© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1.

Slides:



Advertisements
Similar presentations
Topics Networking Concepts Storage Concepts Presentation by Anand Mewalal Vmware VI3 Concepts On networking and Storage.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 Technet Infrastructure Overview Storage Subsystem Fibre Channel Ethernet Only 10G Unified.
 WAN uses Serial ports  Ethernet Ports:  Straight through  Cross over.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Inter- VLAN Routing LAN Switching and Wireless – Chapter 6.
Cisco Unified Computing System Nuts & Bolts
Virtual LANs.
© 2006 Cisco Systems, Inc. All rights reserved.Presentation_ID 1 Configuring Cisco Nexus 5000 Switches in NPV Mode Module 9.
Copyright © 2014 EMC Corporation. All Rights Reserved. Linux Host Installation and Integration for Block Upon completion of this module, you should be.
Switching Topic 4 Inter-VLAN routing. Agenda Routing process Routing VLANs – Traditional model – Router-on-a-stick – Multilayer switches EtherChannel.
Cisco 3 - Switch Perrine. J Page 15/8/2015 Chapter 8 What happens to the member ports of a VLAN when the VLAN is deleted? 1.They become inactive. 2.They.
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Unity Connection Qualification for Prime Collaboration Development Release.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.1 Module 6 Switch Configuration.
© 2004 Cisco Systems, Inc. All rights reserved. Operating and Configuring Cisco IOS Devices Starting a Switch INTRO v2.0—8-1.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 W. Schulte Chapter 5: Inter-VLAN Routing Routing And Switching.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 UCS UCS Central Best Practices Jeff Silberman
How to Finally Secure your Network Storage Himanshu Dwivedi Managing Security Inc.
1 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public Load Presentation onto my communities page VPN to CMI Lab Connect to Client via.
VLAN ROUTING How can we route traffic between vlans ? By Default Vlans isolate them selves. To Route Traffic we can use: 1. Router: A Router connected.
Static Routing Last Update Copyright Kenneth M. Chipps Ph.D.
Development of an API Standard in Interoperable Storage Networking Benjamin F. Kuo Troika Networks, Inc.
Cisco Confidential 1 © 2011 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential 1 © Cisco and/or its affiliates. All rights reserved.  Load Presentation onto my communities page  Start UCSPE (Make sure.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—2-1 Implementing VLANs in Campus Networks Applying Best Practices for VLAN Topologies.
Cisco CatOS vs. IOS 08/07/07 David Mitchell and Teresa Shibao.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 5: Inter-VLAN Routing Routing And Switching.
Module 12 MXL DCB <Place supporting graphic here>
1 © 2004, Cisco Systems, Inc. All rights reserved. Chapter 6 Configuring a Router/ Learning About Other Devices/ Managing Cisco IOS Software.
Starting the switch Configuring the Switch
© 2006 Cisco Systems, Inc. All rights reserved.1 Microsoft Network Load Balancing Support Vivek V
Cisco S2 C4 Router Components. Configure a Router You can configure a router from –from the console terminal (a computer connected to the router –through.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.0 Module 2 Introduction to Routers.
Ch.2 – Introduction to Routers
Copyright © 2014 EMC Corporation. All Rights Reserved. Windows Host Installation and Integration for Block Upon completion of this module, you should be.
1 Version 3.0 Module 6 Switch Configuration. 2 Version 3.0 Switches Contain: –CPU –RAM –Operating System.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 2 Introduction to Routers.
© 2006 Cisco Systems, Inc. All rights reserved.1 Cisco Unity Connection – SNMP Support Unity Connection SNMP TOI Overview Yolanda Liu,
Copyright © 2014 EMC Corporation. All Rights Reserved. Managing Host Access to Storage Upon completion of this module, you should be able to: Explain Access.
Router Fundamentals PJC CCNA Semester 2 Ver. 3.0 by William Kelly.
1 Support for IGMP Snooping v1/v2/v3 Pre UCSM 2.1, IGMP snooping cannot be disabled and querier functionality cannot be turned on. IGMP joins sent on Mrouter.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 8 Virtual LANs Cisco Networking Academy.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. UC320W with SFE2000P Switch configuration July 06, 2012
STP Part II PVST (Per Vlan Spanning Tree): A Vlan field is added to the BPDU header along with Priority & Mac. Priority is 32768, Mac Address is MAC or.
Switching Topic 2 VLANs.
Ch.2 – Introduction to Routers CCNA 2 version 3.0 Rick Graziani Cabrillo College.
Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 1 Multicasting within UCS Qiese Dides.
Configuring a Router MM Clements. Copyright This Week Command line interface Router configuration Modes for configuration Interface.
Chapter 2: Configure a Network Operating System
1 CCNA 2 v3.1 Module 2 Introduction to Routers Claes Larsen, CCAI.
1 © 2004 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Technical Support Seminar Using the Cisco Technical Support Website.
Cisco 2 - Routers Perrine. J Page 16/26/2016 Chapter 2 Cisco IOS Software Cisco’s operating system is called Cisco Internetwork Operating System (IOS)
Cisco Study Guide
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 2 Introduction to Routers.
Router Components & Configuration. Router Components & Configurations Topics Physical components Memory components Configuration modes Keystroke shortcuts.
Instructor Materials Chapter 2: Scaling VLANs
Implementing Cisco Data Center Unified Computing
MDS Setup and Configuration
Switch Commands.
Router Startup and Setup
Braindumps4IT Braindumps Ream Exam Questions Answers
Chapter 5: Inter-VLAN Routing
If you Want pass Your Exam In first Attempt practice-questions.html.
Chapter 2: Scaling VLANs
Free Exam Dumps - Latest [2018] Cisco Braindumps Question
Chapter 5: Switch Configuration
Router Startup and Setup
Storage Automation for BAO
Latest Practice Exam Dumps
Presentation transcript:

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 Physical Uplinks and Connectivity Verification UCSM Configuration – Boot Policy, VHBAs, End-Host Mode, VSANs Upstream 5k VSAN configuration and verification 5k FCalias and Zoning Configuration and Verification Verification via Lunlist and FLOGI EMC VNX side LUN Masking Boot from SAN

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Physical Uplinks and Connectivity Verification We already cabled from the 5k’s to the EMC VNX on interfaces fc1/30 and fc1/32 so you don’t need to do that. HOWEVER, you do need to cable your FI’s to the 5k’s upstream (FIA to 5kA and FIB to 5kB) with FC uplinks. FI A side: interface fc2/13 switchport mode NP switchport trunk mode on no shutdown FI B side: interface fc2/13 switchport mode NP switchport trunk mode on no shutdown

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 Physical Uplinks and Connectivity Verification We already cabled from the 5k’s to the EMC VNX on interfaces fc1/30 and fc1/32 so you don’t need to do that. HOWEVER, you do need to cable your FI’s to the 5k’s upstream (FIA to 5kA and FIB to 5kB) with FC uplinks. AGR012-5K-A# show run interface fc1/29-32 (fc1/29 and 1/31 removed) interface fc1/30 switchport description emcVnx_B2_port1 no shutdown interface fc1/32 switchport description emcVnx_A2_port0 no shutdown AGR012-5K-B# show run interface fc1/29-32 (fc1/29 and 1/31 removed) interface fc1/30 switchport description emcVnx_A2_port1 no shutdown interface fc1/32 switchport description emcVnx_B2_port0 no shutdown

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 UCSM Configuration – Boot Policy, VHBAs, End- Host Mode, and VSANs Boot Policy

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 UCSM Configuration – Boot Policy, VHBAs, End- Host Mode, and VSANs VHBAs - You need two VHBAs configured

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 UCSM Configuration – Boot Policy, VHBAs, End- Host Mode, and VSANs You must be running in FC End-Host Mode (B side shown here)

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 UCSM Configuration – Boot Policy, VHBAs, End- Host Mode, and VSANs Create VSANs for both A and B side in UCSM and label them to reflect your name, VLAN wiki number and A/B side. My VLAN wiki is 28.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 UCSM Configuration – Boot Policy, VHBAs, End- Host Mode, and VSANs Create VSANs for both A and B side in UCSM and label them to reflect your name, VLAN wiki number and A/B side. My VLAN wiki is 28.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 UCSM Configuration – Boot Policy, VHBAs, End- Host Mode, and VSANs Create VSANs for both A side (128) and B side (228) in UCSM and label them appropriately.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 UCSM Configuration – Boot Policy, VHBAs, End- Host Mode, and VSANs After you create VSANs for both A side (128) and B side (228) in UCSM it should look something like this.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 Upstream 5k VSAN Configuration and Verification Now you will need to create VSANs on the upstream 5kA and 5kB to match your new VSANs you made in UCSM. (Done for you already) A side: (config)#vsan database (config-vsan-db)#vsan 128 name VNX3949_FabA B side: (config)#vsan database (config-vsan-db)#vsan 228 name VNX3949_FabB

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 Upstream 5k VSAN Configuration and Verification To verify the vsan configuration on the 5k just do a show interface on one of the 5k uplinks. A Side Config: AGR012-5K-A# show int fc1/31 fc1/31 is trunking Port description is profx_fiA_port2_13 Hardware is Fibre Channel, SFP is short wave laser w/o OFC (SN) Port WWN is 20:1f:8c:60:4f:05:d3:80 Admin port mode is auto, trunk mode is on snmp link state traps are enabled Port mode is TF Port vsan is 1 Speed is 4 Gbps Transmit B2B Credit is 16 Receive B2B Credit is 16 Receive data field Size is 2112 Beacon is turned off Trunk vsans (admin allowed and active) (1,128) Trunk vsans (up) (1,128) B Side Config: AGR012-5K-B# show int fc1/31 fc1/31 is trunking Port description is profx_fiB_port2_13 Hardware is Fibre Channel, SFP is short wave laser w/o OFC (SN) Port WWN is 20:1f:8c:60:4f:05:d6:40 Admin port mode is auto, trunk mode is on snmp link state traps are enabled Port mode is TF Port vsan is 1 Speed is 4 Gbps Transmit B2B Credit is 16 Receive B2B Credit is 16 Receive data field Size is 2112 Beacon is turned off Trunk vsans (admin allowed and active) (1,228) Trunk vsans (up) (1,228)

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 5k FC Aliases and Zoning Configuration and Verification Now it’s time to create your FC aliases and zoning on the upstream 5k for your service profile/server and HBA WWPNs. FC Alias Config Side A: AGR012-5K-A(config)# fcalias name Tray_Gambit_ESX-55-03_fc0 vsan 128 AGR012-5K-A(config-fcalias)# member pwwn 20:00:00:15:B5:0A:00:03 AGR012-5K-A(config)# show fcalias fcalias name Tray_Gambit_ESX-55-03_fc0 vsan 128 pwwn 20:00:00:15:b5:0a:00:03  matches VHBA fc0 WWPN FC Alias Config Side B: AGR012-5K-B(config)# fcalias name Tray_Gambit_ESX_55-03_fc1 vsan 228 AGR012-5K-B(config-fcalias)# member pwwn 20:00:00:15:B5:0B:00:03 AGR012-5K-B(config-fcalias)# show fcalias fcalias name Tray_Gambit_ESX_55-03_fc1 vsan 228 pwwn 20:00:00:15:b5:0b:00:03  matches VHBA fc1 WWPN

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 5k FC Aliases and Zoning Configuration and Verification Now it’s time to create your FC aliases and zoning on the upstream 5k for your service profile/server and HBA WWPNs. Zone Config Side A: AGR012-5K-A(config)# zone name z_Tray_Gambit_ESX_55_03_VNX3949_SPA0 vsan 128 AGR012-5K-A(config-zone)# member pwwn 20:00:00:15:B5:0A:00:03 AGR012-5K-A(config-zone)# member pwwn 50:06:01:60:36:e0:0f:26 AGR012-5K-A(config)# zone name z_Tray_Gambit_ESX_55_03_VNX3949_SPB1 vsan 128 AGR012-5K-A(config-zone)# member pwwn 20:00:00:15:B5:0A:00:03 AGR012-5K-A(config-zone)# member pwwn 50:06:01:69:36:e0:0f:26 Zone Config Side B: AGR012-5K-A(config)# zone name z_Tray_Gambit_ESX_55_03_VNX3949_SPA1 vsan 228 AGR012-5K-A(config-zone)# member fcalias Tray_Gambit_ESX_55-03_fc1 AGR012-5K-A(config-zone)# member pwwn 50:06:01:61:36:e0:0f:26 AGR012-5K-A(config)# zone name z_Tray_Gambit_ESX_55_03_VNX3949_SPB0 vsan 228 AGR012-5K-A(config-zone)# member pwwn 20:00:00:15:B5:0b:00:03 AGR012-5K-A(config-zone)# member pwwn 50:06:01:68:36:e0:0f:26

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 5k FC Aliases and Zoning Configuration and Verification Verify your FC Alias configurations. FC Alias Verification Side A: AGR012-5K-A# show fcalias | inc Tray fcalias name Tray_Gambit_ESX vsan 128 FC Alias Verification Side B: AGR012-5K-B# show fcalias | inc Tray fcalias name Tray_Gambit_ESX_55-03 vsan 228

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 5k FC Aliases and Zoning Configuration and Verification Verify your Zoning configurations. Zoning Verification Side A: AGR012-5K-A(config)# show zone vsan 128 zone name z_Tray_Gambit_ESX_55_03_VNX3949_SPA0 vsan 128 pwwn 20:00:00:15:b5:0a:00:03 pwwn 50:06:01:60:36:e0:0f:26 zone name z_Tray_Gambit_ESX_55_03_VNX3949_SPB1 vsan 128 pwwn 20:00:00:15:b5:0a:00:03 pwwn 50:06:01:69:36:e0:0f:26 Zoning Verification Side B: AGR012-5K-B(config)# show zone vsan 228 zone name z_Tray_Gambit_ESX_55_03_VNX3949_SPA1 vsan 228 pwwn 20:00:00:15:b5:0b:00:03 pwwn 50:06:01:61:36:e0:0f:26 zone name z_Tray_Gambit_ESX_55_03_VNX3949_SPB0 vsan 228 pwwn 20:00:00:15:b5:0b:00:03 pwwn 50:06:01:68:36:e0:0f:26

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 5k FC Aliases and Zoning Configuration and Verification Add the zone you created to the existing zoneset VNXLAB DoNotDelete_FabX. Adding my zone side A: AGR012-5K-A(config)# zoneset name VNXLAB_DoNotDelete_FabA vsan 128 AGR012-5K-A(config-zoneset)# member z_Tray_Gambit_ESX_55_03_VNX3949_SPA0 AGR012-5K-A(config-zoneset)# member z_Tray_Gambit_ESX_55_03_VNX3949_SPB1 Adding my zone side B: AGR012-5K-B(config)# zoneset name VNXLAB_DoNotDelete_FabB vsan 228 AGR012-5K-B(config-zoneset)# member z_Tray_Gambit_ESX_55_03_VNX3949_SPA1 AGR012-5K-B(config-zoneset)# member z_Tray_Gambit_ESX_55_03_VNX3949_SPB0

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 5k FC Aliases and Zoning Configuration and Verification Activate the zoneset: this will make your zones part of the active set. AGR012-5K-A(config-zoneset)# zoneset activate name VNXLAB_DoNotDelete_FabA vsan 128 Zoneset activation initiated. check zone status AGR012-5K-A(config)# show zoneset active zoneset name VNXLAB_DoNotDelete_FabA vsan 128 zone name z_Tray_Gambit_ESX_55_03_VNX3949_SPA0 vsan 128 pwwn 20:00:00:15:b5:0a:00:03 * fcid 0x1c00ef [pwwn 50:06:01:60:36:e0:0f:26] zone name z_Tray_Gambit_ESX_55_03_VNX3949_SPB1 vsan 128 pwwn 20:00:00:15:b5:0a:00:03 * fcid 0x1c01ef [pwwn 50:06:01:69:36:e0:0f:26] AGR012-5K-B(config-zoneset)# zoneset activate name VNXLAB_DoNotDelete_FabB vsan 228 Zoneset activation initiated. check zone status AGR012-5K-B(config)# show zoneset active zoneset name VNXLAB_DoNotDelete_FabB vsan 228 zone name z_Tray_Gambit_ESX_55_03_VNX3949_SPA1 vsan 228 pwwn 20:00:00:15:b5:0b:00:03 * fcid 0xb200ef [pwwn 50:06:01:61:36:e0:0f:26] zone name z_Tray_Gambit_ESX_55_03_VNX3949_SPB0 vsan 228 pwwn 20:00:00:15:b5:0b:00:03 * fcid 0xb200ef [pwwn 50:06:01:61:36:e0:0f:26]

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 Verification via FLOGI and Lunlist With ESXi already installed, you should see FLOGI on the 5ks FLOGI Side A: AGR012-5K-A# show flogi database | inc 128 fc1/ x1c01ef 50:06:01:69:36:e0:0f:26 50:06:01:60:b6:e0:0f:26 fc1/ x1c :00:00:15:b5:0a:00:03 20:00:00:15:b5:00:00:03 fc1/ x1c00ef 50:06:01:60:36:e0:0f:26 50:06:01:60:b6:e0:0f:26 The FLOGI output matches previous zoning config on side A pwwn 20:00:00:15:b5:0a:00:03 – Initiator UCS VHBA pwwn 50:06:01:60:36:e0:0f:26 - Target EMC pwwn 50:06:01:69:36:e0:0f:26 – Target EMC FLOGI Side B: AGR012-5K-B# show flogi database | inc 228 fc1/ xb200ef 50:06:01:61:36:e0:0f:26 50:06:01:60:b6:e0:0f:26 fc1/ xb :00:00:15:b5:0b:00:03 20:00:00:15:b5:00:00:03 fc1/ xb201ef 50:06:01:68:36:e0:0f:26 50:06:01:60:b6:e0:0f:26 The FLOGI output matches previous zoning config on side B pwwn 20:00:00:15:b5:0b:00:03 – Initiator UCS VHBA pwwn 50:06:01:61:36:e0:0f:26 – Target EMC pwwn 50:06:01:68:36:e0:0f:26 – Target EMC

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 Verification via FLOGI and Lunlist If you restart ESXi, during boot, you should see lunlist info on the 5ks ProfX-A# connect adapter 2/3/1 adapter 2/3/1 # connect No entry for terminal type "dumb"; using dumb terminal settings. adapter 2/3/1 (top):1# attach-fls No entry for terminal type "dumb"; using dumb terminal settings. adapter 2/3/1 (fls):1# vnic vnic ecpu type state lif fc active fc active 5 adapter 2/3/1 (fls):2# lif 3 lifid : 3 state : active wwpn : 20:00:00:15:b5:0a:00:03 lif_mac : 00:15:b5:0a:00:03 port : 0 flogi state : flogi est  FLOGI established! adapter 2/3/1 (fls):4# lif 5 lifid : 5 state : active wwpn : 20:00:00:15:b5:0b:00:03 lif_mac : 00:15:b5:0b:00:03 port : 1 flogi state : flogi est  FLOGI established!

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 Verification via FLOGI and Lunlist If you restart ESXi, during boot, you should see lunlist info on the 5ks adapter 2/3/1 (fls):5# lunlist vnic : 14 lifid: 3 - FLOGI State : flogi est (fc_id 0x1c0000) - PLOGI Sessions - WWNN 50:06:01:69:36:e0:0f:26 WWPN 50:06:01:69:36:e0:0f:26 fc_id 0x1c01ef  Boot policy configured targets - LUN's configured (SCSI Type, Version, Vendor, Serial No.) LUN ID : 0x (0x0, 0x4, DGC, APM )  Boot lun access granted - REPORT LUNs Query Response LUN ID : 0x  Boot lun reported LUN ID : 0x  dataTest lun reported - WWNN 50:06:01:60:36:e0:0f:26 WWPN 50:06:01:60:36:e0:0f:26 fc_id 0x1c00ef - LUN's configured (SCSI Type, Version, Vendor, Serial No.) LUN ID : 0x (0x0, 0x4, DGC, APM )  Boot lun access granted - REPORT LUNs Query Response LUN ID : 0x LUN ID : 0x Nameserver Query Response - WWPN : 50:06:01:60:36:e0:0f:26  Nameserver response matches boot policy config - WWPN : 50:06:01:69:36:e0:0f:26

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 Verification via FLOGI and Lunlist If you restart ESXi, during boot, you should see lunlist info on the 5ks adapter 2/3/1 (fls):5# lunlist (continued) vnic : 16 lifid: 5 - FLOGI State : flogi est (fc_id 0xb20001) - PLOGI Sessions - WWNN 50:06:01:68:36:e0:0f:26 WWPN 50:06:01:68:36:e0:0f:26 fc_id 0xb201ef  Boot policy configured targets - LUN's configured (SCSI Type, Version, Vendor, Serial No.) LUN ID : 0x (0x0, 0x4, DGC, APM )  Boot lun access granted - REPORT LUNs Query Response LUN ID : 0x  Boot lun reported LUN ID : 0x  dataTest lun reported - WWNN 50:06:01:61:36:e0:0f:26 WWPN 50:06:01:61:36:e0:0f:26 fc_id 0xb200ef - LUN's configured (SCSI Type, Version, Vendor, Serial No.) LUN ID : 0x (0x0, 0x4, DGC, APM )  Boot lun access granted - REPORT LUNs Query Response LUN ID : 0x LUN ID : 0x Nameserver Query Response - WWPN : 50:06:01:61:36:e0:0f:26  Nameserver response matches boot policy config - WWPN : 50:06:01:68:36:e0:0f:26

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25 Verification via FLOGI and Lunlist If you restart ESXi, during boot, you can get lunmap off the 5ks adapter 2/3/1 (fls):6# lunmap lunmapid: 0 port_cnt: 1 lif_id: 3 PORTNAME NODENAME LUN PLOGI 50:06:01:60:36:e0:0f:26 00:00:00:00:00:00:00: Y lunmapid: 1 port_cnt: 1 lif_id: 3 PORTNAME NODENAME LUN PLOGI 50:06:01:69:36:e0:0f:26 00:00:00:00:00:00:00: Y lunmapid: 0 port_cnt: 1 lif_id: 5 PORTNAME NODENAME LUN PLOGI 50:06:01:61:36:e0:0f:26 00:00:00:00:00:00:00: Y lunmapid: 1 port_cnt: 1 lif_id: 5 PORTNAME NODENAME LUN PLOGI 50:06:01:68:36:e0:0f:26 00:00:00:00:00:00:00: Y

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26 EMC VNX Side LUN Masking The EMC VNX will already see your PWWN initiators so all we need to do is add the necessary LUN masking. The pwwns show up in the EMC management software. Here we have registered one already. (B side not shown)

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27 EMC VNX Side LUN Masking The EMC VNX will already see your PWWN initiators so all we need to do is add the necessary LUN masking. Register A side Initiator

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28 EMC VNX Side LUN Masking The EMC VNX will already see your PWWN initiators so all we need to do is add the necessary LUN masking. Register B side Initiator

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29 EMC VNX Side LUN Masking The EMC VNX will already see your PWWN initiators so all we need to do is add the necessary LUN masking. All initiators are now registered!

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30 EMC VNX Side LUN Masking The EMC VNX will already see your PWWN initiators so all we need to do is add the necessary LUN masking. Add a new storage group.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31 EMC VNX Side LUN Masking The EMC VNX will already see your PWWN initiators so all we need to do is add the necessary LUN masking. Add a new storage group. (cont’d)

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32 EMC VNX Side LUN Masking The EMC VNX will already see your PWWN initiators so all we need to do is add the necessary LUN masking. Add existing LUNs to new sg_Gambit-ESX storage group

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33 EMC VNX Side LUN Masking The EMC VNX will already see your PWWN initiators so all we need to do is add the necessary LUN masking. Storage Group Add Lun’s (cont’d)

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34 EMC VNX Side LUN Masking The EMC VNX will already see your PWWN initiators so all we need to do is add the necessary LUN masking. Storage Group Add Lun’s (cont’d)

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35 EMC VNX Side LUN Masking The EMC VNX will already see your PWWN initiators so all we need to do is add the necessary LUN masking. New storage group created and LUNs associated.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36 Boot From SAN Now that everything is setup you should be able to boot from SAN.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37 Boot From SAN Now that everything is setup you should be able to boot from SAN. Targets Match!

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38