OSA Implementation PDF
OSA Implementation PDF
OSA-Express
Implementation Guide
Product, planning, and quick start
information
Mike Ebbers
Wonjin Chung
Dody Kurniadi
Joselito Manoto
ibm.com/redbooks
International Technical Support Organization
June 2014
SG24-5948-06
Note: Before using this information and the product it supports, read the information in “Notices” on
page xix.
© Copyright International Business Machines Corporation 2009, 2014. All rights reserved.
Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule
Contract with IBM Corp.
Contents
Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xx
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi
Authors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi
Now you can become a published author, too . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxii
Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxii
Chapter 8. QDIO and non-QDIO modes for the IBM z/VSE operating system . . . . . . . 75
8.1 QDIO compared to non-QDIO in z/VSE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
8.1.1 TCP/IP stacks in z/VSE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
8.1.2 TCP/IP setup with OSA CHPID in QDIO mode. . . . . . . . . . . . . . . . . . . . . . . . . . . 76
8.1.3 TCP/IP setup with OSA CHPID in non-QDIO mode . . . . . . . . . . . . . . . . . . . . . . . 77
8.2 Related publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Contents v
OSA-Express5S Gigabit Ethernet long wavelength (GbE LX) features . . . . . . . . . . . . 145
OSA-Express5S Gigabit Ethernet short wavelength (GbE SX) features . . . . . . . . . . . 146
OSA-Express4S 1000BASE-T Ethernet features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
OSA-Express4S 10 Gigabit Ethernet Long Reach (10GbE LR) features . . . . . . . . . . . 148
OSA-Express4S 10 Gigabit Ethernet Short Reach (10GbE SR) features . . . . . . . . . . 148
OSA-Express4S Gigabit Ethernet long wavelength (GbE LX) features . . . . . . . . . . . . 149
OSA-Express4S Gigabit Ethernet short wavelength (GbE SX) features . . . . . . . . . . . 149
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
Contents vii
viii OSA-Express Implementation Guide
Figures
Figures xi
xii OSA-Express Implementation Guide
Tables
Examples xvii
xviii OSA-Express Implementation Guide
Notices
This information was developed for products and services offered in the U.S.A.
IBM may not offer the products, services, or features discussed in this document in other countries. Consult
your local IBM representative for information on the products and services currently available in your area. Any
reference to an IBM product, program, or service is not intended to state or imply that only that IBM product,
program, or service may be used. Any functionally equivalent product, program, or service that does not
infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to
evaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document. The
furnishing of this document does not grant you any license to these patents. You can send license inquiries, in
writing, to:
IBM Director of Licensing, IBM Corporation, North Castle Drive, Armonk, NY 10504-1785 U.S.A.
The following paragraph does not apply to the United Kingdom or any other country where such
provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION
PROVIDES THIS PUBLICATION “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR
IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT,
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of
express or implied warranties in certain transactions, therefore, this statement may not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are periodically made
to the information herein; these changes will be incorporated in new editions of the publication. IBM may make
improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time
without notice.
Any references in this information to non-IBM websites are provided for convenience only and do not in any
manner serve as an endorsement of those websites. The materials at those websites are not part of the
materials for this IBM product and use of those websites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring
any obligation to you.
Any performance data contained herein was determined in a controlled environment. Therefore, the results
obtained in other operating environments may vary significantly. Some measurements may have been made
on development-level systems and there is no guarantee that these measurements will be the same on
generally available systems. Furthermore, some measurements may have been estimated through
extrapolation. Actual results may vary. Users of this document should verify the applicable data for their
specific environment.
Information concerning non-IBM products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. IBM has not tested those products and cannot confirm the
accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the
capabilities of non-IBM products should be addressed to the suppliers of those products.
This information contains examples of data and reports used in daily business operations. To illustrate them
as completely as possible, the examples include the names of individuals, companies, brands, and products.
All of these names are fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrate programming
techniques on various operating platforms. You may copy, modify, and distribute these sample programs in
any form without payment to IBM, for the purposes of developing, using, marketing or distributing application
programs conforming to the application programming interface for the operating platform for which the sample
programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore,
cannot guarantee or imply reliability, serviceability, or function of these programs.
The following terms are trademarks of the International Business Machines Corporation in the United States,
other countries, or both:
AIX® Redbooks® XIV®
BladeCenter® Redbooks (logo) ® z/Architecture®
CICS® Resource Measurement Facility™ z/OS®
HiperSockets™ RMF™ z/VM®
IBM® System z® z/VSE®
IMS™ System z10® z10™
MVS™ System z9® z9®
OMEGAMON® Tivoli® zEnterprise®
Power Systems™ VTAM®
RACF® WebSphere®
Pentium, Intel logo, Intel Inside logo, and Intel Centrino logo are trademarks or registered trademarks of Intel
Corporation or its subsidiaries in the United States and other countries.
Linux is a trademark of Linus Torvalds in the United States, other countries, or both.
Microsoft, Windows, and the Windows logo are trademarks of Microsoft Corporation in the United States,
other countries, or both.
Java, and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its
affiliates.
UNIX is a registered trademark of The Open Group in the United States and other countries.
Other company, product, or service names may be trademarks or service marks of others.
This IBM® Redbooks® publication will help you to install, tailor, and configure the Open
Systems Adapter (OSA) features that are available on IBM zEnterprise® servers. It focuses
on the hardware installation and the software definitions that are necessary to provide
connectivity to LAN environments. This information will help you with planning and system
setup. This book also includes helpful utilities and commands for monitoring and managing
the OSA features.
This information will be helpful to systems engineers, network administrators, and system
programmers who plan for and install OSA features. The reader is expected to have a good
understanding of IBM System z® hardware, Hardware Configuration Definition (HCD) or the
input/output configuration program (IOCP), Open Systems Adapter Support Facility
(OSA/SF), Systems Network Architecture/Advanced Peer-to-Peer Networking (SNA/APPN),
and TCP/IP protocol.
Authors
This book was produced by a team of specialists from around the world working through the
International Technical Support Organization (ITSO), Poughkeepsie Center in the US.
Mike Ebbers is a Consulting IT Specialist and Project Leader at the International Technical
Support Organization, Poughkeepsie Center. He has worked with IBM mainframe hardware
and software products since 1974 in the field, in education, and in the ITSO.
Wonjin Chung is an advisory System Service Representative based in IBM Korea. He has
six years of experience in System z and IBM disk storage hardware. He is also well versed on
UNIX system platforms. His areas of expertise include hardware related to System z, IBM
Power Systems™ solutions, IBM AIX®, and IBM DS8K and IBM XIV® storage. He holds a
bachelor’s degree in Mechanical Engineering.
Joselito Manoto is an IBM mainframe network engineer based in Australia. He supports and
maintains IBM z/OS Communications Server software (IBM Virtual Telecommunications
Access Method [IBM VTAM®] and IBM z/OS Communications Server TCP/IP) for clients in
various industries such as banking, airline, and telecommunications. Joselito has worked with
the IBM mainframes since 1992, when he began working on the IBM VM operating system.
He holds a Bachelor of Science degree in Electrical Engineering.
David Bennin
Richard Conway
Roy Costa
Robert Haimowitz
IBM ITSO Poughkeepsie Center
Find out more about the residency program, browse the residency index, and apply online:
ibm.com/redbooks/residencies.html
Comments welcome
Your comments are important to us.
We want our books to be as helpful as possible. Send us your comments about this or other
IBM Redbooks in one of the following ways:
Use the online Contact us Redbooks form:
ibm.com/redbooks
Send your comments by email:
[email protected]
Mail your comments:
IBM Corporation, International Technical Support Organization
Dept. HYTD, Mail Station P099
2455 South Road
Poughkeepsie, NY 12601-5400
Terminology: If not specifically stated otherwise, the term OSA applies to the
OSA-Express5S and OSA-Express4S features throughout this book.
The information covers the following topics, which includes supported CHPID types and OSA
capabilities:
1.1, “Introduction to the Open Systems Adapter” on page 2
1.2, “OSA-Express for ensemble connectivity” on page 4
The OSA integrates the control unit and device into the same hardware. It does so by placing
them on a single card that directly connects to the central processor complex I/O bus. There
are several current versions of the Open Systems Adapter:
Open Systems Adapter-Express3 (OSA-Express3)
Open Systems Adapter-Express4S (OSA-Express4S)
Open Systems Adapter-Express5S (OSA-Express5S)
In this book, we describe OSA-Express4S and OSA-Express5S and their functions. Although
this book is an update of the previous edition, we describe OSA-Express3 features if nothing
has changed since the particular information was written.
1000BASE-T Ethernet 1 2 2
(zEC12)
10-Gigabit Ethernet 1 1 1
1000BASE-T Ethernet 1 2 2
The integration of a channel path with network ports makes the OSA a unique channel or
channel-path identifier (CHPID) type. This is recognized by the hardware I/O configuration on
a port-by-port basis as one of the following types (CHPID types are shown in parentheses):
The following information about how to configure the OSA-ICC is in the IBM Redbooks
publication titled OSA-Express Integrated Console Controller Implementation Guide,
SA24-6364.
1 Unless otherwise specified, zEnterprise CPC refers to zBC12, zEC12, z114z, and z196.
Figure 1-1 illustrates the required network connectivity to attach a zBX to a zEC12 (INMN and
IEDN, which are described in the sections that follow).
The INMN requires two ports (CHPID port 0) from two OSA-Express5S or OSA-Express4S
1000BASE-T features. CHPID port 1 is not used in this case.
The adapters are configured as CHPID type OSM (OSA intranode management network).
The connection is through port J07 of the bulk power hubs (BPHs) in the zEnterprise CPC.
The INMN TOR switches on the zBX also connect to the BPHs.
2 This HMC must be running with Version 2.11 or later with feature codes 0091, 0025, 0019, and, optionally, 0020.
In this book, we cover how to implement the OSA-Express features. You can find more about
functions, OSA capabilities, and connectivity in Chapter 7 of the IBM System z Connectivity
Handbook, SG24-5444.
Note: Certain functionality might require specific levels of an operating system or program
temporary fixes (PTFs). That information is provided in this chapter.
Note: See the shaded box in the Chapter 1, “Open Systems Adapter overview” on page 1 for
definitions of CHPID types.
See the IBM z/OS Quick Start table (Table 2-4 on page 13), which provides a quick reference
for relating the CHPID type to an operation mode.
The OSA Support Facility (OSA/SF) requires one device (defined by using the Hardware
Configuration Definition (HCD) to be associated with the OSA CHPID as device type OSAD
(UNITADD=FE). OSA/SF uses this device to communicate with the OSA feature.
Spanned channels
Spanning is the ability to configure channels to multiple channel subsystems (CSSs). When
defined that way, the channels can be shared by any or all of the configured logical partitions
(LPARs), regardless of the CSSs to which the LPAR is configured.
OSA ports can be spanned across multiple CSSs on System z systems. For more information
about defining the OSA to hardware, see Chapter 3, “Hardware configuration definitions” on
page 15.
The OSA features provide direct LAN connectivity as integrated System z features. This
brings the strengths of System z servers, such as security, availability, enterprise-wide access
to data, and systems management and IBM z/Architecture® to the client/server environment.
Table 2-1 on page 10 summarizes the OSA features as they relate to the different modes of
operation and maximum addressing ranges that are supported by System z systems.
Addresses
Non-QDIO (OSE)c
QDIO (OSD)
Note: The Address Resolution Protocol (ARP) table and multicast addresses are obtained
from the same storage pool. The overall capacity limit for both tables is the sum of the IPv4
addresses plus the IPv6 addresses, plus the IPv4 multicast addresses, plus the IPv6
multicast addresses, plus the IPv4 remote addresses. Although the maximum number of
multicast addresses is 2048, if there are a large number of other addresses that make up
the same storage pool, the amount of multicast addresses might be fewer than 2048. Keep
in mind that some operating systems generate a multicast address for each IPv6 address
that is specified.
See Appendix E, “Using the Open Systems Adapter Support Facility” on page 191, for a
description of using OSA/SF in the operating system.
For a quick check to determine whether OSA/SF is required for your installation, use
Table 2-2 as a reference.
Yes Dynamic No
1000BASE-T Ethernet
Yes Manual Yes
For more information about the different types of OSA features, see Appendix A, “Open
Systems Adapter-Express features by version” on page 141.
Function
10GbE
GbE
1000BASE-T
Function
10GbE
GbE
Internet Protocol Version 6 (IPv6) x x xa
ARP statisticsb x x x
ARP takeover x x x
IP network availability x x xa
Layer 2 support x x xa
Enterprise Extender x x x
For your z/VM and guest system environment, consider using the virtual switch (VSWITCH) in
conjunction with your OSA and LAN environment. The virtual switch provides IEEE 802.3
capabilities, such as VLAN and link aggregation support, as well as port isolation. See
Chapter 11, “z/VM virtual switch” on page 111 for details.
For more information about the PAGENT, see IBM z/OS V2R1 Communications Server
TCP/IP Implementation Volume 4: Security and Policy-Based Networking, SG24-8099.
Your IBM representative can supply a physical channel identifier (PCHID) report that
specifies where the OSA feature is plugged into your server. The channel path identifier
(CHPID) number and PCHID number are required for all OSA configuration and setup tasks.
SCZP401
LPAR LPAR
SC30 VMLINUX1
CSS 1 CSS 2
Ethernet
Hardware Configuration
3. In the Processor List display (Figure 3-4), select the processor that you want to update by
typing action code S next to the selected processor. Then press Enter.
Note: We identify the panel selection options by using the action code, rather than the item
number, to avoid confusion when a particular HCD menu changes.
Select one or more processors, then press Enter. To add, use F11.
4. In the Channel Subsystem List display (Figure 3-5 on page 19), type an S next to the
channel subsystem that you want to work with, and then press Enter.
Select one or more channel subsystems, then press Enter. To add, use F11.
5. In the Channel Path List panel, press F11 to add a channel path.
6. In the Add Channel Path panel (Figure 3-6 on page 20), enter all of the required
information:
a. We defined 04 for the CHPID and 534 as the PCHID.
b. For Channel path type, we specified Tivoli Provisioning Manager for OS
Deployment because we are defining an OSA-Express5S 1000BASE-T, which supports
Queued Direct I/O (QDIO).
c. For Operation mode, we specify SPAN because the feature will be shared among LPARs
and CSSs.
d. For Description, use a meaningful description to serve as a reference in HCD.
e. Press Enter.
Note: This example shows how to configure an OSA-Express5S 1000BASE-T feature. The
process is identical for the other OSA-Express5S features:
The channel path type must be OSD for QDIO support or OSE for non-QDIO support.
The OSA-Express5S 1000BASE-T features also support the Integrated Console
Controller (ICC) for CHPID type OSC and the Intranode Management Network (INMN)
for CHPID type OSM.
You can specify the following Operation modes for channel paths:
DED: Allows only one logical partition to access a channel path.
REC: Allows only one logical partition at a time to access a channel path, but you can
reconfigure that channel path from one logical partition to another. You reconfigure a
channel path by using the IBM Multiple Virtual Storage (MVS™) CONFIG CHP(xx)
command.
SHR: Allows more than one logical partition to access a channel path simultaneously.
You can specify shared mode only when the support level of the processor has multiple
image facility (MIF) capability.
SPAN: Allows partitions in more than one logical channel subsystem to share the same
channel. Not all types of channel paths can be defined as spanned.
7. In the next display (Figure 3-7), specify whether you want more than 160 TCP/IP stacks.
For more information see the IBM System z Connectivity Handbook, SG24-5444.
Channel subsystem ID : 1
Channel path ID . . : 04 Channel path type . : OSD
Operation mode . . . : SPAN Number of CHPIDs . . : 1
10.Review the partition names and descriptions. You have two choices:
a. Select the ones to include, and press Enter.
b. If you do not want any partitions in that candidate list, press Enter.
Connected to switches . . . __ __ __ __ __ __ __ __ +
Ports . . . . . . . . . . . __ __ __ __ __ __ __ __ +
If connected to a switch:
4. As shown in Figure 3-11, type an S next to the processor for the control unit. Then press
Enter.
Unit address . . . . . . 00 __ __ __ __ __ __ __ +
Number of units . . . . 255 ___ ___ ___ ___ ___ ___ ___
Connected to CUs . 20C0 ____ ____ ____ ____ ____ ____ ____ +
Figure 3-13 Add Device panel
The answer depends on the CHPID type, the number of TCP/IP stacks, the use the
OSA-Express Network Traffic Analyzer, and the SNA definitions that are required.
Consider the following for the number of devices:
Any OSD, OSX, or OSM CHPID (QDIO mode) requires at least three devices for each
TCP/IP stack: read, write, and data path. For z/OS, only the first TCP/IP stack requires
three devices. Any additional TCP/IP stack requires only one device (data path).
If you define both IPv4 and IPv6 with INTERFACE statements, z/OS will use two data
devices, one for each protocol.
If you plan to use the OSA-Express Network Traffic Analyzer, you need one more data
device, which is used to transmit the captured trace data to TCP/IP.
Any OSE CHPID requires two devices (read and write) for each TCP/IP. SNA requires
one device.
4. A panel is displayed in which you can edit information for the specific devices. Make any
changes that you need, and then press Enter.
6. In the panel shown in Figure 3-15, you can change the starting unit address. Verify the
value (00 is required only with the default OAT, for CHPID type OSE), and then press
Enter.
Subchannel set ID . . . . . . . _ +
Unit address . . . . . . . . . . 00 + (Only necessary when different from
the last 2 digits of device number)
Time-Out . . . . . . . . . . . . No (Yes or No)
STADET . . . . . . . . . . . . . No (Yes or No)
Preferred CHPID . . . . . . . . __ +
Explicit device candidate list . No (Yes or No)
Figure 3-15 Define Device / Processor panel
9. In the resulting display (Figure 3-17), press Enter to accept the default values.
Parameter/
Feature Value + R Description
OFFLINE No Device considered online or offline at IPL
DYNAMIC Yes Device has been defined to be dynamic
LOCANY Yes UCB can reside in 31 bit storage
Figure 3-17 Define Device Parameters / Features panel
You should now see the Device List display. If you plan to use OSA/SF, you need to define an
OSAD device.
11.Press F11 to add a new device.
__________________________________Add Device_________________________
Connected to CUs . 20C0 ____ ____ ____ ____ ____ ____ ____ +
Figure 3-18 OSAD definition (Part 1 of 2), Add Device panel
13.Repeat the process as you did for the other devices, except that you must associate the
unit address (FE) with the OSAD Device number (20CF), as shown in Figure 3-19.
14.When you have finished adding the required information, press Enter.
Subchannel set ID . . . . . . . _ +
Unit address . . . . . . . . . . FE + (Only necessary when different from
the last 2 digits of device number)
Time-Out . . . . . . . . . . . . No (Yes or No)
STADET . . . . . . . . . . . . . No (Yes or No)
Preferred CHPID . . . . . . . . __ +
Explicit device candidate list . No (Yes or No)
Figure 3-19 OSAD definition (Part 2 of 2), Define Device / Processor panel
Hardware Configuration
2. From the next display (Figure 3-21), select 3 and press Enter.
3. Select the processor and press Enter (see Figure 3-22 on page 29).
Select one.
4. You will get a Build IOCP Input Data Set panel (Figure 3-23) to enter the required data.
You can use any title and data set. The IOCP Input Data Set field is the target data set
where the job writes the input IOCDS. We use the following values in our example:
– Title1: IOCDS
– IOCP Input Data Set: IOCP.INPUT
5. Example 3-1 on page 30 shows IOCDS input that was generated by the HCD for spanned
OSA CHPIDs running in QDIO mode.
A system programmer (or other authorized person) can use the HCD option to “Activate or
verify configuration dynamically” or the ACTIVATE operator command (ACTIVATE IODF=xx) to
make changes to a running configuration. On the HCD panel, specify the name and volume
serial number (if applicable) for the production IODF.
Although the Open Systems Adapter Support Facility (OSA/SF) is not required because all
definitions are set dynamically, use OSA/SF for monitoring and controlling the OSA port.
For more information about installing and using OSA/SF, see Appendix E, “Using the Open
Systems Adapter Support Facility” on page 191.
The necessary definitions for CHPID 04 and CHPID 07 are also shown in the IOCDS format
in 3.2.4, “Generating the IOCDS input from the HCD” on page 27.
To determine the current missing-interrupt handler (MIH) value for the device (20C1 in our
example), enter this command:
D IOS,MIH,DEV=20C1
In our environment, we are using the first CHPID of each feature with the associated ports (0
and 1) on each OSA-Express5S 1000BASE-T feature for demonstration purposes only. In a
production environment, use both CHPIDs and connect them to at least two different Ethernet
switches to avoid a single point of failure.
Example 4-1 VTAM TRL major node that is related to TCPIPE and TCPIPF
OSA20C0 VBUILD TYPE=TRL
*
* QDIO TRLE FOR OSA-Express5S 1000Base-T CHPID 04 PORT 0
*
OSA20C0P TRLE LNCTL=MPC, *
READ=20C0, *
WRITE=20C1, *
DATAPATH=(20C2,20C5), *
PORTNAME=OSA20C0, *
MPCLEVEL=QDIO
*
* QDIO TRLE FOR OSA-Express5S 1000Base-T CHPID 04 PORT 1
*
OSA20C6P TRLE LNCTL=MPC, *
READ=20C6, *
WRITE=20C7, *
DATAPATH=(20C8,20CB), *
PORTNAME=OSA20C6, *
PORTNUM=1, *
MPCLEVEL=QDIO
*
* QDIO TRLE FOR OSA-Express5S 10GbE CHPID 07 PORT 0
*
OSA2160P TRLE LNCTL=MPC, *
READ=2160, *
WRITE=2161, *
DATAPATH=(2162,2165), *
PORTNAME=OSA2160, *
MPCLEVEL=QDIO
TCP/IP uses a VTAM interface to run the OSA in QDIO mode. You must define and activate a
TRL major node before TCP/IP starts its QDIO device.
Table 2-4 on page 13 lists the various uses of VTAM TRLE definitions, and this chapter
provides implementation examples and the associated TRLE definition requirements.
Table 4-1 VTAM TRL major node definition for port 0, related to TCPIPE and TCPIPF
Required Explanation Remarks
parameters
TYPE=TRL TRL major node MPC TRL major node that is known to VTAM.
OSA20C0P TRLE minor node The name of the TRLE in VTAM. This name is downloaded to OSA
and is used as OSANAME.
READ=20C0 READ device The READ device number must be the even number of the device pair.
The Read/Write pair of the OSA port is used only to exchange control
data.
WRITE=20C1 WRITE device The WRITE device number must be the odd number of the device pair.
The Read/Write pair of the OSA port is used only to exchange control
data.
DATAPATH= Data devices The device address of the DATAPATH of each OSA port. For QDIO, the
(20C2,20C5) device 20C2 is used for the data transfer in both directions. The
additional device 20C3, 20C4, and 20C5 is needed by other TCP/IP
stacks and the OSA Network Traffic Analyzer trace function, which is
covered in Appendix B, “Network Traffic Analyzer” on page 151.
PORTNAME= PORTNAME PORTNAME must match the TCP/IP device name in the TCP/IP
OSA20C0 associated with the profile for this connection. The association between TCP/IP and VTAM
devices is done through the PORTNAME.
PORTNUM=0 Physical Port number PORTNUM specifies which physical port on an OSA is to be used for
that is associated with this QDIO device. For OSA-Express3, OSA-Express4S and
this CHPID OSA-Express5S, multiple ports (0 and 1) are supported. The default
is port number 0.
MPCLEVEL=QDIO MPC compatibility level This indicates that the QDIO interface is used for the OSA port.
TRLE considerations
For OSA, there are two types of subchannels:
1. Subchannels that are dedicated to control flows. The control subchannels are defined on
the READ and WRITE operands.
2. Subchannels that are dedicated to data. The data subchannels are specified on the
DATAPATH operand.
Data subchannels are used for sending and receiving data through the OSA device or for
receiving trace data from the OSA device, such as the OSA-Express Network Traffic
Analyzer (OSAENTA).
The DATAPATH addresses do not need to be immediate after the WRITE address. It can be
any address in the range of the defined devices of the OSA in the HCD.
Note: We describe the setup of multiple VLAN support in more detail in Chapter 10, “VLAN
support” on page 89.
Important: z/OS V1R10 introduced the INTERFACE statement, which provides the
equivalent of DEVICE, LINK, and HOME definitions in one statement. You can still use the
DEVICE, LINK, and HOME statements for IPv4 traffic, as we did for port 0 in Example 4-3
on page 37. However, there are configurations that require you to migrate to the
INTERFACE statement, for example when using multiple VLANs.
Note: When an INTERFACE statement is supported, use that (rather than DEVICE, LINK,
and HOME) to get the latest functionality from your IBM products.
In our environment, stack TCPIPE uses the INTERFACE statement and stack TCPIPF uses
the DEVICE, LINK, and HOME statements.
ENDROUTES
;
START OSA2160LNK
We defined the following values for OSA-Express5S 1000BASE-T port 0, using the
INTERFACE statement on TCPIPF:
OSA20C0 Device name, which must match port name (port 0 of CHPID 04) in TRLE
OSA20C0LNK The link name of port 0 of CHPID 04
192.168.3.30 The IP address of port 0 of CHPID 04
After all of the definitions are added to VTAM and TCP/IP, you can activate the configuration,
which requires completing these tasks:
1. Verify that the devices are online.
2. Activate the VTAM resources.
3. Activate TCP/IP.
Example 4-4 Output of the z/OS command to check OSA port devices related to CHPID 04
IEE457I 15.30.54 UNIT STATUS 421
UNIT TYPE STATUS VOLSER VOLSTATE
20C0 OSA A-BSY
20C1 OSA A
20C2 OSA A-BSY
20C3 OSA A-BSY
20C4 OSA O
20C5 OSA O
20C6 OSA A-BSY
20C7 OSA O
20C8 OSA A-BSY
20C9 OSA A-BSY
20CA OSA O
20CB OSA O
20CC OSA O
20CD OSA O
20CE OSA O
20CF OSAD O-RAL
All devices (read, write, data, and OSA-Express Network Traffic Analyzer) are either active or
online for each OSA port. If the devices are not online, use the vary command:
V (20C0-20CF),ONLINE
Example 4-6 on page 40 shows the status of port 0 of the OSA-Express5S 10GbE device,
which we defined with the INTERFACE statement. Again, to display the status, use the D
TCPIP,TCPIPE,NETSTAT,DEV command.
As you can see, the output differs slightly, for example showing the VMAC address of this
OSA-Expresss5S port.
To determine the devices that are used and allocated by TCP/IP, you must display the VTAM
TRLE. Example 4-8 on page 41 shows the TRLE of port 0 (CHPID 04) of the active
TRLE LNCTL=MPC, *
READ=20C6, *
WRITE=20C7, *
DATAPATH=(20C8,20CB), *
PORTNAME=OSA20C6, *
PORTNUM=1, *
MPCLEVEL=QDIO
Although the Open Systems Adapter Support Facility (OSA/SF) is not required because all
definitions are set dynamically, you need to use the OSA/SF for monitoring and controlling the
OSA port.
For more information about installing and using OSA/SF, see Appendix E, “Using the Open
Systems Adapter Support Facility” on page 191.
The necessary definitions for CHPID 04 and CHPID 07 are also shown in the IOCP and
input/output configuration data set (IOCDS) format in 3.2.4, “Generating the IOCDS input
from the HCD” on page 27.
To dynamically change the MIH value, use either of the following commands:
SET MITIME 20C1 00:15 (for a single device)
SET MITIME 20C0-20CF 00:15 (for a range of devices)
To demonstrate the setup for OSA connectivity, we use only the first CHPID of each
OSA-Express5S 1000BASE-T and OSA-Express5S 10GbE feature with the associated port
or ports. In a production environment, both CHPIDs should be used and the ports should be
connected to at least two different Ethernet switches to avoid single points of failure.
The TCP/IP stack for z/VM user ID TCPIP2 has one port that is defined to it to show how all
OSA-Express4S and OSA-Express5S features that support only one port per CHPID are
configured.
Note: Although DEVICE and LINK statements are still supported, the INTERFACE
statement has more functions and is preferable.
Example 5-1 shows the TCP/IP profile definitions of the stack for z/VM user ID TCPIP for both
OSA-Express5S 1000BASE-T ports from CHPID 04. The device addresses are 20C0 (port 0)
and 20C6 (port 1).
Example 5-2 shows the TCP/IP profile definitions of the stack for z/VM z/VM user ID TCPIP2
for one OSA-Express5S 10GbE port from CHPID 07. The device address is 2160.
Notice that PORTNUMBER 00 is the default value. Therefore, it does not need to be defined
in the DEVICE statement.
5.5 Activation
Normally, the CHPID should be online. If it is offline, configure it to online by using the
following command:
VARY ON CHPID 04
After all the definitions are added to TCP/IP, you can activate the configuration, which
includes these tasks:
Verify that the devices are online
Activate TCP/IP devices
QUERY CHPID 07
Path 07 online to devices 2160 2161 2162 2163 2164 2165 2166 2167
Path 07 online to devices 2168 2169 216A 216B 216C 216D 216E 216F
All devices that are necessary for our environment are online. If the devices are not online,
you can use the VARY ON command:
VARY ON 20C0-20CF
The QUERY OSA ALL command also shows the OSAD device (20CF and 216F) for each
adapter (see Example 5-4).
Example 5-5 shows the status of the OSA-Express5S 1000BASE-T devices for z/VM user ID
TCPIP. OSA devices 20C0 and 20C6 are in a ready state, 20C0 is using port 0, and 20C6 is
using port 1.
Example 5-6 on page 49 shows the status of the OSA-Express5S 10GbE devices for z/VM
user ID TCPIP2. OSA device 2160 is in a ready state and using port 0.
The NETSTAT HOME command can be used to display IPv4 and IPv6 home addresses. See
Example 5-7 for the server named TCPIP and Example 5-8 for z/VM user ID TCPIP2.
netstat home
VM TCP/IP Netstat Level 630 TCP/IP Server Name: TCPIP
This chapter does not cover the setup process for an OSA CHPID running in default mode,
using the default OSA Address Table (OAT). That information is in Appendix G, “TCP/IP
Passthru mode” on page 219.
z/OS LPAR
TCP/IP
VTAM
Channel Subsystem
OAT Table
OSA-Express4S
1000BASE-T Connectivity definitions:
Port 0 Port 1
- TCP/IP Passthru
- SNA
Ethernet
In the following topics, we describe what components must be configured and activated to
use any type of OSA port in non-QDIO mode:
Hardware definitions
Creating and activating the OSA configuration
Customizing the z/OS network environment
Example 6-1 on page 53 shows the IOCP definitions that are used for CHPID 06. For future
use, we defined 15 OSA devices, although only three are needed in our configuration.
CNTLUNIT CUNUMBR=0040,PATH=((CSS(1),06)),UNIT=OSA
IODEVICE ADDRESS=(0040,15),UNITADD=00,CUNUMBR=(0040),UNIT=OSA
IODEVICE ADDRESS=004F,UNITADD=FE,CUNUMBR=(0040),UNIT=OSAD
When the Activate option is selected from OSA/SF, the OSA configuration file and OAT are
downloaded to the OSA, using the FE unit address (OSAD device). After they are
downloaded, the OSA ports are automatically disabled and re-enabled. This causes the OSA
hardware to be reset. It also activates the new OSA configuration.
VTAM
XCA Node
OAT
XCAOSAX3
START OF OSA ADDRESS TABLE
Switch Maj. SWOSAX3
--------------------------
OSA-Express4S 1000BASE-T
Ethernet
Creating (adding) and saving an OSA port configuration is not disruptive. The only time that a
definition can have an effect on the OAT configuration is when the Activate option is
selected.
OSA/SF
For creating and activating the OSA configuration and OAT, you can use OSA/SF. There are
two versions: HMC and operating system-based interface. OSA-Express4S devices are
supported by either interface. Earlier OSA devices are supported only on the OS-based
interface. Later OSA devices must use the HMC interface.
For the HMC version, see Open Systems Adapter/Support Facility on the Hardware
Management Console, SC14- 7580. For the OS-based interface version, see Chapter 8,
OSA-Express Customer’s Guide, SA22-7935.
The OSA port is defined as a local area network (LAN) Channel Station (LCS) to TCP/IP. An
LCS uses two devices for TCP/IP operation.
Example 6-2 shows the XCA major node definitions that are used for this connection.
CUADDR= Channel unit Code the device number that is defined for this port. In our
004A address example, VTAM uses device number 004A for port 0.
SAPADDR=04 Service access Code a value that is a multiple of 4. This address must be
point address unique for each VTAM communicating with a port. Use
different SAP addresses if a port is shared by multiple
VTAMs. See the SAPADDR value of XCAOSAX3.
DIAL=YES Switched peripheral You must code DIAL=YES to specify that the switched line
node control protocol is required.
Note: The current OSA features support 4096 SNA PU Type 2 connections per port on
System zEC12 servers.
MODETAB=MTAPPC Logon mode table Code a separate logon mode table for
APPC.
Figure 6-2 on page 54 shows the network and the connections for our configuration example.
Port 0 is connected to an Ethernet LAN, using IP address 192.168.4.3.
Tip: The required TCP/IP definitions are in Example 6-4 on page 58.
Note: Although the OSA port is addressed by the device number, the port number in the
LINK statement must match the actual OSA port number.
Example 6-4 shows the TCP/IP PROFILE definitions that are needed to define OSA to
TCP/IP A.
D U,,,0040,2
IEE457I 11.03.53 UNIT STATUS 173
UNIT TYPE STATUS VOLSER VOLSTATE
0040 OSA A-BSY
0041 OSA A
D U,,,004A,1
IEE457I 11.04.33 UNIT STATUS 177
UNIT TYPE STATUS VOLSER VOLSTATE
004A OSA A
Figure 6-3 z/OS Display U command
If they are not online, enter the z/OS console VARY command:
V (0040,0041,004A),ONLINE
D NET,E,ID=XCAOSAX3
IST097I DISPLAY ACCEPTED
IST075I NAME = XCAOSAX3, TYPE = XCA MAJOR NODE 704
IST486I STATUS= ACTIV, DESIRED STATE= ACTIV
IST1021I MEDIUM=CSMA/CD,ADAPNO= 0,CUA=004A,SNA SAP= 4
IST1885I SIO = 54 SLOWDOWN = NO
IST654I I/O TRACE = OFF, BUFFER TRACE = OFF
IST1656I VTAMTOPO = REPORT, NODE REPORTED - YES
IST170I LINES:
IST232I L004A000 ACTIV
IST232I L004A001 ACTIV
IST232I L004A002 ACTIV
IST314I END
Figure 6-4 Display of XCA major node
Figure 6-5 shows the results from the switched major node.
D NET,E,ID=SWOSAX3
IST097I DISPLAY ACCEPTED
IST075I NAME = SWOSAX3, TYPE = SW SNA MAJ NODE 707
IST486I STATUS= ACTIV, DESIRED STATE= ACTIV
IST1656I VTAMTOPO = REPORT, NODE REPORTED - YES
IST084I NETWORK RESOURCES:
IST089I OSASW TYPE = PU_T2 , CONCT
IST089I OSASWL1 TYPE = LOGICAL UNIT , CONCT
IST089I OSASWL2 TYPE = LOGICAL UNIT , CONCT
IST314I END
Figure 6-5 Display of switched major node
OSA/SF is a useful tool when verifying your setup. Example 6-5 shows the TCP/IP Passthru
and the SNA devices for CHPID 06.
Example 6-5 Excerpt of the OAT showing the TCP/IP Passthru and SNA devices
START OF OSA ADDRESS TABLE
--------------------------
Example 6-6 on page 62 shows another excerpt of the Query CHPID 06 command. We
verified that our configuration was active and the mode that was configured.
See Appendix D, “Useful setup and verification commands” on page 183, for a list of other
useful commands.
This chapter does not cover the setup process for an OSA CHPID running in default mode,
using the default OSA Address Table (OAT). That information can be found in Appendix G,
“TCP/IP Passthru mode” on page 219.
z/VM LPAR
TCP/IP
VTAM
Channel Subsystem
OAT Table
OSA-Express4S
1000BASE-T Connectivity definitions:
Port 0 Port 1
- TCP/IP Passthru
- SNA
Ethernet
The following elements must be configured and activated to use any type of OSA port in
non-QDIO mode:
Hardware definitions
OSA configuration and OAT definitions
Network definitions
Example 7-1 on page 65 shows the input/output configuration program (IOCP) definitions that
we used for CHPID 06. For future considerations, we defined 15 OSA devices, although only
three are necessary in our configuration.
When the Activate option is selected from OSA/SF, the OSA configuration file and OAT are
downloaded to the OSA, using the FE unit address (OSAD device). After they are
downloaded, the OSA CHPID is automatically configured offline to all systems and then
configured online. This causes the OSA hardware to be reset. It also activates the new OSA
configuration.
In this chapter, we use the configuration that is shown in Figure 7-2 on page 66.
Ethernet Switch
192 .1 68.3.2
SNA term inal
For information about installing and customizing OSA/SF for the z/VM operating system, as
well as the user interface (OSA/SF operating system-based interface or OSA/SF GUI), see
the OSA-Express Customer’s Guide and Reference, SA22-7935.
If you want to use the OSA/SF OS-based command interface, you can follow the steps in
Appendix F, “Using the OSA/SF operating system-based interface” on page 211.
TCP/IP and VTAM coexist and share the OSA port. The definitions can be done
independently, as though the OSA port were owned by VTAM or TCP/IP exclusively.
The OSA port is defined to TCP/IP as a LAN Channel Station (LCS). An LCS uses two
devices for TCP/IP operation.
VTAM sees the OSA port as an external communications adapter (XCA). One OSA port is
linked to one device for SNA operation.
Example 7-2 and Example 7-3 show the VTAM coding to implement the connections. The
PORT parameters map to the OAT entries is defined in Example 7-6 on page 73.
Table 7-1 XCA major node port definition for XCAP0 and XCAP1
Required Explanation Remarks
parameters
CUADDR= Channel unit address Code the device number defined for this port. In our
004A (or 004B) example, VTAM uses device number 004A for port 0.
SAPADDR=08 Service access point Code a value that is a multiple of 4. This address must
address be unique for each VTAM that communicates with a
port. Use different SAP addresses if a port is shared by
multiple VTAMs. See the SAPADDR value of XCAOSAX3
in Chapter 6, “Non-QDIO mode for the IBM z/OS
operating system” on page 51.
Table 7-2 XCA major node group definition for XCAP0 and XCAP1
Required Explanation Remarks
parameters
DIAL=YES Switched peripheral You must code DIAL=YES to specify that the switched line
node control protocol is required.
Note: The current OSA features in System zEC12 servers support 4096 SNA PU Type 2
connections per port.
Figure 7-2 on page 66 shows the network and the connections for our configuration example.
Port 0 is connected to an Ethernet switch, using IP address 192.168.4.20, while port 1 is
using IP address 192.168.4.30. These parameters map to the OAT entries that are defined in
Example 7-6 on page 73.
1. Define one DEVICE statement per OSA port. Use the even device number of the two device
numbers that are assigned in the hardware to the port.
Using the DEVICE statement, define the DEVICE statement name, the DEVICE type (LCS)
for the OSA port, and the DEVICE number (the read number, which is the even number).
Note: Although the OSA port is addressed by the device number, the port number in
the LINK statement must match the actual OSA port number.
3. Define the HOME IP address of the OSA port (the IP address refers to the LINK statement
name).
4. Define static routes through the GATEWAY statement.
5. Define one START command per DEVICE name.
After defining an OSA device in the TCP/IP profile, the device must still be started. There
is one TCP/IP START statement entry per TCP/IP device. It uses the DEVICE statement
name.
Example 7-4 shows the TCP/IP PROFILE definitions for an OSA port.
CP Q OSA
OSA 0044 ATTACHED TO TCPIP01 0044 DEVTYPE OSA CHPID 06 OSE
OSA 0045 ATTACHED TO TCPIP01 0045 DEVTYPE OSA CHPID 06 OSE
OSA 0046 ATTACHED TO TCPIP01 0046 DEVTYPE OSA CHPID 06 OSE
OSA 0047 ATTACHED TO TCPIP01 0047 DEVTYPE OSA CHPID 06 OSE
OSA 004A ATTACHED TO VTAM 004A DEVTYPE OSA CHPID 06 OSE
OSA 004B ATTACHED TO VTAM 004B DEVTYPE OSA CHPID 06 OSE
Figure 7-3 z/VM Q OSA command
If they are not online, enter the z/VM console VARY ON on command:
VARY ONLINE 004A 004B
netstat dev
VM TCP/IP Netstat Level 630ssssss TCP/IP Server Name: TCPIP01
OSA/SF is also useful for the verification of your setup. We used the OSA/SF administration
user, OSADMIN2, and the ioacmd command. Example 7-6 on page 73 shows both the TCP/IP
Passthru and the SNA devices for our OSA CHPID 06.
Example 7-7 shows another extract of the OSA/SF query for CHPID 06. We verified that our
configuration was active and that the mode configured was correct.
See Appendix D, “Useful setup and verification commands” on page 183, for a list of other
helpful commands.
Additionally the device number of the write device has to be the successor (+1) of the device
number of the read device.
Chapter 8. QDIO and non-QDIO modes for the IBM z/VSE operating system 77
78 OSA-Express Implementation Guide
9
VMAC support enables an OSA interface to have not only a physical MAC address but also
multiple virtual MAC addresses for each device or interface in the stack. Each stack can
define up to eight VMACs per protocol (IPv4 or IPv6) for each OSA interface.
Using VMACs, forwarding decisions in the OSA can be made without having to involve the
OSI Layer 3 level (network layer / IP layer). From the LAN perspective, the OSA interface with
a VMAC appears as a dedicated device or interface to a TCP/IP stack. Packets that are
destined for a TCP/IP stack are identified by an assigned VMAC address, and packets sent to
the LAN from the stack use the VMAC address as the source MAC address. This means that
all IP addresses associated with an IBM z/OS TCP/IP stack are accessible by using their own
VMAC addresses rather than sharing a single physical MAC address of an OSA interface.
10.1.2.0/24
10.1.2.11 vmac1
10.1.2.41 vmac4
Switch
Connect to 10.1.2.31
Connect to 10.1.2.41
This simplifies a shared OSA configuration significantly. Defining VMACs uses few system
resources. It is an alternative to Generic Route Encapsulation (GRE) or network address
table (NAT) when load balancing technologies are used.
For IPV6, TCP/IP uses the VMAC address for all neighbor discovery address resolution flows
for that stack’s IP addresses. Likewise, it uses the VMAC as the source MAC address for all
IPv6 packets that are sent from that stack. From a LAN perspective, the OSA interface with a
VMAC appears as a dedicated device to that stack.
Note: VMACs supersede primary and secondary routing. VMAC definitions on a device in
a z/OS TCP/IP stack override any NONRouter, PRIRouter, or SECRouter parameters. If
necessary, selected stacks on a shared OSA can define the device with VMAC and others
can define the device with PRIRouter and SECRouter capability.
Note: Allow the OSA to generate the VMACs rather than assigning an address in the
TCP/IP profile. If VMACs are defined in the TCP/IP profile, they must be defined as locally
administered MAC addresses and must be unique to the LAN where they reside.
Note: To enable virtual MAC support, you must be running at least an IBM System z9®
Enterprise Class (z9EC) or System z 9 Business Class (z9BC) system and have an
OSA-Express feature with OSA Layer 3 virtual MAC support.
VTAM VTAM
Portname OSA20C0 OSA20C6 Portname OSA20C0 OSA20C6
OSA20C0 OSA20C6
OSA-Express5S 1000BASE-T
Ethernet
Switch
We shared an OSA-Express5S 1000BASE-T feature (CHPID 04) between the TCPIPF and
TCPIPE stacks.
Note: Figure 9-2 is used only for demonstration purposes. We do not recommend
implementing any configuration with a single point of failure.
If VMAC is defined without a MAC address 2, OSA generates a VMAC by using a part of the
burned-in MAC address of the OSA. (We intentionally specified ROUTEALL here, which is the
default for demonstration purposes only.)
You can also specify the MAC address for VMAC 1. as we did when defining OSA port 0 of the
OSA-Express5S 1000BASE-T feature. If you decide to specify a MAC address, it must be a
locally administered address, which means that bit 6 of the first byte is 1 and bit 7 of the first
byte is 0.
Example 9-2 DEVICE/LINK (port 0) and INTERFACE (port 1) VMAC definition for TCPIPE
DEVICE OSA20C0 MPCIPA
LINK OSA20C0LNK IPAQENET OSA20C0 VMAC 020087654321 1
;
INTERFACE OSA20C6I
DEFINE IPAQENET
PORTNAME OSA20C6
IPADDR 192.168.5.130/24
MTU 1492
VMAC ROUTEALL
;
HOME
192.168.3.130 OSA20C0LNK
BEGINROUTES
ROUTE DEFAULT 192.168.3.1 OSA20C0LNK MTU 1492
ROUTE 192.168.3.0 255.255.255.0 = OSA20C0LNK MTU 1492
ROUTE 192.168.5.0 255.255.255.0 = OSA20C6I MTU 1492
ENDROUTES
Note: There is no need to define PRIRouter or SECRouter in the DEVICE statement. Also,
when VMAC is specified on the LINK statement, PRIRouter and SECRouter are ignored.
9.2.1 Verification
We verified that our VMACs were correctly defined in TCPIPF (see Example 9-3) and
TCPIPE (see Example 9-4 on page 86).
We specified a MAC address 1 for the OSA-Express5S 1000BASE-T port 0 in TCPIPF and
TCPIPE, so VMACORIGIN is CFG 2. Because we did not specify a MAC address for the
OSA-Express5S 1000BASE-T port 1 in TCPIPF and TCPIPE, the OSA generated the MAC
address 3. Because this is an OSA-generated MAC address, VMACORIGIN is OSA 4.
We can also see the VMAC in the OSA Address Table (OAT) that is queried by Display OAT
entries on the Hardware Management Console (HMC), as shown in Figure 9-3 on page 87
and Figure 9-4 on page 87. OSA registers all IP addresses (including Virtual IP Addresses, or
VIPAs) in the z/OS TCP/IP stack, and maps them to the VMAC address.
Notice that the last 3 bytes of the OSA-generated VMAC 7 are identical to that of the universal
MAC address, the burned-in address of the OSA 5 (see Figure 9-5 on page 88). The first byte
of the OSA-generated VMAC is always 02, which is to make the VMAC a locally administered
address. To make the VMAC unique among all z/OS TCP/IP stacks, the second and third
bytes are used as a counter that is incremented each time that OSA generates a MAC
address.
The OSA-Express5S does not support the Open Systems Adapter Support Facility (OSA/SF)
GUI, but we displayed OAT entries on the HMC, as shown in Figures Figure 9-3 on page 87
and Figure 9-4 on page 87.
Figure 9-4 The details of View OSA Address Table (OAT) entry
This chapter briefly explains the concepts of VLANs and provides examples of how to set up
VLAN support in the TCP/IP stacks of IBM z/OS, IBM z/VM, and IBM Linux on System z
operating systems. It covers the following topics:
10.1, “VLAN overview” on page 90
10.2, “General VLAN design considerations” on page 93
10.3, “VLAN support for the IBM z/OS operating system” on page 96
10.4, “VLAN support in the IBM z/VM operating system” on page 104
10.5, “VLAN support for the z/VSE operating system” on page 106
10.6, “VLAN support for the Linux operating system” on page 107
Figure 10-1 shows an example of VLANs segmented into logically defined networks.
Switch 2
Switch 1
Trunk mode
Trunk mode indicates that the switch should allow all VLAN ID tagged packets to pass
through the switch port without altering the VLAN ID. This mode is intended for servers that
are VLAN-capable, so the switch filters and processes all VLAN ID tagged packets. In trunk
mode, the switch is programmed to receive VLAN ID-tagged packets that are inbound to the
switch port.
Access mode
Access mode indicates that the switch should filter on specific VLAN IDs and allow only
packets that match the configured VLAN IDs to pass through the switch port. The VLAN ID is
then removed from the packet before it is sent to the server. That is, VLAN ID filtering is
controlled by the switch. In access mode, the switch is programmed to receive packets
without VLAN ID tags that are inbound to the switch port.
Hybrid mode
Hybrid mode is a combination of the previous two modes. This is a port where both
VLAN-aware and VLAN-unaware devices are attached. A hybrid port can have both tagged
and untagged frames.
Figure 10-2 shows a logical diagram of a VLAN environment with two switches and several
VLANs.
VLAN 101
Server
HUB 1
TRUNK PORT
Switch 1 Switch 2
This example illustrates two of the usual reasons that VLANs are used:
Staff in different locations retains common access to resources.
The server is used by staff in both buildings. By defining these workstations on the same
VLAN, no additional configuration or equipment is required for either location to access the
Linux server, yet you ensure that other staff do not have access.
Consolidation of resource access.
The external network must be accessed by different staff in both buildings. Extending
VLAN 102 across to Switch 1 avoids having to provide another link from the other building.
Broadcast in VLANs
All ports that are members of the same VLAN, including trunk ports, operate as though they
are part of the same physical network. When a multicast or broadcast frame is received from
a device on a particular VLAN, the switch transmits the frame to all ports (both trunk and
access ports) that belong to the same VLAN.
The only difference between the trunk and access port, in this case, is that the frame
transmitted to the trunk port has the VLAN tag intact so that the VLAN-aware equipment at
the other end of the link knows how to handle it.
VLAN isolation
VLANs provide isolation. VLANs behave like separate physical networks, even if they are
within the same switch.
For devices in different VLANs to communicate, IP routing must occur. In the network that is
shown in Figure 10-2 on page 91, workstations in VLAN 100 and VLAN 101 cannot
communicate because there is no routing path between the two VLANs. Workstations in
VLANs 100 and 102 can communicate if the IP router to which they are attached is configured
appropriately.
Important: Some Ethernet switch vendors use VLAN ID 1 for vendor-specific purposes or
as the default VLAN ID. Therefore, avoid the use of VLAN ID 1.
IBM z/OS VLAN support allows a TCP/IP stack to register up to eight VLAN IDs for both IPv4
and IPv6 for the same OSA port. VLAN IDs for IPv4 can be different from the VLAN ID for
IPv6.
When a VLAN ID is configured to an OSA port in the TCP/IP stack, the following actions
occur:
The TCP/IP stack becomes VLAN-aware or enabled, and the OSA port is considered to
be part of a VLAN.
During activation, the TCP/IP stack registers the VLAN ID value to the OSA port.
A VLAN tag is added to all outbound packets.
The OSA port filters all inbound packets that are based on the configured VLAN ID.
Tip: Create and maintain diagrams of your physical and logical LAN layout. These
diagrams can be helpful when configuring your VLANs and for problem determination.
If a VLAN ID is not configured to an OSA port (VLAN tagging and VLAN ID filtering are not
performed), access mode must be configured at the Ethernet switch port with the appropriate
VLAN ID.
Figure 10-4 shows an example of trunk mode compared to access mode, with four VLANs
deployed through two shared OSA ports. The TCP/IP stacks operate as though they have
their own unique and isolated networks:
VLAN 100 - IP-stack #1 and clients 1 and 2
VLAN 200 - IP-stack #2 and clients 3 and 4
VLAN 300 - IP-stack #3 and clients 5 and 6
VLAN 400 - IP-stack #4 and #5, and IP router (for access beyond that LAN segment)
OSA #1 OSA #2
VLAN aware Trunk connection for VLAN unaware Access connection for
(Tagged frames) VLAN 100, 200 and 300 (Untagged frames) VLAN 400
Router
Clients 1 and 2 Clients 3 and 4 Clients 5 and 6
IP stacks #4 and #5 do not have a VLAN ID defined, and therefore are unaware of the
existence of VLAN IDs and VLAN tagging. The Ethernet switch port to which OSA port #2 is
connected is configured in access mode.
IP stacks #1, #2, and #3 are configured with a VLAN ID, which will be registered with OSA
port #1. Notice that the Ethernet switch port in this case is configured in trunk mode. Also
notice that VLAN-aware and VLAN-unaware IP stacks are not defined to the same OSA port.
10.1.0.1/24 10.2.0.1/24
LINUX1 LINUX2 z/OS
OSA OSA
Figure 10-5 OSA port that is shared between two stacks in the same VLAN
VMAC support enables an OSA interface to have not only a physical MAC address but also
distinct virtual MAC addresses for each device or interface in a stack.
Tip: If your OSA ports are shared across multiple TCP/IP routing stacks, we strongly
suggest using VMAC in your environment. It can simplify network infrastructure and avoid
PRIROUTER or SECROUTER setup issues when sharing a port between multiple LPARs.
See Chapter 9, “IBM z/OS virtual MAC support” on page 79 for more details about VMAC.
Note: On the System z EC12 server, multiple VLAN IDs on a single OSA port are
supported by z/OS V2R1 TCP/IP and Linux on System z TCP/IP stacks.
Multiple VLAN IDs defined to a single OSA port are not supported by z/VM in native mode.
However, guest systems that are running under z/VM are supported.
Note: The stack supports a maximum of eight VLANs for each OSA port and each IP
version (IPv4 and IPv6). This function is limited to OSA features in QDIO mode (CHPID
type OSD) that support the Layer 3 Virtual MAC address (VMAC) function.
Remember that if the OSA port is connected to an Ethernet switch port that is defined to run
in access mode, then no VLAN definitions are required in the z/OS TCP/IP profile.
To define an OSA port in QDIO mode, see Chapter 4, “QDIO mode for the IBM z/OS
operating system” on page 31 for details.
Interface 1/0/15 5 and 8(Trunk mode) OSA (CHPID 04) port 1(20C6)
We altered the configuration of the Ethernet switch to support four VLANs: 3, 5, 6, and 8.
Switch port interface 1/0/13 supports VLAN3 and connects to port 0 of OSA-Express5S
1000BASE-T. Switch port interface 1/0/15 supports VLAN 5 and VLAN 8 and connects to port
1 of OSA-Express5S 1000BASE-T. We added VLAN 6 to port 1/0/26 for the OSAExpress5S
10GbE port 0. Example 10-1 on page 98 shows the configuration of the Netgear switch.
interface 1/0/13
vlan pvid 3
vlan participation include 3
vlan tagging 3
exit
interface 1/0/15
bandwidth 1000000
vlan pvid 5
vlan participation include 5,8
vlan tagging 5,8
ip mtu 1500
exit
interface vlan 3
bandwidth 1000
description 'vlan 3'
routing
ip address 192.168.3.1 255.255.255.0
ip mtu 1500
exit
interface vlan 5
bandwidth 1000
description 'vlan 5'
routing
ip address 192.168.5.1 255.255.255.0
ip mtu 1500
exit
interface vlan 8
bandwidth 1000
description 'vlan 8'
routing
ip address 192.168.8.1 255.255.255.0
ip mtu 1500
exit
10GB
interface 1/0/26
no auto-negotiate
vlan tagging 3
exit
interface vlan 6
bandwidth 1000
description 'Vlan 6'
routing
ip address 192.168.6.1 255.255.255.0
ip mtu 1500
exit
Example 10-3 shows the TRLE definition for our second OSA-Express5S 1000BASE-T.
To use multiple VLANs for our OSA, we needed to configure a separate INTERFACE to the
OSA for each VLAN. See Example 10-5 on page 100 for the INTERFACE definitions in
TCPIP. Each of these interfaces requires a separate DATAPATH device in the TRLE definition.
We activated our Transport Resource List (TRL) major node before TCP/IP starts its QDIO
device. You can activate the corresponding TRL minor node with this VTAM command:
V NET,ACT,ID=OSA20C0 and V NET,ACT,ID=OSA20C6
Example 10-4 Extract of the TCPIP profile that shows the definitions for OSA (port 0)
DEVICE OSA20C0 MPCIPA
LINK OSA20C0LNK IPAQENET OSA20C0 VLANID 3
;
HOME
192.168.3.31 OSA20C0LNK
;
BEGINROUTES
ROUTE DEFAULT 192.168.3.1 OSA20C0LNK MTU 1492
ROUTE 192.168.3.0 255.255.255.0 = OSA20C0LNK MTU 1492
ENDROUTES
;
START OSA20C0
Note: Changing from DEVICE and LINK to INTERFACE statements is strongly suggested in
z/OS Version 1, Release 10 and newer releases.
Example 10-5 shows the TCPIP profile definition for OSA-Express5S 1000BASE-T (port 1).
Notice that the two interface definitions are using the same port name, OSA20C6.
Example 10-5 Extract of our TCPIP profile that shows the definitions for port 1
INTERFACE OSA20C6I
DEFINE IPAQENET
PORTNAME OSA20C6
IPADDR 192.168.5.131/24
VLANID 5
VMAC ROUTEALL
;
INTERFACE OSA20C7I
DEFINE IPAQENET
PORTNAME OSA20C6
IPADDR 192.168.8.131/24
VLANID 8
VMAC ROUTEALL
;
BEGINROUTES
ROUTE DEFAULT 192.168.5.1 OSA20C6I MTU 8992
ROUTE 192.168.5.0 255.255.255.0 = OSA20C6I MTU 8992
ROUTE 192.168.8.0 255.255.255.0 = OSA20C7I MTU 8992
ENDROUTES
;
START OSA20C6I
START OSA20C7I
SOURCEVIPAINT
The SOURCEVIPAINTERFACE parameter must point to the link name of a static VIPA. For
interfaces that are defined by using DEVICE/LINK/HOME, source VIPA selection continues to
work, based on the ordering of the home list.
10.3.3 Verification
After activation, we verify that the VLAN IDs in our z/OS TCP/IP environment are defined
correctly, by issuing the z/OS d tcpip,tcpipf,netstat,dev command. See Example 10-6 for
the output regarding OSA-Express5S 1000BASE-T port 0.
Example 10-6 Results of the netstat dev command for OSA port 0
DevName: OSA20C0 DevType: MPCIPA
DevStatus: Ready
LnkName: OSA20C0I LnkType: IPAQENET LnkStatus: Ready
Speed: 0000001000
IpBroadcastCapability: No
CfgRouter: Non ActRouter: Non
ArpOffload: Yes ArpOffloadInfo: Yes
ActMtu: 8992
VLANid: 3 VLANpriority: Disabled
DynVLANRegCfg: No DynVLANRegCap: Yes
ReadStorage: GLOBAL (4096K)
InbPerf: Balanced
ChecksumOffload: Yes SegmentationOffload: No
SecClass: 255 MonSysplex: No
Routing Parameters:
MTU Size: n/a Metric: 00
DestAddr: 0.0.0.0 SubnetMask: 255.255.255.0
Multicast Specific:
...
The OSA device OSA20C0 (port 0) shows the status ready and the VLANID 3 is assigned.
Now, we verify that OSA device OSA20C6 is working properly. Again, we issue the z/OS d
tcpip,tcpipe,netstat,dev command. See Example 10-7 on page 102 for the output
regarding OSA-Express5S 1000BASE-T (port 1).
The output proves that both OSA interfaces OSA20C6I and OSA20C7I are up and ready.
Each interface has its VLANID assigned and we can discover the two datapath devices that
TCP/IP has allocated: 20C9 for OSA20C6I and 20CA for OSA20C7LNK. The VMAC
addresses are shown as well.
Displaying the OSA Address Table can help you in your installation, even if you are running
OSA in QDIO mode only. Here is an example. In Figure 10-7 on page 103 we used HMC to
show the contents of the OAT:
To check the VLAN assignment, select the device. Then, in the Select Action pull-down,
choose Details. Figure 10-8 shows the details for device 20C9. Its VLAN ID is 5.
Figure 10-8 Device 20C9 details from the OSA Address Table Entry.
10.4.2 Verification
After activation, we used the netstat dev command to verify that the VLAN ID in our z/VM
TCP/IP environment was defined correctly (see Example 10-8).
In Example 10-9 on page 106, we show the output of the netstat tap tcpip2 home
command. This displays the home addresses of TCP/IP2.
We successfully tested the connection from z/OS SC30 to z/VM by using the ping command.
In a Layer 3 configuration, VLANs can be transparently used by IPv6/VSE and TCP/IP for the
IBM VSE/ESA (Virtual Storage Extended/Enterprise Systems Architecture) operating system.
If you want to configure VLANs for OSA-Express (CHPID types OSD and OSX) devices in a
Layer 2 configuration that carries IPv6 traffic, you require the IPv6/VSE from Barnard
Software, Inc.
You can use one of the following ways to configure your system to use VLAN:
Configure one or more VLANs in the TCP/IP stack of IPv6/VSE by using the LINK
command. For details of IPv6/VSE commands, see IPv6/VSE Installation Guide,
SC34-2616.
Generate and catalog phase IJBOCONF containing the global VLANs to be used with
your OSAX devices. z/VSE provides skeleton SKOSACFG to generate phase IJBOCONF.
The VLANs contained in IJBOCONF can be transparently used for Layer 3 links by
IPv6/VSE and TCP/IP for VSE/ESA. See z/VSE Planning, SC34-2635 for details.
Example 10-10 on page 107 shows a sample configuration that sets VLAN ID 200 for
Device D00.
VLAN support is usually built as a module called 8021q.o. Use the insmod or modprobe
command to load the module before you attempt to use VLAN support. To load the module by
using the modprobe command, you enter:
# modprobe 8021q
Note: If the OSA port is connected to an Ethernet switch port that is defined to run in
access mode, then no VLAN definitions are required for the Linux TCP/IP stack.
A VLAN is defined for an existing Ethernet interface. The vconfig command is used to add or
remove a VLAN configuration for a defined Ethernet interface.
Linux commands
On LNXSU1 and LNXRH1, we defined the VLAN configurations and brought up the interfaces
by using the following commands:
LNXSU1
vconfig add eth1 3
ifconfig eth1.3 192.168.3.103 netmask 255.255.255.0 up
LNXRH1
vconfig add eth2 6
ifconfig eth2.6 192.168.3.113 netmask 255.255.255.0 up
Startup configuration
Configuring VLANs is a manual process that must be scripted to take place when the Linux
guests are booted. As VLAN use grows, you can expect Linux distributors to include VLAN
boot-time configuration in their network scripts.
10.6.2 Verification
We verified the VLAN definitions with the ifconfig command on LNXSU1 and LNXRH1.
Example 10-11 shows the results from LNXRH1.
We successfully tested the connections from z/OS SC30 to LNXSU1 and to LNXRH1 by
using the ping command.
The virtual switch can operate at Layer 2 (the data link layer) or Layer 3 (the network layer) of
the OSI model.
In this chapter, the following topics describe the elements and capabilities of the virtual switch
with OSA Ethernet features and explain how to implement Layer 2 support, VLAN support,
and port isolation:
11.1, “Virtual switch description” on page 112
11.2, “Our VSWITCH environment” on page 116
11.3, “Configuring a Layer 2 VSWITCH” on page 118
11.4, “Configuring VLAN support” on page 128
11.5, “Enabling port isolation” on page 137
11.6, “VEPA mode” on page 139
By default, the virtual switch operates in IP mode (Layer 3) and data is transported within IP
packets. Each guest system is identified by one or more IP addresses for the delivery of IP
packets. All outbound traffic that is destined for the physical portion of the LAN segment is
encapsulated in Ethernet frames, with the MAC address of the OSA port as the source MAC
address. With inbound traffic, the OSA port strips the Ethernet frame and forwards the IP
packets to the virtual switch for delivery to the guest system, based on the destination IP
address within each IP packet.
When operating in Ethernet mode (Layer 2), the virtual switch uses a unique MAC address for
forwarding frames to each connecting guest system. Data is transported and delivered within
Ethernet frames. This method can transport both TCP/IP and non-TCP/IP-based application
data through the virtual switch. The address resolution process allows each guest system’s
MAC address to become known to hosts on the physical side of the LAN segment through an
attached OSA port. All inbound or outbound frames that pass through the OSA port have the
guest system’s corresponding MAC address as the destination or source address.
The switching logic resides in the z/VM Control Program (CP), which owns the OSA port
connection and performs all data transfers between guest systems that are connected to the
virtual switch and the OSA port (see Figure 11-1).
Real
Virtual Switch Device
Ethernet
Switch
OSA Port
In this chapter, we concentrate primarily on the OSA Layer 2 support. We highlight the
Ethernet mode (Layer 2) capabilities of a z/VM virtual switch (VSWITCH) and the definitions
that are required to implement such an environment.
In the remainder of this section, we describe the elements that make up the virtual switch and
its capabilities.
Two VSWITCH controllers (DTCVSW1 and DTCVSW2) come predefined with the base
installation of z/VM Version 5, Release 3 and later releases. They are started during the IPL
of the z/VM system through user AUTOLOG1. Both controllers are monitored by TCP/IP and
get restarted if they become unresponsive.
Note: Unlike previous networking configurations that deployed a guest LAN with a router
virtual machine TCP/IP stack, there is no requirement to define any IP addresses or
devices in the TCP/IP stack for the VSWITCH controller virtual machines.
Each guest system that is going to connect to a virtual switch needs to have at least one
virtual NIC defined. After it is defined, this NIC can be connected to the virtual switch. To the
guest operating system, the NIC devices look like a range of OSA devices. The NIC can be
defined permanently with a z/VM user directory statement or temporarily (for the life of the
guest system) by using CP commands. These CP commands are typically put into the guest
system’s PROFILE EXEC data set, along with the required COUPLE of the QDIO NIC to an
existing VSWITCH, virtual HiperSockets LAN, or real HiperSockets LAN.
MAC addresses
A MAC address provides the identification for Ethernet frames that are transported across a
LAN segment. A virtual NIC is assigned a locally defined MAC address by z/VM software
when it is created. These locally generated MAC addresses are visible across the physical
portion of the LAN segment through an OSA port when the VSWITCH is running in Layer 2
mode.
You can specify which MAC addresses are locally generated and assigned to each guest.
system. This is done by using a combination of the VMLAN statement (in SYSTEM CONFIG) and
the NICDEF statement (in the user directory).
The VMLAN statement contains a MACPREFIX parameter, which you can use to specify a 3-byte
ID prefix for all MAC addresses in the z/VM system. The VMLAN parameter MACIDRANGE
controls the range of identifiers that can be used by CP when generating the unique identifier
component of a virtual NIC’s MAC address.
In the user directory, a NICDEF statement is added for each guest that connects to the virtual
switch. You can use the MACID parameter of NICDEF to specify a unique identifier that is
appended to the MACPREFIX to form a unique MAC address for that guest system. If MACID is
omitted, CP generates a unique identifier that is based on the range that is specified in the
IP mode
In this mode, the virtual switch operates at Layer 3 (Network Layer) of the OSI model. IP
addressing is used in IP mode to transport TCP/IP application data. The virtual switch works
with the Layer 3 support of the OSA Ethernet features to communicate with hosts in an IP
network. By default, the virtual switch operates in IP mode.
Ethernet mode
In this mode, the virtual switch operates at Layer 2 (data link layer) of the OSI model. Because
Ethernet mode uses MAC addressing to forward frames, it is protocol-independent. This
provides the ability to transport both TCP/IP and non-TCP/IP application data (such as SNA,
DECnet, IPX, or NetBIOS). The virtual switch works with the Layer 2 support of the OSA
Ethernet features to communicate with hosts on a physical LAN segment to which the OSA
port is connected.
With Ethernet mode, the path length for transporting data is reduced because there is no
need to traverse an extra layer up the protocol stack. For this reason and for the functional
benefits, we suggest using the VSWITCH in Ethernet mode.
VLAN support
VLAN capability in the VSWITCH is based on IEEE standards 802.1p/Q and is supported by
OSA Ethernet features that are running in QDIO mode. VLAN support works with both Layer
2 and Layer 3 transport modes in the VSWITCH.
The purpose of VLANs is to provide logical isolation. Therefore, VLANs behave like separate
physical networks, even if they are within the same switch or VSWITCH. In order for devices
in different VLANs to communicate, IP routing must occur.
The VLAN protocol uses additional information in the Ethernet header that is stored after the
destination and source MAC address. The information marks the frame as one that contains a
VLAN ID. This technique is known as tagging.
Delivery of frames that are tagged with a VLAN ID is controlled by the physical switch or
VSWITCH, not by the devices that are connecting to the same infrastructure.
How the VSWITCH is defined (with or without the VLAN option) determines whether it is
VLAN aware or VLAN unaware.
The VSWITCH supports two VLAN mode types: access mode and trunk mode. These modes
specify whether the VSWITCH applies a VLAN tag (access mode) or expects the VLAN tag
(trunk mode) to be applied by the connected guest system.
Access port definitions work with a Layer 2 or a Layer 3 VSWITCH. Only one VLAN ID can be
used for each access port.
Trunk port definitions work with a Layer 2 and a Layer 3 VSWITCH. Multiple VLAN IDs can be
assigned to each trunk port.
Port isolation minimizes the security risk by separating and isolating frames within the
VSWITCH and preventing guest systems that share the VSWITCH from communicating with
each other.
When port isolation is turned on, traffic is also blocked between those guest systems that
share the VSWITCH and OSA port. All network traffic is forced to pass through the physical
OSA port. Only routing outside of the IBM System z server allows connectivity to the
VSWITCH. This is also true for multiple VSWITCHes that share OSA port and for connections
to other logical partitions that share OSA port.
In the z/VM operating system, these links are OSA ports that are grouped on a VSWITCH
that is operating in Ethernet mode (Layer 2) and given a group name. From the VSWITCH
perspective, the group is treated as a single link for external connectivity. A port group on the
VSWITCH conforms to the Link Aggregation Group (LAG) defined by IEEE 802.3ad.
When OSA ports are grouped into a LAG, they can no longer be share with other operating
systems or LPARs. After an OSA port is removed from the group, it can be shared again.
Link aggregation in the VSWITCH works only in ETHERNET mode and has the following
requirements:
All OSA ports in the LAG must be connected to the same external Ethernet switch.
The external Ethernet switch must support the IEEE 802.3ad standard.
All ports must run in full duplex mode and use the same speed setting.
For single port per CHPID (OSA features), all defined devices must be inactive on all
LPARs. This includes the z/VM LPAR where the VSWITCH is running.
For multiport per CHPID (OSA- features), if only one port is used for link aggregation, then
the other ports can be used for other VSWITCHs or TCP/IP stacks.
For more information about these topics and z/VM communication services and concepts,
see z/VM Connectivity Version 6 Release 3, SC24-6174.
Two virtual switches were configured in the z/VM LPAR with two virtual controllers (primary
and backup). The OSA ports were attached to the virtual switches to provide connectivity
from the guest systems to the external LAN.
Under z/VM, two Linux guest systems were configured, as Figure 11-2 shows:
LNXSU1 (SUSE Linux Enterprise Server [SLES] 11 SP2)
LNXRH1 (Red Hat Enterprise Linux Server release 6.4)
L2VSW1
VTAM / TRL L2VSW2
Ethernet Switch
T = Trunk Mode
A = Access Mode
Note: Figure 11-2 is a multipurpose diagram that is used throughout the remainder of this
chapter.
Tip: Check the appropriate Preventive Service Planning buckets (PSP) buckets for
required APARs and PTFs before implementing the VSWITCH in your environment.
To validate our VSWITCH environment, we used OSA/SF and various system commands.
You will find examples of their use in the subsequent sections of this chapter.
L2VSW1
VTAM / TRL2
20C0-20C2 20C3-20C5 L2VSW2
Ethernet Switch
T = Trunk Mode
A = Access Mode
Note: Definitions that are made in the z/VM SYSTEM CONFIG file can be added to the
PROFILE EXEC of the user AUTOLOG1. The AUTOLOG virtual machine is automatically logged on
as part of the z/VM IPL sequence and is a convenient way to make definitions permanent.
A virtual switch is created by using the CP DEFINE VSWITCH command from any z/VM Class B
user (such as MAINT, TCPMAINT, or AUTOLOG1), or by adding the following definition to the
SYSTEM CONFIG file:
DEFINE VSWITCH L2VSW1 RDEV 20C0 2043 ETHERNET
DEFINE VSWITCH L2VSW2 RDEV 2046 20C3 ETHERNET
The ETHERNET parameter indicates that the virtual switch operates in Ethernet mode and
provides Layer 2 functionality. The virtual switch is connected to two OSA port, CHPID 04
(devices 20C0-20C2) and CHPID 00 (devices 2043-2045).
Devices 2043-2045 are for a secondary interface to be used if there is a problem with the
primary interface (devices 20C0-20C2).
The switchname is the name of the virtual switch, and the operands define the attributes of
the virtual switch.
Add VMLAN
In addition, you can add a VMLAN statement to the CP SYSTEM CONFIG file, which overrides the
system-wide MAC address definitions that are used when generating local MAC addresses
for the individual NIC devices the guest systems use. We used the default system generated
MAC address settings because we had only a single z/VM system in our environment.
In this statement, operands means the attributes to be set for all z/VM guest LANs in the
system. The definitions in Example 11-1 can be used to modify the default VMLAN values.
Tip: If you run multiple z/VM systems on a System z server, change the MACPREFIX of each
system to avoid MAC address duplication.
See CP Commands and Utilities Reference, SC24-6081 for all operands accepted by the
commands that are used in the chapter.
To add, change, or remove authorizations of guest systems, the z/VM CP provides the
Class B command SET VSWITCH switchname.
This function can also be performed by an external security manager (ESM), such as the IBM
Resource Access Control Facility (RACF®). For more information about the use of an ESM,
see Appendix K, “Authorization in the IBM z/VM operating system” on page 251.
Alternative: To dynamically link your guest systems to the virtual switch, use the DEFINE
NIC and COUPLE commands. See “Defining and coupling a NIC using CP commands” on
page 187.
The NICDEF statement defines virtual OSA devices, which are fully simulated by the VM CP.
Example 11-5 shows a sample user directory entry for our Linux guests that connect to the
VSWITCH (L2VSW1).
Example 11-5 NICDEF statements for Linux guests that are connecting to L2VSW1
USER LNXSU1 LNX4ITSO 2G 4G G
NICDEF 8000 TYPE QDIO LAN SYSTEM L2VSW1
In this statement, vdev specifies the base virtual device address for the adapter, and operands
defines the characteristics of the virtual NIC.
Note: We could have made all of our changes dynamically by issuing the configuration
commands directly from MAINT or any other Class B user ID. Dynamic changes are useful
when you are unable to do an IPL of z/VM software or if the changes are only temporary.
Check authorization
To check the access list of the authorized user IDs for the virtual switch, use the QUERY
VSWITCH switchname application control command (ACC) command (see Example 11-9 on
page 123).
Notice that the default MAC address, 02-00-00-00-00-72, was assigned by the system.
11.3.5 Creating definitions for Layer 2 support: SUSE and Red Hat Linux
For Layer 2 support, an OSA QDIO device must be attached and defined to the Linux version
that is running on a System z. We used a virtual NIC with addresses 8000, 8001, and 8002 that
were coupled or attached to the VSWITCH L2VSW1.
To verify the virtual NIC already defined to the Linux, you can use the lscss command (see
Example 11-11)
The /var/log/messages file contains entries that show the status of the OSA devices (see
Example 11-13).
The interface name is eth1 and should be online. Use the following command to check:
cat /sys/bus/ccwgroup/drivers/qeth/0.0.8000/online
The output should be 1 if the device is online. If the output is 0, you must issue the following
command to bring it online:
echo 1 > /sys/bus/ccwgroup/drivers/qeth/0.0.8000/online
After the interface is registered successfully, the network definitions can be created by using
this command:
ifconfig eth1 192.168.3.100 netmask 255.255.255.0 up
On the z/VM side, we verified the connection by using the QUERY VSWITCH command, as
shown in Example 11-14 on page 125.
Notice that both LNXSU1 and LNXRH1 are connected to the virtual switch (L2VSW1). Also, you can
see the system-generated MAC addresses.
We used the ping command to verify connectivity between LNXSU1 and LNXRH1 over the virtual
switch.
To test our environment, we issued ping commands between LNXSU1, LNXRH1, and the
workstations connected through an OSA port that were attached to an Ethernet switch.
Alternative: We could define the Linux guests as Dynamic Host Configuration Protocol
(DHCP) clients to request IP addresses from a DHCP server that is running on the LAN.
This works because the Linux guests’ MAC addresses are visible to both the internal and
external segments of the LAN.
Configuring a Linux device has changed from using /etc/chandev.conf to the use of the
sysfs structure. Scripts in /etc/sysconfig/hardware and /etc/sysconfig/network/ for
SUSE, along with /etc/sysconfig/network-scripts/ for Red Hat, configure the qeth devices
and network definitions.
In addition to making permanent definitions by using the appropriate scripts, those definitions
can also be made dynamically. See Device Drivers, Features, and Commands, SC33-8289
for details.
SUSE SLES 11 has two locations where the final hardware-related and network-related
configuration files are stored. These locations will not change.
Hardware-related definitions are stored in this path:
/etc/sysconfig/hardware
Network interface definitions are stored in this path:
/etc/sysconfig/network
You must decide whether to use one of the existing interfaces or create a new interface.
In our environment, we created a new member for device address 8000. SUSE uses file
names that are created from the type of hardware, combined with the hardware address.
OSA QDIO devices are named hwcfg-qeth-bus-ccw-0.0.8000.
On our SUSE system, we created the hardware configuration member in Example 11-15 on
page 127 for the NIC 8000 device.
The network definition file for NIC device 8000 is shown in Example 11-16.
BOOTPROTO='static'
IPADDR='192.168.3.100'
BROADCAST=''
STARTMODE='auto'
NAME='ITSO OSA Express5S Network card (0.0.8000)'
USERCONTROL='no'
NETMASK='255.255.255.0'
We created a configuration file for the new device with address x’8000’. Red Hat Enterprise
Linux (RHEL) uses file names that start with ifcfg- concatenated with the Linux interface
name. For example, OSA QDIO devices are called:
ifcfg-eth1
On our Red Hat system, we created the configuration file for the NIC 8000 device, as shown in
Example 11-17 on page 128.
Previously, our configuration traversed the virtual switch fabric without the use of VLAN IDs.
These are the next objectives:
Add VLAN functionality to the environment (z/VM and z/OS)
Verify the VLAN environment
Show VLAN connectivity between the virtual switch, Linux guest systems, and the z/OS
TCP/IP stacks
VLAN 3, 5, 6
Ethernet Switch
T = Trunk Mode
A = Access Mode
Define
Virtual Switch
Define
YES Porttype NO Virtual Switch
Authorize Guest
access to
Trunk (Access Mode default Porttype
? and default & VLAN ID
......
VLAN ID )
Define Done
Virtual Switch
(Trunk Mode) SET VSWITCH L2VSW1 GRA LNXSU1
Go to flowchart in:
Figure 11-6 DEFINE VSWITCH L2VSW1 RDEV 20C0 2043 CONR * ETH VLAN 10 PORTT TRUNK
on page 131
The VLAN ID and port type values that are used in the DEFINE VSWITCH command are
inherited by the guest systems when it is attaching to the virtual switch.
To add VLAN support to the virtual switch, add parameters on the DEFINE VSWITCH command.
We configured our virtual switch as a trunk port with a default VLAN ID of 10 as shown in
Example 11-18. For more information about VLAN standards and support, see Chapter 10,
“VLAN support” on page 89.
Another operand that can be specified when you defining a VLAN-aware virtual switch is
NATive. This keyword and value specifies the native VLAN ID to be associated with untagged
frames received and transmitted by the virtual switch. If this option is omitted, the default
VLAN is used as the native VLAN ID. Usually, the same native VLAN ID as your real switch
must be used. The default for most Ethernet switches is 1.
11.4.2 Authorize Linux guests access to the virtual switch with VLAN IDs
You must update the access authorization for the Linux guests to include VLAN capabilities.
With the set vswitch command, you can authorize access for guests and change the default
values for a virtual switch that is defined as a trunk port. For assistance with the VLAN port
type configuration options and granting access, see the flowchart shown in Figure 11-6 on
page 131.
YES NO
YES
Prepare
Authorize Guest Authorize Guest LINUX
access with access with new Authorize Guest Setup
default Portype Porttype and access with new
& VLAN ID VLAN ID Porttype
...... ...... .....
Done
For our environment, we revoked all access and then authorized each guest to have access
to the virtual switch by using the SET VSWITCH command (see Example 11-19). Notice the
VLAN parameters and absence of the PORTTYPE parameter. The port type was determined
in the VSWITCH definition (from Example 11-18 on page 130).
Important: For the virtual switch to identify the correct VLAN and IP address that is
allocated to the Linux guest, it is important to define eth’x’ with an IP address of 0.0.0.0
using the ifconfig eth’x’ 0.0.0.0 up command. Failure to do so results in the virtual
switch incorrectly associating the VLAN ID with the eth’x’ interface IP address. By
specifying an IP address of zero, the eth’x’ interface presents the appropriate VLAN
interface IP address to the virtual switch.
Important: Ensure that your Linux guest system is at the appropriate kernel version. See
10.4, “VLAN support in the IBM z/VM operating system” on page 104, for details.
When configuring a virtual switch with VLAN capabilities, you can select either access mode
or trunk mode. We configured our environment in trunk mode to show the Layer 2 and VLAN
capabilities of the virtual switch with the OSA ports and Ethernet switch. For more information
about VLAN support and access mode and trunk mode, see Chapter 10, “VLAN support” on
page 89.
For the shell scripts to define a VLAN interface, see Device Drivers, Features, and
Commands, SC33-8289. You can download it from this web page:
http://download.boulder.ibm.com/ibmdl/pub/software/dw/linux390/docu/l26cdd03.pdf
The scripts work the same way in SUSE and Red Hat versions of Linux. See Example 11-20
for the SUSE results and Example 11-21 for the Red Hat results.
To create the VLAN definition member for the VLAN ID, copy one of the QDIO Ethernet
definition files, and name the new member ifcfg-ethx, concatenated with the VLAN ID.
Remove definitions from the file that relate to hardware, keeping only the statements that are
network-related (see Example 11-22). Add your network definitions and the
ETHERDEVICE=’interface name’ statement to the file. The ETHERDEVICE statement links the
definition file to the actual network interface.
To create the VLAN definition member for the VLAN ID, copy one of the QDIO Ethernet
definition files and name the new member ifcfg-ethx, concatenated with the VLAN ID.
Remove definitions from the file that relate to hardware, keeping only the statements that are
network-related (Example 11-23). Add your network definitions, the DEVICE=’interface
name’ statement, and VLAN=yes to the file. The DEVICE statement links this definition file to the
actual network interface.
11.4.5 Configure trunk mode in the Ethernet switch for the OSA connections
In the Ethernet switch, we defined trunk mode for port 2/7, which was directly connected to
the OSA port (CHPID 04) on the z/VM LPAR (Example 11-25). Port 1/2 was connected to the
OSA port (CHPID 04) on the z/OS LPAR, which was previously set to trunk mode.
We checked the virtual switch to see the list of authorized user IDs. In Example 11-26 on
page 135, notice the VLAN-specific information that is displayed.
Next, we displayed the virtual switch to verify that our new VLAN information was defined
correctly (see Example 11-27). Notice the VLAN and the Porttype information. Toward the
bottom of the display under the Adapter Owner sections, the Linux guests now show a Trunk
port type.
We looked at the interface configuration for LNXSU1 and LNXRH1, respectively. The changes in
these displays are the absence of IP addresses on the eth1 interface. Only the VLAN
interfaces (subinterfaces) are associated with a valid IP address. The VLAN interfaces (IDs)
use the real interface (eth1) to communicate with the LAN over the virtual switch. During this
process, the eth1 interface adopts the IP address of the VLAN interface to establish
connectivity to the virtual switch and beyond.
The configurations were displayed on the Linux guests with the ifconfig command.
Example 11-28 shows the results for LNXSU1.
We then issued ping commands from LNXSU1 and LNXRH1 to the IP addresses assigned to the
appropriate VLAN IDs for the z/OS LPAR. In all cases, we received a positive response, which
indicates a working infrastructure between the systems.
Lastly, we tried to ping the IP addresses that were not defined to the individual VLANs and
vice versa. As expected, they were unsuccessful, verifying the intended isolation of the
environment.
Port isolation works with a VSWITCH that is either in IP mode (Layer 3) or Ethernet mode
(Layer 2). If a VSWITCH has isolation set to on, guest systems that have a NIC connected to
it cannot exchange data with each other. That is also true for two or more VSWITCHs with
isolation set on that are sharing OSA port or ports.
In this section, we verified that the following actions occur when VSWITCH port isolation is
set to on:
1. Packets between guest systems that are attached to the VSWITCH are dropped.
2. Packets that are destined for the VSWITCH guest ports from any LPAR that is sharing the
connected OSA ports are dropped.
3. Packets from the VSWITCH that are destined for any LPAR that is sharing the connected
OSA ports are dropped.
Figure 11-7 depicts the environment that we used to verify port isolation. Our VSWITCH is
VLAN-aware only because we specified VLANs in our TCP/IP stacks, but this is not a
prerequisite. We also added IP routing to our external Ethernet switch to allow connectivity
between the VLANs.
VLAN 3, 5, 6
Ethernet Switch
T = Trunk Mode
A = Access Mode
All of the definitions for this environment are described in 11.3, “Configuring a Layer 2
VSWITCH” on page 118 and 11.4, “Configuring VLAN support” on page 128.
New feature for port isolation: See 11.6, “VEPA mode” on page 139 for more about the
new feature called Virtual Ethernet Port Aggregator (VEPA).
The SET VSWITCH L2VSW1 ISOL OFF command can be used to disable port isolation.
We used the ping command to verify connectivity between the z/OS LPAR, LNXSU1, and
LNXRH1 (by using the virtual switch). All pings were successful, as expected.
VEPA eliminates the need to provide and support these network-based appliances in the
hypervisors and LPARs. The IEEE 802.1Qbg standard includes a way for an adjacent (Layer
2) switch to support a VEPA mode with a virtual switch through a reflective relay (also known
as a hairpin turn). This enables packets that are received on the switch port to be “reflected”
back on the same switch port.
The VEPA ON option in the SET VSWITCH command can be used to place the virtual switch into
VEPA mode. Similar to ISOLATION ON, VEPA mode affects all internal guest-to-guest
communications (unicast, broadcast, and multicast traffic), along with the virtual switch’s
Uplink RDEV data connection. Figure 11-8 illustrates a VEPA environment.
LP AR L1 LP AR L2 LPA R L3
Partner
NIC Port 0
switch
with
OS A-E f irewall
QDIO Connecti on in
VEP A mode Swi tch in Re fl ective Rel ay mode
In VEPA mode, there are no direct communications between guests that are coupled to the
VSWITCH (E1, E2, E3). All communication is forwarded to the partner switch. Also, there are
no direct communications between sharing connections on the OSA feature and the
VEPA ON requires an Ethernet virtual switch (without a Bridge port) with OSA uplinks that
support VEPA, and the partner switch must support reflective relay.
If guest port isolation is also required, you must use the SET VSWITCH ISOLATION ON
command. This command does not attempt to isolate the RDEV connections within the port
group, but it ensures that the backup RDEV connection is isolated when it is activated during
a failover incident. Similarly, SET VSWITCH VEPA ON must be configured if policy enforcement is
to be provided by the physical switch.
MM 62.5 µm 33 m (200)
Table A-2 shows the numbers of I/O features that are supported on zEC12 systems.
You can choose either of these settings for the OSA-Express5S 1000BASE-T Ethernet
feature port:
Auto-negotiate
100 Mbps full-duplex
If you are not using auto-negotiate, the OSA port attempts to join the LAN at the specified
speed. If this does not match the speed and duplex mode of the signal on the cable, the OSA
port does not connect.
LAN speed can be set by using the OSA Advanced Facilities function of the Hardware
Management Console (HMC). The explicit settings override the OSA feature port’s ability to
auto-negotiate with its attached Ethernet switch.
Each OSA-Express5S 1000BASE-T CHPID can be defined as CHPID types OSD, OSE,
OSC, OSN, or OSM. See 1.1.1, “Operating modes” on page 3, for details about modes of
operation and supported traffic types. The following Ethernet standards are applicable for this
feature:
1000BASE-TX (standard transmission scheme)
– IEEE 802.3u
1000BASE-T (standard transmission scheme)
– IEEE 802.1p
– IEEE 802.1q
– IEEE 802.3ab
– IEEE 802.3ac
– IEEE 802.3u
– IEEE 802.3x
– DIX Version 2
Statement of direction: The zEC12 and zBC12 are planned to be the last System z
servers to support IEEE 802.3 Ethernet frame types. All OSA-Express features on future
System z servers are planned to support DIX Version 2 (V2) exclusively.
The OSA-Express5S 10GbE LR feature does not support auto-negotiation to any other speed
and runs in full duplex mode only. OSA-Express5S 10GbE LR supports 64B/66B encoding,
The one port of the OSA-Express5S 10GbE LR feature has one CHPID assigned and can be
defined as type OSD or OSX. See 1.1.1, “Operating modes” on page 3, for details about
modes of operation and supported traffic types.
The following Ethernet standards are applicable for the 10GBASE-LR (standard transmission
scheme) feature:
IEEE 802.3ae
IEEE 802.1q
IEEE 802.3x - flow control
DIX Version 2
Statement of direction: The zEC12 and zBC12 are planned to be the last System z
servers to support IEEE 802.3 Ethernet frame types. All OSA-Express features on future
System z servers are planned to support DIX Version 2 (V2) exclusively.
The OSA-Express5S 10GbE SR feature does not support auto-negotiation to any other
speed and runs in full duplex mode only. OSA-Express5S 10GbE SR supports 64B/66B
encoding, whereas GbE supports 8B/10 encoding, making auto-negotiation to any other
speed impossible.
The one port of the OSA-Express5S 10GbE SR feature has one CHPID assigned and can be
defined as type OSD or OSX. See 1.1.1, “Operating modes” on page 3, for details about
modes of operation and supported traffic types.
The following Ethernet standards are applicable for the 10GBASE-SR (standard transmission
scheme) feature:
IEEE 802.3ae
IEEE 802.1q
IEEE 802.3x - flow control
DIX Version 2
Statement of direction: The zEC12 and zBC12 are planned to be the last System z
servers to support IEEE 802.3 Ethernet frame types. All OSA-Express features on future
System z servers are planned to support DIX Version 2 (V2) exclusively.
The two ports of the OSA-Express5S GbE LX (long range) feature share a channel path
identifier (CHPID type OSD, exclusively). The use of both ports on a two-port CHPID requires
support by the operating system. See 1.1.1, “Operating modes” on page 3, for details about
modes of operation and supported traffic types.
The OSA-Express5S GbE LX feature does not support auto-negotiation to any other speed
and runs in full duplex mode only
The following Ethernet standards are applicable for the 1000BASE-LX (standard transmission
scheme) feature:
IEEE 802.3ac
IEEE 802.1q
IEEE 802.3x
IEEE 802.3z
DIX Version 2
Statement of direction: The zEC12 and zBC12 are planned to be the last System z
servers to support IEEE 802.3 Ethernet frame types. All OSA-Express features on future
System z servers are planned to support DIX Version 2 (V2) exclusively.
The two ports of the OSA-Express5S GbE SX feature share a channel path identifier (CHPID
type OSD exclusively). The use of both ports on a two-port CHPID requires support by the
operating system. See 1.1.1, “Operating modes” on page 3, for details about modes of
operation and supported traffic types.
The OSA-Express5S GbE SX feature does not support auto-negotiation to any other speed
and runs in full duplex mode only.
The following Ethernet standards are applicable for the 1000BASE-SX (standard
transmission scheme) feature:
IEEE 802.3ac
IEEE 802.1q
IEEE 802.3x
IEEE 802.3z
DIX Version 2
The two ports of the OSA-Express4S 1000BASE-T feature have one CHPID assigned, so the
two ports share one CHPID number. The use of both ports on a two-port CHPID requires
support by the operating system.
You can choose any one of the following settings for the OSA-Express4S 1000BASE-T
Ethernet feature port:
Auto-negotiate
100 Mbps half-duplex
100 Mbps full-duplex
1000 Mbps full-duplex
If you are not using auto-negotiate, the OSA port attempts to join the LAN at the specified
speed and duplex mode. If this does not match the speed and duplex mode of the signal on
the cable, the OSA port does not connect.
LAN speed and duplex mode can be set explicitly by using OSA/SF or the OSA Advanced
Facilities function of the Hardware Management Console (HMC). The explicit settings
overrides the OSA feature port’s ability to auto-negotiate with its attached Ethernet switch.
Each OSA-Express4S 1000BASE-T CHPID can be defined as CHPID type OSD, OSE, OSC,
OSN, or OSM. See 1.1.1, “Operating modes” on page 3, for details about modes of operation
and supported traffic types. The following Ethernet standards are applicable for this feature:
The OSA-Express4S 10GbE LR feature does not support auto-negotiation to any other speed
and runs in full duplex mode only. OSA-Express4S 10GbE LR supports 64B/66B encoding,
whereas GbE supports 8B/10 encoding, which makes auto-negotiation to any other speed
impossible.
The one port of the OSA-Express4S 10GbE LR feature has one CHPID assigned and can be
defined as type OSD or OSM. See 1.1.1, “Operating modes” on page 3, for details about
modes of operation and supported traffic types.
The following Ethernet standards are applicable for the 10GBASE-LR (standard transmission
scheme) feature:
IEEE 802.3ae
IEEE 802.1q
IEEE 802.3x - flow control
DIX Version 2
The OSA-Express4S 10GbE SR feature does not support auto-negotiation to any other
speed and runs in full duplex mode only. OSA-Express4S 10GbE SR supports 64B/66B
encoding, whereas GbE supports 8B/10 encoding, which makes auto-negotiation to any other
speed impossible.
The two ports of the OSA-Express4S GbE LX feature share a channel path identifier (CHPID
type OSD exclusively). The use of both ports on a two-port CHPID requires support by the
operating system. See 1.1.1, “Operating modes” on page 3, for details about modes of
operation and supported traffic types.
The OSA-Express4S GbE LX feature does not support auto-negotiation to any other speed
and runs in full duplex mode only.
The following Ethernet standards are applicable for the 1000BASE-LX (standard transmission
scheme) feature:
IEEE 802.3ac
IEEE 802.1q
IEEE 802.3x
IEEE 802.3z
DIX Version 2
The two ports of the OSA-Express4S GbE SX feature share a channel path identifier (CHPID
type OSD exclusively). The two ports of the OSA-Express5S 1000BASE-T feature have one
CHPID assigned, so the two ports share one CHPID number. The use of both ports on a
two-port CHPID requires support by the operating system. See 1.1.1, “Operating modes” on
page 3, for details about modes of operation and supported traffic types.
The OSA-Express4S GbE SX feature does not support auto-negotiation to any other speed
and runs in full duplex mode only.
To help problem diagnosis, the Network Traffic Analyzer (NTA) function provides a way to
trace inbound and outbound frames for OSA-Express5S and OSA-Express4S features. The
NTA trace function is controlled and formatted by the z/OS Communications Server, but data
is collected in the OSA at the network port.
Note: To enable the OSA-Express Network Traffic Analyzer, you must be running at least
an IBM System z10® or IBM System z9 server with OSA features in Queued Direct I/O
(QDIO) mode (channel path identifier, or CHPID, type OSD). See the Preventive Service
Planning (PSP) buckets for more information:
IBM zEnterprise EC12, see 2827DEVICE (Enterprise Class) and 2828DEVICE
(Business Class)
IBM zEnterprise 196 system, see the 2817DEVICE (Enterprise Class)
IBM zEnterprise 114 system, see the 2818DEVICE (Business Class)
This section describes the steps for setting up the Network Traffic Analyzer feature:
Determine the microcode level for OSA/OSAExpress5S
Define TRLE definitions
Check TCPIP definitions
Customize Network Traffic Analyzer (NTA)
Define a resource profile in RACF
Allocate a VSAM linear data set
Figure B-1 on page 153 shows the microcode level that is installed in one of our
OSA-Express5 features.
Or, you can issue the D NET,TRL,TRLE=OSA20C0P command; Example B-1 shows the output.
The OSA port needs another DATAPATH statement on the TRL (see Example B-3).
After TCP/IP is started, you can also see the OAT entries by using the HMC. See Chapter 9,
“IBM z/OS virtual MAC support” on page 79 for more information.
Important: Enabling the NTA support could allow tracing of sensitive information.
Therefore, the user ID that will handle the following steps must have the Access
Administrator Tasks role assigned.
2. Select the CPC you want to work with, as shown in Figure B-2.
4. Click the Network Traffic Analyzer Authorization task; see Figure B-4.
7. If your CHPID is shared between several LPARs, we suggest you select the option PORT
as shown in Figure B-5, then click OK. Figure B-6 shows the results.
8. Use these steps to verify whether the command has been set, as required:
– Log off from using the SYSPROG user ID.
– Log on to the SE on the HMC through SOO (see Figure B-2 on page 155).
Important: For checking the authorization of NTA support, the Access Administrator
Tasks role must be assigned to the user ID.
The OSAENTA statement enables an installation to trace data from other hosts that are
connected to the OSA port.
Important: The trace data that is collected should be considered confidential, and TCP/IP
system dumps and external trace files that contain this trace data should be protected.
To see the complete syntax of the OSAENTA command, see z/OS Communications Server: IP
Configuration Reference, SC31-8776.
Note: Update CTINTA00 to set the CTRACE buffer size. Keep in mind that this uses
auxiliary page space storage.
When the ON keyword of the OSAENTA parameter is used, VTAM allocates the next available
Transport Resource List Element (TRLE) data path that is associated with the port. This data
path is used only for inbound trace data.
When the OFF keyword of the OSAENTA parameter is used (or the trace limits of the TIME, DATA,
or FRAMES keyword are reached), the data path is released.
In this case, OSAENTA traces the OSA20C0 port name only for traffic that matches the following
filters:
Protocol = TCP
IP address = 192.168.3.30
Port number = 2323
Note: Use filters to limit the trace records to prevent overuse of the OSA processor
resources, the LPAR processor resources, the TCPIPDS1 trace data space, memory,
auxiliary page space, and the I/O subsystem that is writing the trace data to disk.
The message that you receive in response to this command is shown in Figure B-9.
Important: If you receive ERROR CODE 0003, it means that an attempt was made to
enable Network Traffic Analyzer (NTA) tracing for a specified OSA port but the current
authorization level does not permit it. See “Network Traffic Analyzer controls” in Figure B-4
on page 156 for directions about how to change the authorization to allow NTA to be used
on this specified OSA.
Also, read the Support Element Operations Guide, SC28-6860, for complete information
about this topic.
The NETSTAT display for devices shows the Network Traffic Analyzer interfaces. The
INTFName parameter has prefixed the OSA port name with EZANTA (as described in the next
paragraph).
Traces are placed in an internal buffer, which can then be written by using a CTRACE external
writer. The MVS TRACE command must also be issued for the SYSTCPOT component to activate
the NTA trace.
Attention: If you receive ERROR CODE 0005, it means that an attempt was made to
enable Network Traffic Analyzer tracing for a specified OSA that already has NTA tracing
enabled elsewhere on the system for this OSA. Only one active tracing instance at a time is
permitted on the system for a specified OSA.
When the trace starts, you can see that another device has been allocated to trace. Using the
D NET,TRL,TRLE=OSA20C0P command, as shown in Example B-9, that device is highlighted in
the last line.
4. To display information about the status of the component trace for all active procedures,
issue the following command:
DISPLAY TRACE,COMP=SYSTCPOT,SUBLEVEL,N=8
Example B-11 displays the output.
From the IPCS PRIMARY OPTION MENU, select: 0 DEFAULTS - Specify default dump
and options. See Example B-12 for details.
You may change any of the defaults listed below. The defaults shown before
any changes are LOCAL. Change scope to GLOBAL to display global defaults.
If you change the Source default, IPCS will display the current default
Address Space for the new source and will ignore any data entered in
the Address Space field.
Modify the DSNAME and OPTIONS to match your environment, and then select these options:
2 ANALYSIS Analyze dump contents
7 TRACES Trace formatting
1 CTRACE Component trace
D DISPLAY Specify parameters to display CTRACE entries
Fill in the parameters necessary as shown in Example B-13 on page 165 to format the
OSAENTA trace.
On the command line, entering the S command will show the trace formatted by the IPCS.
Figure B-10 depicts a high-level view of the Network Management Interface (NMI) API and its
interfaces to network management products.
I
CS z/OS and n Local monitor
components
APIs
s
t
r
Commands/Utilities
u
m
e Exit
n point
Exit points
t
a
t
SNMP
i
o
n
z/OS
The NMI API can interface with IBM Tivoli® OMEGAMON® XE for Mainframe Networks (or
other products) to provide the following types of functions:
Trace assistance
– Real-time tracing and formatting for packet and data traces
Information gathering
– TCP connection initiation and termination notifications
– API for real-time access to TN3270 server and FTP event data and to IPSec
– APIs to poll information about currently active connections
– TCP listeners (server processes)
– TCP connections (detailed information about individual connections and UDP
endpoints)
– CS storage use
– API to receive and poll for Enterprise Extender management data
– Information and statistics for IP filtering and IPSec security associations on the local
TCP/IP stacks.
References
See the following publications for more information about the use of logs, standard
commands, tools, and utilities:
z/OS Communications Server: IP System Administrator’s Commands, SC31-8781
z/OS Communications Server: IP Diagnosis Guide, GC31-8782
z/OS Communications Server: IP Configuration Reference, SC31-8776
z/OS MVS Diagnosis: Tools and Service Aids, GA22-7589
z/OS Communications Server: SNA Diagnosis Vol. 1, Techniques and Procedures,
GC31-6850
z/OS Communications Server: SNA Operation, SC31-8779
MVS Installation Exits, SA22-7593
Support Element Operations Guide, SC28-6860
See the z/OS Communications Server web page for support and downloads:
https://ibm.biz/BdRCji
See the Tivoli Information Center for information on IBM Tivoli OMEGAMON XE for
Mainframe Networks:
https://ibm.biz/BdRCj4
Note: These functions are used for troubleshooting under the guidance of IBM Product
Engineering.
Online help is available for each function on the HMC or the SE. You can activate the online
help in two ways:
By clicking Help on the active window
By pressing F1 on the keyboard
To gain access to the advanced facilities, log on to the HMC in system programmer mode
(Figure C-1).
3. The OSA Advanced Facilities window (Figure C-3) opens in the HMC console. Select the
OSA CHPID that you want to work with and click OK.
(The bottom two options are beyond the scope of this book.)
Note: Enabling or disabling the port is also possible with an OSA/SF function.
Note: You can run port diagnostics only if the port is disabled.
This information can be useful in the diagnosis of an OSA-related problem. You might be
asked by the IBM Remote Technical Support Center or your IBM Systems Services
Representative for the OSA code level as part of information that they need to analyze a
problem.
1. In the OSA Advanced Facilities, select View Code Level, and then click OK to see the
View Code Level panel (Figure C-16).
The four-digit code that is displayed varies, depending on the specific microcode EC and
MCL levels that are active in the OSA card. The code changes as microcode maintenance
updates are applied to your IBM zEnterprise EC 12 (zEC12), zEnterprise BC 12 (zBC12),
zEnterprise 196 (z196), or zEnterprise 114 (z114) system by your IBM service
representatives.
2. In the View Code Level panel, click OK to return to the Advanced Facilities window.
You cannot configure channels offline to the whole system with one command from an
operator console when you are running in logical partition (LPAR) mode. We explain the HMC
procedure that is used to configure a CHPID On or Off for all LPARs.
3. After a short time, the HMC displays the Support Element Workplace. Figure C-18 on
page 180 shows an example of that window. The zEnterprise background of the
workplace indicates that you are working in the SE.
a. Read the warning information about configuring channels from the Support Element
function rather than from an available operating system, and then type your password
for confirmation.
Toggle the CHPID if you cannot configure it offline and online from the operating
system in each of the LPARs to which the CHPID is assigned.
• If the channel should be set to Off for all partitions, use Toggle all off.
• If the channel should be set to On for all partitions, use Toggle all on.
• If the channel should not be changed in all partitions, then select the affected
partitions. Clicking Toggle changes the state of the channel.
Note: Before you click Apply in the next step, ensure that only the CHPID or
CHPIDs that you want toggled are highlighted.
b. In all cases, click Apply to immediately change the channel state to what you want.
6. The Configure On/Off Progress window briefly displays the In progress message. When
the message changes to Complete, click OK.
Command Description
D TCPIP Lists TCP/IP stacks that have started since the last
initial program load (IPL) and stack status
Command Description
Table D-3 lists some of the Virtual Telecommunications Access Method (VTAM) commands in
z/OS. For a complete list and description, see SNA Operation, SC31-8779.
Command Description
Important: If your static Transport Resource List Element (TRLE) definition is incorrect,
remember that an active TRLE entry cannot be deleted. In such cases, you can use these
steps:
1. Vary activate the TRL node with a blank TRLE to delete previous entries.
2. Code the correct TRL with correct TRLE entries and definitions.
3. Vary activate this corrected TRL and TRLE node.
Command Description
Q OSA ACTIVE|ALL Displays the status of Open Systems Adapter (OSA) devices
Q PATHS rdev|rdev-rdev Displays the path status to real devices (PIM, PAM, LPM)
SET MITIME rdev|rdev-rdev mm:ss Sets the MIH time for device or devices
VARY OFF|ON CHPID cc Configures a CHPID Off or On to both hardware and software
Command Description
NETSTAT OBEY START|STOP DEV Starts or stops the device name that is identified in NETSTAT
DEV output
IFCONFIG (z/VM6.3) Displays the TCP/IP devices and links (similar to the NETSTAT
DEV command, but has other uses; see note)
Note: The IFCONFIG command can help to temporarily modify network interfaces in the current
TCP/IP stack. See z/VM TCP/IP Planning and Customization, SC24-6238 for detailed uses. For more
information about the other z/VM TCP/IP commands, see the z/VM TCP/IP User’s Guide, SC24-6240.
Command Description
QUERY VSWITCH DETAILS Displays detail information about the virtual switch
Tip: You may choose to use the DEFINE NIC and COUPLE approach rather than the NICDEF
z/VM user directory statement. In this case, consider adding these two commands into
your guest’s PROFILE EXEC file so they run automatically at IPL time or whenever the guest
logs on.
In this syntax, vdev specifies the base virtual device address for the adapter, and operands
defines the characteristics of the virtual NIC. Operands accepted by the DEFINE NIC
command are listed in Table D-7.
TYPE This operand specifies the type of NIC adapter to be created, specifically the
hardware and protocol that the adapter is to emulate. This is an optional keyword
that you can specify with IBM HiperSockets or Queued Direct I/O (QDIO).
HIPERsockets This operand defines this adapter as a simulated HiperSockets NIC. This adapter
functions similar to the IBM HiperSockets internal adapter. A HiperSockets NIC can
function without a z/VM guest LAN connection or can be coupled to a HiperSockets
guest LAN.
QDIO This operand defines this adapter as a simulated QDIO NIC. This adapter functions
similarly to the OSA-Express (QDIO) adapter. A QDIO NIC is functional only when
it is coupled to a QDIO guest LAN.
IEDN This operand defines this adapter as a simulated intraensemble data network
(IEDN) NIC. This adapter functions like an OSA-Express CHPID type OSX adapter
(device model 1732-02) that is connected to an IEDN internal network that is
managed by the Unified Resource Manager. An IEDN NIC is functional only when
it is coupled to an IEDN virtual switch.
INMN This operand defines this adapter as a simulated intranode management network
(INMN) NIC. This adapter functions like an OSA-Express CHPID type OSM adapter
(device model 1732-03) that is connected an INMN internal network that is
managed by the Unified Resource Manager. An INMN NIC is only functional when
it is coupled to an INMN virtual switch.
DEVices devs This determines the number of virtual devices that are associated with this adapter.
For a simulated HiperSockets adapter, devs must be a decimal value between 3 and
3072 (inclusive). For a simulated QDIO, IEDN, or INMN adapter, devs must be a
decimal value between 3 and 240 (inclusive). The DEFINE NIC command creates a
range of virtual devices from vdev to vdev + devs -1 to represent this adapter in your
virtual machine. The default value is 3.
CHPID nn A two-digit hexadecimal number that represents the CHPID number that the invoker
wants to allocate for this simulated adapter. If the requested CHPID number is
available, all of the virtual devices that belong to this adapter share the same CHPID
number. This option is useful only if you need to configure a virtual environment with
predictable CHPID numbers for your simulated devices.
After the NIC is installed, use the COUPLE CP command to connect the adapter to a guest LAN
or virtual switch. This is the syntax of the COUPLE command for this scenario:
COUPLE vdev TO [ operands ]
In this syntax, vdev specifies the base virtual device address for the adapter, and operands
defines where to connect the NIC. Table D-8 lists the operands that are accepted by the
COUPLE command for the purpose of connecting a virtual NIC to a guest LAN.
ownerid lanname The ownerid is the name of the owner of the guest LAN (such as SYSTEM). The
lanname is the name of the guest LAN.
Remember that a virtual NIC can be coupled only to a compatible guest LAN. For example, a
QDIO NIC cannot be coupled to a guest LAN of type HiperSockets.
For Red Hat Enterprise Linux systems, after you define the virtual NICs and couple it to a
vswitch, you need to use the following syntax to issue cio_ignore command to remove the
network channels from the list of ignored devices and make them visible to Linux:
cio_ignore -r read_device_bus_id,write_device_bus_id,data_device_bus_id
cio_ignore -r 0.0.8000,0.0.8001,0.0.8002
Command Description
Note: This operating system-based version of OSA/SF does not support OSA-Express5S
or newer devices. For information on those, see Open Systems Adapter/Support Facility on
the Hardware Management Console, SC14- 7580.
OSA/SF includes a graphical user interface (GUI) and a Restructured Extended Executor
(REXX) interface. The OSA/SF GUI runs on the Microsoft Windows 7 and Linux software
platforms that have graphics and Java 1.6 support. For more information about using the
REXX interface, see Appendix F, “Using the OSA/SF operating system-based interface” on
page 211.
From a single OSA/SF GUI, you can establish connections to all server images (logical
partitions (LPARs)) that have OSA/SF running. You do not need to have OSA/SF running on
each server image. This gives you centralized control of OSA features that span server
boundaries, as shown in Figure E-1 on page 192. You can have GUI instances in each server
image that has OSA/SF, so you can monitor your OSA features locally.
This chapter provides instructions to help you set up and use OSA/SF. It covers the following
topics:
“Setup requirements and overview” on page 192
“Setting up OSA/SF in the z/OS environment” on page 193
“Installing OSA/SF GUI on a workstation” on page 195
“Using the OSA/SF GUI” on page 197
OSA/SF is not required for OSA features that are configured in QDIO mode or when the
default IP Passthru (non-QDIO mode) is used. However, it is very useful for monitoring,
problem determination, and simple performance analysis.
Note: OSA/SF is not supported on CHPID types OSC, OSM, and OSX.
Figure E-1 shows the communication path between the user interfaces and OSA features.
REXX
REXX
OSA/SF Command
Command
GUI Line
Line
(IOACMD)
(IOACMD)
LP A LP B LP 1 LP 2 LP 3
Channel
Subsystem
OSA OSA OSA OSA OSA OSA OSA OSA OSA OSA
This integrated version of OSA/SF is applicable to the in-service releases of IBM z/OS, IBM
z/VM, and IBM z/VSE operating systems.
In the z/OS environment, the integrated version of OSA/SF can coexist with OSA/SF 2.1 and
does not overlay it. The integrated version of OSA/SF for z/VM 5.4 replaces OSA/SF 2.1. In
currently supported versions or releases of z/VM and z/VSE, this version is delivered as a
program temporary fix (PTF) and overlays OSA/SF 2.1. The OSA/SF GUI supports only
TCP/IP connections.
The OSA/SF GUI is common across z/OS, z/VM, and z/VSE operating systems. You can find
examples of how the GUI is used in “Using the OSA/SF GUI” on page 197.
In addition to this book, you can find information about how to set up OSA/SF on z/OS, z/VM,
and z/VSE in the Open Systems Adapter-Express Customer's Guide and Reference,
SA22-7935.
OSA/SF on the HMC is required for the OSA-Express5S features. Either OSA/SF on the HMC
or the OSA/SF operating system component can be used for the OSA-Express4S features.
The OSA/SF operating system component must be used for the OSA-Express3 features.
OSA/SF on the HMC can be used to configure CHPID type OSE. It can also be used to
manage (query or display) CHPID types OSD, OSE, and OSN.
If you need more information about OSA/SF on the HMC, see Open Systems
Adapter/Support Facility on the Hardware Management Console, SC14-7580.
Reminder: The OSAD device must be defined in the Hardware Configuration Definition
(HCD) or input/output configuration program (IOCP) to the OSA CHPID for
OSA/SF-to-OSA communication to work. For an HCD setup example, see 3.2.4,
“Generating the IOCDS input from the HCD” on page 27. For an IOCDS input example,
see Figure 3-1 on page 16.
2. Define an APPC local LU for OSA/SF by editing member APPCPMxx in the SYS1.PARMLIB
and adding the statements that are shown in Example E-2 on page 194.
Note: SYS1.APPCTP is a VSAM data set. It must be allocated by using job ATBTPVSM,
which is included in SYS1.SAMPLIB.
4. For automatic startup of the APPC environment, add the parameters that are shown in
Example E-4 to your COMMNDxx member of SYS1.PARMLIB.
Set up OSA/SF
To set up OSA/SF, use the following steps:
1. Create a started task (STC):
a. Copy the sample procedure from IOA.SIOASAMP(IOAOSASF) to SYS1.PROCLIB.
b. Edit the procedure and change the name to OSASF.
c. Verify that the data set names in the STEPLIB and IOALIB DD statements match your
environment.
2. Create a startup profile for OSA/SF:
a. Allocate a sequential data set.
b. Copy the sample that is provided in IOA.SIOASAMP(IOASPROF) into the sequential data
set that you allocated before.
c. Edit the profile and change SYSNAME and CECNAME to suit your installation (verify UNIT
and VOLSER).
3. Set up the OSA configuration and master profile:
a. Allocate sequential data set IOA.&CECNAME.OSAS.CONFIG, and copy the sample that is
provided in IOA.SIOASAMP(IOACFG) into it.
b. Allocate sequential data set IOA.&CECNAME.MASTER.INDEX, and copy the sample in
IOA.SIOASAMP(IOAINX) into it.
4. Set up a REXX executable data set for use under TSO. Copy member IOACMD from
IOA.SIOASAMP to your local lists or executable data sets.
3. Restart TCP/IP or use the obeyfile TCP/IP subcommand to make these modifications
active.
To start the GUI on a Microsoft Windows system, and follow these steps:
1. Open a new Command Prompt (DOS) window.
2. Change to the directory where the ioajava code resides.
3. Enter the following command from the C:\> command prompt:
java ioajava
Note: This appendix uses the steps from the previous version of this book, because they
have not changed. Also, this GUI is optional for OSA-Express4S and does not work for
OSA-Express5S, both of which use the HMC version.
The Host - Open window (Figure E-2 on page 198) allows you to connect to the OSA/SF host.
When you start the OSA/SF GUI, enter the name of the OSA/SF host system. Although the
window allows access to only a single host system, you can open multiple windows on your
workstation for other host systems.
When the connection is established, you see the Workstation Interface window (Figure E-3 on
page 199). Two panels open when the interface is displayed:
Command Output: This panel shows the result of any command that you entered.
OSA/SF Commands: This GUI is where you enter most REXX commands.
2. Click CHPID View.
3. When the CHPID View window opens, it shows the CHPIDs that are managed by OSA/SF.
Select the one that you want to work with.
For our example, we double-clicked CHPID 0A (highlighted in (Figure E-4).
Now you see the settings for that CHPID, shown in Figure E-5 on page 200. This window
shows, among others things, the following information:
5. For our example, we double-clicked Port 0 for CHPID 0A, as shown in Figure E-6 on
page 201.
Note: As shown in Figure E-6, CHPID 0A has two OSA ports, Port 0 and Port 1.We have
OSA-Express 1000BASE-T cards installed. Those features are 4-port dual-density cards
and allow the configuration and operating of two ports per CHPID.
Now you see the settings that are shown in Figure E-7 on page 202. This window shows the
following information:
The LAN traffic state (enable)
The MAC address
The active speed mode (100 Mbps)
The TCP port name (OSAE200)
Note: The reason that this window shows a speed of 100 Mbs is that this is the maximum
speed that our switch supports. Both the OSA port and the switch negotiate the speed
according to their attributes.
6. To view the packets that are transmitted and received and the error counters, select the
Statistics tab.
7. Figure E-8 on page 203 shows the details of the Statistics tab. Use the scroll bar to see
more statistics.
8. From the OSA/SF Commands panel that is shown in Figure E-3 on page 199, select
Configure OSA CHPID.
d. Here you can apply changes for the configuration of CHPID 0A, as shown in
Figure E-10 on page 205.
Note: When configuring or changing OSA-Express3 features with four ports, make sure
that you select the correct port in the CHPID (such as Port 0 or Port 1).
10.Save your changes now by selecting File and then Save Configuration.
11.To perform the initial configuration, select Activate with install as shown in Figure E-11.
Note: The Install command, from the OSA/SF Commands panel (Figure E-3 on
page 199), can be used to load an existing configuration onto an OSA when you
replace the OSA feature. It is not for the initial installation of an OSA feature.
12.Back in the OSA/SF Commands display (Figure E-3 on page 199), select Query.
The result of your Query command appears in the Command Output window (Figure E-13).
14.From the OSA/SF Commands panel (Figure E-3 on page 199), select Set Parameters.
15.In the OSA/SF Set Parameters window (Figure E-14 on page 207), depending on the type
of feature, you can now set some parameters. We enter the CHPID number as 0A and
select OSA-Express3 - All Types, because we are working with an OSA-Express3
1000BASE-T feature. The only valid action for our 1000BASE-T feature running in QDIO
mode here is to check for the LAN traffic state and do an Enable/Disable command.
Start managing
This causes the copy of OSA/SF that runs in the image where the command is issued to take
over management of the specified CHPID (OSA). If the CHPID is currently managed by a
copy of OSA/SF that is running in another image, you must set the Force indicator (z/OS and
z/VM only).
When this command completes, another copy of OSA/SF that is running on another image is
limited to executing commands to this CHPID that do not change the CHPID’s environment.
Debug
This function of the OSA/SF GUI helps you to troubleshoot OSA problems. As stated in the
Debug OSA window (Figure E-15 on page 208), use these Debug OSA commands only with
assistance from IBM support.
When debugging OSA problems, follow these steps under the guidance of IBM Support:
1. From the OSA/SF Commands window (Figure E-3 on page 199), select CHPID View.
2. From the CHPID View window, click Selected Open Device Information to view
device information, as shown in Figure E-16.
Figure E-16 CHPID View (“Open device information” selected in drop-down menu)
Note: Remember that to be able to use the OSA-Express Network Analyzer function, we
defined an additional unit address during the HCD process. Also, in the VTAM TRLE, we
added a data path (for CHPID 0A, Port 0 the device E203, and Port 1 the device E207).
Both devices are online.
3. From the CHPID View window (Figure E-16 on page 208), click Selected Open OAT
Information.
The OAT Information for CHPID 0A window (Figure E-18 on page 210) shows the
following information:
– The LPAR number
– The OSA port
– The devices that are associated with the IP address. In our example, it shows
192.168.1.64 of our OSA Port 0 and 192.168.1.164 as the associated source virtual IP
address (VIPA).
Furthermore, you see the MAC address of this OSA port that is used by the Layer 3 VMAC
function, which is described in Chapter 9, “IBM z/OS virtual MAC support” on page 79.
Use the scroll bar to see the remaining OAT information for OSA Port 1 of CHPID 0A.
1 See Open Systems Adapter/Support Facility on the Hardware Management Console, SC14- 7580
Note: If you retrieve the OAT from the OSA card, the OAT might contain several unneeded
entries, especially if it is the default OAT file.
2. Copy the required parts of the OAT entry into a new data set.
Note: Only the even unit address entries are required for TCP/IP Passthru entries.
3. Update the OAT records for your logical partitions (LPARs) with the unit address, port
mode and port number, default entry indicator, and IP address for each required device.
– Image/Partition: Enter the channel subsystem (CSS) ID and partition number
(cssid.partitionnumber) that is used for that entry. If you are running in basic mode or
if the CHPID is dedicated, the partition number is 0.
– Default: Enter PRI or SEC to make this the primary or secondary entry for this port, or
enter no if it is neither the primary nor secondary entry.
The entry that is designated as primary receives any datagram that is not specifically
addressed to any of the home IP addresses that are associated with this OSA port.
The secondary entry overtakes that function if the primary entry is not running.
– IP Address: Enter the home IP address for the port and unit address. Any time an
OSA port (in TCP/IP Passthru mode) is shared, each partition’s TCP/IP home IP
address must also be added to the OAT. This allows the OSA to forward the received
datagram to the appropriate partition.
4. Update the OAT records for your other LPARs with the unit address, port mode, port
number, partition number, default entry indicator, and IP address for all devices. Do this in
the way that was described for the first partition except, this time, substitute the
appropriate addressing for your partitions.
Example F-3 shows an OAT file that is running in two partitions: 5 and 7. One TCP/IP stack is
running in each partition. UNITADD is defined in both partitions with a value of 00. Shared SNA
mode is defined for both partitions by using UNITADD 0A.
See Open Systems Adapter-Express Customer’s Guide and Reference, SA22-7935, for
details about using OSA/SF.
Important: OSA configuration changes are disruptive, so all applications that are running
through OSA devices must not have active sessions. Also, the OSAD device must be
online to the host on which OSA/SF is running.
1. Vary all OSA devices offline (except the OSAD device) or at least those devices that have
active sessions to all partitions that are sharing this OSA port.
2. Log on to TSO from the system on which OSA/SF is running.
Note: The TSO user ID must be set up to use the OSA/SF TSO interface.
5. Select the OSA features that you want to configure by entering the number shown in the
list (Figure F-2 on page 216), or just press Enter to get a list of valid OSA CHPIDs in your
system.
b. Enter the OSA CHPID number to which the CONFIG file and OAT are to be downloaded.
You will get the message in Figure F-4. Respond to that message (select N if you want
to configure OSE, instead).
c. Enter the fully qualified data set name that contains the CONFIG definitions (Figure F-5)
d. Enter the fully qualified data set name that contains the OAT definitions (Figure F-6)
IOACMD: Enter the name of the data set containing the OAT you
IOACMD: want to put on the OSA
IOACMD: (This should be in the same format that is returned by Get OAT)
IOACMD: -OR-
IOACMD: Enter 0 to exit this EXEC
Figure F-6 IOACMD configuration message (4)
e. Enter the activation option, as shown in Figure F-7 on page 217. Note the following
points:
• Activate creates the OAT, updates the index data set, and downloads the OAT.
• Activate, no Install creates the OAT and updates the index data set but does not
download the OAT. IOACMD INSTALL must be done later.
IOACMD: 1 - Activate
IOACMD: Sets up all the files and transfers the data to the CHPID
IOACMD: If there are any 'in use' OAT entries, 'activate' will fail
f. Press Enter to confirm the activation (Figure F-8), because it is disruptive to the OSA
feature.
LPAR 1
TCP/IP
Channel Subsystem
Port 0 Port 1
Ethernet
Switch
For this example, we use the OSA-Express3 1000BASE-T card, channel path identifier
(CHPID) type OSE, in default mode. When an OSA-Express feature is manufactured, a basic
configuration is installed that permits some functions without the need to build and load an
OSA Address Table.
The default mode permits “passthru” functionality only. One use for this mode is in a new
installation, where you can establish that hardware configuration definitions (HCDs) and
network connections are correct without the added complication or concern of whether there
is a configuration error in the OAT.
The IBM zEnterprise z10 or z9 server sees the OSA-Express3 1000BASE-T port as a LAN
Channel Station (LCS) device. An LCS device handles data traffic in either direction for any
TCP/IP partition that has an OSA-Express port defined.
If you plan to use Open Systems Adapter Support Facility (OSA/SF), we suggest that you
share your OSA-Express port among all partitions where OSA/SF is running. This is why we
included the definition for the OSAD (Unit FE) device.
The OSA/SF GUI must be connected to an IBM z/OS host that has OSA/SF running. In
addition, the OSA CHPID must be defined by HCD, and the HCD must be activated. This step
does not require the CHPID to be installed or online. It simply creates and saves an
OSA-Express configuration.
1. Start the OSA/SF GUI program:
a. Open a DOS command window.
b. Enter the following command:
java IOAJAVA
c. At the prompt, type your password to make a connection.
2. In the Workstation Interface window, in the right panel under OSA/SF Commands, select
CHPID View and select the CHPID (in our example: 0C).
a. In the Settings tab (Figure G-3), you see that the CHPID is TCP/IP Passthru (OSE),
online, shared, and the processor code level is displayed (07.07).
4. Return to the CHPID View window, and click Selected Open Device Information. Now
the unit addresses are displayed with their own status indications, as shown in Figure G-5.
When the CHPID is dedicated to only one partition, LPAR 0 is unique in that this value is used
to identify that an OSE CHPID is dedicated. Regardless of the LPAR to which the OSE
CHPID is dedicated, the LPAR number that is used is always 0.
Non-QDIO OSA-Express ports are defined to TCP/IP as LCS devices. You must assign an IP
address by coding an entry for the LINK name in the HOME statement. Depending on your
network design, you also need to code a route entry. OSA-Express can be activated in the
TCP/IP profile by using a START statement.
CHPID 0C
T HOME IP 00-01
L
C 192.168.4.3
P P 100 Mbps
A / Ethernet
DEVICE Switch
R I
2E40,2E41
P
OSAD, UA FE
"FE" DEVICE
OSA/SF 2E5F
TCP/IP definitions
The z/OS device addresses used for port 0 are 2E40 and 2E41.
We defined:
One DEVICE statement per OSA-Express Port, with the even device number of the two
device addresses assigned to the hardware for the port
Note the following considerations:
– Even though you define only one port, you use two device numbers per OSA-Express
Port for TCP/IP Passthru mode. One device is used by TCP/IP for reading, and the
other device is used for writing.
– Using the DEVICE statement, you define the DEVICE name, the DEVICE type (LCS) for
the OSA-Express Port, and the DEVICE number (the read device number, which is the
even device number).
One LINK statement per OSA TCP/IP DEVICE statement
Using the LINK statement, you define the LINK name, the LINK type (in our example,
ETHERNET), the PORT number, and the DEVICE name.
Although the OSA-Express port is known by the device number, the port number in the
LINK statement must match the actual OSA-Express port number.
Note: If you are using a OSA-Express3 1000 BASE-T multi-port card with two ports per
CHPID, the port number that is specified on the LINK statement must relate to your OSA
port, either port 0 or port1
BEGINROUTES statement: If you are migrating your TCP/IP profile from an earlier
release, the profile might use the GATEWAY statement to define static routes instead of
the BEGINROUTES - ENDROUTES statements. GATEWAY is recognized and used,
but consider replacing it with BEGINROUTES for the following reasons:
It is compatible with UNIX standards.
It is easier to code than GATEWAY.
It accepts both IPv4 and IPv6 addresses.
It has enhanced functionality.
Future static route enhancements will be available only with the BEGINROUTES
statement.
Figure G-8 shows the TCP/IP profile definitions that we used to define OSA to TCP/IP A.
HOME
192.168.4.3 OSA2E40LNK
BEGINROUTES
ROUTE 192.168.4.0/24 = OSA2E40LNK MTU 1492
ENDROUTES
START OSA2E40
Figure G-8 TCP/IP profile definitions
Activation
Activation includes the following tasks, among others:
Ensure that the devices are online
Activate an OSA/SF configuration
Activate VTAM resources
Activate TCP/IP
Because the OSA-Express port is used in default mode, little needs to be done in our case.
We need to ensure only that the devices are online and then activate TCP/IP.
If the devices are not online, enter the z/OS console Vary command:
V (2E40-2E41),ONLINE
Activating TCP/IP
There are three ways to make the added definitions to the TCP/IP profile effective:
You can create an obeyfile by using the definition statements that are listed in this
chapter.
You can restart the TCP/IP stack.
You can issue the following z/OS command:
V TCPIP,TCPIPA,START,OSA2E40
We confirm the status of the TCP/IP devices by using the NETSTAT DEV command, as shown in
Figure G-9 on page 228. Notice that both the device and the link are in READY status.
For a summary of related commands, see Appendix D, “Useful setup and verification
commands” on page 183.
z/OS definitions
This section includes examples of the definitions that we used in our z/OS logical partitions
(LPARs), starting with a diagram. Figure H-2 on page 231 shows the IBM International
Technical Support Organization (ITSO) lab environment from a z/OS perspective.
TCP/IP profiles
The TCP/IP profile for SC30 (Example H-1) shows only the lines that we added or changed.
VTAM definitions
This section presents examples of VTAM definitions for the channel path identifier (CHPID)
OSD type and Enterprise Extender.
Example H-6 shows the external communication adapter (XCA) major node.
The TCP/IP profile in Example H-8 on page 235 shows only the statements that are related to
OSA-Express5S 1000BASE-T and OSA-Express5S 10GbE.
When an OSA DEVICE or INTERFACE that is defined in a TCP/IP stack is started, all of the
IP addresses with that OSA port in Queued Direct I/O (QDIO) mode (which is device type
MPCIPA in the TCP/IP profile) are dynamically downloaded to the OSA.
Note: If you want to use ARP takeover function, use your OSA-Express ports in QDIO
mode. If the port is defined in non-QDIO mode (device type LCS in TCP/IP profile), you
must use OSA Address Table (OAT) entries on the Hardware Management Console (HMC)
for OSA-Express5S and OSA-Express4S or OSA/SF for OSA-Express4S to build and
activate a configuration that identifies the multiple IP address that might be used with the
adapter. In a dynamic virtual IP address (dynamic VIPA) environment (or a simple OSA
takeover environment), use of QDIO mode simplifies setup and management.
If an OSA port fails while there is a backup OSA port available on the same subnetwork,
TCP/IP informs the backup adapter which IP address (real or VIPA) is to take over, and
network connections are maintained. After it is set up correctly, the fault tolerance that is
provided by the ARP takeover function is automatic.
Figure I-1 on page 239 illustrates our test environment for ARP takeover. We defined CHPID
03 and 05 as OSD type CHPIDs.
SWITCH
C : \ ping 192.168.3.130
192.168.3.10
TCP/IP definitions
Example I-1 on page 240 shows the items that we changed or added in our TCP/IP profile for
ARP takeover support.
BEGINROUTES
ROUTE 192.168.3.0 255.255.255.0 = OSA20A0LNK MTU 1492
ROUTE 192.168.3.0 255.255.255.0 = OSA20E0LNK MTU 1492
ROUTE DEFAULT 192.168.3.1 OSA20A0LNK MTU 1492
ROUTE DEFAULT 192.168.3.1 OSA20E0LNK MTU 1492
ENDROUTES
START OSA20AO
START OSA20E0
In the IPCONFIG statement, we added MULTIPATH to allow multiple path definitions to the same
network (or subnetwork). A DEVICE and LINK statement were needed for each of the two OSA
ports that we switch between for the test. Notice the ROUTE statements that define two paths to
get to the same network.
Normal status
Example I-2 shows the status of LANGROUP and VIPAOWNER before a failure.
Warning: Spantree port fast start should be enabled only on ports that are
connected to
a single host. Connecting hubs, concentrators, switches, bridges, and so on, to a
fast start port can cause temporary spanning tree loops. Use with caution.
Note: The results that are documented here are for our test with a specific switch. Consult
the documentation that is provided by the manufacturer of your switch to determine the
requirements to support ARP takeover.
SWITCH
C : \ ping 192.168.3.130
192.168.3.10
Figure I-3 shows the contents of the ARP cache on a Microsoft Windows workstation after
pinging each of IP addresses that are defined in TCPIPF before any error condition was
introduced.
C:\>arp -a
Notice that 192.168.3.130 is currently assigned to the MAC address associated with CHPID
05. Also 192.168.3.30 is assigned to the MAC address associated with CHPID 03.
Figure I-4 on page 243 shows the contents of the ARP table from the OSA before any error
condition was introduced.
We pulled the CAT5 cable that connects the OSA port of CHPID 03 from the switch. Figure I-5
shows the resulting messages from the IBM z/OS console.
Figure I-6 shows the contents of the ARP cache of the workstation after pulling the cable for
CHPID 03.
C:\>arp -a
Notice that both IP addresses now point to the same MAC address, which is associated with
CHPID 05. Nothing had to be done at the workstation to update the ARP cache. The TCP/IP
that is running on z/OS initiated a gratuitous ARP to all hosts on the LAN when it was notified
that the connection on CHPID 03 was lost.
Figure I-7 shows the contents of the ARP table on z/OS immediately after pulling the CAT5/6
cable for CHPID 03.
Then we cleaned up the ARP table with the purgecache command that is available in z/OS
Version 2.1. Figure I-9 shows an example of the command.
V TCPIP,TCPIPF,PURGECACHE,OSA20A0LNK
EZZ0060I PROCESSING COMMAND: VARY TCPIP,TCPIPD,PURGECACHE,OSA20A0LNK
EZZ9786I PURGECACHE PROCESSED FOR LINK OSA20A0LNK
EZZ0053I COMMAND PURGECACHE COMPLETED SUCCESSFULLY
Figure I-9 z/OS PURGECACHE command
When the CAT5/6 cable was plugged back into the switch, we received the messages that are
shown in Figure I-10 at the z/OS operator’s console.
EZD0041I INTERFACE OSA20A0LNK HAS TAKEN BACK ARP RESPONSIBILITY FROM INTERFACE
OSA20E0LNK
EZZ4313I INITIALIZATION COMPLETE FOR DEVICE OSA20A0
EZZ4340I INITIALIZATION COMPLETE FOR INTERFACE OSA20A0I
Figure I-10 CAT5 cable for CHPID 09 plugged into switch
Another gratuitous ARP was issued by TCPIPF to the hosts on the LAN that updated the ARP
cache with the correct MAC addresses. On our Windows workstation, the gratuitous ARP
updated only existing entries in the ARP cache. It did not create entries for IP addresses that
were not currently in ARP cache.
In this example, the number 1 indicates that the OSA20A0LNK is now active and has its own
ARPOWNER status back. However, the OSA20E0LNK keeps the VIPAOWNER. This is because a VIPA
belongs to a stack and not to a particular interface; therefore, it does not matter which OSA is
the VIPAOWNER.
V TCPIP,TCPIPF,STOP,OSA20A0
EZZ0060I PROCESSING COMMAND: VARY TCPIP,TCPIPF,STOP,OSA20A0
EZZ0053I COMMAND VARY STOP COMPLETED SUCCESSFULLY
EZZ4315I DEACTIVATION COMPLETE FOR DEVICE OSA20A0
EZD0040I INTERFACE OSA20E0LNK HAS TAKEN OVER ARP RESPONSIBILITY FOR
INACTIVE INTERFACE OSA20A0LNK
Figure I-11 Induced error by stopping the device in TCPIPF
A gratuitous ARP was sent, and the changes to the ARP tables were identical to those shown
in Figure I-6 on page 243 and Figure I-7 on page 243.
V TCPIP,TCPIPF,START,OSA20A0
EZZ0060I PROCESSING COMMAND: VARY TCPIP,TCPIPF,START,OSA20A0
EZZ0053I COMMAND VARY START COMPLETED SUCCESSFULLY
EZZ4313I INITIALIZATION COMPLETE FOR DEVICE OSA20A0
Figure I-12 Starting the device in TCPIPF
Once again, the gratuitous ARP was sent to update existing ARP cache entries to the correct
MAC addresses.
Measurements are contained in System Management Facilities (SMF) Record Type 79(13)
and are available through the ERBSMFI interface. SMF has been implemented with the field
R79CACR, which contains the channel path acronym.
For OSA channel path identifiers (CHPIDs, with device types of OSD, OSE, OSX, and OSM),
performance information is provided for three main components:
Processor use
Physical PCI bus use
The bandwidth per port (both read and write directions)
The Channel Path Measurement Facility (CPMF) provides information about CHPIDs on a
per-image basis. The Extended CPMF offers the enhancements that supply more data about
the channel types.
For more information, see the Resource Measurement Facility User’s Guide, SC33-7990.
T TUTORIAL X EXIT
T TUTORIAL X EXIT
Figure J-3 RMF Monitor II Primary Menu
3. At the RMF Monitor II I/O Report Selection Menu (Figure J-4 on page 250), enter 1
(Channel)
For more information, see z/OS Resource Measurement Facility Report Analysis,
SC33-7991.
This appendix describes the topics that are related to the authorization commands that are
used in the chapters related to the IBM z/VM operating system. The information focuses on
the following topic:
“z/VM virtual switch authorization” on page 252
Important: If an ESM is in place, the security definitions that are made by the SET
VSWITCH command are overridden by the ESM definitions.
COUPLE
SPECIAL
NICDEF
YES NO CP
ESM
ESM ACCESS
Installed
LIST
?
Protected NO
Resource
?
YES
YES Connection
YES
Permitted
To check who has access to a virtual switch, use the QUERY VSWITCH command with the
ACCESS option. In Example K-1 on page 253, you can see the authorized list of user IDs that
can connect to VSWITCH L2VSW1.
To grant access to a virtual switch, use the SET VSWITCH GRANT command (see Example K-2).
If you want to prevent a user from connecting to a virtual switch, use the SET VSWITCH REVOKE
command (see Example K-3).
You can also grant or revoke access to virtual local area networks (VLANs) that are identified
by a VLAN ID. This means that you can determine which VLANs the user can connect to.
Furthermore, you can restrict access to a virtual switch that is being used with VLANs. In
Example K-5, we defined a RACF profile for virtual switch L2VSW1 and VLAN ID 0001. This
means that virtual guest machines that connect to VLAN ID 0001 must have at least a
permission UPDATE for the profile that is shown in Example K-5.
Once the RACF permission is done, the virtual machine can use the CP COUPLE command
to connect to the virtual switch. Otherwise, you see an error message as shown in
Example K-7.
If you want to revoke user access to a virtual switch, use the command that is shown in
Example K-8.
Important: Before you activate the VMLAN class, you must define a profile for each virtual
switch. Otherwise, the guests are unable to contact the virtual switch.
You can find more information about RACF commands in Security Server RACF Command
Language Reference, SA22-7687.
The publications listed in this section are considered particularly suitable for a more detailed
description of the topics that are covered in this IBM Redbooks publication.
IBM Redbooks
For information about ordering these publications, see “How to get IBM Redbooks” on
page 256. Some of the publications cited here might be available in softcopy only.
IBM Communication Controller for Linux on System z V1.2.1 Implementation Guide,
SG24-7223
Enterprise Extender Implementation Guide, SG24-7359
IBM System z Connectivity Handbook, SG24-5444
OSA-Express Integrated Console Controller Implementation Guide, SG24-6364
IBM zEnterprise System Technical Introduction, SG24-8050
IBM zEnterprise BC12 Technical Guide, SG24-8138
IBM zEnterprise EC12 Technical Guide, SG24-8049
IBM zEnterprise System Technical Introduction, SG24-7832
Enhanced Networking on IBM z/VSE, SG24-8091
Introduction to the New Mainframe: z/VSE Basics, SG24-7436
IBM z/OS V2R1 Communications Server TCP/IP Implementation Volume 4: Security and
Policy-Based Networking, SG24-8099.
Other publications
These publications are also relevant as further information sources:
Open Systems Adapter-Express Customer's Guide and Reference, SA22-7935
Open Systems Adapter/Support Facility on the Hardware Management Console,
SC14- 7580
Resource Measurement Facility User’s Guide, SC33-7990
Resource Measurement Facility Report Analysis, SC33-7991
Device Drivers, Features and Commands, SC33-8289
Communications Server: IP Systems Administrator’s Commands, SC31-8781
Communications Server: IP Configuration Guide, SC31-8775
Communications Server: IP Configuration Reference, SC31-8776
Communications Server: IP Diagnosis Guide, GC31-8782
Communications Server: SNA Diagnosis Vol. 1, Techniques and Procedures, GC31-6850
Communications Server SNA Resource Definition Reference, SC31-8778
Communications Server: SNA Operation, SC31-8779
Online resources
These websites and pages are also relevant as further information sources:
System z networking
http://www.ibm.com/servers/eserver/zseries/networking/
System z networking white papers
http://www.ibm.com/servers/eserver/zseries/networking/wpapers.html
z/VM virtual networking
http://www.vm.ibm.com/virtualnetwork/
IBM Resource Link
http://www.ibm.com/servers/resourcelink/
OSA/SF on the Hardware Management Console
http://www.ibm.com/support/docview.wss?uid=isg24ee3e5124568369385257ba600527f12
C F
CAT5 cable 241 Fast Ethernet (FENET) 13, 212
Channel Activity Report 248 FE,C UNUMBR 221
channel on/off 178 FENET (Fast Ethernet) 13, 212
Channel Path FTP 196
List panel 19, 21
Measurement Facility 248
window 20 G
channel path 19 GbE LR 11
definition 17 grant access
channel path identifier (CHPID) 15 virtual switch 120
CHPID 32, 44, 169 graphical user interface (GUI) 191
On/Off 178 gratuitous ARP 243
CHPID 09 238 GRE 81
Fast Ethernet port 243 guest system 13, 32, 112
CHPID 0B 240 network connectivity 118
CHPID number 184, 204 Q NIC DETAILS command 123
command
Linux for System z TCP/IP 188
Linux z/VM Virtual Switch 187
H
Hardware Configuration Definition (HCD) 15–16, 27, 32,
TCP/IP for z/VM 186
44, 220
TCP/IP operations for z/VM 186
Hardware Management Console (HMC) 169
TSO 185
HCD (Hardware Configuration Definition) 15–17, 27, 32,
z/OS 184, 252
44, 220
z/VM 186
HMC (Hardware Management Console) 169
z/VM Virtual Switch 187
hybrid mode 91
component trace 166
U
R unit address 53, 65, 213, 223
RACF untagged frames 92
authorization 253 USE RING for token ring 56, 68
profile 253
security 253
Redbooks Web site 256 V
Contact us xxii view code level 178
Resource Measurement Facility (RMF) 247 virtual MAC (VMAC) 80
REXX 211 virtual machine 188
RMF (Resource Measurement Facility) 247 Virtual Medium Access Control (VMAC) 75, 79
RMF for OSA-Express 248 virtual switch 13
RMF Monitor II output 248 controller 113
detail information about 187
display information about 187
S Layer 2 functionality 128
SE 169 Layer 2 support 112
SECRouter 81 MAC address 113
shared port OSA-Express devices 113
activation 59, 69 RACF profile 253
HCD 52, 64 RACF security 253
OSA/SF definitions 221 VLAN capabilities 129, 132
status displays 60, 70
Index 261
VLAN connectivity 128
VLAN 89–90, 93, 104
design rules 93
implementation 96, 108
isolation 92
VLAN 200 94
VLAN capability 129, 132
virtual switch 129, 132
VLAN ID 93, 130
OSA-Express registration process 89
parameter 134
tag 91
value 93
VLAN ID 1 93
VLAN support 93, 96, 128
Layer 2 virtual switch configuration 128
VMAC 80
VMLAN 122
VSWITCH VSWTCH1
GRA LNXSU1 VLAN 101 131
GRA LNXSU2 VLAN 101 131
GRANT LNXSU1 120
GRANT LNXSU2 120
GRANT LNXSU3 120
VTAM commands 185
VTAM definition 13, 229
VTAM resource 38, 59, 69, 226
X
XCA (external communications adapter) 55
XCA major node 55, 67
Z
z/OS 33, 45, 221, 243
VLAN support 96
z/VM
TCP/IP command 186
TCP/IP operations commands 186
z/VM V5.1 13
z/VM Virtual Switch
commands 187
Layer 2 support 111
OSA-Express
Implementation Guide
®
Product, planning, This IBM Redbooks publication will help you to install, tailor, and
configure the Open Systems Adapter (OSA) features that are available INTERNATIONAL
and quick start
on IBM zEnterprise servers. It focuses on the hardware installation and TECHNICAL
information
the software definitions that are necessary to provide connectivity to SUPPORT
LAN environments. This information will help you with planning and ORGANIZATION
Realistic examples system setup. This book also includes helpful utilities and commands
and considerations for monitoring and managing the OSA features.
This information will be helpful to systems engineers, network
Hardware and administrators, and system programmers who plan for and install OSA
software setup features. The reader is expected to have a good understanding of IBM BUILDING TECHNICAL
definitions System z hardware, Hardware Configuration Definition (HCD) or the INFORMATION BASED ON
input/output configuration program (IOCP), Open Systems Adapter PRACTICAL EXPERIENCE
Support Facility (OSA/SF), Systems Network Architecture/Advanced
Peer-to-Peer Networking (SNA/APPN), and TCP/IP protocol. IBM Redbooks are developed
by the IBM International
Technical Support
Organization. Experts from
IBM, Customers and Partners
from around the world create
timely technical information
based on realistic scenarios.
Specific recommendations
are provided to help you
implement IT solutions more
effectively in your
environment.