Re: Native VLAN for VSWITCH

2008-06-25 Thread Tracy J Adams
Hi,

In z/VM 5.3, we broke the native VLAN out from the default VLAN.  So you 
can set  a default and a native vlan id.   DEFINE VSWITCH name RDEV rdev 
VLAN this_is_the_default  NATIVE this_is_the_native.   In z/VM 5.2,  the 
native and the default vlan are the same.  So DEFINE VSWITCH name RDEV 
rdev VLAN this_is_both_default_and_native.

I hope that information helps you. 

Tracy (Bolinda) Adams
[EMAIL PROTECTED]
z/VM Development - Virtual Networking
http://www.vm.ibm.com/virtualnetwork/





From:
"Burch, Aubrey Dennis CIV DISA GS4B" <[EMAIL PROTECTED]>
To:
IBMVM@LISTSERV.UARK.EDU
Date:
06/24/2008 03:47 PM
Subject:
Native VLAN for VSWITCH



Hello All

I'm attempting to connect a TCPIP stack and some LINUX guests to a
VSWITCH using 802.1Q trunking, and the network administrator sent me the
following VLAN info as he configured it on the real switch:

"Attached are the IP addresses you requested.  I will put the trunk in
place on core switch 2 tonight.  I will trunk VLANs 390, 391, 393 and
389(new vlan for this project).  I will use a native vlan of 499.  Will
that work for you?"


I tentatively told him I thought it was OK, but I have not found a way
to successfully configure the NATIVE VLAN (I *think* that's the
problem). It appears there is a way to do this with the NATIVE option on
the DEF VSWITCH command on z/VM 5.3, but I am at 5.2. 

If I issue the following:
DEF VSWITCH VSW1 RDEV 9160 VLAN 499
SET VSWITCH VSW1 GRANT TCPIP VLAN 389

That combination allows me to ping the gateway on his switch, but I can
go no further out. I cannot get to my TCPIP stack  from outside the
network either, as I expected.  I have tried several permutations of
VLAN identifiers on the DEF VSWITCH command, and the only way to reach
the gateway is to use VLAN 499 or VLAN 1. 

I have left VLAN 389 on the SET VSWITCH VSW1 GRANT command for TCPIP for
each attempt, as they requested the hosts go on  VLAN 389.

Before I go back to the network guys, does anyone know of a way to
accommodate (on 5.2) the NATIVE VLAN configuration the network guy
specified above?

Thanks,
Denny Burch

z/VM and z/LINUX Systems
DISA DECC Mechanicsburg
717 605-1181
(dsn) 430-1181




Re: New z/VM 5.3 VSWITCH Port Isolation function

2008-04-22 Thread Tracy J Adams
Hi, Wolfgang,

There is nothing in the VSWITCH that will come up by default to prevent 
guests from talking to each other.   If you send me your configuration 
information, I can take a look and see what might be going on.The 
default for a VSWITCH in z/VM 5.2 is

DEFINE VSWITCH vswitchname 

If that is all you specify, you will come up as a VLAN UNAWARE IP layer 
VSWITCH without OSA connectivity to the external network.Remember your 
guests have to be authorized and coupled to the virtual switch. 

The new support that Alan is talking about is enabled by issuing a MODIFY 
or SET VSWITCH vswitchname ISOL  OFF|DROP|FORWARD  and is not enabled by 
default. 

Tracy (Bolinda) Adams
[EMAIL PROTECTED]
z/VM Development - Virtual Networking
http://www.vm.ibm.com/virtualnetwork/
tie line - 620-5469 / (607-429-5469)





Wolfgang Engel <[EMAIL PROTECTED]> 
Sent by: The IBM z/VM Operating System 
04/22/2008 08:28 AM
Please respond to
The IBM z/VM Operating System 


To
IBMVM@LISTSERV.UARK.EDU
cc

Subject
Re: New z/VM 5.3 VSWITCH Port Isolation function






Alan,

the subject brought me to a question I have in mind for some time.

There seems to be a feature on z/VM's (4.4 to 5.2) which prevents
the guests on the same VSWITCH to talk to eachother.
This is what happens on our system with every VSWITCH I create. Every 
guest 
can't talk to other guests by default and I don't know how to enable it.

Is there something I have to enable ?

Regards,


Wolfgang


On Sun, Apr 06, 2008 at 12:25:37PM -0400, Alan Altmark wrote:
> [cross-posted to IBMVM and LINUX-390]
> 
> I just want to bring to everyone's attention some new support for the 
> Virtual Switch.  APAR VM64281 for z/VM 5.3 (only) provides a "port 
> isolation" function that prevents guests on the same VSWITCH or VLAN (if 

> the VSWITCH is VLAN-aware) from talking directly to each other.  You can 

> decide what to do with packets destined for other guests on the LAN 
> segment: silently drop them or forward them, as-is, out to the switch.
> 
> This new function became available on February 26th.
> 
> For more information, see p.58 of the -05 edition of the z/VM 
Connectivity 
> book, http://publibz.boulder.ibm.com/epubs/pdf/hcsc9b21.pdf.
> 
> If you have any questions, please post them to IBMVM.  Thanks.
> 
> Regards,
>   Alan
> 
> Alan Altmark
> Sr. Software Engineer
> IBM z/VM Development

-- 
With kind regards/Mit freundlichen Gruessen,
 
 your/Ihr SuSE Team
 Wolfgang Engel ([EMAIL PROTECTED])
 
-
SUSE LINUX Products GmbH  Tel:   +49-911-74053-668 
Maxfeldstr. 5  Fax:   +49-911-7417755
90409 Nuernberg,  Email: [EMAIL PROTECTED]
Germany   WWW:   http://www.suse.com
SUSE LINUX Products GmbH, GF: Markus Rex, HRB 16746 (AG Nürnberg)
-



Re: Tracing VSWITCH - SAG broker problem

2007-04-11 Thread Tracy J Adams
Hi, Hans,

You should check out APAR PK25362 for IPFORMAT.   I believe that should 
help with your error situation.  Good luck. 

Tracy (Bolinda) Adams
[EMAIL PROTECTED]
z/VM Development - Virtual Networking





Hans Rempel <[EMAIL PROTECTED]> 
Sent by: The IBM z/VM Operating System 
04/10/2007 07:17 PM
Please respond to
[EMAIL PROTECTED]


To
IBMVM@LISTSERV.UARK.EDU
cc

Subject
Re: Tracing VSWITCH - SAG broker problem






Thanks Tracy. I did find a webpage from Paul Giordano talking about 
tracing VSWITCH but ran into problem/time  with IPFORMAT exec.  I used 
sample ETC and Config files from IBM. 
 
ipformat debug file a
   228 +++
40 +++
DMSRTL2103E Error in compiled CMS system Rexx file; additional 
information: 4100
 41 IPFORMAT EXEC 228
Ready(20041); T=0.27/0.27 17:50:09
 
Allan. Thanks for your comments. Nothing has changed or broke in 
production. We are trying to setup a test environment with new TCPIP stack 
and network server with new software. I would like to prove that the 
VSWITCH and OSA are not the problem because I use the same VSWITCH and OSA 
in the production TCPIP stack. The traces seem to show that data is 
heading onto the VSWITCH. Why the network folks don?t see it is a mystery 
to me.
 
I have a few tests planned for Thursday morning which I hope will shed 
more light on the situation.
 
Hans 

From: The IBM z/VM Operating System [mailto:[EMAIL PROTECTED] On 
Behalf Of Tracy J Adams
Sent: April 10, 2007 2:36 PM
To: IBMVM@LISTSERV.UARK.EDU
Subject: Re: Tracing VSWITCH - SAG broker problem
 

For more information on using the 'SNIFFER' support added in z/VM 5.2.0, 
please see the Troubleshooting a Virtual Switch or Guest LAN section of 
the z/VM Connectivity Guide. 

Tracy (Bolinda) Adams
[EMAIL PROTECTED]
z/VM Development - Virtual Networking





Alan Altmark/Endicott/[EMAIL PROTECTED] 
Sent by: The IBM z/VM Operating System  
04/10/2007 02:04 PM 


Please respond to
The IBM z/VM Operating System 



To
IBMVM@LISTSERV.UARK.EDU 
cc
 
Subject
Re: Tracing VSWITCH - SAG broker problem
 


 
 




On Tuesday, 04/10/2007 at 12:39 AST, Hans Rempel <[EMAIL PROTECTED]> 

wrote:
> Hi all. Sorry for the lengthy post.
> 
> I have a problem trying to get SAG broker in VSE to talk to SAG broker 
on a 
> windows platform. For legacy reasons we wish to keep the environment the 

same 
> so there is NO VSE TCPIP stack involved. This does make it more 
complicated but 
> that is how it has/is been running in production for 4 years.

If it has been working, what changed?

> 1)Is there some documentation/tools on reading QDIO traces to I can 
> analyze this captured trace?

No.  To get that level of help you need to open a PMR.

> 2)Is there a trace I can setup to trace traffic leaving the VSWITCH 
to 
> the OSA card or trace certain channels (ports) on the OSA card? 
Currently one 
> LPAR uses 0,1,2 and the second LPAR using 3,4,5. The VSWITCH is 
monitored by 
> DTCVSW1 userid.

You can trace the *VSWITCH* by putting a Linux guest on the VSWITCH with 
sniffer (promiscuous mode) authority and gather a TCPDUMP.  You'll see all 

the traffic on *that* VSWITCH.  Tracing the traffic leaving the OSA itself 

is done exactly as your network guys are doing - with sniffers.

Beware that OSA port sharing enables the OSA to "short cut" the packets if 

it recognizes the destination MAC or IP address as belonging to the OSA. 

And you know how I am about providing pictures, IP addys, and subnet 
masks.  I can't tell if the various hosts are [supposed to be] in the same 

subnet or not.  I get sleepy when I read ankle-bone-leg-bone-hip-bone 
configuration descriptions, particularly where shared OSAs come into play. 

:-D

Alan Altmark
z/VM Development
IBM Endicott


Re: Tracing VSWITCH - SAG broker problem

2007-04-10 Thread Tracy J Adams
For more information on using the 'SNIFFER' support added in z/VM 5.2.0, 
please see the Troubleshooting a Virtual Switch or Guest LAN section of 
the z/VM Connectivity Guide. 

Tracy (Bolinda) Adams
[EMAIL PROTECTED]
z/VM Development - Virtual Networking






Alan Altmark/Endicott/[EMAIL PROTECTED] 
Sent by: The IBM z/VM Operating System 
04/10/2007 02:04 PM
Please respond to
The IBM z/VM Operating System 


To
IBMVM@LISTSERV.UARK.EDU
cc

Subject
Re: Tracing VSWITCH - SAG broker problem






On Tuesday, 04/10/2007 at 12:39 AST, Hans Rempel <[EMAIL PROTECTED]> 

wrote:
> Hi all. Sorry for the lengthy post.
> 
> I have a problem trying to get SAG broker in VSE to talk to SAG broker 
on a 
> windows platform. For legacy reasons we wish to keep the environment the 

same 
> so there is NO VSE TCPIP stack involved. This does make it more 
complicated but 
> that is how it has/is been running in production for 4 years.

If it has been working, what changed?
 
> 1)Is there some documentation/tools on reading QDIO traces to I can 
> analyze this captured trace?

No.  To get that level of help you need to open a PMR.

> 2)Is there a trace I can setup to trace traffic leaving the VSWITCH 
to 
> the OSA card or trace certain channels (ports) on the OSA card? 
Currently one 
> LPAR uses 0,1,2 and the second LPAR using 3,4,5. The VSWITCH is 
monitored by 
> DTCVSW1 userid.

You can trace the *VSWITCH* by putting a Linux guest on the VSWITCH with 
sniffer (promiscuous mode) authority and gather a TCPDUMP.  You'll see all 

the traffic on *that* VSWITCH.  Tracing the traffic leaving the OSA itself 

is done exactly as your network guys are doing - with sniffers.

Beware that OSA port sharing enables the OSA to "short cut" the packets if 

it recognizes the destination MAC or IP address as belonging to the OSA. 

And you know how I am about providing pictures, IP addys, and subnet 
masks.  I can't tell if the various hosts are [supposed to be] in the same 

subnet or not.  I get sleepy when I read ankle-bone-leg-bone-hip-bone 
configuration descriptions, particularly where shared OSAs come into play. 

 :-D

Alan Altmark
z/VM Development
IBM Endicott



Re: Unexpected DEFINE NIC Results

2007-01-11 Thread Tracy J Adams
Check your directory for NICDEFs and your MVSXExx users for error 
messages.  I suspect you have a NICDEF or Define NIC with devices greater 
than 3.  For example you could have a 

NICDEF  1340 type qdio devices 6

CP SEND does not show you the error message on your console but instead 
over on MVSXE49's.   So your define nic might have failed but your couple 
still succeeded in coupling the base nic address (1340)  to your VSWITCH. 
The detach then destroyed the 1340 nic allowing the next define nic to 
succeed and you get the results you originally wanted.   I'd be happy to 
look at this issue more if you want to send me your consoles or a snapshot 
of your directory, etc. 

Tracy (Bolinda) Adams
z/VM Development - Virtual Networking




"Scully, William P" <[EMAIL PROTECTED]> 
Sent by: The IBM z/VM Operating System 
01/10/2007 01:37 PM
Please respond to
The IBM z/VM Operating System 


To
IBMVM@LISTSERV.UARK.EDU
cc

Subject
Unexpected DEFINE NIC Results






Sometimes CP doesn't do what you expect.  Here's an example where I
needed the NIC for z/OS to be at address 1344 rather than 0D00.  Not
hard to fix dynamically... Let's try: 


q vswitch intrav6 details
VSWITCH SYSTEM INTRAV6  Type: VSWITCH Connected: 4Maxconn: INFINITE
  PERSISTENT  RESTRICTEDNONROUTER Accounting: OFF
  VLAN Unaware
  State: Defined
  IPTimeout: 5 QueueStorage: 8
Adapter Owner: MVSXE49  NIC: 0D00  Name: UNASSIGNED
Adapter Owner: MVSXE62  NIC: 0D00  Name: UNASSIGNED
Adapter Owner: MVSXE83  NIC: 0D00  Name: UNASSIGNED
Adapter Owner: MVSXE97  NIC: 4100  Name: UNASSIGNED
Ready;
cp send cp mvsxe83 detach nic d00
Ready;
q vswitch intrav6 details
VSWITCH SYSTEM INTRAV6  Type: VSWITCH Connected: 3Maxconn: INFINITE
  PERSISTENT  RESTRICTEDNONROUTER Accounting: OFF
  VLAN Unaware
  State: Defined
  IPTimeout: 5 QueueStorage: 8
Adapter Owner: MVSXE49  NIC: 0D00  Name: UNASSIGNED
Adapter Owner: MVSXE62  NIC: 0D00  Name: UNASSIGNED
Adapter Owner: MVSXE97  NIC: 4100  Name: UNASSIGNED
Ready;
cp send cp mvsxe83 define nic 1344 type qdio
Ready;
cp send cp mvsxe83 couple 1344 system intrav6
Ready;
q vswitch intrav6 details
VSWITCH SYSTEM INTRAV6  Type: VSWITCH Connected: 4Maxconn: INFINITE
  PERSISTENT  RESTRICTEDNONROUTER Accounting: OFF
  VLAN Unaware
  State: Defined
  IPTimeout: 5 QueueStorage: 8
Adapter Owner: MVSXE49  NIC: 0D00  Name: UNASSIGNED
Adapter Owner: MVSXE62  NIC: 0D00  Name: UNASSIGNED
Adapter Owner: MVSXE83  NIC: 1344  Name: UNASSIGNED
Adapter Owner: MVSXE97  NIC: 4100  Name: UNASSIGNED
Ready;


OK, one down, two to go, (now that I have my technique down pat):


cp send cp mvsxe49 detach nic d00
Ready;
cp send cp mvsxe62 detach nic d00
Ready;
cp send cp mvsxe49 define nic 1344 type qdio
Ready;
cp send cp mvsxe62 define nic 1344 type qdio
Ready;
cp send cp mvsxe49 couple 1344 system intrav6
Ready;
cp send cp mvsxe62 couple 1344 system intrav6
Ready;
q vswitch intrav6 details
VSWITCH SYSTEM INTRAV6  Type: VSWITCH Connected: 4Maxconn: INFINITE
  PERSISTENT  RESTRICTEDNONROUTER Accounting: OFF
  VLAN Unaware
  State: Defined
  IPTimeout: 5 QueueStorage: 8
Adapter Owner: MVSXE49  NIC: 1340  Name: UNASSIGNED
Adapter Owner: MVSXE62  NIC: 1340  Name: UNASSIGNED
Adapter Owner: MVSXE83  NIC: 1344  Name: UNASSIGNED
Adapter Owner: MVSXE97  NIC: 4100  Name: UNASSIGNED
Ready;


Huh?  Where did "1340" come from?  Oh well, if at first you don't
succeed: 


cp send cp mvsxe49 detach nic 1340
Ready;
q vswitch intrav6 details
VSWITCH SYSTEM INTRAV6  Type: VSWITCH Connected: 3Maxconn: INFINITE
  PERSISTENT  RESTRICTEDNONROUTER Accounting: OFF
  VLAN Unaware
  State: Defined
  IPTimeout: 5 QueueStorage: 8
Adapter Owner: MVSXE62  NIC: 1340  Name: UNASSIGNED
Adapter Owner: MVSXE83  NIC: 1344  Name: UNASSIGNED
Adapter Owner: MVSXE97  NIC: 4100  Name: UNASSIGNED
Ready;
cp send cp mvsxe49 define nic 1344 type qdio
Ready;
q vswitch intrav6 details
VSWITCH SYSTEM INTRAV6  Type: VSWITCH Connected: 4Maxconn: INFINITE
  PERSISTENT  RESTRICTEDNONROUTER Accounting: OFF
  VLAN Unaware
  State: Defined
  IPTimeout: 5 QueueStorage: 8
Adapter Owner: MVSXE49  NIC: 1344  Name: UNASSIGNED
Adapter Owner: MVSXE62  NIC: 1340  Name: UNASSIGNED
Adapter Owner: MVSXE83  NIC: 1344  Name: UNASSIGNED
Adapter Owner: MVSXE97  NIC: 4100  Name: UNASSIGNED
Ready;
cp send cp mvsxe49 couple 1344 system intrav6
Ready;
q vswitch intrav6 details
VSWITCH SYSTEM INTRAV6  Type: VSWITCH Connected: 4Maxconn: INFINITE
  PERSISTENT  RESTRICTEDNONROUTER Accounting: OFF
  VLAN Unaware
  State: Defined
  IPTimeout: 5 QueueStorage: 8
Adapter Owner: MVSXE49  NIC: 1344  Name: UNASSIGNED
Adapter Owner: MVSXE62  NIC: 1340  Name: UNASSIGNED
Adapter Owner: MVSXE83  NIC: