How to perform ZVM to ZVM connectivity tests in versions 8.0 and above
Viewed 1303 times
Before we begin, we must eliminate the option that the ZVM NICs are offline. You can check that under ‘NCPA.CPL’ (Run > ncpa.cpl). There you should see all NICs under the VM. Make sure the relevant NICs are not offline and are running properly.
- Validate that ICMP protocol is enabled.
- Ping the Peer ZVM by running the ping command ( Ping -n 30 <peer ZVM IP> ). If the test fails and ICMP is enabled, there is a communication issue between the ZVMs.
- If the test passes and there is a connection, please validate that there isn't any packet loss. If the result has anything above 0% packet loss, you will need to consult with the network team. In the screenshot below you can see an example of an output with packet loss
If the MTU value is too high or too low, we could experience connection or performance issues.
First, we will want to determine what is the currently configured MTU size for each one of the ZVMs, so we could test it later.
We will run the following command in CMD:
netsh interface ipv4 show sub interfaces
We will see a result like the figure below:
Now that we have the MTU value, we will decrease it by 28 (IP and ICMP packet header).
In this example, we will use an MTU value of 1472 (1500 – 28). The next command will be a ping with a custom packet size of 1472:
ping -f -l 1472 <Peer ZVM IP>
If we don’t get a proper response (as in the normal ping attempt), we will need to start decreasing the MTU value until we do.
In the figure below, we can see that the MTU value of 1472 (1500-28) is too high for the environment and that we will need to decrease it:
Once the value is found, we will increase it by 28 and use the following command to set it persistently. The Interface name will be the name we found in Figure B:
netsh interface ipv4 set subinterface "<Interface name>" mtu=<MTU> store=persistent
Once the command was executed, we should see the updated MTU value in the output of the “netsh interface ipv4 show subinterfaces” command and see improvements in the ZVR performance in a matter of minutes. The telnet command checks if a specific port is open for communication.
This test checks whether the firewall allows this communication, as well as if the target is actively listening on the specified port.
We will need to telnet the peer ZVM from each ZVM over port 9071 with the following command:
telnet <ZVM IP> 9071
This test should result in a blank black screen under good, bi-directional communication circumstances. Make sure that we get the blank screen of all telnet attempts when we attempt from the different sites. If the test fails, please contact your networking team.
Suggestion: Disable the Window Firewall and try again. The tracert command is a Command Prompt command that stands for “trace route”. It will attempt (depends on firewalls) to show every “hop”(which is essentially a router) between the source and the target hosts. Usually, we can use this to see where the connection drops.
For example, here is a successful attempt to trace the route:
We can see that the packet went through a router with IP of 192.168.120.254 and then reached the destination, 192.168.119.20.
If we were to disable ICMP in the destination server (192.168.119.20), this would be the result:
We can determine in this case that the issue occurs somewhere after the packet passes the router with IP 192.168.120.254.