Академический Документы
Профессиональный Документы
Культура Документы
Home > HowTo > Replication Using FCIP & Brocade 7800 SAN switches
https://wfayed.wordpress.com/2012/10/27/fcip-on-a-brocade-7800-san-switch/
I was involved for a project for one of our customers that involved configuring remote replication
between two Sun 6180 storage boxes, one located in Cairo and the other located in Port Said
(which is 200km away).
We had two brocade 7800 SAN switches. The two sites are connected via a WAN link.
The WAN link (if you are not familiar with it), is usually a long distance link between two routers.
These routers are connected via a medium that supports the required distance; for example an
E1 link, or a bundle of E1s to increase bandwidth. The result is two network subnets connected
via the routers. The diagram below illustrates how network clients on both sides of the routers
can reach each other via regular network routing.
FC over IP = FCIP
SAN replication uses the FC protocol. To allow the FC protocol to travel over the WAN link we will
use the FCIP protocol. FCIP will encapsulate the FC packets into IP packets which can then be
routed over the long distance network between the two sites.
Sending large amounts of data over a WAN link usually includes sizing. The WAN connection
must have enough bandwidth to accommodate the traffic. Proper sizing has to be performed
such that the link can complete the data transfer complete in a timely fashion according to the
environment requirements.
Connecting the 6180s to the SAN switch is pretty straight forward, just connect the replication
port of the 6180 to one of the FC ports on the SAN switch.
Configuring the FCIP tunnel is where all the work is. The entire FCIP configuration has to be
performed on both SAN switches via command line. The configuration should match on both
sides, otherwise it will not work.
First we need to configure the network ports on the SAN switch, this will just define the IP
addresses of the FC network ports. Dont get this mixed up with the management port and IP,
this is a different port and different configuration.
Once the network ports have been configured we then need to define the network routes. This
way the packets know which router to use to reach the remote subnet.
Finally, we configure the tunnel. The tunnel defines the source and target IPs in addition to any
other options required for the connection, such as IPSEC, fastwrite, compression, etc On the
brocade 7800 switch, the FCIP tunnel is designated a virtual port number. This port is not a
physical port, it is a virtual port used to identify and configure the tunnel. The first FCIP port on
the 7800 is port 16, which we will be using.
Connection Diagram
Step-by-Step Configuration
To configure the tunnel as shown in the configuration diagram, log on to the Main Switch and
run the following commands;
IP: 192.168.1.100
subnet: 255.255.255.0
MTU: 1500
To reach 192.168.2.0/24 (the remote SAN switch FC network) use the router 192.168.1.1
Finally, create the FCIP tunnel 16 with target 192.168.2.100 and source 192.168.1.100
By running the above three commands, the configuration on the MAIN SAN switch is done. We
now need to configure the other side of the tunnel on the DR switch;
SAN-DR:admin> portcfg ipif ge0 create 192.168.2.100 255.255.255.0 1500
The configuration is now complete, the two 6180s should be able to communicate as if they
were connected to the same SAN switch.
Finally, additional configuration such as fast write, compression and IPSEC security can be
configured by modifying the tunnel configuration. Note that this will disrupt the FCIP traffic for a
few seconds while the reconfiguration completes. Again, this has to be done on both SAN
switches otherwise the tunnel will not come up.
To apply this to our example, the 32-byte key is in hexadecimal, and can be anything as long as it
is the same on both sides.
You can also limit the bandwidth used by the tunnel. In this example I am limiting the tunnel to
use 10Mbps.
Modify operation can disrupt the traffic on the fciptunnel specified for a brief period of time.
This operation will bring the existing tunnel down (if tunnel is up) before applying new
configuration.
Continue with Modification (Y,y,N,n): [ n] y
The following output show the commands and example output of a configured tunnel;
Port: ge0
--------------------------------------------------------------
Port: ge0
-------------------------------------------------------------
10.3.202.0 255.255.255.0 * 0 UC
-------------------------------------------------------------------------------
Tunnel Circuit OpStatus Flags Uptime TxMBps RxMBps ConnCnt CommRt Met
-------------------------------------------------------------------------------
-------------------------------------------------------------------------------
circuit: s=sack
-------------------------------------------------------------------------------
Tunnel Circuit OpStatus Flags Uptime TxMBps RxMBps ConnCnt CommRt Met
-------------------------------------------------------------------------------
-------------------------------------------------------------------------------
circuit: s=sack
-------------------------------------------
Tunnel ID: 16
Tunnel Description:
Compression: On (Standard)
Fastwrite: On
IPSec: Enabled
Circuit Count: 1
Flags: 0x00000000
FICON: Off
-------------------------------------------
Tunnel ID: 16
Tunnel Description:
Oper Status: Up
Compression: On (Standard)
Fastwrite: On
IPSec: Enabled
Circuit Count: 1
Flags: 0x00000000
FICON: Off
-------------------------------------------
Circuit Num: 0
Oper Status: Up
Metric: 0
SACK: On
Max Retransmits: 8
DSCP: F: 0 H: 0 M: 0 L: 0
Flags: 0x00000000
If you want to change the IP addresses of the ge interfaces you will need to delete the entire
configuration and start over.
The following sequence of commands will delete the FCPIP tunnel, the route and IP address
assigned to the FC network interface. The tunnel is FC IP is dependent on the route, and the
route is dependent on the tunnel. The commands are arranged by dependency, so if you want to
delete a components, you must also delete all the components above it.
Advertisements
Share this:
PrintEmailMore
Tammy
and article is really fruitful designed for me, keep up posting these content.
Like
Ahmed
Thanks for the great post. I have a question: How do I make the two switches act as one switch?
For example, how do I manage the ports on one SAN switch using the other switch after creating
an FCIP tunnel between the two?
Like
wfayed
I did want to configure zoning between the two switches in this solution but was not able to. I
dont remember if the fabric actually joined or not, Ill update again soon with notes on this
though.
But your question made me curious to look into it again so quick search and I found this blog
post. The author says that the fabric should merge, and that if different zoning exists then zone
conflicts will occur. Check it out and let me know how it works out for you.
Like
Jorge
Hello,
Could you show us which would be the trace from 192.168.1.100 to 192.168.1.200 ??
Like
wfayed
I am so sorry, I never saw this comment, I know this is ancient, but I thought I should answer
anyways.
I dont have access to this environment anymore, nor did I still have it back when the comment
was made, so I am really sorry I cannot provide the traceroute output.
Like
Leave a Reply
Enter your comment here...
RSS feed
Enter your email address to follow this blog and receive notifications of new posts by email.
Follow
Archives
Top
Follow
:)