Professional Documents
Culture Documents
Lab guide
HK758S E.01 Use of this material to deliver training without prior written permission from HP is prohibited.
© Copyright 2013 Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice. The only warranties for HP
products and services are set forth in the express warranty statements accompanying such products and
services. Nothing herein should be construed as constituting an additional warranty. HP shall not be
liable for technical or editorial errors or omissions contained herein.
This is an HP copyrighted work that may not be reproduced without the written permission of HP. You
may not use these materials to deliver training to any person outside of your organization without the
written permission of HP.
Microsoft®, Windows®, Windows NT® are U.S. registered trademarks of Microsoft Corporation.
UNIX® is a registered trademark of The Open Group.
All other product names mentioned herein may be trademarks of their respective companies.
Export Compliance Agreement
Export Requirements. You may not export or re-export products subject to this agreement in violation of
any applicable laws or regulations.
Without limiting the generality of the foregoing, products subject to this agreement may not be
exported, re-exported, otherwise transferred to or within (or to a national or resident of) countries under
U.S. economic embargo and/or sanction including the following countries:
Cuba, Iran, North Korea, Sudan and Syria.
This list is subject to change.
In addition, products subject to this agreement may not be exported, re-exported, or otherwise
transferred to persons or entities listed on the U.S. Department of Commerce Denied Persons List; U.S.
Department of Commerce Entity List (15 CFR 744, Supplement 4); U.S. Treasury Department
Designated/Blocked Nationals exclusion list; or U.S. State Department Debarred Parties List; or to parties
directly or indirectly involved in the development or production of nuclear, chemical, or biological
weapons, missiles, rocket systems, or unmanned air vehicles as specified in the U.S. Export
Administration Regulations (15 CFR 744); or to parties directly or indirectly involved in the financing,
commission or support of terrorist activities.
By accepting this agreement you confirm that you are not located in (or a national or resident of) any
country under U.S. embargo or sanction; not identified on any U.S. Department of Commerce Denied
Persons List, Entity List, US State Department Debarred Parties List or Treasury Department Designated
Nationals exclusion list; not directly or indirectly involved in the development or production of nuclear,
chemical, biological weapons, missiles, rocket systems, or unmanned air vehicles as specified in the U.S.
Export Administration Regulations (15 CFR 744), and not directly or indirectly involved in the financing,
commission or support of terrorist activities.
Printed in US
HP Virtual Connect
Lab guide
September 2013
Contents
Introduction
Virtual Connect is a set of interconnect modules and embedded software for HP
BladeSystem c-Class enclosures that simplifies the setup and administration of server
connections. HP Virtual Connect includes the following components:
• VC Flex-10 Ethernet Module
• VC FlexFabric Ethernet Module
• VC Flex-10/10D Ethernet Module
• Second generation VC 4Gb FC Module
• VC 8Gb 20 Port FC Module
• VC 8Gb 24 Port FC Module
• VC Manager (VCM)
Virtual Connect implements server edge virtualization so that server administrators can
upgrade, replace, or move server blades within their enclosures without changes being
visible to the external LAN and storage area network (SAN) environments.
VCM is embedded on the HP VC Ethernet Modules and is accessed through the out of
band management path provided by the Onboard Administrator to the embedded web
server. The Virtual Connect Manager runs on a VC Ethernet or FlexFabric module.
Therefore, you must have at least one VC Ethernet or FlexFabric module installed if you
want to establish a Virtual Connect domain.
Note
The primary VC module must be in the lowest numbered interconnect bay (ICB) e.g. in
an ICB-3 / ICB-4 pair the primary module will be interconnect bay 3.
The HP VC modules are compatible with the BladeSystem c3000/c7000 enclosures and
all the server blades and networks contained within the enclosure. HP VC also supports
connection to all brands of data center switches.
Note
The BladeSystem c3000enclosure does not support FlexFabric.
A Virtual Connect domain currently includes up to four c7000 enclosures for a total of 64
server blades or a single c3000 enclosure with 8 server blades. (These totals double
when using the 2x220c server blades.) Within the domain, any server blade can access
any LAN connected to a Virtual Connect module, and a server blade can replace (spare)
another server blade within the same domain.
By stacking (cabling) the Ethernet modules within the domain, you can configure every
server blade in the domain to access any external network connection. Fibre Channel
ports do not stack and VC-FC modules within different enclosures must connect directly
to the same set of Fibre Channel SANs. With this configuration, the VC Manager can
migrate (copy) a server blade profile to any server in the VC domain without the need to
change external LAN or SAN configurations.
Note
VC 3.51 (SPP 2012.02) is the current minimum supported firmware version in VC
domains. VC 3.15 is a critical minimum as it forces a consistent firmware version on
all VC components in a multi-enclosure stack.
! Important
For a Virtual Connect domain to operate properly, all HP VC Ethernet Modules within
the Virtual Connect domain must be interconnected with stacking links. HP
recommends that redundancy be maintained in stacking links to ensure continued
connectivity of servers to the external networks.
Requirements
Hardware
To complete these exercises in your datacenter, you will need:
Access to the HP Virtual Connect Simulator
Or
An HP c-Class enclosure
• c-Class servers with FlexNIC capability (LAN on Motherboard or Mezzanine)
• One or more HP VC-Ethernet Flex-10 or FlexFabric modules connected to your
datacenter Ethernet network
! Important
In the datacenter environment, the Virtual Connect Fibre Channel modules
must connect to N_Port Identifier Virtualization (NPIV) enabled switches.
Current VC Manager firmware installed. Please review the current HP Service Pack
for ProLiant release notes for the tested firmware versions.
hp.com/go/spp
Browsers
The VC Manager Web interface requires an Extensible Style Language Transformation
(XSLT) enabled browser with support for JavaScript. The following browsers are
supported:
• Microsoft Internet Explorer 8.x and 9.x
• Mozilla Firefox
• Chrome does not provide the required functionality and is not supported
2. Enter the username and password supplied by your instructor and click the Logon
button. The HP Virtual Lab (HPVL) Home Page displays.
4. The home page rebuilds. Click on the Options link displayed on the upper right
5. The screen resolutions option page displays. By default the HPVL application will use
100% of your screen. The page enables you to set the screen resolution either
directly or by selecting a specific percentage of the desktop that the application will
use.
6. Your selection will vary depending on your desktop’s native resolution and other
applications running. The screen shot displays 1024 x 768 and a 24 bit color depth.
This is the remote system default resolution. Click Update to continue.
9. Your instructor will assign a lab group for your team. Click the assigned ICDCE Lab
group link.
10. Normally (if you have not previously accessed the HPVL), the Citrix environment will
prompt you to install two plug-ins. Depending on your browser, these plug-ins may
require that you close and restart your browser. Eventually the HPVL Lab Group
Access page displays a list of lab groups.
11. The HPVL lab group information page displays. (This is an example and may vary
depending on the equipment assigned.)
Important
! At the end of each day or when your lab work is complete please use the VCM
functionality to save your configuration. Alternatively, close the Terminal Servers
session and leave the VC Manager interface running.
12. Check your equipment assignment and click your Remote Desktop link. This will
access a Windows Server desktop. Log on using Administrator as the user name and
password as the password.
Note
The instructor will have assigned a server for your use.
4. Browse to the C:\Classfiles\VC simulator 4.0.1 folder and select the VC-simulator-
4.01.vmx file. Click Open.
Note
The file location will vary depending on the equipment assignment.
6. The dialog box below displays; choose I copied it and click OK.
In some instances (VMware Player versions), you may have to acknowledge the keyboard
timeout value to continue.
When the simulator completes booting, the following screen will display.
7. Note and record the IP address in the VMware Player window.
9. Changing from Bridged to NAT or Host-only and restarting the simulator usually
resolves connectivity issues.
10. Use an Internet browser to open the IP address (192.168.x.y) displayed in the
VMware Player.
Note
If a security alert displays, click Continue to this website.
2. After you log in, the Virtual Connect Manager Domain Setup Wizard screen displays.
Click Next to continue.
Note
If you cancel the wizard before the enclosure is imported, you are returned to the
login screen.
3. The Local Enclosure page displays. Enter the Onboard Administrator administrative
credentials from the toe-tag sticker (in the lab, this is Administrator and
Administrator). Click Next to continue.
Note
After you enter the credentials, the VC Manager automatically detects the local
enclosures and establishes a trust relationship.
4. Using the inventory stored in the Onboard Administrator, the Virtual Connect
Domain Setup Wizard imports all the servers and VC interconnect modules
associated with the target enclosure.
At the Enclosure Import/Recovery page, accept the defaults and click Next to
continue. (This process can take several minutes.)
5. Confirm that you understand that importing the enclosure will disable network
access to all blade servers by clicking Yes.
6. The Import Status screen displays the imported enclosures and the server and
interconnect count. Click Next to continue.
7. The General Settings screen displays. The Domain Setup Wizard automatically
assigns a domain name (based on the enclosure name) that you can change.
The Virtual Connect domain name should be unique within you data center and can
be up to 31 characters without spaces or special characters. You can change this
name when running the setup wizard or at any time from the Domain Settings
(Controls) screen. Name the domain (your name choice doesn’t matter) and click
Next to continue.
The Local User Accounts page displays. The first time this page appears, the only local
user account is the Administrator account, which has Domain, Network, Storage, and
Server privileges-as opposed to only Domain privileges. The Administrator account
cannot be deleted nor have domain privileges removed. You can change the
Administrator password.
• The default Administrator password is identified on the Default Network
Settings label on the lowest odd-numbered interconnect bay populated with a
Virtual Connect Ethernet or HP VC FlexFabric 10Gb/24-port module.
You can set up each account to have a combination of up to four access privileges:
• Domain
• Network
• Server
• Storage
Plus Guest (any user with no privileges assigned)
9. Select Add User and make a User Account named Student. Make the password
password and set the full name to Student.
12. The Local User Accounts page displays the new user.
13. You have successfully completed the general administrative tasks necessary for the
initial Virtual Connect domain setup.
Deselect the Start the Network Setup Wizard
Click Finish.
4. From Domain Settings panel, select Ethernet → Quality of Service (QoS). What are
the default Quality of Service configurations types available in the drop down?
5. Navigate to the Hardware section and list the interconnects installed in the base
enclosure (enc0):
..........................................................................................................................................
..........................................................................................................................................
..........................................................................................................................................
..........................................................................................................................................
..........................................................................................................................................
..........................................................................................................................................
6. From the Hardware section list the servers installed in the base enclosure (enc0):
..........................................................................................................................................
..........................................................................................................................................
..........................................................................................................................................
..........................................................................................................................................
..........................................................................................................................................
..........................................................................................................................................
..........................................................................................................................................
..........................................................................................................................................
..........................................................................................................................................
..........................................................................................................................................
..........................................................................................................................................
..........................................................................................................................................
1. From the VCM home page select Tools → Backup Domain Configuration.
4. Depending on your browser, some form of popup displays. Select Save as and save
the file to the desktop.
Note
Sometimes, the initial attempt to save the config from the simulator does not
present the opportunity to Save as. A second attempt is successful.
5. To save your work, backup your configuration at the end of each exercise.
Objectives
After completing this lab, you should be able to:
Use the HP Virtual Connect wizards to complete the VC Domain set up, which
includes the following tasks:
• Completing the Network Setup Wizard
• Completing the Fibre Channel Setup Wizard
• Completing the Server Profile Wizard
• Connect the profiles to SAN Fabrics
• Reorganize the profile to support NIC Teaming
Note
The customer has selected to map VLAN tags connecting to the VC Uplinks.
Note
VLAN_Alpha and VLAN_Beta are Shared Uplink Sets carrying multiple VLANs.
Note
LOMs (LAN on Motherboard) are named by port then Flex-NIC. Thus LOM1:a is the
first Flex-NIC on Port 1. LOM1:c is the second Flex-NIC on Port 1 but retains an odd
port numbering (5) so that you know that it maps to interconnect bay 1.
2. The Welcome to the Network Setup Wizard page displays. Click Next to continue.
Important
You must have a user account with network privileges to perform these operations.
Important
! Ensure that each Virtual Connect domain uses a unique range of MAC addresses. This
setting cannot be changed after server profiles are defined.
The default HP defined range selected is 1. Therefore, you should always avoid
using HP defined range 1.
Note
HP provides 64 MAC address ranges and recommends using a predefined range.
These predefined ranges are reserved and will never be used by a manufacturer
(including HP) on any hardware.
2. For the exercises, accept the default, and leave the option unchecked.
VLAN Capacity
1. VC 4.01 does not support the older1/10 Gb Ethernet modules, and the Expanded
VLAN Capacity (Up to 1000 VLANs per domain and 162 VLANs per physical server
port) is enabled by default.
Note
• Expanded VLAN capacity is the default condition in VC 3.70 and newer.
Defining networks connects the VC Domain to the datacenter core switches. The
following terms are used in a Virtual Connect environment:
External port — The Ethernet connectors SFP+ modules (1GbE or 10GbE, 10GBASE-
CX4 and RJ-45) on the faceplate of the HP VC Ethernet modules.
Stacking port — An HP VC Ethernet module external port and/or cross-link used to
connect to other VC Ethernet modules within an active Virtual Connect domain. The
VC Ethernet modules automatically identify stacking ports. The port number (port
ID) lights amber.
Uplink port — An external port that is configured within Virtual Connect for use as a
connection to external networking equipment. Uplink ports are defined within
Virtual Connect by the enclosure name, interconnect bay containing the module, and
the port number. The port number (port ID) for uplink ports lights green.
Uplink port set — A set of uplinks that are trunked together to provide improved
throughput and availability for a single Virtual Connect network connection to
external networking equipment.
Shared uplink port — An Ethernet uplink port that carries the traffic for multiple
Virtual Connect networks. Each associated Virtual Connect network is mapped to a
specific VLAN on the external connection and appropriate VLAN tags are removed or
added as Ethernet frames enter or leave the Virtual Connect domain.
Shared uplink port set — A set of Ethernet uplinks that are trunked to provide
improved throughput and availability to one or more VLANs.
The Advanced Network Settings screen displays. The Flex-10 and FlexFabric modules
enable the Network Administrator to establish a Custom value for Preferred Link
Connection Speed and to set a Custom value for Maximum Link Connection Speed for the
network.
Our first network example was Console_01. In an ESX environment the Console network
requires no more than 100Mb.
4. Set preferred connection speed to 100 Mb and set maximum connection speed to
1Gb. Click Apply to continue.
Note
At customer sites, you would set your custom network link speeds to reflect values
used in your datacenter.
Notes
• The LACP Timer is set to Short to facilitate connecting to an external switch,
which may not support other timer settings.
• In your Datacenter retain the default Auto connection mode if using multiple
ports that will be trunked.
Note
It’s easy to make a mistake in the exercises. This it is not critical, but you cannot
go back to a previous screen while using the wizard. So, if you forget to add a port
or use one not specified, you can correct that at the end of the lab.
6. The Define Networks page displays. Do not configure Network Access Groups at this
time. Click the Create Network button to continue.
7. The All Network Connections screen displays. Click Create more networks button to
add more network connection.
With an Active/Active configuration (Side A and Side B), remember that ESX_01 could
send a frame on Side A to a MAC on ESX_XX on side B. When that happens (and again only
when you are in an Active/Active config in VC), the frame must leave the chassis and go
through a higher level network switch and then come back down through side B for
delivery.
If you are relying on East—West (intra-domain) traffic or you don’t have a reliable
upstream switch, you cannot use Side A/B config. This is why, the HP VMware best
practice design has vMotion as a single network and not vMotion_A and vMotion_B.
Otherwise vMotion traffic may have to leave the chassis, which defeats the advantage of
having East—West communication inside the domain.
9. Once complete, return to Page L2-9 and make three more networks with the same
speed assignments as the previous set. Assign them to FlexFabric ports in
Interconnect bay 2:
• Console_02
• Backup_02
• Production_02
When complete you will have seven networks total.
2. The World Wide Name (WWN) Settings page displays; select Yes, I would like to use
Virtual Connect assigned WWNs. Click Next to continue.
The WWN range used by the Virtual Connect domain must be unique within the
environment. HP provides a set of pre-defined ranges that are reserved for use by
Virtual Connect and will not conflict with VCEM assigned addresses or the factory
default WWNs.
Important
To avoid storage networking issues and potential data loss associated with
duplicate WWNs on a Fibre Channel SAN fabric be sure that each VC assigned range is
used only once within the environment.
When you configure Virtual Connect to assign WWNs, VC securely manages the WWN
and can assign a port WWN and a node WWN to a Fibre Channel HBA port. The port
WWN is used for configuring fabric zoning; it is this WWN that displays throughout
the Virtual Connect and Onboard Administrator user interface.
Note
The assigned node WWN is the same as the port WWN incremented by 1.
3. The Assigned WWNs screen displays. HP provides a set of predefined ranges that are
reserved for use by Virtual Connect and will not conflict with server factory-default
WWNs.
• Select HP Pre-defined.
• Select the same range number that you did for MAC addresses.
Note
The HP defined range for MAC and WWN does not have to be identical, though from
an administrative perspective it is easier to have them the same.
5. The Define Fabrics page displays. Accept the Define Fabric default and click Next to
continue.
Note
You can connect each HP Virtual Connect Fibre Channel module to one or more
external Fibre Channel SAN fabrics.
b. Set uplink ports 1 and 2 from the HP VC FlexFabric module in interconnect bay
five.
Note
The number of enabled uplinks and the number of servers in the enclosure
determines the effective oversubscription for that Fibre Channel connection. The
links can be changed or added later after you complete the wizard.
c. Accept the default uplink port speed for each Virtual Connect Fibre Channel
module to use (the default is Auto).
d. Click Apply to continue.
7. The Define SAN Fabrics page displays. Accept the default setting Yes, I would like to
define additional fabrics and click Next.
8. The Define Fabric page displays, click Next to proceed. The Define SAN Fabric page
displays.
9. Configure a second Fabric (SAN_B) and connect to uplink ports 1 and 2 on the VC
FlexFabric module in bay six.
12. The Finish Fibre Channel Setup Wizard page displays. Accept the default Start the
Server Profile Setup Wizard. Click Finish to continue.
When a server profile is assigned to a device bay, VCM securely connects to the server
blade in the bay and configures the NIC ports with the appropriate MAC addresses and
PXE settings and Fibre Channel HBA ports with the appropriate WWNs and SAN boot
settings. In addition, the VC Manager automatically connects the server blade Ethernet
and Fibre Channel ports to the specified networks and SAN fabrics. This server profile can
then be copied or re-assigned to another server blade as needed without interrupting
server connectivity to the network and SAN.
Server blades that have been assigned a profile and remain in the same device bay do
not require further VC Manager configuration during server or enclosure power cycle.
They boot and access the network and fabric as soon as the server and interconnect
modules are ready. If a server blade is inserted into a device bay that has already been
assigned a server profile, VC Manager automatically updates the configuration of that
server blade before it is allowed to power on and connect to the network.
Before creating and deploying server profiles, consider the following important points:
• The server blade firmware (including HBA and Ethernet mezzanines),iLO
firmware, OA firmware and VCM firmware must be aligned at a release set that
supports Virtual Connect profile assignment.
• Before creating the first server profile, select whether to use VC administered
MAC addresses and WWNs or the local server blade factory-default MAC
addresses and WWNs.
• After an enclosure is imported into a Virtual Connect domain, server blades
remain isolated from the networks and SAN fabrics until a server profile is
created and assigned.
• Server blades must be powered off to receive or relinquish a server profile
assignment when using Virtual Connect-administered MAC addresses or WWNs,
or when changing Fibre Channel boot parameters.
Note
You can assign a profile to a powered on blade when using factory default addresses.
• Fibre Channel SAN connections display in server profile screens only when
there is a Virtual Connect Fibre Channel module in the enclosure managed by
Virtual Connect. Fibre Channel SAN connections are added in pairs and cannot
be deleted. If a Virtual Connect Fibre Channel module is added to a Virtual
Connect domain that has existing profiles, an option to add Fibre Channel
connections displays in the existing profiles when you edit them.
• Some server profile SAN boot settings (such as the controller boot order) are
applied by Virtual Connect only after the server blade has been booted with the
final mezzanine card configuration.
• If PXE, controller boot order, or SAN boot settings are made outside of Virtual
Connect (using the ROM-Based Setup Utility [RBSU] or other configuration
tool), Virtual Connect will restore the settings defined by the server profile
after the server blade completes the next boot cycle.
2. Leave default Use the static, factory default Serial Numbers. Click Next.
In the next steps, you will build a hypervisor profile using the networks that you
previously made.
3. Right click on a Network Name→Add Connection and add six additional server ports
or use the + Add function to add connections.
5. When you are done, your network assignments should look like this. Click Next to
continue.
6. Assign this profile to device bays2 and 10and click Next to continue.
7. The Name Server Profiles screen displays, enter ESX_ as the Base name.
• VC automatically names the profiles to correspond with the device bay.
• Click Create Profiles to continue.
8. The Server Profile Creation screen displays, click Finish to save the configuration.
This would be the ideal time to correct any configuration errors that happened while
navigating the wizards.
5. Question: Why was there a “not mapped” error on the server in bay ten?
..........................................................................................................................................
..........................................................................................................................................
Exercise 4 — Optional
Reorganizing the profile to support NIC teaming across chipsets for
redundancy or on a c3000 enclosure because of its port mapping
configuration.
From the HP ProLiant Network Adapter Teaming White Paper:
ftp://ftp.compaq.com/pub/products/servers/networking/proliant-teaming-
whitepaper-march%2008.pdf
When adapter ports are members of a team, some advanced features are no longer
configurable on the port’s Advanced Settings tab. These advanced features are either
promoted to the team’s Advanced Settings tab because the features are compatible and
supported by all team members, or not promoted because one or more ports do not
support the features. There are also special cases where a feature is supported by all
team members but the implementation is not compatible between the team members
because they use different miniport drivers. In this case, it is not promoted to the team’s
Advanced Settings tab.
The configuration of the individual NICs in a team is important because the team needs
to have each NIC identically configured to ensure that it is accepted into the team. This
can be an issue if the LOM chipset and the mezzanine chipset are not identical (e.g.
Broadcom LOM and an Emulex Mezzanine.
1. From the VCM left panel expand the Hardware → Enclosure1 → Device Bays.
Note
To achieve network redundancy in a c3000 enclosure, you must install a mezzanine
card supporting interconnect bay two. NIC teaming will be from a LOM NIC connecting
to interconnect bay one to a Mezzanine NIC connecting to interconnect bay two.
2. Select the server with the ESX_02 profile in device bay two and scroll down to the
Server Ethernet Adapter Information section.
• Note that by default VCM orders the NICs to make building redundant (left
side/right side) network connections simple.
1. Navigate to the Connections → Server Profiles and edit the ESX_02 profile.
4. Note that you are now able to view all the available Flex-NICs. VCM has assigned each
of the NICs to a unique device.
5. Reassign the original networks and mix the LOM NICs with the Mezzanine NICs.
• Note that it takes your attention to achieve the correct Port One (left) – Port
Two (right) balance
Note
This is an example of what you only build in a c3000 enclosure, or if you are teaming
across chipsets to achieve a higher level of redundancy. Often if a chip or Mezzanine
card fails it takes out both ports.
1. Verify that all external ports connected to the data center are linked and are
operating at the appropriate speed.
2. Verify that all VC Modules are properly powered on and functioning. The module
status LED for all modules connected and configured in Virtual Connect for data
center use should be green. If the LED is not green, use the Onboard Administrator
user interface to diagnose the problem and verify that the module is properly
powered-on.
3. Verify that the data center switches are powered on.
4. Verify that each external port is linked and operating at the appropriate speed using
link/speed activity LEDs for that port. If ports are not linked, verify that the cables
being used are not defective, and verify that both ends of the link are configured for
the same speed/duplex settings.
• Both sides of the configuration must match for the link to be established.
• For auto-negotiation, both ports must be configured to run auto-negotiation.
To use a forced speed, (for example 1000Mb full duplex), both ports must be
configured to be the same forced speed.
• A mismatched configuration can result in ports not linking up or not functioning
properly.
Note
VC Ethernet Modules do not support half-duplex operations.
5. Verify that the port status indicator (port number) of each configured external port
is illuminated green (assuming no port IDs are illuminated). This status indicates
that the port is actively configured as part of an external connection.
Fast MAC Cache Failover forces Virtual Connect to transmit Ethernet packets on newly
active links, which enables the external Ethernet switches to identify the new connection
(and update their MAC caches appropriately). This transmission sequence repeats a few
times at the MAC refresh interval (five seconds is the recommended interval) and
completes in about one minute.
! Important
Be sure to set switches to enable MAC addresses to move from one port to another
without waiting for an expiration period or causing a lock out.
Notes
When the Force server connections to use same VLAN mappings as shared uplink
sets checkbox is not selected, server network connections can be selected from any
VC Ethernet network and the external VLAN ID mappings can be manually edited.
The 'Force server connections to use the same VLAN mappings as shared uplink sets'
checkbox can be selected if no server profile connections are assigned to multiple
networks that are not linked to a shared uplink set.
4. From Domain Settings, select the Ethernet → Port Monitoring tab to setup port
monitoring.
5. To enable Port Monitoring, first select an external uplink. The example uses uplink
port x10 on Bay 4, but any available uplink will work.
6. Select Enable from the drop down in the Port Monitoring State area, and click Apply
to begin Port Monitoring.
7. Note there is a Port Monitoring icon at the top of VCM interface alerting you that Port
Monitoring is enabled.
8. Click the Select Port, then select the server port (or server ports) that you want to
monitor.
• For example, select Filter by Profile → ESX_02
• Click OK to continue.
9. Select Disable from the drop down in the Port Monitoring State area, and click Apply
to stop Port Monitoring.
10. Select the MAC Address tab to review the assigned MAC address range
13. Select Add and select two uplink ports from a VC Ethernet module.
14. Click Statistics and a dropdown displays. Select one of the options, and click Chart.
Note
Although you can enable the display of the historical throughput data, in the VC
Simulator it is statically preconfigured.
Note
The Simulator data is static (prepopulated).
1. From the Server Profiles screen, click on the print icon in the upper right.
Note that you can copy and paste from this screen.
The Traffic Class configuration page displays. A traffic class enables you to categorize
packets requiring similar traffic management.
By default, the configuration defines two system classes: Best Effort and FCoE Lossless.
You must configure the remaining six classes manually. Real Time is enabled
automatically
• Traffic from the Real Time class has the highest priority and is scheduled in
strict priority order. The Share and Max Share for the Real Time class must be
equal, and should be less than or equal to 50.
4. Review the available tabs, settings, and help icons for additional information.
By default Virtual Connect 3.30 and newer map VLAN tags. The VC Ethernet modules
accept incoming frames with valid server VLAN tags and translate the server-assigned
VLANs into corresponding internal network VLANs, thus placing the server packet on the
correct network. When these frames reach the uplinks, network VLANs are once again
translated into external data center VLANs. Similarly, VLANs are translated back to
server-assigned VLANs (or stripped and untagged) before sending frames out to servers.
This function enables the possibility of configurations where server VLANs might not
match external VLANs used on uplinks. To avoid this scenario, you can select the Force
server connections to use the same VLAN mappings as shared uplink sets option.
Note
Server port connections to networks are defined on the Define Server Profile screen.
Beginning with VC 3.30, you can have both mapped and tunneled networks within the
same domain. VLAN tunneling support is controlled on a per network basis. You can
enable or disable VLAN tunneling when adding or modifying a network with a dedicated
uplink. Networks that are associated with a shared uplink set cannot be tunneled (since
they are already being mapped).
When the Enable VLAN Tunneling checkbox is selected, packets on that network with
VLAN tags are passed through the VC domain without modification. When the 'Enable
VLAN Tunneling' checkbox is not selected, the uplink ports in the network do not pass
any packets that have VLAN tags.
Define a Shared Uplink Set with Mapped VLAN Tagging, create two
tunnels, and set up a profile using both tunnels in an Active/Active
design.
By IEEE convention, an LACP trunk is point-to-point; it can only connect from one VC
module to one external logical switch. If the data network and the management network
are on two different core switches, you have to make two separate LACP trunks. If they
are on the same core switch with VLANs, you can either do physical separation by making
two different networks in VCM with their own uplinks, or put the two networks into a
single Shared Uplink Set with all the uplinks and configure VLAN tagging.
In a simplistic way of thinking of it, if all your traffic is going through the same upstream
switch:
• Put the VLANs in the same SUS if you want to get the maximum total I/O for the
minimum uplinks
• If it is critical that traffic on one VLAN does not cause delays on the second
VLAN and there is a reasonable risk of this occurring, put the VLANs into a
separate SUS.
1. From the Network section of the VCM homepage select Define a Shared Uplink Set.
• A shared uplink set is a way of identifying VC Ethernet Module uplinks that will
carry multiple networks over the same cable. In this case, each Ethernet frame
carries a VLAN tag (IEEE 802.1Q) to identify the specific network to which it
belongs. On shared uplinks, the VLAN tags are added when frames leave the
Virtual Connect enabled enclosure and are removed when frames enter the
enclosure. The external Ethernet switch and the VC Manager must be
configured to use the same VLAN tag identifier (a number between 1 and 4094)
for each network on the shared uplinks.
• Virtual Connect places no special restrictions on which VLAN identifiers you can
use, so the VLAN IDs already used for the networks in the data center can be
used on these shared uplinks. To configure a shared uplink set for VLAN
tagging, obtain a list of the network names and their VLAN IDs.
• A shared uplink set enables multiple ports to be included to support port
aggregation and link failover with a consistent set of VLAN tags.
• Because VLAN tags are added or removed when Ethernet frames leave or enter
the VC Ethernet Module shared uplink, the VLAN tags have no relevance after
the Ethernet frame enters the enclosure.
• Identifying an associated network as the native VLAN causes all untagged
incoming Ethernet frames to be placed onto this network. Only one associated
network can be designated as the native VLAN. All outgoing Ethernet frames
are VLAN tagged.
1. Define the Uplink Set Name as VLAN_Alpha and assign two uplinks. (For port
assignments, review the table at beginning of Lab Two.)
Note
In the next steps you will define the Network name and VLAN identifier of each
network that will use the shared uplinks.
Note
In a production environment, this would be the destination network for untagged
frames.
11. Configure one of the displayed networks as Native. Click Apply to continue.
12. Because this SUS will be part of an Active/Active networking design; check to confirm
that you enabled Smart Link on all the networks in the SUS.
13. Click Add and build a new Shared Uplink Set VLAN_Beta
16. From the Associate Networks (VLAN tagged) section, select Add.
18. Click Apply. Your completed configuration will look like this.
1. From the Network section of the VCM homepage select Define a Network.
2. From the Define Networks screen, name the network Tunnel_01 and select Enable
VLAN Tunneling.
3. Add two available uplinks (X3 and X4 from Bay 3) to connect the vNet to the
datacenter.
Note
In this scenario, both Tunneled networks are available.
7. Assign Tunnel_02 to Ethernet Adapter Connection Port 1 and click Apply &Close to
save the profile.
8. From the left panel, select Hardware → Enclosure → Interconnect Bays and click
on Bay 3 (one of the modules hosting the Tunneled networks). Select the Uplink
Ports tab.
• Note the common LAG ID, which confirms that VCM has aggregated the uplinks
into a 20 Gb virtual port.
Note
You are defining a server profile that uses Mapped connections. Each network from
the server will be mapped to an individual VC vNet.
2. Name the new profile ESX_03 and choose Multiple Networks for Ethernet Port 1.
4. Click OK to continue.
5. Repeat the process to assign the networks from VLAN_Beta to the second port.
6. Assign the Profile to a server (Bay 1 is used in the example) and click Apply & Close.
You have now configured a profile and assigned it to a server to support the Operating
System insertion of VLAN tags into the outgoing packets. Virtual Connect module will not
interfere with these tag assignments. If a network was assigned as Native, any untagged
inbound packets would be directed to that VLAN.
The Private Network selection for the Red_02 VLAN forces all packets on this VLAN to
exit the VC Domain and they must pass through an upstream switch before the Domain
will permit them to reenter.
3. From the Edit Ethernet Network: Tunnel_01 page, select the preferred and
maximum network speeds. Set the speeds (preferred at 4Gb and maximum at 6Gb).
6. From the Port Speed Type column next to Tunnel_01 network, click on the
Preferred setting and select Custom.
7. The Custom Port Speed pop-up displays. Note that you can only modify the
minimum speed setting. The maximum speed has been set by the Network Admin.
Note
The following IP addresses are coded into the simulated enclosures:
Local Enclosure
Remote Enclosure 1 — 192.168.6.1
Remote Enclosure 2 — 192.168.6.2
Remote Enclosure 3 — 192.168.6.3
2. Enter the IP Address of the target Remote Enclosure 1 and Onboard Administrator
credentials (Administrator/ Administrator). Click OK:
4. The enclosure status will change to IMPORTED and the Enclosure Import Status
displays the hardware in the newly imported enclosure.
In a datacenter environment, it is critical to confirm that the stacking links are correctly
positioned.
5. Click the Stacking Links link from Domain Settings panel.
Objectives
After completing this lab, you should be able to:
Access the VCM CLI through an SSH client
• This lab uses PuTTY
Explore the VCM CLI
Capture the Show All
Configuring the Domain (Examples)
Working with Profiles
Configure a Profile
Configure a Domain
! Important
These lab exercises are designed to help you understand how to complete a basic
configuration of the VCM using its command line functionality. It will help to take
notes as you move through the exercises.
Introduction
You can use the VCM Command Line Interface as an alternative method for administering
the VCM. Using the CLI can be useful in the following scenarios:
• Developing tools that utilize VCM functions for data collection and for
executing provisioning and configuration tasks.
• When no browser is available or you prefer to use a command line interface,
you can access management data and perform configuration tasks.
• Running batch commands using script files. These script files can be run
manually or scheduled to run automatically.
Notes
All comment lines must begin with "#".
If the SSH keys are not configured on the client and in the firmware, a password
prompt appears.
The VC Simulator does not support pLink.
The CLI User Guide contains an extensive table comparing the VC 3.7 commands with the
changes incorporated in VC 4.00.
Note
Normally you would configure certificates and trust. The VC Simulator does not
support this functionality.
Login as “vcmcli”
4. After a few seconds, the VCM log on screen displays. At the prompt enter the
credentials (Administrator / Administrator).
Note
Commands are not case sensitive, but the objects you create are — MyNetwork is
not same as Mynetwork.
2. Enter show enclosure ?and press Enter. Detailed syntax information for the
command displays.
3. Enter show enclosure * and press Enter. Detailed enclosure information for the
command displays.
Note
The asterisk is critical to get all VC configuration and status detail. You will not get
WWNs without it.
1. Open PuTTY and select Session, enter the name or IP address of the primary Virtual
Connect Ethernet module.
2. Configure Printable output
• In the PuTTY Configuration dialog select Session → Logging.
• Then select Printable output and enter a filename for the log file.
3. You may have to reconfigure the default PuTTY settings by increasing the scroll back
lines to get a complete show all listing.
Depending on your configuration, between 2,000 and 5,000 lines are adequate,
though your experience may vary.
• Verify that the log file exists. (Unless you customized the log location, the
utility automatically saves a putty.log file in the same directory where PuTTY is
installed.)
Optional Exercise
1. To generate a delimited txt file with the configuration information that you can
import into a spreadsheet, follow the procedures below.
->show all * -output=script2
• Text data with semi-colon delimited fields will output to the SSH session.
• Copy the entire output and save it into a .txt file, and import it into an excel
spreadsheet.
4. Log into the VC Simulator CLI by typing vcmcli and then logging in using the VCM
Administrator/Administrator credentials.
After logging in, use the following exercises to help setup the domain:
! Important
After you issue a CLI command, it can take up to 90 seconds before configuration
changes are stored in persistent memory. Disruptive actions such as powering
cycling an I/O module within this time window can result in lost configuration
changes.
Import an enclosure
Enter Onboard Administrator credentials used during import:
import enclosure username=Administrator password=Administrator
! Important
The Virtual Connect domain name must be unique within the data center, and can be
up to 31 characters without spaces or special characters.
Access Roles
Each account can be set up to have a combination of up to four access privileges:
Domain
• Define local user accounts, set passwords, define roles
• Configure role-based user authentication
• Import enclosures
• Name the VC domain
• Set the domain IP address
• Administer SSL certificates
• Delete the VC domain
• Configure SNMP settings
Networking
• Configure network default settings
• Select the MAC address range to be used by the VC domain
• Create, delete, and edit networks
• Create, delete, and edit shared uplink sets
• Create, delete, and edit network access groups
• Create, delete, and edit IGMP filters and filter sets
• Configure Ethernet SNMP settings
Server
• Create, delete, and edit server Virtual Connect profiles
• Assign and unassign profiles to device bays
• Select and use available networks
• Select serial numbers and UUIDs to be used by server profiles
• Power on and off server blades within the enclosure
Storage
• Select the WWNs to be used by the domain
• Set up the connections to the external FC Fabrics
• Configure FC SNMP settings
To disable the timeout function and enable you to work without being logged-off every
15 minutes, set the session timeout
set session timeout=0
Note
It is possible to create a user with no privileges. This user can only view status and
settings.
! Important
The vcmuser account is an internal (and hidden) Onboard Administrator account
created and used by Virtual Connect Manager to communicate with the Onboard
Administrator. This account can show up in the Onboard Administrator system log.
This account cannot be changed or deleted.
Note
In the simulator you can use any IP address starting with 192.168.6 but that will still
not allow you to disable the local user rights.
MAC addresses
The MAC address range used by the Virtual connect domain must be unique within the
environment. HP provides a set of pre-defined ranges that are for use by Virtual Connect
Manager and will not conflict with server factory default MAC addresses.
! Important
When using the HP-defined MAC address ranges, ensure that each range is used only
once within the environment.
Each server blade Ethernet NIC ships with a factory default MAC address. The MAC
address is a 48-bitnumber that uniquely identifies the Ethernet interface to other devices
on the network. While the hardware ships with default MAC addresses, Virtual Connect
has the ability to assign MAC addresses that will override the factory default MAC
addresses while the server remains in that Virtual Connect enclosure.
When configured to assign MAC addresses, Virtual Connect securely manages the MAC
addresses by accessing the physical NICs through the enclosure Onboard Administrator
and the iLO interfaces on the individual server blades.
Always establish control processes to ensure that a unique MAC address range is used in
each Virtual Connect domain in the environment. Reusing address ranges could result in
server network outages caused by multiple servers having the same MAC addresses.
If using Virtual Connect assigned MAC addresses, the following notes apply:
• Virtual Connect automatically reserves both a primary address and an iSCSI
MAC address for use by multifunction gigabit server adapters, such as the HP
NC373m PCI Express Dual Port Multifunction Gigabit server adapter. Only the
primary MAC address is used by standard (not multifunction) Ethernet devices.
• If a server blade is moved from a Virtual Connect managed enclosure to a non-
Virtual Connect enclosure, the local MAC addresses on that server blade are
automatically returned to the original factory defaults.
• If a server blade is removed from a bay within a Virtual Connect domain and
installed in another bay in the same Virtual Connect domain or in a bay in a
different domain, it is assigned the new set of addresses appropriate for that
server location.
Note
After any server profiles are deployed using a selected MAC address range, that range
cannot be changed until all server profiles are deleted.
! Important
Configuring Virtual Connect to assign server blade MAC addresses requires careful
planning to ensure that the configured range of MAC addresses is used once within
the environment. Duplicate MAC addresses on an Ethernet network can result in a
server network outage.
Configuring an Ethernet-network
The complete add network command syntax is as follows:
add network <NetworkName> [-quiet]
[UplinkSet=<UplinkSetName>vlanID=<vlanID>]
[State=<Enabled|Disabled>] [NativeVLAN=<Enabled|Disabled>]
[Private=<Enabled|Disabled>] [ConnectionMode=<Auto|Failover>]
[vlanTunnel=<Enabled|Disabled>] [PrefSpeedType=<Auto|Custom>]
[PrefSpeed=<100Mb–10Gb in 100Mb increments]
[MaxSpeedType=<UnRestricted|Custom>] [MaxSpeed=<100Mb–10Gb in
100Mb increments>]
Note
The SmartLink property is not supported during the creation of the network. If
specified, it will be ignored.
To configure the SmartLink attribute, use the set network command.
After the network has been created, you can add uplink ports if the network is not
using a shared uplink port set.
Note
When using the add uplink command, you will need to specify the enclosure :
interconnect bay : uplink port. For example enc0:2:x2
Note
You can confirm your enclosure name (it may not display as enc0) by running the
show enclosure command.
To modify an existing Ethernet network use the set network command; the
complete syntax is as follows:
set network <NetworkName> [-quiet] [Name=<NewName>]
[State=<Enabled|Disabled>]
[SmartLink=<Enabled|Disabled>][NativeVLAN=<Enabled|Disabled> ]
[Private=<Enabled|Disabled>] [VlanId=<New vlanId>]
[ConnectionMode=<Auto|Failover>]
[vlanTunnel=<Enabled|Disabled>] [PrefSpeedType=<Auto|Custom>]
[PrefSpeed=<100Mb–10Gb in 100Mb increments>]
[MaxSpeedType=<UnRestricted|Custom>] [MaxSpeed=<100Mb–10Gb in
100Mb increments>]
To create a shared uplink port set, use the add uplinkset command:
add uplinkset MyUplinkSet
To modify the default condition, you can force the server connections to use the same
VLAN mappings as the shared uplink sets.
set enet-vlan SharedServerVlanId=true
When using mapped VLAN tags, the overall link speed can be controlled as follows:
set enet-vlan PrefSpeedType=Custom PrefSpeed=500
MaxSpeedType=Custom MaxSpeed=2500
When assigning WWNs to a FC HBA port, Virtual Connect will assign both a port WWN and
a node WWN. Because the port WWN is typically used for configuring fabric zoning, it is
the WWN displayed throughout the Virtual Connect user interface. The assigned node
WWN is always the same as the port WWN incremented by one.
CAUTION: To avoid storage networking issues and potential loss of data associated with
duplicate WWNs on a FC SAN fabric, plan carefully when enabling Virtual Connect to
assign server blade WWNs so that the configured range of WWNs is used only once within
the environment.
The WWN range used by the Virtual Connect domain must be unique within the
environment. HP provides a set of pre-defined ranges that are reserved for use by Virtual
Connect and will not conflict with server factory default WWNs.
! Important
When using the HP-defined WWN ranges, be sure that each range is used only once
within the environment.
Note
A WWN (or MAC) pool cannot be changed if profiles are already configured.
Note
The LinkDist command specifies the login re-distribution scheme to use for load
balancing. Valid values include "Auto" and "Manual". The default login re-distribution
is "Manual".
The HP 4Gb VC-FC module, HP Virtual Connect 4Gb FC module, HP VC 8Gb 20- Port FC
module and HP VC 8Gb 24-Port module support only manual login redistribution. The
HP VC FlexFabric 10Gb/24-Port module supports both auto and manual login
redistribution.
Displaying FC fabrics
To display a list of all FC SAN fabrics, use the show fabric command:
show fabric
Note
If none are configured, the report returns the following message: “No FC SAN fabrics
exist”.
Note
For each VC defined serial number, VCM generates a random 128 bit logical UUID.
www.hp.com/go/bladesystemupdates
• Before creating the first server profile, select whether to use moveable,
administered MAC addresses and WWNs or whether to use the local server
blade factory default MAC addresses and WWNs.
When using Virtual Connect-administered MAC addresses, WWNs, or
changing Fibre Channel boot parameters, server blades must be powered
off to receive (or relinquish) a server profile assignment.
• After an enclosure is imported into a Virtual Connect domain, server blades
remain isolated from the networks and SAN fabrics until a server profile is
created and assigned.
• FC SAN connections are only shown in server profile screens when there is an
HP VC-FC module in the enclosure managed by Virtual Connect. If a VC-FC
module is added to a Virtual Connect domain that has existing profiles, an
option to add FC connections appears in the existing profiles when editing.
• Some server profile SAN boot settings (controller boot order) are only applied
by Virtual Connect after the server blade has been booted at least once with the
final mezzanine card configuration.
• If PXE, controller boot order, or SAN boot settings are made outside of Virtual
Connect (using RBSU or other configuration tools), Virtual Connect will restore
the settings defined by the server profile after the server blade completes the
next boot cycle.
To add an Ethernet network connection to an existing server profile, use the add
Ethernet-connection command:
add enet-connection MyProfile network=MyNetwork
To add a new FC SAN connection to an existing server profile, use the add fc-
connection command:
add fc-connection MyProfile fabric=SAN_A Speed=Auto
To assign a server profile to a specific device bay, use the assign profile
command:
Show profile
Note
Removing the profile will require you to rebuild it.
Configure a Profile
1. Using a Linux compatible text editor and the information presented in the lab build
and assign a profile and use the power control command to power-on the server.
assign profile <ProfileName><DeviceBay> [-PowerOn]
2. Can you delete the profile while the server is powered-on?
remove profile <ProfileName>