HP StorageWorks 2/16V HP StorageWorks Fabric OS 5.X Procedures User Guide (AA- - Page 169

Initializing trunking on ports, Monitoring traffic, Disabling and reenabling the switch

Page 169 highlights

• Consider how the addition of a new path affects existing traffic patterns: • A trunking group has the same link cost as the master ISL of the group, regardless of the number of ISLs in the group. This allows slave ISLs to be added or removed without causing data to be rerouted, because the link cost remains constant. • The addition of a path that is shorter than existing paths causes traffic to be rerouted through that path. • The addition of a path that is longer than existing paths might not be useful because the traffic chooses the shorter paths first. • Plan for future bandwidth addition to accommodate increased traffic. For trunking groups over which traffic is likely to increase as business requirements grow, consider leaving one or two ports in the group available for future non-destructive addition of bandwidth. • Consider creating redundant trunking groups where additional ports are available or paths are particularly critical. This helps to protect against oversubscription of trunking groups, multiple ISL failures in the same group, and the rare occurrence of an ASIC failure. • To provide the highest level of reliability, deploy trunking groups in redundant fabrics to further ensure ISL failures do not disrupt business operations. Initializing trunking on ports After you unlock the ISL Trunking license, you must reinitialize the ports being used for ISLs so that they recognize that trunking is enabled. This procedure needs to be performed only once. To reinitialize the ports, you can either disable and then reenable the switch, or disable and then reenable the affected ports. Disabling and reenabling the switch 1. Connect to the switch and log in as admin. 2. Issue the switchDisable command. 3. Issue the switchEnable command. Disabling and reenabling ports 1. Connect to the switch and log in as admin. 2. Issue the portDisable command. The format is: portDisable [slot/]port where slot is the slot number (Core Switch 2/64 and SAN Director 2/128 only) and port is the port number of the port you want to disable. 3. Issue the portEnable command. The format is: portEnable [slot/]port where slot is the slot number (Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director only) and port is the port number of the port you want to enable. Monitoring traffic To implement ISL trunking effectively, you must monitor fabric traffic to identify congested paths or to identify frequently dropped links. While monitoring changes in traffic patterns, you can adjust the fabric design accordingly, such as by adding, removing, or reconfiguring ISLs and trunking groups in problem areas. There are three methods of monitoring fabric traffic: • Advanced Performance Monitoring monitors traffic flow and allows you to view the impact of different fabric configurations on performance. See "Administering advanced performance monitoring" on page 199. Fabric OS 5.x administrator guide 169

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248

Fabric OS 5.x administrator guide
169
Consider how the addition of a new path affects existing traffic patterns:
A trunking group has the same link cost as the master ISL of the group, regardless of the number of
ISLs in the group. This allows slave ISLs to be added or removed without causing data to be
rerouted, because the link cost remains constant.
The addition of a path that is shorter than existing paths causes traffic to be rerouted through that
path.
The addition of a path that is longer than existing paths might not be useful because the traffic
chooses the shorter paths first.
Plan for future bandwidth addition to accommodate increased traffic.
For trunking groups over which traffic is likely to increase as business requirements grow, consider
leaving one or two ports in the group available for future non-destructive addition of bandwidth.
Consider creating redundant trunking groups where additional ports are available or paths are
particularly critical.
This helps to protect against oversubscription of trunking groups, multiple ISL failures in the same
group, and the rare occurrence of an ASIC failure.
To provide the highest level of reliability, deploy trunking groups in redundant fabrics to further ensure
ISL failures do not disrupt business operations.
Initializing trunking on ports
After you unlock the ISL Trunking license, you must reinitialize the ports being used for ISLs so that they
recognize that trunking is enabled. This procedure needs to be performed only once.
To reinitialize the ports, you can either disable and then reenable the switch, or disable and then
reenable the affected ports.
Disabling and reenabling the switch
1.
Connect to the switch and log in as admin.
2.
Issue the
switchDisable
command.
3.
Issue the
switchEnable
command.
Disabling and reenabling ports
1.
Connect to the switch and log in as admin.
2.
Issue the
portDisable
command.
The format is:
portDisable [
slot
/]
port
where
slot
is the slot number (Core Switch 2/64 and SAN Director 2/128 only) and
port
is the
port number of the port you want to disable.
3.
Issue the
portEnable
command.
The format is:
portEnable [
slot
/]
port
where
slot
is the slot number (Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director
only) and
port
is the port number of the port you want to enable.
Monitoring traffic
To implement ISL trunking effectively, you must monitor fabric traffic to identify congested paths or to
identify frequently dropped links. While monitoring changes in traffic patterns, you can adjust the fabric
design accordingly, such as by adding, removing, or reconfiguring ISLs and trunking groups in
problem areas.
There are three methods of monitoring fabric traffic:
Advanced Performance Monitoring monitors traffic flow and allows you to view the impact of different
fabric configurations on performance. See ”
Administering advanced performance monitoring
” on
page 199.