Download Print this page

HP Brocade 8/12c User Manual

Brocade network advisor san user manual v11.1x (53-1002167-01, may 2011).
Hide thumbs
   
1
2
Table of Contents
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990

Advertisement

53-1002167-01
®
13 May 2011
Brocade Network Advisor
SAN User Manual
Supporting Network Advisor 11.1.X

Advertisement

Troubleshooting

   Related Manuals for HP Brocade 8/12c

   Summary of Contents for HP Brocade 8/12c

  • Page 1

    53-1002167-01 ® 13 May 2011 Brocade Network Advisor SAN User Manual Supporting Network Advisor 11.1.X...

  • Page 2: Document History

    Copyright © 2010 - 2011 Brocade Communications Systems, Inc. All Rights Reserved. Brocade, the B-wing symbol, BigIron, DCX, Fabric OS, FastIron, IronPoint, IronShield, IronView, IronWare, JetCore, NetIron, SecureIron, ServerIron, StorageX, and TurboIron are registered trademarks, and DCFM, Extraordinary Networks, and SAN Health are trademarks of Brocade Communications Systems, Inc., in the United States and/or in other countries.

  • Page 3: Table Of Contents

    Contents Contents About This Document In this chapter ......... . xxxv How this document is organized .

  • Page 4: Table Of Contents

    Management server and client ......22 Logging into a server ........27 Launching a remote client.

  • Page 5: Table Of Contents

    Seed switch requirements ......63 Seed switch failover........64 Changing the seed switch .

  • Page 6: Table Of Contents

    Enabling SAN Ethernet loss events ..... . 94 Disabling SAN Ethernet loss events ..... . 94 Event storage.

  • Page 7: Table Of Contents

    Disabling fabric tracking ......131 Accepting changes for a fabric ......131 Accepting changes for all fabrics .

  • Page 8: Table Of Contents

    LDAP authorization ........154 Loading an Active Directory group .

  • Page 9: Table Of Contents

    Deleting a customized view .......179 Copying a view ......... .179 SAN topology layout .

  • Page 10: Table Of Contents

    Adding an option to the Tools menu ......204 Changing an option on the Tools menu ..... .206 Removing an option from the Tools menu.

  • Page 11: Table Of Contents

    Launching the SMIA configuration tool on Unix ...231 Launching a remote SMIA configuration tool....232 Service Location Protocol (SLP) support ....232 Home tab .

  • Page 12: Table Of Contents

    Disabling a port ........273 Filtering port connectivity .

  • Page 13: Table Of Contents

    Importing storage port mapping ......304 Exporting storage port mapping......305 Chapter 13 Host management In this chapter .

  • Page 14: Table Of Contents

    Chapter 14 Fibre Channel over Ethernet In this chapter ......... .333 FCoE overview .

  • Page 15: Table Of Contents

    LLDP-DCBX configuration ....... . .366 Configuring LLDP for FCoE ......366 Adding an LLDP profile .

  • Page 16: Table Of Contents

    Configuring routing domain IDs ......412 Chapter 17 Virtual Fabrics In this chapter ......... .413 Virtual Fabrics overview .

  • Page 17: Table Of Contents

    Steps for connecting to an LKM appliance ....448 Launching the NetApp DataFort Management Console ..448 Establishing the trusted link ......448 Obtaining and importing the LKM certificate.

  • Page 18: Table Of Contents

    Replacing an encryption engine in an encryption group ..509 Creating high availability (HA) clusters ..... . 510 Removing engines from an HA cluster .

  • Page 19: Table Of Contents

    Viewing and editing switch encryption properties ... . .561 Exporting the public key certificate signing request (CSR) from Properties ......... .563 Importing a signed public key certificate from Properties .

  • Page 20: Table Of Contents

    Configuring zoning for the SAN ......583 Creating a new zone ....... . .584 Viewing zone properties .

  • Page 21: Table Of Contents

    Zoning administration........612 Comparing zone databases......612 Managing zone configuration comparison alerts .

  • Page 22: Table Of Contents

    QOS, DSCP, and VLANs ........642 DSCP quality of service .......642 VLANs and layer two quality of service .

  • Page 23: Table Of Contents

    Troubleshooting FCIP Ethernet connections ....670 Chapter 21 Fabric Binding In this chapter ......... . 671 Fabric binding overview .

  • Page 24: Table Of Contents

    Adding a C3 Discard Frames threshold ....683 Adding an Invalid CRCs threshold..... . .685 Adding an Invalid Words threshold .

  • Page 25: Table Of Contents

    Creating a port group ....... .720 Viewing port groups ........722 Editing a port group .

  • Page 26: Table Of Contents

    Tracing FC routes ........750 Troubleshooting device connectivity.....751 Confirming Fabric Device Sharing.

  • Page 27: Table Of Contents

    SAN End-to-end monitoring .......793 Configuring an end-to-end monitor pair ....793 Displaying end-to-end monitor pairs in a real-time graph .

  • Page 28: Table Of Contents

    Chapter 29 Policy Monitor In this chapter ......... .823 Policy Monitor overview .

  • Page 29: Table Of Contents

    Event action definitions ........867 Creating an event action definition..... .867 Configuring varbind filters .

  • Page 30: Table Of Contents

    E-mailing selected event details from the Master Log ..905 Displaying event details from the Master Log ... . .906 Copying part of the Master Log......907 Copying the entire Master Log .

  • Page 31: Table Of Contents

    SAN shortcut menus ........941 Appendix B Call Home Event Tables In this appendix .

  • Page 32: Table Of Contents

    Database tables and fields .......991 Advanced Call Home ....... . .991 Capability .

  • Page 33: Table Of Contents

    Views ..........1144 BOOT_IMAGE_FILE_DETAILS_INFO .

  • Page 34

    SNMP_DATA_INFO ....... . . 1235 SNMP_EXPR_DATA_INFO......1236 SNMP_DATA_VIEW .

  • Page 35: About This Document, How This Document Is Organized

    About This Document In this chapter • How this document is organized ....... . . xxxv •...

  • Page 36

    • Chapter 13, “Host management,” provides information on how to configure an HBA. • Chapter 14, “Fibre Channel over Ethernet,”provides information on how to configure an FCoE. • Chapter 15, “Security Management,” provides security configuration instructions. • Chapter 16, “FC-FC Routing Service Management,” provides information on how to manage Fibre Channel Routing.

  • Page 37: Supported Hardware And Software

    Supported hardware and software In those instances in which procedures or parts of procedures documented here apply to some devices but not to others, this guide identifies exactly which devices are supported and which are not. Although many different software and hardware configurations are tested and supported by Brocade Communications Systems, Inc.

  • Page 38

    TABLE 1 Fabric OS Supported Hardware (Continued) Device Name Terminology used in documentation Firmware level required Brocade 5480 embedded switch Embedded 24-port, 8 Gbps Switch Fabric OS v6.1.0 or later Brocade 6510 48-port, 16 Gbpsswitch Fabric OS v7.0.0 or later Brocade 7500 Extension switch 4 Gbps Router, Extension Switch Fabric OS v5.1.0 or later...

  • Page 39

    TABLE 1 Fabric OS Supported Hardware (Continued) Device Name Terminology used in documentation Firmware level required Brocade DCX-4S 192-port Backbone Chassis Fabric OS v6.0.0 or later Brocade DCX-4S with FC8-16, FC8-32, and 192-port Backbone Chassis with 8 Gbps Fabric OS v6.2.0 FC8-48 Blades 16-FC port, 8 Gbps 32-FC port, and 8 Gbps 48-FC port blades...

  • Page 40

    What’s new in this document The following changes have been made since this document was last released: • Information that was added: • Host adapter discovery • VM Manager discovery • Performance Data Aging tab to SMC • Port Auto Disable dialog box •...

  • Page 41: Document Conventions, Key Terms

    Document conventions This section describes text formatting conventions and important notice formats used in this document. Text formatting The narrative-text formatting conventions that are used are as follows: bold text Identifies command names Identifies the names of user-manipulated GUI elements Identifies keywords and operands Identifies text to enter at the GUI or CLI italic text...

  • Page 42: Additional Information

    Notice to the reader This document may contain references to the trademarks of the following corporations. These trademarks are the properties of their respective companies and corporations. These references are made for informational purposes only. Corporation Referenced Trademarks and Products Linus Torvalds Linux Microsoft Corporation...

  • Page 43

    Other industry resources For additional resource information, visit the Technical Committee T11 website. This website provides interface standards for high-performance and mass storage applications for Fibre Channel, storage management, and other applications: http://www.t11.org For information about the Fibre Channel industry, visit the Fibre Channel Industry Association website: http://www.fibrechannel.org Getting technical help...

  • Page 44: Document Feedback

    • Brocade 7600—On the bottom of the chassis • Brocade 48000—Inside the chassis next to the power supply bays • Brocade DCX and DCX-4S—On the bottom right on the port side of the chassis 4. World Wide Name (WWN) Use the wwn command to display the switch WWN. If you cannot use the wwn command because the switch is inoperable, you can get the WWN from the same place as the serial number, except for the Brocade DCX.

  • Page 45: In This Chapter, User Interface Components

    Chapter Getting Started In this chapter • User interface components ........1 •...

  • Page 46

    User interface components FIGURE 1 Main window 1. Menu bar. Lists commands you can perform on the Management application. The available commands vary depending on which tab (SAN or Dashboard) you select. For a list of available commands, refer to Appendix A, “Application menus”.

  • Page 47: Dashboard Tab

    User interface components Dashboard tab NOTE Only devices in your area of responsibility (AOR) display in the dashboard. The Dashboard tab provides a high-level overview of the network and the current states of managed devices. This allows you to easily check the status of the devices on the network. The dashboard also provides several features to help you quickly access reports, device configuration, and system logs.

  • Page 48: Menu Bar

    User interface components 5. Widgets. Displays operational status, inventory status, event summary, and overall network/fabric status. 6. Status bar. Displays the connection, port, product, fabric, special event, call home, and backup status, as well as Server and User data. Menu bar The menu bar is located at the top of the main window.

  • Page 49

    User interface components Widgets The Dashboard contains four widgets which can be shown or hidden, resized, collapsed or expanded, as well as maximized or minimized; however you cannot detach a widget. The status and inventory widget colors are defined in “Event type color codes”...

  • Page 50

    User interface components 2. SAN Inventory. Displays the SAN products inventory as stacked bar graphs. Displays each group as a separate bar on the graph. Displays the current state of all products discovered for a group in various colors on each bar. Displays the color legend below the y-axis. Displays tooltips on mouse-over to show the number of devices in that state.

  • Page 51

    User interface components Events widget customization • Range list—Select to display event information for a specific duration. To change the duration, select one of the following from the list. This Hour—Displays event information for the current hour beginning when the ...

  • Page 52

    User interface components • Export. To take a snapshot (.png) of the dashboard, complete the following steps. a. Click Export. b. Browse to the location where you want to save the snapshot. Enter a name for the snapshot in the File Name field. d.

  • Page 53

    User interface components FIGURE 5 Main window - SAN tab 1. Menu bar. Lists commands you can perform on the SAN tab. For a list of SAN tab menu commands, refer to “SAN main menus” on page 932. 2. Main toolbar. Provides buttons that enable quick access to dialog boxes and functions. For a list of available commands, refer to “Main toolbar”...

  • Page 54

    User interface components 11. Utilization Legend. (Trial and Licensed version only) Indicates the percentage ranges represented by the colored, dashed lines on the Connectivity Map. Only displays when you select Monitor > Performance > View Utilization or click the Utilization icon on the toolbar. 12.

  • Page 55: Port Display Buttons

    User interface components View All list The View All list is located at the top left side of the window and enables you to create, copy, or edit a view, select to how to view the Product list (All Levels, Products and Ports, Products Only, or Ports Only) and to select which view you want to display in the main window.

  • Page 56: Product List

    User interface components Connectivity Map toolbar The Connectivity Map toolbar is located at the top right side of the View window and provides tools to export the topology, to zoom in and out of the Connectivity Map, collapse and expand groups, and fit the topology to the window.

  • Page 57

    User interface components • Domain ID. Displays the Domain ID for the product in the format xx(yy), where xx is the normalized value and yy is the actual value on the wire. • FC Address. Displays the Fibre Channel address of the port. •...

  • Page 58: Master Log

    User interface components FIGURE 9 Connectivity Map The Management application displays all discovered fabrics in the Connectivity Map by default. To display a discovered Host in the Connectivity Map, you must select the Host in the Product List. You can only view one Host and physical and logical connections at a time. Master Log The Master Log, which displays in the lower left area of the main window, lists the events and alerts that have occurred on the SAN.

  • Page 59: Utilization Legend

    User interface components • Node WWN. The world wide name of the node on which the event occurred. • Fabric Name. The name of the fabric on which the event occurred. • Operational Status. The operational status (such as, unknown, healthy, marginal, or down) of the product on which the event occurred.

  • Page 60: Status Bar

    User interface components Use the Minimap to view the entire SAN and to navigate more detailed map views. This feature is especially useful if you have a large SAN. Does not display until you discover a fabric. FIGURE 11 Minimap Anchoring or floating the Minimap You can anchor or float the Minimap to customize your main window.

  • Page 61: Icon Legend, San Product Icons

    Icon legend 3. Product Status. Displays the status of the most degraded device in the SAN. For example, if all devices are operational except one (which is degraded), the Product Status displays as degraded. Click this icon to open the Product Status Log. 4.

  • Page 62: Host Product Icons

    Icon legend Icon Description Icon Description Fabric Fabric OS Switch and Blade Switch Fabric OS Director Fabric OS CEE Switch Fabric OS Router Storage Fabric OS FC Switch in Access Gateway Fabric OS FC Switch in Access Gateway mode (single-fabric connected) mode (multiple-fabric connected) Fabric OS CEE Switch in Access Gateway Fabric OS CEE Switch in Access Gateway...

  • Page 63: San Group Icons, Host Group Icons, San Port Icons

    Icon legend SAN group icons The following table lists the manageable SAN product group icons that display on the topology. Icon Description Icon Description Switch Group Host Group Storage Group Unknown Fabric Group Unmanaged Fabric Group Chassis Group Host group icons The following table lists the manageable Host product group icons that display on the topology.

  • Page 64: San Product Status Icons

    Icon legend SAN product status icons The following table lists the product status icons that display on the topology. Icon Status No icon Healthy/Operational Attention Bottleneck Degraded/Marginal Device Added Device Removed/Missing Down/Failed Routed In Routed Out Unknown/Link Down Unreachable Brocade Network Advisor SAN User Manual 53-1002167-01...

  • Page 65: Event Icons

    Icon legend Event icons The following table lists the event icons that display on the topology and Master Log. For more information about events, refer to “Fault Management” on page 843. Event Icon Description Emergency Alert Critical Error Warning Notice Informational Debug Brocade Network Advisor SAN User Manual...

  • Page 66: Management Server And Client

    Management server and client Management server and client The Management application has two parts: the Server and the Client. The Server is installed on one machine and stores device-related information; it does not have a user interface. To view information through a user interface, you must log in to the Server through a Client. The Server and Clients may reside on the same machine, or on separate machines.

  • Page 67

    Management server and client TABLE 4 Professional edition ports (Continued) Port Number Ports Transport Description Communication Path Open in Firewall 24602 jboss.connector.bisocket.port - port 2 Bisocket connector port Client–Server 24603 jboss.connector.bisocket.secondary.port Bisocket connector secondary Client–Server - port 3 port 24604 jboss.naming.rmi.port - port 4 RMI naming service port Client–Server...

  • Page 68

    Management server and client TABLE 5 Trial and Licensed version ports (Continued) Port Number Ports Transport Description Communication Path Open in Firewall TACACS+ Authentication port TACACS+ server port for Server–TACACS+ authentication if TACACS+ is Server chosen as an external authentication jboss.web.http.port Non-SSL HTTP/1.1 connector Client–Server...

  • Page 69

    Management server and client TABLE 5 Trial and Licensed version ports (Continued) Port Number Ports Transport Description Communication Path Open in Firewall 24604 jboss.connector.sslbisocket.port - port 4 SSL Bisocket connector port Client–Server 24605 jboss.connector.sslbisocket.secondary.p SSL Bisocket connector Client–Server ort - port 5 secondary port 24606 smp.registry.port - port 6...

  • Page 70

    Management server and client TABLE 5 Trial and Licensed version ports (Continued) Port Number Ports Transport Description Communication Path Open in Firewall 55556 Launch in Context (LIC) client hand Client port used to check if a Client shaking port Management application client opened using LIC is running on the same host NOTE: If this port is in use, the...

  • Page 71: Logging Into A Server, Launching A Remote Client

    Management server and client Logging into a server You must log into a server to monitor your network. NOTE You must have an established user account on the server to log in. To log into a server, complete the following steps. 1.

  • Page 72: Clearing Previous Versions Of The Remote Client, Launching The Configuration Wizard

    Management server and client 5. Click Login. 6. Click OK on the Login Banner dialog box. The Management application displays. Clearing previous versions of the remote client The remote client link in the Start menu does not automatically upgrade when you upgrade the Management application.

  • Page 73

    Management server and client 4. Select Internal FTP Server or External FTP Server on the FTP Server screen and click Next. If port 21 is busy, a message displays. Click OK to close the message and continue. Once the Management application is configured make sure port 21 is free and restart the Server to start the FTP service.

  • Page 74

    Management server and client b. Select an address from the Switch - Server IP Configuration Preferred Address list. If DNS is not configured for your network, do not select the ‘hostname’ option from either the Server IP Configuration or Switch - Server IP Configuration Preferred Address list. Selecting the ‘hostname’...

  • Page 75

    Management server and client Click Next. If you enter a syslog port number already in use, a message displays. Click No on the message to remain on the Server Configuration screen and edit the syslog port number (return to step 6a). Click Yes to close the message and continue with step 7. If you enter a port number already in use, a Warning displays next to the associated port number field.

  • Page 76: Changing The Database User Password

    Management server and client The defaults are Administrator and password, respectively. If you migrated from a previous release, your user name and password do not change. 12. Click Login. 13. Click OK on the Login Banner. Changing the database user password To change the read/write or read only database password, complete the following steps in the Install_Home/bin directory.

  • Page 77: Viewing Active Sessions, Disconnecting Users

    Management server and client Viewing active sessions To view the Management application active sessions, complete the following steps. 1. Select Server > Active Sessions. The Active Sessions dialog box displays (Figure 19). FIGURE 18 Active Sessions dialog box 2. Review the active session information. The following information displays: •...

  • Page 78: Viewing Server Properties, Viewing Port Status

    Management server and client Viewing server properties To view the Management application server properties, complete the following steps. 1. Select Server > Server Properties. The Server Properties dialog box displays. FIGURE 19 Server Properties dialog box 2. Click Close. Viewing port status You can view the port status for the following ports: FTP, SNMP, Syslog, and Web Server.

  • Page 79: Supported Open Source Software Products

    Supported open source software products Supported open source software products Table 6 lists the open source software third-party software products used in this release. TABLE 6 Supported Open Source Software Third-party Software Products Open Source Software License Type 7-ZipLZMASDK 4.65 public domain Abator 1.1 Apache License v2.0...

  • Page 80

    Supported open source software products TABLE 6 Supported Open Source Software Third-party Software Products (Continued) Open Source Software License Type dom4j 1.6.1 dom4j License EnterpriseDTFTP 1.5.6 LGPL GlazedLists 1.8.0 LGPL or MPL GoogleGuice 1.0 Apache HPInsightSoftwareVCEMWebClientSDK 6.2 HP SOFTWARE DEVELOPMENT KIT LICENSE AGREEMENT HornetQ 2.0.0 Apache License v2.0...

  • Page 81

    Supported open source software products TABLE 6 Supported Open Source Software Third-party Software Products (Continued) Open Source Software License Type OpenSAML 2.3.0 Apache License v2.0 OpenSSLforLinux 1.0.0a OpenSSL License PostgreSQL 8.4.3 PostgreSQL License QualityFirstLibrary 0.99.0 Mozilla License V1.1 and qflib License Quartz Enterprise Job Scheduler 1.66 Apache License v2.0 RockSawRawSocketLibrary 1.0.0...

  • Page 82: San Feature-to-firmware Requirements

    SAN feature-to-firmware requirements SAN feature-to-firmware requirements Use the following table to determine whether the Management application SAN features are only available with a specific version of the Fabric OS firmware, M-EOS firmware, or both, as well as if there are specific licensing requirements. Feature Fabric OS M-EOS...

  • Page 83

    SAN feature-to-firmware requirements Feature Fabric OS M-EOS Meta SAN Requires Fabric OS 5.2 or later for FC router and Not available. router domain ID configuration. Requires Fabric OS 6.0 or later in a mixed Fabric OS and M-EOS fabric. Requires Integrated Routing license. Performance Requires Fabric OS 5.0 or later for FC_ports, -end Requires M-EOS and M-EOSn 9.6.X or later for...

  • Page 84: Accessibility Features For The Management Application, Keyboard Shortcuts

    Accessibility features for the Management application Accessibility features for the Management application Accessibility features help users who have a disability, such as restricted mobility or limited vision, to use information technology products successfully. The following list includes the major accessibility features in the Management application: •...

  • Page 85: Look And Feel

    Accessibility features for the Management application Look and Feel You can configure the Management application to mimic your system settings as well as define the size of the font. ‘Look’ refers to the appearance of graphical user interface widgets and ‘feel’ refers to the way the widgets behave.

  • Page 86

    Accessibility features for the Management application Changing the font size The Options dialog box enables you to change the font size for all components including the Connectivity map of the Management application interface. Font size changes proportionately in relation to the system resolution. For example, if the system resolution is 1024 x 768, the default font size would be 8 and large font size would be 10.

  • Page 87: Overview, In This Chapter

    Chapter Licenses In this chapter • Overview ............43 •...

  • Page 88: Managed Count, Managed San Port Count Calculation, Entering The License Key

    Managed count Managed count The Management application audits and verifies the managed count against the maximum limit for your license under the following conditions: • Every 3 hours from server start time. Note that you may be able to manage more products or ports than the maximum licensed limit briefly (maximum of three hours) between these periodic checks.

  • Page 89: Upgrading The Application

    Upgrading the application NOTE You are not required to enter a license key for SMI Agent only installation. If you choose to the SMI Agent only option, when you open the Management application client, a License dialog displays, where you must enter a license key. Before you enter the license key you must install the application.

  • Page 90

    Upgrading the application TABLE 8 SAN + IP upgrade paths Current Software Release To Software Release SAN Professional Plus + IP SAN + IP Enterprise Licensed version Enterprise Licensed version Enterprise trial Enterprise Licensed version 1. Select Help > License. The License dialog box displays.

  • Page 91: San Discovery Overview, In This Chapter

    Chapter Discovery In this chapter • SAN discovery overview......... . 47 •...

  • Page 92: Fcs Policy And Seed Switches

    SAN discovery overview NOTE Professional Plus edition can discover up to 4 fabrics. NOTE Professional Plus edition can discover, but not manage the Backbone chassis.Use the device’s Element Manager, which can be launched from the Connectivity Map, to manage the device. This device cannot be used as a Seed switch.

  • Page 93: Discovering Fabrics

    SAN discovery overview Discovering fabrics NOTE Fabric OS devices must be running Fabric OS 5.0 or later. M-EOS devices must be running M-EOS 9.6 or later. NOTE Only one copy of the application should be used to monitor and manage the same devices in a subnet.

  • Page 94

    SAN discovery overview FIGURE 22 Add Fabric Discovery dialog box (IP Address tab) 3. Enter a name for the fabric in the Fabric Name field. 4. Enter an IP address for a device in the IP Address field. For seed switch requirements, refer to “Seed switch requirements”...

  • Page 95

    SAN discovery overview For Virtual Fabric discovery device requirements, refer to “Virtual Fabrics requirements” page 415. To discover a Virtual Fabric device, you must have the following permissions: • Switch user account with Chassis Admin role permission on the physical chassis. •...

  • Page 96

    SAN discovery overview d. Select the SNMP version from the SNMP Version list. • If you selected v1, continue with step e. • If you select v3, the SNMP tab displays the v3 required parameters. Go to step i. To discover a Fabric OS device (not virtual fabric-capable), you must provide the existing SNMPv3 username present in the switch.

  • Page 97: Editing The Password For Multiple Devices

    SAN discovery overview Editing the password for multiple devices You can only edit password for Fabric OS devices in the same fabric. To edit the password for multiple devices within the same fabric, complete the following steps. 1. Select Discover > Fabrics. The Discover Fabrics dialog box displays.

  • Page 98: Configuring Snmp Credentials

    SAN discovery overview Configuring SNMP credentials 1. Select Discover > Fabrics. The Discover Fabrics dialog box displays. 2. Select an IP address from the Discovered Fabrics table. 3. Click Edit. The Add Fabric Discovery dialog box displays. 4. To revert to the default SNMPv3 settings, click the Automiatic option. Go to step 19. 5.

  • Page 99: Reverting To A Default Snmp Community String, Removing A Fabric From Active Discovery

    SAN discovery overview 19. Click OK on the Add Fabric Discovery dialog box. If the seed switch is not partitioned, continue with step If the seed switch is partitioned, the Undiscovered Seed Switches dialog box displays. a. Select the Select check box for each undiscovered seed switch to discover their fabrics. b.

  • Page 100: Rediscovering A Previously Discovered Fabric, Deleting A Fabric, Viewing The Fabric Discovery State

    Viewing the fabric discovery state Rediscovering a previously discovered fabric To return a fabric to active discovery, complete the following steps. 1. Select Discover > Fabrics. The Discover Fabrics dialog box displays. 2. Select the fabric you want to return to active discovery in the Previously Discovered Addresses table.

  • Page 101: Troubleshooting Fabric Discovery

    Troubleshooting fabric discovery TABLE 9 Discovery Status Icons Icon Description Displays when the fabric or host is managed and the management status is okay. Displays when the switch is managed and the switch management status is not okay. Displays when the fabric or host is not managed. The Discovery Status field details the actual status message text, which varies depending on the situation.

  • Page 102: M-eosn Discovery Troubleshooting

    Troubleshooting fabric discovery M-EOSn discovery troubleshooting The following section states a possible issue and the recommended solution for M-EOSn discovery errors. Problem Resolution M-EOS seed switch discovery is not supported Discover the device using SNMPv1. using SNMPv3 on the following devices: To configure SNMPv3 and manage the device, complete the following steps.

  • Page 103: Virtual Fabric Discovery Troubleshooting

    Troubleshooting fabric discovery Virtual Fabric discovery troubleshooting The following section state possible issues and the recommended solutions for Virtual Fabric discovery errors. Problem Resolution At the time of discovery, the seed switch is Virtual Fabric-enabled; however, the user does not have Make sure the user account has Chassis Admin role for the seed switch.

  • Page 104: San Fabric Monitoring

    SAN Fabric monitoring SAN Fabric monitoring NOTE Monitoring is not supported on Hosts. The upper limit to the number of HBA and CNA ports that can be monitored at the same time is 32. The same upper limit applies if switch ports and HBA ports are combined.

  • Page 105: Monitoring Discovered Fabrics, Stop Monitoring Of A Discovered Fabric

    SAN Fabric monitoring Monitoring discovered fabrics NOTE Monitoring is not supported on Hosts. To monitor a fabric and all associated devices, complete the following steps. 1. Select Discovery > Fabrics. The Discover Fabrics dialog box displays. 2. Select the fabric you want to monitor from the Discovered Fabrics table. 3.

  • Page 106: San Seed Switch

    SAN Seed switch SAN Seed switch The seed switch must be running a supported Fabric OS or M-EOS version and must be HTTP-reachable. Sometimes, the seed switch is auto-selected, such as when a fabric segments or when two fabrics merge. Other times, you are prompted (an event is triggered) to change the seed switch, such as in the following cases: •...

  • Page 107: Seed Switch Requirements

    SAN Seed switch Seed switch requirements Depending on your environment, you must meet the following hardware and firmware version requirements for seed switches. Fabric OS devices: • For Fabric OS only fabrics, the seed switch must be running Fabric OS 5.0 or later. •...

  • Page 108: Seed Switch Failover

    SAN Seed switch Seed switch failover The Management application collects fabric-wide data (such as, fabric membership, connectivity, name server information, zoning, and so on) using the seed switch. Therefore when a seed switch becomes unreachable or there is no valid seed switch, the fabric becomes unmanageable. When the seed switch cannot be reached for three consecutive fabric refresh cycles, the Management application looks for another valid seed switch in the fabric, verifies that it can be reached, and has valid credentials.

  • Page 109: Changing The Seed Switch

    SAN Seed switch Changing the seed switch When you change the seed switch for a fabric, the Management application performs the following checks in the order they are listed: • Identifies all switches and removes those running unsupported firmware version. •...

  • Page 110: Host Discovery, Discovering Hosts By Network Address Or Host Name

    Host discovery Host discovery The Management application enables you to discover individual hosts, import a group of Host from a comma separated values (CSV) file, or import all hosts from discovered fabrics or VM managers. NOTE Host discovery requires HCM Agent 2.0 or later. NOTE SMI and WMI discovery are not supported.

  • Page 111

    Host discovery FIGURE 26 Add Host Adapters dialog box 3. (Optional) Enter a discovery request name (such as, Manual 06/12/2009) in the Discovery Request Name field. 4. Select Network Address from the list. 5. Enter the IP address (IPv4 or IPv6 formats) or host name in the Network Address field. 6.

  • Page 112: Importing Hosts From A Csv File

    Host discovery Configure Host credentials, if necessary. a. Enter the HCM Agent port number in the Port field. b. Enter your username in the User ID field. Enter your password Password field. 8. Repeat step 5 through step 7 for each Host you want to discover. 9.

  • Page 113: Importing Hosts From A Fabric

    Host discovery 4. Browse to the CSV file location. The CSV file must meet the following requirements: • Comma separated IP address or host names • No commas within the values • No escaping supported For example, XX.XX.XXX.XXX, XX.XX.X.XXX, computername.company.com 5.

  • Page 114

    Host discovery FIGURE 28 Add Host Adapters dialog box 3. Enter a discovery request name (such as, MyFabric) in the Discovery Request Name field. 4. Select Hosts in Fabrics from the list. 5. Select All fabrics or an individual fabric from the list. 6.

  • Page 115: Importing Hosts From A Vm Manager

    Host discovery Importing Hosts from a VM manager To discover Hosts from a discovered VM manager, complete the following steps. 1. Select Discover > Host Adapters. The Discover Host Adapters dialog box displays. 2. Click Add. The Add Host Adapters dialog box displays. FIGURE 29 Add Host Adapters dialog box 3.

  • Page 116: Editing Host Adapter Credentials, Removing A Host From Active Discovery

    Host discovery 8. Click OK on the Add Host Adapters dialog box. If an error occurs, a message displays. Click OK to close the error message and fix the problem. A Host Group displays in Discovered Hosts table with pending status. To update the status from pending you must close and reopen the Discover Host Adapters dialog box.

  • Page 117: Deleting A Host Adapter From Discovery, Rediscovering A Previously Discovered Fabric

    Host discovery To delete a host from active discovery, complete the following steps. 1. Select Discover > Host Adapters. The Discover Host Adapters dialog box displays. 2. Select the host you want to delete from active discovery in the Discovered Hosts table. 3.

  • Page 118: Viewing The Host Discovery State, Troubleshooting Host Discovery

    Host discovery Viewing the host discovery state The Management application enables you to view device discovery status through the Discover Host Adapters dialog box. To view the discovery status of a device, complete the following steps. 1. Select Discover > Host Adapters. The Discover Host Adapters dialog box displays.

  • Page 119: Vm Manager Discovery, Discovering A Vm Manager

    VM Manager Discovery VM Manager Discovery The Management application enables you to discover VM managers. NOTE VM Manager discovery requires vCenter Server 4.0 or later. NOTE You can discover up to 10 VM Managers. Discovering a VM manager To discover a VM manager, complete the following steps. 1.

  • Page 120

    VM Manager Discovery 2. Click Add. The Add VM Manager dialog box displays. FIGURE 32 Add VM Manager dialog box 3. Enter the IP address or host name in the Network Address field. 4. Enter the VM manager port number in the Port field. 5.

  • Page 121: Editing A Vm Manager, Excluding A Host From Vm Manager Discovery

    VM Manager Discovery Editing a VM manager To edit VM manager discovery, complete the following steps. 1. Select Discover > VM Managers. The Discover VM Managers dialog box displays. 2. Select the Host in the Discovered VM Managers list and click Edit. The Edit VM Manager dialog box displays.

  • Page 122: Including A Host In Vm Manager Discovery, Removing A Vm Manager From Active Discovery

    VM Manager Discovery Including a host in VM manager discovery To include host in VM manager discovery complete the following steps. 1. Select Discover > VM Managers. The Discover VM Managers dialog box displays. 2. Select a Host you want to include in the Discovered VM Managers list and click Include.. 3.

  • Page 123: Deleting A Vm Manager From Discovery, Viewing The Vm Manager Discovery State

    VM Manager Discovery Deleting a VM manager from discovery To delete a host permanently from discovery, complete the following steps. 1. Select Discover > VM Managers. The Discover VM Managers dialog box displays. 2. Select the VM manager you want to delete permanently from discovery in the Previously Discovered Addresses table.

  • Page 124: Troubleshooting Vm Manager Discovery

    VM Manager Discovery Troubleshooting VM manager discovery If you encounter discovery problems, complete the following checklist to ensure that discovery was set up correctly. 1. Verify IP connectivity by issuing a ping command to the switch. a. Open the command prompt. b.

  • Page 125

    Chapter Application Configuration In this chapter • Server Data backup..........82 •...

  • Page 126: Server Data Backup, What Is Backed Up, Management Server Backup

    Server Data backup Server Data backup The Management application helps you to protect your data by backing it up automatically. The data can then be restored, as necessary. NOTE Backing up data takes some time. It is possible that, in a disaster recovery situation, configuration changes made after the last backup interval will be missing from the backup.

  • Page 127: Configuring Backup To A Writable Cd

    Server Data backup Back up directory structure overview The Management server backs up data to two alternate folders. For example, if the backup directory location is D:\Backup, the backup service alternates between two backup directories, D:\Backup\Backup and D:\Backup\BackupAlt. The current backup is always D:\Backup and contains a complete backup of the system.

  • Page 128: Configuring Backup To A Hard Drive

    Server Data backup 4. Choose one or more of the following options: • Select the Include Adapter Boot Image directory check box. • Select the Include FTP Root directory check box. If you select the FTP Root directory, the FTP Root sub-directories, Technical Support and Trace Dump, are selected automatically and you cannot clear the sub-directory selections.

  • Page 129: Configuring Backup To A Network Drive

    Server Data backup 4. Choose one or more of the following options: • Select the Include Adapter Boot Image directory check box. • Select the Include FTP Root directory check box. If you select the FTP Root directory, the FTP Root sub-directories, Technical Support and Trace Dump, are selected automatically and you cannot clear the sub-directory selections.

  • Page 130

    Server Data backup 4. Choose one or more of the following options: • Select the Include Adapter Boot Image directory check box. • Select the Include FTP Root directory check box. If you select the FTP Root directory, the FTP Root sub-directories, Technical Support and Trace Dump, are selected automatically and you cannot clear the sub-directory selections.

  • Page 131: Enabling Backup, Disabling Backup, Viewing The Backup Status

    Server Data backup Enabling backup Backup is enabled by default. However, if it has been disabled, complete the following steps to enable the function. 1. Select Server > Options. The Options dialog box displays. 2. Select Server Backup in the Category list. 3.

  • Page 132: Changing The Backup Interval, Starting Immediate Backup

    Server Data backup Changing the backup interval When the backup feature is enabled, your SAN is protected by automatic backups. The backups occur every 24 hours by default. However, you can change the interval at which backup occurs. ATTENTION Do NOT modify the backup.properties file. To change the backup interval, complete the following steps.

  • Page 133: Reviewing Backup Events, Server Data Restore

    Server Data restore Reviewing backup events The Master Log, which displays in the lower left area of the main window, lists the events that occur on the Fabric. If you do not see the Master Log, select View > Show Panels > All Panels. The following backup events appear in the Master Log: •...

  • Page 134: Restoring Data, Restoring Data To A New Server

    Server Data restore • Backup\conf – contains the Management application configuration files. • Backup\cimom – contains the SMIA configuration files. In a disaster recovery situation, it is possible that configuration changes made less than 45 minutes before Server loss (depending on the backup interval you set) could be missing from the backup.

  • Page 135: San Display, Setting Your Ficon Display

    SAN Display SAN Display You can configure the display for FICON and reset the display to the default settings. Setting your FICON display FICON display setup rearranges the columns of any table that contains end device descriptions to move the following eight columns to be the first columns: FC Address, Serial #, Tag, Device Type, Model, Vendor, Port Type, and WWN.

  • Page 136: Resetting Your Display

    SAN Display Resetting your display You can reset your system to display the default display settings. Note that returning to current settings after a reset may require configuring each global fabric or group setting individually. The following table (Table 13) details the settings that change with reset and the associated default state.

  • Page 137: San End Node Display, Displaying End Nodes

    SAN End node display SAN End node display The connectivity map can be configured to display or not display end nodes. This option enables you to set the end node display for all newly discovered fabrics. Note that disabling end node display limits the connectivity map to emphasize switch members only.

  • Page 138: San Ethernet Loss Events, Enabling San Ethernet Loss Events, Disabling San Ethernet Loss Events

    SAN Ethernet loss events SAN Ethernet loss events An Ethernet event occurs when the Ethernet link between the Management Server and the managed SAN device is lost. You can configure the application to enable events when the Ethernet connection is lost. Enabling SAN Ethernet loss events The Options dialog box enables you to configure the Management application to generate an Ethernet event after a device is offline for a specific period of time.

  • Page 139: Event Storage, Configuring Event Storage

    Event storage Event storage You can configure the number of historical events in the repository as well as how long the events will be retained. Configuring event storage To configure event storage, complete the following steps. 1. Select Server > Options. The Options dialog box displays (Figure 38).

  • Page 140: Storing Historical Events Purged From Repository, Flyovers, Configuring Flyovers

    Flyovers Storing historical events purged from repository To store historical events purged from the repository, complete the following steps. 1. Select Server > Options. The Options dialog box displays. 2. Select Event Storage in the Category list. 3. Select the Yes option. 4.

  • Page 141

    Flyovers FIGURE 39 Options dialog box (Flyovers option, Product tab) a. Select each property you want to display in the product flyover from the Available Properties table. Depending on which protocol you select, some of the following properties may not be available for all protocols: Fibre Channel (default) •...

  • Page 142

    Flyovers Select the Connection tab (Figure 40) and complete the following steps to select the information you want to display on flyover. FIGURE 40 Options dialog box (Flyovers option, Connection tab) a. Select the protocol from the Protocol list. The default protocol is Fibre Channel. Depending on which protocol you select, some properties may not be available for all protocols.

  • Page 143: Turning Flyovers On Or Off, Viewing Flyovers, San Names

    SAN Names FCoE • • Name Port# • • Node WWN Port Type • • FCoE Index # • IP_Address:Port-IP_Address:Port Click the right arrow to move the selected properties to the Selected Properties table. d. Use the Move Up and Move Down buttons to reorder the properties in the Selected Properties table.

  • Page 144: Setting Names To Be Unique

    SAN Names Setting names to be unique You can edit duplicate names so that each device has a unique name. Note that the Duplicated Names dialog box only displays when you set names to be unique and there are duplicate names in the system.

  • Page 145: Setting Names To Be Non-unique, Fixing Duplicate Names

    SAN Names Setting names to be non-unique You can choose to allow duplicate names in your fabric. To set names to be non-unique, complete the following steps. 1. Select Server > Options. The Options dialog box displays. 2. Select SAN Names in the Category list. 3.

  • Page 146: Viewing Names, Adding A Name To An Existing Device

    SAN Names 2. Click Fix Duplicates. The Duplicated Names dialog box displays. 3. Select one of the following options. • If you select Append Incremental numbers for all repetitive names, the names are edited automatically using incremental numbering. • If you select I will fix them myself, edit the name in the Name field. 4.

  • Page 147: Adding A Name To A New Device, Applying A Name To A Detached Wwn

    SAN Names 5. Click OK on the confirmation message. 6. Click OK to close the Configure Names dialog box. Adding a name to a new device To add a new device and name it, complete the following steps. 1. Select Configure > Names. The Configure Names dialog box displays.

  • Page 148: Removing A Name From A Device, Editing Names, Exporting Names

    SAN Names Removing a name from a device 1. Select Configure > Names. The Configure Names dialog box displays. 2. In the Display table, select the name you want to remove. 3. Click Remove. An application message displays asking if you are sure you want clear the selected name. 4.

  • Page 149: Importing Names, Searching For A Device By Name

    SAN Names Importing Names If the name length exceeds the limitations detailed in the following table, you must edit the name (in the CSV file) before import. Names that exceed these limits will not be imported. If you migrated from a previous version, the .properties file is located in the Install_Home\migration\data folder. Device Character limit Fabric OS switch 6.2 or later...

  • Page 150: Searching For A Device By Wwn

    SAN Names 4. Enter the name you want to search for in the Search field. You can search on partial names. NOTE To search for a device, the device must be discovered and display in the topology. 5. Click Search. All devices with the specified name (or partial name) are highlighted in the Display table.

  • Page 151: Security, Configuring The Server Name

    Security Security You can configure the Server Name, CHAP secret value, and login banner, and modify whether or not to allow clients to save passwords. When the login banner is enabled, each time a client connects to the server, the login banner displays with a legal notice provided by you. The client's users must acknowledge the login banner to proceed, otherwise they are logged out.

  • Page 152: Setting The Chap Secret, Configuring Login Security

    Security 5. Re-enter the password in the Retype Secret field. If the secret does not meet the application requirements or the CHAP Secret and Retype Secret entries do not match, an error message displays. Click OK to re-enter the CHAP Secret and Retype Secret values.

  • Page 153: Configuring The Login Banner Display, Disabling The Login Banner

    Security Configuring the login banner display To configure the login banner display, complete the following steps. 1. Select Server > Options. The Options dialog box displays. 2. Select Security Misc in the Category list. 3. Select the Display login banner upon client login check box. 4.

  • Page 154: Syslog Registration, Registering A Server As A Syslog Recipient Automatically

    Syslog Registration Syslog Registration You can automatically register the server as the syslog recipient on products. Registering a server as a Syslog recipient automatically 1. Select Server > Options. The Options dialog box displays. 2. Select Syslog Registration in the Category pane. FIGURE 44 Options dialog box (Trap Registration option) 3.

  • Page 155: Snmp Trap Registration, Registering A Server As A Snmp Trap Recipient Automatically

    SNMP Trap Registration SNMP Trap Registration You can automatically register the server as the trap recipient on products. If SAN products have Informs enabled, the registration is for the Informs. Registering a server as a SNMP trap recipient automatically 1. Select Server > Options. The Options dialog box displays.

  • Page 156: Snmp Trap Forwarding Credentials, Configuring Snmp V1 And V2c Credentials, Configuring Snmp V3 Credentials

    SNMP Trap Forwarding Credentials SNMP Trap Forwarding Credentials You can configure SNMP credentials for the traps forwarded by the server. Configuring SNMP v1 and v2c credentials To configure a SNMP v1 or v2c credentials, complete the following steps. 1. Select Server > Options. The Options dialog box displays.

  • Page 157: Software Configuration, Client Export Port

    Software Configuration 4. Select on of the following authentication types from the Authentication Type options. • HMAC_MD5 • HMAC_SHA 5. Enter the SNMP v3 user name (case sensitive, 1 to 16 characters) in the Auth Password and Confirm Password fields. Allows all printable ASCII characters.

  • Page 158

    Software Configuration FIGURE 47 Options dialog box (Client Export Port option) 3. Enter the client export port number to set a fixed port number for the client in the Client Export Port field. 4. Click Apply or OK to save your work. NOTE Changes to this option take effect after a client restart.

  • Page 159: Client/server Ip

    Software Configuration Client/Server IP You can configure connections between the client or switches and the Management application server. Configuring the server IP address NOTE The server binds using IPv6 address by default if your Operating System is IPv6-enabled (dual mode or IPv6 only).

  • Page 160

    Software Configuration 3. Choose one of the following options in the Server IP Configuration list. • Select All. Go to step • Select a specific IP address. Continue with step • Select localhost. Continue with step When Server IP Configuration is set to All, you can select any available IP address as the Return Address.

  • Page 161

    Software Configuration 5. Complete the following steps on the Server IP Configuration screen (Figure 49). FIGURE 49 Server IP Configuration screen a. Select an address from the Server IP Configuration list. b. Select an address from the Switch - Server IP Configuration Preferred Address list. If DNS is not configured for your network, do not select the “hostname”...

  • Page 162

    Software Configuration Configuring the application to use dual network cards Issues with Client-to-Server connectivity can be due to different reasons. Some examples are: • The computer running the Server has more than one network interface card (NIC) installed. • The computer running the Server is behind a firewall that performs network address translation.

  • Page 163: Memory Allocation

    Software Configuration FIGURE 50 Options dialog box (IP Preferences option) Memory allocation You can configure memory allocation for the client and server to improve performance. You can trigger switch polling when a state changes or you can poll at intervals when no state change occurs.

  • Page 164

    Software Configuration For a 32-bit Windows/Linux Server • Small : 768 MB • Medium : 1024 MB • Large : 1024 MB For a 64-bit Windows Server • Small : 20481024 MB • Medium : 1500 MB • Large : 10242048 MB Client Heap Size (for both 32 and 64-bit servers) •...

  • Page 165

    Software Configuration • Enterprise Medium : 1500 MB • Enterprise Large : 2048 MB NOTE There is no restriction on the maximum value for Server Heap Size in a 64-Bit Server. The correct server heap size value must be given according to the RAM present in the server. 6.

  • Page 166: Product Communication

    Software Configuration 5. Click Apply or OK to save your work. NOTE Changes to this option take effect after an application restart. NOTE You can only restart the server using the Server Management Console (Start > Programs > Management_Application_Name 11.X.X > Server Management Console). 6.

  • Page 167: Ftp/scp

    Software Configuration 3. Choose one of the following options: • If you want to connect using HTTP, complete the following steps. a. Select the Connect using HTTP option. b. Enter the connection port number in the Port # field. Continue with step 4. •...

  • Page 168

    Software Configuration Configuring an internal FTP server To configure the internal FTP server settings, complete the following steps. 1. Select Server > Options. The Options dialog box displays (Figure 52). 2. Select FTP/SCP in the Category list. FIGURE 52 Options dialog box (FTP/SCP option) 3.

  • Page 169

    Software Configuration Configuring an external FTP server To configure the external FTP server settings, complete the following steps. 1. Select Server > Options. The Options dialog box displays. 2. Select FTP/SCP in the Category list. 3. Select the Use External FTP Server and/or SCP Server option. 4.

  • Page 170

    Software Configuration 9. Click Test to test the FTP server. A “Server running successfully” or an error message displays. If you receive an error message, make sure your credentials are correct, the server is running, the remote directory path exists, and you have the correct access permission; then try again. 10.

  • Page 171: Server Port

    Software Configuration Server port You can configure the server port settings so that you can assign a web server port number and set the server port to be SSL-enabled. Configuring the server port To configure server settings, complete the following steps. 1.

  • Page 172: Support Mode

    Software Configuration 6. Click Apply or OK to save your work. NOTE Changes to this option take effect after application restart. Click OK on the “changes take effect after application restart” message. Support mode You can configure support settings to allow enhanced diagnostics. Configuring support mode settings To configure support mode settings, complete the following steps.

  • Page 173

    Software Configuration 3. Select the Log client support data - Log Level list, and select the type of log data you want to configure. Log level options include: All, Fatal, Error, Warn, Info, Debug, Trace, and Off. Default is Info. The log level options return to the default value (Info) when the client or server is restarted.

  • Page 174: Fabric Tracking, Enabling Fabric Tracking

    Fabric tracking Fabric tracking When you discover a new fabric and initial discovery is complete, fabric tracking is automatically enabled. Subsequently, if a switch or end-device is added to or removed from the fabric, a plus (+) or minus (-) icon displays (see table below) next to the product icon. Connections are also tracked. A new connection displays a solid gray line with a added icon and missing connections display a yellow dashed line with a removed icon.

  • Page 175: Disabling Fabric Tracking, Accepting Changes For A Fabric

    Fabric tracking Disabling fabric tracking 1. Disable fabric tracking by choosing one of the following options: • Select the fabric on which you want to disable fabric tracking on the Product List or Connectivity Map and select Monitor > Track Fabric Changes. •...

  • Page 176: Accepting Changes For All Fabrics, Accepting Changes For A Switch, Access Gateway, Or Phantom Domain

    Fabric tracking • Device Ports—This table shows a brief summary of the device ports including status (whether the device port will be added ( ) or removed ( ) from the fabric), device type, port, port WWN, node WWN, and attached port number. •...

  • Page 177

    Fabric tracking • Device Ports—This table shows a brief summary of the device ports including status (whether the device port will be added ( ) or removed ( ) from the fabric), device type, port, port WWN, node WWN, and attached port number. •...

  • Page 178

    Fabric tracking Brocade Network Advisor SAN User Manual 53-1002167-01...

  • Page 179: Users Overview, In This Chapter, Configuration Requirements

    Chapter User Account Management In this chapter • Users overview..........135 •...

  • Page 180: User Accounts, Creating A New User Account

    User accounts User accounts NOTE You must have User Management Read and Write privileges to add new accounts, set passwords for accounts, and apply roles to the accounts. For a list of privileges, refer to “User Privileges” page 961. Management application user accounts contain the identification of the Management application user, as well as privileges, roles, and AORs assigned to the user.

  • Page 181: Copying A User Account

    User accounts 12. Assign roles and AORs by selecting the role or AOR in the Available Roles / AOR table and click the right arrow button to move the role or AOR to the Selected Roles / AOR table. Select multiple roles or AORs by holding down the CTRL key and clicking more than one role or AOR.

  • Page 182: Editing A User Account

    User accounts 12. Assign roles and AORs by selecting the role or AOR in the Available Roles / AOR table and click the right arrow button to move the role or AOR to the Selected Roles / AOR table. Select multiple roles or AORs by holding down the CTRL key and clicking more than one role or AOR.

  • Page 183

    User accounts 12. Assign roles and AORs by selecting the role or AOR in the Available Roles / AOR table and click the right arrow button to move the role or AOR to the Selected Roles / AOR table. Select multiple roles or AORs by holding down the CTRL key and clicking more than one role or AOR.

  • Page 184: Disabling A User Account, Enabling A User Account

    User accounts 3. Remove roles and AORs by selecting the role or AOR in the Selected Roles / AOR table and click the left arrow button to move the role or AOR to the Available Roles / AOR table. Select multiple roles or AORs by holding down the CTRL key and clicking more than one role or AOR.

  • Page 185: Deleting A User Account, Unlocking A User Account

    User accounts Deleting a user account NOTE You cannot delete the default "Administrator" user account. To permanently delete a user account from the server, complete the following steps. 1. Select Server > Users. The Users dialog box displays. 2. Select the user you want to delete in the Users table and click Delete. 3.

  • Page 186: Password Policies, Configuring A Password Policy

    Password policies Password policies NOTE You must have User Management Read and Write privileges to configure password policy. Passwords are an important aspect of computer security. They are the front line of protection for user accounts. The purpose of the password policy is to establish a standard for the creation of strong passwords, the protection of those passwords, and the frequency of change.

  • Page 187

    Password policies d. Enter the minimum number of lowercase characters required in the Lower Case Characters field. Only enabled when the Empty Password - Allow check box is clear. Valid values are 0 through 127. The default is 0. e. Enter the minimum number of digits required in the Number of Digits field. Only enabled when the Empty Password - Allow check box is clear.

  • Page 188: Viewing Password Policy Violators, User Profiles

    User profiles 10. Click Yes on the confirmation message. 11. Click Close to close the Users dialog box. Viewing password policy violators To view password policy violators, complete the following steps. 1. Select Server > Users. The Users dialog box displays. 2.

  • Page 189: Viewing Your User Profile, Editing Your User Profile

    User profiles Viewing your user profile To view your user profile, complete the following steps. 1. Select Server > User Profile. The User Profile dialog box displays the following information: • User ID—Displays your user identifier. • Full Name—Displays the name if entered while adding a user; otherwise, this field is blank. •...

  • Page 190: Changing Your Password, Viewing Your Password Policy

    User profiles 5. Change your phone number in the Phone Number field. 6. Select the E-mail Notification Enable check box to enable e-mail notification. Clear the E-mail Notification Enable check box to disable e-mail notification. Click Filter to set up basic event filters. For step-by-step instructions about setting up basic event filters, refer to “Setting up basic event filtering”...

  • Page 191: Resetting Optional Messages, Configuring E-mail Notification

    User profiles Resetting optional messages To reset all Management application optional messages to their default behaviors, complete the following steps. 1. Select Server > User Profile. The User Profile dialog box displays. 2. Click Optional Messages Reset. The Password Policy dialog box displays. 3.

  • Page 192: Roles, Creating A New Role, Adding Privileges To A Role

    Roles Roles NOTE You must have User Management Read and Write privileges to view, add, modify, or delete roles. A role is a group of Management application tasks or privileges that can be assigned to several users who have similar functions. When you create a role, it immediately becomes available in the Users dialog box.

  • Page 193: Removing Privileges From A Role

    Roles 3. Add read and write access by selecting the features to which you want to allow read and write access in the Available Privileges list and click the right arrow button to move the features to the Read & Write Privileges list. Select multiple features by holding down the CTRL key and clicking more than one privilege.

  • Page 194: Copying A Role, Editing A Role

    Roles Copying a role You can create a new role by copying an existing one. When you copy a role, you copy the selected privileges in that role. To copy an existing role, complete the following steps. 1. Select Server > Users. The Users dialog box displays.

  • Page 195: Deleting A Role, Areas Of Responsibility, Creating An Aor

    Areas of responsibility Deleting a role To delete a role, complete the following steps. 1. Select Server > Users. The Users dialog box displays. 2. Select the role you want to delete in the Roles table and click Delete. 3. Click Yes on the confirmation message. 4.

  • Page 196: Assigning Products To An Aor, Removing Products From An Aor

    Areas of responsibility 6. Click OK to save the new AOR and close the Add AOR dialog box. The new AOR displays in the AOR list of the Users dialog box. Click Close to close the Users dialog box. Assigning products to an AOR You can assign fabricsand hosts to an AOR from the Add, Edit, or Duplicate AOR dialog box.

  • Page 197: Copying An Aor, Editing An Aor

    Areas of responsibility Copying an AOR To create a new AOR by copying an existing one, complete the following steps. 1. Select Server > Users. The Users dialog box displays. 2. Select the AOR you want to copy in the AOR table and click Duplicate. The Duplicate AOR dialog box displays.

  • Page 198: Deleting An Aor, Ldap Authorization, Loading An Active Directory Group

    LDAP authorization Deleting an AOR To delete an AOR, complete the following steps. 1. Select Server > Users. The Users dialog box displays. 2. Select the AOR you want to delete in the AOR table and click Delete. 3. Click Yes on the confirmation message. 4.

  • Page 199: Assigning Roles And Aors To An Active Directory Group

    LDAP authorization 10. Click OK. The Active Directory Groups table displays with all first level Active Directory groups available in the specified LDAP server, as well as any Active Directory groups already mapped in the Management server (Local database). To assign or remove roles and AORs, refer to “Assigning roles and AORs to an Active Directory group”...

  • Page 200: Deleting An Active Directory Group

    LDAP authorization Deleting an Active Directory group To delete an Active Directory group, complete the following steps. 1. Select one or more Active Directory groups that you want to delete from the Active Directory Groups table. 2. Click Delete. 3. Click Yes on the confirmation message. 4.

  • Page 201

    Chapter Call Home In this chapter • About call home ..........158 •...

  • Page 202: About Call Home

    About call home About call home NOTE Call Home is supported on Windows systems for all modem and E-mail call home centers and is supported on Unix for the E-mail call home centers. Call Home notification allows you to configure the Management application Server to automatically send an e-mail or dial-in to a support center to report system problems on specified devices (Fabric OSand M-EOS switches, routers, and directors).

  • Page 203: System Requirements

    About call home • Adds an entry to the Master Log file and screen display. • Generates a XML report (only available with EMC call centers) with the product details which is sent with the E-mail. • Generates an HTML report for E-mail-based Call Home centers. For more information about Call Home events, refer to “Call Home Event Tables”...

  • Page 204: Showing A Call Home Center

    Showing a call home center Showing a call home center To show a call home center, complete the following steps. 1. Select Monitor > Event Notification > Call Home. The Call Home dialog box displays (Figure 55). FIGURE 55 Call Home dialog box 2.

  • Page 205: Hiding A Call Home Center, Editing A Call Home Center

    Hiding a call home center Hiding a call home center NOTE Before you can hide a call home center, you must remove all assigned products. To hide a call home center, complete the following steps. 1. Select Monitor > Event Notification > Call Home. The Call Home dialog box displays.

  • Page 206

    Editing a call home center FIGURE 57 Configure Call Home Center dialog box (Brocade International or IBM option) 4. Make sure the call home center type you selected displays in the Call Home Centers list. 5. Select Enable to enable this call home center. 6.

  • Page 207: Editing The Brocade North America Call Home Center

    Editing a call home center Editing the Brocade North America call home center Modem call home centers are only available for Brocade. To edit this call home center, complete the following steps. 1. Select Monitor > Event Notification > Call Home. The Call Home dialog box displays.

  • Page 208: Editing An E-mail Call Home Center

    Editing a call home center Editing an E-mail call home center E-mail call home centers are available for Brocade, IBM, and Oracle. To edit one of these call home centers, complete the following steps. 1. Select Monitor > Event Notification > Call Home. The Call Home dialog box displays.

  • Page 209: Editing The Emc Call Home Center

    Editing a call home center 14. Enter a password in the SMTP Server Settings - Password field. This is a required field when the SMTP server authentication is enabled. 15. Enter the e-mail address for replies in the E-mail Notification Settings - Reply Address field. 16.

  • Page 210: Editing The Hp Lan Call Home Center

    Editing a call home center Enter the path to the ConnectEMC application in the ConnectEMC field or browse to the ConnectEMC application location. 8. Enter the phone number or extension of the local server in the Local Server - Modem # field. 9.

  • Page 211: Enabling A Call Home Center, Enabling Support Save

    Enabling a call home center Enter the port number (default is 2069) of the call home center in the Port field 8. Click Send Test to test the address. The selected call home center must be enabled to test the IP address. A faked event is generated and sent to the selected call home center.

  • Page 212: Testing The Call Home Center Connection, Disabling A Call Home Center

    Testing the call home center connection Testing the call home center connection Once you add and enable a call home center, you should verify that call home is functional. To verify call home center functionality, complete the following steps. 1. Select Monitor > Event Notification > Call Home. 2.

  • Page 213: Viewing Call Home Status

    Viewing Call Home status Viewing Call Home status You can view call home status from the main Management application window or from the Call Home Notification dialog box. The Management application enables you to view the call home status at a glance by providing a call home status icon on the Status Bar.

  • Page 214: Assigning A Device To The Call Home Center

    Assigning a device to the call home center Assigning a device to the call home center Discovered devices (switches, routers, and directors) are not assigned to a corresponding call home center automatically. You must manually assign each device to a call home center before you use call home.

  • Page 215: Removing All Devices And Filters From A Call Home Center, Defining An Event Filter

    Removing all devices and filters from a call home center Removing all devices and filters from a call home center To remove all devices and filters from a call home center, complete the following steps. 1. Select Monitor > Event Notification > Call Home. The Call Home dialog box displays.

  • Page 216: Assigning An Event Filter To A Call Home Center

    Assigning an event filter to a call home center Assigning an event filter to a call home center Event filters allow call home center users to log in to a Management server and assign specific event filters to the devices. This limits the number of unnecessary or ‘acknowledge’ events and improves the performance and effectiveness of the call home center.

  • Page 217: Overwriting An Assigned Event Filter, Removing An Event Filter From A Call Home Center

    Overwriting an assigned event filter Overwriting an assigned event filter A device can only have one event filter at a time; therefore, when a new filter is applied to a device that already has a filter, you must confirm the new filter assignment. To overwrite an event filter, complete the following steps.

  • Page 218: Removing An Event Filter From A Device

    Removing an event filter from a device Removing an event filter from a device To remove an event filter from a device, complete the following steps. 1. Select Monitor > Event Notification > Call Home. The Call Home dialog box displays. 2.

  • Page 219: View Management Overview, In This Chapter

    Chapter View Management In this chapter • View management overview ........175 •...

  • Page 220: Creating A Customized View

    Creating a customized view Creating a customized view You may want to customize the Product List and Connectivity Map to simplify management of large SANs by limiting the topology size or Product List columns. For each customized view, you can specify the fabrics and hosts that display on the Connectivity Map, as well as the columns and device groupings that display on the Product List.

  • Page 221: Editing A Customized View

    Editing a customized view 3. Click the Fabrics tab. 4. In the Available Fabrics table, select the fabrics you want to include in the view and click the right arrow button to move your selections to the Selected Fabrics and Hosts table. To select more than one row, press CTRL and click individual rows.

  • Page 222

    Editing a customized view FIGURE 64 Edit View dialog box - Fabrics tab 2. Click the Fabrics tab. 3. In the Available Fabrics table, select the fabrics you want to include in the view and use the right arrow button to move your selections to the Selected Fabrics and Hosts table. 4.

  • Page 223: Deleting A Customized View, Copying A View

    Deleting a customized view Deleting a customized view To delete a customized view, use the following procedure. 1. Select View > Manage View > Delete View > View_Name. 2. Click Yes on the message. If you delete the current view, the view changes to the default view (View All). Copying a view To copy a customized view, use the following procedure.

  • Page 224: San Topology Layout

    SAN topology layout SAN topology layout You can customize various parts of the topology, including the layout of devices and connections and groups’ background colors, to easily and quickly view and monitor devices in your SAN. The following menu options are available on the View menu. Use these options to customize the topology layout.

  • Page 225: Customizing The Layout Of Devices On The Topology

    Customizing the layout of devices on the topology Customizing the layout of devices on the topology You can customize the layout of devices by group type or for the entire Connectivity Map. Customizing the layout makes it easier to view the SAN and manage its devices. Group types include Fabric, Host, Storage, Router and Switch groups.

  • Page 226: Customizing The Layout Of Connections On The Topology, Changing A Group Background Color

    Customizing the layout of connections on the topology 3. Select the Set as Default Layout check box to set your selection as the default. 4. Click OK on the Map Display Properties dialog box. Customizing the layout of connections on the topology You can change the way inter-device connections display on the topology.

  • Page 227: Reverting To The Default Background Color, Changing The Product Label

    Reverting to the default background color 3. Select or specify a color and preview it in the Preview pane. • To pick a color from a swatch, select the Swatches tab. Select a color from the display. • To specify a color based on hue, saturation, and brightness, click the HSB tab. Specify the hue (0 to 359 degrees), saturation (0 to 100%), and brightness (0 to 100%).

  • Page 228: Changing The Port Label, Changing The Port Display

    Changing the port label Changing the port label To change the port label, complete the following steps. 1. Select a port in the Connectivity Map or Product List. 2. Select View > Port Label, and select one of the following options: •...

  • Page 229: Grouping On The Topology, Collapsing Groups, Expanding Groups, Viewing Connections

    Grouping on the topology Grouping on the topology To simplify management, devices display in groups. Groups are shown with background shading and are labeled appropriately. You can expand and collapse groups to easily view a large topology. Collapsing groups To collapse a single group on the topology, choose one of the following options: •...

  • Page 230: Configuring Custom Connections, Saving A Custom Connection Configuration

    Grouping on the topology Configuring custom connections NOTE Active zones must be available on the fabric. To create a display of the connected end devices participating in a single zone or group of zones, complete the following steps. 1. Choose one of the following options: •...

  • Page 231: Deleting A Custom Connection Configuration, Customizing The Main Window

    Customizing the main window Deleting a custom connection configuration NOTE Active zones must be available on the fabric. To delete a custom connection configuration, complete the following steps. 1. Choose one of the following options: • Select a fabric on the topology and select View > Connected End Devices > Custom. •...

  • Page 232: Showing Levels Of Detail On The Connectivity Map, Exporting The Topology

    Customizing the main window b. Select a zoom percentage. Click OK to save your changes and close the Zoom dialog box. Zooming out To zoom out of the Connectivity Map, use one of the following methods: • Click the zoom-out icon ( ) on the Connectivity Map toolbar. •...

  • Page 233: Customizing Application Tables

    Customizing the main window 4. Click Save. If the file name is a duplicate, a message displays. Click Yes to replace the image or click No to go back to the Export Topology To PNG File dialog box and change the file name. The File Download dialog box displays.

  • Page 234

    Customizing the main window FIGURE 70 Customize Columns dialog box 2. Choose from the following options: • Select the check box to display a column. Select the column name and click Show. • Clear the check box to hide a column. Select the column name and click Hide.

  • Page 235

    Customizing the main window Resizing the columns You can resize a single column or all columns in the table. To resize a single column, right-click the column header and select Size Column to Fit or Table > Size Column to Fit. To resize all columns in the table, right-click anywhere in the table and select Size All Columns to Fit or Table >...

  • Page 236: Search

    Search Searching for information in a table You can search for information in the table by any of the values found in the table. 1. Right-click anywhere in the table and select Table > Search. The focus moves to the Search field. FIGURE 71 Search field 2.

  • Page 237: Searching For A Device, Restricting A Search By Node

    Search Searching for a device You can search for a device by name, WWN, or device type. When searching in the Connectivity Map, make sure you search the right view (View > Manage View > Display View > View_Name) with the appropriate options of port display (View >...

  • Page 238: Searching For An Exact Match, Clearing Search Results

    Search 3. Enter your search criteria in the search field. • Text—Enter a text string in the search text box. This search is case sensitive. For example, you can enter the first five characters in a device name. All products in the Product List that contain the search text display highlighted.

  • Page 239: About Third-party Tools, In This Chapter

    Chapter Third-party tools In this chapter • About third-party tools ......... . 195 •...

  • Page 240: Starting Third-party Tools From The Application, Launching A Telnet Session

    Starting third-party tools from the application Starting third-party tools from the application You can open third-party tools from the Tools menu or a device’s shortcut menu. Remember that you cannot open a tool that is not installed on your computer. You must install the tool on your computer and add the tool to the Tools menu or the device’s shortcut menu.

  • Page 241: Launching An Element Manager

    Launching an Element Manager Launching an Element Manager Element Managers are used to manage Fibre Channel switches and directors. You can open a device’s Element Manager directly from the application. To launch a device’s Element Manager, complete the following steps. On the Connectivity Map, double-click the device you want to manage.

  • Page 242: Launching Web Tools

    Launching Web Tools Launching Web Tools Use Web Tools to enable and manage Fabro OS access gateway, switches, and directors. You can open Web Tools directly from the application. For more information about Web Tools, refer to the Brocade Web Tools Administrator’s Guide. For more information about Fabro OS access gateway, switches, and directors, refer to the documentation for the specific device.

  • Page 243: Launching Fcr Configuration

    Launching FCR configuration Launching FCR configuration Use FCR Configuration to launch the FC Routing module, which enables you to share devices between fabrics without merging the fabrics. You can open the FC Routing module directly from the Management application. For more information about FC Routing, refer to the Brocade Web Tools Administrator’s Guide.

  • Page 244: Launching Name Server

    Launching Name Server Launching Name Server Use Name Server to view entries in the Simple Name Server database. You can open the Name Server module directly from the Management application. For more information about Name Server, refer to the Brocade Web Tools Administrator’s Guide. NOTE You must have Element Manager - Product Administration privileges for the selected device to launch Web Tools.

  • Page 245: Launching Hcm Agent

    Launching HCM Agent Launching HCM Agent Use Fabric OS HCM Agent to enable and manage Fabric OS HBAs. You can open HCM Agent directly from the application. For more information about HCM Agent, refer to the HCM Agent Administrator’s Guide. For more information about Fabric OS HBAs, refer to the documentation for the specific device.

  • Page 246: Launching Fabric Watch

    Launching Fabric Watch Launching Fabric Watch Use Fabric Watch as an health monitor that allows you to enable each switch to constantly monitor its SAN fabric for potential faults and automatically alerts you to problems long before they become costly failures.. For more information about Fabric Watch, refer to the Fabric Watch Administrator’s Guide.

  • Page 247: Adding A Tool

    Adding a tool Adding a tool You can specify third-party tools so they appear on the Setup Tools dialog box. From there, you can add them to the Tools menu and then open the tools directly from the Management application. To add a tool, complete the following steps.

  • Page 248: Entering The Server Ip Address Of A Tool, Adding An Option To The Tools Menu

    Entering the server IP address of a tool Entering the server IP address of a tool If the third-party tool is a web-based application, you must enter the IP address of the applications server as a parameter to be able to open the application. To enter the server IP address, complete the following steps.

  • Page 249

    Adding an option to the Tools menu FIGURE 73 Setup Tools dialog box (Tools menu tab) 3. Type a label for the option as you want it to appear on the Tools menu in the Menu Text field. 4. Select the application from the Tool list, or click Define if you want to specify a new tool. To specify a new tool, refer to “Adding a tool”...

  • Page 250: Changing An Option On The Tools Menu, Removing An Option From The Tools Menu

    Changing an option on the Tools menu Changing an option on the Tools menu You can edit parameters for third-party tools that display on the Tools menu. To edit a option to the tools menu, complete the following steps. 1. Select Tools > Setup. The Setup Tools dialog box displays.

  • Page 251: Adding An Option To A Device's Shortcut Menu

    Adding an option to a device’s shortcut menu Adding an option to a device’s shortcut menu You can add an option to a device’s shortcut menu. To add an option to the device’s shortcut menu, complete the following steps. 1. Select Tools > Setup. The Setup Tools dialog box displays.

  • Page 252: Changing An Option On A Device's Shortcut Menu

    Changing an option on a device’s shortcut menu Changing an option on a device’s shortcut menu You can change the parameters for a tool that displays on a device’s shortcut menu. To edit an option to the device’s shortcut menu, complete the following steps. 1.

  • Page 253: Removing An Option From A Device's Shortcut Menu, Microsoft System Center Operations Manager (scom) Plug-in

    Removing an option from a device’s shortcut menu Removing an option from a device’s shortcut menu You can remove a tool that displays on a device’s shortcut menu. To remove an option to the device’s shortcut menu, complete the following steps. 1.

  • Page 254: Registering A Scom Server

    Microsoft System Center Operations Manager (SCOM) plug-in SCOM plug-in requirements • Make sure you import the Management application management pack (Management_Application_Name.FabricView.xml) to the SCOM Server prior to registering the SCOM Plug-in. The management pack is located in the following directory on the DVD scom/OEM_Name.

  • Page 255: Editing A Scom Server, Removing A Scom Server

    Microsoft System Center Operations Manager (SCOM) plug-in Editing a SCOM server To edit the SCOM server, complete the following steps. 1. Select Tools > Plug-in for SCOM. The Plug-in for SCOM dialog box displays. 2. Select the server you want to edit and click Edit. The Edit SCOM Server dialog box displays.

  • Page 256

    Microsoft System Center Operations Manager (SCOM) plug-in Brocade Network Advisor SAN User Manual 53-1002167-01...

  • Page 257: Server Management Console Overview, In This Chapter, Launching The Smc On Windows

    Chapter Server Management Console In this chapter • Server Management Console overview ......213 •...

  • Page 258: Launching The Smc On Linux, Services, Monitoring And Managing Management Application Services

    Services Launching the SMC on Linux Perform the following steps to launch the Server Management Console on Linux systems. 1. On the Management application server, go to the following directory: Install_Directory/bin 2. Type the following at the command line: ./smc sh smc Services You must be logged in at the administrator (Windows systems) or root (UNIX systems) level to stop,...

  • Page 259: Refreshing The Server Status, Stopping All Services, Stopping The Cimom Services

    Services 3. Review the following information for each available service. • Name—The name of the server; for example, FTP Server or Database Server. • Process Name—The name of the process; for example, postgres.exe (Database Server). • Status—The status of the service; for example, started or stopped. •...

  • Page 260: Starting All Services, Restarting All Services

    Services Starting all services NOTE The Start button restarts running services in addition to starting stopped services which causes client-server disconnect. To start all services, complete the following steps. 1. Launch the Server Management Console. 2. Click the Services tab. 3.

  • Page 261: Changing Server Port Numbers, Aaa Settings, Configuring A Radius Server

    Changing server port numbers Changing server port numbers Use the Ports tab of the Server Management Console to change the Management application server and Web server port numbers. The default Web Server port number is 80. The Management application server default port number is 24600. To change the Management application server or web server port number, complete the following steps.

  • Page 262

    AAA Settings • Know the TCP port you are using. For Radius servers, ports 1812 or 1645 (actually UDP ports) are commonly used. Check with the Radius server vendor if you are not sure which port to specify. • Know how long you want to wait between attempts to reach the server if it is busy. This is expressed as a timeout value (default is 3 seconds) in seconds.

  • Page 263

    AAA Settings 6. Select the authentication policy (PAP or CHAP) from the Authentication Type field. Default is CHAP. Enter the shared secret in the Shared Secret and Confirm Secret fields. 8. Enter the timeout timer value (in seconds) that specifies the amount of time to wait between retries when the server is busy in the Timeout (Sec) field.

  • Page 264: Configuring An Ldap Server

    AAA Settings Configuring an LDAP server If you are using an LDAP server for authentication, make the following preparations first: • Have the IP address of the server available. • Know the TCP port you are using. The LDAP server uses Transport Layer Security (TLS). LDAP over TLS generally uses port 389.

  • Page 265

    AAA Settings 3. Click Add. The Add or Edit LDAP Server dialog box displays (Figure 78). FIGURE 78 Add or Edit LDAP server 4. Enter the LDAP server’s IP address in the IP Address field. 5. Enter the TCP port used by the LDAP server in the TCP Port field. Default is 389.

  • Page 266: Configuring A Tacacs+ Server

    AAA Settings Configuring a TACACS+ server To configure TACACS+ server authentication, complete the following steps. 1. Select the AAA Settings tab. 2. For Primary Authentication, select TACACS+ Server. FIGURE 79 AAA Settings tab - TACACS+ server 3. Click Add. FIGURE 80 Add or Edit TACACS+ server 4.

  • Page 267: Configuring Switch Authentication

    AAA Settings 9. Click OK to return to the AAA Settings tab. 10. Set secondary authentication by selecting one of the following options from the Secondary Authentication list: • Local Database • None 11. Set the fall back condition to secondary authentication by selecting one of the following options from the Fail Over Option list: •...

  • Page 268: Configuring Windows Authentication, Configuring Local Database Authentication

    AAA Settings Enter your user ID and password and click Test. Test verifies your user ID and password on the switch and verifies user privileges on the Management application server. 8. Click Apply to save the configuration. Configuring Windows authentication Windows authentication enables you to authenticate a user account against the Windows user accounts and the Management application server when running on Windows hosts.

  • Page 269: Displaying The Client Authentication Audit Trail, Restoring The Database

    Restoring the database Displaying the client authentication audit trail All responses to authentication requests coming from clients are logged to an audit trail log file. This file is automatically backed up on the first day of every month. 1. Select the AAA Settings tab. 2.

  • Page 270

    Restoring the database FIGURE 81 Restore tab 4. Click Browse to select the path (defined in the Output Directory field on the Options dialog box - Backup pane) to the database backup location. 5. Click Restore. Upon completion, a message displays the status of the restore operation. Click OK to close the message and the Server Management Console.

  • Page 271: Capturing Technical Support Information

    Capturing technical support information Capturing technical support information The Technical Support Information tab of the SMC allows you to capture technical support information for the Management application as well as the configuration files for all switches in discovered fabrics. This information is saved in a zip file in a location that you specify. To capture technical support information, complete the following steps.

  • Page 272: Upgrading Hcm On The Management Server

    Upgrading HCM on the Management server 3. Enter the path where you want to save the support data and a name for the support save file in the Output Path field. For example, Full_Path\Support_Save_File_Name.zip. You can also browse to the location you want to save the support data and append the file name to the path when you return to the Techncial Support Information tab.

  • Page 273: Defining The Performance Data Aging Interval

    Defining the performance data aging interval Defining the performance data aging interval The Performance Data Aging tab enables you to define the performance data collection interval. NOTE Changes to the performance data aging option requires a server restart. NOTE You can only restart the server using the Server Management Console (Start > Programs > Management_Application_Name 11.X.X >...

  • Page 274: Smi Agent Configuration, Launching The Smia Configuration Tool On Windows

    SMI Agent configuration 5. Click Yes on the confirmation message. The server automatically restarts. 6. Click Close. SMI Agent configuration The SMIA Configuration Tool enables you to configure SMI Agent settings, such as security, CIMOM, and certificate management. This tool is automatically installed with the Management application as part of the Server Management Console.

  • Page 275: Launching The Smia Configuration Tool On Unix

    SMI Agent configuration 3. Enter your username and password in the appropriate fields. The defaults are Administrator and password, respectively. If you migrated from a previous release, your username and password do not change. 4. Select or clear the Save password check box to choose whether you want the application to remember your password the next time you log in.

  • Page 276: Launching A Remote Smia Configuration Tool, Service Location Protocol (slp) Support

    SMI Agent configuration 4. Enter your username and password in the appropriate fields and click OK. The defaults are Administrator and password, respectively. If you migrated from a previous release, your username and password do not change. The SMIA Configuration Tool dialog box displays. Launching a remote SMIA configuration tool To launch a remote SMIA configuration tool, complete the following steps.

  • Page 277

    SMI Agent configuration SLP support includes the following components: • slpd script starts the slpd platform • slpd program acts as a Service Agent (SA). A different slpd binary executable file exists for UNIX and Windows systems. • slptool script starts the slptool platform-specific program •...

  • Page 278

    SMI Agent configuration • slptool findattrs service:wbem:https://IP_Address:Port NOTE Where IP_Address:Port is the IP address and port number that display when you use the slptool findsrvs service:wbem command. Use this command to verify that Management application SMI Agent SLP service is properly advertising its WBEM SLP template over the HTTP protocol.

  • Page 279

    SMI Agent configuration SLP on UNIX systems This section describes how to verify the SLP daemon on UNIX systems. SLP file locations on UNIX systems • SLP log—Install_Home/cimom /cfg/slp.log • SLP daemon—Install_Home/cimom /cfg/slp.conf You can reconfigure the SLP daemon by modifying this file. •...

  • Page 280: Home Tab

    SMI Agent configuration Verifying SLP service installation and operation on Windows systems 1. Launch the Server Management Console from the Start menu. 2. Click Start to start the SLP service. 3. Open a command window. 4. Type cd c:\Install_Home\cimom \bin and press Enter to change to the directory where slpd.bat is located.

  • Page 281: Authentication

    SMI Agent configuration Accessing Management application features To access Management application features such as, fabric and host discovery, role-based access control, application configuration and display options, server properties, as well as the application name, build, and copyright, complete the following steps. 1.

  • Page 282

    SMI Agent configuration 1. Click the Authentication tab. FIGURE 87 Authentication tab 2. Select the Enable Client Mutual Authentication check box, as needed. If the check box is checked, CIM client mutual authentication is enabled. If the check box is clear (default), client mutual authentication is disabled.

  • Page 283: Cimom Configuration

    SMI Agent configuration 1. Click the Authentication tab. 2. Choose from one of the following options: • Select No Authentication to allow the CIM client to query the CIMOM server without providing credentials; however, note that the CIMOM server requires the Management application credentials to connect to the Management application server to retrieve the required data.

  • Page 284

    SMI Agent configuration Configuring the SMI Agent port number To configure the SMI Agent port number, complete the following steps. 1. Click the CIMOM tab. FIGURE 88 CIMOM tab 2. Select or clear the Enable SSL check box, to enable or disable SSL for the SMI Agent. NOTE Disabling SSL will disable Indication and Client Mutual Authentication.

  • Page 285

    SMI Agent configuration 4. Click Apply. NOTE Changes on this tab take effect after the next CIMOM server restart. NOTE You can only restart the server using the Server Management Console (Start > Programs > Management_Application_Name 11.X.X > Server Management Console). If you disabled SSL, a confirmation message displays.

  • Page 286

    SMI Agent configuration Configuring the CIMOM log NOTE You must have SAN - SMI Operation Read and Write privileges to view or make changes on the CIMOM tab. To configure the CIMOM log, complete the following steps. 1. Click the CIMOM tab. 2.

  • Page 287: Certificate Management

    SMI Agent configuration Certificate management NOTE You must have SMI Operation Read and Write privileges to view or make changes on the Certificate Management tab. The Certificate Management tab enables you to manage your CIM client and Indication authentication certificates. Using this tab, you can perform the following operations: •...

  • Page 288

    SMI Agent configuration 5. Click Import. The new certificate displays in the Certificates list and text box. If the certificate location is not valid, an error message displays. Click OK to close the message and reenter the full path to the certificate location. If you did not enter a certificate name, an error message displays.

  • Page 289: Viewing The Configuration Summary

    SMI Agent configuration Deleting a certificate NOTE You must have SMI Operation Read and Write privileges to view or make changes to the Certificate Management tab. To delete a certificate, complete the following steps. 1. Click the Certificate Management tab. 2.

  • Page 290

    SMI Agent configuration 1. Click the Summary tab. FIGURE 90 Summary tab 2. Review the summary. NOTE When the CIMOM server is stopped, the server configuration information does not display on the Summary tab. The following information is included in the summary. Field/Component Description Client Mutual Authentication...

  • Page 291

    SMI Agent configuration Field/Component Description Log Level Displays the log level for the Server Configuration and the Current Configuration. Options include the following: • 10000—Off • 1000—Severe • 900—Warning • 800—Info (default) • 700—Config • 500—Fine • 400—Finer • 300—Finest •...

  • Page 292

    SMI Agent configuration Brocade Network Advisor SAN User Manual 53-1002167-01...

  • Page 293: Configuration Repository Management, In This Chapter

    Chapter SAN Device Configuration In this chapter • Configuration repository management ......249 •...

  • Page 294: Saving Switch Configurations

    Configuration repository management Saving switch configurations NOTE Save switch configuration is only supported on Fabric OS switches. NOTE To save switch configuration on more than one switch at a time, you must have the Enhanced Group Management license. Configuration files are uploaded from the selected switches and stored in individual files. Files are named with the convention cfg_fabricName_switchName_domainID.

  • Page 295: Restoring A Switch Configuration For A Selected Device

    Configuration repository management Restoring a switch configuration for a selected device The Restore Switch Configuration dialog box enables you to download a previously saved switch configuration to a selected device. To restore a switch configuration, complete the following steps. 1. Right-click a device in the Product List or the Connectivity Map, and select Configuration > Restore.

  • Page 296: Backing Up A Switch Configuration

    Configuration repository management Backing up a switch configuration NOTE The Enhanced Group Management (EGM) license must be activated on a switch to perform this procedure and to use the supportSave module. If a periodic backup is scheduled at the SAN level, that backup will apply to all switches from all fabrics discovered.

  • Page 297

    Configuration repository management 3. Set the Schedule parameters. These include the following: The desired Frequency for backup operations (daily, weekly, monthly). The Day you want back up to run. If Frequency is Daily, the Day list is grayed out. If Frequency is Weekly, choices are days of the week (Sunday through Saturday). If Frequency is Monthly, choices are days of the month (1 through 31).

  • Page 298: Restoring A Configuration From The Repository

    Configuration repository management Restoring a configuration from the repository If you delete a fabric or switch from discovery, the configuration remains in the repository until you delete it manually. Stored configurations are linked to the switch WWN; therefore, if the IP address or switch name is changed and then rediscovered, the Switch Configuration Repository dialog box displays the new switch name and IP address for the old configuration.

  • Page 299: Viewing Configuration File Content

    Configuration repository management Viewing configuration file content NOTE This feature requires a Trial or Licensed version. You can view switch configuration file content in a text file. 1. Right-click a device in the Product List or the Connectivity Map, and select Configuration > Configuration Repository.

  • Page 300: Searching The Configuration File Content

    Configuration repository management Searching the configuration file content NOTE This feature requires a Trial or Licensed version. To search the configuration file content, complete the following steps. 1. Right-click a device in the Product List or the Connectivity Map, and select Configuration > Configuration Repository.

  • Page 301: Deleting A Configuration, Exporting A Configuration, Importing A Configuration

    Configuration repository management Deleting a configuration NOTE This feature requires a Trial or Licensed version. 1. Right-click a device in the Product List or the Connectivity Map, and select Configuration > Configuration Repository. The Switch Configuration Repository dialog box displays. 2.

  • Page 302: Keeping A Copy Past The Defined Age Limit, Replicating Configurations, Replicating Security Configurations

    Configuration repository management Keeping a copy past the defined age limit NOTE This feature requires a Trial or Licensed version. 1. Right click a device in the Product List or the Connectivity Map, and select Configuration > Configuration Repository. The Switch Configuration Repository dialog box displays. 2.

  • Page 303: Enhanced Group Management, Firmware Management

    Enhanced group management Enhanced group management Use Enhanced Group Management (EGM), a separate licensed feature, to control access to specific features on Fabric OS devices. The features affected include the following: • Firmware Download - enables you to perform group firmware download. For specific instructions for firmware download, refer to “Firmware management”...

  • Page 304: Displaying The Firmware Repository

    Firmware management Displaying the firmware repository The firmware repository is available on the Firmware Management dialog box. The Management application supports .zip and .gz compression file types for firmware files. 1. Select Configure > Firmware Management. The Firmware Management dialog box displays. 2.

  • Page 305: Importing A Firmware File And Release Notes, Deleting A Firmware File

    Firmware management Importing a firmware file and release notes Firmware files and release notes can be imported into the Firmware Repository. 1. Select Configure > Firmware Management. The Firmware Management dialog box displays. 2. Select the Repository tab (Figure 97). 3.

  • Page 306: Download Firmware

    Firmware management Download firmware NOTE Non-disruptive firmware download (HCL) is not supported when downgrading from Fabric OS version 6.2 to 6.1. You must remove all non-default logical switches and disable Virtual Fabrics before downgrading. NOTE You cannot use Fabric OS firmware download with command line options in the Management application.

  • Page 307

    Firmware management 6. To download the firmware to the selected switches one at a time, select the Serial download check box. Use the Up and Down buttons to determine the order in which the firmware is downloaded to the switches. If firmware download fails on one switch, all other switches in the queue will be skipped.

  • Page 308: Properties, Viewing Fabric Properties

    Properties Properties You can customize the device and fabric Properties dialog boxes to display only the data you need by adding, editing, and deleting property labels. You can also edit property fields to change information. Viewing Fabric properties To view the properties for a fabric, complete the following step. 1.

  • Page 309: Viewing Device Properties

    Properties Viewing device properties To view the properties for a device or, complete the following step. 1. Right-click any product icon and select Properties. The Properties dialog box displays, with information related to the selected device (such as, switches, directors, HBAs, trunks, tunnels, and nodes). Depending on the device type, some of the properties listed in the following table may not be available for all products.

  • Page 310

    Properties TABLE 17 Device properties (Continued) Field/Component Description IP Address The device’s IP address. IPSec Policy # The IPSec policy number. Also includes the following information: • Authentication Algorithm • Encryption Algorithm • SA Life L2 Capable Whether the device is Layer 2 capable. L3 Capable Whether the device is Layer 3 capable.

  • Page 311

    Properties TABLE 17 Device properties (Continued) Field/Component Description State The device’s state, for example, online or offline. Status The operational status. Switch Name The switch name. Switch IP The switch IP address. Switch WWN The switch world wide name. Tape Pipelining Whether tape pipelining is On or Off for the FCIP tunnel.

  • Page 312: Adding A Property Label, Editing A Property Label

    Properties Adding a property label You can add a new field to any of the tabs on the Properties dialog box. To add a new field, complete the following steps. 1. Right-click any product icon and select Properties. The Properties dialog box displays. 2.

  • Page 313: Deleting A Property Label, Editing A Property Field

    Properties Deleting a property label You can delete any label that you created on any of the tabs from the Properties dialog box. To delete a label, complete the following steps. 1. Right-click any product icon and select Properties. The Properties dialog box displays. 2.

  • Page 314: Ports, Viewing Port Connectivity

    Ports Ports You can enable and disable ports, as well as view port details, properties, type, status, and connectivity. Viewing port connectivity The connected switch and switch port information displays for all ports. To view port connectivity, choose one of the following steps: •...

  • Page 315

    Ports The following table details the information located (in alphabetical order) on the Port Connectivity View dialog box. TABLE 18 Port connectivity properties Field Description Actual Distance The actual distance for -end port connectivity. Area ID /Port Index The area ID and the port index of the port. Blade Number The number of the blade.

  • Page 316

    Ports TABLE 18 Port connectivity properties (Continued) Field Description Device Port/Switch Name The device port and switch name. Device Port/Switch State The device port and switch state. Device Port/Switch Manufacturer The device port and manufacturer of the switch. Device Port/Switch Manufacturing Plant The device port and switch manufacturing plant.

  • Page 317: Refreshing The Port Connectivity View, Enabling A Port, Disabling A Port

    Ports TABLE 18 Port connectivity properties (Continued) Field Description Switch IDID Whether the switch’s insistent domain ID (IDID) is enabled. If it is enabled, the IDID is the same ID that is requested during switch reboots, power cycles, CP failovers, firmware downloads, and fabric reconfiguration.

  • Page 318: Filtering Port Connectivity

    Ports Filtering port connectivity To filter results from the port connectivity view, complete the following steps. 1. Click the Filter link from the Port Connectivity View dialog box The Filter dialog box displays (Figure 101). FIGURE 101 Filter dialog box 2.

  • Page 319: Viewing Port Details

    Ports Resetting the filter Reset immediately clears all existing definitions. You cannot cancel the reset. To reset the Filter dialog box, complete the following steps. 1. Click the Filter link from the Port Connectivity View dialog box. The Filter dialog box displays. 2.

  • Page 320: Viewing Ports And Port Properties

    Ports Viewing ports and port properties To view ports on the Connectivity Map, right-click a product icon and select Show Ports. NOTE Show Ports is not applicable when the map display layout is set to Free Form (default). NOTE This feature is only available for connected products. On bridges and CNT products, only utilized Fibre Channel ports display;...

  • Page 321

    Ports Depending on the port type, some of the following properties (Table 19) may not be available for all products. TABLE 19 Port properties Field Description # Virtual Session Ports The number of virtual session ports associated with the GE port. Additional Port Info Additional error information relating to the selected port.

  • Page 322

    Ports TABLE 19 Port properties (Continued) Field Description MAC Address The Media Access Control address assigned to a network adapters or network interface cards (NICs). Manufacturer Plant The name of the manufacturer plant. Modify button Click to launch the Element Manager. Model The model number of the device.

  • Page 323: Port Types, Showing Connected Ports

    Ports TABLE 19 Port properties (Continued) Field Description Vendor The product vendor. Virtual FCoE Port Count The number of FC ports on the device. Port types On the Connectivity Map, right-click a switch icon and select Show Ports. The port types display showing which ports are connected to which products.

  • Page 324: Viewing Port Connection Properties

    Ports Viewing port connection properties You can view the information about products and ports on both sides of the connection. 1. Right-click the connection between two end devices on the Connectivity Map and select Properties. Double-click the connection between two devices on the Connectivity Map. The Connection Properties dialog box displays.

  • Page 325

    Ports TABLE 21 Port connection properties (Continued) Field Description 2-WWPN The world wide port number of the second switch. 2-MAC Address The MAC address of the second switch. 2-IP Address The IP address of the second switch. 2-Trunk Whether there is a trunk on the second switch. 2-Speed (Gbps) The speed of the second switch.

  • Page 326

    Ports TABLE 21 Port connection properties (Continued) Field Description Name The name of the switch. NPIV Enabled Whether the NPIV port is enabled. Parameter The parameter of the switch. Physical/Logical Whether the port is a physical port or a logical port. PID Format The port ID format of the switch.

  • Page 327: Determining Inactive Iscsi Devices, Determining Port Status

    Ports Determining inactive iSCSI devices For router-discovered iSCSI devices, you can view all of the inactive iSCSI devices in one list. To do this, use the Ports Only view and then sort the devices by FC Address. The devices that have an FC address of all zeros are inactive.

  • Page 328: Viewing Port Optics

    Ports Viewing port optics NOTE QSFP ports do not display in the Port Optics dialog box. To view port optics, complete the following steps. 1. Right-click the switch for which you want to view port optic information on the Connectivity Map and select Port Optics (SFP).

  • Page 329

    Ports Status icons: Warning icon—One of the five parameters exceeds the threshold of that parameter.  The corresponding parameter field displays with a yellow background. No icon—No parameters exceed the threshold of that parameter.  Unknown icon—The port is not a 16 Gbps capable port or the device is running ...

  • Page 330: Port Auto Disable

    Port Auto Disable 3. Sort the results by clicking on the column header. 4. Rearrange the columns by dragging and dropping the column header. 5. Click Close to close the Port Optics (SFP) dialog box. Refreshing port optics To refresh port optics, click Refresh. The Management application retrieves updated port optic information.

  • Page 331: Viewing The Port Auto Disable Status

    Port Auto Disable Viewing the port auto disable status NOTE The device must be running Fabric OS 6.3 or later. To view the port auto disable status, complete the following steps. 1. Select Configure > Port Auto Disable. The Port Auto Disable dialog box displays. FIGURE 105 Port Auto Disable dialog box 2.

  • Page 332: Configuring Port Auto Disable Triggers

    Port Auto Disable • Loss of Sync—Whether the Loss of Sync event is enabled or disabled in port auto disable. • Loss of Signal—Whether the Loss of Signal event is enabled or disabled in port auto disable. • OLS—Whether the Offline Primitive Sequence event is enabled or disabled in port auto disable.

  • Page 333: Enabling Port Auto Disable On Individual Ports

    Port Auto Disable 6. Select one or more of the following event types: • Port Auto Disable • Loss Of Sync—Requires devices running Fabric OS 7.0 or later. • Loss Of Signal—Requires devices running Fabric OS 7.0 or later. • OLS (Offline Primitive Sequence)—Requires devices running Fabric OS 7.0 or later.

  • Page 334: Enabling Port Auto Disable On All Ports On A Device

    Port Auto Disable Enabling port auto disable on all ports on a device NOTE The device must be running Fabric OS 6.3 or later. To enable port auto disable on all ports on a device, complete the following steps. 1. Select Configure > Port Auto Disable. The Port Auto Disable dialog box displays.

  • Page 335: Disabling Port Auto Disable On All Ports On A Device

    Port Auto Disable 6. Clear any of the following selected event types. • Port Auto Disable • Loss Of Sync—Requires devices running Fabric OS 7.0 or later. • Loss Of Signal—Requires devices running Fabric OS 7.0 or later. • OLS (Offline Primitive Sequence)—Requires devices running Fabric OS 7.0 or later. •...

  • Page 336: Unblocking Ports

    Port Auto Disable Unblocking ports NOTE The device must be running Fabric OS 6.3 or later. To unblock ports, complete the following steps. 1. Select Configure > Port Auto Disable. The Port Auto Disable dialog box displays. 2. Select the fabric on which you want to enable port auto disable (PAD) from the Fabric list. 3.

  • Page 337: Host Port Mapping Overview, In This Chapter

    Chapter Host Port Mapping In this chapter • Host port mapping overview ........293 •...

  • Page 338: Creating A New Host, Renaming An Hba Host

    Creating a new Host Creating a new Host To create a new Host, complete the following steps. 1. Right-click an HBA icon and select Host Port Mapping. The Host Port Mapping dialog box displays. FIGURE 106 Host Port Mapping dialog box 2.