Configuring and Managing Vsans
Configuring and Managing Vsans
c o m
CH A P T E R 26
Configuring and Managing VSANs
You can achieve higher security and greater stability in Fibre Channel fabrics by using virtual SANs
(VSANs) on Cisco MDS 9000 Family switches and Cisco Nexus 5000 Series switches. VSANs provide
isolation among devices that are physically connected to the same fabric. With VSANs you can create
multiple logical SANs over a common physical infrastructure. Each VSAN can contain up to 239
switches and has an independent address space that allows identical Fibre Channel IDs (FC IDs) to be
used simultaneously in different VSANs. This chapter includes the following sections:
• About VSANs, page 26-1
• VSAN Configuration, page 26-5
• Default Settings, page 26-14
About VSANs
A VSAN is a virtual storage area network (SAN). A SAN is a dedicated network that interconnects hosts
and storage devices primarily to exchange SCSI traffic. In SANs you use the physical links to make these
interconnections. A set of protocols run over the SAN to handle routing, naming, and zoning. You can
design multiple SANs with different topologies.
This section describes VSANs and includes the following topics:
• VSANs Topologies, page 26-1
• VSAN Advantages, page 26-3
• VSANs Versus Zones, page 26-4
VSANs Topologies
With the introduction of VSANs, the network administrator can build a single topology containing
switches, links, and one or more VSANs. Each VSAN in this topology has the same behavior and
property of a SAN. A VSAN has the following additional features:
• Multiple VSANs can share the same physical topology.
• The same Fibre Channel IDs (FC IDs) can be assigned to a host in another VSAN, thus increasing
VSAN scalability.
• Every instance of a VSAN runs all required protocols such as FSPF, domain manager, and zoning.
• Fabric-related configurations in one VSAN do not affect the associated traffic in another VSAN.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
• Events causing traffic disruptions in one VSAN are contained within that VSAN and are not
propagated to other VSANs.
The switch icons shown in both Figure 26-1 and Figure 26-2 indicate that these features apply to any
switch in the Cisco MDS 9000 Family.
Figure 26-1 shows a fabric with three switches, one on each floor. The geographic location of the
switches and the attached devices is independent of their segmentation into logical VSANs. No
communication between VSANs is possible. Within each VSAN, all members can talk to one another.
Switch 1
Floor 3
Switch 2
Floor 2
Switch 3
79532
Floor 1
Figure 26-2 shows a physical Fibre Channel switching infrastructure with two defined VSANs: VSAN
2 (dashed) and VSAN 7 (solid). VSAN 2 includes hosts H1 and H2, application servers AS2 and AS3,
and storage arrays SA1 and SA4. VSAN 7 connects H3, AS1, SA2, and SA3.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
H1
FC FC FC FC
Link in VSAN 2
Link in VSAN 7 79533
Trunk link
The four switches in this network are interconnected by trunk links that carry both VSAN 2 and
VSAN 7 traffic. The inter-switch topology of both VSAN 2 and VSAN 7 are identical. This is not a
requirement and a network administrator can enable certain VSANs on certain links to create different
VSAN topologies.
Without VSANs, a network administrator would need separate switches and links for separate SANs. By
enabling VSANs, the same switches and links may be shared by multiple VSANs. VSANs allow SANs
to be built on port granularity instead of switch granularity. Figure 26-2 illustrates that a VSAN is a
group of hosts or storage devices that communicate with each other using a virtual topology defined on
the physical SAN.
The criteria for creating such groups differ based on the VSAN topology:
• VSANs can separate traffic based on the following requirements:
– Different customers in storage provider data centers
– Production or test in an enterprise network
– Low and high security requirements
– Backup traffic on separate VSANs
– Replicating data from user traffic
• VSANs can meet the needs of a particular department or application.
VSAN Advantages
VSANs offer the following advantages:
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
• Traffic isolation—Traffic is contained within VSAN boundaries and devices reside only in one
VSAN ensuring absolute separation between user groups, if desired.
• Scalability—VSANs are overlaid on top of a single physical fabric. The ability to create several
logical VSAN layers increases the scalability of the SAN.
• Per VSAN fabric services—Replication of fabric services on a per VSAN basis provides increased
scalability and availability.
• Redundancy—Several VSANs created on the same physical SAN ensure redundancy. If one VSAN
fails, redundant protection (to another VSAN in the same physical SAN) is configured using a
backup path between the host and the device.
• Ease of configuration—Users can be added, moved, or changed between VSANs without changing
the physical structure of a SAN. Moving a device from one VSAN to another only requires
configuration at the port level, not at a physical level.
Up to 1024 VSANs can be configured in a switch. Of these, one is a default VSAN (VSAN 1), and
another is an isolated VSAN (VSAN 4094). User-specified VSAN IDs range from 2 to 4093.
Figure 26-3 shows the possible relationships between VSANs and zones. In VSAN 2, three zones are
defined: zone A, zone B, and zone C. Zone C overlaps both zone A and zone B as permitted by Fibre
Channel standards. In VSAN 7, two zones are defined: zone A and zone D. No zone crosses the VSAN
boundary—they are completely contained within the VSAN. Zone A defined in VSAN 2 is different and
separate from zone A defined in VSAN 7.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Physical Topology
AS2 AS3
Zone A
H2 SA1
VSAN 2
Zone C
H1 SA4
Zone B
H3
Zone D
VSAN 7
Zone A
AS1 SA2 SA3
79534
VSAN Configuration
VSANs have the following attributes:
• VSAN ID—The VSAN ID identifies the VSAN as the default VSAN (VSAN 1), user-defined
VSANs (VSAN 2 to 4093), and the isolated VSAN (VSAN 4094).
• State—The administrative state of a VSAN can be configured to an active (default) or suspended
state. Once VSANs are created, they may exist in various conditions or states.
– The active state of a VSAN indicates that the VSAN is configured and enabled. By enabling a
VSAN, you activate the services for that VSAN.
– The suspended state of a VSAN indicates that the VSAN is configured but not enabled. If a port
is configured in this VSAN, it is disabled. Use this state to deactivate a VSAN without losing
the VSAN’s configuration. All ports in a suspended VSAN are disabled. By suspending a
VSAN, you can preconfigure all the VSAN parameters for the whole fabric and activate the
VSAN immediately.
• VSAN name—This text string identifies the VSAN for management purposes. The name can be
from 1 to 32 characters long and it must be unique across all VSANs. By default, the VSAN name
is a concatenation of VSAN and a four-digit string representing the VSAN ID. For example, the
default name for VSAN 3 is VSAN0003.
• Load balancing attributes—These attributes indicate the use of the source-destination ID (src-dst-id)
or the originator exchange OX ID (src-dst-ox-id, the default) for load balancing path selection.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note OX ID based load balancing of IVR traffic from IVR- enabled switches is not supported on
Generation 1 switching modules. OX ID based load balancing of IVR traffic from a non-IVR
MDS switch should work. Generation 2 switching modules support OX ID based load
balancing of IVR traffic from IVR-enabled switches.
This section describes how to create and configure VSANs and includes the following topics:
• About VSAN Creation, page 26-6
• Creating VSANs Statically, page 26-6
• About Port VSAN Membership, page 26-8
• Assigning Static Port VSAN Membership, page 26-8
• About the Default VSAN, page 26-8
• About the Isolated VSAN, page 26-8
• Displaying Isolated VSAN Membership, page 26-9
• Operational State of a VSAN, page 26-9
• Mapping VSANs to VLANs, page 26-9
• About Static VSAN Deletion, page 26-12
• Deleting Static VSANs, page 26-13
• About Load Balancing, page 26-13
• Configuring Load Balancing, page 26-13
• About Interop Mode, page 26-14
• About FICON VSANs, page 26-14
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note As of Cisco SAN-OS Release 3.1(2) and later, if you check the Static Domain IDs check box,
Fabric Manager creates the VSAN in suspended mode and then automatically activates the
VSAN.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 1 Choose Interfaces > FC Physical from the Physical Attributes pane. You see the interface configuration
in the Information pane.
Step 2 Click the General tab.
You see the Fibre Channel general physical information. Double-click and complete the PortVSAN field.
Step 3 Click Apply Changes to save these changes, or click Undo Changes to discard any unsaved changes.
Note Up to 1024 VSANs can be configured in a switch. Of these, one is a default VSAN (VSAN 1), and
another is an isolated VSAN (VSAN 4094). User-specified VSAN IDs range from 2 to 4093.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note When you configure a port in VSAN 4094 or move a port to VSAN 4094, that port is immediately
isolated.
Note Up to 1024 VSANs can be configured in a switch. Of these, one is a default VSAN (VSAN 1), and
another is an isolated VSAN (VSAN 4094). User-specified VSAN IDs range from 2 to 4093.
Step 1 Expand Fabricxx and then select All VSANs in the Logical Domains pane.
You see the VSAN configuration in the Information pane.
Step 2 Click the Isolated Interfaces tab.
You see the interfaces that are in the isolated VSAN.
Note This section applies to Cisco Nexus 5000 Series switches only.
A VSAN-VLAN mapping indicates the VLAN that is used to transport Fibre Channel traffic for a
specific VSAN. Each virtual Fibre Channel interface is associated with only one VSAN. Any VSAN
with associated virtual Fibre Channel interfaces must be mapped to a dedicated Fibre Channel over
Ethernet (FCoE)-enabled VLAN. FCoE is not supported on private VLANs.
This section provides information about how to configure a virtual Fibre Channel interface and includes
the following topics:
• Mapping VSANs to VLANs Using Fabric Manager, page 26-10
• Mapping VSANs to VLANs Using Device Manager, page 26-11
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Note You must have a Cisco Nexus 5000 Series switch in the fabric to map a VSAN to a VLAN using the
VSAN-VLAN Mapping tab in the Information pane.
The table shows the existing VSAN-VLAN mappings and the operational state of each VLAN.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 4 From the Switch drop-down list, choose a Cisco Nexus 5000 Series switch.
Step 5 In the VSAN Id and VLAN Id fields, enter the VSAN ID and the VLAN ID that will be mapped together.
Step 6 Click Create to create the mapping.
Step 1 Launch Device Manager from the Cisco Nexus 5000 Series switch, as described in the “Launching
Device Manager” section on page 6-2.
Step 2 Choose FC > VSANs.
You see the VSAN dialog box. In the dialog box, the Membership tab displays the virtual Fibre Channel
interfaces associated with a VSAN.
Step 3 Click the VSAN-VLAN Mapping tab.
In the VSAN-VLAN Mapping tab, the table lists the existing VSAN-VLAN mappings and the
operational state of each VLAN.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Step 5 In the VSAN Id and VLAN Id fields, enter the VSAN ID and the VLAN ID that will be mapped together.
Step 6 Click Create to create the mapping.
Before After
Default VSAN 7 Default VSAN 7
VSAN VSAN
Switch 1 Switch 1
• VSAN-based runtime (name server), zoning, and configuration (static routes) information is
removed when the VSAN is deleted.
• Configured VSAN interface information is removed when the VSAN is deleted.
Note The allowed VSAN list is not affected when a VSAN is deleted (see Chapter 24, “Configuring
Trunking”).
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Any commands for a nonconfigured VSAN are rejected. For example, if VSAN 10 is not configured in
the system, then a command request to move a port to VSAN 10 is rejected.
Step 1 Choose Fabricxx > All VSANs from the Logical Domains pane.
You see the VSAN configuration in the Information pane shown in Figure 26-12.
Se n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a ck - d o c @ c i s c o . c o m
Default Settings
Table 26-2 lists the default settings for all configured VSANs.
Parameters Default
Default VSAN VSAN 1.
State Active state.
Name Concatenation of VSAN and a four-digit string representing the
VSAN ID. For example, VSAN 3 is VSAN0003.
Load-balancing attribute OX ID (src-dst-ox-id).