Page of 662
Download Table of ContentsContents Print This PagePrint Bookmark

HP Brocade BladeSystem 4/12 User Manual

Dcfm professional user manual (53-1001773-01, june 2010.
Hide thumbs
   
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662
53-1001773-01
®
14 April 2010
DCFM Professional
User Manual
Supporting DCFM 10.4.X

Advertising

   Also See for HP Brocade BladeSystem 4/12

   Related Manuals for HP Brocade BladeSystem 4/12

   Summary of Contents for HP Brocade BladeSystem 4/12

  • Page 1

    53-1001773-01 ® 14 April 2010 DCFM Professional User Manual Supporting DCFM 10.4.X...

  • Page 2: Document History

    Copyright © 2008-2010 Brocade Communications Systems, Inc. All Rights Reserved. Brocade, the B-wing symbol, BigIron, DCX, Fabric OS, FastIron, IronPoint, IronShield, IronView, IronWare, JetCore, NetIron, SecureIron, ServerIron, StorageX, and TurboIron are registered trademarks, and DCFM, Extraordinary Networks, and SAN Health are trademarks of Brocade Communications Systems, Inc., in the United States and/or in other countries.

  • Page 3

    DCFM Professional User Manual 53-1001773-01...

  • Page 4

    DCFM Professional User Manual 53-1001773-01...

  • Page 5: Table Of Contents

    Contents About This Document In this chapter ......... . xxiii How this document is organized .

  • Page 6: Table Of Contents

    Management server and client ......14 Logging into a server ........16 Launching a remote client.

  • Page 7: Table Of Contents

    Chapter 3 Application Configuration In this chapter ......... . . 57 Data backup .

  • Page 8: Table Of Contents

    Security ..........81 Configuring the server name .

  • Page 9: Table Of Contents

    Chapter 5 Third-party tools In this chapter ......... .115 About third-party tools .

  • Page 10: Table Of Contents

    Firmware management........138 Displaying the firmware repository ..... .138 Importing a firmware file and release notes .

  • Page 11: Table Of Contents

    Chapter 8 Fault Management In this chapter ......... .173 Fault management overview .

  • Page 12: Table Of Contents

    Registering the management server ....205 Registering a different Management application server..205 Removing a host server .......206 Enabling trap forwarding .

  • Page 13: Table Of Contents

    Chapter 11 Host management In this chapter ......... .231 About host management .

  • Page 14: Table Of Contents

    Open systems tape pipelining ......255 FCIP Fastwrite and Tape Acceleration ....255 FICON emulation features .

  • Page 15: Table Of Contents

    Chapter 13 Fibre Channel over Ethernet In this chapter ......... .283 FCoE overview .

  • Page 16: Table Of Contents

    LLDP-DCBX configuration ....... . . 316 Configuring LLDP for FCoE ......316 Adding an LLDP profile .

  • Page 17: Table Of Contents

    Steps for connecting to an RKM appliance ....352 Exporting the KAC certificate signing request (CSR) ..352 Submitting the CSR to a certificate authority .

  • Page 18: Table Of Contents

    Configuring hosts for encryption targets .....401 Adding target disk LUNs for encryption ..... .402 Remote replication LUNs.

  • Page 19: Table Of Contents

    Chapter 15 Zoning In this chapter ......... .441 Zoning overview.

  • Page 20: Table Of Contents

    Zoning administration........466 Comparing zone databases......466 Managing zone configuration comparison alerts .

  • Page 21: Table Of Contents

    Appendix A Application menus In this appendix .........495 Main menus.

  • Page 22: Table Of Contents

    Appendix D Sybase and Derby Database Fields In this appendix .........533 Database tables and fields .

  • Page 23: About This Document, How This Document Is Organized

    About This Document In this chapter • How this document is organized ....... . . xxiii •...

  • Page 24: Supported Hardware And Software

    • Chapter 15, “Zoning,” provides zoning configuration instructions. • Chapter 16, “Troubleshooting,” provides troubleshooting details. • Appendix D, “Sybase and Derby Database Fields,”provides reference information related to databases. Supported hardware and software In those instances in which procedures or parts of procedures documented here apply to some switches but not to others, this guide identifies exactly which switches are supported and which are not.

  • Page 25

    TABLE 1 Supported Hardware Device Name Terminology used in documentation Brocade 5470 embedded switch 8 Gbps 24-port Embedded Switch Brocade 5480 embedded switch 8 Gbps 24-port Embedded Switch Brocade 7500 Extension switch 4 Gbps Router, Extension Switch Brocade 7500E Extension switch 4 Gbps Extension Switch FR4-18i Blade 4 Gbps Router, Extension blades...

  • Page 26

    TABLE 1 Supported Hardware Device Name Terminology used in documentation Brocade Encryption Switch 8 Gbps Encryption Switch FS8-18 Encryption Blade Encryption Blade FA4-18 Application Platform Blade Application Platform Blade FC8-16 Blade FC 8 GB 16-port Blade FC8-32 Blade FC 8 GB 32-port Blade FC8-48 Blade FC 8 GB 48-port Blade FC10-6 Blade...

  • Page 27

    • Added topic - VMware vCenter plug in • Added topic SMIA Configuration tool • Added procedure - Exporting storage port mapping • Added procedure - Copying technical support information to an external FTP server • Added procedure - Setting up advanced event filtering for the Master Log •...

  • Page 28

    • Changed procedure - Viewing the list of users • Changed procedure - Assigning a user to a resource group • Changed procedure - Removing a user from a resource group • Changed procedure - Activating a PDCM configuration • Changed topic - Cascaded FICON fabric •...

  • Page 29: Document Conventions, Key Terms

    Document conventions This section describes text formatting conventions and important notice formats used in this document. Text formatting The narrative-text formatting conventions that are used are as follows: bold text Identifies command names Identifies the names of user-manipulated GUI elements Identifies keywords and operands Identifies text to enter at the GUI or CLI italic text...

  • Page 30: Additional Information

    Notice to the reader This document may contain references to the trademarks of the following corporations. These trademarks are the properties of their respective companies and corporations. These references are made for informational purposes only. Corporation Referenced Trademarks and Products Linus Torvalds Linux Microsoft Corporation...

  • Page 31

    Other industry resources For additional resource information, visit the Technical Committee T11 Web site. This Web site provides interface standards for high-performance and mass storage applications for Fibre Channel, storage management, and other applications: http://www.t11.org For information about the Fibre Channel industry, visit the Fibre Channel Industry Association Web site: http://www.fibrechannel.org Getting technical help...

  • Page 32: Document Feedback

    • Brocade 48000—Inside the chassis next to the power supply bays • Brocade DCX and DCX-4S—On the bottom right on the port side of the chassis 4. World Wide Name (WWN) Use the wwn command to display the switch WWN. If you cannot use the wwn command because the switch is inoperable, you can get the WWN from the same place as the serial number, except for the Brocade DCX.

  • Page 33: In This Chapter, User Interface Components

    Chapter Getting Started In this chapter • User interface components ........1 •...

  • Page 34

    User interface components FIGURE 1 Main Window 1. Menu Bar. Lists commands you can perform on the SAN. 2. Toolbar. Provides buttons that enable quick access to dialog boxes and functions. 3. SAN tab. Displays the Master Log, Minimap, Connectivity Map (topology), and Product List. For more information, refer to the “SAN tab”.

  • Page 35: Menu Bar, Toolbar

    User interface components 8. Toolbox. Provides tools for viewing the Connectivity Map as well as exporting the Connectivity Map as an image. Does not display until you discover a fabric. 9. Master Log. Displays all events that have occurred on the SAN. 10.

  • Page 36: View All List

    User interface components 11. Port Label. Use to set the port label for the devices in the Connectivity Map. 12. Product List Search. Use to search for a device in the product list. 13. Help. Displays the Online Help. SAN tab The SAN tab displays the Master Log, Utilization Legend, Minimap, Connectivity Map (topology), and Product List.

  • Page 37: Port Display Buttons, Product List

    User interface components Port Display buttons The Port Display buttons (Figure 4) are located at the top right of the Product List and enable you to configure how ports display. You have the option of viewing connected (or occupied) product ports, unoccupied product ports, or attached ports.

  • Page 38: Connectivity Map

    User interface components • Domain ID. Displays the Domain ID for the product in the format xx(yy), where xx is the normalized value and yy is the actual value on the wire. • FC Address. Displays the Fibre Channel address of the port. •...

  • Page 39: Toolbox, Master Log

    User interface components Toolbox The toolbox (Figure 5) is located at the top right side of the View window and provides tools to export the topology, to zoom in and out of the Connectivity Map, collapse and expand groups, and fit the topology to the window.

  • Page 40

    User interface components • Count. The number of times the event occurred. • Module Name. The name of the module on which the event occurred. • Message ID. The message ID of the event. • Contributor. The name of the contributor on which the event occurred. •...

  • Page 41: Minimap

    User interface components Minimap The Minimap, which displays in the lower right corner of the main window, is useful for getting a bird’s-eye view of the SAN, or to quickly jump to a specific place on the Connectivity Map. To jump to a specific location on the Connectivity Map, click that area on the Minimap.

  • Page 42: Status Bar

    User interface components Status bar The status bar (Figure 7) displays at the bottom of the main window. The status bar provides a variety of information about the SAN and the application. The icons on the status bar change to reflect different information, such as the current status of products, fabrics, and backup.

  • Page 43: Icon Legend, Product Icons

    Icon legend Icon legend Various icons are used to illustrate devices and connections in a SAN. The following tables list icons that display on the Connectivity Map and Product List. Product icons The following table lists the manageable SAN product icons that display on the topology. Fabric OS manageable devices display with blue icons and M-EOS manageable devices display with green icons.

  • Page 44: Group Icons, Port Icons, Product Status Icons

    Icon legend Group icons The following table lists the manageable SAN product group icons that display on the topology. Icon Description Icon Description Switch Group Host Group Storage Group Unknown Fabric Group Unmanaged Fabric Group Chassis Group Port icons The following table lists the port status icons that display in the Product List. Icon Description Occupied FC Port...

  • Page 45: Event Icons

    Icon legend Icon Status Device Removed/Missing Down/Failed Routed In Routed Out Unknown/Link Down Event icons The following table lists the event icons that display on the topology and Master Log. For more information about events, refer to “Fault Management” on page 173. Event Icon Description Informational...

  • Page 46: Management Server And Client

    Management server and client Management server and client The Management application has two parts: the Server and the Client. The Server is installed on one machine and stores SAN-related information; it does not have a user interface. To view SAN information through a user interface, you must log in to the Server through a Client.

  • Page 47

    Management server and client TABLE 2 Ports Port Number Ports Transport Description Communication Path Open in Firewall 24605 jboss.jrmp.invoker.port - port 5 RMI/JRMP invoker port Client–Server 24606 jboss.pooled.invoker.port - port 6 Pooled invoker port Client–Server 24607 jboss.connector.socket.port - port 7 Socket invoker port Server 24608...

  • Page 48: Logging Into A Server, Launching A Remote Client

    Management server and client Logging into a server You must log into a Server to monitor a SAN. NOTE You must have an established user account on the Server to log in. To log into a server, complete the following steps. 1.

  • Page 49: Clearing Previous Versions Of The Remote Client, Launching The Configuration Wizard

    Management server and client 4. Select or clear the Save password check box to choose whether you want the application to remember your password the next time you log in. 5. Click Login. 6. Click OK on the Login Banner dialog box. The Management application displays.

  • Page 50

    Management server and client 4. Select Internal FTP Server or External FTP Server on the FTP Server screen and click Next. If port 21 is busy, a message displays. Click OK to close the message and continue. Once the Management application is configured make sure port 21 is free and restart the Server to start the FTP service.

  • Page 51

    Management server and client If you select a specific IP address from the Server IP Configuration screen and the selected IP address changes, you will not be able to connect to the server. To change the IP address, refer to “Configuring an explicit server IP address”...

  • Page 52

    Management server and client Complete the following steps on the SMI Agent Configuration screen. FIGURE 12 SMI Agent Configuration screen a. Enable the SMI Agent by selecting the Enable SMI Agent check box. b. Enable the SLP by selecting the Enable SLP check box. Enable the SSL by selecting the Enable SSL check box.

  • Page 53: Changing Your Password, Changing The Database User Password

    Management server and client Changing your password To change your password, complete the following steps. 1. Double-click the desktop icon or open from the Start menu. The Log In dialog box displays. FIGURE 13 Log In dialog box 2. Enter your user name and password. The defaults are Administrator and password, respectively.

  • Page 54: Viewing Active Sessions, Disconnecting Users

    Management server and client If the current password and new password are the same, the following message displays: Old and New passwords cannot be same. Use different password and try again. Press any key to continue. If the new password and confirm password do not match, the following message displays: New password and confirm password do not match.

  • Page 55: Viewing Server Properties, Viewing Port Status

    Management server and client Viewing server properties To view the Management application server properties, complete the following steps. 1. Select Server > Server Properties. The Server Properties dialog box displays (Figure 15). FIGURE 15 Server Properties dialog box 2. Click Close. Viewing port status You can view the port status for the following ports: •...

  • Page 56

    Management server and client The status options are as follows: • Success—The port is listening or bound to the server. • Failed—The port fails to listen or bind to the server. • Disabled (FTP port only)—only displays when the FTP server is external. This is considered a normal status.

  • Page 57: Entering The License Key, Upgrading The Application

    Management server and client Entering the license key A license key is required to run the application. The key specifies the expiration date of a trial license, as well as the number of ports allowed. NOTE You are not required to enter a license key for a trial license. If you do not enter the license key during installation of Professional Plus or Enterprise editions, you can use the application, including all of its features, for a trial period of 75 days.

  • Page 58: Installing A Patch

    Management server and client 2. Enter the license key (on the Key Certificate) in the License Key field and click Update. 3. Click OK on the message. The Client closes after updating the license successfully. Restart the Server, Client and Server Management Console for the changes to take effect.

  • Page 59: Uninstalling A Patch

    Management server and client 4. Browse to the patch file. The patch zip file uses the following naming convention: Management_Application_Name-Major_Version-Minor_Version-Revision_Number-patch-Patch _Version.zip (for example Management_Application_Name-10-4-0-patch-a.zip). 5. Click Upgrade. If the patch process is interrupted (for example, loss of power), you must restart the patch process.

  • Page 60

    Management server and client 5. Go to the location of the first artifact (as shown in the src value under the file tag). 6. Copy the artifact from the extracted folder to the source folder in the Install_Home/patch-backup directory. Repeat step 5 and 6 for all artifacts listed in the restore.xml folder. 8.

  • Page 61: Feature-to-firmware Requirements

    Feature-to-firmware requirements Feature-to-firmware requirements Use the following table to determine whether the Management application features are only available with a specific version of the Fabric OS firmware, M-EOS firmware, or both, as well as if there are specific licensing requirements. Feature Fabric OS M-EOS...

  • Page 62

    Feature-to-firmware requirements Feature Fabric OS M-EOS Meta SAN Requires Fabric OS 5.2 or later for FC router and Not available. router domain ID configuration. Requires Fabric OS 6.0 or later in a mixed Fabric OS and M-EOS fabric. Requires Integrated Routing license. Performance Requires Fabric OS 5.0 or later for FC_ports, Requires M-EOS and M-EOSn 9.6.X or later for...

  • Page 63: Accessibility Features For The Management Application, Keyboard Shortcuts

    Accessibility features for the Management application Accessibility features for the Management application Accessibility features help users who have a disability, such as restricted mobility or limited vision, to use information technology products successfully. The following list includes the major accessibility features in the Management application: •...

  • Page 64: Look And Feel

    Accessibility features for the Management application Look and Feel You can configure the Management application to mimic your system settings as well as define the size of the font. ‘Look’ refers to the appearance of graphical user interface widgets and ‘feel’ refers to the way the widgets behave.

  • Page 65

    Accessibility features for the Management application Changing the font size The Options dialog box enables you to change the font size for all components including the Connectivity map of the Management application interface. Font size changes proportionately in relation to the system resolution. For example, if the system resolution is 1024 x 768, the default font size would be 8 and large font size would be 10.

  • Page 66

    Accessibility features for the Management application DCFM Professional User Manual 53-1001773-01...

  • Page 67: Fabric Discovery Overview, In This Chapter

    Chapter Discovery In this chapter • Fabric discovery overview ........35 •...

  • Page 68

    Fabric discovery overview NOTE Professional edition can discover, but not manage M-EOS devices or the Backbone chassis. Use the device’s Element Manager, which can be launched from the Connectivity Map, to manage the device. This device cannot be used as a Seed switch. DCFM Professional User Manual 53-1001773-01...

  • Page 69: Fcs Policy And Seed Switches, Discovering Fabrics

    Fabric discovery overview FCS policy and seed switches The Management application requires that the seed switch is the primary Fabric Content Service (FCS) switch at the time of discovery. Setting time on the fabric will set the time on the primary FCS switch, which will then distribute the changes to other switches.

  • Page 70

    Fabric discovery overview FIGURE 17 Discover Setup dialog box 2. Click Add Fabric to specify the IP addresses of the devices you want to discover. The Address Properties dialog box displays. FIGURE 18 Address Properties dialog box (IP Address tab) 3.

  • Page 71

    Fabric discovery overview NOTE Professional edition can discover only 1 fabric. 5. (Fabric OS devices only) Enter the user ID and password for the switch in the User ID and Password fields. DCFM Professional User Manual 53-1001773-01...

  • Page 72

    Fabric discovery overview 6. Click the SNMP tab (Figure 19). FIGURE 19 Address Properties dialog box (SNMP - v1 tab) Enter the duration (in seconds) after which the application times out in the Time-out (sec) field. 8. Enter the number of times to retry the process in the Retries field. 9.

  • Page 73: Configuring Snmp Credentials

    Fabric discovery overview 16. Enter a context name In the Context Name field. 17. Select the authorization protocol in the Auth Protocol field. 18. Enter the authorization password in the Auth Password field. • If you selected Configure for 256-Port_Director_Name, go to step 21. •...

  • Page 74: Reverting To A Default Snmp Community String

    Fabric discovery overview FIGURE 21 Address Properties dialog box (SNMP Tab - v3) 11. Enter a user name in the User Name field. 12. Enter a context name In the Context Name field. 13. Select the authorization protocol in the Auth Protocol field. 14.

  • Page 75: Deleting A Fabric, Host Discovery, Discovering Hosts By Ip Address Or Hostname

    Host discovery Deleting a fabric If you decide you no longer want the Management application to discover and monitor a specific fabric, you can delete it. Deleting a fabric also deletes the fabric data on the server (both system collected and user-defined data) except for user-assigned names for the device port, device node, and device enclosure information.

  • Page 76: Importing Hosts From A Csv File

    Host discovery 3. Enter a discovery request name (such as, Manual 06/12/2009) in the Name field. 4. Select Network Address from the list. 5. Enter the IP address (IPv4 or IPv6 formats) or hostname in the Network Address field. 6. Click Add. The IP address or hostname of the Host displays in the text box.

  • Page 77: Importing Hosts From A Fabric

    Host discovery 4. Browse to the CSV file location. The CSV file must meet the following requirements: • Comma separated IP address or host names • No commas within the values • No escaping supported For example, XX.XX.XXX.XXX, XX.XX.X.XXX, computername.company.com 5.

  • Page 78: Configuring Brocade Hba Credentials

    Host discovery 3. Enter a discovery request name (such as, MyFabric) in the Name field. 4. Select Hosts in Fabric from the list. 5. Select All fabrics or an individual fabric from the list. 6. Click Add. All hosts which are part of a managed fabric and have a registered host name display in the text box.

  • Page 79: Configuring Virtual Machine Credentials

    Host discovery 5. Select the Discover Brocade HBAs in the hosts check box, if necessary. 6. Enter the HCM Agent port number in the Brocade HBAs - Port field if necessary. Enter your username and password in the appropriate fields. 8.

  • Page 80: Editing Host Credentials

    Host discovery 10. Enter your username and password in the appropriate fields. 11. Click OK on the Add Host Discovery dialog box. If an error occurs, a message displays. Click OK to close the error message and fix the problem. A Host Group displays in Discovered Addresses table with pending status.

  • Page 81: Removing A Host From Discovery, Viewing The Discovery State

    Viewing the discovery state Removing a Host from Discovery To remove a Host from discovery, complete the following steps. 1. Select Discover > Setup. The Discover Setup dialog box displays. 2. Select the Host you want to remove from discovery. 3.

  • Page 82: Troubleshooting Discovery

    Troubleshooting discovery • Created host structure differs from discovered host; Discovery ignored • Brocade HBA Discovery Failed: HCM Agent connection failed • HCM Agent collection failed Troubleshooting discovery If you encounter discovery problems, complete the following checklist to ensure that discovery was set up correctly.

  • Page 83: Fabric Monitoring, Monitoring Discovered Fabrics

    Fabric monitoring Fabric monitoring NOTE Monitoring is not supported on Hosts. The upper limit to the number of HBA and CNA ports that can be monitored at the same time is 32. The same upper limit applies if switch ports and HBA ports are combined.

  • Page 84: Stop Monitoring Of A Discovered Fabric, Seed Switch

    Seed switch 3. Click Monitor. The monitor function fails if the fabric has user-defined Admin Domains created or if the fabric is merged with another fabric already in the monitored state. 4. Click OK. Stop monitoring of a discovered fabric NOTE Monitoring is not supported on Hosts.

  • Page 85: Seed Switch Requirements, Seed Switch Failover

    Seed switch • The new seed switch is a primary FCS. • The new seed switch is running the latest Fabric OS version in the fabric. This operation preserves historical and configuration data, such as performance monitoring and user-customized data for the selected fabric. ATTENTION If the seed switch firmware is downgraded from Fabric OS 5.2.X to an earlier version, then all RBAC-related data is discarded from the Management application.

  • Page 86: Changing The Seed Switch

    Seed switch Changing the seed switch When you change the seed switch for a fabric, the Management application performs the following checks in the order they are listed: • Identifies all switches and removes those running unsupported firmware version. • Identifies which of the remaining switches are running the latest firmware versions.

  • Page 87

    Seed switch 4. Select a switch to be the new seed switch from the Change Seed Switch dialog box. You can select only one switch. Only switches that are running the latest Fabric OS version in the fabric are displayed. The current seed switch is not displayed in this list. 5.

  • Page 88

    Seed switch DCFM Professional User Manual 53-1001773-01...

  • Page 89: Data Backup, In This Chapter, What Is Backed Up

    Chapter Application Configuration In this chapter • Data backup........... 57 •...

  • Page 90: Management Server Backup

    Data backup Management server backup There are three options for backing up data to the management server: • Configuring backup to a writable CD • Configuring backup to a hard drive • Configuring backup to a network drive The Management Server is backed up to a rewritable (CD-RW) compact disk by default. Make sure you have a CD-RW disk in the CD recorder drive to ensure that backup can occur.

  • Page 91: Configuring Backup To A Writable Cd

    Data backup Configuring backup to a writable CD NOTE This is not recommended on a permanent basis. CDs have a limited life, and may only last a month. An error message occurs if your Management application can no longer back up to the disc. To configure the backup function to a writable CD, complete the following steps.

  • Page 92: Configuring Backup To A Hard Drive

    Data backup 6. Select an interval from the Backup Interval drop-down list to set how often backup occurs. Verify that the CD backup directory is correct (default directory is D:\Backup). It is assumed that drive D is a CD-RW drive. You can change the directory or use the Browse button to select another directory.

  • Page 93: Configuring Backup To A Network Drive

    Data backup Browse to the hard drive and directory to which you want to back up your data. 8. Click Apply or OK. The application verifies that the backup device exists and that the server can write to it. If the device does not exist or is not writable, an error message displays that states you have entered an invalid device.

  • Page 94: Enabling Backup, Disabling Backup

    Data backup Click Browse to choose the network share and directory to which you want to back up your data, or enter the network share and directory path. NOTE You must specify the directory in a network share format (for example, \\network-name\share-name\directory).

  • Page 95: Viewing The Backup Status, Changing The Backup Interval

    Data backup Viewing the backup status The Management application enables you to view the backup status at a glance by providing a backup status icon on the Status Bar. The following table illustrates and describes the icons that indicate the current status of the backup function. Icon Description Backup in Progress—displays the following tooltip: “Backup started at hh:mm:ss, in progress...

  • Page 96: Starting Immediate Backup, Reviewing Backup Events

    Data backup Starting immediate backup NOTE You must have backup privileges to use the Backup Now function. To start the backup process immediately, complete one of the following procedures: Using the Backup Icon, right-click the Backup icon and select Backup Now. 1.

  • Page 97: Data Restore, Restoring Data

    Data restore Data restore NOTE You cannot restore data from a previous version of the Management application. NOTE You cannot restore data from a different edition of the Management application. The Management application helps you to protect your data by backing it up automatically. The data can then be restored, as necessary.

  • Page 98: Restoring Data To A New Server, Display, Resetting Your Display

    Display Restoring data to a new server If your Management application server fails and you must recover information to a new server, restore the data (Refer to “Restoring data” on page 65 for complete instructions). Display You can reset the display to the default settings. Resetting your display You can reset your system to display the default display settings.

  • Page 99: End Node Display, Displaying End Nodes

    End node display End node display The connectivity map can be configured to display or not display end nodes. This option enables you to set the end node display for all newly discovered fabrics. Note that disabling end node display limits the connectivity map to emphasize switch members only. Displaying end nodes To display end nodes when discovering a new fabric, complete the following steps.

  • Page 100: Ethernet Events, Enabling Ethernet Events

    Ethernet events Ethernet events An Ethernet event occurs when the Ethernet link between the Management Server and the managed device is lost. You can configure the application to enable events when the Ethernet connection is lost. Enabling Ethernet events The Options dialog box enables you to configure the Management application to generate an Ethernet event after a device is offline for a specific period of time.

  • Page 101: Disabling Ethernet Events, Event Storage, Configuring Event Storage

    Event storage Disabling Ethernet events To disable Ethernet events, complete the following steps. 1. Select Server > Options. The Options dialog box displays. 2. Select Ethernet Event in the Category list. 3. Clear the Enable Ethernet Event check box. 4. Click Apply or OK to save your work. Event storage You can configure the number of historical events in the repository as well as how long the events will be retained.

  • Page 102: Flyovers, Configuring Flyovers

    Flyovers 3. Select the Purge Events check box. Events are purged at midnight (12:00 AM). For example, when the maximum number of events allowed limit is reached at 3:00 PM, the system purges the older events at midnight that day. 4.

  • Page 103

    Flyovers 5. Select the Product tab (Figure 33) and complete the following steps to select the product properties you want to display on flyover. FIGURE 32 Options dialog box (Flyovers option, Product tab) a. Select each property you want to display in the product flyover from the Available Properties table.

  • Page 104

    Flyovers 6. Select the Connection tab (Figure 33) and complete the following steps to select the information you want to display on flyover. FIGURE 33 Options dialog box (Flyovers option, Connection tab) a. Select the protocol from the Protocol list. The default protocol is Fibre Channel.

  • Page 105: Turning Flyovers On Or Off, Viewing Flyovers

    Flyovers FCoE • • Name Port# • • Node WWN Port Type • • FCoE Index # Click the right arrow to move the selected properties to the Selected Properties table. d. Use the Move Up and Move Down buttons to reorder the properties in the Selected Properties table.

  • Page 106: Names, Setting Names To Be Unique

    Names Names You can use Names as a method of providing familiar simple names to products and ports in your SAN. Using your Management application you can: • Set names to be unique or non-unique. • Fix duplicate names. • Associate a name with a product or port WWN currently being discovered.

  • Page 107: Setting Names To Be Non-unique, Fixing Duplicate Names

    Names Setting names to be non-unique You can choose to allow duplicate names in your fabric. To set names to be non-unique, complete the following steps. 1. Select Server > Options. The Options dialog box displays. 2. Select Names in the Category list. 3.

  • Page 108: Viewing Names, Adding A Name To An Existing Device

    Names 5. Click OK to close the Configure Names dialog box. 6. Click OK on the confirmation message. Viewing names To view names associated with devices by name, complete the following steps. 1. Select Configure > Names. The Configure Names dialog box displays. 2.

  • Page 109: Adding A Name To A New Device, Applying A Name To A Detached Wwn

    Names Adding a name to a new device To add a new device and name it, complete the following steps. 1. Select Configure > Names. The Configure Names dialog box displays. 2. Enter the WWN of the device in the Detached WWN field. 3.

  • Page 110: Editing Names, Exporting Names

    Names 5. Click OK to close the Configure Names dialog box. 6. Click OK on the confirmation message. Editing names To edit the name associated with a device, complete the following steps. 1. Select Configure > Names. The Configure Names dialog box displays. 2.

  • Page 111: Importing Names, Searching For A Device By Name

    Names Importing Names If the name length exceeds the limitations detailed in the following table, you must edit the name (in the CSV file) before import. Names that exceed these limits will not be imported. If you migrated from a previous version, the .properties file is located in the Install_Home\migration\data folder. Device Character limit Fabric OS switch 6.2 or later...

  • Page 112: Searching For A Device By Wwn

    Names 5. Click Search. All devices with the specified name (or partial name) are highlighted in the Display table. You may need to scroll to see all highlighted names. 6. Click OK to close the Configure Names dialog box. Searching for a device by WWN You can search for objects (switch, fabric, product, ports, or N Ports) by WWN (world wide name).

  • Page 113: Security, Configuring The Server Name

    Security Security You can configure the Server Name, CHAP secret value, and login banner, and modify whether or not to allow clients to save passwords. When the login banner is enabled, each time a client connects to the server, the login banner displays with a legal notice provided by you. The client's users must acknowledge the login banner to proceed, otherwise they are logged out.

  • Page 114: Setting The Chap Secret, Configuring Login Security

    Security 5. Re-enter the password in the Retype Secret field. If the secret does not meet the application requirements or the CHAP Secret and Retype Secret entries do not match, an error message displays. Click OK to re-enter the CHAP Secret and Retype Secret values.

  • Page 115: Configuring The Login Banner Display, Disabling The Login Banner

    Security Configuring the login banner display To configure the login banner display, complete the following steps. 1. Select Server > Options. The Options dialog box displays. 2. Select Security Misc in the Category list. 3. Select the Display login banner upon client login check box. 4.

  • Page 116: Software Configuration, Client Export Port

    Software Configuration Software Configuration The Management application allows you to configure the following software settings: • Client export port—A port for communication between the client and server. • Discovery—HTTP or HTTP over SSL when connecting to the switch. • FTP/SCP overview—Internal or external FTP server settings. •...

  • Page 117: Discovery

    Software Configuration 3. Enter the client export port number to set a fixed port number for the client in the Client Export Port field. 4. Click Apply or OK to save your work. NOTE Changes to this option take effect after a client restart. 5.

  • Page 118: Ftp/scp Overview

    Software Configuration 3. Choose one of the following options: • If you want to connect using HTTP, complete the following steps. a. Select the Connect using HTTP option. a. Enter the connection port number in the Port # field. Continue with step •...

  • Page 119

    Software Configuration Configuring an internal FTP server To configure the internal FTP server settings, complete the following steps. 1. Select Server > Options. The Options dialog box displays (Figure 39). FIGURE 39 Options dialog box (FTP/SCP option) 2. Select FTP/SCP in the Category list. 3.

  • Page 120

    Software Configuration Configuring an external FTP server To configure the external FTP server settings, complete the following steps. 1. Select Server > Options. The Options dialog box displays. 2. Select FTP/SCP in the Category list. 3. Select the Use External FTP Server and/or SCP Server option. 4.

  • Page 121

    Software Configuration 9. Click Test to test the FTP server. A “Server running successfully” or an error message displays. If you receive an error message, make sure your credentials are correct, the server is running, the remote directory path exists, and you have the correct access permission; then try again. 10.

  • Page 122: Ip Configuration

    Software Configuration IP Configuration You can configure IP Configuration settings. Configuring IP Configuration settings NOTE The server binds using IPv6 address by default if your Operating System is IPv6-enabled (dual mode or IPv6 only). The server binds using IPv4 address by default if your Operating System is IPv4-enabled.

  • Page 123

    Software Configuration Configuring an explicit server IP address If you selected a specific IP address from the Server IP Configuration screen during installation and the selected IP address changes, you will not be able to connect to the server. To connect to the new IP address, you must manually update the IP address information.

  • Page 124

    Software Configuration 11. Enter your user name and password. The defaults are Administrator and password, respectively. 12. Click Login. 13. Click OK on the Login Banner. DCFM Professional User Manual 53-1001773-01...

  • Page 125: Memory Allocation

    Software Configuration Memory allocation You can configure memory allocation for the client and server to improve performance. You can trigger switch polling when a state changes or you can poll at intervals when no state change occurs. NOTE SAN size is a consideration in selection of polling periods. Configuring memory allocation settings To configure memory allocation settings, complete the following steps.

  • Page 126

    Software Configuration 3. Enter the memory allocation (MB) for the client in the Client Memory Allocation field. If you enter an invalid value, an error message displays with the minimum value (256 MB) allowed. Click OK and edit the value again. 4.

  • Page 127

    Software Configuration Configuring asset polling Asset polling allows you set the length of time between state change polling. To maximize the efficiency of the polling feature (balance the amount of possible information with any possible performance impact), base your settings on the size of the SAN. To configure asset polling, complete the following steps.

  • Page 128: Server Port

    Software Configuration Server port You can configure the server port settings so that you can assign a web server port number and set the server port to be SSL-enabled. Configuring the server port To configure server settings, complete the following steps. 1.

  • Page 129: Support Mode

    Software Configuration 6. Click Apply or OK to save your work. NOTE Changes to this option take effect after application restart. Click OK on the “changes take effect after application restart” message. Support mode You can configure support settings to allow enhanced diagnostics. Configuring support mode settings To configure support mode settings, complete the following steps.

  • Page 130: Fabric Tracking

    Fabric tracking 3. Select the Log client support data - Log Level list, and select the type of log data you want to configure. Log level options include: All, Fatal, Error, Warn, Info, Debug, Trace, and Off. Default is Info. The log level options return to the default value (Info) when the client or server is restarted.

  • Page 131: Enabling Fabric Tracking, Disabling Fabric Tracking

    Fabric tracking Enabling fabric tracking 1. Enable fabric tracking by choosing one of the following options: • Select a fabric on the Product List or Connectivity Map and select Monitor > Track Fabric Changes. • Right-click a fabric on the Product List or Connectivity Map and select Track Fabric Changes.

  • Page 132: Accepting Changes For A Fabric, Accepting Changes For A Device

    Fabric tracking Accepting changes for a fabric 1. Accept the changes to a fabric by choosing one of the following options: • Select a fabric on the Product List or Connectivity Map and select Monitor > Accept Changes. • Right-click a fabric on the Product List or Connectivity Map and select Accept Changes. The Accept Changes Summary dialog box displays.

  • Page 133: About Topology Layout, In This Chapter

    Chapter View management In this chapter • About topology layout ......... . 101 •...

  • Page 134: Customizing The Layout Of Devices On The Topology

    Customizing the layout of devices on the topology Port Label. Select to configure which port labels display. NOTE Changes apply to the selected fabric or the fabric to which the selected item belongs. Name. Displays the name as the port label. If the port has not been given a name, the port’s WWN displays.

  • Page 135: Customizing The Layout Of Connections On The Topology, Changing A Group's Background Color

    Customizing the layout of connections on the topology • Vertical. Displays the device icons vertically. • Horizontal. Displays the device icons horizontally. • Most Connected at Center. Displays the node that has the most connections at the center of the topology. •...

  • Page 136: Reverting To The Default Background Color

    Reverting to the default background color 2. Select the Custom option and click Change. The Choose a background color dialog box displays (Figure 46). FIGURE 46 Map Display dialog box 3. Select or specify a color and preview it in the Preview pane. •...

  • Page 137: Changing The Product Label, Changing The Port Label, Changing The Port Display

    Changing the product label Changing the product label 1. Select a product in the Connectivity Map or Product List. 2. Select View > Product Label, then select one of the following options: • Name (Product). Displays the product name as the product label. •...

  • Page 138: Grouping On The Topology, Collapsing Groups, Expanding Groups, Viewing Connections, Configuring Custom Connections

    Grouping on the topology Grouping on the topology To simplify management, devices display in groups. Groups are shown with background shading and are labeled appropriately. You can expand and collapse groups to easily view a large topology. Collapsing groups To collapse a single group on the topology, do one of the following: •...

  • Page 139: Saving A Custom Connection Configuration, Deleting A Custom Connection Configuration

    Grouping on the topology 4. Click the right arrow to move them to the Selected Zones list. 5. Click OK. Saving a custom connection configuration NOTE Active zones must be available on the fabric. To save a new custom connection configuration, complete the following steps. 1.

  • Page 140: Customizing The Main Window, Zooming In And Out Of The Connectivity Map

    Customizing the main window Customizing the main window You can customize the main window to display only the data you need by displaying different levels of detail on the Connectivity Map (topology) or Product List. Zooming in and out of the connectivity map You can zoom in or out of the Connectivity Map to see products and ports.

  • Page 141: Showing Levels Of Detail On The Connectivity Map, Exporting The Topology

    Customizing the main window Showing levels of detail on the connectivity map You can configure different levels of detail on the Connectivity Map, making Management easier. View Fabrics To view only fabrics, without seeing groups, products or ports: Select View > Show> Fabrics Only. View Groups To view only groups and fabrics, without seeing products or ports: Select View >...

  • Page 142: Customizing Application Tables

    Customizing the main window Customizing application tables You can customize any table in the Management application (for example, the Master Log or the Product List) in the following ways: • Display only specific columns • Display columns in a specific order •...

  • Page 143

    Customizing the main window 2. Choose from the following options: • Select the check box to display a column. Select the column name and click Show. • Clear the check box to hide a column. Select the column name and click Hide. •...

  • Page 144

    Customizing the main window Copying table information You can copy the entire table or a specific row to another application (such as, Notepad, Excel, Word, and so on). 1. Choose from one of the following options: • Right-click anywhere in the table and select Table > Copy Table. •...

  • Page 145: Searching For A Device In The Connectivity Map

    Customizing the main window Expanding and collapsing tables You can expand a table to display all information or collapse it to show only the top level. To expand the entire table, right-click anywhere in the table and select Expand All or Table > Expand All.

  • Page 146

    Customizing the main window DCFM Professional User Manual 53-1001773-01...

  • Page 147: About Third-party Tools, In This Chapter

    Chapter Third-party tools In this chapter • About third-party tools ......... . 115 •...

  • Page 148: Starting Third-party Tools From The Application, Launching A Telnet Session, Launching An Element Manager

    Starting third-party tools from the application Starting third-party tools from the application You can open third-party tools from the Tools menu or a device’s shortcut menu. Remember that you cannot open a tool that is not installed on your computer. NOTE Installing tools is only available with the Professional Plus and Enterprise Editions.

  • Page 149: Launching Web Tools

    Launching Web Tools To launch a device’s Element Manager, complete the following steps. On the Connectivity Map, double-click the device you want to manage. The Element Manager displays. On the Connectivity Map, right-click the device you want to manage and select Element Manager > Hardware.

  • Page 150: Launching Fcr Configuration

    Launching FCR configuration 1. Select a Fabric OS device. 2. Click the Element Manager icon on the toolbar. Web Tools displays. Launching FCR configuration Use FCR Configuration to launch the FC Routing module, which enables you to share devices between fabrics without merging the fabrics. You can open the FC Routing module directly from the Management application.

  • Page 151: Launching Hcm Agent

    Launching HCM Agent Launching HCM Agent Use Brocade HCM Agent to enable and manage Brocade HBAs. You can open HCM Agent directly from the application. For more information about HCM Agent, refer to the Brocade HCM Agent Administrator’s Guide. For more information about Brocade HBAs, refer to the documentation for the specific device.

  • Page 152

    Launching HCM Agent DCFM Professional User Manual 53-1001773-01...

  • Page 153: Server Management Console Overview, In This Chapter, Launching The Smc On Windows

    Chapter Server Management Console In this chapter • Server management console overview ......121 •...

  • Page 154: Launching The Smc On Linux And Solaris, Services, Services

    Services Launching the SMC on Linux and Solaris Perform the following steps to launch the server management console on Linux and Solaris systems. 1. On the Management application server, go to the following directory: Install_Directory/bin 2. Type the following at the command line: ./smc sh smc Services...

  • Page 155: Refreshing The Server Status, Stopping All Services, Stopping The Cimom Services

    Services 3. Review the following information for each available service. • Name—The name of the server; for example, FTP Server or Database Server. • Process Name—The name of the process; for example, dbsrv10.exe (Database Server). • Status—The status of the service; for example, started or stopped. •...

  • Page 156: Starting All Services, Restarting All Services, Changing Server Port Numbers

    Changing server port numbers Starting all services NOTE The Start button restarts running services in addition to starting stopped services which causes client-server disconnect. To start all services, complete the following steps. 1. Launch the Server Management Console. 2. Click the Services tab. 3.

  • Page 157: Restoring The Database

    Restoring the database The server automatically restarts if you change the server port number. You must manually restart the server if you change only the web server port number. Restoring the database To restore application data files, you must know the path to the backup files. This path is configured from the Server >...

  • Page 158: Capturing Technical Support Information

    Capturing technical support information Capturing technical support information The Technical Support Information tab of the SMC allows you to capture technical support information for the Management application as well as the configuration files for all switches in discovered fabrics. This information is saved in a zip file in a location that you specify. To capture technical support information, complete the following steps.

  • Page 159: Upgrading Hcm On The Management Server

    Upgrading HCM on the Management server Upgrading HCM on the Management server The HCM Upgrade tab enables you to upgrade the Management application to include a new version of HCM. To upgrade HCM, complete the following steps. 1. Select the HCM Upgrade tab (Figure 53).

  • Page 160

    Upgrading HCM on the Management server 5. Select or clear the Save password check box to choose whether you want the application to remember your password the next time you log in. 6. Click Login. (Figure FIGURE 55 SMIA Configuration Tool dialog box NOTE All Management application services must be running before you can log into the Management application services, click Start on the...

  • Page 161

    Upgrading HCM on the Management server FIGURE 57 CIMOM tab FIGURE 58 Certificate Management tab DCFM Professional User Manual 53-1001773-01...

  • Page 162

    Upgrading HCM on the Management server FIGURE 59 Summary tab DCFM Professional User Manual 53-1001773-01...

  • Page 163: Configuration Repository Management, In This Chapter, Saving Switch Configurations

    Chapter Device Configuration In this chapter • Configuration repository management ......131 • Device properties.

  • Page 164: Device Properties, Viewing Properties

    Device properties FIGURE 60 Save switch configurations 2. Select the switches for which you want to save configuration files from Available Switches. 3. Click the right arrow to move the selected switches to Selected Switches. 4. Click OK. 5. Browse to the location where you want to save the switch configuration. 6.

  • Page 165

    Device properties • FC Ports • GigE Ports • IP Ports • iSCSI Ports • • Remote Ports • • Virtual Sessions Ports • Virtual FCoE Ports Depending on the device type, some of the properties listed in the following table may not be available for all products.

  • Page 166

    Device properties TABLE 6 Device properties Field/Component Description IKE Policy # The IKE policy number. Also includes the following information: • Authentication Algorithm • Encryption Algorithm • Diffie-Hellman • SA Life IP Address The device’s IP address. IPSec Policy # The IPSec policy number.

  • Page 167: Adding A Property Label

    Device properties TABLE 6 Device properties Field/Component Description Slot # The slot number of the trunk. Source IP Address The IP address of the of the FCIP tunnel source device. Speed (Gb/s) The speed of the port in gigabytes per second. State The device’s state, for example, online or offline.

  • Page 168: Editing A Property Label

    Device properties Click OK. The new property displays above the one you selected. Editing a property label You can edit any label that you create on the Properties dialog box. To edit any field you create, complete the following steps. 1.

  • Page 169: Deleting A Property Label, Editing A Property Field, Enhanced Group Management

    Enhanced group management Deleting a property label You can delete any label that you created on any of the tabs from the Properties dialog box. To delete a label, complete the following steps. 1. Right-click any product icon and select Properties. The Properties dialog box displays.

  • Page 170: Firmware Management, Displaying The Firmware Repository

    Firmware management Firmware management A firmware file repository (Windows systems only) is maintained on the server in the following location: C:\Program Files\\data\ftproot\6.1.1\n.n.n\n.n.n\ The firmware repository is used by the internal FTP server that is delivered with the Management application software, and may be used by an external FTP server if it is installed on the same platform as the Management application software.

  • Page 171: Importing A Firmware File And Release Notes

    Firmware management FIGURE 61 Firmware repository 3. View information about a specific firmware file by selecting the firmware file in the Firmware Repository. The Firmware Name, Release Date, and Import Date are displayed. You may also view the Release Notes, if the release notes were imported. Importing a firmware file and release notes Firmware files and release notes can be imported into the Firmware Repository.

  • Page 172: Deleting A Firmware File, Download Firmware

    Firmware management 4. Type in the location of the firmware file and release notes, or use Browse to select the location. The Management application supports .zip and .gz compression file types for firmware files. 5. Click OK. You return to the Repository tab. The file is listed in the Firmware Repository when the import is complete and successful.

  • Page 173

    Firmware management FIGURE 63 Firmware download 3. Select one or more switches from Available Switches. 4. Click the right arrow to move the switches to Selected Switches. 5. Select a specific version from the Firmware to Download column, or use Select Latest to automatically select the latest version.

  • Page 174: Host Port Mapping, Creating A New Host

    Host port mapping Host port mapping HBAs and Hosts discovered through a fabric can be easily identified in the topology by their product icons. For a list of products and their icons, refer to “Product icons” on page 11. Once identified in the topology, you can create Hosts and assign the HBAs to them and import an externally created Host port mapping file (.CSV) to the Management application.

  • Page 175: Renaming An Hba Host, Deleting An Hba Host, Viewing Host Properties

    Host port mapping Renaming an HBA Host To rename a Host, complete the following steps. 1. Right-click an HBA icon and select Host Port Mapping. The Host Port Mapping dialog box displays. 2. Click the Host you want to rename in the Hosts table, wait a moment, and then click it again. The Host displays in edit mode.

  • Page 176: Importing Hba-to-host Mapping

    Host port mapping 1. Right-click an HBA icon and select Host Port Mapping. The Host Port Mapping dialog box displays. 2. Select the Host to which you want to assign HBAs in the Hosts table or click New Host to create a new Host.

  • Page 177: Removing An Hba From A Host, Exporting Host Port Mapping

    Host port mapping To import Host port mapping, complete the following steps. 1. Right-click an HBA icon and select Host Port Mapping. The Host Port Mapping dialog box displays. 2. Click Import. The Import dialog box displays. 3. Browse to the file (CSV format only) you want to import. 4.

  • Page 178

    Host port mapping 5005076717011E7D, Server1 50050767170A5AAF, Server1 To export a Host port, complete the following steps. 1. Open the Host Port Mapping dialog box by performing one of the following actions: Select an HBA port icon in the topology view, then select Discover > Host Port Mapping. Right-click any HBA port icon in the topology view and select Host Port Mapping.

  • Page 179: Ports, Viewing Port Connectivity

    Ports Ports You can enable and disable ports, as well as view port details, properties, type, status, and connectivity. Viewing port connectivity The connected switch and switch port information displays for all ports. To view port connectivity, choose one of the following steps: •...

  • Page 180

    Ports TABLE 8 Port connectivity properties Field Description Buffer Limited Whether buffers are limited. Buffers Needed/Allocated The ratio of buffers needed relative to the number of buffers allocated. Calculated Status The operational status. There are four possible operation status values: •...

  • Page 181

    Ports TABLE 8 Port connectivity properties Field Description Device Type The device type; for example, target or initiator. FC4 Type The active FC4 type; for example, SCSI. FC Address The Fibre Channel address. Each FC port has both an address identifier and a world wide name (WWN).

  • Page 182: Refreshing The Port Connectivity View, Enabling A Port, Disabling A Port

    Ports TABLE 8 Port connectivity properties Field Description Switch Routing Policy Whether a routing policy, for example, port-based routing policy, is enabled. Switch Secure Mode Whether switch secure mode is enabled. Switch Status The operational status. There are four possible operation status values: •...

  • Page 183: Filtering Port Connectivity

    Ports Filtering port connectivity To filter results from the port connectivity view, complete the following steps. 1. Click the Filter link from the Port Connectivity View dialog box The Filter dialog box displays (Figure 66). FIGURE 66 Filter dialog box 2.

  • Page 184: Viewing Port Details

    Ports Resetting the filter Reset immediately clears all existing definitions. You cannot cancel the reset. To reset the Filter dialog box, complete the following steps. 1. Click the Filter link from the Port Connectivity View dialog box. The Filter dialog box displays. 2.

  • Page 185: Viewing Ports And Port Properties

    Ports Viewing ports and port properties To view ports on the Connectivity Map, right-click a product icon and select Show Ports. NOTE Show Ports is not applicable when the map display layout is set to Free Form (default). NOTE This feature is only available for connected products. On bridges and CNT products, only utilized Fibre Channel ports display;...

  • Page 186

    Ports Depending on the port type, some of the following properties (Table 9) may not be available for all products. TABLE 9 Port properties Field Description # Virtual Session Ports The number of virtual session ports associated with the GE port. Additional Port Info Additional error information relating to the selected port.

  • Page 187

    Ports TABLE 9 Port properties Field Description MAC Address The Media Access Control address assigned to a network adapters or network interface cards (NICs). Manufacturer Plant The name of the manufacturer plant. Modify button Click to launch the Element Manager. Model The model number of the device.

  • Page 188: Port Types, Showing Connected Ports

    Ports TABLE 9 Port properties Field Description Vendor The product vendor. Virtual FCoE Port Count The number of FC ports on the device. Port types On the Connectivity Map, right-click a switch icon and select Show Ports. The port types display showing which ports are connected to which products.

  • Page 189: Viewing Port Connection Properties

    Ports Viewing port connection properties You can view the information about products and ports on both sides of the connection. 1. Right-click the connection between two end devices on the Connectivity Map and select Properties. Double-click the connection between two devices on the Connectivity Map. The Connection Properties dialog box displays.

  • Page 190

    Ports TABLE 11 Port connection properties Field Description 2-IP Address The IP address of the second switch. 2-Trunk Whether there is a trunk on the second switch. 2-Speed (Gbps) The speed of the second switch. Selected Connection Properties table The connected device port information. Area ID (hex)/Port Index (hex) The area identifier, in hexadecimal, of the switch-to-product connection.

  • Page 191: Determining Inactive Iscsi Devices, Determining Port Status

    Ports TABLE 11 Port connection properties Field Description Protocol The network protocol, for example, Fibre Channel. RA TOV The resource allocation time out value, in milliseconds, of the connected switch. This variable works with the E D TOV variable to determine switch actions when presented with an error condition.

  • Page 192: Viewing Port Optics

    Ports Viewing port optics To view port optics, complete the following steps. 1. Right-click the switch for which you want to view port optic information on the Connectivity Map and select Port Optics (SFP). The Port Optics (SFP) dialog box displays(Figure 69).

  • Page 193

    Ports • Vendor PN—The part number of the SFP. • Vendor Rev—The revision number of the SFP. • Serial #—The serial number of the SFP. • Data Code—The data code. • Media Form Factor—The type of media for the transceiver; for example, single mode. •...

  • Page 194: Port Auto Disable, Viewing The Port Auto Disable Status

    Port Auto Disable Port Auto Disable The Port Auto Disable dialog box allows you to enable and disable the port auto disable flag on individual FC_ports or on all ports on a selected device, as well as unblock currently blocked ports. NOTE The device must be running Fabric OS 6.3 or later.

  • Page 195: Enabling Port Auto Disable On Individual Ports

    Port Auto Disable • Port Type—Displays the port type. • Port Number—Displays the port number. • Port WWN—Displays the port world wide name. • Port Name—Displays the port name. • User Port #—Displays the user port number. • PID—Displays the port identifier. •...

  • Page 196: Disabling Port Auto Disable On Individual Ports

    Port Auto Disable Disabling port auto disable on individual ports NOTE The device must be running Fabric OS 6.3 or later. 1. Select Configure > Port Auto Disable. The Port Auto Disable dialog box displays. 2. Select the fabric on which you want to disable port auto disable (PAD) from the Fabric list. 3.

  • Page 197: Device Technical Support, Scheduling Technical Support Information Collection

    Device Technical Support Device Technical Support You can use Technical Support to collect supportSave data (such as, RASLOG, TRACE and so on) and switch events from Fabric OS devices. You can gather technical data for M-EOS devices using the device’s Element Manager. To gather technical support information for the Management application server, refer to “Capturing technical support information”...

  • Page 198: Collection

    Device Technical Support Starting immediate technical support information collection NOTE The switch must be running Fabric OS 5.2.X or later to collect technical support data. NOTE The HBA must be a managed Brocade HBA. NOTE You must have the SupportSave privilege to perform this task. To capture technical support and event information for specified devices, complete the following steps.

  • Page 199: Viewing Technical Support Information, E-mailing Technical Support Information

    Device Technical Support Viewing technical support information To view technical support information, complete the following steps. 1. Select Monitor > Technical Support > View Repository. The Repository dialog box displays. 2. Choose from one of the following options: • Select the Switches tab to view technical support information on switches. •...

  • Page 200: Ftp Server, Deleting Technical Support Files From The Repository

    Device Technical Support Copying technical support information to an external FTP server To copy the Support Save data located in the built-in FTP server to an external FTP server, complete the following steps. 1. Select Monitor > Technical Support > View Repository. The Repository dialog box displays.

  • Page 201: Upload Failure Data Capture, Enabling Upload Failure Data Capture

    Upload Failure data capture Upload Failure data capture You can use Upload Failure Data Capture to enable, disable, and purge failure data capture files as well as configure the FTP Host for the switch. NOTE Upload Failure Data Capture is only supported on Fabric OS devices. Enabling upload failure data capture 1.

  • Page 202: Disabling Upload Failure Data Capture, Purging Upload Failure Data Capture Files

    Upload Failure data capture Disabling upload failure data capture NOTE Upload Failure Data Capture is only supported on Fabric OS devices. 1. Select Monitor > Technical Support > Upload Failure Data Capture. The Upload Failure Data Capture dialog box displays. 2.

  • Page 203: Configuring The Upload Failure Data Capture Ftp Server

    Upload Failure data capture Configuring the upload failure data capture FTP server NOTE Upload Failure Data Capture is only supported on Fabric OS devices. NOTE Some external FTP software (such as, Filezilla and Xlight) are not supported. 1. Select Monitor > Technical Support > Upload Failure Data Capture. The Upload Failure Data Capture dialog box displays.

  • Page 204: Viewing The Upload Failure Data Capture Repository

    Upload Failure data capture Viewing the upload failure data capture repository NOTE Upload Failure Data Capture is only supported on Fabric OS devices. 1. Select Monitor > Technical Support > View Repository. The Repository dialog box displays. 2. Select the trace dump file you want to view from the Available Support and Upload Failure Data Capture Files table.

  • Page 205: Fault Management Overview, In This Chapter

    Chapter Fault Management In this chapter • Fault management overview........173 •...

  • Page 206: Event Logs, Viewing Event Logs

    Event logs Event logs The Management application provides a variety of logs through which you can monitor the SAN. You can view all events that take place in the SAN through the Master Log at the bottom of the main window. You can also view a specific log by selecting an option from the Monitor menu’s Logs submenu.

  • Page 207: Copying Part Of A Log Entry, Copying An Entire Log Entry

    Event logs Copying part of a log entry You can copy data from logs to other applications. Use this to analyze or store the data using another tool. To copy part of a log, complete the following steps. 1. Select Monitor > Logs > Log_Type. The Log_Type Logs dialog box displays the kind of log you selected.

  • Page 208: Exporting The Entire Log, E-mailing All Event Details From The Master Log

    Event logs Exporting the entire log You can export the log data to a tab delimited text file. To export a log, complete the following steps. 1. Select Monitor > Logs > Log_Type. The Log_Type Log dialog box displays the kind of log you selected. 2.

  • Page 209: E-mailing A Range Of Event Details From The Master Log

    Event logs 5. Enter your e-mail address in the From field. 6. Click OK. E-mailing a range of event details from the Master Log NOTE You must configure e-mail notification before you can e-mail event details from the Master Log. To configure e-mail notification, refer to “Configuring e-mail notification”...

  • Page 210: Copying Part Of The Master Log, Copying The Entire Master Log

    Event logs TABLE 12 Event details Event Field Description Virtual Fabric ID The virtual fabric identifier. Message ID The message text. Recommended Action The recommended action. Contributors The contributor to this event. Time (Host) The time this event occurred and the host on which it occurred. 4.

  • Page 211: Exporting The Master Log, Filtering Events In The Master Log

    Event logs Exporting the Master Log You can export the Master Log to a tab delimited text file. Use this to analyze or store the data using another tool. To export the Master Log, complete the following steps. 1. Right-click an entry in the Master Log. 2.

  • Page 212: Setting Up Advanced Event Filtering For The Master Log

    Event logs 2. Select from the following to include or exclude event types. • To include an event type in the filter, select the event from the Available Events table and click the right arrow. • To exclude an event type from the filter, select the event from the Selected Events table and click the left arrow.

  • Page 213

    Event logs b. Select the event column for the event from the Event Column list. All event columns are listed in alphabetical order. Enter all or part of the event type value in the Value Contains text box. d. Click the right arrow button to move the event type to the Additional Filters - Include these Events table.

  • Page 214

    Event logs Click the right arrow button to move the event type to the Additional Filters - Filter out these Events table. NOTE You can configure a maximum of 10 filters to be excluded. DCFM Professional User Manual 53-1001773-01...

  • Page 215: Removing An Advanced Event Filter, Event Policies, Policy Types

    Event policies 6. Click OK. The Define Filter dialog box displays. Click OK to close Define Filter dialog box. Removing an advanced event filter To remove an advanced event filter, complete the following steps. 1. Click the Filter hyper link in the Master Log. The Define Filter dialog box displays.

  • Page 216: Policy Triggers

    Event policies • Authentication Event — occurs when an authentication event has been triggered. • Call Home Event — occurs when a call home event has been triggered. • Config Management Event — occurs when a configuration management event has been triggered •...

  • Page 217: Policy Actions, Adding An Event Policy

    Event policies Policy actions You can automate tasks that you perform on the SAN by configuring multiple actions to be performed when an associated trigger is fired. The following actions are available: • Broadcast Message — Displays a message to all open Clients. •...

  • Page 218: Adding An Port Offline Policy

    Event policies 9. Enter all or part of the message ID associated with SNMP traps and Syslog messages in the Message ID field. If the entry matches or is part of the message ID, the policy is triggered. 10. Define the trigger in the IP Address, Node WWN, and Name list. The trigger is limited to 1024 characters.

  • Page 219: Adding A Pm Threshold Crossed Policy

    Event policies 6. Define the trigger in the IP Address, Node WWN, and Name list. The trigger is limited to 1024 characters. Multiple values must be separated by a semi-colon. When multiple values are entered, as long as at least one value matches the IP address, Node WWN, or Name in the event and all other conditions are met, an action is triggered.

  • Page 220: Adding A Security Violation Policy

    Event policies 9. Select the duration type (Seconds or Minutes) from the Duration list. The maximum duration is 30 minutes. 10. Select the check box in the Actions list for each action you want to occur when this policy is triggered.

  • Page 221: Defining The Broadcast Message Action

    Event policies 11. Click OK on the Add Event Policy dialog box. 12. Select the Active check box for the policy you want to activate. 13. Click OK on the Event Policies dialog box. Defining the broadcast message action You can define the content of the broadcast message that occurs when a policy is triggered. You can only edit actions from the Add Event Policy, Duplicate Event Policy, or Edit Event Policy dialog boxes.

  • Page 222: Defining The Launch Script Action

    Event policies Defining the launch script action NOTE Launch scripts with a user interface are not supported. You can define the path to the script that is launched when a policy is triggered. When the script launches, the Management application does not verify the existence of the script. The script must have the following characteristics: •...

  • Page 223: Defining The Send E-mail Action

    Event policies Defining the send e-mail action You can define the content of the e-mail message that occurs when a policy is triggered. You can only edit actions from the Add Event Policy, Duplicate Event Policy, or Edit Event Policy dialog boxes. For step-by-step instructions on adding or editing an event policy, refer to “Adding an event policy”...

  • Page 224: Configuring Support Data Capture Action, Activating A Policy, Deactivating A Policy

    Event policies Configuring support data capture action You can configure the Management application to start supportSave capture on Fabric OS devices when a policy is triggered. You can only edit actions from the Add Event Policy, Duplicate Event Policy, or Edit Event Policy dialog boxes. For step-by-step instructions on adding or editing an event policy, refer to “Adding an event policy”...

  • Page 225: Deleting A Policy, Duplicating An Event Policy

    Event policies Deleting a policy 1. Select Monitor > Event Policies. The Event Policies dialog box displays. 2. Select the policy you want to delete. Press Ctrl and then click to select more than one policy. 3. Click Delete. 4. Click OK on the Event Policies dialog box. Duplicating an event policy To duplicate an event policy, complete the following steps.

  • Page 226: Duplicating An Port Offline Policy

    Event policies 10. Edit the trigger in the IP Address, Node WWN, and Name list. The trigger is limited to 1024 characters. Multiple values must be separated by a semi-colon. When multiple values are entered, as long as at least one value matches the IP address, Node WWN, or Name in the event and all other conditions are met, an action is triggered.

  • Page 227: Duplicating A Pm Threshold Crossed Policy

    Event policies 8. Select the duration type (Seconds or Minutes) from the Duration list. The maximum duration is 30 minutes. 9. Select the check box in the Actions list for each action you want to occur when this policy is triggered.

  • Page 228: Duplicating A Security Violation Policy

    Event policies 11. Select the Active check box to activate the duplicated policy. 12. Click OK on the Event Policies dialog box. Duplicating a security violation policy To duplicate a security violation policy, complete the following steps. 1. Select Monitor > Event Policies. The Event Policies dialog box displays.

  • Page 229: Editing An Event Policy

    Event policies Editing an event policy To edit an event policy, complete the following steps. 1. Select Monitor > Event Policies. The Event Policies dialog box displays. 2. Select the policy you want to edit in the Policies table. 3. Click Edit. The Edit Event Policy dialog box displays.

  • Page 230: Editing An Port Offline Policy

    Event policies Editing an Port offline policy To edit an Port offline policy, complete the following steps. 1. Select Monitor > Event Policies. The Event Policies dialog box displays. 2. Select the policy you want to edit in the Policies table. 3.

  • Page 231: Editing A Pm Threshold Crossed Policy

    Event policies Editing a PM threshold crossed policy To edit a PM threshold crossed policy, complete the following steps. 1. Select Monitor > Event Policies. The Event Policies dialog box displays. 2. Select the policy you want to edit in the Policies table. 3.

  • Page 232: Editing A Security Violation Policy, Viewing Events

    Event policies Editing a security violation policy To edit a security violation policy, complete the following steps. 1. Select Monitor > Event Policies. The Event Policies dialog box displays. 2. Select the policy you want to edit in the Policies table. 3.

  • Page 233: Event Notification, Configuring E-mail Notification

    Event notification Event notification The Management application records the SAN events in the Master Log. You can configure the application to send event notifications to e-mail addresses at certain time intervals. This is a convenient way to keep track of events that occur on the SAN. Configuring e-mail notification To send notification of events to users, complete the following steps.

  • Page 234: Setting Up Advanced Event Filtering For A User

    Event notification 8. Enter the length of time the application should wait between notifications in the Summary Interval field and list. Notifications are combined into a single e-mail and sent at each interval setting. An interval setting of zero causes notifications to be sent immediately. ATTENTION Setting too short an interval can cause the recipient’s e-mail inbox to fill very quickly.

  • Page 235

    Event notification FIGURE 77 Advanced Event Filtering dialog box - Include Events tab a. Select the event type you want to include from the Event Type list. All event types are listed in alphabetical order. b. Select the event column for the event from the Event Column list. All event columns are listed in alphabetical order.

  • Page 236

    Event notification FIGURE 78 Advanced Event Filtering dialog box - Include Events tab a. Select the event type you want to remove from the Event Type list. All event types are listed in alphabetical order. b. Enter all or part of the event type description text in the Description Contains text box (up to 40 characters).

  • Page 237: Snmp Trap And Informs Registration And Forwarding, Registering The Management Server

    SNMP trap and informs registration and forwarding SNMP trap and informs registration and forwarding You can configure the application to send SNMP traps and informs to other computers. To correctly configure trap forwarding, you must configure the target computer’s IP address and SNMP ports. To correctly configure informs, you must enable informs on the switch.

  • Page 238: Removing A Host Server, Enabling Trap Forwarding, Adding An Snmpv1 Destination

    SNMP trap and informs registration and forwarding 5. Select a fabric from the Targeted Fabric list. 6. Select a severity (None, Critical, Error, Warning, Info, or Debug) from the Severity list. Click OK on the SNMP Setup dialog box. Removing a host server You can remove any host server as the trap recipient on managed Fabric OS devices.

  • Page 239: Adding An Snmpv3 Destination

    SNMP trap and informs registration and forwarding 4. Click Add. The Add/Edit Trap Recipient dialog box displays. a. (Optional) In the Description field, enter a description of the trap recipient. b. In the IP Address field, enter the trap recipient’s IP address. The Management application accepts IP addresses in IPv4 or IPv6 formats.

  • Page 240: Editing A Destination, Removing A Destination, Disabling Trap Forwarding

    SNMP trap and informs registration and forwarding Editing a destination To edit a destination, complete the following steps. 1. Select Monitor > SNMP Setup. The SNMP Setup dialog box displays. 2. Click the Trap Forwarding tab. 3. Select the destination you want to edit in the Destinations table and click Edit. The Add/Edit Trap Recipient dialog box displays.

  • Page 241: Enabling Snmp Informs, Disabling Snmp Informs

    SNMP trap and informs registration and forwarding Enabling SNMP informs NOTE SNMP Informs is only supported on Fabric OS 6.3 or later switches discovered through SNMP v3. For information about discovery through SNMP v3, refer to “Discovering fabrics” on page 37. You can enable SNMP informs on all Informs-capable Fabric OS switches.

  • Page 242: Syslog Forwarding, Registering The Management Server

    Syslog forwarding Syslog forwarding NOTE Syslog messages are only available on Fabric OS devices and Brocade HBAs (managed using HCM Agent). Syslog forwarding is the process by which you can configure the Management application to send Syslog messages to other computers. Switches only send the Syslog information through port 514; therefore, if port 514 is being used by another application, you must configure the Management application to listen on a different port.

  • Page 243: Registering A Host Server, Removing A Host Server, Adding A Destination

    Syslog forwarding Registering a host server You can register any host server as the Syslog destination on managed Fabric OS devices. You can register different destinations for different fabrics. To register a host server, complete the following steps. 1. Select Monitor > Syslog Configuration. The Syslog Registration and Forwarding dialog box displays.

  • Page 244: Removing A Destination, Editing A Destination, Enabling Syslog Forwarding

    Syslog forwarding Editing a destination To edit a destination, complete the following steps. 1. Select Monitor > Syslog Configuration. The Syslog Registration and Forwarding dialog box displays. 2. Click the Syslog Forwarding tab. 3. Select the destination you want to edit in the Destinations table and click Edit. The Add/Edit Syslog Recipient dialog box displays.

  • Page 245: Disabling Syslog Forwarding

    Syslog forwarding Disabling Syslog forwarding You can disable Syslog forwarding on all defined destinations. To disable Syslog forwarding, complete the following steps. 1. Select Monitor > Syslog Configuration. The Syslog Registration and Forwarding dialog box displays. 2. Click the Syslog Forwarding tab. 3.

  • Page 246

    Syslog forwarding DCFM Professional User Manual 53-1001773-01...

  • Page 247: Performance Overview, In This Chapter

    Chapter Performance Data In this chapter • Performance overview......... . 215 •...

  • Page 248: Performance Measures

    Performance overview Performance measures Performance measures enable you to select one or more measures to define the graph or report. The measures available to you depend on the object type from which you want to gather performance data. • Tx % Utilization — available for FC, GE, Managed HBA ports, Managed CNA ports, 10GE ports, and FCIP tunnels.

  • Page 249: Performance Management Requirements

    Performance overview • Under Sized Frames — available for Managed HBA ports and Managed CNA ports. • Over Sized Frames — available for Managed HBA ports and Managed CNA ports. • Primitive Sequence Protocol Errors — available for Managed HBA ports and Managed CNA ports.

  • Page 250

    Performance overview Trap recipient: 10.191.12.240 Trap port: 162 Trap recipient Severity level: 4 Community 3: private (rw) Trap recipient: 10.103.5.105 Trap port: 162 Trap recipient Severity level: 4 Community 4: public (ro) Trap recipient: 192.168.102.41 Trap port: 162 Trap recipient Severity level: 4 Community 5: common (ro) Trap recipient: 10.32.150.116 Trap port: 162...

  • Page 251

    Performance overview Priv Protocol: noPriv User 3 (rw): snmpadmin3 Auth Protocol: noAuth Priv Protocol: noPriv User 4 (ro): snmpuser1 Auth Protocol: noAuth Priv Protocol: noPriv User 5 (ro): snmpuser2 Auth Protocol: noAuth Priv Protocol: noPriv User 6 (ro): admin Auth Protocol: noAuth Priv Protocol: noPriv To set the SNMP v3 credentials on the device, use the snmpconfig --set snmpv3...

  • Page 252

    Performance overview Trap Recipient's IP address : [0.0.0.0] Trap Recipient's IP address : [0.0.0.0] Trap Recipient's IP address : [0.0.0.0] To check SNMP credentials in the Management application, complete the following steps. 1. Select Discover > Setup. The Discover Setup dialog box displays. 2.

  • Page 253: Real-time Performance Data

    Real-time performance data HA-MIB (yes, y, no, n): [yes] FCIP-MIB (yes, y, no, n): [yes] ISCSI-MIB (yes, y, no, n): [yes] • To collect performance on a Virtual Fabric enabled device, use the admin> userconfig command to make sure the Fabric OS user has access to all the Virtual Fabrics. Make --show sure that the SNMPv3 user name is same as the Fabric OS user name.

  • Page 254: Generating A Real-time Performance Graph

    Real-time performance data Generating a real-time performance graph You can monitor a device’s performance through a performance graph that displays transmit and receive data. The graphs can be sorted by the column headers. You can create multiple real-time performance graph instances. NOTE To make sure that statistic collection for a switch does not fail, you must configure SNMP credentials for the switch.

  • Page 255: Filtering Real-time Performance Data

    Real-time performance data Filtering real-time performance data To filter real-time performance data from the Real Time Performance Graphs dialog box, complete the following steps. 1. Open the Real Time Performance Graphs dialog box. For step-by-step instructions, refer to “Generating a real-time performance graph” page 222.

  • Page 256: Exporting Real-time Performance Data, Clearing Port Counters

    Real-time performance data 10. Select the granularity at which you want to gather performance data from the Granularity list. 11. Select the Interpolate check box to use interpolation to fill existing gaps, if necessary. 12. (Optional) Click Other Options and select the Use Same Y-axis check box to make the Y-axis range the same for object.

  • Page 257: Report Types, In This Chapter

    Chapter Reports In this chapter • Report types..........225 •...

  • Page 258: Generating Reports, Viewing Reports, Exporting Reports

    Generating reports Generating reports To generate reports, complete the following steps. 1. Select Reports > Generate. The Generate Reports dialog box displays. 2. Select the types of reports you want to generate. • Fabric Ports • Fabric Summary 3. Select the fabrics for which you want to generate reports. 4.

  • Page 259

    Exporting reports If you do not see the report you want to export, generate it first by following the instructions in “Generating reports” on page 226. You can select reports by Time, Report Type, or User. 3. Select the format (PDF, HTML, or XML) you want to export to from the list to the left of the Export button.

  • Page 260: Printing Reports, Deleting Reports

    Printing reports Printing reports You can print reports through an internet browser. 1. Select Reports > View. The View Reports dialog box displays. 2. Select the report you want to print in the left pane of the dialog box. If you do not see the report you want to view, generate it first by following the instructions in “Generating reports”...

  • Page 261: Generating Zoning Reports

    Generating zoning reports Generating zoning reports The Management application enables you to generate a report for the current zone DB in the fabric. To generate a report for the edited zone DB, you must save it to the fabric first. Make sure no one else is making changes to the same area prior to submitting or your changes may be lost.

  • Page 262

    Generating zoning reports DCFM Professional User Manual 53-1001773-01...

  • Page 263: About Host Management, In This Chapter

    Chapter Host management In this chapter • About host management........231 •...

  • Page 264: Hcm Software, Hcm Features

    HCM software HCM software The Host Connectivity Manager (HCM) is a management software application for configuring, monitoring, and troubleshooting Brocade host bus adapters (HBAs), converged network adapters (CNAs), and FC mezzanine cards in a storage area network (SAN) environment. HCM features Common HBA and CNA management software features include the following: •...

  • Page 265: Host Bus Adapters

    HCM software Host bus adapters Brocade offers five models of Fibre Channel Host Bus Adapters (HBAs). These models provide reliable, high-performance host connectivity for mission-critical SAN environments. The Brocade HBAs are listed in Table TABLE 13 Brocade Fibre Channel HBA models Model Number Description Number of Ports...

  • Page 266: Converged Network Adapters

    HCM software Converged network adapters Table 14 describes available Brocade Converged Network Adapters (CNAs) for PCIe x 8 host bus interfaces, hereafter referred to as Brocade CNAs. These adapters provide reliable, high-performance host connectivity for mission-critical SAN environments. TABLE 14 Brocade Fibre Channel CNA Models Model Number Port Speed...

  • Page 267: Host Discovery, Connectivity Map

    Host discovery Host discovery The Management application enables you to discover individual hosts, import a group of hosts from a CSV file, or import host names from discovered fabrics. The maximum number of host discovery requests that can be accepted is 1000. Host discovery requires HCM Agent 2.0 or later. SMI and WMI discovery are not supported.

  • Page 268

    Host port mapping Host port mapping Host bus adapters (HBAs) and hosts discovered through one or more fabrics can be easily identified in the topology by their product icons. For a list of products and their icons, refer to “Product icons” on page 11.

  • Page 269: Host Performance Management

    Host performance management Host performance management Real-time performance enables you to collect data from managed HBA and CNA ports. You can use real-time performance to configure the following options: • Select the polling rate from 20 seconds up to 1 minute. •...

  • Page 270: Host Fault Management, Adapter Events, Event Policies

    Host fault management TABLE 15 Counters (Continued) FC port measures HBA port measures CNA port measures Received length error frames Received code error frames Instructions for generating real-time performance data are detailed in “Generating a real-time performance graph”. Host fault management Fault management enables you to monitor your SAN using the following methods: •...

  • Page 271: Filtering Event Notifications, Syslog Forwarding

    Host fault management Filtering event notifications The application provides notification of many different types of SAN events. If a user wants to receive notification of certain events, you can filter the events specifically for that user. NOTE The e-mail filter in the Management application is overridden by the firmware e-mail filter. When the firmware determines that certain events do not receive e-mail notification, an e-mail is not sent for those events even when the event type is added to the Selected Events table in the Define Filter dialog box.

  • Page 272: Host Security Authentication, Application

    Host security authentication Host security authentication Fibre Channel Security Protocol (FC-SP) is a mechanism used to secure communication between two switches or between a switch and a device such as an HBA port. You can use either the the Management application or the HCM GUI to display the authentication settings and status.

  • Page 273

    Host security authentication 3. Configure the following parameters on the FCSP Authentication dialog box: a. Select the Enable Authentication check box to enable or disable the authentication policy. If authentication is enabled, the port attempts to negotiate with the switch. If the switch does not participate in the authentication process, the port skips the authentication process.

  • Page 274: Supportsave On Adapters

    supportSave on adapters supportSave on adapters Host management features support capturing support information for managed Brocade adapters, which are discovered in the Management application. You can trigger supportSave for multiple adapters at the same time. You can use Technical Support to collect supportSave data (such as, RASLOG, TRACE and so on) and switch events from Fabric OS devices.

  • Page 275

    Chapter Fibre Channel over IP In this chapter • FCIP services licensing ......... 244 •...

  • Page 276: Fcip Services Licensing, Fcip Concepts, Ip Network Considerations

    FCIP services licensing FCIP services licensing Most of the FCIP extension services described in this chapter require the High Performance . FICON emulation features require additional licenses. Use the Extension over FCIP/FC license licenseShow command to verify the needed licenses are present on the hardware used on both ends the FCIP tunnel.

  • Page 277: Fcip Platforms And Supported Features

    FCIP platforms and supported features FCIP platforms and supported features There are five Fabric OS platforms that support FCIP: • The 8 Gbps 16-FC ports, 6-Gbps ports extension switch. • The 8 Gbps 12-FC port, 10 GbE ports, 2-10 GbE ports blade (384-port Backbone Chassis, 192-port Backbone Chassis).

  • Page 278: Fcip Trunking

    FCIP trunking The way FCIP tunnels and virtual ports map to the physical GbE ports depends on the switch or blade model. The 8 Gbps 16-FC ports, 6-Gbps ports extension switch and 8 Gbps 12-FC port, 10 GbE ports, 2-10 GbE ports blade tunnels are not tied to a specific GbE port, and may be assigned to any virtual port within the allowed range.

  • Page 279: Design For Redundancy And Fault Tolerance, Fcip Trunk Configuration Considerations

    FCIP trunking 10.0.0.2 10.0.1.2 10.0.0.3 10.0.1.3 10.0.0.4 10.0.1.4 FCIP Tunnel 10.0.0.5 10.0.1.5 FIGURE 82 FCIP tunnel and FCIP circuits Design for redundancy and fault tolerance Multiple FCIP tunnels can be defined between pairs of 8 Gbps extension switches and 8 Gbps extension blades, but doing so defeats the concept of a multiple circuit FCIP tunnel.

  • Page 280: Fcip Circuit Failover Capabilities

    FCIP trunking • In a scenario where a FCIP tunnel has multiple circuits of different metrics the data will flow over the lower metric circuits unless a failover condition occurs, as described in “FCIP circuit failover capabilities”. • The maximum bandwidth for a single circuit is 1 Gbps. To utilize the entire bandwidth of an XGE (10GbE) port, you must create ten 1 Gbps circuits.

  • Page 281: Bandwidth Calculation During Failover, Adaptive Rate Limiting, Fspf Link Cost Calculation When Arl Is Used

    Adaptive Rate Limiting Bandwidth calculation during failover The bandwidth of higher metric circuits is not calculated as available bandwidth on an FCIP tunnel until all lowest metric circuits have failed. For example, assume the following: • Circuits 0 and 1 are created with a metric of 0. Circuit 0 is created with a maximum transmission rate of 1 Gbps, and Circuit 1 is created with a maximum transmission rate of 500 Mbps.

  • Page 282: Qos Sid/did Priorities Over An Fcip Trunk

    QoS SID/DID priorities over an FCIP trunk QoS SID/DID priorities over an FCIP trunk QoS SID/DID traffic prioritization is a capability of Brocade Fabric OS Adaptive Networking licensed feature. This feature allows you to prioritize FC traffic flows between hosts and targets. Four internal TCP connections provide internal circuits for managing QoS SID/DID priorities over an FCIP tunnel, as illustrated in Figure...

  • Page 283: Ipsec And Ike Implementation Over Fcip, Ipsec For The 4 Gbps Platforms

    IPsec and IKE implementation over FCIP IPsec and IKE implementation over FCIP Internet Protocol security (IPsec) uses cryptographic security to ensure private, secure communications over Internet Protocol networks. IPsec supports network-level data integrity, data confidentiality, data origin authentication, and replay protection. It helps secure your SAN against network-based attacks from untrusted computers, attacks that can result in the denial-of-service of applications, services, or the network, data corruption, and data and user credential theft.

  • Page 284: Ipsec For The 8 Gbps Platforms

    IPsec and IKE implementation over FCIP The following limitations apply to using IPsec: • IPsec is not supported on 10GbE ports. • IPsec-specific statistics are not supported. • To change the configuration of a secure tunnel, you must delete the tunnel and recreate it. •...

  • Page 285: Qos, Dscp, And Vlans, Dscp Quality Of Service, Vlans And Layer Two Quality Of Service

    QOS, DSCP, and VLANs QOS, DSCP, and VLANs Quality of Service (QoS) refers to policies for handling differences in data traffic. These policies are based on data characteristics and delivery requirements. For example, ordinary data traffic is tolerant of delays and dropped packets, but voice and video data are not. QoS policies provide a framework for accommodating these differences in data as it passes through a network.

  • Page 286

    QOS, DSCP, and VLANs TABLE 18 Default Mapping of DSCP priorities to L2Cos Priorities (Continued) DSCP priority/bits L2CoS priority/bits Assigned to: 11 / 001011 3 / 011 Medium QoS 15 / 001111 3 / 011 Medium QoS 19 / 010011 3 / 011 Medium QoS 23 / 010111...

  • Page 287: Open Systems Tape Pipelining, Fcip Fastwrite And Tape Acceleration

    Open systems tape pipelining Open systems tape pipelining Open Systems Tape Pipelining (OSTP) can be used to enhance open systems SCSI tape write I/O performance. To implement OSTP over FCIP, you must enable the following two features: • FCIP Fastwrite and Tape Acceleration. •...

  • Page 288: Ficon Emulation Features, Xrc Emulation, Tape Write Pipelining, Tape Read Pipelining

    FICON emulation features FICON emulation features FICON emulation supports FICON traffic over IP WANs using FCIP as the underlying protocol. FICON emulation features support performance enhancements for specific applications. If you are using FCIP for distance extension in a FICON environment, evaluate the need for these features before you run the FCIP configuration wizard.

  • Page 289: Fcip Configuration Guidelines, Virtual Port Types

    FCIP configuration guidelines FCIP configuration guidelines FCIP configuration always involves two or more extension switches. The following should take place first before you configure a working FCIP connection from the Management application: • The WAN link should be provisioned and tested for integrity. •...

  • Page 290: Configuring An Fcip Tunnel

    Configuring an FCIP tunnel Configuring an FCIP tunnel When you configure an FCIP extension connection, you create FCIP tunnels and FCIP circuits, between two extension switches. 1. Select Configure > FCIP Tunnels. The FCIP Tunnels dialog box is displayed (Figure 86).

  • Page 291

    Configuring an FCIP tunnel 3. Click the Add Tunnel button, or right-click on the switch and select Add Tunnel. The Add FCIP Tunnel dialog is displayed (Figure 87). The name of the switch you selected is displayed in the Switch field under Switch One Settings. This dialog allows you to configure settings for both switches on either end of the tunnel.

  • Page 292: Adding An Fcip Circuit

    Adding an FCIP circuit Adding an FCIP circuit When adding a new FCIP tunnel, you can add an FCIP circuit by selecting the Add Circuit button on the Add FCIP Tunnel dialog box. Additional FCIP circuits can be added to existing FCIP tunnels by clicking Add Circuit from the Circuit tab, or by right-clicking on an existing tunnel and selecting Add Circuit.

  • Page 293

    Adding an FCIP circuit The default is created from the IP address and Subnet Mask. If you want to create a route through a gateway router, click Create Non-Default Route, and select a Gateway address. 5. Enter the MTU Size. For SAN traffic, the largest possible MTU (Maximum Transmission Unit) size is generally the most efficient.

  • Page 294

    Adding an FCIP circuit FIGURE 89 FCIP Circuit Advanced Settings Select the Selective Ack Off check box to disable or enable selective acknowledgement. Selective acknowledgement allows a receiver to acknowledge multiple lost packets with a single ACK response. This results in better performance and faster recovery time. Normally, selective acknowledgement should not be disabled.

  • Page 295: Configuring Fcip Tunnel Advanced Settings, Enabling And Disabling Compression

    Configuring FCIP tunnel advanced settings Configuring FCIP tunnel advanced settings Compression, FCIP fast write and tape pipelining, IPSec and IKE policies, and FICON emulation features are configured as advanced settings. 1. Click Advanced Settings on the Add FCIP Tunnel dialog box. The Advanced Settings dialog box is displayed.

  • Page 296: Enabling Open Systems Tape Pipelining (ostp), Enabling Tperf Test Mode

    Configuring FCIP tunnel advanced settings 2. Select the desired compression mode. A Hardware compression option is available on all platforms. The 8 Gbps 16-FC ports, 6-Gbps ports extension switch and the 8 Gbps 12-FC port, 10 GbE ports, 2-10 GbE ports Extension blade provide two additional, more aggressive options for compression.

  • Page 297: Configuring Ipsec And Ike Policies

    Configuring FCIP tunnel advanced settings Configuring IPSec and IKE policies IPSec and IKE policies are configured from the Security tab. The screens and procedures are platform-dependent. Figure 91 shows the screen for the 4 Gbps Router, Extension Switch. Figure 91 shows the screen for the 8 Gbps 16-FC ports, 6-Gbit ports Extension Switch and 8 Gbps 12-FC port, 10 GbE ports, 2-10 GbE ports Extension blade.

  • Page 298

    Configuring FCIP tunnel advanced settings FIGURE 92 Advanced Settings Security Tab for the 8 Gbps extension switch and blade NOTE IPSec settings cannot be edited. If you want to change settings, you will need to delete the tunnel and then create a new tunnel with the new settings. DCFM Professional User Manual 53-1001773-01...

  • Page 299: Configuring Ficon Emulation

    Configuring FCIP tunnel advanced settings Configuring FICON emulation FICON emulation and acceleration features and operating parameters are configured from the FICON Emulation tab (Figure 93). Before you configure these features you must decide which features you want to implement, and you must look closely at the operational parameters to determine if values other than the default values are better for your installation.

  • Page 300: Viewing Fcip Connection Properties

    Viewing FCIP connection properties FICON Tape Read Max Ops defines a maximum number of concurrent emulated tape read operations. The range is 1-32. FICON Tape Write Timer defines a time limit for pipelined write chains. This value is be specified in milliseconds (ms). If a pipelined write chain takes longer than this value to complete, the ending status for the next write chain will be withheld from the channel.

  • Page 301: Viewing General Fcip Properties

    Viewing General FCIP properties Viewing General FCIP properties Take the following steps to view general FCIP properties. 1. Select an extension blade or switch from the Fabric Tree structure, or right-click an extension blade or switch on the Connectivity Map, and select Properties. 2.

  • Page 302: Viewing Fcip Fc Port Properties

    Viewing FCIP FC port properties Viewing FCIP FC port properties Take the following steps to view FCIP FC port properties. 1. Select an extension blade or switch from the Fabric Tree structure, or right-click an extension blade or switch on the Connectivity Map, and select Properties. 2.

  • Page 303: Viewing Fcip Ethernet Port Properties

    Viewing FCIP Ethernet port properties Viewing FCIP Ethernet port properties Take the following steps to view Ethernet port properties. 1. Select an extension blade or switch from the Fabric Tree structure, or right-click an extension blade or switch on the Connectivity Map, and select Properties. 2.

  • Page 304: Editing Fcip Tunnels

    Editing FCIP tunnels Editing FCIP tunnels NOTE You cannot edit an active tunnel; disable the tunnel before making changes. 1. From the FCIP Tunnels dialog box, select the tunnel you want to edit. 2. Select Edit Tunnel. The Edit FCIP Tunnel dialog box displays (Figure 98).

  • Page 305: Editing Fcip Circuits

    Editing FCIP circuits Editing FCIP circuits FCIP circuit settings may be edited from the Edit FCIP Circuit dialog box. The procedure for launching this dialog box for the 4 Gbps Router, Extension Switch and Blade is different than the procedure for the 8 Gbps 16-FC ports, 6-Gbit ports Extension Switch and the 8 Gbps 12-FC port, 10 GbE ports, 2-10 GbE ports Extension blade.

  • Page 306: Disabling Fcip Tunnels, Enabling Fcip Tunnels

    Disabling FCIP tunnels FIGURE 99 Edit FCIP Circuits dialog box 5. Fields and parameters are as described in “Adding an FCIP circuit”. You can edit all editable fields and parameters. Disabling FCIP tunnels 1. From the FCIP Tunnels dialog box, select the tunnel you want to disable. 2.

  • Page 307

    Enabling FCIP tunnels A confirmation dialog box displays. 3. Click OK to enable the tunnel. DCFM Professional User Manual 53-1001773-01...

  • Page 308: Deleting Fcip Tunnels, Disabling Fcip Circuits, Enabling Fcip Circuits, Deleting Fcip Circuits

    Deleting FCIP tunnels Deleting FCIP tunnels 1. From the FCIP Tunnels dialog box, right-click the tunnel you want to delete. 2. Select the Delete Tunnel button. A confirmation dialog box displays, warning you of the consequences of deleting a tunnel. 3.

  • Page 309: Displaying Fcip Performance Graphs, Displaying Performance Graphs For Fc Ports

    Displaying FCIP performance graphs Displaying FCIP performance graphs You can display peformance graphs by clicking the Performance button on the FCIP Tunnels dialog box. You can also display performance graphs from Properties, as described in the following sections. Displaying performance graphs for FC ports 1.

  • Page 310: Displaying Tunnel Properties From The Fcip Tunnels Dialog Box

    Displaying tunnel properties from the FCIP tunnels dialog box Displaying tunnel properties from the FCIP tunnels dialog box Tunnel properties can be displayed from the FCIP Tunnels dialog box. 1. Select a tunnel from the FCIP tunnels dialog box. 2. Select the Tunnel tab. Tunnel properties are displayed (Figure 100).

  • Page 311: Dialog Box, Displaying Fcip Circuit Properties From The Fcip Tunnels Dialog Box

    Displaying FCIP circuit properties from the FCIP tunnels dialog box Displaying FCIP circuit properties from the FCIP tunnels dialog box Tunnel properties can be displayed from the FCIP Tunnels dialog box using the following procedure. 1. Select a tunnel from the FCIP tunnels dialog box. 2.

  • Page 312: Displaying Switch Properties From The Fcip Tunnels Dialog Box

    Displaying switch properties from the FCIP Tunnels dialog box Displaying switch properties from the FCIP Tunnels dialog box Switch properties are displayed on the FCIP Tunnels dialog box when you select a switch (Figure 102). FIGURE 102 Switch properties on the FCIP Tunnels dialog box DCFM Professional User Manual 53-1001773-01...

  • Page 313: Displaying Fabric Properties From The Fcip Tunnels Dialog Box

    Displaying fabric properties from the FCIP Tunnels dialog box Displaying fabric properties from the FCIP Tunnels dialog box Fabric properties are displayed on the FCIP Tunnels dialog box when you select a fabric. (Figure 103). FIGURE 103 Fabric properties on the FCIP Tunnels dialog box DCFM Professional User Manual 53-1001773-01...

  • Page 314: Troubleshooting Fcip Ethernet Connections

    Troubleshooting FCIP Ethernet connections Troubleshooting FCIP Ethernet connections 1. Select an extension blade or switch from the Fabric Tree structure, or right-click an extension blade or switch on the Connectivity Map, and select Properties. 2. Select the GigE Ports tab. 3.

  • Page 315: Fcoe Overview, In This Chapter, Dcb Exchange Protocol

    Chapter Fibre Channel over Ethernet In this chapter • FCoE overview ..........283 •...

  • Page 316: Enhanced Ethernet Features, Enhanced Transmission Selection, Priority-based Flow Control, Ethernet Jumbo Frames

    Enhanced Ethernet features Enhanced Ethernet features Converged Enhanced Ethernet (CEE) is a set of IEEE 802 standard Ethernet enhancements that enable Fibre Channel convergence with Ethernet. The two basic requirements in a lossless Ethernet environment are Enhanced Transmission Selection (ETS) and priority-based flow control. These capabilities allow the Fibre Channel frames to run directly over 10 Gbps Ethernet segments without adversely affecting performance.

  • Page 317: Fcoe Protocols Supported, Ethernet Link Layer Protocols Supported, Fcoe Protocols

    FCoE protocols supported FCoE protocols supported The Brocade FCoE converged network adapter supports two layers of protocols: Ethernet link layer and FCoE layer. They are listed in the following sections. Ethernet link layer protocols supported The following protocols support the Ethernet link layer. •...

  • Page 318: Fcoe Licensing, Save Running To Startup, Copying Switch Configurations To Selected Switches

    FCoE Licensing FCoE Licensing The FCoE license enables Fibre Channel over Ethernet (FCoE) functionality on the Brocade 8000. Without the FCoE license, the Brocade 8000 is a pure L2 Ethernet switch and will not allow FCoE bridging capabilities. With the FCoE license, the FCoE Configuration dialog displays virtual FCoE port information and enables you to manage the virtual port information.

  • Page 319: Cee Configuration

    CEE configuration 2. Highlight a discovered CEE switch from the Available Switches table, and click the right arrow button to move the switch to the Selected Switches Table. 3. Highlight the selected switch and click OK to start the configuration. The running configuration is saved to the selected switch, effective on the next system startup.

  • Page 320: Opening The Cee Configuration Dialog Box

    CEE configuration Opening the CEE Configuration dialog box 1. Launch the CEE Configuration dialog box using one of the following methods: • Select Configure > Switch > CEE from the menu bar. • Right-click the CEE switch from the device tree, and select Configure > CEE. •...

  • Page 321: Cee Configuration Tasks, Minimum Cee Configuration For Fcoe Traffic

    CEE configuration CEE configuration tasks The CEE Configuration dialog box enables you to perform the following tasks: • Edit CEE ports for a selected switch. You can also add a link aggregation group (LAG) if a single switch is selected. •...

  • Page 322

    CEE configuration Creating a CEE map to carry the LAN and SAN traffic To create a CEE map to carry the LAN and SAN traffic, complete the following steps. 1. Select Configure > Switch > CEE. The CEE Configuration dialog box displays. 2.

  • Page 323

    CEE configuration Configuring LLDP for FCoE To configure LLDP for FCoE, complete the following steps. 1. Select Configure > Switch > CEE. The CEE Configuration dialog box displays. 2. Select the switch to edit in the CEE Ports and LAGs table and click Edit. The CEE Edit Switch dialog box displays.

  • Page 324

    CEE configuration Configuring the CEE interface with the CEE Map and Global LLDP profile To configure the CEE interface, complete the following steps. 1. Select Configure > Switch > CEE. The CEE Configuration dialog box displays. 2. Select the Te port connected to the CNA in the CEE Ports and LAGs table and click Edit. 3.

  • Page 325

    CEE configuration 9. Select the FCoE check box. 10. Select the CEE interface to carry the FCoE traffic from the Selection List and click Add to add it to the Selected List. 11. Click OK on the VLAN Configuration dialog box to save your changes. 12.

  • Page 326: Switch Policies, Cee Map And Traffic Class Map, Lldp Profiles, Access Control Lists

    Switch policies Switch policies You can configure and enable a number of CEE policies on a switch, port, or link aggregation group (LAG). The following switch policy configurations apply to all ports in a LAG: • CEE map and Traffic Class map •...

  • Page 327: Spanning Tree Protocol Policy, X Policy

    Switch policies Spanning Tree Protocol policy The Spanning Tree Protocol (STP) is a Layer 2 protocol that ensures a loop-free topology for any bridged LAN (Layer-2 bridges are typically Ethernet switches). Spanning tree allows a network design to include spare (redundant) links to provide automatic backup paths if an active link fails, without the danger of bridge loops or the need to manually enable or disable these backup links.

  • Page 328: Link Aggregation Groups, Adding A Lag

    Link aggregation groups Link aggregation groups Link aggregation, based on the IEEE 802.3ad protocol, is a mechanism to bundle several physical ports together to form a single logical channel or trunk. The collection of ports is called a link aggregation group (LAG). LAG configuration is not supported on internal ports. The Add LAG button is enabled when a single CEE switch or ports of a single CEE switch are selected.

  • Page 329

    Link aggregation groups FIGURE 108 Add LAG dialog box 4. Configure the following LAG parameters: NOTE Ports with 802.1x authentication or ports that are L2 or L3 mode-enabled are not supported in a LAG. • Status - Enabled or Disabled. You must enable the LAG to use the CEE functionality. •...

  • Page 330

    Link aggregation groups 6. Continue to configure the following LAG parameters. These parameters are always enabled. • Mode - Sets all ports added to the LAG members table in either Static or Dynamic mode. The default is Dynamic, Active, but LAG members can be Active or Passive if the LAG member is Dynamic.

  • Page 331: Editing A Cee Switch

    Link aggregation groups Editing a CEE switch 1. Select Configure > Switch > CEE from the menu bar. The CEE Configuration dialog box displays, showing the status of all CEE-related hardware and functions. 2. Select the CEE switch from the Products/Ports table. 3.

  • Page 332: Editing A Cee Port

    Link aggregation groups Editing a CEE port 1. Select Configure > Switch > CEE from the menu bar. The CEE Configuration dialog box displays, showing the status of all CEE-related hardware and functions. 2. Select a CEE port from the Products/Ports table. 3.

  • Page 333: Editing A Lag

    Link aggregation groups 5. When you have finished configuring the policies, apply the settings to the CEE port. NOTE Clicking Cancel when there are pending changes launches a pop-up dialog. 6. Click OK when you have finished modifying the CEE port parameters. The CEE Confirmation and Status dialog box displays.

  • Page 334

    Link aggregation groups 5. Configure the following LAG parameters: NOTE Ports with 802.1x authentication or ports that are L2/L3 mode enabled are not supported in a LAG. • Status - Enabled or Disabled. You must enable the LAG to use the CEE functionality. •...

  • Page 335: Enabling A Cee Port Or Lag

    Link aggregation groups NOTE If the primary or secondary IP address already exists on another interface, an error message displays in the Status area. Enabling a CEE port or LAG If you select multiple switches or multiple ports and LAGs from two or more switches, both the Enable button and the Disable button are disabled.

  • Page 336: Deleting A Lag

    Link aggregation groups Deleting a LAG You can only delete a link aggregation group (LAG) that is selected from a single switch. If you select multiple switches or multiple ports from two or more switches, the Delete button is disabled. 1.

  • Page 337: Cee Performance, Real Time Performance Graph

    CEE Performance CEE Performance Performance monitoring provides details about the quantity of traffic and errors a specific port or device generates on the fabric over a specific time frame. You can also use performance to indicate the devices that create the most traffic and to identify the ports that are most congested. Real Time Performance Graph You can monitor a device’s performance through a performance graph that displays transmit and receive data.

  • Page 338: Historical Performance Graph

    CEE Performance Historical Performance Graph The Historical Performance Graph dialog box enables you to customize how you want the historical performance information to display. Generating a historical performance graph 1. Select a CEE port from the CEE Configuration dialog box, and select Historical Graph from the Performance list.

  • Page 339: Qos Configuration, Enhanced Transmission Selection, Priority-based Flow Control

    QoS configuration QoS configuration QoS configuration involves configuring packet classification, mapping the priority and traffic class, controlling congestion, and scheduling. The configuration of these QoS entities consist of CEE Map and Traffic Class Map configuration. In a Converged Enhanced Ethernet (CEE) configuration, Enhanced Transmission Selection (ETS) and Priority-based flow control (PFC) are configured by utilizing a priority table, a priority group table, and a priority traffic table.

  • Page 340: Creating A Cee Map

    QoS configuration Creating a CEE map When you create a CEE map, each of the Class of Service (CoS) options (0-7) must be mapped to at least one of the Priority Group IDs (0-7) and the total bandwidth must equal 100. All QoS, CEE map, and Traffic map configurations apply to all ports in a LAG.

  • Page 341

    QoS configuration 5. Configure the following CEE Map parameters in the CEE Map table: • Name - Enter a name to identify the CEE map. If the switch is a 10 Gbps CEE/FC switch module, you cannot change the name. •...

  • Page 342: Editing A Cee Map

    QoS configuration Editing a CEE map 1. Select Configure > Switch > CEE from the menu bar. The CEE Configuration dialog box displays, showing the status of all CEE-related hardware and functions. 2. Select a switch, and click Edit. 3. Click the QoS tab on the Edit Switch dialog box. The QoS dialog box displays.

  • Page 343: Deleting A Cee Map

    QoS configuration Deleting a CEE map You cannot delete the CEE map of a 10 Gbps CEE/FC switch module. 1. Select Configure > Switch > CEE from the menu bar. The CEE Configuration dialog box displays, showing the status of all CEE-related hardware and functions.

  • Page 344: Assigning A Cee Map To A Port Or Link Aggregation Group

    QoS configuration Assigning a CEE map to a port or link aggregation group A port can have either a CEE map or a Traffic Class map assigned to it, but it cannot have both. 1. Select Configure > Switch > CEE from the menu bar. The CEE Configuration dialog box displays, showing the status of all CEE-related hardware and functions.

  • Page 345: Creating A Traffic Class Map

    QoS configuration Creating a traffic class map 1. Select Configure > Switch > CEE from the menu bar. The CEE Configuration dialog box displays, showing the status of all CEE-related hardware and functions. 2. Select a switch, and click Edit. 3.

  • Page 346: Editing A Traffic Class Map, Deleting A Traffic Class Map

    QoS configuration Editing a traffic class map 1. Select Configure > Switch > CEE from the menu bar. The CEE Configuration dialog box displays, showing the status of all CEE-related hardware and functions. 2. Select a switch, and click Edit. 3.

  • Page 347: Link Aggregation Group

    QoS configuration Assigning a traffic class map to a port or link aggregation group You can assign a Traffic Class map to a port or ports under the LAG; however, a port does not require a Traffic Class map be assigned to it. A port can have either a CEE map or a Traffic Class map assigned to it, but it cannot have both.

  • Page 348: Lldp-dcbx Configuration, Configuring Lldp For Fcoe

    LLDP-DCBX configuration LLDP-DCBX configuration Link Layer Discovery Protocol (LLDP) provides a solution for the configuration issues caused by increasing numbers and types of network devices in a LAN environment, because, with LLDP, you can statically monitor and configure each device on a network. Data Center Bridging Capability Exchange Protocol (DCBX) enables Enhanced Ethernet devices to discover whether a peer device supports particular features, such as Priority Flow Control or Class of Service (CoS).

  • Page 349: Adding An Lldp Profile

    LLDP-DCBX configuration 4. Select the Global Configuration LLDP profile in the LLDP Profiles table. 5. Click the left arrow button to edit. 6. Select the FCoE Application and FCoE Logical Link check boxes in the Advertise table to advertise them on the network. Click OK.

  • Page 350: Editing An Lldp Profile

    LLDP-DCBX configuration • DCBX - The DCBX profiles. • FCoE application - The FCoE application feature. • FCoE logical link - The logical link level for the SAN network. 6. Click the right arrow button to move the newly created profile into the DBCX Profiles table. Click OK.

  • Page 351: Deleting An Lldp Profile

    LLDP-DCBX configuration Deleting an LLDP profile 1. Select Configure > Switch > CEE from the menu bar. The CEE Configuration dialog box displays, showing the status of all CEE-related hardware and functions. 2. Select a switch, and click Edit. 3. Click the LLDP-DCBX tab on the Edit Switch dialog box. The LLDP Profile dialog box displays.

  • Page 352: Assigning An Lldp Profile To A Port Or Ports In A Lag

    LLDP-DCBX configuration Assigning an LLDP profile to a port or ports in a LAG You create LLDP profiles using the Edit Switch dialog box, which you access from the CEE Configuration dialog box. Global configuration parameters, which is the default selection, are displayed in the Assigned Profile table shown in Figure 117.

  • Page 353

    LLDP-DCBX configuration 6. Click OK. The CEE Confirmation and Status dialog box displays. Review the changes carefully before you accept them. The port you selected on the CEE Configuration dialog box should now be assigned to the profile you selected from the Available Profiles list.

  • Page 354: Access Control List Configuration, Adding An Acl To A Switch

    Access Control List configuration Access Control List configuration Access control lists (ACL) are sequential lists consisting of permit and deny rules. They are either Layer 3 (IP)- or Layer 2 (MAC)-specific. You can configure multiple access lists and rules and store them in the configuration.

  • Page 355

    Access Control List configuration 4. Click Add and select Standard or Extended from the Add list. The Add Extended Access Control List includes all the Standard ACL features plus two additional features: Destination and Ether Type. The ACL parameters are described below. FIGURE 119 Add Extended Access Control List dialog box 5.

  • Page 356: Editing The Parameters Of An Acl

    Access Control List configuration • Count - Instructs the system to maintain a counter. • Ether Type - Specifies the Ethernet protocol being transferred in the Ethernet frame. Only one of the following Ether types is supported at a time. Address Resolution Protocol (ARP) - Ether Type 0x0806 ...

  • Page 357: Deleting An Acl, Assigning An Acl To A Port Or Link Aggregation Group

    Access Control List configuration Deleting an ACL When you delete an ACL from the ACLs table, you are given the option to also remove the profile from the entities where it is currently associated. 1. Select Configure > Switch > CEE from the menu bar. The CEE Configuration dialog box displays, showing the status of all CEE-related hardware and functions.

  • Page 358

    Access Control List configuration FIGURE 120 Assign ACL to port dialog box 5. Select an ACL from the Available ACLs list. The ACL name is suffixed with its type (standard or extended) in parentheses; for example, Human Resources (Extended). The details of the selected ACL are displayed in the Assigned ACL Details table, shown in Figure 120.

  • Page 359: Spanning Tree Protocol Configuration, Enabling Spanning Tree Protocol

    Spanning Tree Protocol configuration Spanning Tree Protocol configuration You can configure Spanning Tree Protocol (STP) when editing a LAG, but not when you are adding a LAG. The 8 Gbps 16-FC-ports, 10 GbE 8-Ethernet Port, and the 10 Gbps CEE/FC switch module support the following types of STP: •...

  • Page 360: Setting Spanning Tree Parameters For A Switch

    Spanning Tree Protocol configuration Setting Spanning Tree parameters for a switch You cannot configure Spanning Tree Protocol (STP) when adding a new LAG. STP can be configured only after the LAG has been added to the switch. NOTE The ports and the ports in a link aggregation group (LAG) for the selected switch must be in Layer 2 (L2) mode.

  • Page 361

    Spanning Tree Protocol configuration 5. Configure the following Spanning Tree Protocol parameters: • Priority - The bridge priority. The value range is 0-61440 and the default value is 32768. The value must be in increments of 4096. • Mode - The spanning tree protocol mode. Options include Spanning Tree Protocol (STP), Rapid Spanning Tree Protocol (RSTP), and Multiple Spanning Tree Protocol (MSTP).

  • Page 362

    Spanning Tree Protocol configuration FIGURE 122 Spanning Tree Protocol dialog box, MSTP 6. Click OK. The CEE Confirmation and Status dialog box displays. Review the changes carefully before you accept them. 8. Click Start to apply the changes, or click Close to abort the operation. DCFM Professional User Manual 53-1001773-01...

  • Page 363: Stp Configurable Parameters At The Port Or Lag Level

    Spanning Tree Protocol configuration STP configurable parameters at the port or LAG level You cannot configure Spanning Tree Protocol (STP) when adding a new LAG. STP can be configured only after the LAG has been added to the switch. Figure 123 shows the Spanning Tree Protocol (STP) parameters that are configurable at the port or LAG level.

  • Page 364: X Authentication, Enabling 802.1x Authentication

    802.1x authentication 802.1x authentication 802.1x is a standard authentication protocol that defines a client-server-based access control and authentication protocol. 802.1x restricts unknown or unauthorized clients from connecting to a LAN through publicly accessible ports. NOTE 802.1x is not supported for internal ports. A switch must be enabled for 802.1x authentication before you configure its parameters.

  • Page 365: Disabling 802.1x, Setting 802.1x Parameters For A Switch

    802.1x authentication Disabling 802.1x 1. Select Configure > Switch > CEE from the menu bar. The CEE Configuration dialog box displays, showing the status of all CEE-related hardware and functions. 2. Select a switch and click Edit. 3. Click the 802.1x tab on the Edit Switch dialog box. The 802.1x dialog box displays.

  • Page 366

    802.1x authentication 4. Click the Enable 802.1x check box to enable 802.1x authentication, and click OK. The 802.1x dialog box displays. FIGURE 124 802.1x dialog box 6. Configure the following 802.1x parameters: • Wait Period - The number of seconds the switch waits before sending an EAP request. The value range is 15 to 65535 seconds.

  • Page 367: Cee Switch Management Using Web Tools

    CEE switch management using Web Tools CEE switch management using Web Tools You can open Web Tools directly from the CEE Configuration dialog box and use the Element Man- ager to enable and manage the CEE switch. To launch a CEE switch’s Element Manager, complete the following steps. 1.

  • Page 368: Cee Switch Management Using Telnet, Virtual Fcoe Port Configuration

    CEE switch management using Telnet CEE switch management using Telnet You can use Telnet to log in and issue command line-based commands to a CEE switch. To launch a Telnet session, complete the following steps: 1. Launch the CEE Configuration dialog box using one of the following methods: •...

  • Page 369: Viewing Virtual Fcoe Ports

    Virtual FCoE port configuration Viewing virtual FCoE ports Configuration of virtual FCoE ports requires installation of the FCoE license on the switch. 1. Select Configure > Switch > FCoE from the menu bar. The FCoE Configuration dialog box displays. 2. Select the Virtual FCoE Ports tab. The Virtual FCoE Ports tab displays.

  • Page 370: Clearing A Stale Entry

    Virtual FCoE port configuration Clearing a stale entry A stale entry is a device that logged in and logged off but, because a port went down after an FLOGI was received, the device failed to receive the message. The entry in the FCoE Connected Devices table becomes stale and you must clear it manually.

  • Page 371

    Chapter Encryption configuration In this chapter • Encryption Center features ........340 •...

  • Page 372: Encryption Center Features

    Encryption Center features Encryption Center features The Encryption Center dialog box (Figure 127) is the single launching point for all encryption-related configuration in the Management application. It also provides a table that shows the general status of all encryption-related hardware and functions at a glance. FIGURE 127 Encryption Center dialog box Beginning with Fabric OS version 6.4, the Encryption Center is dynamically updated to reflect the...

  • Page 373: Encryption User Privileges

    Encryption user privileges Encryption user privileges In the Management application, resource groups are assigned privileges, roles, and fabrics. Privileges are not directly assigned to users; users get privileges because they belong to a role in a resource group. A user can only belong to one resource group at a time. The Management application provides three pre-configured roles: •...

  • Page 374: Smart Card Usage

    Smart card usage Smart card usage Smart Cards are credit card-sized cards that contain a CPU and persistent memory. Smart cards can be used as security devices. You must have Storage Encryption Security user privileges to activate, register, and configure smart cards. Smart cards can be used to do the following: •...

  • Page 375: Registering Authentication Cards From A Card Reader

    Smart card usage Registering authentication cards from a card reader When authentication cards are used, one or more authentication cards must be read by a card reader attached to a Management application PC to enable certain security sensitive operations. These include the following: •...

  • Page 376: Registering Authentication Cards From The Database, De-registering An Authentication Card, Using Authentication Cards

    Smart card usage Registering authentication cards from the database Smart cards that are already in the Management program’s database can be registered as authentication cards. 1. From the Register Authentication Cards dialog box, select Register from Archive. The Authentication Cards dialog box displays, showing a list of smart cards in the database. 2.

  • Page 377

    Smart card usage 1. When the Authenticate dialog box is displayed, gather the number of cards needed, as directed by instructions on the dialog box. The currently registered cards and the assigned owners are listed in the table near the bottom of the dialog box. 2.

  • Page 378: Enabling Or Disabling The System Card Requirement, Registering System Cards From A Card Reader

    Smart card usage Enabling or disabling the system card requirement If you want to use a system card to control activation of an encryption engine on a switch, you must enable the system card requirement. You can use the following procedure to enable or disable the system card requirement.

  • Page 379: Tracking Smart Cards

    Smart card usage 3. A confirmation dialog box is displayed. Click OK to confirm de-registration. The card is removed to the Registered System Cards table. Tracking smart cards Use the Smart Card Tracking dialog box to track smart card details. 1.

  • Page 380: Editing Smart Cards

    Smart card usage Editing smart cards Use the Edit Smart Card dialog box to edit smart card details. 1. From the Encryption Center, select Smart Card > Edit Smart Card. The Edit Smart Card dialog box displays(Figure 129). FIGURE 129 Edit Smart Card dialog box 2.

  • Page 381: Network Connections, Configuring Blade Processor Links

    Network connections Network connections Before you use the encryption setup wizard for the first time, you must have the following required network connections: • The management ports on all encryption switches and 384-port Backbone Chassis CPs that have encryption blades installed must have a LAN connection to the SAN management program, and must be available for discovery.

  • Page 382: Encryption Node Initialization And Certificate Generation

    Encryption node initialization and certificate generation Encryption node initialization and certificate generation When an encryption node is initialized, the following security parameters and certificates are generated: • FIPS crypto officer • FIPS user • Node CP certificate • A self-signed Key authentication center KAC) certificate •...

  • Page 383: Supported Encryption Key Manager Appliances

    Supported encryption key manager appliances Supported encryption key manager appliances As stated under “Network connections”, a supported key management appliance must be connected on the same LAN as the management port of the encryption switches or of the Backbone Chassis Control Processors (CPs) in the case of the encryption blade. Secure communication between encryption nodes in an encryption group, and between encryption nodes and key manager appliances requires an exchange of certificates that are used for mutual authentication.

  • Page 384: Steps For Connecting To An Rkm Appliance, Exporting The Kac Certificate Signing Request (csr)

    Steps for connecting to an RKM appliance Steps for connecting to an RKM appliance All switches you plan to include in an encryption group must have a secure connection to the RSA Key Manager (RKM). The following is a suggested order for the steps needed to create a secure connection to RKM: 3.

  • Page 385: Importing The Signed Kac Certificate, Rkm Appliance

    Steps for connecting to an RKM appliance 4. Download and store the signed certificates. The following example submits a CSR to the demoCA from RSA. cd /opt/CA/demoCA openssl x509 -req -sha1 -CAcreateserial -in certs/KACcsr kac_RKM_cert.pem -days 365 -CA ca Importing the signed KAC certificate After a KAC CSR has been submitted and signed by a CA, the signed certificate must be imported into the switch.

  • Page 386: Rkm Key Vault High Availability Deployment

    Steps for connecting to an RKM appliance kcn.1998-01.com.brocade:DEK_AES_256_ECB a. Click Create. b. Type the key name string into the Name field. Select Hardware Retail Group for Identity Group. d. Deselect Activated Keys Have Duration. e. Select AES for Algorithm. Select 256 for Key Size. Select the Mode for the respective key classes as follows: XTS for Key Class "kcn.1998-01.com.brocade:DEK_AES_256_XTS"...

  • Page 387: Steps For Connecting To An Lkm Appliance, The Netapp Datafort Management Console

    Steps for connecting to an LKM appliance Steps for connecting to an LKM appliance The NetApp Lifetime Key Manager (LKM) resides on an FIPS 140-2 Level 3-compliant network appliance. The encryption engine and LKM appliance communicate over a trusted link. A trusted link is a secure connection established between the Encryption switch or blade and the NetApp LKM appliance, using a shared secret called a link key.

  • Page 388: Establishing The Trusted Link

    Steps for connecting to an LKM appliance Establishing the trusted link You must generate the trusted link establishment package (TEP) on all nodes to obtain a trusted acceptance package (TAP) before you can establish a trusted link between each node and the NetApp LKM appliance.

  • Page 389: Obtaining And Importing The Lkm Certificate

    Steps for connecting to an LKM appliance Obtaining and importing the LKM certificate Certificates must be exchanged between LKM and the encryption switch to enable mutual authentication. You must obtain a certificate from LKM, and import it into the encryption group leader.

  • Page 390: Lkm Key Vault High Availability Deployment

    Steps for connecting to an LKM appliance Exporting and registering the switch KAC certificates on LKM The encryption switch self-signed KAC certificates must exported and then registered on the LKM appliance. 1. From the Encryption Center, select Switch > Export Certificate. The Export Switch Certificate dialog box displays.

  • Page 391: Tape Lun And Df -compatible Tape Pool Support, Lkm Key Vault Deregistration

    Steps for connecting to an LKM appliance Tape LUN and DF -compatible tape pool support • DEK Creation - The DEK is created and archived to the primary LKM only. Upon successful archival of the DEK to the primary LKM, the DEK can be used for encryption of a Tape LUN or DF-Compatible tape pool.

  • Page 392: Steps For Connecting To An Skm Appliance

    Steps for connecting to an SKM appliance Steps for connecting to an SKM appliance The SKM management web console can be accessed from any web browser with Internet access to the SKM appliance. The URL for the appliance is as follows: https://<appliance hostname>:<appliance port number>...

  • Page 393: Configuring A Brocade Group On Skm

    Steps for connecting to an SKM appliance Configuring a Brocade group on SKM A Brocade group is configured on SKM for all keys created by Brocade encryption switches and blades. This needs to be done only once for each key vault. 1.

  • Page 394: User Name And Password

    Steps for connecting to an SKM appliance Registering the SKM Brocade group user name and password The Brocade group user name and password you created when configuring a Brocade group on SKM must also be registered on each Brocade encryption node. 1.

  • Page 395: Setting Up The Local Certificate Authority (ca) On Skm

    Steps for connecting to an SKM appliance Setting up the local Certificate Authority (CA) on SKM To create and install a local CA, perform the following steps: 1. Login to the SKM management web console using the admin password. 2. Select the Security tab. 3.

  • Page 396: Downloading The Local Ca Certificate From Skm, Creating And Installing The Skm Server Certificate

    Steps for connecting to an SKM appliance In the Trusted Certificate Authority List, click Edit. 8. From the list of Available CAs in the right panel, select the CA you just created. Repeat these steps any time another local CA is needed. Downloading the local CA certificate from SKM The local CA certificate you created using the procedure for “Setting up the local Certificate...

  • Page 397: Server

    Steps for connecting to an SKM appliance 11. Enter the required data in the Sign Certificate Request section of the window. Select the CA name from the Sign with Certificate Authority drop down box. Select Server as the Certificate Purpose. Enter the number of days before the certificate must be renewed based on your site's security policies.

  • Page 398: Creating An Skm High Availability Cluster, Skm Appliance

    Steps for connecting to an SKM appliance Creating an SKM High Availability cluster The HP SKM key vault supports clustering of HP SKM appliances for high availability. If two SKM key vaults are configured, they must be clustered. If only a single SKM appliance is configured, it may be clustered for backup purposes, but the backup appliance will not be directly used by the switch.

  • Page 399: Adding Skm Appliances To The Cluster

    Steps for connecting to an SKM appliance Adding SKM appliances to the cluster If you are adding an appliance to an existing cluster, select the Cluster Settings section of the window, click Download Cluster Key and save the key to a convenient location, such as your computer's desktop.

  • Page 400: Signing The Brocade Encryption Node Kac Certificates, Importing A Signed Kac Certificate Into A Switch

    Steps for connecting to an SKM appliance Signing the Brocade encryption node KAC certificates The KAC certificate signing request generated when the encryption node is initialized must be exported for each encryption node and signed by the Brocade local CA on SKM. The signed certificate must then be imported back into the encryption node.

  • Page 401: Steps For Connecting To A Tems Appliance, Setting Up Tems Network Connections

    Steps for connecting to a TEMS appliance Steps for connecting to a TEMS appliance TEMS provides a web user interface for management of clients, keys, admins, and configuration parameters. A Thales officer creates domains, groups, and managers (a type of administrator), assigns groups to domains and assigns managers to manage groups.

  • Page 402: Creating A Client On Tems

    Steps for connecting to a TEMS appliance 2. Enter the management IP address information under Management Interface. 3. Enter the client IP address information under KM Server Interface. 4. Enter a host name for the appliance, internet or intranet domain, and, if used, the primary and secondary DNS IP address under Common Settings.

  • Page 403

    Steps for connecting to a TEMS appliance FIGURE 133 TEMS Clients tab Click the Add Client tab. 8. Paste or type in the user name from step 4 in the Name field. 9. Enter a password in the Password and Verify Password fields. 10.

  • Page 404: Establishing Tems Key Vault Credentials On The Switch

    Steps for connecting to a TEMS appliance Establishing TEMS key vault credentials on the switch The credentials established for the TEMS client must be presented to TEMS by the switch. 1. From the Encryption Center, select Switch > Key Vault Credentials. The Key Vault Credentials dialog box displays (Figure 134).

  • Page 405: Gathering Information

    Gathering information Gathering information Before you use the encryption setup wizard for the first time, you should also have a detailed configuration plan in place and available for reference. The encryption setup wizard assumes the following: • You have a plan in place to organize encryption devices into encryption groups. •...

  • Page 406: Creating A New Encryption Group

    Creating a new encryption group Creating a new encryption group The following steps describe how to start and run the encryption setup wizard, and then create a new encryption group. NOTE When a new encryption group is created, any existing tape pools in the switch are removed. 1.

  • Page 407

    Creating a new encryption group 4. Click Next. Create a new encryption Group is pre-selected. This is the correct selection for creating a new group. FIGURE 136 Designate Switch Membership dialog box 5. Enter an Encryption Group Name for the encryption group (the maximum length of the group name is 15 characters;...

  • Page 408

    Creating a new encryption group FIGURE 137 Select Key Vault dialog box Select the Key Vault Type. The choices are the following: RSA Key Manager (RKM) NetApp Link Key Manager (LKM) HP Secure Key Manager (SKM) Thales Encryption Manager for Storage (TEMS) Tivoli Key Lifetime Manager (TKLM) Different options are available depending on which key vault type you choose.

  • Page 409

    Creating a new encryption group When you select RKM, the options are a shown in Figure 138. a. Enter the IP address or host name for the primary key vault. If you are clustering RKM appliances for high availability, IP load balancers are used to direct traffic to the appliances.

  • Page 410

    Creating a new encryption group When you select LKM, the options are as shown in Figure 139. a. Enter the IP address or host name for the primary key vault. b. Enter the name of the file that holds the primary key vault’s public key certificate or browse to the location by clicking the Browse button.

  • Page 411

    Creating a new encryption group When you select SKM, the options are as shown in Figure 140. a. Enter the IP address or host name for the primary key vault. b. Enter the name of the file that holds the primary key vault’s public key certificate or browse to the location by clicking the Browse button.

  • Page 412

    Creating a new encryption group When you select TEMS, the options are as shown in Figure 141. a. Enter the IP address or host name for the primary key vault. b. Enter the name of the file that holds the primary key vault’s public key certificate or browse to the location by clicking the Browse button.

  • Page 413

    Creating a new encryption group When you select TKLM, the options are as shown in Figure 142. a. Enter the IP address or host name for the primary key vault. b. Enter the name of the file that holds the primary key vault’s public key certificate or browse to the location by clicking the Browse button.

  • Page 414

    Creating a new encryption group FIGURE 143 Specify Public Key Certificate filename dialog box 8. Specify the name of the file where you want to store the public key certificate that is used to authenticate connections to the key vault, and click Next. The certificate stored in this file is the switch’s public key certificate.

  • Page 415

    Creating a new encryption group FIGURE 144 Specify Master Key File Name dialog box 10. Enter a file name, or browse to the desired location. 11. Enter the passphrase, which is required for restoring the master key. The passphrase can be between eight and 40 characters, and any character is allowed.

  • Page 416

    Creating a new encryption group 13. Click Next. The Confirm Configuration panel displays the encryption group name and switch public key certificate file name you specified, shown in Figure 145. FIGURE 145 Confirm Configuration dialog box 14. Click Next to confirm the displayed information. The Configuration Status displays, as shown in Figure 146.

  • Page 417

    Creating a new encryption group FIGURE 146 Configuration Status dialog box The Management application sends API commands to verify the switch configuration. The CLI commands are detailed in the Fabric OS Encryption Administrator’s Guide, “Key vault configuration.” • Initialize the switch If the switch is not already in the initiated state, the Management application performs the command.

  • Page 418

    Creating a new encryption group • Create a new master key The Management application checks for a new master key. New master keys are generated from the Encryption Group Properties dialog box, Security tab. See “Creating a new master key” on page 419 for more information.

  • Page 419: Adding A Switch To An Encryption Group

    Adding a switch to an encryption group Adding a switch to an encryption group The setup wizard allows you to either create a new encryption group, or add an encryption switch to an existing encryption group. Use the following procedure to add a switch to an encryption group. 1.

  • Page 420

    Adding a switch to an encryption group FIGURE 148 Add Switch to Existing Encryption Group dialog box 5. Select the group to which you want to add the switch, and click Next. The Specify Public Key Certificate Filename panel displays. FIGURE 149 Add switch to an encryption group - Specify Public Key Certificate filename dialog box 6.

  • Page 421

    Adding a switch to an encryption group FIGURE 150 Add switch to an encryption group - Confirm Configuration dialog box Click Next to confirm the displayed information. The Configuration Status displays. • A progress indicator shows that a configuration step is in progress. A green check mark indicates successful completion of all steps for that Configuration Item.

  • Page 422: Replacing An Encryption Engine In An Encryption Group

    Replacing an encryption engine in an encryption group 8. Note Important Next Steps! below this message, and click Next. Instructions for installing public key certificates for the encryption switch are displayed. These instructions are specific to the key vault type. Copy or print these instructions. FIGURE 152 Add switch to an encryption group - Next Steps dialog box 9.

  • Page 423: Creating High Availability (ha) Clusters

    Creating high availability (HA) clusters FIGURE 153 Engine Operations tab 2. Select the engine you want to replace in the Engine list. 3. Select the engine you want to use as the replacement in the Replacement list. 4. Click Replace. All containers hosted by the current engine (Engine list) are replaced by the new engine (Replacement list).

  • Page 424: Removing Engines From An Ha Cluster

    Creating high availability (HA) clusters 4. Select an available encryption engine, and a destination HA cluster under High-Availability Clusters. Select New HA Cluster if you are creating a new cluster. 5. Click the right arrow to add the encryption engine to the selected HA cluster. FIGURE 154 HA Clusters tab NOTE...

  • Page 425: Swapping Engines In An Ha Cluster, Failback Option, Invoking Failback

    Creating high availability (HA) clusters Swapping engines in an HA cluster Swapping engines is useful when replacing hardware. Swapping engines is different from removing an engine and adding another because when you swap engines, the configured targets on the former HA cluster member are moved to the new HA cluster member. To swap engines, select one engine from the right tree (see Figure 154) and one unclustered...

  • Page 426: Adding Encryption Targets

    Adding encryption targets Adding encryption targets Adding an encryption target maps storage devices and hosts to virtual targets and virtual initiators within the encryption switch. NOTE It is recommended that you zone the host and target together before configuring them for encryption.

  • Page 427

    Adding encryption targets 5. Click Next to begin. The Select Encryption Engine dialog box displays. The list of engines depends on the scope being viewed. • If the Targets dialog box is showing all targets in an encryption group, the list includes all engines in the group.

  • Page 428

    Adding encryption targets 6. Select the encryption engine (blade or switch) you want to configure, and click Next. The Select Target panel displays. This panel lists all target ports and target nodes in the same fabric as the encryption engine. The Select Target list does not show targets that are already configured in an encryption group.

  • Page 429

    Adding encryption targets Click Next. The Select Hosts panel displays. This panel lists all hosts in the same fabric as the encryption engine. There are two available methods for selecting hosts: select from a list of known hosts or manually enter the port and node world wide names. FIGURE 158 Select Hosts dialog box a.

  • Page 430

    Adding encryption targets FIGURE 159 Name Container dialog box 10. Click Next. The Confirmation panel displays. FIGURE 160 Confirmation dialog box DCFM Professional User Manual 53-1001773-01...

  • Page 431

    Adding encryption targets 11. Click Next to confirm the displayed information. The Configuration Status displays the target and host that are configured in the target container, as well as the virtual targets (VT) and virtual initiators (VI). NOTE If you can view the VI/VT Port WWNs and VI/VT Node WWNs, the container has been successfully added to the switch.

  • Page 432

    Adding encryption targets 13. Click Next to confirm the configuration. The Important Instructions dialog box displays. FIGURE 162 Important Instructions dialog box 14. Review the instructions about post-configuration tasks you must complete after you close the wizard. 15. Click Finish to exit the Configure Storage Encryption wizard. DCFM Professional User Manual 53-1001773-01...

  • Page 433: Configuring Hosts For Encryption Targets

    Configuring hosts for encryption targets Configuring hosts for encryption targets Use the Encryption Target Hosts dialog box to edit (add or remove) hosts for an encrypted target. NOTE Hosts are normally selected as part of the Configure Storage Encryption wizard but you can also edit hosts later using the Encryption Target Hosts dialog box.

  • Page 434: Adding Target Disk Luns For Encryption

    Adding target disk LUNs for encryption Adding target disk LUNs for encryption You can add a new path to an existing disk LUN or add a new LUN and path by launching the Add New Path wizard. Take the following steps to launch the Add New Path wizard. 1.

  • Page 435

    Adding target disk LUNs for encryption The Select Initiator Port dialog box displays. 6. Select the initiator port from the Initiator Port list. Click Next. LUN discovery is launched, and a progress bar displays. There are four possible outcomes: A message displays indicating No LUNs are discovered. Click OK to dismiss the message and exit the wizard.

  • Page 436: Remote Replication Luns, Srdf Pairs

    Adding target disk LUNs for encryption Remote replication LUNs The Symmetrix Remote Data Facility (SRDF) transmits data that is being written to a local Symmetrix array to a remote symmetrix array. The replicated data facilitates a fast switchover to the remote site for data recovery.

  • Page 437: Metadata Requirements And Remote Replication

    Adding target disk LUNs for encryption FIGURE 167 Basic SRDF configuration with Brocade encryption switches Metadata requirements and remote replication When the metadata and key ID are written, the primary metadata on blocks 1 to 16 is compressed and encrypted. However, there are scenarios where these blocks are not compressible, and the metadata is not written to the media.

  • Page 438

    Adding target disk LUNs for encryption • The New LUN option is used only if an RKM key vault is configured for the encryption group. • The New LUN option can be used only if replication is enabled for the encryption group. •...

  • Page 439: Adding Target Tape Luns For Encryption

    Adding Target Tape LUNs for encryption Adding Target Tape LUNs for encryption You configure a Crypto LUN by adding the LUN to the CryptoTarget container and enabling the encryption property on the Crypto LUN. You must add LUNs manually. After you add the LUNs, you must specify the encryption settings.

  • Page 440: Multi-path Environment, Configuring Encrypted Tape Storage In A Multi-path Environment

    Adding Target Tape LUNs for encryption 8. Select the desired encryption mode. • If you change a LUN policy from Native Encryption or DF-Compatible Encryption to Clear Text, you disable encryption. • The LUNs of the target which are not enabled for encryption must still be added to the CryptoTarget container with the Clear Text encryption mode option.

  • Page 441: Re-balancing The Encryption Engine

    Re-balancing the encryption engine 9. Select target port B, click LUNs, then click Add. Select the LUNs to be encrypted and the encryption policies for the LUNs, making sure that the encryption policies match the policies specified in the other path. 10.

  • Page 442: Master Keys, Active Master Key, Alternate Master Key

    Master keys To rebalance an encryption engine, do the following. 1. Select Configure > Encryption from the menu bar. The Encryption Center dialog box displays. 2. Select an encryption engine and select Engine > Re-Balance from the menu bar, or right click on the encryption engine, and select Re-Balance.

  • Page 443: Master Key Actions, Reasons Master Keys Can Be Disabled

    Master keys Master key actions Master key actions are as follows: • Backup master key, which is enabled any time a master key exists. • Restore master key, which is enabled when no master key exists or the previous master key has been backed up.

  • Page 444

    Master keys 4. Select Backup Master Key as the Master Key Action. The Master Key Backup dialog box displays, but only if the master key has already been generated. FIGURE 168 Backup Destination (to file) dialog box 5. Select File as the Backup Destination. 6.

  • Page 445: Saving A Master Key To A Key Vault

    Master keys Saving a master key to a key vault Use the following procedure to save the master key to a key vault. 1. Select Configure > Encryption from the menu bar. The Encryption Center dialog box displays. 2. Select an encryption group from the tree, and click Properties. 3.

  • Page 446: Saving A Master Key To A Smart Card Set

    Master keys Saving a master key to a smart card set A card reader must be attached to the SAN Management application PC to complete this procedure. Recovery cards can only be written once to back up a single master key. Each master key backup operation requires a new set of previously unused smart cards.

  • Page 447

    Master keys FIGURE 170 Backup Destination (to smart cards) dialog box 5. Select A Recovery Set of Smart Cards as the Backup Destination. 6. Enter the recovery card set size. Insert the first blank card and wait for the card serial number to appear. 8.

  • Page 448: Restoring A Master Key From A File

    Master keys Restoring a master key from a file Use the following procedure to restore the master key from a file. 1. Select Configure > Encryption from the menu bar. The Encryption Center dialog box displays. 2. Select an encryption group from the tree, and click Properties. 3.

  • Page 449: Restoring A Master Key From A Key Vault

    Master keys Restoring a master key from a key vault Use the following procedure to restore the master key from a key vault. 1. Select Configure > Encryption from the menu bar. The Encryption Center dialog box displays. 2. Select an encryption group from the tree, and click Properties. 3.

  • Page 450: Restoring A Master Key From A Smart Card Set

    Master keys Restoring a master key from a smart card set A card reader must be attached to the SAN Management application PC to complete this procedure. Use the following procedure to restore the master key from a set of smart cards. 1.

  • Page 451: Creating A New Master Key

    Master keys 10. Insert the next card, and repeat step 8 step 11. Continue until all the cards in the set have been read. 12. Click OK. Creating a new master key Though it is generally not necessary to create a new master key, you may be required to create one due to circumstances such as the following: •...

  • Page 452: Zeroizing An Encryption Engine

    Zeroizing an encryption engine Zeroizing an encryption engine Zeroizing is the process of erasing all data encryption keys and other sensitive encryption information in an encryption engine. You can zeroize an encryption engine manually to protect encryption keys. No data is lost because the data encryption keys for the encryption targets are stored in the key vault.

  • Page 453: Encryption Targets Dialog Box

    Encryption Targets dialog box A confirmation dialog box describing consequences and actions required to recover launches. 4. Click YES to zeroize the encryption engine. Encryption Targets dialog box The Encryption Targets dialog box enables you to send outbound data that you want to store as ciphertext to an encryption device.

  • Page 454

    Encryption Targets dialog box FIGURE 175 Encryption Targets dialog box TABLE 22 Feature Description Add button Launches the Storage Encryption Setup Wizard, which enables you to configure a new target for encryption. It is the first step in configuring encryption for a storage device. It is recommended that you zone the host and target together before you add container information.

  • Page 455: Redirection Zones

    Encryption Targets dialog box TABLE 22 Feature Description Hosts button Launches the Encryption Target Hosts dialog box, where you can configure hosts to access the selected encryption target. LUNs button Launches the Encryption Target LUNs dialog box, where you can display existing LUNs and add new LUNs.

  • Page 456: Disk Device Decommissioning, Decommissioning Luns

    Disk device decommissioning Disk device decommissioning A disk device needs to be decommissioned when any of the following occur: • The storage lease expires for an array, and devices must be returned or exchanged. • Storage is reprovisioned for movement between departments. •...

  • Page 457: Displaying And Deleting Decommissioned Key Ids, Viewing And Editing Switch Encryption Properties

    Viewing and editing switch encryption properties Displaying and deleting decommissioned key IDs When disk LUNs are decommissioned, the process includes the disabling of the key record in the key vault and indicating that the key has been decommissioned. These decommissioned keys are still stored on the switch.

  • Page 458

    Viewing and editing switch encryption properties FIGURE 176 Encryption Properties dialog box • Switch Properties table - the properties associated with the selected switch. • Name - the name of the selected switch. • Node WWN - the world wide name of the node. •...

  • Page 459

    Viewing and editing switch encryption properties • Domain ID - the domain ID of the selected switch. • Firmware Version - the current encryption firmware on the switch. • Primary Key Vault Link Key Status - the possible statuses are as follows: Not Used –...

  • Page 460: Properties, Importing A Signed Public Key Certificate From Properties

    Viewing and editing switch encryption properties • HA Cluster Name - the name of the HA cluster (for example, Cluster1), if in an HA configuration. The name can have a maximum of 31 characters. Only letters, digits, and underscores are allowed.

  • Page 461: Disabling The Encryption Engine State From Properties

    Viewing and editing switch encryption properties 1. Find the Set State To entry under Encryption Engine Properties. 2. Click the field and select Enabled. 3. Click OK. Disabling the encryption engine state from Properties To disable the encryption engine, complete the following steps. 1.

  • Page 462: Viewing And Editing Group Properties

    Viewing and editing group properties Viewing and editing group properties To view encryption group properties, complete the following steps. 1. Select Configure > Encryption. The Encryption Center dialog box displays. 2. If groups are not visible in the Encryption Devices table, select View > Groups from the menu bar.

  • Page 463: General Tab, Members Tab

    Viewing and editing group properties General tab The properties displayed in the General tab are described below. • Encryption group name - the name of the encryption group. • Group status - the status of the encryption group, which can be OK-Converged or Degraded. Degraded means the group leader cannot contact all of the configured group members.

  • Page 464: Consequences Of Removing An Encryption Switch

    Viewing and editing group properties Members tab Remove button You can click the Remove button to remove a selected switch or an encryption group from the encryption group table. • You cannot remove the group leader unless it is the only switch in the group. If you remove the group leader, the Management application also removes the HA cluster, the target container, and the tape pool (if configured) that are associated with the switch.

  • Page 465

    Viewing and editing group properties FIGURE 178 Removal of switch warning Figure 179 shows the warning message that displays if you click Remove to remove an encryption group. FIGURE 179 Removal of switch in encryption group warning DCFM Professional User Manual 53-1001773-01...

  • Page 466: Security Tab

    Viewing and editing group properties Security tab The Security tab (Figure 180) displays the status of the master key for the encryption group. NOTE You must enable encryption engines before you back up or restore master keys. Master key actions are as follows: •...

  • Page 467: Ha Clusters Tab, Engine Operations Tab

    Viewing and editing group properties HA Clusters tab HA clusters are groups of encryption engines that provide high availability features. If one of the engines in the group fails or becomes unreachable, the other cluster member takes over the encryption and decryption tasks of the failed encryption engine. An HA cluster consists of exactly two encryption engines.

  • Page 468: Link Keys Tab

    Viewing and editing group properties Link Keys tab Connections between a switch and an NetApp LKM key vault require a shared link key. Link keys are used only with LKM key vaults. They are used to protect data encryption keys in transit to and from the key vault.

  • Page 469: Tape Pools Tab

    Viewing and editing group properties Tape Pools tab Tape pools are managed from the Tape Pools tab. Figure 182 displays the tape pools tab. FIGURE 182 Encryption Group Properties - Tape Pools tab • If you want to remove a tape pool, select one or more tape pools in the list and click Remove. •...

  • Page 470

    Viewing and editing group properties Adding tape pools A tape pool can be identified by either a name or a number, but not both. Tape pool names and numbers must be unique within the encryption group. When a new encryption group is created, any existing tape pools in the switch are removed and must be added.

  • Page 471: Encryption-related Acronyms In Log Messages

    Encryption-related acronyms in log messages 6. Select the Encryption Mode. Choices include Clear Text, DF-Compatible Encryption, and Native Encryption. DF-Compatible Encryption is valid only when LKM is the key vault. The Key Lifespan (days) field is editable only if the tape pool is encrypted. If Clear Text is selected as the encryption mode, the key lifespan is disabled.

  • Page 472

    Encryption-related acronyms in log messages DCFM Professional User Manual 53-1001773-01...

  • Page 473: Zoning Overview, In This Chapter, Types Of Zones

    Chapter Zoning In this chapter • Zoning overview ..........441 •...

  • Page 474: Online Zoning, Accessing Zoning, Zoning Naming Conventions

    Zoning overview • Traffic Isolation zones (TI zones) Isolate inter-switch traffic to a specific, dedicated path through the fabric. See “Traffic isolation zoning” on page 461 for more information. Online zoning Online zoning allows you to do the following: • View both defined and active zone information in the fabric.

  • Page 475: Zoning Configuration, Configuring Zoning For The San

    Zoning configuration For FC fabrics, if an invalid name is entered for a zone or zone configuration, the application displays a warning message. If there is a naming violation according to the vendor, the switch returns the error message for the exact information along with the zone configuration activation failure message.

  • Page 476: Creating A New Zone

    Zoning configuration A message displays informing you that any zones or zone configurations you have changed will be saved in the zone database, and warning you to make sure no other user is making changes to the same areas. Creating a new zone 1.

  • Page 477: Viewing Zone Properties, Adding Members To A Zone

    Zoning configuration Viewing zone properties 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Click the Zone DB tab if that tab is not automatically displayed. 3. Select an FC fabric from the Zoning Scope list. This identifies the target entity for all subsequent zoning actions and displays the zoning database for the selected entity.

  • Page 478: Creating A New Member In A Zone By Wwn

    Zoning configuration By default, the first time you launch the Zoning dialog box for a Zoning Scope, the Potential Members list displays valid members using the following rules: • If you select the World Wide Name type, the valid members display by the Attached Ports. •...

  • Page 479: Creating A New Member In A Zone By Domain, Port Index

    Zoning configuration 6. Select World Wide Name from the Member Type list. Add the new member by port name by completing the following steps. a. Select the Existing End Device Node/Port Name option. b. Select a port name from the list. Add the new member by port WWN by completing the following steps.

  • Page 480: Creating A New Member In A Zone By Alias

    Zoning configuration 3. Select an FC fabric from the Zoning Scope list. This identifies the target entity for all subsequent zoning actions and displays the zoning database for the selected entity. 4. Select one or more zones to which you want to add members in the Zones list. (Press SHIFT or CTRL and click each zone name to select more than one zone.) 5.

  • Page 481

    Zoning configuration 2. Click the Zone DB tab if that tab is not automatically displayed. 3. Select an FC fabric from the Zoning Scope list. This identifies the target entity for all subsequent zoning actions and displays the zoning database for the selected entity. 4.

  • Page 482: Enabling Or Disabling The Default Zone For Fabrics

    Zoning configuration Enabling or disabling the default zone for fabrics 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Click the Zone DB tab if that tab is not automatically displayed. 3. Select an FC fabric from the Zoning Scope list. This identifies the target entity for all subsequent zoning actions and displays the zoning database for the selected entity.

  • Page 483: Creating A Zone Alias

    Zoning configuration NOTE The format and content of this dialog box vary slightly depending on Interop Mode and the target selected in the Zoning Scope list. 5. Make sure the appropriate fabric is named on the Zoning Policies dialog box. 6.

  • Page 484: Editing A Zone Alias, Removing An Object From A Zone Alias

    Zoning configuration Editing a zone alias 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Click the Zone DB tab if that tab is not automatically displayed. 3. Select Alias from the Type list. 4. Select the alias you want to edit in the Alias list. 5.

  • Page 485: Exporting Zone Aliases, Renaming A Zone Alias, Creating A Zone Configuration

    Zoning configuration Click OK or Apply on the Zoning dialog box to save your changes. Exporting zone aliases 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Click the Zone DB tab if that tab is not automatically displayed. 3.

  • Page 486: Viewing Zone Configuration Properties, Adding Zones To A Zone Configuration

    Zoning configuration 6. Press Enter. Depending on the characters included in the name you enter, a message may display informing you the name contains characters that are not accepted by some switch vendors, and asking whether you want to proceed. Click Yes to continue, or No to cancel the zone creation.

  • Page 487: Activating A Zone Configuration

    Zoning configuration This identifies the target entity for all subsequent zoning actions and displays the zoning database for the selected entity. 4. Select one or more zone configurations to which you want to add zones in the Zone Configs list. (Press SHIFT or CTRL and click each zone configuration name to select more than one zone configuration.) 5.

  • Page 488

    Zoning configuration • You do not have Read/Write or Activate privileges for the selected fabric and the selected zone database (for FC fabric only). • The selected fabric is not supported by the Management application. • The selected fabric is no longer discovered. •...

  • Page 489: Deactivating A Zone Configuration

    Zoning configuration Click OK to activate the zone configuration. If you are activating a zone configuration from the offline zone database, a message might display informing you of name conflicts between items in the offline zone database and the existing online zone database. Click Yes to overwrite the items in the online zone database, or No to cancel the activation.

  • Page 490: Refreshing A Zone Database, Merging Two Zone Databases

    Zoning configuration 6. Click OK or Apply to save your changes. A message displays informing you that any zones or zone configurations you have changed will be saved in the zone database, and warning you to make sure no other user is making changes to the same areas.

  • Page 491

    Zoning configuration FIGURE 185 Compare/Merge Zone DBs dialog box 3. Select a database from the Reference Zone DB field. 4. Select a database from the Editable Zone DB field. The Reference Zone DB and Editable Zone DB areas display all available element types (zone configurations, zones, and aliases) for the two selected zone databases.

  • Page 492: Saving A Zone Database To A Switch

    Zoning configuration 8. Select the Sync Scroll Enable check box to synchronize scrolling between the selected databases. 9. Merge zone configurations by completing the followings steps. a. Select one or more zone configuration nodes from the Reference Zone DB area. b.

  • Page 493: Traffic Isolation Zoning, Enhanced Ti Zones

    Traffic isolation zoning Traffic isolation zoning A Traffic Isolation zone (TI zone) is a special zone that isolates inter-switch traffic to a specific, dedicated path through the fabric. A TI zone contains a list of E_Ports, followed by a list of N_Ports. When the TI zone is activated, the fabric attempts to isolate all inter-switch traffic between N_Ports to only those E_Ports that have been included in the zone.

  • Page 494: Configuring Traffic Isolation Zoning, Creating A Traffic Isolation Zone

    Traffic isolation zoning The failover mode must be the same for each enhanced TI zone to which a port belongs. You cannot merge a downlevel switch into a fabric containing enhanced TI zones, and you cannot merge a switch with enhanced TI zones defined into a fabric containing switches that do not support ETIZ.

  • Page 495: Adding Members To A Traffic Isolation Zone

    Traffic isolation zoning 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Click the Zone DB tab if that tab is not automatically displayed. 3. Select an FC fabric from the Zoning Scope list. This identifies the target entity for all subsequent zoning actions and displays the zoning database for the selected entity.

  • Page 496: Enabling A Traffic Isolation Zone

    Traffic isolation zoning 6. Select Domain, Port Index from the Type list. Select two or more N_Ports (as well as all E_Ports on the path between the N_Ports) to add to the zone in the Potential Members list. (Press SHIFT or CTRL and click each port to select more than one port.) NOTE TI zones can be created in fabrics that contain logical switches;...

  • Page 497: Disabling A Traffic Isolation Zone, Enabling Failover On A Traffic Isolation Zone

    Traffic isolation zoning Disabling a traffic isolation zone NOTE Traffic isolation zones are configurable only on a Fabric OS device. Traffic isolation zones are enabled by default when you create them. Use this procedure to disable a traffic isolation zone. To apply the settings and deactivate the zone, you must activate a zone configuration in the same zone database.

  • Page 498: Disabling Failover On A Traffic Isolation Zone, Zoning Administration, Comparing Zone Databases

    Zoning administration Disabling failover on a traffic isolation zone NOTE Traffic isolation zones are configurable only on a Fabric OS device. If failover is disabled, be aware of the following considerations: • Ensure that there are non-dedicated paths through the fabric for all devices that are not in a TI zone.

  • Page 499

    Zoning administration TABLE 25 Compare icon indicators Icon Description Added—Displays when an element is added to the editable database. Modified—Displays when an element is modified on the editable database. Removed—Displays when an element is removed from the editable database. To compare two zone databases, complete the following steps. 1.

  • Page 500: Managing Zone Configuration Comparison Alerts, Setting Change Limits On Zoning Activation

    Zoning administration 5. Set the display for the database areas by selecting one of the following from the Comparison View list: • Storage-to-Host Connectivity—Displays only storage and host devices. • Host-to-Storage Connectivity—Displays only host and storage devices. • Full (Zone Configs, Zones, Aliases)—Displays all zone configurations, zones, and aliases. 6.

  • Page 501: Deleting A Zone

    Zoning administration Using the following procedure you can do the following: • Set a different limit for each fabric. • Set limits on some fabrics while allowing other fabrics to have unlimited changes. • Set a limit for fabrics that will be discovered later. NOTE You must have the Zoning Set Edit Limits privilege to perform this task.

  • Page 502: Deleting A Zone Alias, Deleting A Zone Configuration

    Zoning administration NOTE If you delete something in error, click Cancel on the Zoning dialog box to exit without saving changes since the last operation (Apply or Activate). When you reopen the dialog box, the zone is restored. 6. Click OK or Apply to save your changes. A message displays informing you that any zones or zone configurations you have changed will be saved in the zone database, and warning you to make sure no other user is making changes to the same areas.

  • Page 503: Clearing The Fabric Zone Database, Duplicating A Zone

    Zoning administration 6. Click OK or Apply to save your changes. A message displays informing you that any zones or zone configurations you have changed will be saved in the zone database, and warning you to make sure no other user is making changes to the same areas.

  • Page 504: Duplicating A Zone Alias, Duplicating A Zone Configuration

    Zoning administration Depending on the characters included in the name you enter, a message may display informing you the name contains characters that are not accepted by some switch vendors, and asking whether you want to proceed. Click Yes to continue, or No to cancel the renaming. (For zone name requirements and limitations, refer to “Zoning naming conventions”...

  • Page 505: Finding A Member In One Or More Zones

    Zoning administration 5. (Optional) Type a new name for the zone configuration. If you key in a new name, press Enter to save the name. Depending on the characters included in the name you enter, a message may display informing you the name contains characters that are not accepted by some switch vendors, and asking whether you want to proceed.

  • Page 506: Finding Zones In A Zone Configuration, Finding A Zone Configuration Member In The Zones List

    Zoning administration Press SHIFT or CTRL and click each zone to select more than one zone. 5. Click Find < between the Potential Members list and the Zones list. • If the member is found, it is highlighted in the Potential Members list. •...

  • Page 507: Listing Zone Members, Removing A Member From A Zone

    Zoning administration • If the zone is not found, a message displays informing you of this. Click OK to close the message box. Listing zone members Use this procedure to identify the zone in the active zone configuration of the fabric to which an individual port belongs and the members of that zone.

  • Page 508: Removing A Zone From A Zone Configuration, Renaming A Zone

    Zoning administration Removing a zone from a zone configuration Use the following procedure to remove a zone from a zone configuration. Note that the zone is not deleted; it is only removed from the zone configuration. 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays.

  • Page 509: Renaming A Zone Configuration, Replacing Zone Members

    Zoning administration A message displays informing you that any zones or zone configurations you have changed will be saved in the zone database, and warning you to make sure no other user is making changes to the same areas. Renaming a zone configuration 1.

  • Page 510

    Zoning administration When you select Replace, the Replace Zone Member dialog box displays. When you select Replace All, the same dialog box displays, but with the title Replace Zone Member (all instances). 5. Select the option from the Type list that you want to use to identify the replacement zone member.

  • Page 511: Fc Troubleshooting, In This Chapter

    Chapter Troubleshooting In this chapter • FC troubleshooting ..........479 •...

  • Page 512: Tracing Fc Routes

    FC troubleshooting Tracing FC routes The Management application enables you to select a source port and a destination port and displays the detailed routing information from the source port or area on the local switch to the destination port or area on another switch. Trace route cannot be performed on the offline devices or virtual devices.

  • Page 513: Troubleshooting Device Connectivity

    FC troubleshooting • Reverse Route. This tab shows the path from the destination port to the source port. NOTE This reverse route may sometimes be different from the forward route. • FC Ping. This tab shows the minimum, maximum and average round trip times between the selected device port WWNs and the domain controller.

  • Page 514: Ip Troubleshooting, Configuring Ip Ping

    IP troubleshooting 3. Click OK. The following diagnostic tests are performed: • Device Status • Switch port health status • Zone configuration in the fabric • Edge fabric - FC router physical connection status. • Active ACL DCC policy check (Fabric OS only) The Device Connectivity Troubleshooting Results dialog box displays.

  • Page 515

    IP troubleshooting 1. Select Configure > IP Troubleshooting > Ping. The IP Ping dialog box displays. 2. Select a switch from the Available Switches table. 3. Select a port from the GigE Port list. 4. Select an IP address switch from the IP Interface list. 5.

  • Page 516

    IP troubleshooting TABLE 27 IP Ping Details Field or Component Description Round Trip Time (ms) The time in milliseconds between sending the packet and receiving the response. This provides a rough indication of network congestion or latency. It is normal for the first packet to experience a higher round trip time than later packets, if the intermediate routers need to do ARP requests to locate the next hop.

  • Page 517: Tracing Ip Routes

    IP troubleshooting Tracing IP routes The Management application enables you to select an source and a target and displays the detailed routing information from the source port or area on the local switch to the destination port or area on another switch. Trace route cannot be performed on the offline devices or virtual devices.

  • Page 518: Viewing Fcip Tunnel Performance

    IP troubleshooting Click Close on the IP Traceroute Result dialog box. 8. Click Cancel on the IP Traceroute dialog box. Viewing FCIP tunnel performance NOTE IP Performance is only supported on the 4 Gbps Router, Extension Switch and Encryption Blade running Fabric OS 5.2 or later.

  • Page 519: Client Browser Troubleshooting, Fabric Tracking Troubleshooting, Firmware Download Troubleshooting

    Client browser troubleshooting Field/Component Description DELAY The average round trip time to send a packet of data and receive the acknowledgement. PMTU The largest packet size that can be transmitted over the end-to- end path without fragmentation. This value is measured in bytes and includes the IP header and (Path Maximum payload.

  • Page 520

    Firmware download troubleshooting Problem Resolution If you configured an internal FTP server and the Choose from one of the following options: • Management application server is running If the Management application is running IPv6 only, configure an external FTP server. •...

  • Page 521: Launch Client Troubleshooting

    Launch Client troubleshooting Launch Client troubleshooting The following section states a possible issue and the recommended solution if you are unable to launch the client. Problem Resolution Incorrect (down level) remote client short cut The remote client link in the Start menu does not automatically upgrade when you displays in Start menu after Management upgrade the Management application.

  • Page 522: Names Troubleshooting

    Names troubleshooting Problem Resolution Unable to log into the Client (the application Use one the following procedures to configure the IP address in the host file. does not launch when you use a valid user Windows operating systems name and password and exceptions are thrown Log in using the 'Administrator' privilege.

  • Page 523: Professional Edition Login Troubleshooting, Server Management Console Troubleshooting

    Professional edition login troubleshooting Problem Resolution Duplicate name error. If you configured the Management application to only allow unique names and you try to use a name that already exists in the fabric. You can enter a different name for the device or search for the duplicate name using one of the following procedures: •...

  • Page 524

    Server Management Console troubleshooting Problem Resolution Unable to launch the The Windows Vista or Windows 7 system enables the User Access Control (UAC) option by default. When the UAC SMC on a Windows Vista option is enabled, the SMC cannot launch. If the SMC does not launch, use one of the following options to or Windows 7 system disable the UAC option: The following are the various ways we can disable UAC in vista:...

  • Page 525: Supportsave Troubleshooting

    Supportsave troubleshooting Problem Resolution Unable to launch the SMC on Disable using the Group Policy by completing the following steps. a Windows Vista or Windows 7 You can perform this procedure on you local machine using Local Group Policy editor or for many system computers at the same time using the Active Directory-based Group Policy Object (GPO) editor.

  • Page 526: View All List Troubleshooting, Zoning Troubleshooting

    View All list troubleshooting View All list troubleshooting The following section states a possible issue and the recommended solution for View All list errors. Problem Resolution View All list does not display. The View All list does not display until you discover a fabric. To discover a fabric, refer to “Discovering fabrics”...

  • Page 527: In This Appendix, Main Menus

    Appendix Application menus In this appendix • Main menus ..........495 •...

  • Page 528

    Main menus Menu Command Command Options Manage View. Select to set up the Management application view. Create View. Select to create a new view. Display View. Select to display by View All or by a view you create. Levels. Select to display by All Levels, Products and Ports, Product Only, or Ports Only.

  • Page 529

    Main menus Menu Command Command Options IP Address. Select to display the IP Address (IPv4 or IPv6 format) as the product label. Domain ID. Select to display the domain ID as the product label. Port Label. Select to configure which port labels display. Name.

  • Page 530

    Main menus Menu Command Command Options Switch. Select to manage a selected device. Save. Select to save device configurations to the repository. Save Running to Startup. Select to save the CEE running configuration to the startup configuration on selected switches. Requires at least one discovered CEE switch. Restore.

  • Page 531

    Main menus Menu Command Command Options High Integrity Fabric. (Professional Plus and Enterprise Edition Only) Select to activate the following on M-EOS and Fabric OS devices: • On M-EOS switches, HIF activates fabric binding, switch binding, insistent domain ID and RSCNs. •...

  • Page 532

    Main menus Menu Command Command Options Performance. (Professional Plus and Enterprise Edition Only) Select to view IP performance between two devices. List Zone Members. (Professional Plus and Enterprise Edition Only) Select to display all members in a zone. Monitor Menu. Performance.

  • Page 533

    Main menus Menu Command Command Options E-mail. Select to configure the Management application to send event notifications through e-mail. Call Home. (Professional Plus and Enterprise Edition Only) Select to configure the Management Server to automatically dial-in to or send an E-mail to a support center to report system problems.

  • Page 534

    Main menus Menu Command Command Options Product Menu. Select to access the tools available on a device’s shortcut menu. Plug-in for VMware vCenter. Select to configure VMWare vCenters. Tools List (determined by user settings). Select to open a software application. You can configure the Tools menu to display different software applications.

  • Page 535: Shortcut Menus

    Shortcut menus Shortcut menus You can use the Management application interface main menu to configure, monitor, and troubleshoot your SAN components. The instructions for using these features are documented in the subsequent chapters of this manual. For each SAN component, you can optionally right-click the component and a shortcut menu displays.

  • Page 536

    Shortcut menus Component Menu/Submenu Commands Comments Create View Automatically Automatically creates a view with the selected fabric. View name is same as the current label. Map Display Port Display > Only available from Product List. Occupied Product Ports UnOccupied Product Ports Attached Ports Switch to Switch Connections Collapse or Expand...

  • Page 537

    Shortcut menus Component Menu/Submenu Commands Comments Fabric OS Switch/Chassis/Access Gateway Element Manager > Hardware Ports Admin Router Admin Configuration > Save Save Running to Startup (CEE-capable switch) Restore CEE (CEE-capable switch) FCoE (CEE-capable switch) Schedule Backup (Professional Plus and Enterprise Edition Only) Configuration Repository Replicate >...

  • Page 538

    Shortcut menus Component Menu/Submenu Commands Comments Performance > Top Talkers (Professional Plus and Enterprise Edition Only) Clear Counters Real-Time Graph Historical Graph (Professional Plus and Enterprise Edition Only) Historical Report (Professional Plus and Enterprise Edition Only) Events Enable / Disable > Enable Disable Telnet...

  • Page 539

    Shortcut menus Component Menu/Submenu Commands Comments Table > Only available from Product List. Copy 'Device_Name Group' Copy Row Copy Table Export Row Export Table Search Select All Size All Columns To Fit Expand All Collapse All Customize Properties Core Switch Element Manager Only available from Product List.

  • Page 540

    Shortcut menus Component Menu/Submenu Commands Comments Table > Only available from Product List. Copy 'Device_Name Group' Copy Row Copy Table Export Row Export Table Search Select All Size All Columns To Fit Expand All Collapse All Customize Properties HBA, iSCSI Host, and HBA Enclosure Element Manager Launches Element Manager for Brocade HBAs discovered using JSON agent.

  • Page 541

    Shortcut menus Component Menu/Submenu Commands Comments Port Display > Only available from Product List. Occupied Product Ports UnOccupied Product Ports Attached Ports Switch to Switch Connections Expand All Only available from Product List. Collapse All Only available from Product List. Properties Storage, iSCSI Storage, and Storage Enclosure...

  • Page 542

    Shortcut menus Component Menu/Submenu Commands Comments Origin Port Display > Only available from Product List. Occupied Product Ports UnOccupied Product Ports Attached Ports Switch to Switch Connections Table > Only available from Product List. Copy 'Device_Name Group' Copy Row Copy Table Export Row Export Table Search...

  • Page 543

    Shortcut menus Component Menu/Submenu Commands Comments Table > Only available from Product List. Copy 'Device_Name Group' Copy Row Copy Table Export Row Export Table Search Select All Size All Columns To Fit Expand All Collapse All Customize Collapse All Only available from Product List. Properties HBA and iSCSI Initiator Performance >...

  • Page 544

    Shortcut menus Component Menu/Submenu Commands Comments FC Security Protocol Only available for Managed JSON HBA Ports. Only available when you have the Security Privilege. Zoning List Zone Members Professional Plus and Enterprise Edition Only Connected Port Port Display > Only available from Product List. Occupied Product Ports UnOccupied Product Ports Attached Ports...

  • Page 545

    Shortcut menus Component Menu/Submenu Commands Comments Modify Launches Element Manager. IP Troubleshooting > Ping Trace Route Performance (Professional Plus and Enterprise Edition Only) Port Display > Only available from Product List. Occupied Product Ports UnOccupied Product Ports Attached Ports Switch to Switch Connections Table >...

  • Page 546

    Shortcut menus Component Menu/Submenu Commands Comments White Area of the Connectivity Map Zoom Zoom In Zoom Out Map Display Expand Collapse Export White Area of the Product List Port Display > Occupied Product Ports UnOccupied Product Ports Attached Ports Switch to Switch Connections Table >...

  • Page 547: Call Home Event Table, In This Appendix

    Appendix Call Home Event Tables In this appendix This section provides information about the specific events that display when using Call Home. This information is shown in the following Event Tables. • Call Home Event Table ......... 515 •...

  • Page 548

    Call Home Event Table Event Reason Code FRU Code / Event Type Description Severity PWR/HW Power supply DC voltage failure. PWR/HW Power supply thermal failure. PWR/HW Power supply false shutdown. PWR/HW Power supply i2c bus failure. FAN/HW A cooling fan propeller has failed. FAN/HW A cooling fan propeller has failed (two failed propellers).

  • Page 549: Consrv Events Table, Thermal Event Reason Codes Table

    # CONSRV Events Table # CONSRV Events Table Event Reason Code FRU Code/Event Type Description Severity DVP/LIM/HW M-EOS: Port module failure. DVP/PORT Fibre Channel port failure DVP/PORT Fibre Channel path failure. LIM/DVP LIM SPP failure. DVP/ LIM/PORT SFP/XFP optics failure. LIM SPP Offline.

  • Page 550: Brocade Events Table

    # Brocade Events Table # Brocade Events Table Event Reason Code FRU Code/Event Type Description Severity 1009 MS-1009 Error in registered link incident record (RLIR) 1402 FW-1402 Flash usage is out of range (Fabric OS version 6.0 or earlier) 1426 FW-1426 Faulty or Missing Power supply 1427...

  • Page 551: About User Privileges, In This Appendix

    Appendix User Privileges In this appendix • About User Privileges......... . . 519 •...

  • Page 552

    About User Privileges TABLE 30 Privileges and Application Behavior Privilege Description No Privilege Read-Only Read/Write Active Session Allows you view active Disables the Active Enables the Active Enables the Active Management client sessions and Sessions command from Sessions command from Sessions command from disconnect an unwanted the Server menu.

  • Page 553

    About User Privileges TABLE 30 Privileges and Application Behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Diagnose and Allows you to run device Disables the Disables the Device Enables the Device Troubleshooting connectivity check and DeviceConnectivity and Connectivity and Trace Connectivity and Trace trace route.

  • Page 554

    About User Privileges TABLE 30 Privileges and Application Behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Fault Management Allows you to control Disables the SNMP Trap Enables the SNMP Trap Enables the SNMP Trap access to the SNMP Trap and Syslog configuration and Syslog configuration, and Syslog configuration, Registration and...

  • Page 555

    About User Privileges TABLE 30 Privileges and Application Behavior (Continued) Privilege Description No Privilege Read-Only Read/Write FCIP Management Allows you to configure Disables the Configure > Enables the Configure > Enables the Configure > FCIP tunnels and FCIP Tunnel and FCIP Tunnel and FCIP Tunnel and troubleshooting of IP...

  • Page 556

    About User Privileges TABLE 30 Privileges and Application Behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Performance Allows you to configure Disables entire Enables entire Enables entire the performance Performance submenu of Performance submenu Performance submenu of subsystem, the display of the Monitor menu as well off the Monitor menu as the Monitor menu and the...

  • Page 557

    About User Privileges TABLE 30 Privileges and Application Behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Product Operation An Element Manager Disables the functions Same as No Privilege. Enables the functions privilege that enables described in the Element described in the Element NOTE operator functions.

  • Page 558

    About User Privileges TABLE 30 Privileges and Application Behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Security Allows you to enable and Disables the Security Disables the Security Enables the Security configure SANtegrity command from the command from the command from the features.

  • Page 559

    About User Privileges TABLE 30 Privileges and Application Behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Software Configuration Allows you to configure Disables the Software Enables the Software Enables the Software Parameters some of the properties of Configuration Parameters Configuration Parameters Configuration Parameters the client and server of folder and subpages in...

  • Page 560

    About User Privileges TABLE 30 Privileges and Application Behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Zoning Activation (Fabric Allows you to activate a Disables the Activate, Enables the Zoning Enables the Activate, and offline zone zone configuration Deactivate, and Zoning Policies button;...

  • Page 561

    About User Privileges TABLE 30 Privileges and Application Behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Zoning Offline Allows you to edit the In Zoning dialog box, the In Zoning dialog box, the Enables all functions on zone database in offline Zone DB list includes Zone DB list includes the Zoning dialog box.

  • Page 562

    About User Privileges TABLE 30 Privileges and Application Behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Zoning Online Allows you to edit any of In Zoning dialog box, the In Zoning dialog box, the Enables all functions on the fabric zone databases Zone DB list includes Zone DB list includes the Zoning dialog box.

  • Page 563: About Roles And Access Levels

    About Roles and Access Levels About Roles and Access Levels The Management application provides seven pre-configured roles (System Administrator, Security Administrator, Zone Administrator, Operator, Security Officer, Network Administrator, and Host Administrator); however, System Administrators can also create roles manually. Refer to “Creating a user role”...

  • Page 564

    About Roles and Access Levels TABLE 31 Features and User Groups Access Levels (Continued) Feature Roles with Read/Write Access Roles with Read-Only Access Software Configuration Properties System Administrator Operator Technical Support Data Collection System Administrator Operator User Management System Administrator, Security Officer Operator View Management System Administrator, Security Administrator,...

  • Page 565

    Appendix Sybase and Derby Database Fields In this appendix • Capability ........... . 534 •...

  • Page 566: Database Tables And Fields, Capability

    Database tables and fields Database tables and fields Capability TABLE 32 CAPABILITY_ Field Definition Format Size NAME * Name of the capability. varchar DESCRIPTION Optional detailed description about the capability. varchar TABLE 33 CARD_CAPABILITY Field Definition Format Size CARD_ID * DB ID of the card.

  • Page 567: Client_view

    Database tables and fields TABLE 35 CARD Field Definition Format Size ID * CORE_SWITCH_ID * Core switch DB ID. SLOT_NUMBER The number of the physical slot in the chassis where smallint the blade is plugged in. For fixed blades, SlotNumber is zero.

  • Page 568

    Database tables and fields TABLE 37 USER_ (Continued) Field Definition Format Size PASSWORD User password. varchar EMAIL User e-mail ID. varchar 1024 NOTIFICATION_ENABLED Flag for e-mail notification. smallint TABLE 38 USER_PREFERENCE Field Definition Format Size USER_NAME * User name whose preferences are saved. It corresponds varchar to user_name in USER_table.

  • Page 569

    Database tables and fields TABLE 41 CLIENT_VIEW_MEMBER Field Definition Format Size CLIENT_VIEW_ID * Foreign key to CLIENT_VIEW table. FABRIC_ID * Foreign key to FABRIC table. TABLE 42 FABRIC Field Definition Format Size ID * SAN_ID Foreign key to SAN table; usually 1 since there is only one SAN.

  • Page 570: Collector

    Database tables and fields Collector TABLE 43 FABRIC_CHECKSUM Field Definition Format Size FABRIC_ID * Fabric ID, foreign key to the FABRIC table. CHECKSUM_KEY * Type of checksum, e.g. device data or zone data. varchar CHECKSUM Actual checksum value. varchar TABLE 44 FABRIC_COLLECTION Field Definition...

  • Page 571

    Database tables and fields TABLE 46 FABRIC (Continued) Field Definition Format Size AD_ENVIRONMENT 1 = there are user-defined ADs in this fabric. smallint MANAGED 1 = it is an actively "monitored" fabric; otherwise, it is smallint an "unmonitored" fabric. MANAGEMENT_STATE Bit map to indicate various management indications smallint for the fabric.

  • Page 572

    Database tables and fields TABLE 49 VIRTUAL_SWITCH_CHECKSUM Field Definition Format Size VIRTUAL_SWITCH_ID * DB ID of virtual switch. CHECKSUM_KEY * Checksum key. varchar CHECKSUM Checksum value. varchar TABLE 50 CORE_SWITCH_CHECKSUM Field Definition Format Size CORE_SWITCH_ID * DB ID. CHECKSUM_KEY * Checksum type.

  • Page 573: Config

    Database tables and fields TABLE 52 SECURITY_POLICY Field Definition Format Size VIRTUAL_SWITCH_ID * DB ID of virtual_switch. POLICY_NUMBER* IPSec Policy Number. The number can range from 1 to smallint POLICY_TYPE* Type of the Policy. The possible values are IKE or IPSec smallint ENCRYPTION_ALGORITHM Encryption Algorithm for the policy.The following are varchar the possible Encryption:...

  • Page 574

    Database tables and fields TABLE 54 FIRMWARE_FILE_DETAIL (Continued) Field Definition Format Size RELEASE_DATE Release date of the firmware file. timestamp IMPORTED_DATE Imported date of the file to the Management timestamp application. FIRMWARE_FILE_SIZE Firmware file size. FIRMWARE_LOCATION Firmware file location in the Management application varchar 1024 repository.

  • Page 575: Connected End Devices

    Database tables and fields TABLE 58 SWITCH_CONFIG Field Definition Format Size NAME Name of the switch configurations uploaded from the switch either on demand or through scheduler. varchar SWITCH_ID ID of the switch from which the configuration has been uploaded. BACKUP_DATE_TIME The date/time stamp at which the configuration has timestamp...

  • Page 576: Device

    Database tables and fields Device TABLE 62 DEVICE_PORT Field Definition Format Size NODE_ID DB ID of the device node to which this port belongs. DOMAIN_ID Domain ID of the switch to which this device port is attached. Device port WWN. char SWITCH_PORT_WWN WWN of the switch port to which this device port is...

  • Page 577

    Database tables and fields TABLE 63 FICON_DEVICE_PORT (Continued) Field Definition Format Size FICON device property, e.g., 809a or 809b. varchar FLAG FICON device property, e.g., 0x10 (hex). varchar PARAMS FICON device property string, e.g., Valid channel port. varchar TABLE 64 DEVICE_NODE Field Definition...

  • Page 578

    Database tables and fields TABLE 66 DEVICE_ENCLOSURE Field Definition Format Size FABRIC_ID ID of the fabric to which the device enclosure belongs. int NAME Name of the Device enclosure. varchar TYPE Type of Device enclosure - Storage Array/Server. varchar ICON Type of Icon.

  • Page 579

    Database tables and fields TABLE 67 FABRIC (Continued) Field Definition Format Size SECURE 1 = it is secured fabric. smallint AD_ENVIRONMENT 1 = there are user-defined ADs in this fabric. smallint MANAGED 1 = it is an actively "monitored" fabric; otherwise, it is smallint an "unmonitored"...

  • Page 580

    Database tables and fields TABLE 68 DEVICE_PORT_INFO Name Source MISSING TIME DEVICE_PORT.MISSING_TIME, NPV PHYSICAL DEVICE_PORT.NPV_PHYSICAL TYPE NUMBER FICON_DEVICE_PORT.TYPE_NUMBER MODEL NUMBER FICON_DEVICE_PORT.MODEL_NUMBER MANUFACTURER FICON_DEVICE_PORT.MANUFACTURER MANUFACTURER PLANT FICON_DEVICE_PORT.MANUFACTURER_PLANT SEQUENCE NUMBER FICON_DEVICE_PORT.SEQUENCE_NUMBER FICON_DEVICE_PORT.TAG FLAG FICON_DEVICE_PORT.FLAG PARAMS FICON_DEVICE_PORT.PARAMS NAME USER_DEFINED_DEVICE_DETAIL.NAME USER DEFINED TYPE USER_DEFINED_DEVICE_DETAIL.TYPE IP ADDRESS USER_DEFINED_DEVICE_DETAIL.IP_ADDRESS CONTACT...

  • Page 581

    Database tables and fields TABLE 69 DEVICE_INFO (Continued) Name Source DEVICE PORT TYPE DEVICE_PORT.TYPE DEVICE PORT SYMBOLICE NAME DEVICE_PORT.SYMBOLIC_NAME FC4_TYPE DEVICE_PORT.FC4_TYPE, IP_PORT DEVICE_PORT.IP_PORT HARDWARE_ADDRESS DEVICE_PORT.HARDWARE_ADDRESS DEVICE PORT TRUSTED DEVICE_PORT.TRUSTED DEVICE PORT MISSING DEVICE_PORT.MISSING DEVICE_PORT.COS NPV_PHYSICAL DEVICE_PORT.NPV_PHYSICAL SWITCH PORT ID SWITCH_PORT.ID SWITCH PORT WWN SWITCH_PORT.WWN SWITCH PORT NAME...

  • Page 582

    Database tables and fields TABLE 69 DEVICE_INFO (Continued) Name Source VIRTUAL SWITCH ID SWITCH_INFO.ID VIRTUAL SWITCH NAME SWITCH_INFO.NAME OPERATIONAL STATUS SWITCH_INFO.OPERATIONAL_STATUS SWITCH_MODE SWITCH_INFO.SWITCH_MODE VIRTUAL SWITCH WWN SWITCH_INFO.WWN VIRTUAL SWITCH DOMAIN ID SWITCH_INFO.DOMAIN_ID VIRTUAL_FABRIC_ID SWITCH_INFO.VIRTUAL_FABRIC_ID BASE_SWITCH SWITCH_INFO.BASE_SWITCH VIRTUAL SWITCH STATE SWITCH_INFO.STATE VIRTUAL SWITCH STATUS SWITCH_INFO.STATUS FABRIC ID...

  • Page 583: Ee- Monitor

    Database tables and fields TABLE 71 DEVICE_NODE_INFO (Continued) Name Source CAPABILITY DEVICE_NODE.CAPABILITY_ TRUSTED DEVICE_NODE.TRUSTED CREATION TIME DEVICE_NODE.CREATION_TIME MISSING DEVICE_NODE.MISSING MISSING TIME DEVICE_NODE.MISSING_TIME, PROXY DEVICE DEVICE_NODE.PROXY_DEVICE DEVICE_NODE.AG, NAME USER_DEFINED_DEVICE_DETAIL.NAME USER DEFINED TYPE USER_DEFINED_DEVICE_DETAIL.TYPE IP ADDRESS USER_DEFINED_DEVICE_DETAIL.IP_ADDRESS CONTACT USER_DEFINED_DEVICE_DETAIL.CONTACT LOCATION USER_DEFINED_DEVICE_DETAIL.LOCATION DESCRIPTION USER_DEFINED_DEVICE_DETAIL.DESCRIPTION USER DEFINED VALUE1 USER_DEFINED_DEVICE_DETAIL.USER_DEFINED_VALUE1...

  • Page 584

    Database tables and fields TABLE 73 EE_MONITOR_STATS_30MIN Field Definition Format Size EE_MONITOR_ID CREATION_TIME timestamp ACTIVE_STATE smallint double precision double precision CRCERRORS double TABLE 74 EE_MONITOR_STATS_2HOUR Field Definition Format Size EE_MONITOR_ID CREATION_TIME timestamp ACTIVE_STATE smallint double precision double precision CRCERRORS double TABLE 75 EE_MONITOR Field...

  • Page 585: Event/fm

    Database tables and fields TABLE 76 EE_MONITOR_STATS_1DAY (Continued) Field Definition Format Size CREATION_TIME timestamp ACTIVE_STATE smallint double precision double precision CRCERRORS double Event/FM TABLE 77 RECIPIENT_TYPE Field Definition Format Size TYPE Type of the recipient (Syslog or SNMP). varchar TABLE 78 SOURCE_OBJECT_TYPE Field Definition...

  • Page 586

    Database tables and fields TABLE 81 EVENT_SUB_TYPE Field Definition Format Size EVENT_TYPE_ID Unique Event Sub type ID DESCRIPTION Description of Event Sub Type varchar TABLE 82 SNMP_CREDENTIALS Field Definition Format Size VIRTUAL_SWITCH_ID Virtual switch ID for which this instance of the SNMP credentials apply.

  • Page 587

    Database tables and fields TABLE 82 SNMP_CREDENTIALS (Continued) Field Definition Format Size AUTH_PASSWORD The localized secret key used by the authentication varchar protocol for authenticating messages. This is applicable if the agent is configured to operate in SNMPv3. PRIV_PROTOCOL An indication of whether messages sent or received on varchar behalf of this user can be encrypted and if so, which privacy protocol to use.

  • Page 588

    Database tables and fields TABLE 84 EVENT Field Definition Format Size SWITCH_ID ID of the switch. PARENT_ID ID of the Parent. SOURCE_NAME Name of the source from which the event originated. varchar SOURCE_ADDR IP Address of the source from which the event varchar originated.

  • Page 589

    Database tables and fields TABLE 84 EVENT (Continued) Field Definition Format Size EVENT_CATEGORY Category of the event varchar DISCOVERY_TYPE Discovery type of the product varchar MANAGEMENT_LINK Management link status varchar OPERATIONAL_STATUS Operational Status of the switch from which the event varchar is triggered NODE_WWN...

  • Page 590

    Database tables and fields TABLE 86 EVENT_NOTIFICATION (Continued) Field Definition Format Size USER_NAME User name for authentication. varchar PASSWORD Password for authentication. varchar NOTIFICATION_INTERVAL Time interval between successive event notifications. NOTIFICATION_UNIT Time interval Unit: smallint 0 = Seconds 1 = Minutes 2 = Hours TEST_OPTION Time interval Unit:...

  • Page 591: Fabric

    Database tables and fields TABLE 87 EVENT_RULE (Continued) Field Definition Format Size LAST_MODIFIED_TIME Rules last edited time. timestamp SELECTED_TIME_UNIT Timestamp unit of the selected rule: smallint 0 = second 1 = Minutes 2 = Hours TABLE 88 EVENT_RULE_ACTION Field Definition Format Size RULE_ID...

  • Page 592

    Database tables and fields TABLE 90 FABRIC Field Definition Format Size SAN_ID Foreign key to SAN table; usually 1 since there is only one SAN. SEED_SWITCH_WWN WWN of the virtual switch used as seed switch to char discover the fabric. NAME User-assigned fabric name.

  • Page 593

    Database tables and fields TABLE 91 FABRIC_INFO (Continued) Name Source MANAGEMENT_STATE FABRIC.MANAGEMENT_STATE LAST_FABRIC_CHANGED FABRIC.LAST_FABRIC_CHANGED SECURE FABRIC.SECURE AD_ENVIRONMENT FABRIC.AD_ENVIRONMENT MANAGED FABRIC.MANAGED CONTACT FABRIC.CONTACT LOCATION FABRIC.LOCATION DESCRIPTION FABRIC.DESCRIPTION CREATION_TIME FABRIC.CREATION_TIME LAST_SCAN_TIME FABRIC.LAST_SCAN_TIME LAST_UPDATE_TIME FABRIC.LAST_UPDATE_TIME TRACK_CHANGES FABRIC.TRACK_CHANGES TYPE FABRIC.TYPE USER_DEFINED_VALUE_1 FABRIC.USER_DEFINED_VALUE_1 USER_DEFINED_VALUE_2 FABRIC.USER_DEFINED_VALUE_2 USER_DEFINED_VALUE_3 FABRIC.USER_DEFINED_VALUE_3 VIRTUAL_SWITCH.ID...

  • Page 594: Fc Port Stats

    Database tables and fields FC Port Stats TABLE 93 FC_PORT_STATS Field Definition Format Size SWITCH_ID References the ID in CORE_SWITCH table. PORT_ID References the ID in SWITCH_PORT table. Transmission (TX) value in bytes. double Receive (RX) value in bytes. double TX_UTILIZATION Transmit utilization value in percentage.

  • Page 595

    Database tables and fields TABLE 94 FC_PORT_STATS_30MIN (Continued) Field Definition Format Size SIGNALLOSSES double SEQUENCEERRORS double INVALIDTRANSMISSIONS double CRCERRORS double DATA_GAPS_IN5MIN smallint TABLE 95 FC_PORT_STATS_2HOUR Field Definition Format Size SWITCH_ID PORT_ID double double TX_UTILIZATION double RX_UTILIZATION double‘ CREATION_TIME timestamp ACTIVE_STATE smallint LINKFAILURES double...

  • Page 596

    Database tables and fields TABLE 96 FC_PORT_STATS_1DAY (Continued) Field Definition Format Size RX_UTILIZATION double‘ CREATION_TIME timestamp ACTIVE_STATE smallint LINKFAILURES double TXLINKRESETS double RXLINKRESETS double SYNCLOSSES double SIGNALLOSSES double SEQUENCEERRORS double INVALIDTRANSMISSIONS double CRCERRORS double DATA_GAPS_IN5MIN smallint DATA_GAPS_IN30MIN smallint DATA_GAPS_IN2HOUR smallint DCFM Professional User Manual 53-1001773-01...

  • Page 597: Fcip

    Database tables and fields FCIP TABLE 97 FCIP_TUNNEL Field Definition Format Size ETHERNET_PORT_ID GigE Port ID on which the tunnel is created. TUNNEL_ID Tunnel ID for that GigE Port. smallint VLAN_TAG VLAN Tag on the tunnel (if present). SOURCE_IP Source IP on which the tunnel is created. char DEST_IP Destination IP on the other end of tunnel.

  • Page 598

    Database tables and fields TABLE 98 FCIP_TUNNEL_INFO (Continued) Name Source WAN_TOV_ENABLED FCIP_TUNNEL.WAN_TOV_ENABLED TUNNEL_STATUS FCIP_TUNNEL.TUNNEL_STATUS COMPRESSION_ENABLED FCIP_TUNNEL_DETAILS.COMPRESSION_ENABLED TURBO_WRITE_ENALBED FCIP_TUNNEL_DETAILS.TURBO_WRITE_ENABLED TAPE_ACCELERATION_ENABLED FCIP_TUNNEL_DETAILS.TAPE_ACCELERATION_ENABLED IKE_POLICY_NUM FCIP_TUNNEL_DETAILS.IKE_POLICY_NUM IPSEC_POLICY_NUM FCIP_TUNNEL_DETAILS.IPSEC_POLICY_NUM PRESHARED_KEY FCIP_TUNNEL_DETAILS.PRESHARED_KEY FICON_TAPE_READ_BLOCK_ID_ FCIP_TUNNEL_DETAILS.FICON_TAPE_READ_BLOCK_ID_ENABLED ENABLED FICON_TIN_TIR_EMULATION_E FCIP_TUNNEL_DETAILS.FICON_TIN_TIR_EMULATION_ENABLED NABLED FICON_DEVICE_LEVEL_ACK_EM FCIP_TUNNEL_DETAILS.FICON_DEVICE_LEVEL_ACK_EMULATION_ENABLED ULATION_ENABLED FICON_TAPE_WRITE_MAX_PIPE FCIP_TUNNEL_DETAILS.FICON_TAPE_WRITE_MAX_PIPE FICON_TAPE_READ_MAX_PIPE FCIP_TUNNEL_DETAILS.FICON_TAPE_READ_MAX_PIPE FICON_TAPE_WRITE_MAX_OPS FCIP_TUNNEL_DETAILS.FICON_TAPE_WRITE_MAX_OPS FICON_TAPE_READ_MAX_OPS FCIP_TUNNEL_DETAILS.FICON_TAPE_READ_MAX_OPS...

  • Page 599

    Database tables and fields TABLE 98 FCIP_TUNNEL_INFO (Continued) Name Source REMOTE PORT WWN FCIP_PORT_TUNNEL_MAP.TUNNEL_ID = FCIP_TUNNEL.ID and FCIP_PORT_TUNNEL_MAP.SWITCHPORT_ID = PORT.ID) REMOTE_PORT_WWN REMOTE NODE WWN FCIP_PORT_TUNNEL_MAP.TUNNEL_ID = FCIP_TUNNEL.ID and FCIP_PORT_TUNNEL_MAP.SWITCHPORT_ID = PORT.ID) REMOTE_NODE_WWN TABLE 99 FCIP_PORT_TUNNEL_MAP Field Definition Format Size SWITCHPORT_ID* Switch Port ID.

  • Page 600: Fcip Tunnel Stats

    Database tables and fields TABLE 100 FCIP_TUNNEL_DETAILS (Continued) Field Definition Format Size FICON_TAPE_WRITE_ Whether this is enabled on that tunnel. smallint EMULATION_ENABLED FICON_TAPE_READ_ Whether this is enabled on that tunnel. smallint EMULATION_ENABLED FICON_DEBUG__FLAGS FICON_DEBUG_FLAGS for that particular tunnel. double FCIP Tunnel Stats TABLE 101 FCIP_TUNNEL_STATS Field...

  • Page 601

    Database tables and fields TABLE 102 FCIP_TUNNEL_STATS_30MIN (Continued) Field Definition Format Size DROPPED PACKETS double precision COMPRESSION double precision LATENCY double precision LINK_RETRANSMITS double precision ACTIVE_STATE smallint TABLE 103 FCIP_TUNNEL_STATS_2HOUR Field Definition Format Size TUNNEL_DBID SWITCH ID CREATION TIME timestamp double precision double precision TX_UTILIZATION...

  • Page 602: Gige Port Stats

    Database tables and fields TABLE 104 FCIP_TUNNEL_STATS_1DAY (Continued) Field Definition Format Size LINK_RETRANSMITS double precision ACTIVE_STATE smallint TABLE 105 FCIP_TUNNEL Field Definition Format Size ETHERNET_PORT_ID GigE Port ID on which the tunnel is created. TUNNEL_ID Tunnel ID for that GigE Port. smallint VLAN_TAG VLAN Tag on the tunnel (if present).

  • Page 603

    Database tables and fields TABLE 106 GIGE_PORT_STATS (Continued) Field Definition Format Size DROPPED PACKETS Number of dropped packets. double precision COMPRESSION The compression value. double precision LATENCY The latency value. double precision BANDWIDTH The bandwidth value. double precision TABLE 107 GIGE_PORT_STATS_30MIN Field Definition...

  • Page 604

    Database tables and fields TABLE 109 GIGE_PORT_STATS_1DAY Field Definition Format Size SWITCH ID PORT_ID CREATION TIME timestamp double precision double precision TX_UTILIZATION double precision RX_UTILIZATION double precision DROPPED PACKETS double precision COMPRESSION double precision LATENCY double precision BANDWIDTH double precision TABLE 110 ISL_INFO Name...

  • Page 605

    Database tables and fields TABLE 111 ISL_TRUNK_INFO Name Source ISL_TRUNK_GROUP.ID COST ISL_INFO.COST TYPE ISL_INFO.TYPE SOURCE PORT NUMBER ISL_INFO.SOURCE_PORT_NUMBER SOURCE SWITCH ID ISL_INFO.SOURCE_SWITCH_ID SOURCE SWITCH IP ADDRESS SOURCE_CORE_SWITCH.IP_ADDRESS SOURCE SWITCH WWN SOURCE_VIRTUAL_SWITCH.WWN MASTER PORT ISL_INFO.SOURCE_DOMAIN_ID SOURCE SWITCH NAME ISL_INFO.SOURCE_SWITCH_NAME SOURCE SWITCH PORT ID ISL_INFO.SOURCE_SWITCH_PORT_ID DEST PORT NUMBER ISL_INFO.DEST_PORT_NUMBER...

  • Page 606

    Database tables and fields TABLE 113 FABRIC Field Definition Format Size SAN_ID Foreign key to SAN table; usually 1 since there is only one SAN. SEED_SWITCH_WWN WWN of the virtual switch used as seed switch to char discover the fabric. NAME User-assigned fabric name.

  • Page 607: License

    Database tables and fields TABLE 115 ISL_TRUNK_GROUP Field Definition Format Size VIRTUAL_SWITCH_ID Virtual switch DB ID. MASTER_USER_PORT Port number of master port. smallint License TABLE 116 LICENSE_FEATURE_MAP Field Definition Format Size LICENSE_ID* Foreign Key (SWITCH_LICENSE.ID) and is part of the integer primary key.

  • Page 608: Meta San

    Database tables and fields Meta SAN TABLE 120 LSAN_DEVICE Field Definition Format Size BB_FABRIC_ID Backbone fabric DB ID. FCR_FABRIC_ID FID assigned to edge fabric. DEVICE_PORT_WWN Device port WWN of physical device. char PHYSICAL_PID PID of physical device. char TABLE 121 LSAN_PROXY_DEVICE Field Definition...

  • Page 609

    Database tables and fields TABLE 123 FABRIC (Continued) Field Definition Format Size TYPE Type of fabric: smallint 0 = legacy fabric 1 = base fabric 2 = logical fabric SECURE 1 = it is a secured fabric. smallint AD_ENVIRONMENT 1 = there are user-defined ADs in this fabric. smallint MANAGED 1 = it is an actively "monitored"...

  • Page 610: Network

    Database tables and fields TABLE 125 IFL_INFO Name Source IFL.ID EDGE_FABRIC_ID IFL.EDGE_FABRIC_ID FCR SWITCH ID FCR_PORT.VIRTUAL_SWITCH_ID EDGE_PORT_WWN IFL.EDGE_PORT_WWN BB_FABRIC_ID IFL.BB_FABRIC_ID BB_PORT_WWN IFL.BB_PORT_WWN BB_RA_TOV IFL.BB_RA_TOV BB_ED_TOV IFL.BB_ED_TOV BB_PID_FORMAT IFL.BB_PID_FORMAT EDGE SWITCH ID SWITCH_PORT.VIRTUAL_SWITCH_ID EDGE PORT ID SWITCH_PORT.ID EDGE PORT NUMBER SWITCH_PORT.USER_PORT_NUMBER EDGE PORT TYPE SWITCH_PORT.TYPE Network...

  • Page 611: Others

    Database tables and fields TABLE 127 IP_ROUTE (Continued) Field Definition Format Size FLAG Flag. CHECKSUM Check Sum. varchar Others TABLE 128 SYSTEM_PROPERTY Field Definition Format Size NAME* The name of the property. char VALUE The value for the property. VARCHAR 2048 TABLE 129 OUI_VENDOR...

  • Page 612: Port Fencing

    Database tables and fields Port Fencing TABLE 133 PORT_FENCING_POLICY Field Definition Format Size NAME Name of the policy. The length of the field should be varchar 62 because M-EOS switch supports only maximum 62 characters. TYPE 0 = ISL Protocol smallint 1 = Link 2 = Security...

  • Page 613: Quartz

    Database tables and fields Quartz TABLE 135 QRTZ_JOB_DETAILS Field Definition Format Size JOB_NAME* Name of the job. varchar JOB_GROUP* Name of the job group. varchar DESCRIPTION Description of the job (optional). varchar JOB_CLASS_NAME The instance of the job that will be executed. varchar IS_DURABLE Whether the job should remain stored after it is...

  • Page 614

    Database tables and fields TABLE 137 QRTZ_SIMPLE_TRIGGERS Field Definition Format size TRIGGER_NAME* Name of the trigger varchar TRIGGER_GROUP* name of the trigger group varchar REPEAT_COUNT number of times to repeat numeric 13,0 REPEAT_INTERVAL interval for first and second job numeric 13,0 TIMES_TRIGGERED Number of times the corresponding trigger fired...

  • Page 615

    Database tables and fields TABLE 141 QRTZ_JTRIGGER_LISTENERS Field Definition Format Size TRIGGER_NAME* Name of the trigger. varchar TRIGGER_GROUP* Name of the trigger group. varchar TRIGGER_LISTENER* The listener action. varchar TABLE 142 QRTZ_BLOB_TRIGGERS Field Definition Format Size TRIGGER_NAME* Name of the trigger. varchar TRIGGER_GROUP* Name of the trigger group.

  • Page 616: Reports, Role Based Access Control

    Database tables and fields Reports TABLE 147 REPORT_TYPE Field Definition Format Size Meta Data for available reports. NAME Report name. varchar DESCRIPTION Report type description. varchar TABLE 148 GENERATED_REPORT Field Definition Format Size NAME Report name. varchar TYPE_ID Report type. EFCM_USER The Management application user who has varchar...

  • Page 617

    Database tables and fields TABLE 152 PRIVILEGE Field Definition Format Size NAME Privilege Name. varchar TABLE 153 PRIVILEGE_GROUP_MAP Field Definition Format Size GROUP_ID* Privilege group ID. PRIVILEGE_ID* Privilege ID. TABLE 154 PRIVILEGE_GROUP Field Definition Format Size NAME Privilege group name. varchar TABLE 155 ROLE_PRIVILEGE_INFO...

  • Page 618

    Database tables and fields TABLE 158 RESOURCE_GROUP Field Definition Format Size NAME Resource group name. varchar DESCRIPTION Resource group description. varchar TABLE 159 RESOURCE_FABRIC_MAP Field Definition Format Size RESOURCE_GROUP_ID* Resource group ID. FABRIC_ID* Fabric ID, which is in the resource group. TABLE 160 USER_ROLE_RESOURCE_INFO name...

  • Page 619: Snmp

    Database tables and fields SNMP TABLE 161 SNMP_CREDENTIALS Field Definition Format Size VIRTUAL SWITCH_ID Virtual switch ID for which this instance of the SNMP credentials apply. RECIPIENT_ID Recipient in the MESSAGE_RECIPIENT table. POR)_NUMBER Port number of the SNMP agent on the switch for get smallint and set requests.

  • Page 620

    Database tables and fields TABLE 161 SNMP_CREDENTIALS (Continued) Field Definition Format Size PRIV_PROTOCOL An indication of whether messages sent or received varchar on behalf of this user can be encrypted and if so, which privacy protocol to use. The current values for this field are: usmNoPrivProtocol and usmDESPrivProtocol.

  • Page 621

    Database tables and fields TABLE 162 SNMP_PROFILE (Continued) Field Definition Format Size AUTH_PROTOCOL An indication of whether or not messages sent or varchar received on behalf of this user can be authenticated and if so, which authentication protocol to use. The supported values for this field are: usmNoAuthProtocol, usmHMACMD5AuthProtocol, and usmHMACSHAAuthProtocol.

  • Page 622: Stats

    Database tables and fields Stats TABLE 164 FAVORITES Field Definition Format Size NAME Name of the favorite. varchar USER_ The application user credentials. varchar TOP_N The top number of ports(5,10,15,20). varchar SELECTION_FILTER Types of ports (FC/FCIP/GE) and End-to-End varchar Monitors. FROM_TIME The time interval in which the graph is shown.

  • Page 623

    Database tables and fields TABLE 166 STATS_AGING Field Definition Format Size FIVE_MIN_VALUE Configured maximum samples value for the five minute table. THIRTY_MIN_VALUE Configured maximum samples value for the thirty minute table. TWO_HR_VALUE Configured maximum samples value for the two hour table.

  • Page 624: Switch

    Database tables and fields Switch TABLE 169 VIRTUAL-SWITCH Field Definition Format Size LOGICAL_ID Logical ID of the switch. smallint NAME Switch name. varchar WWN of the switch. char VIRTUAL_FABRIC_ID Virtual fabric ID. If VF enabled then will have the VFID; smallint otherwise it will be -1.

  • Page 625

    Database tables and fields TABLE 170 CORE_SWITCH Field Definition Format Size IP_ADDRESS IP address of the switch. varchar Chassis WWN. char NAME Switch name. varchar CONTACT Any associated contact name, obtained through varchar SNMP. LOCATION Physical location, obtained through SNMP. varchar DESCRIPTION User assigned description, obtained through SNMP.

  • Page 626

    Database tables and fields TABLE 170 CORE_SWITCH (Continued) Field Definition Format Size NIC_PROFILE_ID NIC profile of the Management application server host used by this switch to communicate in interactive configuration and other operations. It determines which Management application host IP used by this switch.

  • Page 627

    Database tables and fields TABLE 172 SWITCH_INFO name Source NIC_PROFILE_ID CORE_SWITCH.NIC_PROFILE_ID MANAGING_SERVER_IP_ADDRESS CORE_SWITCH.MANAGING_SERVER_IP_ADDRESS VIRTUAL_SWITCH.ID NAME VIRTUAL_SWITCH.NAME OPERATIONAL_STATUS VIRTUAL_SWITCH.OPERATIONAL_STATUS SWITCH_MODE VIRTUAL_SWITCH.SWITCH_MODE AD_CAPABLE VIRTUAL_SWITCH.AD_CAPABLE VIRTUAL_SWITCH.WWN ROLE VIRTUAL_SWITCH.ROLE FCS_ROLE VIRTUAL_SWITCH.FCS_ROLE DOMAIN_ID VIRTUAL_SWITCH.DOMAIN_ID VIRTUAL_FABRIC_ID VIRTUAL_SWITCH.VIRTUAL_FABRIC_ID BASE_SWIITCH VIRTUAL_SWITCH.BASE_SWITCH MAX_ZONE_CONFIG_SIZE VIRTUAL_SWITCH.MAX_ZONE_CONFIG_SIZE CREATION_TIME VIRTUAL_SWITCH.CREATION_TIME LAST_UPDATE_TIME VIRTUAL_SWITCH.LAST_UPDATE_TIME USER_NAME VIRTUAL_SWITCH.USER_NAME PASSWORD VIRTUAL_SWITCH.PASSWORD...

  • Page 628

    Database tables and fields TABLE 173 SWITCH_MODEL Field Definition Format Size SWBD_TYPE Switch type number, universally used by all the smallint Management application module implementation. SUBTYPE Switch subtype. At present no subtypes for existing smallint model records are defined. DESCRIPTION Model description, such as FC link speed, port count varchar and whether multi-card (director) class switch or...

  • Page 629: Switch Details

    Database tables and fields Switch details TABLE 175 CORE_SWITCH_DETAILS Field Definition Format Size CORE_SWITCH_ID* DB ID. ETHERNET_MASK Subnet mask. char FC_MASK Subnet mask for FC IP. char FC_IP Fibre Channel IP address. char FC_CERTIFICATE smallint SW_LICENSE_ID char SUPPLIER_SERIAL_ Serial number of the chassis. varchar NUMBER PART_NUMBER...

  • Page 630

    Database tables and fields TABLE 175 CORE_SWITCH_DETAILS (Continued) Field Definition Format Size STBY_CP_PRI_FW_VERSIO Standby CP primary firmware version. varchar STBY_CP_SEC_FW_VERSIO Standby CP secondary firmware version. varchar TYPE SWBD number as assigned by embedded SW smallint depending upon the switch type / platform. EGM_CAPABLE 1 = the switch is EGM-capable.

  • Page 631

    Database tables and fields TABLE 176 CORE_SWITCH (Continued) Field Definition Format Size LAST_SCAN_TIME timestampty LAST_UPDATE_TIME Time when this record was last updated. timestamp SYSLOG_REGISTERED 1 if the Management application server is registered smallint with the switch to receive Syslog. CALL_HOME_ENABLED 1 if "call home"...

  • Page 632

    Database tables and fields TABLE 177 SWITCH_DETAILS_INFO Name Source MANAGING_SERVER_IP_ADDRESS CORE_SWITCH.MANAGING_SERVER_IP_ADDRESS VIRTUAL_SWITCH.ID NAME VIRTUAL_SWITCH.NAME OPERATIONAL_STATUS VIRTUAL_SWITCH.OPERATIONAL_STATUS SWITCH_MODE VIRTUAL_SWITCH.SWITCH_MODE AD_CAPABLE VIRTUAL_SWITCH.AD_CAPABLE VIRTUAL_SWITCH.WWN ROLE VIRTUAL_SWITCH.ROLE FCS_ROLE VIRTUAL_SWITCH.FCS_ROLE DOMAIN_ID VIRTUAL_SWITCH.DOMAIN_ID VIRTUAL_FABRIC_ID VIRTUAL_SWITCH.VIRTUAL_FABRIC_ID BASE_SWITCH VIRTUAL_SWITCH.BASE_SWITCH MAX_ZONE_CONFIG_SIZE VIRTUAL_SWITCH.MAX_ZONE_CONFIG_SIZE CREATION_TIME VIRTUAL_SWITCH.CREATION_TIME LAST_UPDATE_TIME VIRTUAL_SWITCH.LAST_UPDATE_TIME USER_NAME VIRTUAL_SWITCH.USER_NAME PASSWORD VIRTUAL_SWITCH.PASSWORD MANAGEMENT_STATE VIRTUAL_SWITCH.MANAGEMENT_STATE...

  • Page 633

    Database tables and fields TABLE 177 SWITCH_DETAILS_INFO Name Source PART_NUMBER CORE_SWITCH_DETAILS.PART_NUMBER CHECK_BEACON CORE_SWITCH_DETAILS.CHECK_BEACON TIMEZONE CORE_SWITCH_DETAILS.TIMEZONE FMS_MODE CORE_SWITCH_DETAILS.FMS_MODE MAX_PORT CORE_SWITCH_DETAILS.MAX_PORT CHASSIS_SERVICE_TAG CORE_SWITCH_DETAILS.CHASSIS_SERVICE_TAG BAY_ID CORE_SWITCH_DETAILS.BAY_ID TYPE_NUMBER CORE_SWITCH_DETAILS.TYPE_NUMBER MODEL_NUMBER CORE_SWITCH_DETAILS.MODEL_NUMBER MANUFACTURER CORE_SWITCH_DETAILS.MANUFACTURER PLANT_OF_MANUFACTURER CORE_SWITCH_DETAILS.PLANT_OF_MANUFACTURER SEQUENCE_NUMBER CORE_SWITCH_DETAILS.SEQUENCE_NUMBER CORE_SWITCH_DETAILS.TAG DYNAMIC_LOAD_SHARING CORE_SWITCH_DETAILS.DYNAMIC_LOAD_SHARING PORT_BASED_ROUTING CORE_SWITCH_DETAILS.PORT_BASED_ROUTING IN_ORDER_DELIVERY CORE_SWITCH_DETAILS.IN_ORDER_DELIVERY ACT_CP_PRI_FW_VERSION CORE_SWITCH_DETAILS.ACT_CP_PRI_FW_VERSION ACT_CP_SEC_FW_VERSION...

  • Page 634: Switch Port

    Database tables and fields Switch port TABLE 178 GIGE_PORT Field Definition Format Size SWITCH_PORT_ID ID for the GigE Port in SWITCH_PORT. PORT_NUMBER GigE Port Number(0 for ge0 and 1 for ge1). SLOT_NUMBER Slot number on which the GigE Port is present. ENABLED Enabled or disabled.

  • Page 635

    Database tables and fields TABLE 179 SWITCH_PORT (Continued) Field Definition Format Size MAC_ADDRESS MAC address of this port. varchar PORT_MOD varchar TYPE Port type. The specific mode currently enabled for the varchar port. FULL_TYPE Port type. varchar STATUS The current status of the switch port. varchar HEALTH varchar...

  • Page 636

    Database tables and fields TABLE 179 SWITCH_PORT (Continued) Field Definition Format Size NPIV_CAPABLE Instance NPIV mode capability: smallint 1 = indicates port has NPIV capability 2 = NPIV license is enabled NPIV_ENABLED Whether NPIV mode is enabled. smallint FC_FAST_WRITE_ENABLED 1 = FC fast write is enabled. smallint ISL_RRDY_ENABLED smallint...

  • Page 637

    Database tables and fields TABLE 180 GIGE_PORT_INFO (Continued) name Source INTERFACE_TYPE GIGE_PORT.INTERFACE_TYPE CHECKSUM GIGE_PORT.CHECKSUM FCIP_CAPABLE GIGE_PORT.FCIP_CAPABLE ISCSI_CAPABLE GIGE_PORT.ISCSI_CAPABLE INBAND_MANAGEMENT_STATUS GIGE_PORT.INBAND_MANAGEMENT_STATUS VIRTUAL SWITCHID SWITCH_PORT.VIRTUAL_SWITCH_ID USER PORT NUMBER SWITCH_PORT.USER_PORT_NUMBER TABLE 181 N2F_PORT_MAP Field Definition Format Size VIRTUAL_SWITCH_ID Virtual switch ID of AG for N to F_port mapping, foreign key to VIRTUAL_SWITCH table.

  • Page 638

    Database tables and fields TABLE 184 FPORT_TRUNK_MEMBER Field Definition Format Size GROUP_ID* Foreign key to the PORT_TRUNK_GROUP table. PORT_NUMBER* Member user port number. SMALLINT Member port WWN. CHAR TABLE 185 VIRTUAL_SWITCH Field Definition Format Size LOGICAL_ID Logical ID of the switch. smallint NAME Switch name.

  • Page 639: Switch Snmp Info

    Database tables and fields TABLE 185 VIRTUAL_SWITCH (Continued) Field Definition Format Size CRYPTO_CAPABLE 0 = the switch is not crypto-enabled; if capable it will smallint have non-zero value FCR_CAPABLE 0 = the switch is not FCR-enabled; if capable it will smallint have non-zero value FCIP_CAPABLE...

  • Page 640

    Database tables and fields TABLE 186 VIRTUAL_SWITCH Name Source BASE SWITCH BASE_SWITCH MAX ZONE CONFIG SIZE MAX_ZONE_CONFIG_SIZE CREATION TIME CREATION_TIME LAST UPDATE TIME LAST_UPDATE_TIME USER NAME SWITCH_INFO.USER_NAME PASSWORD PASSWORD MANAGEMENT STATE MANAGEMENT_STATE STATE STATE STATUS STATUS STATUS REASON STATUS_REASON USER DEFINED VALUE1 USER_DEFINED_VALUE_1 USER DEFINED VALUE2 USER_DEFINED_VALUE_2...

  • Page 641: Threshold

    Database tables and fields Threshold TABLE 187 SWITCH_THRESHOLD-SETTING Field Definition Format Size SWITCH_ID* References the ID in CORE_SWITCH table. POLICY_ID* References the ID in THRESHOLD_POLICY table. STATUS The status of applied to the switch. smallint OVERRIDDEN Policy is overridden or not overridden. smallint DESCRIPTION Description about the status of policy applied to the...

  • Page 642: User Interface

    Database tables and fields TABLE 192 THRESHOLD_MEASURE (Continued) Field Definition Format Size LOW_BOUNDARY Configured low boundary threshold value for measure ID. BUFFER_SIZE Configured buffer size for measure ID. POLICY_ID* References the ID in THRESHOLD_POLICY table. User Interface TABLE 193 AVAILABLE_FLYOVER_PROPERTY Field Definition Format...

  • Page 643: Zoning 1

    Database tables and fields TABLE 196 TOOL_PATH (Continued) Field Definition Format Size PATH Path of the tool where installed or available. varchar 1057 WORKING_FOLDER Working folder for that application. varchar TABLE 197 PRODUCT_APP Field Definition Format Size MENU_TEXT Name of the product menu. varchar PROP1_KEY First condition name to be satisfied by a selected...

  • Page 644

    Database tables and fields TABLE 198 ZONE_DB (Continued) Field Definition Format Size MCDATA_DEFAULT_ZONE McData switch default zoning mode. smallint MCDATA_SAFE_ZONE McData switch safe zoning mode. smallint ZONE_CONFIG_SIZE Zone configuration string length. TABLE 199 ZONE_DB_USERS Field Definition Format Size ZONE_DB_ID PK of the owning zone DB. USER_NAME List of users currently editing this zone DB.

  • Page 645: Zoning 2

    Database tables and fields Zoning 2 TABLE 203 ZONE_ALIAS_IN_ZONE Field Definition Format Size ZONE_ALIAS_ID* PK of the zone alias. ZONE_ID* PK of the zone. TABLE 204 ZONE_ALIAS Field Definition Format Size ZONE_DB_ID PK of the owning ZONE_DB. NAME The zone alias name. varchar TABLE 205 ZONE_ALIAS_MEMBER...

  • Page 646

    Database tables and fields TABLE 208 ZONE_DB Field Definition Format Size FABRIC_ID PK of the owning fabric. NAME Zone DB name for offline Zone DBs. varchar OFFLINE Offline Zone DB (1 = offline). smallint CREATED Created timestamp. timestamp LAST_MODIFIED Last modified timestamp. timestamp LAST_APPLIED Last saved to switch timestamp.

  • Page 647

    Index access levels backup defined changing interval – features configuring to hard drive roles configuring to network drive accessing configuring to writable CD data FTP server folder disabling ACK emulation, device level enabling activating immediate event policies management server zone configuration reviewing events active session management, roles and access levels roles and access levels...

  • Page 648

    client/server connections between a switch and an LKM key vault firewall requirements connections, changing display of content product overview broadcast messages collapsing groups copying color, changing log entries community strings log entry parts master log reverting to default master log parts comparing zones zone databases...

  • Page 649

    deleting discovery event policies configuring fabrics description of FCIP tunnels in-band, enabling property labels out-of-band, enabling reports setting up technical support information SNMP version zone alias state zone configuration troubleshooting zones discovery setup deleting firmware files from roles and access levels firmware repository display deleting servers...

  • Page 650

    e-mail messages encryption group properties defining using the restore master key e-mail notification viewing encryption group properties encryption group properties dialog box configuring emailing General tab HA Clusters tab technical support information Link Keys tab enable SSL Members tab enabling Tape Pools tab default zone for fabrics encryption properties...

  • Page 651

    event policies fabrics activating deleting broadcast message discovering deactivating IPv6 discovery deleting monitoring description status, determining duplicating zone database, clearing editing Fastwrite e-mail messages fault management ISL offline policy roles and access levels ISL offline, duplicating FC Address ISL offline, editing for inactive iSCSI devices launch scripts FC routing module...

  • Page 652

    FCIP trunking firmware FCoE management, roles and access levels deleting files from repository downloading FCR configuration, launching management, overview feature overwriting active session management firmware management add/delete properties roles and access levels backup firmware repository CEE management deleting firmware files configuration management displaying diagnose and troubleshooting...

  • Page 653

    ISL offline policies adding duplicating HA clusters editing creating removing engines from requirements for swapping engines in HBAs key vaults associating to servers unassociating connection from switch entering the IP address or host name for features software overview statistics monitoring HCM Agent, launching Help menu host management, roles and access levels...

  • Page 654

    login banner memory allocation configuring configuration disabling configuring asset polling login security menu bar configuring Configure logon conflicts Discover Edit logs Help event Monitor Server choosing to be added to an encryption target Tools container View M-EOS feature listing merging zone databases minimap Main window...

  • Page 655

    port connectivity view disabling filter enabling filter offline ports, display filtering results out-of-band discovery refreshing setting up resetting filter overwriting viewing details firmware port connectivity, viewing port display, changing port label, changing port optics refreshing passwords viewing changing port properties database, changing port status, determining performance...

  • Page 656

    properties edit renaming roles and access levels zone alias property fields zone configuration zones editing renaming servers property labels replacing adding deleting zone members editing report roles and access levels report types reports deleting exporting QoS implementation in FCIP generating QoS priorities per FCIP circuit printing viewing...

  • Page 657

    searching showing ports members in zones connected Potential Members list procedure zones in zone configuration smart cards Zones list configuring security removing using the management application configuring saving to a file roles and access levels SNMP credentials, configuring security authentication SNMP informs, disabling configuring using the GUI SNMP informs, enabling...

  • Page 658

    management application tables switch removal, consequences of – capability database fields – Sybase database fields client_view database fields – collector database fields syslog forwarding – config database fields adding a destination connected end devices database fields description – device database fields disabling –...

  • Page 659

    technical support information collection troubleshooting scheduling discovery technical support information, capturing FCIP Ethernet connections tunnels, configuring technical support information, viewing Telnet launching session testing FTP server third-party tools unassociating, HBA to server adding user starting privileges TIN/TUP emulation User Administrator tips, turning on and off user ID, determining tips, viewing...

  • Page 660

    viewing zone alias device properties creating disabling port connectivity filter deleting enabling port connectivity filter editing event logs exporting events zone alias, duplicating FCIP connection properties zone alias, removing objects FCIP Ethernet port properties zone alias, renaming FCIP FC port properties zone configuration filtering port connectivity activating...

  • Page 661

    zoning accessing configuration overview configuring for the SAN invalid names naming conventions online overview traffic isolation traffic isolation, configuring zoning activation roles and access levels zoning administration zoning configuration overview zoning offline roles and access levels zoning online roles and access levels zoning reports generating zoning set edit limits, roles and access levels...

  • Page 662

    DCFM Professional User Manual 53-1001773-01...

This manual also for:

Brocade bladesystem 4/24

Comments to this Manuals

Symbols: 0
Latest comments: