Module 3 Zoning
Module 3 Zoning
Module 3
Objectives
– Describe
– Basic Zoning
– Traffic Isolation zones
– LSAN zones
– Target Driven Peer Zones
– Fabric-based service that enables partitioning the network into logical groups of devices that can
communicate
– Devices not zoned with another device will not be able to communicate with each other
– Devices not included in an effective zone configuration are inaccessible to all other devices in the fabric
– Devices can be members of multiple zones
– Standard zones
– Frame redirection zones
– LSAN zones
– LSAN Peer zones
– Quality of Service zones (QoS zones)
– Traffic Isolation zones (TI zones)
– Peer zones
– Target Driven Peer zones
– For example HPE 3PAR Smart SAN
– Controls device access if zoning is not implemented or – View the current zone configuration using cfgActvShow
there is no effective zone configuration
– View the current default zone access mode
– All Access – default setting – defzone --show
– All devices with the fabric can communicate with all other
devices – Setting the default to No Access
– defzone –noaccess
– No Access
– cfgsave
– Devices in the fabric cannot access any other device in the
fabric – Setting the default zone to All Access
– All switches in a fabric must have the same setting – defzone –allaccess
– cfgsave
– Switches in large fabrics > 120 devices should set the
default zone to No Access
– Names must start with an alphabetic character and may contain alphanumeric characters and underscore
– Names are not case-sensitive
– Zone, alias and configuration names cannot begin with
– “bfa_”, “red_”, “lsan_red_”, “d_efault_”
– Zone configuration names cannot begin with the string “r_e_d_i_r_c_fg”
– Normal zone names cannot begin with “bfa_” prefixes or end with “blun_” suffixes
– Recommended character limit of 64 characters
– Duplicate names are not allowed within a zone database
– cfgsize allows you to monitor and view the size of the zoning database
– Members
– Identified by the
– Physical port number or port index on the switch (Domain ID, Port)
– Node World Wide Name (N-WWN)
– Port World Wide Name (P-WWN)
– Alias
– Can be a member of multiple Zones
– Viewing an alias
– alishow
– Defined Configuration
– Complete set of all zone objects defined in a fabric
– Effective Configuration
– Built when a configuration is enabled
– Only one configuration can be in effect at a time
– Saved configuration
– Copy of the defined configuration plus the name of the effective configuration which is saved in flash memory
– Disabled configuration
– The effective configuration is removed from flash memory
– Is not deleted from the zone database
cfgadd “cfgname", "member [; member...]" – Clearing all zone configurations using cfgclear
– Removing members from a configuration using – Will clear all configurations that are defined not in effect
cfgRemove cfgclear
cfgremove “cfgname ", "member [; member ...]" – Viewing all zone configuration information using
– Enabling a configuration using cfgenable cfgShow
cfgenable “cfgname” cfgshow
B-series switches
Configuration Enabled
definitions configuration
Create
configurations cfgEngMkt
aliCreate ZoneEng
zoneCreate ZoneMkt
cfgCreate
SDRAM
Switch
domain 1 Flash
memory
cfgEngMkt cfgEngMkt
ZoneEng ZoneEng
ZoneMkt ZoneMkt
SDRAM
Switch
domain 1
Flash
memory
Confidential – For Training Purposes Only 16
Zone management commands (3 of 5)
cfgDisable
B-series switches
Configuration Enabled
definitions configuration
cfgEngMkt cfgEngMkt
ZoneEng ZoneEng
ZoneMkt ZoneMkt
SDRAM
Switch
domain 1
Flash
memory
Confidential – For Training Purposes Only 17
Zone management commands (4 of 5)
cfgclear
B-series switches
Configuration Enabled
definitions configuration
cfgEngMkt
ZoneEng
ZoneMkt
SDRAM
Switch
domain 1
Flash
memory
Confidential – For Training Purposes Only 18
Zone management commands (5 of 5)
cfgSave
B-series switches
Configuration Enabled
definitions configuration
cfgEngMkt cfgEngMkt
ZoneEng ZoneEng
ZoneMkt ZoneMkt Writes “name”
Only to
flash
SDRAM
Switch
domain 1
Flash
memory
Confidential – For Training Purposes Only 19
Creating a configuration example
aliCreate “Alias_Name”,“member”
zoneCreate “Zone_Name”,“Alias_Name_1;Alias_Name_2”
cfgCreate “cfg_Name”,”Zone_Name;Zone_Name”
cfgEnable “cfg_Name”
cfgSave “cfg_Name”
configUpload “host_IP”,“user”,“/file_name”,“password”
– Zones can contain all WWN members or all Domain ID/Port members or a combination
– Frame-based hardware enforcement is in effect if all members of a zone are identified the same way
– Session-based hardware enforcement is in effect if the zone has a mix of WWN and Domain ID/Port
members
– If a port is in multiple zones and is defined by WWN in one zone and Domain/ID in another then session-
based hardware enforcement is in effect.
– When zoning a fabric with different releases of FOS zoning tasks should be performed from the latest FOS
– Zone using the core switch is preferred to using an edge switch
– When adding a switch to a fabric the defzone policy should be configured prior to connecting the new
switch.
– Allows the administrator to control the flow of the interswitch traffic by creating a dedicated path for traffic
flowing from a specific set of source ports
– Use case:
– Dedicate an ISL to high priority, host to target traffic
– Force high volume, low priority traffic onto a given ISL to limit the effect on the fabric of this high traffic patter
– To ensure that requests and response of FCIP-based applications such as tape pipelining use the same VE_port
tunnel across a metaSAN
– Implemented using a special zone called a Traffic Isolation zone (TI zone)
– TI zone failover
– Can be enabled or disabled
– Disabled guarantees the TI zone traffic uses only the dedicated path
– Enabled allows alternate routes if the dedicated path cannot be used and if you want other traffic to be able to use the
dedicated path if the non-dedicated paths cannot be used
– TI zone must include E_Ports and N_Ports that for a complete end to end route from initiator to target
– When an E_Port is a member of a TI zone that E_Port cannot have its index swapped with another port
– An E_Port used in a TI zone should not be a member of more than one TI zone
– If multiple E_Ports are configured on the lowest cost route to a domain, the various source ports for that zone are
load-balanced
– TI zones reside only in the defined configuration, not the effective configuration and must be enabled to
become active
– TI zones only provide traffic isolation and is not a regular zone
– FSPF supports a maximum of 16 paths to a given domain and includes paths in a TI zone
– For any trunk group, all members of the group need to belong to the TI zone
‒ To activate the TI zone use cfgactvshow then cfgenable “current effective configuration”
‒ To activate the TI zone use cfgactvshow then cfgenable “current effective configuration”
– When merging switches TI zones are not automatically activated after the merge
– Ports in different TI zones cannot communicate with each other if failover is disabled
– TI zone members in multiple TI zones must have the same failover policy on each TI zone
– Fabric 1 contains a host that will be connecting to 2 – Add the LSAN to the zone configuration
target devices in Fabric 2 – cfgadd “zone_cfg”, “lsan_zone_fabric75”
– Host has WWN 10:00:00:00:c9:2b:c9:0c (connected to
Fabric1) – Enable the configuration
– Target A has WWN 50:05:07:61:00:5b:62:ed (connected to – cfgenable “zone_cfg”
Fabric2)
– Target B has WWN 50:05:07:61:00:49:20:b4 (connected to
Fabric2) – On Fabric 2
– Connect to the router or switch with the EX_port or VEX_port and verify using lsanzoneshow –d
switch:admin> lsanzoneshow -d
Fabric ID: 2 Zone Name: lsan_zone_fabric2
10:00:00:00:c9:2b:c9:0c Imported from FID 75
50:05:07:61:00:5b:62:ed EXIST in FID 2
50:05:07:61:00:49:20:b4 EXIST in FID 2
Fabric ID: 75 Zone Name: lsan_zone_fabric75
10:00:00:00:c9:2b:c9:0c EXIST in FID 75
50:05:07:61:00:5b:62:ed Imported from FID 2