Brocade Communications Systems SN3000B Administrator's Manual

Brocade web tools administrator's guide - supporting fabric os v7.0.0 (53-1002152-01, march 2012)
Hide thumbs Also See for SN3000B:
Table of Contents

Advertisement

Quick Links

53-1002152-01
®
29 April 2011

Web Tools

Administrator's Guide
Supporting Fabric OS v7.0.0

Advertisement

Table of Contents
loading

Summary of Contents for Brocade Communications Systems SN3000B

  • Page 1: Web Tools

    53-1002152-01 ® 29 April 2011 Web Tools Administrator’s Guide Supporting Fabric OS v7.0.0...
  • Page 2 Copyright © 2006-2011 Brocade Communications Systems, Inc. All Rights Reserved. Brocade, the B-wing symbol, BigIron, DCX, Fabric OS, FastIron, IronPoint, IronShield, IronView, IronWare, JetCore, NetIron, SecureIron, ServerIron, StorageX, and TurboIron are registered trademarks, and Brocade Network Advisor, Extraordinary Networks, and SAN Health are trademarks of Brocade Communications Systems, Inc., in the United States and/or in other countries.
  • Page 3 Document History Document Title Publication Number Summary of Changes Publication Date Web Tools User’s Guide v2.0 53-0001536-01 September 1999 Web Tools User’s Guide v2.2 53-0001558-02 May 2000 Web Tools User’s Guide v2.3 53-0000067-02 December 2000 Web Tools User’s Guide v3.0 53-0000130-03 July 2001 Web Tools User’s Guide v2.6...
  • Page 4 Document Title Publication Number Summary of Changes Publication Date Web Tools Administrator’s Guide 53-1000606-01 Updates to reflect updates to enhanced October 2007 Access Gateway support, changes to FCIP tunneling wizard, and other enhancements. Web Tools Administrator’s Guide 53-1000606-02 Updates for support for new switches, March 2008 traffic isolation zoning, F_Port trunking, removal of enhanced Access Gateway...
  • Page 5: Table Of Contents

    Contents About This Document In this chapter ......... . . xxi How this document is organized .
  • Page 6 Role-Based Access Control....... . . 13 Session management ........13 Ending a Web Tools session .
  • Page 7 Switch configuration ........37 Enabling and disabling a switch .
  • Page 8 Admin Domain configuration maintenance....59 Uploading and downloading from USB storage....60 Performing a firmware download .
  • Page 9 Port activation ......... . . 86 Enabling Ports on Demand .
  • Page 10 Saving graphs to a canvas ....... .114 Adding graphs to an existing canvas ......115 Printing graphs .
  • Page 11 Zone configuration and zoning database management ..128 Creating zone configurations ......129 Adding or removing zone configuration members.
  • Page 12 Viewing EX_Ports........148 Configuring an EX_Port .
  • Page 13 Routing overview ........169 Viewing fabric shortest path first routing .
  • Page 14 RADIUS management ........196 Enabling and disabling RADIUS ......196 Configuring RADIUS .
  • Page 15 Allow / Prohibit Matrix configuration ......220 Viewing Allow / Prohibit Matrix configurations... . .221 Modifying Allow / Prohibit Matrix configurations .
  • Page 16 Enabling and disabling LLDP ......241 Enabling and disabling QoS priority-based flow control ..242 Enabling and disabling FCoE ports .
  • Page 17 Figures Figure 1 Configuring Internet Explorer ......... 6 Figure 2 Default Java for browsers option .
  • Page 18 Figure 37 Switch Admin:Add User Defined Role dialog ......185 Figure 38 Switch Admin:Add User Defined Role dialog ......186 Figure 39 Transport mode and tunnel mode comparison .
  • Page 19 Tables Table 1 Basic Web Tools features and EGM licensed features ..... 2 Table 2 Web Tools functionality moved to Brocade Network Advisor ....3 Table 3 Certified and tested platforms.
  • Page 20 Web Tools Adminstrator’s Guide 53-1002152-01...
  • Page 21: About This Document

    About This Document In this chapter • How this document is organized ........xxi •...
  • Page 22: Supported Hardware And Software

    • Chapter 10, “Working with Diagnostic Features” provides information about trace dumps, viewing switch health, and interpreting the LEDs. • Chapter 11, “Using the FC-FC Routing Service” provides information on using the FC-FC Routing Service to share devices between fabrics without merging those fabrics. •...
  • Page 23: What's New In This Document

    • Brocade 8000 • Brocade DCX 8510-4 • Brocade DCX 8510-8 Backbone • Brocade DCX Backbone • Brocade DCX-4S Backbone • Brocade Encryption Switch • Brocade VA-40FC The following blades are supported by this release: • Brocade CORE 8 blade •...
  • Page 24: Document Conventions

    Document conventions This section describes text formatting conventions and important notice formats used in this document. Text formatting The narrative-text formatting conventions that are used are: bold text Identifies command names Identifies the names of user-manipulated GUI elements Identifies keywords and operands Identifies text to enter at the GUI or CLI italic text Provides emphasis...
  • Page 25: Key Terms

    Key terms For definitions specific to Brocade and Fibre Channel, see the Brocade Glossary. For definitions of SAN-specific terms, visit the Storage Networking Industry Association online dictionary http://www.snia.org/education/dictionary Notice to the reader This document may contain references to the trademarks of the following corporations. These trademarks are the properties of their respective companies and corporations.
  • Page 26: Other Industry Resources

    Other industry resources For additional resource information, visit the Technical Committee T11 website. This website provides interface standards for high-performance and mass storage applications for Fibre Channel, storage management, and other applications: http://www.t11.org For information about the Fibre Channel industry, visit the Fibre Channel Industry Association website: http://www.fibrechannel.org Getting technical help...
  • Page 27: Document Feedback

    • Brocade 8000 —On the switch ID pull-out tab located inside the chassis on the port side on the left. 3. World Wide Name (WWN) Use the licenseIdShow command to display the WWN of the chassis. If you cannot use the licenseIdShow command because the switch is inoperable, you can get the WWN from the same place as the serial number, except for the Brocade DCX.
  • Page 28 xxviii Web Tools Adminstrator’s Guide 53-1002152-01...
  • Page 29: In This Chapter

    Chapter Introducing Web Tools In this chapter • Web Tools overview ..........1 •...
  • Page 30: Web Tools Features Enabled By The Egm License

    Web Tools, the EGM license, and Brocade Network Advisor Web Tools features enabled by the EGM license Table 1 describes those Web Tools features that require the EGM license. TABLE 1 Basic Web Tools features and EGM licensed features Feature Basic Web Tools Web Tools with EGM License Active Directory support...
  • Page 31: Web Tools Functionality Moved To Brocade Network Advisor

    Web Tools, the EGM license, and Brocade Network Advisor TABLE 1 Basic Web Tools features and EGM licensed features (Continued) Feature Basic Web Tools Web Tools with EGM License Port Administration Print zone database summary RBAC Routing and DLS Configuration Security Policies Tab (like ACL) Switch Info tab Switch Status...
  • Page 32: System Requirements

    System requirements TABLE 2 Web Tools functionality moved to Brocade Network Advisor (Continued) Function Web Tools 6.1.0 Brocade Network Advisor Comments Device Zone Admin Configure > Zoning Accessibility the Compare dialog box provides the Matrix Storage-Host and Host-Storage view in a tree representation that is comparable to the Device Accessibility Matrix when all devices are selected.
  • Page 33: Setting Refresh Frequency For Internet Explorer

    System requirements Brocade has certified and tested Web Tools on the platforms shown in Table TABLE 3 Certified and tested platforms Operating System Browser Windows Server 2008 R2 Standard (64-bit) Internet Explorer 8.0 Windows Server 2008 Standard Internet Explorer 7.0 Windows Vista Business Internet Explorer 7.0 Red Hat Enterprise Server 5 Advanced...
  • Page 34: Deleting Temporary Internet Files Used By Java Applications

    Java installation on the workstation 3. Choose Every visit to the page under “Check for newer versions of stored pages:” as shown in Figure 1 on page 6. FIGURE 1 Configuring Internet Explorer Deleting temporary internet files used by Java applications For Web Tools to operate correctly, you must delete the temporary internet files used by Java applications.
  • Page 35: Installing The Jre On Your Solaris Or Linux Client Workstation

    Java installation on the workstation If you attempt to open Web Tools with a later version of Java Plug-in installed: • Internet Explorer might prompt for an upgrade, depending on the existing Java Plug-in version. • Firefox uses the existing Java Plug-in. Installing the JRE on your Solaris or Linux client workstation To do the JRE installation, perform the following steps.
  • Page 36: Java Plug-In Configuration

    Java plug-in configuration • If no Java Plug-in is installed, point the browser to a switch running Fabric OS 5.2.0 or later to install JRE 1.6.0. For Fabric OS 6.3.0 install JRE 1.6.0 update 13. Web Tools guides you through the steps to download the proper Java Plug-in. •...
  • Page 37: Configuring The Java Plug-In For Mozilla Family Browsers

    Value line licenses Configuring the Java plug-in for Mozilla family browsers To configure Java plug-in for Mozilla family browsers, perform the following steps. 1. From the Start menu, select Settings > Control Panel. 2. Click the Advanced tab and expand the Default Java for browsers option, as shown in Figure 2 on page 9.
  • Page 38: Opening Web Tools

    Opening Web Tools Opening Web Tools You can open Web Tools on any workstation with a compatible Web browser installed. For a list of Web browsers compatible with Fabric OS v7.0.0, refer to Table 3. Web Tools supports both HTTP and HTTPS protocol.
  • Page 39: Logging In

    Opening Web Tools Logging in When you use Web Tools, you must log in before you can view or modify any switch information. This section describes the login process. Prior to displaying the login window, Web Tools displays a security banner (if one is configured for your switch), that you must accept before logging in.
  • Page 40: Logging Out

    Opening Web Tools To log in to a Virtual Fabric, perform the following steps. 1. Select Options to display the Virtual Fabric options. You are given a choice between Home Logical Fabric and User Specified Virtual Fabric (Figure 4). Home Logical Fabric is the default. FIGURE 4 Virtual Fabric login option 2.
  • Page 41: Role-Based Access Control

    Role-Based Access Control • Your currently selected Admin Domain is removed or invalidated. • Your currently selected Admin Domain is removed from your Admin Domain list. • You initiate a firmware download from Web Tool’s Switch Administration window. In this case, you are logged out a few minutes later when the switch restarts.
  • Page 42: Ending A Web Tools Session

    Web Tools system logs A session automatically ends if no information was sent to the switch for more than two hours. Because user key strokes are not sent to the switch until you apply or save the information, it is possible for your session to end while you are entering information in the interface.
  • Page 43: Requirements For Ipv6 Support

    Requirements for IPv6 support The maximum size of the webtools.log file is 2MB. It is rolled into new file when the 5mb file size limit is exceeded. A backup file named webtools1.log is automatically created. Web Tools maintains only one webtools.log backup file at a time. The Web Tools debug dialog box can be used to enable the debug state and level for a module at runtime.
  • Page 44 Requirements for IPv6 support Web Tools Adminstrator’s Guide 53-1002152-01...
  • Page 45: In This Chapter

    Chapter Using the Web Tools Interface In this chapter • Viewing Switch Explorer ......... 17 •...
  • Page 46 Viewing Switch Explorer NOTE To perform monitoring tasks such as performance monitoring the EGM license must be installed on the switch; otherwise, access to this feature is denied and an error message displays. Tools tasks, such as opening the Telnet window. •...
  • Page 47: Persisting Gui Preferences

    Viewing Switch Explorer For non-8 Gbps platforms, all functionalities are available without EGM license. Tasks and Fabric Tree Menu bar Switch View buttons Changing the Virtual Fabric ID, or Changing the Admin Domain Switch Events and Switch Information Indicator bar Professional Management Tool offering Switch View...
  • Page 48: Tasks

    Viewing Switch Explorer If you launch WebTools from Brocade Network Advisor (BNA), all of the Web Tools GUI persistence data for each user name is stored in the BNA database. The Port Admin GUI preferences that persist are: • Basic or Advance mode •...
  • Page 49: Fabric Tree

    Viewing Switch Explorer • Switch administration • Port administration • Admin Domain administration • FCR (present only on the base switch when the Virtual Fabrics capability is enabled.) • Fabric Watch NOTE Some of these functions require a license key to activate them. The Monitor section of the Tasks menu provides access to the following options: •...
  • Page 50 Viewing Switch Explorer After you log in, all Admin Domains assigned to you are available in the drop-down menu. For most administrative tasks, you must be in either AD0 or the physical fabric. When changing the Admin Domain context, the option for selecting AD from the drop-down list is not available if the EGM license is not present.
  • Page 51: Switch View Buttons

    Viewing Switch Explorer To change the Admin Domain context, perform the following steps. 1. Select a domain from the Admin Domain menu. 2. Click OK in the confirmation window. Switch Explorer refreshes to display the new Admin Domain context. You can monitor the progress using the progress bar.
  • Page 52: Figure 6 Usb Port Storage Management

    Viewing Switch Explorer The default Switch View display refresh rate is 60 seconds. However, the initial display of Switch Explorer might take from 30 to 60 seconds after the switch is booted. Refresh rates are fabric-size dependent. The auto refresh interval may not be less than 60 seconds. However, the refresh rate varies depending on the activity in the fabric and on the host system you are using.
  • Page 53: Switch Events And Switch Information

    Viewing Switch Explorer NOTE Click the USB port on the switch to launch the USB Storage Management window. Switch Events and Switch Information Switch Events and Switch Information display as tab forms under Switch View. The information in the Switch Information View is polled every 60 seconds. NOTE You can click the column head to sort the events by a particular column, and drag the column divider to resize a column.
  • Page 54: Free Professional Management Tool

    Displaying tool tips • Other Manufacturer serial number Displays the serial number of the manufacturer. Supplier serial number Displays the serial number of the supplier. License ID Displays the license ID. • RNID Type Type of the switch. Model Model of the switch. Tag of the switch.
  • Page 55: Right-Click Options

    Right-click options • port status (online or offline) • port state (in-sync, no_sync, no light, or no module) Right-click options You can right-click a port to quickly perform some basic port administration tasks, as shown in Figure FIGURE 7 Right-click menu for ports (from Switch Explorer) The tasks are: •...
  • Page 56: Displaying Switches In The Fabric

    Displaying switches in the fabric For these reasons, the time displayed in the port statistics tab might not be refreshed as expected. The counter time indicates only that “this statistics data is retrieved from the switch in this time period.” To ensure the correct information, the time field is updated along with the port statistics data after every refresh.
  • Page 57: Working With Web Tools: Recommendations

    Working with Web Tools: recommendations Working with Web Tools: recommendations Brocades makes the following recommendations for working with Web Tools: • If you receive an error when saving changes in the Switch Administration window, note the error messages, refresh the window, and make your changes again. Do not continue making changes without refreshing the window and determining which changes were saved correctly.
  • Page 58: Collecting Logs For Troubleshooting

    Collecting logs for troubleshooting To avoid the need to remember and key in the path, you can store the path on your PC and browse to the location. Clicking the button to the right of the field initiates the browse capability.
  • Page 59: In This Chapter

    Chapter Managing Fabrics and Switches In this chapter • Fabric and switch management overview ......31 •...
  • Page 60: Figure 8 Switch Administration Window, Switch Tab

    Fabric and switch management overview If the switch is not a member of the selected Admin Domain, most tabs in the Switch Administration window display in read-only mode, regardless of your permission level. The User tab is editable because most of its information does not require switch membership in the current Admin Domain.
  • Page 61: Opening The Switch Administration Window

    Configuring IP and subnet mask information Opening the Switch Administration window Most of the management procedures in this chapter are performed from the Switch Administration window. To open the Switch Administration window, perform the following steps. 1. Select Tasks > Manage > Switch Admin. The Switch Administration dialog box displays in basic mode, as shown in Figure 8 on page 32.
  • Page 62: Configuring A Syslog Ip Address

    Configuring a syslog IP address To configure Auto Refresh, perform the following steps. 1. Open the Switch Administration window as described in “Opening the Switch Administration window” on page 33. 2. Select the Network tab. 3. Click Netstat Performance. 4. Select the Auto Refresh check box to automatically refresh the port details. Clear the check box to disable auto refresh.
  • Page 63: Configuring Ip Filtering

    Configuring IP Filtering Configuring IP Filtering Web Tools provides the ability to control what client IP addresses may connect to a switch or fabric. To set up IP Filtering, perform the following steps. 1. Open the Switch Administration window as described in “Opening the Switch Administration window”...
  • Page 64: Setting A Slot-Level Ip Address

    Blade management NOTE The blade state is always shown as enabled, even if you perform a blade disable operation. When a blade is set to a disable state, only the ports on the balde are disabled. The blade remains active. To enable or disable a blade, perform the following steps.
  • Page 65: Viewing Ip Addresses

    Switch configuration 5. Enter the IP address, subnet mask, and Gateway IP address. 6. Select a type from the list. Click Add to add the new entry to the table. When you click Add, the values remain in the fields. The Clear Gateway and Clear IP buttons are available for clearing fields in the table.
  • Page 66: Changing The Switch Name

    Switch configuration The system displays a confirmation window that asks if you want to save the changes to the switch. You must click Yes to save the changes. Changing the switch name Switches can be identified by IP address, domain ID, World Wide Name (WWN), or switch names. Names must begin with an alphabetic character, but otherwise can consist of alphanumeric, hyphen, and underscore characters.
  • Page 67: Switch Restart

    Switch restart To view or print a report, perform the following steps. 1. Open the Switch Administration window as described in “Opening the Switch Administration window” on page 33. 2. Select the Switch tab. 3. Click View Report. 4. In the new window that displays the report, view or print the report using your browser. Switch restart When you restart the switch, the restart takes effect immediately.
  • Page 68: Wwn-Based Persistent Pid Assignment

    System configuration parameters • System services • Signed firmware WWN-based Persistent PID assignment WWN-based PID assignment allows you to configure a PID persistently using a device’s WWN. When the device logs into the switch, the PID is bound to the device WWN. If the device is moved to another port in the same switch, or a new blade is hot plugged, the device receives the same PID (area) at its next login.
  • Page 69: Configuring Fabric Settings

    System configuration parameters Configuring fabric settings To configure the fabric settings, perform the following steps. 1. Open the Switch Administration window as described in “Opening the Switch Administration window” on page 33. 2. Select the Configure tab. 3. Select the Fabric subtab. 4.
  • Page 70: Configuring Virtual Channel Settings

    System configuration parameters 1. Open the Switch Administration window as described in “Opening the Switch Administration window” on page 33. 2. Disable the switch as described in “Enabling and disabling a switch” on page 37. 3. Select the Configure tab. 4.
  • Page 71: Configuring System Services

    System configuration parameters 5. Select or clear the check boxes to enable or disable the corresponding arbitrated loop parameters. 6. Click Apply. Enable the switch as described in “Enabling and disabling a switch” on page 37. Arbitrated loop parameters Configure the following arbitrated loop parameters on the Arbitrated Loop subtab of the Configure tab: Send Fan Frames Select this check box to specify that fabric address notification (FAN)
  • Page 72: Licensed Feature Management

    Licensed feature management To configure the signed firmware, perform the following steps. 1. Open the Switch Administration window as described in “Opening the Switch Administration window” on page 33. 2. Select the Configure tab. 3. Select the Firmware subtab. 4. Select the Enable Signed Firmware Download check box. 5.
  • Page 73: Removing A License From A Switch

    Licensed feature management 1. Open the Switch Administration window as described in “Opening the Switch Administration window” on page 33. 2. Select the License tab. 3. Select the license key for which you want to assign slots from the License Administration table. The Assign Slots window displays.
  • Page 74: High Availability Overview

    High Availability overview • Server Application Optimization High Availability overview High-Availability (HA) features provide maximum reliability and nondisruptive replacement of key hardware and software modules. High Availability is available only on the Brocade DCX, DCX-4S, DCX 8510-4 and DCX 8510-8 platforms. Refer to the Fabric OS Administrator’s Guide for additional information about High Availability.
  • Page 75: Synchronizing Services On The Cp

    High Availability overview • The CP tab displays information about slots. For Brocade DCX-4S or DCX 8510-4, CP blades are placed in slot 4 and slot 5.,For the Brocade DCX or DCX 8510-8, CP blades are placed in slot 6 and 7.
  • Page 76: Initiating A Cp Failover

    Event monitoring 4. Click Yes and wait for the CPs to complete a synchronization of services, so that a nondisruptive failover is ready. 5. Click Refresh to update the HA Status field. When the HA Status field displays HA enabled, Heartbeat Up, HA State synchronized a failover can be initiated without disrupting frame traffic on the fabric.
  • Page 77: Displaying Switch Events

    Event monitoring • Marginal • Notice • Information • Debug Table 8 lists the event message severity levels displayed on the Switch Events tab and explains what qualifies event messages to be certain levels. On the Switch Events tab, you can click the Filter button to launch the Filter Events dialog box. The Filter Events dialog box allows you to define which events should be displayed on the Switch Events tab.
  • Page 78: Filtering Switch Events

    Event monitoring To display Switch Events, perform the following steps. 1. Select the switch from the Fabric Tree. The Switch View displays. 2. Select the Switch Events tab, if necessary. Filtering Switch Events You can filter the fabric and switch events by time, severity, message ID, and service. You can apply either one type of filter at a time or multiple types of filters at the same time.
  • Page 79: Filtering Events By Message Id

    Displaying the Name Server entries Filtering events by message ID To filter events by message ID, perform the following steps. 1. Open the Switch Events tab as described in “Displaying Switch Events” on page 49. 2. Click Filter. The Event Filter dialog box displays. 3.
  • Page 80: Printing The Name Server Entries

    Displaying the Name Server entries For FICON devices: The Name Server table lists the request node identification (RNID) information. To display the Name Servers, perform the following steps. 1. Select Tasks > Monitor > Name Server. The Name Server window displays. 2.
  • Page 81: Physically Locating A Switch Using Beaconing

    Physically locating a switch using beaconing Physically locating a switch using beaconing Use the Beacon button to physically locate a switch in a fabric. The beaconing function helps to physically locate a switch by sending a signal to the specified switch, resulting in an LED light pattern that cycles through all ports for each switch (from left to right).
  • Page 82: Selecting A Logical Switch From The Switch View

    Virtual Fabrics overview • Brocade DCX 8510-8 Virtual Fabrics cannot be configured or managed from Web Tools. Configuration and management is done from either the Brocade Network Advisor, or the Fabric OS command line interface. For information about configuring and managing Virtual Fabrics, refer to the Brocade Network Advisor User Manual if you are using Brocade Network Advisor, or Fabric OS Administrator’s Guide if you are using the Fabric OS command line interface.
  • Page 83 Virtual Fabrics overview Logical ports are software constructs, and have no corresponding hardware to represent them on the Switch View. Logical port information is available in the Port Administration window. 1. Select Port Administration. The Port Administration window displays. Logical ports are displayed in the FC Ports Explorer tree structure.
  • Page 84 Virtual Fabrics overview Web Tools Adminstrator’s Guide 53-1002152-01...
  • Page 85: Maintaining Configurations And Firmware

    Chapter Maintaining Configurations and Firmware In this chapter • Creating a configuration backup file ....... 57 •...
  • Page 86: Restoring A Configuration

    Restoring a configuration NOTE By default, Config Upload is chosen under Function, and Network is chosen as the source of the configuration file. 5. Enter the configuration file with a fully-qualified path, or select the configuration file name in the Configuration File Name field. If you select USB as the configuration file source, the network parameters are not needed and are not displayed.
  • Page 87: Admin Domain Configuration Maintenance

    Admin Domain configuration maintenance 4. Select the Upload/Download tab. The Upload/Download configuration screen displays. By default, Config Upload is chosen under Function, and Network is chosen as the source of the configuration file. 5. Under Function, select Config Download to Switch. If you select USB as the configuration file source, the network parameters are not needed and are not displayed, and you can skip to step 7.
  • Page 88: Uploading And Downloading From Usb Storage

    Uploading and downloading from USB storage • If you invoke Admin Domain from AD255 and you are logged in with any role that allows configuration upload/download, the following items are saved in the configuration file: Configuration information for zones in all Admin Domains All other configuration information, including zoning from all Admin Domains The filtering depends on the Admin Domain switch ownership, with additional access if you are in AD255.
  • Page 89 Performing a firmware download To download a new firmware version, perform the following steps. 1. Open the Switch Administration window as described in “Opening the Switch Administration window” on page 33. 2. Select the Firmware Download tab. 3. Choose to download either the firmware or the firmware key. The download source can be located on the network or a USB device.
  • Page 90 Performing a firmware download Web Tools Adminstrator’s Guide 53-1002152-01...
  • Page 91: Managing Administrative Domains

    Chapter Managing Administrative Domains In this chapter • Administrative Domain overview ........63 •...
  • Page 92: User-Defined Admin Domains

    Administrative Domain overview User-defined Admin Domains AD1 through AD254 are user-defined Admin Domains. These user-defined Admin Domains can be created only by a physical fabric administrator in AD255. System-defined Admin Domains AD0 and AD255 are special Admin Domains and are present in every AD-capable fabric. AD0 is a system-defined Admin Domain that, in addition to containing members you explicitly added (similar to user-defined Admin Domains), it contains all online devices, switches, and switch ports that were not assigned to any user-defined Admin Domain.
  • Page 93: Admin Domain Membership

    Enabling Admin Domains • Manage Advanced Performance Monitoring (this can be managed in AD0 if no other Admin Domains are present, but only if you are using Web Tools with the EGM license). The EGM license is required only for 8 Gbps platforms, such as the: •...
  • Page 94: Admin Domain Window

    Admin Domain window To enable Admin Domains, perform the following steps. 1. Change the Admin Domain context to AD0. Refer to “Changing the Admin Domain context” page 21. NOTE Changing the Admin Domain context requires using Web Tools with the EGM license; otherwise, access to this feature is denied and an error message displays.
  • Page 95: Opening The Admin Domain Window

    Admin Domain window When you launch the Admin Domain window and select the parent Admin Domains node in the tree on the left pane, the Admin Domain window displays summary information about all of the Admin Domains. You can also select a specific Admin Domain from the tree to display detailed information about that Admin Domain.
  • Page 96: Refreshing Fabric Information

    Admin Domain window To open an Admin Domain window, perform the following steps. 1. Select a switch from the Fabric Tree and log in when prompted. Switch View displays information for the selected switch. 2. If you plan to modify the Admin Domain configuration, from the Admin Domain menu, select Physical Fabric.
  • Page 97: Closing The Admin Domain Window

    Creating and populating domains To save the local Admin Domain changes, perform the following steps. 1. Select Actions > Save AD Configuration to save your changes to persistent storage as the defined Admin Domain configuration. 2. Select Actions > Apply AD Configuration to save your changes to persistent storage and make your changes effective in the fabric.
  • Page 98: Adding Ports Or Switches To The Fabric

    Creating and populating domains 3. In the Name area, assign an Admin Domain name. You can specify a name or let the system assign the name for you. 4. In the ID area, assign an Admin Domain ID. You can specify an ID or let the system assign the ID for you. 5.
  • Page 99: Activating Or Deactivating An Admin Domain

    Modifying Admin Domain members Activating or deactivating an Admin Domain To activate or deactivate an Admin Domain, perform the following steps. 1. Open the Admin Domain window. 2. From the tree on the left, select the Admin Domain you want to activate or deactivate. 3.
  • Page 100: Renaming Admin Domains

    Modifying Admin Domain members 9. Select Actions > Save AD Configuration to save the new Admin Domain configuration to persistent storage. 10. Select Actions > Apply AD Configuration to enforce the new Admin Domain configuration as the effective configuration. Renaming Admin Domains You can change the name of an Admin Domain, including an auto-assigned ID name.
  • Page 101: Clearing The Admin Domain Configuration

    Modifying Admin Domain members Clearing the Admin Domain configuration When you clear the Admin Domain configuration, all user-defined Admin Domains are deleted and all fabric resources (switches, ports, and devices) are returned to AD0. You cannot clear the Admin Domain configuration if zone configurations exist in any of the user-defined Admin Domains. To clear the Admin Domain configuration, perform the following steps.
  • Page 102 Modifying Admin Domain members Web Tools Adminstrator’s Guide 53-1002152-01...
  • Page 103: Managing Ports

    Chapter Managing Ports In this chapter • Port management overview ........75 •...
  • Page 104: Port Administration Window Components

    Port management overview NOTE You can drag the column divider to resize a column, or drag columns to re-arrange them in a custom order. You can also right-click a column heading to resize one or all columns, or sort the information in ascending or descending order.
  • Page 105 Port management overview • MTU Size • Compression Mode • Data L2COS Value • DSCP Data • IKE Policy Number • IPsec Policy Enabled • Keep Alive Timeout • MaximumCommunicationRate • MinimumCommunicationRate • MaxRetransmitRate • MinRetransmitRate • Metric • Pre-Shared key •...
  • Page 106 Port management overview When viewing detailed information about a port, Basic Mode provides these subtabs: • General—All ports View Details Rename Edit Configuration Enable/Disable (port) Persistent Enable/Persistent Disable (port) • SFP—Physical ports only (FC, CEE, and GbE) Basic information about the port equipment •...
  • Page 107: Controllable Ports

    Configuring FC ports • SFP—Physical ports only (FC, CEE, and GbE) Basic Information about the port. Advanced information about the port equipment • QSFP—Quad Small Form-factor Pluggable ports Basic Information about the port. Advanced information about the port equipment. UnitNumber ChannelIndex DeviceTech MaxCaseTemp...
  • Page 108: Allowed Port Types

    Configuring FC ports • Brocade 7800 For non-8 Gbps platforms, all functionality is available without EGM license. The following procedure describes how to open the FC Port Configuration wizard. The wizard is self-explanatory, so the explicit steps are not documented here. 1.
  • Page 109: Long Distance Mode

    Configuring FC ports E_Port The port can be used to connect to another switch. On the Brocade FC8-64, ports 56 through 63 are not available as E_Ports. This option is unavailable for these ports. U_Port For a physical FC port: the port can be any one of E_Port, F_Port, or L_Port. For a logical FC port: the port can be either VE_Port or VEX_Port.
  • Page 110: Assigning A Name To A Port

    Assigning a name to a port Ingress rate limiting is applicable only to F_Ports and FL_Ports and is available only on the following platforms: • Brocade DCX • Brocade DCX-4S • Brocade DCX 8510 • Brocade Encryption Switch • Brocade 300 •...
  • Page 111: Port Beaconing

    Port beaconing Port names can be from 1 through 128 alphanumeric characters, unless FICON Management Server (FMS) mode is enabled. If FMS mode is enabled, port names should be limited from 1 through 24 alphanumeric characters. The comma (,), semicolon (;), and “at” symbol (@) are not allowed.
  • Page 112: Enabling And Disabling A Port

    Enabling and disabling a port Enabling and disabling a port To enable or disable a port, perform the following steps. 1. Click a port in the Switch View to open the Port Administration window. 2. Select the FC Ports or GigE Ports tab. 3.
  • Page 113: Persistent Enabling And Disabling Ports

    Persistent enabling and disabling ports Persistent enabling and disabling ports To enable or disable a port so that it remains enabled or disabled across switch restarts, perform the following steps. NOTE Ports cannot be persistently enabled or disabled when FMS is enabled. 1.
  • Page 114: Port Activation

    Port activation The NPIV Max Login Limit option configures the maximum number of permitted logins per NPIV port. Each NPIV port can support up to 255 logins. The range of valid values is from 1 through 255 logins per port. The default value is 126 logins. This feature supports virtual switches, but not on physical switches.
  • Page 115: Enabling Ports On Demand

    Port activation TABLE 9 Ports enabled with POD licenses and DPOD feature (Continued) Switch name Enabled by Enabled with Ports on Demand Enabled with the Dynamic Ports on default licenses Demand feature Brocade 5460 0-3, 6-13 4, 5, 14-25 Brocade 5450 1-10, 19-22 0, 11-18, 23-25 Brocade 5424...
  • Page 116: Enabling Dynamic Ports On Demand

    Port activation If you remove a Ports on Demand license, the licensed ports are disabled after the next platform restart or the next port deactivation. Enabling Dynamic Ports on Demand You must be logged in as Admin to enable the Dynamic POD feature. NOTE The Dynamic PODs feature is supported on the Brocade 4018, 4020, 4024, 5460, and 5470 switches only.
  • Page 117: Diagnostic Ports

    Port activation Diagnostic ports Diagnostic ports (D_Port) are used for running diagnostics to isolate link level faults and inter-switch link testing in fabric, optical and remote loopback modes. D_Ports are not part of any fabric and it does not carry any data or protocol traffic with it. It is used only for running diagnostic traffic for isolating link level faults.
  • Page 118: Port Swapping Index

    Port swapping index Port swapping index If a port malfunctions, or if you want to connect to different devices without having to rewire your infrastructure, you can move traffic from one port to another (swap ports) without changing the I/O Configuration Data Set (IOCDS) on the mainframe computer.
  • Page 119: Determining If A Port Index Was Swapped With Another Switch Port

    Port swapping index If the port is on a blade, you must also provide the slot number. NOTE Port swap is not supported above the 16th port in a 48 port card in FMS mode. 8. Click Swap. Determining if a port index was swapped with another switch port To determine whether a port was swapped, perform the following steps.
  • Page 120: Configuring Bb Credits On An F_Port

    Configuring BB credits on an F_Port Configuring BB credits on an F_Port In Fabric OS v6.4.0 and later, you can configure the BB credits value on an F_Port. Follow the steps given below. 1. Select a port in the Switch View to open the Port Administration window. 2.
  • Page 121: Configuring Port Octet Speed Combination

    Configuring Port Octet Speed Combination After selecting enable, the stringent and flexible radio buttons are enabled. Neither radio buttons are selected by default. 3. Select either stringent or flexible. 4. Click Apply. 5. Close the Switch page. 6. Select Port Admin. Select an F_Port or U_Port from the device tree or Port List table.
  • Page 122: Figure 17 Fc Explorer Dialog

    Configuring Port Octet Speed Combination The ports on these hardware models are segregated into 8 port octets. The Port Octet Speed Combination is applied to the eight ports to which the selected port belongs. Based on this Port Octet Speed combination, the speed options will be available in the Edit Configuration Dialog. TABLE 10 Port octet speed combinations Port Octet in Combination...
  • Page 123: Configuring Csctl

    Configuring CSCTL Configuring CSCTL Unlike QoS Zone-based FC flow prioritization method, CSCTL enables the same SID/DID pair exchange frames with different priorities. To be able to prioritize a frame flow between two end nodes, Fabric OS v7.0.0 provides support for up to 32 Virtual Channels (VCs) per port.
  • Page 124: Inband Management

    Inband Management Inband Management Inband Management is designed to allow the management of the switch through GigE ports. This allows a management station located on the WAN side of the FCIP platform to communicate with the control processor for management tasks, such as launching Web Tools, SNMP polling, SNMP traps, trouble shooting, and configuration.
  • Page 125 Inband Management 10. Click OK. 11. Select the General sub-tab. 12. Select the Enable option from the Inband selection list to activate Inband Management. Web Tools Adminstrator’s Guide 53-1002152-01...
  • Page 126 Inband Management Web Tools Adminstrator’s Guide 53-1002152-01...
  • Page 127: Enabling Isl Trunking

    Chapter Enabling ISL Trunking In this chapter • ISL Trunking overview ......... . . 99 •...
  • Page 128: Admin Domain Considerations

    Viewing trunk group information To disable trunking on a port, or to re-enable trunking if it has been disabled, perform the following steps. 1. Select a port in the Switch View to open the Port Admin window. 2. Select the FC Ports tab. 3.
  • Page 129: F_Port Trunk Groups

    F_Port trunk groups • Bandwidth (shown only for E_Port, Ex_Port, F_Port, and N_Port). • Throughput (shown only for E_Port, Ex_Port, F_Port, and N_Port). • Utilization (shown only for E_Port, Ex_Port, F_Port, and N_Port). Additionally, the following trunking attributes can also be displayed from the Port Admin view by clicking the Show Advanced Mode button: •...
  • Page 130 F_Port trunk groups 3. Select any port from the port group in which you want to create the trunk group. 4. Select F_Port Trunking. The F_Port Trunking dialog box displays. 5. Select one or more ports in the Ports for trunking pane. A dialog box displays, asking you to select a trunk index.
  • Page 131: Monitoring Performance

    Chapter Monitoring Performance In this chapter • Performance Monitor overview........103 •...
  • Page 132: Advanced Monitoring

    Performance Monitor overview Advanced monitoring The Advanced Monitoring menu is an optionally licensed feature. To utilize the Advanced Monitoring feature you must have a Performance Monitor license installed and you must log in using an account with an admin, switchadmin, fabricadmin role, and properly configured user defined roles.
  • Page 133: Predefined Performance Graphs

    Performance Monitor overview Predefined performance graphs Web Tools predefines basic graph types to simplify performance monitoring. A wide range of end-to-end fabric, LUN, device, and port metrics graphs are included. Table 11 lists the basic monitoring graphs available. Table 12 lists the advanced monitoring graphs.
  • Page 134: Table 13 Supported Port Types For Brocade Switches

    Performance Monitor overview Table 13 lists each graph and indicates the supported port types for each graph. The port selection columns for each graph displays the supported ports. TABLE 13 Supported port types for Brocade switches Graph type Physical FC ports Logical FC ports GbE ports Port Throughput...
  • Page 135: User-Defined Graphs

    Performance Monitor overview Figure 20 shows how to access the list of Advanced Performance Monitoring graphs using Web Tools with the EGM license. This example displays the graphs available in the Performance Monitoring window with the Advanced Performance Monitoring license installed. Note that the slot number is identified.
  • Page 136: Canvas Configurations

    Opening the Performance Monitoring window Canvas configurations A canvas is a saved configuration of graphs. The graphs can be either the Web Tools predefined graphs or user-defined graphs. Each canvas can hold up to eight graphs per window, with six shown Figure 21.
  • Page 137: Creating Basic Performance Monitor Graphs

    Creating basic performance monitor graphs Creating basic performance monitor graphs To create the basic performance monitor graphs listed in Table 11 on page 105, perform the following steps. 1. Open the Performance Monitoring window. 2. Select Performance Graphs > Basic Monitoring > Graph Type. Depending on the type of graph you select, you might be prompted to select a slot or port for which to create a graph.
  • Page 138: Figure 22 Select Ports For Customizing The Switch Throughput Utilization Graph

    Customizing basic monitoring graphs The title of the dialog box varies, depending on the type of graph you are customizing, but the layout of the dialog box is the same. Figure 22 displays an example of the setup dialog box for the Edit Switch Throughput Utilization graph.
  • Page 139: Advanced Performance Monitoring Graphs

    Advanced performance monitoring graphs Click Apply. Only the selected ports are displayed in the graph. Advanced performance monitoring graphs This section describes how to create the advanced performance monitor graphs listed in Table 12 on page 105. Because the procedure for creating these graphs differs depending on the type of graph, each type is described separately in the sections that follow.
  • Page 140: Creating The Scsi Vs. Ip Traffic Graph

    Advanced performance monitoring graphs 5. Select a destination ID from the Port or Sid/Did Selection List, and click Add Did. You can also enter a destination ID in the Enter/drag DID number field. 6. Click OK. If you selected multiple EE monitors, SIDs, or PIDs, a confirmation dialog box displays, reminding you that one graph is opened for each selection.
  • Page 141: Tunnel And Tcp Performance Monitoring Graphs

    Tunnel and TCP performance monitoring graphs To create a SCSI command graph, perform the following steps. 1. Open the Performance Monitoring window. 2. Select Performance Graphs > Advanced Monitoring > SCSI Commands > Graph Type. The applicable setup dialog box displays. 3.
  • Page 142: Tunnel And Tcp Graph Chart Properties

    Saving graphs to a canvas 3. Select the tunnel from the Tunnels drop-down list for which you want to generate the graphs. For Brocade 7800 extension switch, you can have maximum six circuit connections in a tunnel and for FX8-24 DCX extension blade, you can have maximum of ten circuit connections in a tunnel.
  • Page 143: Adding Graphs To An Existing Canvas

    Adding graphs to an existing canvas The following procedure describes how to save graphs to a new canvas. 1. Open the Performance Monitoring window. 2. Create basic or advanced Performance Monitor graphs, as described in “Creating basic performance monitor graphs” on page 109 and “Advanced performance monitoring graphs”...
  • Page 144: Modifying Graphs

    Modifying graphs 4. In the print dialog box, click OK. Modifying graphs To modify an existing graph that is saved in a canvas, perform the following steps. 1. Open the Performance Monitoring window. 2. Select File > Display Canvas Configurations. The Canvas Configuration List displays.
  • Page 145: Administering Zoning

    Chapter Administering Zoning In this chapter • Zoning overview ..........117 •...
  • Page 146: Lsan Zone Requirements

    Zoning configurations LSAN zone requirements An LSAN zone enables device connectivity between fabrics connected in Fibre Channel Routing (FCR) configurations without forcing you to merge fabrics. Extension switches provide multiple mechanisms to manage interfabric device connectivity. Zones that contain hosts and targets that are shared between the two fabrics need to be explicitly coordinated.
  • Page 147: Setting The Default Zoning Mode

    Zoning management Setting the default zoning mode The default zoning mode has two options: • All Access—All devices within the fabric can communicate with all other devices. • No Access—Devices in the fabric cannot access any other device in the fabric. Web Tools supports default zoning on switches running firmware v5.1.0 or later.
  • Page 148: Figure 23 Zone Admin Window

    Zoning management When you log in to a virtual switch, or select a virtual switch using the drop-down list under Fabric Tree section in the Switch Explorer window, only the ports that are associated with the Virtual Fabric ID you selected are displayed in the member selection list, as shown in Figure 23.
  • Page 149: Refreshing Fabric Information

    Zoning management Click the Alias tab to display which aliases the port or device is a member of. Also, you can right-click the device nodes and click View Device Detail to display detailed information about the selected device. The Member Selection List panel displays only physical FC ports. To verify whether you have any unzoned devices, you must use Brocade Network Advisor to analyze zone configurations.
  • Page 150: Saving Local Zoning Changes

    Zoning management Any local zoning changes are buffered by the Zone Admin window until explicitly saved to the fabric. If the fabric zoning database is independently changed by another user or from another interface (for example, the CLI) while Web Tools zoning changes are still pending, the refresh icon starts to blink (after a 15–30 second polling delay).
  • Page 151: Selecting A Zoning View

    Zoning management Selecting a zoning view You can define how zoning elements are displayed in the Zone Admin window. The zoning view you select determines how members are displayed in the Member Selection List panel (Figure 23). The views filter the fabric and device information displayed in the Member Selection List for the selected view, making it easier for you to create and modify zones, especially when creating “hard zones.”...
  • Page 152: Adding And Removing Members Of A Zone Alias

    Zoning management The choices available in the Member Selection List depend on the selection in the View menu. 6. Click elements in the Member Selection List that you want to include in the alias. The right arrow becomes active. Click the right arrow to add alias members. Selected members move to the Alias Members window.
  • Page 153: Deleting Zone Aliases

    Zoning management 4. Enter a new alias name and click OK. The alias is renamed in the Zone Admin buffer. At this point, you can either save your changes or save and enable your changes. 5. Select Zoning Actions > Save Config to save the configuration changes. Deleting zone aliases You can remove a zone alias from the Zone Admin buffer.
  • Page 154: Adding And Removing Members Of A Zone

    Zoning management 6. Expand the Member Selection List to view the nested elements. The choices available in the list depend on the selection made in the View menu. Select an element in the Member Selection List that you want to include in your zone. Note that LSAN zones should contain only port WWN members.
  • Page 155: Cloning Zones

    Zoning management 4. Click Rename. 5. In the Rename a Zone dialog box, enter a new zone name and click OK. The zone is renamed in the Zone Admin buffer. 6. Select Zoning Actions > Save Config to save the configuration changes. Cloning zones To perform clone operations for zoning, the EGM license must be installed on the switch;...
  • Page 156: Creating And Populating Enhanced Traffic Isolation Zones

    Zone configuration and zoning database management Creating and populating enhanced traffic isolation zones An enhanced traffic isolation zone (TI zone) is a special zone that creates a dedicated path for a specific traffic flow. When an enhanced TI zone is activated, inter-switch traffic from a zone member is directed to E_Ports that are included in the TI zone.
  • Page 157: Creating Zone Configurations

    Zone configuration and zoning database management Figure 24 displays a sample zoning database and the relationship between the zone aliases, zones, and zoning configuration. The database contains one zoning configuration, myconfig, which contains two zones: Zone A and Zone B. The database also contains four aliases, which are members of Zone A and Zone B.
  • Page 158: Adding Or Removing Zone Configuration Members

    Zone configuration and zoning database management The new configuration displays in the Name list. 5. Expand the Member Selection List to view the nested elements. The choices available in the list depend on the selection made in the View menu. 6.
  • Page 159: Cloning Zone Configurations

    Zone configuration and zoning database management The configuration is renamed in the configuration database. 5. Select Zoning Actions > Save Config to save the configuration changes. Cloning zone configurations You must use Web Tools with the EGM license to perform cloning operations for zone configurations;...
  • Page 160: Disabling Zone Configurations

    Zone configuration and zoning database management To enable the zone configuration, perform the following steps. 1. Open the Zone Admin window as described in “Opening the Zone Admin window” on page 118. 2. Select Zoning Actions > Enable Config. 3. On Enable Config, select the configuration to be enabled from the menu. 4.
  • Page 161: Viewing Detailed Information About The Enabled

    Zone configuration and zoning database management 2. You can view the current zone configuration name (if one is enabled) in the lower portion of the Switch Events and Switch Information window. If no zone configuration is enabled, the field displays “No configuration in effect”. Viewing detailed information about the enabled zone configuration To view detailed information about the enabled zone configuration, perform the following steps.
  • Page 162: Removing A Wwn From Multiple Aliases And Zones

    Zone configuration and zoning database management The Add WWN dialog box displays all the zoning elements that include the new WWNs. All of the elements are selected by default. 4. Click items in the list to select or unselect, and click Add to add the new WWN to all the selected zoning elements.
  • Page 163: Searching For Zone Members

    Zone configuration and zoning database management Searching for zone members You can search zone member selection lists for specified strings of text. If you know some identifying information about a possible member of a zoning entity, you can select the tab and view for that entity and then search through its member selection list using the Search for Zone Member option.
  • Page 164: Zone Configuration Analysis

    Best practices for zoning Zone configuration analysis You must use Brocade Network Advisor to analyze the following zone configurations: • Add unzoned devices • Remove offline or inaccessible devices • Replace offline devices • Define device alias Best practices for zoning The following are recommendations for using zoning: •...
  • Page 165: Working With Diagnostic Features

    Chapter Working with Diagnostic Features In this chapter • Trace dumps ..........137 •...
  • Page 166: How A Trace Dump Is Used

    Trace dumps How a trace dump is used The generation of a trace dump causes a CRITICAL message to be logged to the system error log. When a trace dump is detected, issue the supportSave command on the affected switch. This command packages all error logs, the supportShow output, and trace dump, and moves these to your FTP server.
  • Page 167: Disabling Automatic Trace Uploads

    Displaying switch information 3. Select the Trace tab. 4. Select Enable in the Auto FTP Upload section to enable automatic uploading of the trace dump to the FTP host. 5. Click Apply. Disabling automatic trace uploads If automatic uploading of a trace dump is disabled, you must manually upload the trace dump or else the information is overwritten when a subsequent trace dump is generated.
  • Page 168: Viewing Detailed Fan Hardware Status

    Displaying switch information Enter the text string in the box that displays on the table, as shown in Figure 25, and press Enter. This is an incremental search and allows 24 maximum characters including wildcards question mark (?) and asterisk (*). The first row containing the text string is highlighted. To find the next match, click the down arrow.
  • Page 169: Viewing The Temperature Status

    Displaying switch information To view the detailed fan status of a switch, perform the following steps. 1. Select a logical switch using the drop-down list under Fabric Tree section in the Switch Explorer window. The selected switch displays in the Switch View. The icon on the Fan button indicates the overall status of the fan.
  • Page 170: Checking The Physical Health Of A Switch

    Displaying switch information 3. Click Power on the Switch View. The detailed power supply states are displayed (Figure 27). If you are using the Brocade 6510, the Type column displays either AC or DC. For all other hardware the value will be N/A. Checking the physical health of a switch The Status button displays the operational state of the switch.
  • Page 171: Defining Switch Policy

    Defining Switch Policy NOTE The Port Detail Report and Switch Availability Monitor (SAM) reports display the details of only those ports which are members of the current Admin Domain context and the E_Ports of the switch. 4. Optional: Hold the cursor on the Action bar and click an action to perform one of the following options: •...
  • Page 172: Port Led Interpretation

    Port LED interpretation NOTE The options available in the dialog box may differ, depending on the options available on your switch, including CP, core blades, blades, and WWN. FIGURE 29 Switch Status Policy dialog box 3. Configure the numerical and percentage values to conform to your definition of a healthy switch.
  • Page 173: Using The Fc-Fc Routing Service

    Chapter Using the FC-FC Routing Service In this chapter • Fibre Channel Routing overview ........145 •...
  • Page 174: Supported Switches For Fibre Channel Routing

    Supported switches for Fibre Channel Routing VEX_Port A virtual port that enables routing functionality through an FCIP tunnel. A VEX_Port is similar to an EX_Port. A device is shared between: • The backbone fabric and edge fabric 1 • Edge fabric 1 and edge fabric 2 •...
  • Page 175: Fc-Fc Routing Management

    FC-FC routing management FC-FC routing management You can perform Fibre Channel Routing operations using Web Tools, Web Tools with the EGM license, and Integrated Routing license. You can manage FC-FC Routing through the FC Routing module. The FC Routing module has tabbed panes that display EX_Ports, LSAN fabrics, LSAN zones, LSAN devices, and general FCR information.
  • Page 176: Viewing And Managing Lsan Fabrics

    Viewing EX_Ports Viewing and managing LSAN fabrics The LSAN Fabric tab displays all the LSAN fabrics visible to your switch, in both a tabular and tree form. (If FC-FC Routing is disabled, the table and tree nodes in this tab are empty and the tree displays only the backbone switch.) For more detailed information about a specific LSAN fabric, click a fabric name in the table and then click View Details in the task bar.
  • Page 177: Configuring An Ex_Port

    Configuring an EX_Port You can enable or disable multiple ports at one time. Use Shift-click and Ctrl-click to select multiple ports in the table, and then click one of the enable or disable tasks in the task bar. You can select multiple ports in the table, but you can select only one port at a time in the tree. Configuring an EX_Port To configure an EX_Port, perform the following steps.
  • Page 178: Viewing Lsan Zones

    Viewing LSAN zones Every link has a default cost. For an EX_Port 1 Gbps, 2 Gbps, 4 Gbps, 8 Gbps, 10 Gbps, and 16 Gbps links, the default cost is 1000. For a VEX_Port, the default cost is 10000. If the cost is set to 0, the default cost are be used for that link.
  • Page 179 Configuring the backbone fabric ID NOTE When the Virtual Fabrics capability is enabled on the switch, Fabric ID cannot be set using the Set Fabric ID button. To configure the backbone fabric ID, perform the following steps. 1. Open the Switch View window. 2.
  • Page 180 Configuring the backbone fabric ID Web Tools Adminstrator’s Guide 53-1002152-01...
  • Page 181: In This Chapter

    Chapter Using the Access Gateway In this chapter • Access Gateway overview ........153 •...
  • Page 182: Viewing Switch Explorer For Access Gateway Mode

    Viewing Switch Explorer for Access Gateway mode Viewing Switch Explorer for Access Gateway mode The Switch Explorer for Access Gateway mode displays as shown in Figure FIGURE 30 Switch Explorer view for Access Gateway mode The Access Gateway mode Switch Explorer is divided into the following areas: •...
  • Page 183: Access Gateway Mode

    Access Gateway mode Access Gateway mode The Access Gateway feature on the Brocade Encryption switch and the Brocade 8000 enables interoperability with the Cisco fabrics. The Access Gateway mode of the switch presents standard F_Ports to the hosts, but it connects to the Enterprise fabric as N_Port (rather than as E_Port in case of a regular switch).
  • Page 184: Disabling Access Gateway Mode

    Disabling Access Gateway mode To enable Access Gateway mode, perform the following steps. 1. Select a switch. 2. Click Switch Admin in the Manage section under Tasks. The Switch Administration dialog box displays. 3. Click Disable in the Switch Status section. You can enable Access Gateway mode only after the switch is disabled.
  • Page 185: Creating Port Groups

    Port configuration 3. Configure F_Port-to-N_Port mappings. You can set up primary and secondary mappings. The secondary mapping is the N_Port to which an F_Port is mapped when the primary N_Port mapping goes offline. 4. Configure WWN-N_Port mappings Creating port groups You can group a number of N_Ports (and its mapped F_Ports) together to connect to multiple independent fabrics or to create performance optimized ports.
  • Page 186: Deleting Port Groups

    Port configuration 3. On Port Group Configuration dialog box, select the group that you want to edit and then click Edit/View. The Edit/View Port Group window displays. 4. Edit the name of the port group in the Port Group Name field. 5.
  • Page 187: Defining Custom Primary F-N Port Mapping

    Port configuration Defining custom primary F-N port mapping To manually change primary F-N port mappings, perform the following steps. 1. Click a port in the Switch View to open the Port Administration window. 2. Click the FC Ports tab. 3. Click Configure F_N Port Mappings. 4.
  • Page 188: Access Gateway Policy Modification

    Access Gateway policy modification 1. Open the Port Administration window. 2. Click the FC Ports tab. 3. Click Configure WWN-N Port Mappings. 4. In the Primary Mappings area, select a WWN from the left pane and a group or port from the right pane.
  • Page 189: Enabling The Automatic Port Configuration Policy

    Access Gateway policy modification Enabling the Automatic Port Configuration policy The Automatic Port Configuration (APC) policy is a global configuration policy for a switch in Access Gateway mode. By default, this policy is disabled. If you created an N_Port grouping and switching over to the automatic mode, those port groups are lost.
  • Page 190: Access Gateway Limitations On The Brocade 8000

    Access Gateway limitations on the Brocade 8000 • Select F Port Auto Rebalancing check box to enable F_Port rebalancing. • Click Manual Balancing and a confirmation dialog box displays. Click Yes to change F Port-N Port Mapping or click No to cancel the changes. Click Apply to apply the changes.
  • Page 191: Chapter 13 Administering Fabric Watch

    Chapter Administering Fabric Watch In this chapter • Fabric Watch overview......... . 163 Fabric Watch overview Fabric Watch is an optional Brocade licensed feature that monitors the performance and status of switches.
  • Page 192 Fabric Watch overview Web Tools Adminstrator’s Guide 53-1002152-01...
  • Page 193: Chapter 14 Administering Extended Fabrics

    Chapter Administering Extended Fabrics In this chapter • Extended link buffer allocation overview ......165 •...
  • Page 194: Figure 32 Extended Fabric Tab

    Extended link buffer allocation overview • Actual Distance (km)—The actual distance for the link in kilometers. • Desired Distance (km)—Required for a port configured in LD or LS mode (Table 15 page 167), the desired distance, in kilometers, for the link. For an LD-mode link, the desired distance is used as the upper limit of the link distance to calculate buffer availability for other ports in the same port group.
  • Page 195: Configuring A Port For Long Distance

    Configuring a port for long distance The Brocade Encryption Switch and the FS8-18 Encryption blade support auto-negotiated link speeds of 1, 2, 4, and 8 Gbps. The GE ports are always locked at 1 Gbps. TABLE 15 Long-distance settings and license requirements Value Description Extended Fabrics License...
  • Page 196 Configuring a port for long distance Depending on the distance selected, this might require a license. For information about the various distances, refer to Table If you select a long-distance setting of LD or LS, you must also enter a value in the Desired Distance column for that port number: a.
  • Page 197: In This Chapter

    Chapter Routing Traffic In this chapter • Routing overview ..........169 •...
  • Page 198: Viewing Fabric Shortest Path First Routing

    Viewing fabric shortest path first routing Use the Routing tab of the Switch Administration window to view and modify routing information. Figure 33 on page 170 displays the Routing tab. FIGURE 33 Routing tab Viewing fabric shortest path first routing The Routing tab of the Switch Administration window displays information about routing paths.
  • Page 199: Lossless Dynamic Load Sharing

    Configuring dynamic load sharing When the port-based policy is in force, you can enable DLS to optimize routing. When DLS is enabled, it shares traffic among multiple equivalent paths between switches. DLS recomputes load sharing either when a switch boots up or each time an E_Port or FX_Port goes online or offline. Enabling this feature allows a path to be discovered automatically by the FSPF path-selection protocol.
  • Page 200: Specifying Frame Order Delivery

    Specifying frame order delivery When the exchange-based routing policy is in effect, the Loss Less DLS radio buttons display on the Routing tab 4. Click Apply, and then click OK. Specifying frame order delivery In a stable fabric, frames are always delivered in order, even when the traffic between switches is shared among multiple paths.
  • Page 201 Configuring the link cost for a port 3. This step is switch-specific: For the Brocade DCX and DCX-4S enterprise-class platforms, click the slot number of the logical switch under Link Cost in the navigation tree. For Brocade 300, 5100, 5300, and the Encryption Switch, click Link Cost in the navigation tree.
  • Page 202 Configuring the link cost for a port Web Tools Adminstrator’s Guide 53-1002152-01...
  • Page 203: In This Chapter

    Chapter Configuring Standard Security Features In this chapter • User-defined accounts ......... 175 •...
  • Page 204: Virtual Fabrics Considerations

    User-defined accounts Access rights for any user session are determined by the user’s role-based access rights. Refer to Chapter 1, “Introducing Web Tools” for additional information about Role-Based Access Control (RBAC). The User tab of the Switch Administration window (Figure 34 on page 177) displays account information.
  • Page 205: Viewing User Account Information

    User-defined accounts NOTE The User tab displays and changes information in the switch database. If you have RADIUS configured, note that this tab displays the logged-in RADIUS account information but does not allow the user to modify the RADIUS host server database. FIGURE 34 User tab Viewing user account information...
  • Page 206: Figure 35 Add User Account Dialog Box (Vf)

    User-defined accounts The Add User Account dialog box displays. For switches that support Virtual Fabrics, refer to Figure 35. For switches that support Administrative Domains (AD), refer to Figure FIGURE 35 Add User Account dialog box (VF) FIGURE 36 Add User Account dialog box (AD) Web Tools Adminstrator’s Guide 53-1002152-01...
  • Page 207 User-defined accounts 4. Enter the user name. The user name must begin with an alphabetic character. The name can be up to 40 characters long. It is case-sensitive and can contain alphabetic and numeric characters, the dot (.) and the underscore (_). It must be different from all other account names on the logical switch. 5.
  • Page 208: Deleting User-Defined Accounts

    User-defined accounts Deleting user-defined accounts To delete user-defined accounts, perform the following steps. 1. Open the Switch Administration window as described in “Opening the Switch Administration window” on page 33. 2. Select the User tab. 3. Select the account to remove and click Remove. 4.
  • Page 209: Maintaining Passwords

    User-defined accounts 8. Check the available Admin Domains that the user can access. Only Admin Domains that have already been created and are accessible to you display. If all the Admin Domains in the list are inactive then you cannot log in to the switch. NOTE The All option does not mean all of the listed Admin Domains;...
  • Page 210 User-defined accounts 3. Select the account to modify. If you are logged in as a switchadmin, you can only change the password of your own account. 4. Click Change Password. The Set User Account Password dialog box displays. 5. Enter the current password of the account. This step is required only if you are changing the password of your own or a peer admin account.
  • Page 211: User-Defined Roles

    User-defined roles Setting a password as expired To set a password as expired, perform the following steps. 1. Open the Switch Administration window as described in “Opening the Switch Administration window” on page 33. 2. Select the User tab. 3. Select the account. 4.
  • Page 212: Guidelines And Restrictions

    User-defined roles Guidelines and restrictions Follow these guidelines and restrictions when creating and configuring user-defined roles: • In order for the user-defined role to be able to edit the Port Admin and FCR configuration, you must assign the RBAC_SwitchPortManagement and RBAC_SwitchPortConfiguration RBAC classes to the role.
  • Page 213: Editing A User-Defined Role

    User-defined roles The Switch Admin:Add User Defined Role dialog displays. FIGURE 37 Switch Admin:Add User Defined Role dialog 5. Enter a role name in the Name field. 6. Enter a description of the role in the Description field. To grant the role a read/write privilege, select the privilege and click the right-arrow next to the Read &...
  • Page 214: Access Control List Policy Configuration

    Access control list policy configuration 5. Click the Edit button. The Switch Admin:Edit User Defined Role dialog displays. FIGURE 38 Switch Admin:Add User Defined Role dialog 6. To grant the role a read/write privilege, select the privilege and click the right-arrow next to the Read &...
  • Page 215: Virtual Fabrics Considerations

    Access control list policy configuration Virtual Fabrics considerations ACL policies can be implemented at the logical switch/logical fabric level. Admin Domain considerations ACL management can be done on AD255 and in AD0 only if there are no other user-defined Admin Domains.
  • Page 216: Deleting All Scc, Dcc, Or Fcs Policies

    Access control list policy configuration 3. Select the Security Policies tab. 4. Select a policy by clicking on the appropriate tab. 5. Click Edit. This launches the ACL Policy Configuration wizard. 6. Select the policy type you want to edit. Click Next and click Modify.
  • Page 217: Moving An Fcs Policy Switch Position

    Access control list policy configuration NOTE SCC and DCC policy can be distributed only for a primary switch. To distribute an SCC, DCC, or FCS policy, perform the following steps. 1. Open the Switch Administration window as described in “Opening the Switch Administration window”...
  • Page 218: Fabric-Wide Consistency Policy Configuration

    Fabric-Wide Consistency Policy configuration When the ADS policy is enabled first time, all the F_Ports are set to All Access and all the devices are allowed to login into fabric. This configuration persists for subsequent logins from all devices. Existing devices that are already logged into the fabric are not affected. When the ADS policy is disabled, all the allowed lists are cleared and all the devices are allowed to login into the fabric.
  • Page 219: Authentication Policy Configuration

    Authentication policy configuration NOTE You can change the consistency behaviors of SCC, DCC, or FCS policy only for a primary switch. 5. Click Apply. 6. Click Yes to accept the changes. NOTE If the switch is not a primary switch, an error message dialog box displays. Click No to discard the changes and click Refresh in the FWCP Configuration window to manually refresh the window.
  • Page 220: Configuring Authentication Policies For F_Ports

    Authentication policy configuration Configuring authentication policies for F_Ports To configure authentication policies for F_Ports, perform the following steps. 1. Open the Switch Administration window and click Show Advanced Mode, if not selected. 2. Select the Security Policies tab. 3. Select Authentication on the Security Policies menu. 4.
  • Page 221: Setting A Shared Secret Key Pair

    Authentication policy configuration Setting a shared secret key pair DH-CHAP requires a shared secret key pair between two entities to authenticate with each other. A key pair consists of a local secret and a peer secret. The local secret identifies the local switch. The peer secret identifies the entity to which the local switch may authenticate.
  • Page 222: Snmp Configuration

    SNMP configuration 4. Use the Switch Policy Authentication Mode option to select the authentication policy. SNMP configuration This section describes how to manage the configuration of the SNMP agent in the switch. The configuration includes SNMPv1 and SNMPv3 configuration, accessControl, and systemGroup configuration parameters.
  • Page 223: Setting Snmpv3 Configuration Parameters

    SNMP configuration 3. Double-click a community string in the SNMPv1 section and enter a new community string. 4. Double-click a recipient IP address in the SNMPv1 section and enter a new IP address. 5. Click Apply. Setting SNMPv3 configuration parameters NOTE The port number is not included.
  • Page 224: Radius Management

    RADIUS management 4. Select a permission for the host from the Access Control List menu. Options are Read Only and Read Write. 5. Click Apply. RADIUS management Fabric OS supports RADIUS authentication, authorization, and accounting service (AAA). When configured for RADIUS, the switch becomes a Network Access Server (NAS) that acts as a RADIUS client.
  • Page 225: Configuring Radius

    RADIUS management NOTE To disable RADIUS, select Switch Database from the Primary AAA Service menu and select None from the Secondary AAA Service menu. 5. Click Apply. Configuring RADIUS The configuration is chassis-based, so it applies to all logical switches (domains) on the switch and it is replicated on a standby CP, if one is present.
  • Page 226: Modifying The Radius Server Order

    RADIUS management 4. Click Modify. The RADIUS/ADLDAP Configuration dialog box displays. 5. Enter new values for the port number, timeout time (in minutes), and secret string. 6. Select either CHAP or PAP as the authentication protocol. The default value is CHAP, and if you do not change it, CHAP becomes the authentication protocol.
  • Page 227: Active Directory Service Management

    Active Directory service management Active Directory service management Active Directory is the directory server that holds all the user profiles. Active Directory provides user authentication and authorization using LDAP as authentication protocol. Active Directory provides better security while using remote authentication mechanism. You can add, remove, and modify settings of Active Directory Server.
  • Page 228: Removing Active Directory Service

    IPsec concepts Removing Active Directory service To remove a RADIUS server, perform the following steps. 1. Open the Switch Administration window as described in “Opening the Switch Administration window” on page 33. 2. Select the AAA Service tab. 3. Select a server from the ADLDAP Configuration list. 4.
  • Page 229: Transport Mode And Tunnel Mode

    IPsec concepts TABLE 17 Relevant RFCs (Continued) RFC number Title RFC 4309 Using Advanced Encryption Standard (AES) CCM Mode with IPsec Encapsulating Security Payload (ESP) RFC 4306 Internet Key Exchange Version 2 (IKEv2) Protocol RF C4307 Cryptographic Algorithms for Internet Key Exchange Version 2 (IKEv2) RFC 3971 Secure Neighbor Discovery...
  • Page 230: Basic Ipsec Configurations

    IPsec concepts Authentication Header AH can be used to authenticate a data stream, but does not provide encryption needed for privacy. The AH contains a message authentication code (MAC). The MAC is created by a hash algorithm calculation. The MAC is transmitted in an IP datagram. The same hash algorithm is then used by the receiver to verify the integrity of the packet.
  • Page 231: Internet Key Exchange Concepts

    IPsec concepts • Endpoint to Gateway Endpoint to Endpoint In an endpoint to endpoint configuration, both endpoints implement IPsec. Transport mode is commonly used in endpoint to endpoint configurations, and only a single pair of addresses is used. Typically, this kind of configuration would be used for direct communication between hosts. There are two drawbacks to consider: •...
  • Page 232: Table 18 Encryption Algorithm Options

    IPsec concepts Encryption algorithms An encryption algorithm is used to encrypt messages used in the IKE negotiation. Table 18 lists the available encryption algorithms. A brief description is provided. If you need further information, please refer to the RFC. TABLE 18 Encryption algorithm options Encryption algorithm Description...
  • Page 233: Ipsec Over Fcip

    IPsec over FCIP For example, if a 200 MB file is transferred with a 100 MB lifetime, at least two keys are generated. If a communication takes one hour, and you specify a lifetime of 300 seconds (five minutes), more than 12 keys may be generated to complete the communication.
  • Page 234: Fcip Compression

    IPsec over FCIP • Create a security association (SA). • Create an SA proposal. • Add an IPsec Transform policy, referencing the IKE policy and the SA proposal. • Add an IPsec selector that allows you to apply a Transform policy to a specific IP flow. •...
  • Page 235: Establishing An Ipsec Policy For An Fcip Tunnel

    IPsec over management ports 8. Set a Security Association Lifetime (in seconds). The Security Association Lifetime is a time value in seconds. When this timer expires, the security association (SA) is rekeyed. This limits the amount of time a given key is available to a potential attacker.
  • Page 236: Enabling The Ethernet Ipsec Policies

    IPsec over management ports Enabling the Ethernet IPsec policies To access the Ethernet IPsec Policies dialog box, perform the following steps. 1. Open the Switch Administration window. 2. Select Show Advanced Mode. 3. Select the Security Policies tab. 4. Under Security Policies, select Ethernet IPsec. The Ethernet IPsec Policies screen displays.
  • Page 237: Creating A Security Association

    IPsec over management ports Creating a security association A security association (SA) describes a set of parameters for providing secure communications between two endpoints. To create a security association, perform the following steps. 1. Select the IPsec tab. The IPsec Policies screen displays. 2.
  • Page 238: Adding An Ipsec Transform Policy

    IPsec over management ports 5. Optionally, define SA lifetime parameters. The SA lifetime may be defined as a time value in seconds (LifeTime in seconds), as the number of bytes transmitted before the SA is rekeyed (LifeTime in bytes), or both. When both are used, the SA lifetime is determined by the threshold that is first reached.
  • Page 239: Manually Creating An Sa

    IPsec over management ports 2. Select Add. The Add Selector dialog box displays. 3. Enter a name in the Selector Name field. 4. Select the Traffic Flow Direction (in or out). IPsec policies are unidirectional, and must be applied separately to inbound and outbound flows.
  • Page 240: Editing An Ike Or Ipsec Policy

    IPsec over management ports 9. Select the IPsec Protocol. The choices are ah (for authentication header) and esp (for encapsulated security protocol). 10. Select the IPsec Protection Type option. 11. Select the Authentication Algorithm option. 12. Enter or copy a generated encryption key in the Encryption Key field. 13.
  • Page 241: Establishing Authentication Policies For Hbas

    Establishing authentication policies for HBAs Establishing authentication policies for HBAs To establish and enable authentication policies for HBAs as the log in to a fabric, perform the following steps. 1. Open the Switch Administration window. 2. Click Show Advanced Mode. 3.
  • Page 242 Establishing authentication policies for HBAs Web Tools Adminstrator’s Guide 53-1002152-01...
  • Page 243: In This Chapter

    Chapter Administering FICON CUP Fabrics In this chapter • FICON CUP fabrics overview ........215 •...
  • Page 244: Enabling Port-Based Routing

    Enabling port-based routing • Install a FICON CUP license on the Brocade switch. • Configure CUP attributes (FMS parameters) for the FICON director. FMS mode enable failed due to ports with areas 0xFE or 0xFF are connected to devices. You can use Web Tools for all of these tasks. You can also use Web Tools to manage FICON directors (when FMS mode is enabled on those directors) to do the following: •...
  • Page 245: Enabling Or Disabling Ficon Management Server Mode

    Enabling or disabling FICON Management Server mode Enabling or disabling FICON Management Server mode FICON Management Server (FMS) is used to support switch management using CUP. To be able to use the CUP functionality, all switches in the fabric must have FICON Management Server mode (FMS mode) enabled.
  • Page 246: Fms Parameter Configuration

    FMS parameter configuration FMS parameter configuration FMS parameters control the behavior of the switch with respect to CUP itself, as well as the behavior of other management interfaces (director console, Alternate Managers). You can configure FMS parameters for a switch only after FMS mode is enabled on the switch. All FMS parameter settings are persistent across switch power cycles.
  • Page 247: Configuring Fms Mode Parameters

    Displaying code page information Configuring FMS mode parameters To configure FMS mode parameters, perform the following steps. 1. Select a FICON-enabled switch from the Fabric Tree. 2. Open the Switch Administration window as described in “Opening the Switch Administration window” on page 33.
  • Page 248: Allow / Prohibit Matrix Configuration

    Allow / Prohibit Matrix configuration Device allegiance usually lasts for a very short time. However, under abnormal conditions, device allegiance can get “stuck” and fail to terminate. It might cause the switch to be unmanageable with CUP, and you will continue to receive the FICON CUP Busy Error. In this case, you should check the control device state and the last update time to identify if the device allegiance is stuck.
  • Page 249: Viewing Allow / Prohibit Matrix Configurations

    Allow / Prohibit Matrix configuration When initially installed, a switch allows any port to dynamically communicate with any other port. Two connectivity attributes are defined to restrict this any-to-any capability for external ports: Block and Prohibit. Block is a port connectivity attribute that prevents all communication through a port. Prohibit is the port connectivity attribute that prohibits or allows dynamic communication between ports when a port is not blocked.
  • Page 250 Allow / Prohibit Matrix configuration To create a new Allow / Prohibit Matrix configuration or to edit an existing configuration, perform the following steps. 1. Display the Allow / Prohibit Matrix configuration list. 2. You can either create a new configuration or edit an existing configuration: •...
  • Page 251: Activating An Allow / Prohibit Matrix Configuration

    Allow / Prohibit Matrix configuration FIGURE 43 Allow / Prohibit Matrix Configuration dialog box Activating an Allow / Prohibit Matrix configuration When you activate a saved Allow / Prohibit Matrix configuration on the switch, the preceding configuration (currently activated) is overwritten. To activate an Allow / Prohibit Matrix configuration, perform the following steps.
  • Page 252: Deleting An Allow / Prohibit Matrix Configuration

    CUP logical path configuration 3. Click Copy. The Allow / Prohibit Matrix Configuration dialog box displays. 4. In the dialog box, enter a name and description for the new configuration and click OK to save the configuration to the target file; click Cancel to cancel copying the configuration. The file name must be in alphanumeric characters and can contain only dashes or underscores as special characters.
  • Page 253: Link Incident Registered Recipient Configuration

    Link Incident Registered Recipient configuration The FICON CUP page displays the FICON Management Server page in front. All attributes on this page are read-only until FMS mode is enabled. 5. Click the CUP Logical paths subtab. 6. Select a logical path and click Set Current. Link Incident Registered Recipient configuration The Link Incident Registered Recipient (LIRR) receives Link Incident Reports (RLIR) on the source N_Port.
  • Page 254: Displaying Request Node Identification Data

    Displaying Request Node Identification Data Displaying Request Node Identification Data Web Tools displays Request Node Identification Data (RNID) information for the local switch, and for attached FICON devices and FICON channel paths. RNID information for the switch displays in the Switch Information tab (Figure 44).
  • Page 255: In This Chapter

    Chapter Configuring FCoE with Web Tools In this chapter • Web Tools and FCoE overview ........228 •...
  • Page 256: Web Tools And Fcoe Overview

    Web Tools and FCoE overview Web Tools and FCoE overview Brocade Web Tools is an embedded graphical user interface (GUI) that enables administrators to monitor and manage single or small fabrics, switches, and ports. Web Tools is launched directly from a web browser, or from Brocade Network Advisor. NOTE For complete information on Web Tools, refer to the Web Tools Administrator’s Guide.
  • Page 257: Switch Administration And Fcoe

    Switch administration and FCoE • L2 Mode—The values are Access, Trunk, or Converged. Access mode allows only one VLAN association, and allows only untagged frames. Trunk mode allows more than one VLAN association, and allows tagged frames. Converged mode interface can be native (untagged or access) in one VLAN and it could be non-native (trunk or tagged) type in more than one VLAN.
  • Page 258: Quality Of Service Configuration

    Quality of Service configuration • Link Aggregation Group (LAG) configuration (mandatory)—Ports must be configured before they can be placed into a LAG. The parameters applied to the LAG reflects on each port that is member of the LAG. • VLAN configuration (optional)—Port and LAG names are referenced in VLAN configuration, and must be defined before you can successfully complete a VLAN configuration.
  • Page 259: Adding A Traffic Class Map

    LLDP-DCBX configuration An entry is added to the Priority Group table. NOTE When you add an entry, a PGID is automatically assigned. The PGID is an integer from 0 to 7. The first added entry is given a PGID of 0, and the PGID increments by one for each additional added entry until a PGID of 7 is reached.
  • Page 260: Configuring Global Lldp Characteristics

    LLDP-DCBX configuration Configuring global LLDP characteristics Configuring at the global level enables you to apply changes to every port. To configure the global LLDP characteristics, perform the following steps. 1. Select the DCB tab on the Switch Administration panel. 2. Select the LLDP-DCBX tab. 3.
  • Page 261: Adding An Lldp Profile

    LLDP-DCBX configuration • Advertise Optional-tlv—Advertises the following optional TLVs: system-description—Describes switch or blade characteristics. port-description—Describes the configured port. system-name—Specifies the system name. system-capabilities—Describes the system capabilities. management-address—The IP address of the management port on the 8000 switch. • Advertise dot1-tlv—Select this check box to advertise to any attached device to send IEEE 802.1 LLDP type, length, and values.
  • Page 262: Configuring Dcb Interfaces

    Configuring DCB interfaces The range is 2 to 10. The default is the global configuration range. The multiplier is related to the Hello time interval. Using the defaults, you wait four times (the multiplier value) at 30 second intervals (the hello value) before giving up on the interface. 10.
  • Page 263: Configuring A Link Aggregation Group

    Configuring a link aggregation group 6. Select the L2 Mode. The choices are Access, Trunk, and Converged. The default is Access. The L2 mode setting determines operation within a VLAN: • Access mode allows only one VLAN association, and all frames are untagged. •...
  • Page 264: Configuring Vlans

    Configuring VLANs The choices are Static and Dynamic. Static mode does not use Link Aggregation Control Protocol (LACP) to negotiate and manage link aggregation. Link participation in the LAG is determined by the link’s operational status and administrative state. Dynamic mode uses LACP.
  • Page 265: Configuring Fcoe Login Groups

    Configuring FCoE login groups NOTE If you want to modify any converged interface as either native or non-native, you must first remove that particular member from that VLAN and then re-add it to the same VLAN. 6. Under the Selection List, click the plus sign (+) next to the Interface and LAG folders, and select individual interfaces and LAGs you want to associate with the VLAN ID.
  • Page 266: Displaying Fcoe Port Information

    Displaying FCoE port information • If you select Allow Specific Member, you can control which devices can log in, using Member Type, Member PWWN/MAC, and the Add and Remove buttons, as described below. a. Select Model2 as Member Type. a. Enter the port WWN in hexadecimal format in the Member PWWN/MAC field, and click Add.
  • Page 267: Displaying Lag Information

    Displaying LAG information • Connected Peer Type displays the port type on the connected device. • Is Directly Connected indicates whether or not the device is directly connected to the trunk. • FCoE Port MAC displays the FCoE port MAC address. •...
  • Page 268: Displaying Lldp-Dcbx Information

    Displaying LLDP-DCBX information Displaying LLDP-DCBX information To display LLDP-DCBX information, perform the following steps. 1. Select the DCB tab on the Switch Administration panel. 2. Select the LLDP-DCBX tab. • To display global settings, select the Global tab. • To display LLDP profile information, select the LLDP Profile tab. Displaying DCB interface statistics The DCB interface Port Statistics tab displays basic and advanced statistics, and allows you to change statistics collection parameters.
  • Page 269: Configuring A Dcb Interface From The Port Admin Panel

    Configuring a DCB interface from the Port Admin panel Configuring a DCB interface from the Port Admin panel DCB interfaces can be enabled and disabled from the Port Administration panel. To enable or disable a DCB interface from the Port Administration panel, perform the following steps.
  • Page 270: Enabling And Disabling Qos Priority-Based Flow Control

    Enabling and disabling QoS priority-based flow control Enabling and disabling QoS priority-based flow control Priority-based flow control (PFC) can be used to control network congestion. PFC can be used to selectively pause lower priority traffic classes to ensure that high priority and delay-sensitive traffic are not affected by network congestion.
  • Page 271: Chapter 19 Limitations

    Chapter Limitations In this chapter • General Web Tools limitations ........243 General Web Tools limitations Table 21 lists general Web Tools limitations that apply to all browsers and switch platforms.
  • Page 272 General Web Tools limitations TABLE 21 Web Tools limitations (Continued) Area Details Firmware download There are multiple phases to firmware download and activation. When Web Tools reports that firmware download completed successfully, this indicates that a basic sanity check, package retrieval, package unloading, and verification was successful. Web Tools forces a full package install.
  • Page 273 General Web Tools limitations TABLE 21 Web Tools limitations (Continued) Area Details Loss of Connection Occasionally, you might see the following message when you try to retrieve data from the switch or send a request to the switch: Switch Status Checking The switch is not currently accessible.
  • Page 274 General Web Tools limitations TABLE 21 Web Tools limitations (Continued) Area Details Refresh option in If you change the switch name using the Web Tools Switch Administration page or browsers SNMP and then open a Telnet window to verify the name change, the CLI prompt (for example, switch:admin >) displays the previous name.
  • Page 275 Index Numerics Allow / Prohibit Matrix configuration activating copying 2 domain/4 domain fabric licenses deleting 7800 switch displaying Allow / Prohibit Matrixconfiguration displaying arbitrated loop parameters, configuring automatic trace dump transfers Access Control List. Refer to ACL access control. Refer to RBAC. Access Gateway mode configuration disable...
  • Page 276 configuration Access Gateway mode upload datafield size configuration file default zoning Admin Domain considerations deleting backing up Admin Domains restoring Allow / Prohibit Matrix configuration configuring user accounts Allow / Prohibit Matrix zone aliases arbitrated loop parameters zone configurations backbone fabric ID zones default heap size device probing...
  • Page 277 edge fabrics FC-FC routing EGM licensed features about setting up FICON CUP supported switches Performance Monitoring FCR router cost enabled zone configuration, displaying FCS policy enabling activate Access Gateway mode create automatic trace dump transfer deactivate beaconing delete blades distribute moving switch position FICON Management Server mode feature licenses...
  • Page 278 in-order delivery. Refer to IOD insistent domain ID mode about managing RADIUS server enabling media type installing GigE Java Plug-in message severity levels MetaSAN JRE patches on Solaris modifying Solaris patches performance graphs Internet Explorer 7.0 RADIUS server IOD, frame delivery RADIUS server order IP address zone aliases...
  • Page 279 per-frame routing priority refreshing persistently disable a port Admin Domain window fabric information platforms, supported Zone Admin window polling rates removing port membership in Admin Domains licenses port menu RADIUS server port names, assigning zone alias members port speed, configuring zone configuration members port swapping zone members...
  • Page 280 swapping port index IDs VC Priority switch viewing 7800 EX_Ports changing the name of LSAN devices enabling and disabling LSAN fabrics mouse over information LSAN zones rebooting swapped ports Switch Administration window Switch Explorer switch status opening viewing FCR router cost Switch Events and Switch Information virtual channel settings, configuring switch events, displaying...
  • Page 281 zones about adding WWNs best practices creating deleting description LSAN modifying removing WWNs renaming replacing WWNs selecting a view zoning all access default zoning no access zoning database clearing maximum size zoning views zoning, disabling zoning, saving changes Web Tools Adminstrator’s Guide 53-1002152-01...
  • Page 282 Web Tools Adminstrator’s Guide 53-1002152-01...

This manual is also suitable for:

Web tools

Table of Contents