Notice This manual contains information that is proprietary to SANRAD. No part of this publication may be reproduced in any form whatsoever without prior written approval by SANRAD.
Limited Warranty SANRAD warrants to the CUSTOMER that the hardware in the V-Switch to be delivered hereunder shall be free of defects in material and workmanship under normal use and service for a period of twelve (12) months following the date of shipment to the CUSTOMER.
liable for any indirect, incidental, consequential, special, or exemplary damages or lost profits, even if SANRAD has been advised of the possibility of such damages. This Agreement shall be construed and governed in accordance with the laws of the State of Israel. Regulatory Information FCC-15 User Information The V-Switch has been tested and found to comply with the limits of the Class A digital device, pursuant to Part 15 of the FCC rules.
Safety Notices Read and understand the following notices before installing the V-Switch. The power plug must be accessible at all times because it serves as the main disconnecting vehicle. Unplug the V-Switch power cord before performing maintenance procedures. The V-Switch contains two power supply units. To disconnect the V-Switch completely, all power supply cords must be unplugged. Do not touch the power supplies when their power cords are connected.
SPCLI3.1.
T Table of Contents CHAPTER 1: V-Switch............................................................................. 1-1 V-Switch Overview............................................................................................................. 1-2 Order of Operations........................................................................................................... 1-3 Manual Organization .........................................................................................................
CHAPTER 3: Installing the V-Switch 3000 ............................................. 3-1 Chassis ............................................................................................................................... 3-2 Front Panel ................................................................................................................................................................3-2 Back Panel................................................................................................
iscsi discovery rportal set.........................................................................................................................................4-21 iscsi discovery rportal discover ................................................................................................................................4-22 iscsi discovery rportal add........................................................................................................................................
Creating an iSCSI Target................................................................................................. 7-10 Viewing iSCSI Targets .............................................................................................................................................7-13 Viewing iSCSI Target Details...................................................................................................................................7-13 Viewing Access Rights................................
Changing iSCSI Target Parameters ..........................................................................................................................9-6 Removing an iSCSI Target ........................................................................................................................................9-7 Removing a RADIUS Server......................................................................................................................................9-7 Removing an iSNS Server ..
CHAPTER 11: Command Line Interface ............................................... 11-1 V Switch Configuration ................................................................................................... 11-2 admin show..............................................................................................................................................................11-3 admin add .................................................................................................................
system set..............................................................................................................................................................11-21 system copy ...........................................................................................................................................................11-21 system show .........................................................................................................................................................
Volume Exposure .......................................................................................................... 11-42 iscsi portal show.....................................................................................................................................................11-43 iscsi portal create ...................................................................................................................................................11-43 iscsi portal remove ..................
lu details.................................................................................................................................................................11-66 lu remove ...............................................................................................................................................................11-67 lu statistics show .............................................................................................................................................
CHAPTER 13: Sample Configurations.....................................................A-1 Sample Introduction ..........................................................................................................A-2 Installing and Using the V-Switch 3000 ...........................................................................A-2 Replacing a Mirrored Volume ...........................................................................................A-9 Replicating Data Off-line .........................
Figure 5-2. Figure 5-3. Figure 6-1. Figure 6-2. Figure 6-3. Figure 6-4. Figure 6-5. Figure 6-6. Figure 6-7. Figure 6-8. Figure 6-9. Figure 6-10. Figure 6-11. Figure 6-12. Figure 6-13. Figure 6-14. Figure 6-15. Figure 6-16. Figure 6-17. Figure 6-18. Figure 7-1. Figure 7-2. Figure 7-3. Figure 7-4. Figure 7-5. Figure 7-6. Figure 7-7. Figure 7-8. Figure 7-9. Figure 7-10. Figure 7-11. Figure 7-12. Figure 7-13. Figure 7-14. Figure 7-15. Figure 7-16. Figure 7-17. Figure 7-18. Figure 7-19. Figure 8-1. Figure 8-2.
Figure 8-12. Figure 8-13. Figure 8-14. Figure 8-15. Figure 8-16. Figure 8-17. Figure 8-18. Figure 8-19. Figure 8-20. Figure 8-21. Figure 9-1. Figure 9-2. Figure 10-1. Figure 10-2. Figure 10-3. Figure A-1. Figure A-2. Figure A-3. Figure A-4. Figure A-5. Figure A-6. Figure A-7. Figure A-8. Figure A-9. Figure A-10. Figure A-11. Figure A-12. Figure A-13. Figure A-14. Figure A-15. Figure A-16. Figure A-17. Figure A-18. Figure A-19. Figure A-20. Figure A-21. Figure A-22. Figure A-23. Figure A-24. Figure A-25.
List of Tables Table 1-1: Manual Chapter Organization ....................................................................................... 1-4 Table 1-2: CLI Command ............................................................................................................... 1-5 Table 1-3: Hot Keys ........................................................................................................................ 1-6 Table 2-1: V-Switch 2000 LEDs.....................................................
Table 11-15: Storage Disks ........................................................................................................ 11-25 Table 11-16: Storage Aliases ..................................................................................................... 11-25 Table 11-17: Storage Details ...................................................................................................... 11-26 Table 11-18: Details of all Subdisks ..............................................................
Table 12-8: UDP Statistics............................................................................................................ 12-7 Table 12-9: iSCSI Sessions.......................................................................................................... 12-7 Table 12-10: Basic iSCSI Session Details.................................................................................... 12-8 Table 12-11: Advanced iSCSI Session Details ............................................................
xvi SANRAD V-Switch CLI User Manual
1 V-Switch IN THIS CHAPTER V-Switch Overview Order of Operations Manual Organization CLI - Command Line Interface Technical Assistance The V-Switch is a storage virtualization and management solution that allows you to pool physical storage resources and re-partition the total storage capacity into virtual volumes that best meet your storage needs. The V-Switch is a high performance appliance that operates in the data-path of a storage network between the hosts and storage subsystem.
V-Switch Overview The V-Switch provides protocol bridging, routing, switching and volume management in a single platform. Figure 1-1, details a standard V-Switch network topology. Two V-Switches sit in the center of the network, providing load balancing and failover ability. Above the V-Switches are IP clouds connecting the network(s) management and host stations. The hosts can connect to the V-Switch directly or via an IP cloud.
Tower Hostbox Tower box Host Tower Hostbox Management Clients Terminal Cloud IP Cloud Management Clients Terminal IP Cloud Cloud Tower box Host V-Switch 1 V-Switch 2 10236 FC Cloud Cloud Figure 1-1. RAID JBOD SCSI Connection SCSI Connection RAID RAID RAID V-Switch Network Topology Order of Operations Whether being used as a bridging switch between FC or SCSI and iSCSI or as a storage virtualization switch, the V-Switch is operated in the following manner: Chapter 1: V-Switch STEP 1.
Manual Organization This manual is designed to guide you step-by-step through V-Switch installation, configuration, virtualization, maintenance and troubleshooting. The chapters are set up as follows: Table 1-1: Manual Chapter Organization Chapter Title Description Chapter 2 “Installing the V-Switch 2000” Explains the V-Switch2000 chassis, cabling connections and power up procedures.
CLI - Command Line Interface The Command Line Interface (CLI) is used to implement all V-Switch management functions, including switching, virtualization and security. The CLI is available via: Console port via an RS232 connection. 10/100 Ethernet Management port via a Telnet session (V-Switch 3000 only). 1 Gb Ethernet port Eth1 via a Telnet session. All CLI commands are case sensitive and must be entered in lower case.
The CLI supports the use of the following hot keys for the listed functions: Table 1-3: Hot Keys Command Description ? LIST OF COMMANDS WITH A SHORT DESCRIPTION OF EACH ! RETURN TO MAIN MENU Esc ABORT CURRENT COMMAND # DISPLAY LAST COMMAND TO VIEW COMMAND HISTORY Tab COMPLETE A COMMAND TO THE POINT OF AMBIGUITY Technical Assistance SANRAD is continually striving to provide top-of-the-line products. If you have found an error in this user manual, please report it to: documentation@sanrad.
2 Installing the V-Switch 2000 IN THIS CHAPTER The V-Switch 2000 is a 1U high performance storage networking appliance that can be surface or rack mounted. Chassis Surface Mounting Rack Mounting Storage Port Connections Network Port Connections Console Port Connection Powering Up After mounting the V-Switch 2000, connect the requisite cables.
Chassis The V-Switch 2000 is a 1 U surface or rack-mountable storage network appliance. Its front panel includes the console port, network ports, storage ports, system indicator LEDs and reset button. Its back panel includes the fans and power supply. Front Panel RS232 console port 2. Two 1 Gb copper Ethernet network port interfaces 3. Two SCSI or two FC storage port interfaces 4. Reset push button 10203 1. 1 Figure 2-1.
10209 2 1 Figure 2-2. 3 4 V-Switch 2000 Front Panel – FC Back Panel Fans 6. Power supply 10214 5. 5 Figure 2-3.
System Indicator LEDs Table 2-1 lists the V-Switch 2000 indicator LEDs as shown in Figure 2-4.
1 2 2 4 10210 1 Figure 2-5. 3 3 5 V-Switch 2000 LEDs – FC Surface Mounting The V-Switch 2000 chassis is manufactured with four chassis feet. The V-Switch 2000 is ready to be mounted on any secure flat surface. If you plan to rack mount the V-Switch 2000, continue with “Rack Mounting.” Rack Mounting The V-Switch 2000 chassis can be mounted on a 19-inch rack. The V-Switch 2000 can be mounted alone or two V-Switches can be joined and mounted together in a single 1U space.
STEP 1. PLACE THE V-SWITCH 2000 RIGHT SIDE UP ON A SECURE FLAT SURFACE NEAR THE RACK STEP 2. ATTACH THE LEFT FRONT L-BRACKET The left front L-bracket is the wide L-bracket with two round openings for air intake. Attach it with four of the included screws. The bracket sits directly against the V Switch. STEP 3. ATTACH THE RIGHT FRONT L-BRACKET There are two types of right front L-brackets, depending on if the V-Switch is single or dual-mounted.
Storage Port Connections Connect the SAN storage devices or fabric to the V-Switch 2000 using the FC/SCSI storage ports. The storage ports are located on the front right of the V-Switch 2000. The type of storage ports on your V-Switch 2000 will vary depending on your V-Switch 2000 order specifications – either two SCSI or two FC ports. The V-Switch 2000 contains a storage auto-discovery function.
The V-Switch 2000 supports two storage ports in any combinations of the following: Table 2-2: SCSI Storage Port Connection Type LENGTH SCSI ULTRA3 LVD 160MB/SEC 68 PIN PORT UP TO 12M 10211 SCSI CONNECTOR FC Storage Ports Figure 2-7. Table 2-3: V-Switch 2000 FC Storage Ports FC Storage Port Connection Types FIBRE CHANNEL 1 GBIT/2 GBIT NL_PORT OR N_PORT OF EITHER Your exact port configuration will depend on your VSwitch 2000 order specifications.
Network Port Connections The copper network ports, labeled Eth 1 and 2, are located on the front left of the V-Switch 2000. Use the 1Gb Ethernet ports to connect to the network or directly to the host station. When configuring your network topology, keep in mind that the current initiator technology does not support volume access by more than one server at a time.
Console Port Connection 10207 The console port, labeled Console, is located on the front left of the V-Switch 2000. Use this RS232 port and included male-female straight cable to connect a console or dumb terminal to the V-Switch 2000 for initial system configuration and local management. Console Port Figure 2-9. V-Switch 2000 Console Port Powering Up Do not power the VSwitch 2000 up and down quickly.
10213 Power Switch Figure 2-10. V-Switch 2000 Power Supplies Reconfirm that all storage devices are powered up. Plug the power cable into the V-Switch 2000 power supply and then into the power source. Push the power switch to the ON position. The V-Switch 2000 powers up. The Power indicator LED on the front right of the V-Switch 2000 turns green. Each network port 1 Gb indicator LED turns green only if connected to the network and operating at 1 Gb.
2-12 SANRAD V-Switch CLI User Manual
3 Installing the V-Switch 3000 IN THIS CHAPTER The V-Switch 3000 is a 1U high performance storage networking appliance that can be surface or rack mounted. Chassis Surface Mounting Rack Mounting Storage Port Connections Network Port Connections Console Port Connection Management Port Connection LCD Compact Flash (CF) Slot Scalability Port Powering Up After mounting the V-Switch 3000, connect the requisite cables.
Chassis The V-Switch 3000 is a 1 U surface or rack-mountable storage network appliance. Its front panel includes the LCD display and programming buttons, system indicator LEDs and network ports. Its back panel includes the storage ports, redundant power supplies, compact flash and console port. Front Panel 1. LCD display 2. LCD display programming buttons 3. One 10/100 Management Port 4. Three 1 Gb Ethernet Network Ports; both copper and FO interfaces 5.
7 10238 6 10 9 8 Figure 3-2. V-Switch 3000 Back Panel System Indicator LEDs Table 3-1 lists the V-Switch 3000 indicator LEDs as shown in Figure 3-3.
4 act 6 act 6 act 2 6 act Sys OK 10269 1 Power 100 5 1 GB 7 1 GB 7 Figure 3-3. 1 GB 7 FC/SCSI 8 Scale 3 V-Switch 3000 LEDs Surface Mounting The V-Switch 3000 chassis is manufactured with four chassis feet. The V-Switch 3000 is ready to be mounted on any secure flat surface. If you plan to rack mount the V-Switch 3000, continue with “Rack Mounting.” Rack Mounting The V-Switch 3000 chassis can be mounted on a 19-inch rack. The V-Switch 3000 is shipped with an accessory packet of hardware.
STEP 1. ATTACH THE REAR MOUNTS Using screws that you provide, attach the rear mounts to the back mounting posts so that the length of each mount is parallel to the floor and extends forward into the rack space. The lip of each mount is at the bottom and facing inward toward the opposite rear mount. The rear of the V-Switch 3000 will be supported from underneath on these lips. STEP 2. PLACE THE V-SWITCH 3000 RIGHT SIDE UP ON A SECURE FLAT SURFACE NEAR THE RACK STEP 3.
Storage Port Connections Connect the SAN storage devices or fabric to the V-Switch 3000 using the FC/SCSI storage ports. The storage ports are located on the back upper left of the V-Switch 3000. The number and configuration of storage ports on your V-Switch 3000 will vary depending on your V-Switch 3000 order specifications. The V-Switch 3000 contains a storage auto-discovery function. At powerup the V-Switch 3000 automatically scans for and registers all attached and powered up network storage devices.
The V-Switch 3000 supports up to four storage ports in any combinations in pairs of the following: Table 3-2: Storage Port Connection Types FC CONNECTOR Your exact port configuration will depend on your VSwitch 3000 order specifications.
A copper connection will not work if an SFP is present in the port. At power up, the V-Switch 3000 automatically registers which connector, copper or fiber optic, is active by searching for an SFP optical transceiver. The presence of an SFP will automatically determine which mode is active. Once the port is active in one mode, it will not change modes unless the first, active connection is broken first.
Each network port has two LEDs: act – indicates whether the port is connected and active: slow blink – active; fast blink – port traffic. 1 Gb – indicates whether the port is operating at 1 Gb. The LED is off if the port is operating at 10/100. Console Port Connection 10240 The console port, labeled Console, is located on the back lower left of the VSwitch 3000.
10219 Management Port - RJ45 Figure 3-8. V-Switch 3000 Management Port The management port has two LEDs: act – indicates whether the port is connected and active: green – active; blinking – port traffic 100 – indicates how the port is operational: on – 100; off – 10. 10076 act LED 100 LED Figure 3-9. V-Switch 3000 Management Port LEDs LCD 10221 The LCD is located on the front left of the V-Switch 3000. The LCD has two rows of 16 characters each in addition to six control buttons.
Compact Flash (CF) Slot The compact flash slot, labeled CF Card, is located on the back center of the VSwitch 3000. A compact flash card is inserted into the slot and the configuration database is mirrored into the flash card for configuration recovery if replacing a V-Switch 3000. Scalability Port 10241 The scalability port is for future use and is not supported currently. The scalability port, labeled Scalability, is located on the back lower left side of the V-Switch 3000.
Powering Up You can power up the V-Switch 3000 once you have connected and powered up the storage devices. The V-Switch 3000 contains a storage auto-discovery function. At power- up the V-Switch 3000 automatically scans for and registers all attached and powered up network storage devices. Therefore, power up all storage devices before powering up the V-Switch 3000. Storage devices added after V-Switch 3000 power- up will be registered in the next V-Switch 3000 storage network scan.
4 V-Switch Configuration IN THIS CHAPTER Introduction to Managing the VSwitch Initial V-Switch Configuration Changing Management Parameters Configuring the Storage Ports Configuring the Network Ports Discovering iSCSI Targets Configuring iSCSI Portals Configuring IP Routing After the V-Switch is connected properly to the physical disks, management station and the network and powered up, the VSwitch must be configured.
Introduction to Managing the V-Switch After powering up the V-Switch, the first thing you must do is to configure its management parameters. This can be done via telnet, SSH, using the V-Switch LCD panel (for V-Switch 3000 only) or via a console or dumb terminal to open a direct connection with the V-Switch’s RS232 console port. The V-Switch can be managed in one of three different ways. Each way requires a different configuration.
B In-Band Management Telnet Station IPCloud Cloud Gb port RS232 port Gb port 10/100 port 10/100 port RS232 port Modem Fast Ethernet Network C A C Clients Console Clients Console 10223 Modem Clients Terminal Management Out-of-Band Management Figure 4-1.
Initial V-Switch Configuration The V-Switch has a default IP Address of 10.11.12.123. This allows you to set initial startup parameters via a telnet session. Assigning a Management IP Address Mgnt port is only for V-Switch 3000. The management IP address can be set via: RS-232 port Telnet session LCD Buttons (only for V-Switch 3000) Telnet/SSH Connection To initialize the V-Switch via telnet/SSH session: 1. Change your computer’s IP Address to anything on the same subnet 10.11.12.* 2.
RS232 Serial Connection To initialize the V-Switch via an RS-232 serial connection: Connect the cable to the appropriate port on the management server, and open a Terminal session. Set the following parameters in the terminal: PARAMETER SYSTEM REQUIREMENT CONFIG SERIAL PORT COMX (ACCORDING TO YOUR PHYSICAL PORT CONNECTION) BITS PER SECOND 115200 DATA BITS 8 PARITY NONE STOP BITS 1 FLOW CONTROL NONE EMULATION AUTODETECT Figure 4-2.
You must define only one port for management. Both can not be active at the same time. LCD Buttons The V-Switch 3000 has buttons next to its LCD display. You can use these to assign the initial setup parameters. To assign management IP for V-Switch 3000 via the LCD buttons: Toggle the LCD buttons to set an IP address and IP mask. For example: IP Address: 192.168.1.1 IP Mask: 255.255.255.
SWITCH PARAMETER -im MANAGEMENT MASK IP DEFINITION STATUS IP MASK FOR THE OPTIONAL DEFAULT: MANAGEMENT PORT EXAMPLE 255.255.255.
Example: The V-Switch alias is reset to V-Switch 1; the IP address for V-Switch management functions is changed to 212.199.43.47. The date is set to the 21st of July, 2002 and the time to 1:30 p.m. Anna Levin is named as the contact person and she can be reached at the internal office extension 4838. device set –n VSwitch1 –ip 212.199.43.
Changing the Telnet Communications Port If your Telnet communications connection to the V-Switch traverses a firewall, the standard Telnet communications port 23 may be blocked by the firewall as a security measure. To enable Telnet communications to the V-Switch, you can designate an alternate port using the CLI command device set -telnet. This port can be opened in the firewall for dedicated Telnet-V-Switch communications.
SWITCH PARAMETER DEFINITION STATUS EXAMPLE -wcom WRITE COMMUNITY COMMUNITY FOR MANAGER TO SET INFORMATION OPTIONAL private TO SEND TRAPS TO MANAGER OPTIONAL YES: SEND NO: DO NOT SEND -trap TRAP DEFAULT: PRIVATE yes DEFAULT: YES Example An SNMP manager is added on IP address 212.199.43.96. It receives traps through port 162. The manager receives information through the public community and writes information through the private community. snmp manager add –ip 212.199.43.
Adding User Login Profiles All CLI names and aliases are case sensitive. After logging in to a V-Switch, a total of ten user profiles (name plus password) can be configured on a V-Switch using the CLI command admin add. The default user name and password sanrad can be maintained or removed. The user name can have from one to twenty characters. The user password can have from six to twelve characters. Both fields are case sensitive and accept all characters, including spaces.
Table 4-2: V Switch Interfaces Type Name Description RS232 cons ETHERNET mgnt FibreChannel FibreChannel SCSI SCSI ETHERNET fc1 fc2 SCSI1 SCSI2 eth1 ETHERNET eth2 ETHERNET eth3 RS232 Management Int Fast Ethernet Manage FC MMF FC MMF SCSI Ultra 3 SCSI Ultra 3 Gigabit Ethernet Net Gigabit Ethernet Net Gigabit Ethernet Net Alias Phys Address cons 000000000000 mgnt 000000000000 fc1 fc2 SCSI1 SCSI2 eth1 000000000000 000000000000 000000000000 000000000000 00081a000110 eth2 00081a000111 eth3
Example Storage port 3, pscsi3, is assigned SCSI bus ID 12. pscsi set busid –if pscsi3 –id 12 Viewing the FC Port Information Use the CLI command fc interface show to view all FC ports on the VSwitch; their World Wide Port Names (WWPN) and administrative and operative types.
Example fc set –if fc2 –sp 1 –pt nl –cm prl Viewing the V-Switch World Wide Node Name Use the CLI command fc node show to view the V-Switch World Wide Node Name (WWNN). fc node show Name Description WWNN Function V-Switch1 SW Version 1.5, build 5,patch 0 Board version 1, PCB version 20:00:20:10:58:00:10:46 Gateway Configuring the Network Ports Each network port must be located on a separate subnet. Each network port can have more than one IP address.
SWITCH PARAMETER DEFINITION STATUS EXAMPLE -act ACTIVITY IF IP ADDRESS IS ACTIVE TO EXPOSE VOLUMES. USE INACTIVE STATUS TO ALLOW FAILOVER. OPTIONAL DEFAULT: 1 (ACTIVE) 1 2 (INACTIVE) For regular port activity, use the default active port setting. The inactive port setting is used when configuring a V-Switch cluster. If you are configuring a VSwitch cluster, each IP address must be configured on both V-Switches in the VSwitch cluster.
10225 212.199.43.46 Figure 4-4. 212.199.75.66 212.199.43.56 212.199.12.67 212.199.43.57 212.199.12.70 V-Switch IP Adresses Removing an IP Address An IP address that has a portal configured on it cannot be removed. Network ports can have multiple IP addresses. You can remove an IP address that is no longer relevant from a network port using the CLI command ip config remove. You can remove the last network IP address from a port, but you cannot remove the management IP address from Eth1.
10226 212.199.43.46 212.199.75.66 212.199.43.56 212.199.12.67 212.199.43.57 Figure 4-5. Ethernet Port 3 with One IP Address Discovering iSCSI Targets iSCSI target discovery is performed across the IP-SAN by the iSCSI initiator located on the server.
iSNS The V-Switch supports Internet Storage Name Service (iSNS) protocol for advertising its targets and portals on the iSNS server to enable iSCSI initiators in the IP-SAN to locate the V-Switch targets automatically. Use the CLI command ip isns add to add an iSCSI server to the V-Switch’s iSNS client. Targets defined by the V-Switch’s Access Control List (ACL) as having controlled access are accessible only to those servers defined as having access to the target. See “Volume Exposure & Security”.
Configuring iSCSI Portals Do not create an iSCSI portal on the management IP address. The V-Switch supports a maximum of 100 portals. To enable communication between iSCSI initiators and iSCSI targets you need to assign a portal to the iSCSI protocol transport. Use the CLI command iscsi portal create to create an iSCSI portal. A portal is the coupling of an IP address and a TCP port. Once created, a portal is opened automatically during a communication session.
Viewing iSCSI Portals You can view all created portals using the CLI command iscsi portal show. iscsi portal show Table 4-5: iSCSI Portals Protocol Address Type Address Port 6 ipv 4 212.199.43.56 3260 6 ipv 4 212.199.43.57 3260 6 ipv 4 212.199.43.66 5003 6 ipv 4 212.199.43.67 5003 Protocol 6 is the transport protocol for iSCSI. Address type IPv 4 designates a four byte IP address. Removing iSCSI Portals You can remove an iSCSI portal using the CLI command iscsi portal remove.
Discovery of iSCSI Storage Devices An iSCSI device can have many portals. Each portal can have remote targets associated with it. In order for the V-Switch to recognize a portal’s remote targets, you must define the IP Address of the iSCSI portal. Once defined, the V-Switch will automatically receive the list of remote targets attached to the portal. iscsi discovery rportal show This command displays iSCSI remote portals.
iscsi discovery rportal discover This command allows you discover remote iSCSI portals. iscsi discovery rportal discover SWITCH PARAMETER DEFINITION STATUS EXAMPLE -ip IP ADDRESS IP ADDRESS OF NETWORK PORT MANDATORY 212.199.43.70 -port TCP PORT TCP PORT FOR ISCSI COMMUNICATION OPTIONAL DEFAULT: 5003 3260 iscsi discovery rportal add This command adds an iSCSI remote portal.
iscsi discovery rportal remove This command removes an iSCSI remote portal. iscsi discovery rportal remove SWITCH PARAMETER DEFINITION STATUS EXAMPLE -ip IP ADDRESS IP ADDRESS OF NETWORK PORT MANDATORY 212.199.43.70 -port TCP PORT TCP PORT FOR ISCSI COMMUNICATION OPTIONAL DEFAULT: 5003 3260 Configuring IP Routing To enable communications between the V-Switch and IP networks located outside the V-Switch LAN, you must configure IP routing paths for each external network port.
Clou Network E d 10.11.30.0 Network F Clou Network D d 10.10.20.0 R 10.12.40.0 12.11.20.20 R R 30.30.20.20 DB 20.20.10.20 DA Etherne 20.22.11.11 Etherne Etherne LAN t C Cloud B LAN t 10227 LAN t A V Switch 1 V Switch 2 Figure 4-6. IP Routing Options Adding an IP Route You can enable communications to networks outside of your LAN by configuring an IP routing path. This allows volume access to hosts located on external networks.
SWITCH PARAMETER DEFINITION STATUS EXAMPLE -if INTERFACE ALIAS NETWORK PORT TO OPEN COMMUNICATION THROUGH MANDATORY eth2 Example: An IP routing path to Network D, IP 10.10.20.0, (IP mask 255.255.255.0) is mapped from network port Eth2 through router gateway 30.30.20.20. ip route add –dip 10.10.20.0 –dmask 255.255.255.0 –gw 30.30.20.20 –if eth2 Setting a Default Gateway You can configure the default gateway for IP routes from two interfaces: 10/100 MBits Mgnt Interface or 1GBits ETH1 Interface.
Checking IP Routes After creating an IP routing path, you can ping any IP-connected device from the V-Switch Eht1 to check that the routing is configured correctly. Use the CLI command ping to ping an IP address from the V-Switch. Make sure that the route is defined on the other side as well. ping You need one parameter to check an IP routing path from the V-Switch. SWITCH PARAMETER DEFINITION STATUS EXAMPLE -ip IP ADDRESS IP ADDRESS TO PING MANDATORY 172.17.200.69 ping –ip 172.17.200.
ip route remove You need three parameters to remove an IP routing path. SWITCH PARAMETER -dip DESTINATION -dmask -if DEFINITION STATUS EXAMPLE IP OF HOST STATION MANDATORY 10.12.40.0 DESTINATION MASK IP MASK OF HOST MANDATORY 255.255.255.0 INTERFACE ALIAS NETWORK PORT TO OPEN COMMUNICATION THROUGH MANDATORY eth3 IP STATION Example: The routing path to destination network IP 10.12.40.0 (IP mask 255.255.255.0) is removed from network port Eth3. ip route remove –dip 10.12.40.0 –dmask 255.
4-28 SANRAD V-Switch CLI User Manual
5 V-Switch Cluster Configuration IN THIS CHAPTER Introduction to V-Switch Clusters Configuring a V-Switch Cluster Managing a Cluster You can configure a V-Switch cluster using two V-Switches of the same type. A cluster is a group of storage units and switches that function as one unit for virtualization and provide high availability in the event of V-Switch failover. A cluster can be configured between two V-Switches using CLI or SANRAD’s StoragePro management GUI.
Introduction to V-Switch Clusters Two V-Switches can be concurrently connected to the same storage devices to balance volume exposure thus creating a V-Switch cluster. In a cluster, each VSwitch interacts in an active-active, peer-to-peer fashion with the other VSwitch, or neighbor, in the cluster. No one V-Switch must be configured specially to act as the master V-Switch in the cluster providing higher flexibility in building a cluster.
. Vol 1 IP1,Target 1 iSCSI initiator Vol 2 iSCSI initiator Tower Hostbox 1 Tower Hostbox 2 IP2,Target 2 IPCloud SAN IP1-active IP2-inactive V Switch 1 V Switch 2 iSCSI Target 1 wwui1 iSCSI Target 2 wwui2 Vol 1 Vol 2 LU0 LU0 JBOD Figure 5-1. When working in a cluster, the V-Switch can support a maximum of 100 portals: 50 active and 50 inactive.
RAID controller are simultaneously exposed through all ports connected to both V-Switches for the V-Switches to provide high availability during a V-Switch failover. In Figure 5-2, V-Switch 1 has gone off-line. V-Switch 2 activates V-Switch 1’s IP address and takes over exposure of Volume 1 to Host 1, represented by the orange dashed line. Host 1 continues to access Volume 1 through the same IP address as it did before its V-Switch went off-line.
Configuring a V-Switch Cluster Setting the V-Switch ID When you configure a cluster, you must give each V-Switch a different device ID for proper cluster functioning. Use the CLI command device set to configure the V-Switch ID for each V-Switch. device set SWITCH PARAMETER DEFINITION STATUS EXAMPLE -id V-SWITCH ID ID OF V-SWITCH IN A CLUSTER MANDATORY IN A CLUSTER 1 EACH V-SWITCH MUST HAVE A DIFFERENT ID 0 OR 1 Example: There are two V-Switches in a cluster. In V-Switch 1 the ID is set to 1.
neighbor add You need to define two parameters to notify a V-Switch of a neighbor. SWITCH PARAMETER DEFINITION STATUS EXAMPLE -nb NEIGHBOR ALIAS OF NEIGHBOR TO ADD TO CLUSTER MANDATORY VSwitch2 -ip IP ADDRESS IP ADDRESS OF MGMT PORT ON NEIGHBOR MANDATORY 212.199.43.75 Example: A V-Switch is informed that it has a neighbor, VSwitch2, and that it can establish communication with VSwitch2 via IP address 212.199.43.75. neighbor add –nb VSwitch2 –ip 212.199.43.
Vol 1 IP1,Target 1 iSCSI initiator Vol 2 iSCSI initiator Tower Hostbox 1 Tower Hostbox 2 IP: 212.199.43.90 IP2,Target 2 IP: 212.199.43.75 IPCloud SAN IP1-active: 212.199.43.90 IP2-inactive: 212.199.43.
Working with SCSI Storage Devices The V-Switch default SCSI bus ID is 7. If your storage cluster includes SCSI storage devices, one of the V-Switch’s default SCSI bus ID may need to be changed, depending on the number of internal bus drives in the attached SCSI storage system. Consult your SCSI system manual to verify if your SCSI device has one or two internal buses. If your SCSI device has one internal bus, both VSwitches in the cluster will be sharing the same bus.
Use the CLI command cluster show to view the keep alive parameters of a cluster. cluster show Last Keep Alive KeepAlive Int(s) Susp Int(s) Dead Int(s) 1 2 6 10 Example: Every 2 seconds V-Switch 1 sends out a keep alive signal. If, after 6 seconds from the last keep alive signal, V-Switch 1 does not receive another keep alive signal from its neighbor, it enters a suspicious interval.
Viewing V-Switch Neighbor Details Use the CLI command neighbor show to view the neighbor configured on a V-Switch. neighbor show Table 5-1: Neighbors in a Cluster Name IP Address UDP VSwitch2 212.199.43.75 161 SNMP Timeout (msec) SNMP # of Retries Use the CLI command neighbor details to list the details of a neighbor in a cluster. neighbor details You need to define one parameter to list neighbor details.
Managing a Cluster If you modify a V-Switch alias or management IP address, you must implement the updates in the neighboring V-Switch. Use the CLI command neighbor set to update a V-Switch on changes in its neighbor. neighbor set You need to define the parameter(s) to modify to reset a neighbor alias or IP address in a cluster.
You need to define the parameters you want to modify in the keep alive interval.
6 Volume Configuration IN THIS CHAPTER After you have configured the V-Switch general parameters, you can begin defining the storage topology using the Volume Manager.
Introduction to Volume Configuration This chapter describes how to identify the SAN storage devices and use them to create subdisks and virtual volumes. Each description includes: A general description and generic diagram. The basic command, switches and parameters needed to execute the command. An example of how to use the command with an accompanying diagram. The specific examples used in this chapter contain two JBODs; each JBOD having four disks, each with a volume of 18 GB.
Identifying Available Storage Devices The V-Switch supports a maximum of 512 disks. Before beginning to configure virtual volumes, you need to know which storage devices are available. Use the CLI command storage show to show the available storage devices and their corresponding aliases needed to configure volumes storage show Table 6-1: Storage Devices Alias Entity Name Stor_1 Stor_2 Stor_3 Stor_4 500507606058c900 2000002037f88fb8 2000002037c32b1f 2000002037c32450 LUN Oper.
You need to define two parameters to blink a storage device: SWITCH PARAMETER DEFINITION STATUS EXAMPLE -s STORAGE DEVICE ALAIS OF DEVICE TO BLINK MANDATORY Stor_1 -t TIME LENGTH OF TIME TO BLINK DEVICE OPTIONAL 120 1-3600 SEC 0=FOREVER DEFAULT: 0 Example: The storage device, Stor_1, is set to blink for two minutes (one hundred and twenty seconds) to allow it to be identified.
The alias of Stor_1 is changed to Disk2JBOD5 for easier identification and it is noted to save the disk for snapshots. storage set –s Stor_1 –na Disk2JBOD5 –info save_for_snap shots The V-Switch supports write cache enabling for increased performance. Use the CLI command storage disk set to enable or disable the write cache.
Alias: Revision Level: Product Id: Serial Number: Number Of Blocks: Block Size: SubDisks: Write Cache Enabled: Write Protected Volume Disk2JBOD5 0002ST336704FC ST336704FC 3CD0FHA400002108XYGLXYGL 71687369 512 Entire true false sim Creating a Transparent Volume Transparent volumes cannot be used in further volume hierarchies.
Example: If you are working in a V-Switch cluster, this volume must be configured on both V-Switches. In Figure 6-2, the logical unit, LUN0 on Disk 1, is converted directly to a virtual transparent volume, Transparent 1. This RAID device has only one LUN. For each LUN configured on a RAID device, the V-Switch registers a disk. Therefore, a RAID device with five LUNs will appear to the VSwitch as five disks.
Table 6-3: Volume Details Alias Vol Type # of Blocks Block Size State Trans1 Transpar 1024 512 Internal Creating a Subdisk (LUN Carving) You can create one or more subdisks on a physical disk. The subdisks can then be converted to simple volumes to be used for creating concatenated, striped and mirrored virtual volumes. When you create a subdisk, only the defined area is converted into a subdisk.
SWITCH PARAMETER DEFINITION STATUS EXAMPLE –sd SUBDISK ALIAS USER-ASSIGNED ALIAS FOR SUBDISK OPTIONAL DEFAULT: DEF_SPLIT_ CLUSTER NO_ DISK NO_END ADDRESS IN BLOCKS Subdisk1 Example: In Figure 6-4, you see Disk 1 before a subdisk is created on it. JBOD 1 JBOD 2 Disk 2 Disk 5 Disk 6 Disk 3 Disk 4 Disk 7 Disk 8 10066 Disk 1 Figure 6-4. If you are working in a V-Switch cluster, this volume must be configured on both V-Switches.
JBOD 1 JBOD 2 Disk 1 Disk 2 Disk 5 Disk 6 Disk 4 Disk 7 Disk 8 Subdisk 1 10067 Disk 3 Figure 6-5. Disk 1 with 1 Subdisk After creating the subdisk, you can use the CLI command subdisk show to view it and all configured subdisks. You can use the CLI command subdisk details to view the details of the created subdisk. subdisk details You need to define one parameter to view subdisks.
For the rest of the physical volume on Disk 1 to be usable to the Volume Manager, you must create another subdisk. subdisk create –d Disk1 –sl 18000000 Subdisk2 JBOD 1 Disk 1 –sa 18000000 –sd JBOD 2 Disk 2 Disk 5 Disk 6 Disk 4 Disk 7 Disk 8 Subdisk 1 Subdisk 2 10082 Disk 3 Figure 6-6. Disk 1 with 2 Subdisks Creating a Simple Volume The V-Switch supports a maximum of 512 volumes.
Simple Volume B1 B2 B3 B4 Disk 1 Physical Volume Disk 2 S1 S2 S3 S4 S1 S2 S3 S4 S5 S6 S7 S8 S5 S6 S7 S8 S9 S10 S11 S12 S9 S10 S11 S12 S13 S14 S15 S16 S13 S14 S15 S16 Figure 6-7. 10025 Virtual Volume Simple Volume Block Distribution volume create simple You need to define three parameters to create a Simple Volume. If you are working in a V-Switch cluster, this volume must be configured on both V-Switches.
JBOD 1 Disk 1 JBOD 2 Disk 2 Disk 5 Disk 6 Disk 4 Disk 7 Disk 8 Simple 1 Subdisk2 10068 Disk 3 Figure 6-8. Simple Volume 1 Use the CLI command volume show to show the created volume: volume show Alias Type Simple1 Simple Act # of Bl Pot # of Bl Bl Size 17999999 17999999 512 State Internal Creating a Concatenated Volume The V-Switch supports a maximum of 512 volumes.
Concatenated Volume B1 B2 B3 B4 B5 B6 B7 B8 Disk 1 Physical Volume S2 S3 S4 S1 S2 S3 S4 S5 S6 S7 S8 S5 S6 S7 S8 S9 S10 S11 S12 S9 S10 S11 S12 S15 S16 S13 S14 S15 S16 S13 S14 Figure 6-9.
Example: If you are working in a V-Switch cluster, this volume must be configured on both V-Switches. In Figure 6-10, Simple Volume 5 and Simple Volume 12, both built over an entire physical disk, are concatenated to create a concatenated volume, Concat 1. Data is read/written first to Simple 5. When the data chunk gets to the end of Simple 5, it continues with Simple 12 reflecting the volume order as entered in the CLI command.
Creating a Striped Volume The V-Switch supports a maximum of 512 volumes. A striped volume has data written equitably across two or more disks to provide higher read/write rates. Subdisks within a striped volume need to be on different disks to realize the benefits of striping. Throughput increases with the number of disks within a striped volume. In Figure 6-11, data block 1 is mapped to section 1 of Disk 1; data block 2 is mapped to block 1 of Disk 2.
SWITCH PARAMETER DEFINITION STATUS –nbc NUMBER OF CHILDREN NUMBER OF OPTIONAL DEFAULT: –ch CHILD FIRST VOLUME (CHILD) TO WRITE TO MANDATORY Simple2 –ch CHILD SECOND VOLUME (CHILD) TO WRITE TO MANDATORY Simple4 –ch CHILD THIRD VOLUME (CHILD) TO WRITE TO MANDATORY Simple8 –ch CHILD FOURTH VOLUME (CHILD) TO WRITE TO MANDATORY Simple10 VOLUMES OR CHILDREN FROM WHICH TO BUILD STRIPED VOLUME EXAMPLE 2 4 The system default for the number of children data is being striped across is tw
Striped Volume 1 JBOD 1 JBOD 2 Disk 2 Disk 5 Disk 6 Simple 1 Simple 3 Simple 7 Simple 9 Simple 2 Simple 4 Simple 8 Simple 10 Disk 3 Disk 4 Disk 7 Disk 8 Simple 5 Simple 6 Simple 11 Simple 12 10060 Disk 1 Figure 6-12. Striped Volume 1 Creating a Mirrored Volume Use mirroring to create data backups. The V-Switch supports a maximum of 512 volumes. 6-18 A mirrored volume is synchronously written into two or more volumes.
Mirrored Volume B1 B2 B3 B4 Disk 1 Physical Volume Disk 2 S1 S2 S3 S4 S1 S2 S3 S4 S5 S6 S7 S8 S5 S6 S7 S8 S9 S10 S11 S12 S9 S10 S11 S12 S13 S14 S15 S16 S13 S14 S15 S16 10024 Virtual Volume Figure 6-13.
Mirrored Volume 1 JBOD 1 JBOD 2 Disk 2 Disk 5 Disk 6 Simple 1 Simple 3 Simple 7 Simple 9 Simple 2 Simple 4 Simple 8 Simple 10 Disk 3 Disk 4 Disk 7 Disk 8 Simple 5 Simple 6 Simple 11 Simple 12 10059 Disk 1 Figure 6-14. Mirrored Volume 1 Replicating Data in a Mirrored Volume If one child of a mirrored volume, the source, already contains data, the data can be replicated to the second child, the destination, using the CLI command volume mirror sync.
You need to define two parameters to synchronize a volume: SWITCH PARAMETER DEFINITION STATUS EXAMPLE -src SOURCE VOLUME ORIGINAL VOLUME TO SYNCHRONIZE TO MANDATORY Simple3 -dst DESTINATION VOLUME NEW VOLUME TO ADD TO SYNCHRONINZE MANDATORY Simple5 Example: The online volume Simple3 is synchronized to the online volume Simple5. volume mirror sync –src Simple3 –dst Simple5 Creating a RAID 10 and RAID 0+1 You will need two separate commands to create a RAID 10 or 0+1 volume.
RAID 10 Volume Virtual Volumes B1 B2 B3 B4 B5 B6 B7 B8 Mirrored Volume B1 B3 B5 Mirrored Volume RAID 0 - Striping B7 B2 B4 B6 B8 RAID 1 - Mirroring Disk 2 Disk 3 Disk 4 S2 S3 S4 S1 S2 S3 S4 S1 S2 S3 S4 S1 S2 S3 S4 S5 S6 S7 S8 S5 S6 S7 S8 S5 S6 S7 S8 S5 S6 S7 S8 S9 S10 S11 S12 S9 S10 S11 S12 S9 S10 S11 S12 S9 S10 S11 S12 S13 S14 S15 S16 S13 S14 S15 S16 S13 S14 S15 S16 S13 S14 S15 S16 10029 Disk 1 S1 Physical Volumes Figure 6-
Mirrored Volume 2 JBOD 1 JBOD 2 Disk 2 Disk 5 Disk 6 Simple 1 Simple 3 Simple 7 Simple 9 Simple 2 Simple 4 Simple 8 Simple 10 Disk 3 Disk 4 Disk 7 Disk 8 Simple 5 Simple 6 Simple 11 Simple 12 10061 Disk 1 Figure 6-16. First Mirrored Volume of RAID 10 If you are working in a V-Switch cluster, this volume must be configured on both V-Switches. Next, in Figure 6-17, another mirrored volume, Mirror 3, is created using two children: Simple 3 and Simple 9.
Mirrored Volume 2 Mirrored Volume 3 JBOD 2 JBOD 1 Disk 2 Disk 5 Disk 6 Simple 1 Simple 3 Simple 7 Simple 9 Simple 2 Simple 4 Simple 8 Simple 10 Disk 3 Disk 4 Disk 7 Disk 8 Simple 5 Simple 6 Simple 11 Simple 12 10062 Disk 1 Figure 6-17. Second Mirrored Volume of RAID 10 If you are working in a V-Switch cluster, this volume must be configured on both V-Switches.
Striped Volume 2 Mirrored Volume 2 Mirrored Volume 3 JBOD 1 JBOD 2 Disk 2 Disk 5 Disk 6 Simple 1 Simple 3 Simple 7 Simple 9 Simple 2 Simple 4 Simple 8 Simple 10 Disk 3 Disk 4 Disk 7 Disk 8 Simple 5 Simple 6 Simple 11 Simple 12 10063 Disk 1 Figure 6-18. Striped Volume of RAID 10 To create a RAID 0+1 volume, invert the commands and first create a striped volume and then mirrored volumes of the stripe.
6-26 SANRAD V-Switch CLI User Manual
7 Volume Exposure & Security IN THIS CHAPTER Introduction to Volume Exposure & Security Creating an iSCSI Target Changing the Default Identity Creating an Identity Adding Initiators to an Identity Assigning Identity Credentials Connecting an Identity and Target Exposing an iSCSI Target and LUN After you have created your virtual volumes and storage hierarchies, you want to expose them securely to hosts using the iSCSI protocol.
Introduction to Volume Exposure & Security iSCSI Targets Data is able to be transferred via iSCSI when an iSCSI initiator establishes a TCP connection with an iSCSI target. The iSCSI initiator resides in the host computer and is configured by the system administrator. The iSCSI target resides in the V-Switch and is created by the volume manager.
V-Switch iSCSI Target 2 wwui2 iSCSI Target 3 wwui3 Vol 1 Vol 2 Vol 3 Vol 4 LU0 LU0 LU0 LU1 10124n iSCSI Target 1 wwui1 Figure 7-1. iSCSI Target Access Once a volume has a LUN and is attached to a target, it is accessible to iSCSI initiators. Each initiator can access, read and write into the volume. Identities To allow selective iSCSI initiator access to iSCSI target volumes, the V-Switch uses identities to define pools of initiators. An identity is a user-defined list of iSCSI initiators.
wwui1 wwui2 wwui3 An iSCSI initiator can be listed in multiple identities. Ident A wwui4 wwui5 Ident B wwui6 wwui7 wwui8 10149 wwui9 wwui10 Figure 7-3. Identity B’s iSCSI Initiators In Figure 7-3, there are six iSCSI initiators in Identity B: WWUI 3, 4, 6, 7, 8 and 9. Note that iSCSI initiator 8 is in both Identity A and B. An iSCSI initiator can be listed in multiple identities. wwui1 wwui2 wwui3 Ident A wwui4 wwui5 Ident B wwui6 wwui7 wwui8 Ident C 10150 wwui9 wwui10 Figure 7-4.
wwui1 Vol 1 iSCSI Target 1 wwui21 wwui2 An identity can be used with more than one target. Ident A wwui3 wwui4 iSCSI Target 2 wwui22 Vol 2 Vol 3 wwui5 Ident B wwui6 Vol 4 iSCSI Target 3 wwui23 wwui8 Vol 5 Ident C iSCSI Target 4 wwui24 wwui9 Vol 6 wwui10 Figure 7-5. 10151 wwui7 Identities Coupled with Targets In Figure 7-5, Identity A is coupled with both Targets 1 and 2. Identity B is coupled with Target 3. Identity C is coupled with Target 4.
Access Rights The creation of an identity limits the iSCSI initiators able to access an iSCSI target and its underlying volumes. Now, you want to define the access rights for each identity-target pair. When you couple an identity and target, you assign access rights: read-write (RW), read-only (RO) or not accessible (NA). The access rights are per identity-target pair. An identity can be coupled with multiple targets, each time with different access rights.
wwui1 wwui2 wwui3 Ident A wwui4 wwui5 Re ad -O nly Re rite -W ad Vol 2 iSCSI Target 2 wwui22 Vol 3 Ident B wwui6 wwui7 wwui8 10154 wwui9 wwui10 Figure 7-7. iSCSI Initiator in Two Different Identities In Figure 7-7, iSCSI initiator WWUI8 is part of Identity A and Identity B. If Identity A and Identity B are coupled with Target 2, iSCSI initiator WWUI8 will have two different access options to Volumes 2 and 3: read-write and readonly, depending on the positioning of the identities.
Ident B Credentials wwui3 CHAP SRP wwui4 Sarah C6H12O6 Dinos RockOn wwui6 Dinos RockOn Albert energy 10155 Initiators wwui7 wwui8 wwui9 Figure 7-8. Identity with iSCSI Initiators and Credentials In Figure 7-8, there are six iSCSI initiators in Identity B but only four user name + password credentials. Certain initiators have the same user name + password configured on them. Default Identity When you create a target, it is automatically coupled to a default identity.
iSCSI initiator iSCSI initiator Tower box wwui1 Tower box wwui2 Vol 1 Vol 2 RW RW Vol 3 RW IPCloud SAN V-Switch Identity A Identity B Target 2 Def Ident Def Ident Ident A wwui1 Ident B wwui2 RW RW Default all Default all NA NA iSCSI Target 1 wwui3 iSCSI Target 2 wwui4 Vol 1 Vol 2 Vol 3 LU0 LU0 LU1 Figure 7-9.
If iSCSI initiator WWUI1 tries to login to Target 2, the V-Switch first scans Identity B. It does not find the initiator listed so it continues to scan the next identity, the default identity. The default identity blocks all iSCSI initiators, including WWUI1. The scan stops and the initiator is denied access to Target 2’s underlying volumes, Volume 2 and Volume 3, since the default identity is configured as not assessable.
You need to define three parameters to create an iSCSI target: SWITCH PARAMETER DEFINITION STATUS EXAMPLE -ta TARGET ALIAS USER-ASSIGNED ALIAS FOR ISCSI TARGET MANDATORY finance –tn TARGET WWUI USER-ASSIGNED WORLD-WIDE UNIQUE IDENTIFIER FOR THE TARGET MANDATORY sanrad. billing –device DEVICE ALIAS OF VSWITCH TO EXPOSE TAREGT ON MANDATORY VSwitch1 Example: If you are working in a V-Switch cluster, each target must be configured on both VSwitches.
iSCSI initiator iSCSI initiator Tower box iqn.1991-05.microsoft:steven.sanrad Tower box iqn.1991-05.microsoft:wilbur.sanrad iqn.com.cisco.steven IPCloud SAN V-Switch1 Default all RW 10177n finance sanrad.billing Figure 7-10.
Viewing iSCSI Targets Use the CLI command iscsi target show to view all created iSCSI targets. iscsi target show Table 7-1: iSCSI Targets Target Alias Target Name # of LUs Exposed On: finance sanrad.billing 0 Not exposed musicbox musicbox.sanrad 1 VSwitch1 Viewing iSCSI Target Details Use the CLI command iscsi target details to view the details of an iSCSI target.
Viewing Access Rights After creating a target, use the CLI command acl show to view the target’s automatically connected default identity. acl show Table 7-3: Default Identity Target Access Target Position Identity Access finance 0 DEF_ALL read-write musicbox 0 DEF_ALL not accessible musicbox 1 musicdept read-write Changing the Default Identity If you are working in a V-Switch cluster, the default access rights must be disabled on both VSwitches.
You need to define four parameters to modify an identity: SWITCH PARAMETER DEFINITION STATUS EXAMPLE -ta TARGET ALIAS OF TARGET TO CONNECT WITH ACL IDNETITY MANDATORY finance -id IDENTITY ACL IDENTITY MANDATORY DEF_ALL -acc ACCESS ACCESS RIGHTS TO TARGET: OPTIONAL na OPTIONAL 0 DEFAULT=RW RW =READ-WRITE RO = READ-ONLY NA =NOT ACCESSIBLE -pos POSITION IDENTITY RANK IN ACCESS RIGHT EVALUATION SCAN DEFAULT=NEXT HIGHEST AVAILABLE NUMBER Example The default access rights for the target
Creating an Identity If you are working in a V-Switch cluster, each identity must be configured on both VSwitches. If you are working with an iSNS server, all hosts are able to see the target but only those hosts with access rights are able to connect to the target. If you want to limit host, meaning iSCSI initiator, access to targets, you must create an identity that is more discriminate than the default identity. Use the CLI command acl identity create to name and describe an identity.
iSCSI initiator iSCSI initiator Tower box iqn.1991-05.microsoft:steven.sanrad Tower box iqn.1991-05.microsoft:wilbur.sanrad iqn.com.cisco.steven IPCloud SAN V-Switch1 accounting Default all NA 10178n finance sanrad.billing Figure 7-11.
Adding Initiators to an Identity If you are working in a V-Switch cluster, each initiator must be added on both VSwitches. After creating an identity, you can begin adding hosts by their iSCSI initiator WWUIs to the identity. The identity is a group of iSCSI initiators. It is not enough for an authorized host to request access to a target. The host must be requesting access from the correct iSCSI initiator. Use the CLI command acl identity add name to add iSCSI initiators to an identity.
Example The host, steven, is added to the identity accounting according to his iSCSI initiator wwui, iqn.1991-05.microsoft:steven.sanrad. acl identity add name –id accounting –name iqn. 1991-05. microsoft: steven.sanrad iSCSI initiator iSCSI initiator Tower box iqn.1991-05.microsoft:steven.sanrad Tower box iqn.1991-05.microsoft:wilbur.sanrad iqn.com.cisco.steven IPCloud SAN V-Switch1 accounting microsoft:steven Default all NA 10179n finance sanrad.billing Figure 7-12.
If a host has more than one iSCSI initiator installed, both initiators can be included in the identity. acl identity add name –id accounting –name iqn.com. cisco.steven iSCSI initiator iSCSI initiator Tower box iqn.1991-05.microsoft:steven.sanrad Tower box iqn.1991-05.microsoft:wilbur.sanrad iqn.com.cisco.steven IPCloud SAN V-Switch1 cisco.steven accounting microsoft:steven Default all NA 10180n finance sanrad.billing Figure 7-13.
Assigning Identity Credentials If you are working in a V-Switch cluster, the identity authentication method(s) must be added on both VSwitches. You can require initiator authentication before allowing access to a target and its underlying volume(s). The V-Switch supports CHAP and SRP authentication methods. Microsoft and Cisco initiators support CHAP. Use the CLI command acl identity add chap/srp to assign a login authentication method(s) to initiators in an identity.
Example The user name, steven, with user password, oneveryhotdude, is assigned CHAP credential verification in the identity accounting. acl identity add chap –id accounting –us steven –pw oneveryhotdude iSCSI initiator iSCSI initiator Tower box iqn.1991-05.microsoft:steven.sanrad Tower box iqn.1991-05.microsoft:wilbur.sanrad iqn.com.cisco.steven IPCloud SAN V-Switch1 steven oneveryhotdude cisco.steven accounting microsoft:steven Default all NA 10181n finance sanrad.billing Figure 7-14.
If a host has more than one iSCSI initiator installed, both initiators can be included in the identity and given authentication methods. The user name and password do not need to be the same for different initiators on the same host. acl identity add chap –id accounting –us steven –pw ilovecookies iSCSI initiator iSCSI initiator Tower box iqn.1991-05.microsoft:steven.sanrad Tower box iqn.1991-05.microsoft:wilbur.sanrad iqn.com.cisco.steven IPCloud SAN V-Switch1 steven oneveryhotdude cisco.
After assigning iSCSI initiators and assigning credentials to an identity, use the CLI command acl identity details to view the list of iSCSI initiators. acl identity details You need to define one parameter to view an identity’s details: SWITCH PARAMETER DEFINITION -id IDENTITY NAME OF ACL STATUS EXAMPLE MANDATORY accounting acl identity details –id accounting Table 7-4: Identity Details Description: Initiators: Accounts allowed read-write access to accounting records iqn.1991-05.
iSCSI initiator iSCSI initiator Tower box iqn.1991-05.microsoft:steven.sanrad iqn.com.cisco.steven Tower box iqn.1991-05.microsoft:wilbur.sanrad CHAP Authentication steven oneveryhotdude IPCloud SAN Tower box RADIUS Server Yes V-Switch1 RADIUS Authentication? No cisco.steven accounting steven ilovecookies microsoft:steven Default all NA 10261 finance sanrad.billing Figure 7-16.
ip radius add You need to define three parameters to add a RADIUS server IP to the RADIUS client SWITCH PARAMETER DEFINITION STATUS EXAMPLE -ip IP ADDRESS IP ADDRESS OF RADIUS SERVER MANDATORY 212.199.43.2 -p PORT UDP PORT OPTIONAL 1812 -k KEY SHARED SECRET BETWEEN RADIUS SERVER AND VSWITCH MANDATORY DataTurnsMeOn Example: In Figure 7-17, the V-Switch is configured to relay CHAP challenges to the identity, accounting, from the user, steven, to the RADIUS server.
iSCSI initiator iSCSI initiator Tower box iqn.1991-05.microsoft:steven.sanrad Tower box iqn.1991-05.microsoft:wilbur.sanrad CHAP Authentication: steven oneveryhotdude steven oneveryhotdude IPCloud SAN Tower box RADIUS Server User: steven PW: oneveryhotdude Key: DataTurnsMeOn V-Switch1 RADIUS Authentication? cisco.steven allow accounting steven ilovecookies microsoft:steven Default all NA 10262 finance sanrad.billing Figure 7-17.
Connecting an Identity and Target If you are working in a V-Switch cluster, each Identity must be connected to the target(s) on both VSwitches. Once created, an identity must be connected to a target to provide it with access control. An identity specifies which access rights the iSCSI initiators within the Identity have to the target. All CLI names and aliases are case sensitive An identity can be connected to more than one target to provide the same conditions for each target.
Example The identity, accounting, is connected to the target finance. Accounting is the second identity scanned for an initiator match. Any initiator in the accounting identity is given read-only access. Later, an administrator identity can be created with read-write access and placed in position 0. acl add –ta finance –id accounting –acc rw –pos 1 iSCSI initiator iSCSI initiator Tower box iqn.1991-05.microsoft:steven.sanrad Tower box iqn.1991-05.microsoft:wilbur.sanrad iqn.com.cisco.
Exposing an iSCSI Target and LUN The first LUN assigned to an iSCSI target must be LU 0. A LUN value cannot be larger than 255. All CLI names and aliases are case sensitive. To make a volume accessible to a host, you need to assign a LUN to it, attach the LUN to an iSCSI target and expose the target. The CLI command volume expose is used in two ways: Create and expose a new target. Expose an existing target.
You need to define six parameters to create and expose an iSCSI target and volume LUN: SWITCH PARAMETER DEFINITION STATUS EXAMPLE -new NEW TARGET NEW ISCSI TARGET TO CREATE OPTIONAL No parameter required -vol VOLUME ALIAS ALIAS OF VOLUME TO CREATE LU0 AND TARGET FOR MANDATORY Vol1 -ta TARGET ALIAS USER-ASSIGNED ALIAS OF TARGET TO CREATE MANDATORY finance -lun LU NUMBER USER-ASSIGNED LUN FOR EXPOSING MANDATORY ON EXISTING TARGET 0 VOLUME -tn TARGET WWUI USER-ASSIGNED WORLD WIDE UN
Example 1: The target finance already exists. The WWUI of finance has already been assigned to the target. The volume Vol1 is assigned LU0 and attached to the target finance. The exposing device is VSwitch1. volume expose –vol Vol1 –ta finance –lun 0 iSCSI initiator iSCSI initiator Tower box iqn.1991-05.microsoft:steven.sanrad Tower box iqn.1991-05.microsoft:wilbur.sanrad iqn.com.cisco.steven IPCloud SAN V-Switch1 steven oneveryhotdude cisco.
Example 2: If you are working in a V-Switch cluster, this target and LUN must be configured on both V-Switches. The target musicbox is created. The WWUI of musicbox is sanrad.musicbox. The volume Concat1 is automatically assigned LU0 and attached to the target musicbox on VSwitch1. volume expose -new –vol Concat1 –ta musicbox -tn sanrad.musicbox –device VSwitch1 Viewing LUNs You can view all created LUNs using the CLI command lu show.
7-34 SANRAD V-Switch CLI User Manual
8 Advanced Volume Operations IN THIS CHAPTER Once you have configured your initial basic volume topology, you can do more advanced volume operations. Introduction to Advanced Volume Configurations Copying a Volume (Off-line Copy) Synchronizing a Volume Adding a Child to a Mirror (On-line Copy) Creating a Snapshot Breaking a Mirror Resizing a Volume Expanding a Volume This chapter explains how to: Create an off-line volume copy. Create an on-line volume copy. Break a mirror to remove a child.
Introduction to Advanced Volume Configurations The V-Switch supports several advanced volume operations. Some do the same or similar functions. Each has its own advantages so it is important to understand their differences to best choose the function most appropriate for you SAN. Data Replication: Off-line versus On-line Off-line data replication creates a copy of a volume. The source volume can be any type of volume.
Copying a Volume (Off-line Copy) Data from any volume type can be replicated offline using the CLI command volume copy create. Off-line replication is faster than on-line replication but both the source and destination volumes must be off-line which can create an interruption of service to the volume host(s). Because snapshot volumes are internal (off-line) volumes, this is a way of copying a snapshot volume.
volume mirror sync You need to define two parameters to synchronize a volume: SWITCH PARAMETER DEFINITION STATUS EXAMPLE -src SOURCE VOLUME ORIGINAL VOLUME TO SYNCHRONIZE TO MANDATORY Simple3 -dst DESTINATION VOLUME NEW VOLUME TO ADD TO SYNCHRONINZE MANDATORY Simple5 Example: The on-line volume Simple3 is synchronized to the on-line volume Simple5.
Mir 1T Ch1 Ch2 Vol X 1T 1T 1T Ch1 Ch2 Ch3 1T 1T 1T Mir Figure 8-1. 10189 1T Adding Another Child to a Mirror In Figure 8-2 , a concatenated volume becomes one child of a new mirrored volume. This adds a level to the hierarchy. The new mirrored volume becomes the head of the volume hierarchy. The new mirrored volume automatically assumes the LUN from the concatenated volume. For more information on attaching volumes to LUNs, Chapter 7 “Volume Exposure and Security”.
Con Vol X LU0 Mir LU0 Con Ch 2 Figure 8-2.
Mir4 1T Sim2 Sim4 Sim6 1T 1T 1T Sim2 Sim4 Sim6 1T 1T 1T Mir4 Figure 8-3. 10248 1T Adding Sim6 to Mir4 Use the CLI command volume mirror show to view the status of all mirror synchronizations.
Creating a Snapshot You can create a snapshot, a point-in-time copy, of any volume at the top of a hierarchy using the CLI command volume create snapshot. A snapshot does not create a full copy of its source volume. It is a dynamic and dependent volume that stores the original data from a source volume when changes to the source volume are made after the snapshot’s creation.
B QA Testing A Snapshot1 N S N A S H A M M O P U N T QA Testing B Figure 8-5. A Snapshot1 N S N A S H A M M O P U N T S 10264 S 1st Write to Source and Update to 1st Snapshot The more active the write operations are to a source volume, the more capacity its snapshots need to have. SANRAD requires a beginning snapshot volume of at least one percent of the size of its source volume. A snapshot volume can be resized to accommodate a growing capacity need.
Active Snapshot volume create –activate snapshot You need four parameters to create an active snapshot volume: SWITCH PARAMETER DEFINITION STATUS EXAMPLE -vol VOLUME SNAPSHOT NAME MANDATORY Snapshot1 -src SOURCE SOURCE OF SNAPSHOT MANDATORY QATesting -ch CHILD SNAPSHOT CHILD MANDATORY Snapshot1 -lt LOAD THRESHOLD PERCENTAGE FULL AT DESTINATION TO TRIGGER AN ALARM OPTIONAL DEFAULT: 80% 75 Inactive Snapshot volume create snapshot You need four parameters to create an inactive snapshot
volume create –activate snapshot –vol Snapshot1 –src QATesting –dst Snapshot1 -lt 75 QA Testing A Snapshot1 N S N A S H A M M O P U N T 10254 S Figure 8-6. 1st Snapshot Figure 8-7 shows the same source and snapshot volume after a write operation to sector 1. The original data, S, from sector 1 is first copied to the snapshot and then the new data, B, is written to the source volume.
QA Testing A Snapshot1 N S N A S H A M M O P U N T QA Testing B A Snapshot1 N S N A S H A M M O P U N T S QA Testing B Figure 8-8. A Snapshot1 N S S Snapshot2 B A S H N N E M M O A A B U N T P P 10256 S 2nd Snapshot Created, Update to 1st Snapshot & 2nd Snapshot and Write to Source Figure 8-9 shows the creation of a third snapshot and a third write operation to the source volume.
QA Testing A Snapshot1 N S N A S H A M M O P U N T QA Testing B A Snapshot1 N S N A S H A M M O P U N T S QA Testing B A Snapshot1 N S S B A S H N N E M M O A A N T P P B U QA Testing Figure 8-9.
SWITCH PARAMETER DEFINITION STATUS EXAMPLE -vol VOLUME SNAPSHOT SOURCE VOLUME MANDATORY Mirror7 Reactivating a Snapshot Volume volume snapshot activate You need one parameter to (re)activate a snapshot volume: SWITCH PARAMETER DEFINITION STATUS EXAMPLE -vol VOLUME SNAPSHOT SOURCE VOLUME MANDATORY Mirror7 Viewing Snapshot Volumes You can view all created snapshot volumes using the CLI command volume snapshot show.
Example: Table 8-2 lists the only snapshot for Mirror7. volume snapshot list –vol Mirror7 Table 8-2: All Snapshots of a Specific Volume Snapshot Date & Time Utilization Snp1Mir1 12/12/02 20:00:00 20% Snapshot Rollback Snapshot rollback allows you to rollback to the original state of the volume. volume snapshot rollback show This command shows status of snapshot rollback. volume snapshot rollback show volume snapshot rollback start This command starts snapshot rollback.
volume snapshot rollback abort This command aborts snapshot rollback. volume snapshot rollback abort SWITCH PARAMETER DEFINITION STATUS EXAMPLE -snap SNAPSHOT SNAPSHOT SOURCE VOLUME MANDATORY Mirro2 Breaking a Mirror If you are working in a V-Switch cluster, the child must be removed on both VSwitches. You can remove one of multiple children from a mirror or break a twochild mirrored volume to enable one or both of the children to be used independently.
Mir 1T Ch1 Ch2 Ch3 1T 1T 1T Mir 1T Ch1 Ch2 Vol X 1T 1T 1T 10191 Able to be exposed as an independent volume Figure 8-10. Removing a Child from a Mirror In Figure 8-11 a child is removed from a mirrored volume with two children. This breaks the mirror. If the mirrored volume is exposed or attached to a LUN, the source volume retains the LUN. There is no need to reassign a LUN to the remaining source volume. All read-write operations will be executed without a break in service.
volume mirror break You need to define two parameters to break a mirror: SWITCH PARAMETER DEFINITION STATUS EXAMPLE -vol VOLUME VOLUME MIRROR IS ADDING TO MANDATORY Mirror5 -ch CHILD CHILD TO BREAK FROM MIRROR MANDATORY Simple10 Example: In Figure 8-12 the simple volume Sim5 is removed from mirrored volume Mir1. volume mirror break –vol Mir1 –ch Sim5 Mir1 1T Sim1 Sim3 Sim5 1T 1T 1T Mir1 1T Sim1 Sim3 Sim5 1T 1T 1T 10249 Able to be exposed as an independent volume Figure 8-12.
If you are working in a V-Switch cluster, a volume must be resized on both V Switches. You can increase a virtual volume’s potential capacity using the CLI command volume resize. This is the first step in increasing a virtual volume’s actual capacity. Potential capacity is the maximum capacity a volume could be. Actual capacity is the capacity that the server recognizes a virtual volume as having. Resizing a volume is done while the top-level volume in the hierarchy is exposed on an iSCSI target.
In Figure 8-13 is a mirrored volume with a potential capacity of one terabyte. The smallest child of the mirrored volume determines the mirrored volume’s potential capacity. Resizing the one-terabyte child to two terabytes will increase the mirrored volume’s potential capacity to two terabytes. The actual capacity of the mirrored volume remains unchanged until it is expanded to match its potential size. Mir 1T Ch 1 Ch 2 1T 2T 1T 10251 Sim3 Figure 8-13.
Mir 1T Ch 1 XCh 2 2T Ch 2 Sim3 1T 1T 10253 2T Figure 8-15. Resized Volume Only one cube is created per resized simple or snapshot volume. Any further simple volumes are added to the existing cube. In Figure 8-16 a second oneterabyte simple volume is added to the existing cube created to resize Sim2. Mir 1T Sim1 XSim2 3T Sim2 Sim3 Sim4 1T 1T 1T 10258 2T Figure 8-16.
Con 2T Ch 1 Ch 2 Vol X LU0 1T 1T 1T Ch 1 Ch 2 Ch 3 LU0 1T 1T 1T Con 10195 2T Figure 8-17.
In Figure 8-18 the mirrored volume, Mir, is limited in its actual capacity by its smallest child, Sim2. To resize Sim2 to two terabytes, simple volume, Sim3, is concatenated to Sim2 to create the resized cube volume, XSim 2. volume resize –vol Sim2 –a XSim2 –with Sim3 Mir 1T Sim1 Sim2 1T 2T Sim3 1T Mir 1T Sim1 XSim2 2T Sim2 Sim3 1T 1T 10259 2T Figure 8-18.
You need to define one parameter to retract a volume: SWITCH PARAMETER DEFINITION STATUS EXAMPLE -vol VOLUME VOLUME TO RETRACT – HEAD OF HIERARCHY MANDATORY Mir5 Expanding a Volume If you are working in a V-Switch cluster, a volume must be expanded on both VSwitches. You must expand a volume’s actual capacity, its capacity as identified by the file server, to match its resized potential capacity using the CLI command volume expand.
In Figure 8-20 a mirrored volume is expanded to two terabytes after one of its child volumes was resized and expanded to two terabytes. Mir 1T Sim1 XSim2 2T 2T Sim2 Sim3 1T 1T Mir5 2T Sim1 XSim2 2T Sim2 Sim3 1T 1T 10260 2T Figure 8-20.
Example: In Figure 8-21 the resized volume, XSim2, is expanded to an actual capacity of two terabytes to match its resized potential capacity. Once XSim2 is expanded, the capacity of Mir5 will automatically adjust itself to two terabytes. volume expand –vol XSim2 Mir 1T Sim1 XSim2 2T 2T Sim2 Sim3 1T 1T Mir5 2T Sim1 XSim2 2T Sim2 Sim3 1T 1T 10260 2T Figure 8-21.
9 Routine Volume Maintenance IN THIS CHAPTER Once you have begun creating volumes and managing your storage, you may want to adjust or change certain parameters for more effective storage management and utilization. Volumes Targets and Exposure This chapter explains how to rename or remove volumes, LUNs, iSCSI targets, identities and credentials. Volumes Renaming a Volume If you are working in a V-Switch cluster, the volume must be renamed on both VSwitches. After creating a volume you can rename it.
Example: volume set –vol Concat1 –n JPGRepos Removing a Volume If you are working in a V-Switch cluster, the volume must be removed on both VSwitches. You can remove a volume. The volume must be inactive, that is not exposed, and it must be at the top level of its volume hierarchy. For example, you cannot remove a simple volume from within a set of volumes creating a striped volume. The striped volume is at the top of the hierarchy must be removed first.
Striped Volume 1 JBOD 1 JBOD 2 Disk 2 Disk 5 Disk 6 Simple 1 Simple 3 Simple 7 Simple 9 Simple 2 Simple 4 Simple 8 Simple 10 Disk 3 Disk 4 Disk 7 Disk 8 Simple 5 Simple 6 Simple 11 Simple 12 10092 Disk 1 Figure 9-1. Stripe 1 Volume Removed Removing all Volumes in a Hierarchy If you are working in a V-Switch cluster, the volume must be removed on both VSwitches. You can remove a volume and all of its component volumes in a volume hierarchy.
Example: The top-level volume Stripe 1 is removed along with its component volumes, Simple 2, 4, 8 & 10. volume remove -all –vol Stripe1 Striped Volume 1 JBOD 1 JBOD 2 Disk 2 Disk 5 Disk 6 Simple 1 Simple 3 Simple 7 Simple 9 Simple 2 Simple 4 Simple 8 Simple 10 Disk 3 Disk 4 Disk 7 Disk 8 Simple 5 Simple 6 Simple 11 Simple 12 10093 Disk 1 Figure 9-2.
volume replace You need to define two parameters to replace a volume: SWITCH PARAMETER DEFINITION STATUS EXAMPLE -vol VOLUME VOLUME ON FAILED DISK MANDATORY Simple4 -nvol NEW VOLUME REPLACEMENT VOLUME MANDATORY Simple6 Synchronizing a Volume You can replace a failed volume in a mirror. You must then synchronize the new volume to the original mirrored volumes. See the working example: Appendix A “Replacing a Mirrored Volume”.
Targets and Exposure Removing an LU If you remove LU 0 from a target, you will inactivate the target even if the target has other attached LUs. If you are working in a V-Switch cluster, the LU must be removed on both VSwitches. Before you can remove a volume, you must remove any attached LU.
Removing an iSCSI Target If you are working in a V-Switch cluster, the target must be removed on both VSwitches. You can remove an iSCSI target provided it has no attached LU. Use the CLI command lu remove to first remove any LUs from a target.
9-8 SANRAD V-Switch CLI User Manual
10 Routine V-Switch Maintenance IN THIS CHAPTER General Configuration Parameters Telnet Port SNMP Manager iSNS Server User Profiles V-Switch Network Interfaces IP Routing Disks and Subdisks Clusters V-Switch 3000 Power Supply Upgrading the VSwitch Software V-Switch 3000 Compact Flash Safe Mode Once you have configured the V-Switch, you need to be able to update its configuration and maintain optimum V-Switch functionality.
General Configuration Parameters This command is available only after the V-Switch is initialized with the init command. After the initial V-Switch configuration, you may want to change one or more of the V-Switch parameters. For example: You may need to change the system clock to adjust to Daylight Savings Time. You can also use this command to add contact information of whom to contact in the event of technical difficulties.
SWITCH PARAMETER DEFINITION STATUS EXAMPLE -rld REPORT LUN DISCOVERY MODE FOR DISCOVERING DEVICE LUNS OPTIONAL no YES OR NO DEFAULT: YES -telnet -rcom -wcom PORT FOR VSWITCH COMMUNICATIONS OPTIONAL READ COMMUNITY COMMUNITY TO GET INFORMATION OPTIONAL WRITE COMMUNITY COMMUNITY TO SET INFORMATION OPTIONAL TELNET PORT DEFAULT: 1597 23 DEFAULT: PUBLIC DEFAULT: PRIVATE Example: The V-Switch is named V-Switch 1 at 13:30 in the afternoon on 21 March 2002.
Use the CLI command info to check the V-Switch’s designated Telnet port. info Table 10-1: 10-4 V-Switch Configuration Parameter Value Name Description Contact Location Status Object ID Time Since Last Reset Mgmt IP Address Mgmt UDP Port Date & Time [DD/MM/YY] Telnet Port Eth FC Read Community Write Community VSwitch1 SDC HW 1.0 SW 1.0 Anna Levin Ext. 4838 OK 1.3.6.1.4.1 10059 1.1.2 12 days 17 hours 29 min 32 sec 212.199.43.
SNMP Manager Setting an SNMP Manager This command modifies parameters of existing managers. snmp manager set SWITCH PARAMETER DEFINITION STATUS EXAMPLE -ip IP ADDRESS MANAGER ADDRESS MANDATORY 212.199.43.
Removing an SNMP Manager This command removes a manager from the V-Switch. snmp manager remove SWITCH PARAMETER DEFINITION -ip IP ADDRESS MANAGER ADDRESS -p UDP PORT PORT TO RECEIVE TRAPS THROUGH IP STATUS EXAMPLE MANDATORY 212.199.43.96 MANDATORY 162 iSNS Server The V-Switch supports Internet Storage Name Service (iSNS) protocol for advertising its targets and portals on the iSNS server to enable iSCSI initiators in the IP-SAN to locate the V-Switch targets automatically.
You need to define one parameter to remove an iSNS server address: SWITCH PARAMETER DEFINITION STATUS EXAMPLE -ip IP ADDRESS IP ADDRESS OF ISNS SERVER MANDATORY 212.199.43.1 User Profiles Access to the V-Switch is password protected. The V-Switch ships with the default user name sanrad and the default user password sanrad. After logging in, a total of ten user profiles (name plus password) can be configured on a V-Switch. As needed, profiles can be modified or removed.
Changing a User Profile If you are working in a V-Switch cluster, a user profile must be changed on both VSwitches This interactive command enables a user to change their login password for their user name on the V-Switch. admin password After entering the command, you are prompted to enter your existing password and the new password.
Saving (Uploading) a V-Switch Database File You can upload a copy of a V-Switch’s full database file to the local TFTP server. If the V-Switch fails, its database file can be downloaded to the replacement V-Switch. This eliminates protracted configuration time on the new V-Switch and ensures configuration integrity.
Downloading a V-Switch Configuration File Download the database file to the V-Switch before attaching it to the storage devices. The V-Switch must be reset for the downloaded database to become operational. After replacing a failed V-Switch, you can download the replaced VSwitch database file from the tftp server to the new V-Switch. Unlike a standard V-Switch installation, do not connect the V-Switch to the storage devices before powering up.
Network Interfaces Changing an Interface Alias All CLI names and aliases are case sensitive. You can change the alias of a V-Switch interface for user convenience. Leaving the new alias field blank will return the alias to its default setting interface set You need to define two parameters to change an interface alias: If you are working in a V-Switch cluster, the interface alias must be changed on both V-Switches.
with a different IP address will not reset the network port address. It will add another IP address to the network port -ip IP ADDRESS IP ADDRESS ASSIGNING TO THE INTERFACE PORT MANDATORY -im IP MASK IP NET MASK OPTIONAL DEFAULT: 212.199.43.57 255.255.255.0 -act ACTIVITY IF IP ADDRESS IS ACTIVE TO EXPOSE VOLUMES. USE INACTIVE STATUS TO ALLOW FAILOVER. OPTIONAL DEFAULT: 1 (ACTIVE). 1 2(INACTIVE) Example: IP address 212.199.43.
Example: The second IP address, 212.199.43.70, on the network interface eth3 is removed. 10231 ip config remove–ip 212.199.12.70 212.199.43.46 212.199.75.66 212.199.43.56 212.199.12.67 212.199.43.57 212.199.12.70 Figure 10-2. Removing an IP Address IP Routing Adding an IP route If you are working in a V-Switch cluster, the IP route must be added on both VSwitches. You can add an IP route to a network port.
Example: An IP routing path to Network D, IP 10.10.20.20, (IP mask 255.255.255.0) is mapped from network port Eth2 through router gateway 30.30.20.20. ip route add –dip 10.10.20.20 –dmask 255.255.255.0 –gw 30.30.20.20 –if eth2 Removing an IP route If you are working in a V-Switch cluster, the IP route must be removed on both VSwitches. You can remove an IP route to a network.
Disks and Subdisks Discovering Storage Devices The V-Switch default algorithm for storage devices discovery is using the SCSI command REPORT LUNS. Certain storage devices either do not support this command or do not respond according to the SCSI standard. To discover these devices, the REPORT LUNs command must be disabled. If certain devices in the SAN are not being discovered by the V-Switch, use the CLI command device set to disable or re-enable device discovery via REPORT LUNs.
Renaming a Storage Device If you are working in a V-Switch cluster, the disk must be renamed on both VSwitches. You can rename a disk. Renaming the disk will have no effect on the volume hierarchies built on the disk.
Renaming a Subdisk If you are working in a V-Switch cluster, the subdisk must be renamed on both VSwitches. After creating a subdisk you can rename it. Renaming the subdisk will have no effect on the volume hierarchy built on the subdisk.
Clusters Modifying Neighbor Parameters You can modify neighbor parameters in a cluster. neighbor set You need to define up to two parameters to modify a neighbor’s parameters in a cluster: SWITCH PARAMETER DEFINITION -nb NEIGHBOR ALIAS OF NEIGHBORING SWITCH IN CLUSTER -ip IP ADDRESS MANAGEMENT ADDRESS OF NEIGHBOR V- IP STATUS EXAMPLE MANDATORY IF CHANGING NewVSwitch MANDATORY IF CHANGING 212.199.43.40 Removing a Neighbor Both V-Switches must have its neighbor removed.
Modifying a Cluster Both V-Switches in the cluster must be modified. You can modify a cluster’s parameters.
V-Switch 3000 Power Supply The V-Switch 3000 is standard-issued with two hot-swappable AC power supplies. If one of the power supplies fail, its red LED on the back panel turns off. If both of the power supplies fail, the Power LED on the front panel turns off. STEP 1. DISCONNECT THE POWER CABLE Disconnect the power cable from the power source. After the power cable is disconnected from the power source, disconnect the power cable from the V-Switch. STEP 2.
Upgrading the V-Switch Software The V-Switch must be reset for the new software to begin functioning. You can upgrade the V-Switch software via CLI. The software upgrade files are first downloaded from the TFTP server. You can then use the CLI command ft update to upgrade the V-Switch software. There are a total of six upgrade files. Do not change their names or the V-Switch will not be able to perform the upgrade. All configured user profiles are unaffected by the software upgrade.
V-Switch 3000 Compact Flash The V-Switch 3000 includes a compact flash for backing up the database to provide redundancy. The V-Switch 3000 has two permanent memory devices: flash and compact flash. The V-Switch can work with only the flash. When both are present, the V-Switch reads from the flash and can be set to write to both the flash and the compact flash. Use the CLI command system set to replicate the database from the flash on to the compact flash.
system copy You need to define two parameters to copy a file between the flash and compact flash: SWITCH PARAMETER DEFINITION STATUS EXAMPLE -from FROM WHERE TO COPY FROM MANDATORY cflash FLASH CFLASH -type TYPE TYPE OF FILE TO COPY MANDATORY db DB: DATABASE system copy –from cflash –type db If you want to load Safe Mode The V-Switch operating status includes the ability to enter into safe mode in the event of booting problems or in an attempt to clear significant amounts of a VSwitch conf
Automatic Safe Mode When the V-Switch reboots, either after upgrading the V-Switch software or any other time that environmental irregularities require, there may be database corruption. To prevent potential damage to the database, the V-Switch enters safe mode. Safe mode can only be navigated from a console with a local, direct RS232 connection to the V-Switch.
Level 3: Reboot with Default Factory System This clears all user login profiles. You will have to login with the user name sanrad and password sanrad. This clears the database of all configurations executed on the V-Switch, including user login profiles. You will have to log in with the user name sanrad and password sanrad.
Safe mode levels 0 and 1 can be executed from any Telnet station but, for extra safety, safe mode levels 2 and 3 can only be executed from a console with a local, direct RS232 connection to the V-Switch. system boot You need one parameter to reboot the V-Switch in safe mode.
Level 3: Default Factory System A direct RS232 connection is necessary. This clears the database of all configurations executed on the V-Switch, including user login profiles. Use this level if you want to completely clear a V-Switch’s database. For example, if you want to transfer a V-Switch to another branch office or campus department with different system administrators, this level will return the V-Switch to the same state it left the factory for shipping.
10-28 SANRAD V-Switch CLI User Manual
11 Command Line Interface IN THIS CHAPTER V Switch Configuration Volume Configuration Volume Exposure Monitoring and Statistics The CLI is available via: Console port with a direct RS232 connection. 1Gbit Ethernet network port (eth1) with a Telnet session. 10/100 Ethernet Management port with a Telnet session. The CLI is used to implement all V Switch management functions, including switching, virtualization and security. All CLI commands are case sensitive and must be entered in lower case.
The CLI supports the use of the following hot keys for the listed functions: Table 11-1: Hot Keys Command Description ? LIST OF COMMANDS WITH A SHORT DESCRIPTION OF EACH ! RETURN TO MAIN MENU Esc ABORT CURRENT COMMAND # DISPLAY LAST COMMAND TO VIEW COMMAND HISTORY Tab COMPLETE A COMMAND TO THE POINT OF AMBIGUITY V Switch Configuration These commands enable you to configure and view the basic V Switch parameters needed to operate the V Switch 11-2 COMMAND COMMAND COMMAND COMMAND ADMIN SHO
admin show This command shows all valid user login names for the V Switch. admin show Table 11-2: Administrator User Names User Name Joe Cool Cyber Dude MI5 CUL8R C6H12O6 admin add This command adds a user name to the list of valid user login names for the V Switch. A user name can be from 1 to 20 characters long, including spaces. A password can be from 6 to 12 characters long, including spaces.
Example admin remove –un Joe Cool admin password This interactive command enables a user to change their login password for their user name on the V Switch. You can only change the password of the current active user. admin password system reset This command performs a remote soft reset of the V Switch. All configuration databases will be maintained on the V Switch, including user names and passwords; network port aliases; configured volumes and iSCSI targets.
Table 11-3: iSCSI V Switch Configuration Parameter Value Name Description Contact Location Status Object ID Time Since Last Reset Mgmt IP Address Mgmt UDP Port Date & Time Telnet Port V Switch1 High Performance V Switch Anna Levin Ext. 4838 OK 1.3.6.1.4.1.10059.1.1.2 5 days 1 h:29 m:49 sec 212.199.43.46 161 24/03/02 15:37 23 device set This command redefines the specified general parameters of the V Switch.
SWITCH PARAMETER DEFINITION STATUS EXAMPLE -t TIME LOCAL TIME OPTIONAL 13:30 -c CONTACT CONTACT PERSON IN THE EVENT OF A SYSTEM MALFUNCTION OPTIONAL AnnaLevin -loc LOCATION LOCATION OF THE CONTACT PERSON OPTIONAL ext4838 -if MANAGEMENT INTERFACE ALIAS MANAGEMENT PORT NAME MANDATORY ETH1 eth1 -rld REPORT LUN DISCOVERY MODE FOR DISCOVERING DEVICE LUNS MANDATORY no YES OR NO DEFAULT: YES -telnet -rcom -wcom PORT FOR VSWITCH COMMUNICATIONS OPTIONAL READ COMMUNITY COMMUNITY T
device set -telnet 49155 device advance set This command redefines the specified advanced parameter of the V Switch. device set SWITCH PARAMETER DEFINITION STATUS -param PARAMETER PARAMETER TO SET MANDATORY -val VALUE VALUE FOR PARAMETER MANDATORY EXAMPLE device advance show This command shows the specified advanced parameter of the V Switch.
Name Description V Switch1 SW Version 1.5, build 5,patch 0 Board version 1, PCB version 20:00:20:10:58:00:10:46 Gateway WWNN Function fc set speed This command allows you to set the speed of the FC communication. fc set speed SWITCH PARAMETER DEFINITION STATUS EXAMPLE -if INTERFACE STORAGE PORT MANDATORY fc2 -sp SPEED FC MANDATORY 1 COMMUNICATION SPEED 1 GB: 1 2 GB: 2 DEFAULT: 1 interface show This command shows the V Switch interfaces (ports) and their parameters.
interface details This command lists the interface details of a specified interface. interface details SWITCH PARAMETER DEFINITION STATUS EXAMPLE -if INTERFACE ALIAS ALIAS OF INTERFACE TO SHOW MANDATORY eth1 Table 11-5: Interface Details Parameter Details Name: Alias: Index: Type: Description: Phys Address: MTU: Admin Status: Oper. Status: eth1 eth1 9 ETHERNET Gigabit Ethernet Network Interface 0081a000110 1500 up up interface set This command renames the specified interface alias.
pscsi show This command displays at parallel SCSI devices and their bus ID number. pscsi show Table 11-6: Parallel SCSI Device Bus IDs Alias pscsi3 pscsi4 BusID 12 7 pscsi set busid This command assigns a bus ID to a parallel SCSI device.
SWITCH PARAMETER DEFINITION -ip IP ADDRESS MANAGER ADDRESS -p UPD PORT PORT TO RECEIVE TRAPS THROUGH OPTIONAL COMMUNITY TO GET INFORMATION OPTIONAL COMMUNITY TO SET INFORMATION OPTIONAL TO SEND TRAPS TO MANAGER OPTIONAL Y: SEND N: DO NOT SEND -rcom -wcom -trap READ COMMUNITY WRITE COMMUNITY TRAP IP STATUS EXAMPLE MANDATORY 212.199.43.96 DEFAULT: 162 DEFAULT: PUBLIC DEFAULT: PRIVATE DEFAULT: Y device set This command modifies parameters of existing managers. device set.
snmp manager remove This command removes a manager from the V Switch. snmp manager remove SWITCH PARAMETER DEFINITION -ip IP ADDRESS MANAGER ADDRESS -p UPD PORT PORT TO RECEIVE TRAPS THROUGH IP STATUS EXAMPLE MANDATORY 212.199.43.96 MANDATORY 150 ip config show This command displays the V Switch IP configurations. ip config show Table 11-8: V Switch IP Configurations If Name IP Address Net Mask Activity mgmt eth1 eth1 eth2 eth3 eth3 212.199.43.46 212.199.43.56 212.199.43.57 212.199.
SWITCH PARAMETER DEFINITION STATUS EXAMPLE -act ACTIVITY IF IP ADDRESS IS ACTIVE TO EXPOSE VOLUMES. USE INACTIVE STATUS TO ALLOW FAILOVER. OPTIONAL DEFAULT: 1 (ACTIVE). 1 2(INACTIVE) Example ip config set –ip 212.199.43.56 –if eth1 –act 1 ip config remove This command removes an IP address from an interface. ip config remove SWITCH PARAMETER DEFINITION STATUS EXAMPLE -ip IP ADDRESS IP ADDRESS TO REMOVE FROM THE NETWORK INTERFACE PORT MANDATORY 212.199.43.
ip route add SWITCH PARAMETER -dip DESTINATION -dmask DESTINATION MASK IP -gw GATEWAY ADDRESS -if INTERFACE ALIAS IP DEFINITION STATUS EXAMPLE IP OF HOST STATION MANDATORY 10.10.20.20 IP MASK OF HOST MANDATORY 255.255.255.0 IP ADDRESS OF THE GATEWAY ROUTER MANDATORY 30.30.20.20 NETWORK PORT TO OPEN COMMUNICATION THROUGH MANDATORY eth2 STATION Example: An IP routing path to Network D, IP 10.10.20.20, (IP mask 255.255.255.
SWITCH PARAMETER DEFINITION STATUS EXAMPLE -dip DESTINATION IP OF HOST STATION MANDATORY 10.12.40.40 -dmask DESTINATION MASK IP MASK OF HOST MANDATORY 255.255.255.0 -gw GATEWAY GATEWAY TO HOST STATION IP ADDRESS MANDATORY 20.22.11.11 -if INTERFACE ALIAS NETWORK PORT TO OPEN COMMUNICATION THROUGH MANDATORY eth3 IP STATION Example: The routing path to destination network IP 10.12.40.40 (IP mask 255.255.255.0) is removed from network port Eth3. ip route remove –dip 10.12.40.
ip isns remove This command removes an iSNS server’s IP address from the V-Switch iSNS client. ip isns remove SWITCH PARAMETER DEFINITION STATUS EXAMPLE -ip IP ADDRESS IP ADDRESS OF ISNS SERVER MANDATORY 212.199.43.1 neighbor add This command adds a neighbor to a cluster. neighbor add SWITCH PARAMETER DEFINITION STATUS EXAMPLE -nb NEIGHBOR ALIAS OF NEIGHBOR TO ADD TO CLUSTER MANDATORY VSwitch2 -ip IP ADDRESS IP ADDRESS OF MGMT PORT ON NEIGHBOR MANDATORY 212.199.43.
neighbor show This command lists the neighbor(s) in a cluster. neighbor show Table 11-10: Neighbors in a Cluster Name IP Address UDP VSwitch2 212.199.43.75 161 SNMP Timeout (msec) 1500 SNMP # of Retries 3 neighbor details This command lists the details of a neighbor in a cluster. neighbor details SWITCH PARAMETER DEFINITION STATUS EXAMPLE -nb NEIGHBOR ALIAS OF NEIGHBOR IN CLUSTER MANDATORY VSwitch2 Table 11-11: Neighbor Details Neighbor Name VSwitch2 IP Address 212.199.43.
cluster show This command shows the keep alive parameters of a cluster. cluster show Table 11-12: Cluster Table Last Keep Alive: KeepAlive Int(s): Susp Int(s): Dead Int(s): Failover: State: 1 2 6 10 Enabled Running cluster set This command allows you to modify a cluster’s parameters.
cluster failover enable This command enables the cluster failover functionality. This command must be executed on both V Switches in the cluster. cluster failover enable cluster failover disable This command disables the cluster failover functionality. This command must be executed on both V Switches in the cluster. cluster failover disable ft show This command displays the configuration for file transfer.
SWITCH PARAMETER DEFINITION STATUS EXAMPLE -ip IP ADDRESS SERVER IP ADDRESS MANDATORY 212.199.43.70 -fn FILE NAME NAME TO SAVE FILE AS MANDATORY Backupdata -ft FILE TYPE FORMAT TO SAVE DATA IN OPTIONAL DB – DATA BASE db DEFAULT: DB ft download This command downloads a V Switch database configuration file from the local TFTP server. ft download SWITCH PARAMETER DEFINITION STATUS EXAMPLE -ip IP ADDRESS IP ADDRESS OF TELNET STATION WHERE TFTP APPLICATION SITS MANDATORY 212.199.43.
SWITCH PARAMETER DEFINITION STATUS EXAMPLE -ip IP ADDRESS SERVER IP ADDRESS MANDATORY 212.199.43.70 -fd FILE DIRECTORY DIRECTORY TO EXPORT FILES TO MANDATORY Backupdata system boot This command forces the V Switch to boot in Safe Mode.
SWITCH PARAMETER DEFINITION STATUS EXAMPLE -from FROM WHERE TO COPY FROM MANDATORY cflash FLASH CFLASH -type TYPE TYPE OF FILE TO COPY db MANDATORY DB: DATABASE system show This command shows the status of both the compact flash and replication mode.
Volume Configuration These commands enable you to configure and view disks and volumes via the V Switch.
storage blink activate This command allows you to blink a storage device to identify it. storage blink activate SWITCH PARAMETER DEFINITION STATUS EXAMPLE -s STORAGE DEVICE ALIAS OF DEVICE TO BLINK MANDATORY Stor_1 -t TIME LENGTH OF TIME TO BLINK DEVICE MANDATORY 120 1-3600 SEC 0=FOREVER storage blink abort This command stops a storage device from blinking.
Table 11-15: Storage Disks Alias Entity Name disk1 01:02:03:04:05:06 :07:08 09:0a:0b:0c:0d:0e :0f:10 09:0a:0b:0c:0d:0e :0f:10 01:02:03:04:05:06 :07:08 disk2 disk3 disk4 LUN Oper. Status Subdisk 0 Disabled entire 0 Enabled entire 1 Enabled split 0 Storage is missing entire storage disk set This command allows you to enable or disable write cache for a disk.
SWITCH PARAMETER DEFINITION STATUS EXAMPLE -s STORAGE ALIAS ALIAS OF STORAGE TO VIEW MANDATORY disk1 Table 11-17: Storage Details Alias: Entity Name: LUN(Logical Unit Number) Vendor Name: Additional Info: Transport type: Oper.
storage remove This command removes a storage device from the database only if the storage device state is defined as StorageIsMissing. storage remove SWITCH PARAMETER DEFINITION STATUS EXAMPLE -s STORAGE ALIAS OF STORAGE TO REMOVE MANDATORY Stor_1 subdisk create This command creates a subdisk according to the input parameters.
subdisk show SWITCH PARAMETER DEFINITION STATUS EXAMPLE -d DISK ALIAS ALIAS OF DISK TO SHOW SUBDISKS FROM OPTIONAL USE THIS SWITCH TO LIST ONLY THE DETAILS OF A SPECIFIC DISK Table 11-18: Details of all Subdisks Disk Subdisk disk1 disk1 disk2 disk2 disk3 disk3 split1 0 split2 512 split1 0 split2 2048 split1di*~ 0 split2 1024 Start Address Length Vol 512 512 2048 512 1024 1024 yes yes no yes no no subdisk details This command shows all/specified subdisks on a disk.
subdisk alias This command allows you to view all subdisk aliases in full. The command subdisk show has a ten-character display limit so subdisk aliases may be ambiguous in the subdisk show table. subdisk alias Table 11-20: Subdisk Aliases Disk Disk3 Disk7 Disk7 Length 1024 1024 1024 Alias split1disk3 split1disk7 split2mirror subdisk set This command renames a subdisk and allows you to edit the subdisk information.
volume show This command shows all volumes defined in the database. volume show Table 11-21: Volume Details of all Volumes Alias Type Simple1 Simple Act # of Bl Pot # of Bl Bl Size State 17999999 17999999 512 Internal RLU1 Simple 17999999 17999999 512 Exposed Mir1 Mirror 8388608 8388608 512 Exposed RLU3 Simple 16777216 16777216 512 Internal volume details This command shows all details of a specified volume.
Alias Snp3Stripe1 Percentage Utilized 90% # of SubVolumes - Parent RAID Time Since Last Reset 1 days 4h:14m:21s Child vol1 Child vol2 volume alias This command allows you to view all volume aliases in full. The command volume show has a ten-character display limit so volume aliases may be ambiguous in the volume show table.
volume create simple This command creates a simple volume out of a disk or subdisk. volume create simple SWITCH PARAMETER DEFINITION STATUS EXAMPLE -vol VOLUME ALIAS OF SIMPLE VOLUME OPTIONAL DEFAULT: (SUB)DISK ALIAS -sd SUBDISK ALIAS ALIAS OF SUBDISK TO USE MANDATORY IF USING A SUBDISK -d DISK ALIAS OF DISK TO USE MANDATORY IF USING A DISK volume create transparent This command creates a transparent volume out of a disk.
SWITCH PARAMETER DEFINITION STATUS EXAMPLE -ch CHILD ALIAS OF EACH VOLUME TO INCLUDE IN MIRROR MANDATORY Simple1 -ch CHILD ALIAS OF EACH VOLUME TO INCLUDE IN MIRROR MANDATORY Simple2 volume create concatenated This command creates a concatenated volume across the specified volumes in the order listed.
SWITCH PARAMETER DEFINITION STATUS EXAMPLE -sus STRIPED UNIT SIZE NUMBER OF BLOCKS TO WRITE IN EACH VOLUME PER PASS MANDATORY 200 -nbc NUMBER OF CHILDREN NUMBER OF VOLUMES TO CREATE STRIPE ACROSS OPTIONAL DEFAULT: 2 -ch CHILD ALIAS OF EACH VOLUME IN STRIPE MANDATORY Simple3 -ch CHILD ALIAS OF EACH VOLUME TO INCLUDE IN MIRROR MANDATORY Simple4 2 volume set This command will change a volume alias or load threshold.
volume remove -all This command removes a volume and all volumes composing it in the hierarchy. The volume must be at the top of the hierarchy. The volume cannot be exposed; the volume LU must be inactivated. Simple volumes will convert back to their component disks or subdisks. volume remove -all SWITCH PARAMETER DEFINITION STATUS EXAMPLE -vol VOLUME ALIAS ALIAS OF TOPLEVEL VOLUME TO REMOVE MANDATORY Stripe 1 volume replace This command replaces a volume with another volume.
volume mirror sync show This command shows the status of all mirrored volumes where the “mirror sync” operation was activated since last V-Switch reset. volume mirror show Volume Alias Source Alias Mirror8 Mirror2 Mirror4 Mirror3 Mirror 12 Mirror10 Operational Status Synchronizing Last sync succeeded none Progress 60% 100% - volume mirror sync start This command starts synchronization of mirrored volumes. Use this command in the following three cases: 1.
volume mirror sync abort This command aborts synchronization of mirrored volumes. volume mirror sync abort SWITCH PARAMETER DEFINITION STATUS EXAMPLE -src SOURCE ALIAS OF SOURCE VOLUME TO COPY MANDATORY Mirror2 -dst DESTINATION ALIAS OF VOLUME TO COPY TO MANDATORY Mirror8 volume copy create This command creates an off-line volume copy.
volume copy abort This command aborts an off-line volume copy operation. volume copy abort SWITCH PARAMETER DEFINITION STATUS EXAMPLE -src SOURCE ALIAS OF SOURCE VOLUME TO COPY MANDATORY ScienceLab -dst DESTINATION ALIAS OF VOLUME TO ABORT COPY TO MANDATORY ScienceLabII volume mirror add This command adds an on-line volume copy to a mirror or the head of a hierarchy.
volume mirror break This command removes a child from a mirror volume. volume mirror break SWITCH PARAMETER DEFINITION STATUS EXAMPLE -vol VOLUME VOLUME MIRROR IS ADDING TO MANDATORY Mirror5 -ch CHILD CHJILD TO BREAK FROM MIRROR MANDATORY Simple10 volume resize This command increases a volume’s potential capacity on-line.
volume expand This command expands a volume’s actual capacity to match its potential capacity.
volume snapshot list This command shows all snapshot volumes for a specific source volume. volume snapshot list SWITCH PARAMETER DEFINITION STATUS EXAMPLE -vol VOLUME SNAPSHOT SOURCE VOLUME MANDATORY Mirro2 volume snapshot rollback show This command shows status of snapshot rollback. volume snapshot rollback show volume snapshot rollback start This command starts snapshot rollback.
Volume Exposure These commands enable you to expose volumes using iSCSI protocol to network hosts and control access the exposed volumes.
iscsi portal show This command shows the portals defined for iSCSI on the V Switch with which you are communicating. iscsi portal show Table 11-25: iSCSI Portals Protocol Address Type Address Port 6 IPv4 172.17.200.156 5003 6 IPv4 172.17.200.150 5003 iscsi portal create This command creates an iSCSI portal on a 1 Gb (network) port. iscsi portal create SWITCH PARAMETER DEFINITION STATUS EXAMPLE -ip IP ADDRESS IP ADDRESS OF NETWORK PORT MANDATORY 212.199.43.
iscsi target show This command shows all created targets. iscsi target show Table 11-26: iSCSI Targets Target Alias Target Name # of LU Exposed On: wind wwui 1 VSwitch1 fire wwui 2 VSwitch2 water wwui 1 VSwitch1 Presiden*~ wwui 1 VSwitch2 Presiden*~ wwui 1 VSwitch2 iscsi target details This command shows the details of the iSCSI target.
Target Alias: nms153 Last Failure Type: Authentication Error Last Plony Initiator Name: Last Initiator IP: 1.2.3.4 iscsi target create This command creates an iSCSI target without creating LU0, attaching volumes or exposing the target. Targets can be created in advance and only later have LUNs created and exposed.
iscsi target set This command renames a target alias. iscsi target set SWITCH PARAMETER DEFINITION STATUS EXAMPLE -ta TARGET ALIAS ALIAS OF TARGET TO RENAME MANDATORY Pilote -n NEW ALIAS NEW ALIAS FOR TARGET MANDATORY Buffy -chapun CHAP USER USER NAME FOR NAME CHAP AUTHENTICATION MANDATORY WITH CHAP PASSWORD USER PASSWORD FOR CHAP AUTHENTICATION MANDATORY WITH CHAP USER NAME -chappw CHAP PASSWORD iscsi target remove This command removes an iSCSI target.
iscsi target authentication This command allows the assigning of a password to a target to allow CHAP authentication at initiator connection to the target. iscsi target authentication SWITCH PARAMETER DEFINITION STATUS EXAMPLE -ta TARGET ALIAS ALIAS OF ISCSI TARGET TO REMOVE MANDATORY MusicBox -pw PASSWORD PASSWORD OF TARGET OPTIONAL DEFAULT: SANRADSANRAD -un USER NAME USER NAME OF TARGET OPTIONAL DEFAULT: SANRAD iscsi session show This command shows all iSCSI sessions.
iscsi session details This command lists all details of a specific session. iscsi session details SWITCH PARAMETER DEFINITION STATUS EXAMPLE -id ID ID OF SESSION TO CHECK MANDATORY Finance -adv ADVANCED ADVANCED ISCSI SESSION DETAILS OPTIONAL No value needed Table 11-30: Basic iSCSI Session Details 11-48 Initiator Alias: nms153 Initiator Name: ISID: iqn.199105.com.microsoft:QA2.qa.test.
Table 11-31: Advanced iSCSI Session Details Initial R2T False Immediate Data True Max Outstanding R2T 1 First Burst Size 65536 Max Burst Size 262114 Number of Connections 1 Sequence In Order True PDU In Order True Error Recovery Level 0 iscsi session statistics This command lists the statistics of a specific session.
Table 11-33: TXRX iSCSI Session Details ID Initiator 1 ISID TSID Tx Octets Rx Octets nms153 10000 1900 2 nms153 9990 1800 3 nms153 9000 1700 4 nms153 8990 1600 Table 11-34: Error iSCSI Session Details ID Initiator ISID TSIH Digests Err Timeout Err 1 nms153 5 10 2 nms153 5 9 3 nms153 4 8 4 nms153 4 7 iscsi session connection show This command iscsi session connection show Table 11-35: iSCSI Session Connections ID Cid State 11-50 1 1 full 2 1 full 3 1 full
iscsi session connection details This command shows all details of a specific connection. iscsi session connection details SWITCH PARAMETER -id SESSION -adv ID ADVANCED DEFINITION STATUS EXAMPLE ID OF ISCSI SESSION MANDATORY 1 ID OF ISCSI CONNECTION OPTIONAL 1 – 255 no value is needed Table 11-36: iSCSI Session Connection Details Connection ID: 1 State: Full (2) Local Address: 172.17.200.151 Local Port: 3260 Remote Address: 172.17.200.
scsi target port statistics This command shows all details of the SCSI target ports. scsi target port statistics Table 11-38: SCSI Target Port Statistics Target Port Trans Read MB Written MB iSCSI In Commands 1900 Oracle 0 10000 10900 1 iSCSI 1800 9990 10000 iscsi rinitiator show This command shows all remote initiators. iscsi rinitiator show Table 11-39: Remote iSCSI Initiators Target Alias Initiator Alias Initiator Name nms154dr iqn.1991-05.com.micr iqn.1991-05.com.
iscsi rinitiator statistics show This command shows the statistics for remote initiators. iscsi rinitiator statistics show Target Initiator Attached Times ta1 1 ta1 1 ta2 1 Out Commands Written MB Read MB iscsi discovery rportal show This command displays iSCSI remote portals. iscsi discovery rportal show iscsi discovery rportal set This command allows you to set the interval (period) for the V-Switch to poll the network for iSCSI targets.
iscsi discovery rportal discover This command allows you discover remote iSCSI portals. iscsi discovery rportal discover SWITCH PARAMETER DEFINITION STATUS EXAMPLE -ip IP ADDRESS IP ADDRESS OF NETWORK PORT MANDATORY 212.199.43.70 -port TCP PORT TCP PORT FOR ISCSI COMMUNICATION OPTIONAL DEFAULT: 5003 3260 iscsi discovery rportal add This command adds an iSCSI remote portal.
acl show This command shows all target access per identity for the V Switch. acl show Table 11-41: Target Access per Identity Target Position Identity Access Finance 0 DEF_ALL not-accessible Finance 1 Identity5 read-only Finance 2 Identity2 read-write SQL 0 DEF_ALL not-accessible SQL 1 Identity7 read-write Library 0 DEF_ALL not-accessible Library 1 Identity4 read-only Library 2 Identity7 read-write acl details This command shows the access control for a target.
acl add This command links an identity and a target. acl add SWITCH PARAMETER DEFINITION STATUS EXAMPLE -ta TARGET ALIAS ALIAS OF ISCSI TARGET MANDATORY water -id IDENTITY NAME OF MANDATORY health_club -acc ACCESS RIGHTS ACCESS RIGHTS TO THE TARGET OPTIONAL OPTIONS: RW, RO OR NA DEFAULT: RW rw -pos POSITION ACCESS PRIORITY LEVEL OPTIONAL DEFAULT: 1 ACL 1 acl set This command changes the access rights of an existing identity as it is linked with a specific target.
acl rem This command removes an identity from the access control list of a specific target. acl rem SWITCH PARAMETER DEFINITION STATUS EXAMPLE -ta TARGET ALIAS ALIAS OF ISCSI TARGET MANDATORY water -id IDENTITY NAME OF MANDATORY health_club ACL acl identity show This command lists the identities in a V Switch.
Table 11-44: Identity Details Description: All library employees Initiators: iqn.com.ibm.Chandler iqn.com.cisco.Nigel iqn.com.ibm.Helen iqn.com.cisco.Julia Credentials: CHAP acl identity create This command creates a new identity for the V Switch.
acl identity add name This command adds an iSCSI initiator to an identity. acl identity add name SWITCH PARAMETER DEFINITION -id IDENTITY NAME OF -name INITIATOR NAME WWUI OF INITIATOR ACL STATUS EXAMPLE MANDATORY Med_School MANDATORY iqn.com.ibm. Sarah acl identity remove name This command removes an iSCSI initiator from an identity.
acl identity add chap This command adds CHAP authentication credentials to an identity.
acl identity add srp This command adds SRP authentication credentials to an identity. acl identity add srp SWITCH PARAMETER DEFINITION STATUS EXAMPLE -id IDENTITY NAME OF MANDATORY Med_School -un USER NAME HOST NAME MANDATORY Robert -pw USER PASSWORD HOST PASSWORD MANDATORY cardiac ACL acl identity remove srp This command removes an SRP authentication credential from an identity.
acl identity set This command allows changes to an identity. acl identity set SWITCH PARAMETER DEFINITION -id IDENTITY NAME OF -na NEW ALAIS -info -radius STATUS EXAMPLE MANDATORY Med_School NEW ALAIS FOR IDENTITY OPTIONAL Medschool INFORMATION INFORMATION ON IDENTITY OPTIONAL all_students RADIUS RADIUS AUTHENTICATION USED OPTIONAL YES OR NO yes SERVER ACL acl up This command pushes an identity position up in priority.
acl down This command pushes an identity position down in priority. acl down SWITCH PARAMETER DEFINITION STATUS EXAMPLE -ta TARGET TARGET ALAIS MANDATORY sql -id IDENTITY NAME OF ACL MANDATORY Med_School -n JUMP SIZE NUMBER OF PLACES TO MOVE DOWN OPTIONAL DEFAULT: 1 2 ip radius show This command shows all IP addresses for RADIUS servers configured on the V Switch RADIUS client. Table 11-45: RADIUS Server IP Addresses 212.199.43.2 212.199.56.
ip radius set This command allows changes to a RADIUS server configuration on the V Switch RADIUS client. SWITCH PARAMETER DEFINITION STATUS EXAMPLE -ip IP ADDRESS IP ADDRESS OF RADIUS SERVER MANDATORY 212.199.43.2 -p PORT PORT NUMBER OPTIONAL -key KEY SHARED SECRET BETWEEN VSWITCH AND RADIUS SERV OPTIONAL Xqjz1m7s9rjb ip radius remove This command removes a RADIUS server IP address from the V Switch RADIUS client.
volume expose –new This command creates a new LU0 and a new target for a specified volume. volume expose -new SWITCH PARAMETER DEFINITION STATUS EXAMPLE -vol VOLUME ALIAS ALIAS OF VOLUME TO CREATE LU0 AND TARGET FOR MANDATORY Concat 1 -ta TARGET ALIAS USER-ASSIGNED ALIAS OF TARGET TO CREATE MANDATORY ALIAS CANNOT CONTAIN SPACES MusicBox -tn TARGET WWUI USER-ASSIGNED WORLD WIDE UNIQUE IDENTIFIER FOR THE TARGET MANDATORY Ourcompany.
lu show This command shows all LUNs defined in the database. lu show Table 11-46: Details of all LUNs LUN Tgt Alias Volume Oper Status 0 Pilote xxx Active 0 Spirou yyy Active 1 Pilote Mir1 Active 0 1 zzz Active lu details This command shows the details of an LU in the database.
lu remove This command removes the LU from its target. The LU must be inactive before being removed. This command is the opposite of volume expose. lu remove SWITCH PARAMETER DEFINITION STATUS EXAMPLE -ta TARGET ALIAS ALIAS OF TARGET TO REMOVE LU FROM MANDATORY Pilote -lun LOGICAL UNIT NUMBER LU TO REMOVE FROM THE TARGET MANDATORY 0 lu statistics show This command shows all statistics for configured LUNs on the V-Switch.
system hardware show This command shows all hardware interface connection statistics. system hardware show Table 11-49: System Hardware PS Status: 2 working Max Max Fan CPU CPU 2 3 3 working 59 Warning 90; Faulty 100 OK 33 Warning 60; Faulty 70 OK No. of Power Supplies: No.
interface statistics details This command shows all interface connection counters.
In Receives: Reasm. Failures: Fragments OK: Failed to Fragment: Number Generated Frag.: Routing Discards: 161853270 0 0 0 0 0 ip statistics icmp show This command shows all ICMP counters. ip statistics icmp show Table 11-53: ICMP Counter Statistics Messages Received / Sent: Errors In / Out: Dest. Unreach In / Out: Time Excds In / Out: Param.
Local Address 11.11.11.110 22.22.22.110 Local Port 3260 3260 Remote Address 11.11.11.26 0.0.0.0 Remote Port 2176 0 State established listen tcp statistics show This command shows all TCP connection counters.
udp statistics show This command shows all UDP connection counters.
12 Monitoring & Statistics IN THIS CHAPTER The V-Switch enables RFC standards compliant health, interface and session monitoring of all V-Switch interfaces. Health Monitoring Interface Statistics TCP/IP Statistics iSCSI Session Statistics iSCSI Connection Statistics SCSI Port Statistics Remote iSCSI Initiator Statistics Logical Unit (LU) Statistics For specific details on a monitoring parameter, consult the RFC standard 2863.
Health Monitoring You can monitor the health of the V-Switch hardware for fan malfunctions that could lead to overheating as well as power supply malfunctions both of which can nullify high availability and lead to V-Switch failover. system hardware show This command shows all hardware interface connection statistics. system hardware show Table 12-1: System Hardware Max No. of Power Supplies: PS Status: Max No.
Interface Statistics You can monitor interface traffic and errors for each V-Switch interface to aid in system diagnostics. The interface monitoring has two components: the interface configuration and the counters. interface statistics show This command shows all interface connection statistics to provide an overview.
Table 12-3: Interface Statistics Details Alias: Discontinuity: In/Out Octets: In/Out Unicast Pkts: In/Out Discards: In/Out Errors: In/Out Multicast Pkts: In/Out Broadcast Pkts: In Unknown Protos: eth1 2 days 1h:37m:9 sec 535709973551 857473339209 0/0 0/0 96251/0 403010/0 0 TCP/IP Statistics ip statistics ip show This command shows all IP counters.
ip statistics icmp show This command shows all ICMP counters. ip statistics icmp show Table 12-5: ICMP Statistics Messages Received / Sent: Errors In / Out: Dest. Unreach In / Out: Time Excds In / Out: Param.
tcp statistics show This command shows all TCP connection counters. tcp statistics show Table 12-7: TCP Statistics #Current Connections: Active Open: Passive Open: Attempt Failures: Reset Establishments: Segments Received: Segments Sent: Segments Retransmitted: Errors Received: Reset Sent: 4 0 5 0 0 16078975 162950234 3794 50 0 udp listeners show This command shows all UDP listeners. udp listeners show 12-6 Local Address Local Port 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 10.0.0.110 127.0.0.
udp statistics show This command shows all UDP connection counters. udp statistics show Table 12-8: UDP Statistics Datagrams Received Wrong Port Datagrams Errors Datagrams Datagrams Sent 408815 0 18681 78999 iSCSI Session Statistics You can monitor iSCSI sessions including: All iSCSI sessions in and out of the V-Switch. All iSCSI sessions for a specific initiator or target. Specific iSCSI session details.
iscsi session details This command details all statistics, either basic or advanced, of a specific iSCSI session. iscsi session details You need one parameter to view a target’s iSCSI session details: SWITCH PARAMETER DEFINITION STATUS EXAMPLE -id ID ID OF SESSION TO CHECK MANDATORY Finance -adv ADVANCED ADVANCED ISCSI SESSION DETAILS OPTIONAL No value needed Table 12-10: Basic iSCSI Session Details 12-8 Initiator Alias: nms153 Initiator Name: ISID: iqn.199105.com.microsoft:QA2.qa.test.
Table 12-11: Advanced iSCSI Session Details Initial R2T False Immediate Data True Max Outstanding R2T 1 First Burst Size 65536 Max Burst Size 262114 Number of Connections 1 Sequence In Order True PDU In Order True Error Recovery Level 0 iscsi session statistics This command lists the statistics of all iSCSI sessions in and out of the V-Switch.
Table 12-14: Error iSCSI Session Details ID Initiator 1 nms153 ISID TSIH Digests Err Timeout Err 400001370000 b701 0 0 iSCSI Connection Statistics You can monitor iSCSI connections including: All iSCSI connections in and out of the V-Switch. All iSCSI connections for a specific initiator or target. Specific iSCSI connection details. iscsi session connection show This command lists all connections in the V-Switch.
Table 12-16: iSCSI Session Connection Details Connection ID: 1 State: Full Local Address: 11.11.11.110 Local Port: 3260 Remote Address: 11.11.11.26 Remote Port: 2178 Table 12-17: Advanced iSCSI Session Connection Details RX Data Segment Length: 65536 TX Data Segment Length 65536 Header Integrity Data Integrity SCSI Port Statistics You can monitor both the SCSI/iSCSI target and initiator ports. scsi target port statistics This command lists SCSI/iSCSI target port statistics.
Remote iSCSI Initiator Statistics You can monitor remote iSCSI initiators including: All initiators connected to the V-Switch. All initiators connections to a specific target. Statistics of all connected initiators. The CLI has a twenty-character display limit for initiator WWUIs. Use StoragePro to view a WWUI longer than twenty characters. iscsi rinitiator show This command shows all remote iSCSI initiators connected to the V-Switch.
iscsi rinitiator statistics show This command lists the statistics of all iSCSI remote initiators connected to the V-Switch. iscsi rinitiator statistics show Targ Initiator Attached Times Out Commands Written MB Read MB ta1 iqn.199*~ 1 0 4848612 7382819 ta2 iqn.199*~ 1 0 3914422 8773472 ta3 iqn.199*~ 1 0 146699 399844 Logical Unit (LU) Statistics This command shows all statistics for configured LUNs on the V-Switch.
12-14 SANRAD V-Switch CLI User Manual
r A Sample Configurations IN THIS CHAPTER This chapter details working examples of how to install, configure and use the V-Switch with a Microsoft iSCSI initiator on a Windows™ 2000 platform for: Sample Introduction Installing and Using the V-Switch 3000 Replacing a Mirrored Volume Replicating Data Off-line Configuring the VSwitch with a Single IP Routing Path Configuring a Cluster Appendix: Sample Configurations Basic V-Switch configuration with volume creation and exposure.
Sample Introduction This chapter provides working examples of standard procedures and configurations you will use in owning and operating your V-Switch. Each example uses one basic storage network consisting of: One JBOD appliance with four disks of equal capacity (the actual capacity is not important) connected to the V-Switch. A PC running on the Windows™ 2000 OS platform. Microsoft iSCSI initiator software installed on each host terminal.
STEP 1. ATTACH CABLES Attach an HSSDC-DB9 fibre channel cable from your JBOD appliance to one of the storage ports on the back panel of the V-Switch. See #1, Figure A-1. Depending on your appliance, you need to plug a terminator into one of the JBOD ports. Attach the included RS232 cable from your management/host station to the console port (Console) on the back panel of the V-Switch. See #2, Figure A-1.
STEP 2. POWER UP STORAGE DEVICE Power up the JBOD appliance first to allow the V-Switch to register it in its network scan. STEP 3. POWER UP V-SWITCH Connect the power cord to the V-Switch and then to the electric socket. Turn the V-Switch on. The V-Switch powers up. The fan assembly is running and the LCD panel displays: V-Switch 3000 Status: OK STEP 4. CONFIGURE CONSOLE You are using your PC as both the V-Switch’s management station and the network host station.
Figure A-2. V-Switch 3000 Login Window Enter the default user name, sanrad, and password, sanrad, and press Enter on your keyboard. The CLI prompt > appears. You are now logged in and ready to begin configuring your V-Switch for volume virtualization and exposure. STEP 6. INITIALIZE V-SWITCH From the open terminal emulation window, use the CLI command init to name the V-Switch. init –n VSwitch1 Use the CLI command ip config set to assign an IP address to the network port Eth 1.
STEP 8. CHECK STORAGE DEVICES Use the CLI command storage show to list the system-registered storage devices. This ensures that all disks were registered during the disk auto-discovery scan. This also lists the default disk aliases needed for creating your simple volumes. storage show Table A-3: Storage Devices Alias Entity Name Stor_1 Stor_2 Stor_3 Stor_4 500507606058c90 0 2000002037f88fb8 0 2000002037c32b1f 0 2000002037c32450 0 STEP 9. LUN Oper.
STEP 11. CREATE STRIPED VOLUME (RAID 0) Use the CLI command volume create striped to create a striped volume, Stripe1. volume create striped –vol Stripe1 –nbc 2 –sus 64 –ch Mirror1 –ch Mirror2 STEP 12. CREATE ISCSI TARGET AND LUN After creating the final virtual volume configuration that you want to expose to the network host, you need to create an iSCSI target for the volume as well as attach LUN0 to the target volume.
Click Add from the Target Portals tab. The Add Target Portal dialog box opens. Figure A-4. Portal Configuration Enter the IP address of Eth1, 172.17.200.174 and select the socket for the IP address. Click OK. The Microsoft initiator automatically discovers all available targets for this portal (IP + TCP). Toggle to the Available Targets tab to view all available targets. Figure A-5.
STEP 14. BEGIN USING VOLUME The new disk should be configured as a basic disk only. You can access Windows’ Disk Management application by right clicking on My Computer and selecting Manage. Select Disk Management from the Computer Management window. Figure A-6. Disk Management Window Replacing a Mirrored Volume After configuring the above setup, you notice that Disk 4 in your JBOD has gone offline. Simulate this by removing a physical disk from the JBOD case.
V Switch Manager and Host Station Windows 2000 Microsoft Initiator 2 Client s 1 Gbit Ethernet, RJ45 Copper Connection 3 RS232 Connection Fibre Channel Connection 1 JBOD 1 Disk 1 Disk 2 Disk 5 Disk 4 10233 Disk 3 Figure A-7. STEP 1. Replacing a Failed Disk SELECT A REPLACEMENT DISK Insert a replacement blade of the same size according to your specific manufacture’s instructions STEP 2. CHECK STORAGE DEVICES Use the CLI command storage show to view the new disk’s alias.
Table A-4: New disk Ð Storage Devices Alias Entity Name Stor_1 Stor_2 Stor_3 Stor_4 500507606058c90 0 2000002037f88fb8 0 2000002037c32b1f 0 2000002037c32450 0 Stor_5 500708206059f880 0 STEP 3. LUN Oper. Status Subdisk Enabled Enabled Enabled Storage is missing Enabled entire entire entire entire entire CREATE A SIMPLE VOLUME Use the CLI command volume create simple to create a simple volume from the newly inserted disk. volume create simple –vol Simple5 –d Stor_5 STEP 4.
STEP 7. REMOVE FAILED VOLUME Use the CLI command volume remove all to remove the nonfunctional virtual volume from the V-Switch database. volume remove all –vol Simple4 STEP 8. REMOVE FAILED DISK Use the CLI command volume storage remove to remove the failed disk from the V-Switch database. storage remove –s Stor_4 Use the CLI command storage show to view the updated storage disk table.
Windows 2000 10266 Microsoft Initiator V Switch Management Station OS3 NS3 JBOD 1 JBOD 2 Old1 Old2 New1 New 2 Old3 Old4 New3 New4 Figure A-8. STEP 1. Replicating Data Off-line ATTACH AND VIEW STORAGE DEVICES Attach the legacy JBOD to the V-Switch and configure the storage port communications as needed. See Chapter 4 “Configuring Storage Ports”. Use the CLI command storage show to view the attached storage.
Next, attach the new JBOD to the V-Switch and configure the storage port communications as needed. Use the CLI command storage show to view the attached storage. The legacy JBOD disks are Stor_1 through Stor_4. The new JBOD disks are Stor_5 through Stor_8.
STEP 3. REPLICATE DATA Use the CLI command volume copy create to begin replicating the data. The legacy volume is the source volume. The new volume is the destination volume. volume copy create –src OS1 –dst NS1 volume copy create –src OS2 –dst NS2 volume copy create –src OS3 –dst NS3 volume copy create –src OS4 –dst NS4 STEP 4. CHECK REPLICATION STATUS Use the CLI command volume mirror show to check the replication status.
Configuring the V-Switch with a Single IP Routing Path You have just purchased a V-Switch to manage your company’s storage network. A section of your company’s employees is located in your local branch offices and a section is stationed in your overseas offices. You need to configure volume access for both the local and overseas employees.
Initiator Target: 212.199.43.56 Tower box Tower Hostbox 1 IP address: 10.10.1.1 10.10.0.0 R Network B 212.199.43.70 Tower Host box 2 IP address: 212.199.43.90 LANt A Windows 2000 Microsoft Initiator V Switch Management Station 1 Gbit Ethernet, RJ45 Copper Connections IP address: 100.100.100.1 3 10234 2 Fibre Channel Connection Eth 1: 100.100.100.2 Eth 2: 212.199.43.56 1 JBOD 1 Disk 1 Disk 2 Disk 3 Disk 4 Figure A-9. STEP 1.
STEP 3. POWER UP V-SWITCH Connect the power cord to the V-Switch and then to the electric socket. The V-Switch powers up. The fan assembly is running and the LCD panel displays: V-Switch 3000 Status: OK STEP 4. INITIALIZE V-SWITCH Use the LCD display and control buttons to configure the V-Switch management port IP address and mask. Use the LCD display and control buttons on the V-Switch to configure the VSwitch management port IP address and mask. Toggle to the IP Configure ETH1 Port screen.
STEP 5. LOGIN TO THE MANAGEMENT PORT From your management terminal, open a Telnet session with the management port. From the Windows Start menu, select Run. In the Open window, enter: telnet 100.100.100.2 Click OK. A Telnet session window opens. Press Enter on your keyboard to open the V-Switch 3000 Login window. Figure A-10. V-Switch 3000 Login Screen STEP 6. Enter the default user name and password and press Enter on your keyboard. The CLI prompt > appears.
STEP 8. CONFIGURE IP ROUTING PATH Use the CLI command ip route add to create an IP routing path to the external host network IP address from network port Eth 2. This will allow communications between the local V-Switch and Network B’s host stations. ip route add –dip 10.10.0.0 –dmask 255.255.255.0 – gw 212.199.43.70 –if eth2 STEP 9. CHECK STORAGE DEVICES Use the CLI command storage show to list the system-registered storage devices.
STEP 11. CREATE MIRRORED VOLUMES (RAID 0) Use the CLI command volume create mirror to create a mirrored volume, Mirror1, from simple volumes Simple1 and Simple2. volume create mirror –vol Mirror1 –nbc 2 –ch Simple1 –ch Simple2 Use the CLI command volume create mirror to create a mirrored volume, Mirror2, from simple volumes Simple3 and Simple4. volume create mirror –vol Mirror2 –nbc 2 –ch Simple3 –ch Simple4 STEP 12.
Figure A-11. Microsoft iSCSI Initiator Click Add from the Target Portals tab. The Add Target Portal dialog box opens. Figure A-12. Portal Configuration Enter the IP address of Eth1, 172.17.200.174 and select the socket for the IP address. Click OK. The Microsoft initiator automatically discovers all available targets for this portal (IP + TCP). Toggle to the Available Targets tab to view all available targets.
Figure A-13. Available Target STEP 15. BEGIN USING VOLUME The new disk should be configured as a basic disk only. You can access Windows’ Disk Management application by right clicking on My Computer and selecting Manage. Select Disk Management from the Computer Management window. Figure A-14.
Configuring a Cluster You have just purchased two V-Switches and are ready to configure your host/storage network. Your company has one LAN for storage access and VSwitch management connections. Your management station IP address is 212.199.43.40. You have one FC JBOD that contains four disks. Because you have only one company LAN, you will be using only one network port, Eth 2, to connect the V-Switches to the company hosts. Your LAN mask is 212.199.43.
Initiator Target: 212.199.43.56 Telnet Station Initiator Targets: 212.199.43.75 212.199.43.56 IP address: 212.199.43.40 Tower Host box 1 IP address: 212.199.43.50 Tower box Host 2 IP address: 212.199.43.70 Etherne CloudB LAN t 2 2 2 Eth 1: 212.199.43.41 10235 Eth 1: 212.199.43.56 V Switch 1 V Switch 2 1 Fibre Channel Connection Eth 1: 212.199.43.42 Eth 1: 212.199.43.75 1 JBOD 1 Disk 1 Disk 2 Disk 3 Disk 4 Figure A-15. Cluster Topology STEP 1.
STEP 2. POWER UP STORAGE DEVICE Power up the JBOD appliance first to allow both V-Switches to register it in their network scan. STEP 3. POWER UP V-SWITCHES Connect the power cord to V-Switch 1 and then to the electric socket. The V-Switch powers up. The fan assembly is running and the LCD panel displays: V-Switch 3000 Status: OK Connect the power cord to V-Switch 2 and then to the electric socket. The V-Switch powers up.
Press Enter to enter the IP mask and return to the main V-Switch Status screen. V-Switch 3000 Status: OK STEP 5. INITIALIZE V-SWITCH 2 Use the LCD display and control buttons on V-Switch 2 to configure the VSwitch management port IP address and mask. Toggle to the IP Configure ETH1 Port screen. Press Enter. The IP Configuration screen appears. IP CONFIG Press Enter again. The IP Config ETH1 Port screen appears. IP Config ETH1 Port Press Enter. The Insert IP screen appears.
Figure A-16. V-Switch 3000 Login Screen STEP 7. Enter the default user name, sanrad, and password, sanrad, and press Enter on your keyboard. The CLI prompt > appears. You are now logged in and ready to begin configuring your V-Switch for volume virtualization and exposure. NAME V-SWITCH 1 Use the CLI command init to name V-Switch 1. You will need this name later for exposing volumes. init –n VSwitch1 STEP 8.
Figure A-17. V-Switch 3000 Login Screen STEP 9. Enter the default user name and password and press Enter on your keyboard. The CLI prompt > appears. You are now logged in and ready to begin configuring your V-Switch for volume virtualization and exposure. NAME V-SWITCH 2 Use the CLI command init to name V-Switch 2. You will need this name later for exposing volumes. init –n VSwitch2 STEP 10. CREATE CLUSTER You need to enable your two V-Switches to act as one unit to provide VSwitch failover.
Now, use the CLI command ip config set to configure the IP takeover address for Eth 1. This IP address will be the IP address of Eth 1 on VSwitch2. The address will sit inactive (2) unless VSwitch2 goes offline. Then VSwitch1 will activate (1) this address and direct all read/write commands to this address through Eth1 on VSwitch1. ip config set –if eth1 -ip 212.199.43.75 –im 255.255.255.0 –act 2 STEP 12.
STEP 14. CONFIGURE V-SWITCH 2 ISCSI PORTALS The port number you set in the CLI must coincide with the port number you set in your iSCSI initiator configuration. Use the CLI command iscsi portal create to configure the iSCSI portal on network port Eth 1 for iSCSI communications between the V-Switch and the host stations. iscsi portal create –ip 212.199.43.
Compare this disk table with the disk table from VSwitch1. Note that Default storage 1 and 2 are reversed in the disk table from VSwitch2. That is, Default storage 1 in VSwitch1 is listed as Default storage 2 in VSwitch2. You will use the WWUIs to duplicate virtual volume hierarchies in each VSwitch. STEP 16. CREATE SIMPLE VOLUMES ON V-SWITCH 1 Use the CLI command volume create simple to create four simple virtual volumes – one from each physical disk.
STEP 19. CREATE SIMPLE VOLUMES ON V-SWITCH 2 Now you will repeat the volume configurations on VSwitch2 to mimic the configurations on VSwtich1. Use the CLI command volume create simple to create four simple virtual volumes – one from each physical disk. Note that, using the WWUI to identify each disk, Simple1 is built on default storage 2 and Simple 2 is built on default storage 1.
STEP 22. CONFIGURE HOST STATION 1 INITIATOR Open the Microsoft iSCSI initiator program on host station 1. Figure A-18. Microsoft iSCSI Initiator Click Add from the Target Portals tab. The Add Target Portal dialog box opens. Figure A-19. Portal Configuration Enter the IP address of Eth1, 212.199.43.56 and select the socket for the IP address. Click OK. The Microsoft initiator automatically discovers all available targets for this portal (IP + TCP).
Toggle to the Available Targets tab to view all available targets for the configured portal. Figure A-20. Available Target STEP 23. CONFIGURE HOST STATION 2 INITIATOR Open the Microsoft iSCSI initiator program on host station 2.
Figure A-21. Microsoft iSCSI Initiator Click Add from the Target Portals tab. The Add Target Portal dialog box opens. Figure A-22. Portal Configuration Enter the IP address of Eth1, 212.199.43.56 and select the socket for the IP address. Click OK. The Microsoft initiator automatically discovers all available targets for this portal (IP + TCP). Toggle to the Available Targets tab to view all available targets for the configured portal.
Figure A-23. Available Target Because host 2 has access to two targets, you need to add the second initiator to access the target, sanrad.musicbox. Figure A-24.
Toggle to the Available Targets tab to view all available targets for the host 2 initiator. Figure A-25.
I Index 1 10/100, 1-5 A AC power supplies, 10-20 ACL add, 11-56 details, 11-55 down, 11-63 identity add chap, 11-60 identity add name, 11-59 identity add srp, 11-61 identity create, 11-58 identity delete, 11-58 identity details, 7-24, 11-57 identity remove chap, 11-60 identity remove name, 11-59 identity remove srp, 11-61 identity set, 11-62 remove, 11-57 set, 11-56 show, 7-14, 11-55, 11-57 up, 11-62 Activate snapshot, 8-10, 8-14 Actual capacity, 8-19, 8-24 Index Add acl, 11-56 acl identity chap, 11-60 a
subdisk, 6-9, 11-29 volume, 6-12, 9-1, 11-31 Auto-discovery, 2-8, 3-6 B Blink storage abort, 6-4, 11-24 storage activate, 6-3, 11-24 Boot, 11-21 Break mirror, 8-16, 11-39 Bridging switch, 1-2 Bus ID, 4-12, 11-10 C Capacity actual, 8-19, 8-24 potential, 8-19, 8-24 Celsius, 4-6, 12-2 Change password, 10-8 user profile, 10-8 CHAP add acl identity, 11-60 remove identity, 11-60 Chassis, 2-2, 3-2 Check IP route, 4-26 CLI, 1-5, 11-1 Cluster, 5-2 configuration, A-24 failover disable, 5-9, 10-19, 11-19 failover en
acl identity, 11-58 iSNS, 4-18, 9-7, 10-6 RADIUS, 9-7 Details acl, 11-55 disk, 6-5, 11-25 interface, 11-9 interface statistics, 11-69, 12-3 iSCSI session, 11-48, 12-8 iSCSI session connection, 11-51, 12-10 iSCSI target, 7-13, 11-44, 11-67, 12-13 LU, 11-66 LUN, 11-66 neighbor, 5-10, 11-17 storage, 6-5, 11-25 subdisk, 6-10 subdisks, 11-28 volume, 11-30 Device advance set, 11-7 advance show, 11-7 set, 4-6, 5-5, 10-2, 10-15, 11-5 set communities, 4-10, 11-11 set Telnet, 4-9, 10-3, 11-6 Disable cluster failover,
Hierarchy volume, 11-31 Hot keys, 1-6, 11-2 I Identify storage device, 6-3, 11-24 Identity acl add chap, 11-60 acl add name, 11-59 acl remove name, 11-59 add srp, 11-61 create acl, 11-58 delete acl, 11-58 details, 7-24, 11-57 down, 11-63 remove chap, 11-60 remove srp, 11-61 set, 11-62 up, 11-62 In-band, 4-2 Info, 4-8 V switch, 11-4 V-Switch, 10-4 Initiate V-Switch, A-5 Interface details, 11-9 set, 10-11, 11-9 show, 4-11, 11-8 show fc, 11-7 Interface statistics, 12-3 details, 11-69, 12-3 show, 11-68, 12-3 I
iSCSI initiator statistics show, 11-53, 12-13 iSCSI portal create, 4-19 remove, 4-20, 11-43 show, 4-20, 11-43 iSCSI remote initiator list, 11-52, 12-12 show, 11-52, 12-12 iSCSI remote portal add, 4-22, 11-54 discover, 4-22, 11-54 remove, 4-23, 11-54 set, 4-21, 11-53 show, 4-21, 11-53 iSCSI session connection details, 11-51, 12-10 connection show, 11-50, 12-10 details, 11-48, 12-8 show, 11-47, 12-7 statistics, 11-49, 12-9 iSCSI session statistics, 12-7 iSCSI target alias, 11-45 create, 11-45 details, 7-13, 1
Name acl identity remove, 11-59 Neighbor add, 5-6, 11-16 details, 5-10, 11-17 remove, 5-11, 10-18, 11-17 set, 5-11, 10-18, 11-16 show, 5-10, 11-17 Network port, 2-9, 3-7 config, 4-14 Network topology, 1-3 New volume expose, 11-65 Node show fc, 11-7 Normal mode, 10-24 Number of children, 6-14 O Off-line, 5-9, 10-19 On-line, 10-19 On-line copy, 8-4 On-line replication, 6-20, 8-4 Optical transceiver, 3-7 Out-of-band, 4-2 P Panel back, 3-2 back 2000, 2-3 front, 3-2 front 2000, 2-2 Parallel SCSI bus ID, 4-12,
subdisk, 10-17, 11-29 user profile, 10-8 volume, 9-2, 11-34 Remove all volume, 11-35 Rename volume, 9-1 Replace mirrored volume, A-9 power supply, 10-20 volume, 9-5, 11-35 Replicate, A-15 Replicating data off-line, A-12 Replication status, A-15 Report LUNs, 10-15, 11-6 Reset, 2-2, 10-21 V-Switch, 10-8 Resize volume, 8-19, 11-39 Retract volume, 8-23, 11-39 RJ45, A-3 RS232, 1-5, 4-2, 10-24, A-3 S Safe mode, 10-24 Safe Mode, 11-21 SCSI target port statistics, 11-52, 12-11 SCSI bus ID, 4-12, 11-10 SCSI bus ter
subdisk, 6-10, 11-28 system, 11-22 system hardware, 11-68, 12-2 TCP connection, 11-70, 12-5 TCP statistics, 11-71, 12-6 UDP listeners, 11-71, 12-6 UDP statistics, 11-72, 12-7 volume, 6-7, 6-13, 11-30 volume mirror, 8-7 volume mirror sync, 11-36 volume snapshot rollback, 8-15 Simple volume, 11-32 Simple volume create, 6-12 SLP, 4-17 Snapshot, 8-8 activate, 8-14 Deactivate, 8-13 show, 8-14 snapshot rollback abort, 8-16 show, 8-15 start, 8-15 Snapshot Rollback, 8-15 SNMP, 1-6 manager add, 4-9, 11-10 manager re
System Reset V switch, 11-4 System Reset Default Factory V switch, 11-4 T Target authentication, 7-21 existing, 7-30 new, 7-30 TCP connection show, 11-70, 12-5 TCP statistics show, 11-71, 12-6 TCP/IP statistics, 12-4 Technical assistance, 1-6 Telnet, 1-5, 4-2, 4-6, 4-9 set device, 10-3, 11-6 Telnet port, 10-3 Temperature scale, 4-6, 12-2 Transparent volume, 11-32 Trap, 4-10 U UDP listeners show, 11-71, 12-6 UDP statistics show, 11-72, 12-7 Up acl, 11-62 identity, 11-62 UPD port, 4-9 Update software, 10-21
simple, 6-12, 11-32 snapshot activate, 8-14 snapshot deactivate, 8-13 snapshot list, 8-14 snapshot show, 8-14 start mirror synchonization, 11-36, 11-37 stripe, 6-16, 11-33 transparent, 11-32 Volume configuration, 11-23 Volume create concatenated, 6-14, 11-33 mirror, 6-19, 11-32 RAID 0+1, 6-21 RAID 10, 6-21 simple, 11-32 stripe, 6-16, 11-33 transparent, 6-6, 11-32 volume snapshot rollback abort, 8-16 rollback show, 8-15 rollback start, 8-15 V-Switch, 1-2 10 configuration single IP, A-16 initiate, A-5 insta