HP StorageWorks Fabric OS 6.2 administrator guide (5697-0016, May 2009)

480 Configuring and monitoring FCIP extension services
Example: Creating an FCIP tunnel with FastWrite and Tape Pipelining enabled
switch:admin> portcfg fciptunnel ge1 create 1 192.168.1.2 192.168.1.201 0 -f -t
!!!! WARNING !!!!
The fastwrite and tape pipelining features are incompatible with multiple equal
cost paths. Please ensure that there are no multiple equal cost paths in your
fabric before continuing.
Continue with operation (Y,y,N,n): [ n] Y
Operation Succeeded
Verifying the FCIP tunnel configuration
After you have created local and remote FCIP configurations, HP recommends that you verify that the
tunnel configuration operation succeeded using the portShow fcipTunnel command (be sure to
specify the slot/port numbers and the tunnel IDs).
1. Connect to the switch and log in using an account assigned to the admin role.
2. Verify the FCIP tunnel using the portShow fciptunnel command. The command syntax is as
follows.
portShow fciptunnel [slot/][ge0|ge1 all|tunnel_id
where:
all Displays all FCIP tunnels.
tunnel_id Displays the specified FCIP tunnel.
The following example shows an active tunnel FCIP Fastwrite and Tape Pipelining enabled. If TCP Byte
Streaming were enabled, FCIP Fastwrite and Tape Pipelining would be disabled.
SP3:admin> portshow fciptunnel ge1 1
Port: ge1
-------------------------------------------
Tunnel ID 1
Tunnel Description Not Configured
Remote IP Addr 192.168.15.2
Local IP Addr 192.168.15.1
Remote WWN Not Configured
Local WWN 10:00:00:05:1e:41:2f:2e
Compression on
Fastwrite on
Tape Pipelining on
Committed Rate 200000 Kbps (0.200000 Gbps)
SACK on
Min Retransmit Time 100
Keepalive Timeout 10
Max Retransmissions 8
VC QoS Mapping off
DSCP Marking (Control): 0, DSCP Marking (Data): 0
VLAN Tagging Not Configured
TCP Byte Streaming off
Status : Inactive
Connected Count: 1
If IPsec has been enabled and a policy added to the configuration, you will see the policy information
under the status section of the output, as shown below. The policy information is visible only when IPsec