McDATA 316095-B21 - StorageWorks Edge Switch 2/24 User Manual

Fw 08.01.00 mcdata efcm basic user manual (620-000240-000, november 2005)
Hide thumbs Also See for 316095-B21 - StorageWorks Edge Switch 2/24:
Table of Contents

Advertisement

EFCM Basic

User Manual

P/N 620-000240-000
REV A

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the 316095-B21 - StorageWorks Edge Switch 2/24 and is the answer not in the manual?

Questions and answers

Summary of Contents for McDATA 316095-B21 - StorageWorks Edge Switch 2/24

  • Page 1: Efcm Basic

    EFCM Basic User Manual P/N 620-000240-000 REV A...
  • Page 2 Record of Revisions and Updates Revision Date Description 620-000245-000 7/2005 Initial release of the manual Copyright © 2002 - 2005 McDATA Corporation. All rights reserved. Printed July 2005 First Edition No part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written consent of McDATA Corporation.
  • Page 3: Table Of Contents

    Contents Preface ..........................xv Chapter 1 Introduction Overview....................1-1 Using the EFCM Basic Interface to Perform Tasks ....1-2 Benefits ....................1-4 Key Terms ..................1-5 Fabric ...................1-5 Storage Area Network (SAN) ..........1-5 Zone (Zoning) ................1-5 Zone Member ................1-5 Zone Set..................1-5 Suggested Reading ................1-6 Where to Start..................1-6 Starting the EFCM Basic Interface ..........1-7 Using the EFCM Basic User Interface ..........1-10 Navigational Tools of the EFCM Basic Page .......1-11...
  • Page 4 Contents Viewing the FRU List ..............2-11 Viewing Operating Parameters ............2-12 Viewing the Node List ..............2-14 Viewing Performance Information ..........2-15 Using the Performance Page..........2-15 Parts of Statistics Tables ............2-15 Port Utilization Percentages and Error Totals.....2-16 Traffic Statistics................2-16 Error Statistics ................2-17 Class 2 Statistics ...............2-19 Class 3 Statistics ...............2-19 Open Trunking Statistics ............2-19 Chapter 3...
  • Page 5 Contents Chapter 4 Configuring Zoning Understanding Zoning ..............4-1 Controlling Access Across a Fabric ........4-2 Controlling Access at the Switch ..........4-5 Controlling Access at the Server or Storage Device..... 4-5 Zoning Concepts ............... 4-6 Merging Zoned Fabrics ............4-11 Using The Zoning Page ..............
  • Page 6 Contents Removing a Device from the Authentication Devices List5-13 Configuring Port Authentication ..........5-14 Configuring the IP Access Control List ........5-15 Setting the IP ACL State ............5-16 Adding New Members to the List ........5-16 Editing the List.................5-17 Deleting Members from the List ...........5-17 Configuring the RADIUS Server ..........5-18 Add an Entry to the RADIUS Server List ......5-19 Edit an Entry on the RADIUS Server List ......5-20...
  • Page 7 Contents Defining Filtering Settings............. 6-15 Viewing All Logs................6-16 Viewing Syslog Configuration ............. 6-18 Enable and Disable Syslogs ........... 6-19 Add a Syslog Recipient ............6-19 Edit a Syslog Recipient............6-20 Delete Syslog Recipients ............6-20 Specify Which Logs Are Sent to a Recipient ....... 6-20 Chapter 7 Performing Product Maintenance Switch Maintenance Tasks..............
  • Page 8 Contents Chapter 9 Software Upgrade and Feature Installation Adding Licensed Features...............9-2 Licensed Features ..............9-3 Entering a Feature Key .............9-3 Chapter 10 Upgrading Your SAN Management System Differences Between EFCM Basic and other McDATA Products .. 10-1 Enterprise Fabric Connectivity Manager ........10-1 SANavigator ..................10-2 Features and Functions............10-3 Management Features Provided by EFCM and/or SANavigator .
  • Page 9 Figures Enter Network Password Dialog Box ............1-7 Fabric View ....................1-9 Example EFCM Basic Page Showing a 24-Port Switch ......1-10 Product Hardware Page ................2-2 Port List Page ....................2-5 Optics Monitoring Information ..............2-10 FRU List Page ....................2-11 Operating Parameters Page ..............
  • Page 10 Figures Zoning through a Single Fibre Channel Managed Product ....4-3 Zoning Through a Multiswitch Fabric ............4-4 Zoning Page ....................4-13 User Authentication Configuration Page ..........5-3 Software Authentication Configuration Page ........... 5-7 Device Authentication Configuration Page ..........5-10 Port Authentication Configuration Page ..........
  • Page 11 Figures Figures...
  • Page 12 Figures EFCM Basic User Manual...
  • Page 13 Tables Items on the Tool Bar ................. 1-11 Items on the Menu Bar ................1-12 Items Used in Multiple Pages ..............1-12 Status Indicators ................... 2-3 Zone Set Configuration ................4-10 Merging Zones .................... 4-12 Facility Code Levels ................... 6-19 Tables xiii...
  • Page 14 Tables EFCM Basic User Manual...
  • Page 15: Preface

    Preface This publication provides instructions on using the McDATA® ® EFCM Basic interface to configure, operate, and monitor a Storage Area Network (SAN). This publication is intended for data center administrators, LAN Who Should Use This Manual administrators, operations personnel, and customer support personnel who administer user access to this application and monitor and manage product operation.
  • Page 16 Preface • Chapter 7, Performing Product Maintenance provides procedures to perform various maintenance tasks for the product. • Chapter 8, Using the Fabric View describes how to use this option to configure and view a small fabric. • Chapter 9, Software Upgrade and Feature Installation describes functionality related to upgrading your system using EFCM Basic licensed features or switching to a SAN Management System...
  • Page 17 Preface TIP: A tip presents useful information about the tasks being described, such as a shortcut. NOTE: A note presents important information that is not hazard-related. ATTENTION! An attention notice presents important information about activities that could result in loss of equipment function or loss of data. For technical support, end-user customers should call the phone Where to Get Help number located on the service label attached to the front or rear of the...
  • Page 18 Preface information? Were there any errors? Could its organization be improved? Please send your comments via e-mail, our home page, or FAX. Identify the manual, and provide page numbers and details. Thank you. E-mail: pubsmgr@mcdata.com Home Page: http://www.mcdata.com FAX: Technical Communications Manager (720) 558-8999 To order a paper copy of this manual, contact your McDATA Ordering Publications...
  • Page 19: Introduction

    Introduction ® The following sections provide an introduction to the EFCM Basic application solution: • Overview....................1-1 • Benefits....................1-4 • Key Terms ..................... 1-5 • Suggested Reading................1-6 • Where to Start..................1-6 • Starting the EFCM Basic Interface ............1-7 •...
  • Page 20: Using The Efcm Basic Interface To Perform Tasks

    Overview (For example, the EFCM Basic interface does not support all product maintenance functions.) In addition, the EFCM Basic interface provides hyperlink access to other products in a fabric, which means those products can also be managed. Refer to Chapter 10, Upgrading Your SAN Management for information on differences between the EFCM Basic System interface and other applications such as EFCM and SANavigator.
  • Page 21 Overview • Perform product operations and maintenance tasks, including: — Enable unit beaconing, turn off the system error light, set the product online or offline, and perform a configuration reset. — Enable port beaconing, perform port diagnostics, and reset ports. —...
  • Page 22: Benefits

    Benefits Benefits The EFCM Basic interface provides users the following benefits: • EFCM Basic enables a single product to be managed from a single point of access. An administrator can manage a product from any location (such as their office, a raised floor area, or a conference room) within the company’s public/private networks.
  • Page 23: Key Terms

    Key Terms Key Terms Here are key terms that will help you perform tasks such as zoning. Entity that interconnects N_Ports and is capable of routing Fabric (switching) Fibre Channel frames using the destination ID information in the Fibre Channel frame header accompanying the frames.
  • Page 24: Suggested Reading

    Suggested Reading Suggested Reading A book that can help you install products and configure a SAN is the McDATA Products in a SAN Environment Planning Manual (620-000124). You can obtain this book from the McDATA web site (www.mcdata.com) or from the documentation CD shipped with the McDATA product you purchased.
  • Page 25: Starting The Efcm Basic Interface

    Starting the EFCM Basic Interface Starting the EFCM Basic Interface Open the EFCM Basic interface as follows: 1. You must be able to make a connection between the web browser and the product in order to log into the product. Ensure the workstation (or device you use to launch the web browser) and the Ethernet LAN segment containing the product, such as the 24-Port Switch, are attached and connected through the Internet.
  • Page 26 Starting the EFCM Basic Interface 5. Type the user name and password. (The user name and password are case sensitive.) NOTE: The default user name is Administrator and the default password is password. After the initial log on, you will need to change the password for the user name, Administrator.
  • Page 27: Fabric View

    Starting the EFCM Basic Interface Fabric View Figure 1-2 Introduction...
  • Page 28: Using The Efcm Basic User Interface

    Using the EFCM Basic User Interface Using the EFCM Basic User Interface When the EFCM Basic interface opens, the default display is the Fabric View screen. For information about how to use this screen, and how to access the menu bar for a product in the SAN, see Chapter 8, View.
  • Page 29: Navigational Tools Of The Efcm Basic Page

    Using the EFCM Basic User Interface The EFCM Basic interface has many buttons and other screen Navigational Tools elements that appear in multiple views. These elements are broken of the EFCM Basic out into the following categories: Page • Tool bar options, which are described in Table 1-1 on page 1-11.
  • Page 30: Items On The Menu Bar

    Using the EFCM Basic User Interface The menu bar displays the information described in the following table: Items on the Menu Bar Table 1-2 Item Associated Graphic Description Menus Select a menu to display the menu items that are associated with the menu.
  • Page 31: Licensed Features

    Using the EFCM Basic User Interface Table 1-3 Items Used in Multiple Pages (Continued) Item Associated Graphic Description Cancel button After making a change on a page that is not already activated, select the Cancel button to cancel the change and redisplay the currently saved settings.
  • Page 32 Using the EFCM Basic User Interface EFCM Basic User Manual 1-14...
  • Page 33: Viewing Product Information

    Viewing Product Information This chapter describes how to view configuration information of McDATA SAN products using the EFCM Basic interface. This chapter describes how to perform the following tasks: • Opening the Hardware Page ..............2-1 • Viewing the Port List................2-4 •...
  • Page 34: Front View And Rear View

    Opening the Hardware Page Product Hardware Page Figure 2-1 The Hardware page provides a representation of the front and rear Front View and Rear views of the product. Using this graphical view of the product, you View can view status symbols and simulated light emitting diode (LED) indicators, display data, or use mouse functions to monitor status and obtain vital product information for the product and its hardware components.
  • Page 35: Product Information

    Opening the Hardware Page NOTE: On the 140-Port Director, each of the installed port card FRUs bears a notation of either FPM, UPM or XPM to inform the user whether they are a 1 Gbps FPM, a 2 Gbps UPM, or a 10 Gbps XPM. Status Indicators Table 2-1 View...
  • Page 36: Viewing The Port List

    Viewing the Port List • Type Number—Type number of the product, usually the numeric part of the product’s name. • Model Number—Model number of the product. • Manufacturer—Three-letter identifier of the product’s manufacturer. • Serial Number—Product serial number. • EC Level—Current engineering change (EC) level. •...
  • Page 37: Port List

    Viewing the Port List Port List Page Figure 2-2 The scroll list part of the Port List page provides the following Port List information for all of the ports on the product: Port #—The number of the port. • • Name—Displays the port name as configured.
  • Page 38 Viewing the Port List • Operational State—refer to on page 2-6 for Port Operational States an explanation of the states. • Type—The type of port. The valid options vary by product. (This may be the same as the configured port type.) •...
  • Page 39: Port Information

    Viewing the Port List • Offline—The switch port was configured as “blocked” and is transmitting the Fibre Channel OLS to the attached device. • Port Failure—The switch port has failed and requires service. (A port in the failed state cannot beacon.) •...
  • Page 40 Viewing the Port List • Port WWN—The port’s 16-digit WWN. • Attached Port WWN—Fibre Channel WWN identifier of the device attached to the port. (This field is not valid for loop devices.) • Block Configuration—Indicates whether the port is blocked or unblocked.
  • Page 41: Health Status Information

    Viewing the Port List • ISL connection not allowed on this port • ELP rejected by the attached switch • Incompatible switch at other end of the ISL • External loopback adapter connected to the port • N_Port connection not allowed on this port •...
  • Page 42: Transceiver Information

    Viewing the Port List Optics Monitoring Information Figure 2-3 At the Port List Page, click the entry for a port in the Transceiver Transceiver column. Port transceiver technology information for the selected port Information appears in the lower panel of the page: •...
  • Page 43: Viewing The Fru List

    Viewing the FRU List Viewing the FRU List Select Product > FRU List on the navigation panel. The FRU List page (Figure 2-4) displays. FRU List Page Figure 2-4 This page shows the following information for the FRUs: • FRU—Name of the FRU. •...
  • Page 44: Viewing Operating Parameters

    Viewing Operating Parameters Viewing Operating Parameters To view the Operating Parameters of a product, perform the following procedure: 1. From the navigation panel, select Product > Operating Parameters. The Operating Parameters page displays (Figure 2-5) showing Switch Parameters and Fabric Parameters. Operating Parameters Page Figure 2-5 This page shows the following Switch Parameters information for the...
  • Page 45 Viewing Operating Parameters • Domain RSCN—If enabled, domain registered state change notifications (domain RSCNs) are sent between end devices in a fabric to provide additional connection information to HBAs and storage devices. This option is required if Enterprise Fabric Mode (an optional SANtegrity Binding feature) is enabled.
  • Page 46: Viewing The Node List

    Viewing the Node List Viewing the Node List Select Product > Node List on the navigation panel. The Node List page (Figure 2-6) displays. Figure 2-6 Node List Page Information displayed for each node includes: Port—The number of the port. •...
  • Page 47: Viewing Performance Information

    Viewing Performance Information Viewing Performance Information Select Product > Performance on the navigation panel. The Performance page (Figure 2-7 on page 2-16) displays. The Performance page provides port utilization percentages and error totals for all ports and the following types of information for the selected port: •...
  • Page 48: Port Utilization Percentages And Error Totals

    Viewing Performance Information Product Performance Page Figure 2-7 The Performance page provides utilization information and error Port Utilization totals for each port as described below: Percentages and Error Totals • Port—The port number. • Name—The configured port name. • % Rx Util—Percentage of received link traffic on the port that is data.
  • Page 49: Error Statistics

    Viewing Performance Information • Four byte words Rx—The number of words that the port has received. • Four byte words Tx—The number of words that the port has transmitted. • Offline sequences Rx—The number of offline sequences (OLS) received by this port. •...
  • Page 50 Viewing Performance Information • Sync losses—The number of loss-of-synchronizations detected because an attached device was reset or disconnected from the port. • Signal losses—The number of loss-of-signal errors detected because the attached device was reset or disconnected from the port. •...
  • Page 51: Class 2 Statistics

    Viewing Performance Information The Performance page provides the following Class 2 statistics for the Class 2 Statistics selected port: • Received Frames—The number of Class 2 frames received by this F_Port from its attached N_Port. • Transmitted Frames—The number of Class 2 frames transmitted by this F_Port to its attached N_Port.
  • Page 52 Viewing Performance Information • Flows rerouted from ISL—The number of Fibre Channel traffic flows that were rerouted from this ISL to another ISL due to congestion. (This value increments only if the OpenTrunking feature is installed.) EFCM Basic User Manual 2-20...
  • Page 53: Configuring The Product

    Configuring the Product This chapter describes how to configure products using the EFCM Basic interface. These procedures can be used to configure a product after installation and as changes are needed. You can use the options on the Configure menu to perform configuration tasks for your product: •...
  • Page 54: Factory Default Values

    Factory Default Values Factory Default Values McDATA products on a SAN have pre-set, default configuration values that were set in the factory. The items that have factory-set default values are: • Passwords (customer and maintenance-level) • Internet Protocol (IP) address •...
  • Page 55: Port Basic Information Page

    Configuring Ports Port Basic Information Page Figure 3-1 2. For each port to be configured, type a port name of 24 or fewer alphanumeric characters in the associated Name field. TIP: When naming ports, you may want to name each port based on the device attached to the port.
  • Page 56 Configuring Ports 5. Select from the drop-down list in the Type column to configure the port type. Available selections are: • G_Port—Generic port. • F_Port—Fabric port. • E_Port—Expansion port. • GX_Port—Generic mixed port. Use this selection to configure a port as a generic loop port (GL_Port). The port automatically negotiates any connection type (loop devices only).
  • Page 57: Configuring Port Rx Bb_Credits

    Configuring Ports Use the Rx BB Credit page to configure the BB_Credit allocation for Configuring Port Rx ports on the product. For each type of port, there is a maximum and BB_Credits minimum BB_Credit limit which is displayed as a range. For a detailed explanation of BB_Credits, see the McDATA Products in a SAN Environment Planning Manual (620-000124).
  • Page 58 Configuring Ports Rx BB_Credit Page Figure 3-2 3. Verify that the port is offline by checking the value in the State column. 4. Each port has a maximum and minimum number of BB_Credits that can be assigned to it, based on the port speed and product type.
  • Page 59: Configuring Npiv

    Configuring Ports 6. Click OK to save and activate the changes. The message Your changes have been successfully activated displays below the page’s heading. 7. If the product is offline, set the product online by selecting the Switch Online check box on the Configure menu. Node Port Identifier Virtualization (NPIV) is a feature that allows Configuring NPIV you to assign multiple Fibre Channel addresses (N_port IDs) to a...
  • Page 60: Port Npiv Configuration Page

    Configuring Ports Port NPIV Configuration Page Figure 3-3 3. Enter a value in the Login field, to specify the maximum number of login sessions allowed by a product. Valid values are in the range 1 to 256. NOTE: You cannot decrease the number of allowed login sessions when the port is online.
  • Page 61: Configuring Switch Information

    Configuring Switch Information Configuring Switch Information The task of configuring switch information is available through the following sections: • on page 3-9 Configuring Switch Identification • on page 3-10 Configuring Switch Date and Time • on page 3-11 Configuring Switch Parameters Perform this procedure to configure the product’s name, description, Configuring Switch location, and contact person.
  • Page 62: Configuring Switch Date And Time

    Configuring Switch Information 3. Type a product description of 255 or fewer alphanumeric characters in the Description field. 4. Type the product’s physical location (255 or fewer alphanumeric characters) in the Location field. 5. Type the name of a contact person (255 or fewer alphanumeric characters) in the Contact field.
  • Page 63: Configuring Switch Parameters

    Configuring Switch Information 4. Click Activate to save and activate the changes. The message Your changes have been successfully activated displays below the page’s heading. The Switch Parameters page is used to enable insistent domain ID, Configuring Switch rerouting delay, domain registered state change notifications Parameters (RSCNs), suppression of RSCNs during zone set activation, limited fabric RSCNs, and zone FlexPars.
  • Page 64 Configuring Switch Information ™ NOTE: If Enterprise Fabric Mode (an optional SANtegrity Binding feature) or Fabric Binding is enabled, then Insistent Domain ID must be enabled. 4. Select the Rerouting Delay check box to enable rerouting delay. When this check box is filled, traffic is delayed through the fabric by the specified error detect time out value (E_D_TOV).
  • Page 65 Configuring Switch Information congestion and disrupt devices. With zone FlexPars enabled, RSCNs are limited to devices that are impacted by a zoning change. 9. At the Preferred Domain ID field, type a value of 1 through 31. The domain ID uniquely identifies each product in a fabric. NOTE: If the product is attached to a fabric element, the product and element must have unique domain IDs.
  • Page 66: Configuring Fabric Parameters For The Switch

    Configuring Switch Information 12. Click OK to save and activate the changes. The message Your changes have been successfully activated displays below the page’s heading. 13. If fabric parameters require configuration, go to Configuring Fabric on page 3-14. Parameters for the Switch 14.
  • Page 67 Configuring Switch Information NOTE: If the product is attached to a fabric element, the product and element must be set to the same R_A_TOV value. If the values are not identical, the E_Port connection to the element fails and the product cannot communicate with the fabric.
  • Page 68: Configuring Network Parameters For The Switch

    Configuring Switch Information • Open Fabric 1.0—Select this option for managing heterogeneous fabrics, and if the product is fabric-attached to McDATA directors or switches and open-fabric compliant switches produced by other original equipment manufacturers (OEMs). This setting is the default. 7.
  • Page 69: Switch Network Configuration Page

    Configuring Switch Information Switch Network Configuration Page Figure 3-8 a. At the IP Address field, type the new value specified by the customer’s network administrator (default is 10.1.1.10). b. At the Subnet Mask field, type the new value specified by the customer’s network administrator (default is 255.0.0.0).
  • Page 70: Configuring Snmp

    Configuring SNMP Configuring SNMP Perform this procedure to enable the SNMP agent, configure community names, write authorizations, network addresses, and user datagram protocol (UDP) port numbers for up to six SNMP trap message recipients. A trap recipient is a management workstation that receives notification (through SNMP) if a switch event occurs.
  • Page 71: Configuring Cli And Ssh

    Configuring CLI and SSH 5. For each trap recipient to be configured, type a community name of 32 or fewer alphanumeric characters in the Name field. The community name is incorporated in SNMP trap messages to prevent unauthorized viewing or use. Duplicate community names are allowed, but the corresponding Write Authorization check boxes must match.
  • Page 72: Configuring Osms And Host Control

    Configuring OSMS and Host Control Figure 3-10 CLI Configuration Page 2. Select the Enable button to enable the CLI. Select the Disable button to disable the CLI. 3. Enable SSH by selecting the Use SSH check box. Disable SSH by clearing the check box.
  • Page 73: Configuring Ssl

    Configuring SSL resides on an open-systems interconnection (OSI) device. This device is attached to a director or switch port. The device communicates with the switch or director through Fibre Channel common transport (FC-CT) protocol. Use the following procedure to configure OSMS and host control: 1.
  • Page 74 Configuring SSL • Current Certificate Details—Provides current information related to SSL certificates. This part of the page shows the following items: — The public certificate. The same certificate is used for both web and software connections. The certificate contains public information that is not secret.
  • Page 75 Configuring SSL 3. To enable or disable Software SSL, click the corresponding Enable and Disable buttons. The state of Software SSL controls the ability of a program to use an Application Program Interface (API) to connect. If Software SSL is disabled, the secure API connection is rejected.
  • Page 76: Zoning

    Zoning Figure 3-12 SSL Configuration Page Zoning A description of use of the Zoning page and of the topic of zoning is found in Chapter 4, Configuring Zoning. EFCM Basic User Manual 3-24...
  • Page 77: Configuring Performance Parameters

    Configuring Performance Parameters Configuring Performance Parameters The following sections describe how to configure performance parameters: • on page 3-25 Configuring Open Trunking • on page 3-27 Configuring Preferred Paths The Open Trunking page enables you to configure open trunking Configuring Open settings.
  • Page 78: Open Trunking Page

    Configuring Performance Parameters be off-loaded. Candidate links for rerouting flow are identified automatically and maintained by the FSPF protocol. All ISLs that lead to adjacent switches on the shortest path to the flow’s destination are considered. This means that even if a link is not on the shortest path to the destination, the flow may be rerouted to this link to relieve congestion.
  • Page 79: Configuring Preferred Paths

    Configuring Performance Parameters 3. Unresolved congestion occurs when a flow cannot be rerouted to another link because it would exceed the other link's threshold. Select the Unresolved Congestion Event Notification check box to enable unresolved congestion event notification. If enabled, an unresolved congestion entry is made in the event log and, if SNMP is configured, an SNMP trap is generated.
  • Page 80 Configuring Performance Parameters The data path consists of the source port of the switch or director being configured, the exit port of that switch or director, and the domain ID of the destination switch or director. Each switch or director must be configured for its part of the desired path in order to achieve optimal performance.
  • Page 81: Preferred Path Page

    Configuring Performance Parameters Preferred Path Page Figure 3-14 2. Select the Enable button to enable Preferred Path function. Select the Disable button to disable preferred path function. When the Preferred Path configuration state is disabled, the switch will not use the configured Preferred Paths. If it is enabled, then it will use the configured Preferred Paths.
  • Page 82: Configuring Port Fencing

    Configuring Port Fencing b. To edit an existing path, select it from the list, then click the Edit button. The information for the selected path is populated in the Path Details dialog. Change the desired fields and select the OK button to show your changes in the list. c.
  • Page 83: Port Fencing Page

    Configuring Port Fencing Port Fencing Page Figure 3-15 2. To enable a policy, select a policy from the Policy Name column and select the Enable button. To disable a policy, select a policy from the Policy Name column and select the Disable button. 3.
  • Page 84: Setting A Switch Online And Offline

    Setting a Switch Online and Offline list of ports by number by selecting Port List from the drop-down list and listing the ports in the entry field. (Identify the ports by port number, or port range, separated by commas. For example, 1,3,5-9,14.) Select the OK button to add your new policy to the Policies List.
  • Page 85: Enabling And Disabling Software

    Enabling and Disabling Software Figure 3-16 Configure Menu Enabling and Disabling Software Perform this procedure to enable and disable the ability of software other than E/OS to control the product. Examples of software that are affected by this are SAN management interfaces, such as EFC Manager, and APIs, such as the SMI-S Interface.
  • Page 86: Upgrade Options

    Upgrade Options Upgrade Options For information about the Upgrade Options command on the Configure menu, see on page 9-2. Adding Licensed Features EFCM Basic User Manual 3-34...
  • Page 87: Understanding Zoning

    Configuring Zoning This section describes the concepts of zoning and provides procedures for using the EFCM Basic interface to create and manage zones. • Understanding Zoning................. 4-1 • Using The Zoning Page..............4-13 • Creating and Modifying a Zone ............4-14 •...
  • Page 88: Controlling Access Across A Fabric

    Understanding Zoning Zoning features enable you to establish zoning across a fabric of Controlling Access devices attached to switches and directors by partitioning these Across a Fabric devices into groups called zones. A zone is composed of devices that can access each other through port-to-port connections. Devices in the same zone can recognize and communicate with each other;...
  • Page 89: Zoning Through A Single Fibre Channel Managed Product

    Understanding Zoning Figure 4-1 illustrates three zones established on a single managed product with four devices in each zone. Devices in each zone can communicate with and access devices only in their respective zones. Zoning through a Single Fibre Channel Managed Product Figure 4-1 Configuring Zoning...
  • Page 90: Zoning Through A Multiswitch Fabric

    Understanding Zoning Figure 4-2 illustrates how zones can consist of ports and (or) devices installed on ports in three managed products in a multiswitch fabric. Figure 4-2 Zoning Through a Multiswitch Fabric EFCM Basic User Manual...
  • Page 91: Controlling Access At The Switch

    Understanding Zoning A port binding feature is available on switches and directors that Controlling Access allows you to “bind” a specific switch or director port to the world at the Switch wide name (WWN) of an attached device for exclusive communication.
  • Page 92: Zoning Concepts

    Understanding Zoning Access can also be controlled at the storage device as an addition or enhancement to redundant array of independent disks (RAID) controller software. Data access is controlled within the storage device, and server HBA access to each LUN is explicitly limited (access is blocked by default).
  • Page 93 Understanding Zoning The following naming conventions apply to zones and zone sets: Naming Conventions for Zones and Zone • All names must be unique and may not differ by case only. For Sets example, myzone and MyZone are both valid individually, but they are not considered to be unique.
  • Page 94 Understanding Zoning such as servers or storage devices. Although the device may also have a node WWN, this WWN is not used for zoning identification. NOTE: Nicknames can be assigned to the WWN using the Element Manager. This functionality is not available in EFCM Basic. The advantage of identifying a zone member as the WWN of the attached device is that the identification will not change if fiber cable connections to ports are rearranged.
  • Page 95 Understanding Zoning NOTE: If a managed product’s Domain ID changes, you must reconfigure all zones that contained the managed product’s port as a zone member. We recommend assigning unique Preferred Domain IDs to each switch in the fabric using the Switch Parameters page to change the Preferred Domain IDs (see on page 3-11).
  • Page 96: Zone Set Configuration

    Understanding Zoning Zone Set Configuration Table 4-1 Zone Set Configuration Limit Number of members in a zone 4096 Number of unique zone members in a zone set 4096 Number of zone members in a zone set, including 8192 duplicates Number of zones in a zone set 2048 (2047 plus the default zone) Characters per zoning name Consider the following factors when configuring zone sets for your...
  • Page 97: Merging Zoned Fabrics

    Understanding Zoning Merging Zoned Fabrics Managed products are linked through Interswitch Links (ISLs) to form multiswitch fabrics. In a multiswitch fabric, the active zoning configuration applies to the entire fabric. Any change to the configuration applies to all switches in the fabric. When fabrics join through an ISL, adjacent managed products exchange active zone configurations and determine if the configurations are compatible and can merge.
  • Page 98: Merging Zones

    Understanding Zoning Merging Zones Table 4-2 Fabric A Fabric B Result Not zoned Not zoned Fabrics join successfully. The new fabric remains not zoned. Not zoned Zoned Fabrics join successfully and the active zone set will propagate across the fabric. Fabric A inherits zoning configuration from Fabric B.
  • Page 99: Using The Zoning Page

    Using The Zoning Page Using The Zoning Page Select Configure > Zoning on the navigation panel. The Zoning configuration page (Figure 4-3) displays. This page is used to configure zoning on the product. The page has three panels: • Potential Zone Members—Used to add members to the zone. This consists of a listing of attached nodes and an interface for adding zone members by WWN or the combination of domain ID and port number.
  • Page 100: Creating And Modifying A Zone

    Creating and Modifying a Zone Creating and Modifying a Zone Perform this procedure to configure, add, or delete zones. A zone is a group of devices that can access each other through port- to-port connections. Devices in the same zone can recognize and communicate with each other;...
  • Page 101: Add Zones Members To A Zone

    Creating and Modifying a Zone • A zone set name cannot contain spaces. • Valid characters are alphanumerics and the caret ( ^ ), hyphen ( - ), underscore ( _ ), or dollar ( $ ) symbols. • A zone set name can have a maximum of 64 characters. NOTE: A product can have at most 1024 zones.
  • Page 102: Remove Zone Members From A Zone

    Creating and Modifying a Zone Remove a member from the Pending Zone Members list using the Remove Zone arrow buttons between the panels. To delete all zone members, select Members from a the Clear button. Zone NOTE: If you use the arrow button to remove a zone member listed by WWN or the combination of domain ID and port number, the zone member is deleted from the Pending Zone Members list.
  • Page 103: Configuring The Zone Set

    Configuring the Zone Set Configuring the Zone Set A zone set is a group of zones that is activated or deactivated as a single entity across all managed products in either a single switch or a multiswitch fabric. Only one zone set can be active at one time (although the default zone can be active at the same time as a zone set).
  • Page 104: Name And Rename A Zone Set

    Configuring the Zone Set Name or rename a zone set by typing in the Zone Set field and Name and Rename selecting the Update button. This changes the zone set name in the a Zone Set zone set work area and highlights the Activate button. Select the Activate button to distribute this change across the fabric.
  • Page 105: Delete Zones From The Zone Set

    Configuring the Zone Set Deleting a zone set deletes the zone from system memory. When a Delete Zones From zone set is deleted, it is no longer available for configuration. Use the the Zone Set following procedure to delete zones from the zone set: 1.
  • Page 106: Deactivate The Active Zone Set

    Configuring the Zone Set not activated on the fabric until the user activates the changes. Instead, the changes remain local to the product. Selecting the Cancel button clears all changes to the zone set. When the Cancel button is selected, the configuration dialogs show active zone set information.
  • Page 107: Configuring Security

    Configuring Security The Security menu is used to configure the ability of users and devices to communicate with the product. You must be logged in with administrator access to use the commands on the Security menu. The Security menu provides the following options: •...
  • Page 108: Configuring User Authentication

    Configuring User Authentication • Devices tab—Configuring Device Authentication on page 5-10 • Ports tab—Configuring Port Authentication on page 5-14 Configuring User Authentication The User Authentication configuration page (the default landing page when clicking on the Authentication Settings menu item) allows the EFCM Basic user to configure authentication settings for users of the product’s embedded management interfaces, EFCM Basic and the CLI.
  • Page 109: User Authentication Configuration Page

    Configuring User Authentication User Authentication Configuration Page Figure 5-1 Use the page to perform the following tasks: • Add a user name by selecting the New button. Use the User Properties area to configure settings for the user name as described on page 5-4.
  • Page 110: Defining User Properties

    Configuring User Authentication To configure the properties of user names, use the User Properties area Defining User of the Users Authentication page. Select Security > Authentication Properties Settings on the navigation panel, then select the Users tab. The Users Authentication configuration page (Figure 5-1 on page 5-3) displays.
  • Page 111: Defining Authentication Settings For The Product

    Configuring User Authentication To configure how the product authenticates login attempts, use the Defining Authentication Settings area of the Users Authentication page. Select Authentication Security > Authentication Settings on the navigation panel, then select Settings for the the Users tab. The Users Authentication configuration page (Figure 5-1 Product on page 5-3) displays.
  • Page 112: Configuring Software Authentication

    Configuring Software Authentication Configuring Software Authentication The Software Authentication configuration page provides the ability to configure authentication settings for management access to the product. The management access configured by this page includes both in-band and out-of-band software access and settings for the API path (NMRU) and OSMS.
  • Page 113: Software Authentication Configuration Page

    Configuring Software Authentication Authentication Settings on the navigation panel, then select the Software tab. The Software configuration page (Figure 5-2) displays. Software Authentication Configuration Page Figure 5-2 The Permitted Management Software list shows authenticated out-of-band software identifiers (such as NMRU connections to the switch).
  • Page 114: Configuring Software Authentication Properties

    Configuring Software Authentication To configure the properties of a software ID, use the Software Member Configuring area of the Users Authentication page. Select Security > Authentication Software Settings on the navigation panel, then select the Software tab. The Authentication Software configuration page (Figure 5-2) displays.
  • Page 115: Configuring Osms Settings

    Configuring Software Authentication — Local Only—Only local authentication is performed. That is to say, authentication is performed by the product (local device) only. — RADIUS Only—Only the RADIUS server is used for authentication. — RADIUS then Local—First the RADIUS server is used for authentication, then the local device.
  • Page 116: Configuring Device Authentication

    Configuring Device Authentication Configuring Device Authentication The Device Authentication page allows the user to configure authentication for both attached and detached devices. This page specifies whether the product authenticates requests from other devices for connection. Select Security > Authentication Settings on the navigation panel, then select the Device tab.
  • Page 117: Defining The Chap Secret Of The Product

    Configuring Device Authentication • Dialog for adding devices to the list of Authenticated Devices. These devices are allowed to make connections to the product, which is described in Configuring Authentication Devices page 5-12. The top left of the Device Authentication page contains a dialog for Defining the CHAP defining the CHAP secret of the product.
  • Page 118: Configuring Authentication Devices

    Configuring Device Authentication Select the OK button to save the settings. You can select Cancel to load the dialog with the product’s currently active values. The lower part of the Device Authentication page is used to configure Configuring authentication for remote devices. This part of the screen has the Authentication following components: Devices...
  • Page 119: Adding A Device To The Authentication Devices List

    Configuring Device Authentication If you use the arrow buttons between the Attached Devices and CHAP Secret panels to return the device to the Attached Devices panel, no CHAP secret value is assigned to the device. If the device is a detached device, the WWN of the device is removed.
  • Page 120: Configuring Port Authentication

    Configuring Port Authentication Configuring Port Authentication The Port Authentication page allows a user to override the authentication settings of the product for specified ports. The page shows a list of ports, their WWN (if applicable), and their authentication state. To configure authentication for a port, perform the following procedures: 1.
  • Page 121: Configuring The Ip Access Control List

    Configuring the IP Access Control List • Disable—Specifies that authentication is disabled for the port. The changes are immediately applied to the port and the list is updated with the new information. Configuring the IP Access Control List The IP Access Control List page enables you to configure a list of trusted switch IP addresses that are allowed to make IP connections to the product.
  • Page 122: Setting The Ip Acl State

    Configuring the IP Access Control List • Switch IP Access Control List—A table containing all addresses configured as having access to the switch. This area is also used to delete members from the list, which is described in Deleting on page 5-17. Members from the List •...
  • Page 123: Editing The List

    Configuring the IP Access Control List Use the edit functionality of the Switch IP Access Control List to Editing the List remove an entry from the list and replace with an updated entry. Edit an entry by selecting an entry on the Switch IP Access Control List and selecting the Edit button.
  • Page 124: Configuring The Radius Server

    Configuring the RADIUS Server Configuring the RADIUS Server The product has a RADIUS client that can access up to three user-configurable RADIUS servers. The RADIUS Server page enables you to configure a list of RADIUS servers that are used by the product for authentication.
  • Page 125: Add An Entry To The Radius Server List

    Configuring the RADIUS Server RADIUS Server Page Figure 5-6 The RADIUS Server list shows the RADIUS Servers the product is Add an Entry to the configured to use for authentication. The RADIUS Server list can RADIUS Server List have a maximum of three entries. To create an entry in the RADIUS Server list, select the New button.
  • Page 126: Edit An Entry On The Radius Server List

    Configuring the RADIUS Server • Timeout (sec)—Specify the amount of time to wait for a response from the RADIUS server before re-transmitting information. The time-out value can be in the range 1 to 1000 seconds; the default is 4 seconds. •...
  • Page 127: Configuring The Dead Time Parameter

    Configuring the RADIUS Server If a RADIUS server does not respond to an authentication request, it Configuring the can be marked as dead (unavailable) for a specified time interval. Dead Time During that time period the alternate, lower-priority server is used Parameter for authentication.
  • Page 128: Enabling The Enterprise Fabric Mode

    Enabling the Enterprise Fabric Mode Enabling the Enterprise Fabric Mode The Enterprise Fabric Mode page provides the ability to enable and disable the Enterprise Fabric Mode. The Enterprise Fabric Mode automatically enables the features that FICON devices need to participate in a fabric. These features are described in Features and on page 5-22.
  • Page 129 Enabling the Enterprise Fabric Mode Fabric Binding is a SANtegrity Binding feature that prohibits Fabric Binding and the Enterprise Fabric switches and directors from communicating with switches or Mode directors that are not part of the fabric. Refer to Configuring Fabric on page 5-25 for details on configuring Fabric Binding.
  • Page 130 Enabling the Enterprise Fabric Mode switch is offline. In this case, disabling Rerouting Delay also disables Enterprise Fabric Mode. For information about configuring and enabling Rerouting Delay, see Configuring Switch Parameters page 3-11. Domain register for state change notifications (domain RSCNs) are Domain RSCNs and the Enterprise Fabric sent between end devices in a fabric to provide additional connection...
  • Page 131: Configuring Fabric Binding

    Configuring Fabric Binding Configuring Fabric Binding Fabric Binding functionality, provided by the SANtegrity Binding feature, allows you to bind the product to specified fabrics so that it can communicate only with those fabrics. With Fabric Binding enabled, the product can communicate only with fabrics that are included in the Fabric Binding Member List (FBML).
  • Page 132: Enable, Disable, And Online State Functions

    Configuring Fabric Binding Fabric Binding Page Figure 5-8 In order for Fabric Binding to function, specific operating parameters Enable, Disable, and optional features must be enabled. Also, there are specific and Online State requirements for disabling these parameters and features when the Functions director or switch is offline or online.
  • Page 133: Identify Fabric Binding Status

    Configuring Fabric Binding The Fabric Binding page provides the status of Fabric Binding for the Identify Fabric product in the Fabric Binding Status field. The following values are Binding Status shown in the field: • Active—Fabric Binding is active on the fabric, which means that product can communicate only with the members of the FBML.
  • Page 134: Activate Fabric Binding

    Configuring Fabric Binding NOTE: If Fabric Binding is active, you cannot delete members from the list that are attached to the fabric. Members that are attached must remain in the list, because the list must contain all attached members to be activated. The FBML list shown in the page is not active on the fabric until the changes are activated.
  • Page 135: Configuring Switch Binding

    Configuring Switch Binding Configuring Switch Binding Switch Binding functionality enables you to identify the devices with which the switch or director can communicate. Switch Binding is available only if the SANtegrity Binding feature is installed. The Switch Binding page allows you to enable the product to communicate only with devices that are listed on the Switch Binding Membership List (SBML).
  • Page 136: Enable, Disable And Online State Functions

    Configuring Switch Binding Switch Binding Page Figure 5-9 Enable, Disable and Online State Functions For Switch Binding to function, specific operating parameters and optional features must be enabled. Also, there are specific requirements for disabling these parameters and features: • Switch Binding can be enabled or disabled whether the product is offline or online.
  • Page 137: Define Switch Binding State

    Configuring Switch Binding • If Enterprise Fabric Mode is enabled and the director or switch is offline you can disable Switch Binding, but this also disables Enterprise Fabric Mode. • WWNs can be added to the SBML without regard to whether Switch Binding is enabled or disabled.
  • Page 138: Removing Members From The Sbml

    Configuring Switch Binding than 256 for some products. The limit is 252 for the 140-Port Director. The limit is 128 for the 16-Port 2-Gbps Switch, 32-Port 2-Gbps Switch, and 64-Port Director. • Detached nodes—Enter the WWN of a detached node in the Detached Node WWN field.
  • Page 139: Configuring Port Binding

    Configuring Port Binding Configuring Port Binding The Port Binding page enables you to bind a specific switch or director port to the WWN of an attached device for exclusive communication. To configure Port Binding, select Security > Port Binding on the navigation panel.
  • Page 140: Enabling And Disabling Safe Zoning Mode

    Enabling and Disabling Safe Zoning Mode • Enter the WWN to which the port is to bind in the Bound WWN column. The WWN must be entered as hex digits, all uppercase, and you must use a colon to separate digits. •...
  • Page 141: Upgrade Options

    Upgrade Options Upgrade Options For information about the Upgrade Options command on the Security menu, see on page 9-2. Adding Licensed Features Configuring Security 5-35...
  • Page 142 Upgrade Options EFCM Basic User Manual 5-36...
  • Page 143: Viewing System Logs

    Viewing System Logs The commands on the Logs menu enable the user to view logs of system and fabric activity. Each log contains a link that brings the user to a page of ASCII text that reflects the log information present on the machine at that moment.
  • Page 144: Viewing The Event Log

    Viewing the Event Log Viewing the Event Log Select Logs > Event on the navigation panel. The Event Log (Figure 6-1) displays. The Event Log page provides the following button functions: • Clear—Select this button to clear the contents of the log. The log’s contents are deleted from system memory.
  • Page 145: Error Event Code Categories

    Viewing the Event Log • Date/Time: Represents the date and time the event occurred on the switch. • Error code: Numeric code for the event. For more information, on page 6-3. Error Event Code Categories • Severity: The severity of the event represented in text. There are four levels, indicating an increasing level of severity: Informational, Minor, Major, and Severe (not operational).
  • Page 146: Viewing The Link Incident Log

    Viewing the Link Incident Log Viewing the Link Incident Log Select Logs > Link Incident on the navigation panel. The Link Incident (Figure 6-2) displays. The Link Incident Log page provides the following button functions: • Clear—Select this button to clear the contents of the log. The log’s contents are deleted from system memory.
  • Page 147 Viewing the Link Incident Log — Bit-error threshold exceeded. The number of code violation errors has exceeded the specified threshold. — Loss-of-signal or loss-of-synchronization. This occurs if a cable is unplugged from an attached node. Loss-of-signal occurs when a cable is unplugged from an attached node. Loss-of-synchronization is reported if the condition has persisted for longer than the resource allocation time out value (R_A_TOV).
  • Page 148: Viewing The Audit Log

    Viewing the Audit Log Viewing the Audit Log Select Logs > Audit on the navigation panel. The Audit Log (Figure 6-3) displays. The Audit Log page provides the following button functions: • Clear—Select this button to clear the contents of the log. The log’s contents are deleted from system memory.
  • Page 149 Viewing the Audit Log • User ID: Identifier of the user that issued the command. The identifier is usually an IP address. • Action: The type of Audit Log event. Viewing System Logs...
  • Page 150: Viewing The Security Log

    Viewing the Security Log Viewing the Security Log Select Logs > Security on the navigation panel. The Security Log (Figure 6-4) displays. The Security Log page provides the following button functions: • Clear—Select this button to clear the contents of the log. The log’s contents are deleted from system memory.
  • Page 151 Viewing the Security Log • Trigger Level: The trigger level of the event. Possible values include: Informational, Security Change, or Error • Count: A cumulative count of events within a known period. • Category: The event category message with possible values may be: Successful Connection, Disconnection, Configuration Change, Authorization Failure, Authentication Failure, or Reserved •...
  • Page 152: Viewing The Open Trunking Re-Route Log

    Viewing the Open Trunking Re-Route Log Viewing the Open Trunking Re-Route Log Select Logs > Open Trunking Re-Route on the navigation panel. The (Figure 6-5) displays. The Open Trunking Open Trunking Re-Route Log Re-Route Log page provides the following button functions: •...
  • Page 153 Viewing the Open Trunking Re-Route Log • Old Exit Port: The decimal exit-port number on this switch that the flow used to get to the target domain. • New Exit Port: The decimal exit-port number on this switch that the flow now uses to get to the target domain. Viewing System Logs 6-11...
  • Page 154: Viewing The Fabric Log

    Viewing the Fabric Log Viewing the Fabric Log Select Logs > Fabric on the navigation panel. The Fabric Log (Figure 6-6) wrapping page displays. The Fabric Log page provides the following button functions: • Wrapping—Select this button to display the wrapping page of the log.
  • Page 155: Fabric Log Page

    Viewing the Fabric Log Fabric Log Page Figure 6-6 The Fabric Log provides: • Count: A cumulative count of entries within a known period. • Date/Time: The date and time of the log entry. • Description: A description of the log entry. •...
  • Page 156: Viewing The Embedded Port Frame Log

    Viewing the Embedded Port Frame Log Viewing the Embedded Port Frame Log Select Logs > Embedded Port Frame on the navigation panel. The (Figure 6-7) page displays. The Fabric Log Embedded Port Frame Log page provides the following button functions: •...
  • Page 157: Defining Filtering Settings

    Viewing the Embedded Port Frame Log The Embedded Port Frame Log provides: • Count: A cumulative count of entries within a known period. • Date/Time: Date and time of the frame. • Port #: The port number. • Direction: Direction of the frame through the port (I = In, O = Out).
  • Page 158: Viewing All Logs

    Viewing All Logs Viewing All Logs Select Logs > All on the navigation panel. The All Logs page (Figure 6-8) displays. The All Logs page provides the following button functions: • Clear—Select this button to clear the contents of all logs on the product.
  • Page 159 Viewing All Logs The All Logs listing provides the ability to view (display) all of the content of the following logs: • Event Log—For more information, see Viewing the Event Log page 6-2. • Open Trunking Re-Route Log—For more information, see on page 6-10.
  • Page 160: Viewing Syslog Configuration

    Viewing Syslog Configuration Viewing Syslog Configuration The Syslog Configuration page enables you to configure client systems to receive logs from the product. A remote host receives copies of the system logs (syslogs), providing a means to view logs if the product is unavailable.
  • Page 161: Enable And Disable Syslogs

    Viewing Syslog Configuration • Delete syslog recipients from the list, which is described in Delete on page 6-20. Syslog Recipients • Identify which logs are sent to recipients, which is described in on page 6-20. Specify Which Logs Are Sent to a Recipient Sending syslogs to recipients is disabled by default.
  • Page 162: Edit A Syslog Recipient

    Viewing Syslog Configuration To change the information for a configured syslog recipient, select the Edit a Syslog recipient on the list in the Recipients area. Select the Edit button. The Recipient information for the entry is populated to the Recipient Properties dialog.
  • Page 163: Performing Product Maintenance

    Performing Product Maintenance The Maintenance menu provides commands to perform maintenance tasks, such as port diagnostics. You can access information and tools that are useful in troubleshooting from the Maintenance menu. The following tasks are available on the Maintenance menu: •...
  • Page 164: Switch Maintenance Tasks

    Switch Maintenance Tasks Switch Maintenance Tasks The Switch maintenance page enables you to configure a number of settings for the product on one page. Select Maintenance > Switch on the navigation panel. The Switch maintenance page (Figure 7-1) displays. Switch Maintenance Page Figure 7-1 The Switch maintenance page enables you to perform the following tasks:...
  • Page 165: Set The Unit Beaconing State

    Switch Maintenance Tasks If the value in the Current Online State field is Off, you can set the product online by selecting the Activate button. Using the Switch maintenance page, you can enable or disable Set the Unit beaconing on the product. The current state of beaconing for the unit, Beaconing State which is either on or off, is displayed by a flashing LED.
  • Page 166 Switch Maintenance Tasks ATTENTION! This operation will reset all configuration data and non-volatile settings to the factory default values. All optional features will also be disabled. You will need to activate optional features after completing the product reset. Before resetting the product, review the kinds of data that will be reset by browsing the Configure menu and associated options.
  • Page 167: Setting Individual Port Beaconing

    Setting Individual Port Beaconing Setting Individual Port Beaconing Select Maintenance > Ports > Beacon from the navigation panel. The Ports Beacon page displays (Figure 7-2). Use this page to enable or disable beaconing for individual ports. Enabling beaconing helps you to locate a specific port for troubleshooting purposes using the flashing port LED.
  • Page 168: Resetting Ports

    Resetting Ports Resetting Ports Select Maintenance > Ports > Reset from the navigation panel. The Ports Reset page displays (Figure 7-3). Use this page to reset ports. This action clears all statistics counters and disables port beaconing for the port. If a product is attached to the port and is online, this operation sends a link reset to the attached product;...
  • Page 169: Performing Diagnostics On A Port

    Performing Diagnostics on a Port Performing Diagnostics on a Port Select Maintenance > Ports > Diagnostics from the navigation panel. The Ports Diagnostics page displays (Figure 7-4). Use this page to run either internal or external loopback diagnostic tests for any port. (Service personnel may request these tests to be conducted to aid in troubleshooting problems.) When running port diagnostics, the product may be online or offline and the port can be either blocked or...
  • Page 170: Port Diagnostics - Executing Page

    Performing Diagnostics on a Port 5. The Ports Diagnostics Executing page (Figure 7-5) displays. This page displays the type of test being run, the port number selected, and a text box that counts down the seconds until the diagnostics are completed. (The test typically lasts 30 seconds.) To discontinue the test, select the Stop button.
  • Page 171: Accessing System Files

    Accessing System Files Accessing System Files The System Files page enables you to access the dump file and the data collection file. If the operational firmware detects a critical error, the product automatically copies the contents of dynamic random access memory (DRAM) to a dump area in FLASH memory on the Control Processor (CTP) card.
  • Page 172: System Files Page

    Accessing System Files Selecting the Location to Save the CTP Maintenance Information Figure 7-7 4. When the file is completely downloaded, the Download Complete screen displays. If you encounter any problems during this procedure, contact your service representative. Use the following procedure to create the data collection file: Create the Data Collection File 1.
  • Page 173: Configuration Backup

    Configuration Backup Configuration Backup The Backup Configuration page enables you to save the current persistent state of the product (the NVRAM contents) to a file in XML format. To perform the backup, you must stop any other management operations; in particular you should not edit a zone set using either the EFCM Basic interface or the CLI.
  • Page 174: Configuration Restoration

    Configuration Restoration Configuration Restoration The Restore Configuration page enables you to download a configuration file from a location that you specify. (The configuration file is created using the procedure described in Configuration Backup on page 7-11.) Follow these steps to download the configuration file: 1.
  • Page 175: Upgrading Firmware

    Upgrading Firmware Upgrading Firmware The Firmware Upgrade page enables you to upload and upgrade firmware. The firmware version shipped with the product is provided on the System Version XX.YY.ZZ diskette. McDATA’s web site, under Services, Support Login. (You will need a member name and password to log in.) Detailed instructions on how to locate and download firmware are provided in the product’s installation and service manual.
  • Page 176: Activating Optional Features

    Upgrading Firmware 2. Type the drive and pathname of the firmware file in the Download configuration file from field, or click Browse to locate the file. 3. When the correct filename is in the box, click Send & Load Firmware. When the firmware has finished transferring, a message displays stating that the new firmware is being activated on the product and the product will be unavailable temporarily.
  • Page 177: Viewing Product Information

    Viewing Product Information Viewing Product Information The Product Info page displays information about the product. To view the product information, select Maintenance > Product Information from the navigation panel. The Product Info page displays (Figure 7-11). Product Information Page Figure 7-11 Information shown in this page may be requested by technical support to help resolve technical problems.
  • Page 178 Viewing Product Information The Print Info page shows the following information: • Network Information (IP Address, Subnet Mask, Gateway Address) • Product Identification Information • Switch Information • Switch Parameters • Fabric Parameters • Port Configurations • FRU List and Information •...
  • Page 179: Enabling And Disabling Unit Beaconing

    Enabling and Disabling Unit Beaconing • Threshold Alerts • Fabric Topology • Fabric Node List • Port Fencing Enabling and Disabling Unit Beaconing Beaconing is useful in helping to isolate problems and locate the product, especially when there are multiple products stacked together, such as in a rack-mount cabinet.
  • Page 180: Clearing The System Error Light

    Clearing the System Error Light Clearing the System Error Light The amber system error light indicator, shown on the Product Hardware page, simulates the system error light on the actual switch. When this indicator illuminates, an event has occurred requiring immediate attention, such as the failure of the system, power supply/fan, or port.
  • Page 181: Using The Fabric View

    Using the Fabric View The following information about the Fabric View is available: • Overview of the Fabric View..............8-1 • Fabric View Elements ................8-1 Overview of the Fabric View The Fabric View is the first screen displayed after logging into the EFCM Basic interface.
  • Page 182: Fabric Tree

    Fabric View Elements Fabric View with 10 Domain IDs Figure 8-1 The panel on the left of the page is a fabric tree of all the domains in Fabric Tree the fabric sorted by domain ID in numerical order. The fabric tree EFCM Basic User Manual...
  • Page 183: Product Boxes

    Fabric View Elements cannot be expanded or contracted. The listings in the fabric tree provide the following information, for the current product and the next two domain IDs: • Domain ID —This field is a link that opens the Product Hardware page for the corresponding device.
  • Page 184 Fabric View Elements • WWN—WWN of the switch/domain. • IP—IP address of the switch/domain. • Name—Name of the switch as configured by the user. • Firmware—Firmware release version. • Status—operational status of the switch (Operational, Degraded, or Failed). • Switch Details button—Available only for the current product, This button opens the Product Hardware page for the corresponding device and enables the drop-down menus that are used to configure and monitor the device.
  • Page 185: Chapter 9 Software Upgrade And Feature Installation

    Software Upgrade and Feature Installation Because the EFCM Basic interface provides a limited amount of SAN management capacity, and SANs frequently grow, the interface has functionality intended to aid you in upgrading your SAN management capacity. The EFCM Basic interface provides two methods of upgrading your system’s SAN Management technology: •...
  • Page 186: Adding Licensed Features

    Adding Licensed Features Adding Licensed Features Select Optional Features from the Configure, Security, or Maintenance menus. The Maintenance Feature Installation page displays (Figure 9-1). This page provides a list of the licensed features that are available on the system. Select an entry in the Features panel to view information about the feature.
  • Page 187: Licensed Features

    Adding Licensed Features The licensed features are: Licensed Features • Element Manager—This feature enables the EFCM Element Manager for the product. • Flexport—A Flexport switch is delivered at a discount with only a portion of the switch’s ports enabled. When additional port capacity is required, the remaining ports are enabled through purchase of this feature.
  • Page 188 Adding Licensed Features may vary depending on keys and serial number. The feature key is case sensitive and must be entered exactly, including dashes. Feature keys use a format similar to the following: XxXx-XXxX-xxXX-xX. TIP: You must be logged in with Administrator-level rights to install feature keys. The feature key can be installed while the product is online, unless the new feature key removes existing functionality.
  • Page 189: Chapter 10 Upgrading Your San Management System

    Upgrading Your SAN Management System Differences Between EFCM Basic and other McDATA Products The EFCM Basic interface is designed to manage products in a simple SAN while the Enterprise Fabric Connectivity Manager (EFCM) and SANavigator are designed to manage products in large scale SANs. Therefore, as you add additional products to your SAN, consider migrating from EFCM Basic to other McDATA management products to provide more efficient management of your SAN.
  • Page 190: Sanavigator

    SANavigator • Enables SAN management from a single console. Systems administrators have the ability to view and zone components in the SAN, as well as remotely adding, removing, or modifying McDATA's interconnected directors and switches. • Integrates with leading multi-vendor applications. EFCM allows easy integration with heterogeneous applications and environments such as SANavigator™, Veritas, and Tivoli, enabling proactive SAN management.
  • Page 191: Features And Functions

    SANavigator • Leverages existing resources to reduce hardware and personnel costs. • Minimizes risk through centralized planning and management. Features and Performance Monitoring Functions Measure the performance trends of every switch port in the SAN and pinpoint bandwidth bottlenecks with the SANavigator Performance Monitoring module.
  • Page 192: Management Features Provided By Efcm And/Or Sanavigator

    Management Features Provided by EFCM and/or SANavigator LUN Management The SANavigator LUN Management module gives you the ability to manage the LUNs on storage arrays from EMC, HDS and IBM. With this module, you’ll get the increased data security features associated with LUN masking as well as the ability to create new LUNs on supported storage arrays.
  • Page 193: Monitoring System Performance

    Management Features Provided by EFCM and/or SANavigator • Remote notification test • Continuous screen alert indicator • Dial-in support • Link incident logs • Product change status log • User session logs • Audit log of user actions • Export log files •...
  • Page 194 Management Features Provided by EFCM and/or SANavigator EFCM Basic User Manual 10-6...
  • Page 195: Appendix A Error Messages

    Error Messages This appendix lists and explains error messages for EFCM Basic. Any error numbers that are not listed are reserved for future use. The message that is returned is a string that includes the error number and the text of the message. Message Error 000: Authorized OK Informational only.
  • Page 196 Message Error 003: Initiated OK Informational only. Description Informational Only Action Message Error 004 Busy The switch cannot process any requests at this time. Description Re-submit the request. Action Message Error 005: Busy The switch cannot process any requests at this time. Description Re-submit the request.
  • Page 197 Message Error 009: Invalid Switch Description The value entered for the switch DESCRIPTION is invalid. Description The description for the director or switch may contain 0–255 Action characters. Enter a description with 0–255 characters and re-submit. Message Error 010: Invalid Switch Location The value entered for the switch location is invalid.
  • Page 198 The port name for the individual port may contain 0–24 characters. Action Enter a name with 0–24 characters and re-submit. If spaces are used, enclose the name in quotation marks. Message Error 015: Invalid BB Credit The value entered for the buffer-to-buffer credit is invalid. Description The buffer-to-buffer credit must be an integer in the valid range Action...
  • Page 199 Message Error 019: Invalid Operating Mode Informational Only. Description Informational Only. Action Message Error 020: Invalid Preferred Domain ID The value entered for the preferred domain ID for the director or Description switch is invalid. The preferred domain ID must be an integer in the range 1–31. Enter Action an appropriate value and re-submit.
  • Page 200 Message Error 024: Invalid Loop Class 2 VC No longer used. Description Informational Only Action Message Error 025: Invalid Loop Class 3 VC No longer used. Description Informational Only Action Message Error 026: Invalid Multicast VC No longer used. Description Informational Only Action Message...
  • Page 201 Message Error 030: Invalid IP Address The value entered for the IP Address is invalid. Description The new IP address for the Ethernet interface must be entered in Action dotted decimal format (e.g. 10.0.0.0). Enter an appropriate IP address and re-submit. Message Error 031: Invalid Subnet Mask The value entered for the subnet mask is invalid.
  • Page 202 Enter unique SNMP community names or force write authorizations Action for duplicate community names to be identical and re-submit. Message Error 035: Duplicate SNMP Trap Address The value entered for the SNMP trap address is already in use. Description Enter a different SNMP trap address. Action Message Error 036: Port Already Swapped...
  • Page 203 Message Error 039: Invalid Year The value of the year entered for the new system date is invalid. Description The format of the date parameter must be mm:dd:yyyy or Action mm/dd/yyyy. The year must contain an integer greater than 1980. Enter an appropriate date and re-submit.
  • Page 204 Message Error 044: Max SNMP Communities Defined A new SNMP community may not be defined without removing an Description existing community from the list. A total of 6 communities may be defined for SNMP. A new Action community can be added only after a current community is removed. Make the appropriate changes and re-submit.
  • Page 205 Message Error 049: Invalid RADIUS Server UDP Port Number An invalid value was entered. Description Enter a valid RADIUS Server UDP Port Number; the default port Action number is 1812. Message Error 050: Invalid RADIUS Server Timeout Value An invalid value was entered. Description Enter a valid RADIUS Server time-out value;...
  • Page 206 Message Error 055: Invalid Zone Name The value entered for the zone name is invalid. Description The zone name must be unique and contain 1–64 characters. The Action valid character set for the zone name can be found under Creating and on page 4-14.
  • Page 207 Message Error 060: Invalid Number of Zone Members The entered command tried to add more zone members than the Description zone can hold. Reduce the number of zone members in the zone and re-submit the Action command. Message Error 061: Invalid Zone Member Type A zone member was entered that is neither a WWN nor a Domain, Description Port pair.
  • Page 208 Message Error 065: Cannot remove the last CLI user with Administrators rights There must be at least one administrator with access to the CLI. Description No action, you cannot remove the user account. Action Message Error 066: Unknown Error No longer used. Description Informational only.
  • Page 209 Message Error 070: Invalid FRU Type The requested FRU does not exist on this product. Description Consult the installation/service manual for this product to find Action appropriate FRU names. Message Error 071: FRU Not Installed The requested FRU is not installed. Description Consult the installation/service manual for this product for Action...
  • Page 210 Message Error 075: Invalid Zone Set Size The zone set entered exceeds switch NVRAM limitations. Description Reduce the size of the zone set to meet specified requirements. This Action can be a reduction in the number of zones in the zone set, a reduction of members in a zone, or a reduction of zone name lengths.
  • Page 211 Message Error 080: Front Panel Failed No longer used. Description Informational Only. Action Message Error 081: Default Zone Enabled The request cannot be completed because the default zone is enabled Description Disable the default zone and re-submit the command. Action Message Error 082: Invalid Interop Mode The value entered for the interoperability mode is not valid.
  • Page 212 Message Error 086: Invalid Code Set FICON error message. Description Informational Only. Action Message Error 087: Invalid GCSGID FICON error message. Description Informational Only. Action Message Error 088: Invalid Feature Key Length The feature key installed is longer than the maximum length allowed. Description Be sure that the key has been entered correctly and re-submit.
  • Page 213 Message Error 092: Not Allowed While Port Is Unblocked The port must be blocked to complete this request. Description Block the port and re-submit the command. Action Message Error 093: Not Allowed While FICON MS Is Installed This request cannot be completed because FICON Management Description Server is installed.
  • Page 214 Message Error 098: Chassis Serial Number is Zero No longer used. Description Informational Only. Action Message Error 099: Preferred Domain ID Cannot Be Zero This product cannot be configured to have a preferred domain ID Description equal to zero (0). Ensure that the ID is expressed as an integer in the range 1–31 and Action re-submit.
  • Page 215 Message Error 103: Port Diagnostic In Progress The request cannot be completed because a port diagnostic is Description running. Wait for the diagnostic to complete. Action Message Error 104: System Diagnostic In Progress The request cannot be completed because a system diagnostic is Description running.
  • Page 216 Message Error 108: Invalid TTA Type The type of the throughput threshold alert has not been set. Description Set the type of the TTA, then try to activate the alert. Action Message Error 109: Invalid CTA Type The type of the counter threshold alert has not been set. Description Set the type of the CTA, then try to activate the alert.
  • Page 217 Message Error 114: Invalid CLI Enabled State Internal error. Description Informational only. Action Message Error 115: Invalid Switch Speed The request cannot be completed because the switch is not capable of Description operating at the configured speed. Consult the installation/service manual to determine the speed Action capabilities of your product.
  • Page 218 Message Error 119: Switch Speed Not 2 Gb/sec This request cannot be completed because the switch speed has not Description been set to 2 Gb/s. The switch speed must be set to 2 Gb/s in order to accommodate a Action port speed of 2 Gb/s.
  • Page 219 Message Error 135: Invalid Number of Fabric Membership List Entries The number of fabric members submitted exceeds the maximum Description allowable entries of 31. The number of entries in the fabric membership list is limited to the Action total number of domain ID's available to the fabric. Make sure that the list (including the managed switch) contains no more than 31 entries.
  • Page 220 Message Error 139: Insistent Domain ID's Must Be Enabled When Fabric Binding Active The user attempted to disable insistent domain ID's while fabric Description binding was active. Insistent domain ID's must remain enabled while fabric binding is Action active. If fabric binding is set to inactive, the insistent domain ID state may be changed.
  • Page 221 RSCN state may be changed. It should be noted, however, that this can be disruptive to the fabric. Message Error 144: The SANtegrity Feature Has Not Been Installed The user attempted to activate a change to the fabric security Description configuration without first installing the SANtegrity feature key.
  • Page 222 Message Error 151: Invalid Open Systems Management Server State The request cannot be completed because the OSMS state submitted Description is invalid. The OSMS state may be set to either enable or disable. Action Message Error 152: Invalid FICON Management Server State The request cannot be completed because the FICON MS state Description submitted is invalid.
  • Page 223 port (or physically removing the device from the managed switch) to which this device is attached and resubmitting the request. Message Error 156: Cannot Complete While Switch is Online and Fabric Binding Active The switch must be offline and Fabric Binding must be inactive Description before this feature can be disabled.
  • Page 224 The management IP must be in the list or the current connection Action would be lost. Message Error 162: List is full There is no more room for new entries in the list. Description Remove a different entry and try again. Action Message Error 163: FICON MS feature key must be installed...
  • Page 225 Message Error 167: Diagnostics can not be run on inactive port The port is in the inactive state and diagnostics can't be run. Description The port state must change out of the inactive state. Action Message Error 168: Duplicate member in the list The member is already in the list.
  • Page 226 Message Error 173: Invalid value The value being entered is invalid. Description Enter a valid value. Action Message Error 174: Invalid list data The list data is invalid. Description Correct the list to make it a valid list. Action Message Error 175: Invalid list index The list data is invalid.
  • Page 227 Message Error 179: Insistent Domain IDs must be enabled To complete this command, Insistent Domain IDs must be enabled. Description Enabled Insistent Domain IDs. Action Message Error 180: Too many management interface users Only 25 management users can be added to the user database. Description Remove other management users in order to make room for a new Action...
  • Page 228 Message Error 185: Invalid Limit Value for this Fencing Policy Type The entered limit is invalid Description Enter a valid limit Action Message Error 186: Cannot Block this Port Port is not blockable Description Enter a valid port number Action Message Error 187: cannot beacon this port Cannot enable beaconing on this port...
  • Page 229 Message Error 191: max fencing policy definitions reached A new port fencing policy may not be defined without removing an Description existing port fencing policy from the list. A total of 14 policies may be defined for port fencing. A new policy Action can be added only after a current policy is removed;...
  • Page 230 Message Error 196: Cannot enable two policies of the same type that contain default scope Two policies of the same type cannot be enabled if both policies use Description the default ports. Only enable one policy that is using the default ports. Action Message Error 197: Port list contains no ports...
  • Page 231 Message Error 202: Invalid Change Authorization ID The switch will not accept a change request from this particular Description client. Be sure all parameters have been entered correctly and re-submit. Action Contact your service representative with further problems. Message Error 203: Another Client Has Change Authorization Another user is currently making changes to this switch.
  • Page 232 Message Error 210: Busy Processing Another Request A different switch in the Fabric was busy processing another request Description and could not complete the command. Be sure all parameters have been entered correctly and re-submit. Action Contact your service representative with continued problems. Message Error 211: Duplicate Zone Two or more zone names in the local zone set are identical.
  • Page 233 Message Error 215: Zone Set Size Exceeded The local work area zone set has outgrown the size limitations Description imposed by the Command Line Interface. Reduce the size of the zone set to meet requirements. This can be a Action reduction in the number of zones in the zone set, a reduction of members in a zone, or a reduction of zone name lengths.
  • Page 234 Message Error 220: Cannot Run Diagnostics While a Device is Logged into the Port Diagnostics cannot be run while a device is logged into the port. Description Block the port to run diagnostics. Action Message Error 221: Cannot Run Diagnostics on an Active E-Port Diagnostics cannot be run on an active E-Port.
  • Page 235 Enter only ASCII characters. Action Message Error 226: Argument Is Too Long One or more parameters are invalid for this command. Description For the appropriate parameters, see the section of the manual that Action corresponds to the attempted command. Parameters must be typed exactly to specification to be recognized correctly.
  • Page 236 For the appropriate parameters, see the section of the manual that Action corresponds to the attempted command. Parameters must be typed exactly to specification to be recognized correctly. Message Error 231: Invalid Port number The portNum parameter does not contain a valid value. Description For the appropriate parameters, see the section of the manual that Action...
  • Page 237 Message Error 235: Unrecognized Command The CLI does not recognize the command and cannot perform the Description help '?' command as requested. The entered command is misspelled or the prompt is not positioned Action at the right place in the CLI command tree for this command. For the appropriate syntax, see the section of the manual that corresponds to the attempted command.
  • Page 238 Message Error 240: Duplicate fabric binding member The user requested to add an entry to the fabric binding list that is Description already a member of the list. Verify that the correct entry (both WWN and Domain ID) is being Action requested for addition to the list and re-submit the request.
  • Page 239 Message Error 246: Invalid interval value The interval value specified is not between 5 and 70560 minutes. Description Make sure the increment value given is between 5 and 70560 minutes. Action Message Error 247: Invalid counter number The counter specified is not a valid number. Description Use the table output by the command Action...
  • Page 240 Message Error 251: The threshold alert must be disabled The counter threshold alert to be modified/deleted is already Description enabled. Disable the threshold alert and then try the command again. Action Message Error 253: Cannot Remove a Member Currently Interacting with the Fabric Current members of the fabric must be included in the Fabric Binding Description...
  • Page 241 Select a valid utilization percentage value. Action Message Error 258: Invalid duration value The duration value in minutes is out of range. Description Select a valid duration value. Action Message Error 259: Invalid threshold alert name The name of the threshold alert is incorrect. Description The threshold alert name does not exist.
  • Page 242 Message Error 263: The SANtegrity Authentication feature key is not installed The SANtegrity Authentication feature key is not installed. Description Install the SANtegrity Authentication feature key. Action Message Error 264: The Preferred Path feature key is not installed The preferred path feature key must be installed. Description Install the preferred path feature key.
  • Page 243 Message Error 269: Invalid retransmit attempts. Must be between 1 and 100 The desired retransmit attempt value is invalid Description Select a retransmit value between 1 and 100 Action Message Error 270: Invalid timeout value. Must be between 1 and 1000 The desired timeout value is invalid Description Select a timeout value between 1 and 10000...
  • Page 244 Message Error 275: Invalid authentication role The desired role is not a valid role Description Select a valid role. Valid roles are administrator, operator, or no role. Action Message Error 276: Invalid sequence authentication combination The desired sequence is not a valid sequence Description Select a valid sequence.
  • Page 245 Message Error 281: Zone does not exist The desired zone does not exist Description Select a valid zone name Action Message Error 282: Conflicting Domain ID for the specified WWN The desired Domain ID is already in use Description Select a different Domain ID Action Message Error 283: Conflicting WWN for the specified Domain ID...
  • Page 246 Select a value between 1 and 256. Action Message Error 287: Port is unaddressable The desired port cannot be configured because it is unadressable Description This operation is not supported. No action necessary. Action Message Error 288: The NPIV feature key must be installed. An attempt was to access feature was accessed that has not been Description installed...
  • Page 247 Select a different port number Action Message 293: Cannot modify users with default passwords No longer used. Description None. Action Message 294: Invalid RADIUS Index The specified RADIUS index is invalid. Description Enter a valid index; valid indexes are 1 to 3. Action Message 295: Invalid MIHPTO Value...
  • Page 248 Message 298: Cannot Delete the Last API User with Authentication Setting There must be at least one administrator with access to the API Description interface. No action, you cannot remove the user account. Action Message 299: CHAP Secret Not Defined The CHAP secret must be defined for Open Systems Management Description Server before enabling outgoing authentication.
  • Page 249 The preferred path is invalid; one reason may be that the Domain ID Description is the same as the local switch ID. Enter a valid preferred path and ensure the Domain ID is not the Action same as the local switch ID. Message 304: RADIUS Authentication Present.
  • Page 250 Message 308: Invalid Line Speed Combination. The Ethernet speed/duplex combination is invalid. Description Enter a valid Ethernet speed/duplex combination. Action Message Error 310: FICON Management Server must be enabled You cannot perform this operation until the FICON Management Description Server is enabled. Enable the FICON Management Server.
  • Page 251 Message Error 325: Invalid trigger end offset The trigger end offset value is invalid. Description Select a valid trigger end offset value. Action Message Error 326: Invalid trigger end bit pattern The trigger end bit pattern is invalid. Description Select a valid trigger end bit pattern. Action Message Error 327: Invalid trigger...
  • Page 252 Message Error 332: Unable to run a trace route at this time The trace route is unable to run. Description Wait a little while and run the trace route again. Action Message Error 333: Invalid Port ID The Port ID is invalid. Description Enter a valid Port ID.
  • Page 253 Message Error 341: Invalid SNMPv3 authentication protocol The authentication protocol is invalid. Description Select a valid authentication protocol. Action Message Error 342: Invalid SNMPv3 authentication key The authentication key is invalid. Description Select a valid authentication key. Action Message Error 343: Invalid SNMPv3 privacy protocol The privacy protocol is invalid.
  • Page 254 Message Error 347: Invalid SNMPv3 UDP port number The UDP Port number is invalid. Description Select a valid UDP port number. Action Message Error 348: Invalid SNMPv3 community name The community name is invalid. Description Enter a valid community name. Action Message Error 349: Invalid SNMPv3 MP model...
  • Page 255 Message Error 353: Invalid SNMPv3 security level The security level is invalid. Description Enter a valid security level. Action Message Error 354: Invalid SNMPv3 access table index The access table index is invalid. Description Enter a valid index. Action Message Error 360: The number of days for key generation is out of range.
  • Page 256 Message Error 364: SNMPv3 group name conflict The group name, security name, security model combination must be Description unique. Enter a valid group name, security name, and security model Action combination. Message Error 367: Invalid SNMPv3 access group name The access group name is invalid. Description Enter a valid access group name.
  • Page 257 Message Error 376: The Local Switch WWN or DID conflicts with another member There is a member in the FBML that has the same WWN or DID as Description the local switch. Remove the conflicting entry and then add the local switch to the list. Action Message Error 377: HA Mode cannot be turned off with both Power Supply...
  • Page 258 EFCM Basic User Manual A-64...
  • Page 259 Glossary This glossary includes terms and definitions from: • American National Standard Dictionary for Information Systems (ANSI X3.172-1990), copyright 1990 by the American National Standards Institute (ANSI). Copies can be purchased from the American National Standards Institute, 25 West 42nd Street, New York, NY 10036.
  • Page 260 Glossary The ability and means necessary to store data in, to retrieve data access from, to transfer data into, to communicate with, or to make use of any resource of a storage device, a system, or area such as random access memory (RAM) or a register.
  • Page 261 Glossary (1) A notification of an abnormal condition within a system that alarm provides an indication of the location or nature of the abnormality to either a local or remote alarm indicator. (2) A simple network management protocol (SNMP) message notifying an operator of a network or device problem.
  • Page 262 Glossary without the need for a separate switched fabric. See also point-to-point. AL_PA. A 1-byte value used in the arbitrated loop topology that arbitrated loop identifies loop ports (L_Ports). This value then becomes the last byte physical address of the address identified for each public L_Port on the loop. Process of selecting one device from a collection of devices that arbitration request service simultaneously.
  • Page 263 Glossary backup field-replaceable unit. backup FRU buffer-to-buffer credit. BB_Credit Use of light-emitting diodes (LEDs) on ports, port cards, beaconing field-replaceable units (FRUs), and directors to aid in the fault-isolation process. When enabled, active beaconing will cause LEDs to flash in order for the user to locate field-replaceable units (FRU’s), switches, or directors in cabinets or computer rooms.
  • Page 264 Glossary frames a port can transmit without receiving a receive ready signal from the receiving device. BB_Credit can be adjustable to provide different levels of compensation. The path that carries data between the computer (microprocessor) and peripheral devices. An IDE interface cable and a small computer system interface (SCSI) cable are both examples.
  • Page 265 Glossary CHP. A single interface between a central processor and one or more channel path control units, along which signals and data are sent to perform I/O requests (D). CHPID. In a channel subsystem, a value assigned to each channel channel path path of the system that uniquely identifies the path (D).
  • Page 266 Glossary A node that requests network services from a server. Typically the client node is a personal computer (PC). Architectural model that functionally divides that execution of a unit client/server of work between activities initiated by an end user or program computing (client) and those maintaining data (servers).
  • Page 267 Glossary Firmware is upgraded without disrupting switch operation. concurrent firmware upgrade The collection of data that results from configuring product and configuration data system operating parameters. For example, configuring operating parameters, simple network management protocol (SNMP) agent, zoning configurations, and port configurations through the Element Manager application, results in a collection of configuration data.
  • Page 268 Glossary technical support. customer support Synonym for A collection of servers and data storage devices, usually in one data center location, administered by an information technology/information services (IT/IS) manager. Pertaining to an attribute, value, or option that is assumed by a default system when none is explicitly specified (D, I).
  • Page 269 Glossary between nodes in accordance with the address information present in the frame headers of those transmissions. Domain name system or domain name service. Host or node name DNS name for a device or managed product that is translated to an Internet protocol (IP) address through a domain name server.
  • Page 270 Glossary DRAM. Random access memory that resides in a cell comprised of a dynamic random capacitor and transistor. DRAM data deteriorates (that is, is dynamic) access memory unless the capacitor is periodically recharged by the controlling microprocessor. DRAM is slow, but relatively inexpensive (D). static random access memory.
  • Page 271 Glossary product instance is opened from your SAN management application, the corresponding Element Manager application is invoked. electronic mail. e-mail EAF. A backup field-replaceable unit (backup FRU) that is ordered enhanced availability and installed to provide redundancy and reduce disruption in case of feature failure.
  • Page 272 Glossary Enterprise Systems Architecture. ESA™ Enterprise Systems Connection. ESCON™ A widely implemented local area network (LAN) protocol that uses a Ethernet bus or star topology and serves as the basis for the Institute of Electrical and Electronics Engineers (IEEE) 802.3 standard, which specifies the physical and software layers.
  • Page 273 Glossary A feature that enables a switch or director to communicate only with fabric binding fabrics that are included in the Fabric Binding Member list (FBML). Fabric Binding is available only if the SANtegrity Binding feature is installed. A list of fabric members used in fabric binding. See active FBML Fabric Binding pending...
  • Page 274 Glossary Fibre Channel adapter. See host bus adapter. FC adapter Federal Communications Commission. Fibre Channel Industry Association. FCIA Fibre Channel IP address. FC IP A unique key to enable additional product features. This key is feature key entered into the Configure Feature Key dialog box in the Element Manager application to activate optional hardware and software features.
  • Page 275 Glossary FC-AL. A high-speed (100 Mbps) connection which is a true loop Fibre Channel technology where ports use arbitration to establish a point-to-point arbitrated loop circuit. Data can be transferred in both directions simultaneously, achieving a nominal transfer rate between two devices of 200 Mbps. FCA.
  • Page 276 Glossary An optional feature that can be enabled on the director or switch or FICON Management switch through the Element Manager application. When enabled, Server host control and management of the director or switch or switch is provided through an S/390 Parallel Enterprise or 2/Series Server attached to a director or switch or switch port.
  • Page 277 Glossary Acronym for gigabits per second. Gbps G_Port. Physical interface on a director or switch that can function generic port either as a fabric port (F_Port) or an expansion port (E_Port), depending on the port type to which it connects. See also expansion port;...
  • Page 278 Glossary A fabric containing open-fabric-compliant products from various heterogeneous fabric vendors. Contrast with homogeneous fabric. A numbering system with base of sixteen; valid numbers use the hexadecimal digits 0 through 9 and characters A through F, where A represents 10 and F represents 15 (D).
  • Page 279 Glossary completely different physical location. Commonly used on the world wide web for navigation, reference, and depth where published text will not suffice. HTTP. A simple protocol that allows world wide web pages to be hypertext transport transferred quickly between web browsers and servers. protocol See Hertz.
  • Page 280 Glossary IT. The broad subject concerned with all aspects of managing and information processing information, especially within a large organization or technology company. Because computers are central to information management, computer departments within companies and universities are often called IT departments. See also information services.
  • Page 281 Glossary IP. Network layer for the transmission control protocol/Internet Internet protocol protocol (TCP/IP) protocol used on Ethernet networks. IP provides packet routing, fragmentation, and reassembly through the data link layer (D). IP address. Unique string of numbers (in the format xxx.xxx.xxx.xxx) Internet protocol that identifies a device on a network.
  • Page 282 Glossary Isolated E_Port. See segmented expansion port. isolated expansion port information technology. See kilobit. See kilobyte. Kb. A unit of measure for data storage, equaling 1,024 bits, or two to kilobit the tenth power. Kilobits are generally approximated as being one thousand bits.
  • Page 283 Glossary field-replaceable units (FRUs) and the front bezel to provide visual indications of hardware status or malfunctions. link incident. Physical connection between two devices on a switched fabric. A link link consists of two conductors, one used for sending and the other for receiving, thereby providing a duplex communication path.
  • Page 284 Glossary In a fiber optic environment, a type of duplex connector used to wrap loopback plug the optical output signal of a device directly to the optical input. protective plug. Synonymous with wrap plug. Contrast with Test that checks attachment or control unit circuitry, without loopback test checking the mechanism itself, by returning the output of the mechanism as input.
  • Page 285 Glossary Hardware product that can be managed with the Element Manager managed product application. Directors and switches are managed products. See also device. MIB. Related set of software objects (variables) containing management information about a managed device and accessed via simple information base network management protocol (SNMP) from a network management station.
  • Page 286 Glossary Modem is an abbreviation for modulator/demodulator. A modem communication device that converts digital computer data to signals and signals to computer data. These signals can be received or transmitted by the modem via a phone line or other method of telecommunication.
  • Page 287 Glossary NAS. Storage connected directly to the network, through a processor network-attached and its own operating system. Lacks the processor power to run storage centralized, shared applications. The broad subject of managing computer networks. There exists a network management wide variety of software and hardware products that help network system administrators manage a network.
  • Page 288 Glossary original equipment manufacturer. Referring to data stored on a medium, such as tape or even paper, offline that is not available immediately to the user. Diagnostics that only operate in stand alone mode. User operations offline diagnostics cannot take place with offline diagnostics running. OLS.
  • Page 289 Glossary System Interconnection (OSI) device attached to a director or switch port. OpenTrunking is a licensed optional feature that enables load OpenTrunking balancing of traffic flows. OpenTrunking monitors the average speed of data traffic through a flow. In the event of traffic congestion, or if traffic on an ISL is disproportionate, a traffic flow is rerouted to a less congested ISL.
  • Page 290 Glossary data, and a trailer (which contains the error checking function, usually in the form of a cyclic redundancy check), and frequently user data. A logical component of the interface window. Typically, a heading panel and/or frame marks the panel as an individual entity of the window. Size and shape of the panel and its data depend upon the purpose of the panel and may or may not be modified.
  • Page 291 Glossary Field-replaceable hardware component that provides the port port card connections for fiber cables and performs specific device-dependent logic functions. Map showing port numbers and port card slot numbers inside a port card map hardware cabinet. Name that the user assigns to a particular port through the Element port name Manager application.
  • Page 292 Glossary standardized architectures, which allow them to mix and match products from different manufacturers. In a fiber-optic environment, a type of duplex connector (or cover) protective plug that provides physical protection (D). Contrast with loopback plug. (1) Set of semantic and syntactic rules that determines the behavior of protocol functional units in achieving communication.
  • Page 293 Glossary resource allocation time-out value. R_A_TOV ROM. An information storage chip with permanent memory. Stored read-only memory information cannot be changed or deleted except under special circumstances (D). Contrast with random access memory. Performance characteristic of a system or product whose integral redundancy components are backed up by identical components to which operations will automatically failover in the event of a component...
  • Page 294 Glossary SANavigator management software provides easy, centralized SANavigator management of a SAN and quick access to all device configuration applications. The computer that is hosting the SANavigator application. Multiple SANavigator Server client systems can log into the Server to utilize the application. serial crossbar assembly.
  • Page 295 Glossary If a director or switch is in shared mode, all devices on the loop share shared mode the 100 MB bandwidth available on the loop. In shared mode, only one end device can communicate with another device through the fabric loop port (FL_Port) on the director or switch.
  • Page 296 Glossary A narrow SCSI adapter supports up to eight devices, including itself. SCSI address 7 has the highest priority followed by 6, 5, 4, 3, 2, 1, 0, with 0 being the lowest priority. simple network management protocol. SNMP simple network management protocol community.
  • Page 297 Glossary A mask used by a computer to determine whether another computer subnet mask with which it needs to communicate is located on a local or remote network. The network mask depends upon the class of networks to which the computer is connecting. The mask indicates which digits to look at in a longer network address and allows the router to avoid handling the entire address.
  • Page 298 Glossary SSP. In a director or switch, the central controlling processor. system services Controls the RS-232 maintenance port and the Ethernet port of a Fibre processor Channel director or switch. See terabyte. transmission control protocol. transmission control protocol/Internet protocol. TCP/IP Single point of contact for a customer when assistance is needed in technical support managing or troubleshooting a product.
  • Page 299 Glossary bits) circulates on the ring to allow devices to access the LAN for data transmission (D). See also ring topology. TKRG. The circuit card that provides a port to connect a director or token ring controller switch to a 4/16 Mbps token ring local area network (LAN) (D). adapter card Logical and/or physical arrangement of stations on a network.
  • Page 300 Glossary Underwriters Laboratories. In a director or switch, the absence of the blocked attribute for a unblocked specific port. Contrast with blocked connection. See connectivity connection attribute. See also dynamic connection; dynamic connectivity. Devices communicating with an unblocked port can log into the unblocked port director or switch and communicate with devices attached to any other unblocked port (assuming that this is supported by the current...
  • Page 301 Glossary way to send and receive datagrams over an IP network. UDP/IP is primarily used for broadcasting messages over an entire network. transmission control protocol/Internet protocol. Contrast with VPD. System-level data stored by field-replaceable units (FRUs) in vital product data the electrically erasable programmable read-only memory.
  • Page 302 Glossary WWN. Eight-byte string that uniquely identifies a Fibre Channel world wide names entity (that is, a port, a node, a switch, a fabric), even on global networks. loopback plug. wrap plug Synonym for A test that checks attachment or control unit circuitry, without wrap test checking the mechanism itself, by returning the output of the mechanism as input.
  • Page 303 Glossary may be configured into one or more zones. See also access control; zone. g-45...
  • Page 304 Glossary g-46 EFCM Basic User Manual...
  • Page 305 Index blocking a port Symbols blocking ports 3-12 browser logging in browser level required activating beaconing zone sets 4-17 class of service 2-14 active domain ID 2-12 active zone set, description 4-10 enable and disable 3-19, 3-33 address codes, error event IP, see IP address command line interface 3-19...
  • Page 306 Index server or storage device domain ID server-level active 2-12 conventions used in manual insistent 2-12, 3-11, 5-24 conventions, naming numbers 2-14 preferred 2-12, 3-13 cost configuration, ISL FSPF 3-13 unique 3-13 counter 2-15 zoning CTP dump file changes and consequences domain RSCN 2-13 enable...
  • Page 307 Index features and parameters enabled by 5-22 position 2-11 error serial number 2-11 event codes status 2-11 statistics 2-18 FRU List 2-11 Error Detection Time Out Value 2-13 FSPF cost configuration 3-13 event codes full volatility feature, installing external loopback test FX_Port 2-7, F_Port 2-7, G_Port 2-7,...
  • Page 308 Index defining 3-15 switch binding 5-23, 5-29 introduction to EFCM Basic menu configure IP address 3-2, 3-17 merging product zoned fabrics 4-11 setting 3-17 merging zoned fabrics 4-11 mode limit fabric RSCNs 3-12 interop ISL FSPF cost configuration 3-13 defining 3-15 McDATA Fabric 1.0 2-13...
  • Page 309 Index operating speed port binding operating state reason zoning operational state port fencing 3-30 port list Port List page port properties position, FRU 2-11 organization of manual preferred domain ID 2-12, 3-13 OSI standards preferred path 3-28 OSMS priority enable and disable 3-20 switch 3-15...
  • Page 310 Index RSCN 3-11 switch domain 2-13 setting 3-13 enable 3-12 limited fabric 3-12 enable and disable 3-20 suppress 2-13 3-20 suppress after IPL 3-12 3-21 suppress on zoning change 3-12 configure 3-22 suppress zone set activation messages 3-12 starting EFCM Basic RSCNs starting to use EFCM Basic domain...
  • Page 311 Index time fields 3-10 trademarks xviii zone trap message recipients 3-18 definition trap recipient 3-18, 3-19 overview type zone FlexPars 3-12 port 2-6, zone members defining definition type number, product interoperability mode maximum number port numbers types UDP port number 3-18, 3-19 WWNs unblocking a port...
  • Page 312 Index EFCM Basic User Manual...

Table of Contents