Brocade Communications Systems 1606 Administrator's Manual

Converged enhanced ethernet administrator's guide v6.4.0 (53-1001761-01, june 2010)
Hide thumbs Also See for 1606:
Table of Contents

Advertisement

DRAFT: BROCADE CONFIDENTIAL
53-1001761-01
®
30 March 2010
Converged Enhanced
Ethernet
Administrator's Guide
Supporting Fabric OS v6.4.0

Advertisement

Table of Contents
loading

Summary of Contents for Brocade Communications Systems 1606

  • Page 1 DRAFT: BROCADE CONFIDENTIAL 53-1001761-01 ® 30 March 2010 Converged Enhanced Ethernet Administrator’s Guide Supporting Fabric OS v6.4.0...
  • Page 2 DRAFT: BROCADE CONFIDENTIAL Copyright © 2006-2010 Brocade Communications Systems, Inc. All Rights Reserved. Brocade, the B-wing symbol, BigIron, DCX, Fabric OS, FastIron, IronPoint, IronShield, IronView, IronWare, JetCore, NetIron, SecureIron, ServerIron, StorageX, and TurboIron are registered trademarks, and DCFM, Extraordinary Networks, and SAN Health are trademarks of Brocade Communications Systems, Inc., in the United States and/or in other countries.
  • Page 3: Table Of Contents

    DRAFT: BROCADE CONFIDENTIAL Contents About This Document In this chapter ......... . . xv How this document is organized .
  • Page 4 DRAFT: BROCADE CONFIDENTIAL FCoE Initialization Protocol ....... . . 8 FIP discovery .
  • Page 5 DRAFT: BROCADE CONFIDENTIAL Ingress VLAN filtering ........31 VLAN configuration guidelines and restrictions .
  • Page 6 DRAFT: BROCADE CONFIDENTIAL STP, RSTP, and MSTP configuration and management ..51 Enabling STP, RSTP, or MSTP ......51 Disabling STP, RSTP, or MSTP .
  • Page 7 DRAFT: BROCADE CONFIDENTIAL LACP configuration and management ......69 Enabling LACP on a CEE interface ..... . . 69 Configuring the LACP system priority .
  • Page 8 DRAFT: BROCADE CONFIDENTIAL Rewriting ..........92 Queueing .
  • Page 9 DRAFT: BROCADE CONFIDENTIAL RMON configuration and management..... .119 Default RMON configuration ......119 Configuring RMON settings .
  • Page 10 DRAFT: BROCADE CONFIDENTIAL Index Converged Enhanced Ethernet Administrator’s Guide 53-1001761-01...
  • Page 11 DRAFT: BROCADE CONFIDENTIAL Figures Figure 1 Multiple switch fabric configuration ........3 Figure 2 CEE CLI command mode hierarchy .
  • Page 12 DRAFT: BROCADE CONFIDENTIAL Converged Enhanced Ethernet Administrator’s Guide 53-1001761-01...
  • Page 13 DRAFT: BROCADE CONFIDENTIAL Tables Table 1 FCoE terminology ........... 1 Table 2 CEE RBAC permissions.
  • Page 14 DRAFT: BROCADE CONFIDENTIAL Converged Enhanced Ethernet Administrator’s Guide 53-1001761-01...
  • Page 15: About This Document

    DRAFT: BROCADE CONFIDENTIAL About This Document In this chapter • How this document is organized ........xv •...
  • Page 16: Supported Hardware And Software

    DRAFT: BROCADE CONFIDENTIAL • Chapter 11, “Configuring IGMP,” describes how to configure IGMP snooping on the Brocade FCoE hardware. • Chapter 12, “Configuring RMON using the CEE CLI,” describes how to configure remote monitoring (RMON). • Chapter 13, “FCoE configuration using the Fabric OS CLI,” describes how to configure FCoE using the FOS CLI.
  • Page 17: What's New In This Document

    DRAFT: BROCADE CONFIDENTIAL To obtain information about an OS version other than 6.4.0, refer to the documentation specific to that OS version. What’s new in this document This document has been updated for 6.4.0. The following information was added: • New chapter on Internet Group Management Protocol.
  • Page 18: Notes, Cautions, And Warnings

    DRAFT: BROCADE CONFIDENTIAL Optional element. variable Variables are printed in italics. In the help pages, values are underlined or enclosed in angled brackets < >. Repeat the previous element, for example “member[;member...]” value Fixed values following arguments are printed in plain font. For example, show WWN Boolean.
  • Page 19: Notice To The Reader

    DRAFT: BROCADE CONFIDENTIAL Notice to the reader This document may contain references to the trademarks of the following corporations. These trademarks are the properties of their respective companies and corporations. These references are made for informational purposes only. Corporation Referenced Trademarks and Products None Not applicable Additional information...
  • Page 20: Document Feedback

    DRAFT: BROCADE CONFIDENTIAL 1. General Information • Switch model • Switch operating system version • Software name and software version, if applicable • Error numbers and messages received • supportSave command output • Detailed description of the problem, including the switch or fabric behavior immediately following the problem, and specific questions •...
  • Page 21 DRAFT: BROCADE CONFIDENTIAL documentation@brocade.com Provide the title and version number of the document and as much detail as possible about your comment, including the topic heading and page number and your suggestions for improvement. Converged Enhanced Ethernet Administrator’s Guide 53-1001761-01...
  • Page 22 DRAFT: BROCADE CONFIDENTIAL xxii Converged Enhanced Ethernet Administrator’s Guide 53-1001761-01...
  • Page 23: In This Chapter

    DRAFT: BROCADE CONFIDENTIAL Chapter Introducing FCoE In this chapter • FCoE terminology..........1 •...
  • Page 24: Fcoe Hardware

    DRAFT: BROCADE CONFIDENTIAL FCoE overview The motivation behind using CEE networks as a transport mechanism for FC arises from the desire to simplify host protocol stacks and consolidate network interfaces in data center environments. FC standards allow for building highly reliable, high-performance fabrics for shared storage, and these characteristics are what CEE brings to data centers.
  • Page 25: Layer 2 Ethernet Overview

    DRAFT: BROCADE CONFIDENTIAL Layer 2 Ethernet overview Layer 2 Ethernet overview The Brocade FCoE hardware contain CEE ports that support FCoE forwarding. The CEE ports are also backwards compatible and support classic Layer 2 Ethernet networks (see Figure 1). In Layer 2 Ethernet operation, a host with a Converged Network Adapter (CNA) can be directly attached to a CEE port on the Brocade FCoE hardware.
  • Page 26: Vlan Tagging

    DRAFT: BROCADE CONFIDENTIAL Layer 2 Ethernet overview The Brocade FCoE hardware handles Ethernet frames as follows: • When the destination MAC address is not in the lookup table, the frame is flooded on all ports except the ingress port. • When the destination MAC address is present in the lookup table, the frame is switched only to the correct egress port.
  • Page 27: Loop-Free Network Environment

    DRAFT: BROCADE CONFIDENTIAL Layer 2 Ethernet overview Loop-free network environment The Brocade FCoE hardware uses the following protocols to maintain a loop-free network environment: • 802.1D Spanning Tree Protocol (STP)—STP is required to create a loop-free topology in the LAN. •...
  • Page 28: Congestion Control And Queuing

    DRAFT: BROCADE CONFIDENTIAL Layer 2 Ethernet overview Congestion control and queuing The Brocade FCoE hardware supports several congestion control and queuing strategies. As an output queue approaches congestion, Random Early Detection (RED) is used to selectively and proactively drop frames to maintain maximum link utilization. Incoming frames are classified into priority queues based on the Layer 2 CoS setting of the incoming frame, or the possible rewriting of the Layer 2 CoS field based on the settings of the CEE port or VLAN.
  • Page 29: Access Control

    DRAFT: BROCADE CONFIDENTIAL Layer 2 Ethernet overview Multicast output queuing—A typical multicast output queuing example is where several ports carry multicast inbound traffic. Each port has a different priority setting. Traffic from all ports is switched to the same outbound port. If the inbound ports have varying traffic rates, some outbound priority groups will be congested while others remain uncongested.
  • Page 30: Trunking

    DRAFT: BROCADE CONFIDENTIAL FCoE Initialization Protocol Trunking NOTE The term “trunking” in an Ethernet network refers to the use of multiple network links (ports) in parallel to increase the link speed beyond the limits of any one single link or port, and to increase the redundancy for higher availability.
  • Page 31: Fip Login

    DRAFT: BROCADE CONFIDENTIAL FCoE Initialization Protocol • The Brocade FCoE hardware uses the FCoE Initialization Protocol (FIP). Enodes discover FCFs and initialize the FCoE connection through the FIP. • VF_port configuration—An FCoE port accepts Enode requests when it is configured as a VF_port and enabled.
  • Page 32: Fip Logout

    DRAFT: BROCADE CONFIDENTIAL FCoE Initialization Protocol FIP logout FIP logout operates as follows: • ENodes can log out from the Brocade FCoE hardware using FIP. The Brocade FCoE hardware in the fabric updates the MAC address, WWN, and PID mappings upon logout. The Brocade FCoE hardware also handles scenarios of implicit logout where the ENode has left the fabric without explicitly logging out.
  • Page 33: Logincfg

    DRAFT: BROCADE CONFIDENTIAL FCoE Initialization Protocol Logincfg The Brocade FCoE hardware logincfg mechanism operates as follows: • The logincfg is the mechanism for controlling ENode logins per Brocade FCoE hardware. Each unit of Brocade FCoE hardware maintains its own logincfg. •...
  • Page 34: Registered State Change Notification (Rscn)

    DRAFT: BROCADE CONFIDENTIAL FCoE queuing • ENodes can access all FC devices with no zoning—ENodes can access all FC devices in the fabric when cfgdisable is issued and Default Zone is set to All Access Mode. • Field replacement—When a Brocade FCoE hardware is replaced in the field, you can perform a configdownload on a previously saved configuration.
  • Page 35: Chapter 2 Using The Cee Cli

    DRAFT: BROCADE CONFIDENTIAL Chapter Using the CEE CLI In this chapter • Management Tools ..........13 •...
  • Page 36: Saving Your Configuration Changes

    DRAFT: BROCADE CONFIDENTIAL CEE Command Line Interface NOTE The CEE configuration is not affected by configUpload and configDownload commands entered in the Fabric OS shell. Saving your configuration changes Any configuration changes made to the switch are written into the running-config file. This is a dynamic file that is lost when the switch reboots.
  • Page 37: Accessing The Cee Cli Through The Console Or Telnet

    DRAFT: BROCADE CONFIDENTIAL CEE Command Line Interface Accessing the CEE CLI through the console or Telnet NOTE While this example uses the admin role to log in to the switch, any role listed in the “CEE CLI RBAC permissions” section can be used. The procedure to access the CEE CLI is the same through either the console interface or through a Telnet session;...
  • Page 38: Table 3 Cee Cli Command Modes

    DRAFT: BROCADE CONFIDENTIAL CEE Command Line Interface NOTE At system startup, if you try to enter Privileged EXEC mode before the system has fully booted, the following message is displayed: %Info: Please wait. System configuration is being loaded. After the system has fully booted, a RASLOG message indicates that the CEE CLI is ready to accept configuration commands.
  • Page 39: Cee Cli Keyboard Shortcuts

    DRAFT: BROCADE CONFIDENTIAL CEE Command Line Interface TABLE 3 CEE CLI command modes Command Prompt How to access the command mode Description mode Feature CEE map: From the global configuration mode, Access and configure CEE features. configuration specify a CEE feature by entering switch(config-ceemap)# one of the following feature names: •...
  • Page 40: Using The Do Command As A Shortcut

    DRAFT: BROCADE CONFIDENTIAL CEE Command Line Interface Using the do command as a shortcut You can use the do command to save time when you are working in any configuration mode and you want to run a command in the EXEC or Privileged EXEC mode. For example, if you are configuring an LLDP and you want to execute a Privileged EXEC mode command, such as the dir command, you would first have to exit the LLDP configuration mode.
  • Page 41: Cee Cli Command Completion

    DRAFT: BROCADE CONFIDENTIAL CEE Command Line Interface The CEE CLI accepts abbreviations for commands. This example is the abbreviation for the show qos interface all command. switch#sh q i a If the switch does not recognize a command after Enter is pressed, an error message displays. switch#hookup % Invalid input detected at '^' marker.
  • Page 42 DRAFT: BROCADE CONFIDENTIAL CEE Command Line Interface Converged Enhanced Ethernet Administrator’s Guide 53-1001761-01...
  • Page 43: Chapter 3 Standard Cee Integrations And Configurations

    DRAFT: BROCADE CONFIDENTIAL Chapter Standard CEE Integrations and Configurations In this chapter • Overview of standard CEE integrations ......21 •...
  • Page 44: Integrating A Brocade 8000 Switch On A San

    DRAFT: BROCADE CONFIDENTIAL CEE and LAN integration FCoE devices log in to one of the six FCoE ports on the Brocade 8000 switch. The FCoE ports provide FC services to FCoE initiators and enable bridging between FCoE initiators and FC targets. FCoE ports differ from regular FC ports in that they are not directly associated with an external physical port on the switch.
  • Page 45: Figure 3 Adding The Brocade 8000 Switch To The Data Center Lan (San Not Shown)

    DRAFT: BROCADE CONFIDENTIAL CEE and LAN integration Figure 3 illustrates a representative data center LAN with Brocade FCoE hardware. The information and procedures that follow outline the configuration process for introducing the Brocade FCoE hardware into the network and for feature sets unique to CEE. Unless otherwise noted, all commands are entered through the CEE CLI.
  • Page 46: Creating The Cee Map

    DRAFT: BROCADE CONFIDENTIAL CEE and LAN integration • Which traffic type needs lossless behavior. Brocade uses CEE Maps to simplify the configuration of QoS and flow control. Users assign different priorities to different traffic types and enable lossless connectivity. A CEE map configures two features: Enhanced Transmission Selection (ETS) and Priority Flow Control (PFC).
  • Page 47: Configuring Dcbx

    DRAFT: BROCADE CONFIDENTIAL CEE and LAN integration Bandwidth requirements for each PGID are then chosen. The administrator decides to give IP traffic 60 percent of the schedule and FCoE traffic 40 percent. Finally, since FCoE traffic requires lossless communication, PFC is also enabled for PGID 1. FIGURE 4 Configuring CEE attributes Priority...
  • Page 48: Configuring Spanning Tree Protocol

    DRAFT: BROCADE CONFIDENTIAL CEE and LAN integration To configure the TLVs for DCBX, perform the following steps in global configuration mode. 1. Set the protocol type to LLDP. switch(config)#protocol lldp 2. Activate the protocol. switch(conf-lldp)#no disable 3. Activate the TLV formats using the advertise command in Protocol LLDP Configuration Mode. switch(conf-lldp)#advertise dcbx-fcoe-app-tlv switch(conf-lldp)#advertise dcbx-fcoe-logical-link-tlv 4.
  • Page 49: Configuring The Cee Interfaces

    DRAFT: BROCADE CONFIDENTIAL CEE and LAN integration In the sample network shown in Figure 5, there are three VLANs: VLAN 100, VLAN 10, and VLAN 20. VLAN 10 and 20 are used to isolate the L2 traffic from the two server groups. These VLANs carry IP traffic from the servers to the data center LAN.
  • Page 50 DRAFT: BROCADE CONFIDENTIAL CEE and LAN integration To configure the CEE interfaces, perform the following steps in global configuration mode. 1. Assign VLANs to the uplink Ethernet port. NOTE You must repeat this step for all uplink interfaces. For details, see “Configuring an interface port as a trunk interface”...
  • Page 51: Server Connections To The Brocade 8000 Switch

    DRAFT: BROCADE CONFIDENTIAL Server connections to the Brocade 8000 switch Server connections to the Brocade 8000 switch Converged Network Adapters (CNAs) support FCoE and Ethernet LAN communication over the same cable from the server to a CEE switch, such as the Brocade 8000 switch as shown in Figure 5.
  • Page 52 DRAFT: BROCADE CONFIDENTIAL Minimum CEE configuration to allow FCoE traffic flow To set the minimum CEE configuration, perform the following steps in global configuration mode. 1. Configure the CEE interface as a Layer 2 switch port. For details, see “Configuring an interface port as a Layer 2 switch port”...
  • Page 53: In This Chapter

    DRAFT: BROCADE CONFIDENTIAL Chapter Configuring VLANs Using the CEE CLI In this chapter • VLAN overview ..........31 •...
  • Page 54: Figure 6 Ingress Vlan Filtering

    DRAFT: BROCADE CONFIDENTIAL Ingress VLAN filtering • Admit VLAN tagged and untagged frames—All tagged and untagged frames would be processed as follows: All untagged frames are classified into native VLANs. All frames egressing are untagged for the native VLANs. Any tagged frames coming with a VLAN tag equal to the configured native VLAN are processed.
  • Page 55: Vlan Configuration Guidelines And Restrictions

    DRAFT: BROCADE CONFIDENTIAL VLAN configuration guidelines and restrictions Additionally, there are important facts you should know about the VLAN FDB: • The VLAN FDB contains information that helps determine the forwarding of an arriving frame based on MAC address and VLAN ID data. The FDB contains both statically configured data and dynamic data that is learned by the switch.
  • Page 56: Vlan Configuration And Management

    DRAFT: BROCADE CONFIDENTIAL VLAN configuration and management VLAN configuration and management NOTE To see the minimum configuration required to enable FCoE on Brocade FCoE hardware, refer to “Minimum CEE configuration to allow FCoE traffic flow” on page 29. NOTE You need to enter either the copy running-config startup-config command or the write memory command to save your configuration changes to Flash so that they are not lost if there is a system reload or power outage.
  • Page 57: Creating A Vlan Interface

    DRAFT: BROCADE CONFIDENTIAL VLAN configuration and management Example of setting the MTU value to 4200. switch(conf-if-te-0/1)#mtu 4200 Creating a VLAN interface On Brocade FCoE hardware, VLANs are treated as interfaces from a configuration point of view. By default all the CEE ports are assigned to VLAN 1 (VLAN ID equals 1). The vlan_ID value can be 1 through 3583.
  • Page 58: Configuring A Vlan Interface To Forward Fcoe Traffic

    DRAFT: BROCADE CONFIDENTIAL VLAN configuration and management Example of selecting the VLAN interface number “55”. switch(config)#interface vlan 55 3. Enter the spanning-tree shutdown command to disable spanning tree on VLAN 1002. switch(conf-if-vl-55)#spanning-tree shutdown Configuring a VLAN interface to forward FCoE traffic An FCoE Forwarder (FCF) is an FCoE device that supports FCoE VF_ports.
  • Page 59: Configuring An Interface Port As A Trunk Interface

    DRAFT: BROCADE CONFIDENTIAL VLAN configuration and management 1. Enter the configure terminal command to access global configuration mode. 2. Enter the interface command to specify the CEE interface type and slot/port number. Example of selecting the Ten Gigabit Ethernet port number 0/1. switch(config)#interface tengigabitethernet 0/1 3.
  • Page 60: Configuring An Interface Port As A Converged Interface

    DRAFT: BROCADE CONFIDENTIAL Configuring protocol-based VLAN classifier rules 4. Enter the switchport command to place the CEE interface into trunk mode. switch(conf-if-te-0/10)#switchport mode trunk none Configuring an interface port as a converged interface Each CEE interface port supports admission policies based on whether the frames are untagged or tagged.
  • Page 61: Configuring A Vlan Classifier Rule

    DRAFT: BROCADE CONFIDENTIAL Configuring protocol-based VLAN classifier rules NOTE Multiple VLAN classifier rules can be applied per interface provided the resulting VLAN IDs are unique for the different rules. 802.1Q protocol-based VLANs apply only to untagged frames, or frames with priority tagging. With both Ethernet-II and 802.2 SNAP encapsulated frames, the following protocol types are supported: •...
  • Page 62: Creating A Vlan Classifier Group And Adding Rules

    DRAFT: BROCADE CONFIDENTIAL Configuring protocol-based VLAN classifier rules Creating a VLAN classifier group and adding rules VLAN classifier groups (1 through 16) can contain any number of VLAN classifier rules. To configure a VLAN classifier group and add a VLAN classifier rule, perform the following steps from Privileged EXEC mode.
  • Page 63: Configuring The Mac Address Table

    DRAFT: BROCADE CONFIDENTIAL Configuring the MAC address table Configuring the MAC address table Each CEE port has a MAC address table. The MAC address table stores a number of unicast and multicast address entries without flooding any frames. Brocade FCoE hardware has a configurable aging timer.
  • Page 64 DRAFT: BROCADE CONFIDENTIAL Configuring the MAC address table Converged Enhanced Ethernet Administrator’s Guide 53-1001761-01...
  • Page 65: Configuring Stp, Rstp, And Mstp Using The Cee Cli

    DRAFT: BROCADE CONFIDENTIAL Chapter Configuring STP, RSTP, and MSTP using the CEE CLI In this chapter • STP overview ..........43 •...
  • Page 66: Configuring Stp On Brocade Fcoe Hardware

    DRAFT: BROCADE CONFIDENTIAL STP overview • Disabled—The interface is not participating in spanning tree because of a shutdown port, no link on the port, or no spanning tree instance running on the port. A port participating in spanning tree moves through these states: •...
  • Page 67: Rstp Overview

    DRAFT: BROCADE CONFIDENTIAL RSTP overview 6. Enable the guard root feature with the spanning-tree guard root command. The guard root feature provides a way to enforce the root bridge placement in the network. For detailed information, refer to“Enabling the guard root” on page 59.
  • Page 68 DRAFT: BROCADE CONFIDENTIAL RSTP overview With RSTP, the port roles for the new interface states are also different. RSTP differentiates explicitly between the state of the port and the role it plays in the topology. RSTP uses the root port and designated port roles defined by STP, but splits the blocked port role into backup port and alternate port roles: •...
  • Page 69: Mstp Overview

    DRAFT: BROCADE CONFIDENTIAL MSTP overview 10. Configure the bridge hello time value. For details, see “Specifying the bridge hello time (STP and RSTP)” on page 54. switch(conf-stp)#hello-time 5 11. Flush the MAC addresses from the VLAN FDB. For details, see “Flushing MAC addresses (RSTP and MSTP)”...
  • Page 70: Configuring Mstp On Brocade Fcoe Hardware

    DRAFT: BROCADE CONFIDENTIAL MSTP overview spanning tree instances. With MSTP you can have multiple forwarding paths for data traffic. A failure in one instance does not affect other instances. With MSTP, you are able to more effectively utilize the physical resources present in the network and achieve better load balancing of VLAN traffic.
  • Page 71: Stp, Rstp, And Mstp Configuration Guidelines And Restrictions

    DRAFT: BROCADE CONFIDENTIAL STP, RSTP, and MSTP configuration guidelines and restrictions 5. Map a VLAN to an MSTP instance using the instance command. For more details see “Mapping a VLAN to an MSTP instance” on page 55. switch(conf-mstp)#instance 1 vlan 2, 3 switch(conf-mstp)#instance 2 vlan 4-6 switch(conf-mstp)#instance 1 priority 4096 6.
  • Page 72: Default Stp, Rstp, And Mstp Configuration

    DRAFT: BROCADE CONFIDENTIAL Default STP, RSTP, and MSTP configuration Default STP, RSTP, and MSTP configuration Table 8 lists the default STP, RSTP, and MSTP configuration. TABLE 8 Default STP, RSTP, and MSTP configuration Parameter Default setting Spanning-tree mode By default, STP, RSTP, and MSTP are disabled Bridge priority 32768 Bridge forward delay...
  • Page 73: Stp, Rstp, And Mstp Configuration And Management

    DRAFT: BROCADE CONFIDENTIAL STP, RSTP, and MSTP configuration and management STP, RSTP, and MSTP configuration and management NOTE To see the minimum configuration required to enable FCoE on the Brocade 8000 switch, refer to “Minimum CEE configuration to allow FCoE traffic flow” on page 29.
  • Page 74: Specifying The Bridge Priority

    DRAFT: BROCADE CONFIDENTIAL STP, RSTP, and MSTP configuration and management Specifying the bridge priority In any mode (STP, RSTP, or MSTP), use this command to specify the priority of the switch. After you decide on the root switch, set the appropriate values to designate the switch as the root switch. If a switch has a bridge priority that is lower than all the other switches, the other switches automatically select the switch as the root switch.
  • Page 75: Specifying The Bridge Maximum Aging Time

    DRAFT: BROCADE CONFIDENTIAL STP, RSTP, and MSTP configuration and management Specifying the bridge maximum aging time In any mode (STP, RSTP, or MSTP), use this command to control the maximum length of time that passes before an interface saves its Bridge Protocol Data Unit (BPDU) configuration information. When configuring the maximum aging time, the max-age setting must be greater than the hello-time setting.
  • Page 76: Specifying The Port-Channel Path Cost

    DRAFT: BROCADE CONFIDENTIAL STP, RSTP, and MSTP configuration and management Specifying the port-channel path cost In any mode (STP, RSTP, or MSTP), use this command to specify the port-channel path cost. The default port cost is standard. The path cost options are: •...
  • Page 77: Enabling Cisco Interoperability (Mstp)

    DRAFT: BROCADE CONFIDENTIAL STP, RSTP, and MSTP configuration and management Enabling Cisco interoperability (MSTP) In MSTP mode, use this command to enable or disable the ability of the Brocade FCoE hardware to interoperate with certain legacy Cisco switches. If Cisco interoperability is required on any switch in the network, then all switches in the network must be compatible, and therefore enabled using this command.
  • Page 78: Specifying The Maximum Number Of Hops

    DRAFT: BROCADE CONFIDENTIAL STP, RSTP, and MSTP configuration and management Specifying the maximum number of hops for a BPDU (MSTP) In MSTP mode, use this command to configure the maximum number of hops for a BPDU in an MSTP region. Specifying the maximum hops for a BPDU prevents the messages from looping indefinitely on the interface.
  • Page 79: Flushing Mac Addresses (Rstp And Mstp)

    DRAFT: BROCADE CONFIDENTIAL STP, RSTP, and MSTP configuration and management Flushing MAC addresses (RSTP and MSTP) For RSTP and MSTP, use this command to flush the MAC addresses from the VLAN filtering database (FDB). The VLAN FDB determines the forwarding of an incoming frame. The VLAN FDB contains information that helps determine the forwarding of an arriving frame based on MAC address and VLAN ID data (see “VLAN configuration guidelines and restrictions”...
  • Page 80: Displaying Stp, Rstp, And Mstp-Related Information

    DRAFT: BROCADE CONFIDENTIAL Configuring STP, RSTP, or MSTP on CEE interface ports To restart the protocol migration process, perform the following tasks from Privileged EXEC mode. 1. Enter the appropriate form of the clear command based on what you want to clear: •...
  • Page 81: Enabling A Port (Interface) As An Edge Port

    DRAFT: BROCADE CONFIDENTIAL Configuring STP, RSTP, or MSTP on CEE interface ports To configure the path cost for spanning tree calculations on the CEE interface, perform the following steps from Privileged EXEC mode. 1. Enter the configure terminal command to access global configuration mode. 2.
  • Page 82: Specifying The Mstp Hello Time

    DRAFT: BROCADE CONFIDENTIAL Configuring STP, RSTP, or MSTP on CEE interface ports Guard root protects the root bridge from malicious attacks and unintentional misconfigurations where a bridge device that is not intended to be the root bridge becomes the root bridge. This causes severe bottlenecks in the data path.
  • Page 83: Specifying A Link Type

    DRAFT: BROCADE CONFIDENTIAL Configuring STP, RSTP, or MSTP on CEE interface ports 4. Enter the spanning-tree command to specify the restrictions for an MSTP instance on a CEE interface. switch(conf-if-te-0/1)#spanning-tree instance 5 cost 3550 restricted-tcn Specifying a link type From the CEE interface, use this command to specify a link type. Specifying the point-to-point keyword enables rapid spanning tree transitions to the forwarding state.
  • Page 84: Restricting The Port From Becoming A Root Port

    DRAFT: BROCADE CONFIDENTIAL Configuring STP, RSTP, or MSTP on CEE interface ports To specify the port priority on the CEE interface, perform the following steps from Privileged EXEC mode. 1. Enter the configure terminal command to access global configuration mode. 2.
  • Page 85: Disabling Spanning Tree

    DRAFT: BROCADE CONFIDENTIAL Configuring STP, RSTP, or MSTP on CEE interface ports To enable spanning tree on the CEE interface, perform the following steps from Privileged EXEC mode. 1. Enter the configure terminal command to access global configuration mode. 2. Enter the interface command to specify the CEE interface type and slot/port number. switch(config)#interface tengigabitethernet 0/1 3.
  • Page 86 DRAFT: BROCADE CONFIDENTIAL Configuring STP, RSTP, or MSTP on CEE interface ports Converged Enhanced Ethernet Administrator’s Guide 53-1001761-01...
  • Page 87: Configuring Link Aggregation Using The Cee Cli

    DRAFT: BROCADE CONFIDENTIAL Chapter Configuring Link Aggregation using the CEE CLI In this chapter • Link aggregation overview ........65 •...
  • Page 88 DRAFT: BROCADE CONFIDENTIAL Link aggregation overview On each port, link aggregation control: • Maintains configuration information to control port aggregation. • Exchanges configuration information with other devices to form LAGs. • Attaches ports to and detaches ports from the aggregator when they join or leave a LAG. •...
  • Page 89: Figure 7 Configuring Lags For A Top-Of-The-Rack Cee Switch-Example 1

    DRAFT: BROCADE CONFIDENTIAL Link aggregation overview The Brocade 8000 switch interoperates with all of the major Layer 2/Layer 3 aggregation routers including Foundry Networks, Cisco Systems, and Force10 Networks. FIGURE 7 Configuring LAGs for a top-of-the-rack CEE switch—Example 1 Data Center Core Data Center Network Core Layer Data Center Network...
  • Page 90: Link Aggregation Control Protocol

    DRAFT: BROCADE CONFIDENTIAL Link aggregation overview Link Aggregation Control Protocol Link Aggregation Control Protocol (LACP) is an IEEE 802.3ad standards-based protocol that allows two partner systems to dynamically negotiate attributes of physical links between them to form logical trunks. LACP determines whether a link can be aggregated into a LAG. If a link can be aggregated into a LAG, LACP puts the link into the LAG.
  • Page 91: Lacp Configuration Guidelines And Restrictions

    DRAFT: BROCADE CONFIDENTIAL LACP configuration guidelines and restrictions LACP configuration guidelines and restrictions This section applies to standards-based and Brocade-proprietary LAG configurations except where specifically noted otherwise. Follow these LACP configuration guidelines and restrictions when configuring LACP: • All ports on the Brocade FCoE hardware can operate only in full-duplex mode. •...
  • Page 92: Configuring The Lacp System Priority

    DRAFT: BROCADE CONFIDENTIAL LACP configuration and management 3. Enter the no shutdown command to enable the CEE interface. 4. Enter the channel-group command to configure the LACP for the CEE interface. Example switch(conf-if)#channel-group 4 mode active type brocade Configuring the LACP system priority You configure an LACP system priority on each switch running LACP.
  • Page 93: Clearing Lacp Counter Statistics On All Lag Groups

    DRAFT: BROCADE CONFIDENTIAL LACP troubleshooting tips Clearing LACP counter statistics on all LAG groups To clear LACP counter statistics, perform the following task from Privileged EXEC mode. 1. Enter the clear command to clear the LACP counter statistics for all LAG groups. switch#clear lacp counters Displaying LACP information Use the show command to display LACP statistics and configuration information.
  • Page 94 DRAFT: BROCADE CONFIDENTIAL LACP troubleshooting tips • Make sure that LACPDUs are being received and transmitted on both ends of the link and there are no error PDUs. This can be verified by entering the show lacp port-channel-num counters command and looking at the rx and tx statistics. The statistics should be incrementing and should not be at zero or a fixed value.
  • Page 95: In This Chapter

    DRAFT: BROCADE CONFIDENTIAL Chapter Configuring LLDP using the CEE CLI In this chapter • LLDP overview ..........73 •...
  • Page 96: Layer 2 Topology Mapping

    DRAFT: BROCADE CONFIDENTIAL Layer 2 topology mapping Layer 2 topology mapping The LLDP protocol lets network management systems accurately discover and model Layer 2 network topologies. As LLDP devices transmit and receive advertisements, the devices store information they discover about their neighbors. Advertisement data such as a neighbor's management address, device type, and port identification is useful in determining what neighboring devices are in the network.
  • Page 97 DRAFT: BROCADE CONFIDENTIAL Layer 2 topology mapping Port VLANID TLV—Indicates the port VLAN ID (PVID) that is associated with an untagged or priority tagged data frame received on the VLAN port. PPVLAN ID TLV—Indicates the port- and protocol--based VLAN ID (PPVID) that is associated with an untagged or priority tagged data frame received on the VLAN port.
  • Page 98: Dcbx Overview

    DRAFT: BROCADE CONFIDENTIAL DCBX overview DCBX overview Storage traffic requires a lossless communication which is provided by CEE. The Data Center Bridging (DCB) Capability Exchange Protocol (DCBX) is used to exchange CEE-related parameters with neighbors to achieve more efficient scheduling and a priority-based flow control for link traffic. DCBX uses LLDP to exchange parameters between two link peers;...
  • Page 99: Priority Flow Control (Pfc)

    DRAFT: BROCADE CONFIDENTIAL DCBX interaction with other vendor devices Priority Flow Control (PFC) With PFC, it is important to provide lossless frame delivery for certain traffic classes while maintaining existing LAN behavior for other traffic classes on the converged link. This differs from the traditional 802.3 PAUSE type of flow control where the pause affects all traffic on an interface.
  • Page 100: Default Lldp Configuration

    DRAFT: BROCADE CONFIDENTIAL Default LLDP configuration Default LLDP configuration Table 13 lists the default LLDP configuration. TABLE 13 Default LLDP configuration Parameter Default setting LLDP global state Enabled LLDP receive Enabled LLDP transmit Enabled Transmission frequency of LLDP updates 30 seconds Hold time for receiving devices before discarding 120 seconds DCBX-related TLVs to be advertised...
  • Page 101: Configuring Lldp Global Command Options

    DRAFT: BROCADE CONFIDENTIAL LLDP configuration and management Configuring LLDP global command options After entering the protocol lldp command from global configuration mode, you are in LLDP configuration mode which is designated with the switch(conf-lldp)# prompt. Using the keywords in this mode, you can set non-default parameter values that apply globally to all interfaces. Specifying a system name for the Brocade FCoE hardware The global system name for LLDP is useful for differentiating between switches.
  • Page 102 DRAFT: BROCADE CONFIDENTIAL LLDP configuration and management Example switch(conf-lldp)#description Brocade-LLDP-installed-july-25 Enabling and disabling the receiving and transmitting of LLDP frames By default both transmit and receive for LLDP frames is enabled. To enable or disable the receiving (rx) and transmitting (tx) of LLDP frames, perform the following steps from Privileged EXEC mode. 1.
  • Page 103 DRAFT: BROCADE CONFIDENTIAL LLDP configuration and management 1. Enter the configure terminal command to access global configuration mode. 2. Enter LLDP configuration mode. switch(config)#protocol lldp 3. Advertise the optional LLDP TLVs. switch(conf-lldp)#advertise optional-tlv [port-description |system-name | system-capabilities | system-description | management-address] Configuring the advertisement of LLDP DCBX -related TLVs NOTE By default, the dcbx-tlv is advertised;...
  • Page 104 DRAFT: BROCADE CONFIDENTIAL LLDP configuration and management Configuring LLDP profiles You can configure up to 64 profiles on a switch. Using the no profile NAME command deletes the entire profile. To configure LLDP profiles, perform the following steps from Privileged EXEC mode. 1.
  • Page 105: Configuring Lldp Interface-Level Command Options

    DRAFT: BROCADE CONFIDENTIAL LLDP configuration and management Configuring LLDP interface-level command options Only one LLDP profile can be assigned to an interface. If you do not use the lldp profile option at the interface level, the global configuration is used on the interface. If there are no global configuration values defined, the global default values are used.
  • Page 106: Displaying Lldp-Related Information

    DRAFT: BROCADE CONFIDENTIAL LLDP configuration and management Displaying LLDP-related information To display LLDP-related information, perform the following steps from Privileged EXEC mode. 1. Use the show lldp neighbors command to: • Display LLDP general information. switch#show lldp • Display LLDP interface-related information. switch#show lldp interface tengigabitethernet 0/1 •...
  • Page 107: Chapter 8 Configuring Acls Using The Cee Cli

    DRAFT: BROCADE CONFIDENTIAL Chapter Configuring ACLs using the CEE CLI In this chapter • ACL overview ..........85 •...
  • Page 108: Default Acl Configuration

    DRAFT: BROCADE CONFIDENTIAL Default ACL configuration • VLANs Default ACL configuration Table 14 lists the default ACL configuration. TABLE 14 Default MAC ACL configuration Parameter Default setting MAC ACLs By default, no MAC ACLs are configured. ACL configuration guidelines and restrictions Follow these ACL configuration guidelines and restrictions when configuring ACLs: •...
  • Page 109: Creating An Extended Mac Acl And Adding Rules

    DRAFT: BROCADE CONFIDENTIAL ACL configuration and management 3. Enter the deny command to create a rule in the MAC ACL to drop traffic with the source MAC address. switch(conf-macl-std)#deny 0022.3333.4444 count 4. Enter the permit command to create a rule in the MAC ACL to permit traffic with the source MAC address.
  • Page 110: Removing A Mac Acl

    DRAFT: BROCADE CONFIDENTIAL ACL configuration and management Use a sequence number to specify the rule you wish to modify. Without a sequence number, a new rule is added to the end of the list, and the existing rule is unchanged. NOTE Using the permit and deny keywords, you can create many different rules.
  • Page 111: Applying A Mac Acl To A Cee Interface

    DRAFT: BROCADE CONFIDENTIAL ACL configuration and management To reorder the rules in a MAC ACL, perform the following task from Privileged EXEC mode. 1. Enter the resequence command to assign sequence numbers to the rules contained in the MAC ACL. Example switch#resequence access-list mac test_02 50 5 Applying a MAC ACL to a CEE interface...
  • Page 112 DRAFT: BROCADE CONFIDENTIAL ACL configuration and management Converged Enhanced Ethernet Administrator’s Guide 53-1001761-01...
  • Page 113: Chapter 9 Configuring Qos Using The Cee Cli

    DRAFT: BROCADE CONFIDENTIAL Chapter Configuring QoS using the CEE CLI In this chapter • QoS overview ..........91 •...
  • Page 114: Rewriting

    DRAFT: BROCADE CONFIDENTIAL Rewriting • Scheduling—When multiple queues are active and contending for output on a common physical port the scheduling algorithm selects the order the queues are serviced. Scheduling algorithms include Strict Priority (SP) and Deficit Weighted Round Robin (DWRR) queueing. The scheduler supports a hybrid policy combining SP and DWRR servicing.
  • Page 115: Table 15 Default Priority Value Of Untrusted Interfaces

    DRAFT: BROCADE CONFIDENTIAL Queueing Table 15 presents the Layer 2 QoS untrusted user priority generation table. TABLE 15 Default priority value of untrusted interfaces Incoming CoS User Priority port <user priority> (default 0) port <user priority> (default 0) port <user priority> (default 0) port <user priority>...
  • Page 116 DRAFT: BROCADE CONFIDENTIAL Queueing Perform the following steps from Privileged EXEC mode to configure the QoS trust mode. 1. Enter global configuration mode. switch#configure terminal 2. Specify the 10-gigabit Ethernet interface. Example of selecting the 10-Gigabit Ethernet interface port 0/2. switch(config)#interface tengigabitethernet 0/2 3.
  • Page 117: Traffic Class Mapping

    DRAFT: BROCADE CONFIDENTIAL Queueing Creating a CoS-to-CoS mutation QoS map Perform the following steps from Privileged EXEC mode to create a CoS-to-CoS mutation. 1. Enter global configuration mode. switch#configure terminal 2. Create the CoS-to-CoS mutation QoS map name. In this example ‘test’ is used. switch(config)#qos map cos-mutation test 0 1 2 3 5 4 6 7 3.
  • Page 118: Table 17 Default User Priority For Unicast Traffic Class Mapping

    DRAFT: BROCADE CONFIDENTIAL Queueing The traffic class mapping stage provides some flexibility in queue selection: • The mapping may be many-to-one, such as mapping one byte user priority (256 values) to eight traffic classes. • There may be a non-linear ordering between the user priorities and traffic classes. Unicast traffic Table 17 presents the Layer 2 default traffic class mapping supported for a COS-based user priority...
  • Page 119 DRAFT: BROCADE CONFIDENTIAL Queueing Once the traffic class mapping has been resolved for ingress traffic, it is applied consistently across all queueing incurred on the ingress and egress ports. Mapping CoS-to-Traffic-Class Perform the following steps from Privileged EXEC mode to map a CoS-to-Traffic-Class. 1.
  • Page 120: Congestion Control

    DRAFT: BROCADE CONFIDENTIAL Congestion control Verifying a mapping CoS-to-Traffic-Class Perform the following steps from Privileged EXEC mode to verify a CoS-to-Traffic-Class mapping. 1. Enter global configuration mode. switch#configure terminal 2. Verify the CoS-Traffic-Class mapping specifying a name and the mapping. switch(config)#show qos map cos-traffic-class test Congestion control Queues can begin filling up due to a number of reasons, such as over subscription of a link or...
  • Page 121: Figure 9 Queue Depth

    DRAFT: BROCADE CONFIDENTIAL Congestion control consume the full buffer memory. Thresholds can also be used to bound the maximum queueing delay for each traffic class. Additionally if the sum of the thresholds for a port is set below 100 percent of the buffer memory, then you can also ensure that a single port does not monopolize the entire shared memory pool.
  • Page 122: Ethernet Pause

    DRAFT: BROCADE CONFIDENTIAL Congestion control switch#copy running-config startup-config Ethernet pause Ethernet Pause is an IEEE 802.3 standard mechanism for back pressuring a neighboring device. Pause messages are sent by utilizing the optional MAC control sublayer. A Pause frame contains a 2-byte pause number, which states the length of the pause in units of 512 bit times.
  • Page 123: Ethernet Priority Flow Control

    DRAFT: BROCADE CONFIDENTIAL Multicast rate limiting Ethernet Priority Flow Control Ethernet Priority Flow Control (PFC) is a basic extension of the Ethernet Pause. The Pause MAC control message is extended with eight 2-byte pause numbers and a bitmask to indicate which values are valid.
  • Page 124: Scheduling

    DRAFT: BROCADE CONFIDENTIAL Scheduling Multicast rate limit is applied to the output of each multicast receive queue. Rate limits apply equally to ingress receive queueing (first level expansion) and egress receive queueing (second level expansion) since the same physical receive queues are utilized. You can set policies to limit the maximum multicast frame rate differently for each traffic class level and cap the total multicast egress rate out of the system.
  • Page 125: Deficit Weighted Round Robin Scheduling

    DRAFT: BROCADE CONFIDENTIAL Scheduling Figure 10 describes the frame scheduling order for an SP scheduler servicing two SP queues. The higher numbered queue, SP2, has a higher priority. FIGURE 10 Strict priority schedule — two queues Deficit weighted round robin scheduling Weighted Round Robin (WRR) scheduling is used to facilitate controlled sharing of the network bandwidth.
  • Page 126: Figure 12 Strict Priority And Weighted Round Robin Scheduler

    DRAFT: BROCADE CONFIDENTIAL Scheduling TABLE 19 Supported scheduling configurations Traffic Class WRR8 WRR7 WRR7 WRR6 WRR6 WRR6 WRR5 WRR5 WRR5 WRR5 WRR4 WRR4 WRR4 WRR4 WRR4 WRR3 WRR3 WRR3 WRR3 WRR3 WRR3 WRR2 WRR2 WRR2 WRR2 WRR2 WRR2 WRR2 WRR1 WRR1 WRR1 WRR1...
  • Page 127: Multicast Queue Scheduling

    DRAFT: BROCADE CONFIDENTIAL Scheduling Multicast queue scheduling The multicast traffic classes are numbered from 0 to 3; higher numbered traffic classes are considered higher priority. A fixed mapping from multicast traffic class to equivalent unicast traffic class is applied to select the queue scheduling behavior. Table 20 presents the multicast traffic class equivalence mapping applied.
  • Page 128: Converged Enhanced Ethernet Map Configuration

    DRAFT: BROCADE CONFIDENTIAL Converged Enhanced Ethernet map configuration Converged Enhanced Ethernet map configuration The CEE QoS covers frame classification, priority and traffic class (queue) mapping, congestion control, and scheduling. Under the CEE Provisioning model all of these features are configured utilizing two configuration tables, Priority Group Table and Priority Table.
  • Page 129: Table 22 Default Cee Priority Table

    DRAFT: BROCADE CONFIDENTIAL Converged Enhanced Ethernet map configuration CEE Priority Table defines each CoS mapping to Priority Group, and completes PFC configuration. There are eight rows in the CEE Priority Table. Table 22 details the default CEE Priority Table configuration. TABLE 22 Default CEE priority table PGID...
  • Page 130 DRAFT: BROCADE CONFIDENTIAL Converged Enhanced Ethernet map configuration Example of defining a CEE map with a Priority Group Table. PGID Description 15.0 switch:admin>cmsh switch>enable switch#configure terminal Enter configuration commands, one per line. End with CNTL/Z. switch(config)#cee-map test switch(config-ceemap)#priority-group-table 0 weight 50 pfc switch(config-ceemap)#priority-group-table 1 weight 50 switch(config-ceemap)#exit switch(config)#end...
  • Page 131 DRAFT: BROCADE CONFIDENTIAL Converged Enhanced Ethernet map configuration switch(config-ceemap)#exit switch(config)#end 4. Enter the copy command to save the running-config file to the startup-config file. switch#copy running-config startup-config Converged Enhanced Ethernet Administrator’s Guide 53-1001761-01...
  • Page 132 DRAFT: BROCADE CONFIDENTIAL Converged Enhanced Ethernet map configuration Applying a CEE provisioning map to an interface Perform the following steps from Privileged EXEC mode apply a CEE provisioning map. 1. Enter global configuration mode. switch#configure terminal 2. Specify the 10-gigabit Ethernet interface. In this example, 0/2 is used. switch(config)#interface tengigabitethernet 0/2 3.
  • Page 133: Chapter 10 Configuring 802.1X Port Authentication

    DRAFT: BROCADE CONFIDENTIAL Chapter Configuring 802.1x Port Authentication In this chapter • 802.1x protocol overview ........111 •...
  • Page 134: 802.1X Authentication Configuration Tasks

    DRAFT: BROCADE CONFIDENTIAL 802.1x authentication configuration tasks 802.1x authentication configuration tasks The tasks in this section describe the common 802.1x operations that you will need to perform. For a complete description of all the available 802.1x CLI commands for the Brocade FCoE hardware, see the Converged Enhanced Ethernet Command Reference.
  • Page 135: Configuring 802.1X Timeouts On Specific Interface Ports

    DRAFT: BROCADE CONFIDENTIAL Interface-specific administrative tasks for 802.1x 2. Use the interface command to select the interface port to modify. switch(config)#interface tengigabitethernet 1/12 3. Use the dot1x authentication command to enable 802.1x authentication. switch(conf-if-te-1/12)#dot1x authentication 4. Enter the copy command to save the running-config file to the startup-config file. switch(conf-if-te-1/12)#exit switch(config)#end switch#copy running-config startup-config...
  • Page 136: Disabling 802.1X On Specific Interface Ports

    DRAFT: BROCADE CONFIDENTIAL Interface-specific administrative tasks for 802.1x Disabling 802.1x on specific interface ports To disable 802.1x authentication on a specific interface port, perform the following steps from Privileged EXEC mode. 1. Enter the configure terminal command to access global configuration mode. 2.
  • Page 137: Chapter 11 Configuring Igmp

    DRAFT: BROCADE CONFIDENTIAL Chapter Configuring IGMP In this chapter • About IGMP ..........115 •...
  • Page 138: Multicast Routing

    DRAFT: BROCADE CONFIDENTIAL Configuring IGMP Multicast routing Multicast routers use IGMP to learn which groups have members on each of their attached physical networks. A multicast router keeps a list of multicast group memberships for each attached network, and a timer for each membership. NOTE “Multicast group memberships”...
  • Page 139: Configuring Igmp Snooping Querier

    DRAFT: BROCADE CONFIDENTIAL Configuring IGMP snooping querier Configuring IGMP snooping querier If your multicast traffic is not routed because Protocol-Independent Multicast (PIM) and IGMP are not configured, use the IGMP snooping querier in a VLAN. IGMP snooping querier sends out IGMP queries to trigger IGMP responses from switches that wish to receive IP multicast traffic.
  • Page 140 DRAFT: BROCADE CONFIDENTIAL Monitoring IGMP Use this command to display the IGMP database, including configured entries for either all groups on all interfaces, or all groups on specific interfaces, or specific groups on specific interfaces. Example switch#show ip igmp groups 3.
  • Page 141: Chapter 12 Configuring Rmon Using The Cee Cli

    DRAFT: BROCADE CONFIDENTIAL Chapter Configuring RMON using the CEE CLI In this chapter • RMON overview ..........119 •...
  • Page 142: Configuring Rmon Events

    DRAFT: BROCADE CONFIDENTIAL RMON configuration and management 2. Configure the RMON alarms. Example of an alarm that tests every sample for a rising threshold switch(config)#rmon alarm 5 1.3.6.1.2.1.16.1.1.1.5.65535 interval 30 absolute rising-threshold 95 event 27 owner john_smith Example of an alarm that tests the delta between samples for a falling threshold switch(config)#rmon alarm 5 1.3.6.1.2.1.16.1.1.1.5.65535 interval 10 delta falling-threshold 65 event 42 owner john_smith 3.
  • Page 143 DRAFT: BROCADE CONFIDENTIAL RMON configuration and management 5. Enter the copy command to save the running-config file to the startup-config file. switch(conf-if-te-0/1)#exit switch(config)#end switch#copy running-config startup-config Converged Enhanced Ethernet Administrator’s Guide 53-1001761-01...
  • Page 144 DRAFT: BROCADE CONFIDENTIAL RMON configuration and management Converged Enhanced Ethernet Administrator’s Guide 53-1001761-01...
  • Page 145: Fcoe Configuration Using The Fabric Os Cli

    DRAFT: BROCADE CONFIDENTIAL Chapter FCoE configuration using the Fabric OS CLI In this chapter • FCoE configuration guidelines and restrictions..... . 123 •...
  • Page 146: Managing And Displaying The Fcoe Configuration

    DRAFT: BROCADE CONFIDENTIAL Managing and displaying the FCoE configuration Managing and displaying the FCoE configuration FCoE technology bridges the boundary between the SAN and LAN sections of your network. FCoE configuration tasks require mostly configuration of the interface ports on the Brocade 8000 switch. NOTE To assist you in configuring FCoE, see “FCoE Initialization Protocol”...
  • Page 147: Clearing Logins

    DRAFT: BROCADE CONFIDENTIAL Managing and displaying the FCoE login configuration Perform the following task to configure FIP multicast advertisement intervals. Task Command Configure FIP multicast advertisement intervals. switch:admin> fcoe --fipcfg -advintvl intvl Syntax is as follows: • intvl—Specifies the interval in seconds. The minimum interval value is 0 seconds and the maximum value is 300 seconds.
  • Page 148: Displaying Or Aborting The Current Configuration Transaction

    DRAFT: BROCADE CONFIDENTIAL Managing and displaying the FCoE login configuration Perform one of the following tasks to toggle the availability of FCoE login configuration management. Task Command Enable the FCoE login configuration management switch:admin> fcoelogincfg --enable on the switch (this is a switch-based command, not port-based).
  • Page 149: Displaying The Fcoe Login Configuration

    DRAFT: BROCADE CONFIDENTIAL Creating and managing the FCoE login group configuration Displaying the FCoE login configuration Perform the following tasks to display the FCoE login configuration. Task Command Display the FCoE login configuration. Syntax is as switch:admin> fcoelogincfg --show [-switch swwn | follows: -logingroup lgname] [-saved] •...
  • Page 150: Modifying The Fcoe Login Group Device List

    DRAFT: BROCADE CONFIDENTIAL Creating and managing the FCoE login group configuration Perform the following task to create an FCoE login group. Task Command Syntax is as follows: switch:admin> fcoelogingroup --create lgname -switch • swwn | -self [-allowall | “member; member;…”] --create—Create a login group.
  • Page 151: Renaming An Fcoe Login Group

    DRAFT: BROCADE CONFIDENTIAL Creating and managing the FCoE login group configuration Renaming an FCoE login group Perform the following task to rename an FCoE login group. Task Command Rename an FCoE login group. Syntax is as switch:admin> fcoelogingroup --rename lgname follows: newlgname •...
  • Page 152 DRAFT: BROCADE CONFIDENTIAL Creating and managing the FCoE login group configuration Converged Enhanced Ethernet Administrator’s Guide 53-1001761-01...
  • Page 153: Cee Configuration Management

    DRAFT: BROCADE CONFIDENTIAL Chapter CEE configuration management In this chapter • CEE configuration management guidelines and restrictions ... 131 • CEE configuration management tasks......131 •...
  • Page 154: Display The Running Configuration File

    DRAFT: BROCADE CONFIDENTIAL CEE configuration management tasks Display the running configuration file To display the running configuration, perform the following steps from Privileged EXEC mode. 1. Enter the configure terminal command to access global configuration mode. 2. Enter the show command to display the configuration. switch#show running-config Saving the running configuration file This tasks causes the running configuration to become the default configuration.
  • Page 155: Restore An Archived Running Configuration File

    DRAFT: BROCADE CONFIDENTIAL CEE configuration management tasks 1. Enter the configure terminal command to access global configuration mode. 2. Enter the copy command to archive the running configuration file. switch#copy running-config ftp://jsmith:password@/archive/config_file] Restore an archived running configuration file To restore the running configuration, perform the following steps from Privileged EXEC mode. 1.
  • Page 156: Cee Configuration Management Commands

    DRAFT: BROCADE CONFIDENTIAL Flash file management commands switch#copy flash://config_filename startup-config CEE configuration management commands Table 23 lists the common CEE configuration management commands. TABLE 23 CEE configuration management commands Task Command Write the current running configuration file to switch#copy running-config startup-config the startup configuration file.
  • Page 157: Debugging And Logging Commands

    DRAFT: BROCADE CONFIDENTIAL Debugging and logging commands TABLE 24 CEE Flash memory file management commands (Continued) Task Command Erase all the files in the Flash memory directory. switch#erase flash NOTE: This command erases all the files in the % Warning: Erasing flash filesystem will remove all files in flash://.
  • Page 158 DRAFT: BROCADE CONFIDENTIAL Debugging and logging commands Converged Enhanced Ethernet Administrator’s Guide 53-1001761-01...
  • Page 159 DRAFT: BROCADE CONFIDENTIAL Index Symbols authentication server authenticator Numerics basic management TLV sets bridge 8000 CEE switch forwarding delay, configuring for STP, RSTP, MSTP congestion control and queuing hello time, configuring for STP, RSTP flow control maximum aging time, configuring for STP, RSTP, MSTP Layer 2 Ethernet Layer 2 forwarding priority, configuring for STP, RSTP, MSTP...
  • Page 160 DRAFT: BROCADE CONFIDENTIAL CEE maps, verifying CEE provisioning map, applying Cisco interoperability, disabling for MSTP Cisco interoperability, enabling for MSTP edge detection, configuring for STP, RSTP, MSTP classifier groups, VLAN edge port, enabling a CEE interface as an edge port for classifier rules, VLAN RSTP, MSTP CLI, CEE...
  • Page 161 DRAFT: BROCADE CONFIDENTIAL FC zoning FCoE login key terms xviii FCoE logout keyboard shortcuts, CEE CLI FIP discovery login logincfg logout name server LACP registered state change notification (RSCN) configuration guidelines and restrictions FLOGI configuration procedures flow control clearing counters flushing MAC addresses configuring system priority frame classification, incoming...
  • Page 162 DRAFT: BROCADE CONFIDENTIAL LLDP configuration guidelines and restrictions configuration procedures output modifiers, CEE CLI clearing LLDP-related information overview disabling LLDP globally displaying LLDP-related information link aggregation enabling LLDP globally MSTP global command options RSTP important notes interface-level command options DCBX overview default configuration Layer 2 topology mapping overview...
  • Page 163 DRAFT: BROCADE CONFIDENTIAL querier switch interval connecting servers port configuration VLAN serial number queuing system priority, configuring for LACP congestion control FCoE T11-FC-BB5 technical help telnet RADIUS terminology Rapid Spanning Tree Protocol document xviii See RSTP FCoE RBAC permissions timeout period, configuring for LACP region name, specifying for MSTP TLV sets registered state notification protocol (RSCN)
  • Page 164 DRAFT: BROCADE CONFIDENTIAL VLAN applying a MAC ACL configuration guidelines and restrictions configuration procedures clearing VLAN counters configuring a CEE interface as a Layer 2 switch port configuring a CEE interface as an access or trunk interface configuring the MTU on an interface displaying VLAN information enabling and disabling a CEE interface important notes...

Table of Contents