Admin domains, zones, and zone databases, Admin domains, zones, and, Zone databases – Dell POWEREDGE M1000E User Manual

Page 400: Admin, Domains, zones, and zone databases

Advertising
background image

360

Fabric OS Administrator’s Guide

53-1001763-02

SAN management with Admin Domains

15

Admin Domains, zones, and zone databases

If you are working with zones, you should be aware of how they impact Admin Domains. Each AD
has its own zone database, with both defined and effective zone configurations and all related
zone objects (zones, zone aliases, and zone members). Within an Admin Domain, you can
configure zoning only with the devices that are present in that Admin Domain.

With a hierarchical zoning model, the name space for each Admin Domain and the root zones are
separate; configurations are supported with the same zone object name appearing in the root zone
database and different ADs (for example, the same zoneset name in AD1 and AD2).

FC-FC Routing Service

You can create LSAN zones as a physical fabric administrator or as an individual AD
administrator. The LSAN zone can be part of the root zone database or the AD zone
database.
FCR collects the LSAN zones from all ADs. If both edge fabrics have matching LSAN
zones and both devices are online, FCR triggers a device import.
LSAN zone enforcement in the local fabric occurs only if the AD member list contains
both of the devices (local and imported device) specified in the LSAN zone.
To support legacy applications, WWNs are reported based on the AD context using
NAA=5. As a result, you cannot use the NAA=5 field alone in the WWN to detect an FC
router.

FDMI

FDMI operations are allowed only in AD0 and AD255.

FICON

Admin Domains support FICON. However, you must perform additional steps because
FICON management (CUP) requires additional physical control of the ports. You must set
up the switch as a physical member of the FICON AD.
Device Connection Control (DCC) and Switch Connection Control (SCC) policies are
supported only in AD0 and AD255, because ACL configurations are supported only in
AD0 and AD255.

iSCSI

iSCSI operations are supported only in AD0.

Management
applications

Management interfaces that access the fabric without a user’s credentials continue to
get the physical fabric view. Examples include SNMPV1, Web Tools, http access, unzoned
management server query, FAL in-band CT requests from FAL Proxy to FAL Target, and
FC-CT based management applications (such as Tivoli).
Access from applications or hosts using Management Server calls can be controlled
using the Management Server ACL support provided by the msConfigure command. Note
that this is a switch-specific setting and not a fabric-wide setting.

Port-Swapping and PID
formats

Admin Domain port members are specified in domain,index format. Based on the PID
format, a domain,index member indicates a slot and port in the switch. The
domain,index member is effectively a member of that AD.
Port swapping has no effect on AD support as port swapping swaps only the area
numbers of two ports and Admin Domains are specified using domain,index members.
For detailed information about configuring the PID format, see

Chapter 3, “Performing

Advanced Configuration Tasks”

.

RSCN

Admin Domains do not introduce any RSCN changes to devices or hosts.

Virtual Fabrics

Virtual Fabrics and Admin Domains are mutually exclusive and are not supported at the
same time on a switch. To use Admin Domains, you must first disable Virtual Fabrics; to
use Virtual Fabrics, you must first delete all Admin Domains.
If you connect a switch with Admin Domains to a Virtual Fabric-enabled switch, the link is
segmented with the reason “VF AD conflict.”

TABLE 75

Admin Domain interaction with Fabric OS features (Continued)

Fabric OS feature

Admin Domain interaction

Advertising