Sign In
Upload
Manuals
Brands
Brocade Communications Systems Manuals
Software
DCFM Enterprise
Brocade Communications Systems DCFM Enterprise Manuals
Manuals and User Guides for Brocade Communications Systems DCFM Enterprise. We have
1
Brocade Communications Systems DCFM Enterprise manual available for free PDF download: User Manual
Brocade Communications Systems DCFM Enterprise User Manual (870 pages)
Supporting DCFM 10.4.X
Brand:
Brocade Communications Systems
| Category:
Software
| Size: 6.79 MB
Table of Contents
Table of Contents
3
Document History
2
About this Document
27
How this Document Is Organized
27
In this Chapter
27
Supported Hardware and Software
28
Supported Open Source Software Products
31
What's New in this Document
32
Document Conventions
34
Text Formatting
34
Notes, Cautions, and Warnings
34
Key Terms
34
Additional Information
35
Brocade Resources
35
Other Industry Resources
36
Notice to the Reader
35
Getting Technical Help
36
Document Feedback
37
Chapter 1 Getting Started
39
In this Chapter
39
User Interface Components
39
Menu Bar
41
Toolbar
41
SAN Tab
42
View All List
42
Port Display Buttons
43
Product List
43
Connectivity Map
44
Toolbox
45
Master Log
45
Utilization Legend
46
Minimap
47
Status Bar
48
Icon Legend
49
Product Icons
49
Group Icons
50
Port Icons
50
Product Status Icons
51
Event Icons
51
Management Server and Client
52
Logging into a Server
55
Launching a Remote Client
55
Clearing Previous Versions of the Remote Client
56
Launching the Configuration Wizard
56
Changing Your Password
60
Changing the Database User Password
60
Viewing Active Sessions
61
Disconnecting Users
61
Viewing Server Properties
62
Viewing Port Status
62
License
63
Managed Port Count Calculation
63
Entering the License Key
64
Upgrading the Application
64
Installing a Patch
65
Uninstalling a Patch
66
Feature-To-Firmware Requirements
67
Accessibility Features for the Management Application
69
Keyboard Shortcuts
69
Look and Feel
70
Chapter 2 Discovery
73
Fabric Discovery Overview
73
FCS Policy and Seed Switches
74
Discovering Fabrics
74
Configuring SNMP Credentials
77
Reverting to a Default SNMP Community String
79
Deleting a Fabric
79
In this Chapter
73
Host Discovery
80
Discovering Hosts by IP Address or Hostname
80
Importing Hosts from a CSV File
81
Importing Hosts from a Fabric
82
Configuring Brocade HBA Credentials
83
Configuring Virtual Machine Credentials
84
Editing Host Credentials
85
Removing a Host from Discovery
86
Viewing the Discovery State
86
Troubleshooting Discovery
87
M-Eosn Discovery Troubleshooting
88
Virtual Fabric Discovery Troubleshooting
89
Fabric Monitoring
90
Monitoring Discovered Fabrics
90
Stop Monitoring of a Discovered Fabric
91
Seed Switch
91
Seed Switch Requirements
92
Seed Switch Failover
93
Changing the Seed Switch
94
Chapter 3 Application Configuration
97
Data Backup
97
In this Chapter
97
What Is Backed up
97
Management Server Backup
98
Configuring Backup to a Writable CD
99
Configuring Backup to a Hard Drive
100
Configuring Backup to a Network Drive
101
Disabling Backup
102
Enabling Backup
102
Changing the Backup Interval
103
Viewing the Backup Status
103
Reviewing Backup Events
104
Starting Immediate Backup
104
Data Restore
105
Restoring Data
105
Display
106
Restoring Data to a New Server
106
Resetting Your Display
107
Displaying End Nodes
108
End Node Display
108
Enabling Ethernet Events
109
Ethernet Events
109
Configuring Event Storage
110
Disabling Ethernet Events
110
Event Storage
110
Flyovers
111
Names
114
Turning Flyovers on or off
114
Viewing Flyovers
114
Setting Names to be Non-Unique
115
Fixing Duplicate Names
116
Adding a Name to an Existing Device
117
Viewing Names
117
Adding a Name to a New Device
118
Applying a Name to a Detached WWN
118
Removing a Name from a Device
118
Editing Names
119
Exporting Names
119
Importing Names
120
Searching for a Device by Name
120
Searching for a Device by WWN
121
Configuring the Server Name
122
Security
122
Configuring Login Security
123
Setting the CHAP Secret
123
Configuring the Login Banner Display
124
Disabling the Login Banner
124
Client Export Port
125
Software Configuration
125
Discovery
126
FTP/SCP Overview
127
IP Configuration
131
Memory Allocation
135
Server Port
138
Support Mode
139
Fabric Tracking
140
Enabling Fabric Tracking
141
Disabling Fabric Tracking
141
Accepting Changes for a Fabric
142
Accepting Changes for a Device
142
In this Chapter
143
Chapter 4 Call Home
144
About Call Home
144
System Requirements
145
Showing a Call Home Center
146
Editing a Call Home Center
147
Editing the Brocade International or IBM Call Home Center
147
Editing the Brocade North America Call Home Center
149
Editing an E-Mail Call Home Center
150
Editing the EMC Call Home Center
151
Editing the HP LAN Call Home Center
152
Hiding a Call Home Center
147
Enabling a Call Home Center
153
Enabling Support Save
153
Disabling a Call Home Center
154
Testing the Call Home Center Connection
154
Viewing Call Home Status
155
Assigning a Device to the Call Home Center
156
Removing a Device from a Call Home Center
156
Defining an Event Filter
157
Call Home for Virtual Switches
157
Removing All Devices and Filters from a Call Home Center
157
Assigning an Event Filter to a Call Home Center
158
Assigning an Event Filter to a Device
158
Overwriting an Assigned Event Filter
159
Removing an Event Filter from a Call Home Center
159
Removing an Event Filter from a Device
160
Removing an Event Filter from the Call Home Event Filters Table
160
Searching for an Assigned Event Filter
160
Chapter 5 View Management
161
About View Management
161
In this Chapter
161
Creating a Customized View
162
Editing a Customized View
163
Deleting a Customized View
164
About Topology Layout
165
Copying a View
165
Customizing the Layout of Devices on the Topology
166
Changing a Group's Background Color
167
Customizing the Layout of Connections on the Topology
167
Reverting to the Default Background Color
168
Changing the Port Display
169
Changing the Port Label
169
Changing the Product Label
169
Collapsing Groups
170
Configuring Custom Connections
170
Expanding Groups
170
Grouping on the Topology
170
Viewing Connections
170
Deleting a Custom Connection Configuration
171
Saving a Custom Connection Configuration
171
Customizing the Main Window
172
Zooming in and out of the Connectivity Map
172
Showing Levels of Detail on the Connectivity Map
173
Exporting the Topology
173
Customizing Application Tables
174
Searching for a Device in the Connectivity Map
177
Chapter 6 Third-Party Tools
179
About Third-Party Tools
179
In this Chapter
179
Launching a Telnet Session
180
Starting Third-Party Tools from the Application
180
Launching an Element Manager
181
Launching Web Tools
181
Launching FCR Configuration
182
Launching HCM Agent
183
Adding a Tool
184
Adding an Option to the Tools Menu
185
Entering the Server IP Address of a Tool
185
Changing an Option on the Tools Menu
187
Removing an Option from the Tools Menu
187
Adding an Option to a Device's Shortcut Menu
188
Changing an Option on a Device's Shortcut Menu
189
Removing an Option from a Device's Shortcut Menu
190
Vmware Vcenter Plug-In
191
Registering a Vcenter Server
191
Editing a Vcenter Server
192
Deleting a Vcenter Server
192
Chapter 7 Server Management Console
193
In this Chapter
193
Launching the SMC on Windows
193
Server Management Console Overview
193
Launching the SMC on Linux and Solaris
194
Services
194
Refreshing the Server Status
195
Stopping All Services
195
Stopping the CIMOM Services
195
Changing Server Port Numbers
196
Restarting All Services
196
Starting All Services
196
Authentication
197
Configuring a Radius Server
197
Configuring an LDAP Server
199
Configuring Switch Authentication
200
Configuring Windows Authentication
201
Configuring Local Database Authentication
202
Configuring NIS Authentication
202
Configuring UNIX Password File Authentication
202
Displaying the Client Authentication Audit Trail
203
Restoring the Database
203
Capturing Technical Support Information
205
Upgrading HCM on the Management Server
206
Launching the SMIA Configuration Tool on Windows
207
SMI Agent Configuration
207
Launching the SMIA Configuration Tool on Linux and Solaris
208
Home Tab
209
Launching a Remote SMIA Configuration Tool
209
Authentication
210
CIMOM Configuration
213
Certificate Management
215
Deleting a Certificate
217
Viewing the Configuration Summary
218
Chapter 8 Device Configuration
221
Configuration Repository Management
221
In this Chapter
221
Saving Switch Configurations
222
Restoring a Switch Configuration for a Selected Device
223
Backing up a Switch Configuration
224
Restoring a Configuration from the Repository
226
Viewing Configuration File Content
227
Deleting a Configuration
228
Searching the Configuration File Content
228
Exporting a Configuration
229
Importing a Configuration
229
Keeping a Copy Past the Defined Age Limit
229
Replicating Configurations
229
Device Properties
230
Replicating Security Configurations
230
Viewing Properties
230
Adding a Property Label
233
Editing a Property Label
233
Deleting a Property Label
234
Editing a Property Field
234
Enhanced Group Management
234
Displaying the Firmware Repository
235
Firmware Management
235
Importing a Firmware File and Release Notes
236
Deleting a Firmware File
237
Download Firmware
237
Creating a New Host
239
Host Port Mapping
239
Deleting an HBA Host
240
Renaming an HBA Host
240
Viewing Host Properties
240
Associating an HBA with a Host
241
Importing HBA-To-Host Mapping
241
Removing an HBA from a Host
242
Exporting Host Port Mapping
243
Ports
244
Viewing Port Connectivity
244
Disabling a Port
247
Enabling a Port
247
Refreshing the Port Connectivity View
247
Filtering Port Connectivity
248
Viewing Port Details
249
Viewing Ports and Port Properties
250
Port Types
253
Showing Connected Ports
253
Viewing Port Connection Properties
254
Determining Inactive Iscsi Devices
256
Determining Port Status
256
Viewing Port Optics
257
Port Auto Disable
259
Enabling Port Auto Disable on All Ports on a Device
260
Enabling Port Auto Disable on Individual Ports
260
Disabling Port Auto Disable on All Ports on a Device
261
Disabling Port Auto Disable on Individual Ports
261
Unblocking Ports
261
Creating a Storage Array
262
Storage Port Mapping Configuration
262
Adding Storage Ports to a Storage Array
263
Reassigning Mapped Storage Ports
263
Unassigning a Storage Port from a Storage Array
263
Deleting a Storage Array
264
Editing Storage Array Properties
264
Viewing Storage Array Properties
265
Viewing Storage Port Properties
265
Importing Storage Port Mapping
266
Exporting Storage Port Mapping
267
Device Technical Support
268
Scheduling Technical Support Information Collection
268
Starting Immediate Technical Support Information Collection
269
E-Mailing Technical Support Information
270
Viewing Technical Support Information
270
Deleting Technical Support Files from the Repository
271
FTP Server
271
Upload Failure Data Capture
272
Disabling Upload Failure Data Capture
273
Purging Upload Failure Data Capture Files
273
Configuring the Upload Failure Data Capture FTP Server
274
Viewing the Upload Failure Data Capture Repository
275
Chapter 9 Fabric Binding
277
Fabric Binding Overview
277
In this Chapter
277
Enabling Fabric Binding
278
Disabling Fabric Binding
279
Adding Switches to the Fabric Binding Membership List
279
Membership List
280
Removing Switches from Fabric Binding Membership
280
High Integrity Fabrics
281
High Integrity Fabric Requirements
282
Activating High Integrity Fabrics
282
Deactivating High Integrity Fabrics
283
Chapter 10 Fault Management
285
Fault Management Overview
285
In this Chapter
285
Event Logs
286
Viewing Event Logs
286
Copying Part of a Log Entry
287
Copying an Entire Log Entry
287
Exporting the Entire Log
288
E-Mailing All Event Details from the Master Log
288
E-Mailing Selected Event Details from the Master Log
288
E-Mailing a Range of Event Details from the Master Log
289
Displaying Event Details from the Master Log
289
Copying Part of the Master Log
290
Copying the Entire Master Log
290
Exporting the Master Log
291
Filtering Events in the Master Log
291
Setting up Advanced Event Filtering for the Master Log
292
Removing an Advanced Event Filter
294
Event Policies
295
Policy Types
295
Policy Triggers
296
Policy Actions
296
Adding an Event Policy
296
Adding an Port Offline Policy
297
Adding a PM Threshold Crossed Policy
298
Adding a Security Violation Policy
299
Defining the Broadcast Message Action
300
Defining the Launch Script Action
301
Defining the Send E-Mail Action
302
Configuring Support Data Capture Action
303
Activating a Policy
303
Deactivating a Policy
303
Deleting a Policy
304
Duplicating an Event Policy
304
Duplicating an Port Offline Policy
305
Duplicating a PM Threshold Crossed Policy
306
Duplicating a Security Violation Policy
307
Editing an Event Policy
308
Editing an Port Offline Policy
309
Editing a PM Threshold Crossed Policy
310
Editing a Security Violation Policy
311
Viewing Events
311
Event Notification
312
Configuring E-Mail Notification
312
Setting up Advanced Event Filtering for a User
313
SNMP Trap and Informs Registration and Forwarding
316
Registering the Management Server
316
Registering a Different Management Application Server
316
Removing a Host Server
317
Enabling Trap Forwarding
317
Adding an Snmpv1 Destination
317
Adding an Snmpv3 Destination
318
Editing a Destination
319
Removing a Destination
319
Disabling Trap Forwarding
319
Enabling SNMP Informs
320
Disabling SNMP Informs
320
Syslog Forwarding
321
Registering the Management Server
321
Registering a Host Server
322
Removing a Host Server
322
Adding a Destination
322
Removing a Destination
323
Editing a Destination
323
Enabling Syslog Forwarding
323
Disabling Syslog Forwarding
324
Chapter 11 Performance Data
325
Performance Overview
325
In this Chapter
325
Performance Measures
326
Performance Management Requirements
327
Real-Time Performance Data
331
Generating a Real-Time Performance Graph
332
Filtering Real-Time Performance Data
333
Exporting Real-Time Performance Data
334
Clearing Port Counters
334
Historical Performance Data
335
Enabling Historical Performance Collection SAN Wide
335
Selected Fabrics
335
Disabling Historical Performance Collection
336
Generating a Historical Performance Graph
336
Saving a Historical Performance Graph Configuration
338
Exporting Historical Performance Data
339
Deleting a Historical Performance Graph
339
End-To-End Monitoring
340
Configuring an End-To-End Monitor Pair
340
Displaying End-To-End Monitor Pairs in a Real-Time Graph
341
Displaying End-To-End Monitor Pairs in a Historical Graph
341
Refreshing End-To-End Monitor Pairs
342
Deleting an End-To-End Monitor Pair
342
Top Talker Monitoring
342
Configuring a Fabric Mode Top Talker Monitor
343
Configuring an F_Port Mode Top Talker Monitor
345
Deleting a Top Talker Monitor
346
Pausing a Top Talker Monitor
346
Restarting a Top Talker Monitor
346
Thresholds and Event Notification
347
Creating a Threshold Policy
347
Editing a Threshold Policy
349
Duplicating a Threshold Policy
351
Assigning a Threshold Policy
351
Deleting a Threshold Policy
352
Connection Utilization
353
Enabling Connection Utilization
354
Disabling Connection Utilization
354
Changing Connection Utilization
355
Chapter 12 Reports
357
Report Types
357
In this Chapter
357
Generating Reports
358
Viewing Reports
358
Exporting Reports
359
Deleting Reports
360
Printing Reports
360
Generating Performance Reports
361
Generating Zoning Reports
362
Chapter 13 Port Fencing
363
About Port Fencing
363
In this Chapter
363
Port Fencing Requirements
363
Thresholds
364
C3 Discard Frames Threshold
364
Invalid Crcs Threshold
365
Invalid Words Threshold
365
Link Threshold
365
Link Reset Threshold
365
Protocol Error Threshold
366
State Change Threshold
366
Security Threshold
366
Adding Thresholds
367
Adding a C3 Discard Frames Threshold
367
Adding an Invalid Crcs Threshold
369
Adding an Invalid Words Threshold
370
Adding a Link Threshold
371
Adding a Link Reset Threshold
372
Adding a Protocol Error Threshold
373
Adding a State Change Threshold
374
Adding a Security Threshold
376
Assigning Thresholds
377
Unblocking a Port
377
Avoiding Port Fencing Inheritance
378
Editing Thresholds
378
Editing a C3 Discard Frames Threshold
378
Editing an Invalid Crcs Threshold
379
Editing an Invalid Words Threshold
380
Editing a Link Threshold
381
Editing a Link Reset Threshold
382
Editing a Protocol Error Threshold
383
Editing a State Change Threshold
384
Editing a Security Threshold
385
Finding Assigned Thresholds
386
Viewing Thresholds
386
Viewing All Thresholds on a Specific Device
387
Removing Thresholds
387
Removing Thresholds from Individual Objects
387
Removing Thresholds from the Thresholds Table
388
Chapter 14 Role-Based Access Control
389
Users
389
In this Chapter
389
Viewing the List of Users
389
Adding a User Account
390
Editing a User Account
391
Filtering Event Notifications for a User
391
Removing a User Account
392
Roles
393
Creating a User Role
393
Editing a User Role
394
Removing a User Role
395
Resource Groups
396
Creating a Resource Group
396
Editing a Resource Group
397
Removing a Resource Group
398
Assigning a User to a Resource Group
399
Removing a User from a Resource Group
400
Finding a User's Resource Group
400
15 In this Chapter
401
About Host Management
401
Chapter 15 Host Management
402
HCM Features
402
HCM Software
402
Host Bus Adapters
403
Converged Network Adapters
404
Connectivity Map
405
Host Discovery
405
Host Port Mapping
406
View Management
406
Host Administrator Privileges
407
Host Management Privileges
407
Role-Based Access Control
407
Host Performance Management
408
Adapter Events
409
Event Policies
409
Host Fault Management
409
Filtering Event Notifications
410
Syslog Forwarding
410
Application
411
Supportsave on Adapters
412
Host Security Authentication
411
16 In this Chapter
413
FCIP Concepts
414
FCIP Services Licensing
414
IP Network Considerations
414
FCIP Platforms and Supported Features
415
Design for Redundancy and Fault Tolerance
417
Emulation Features
417
FCIP Trunking
417
FCIP Circuit Failover Capabilities
418
FCIP Trunk Configuration Considerations
418
Bandwidth Calculation During Failover
419
Adaptive Rate Limiting
420
FSPF Link Cost Calculation When ARL Is Used
420
Qos SID/DID Priorities over an FCIP Trunk
421
Ipsec and IKE Implementation over FCIP
422
Ipsec for the 4 Gbps Platforms
422
Ipsec for the 8 Gbps Platforms
423
QOS, DSCP, and Vlans
424
DSCP Quality of Service
424
Vlans and Layer Two Quality of Service
424
When both DSCP and L2Cos Are Used
425
Open Systems Tape Pipelining
426
FCIP Fastwrite and Tape Acceleration
426
FICON Emulation Features
427
XRC Emulation
427
Tape Write Pipelining
427
Tape Read Pipelining
427
FCIP Configuration Guidelines
428
Virtual Port Types
428
Configuring an FCIP Tunnel
429
Adding an FCIP Circuit
431
Use TCP/IP DSCP or L2Cos to Prioritize FC Traffic
432
Configuring FCIP Tunnel Advanced Settings
434
Enabling and Disabling Compression
434
Enabling Open Systems Tape Pipelining (OSTP)
435
Enabling Tperf Test Mode
435
Configuring Ipsec and IKE Policies
436
Configuring FICON Emulation
437
Viewing FCIP Connection Properties
439
Viewing General FCIP Properties
440
Viewing FCIP FC Port Properties
441
Viewing FCIP Ethernet Port Properties
442
Editing FCIP Tunnels
443
Editing FCIP Circuits
444
Disabling FCIP Tunnels
445
Enabling FCIP Tunnels
445
Deleting FCIP Tunnels
446
Deleting FCIP Circuits
446
Displaying FCIP Performance Graphs
447
Displaying Performance Graphs for FC Ports
447
Displaying FCIP Performance Graphs for Ethernet Ports
447
Displaying Tunnel Properties from the FCIP Tunnels Dialog Box
448
Displaying FCIP Circuit Properties from the FCIP Tunnels Dialog Box
449
Displaying Switch Properties from the FCIP Tunnels Dialog Box
450
Displaying Fabric Properties from the FCIP Tunnels Dialog Box
451
Troubleshooting FCIP Ethernet Connections
452
Chapter 17 Fibre Channel over Ethernet
453
Disabling FCIP Circuits
446
Enabling FCIP Circuits
446
Fcoe Overview
453
In this Chapter
453
DCB Exchange Protocol
453
Enhanced Ethernet Features
454
Enhanced Transmission Selection
454
Priority-Based Flow Control
454
Ethernet Jumbo Frames
454
Fcoe Protocols Supported
455
Ethernet Link Layer Protocols Supported
455
Fcoe Licensing
456
Save Running to Startup
456
Copying Switch Configurations to Selected Switches
456
CEE Configuration
457
Opening the CEE Configuration Dialog Box
458
CEE Configuration Tasks
459
Minimum CEE Configuration for Fcoe Traffic
460
Switch Policies
464
CEE Map and Traffic Class Map
464
LLDP Profiles
464
Access Control Lists
464
Spanning Tree Protocol Policy
465
X Policy
465
Link Aggregation Groups
465
Adding a LAG
465
Editing a CEE Switch
468
Editing a CEE Port
469
Editing a LAG
470
Enabling a CEE Port or LAG
472
Deleting a LAG
472
CEE Performance
473
Real Time Performance Graph
473
Historical Performance Graph
474
Historical Performance Report
474
Qos Configuration
475
Enhanced Transmission Selection
475
Priority-Based Flow Control
475
Creating a CEE Map
476
Editing a CEE Map
477
Deleting a CEE Map
478
Assigning a CEE Map to a Port or Link Aggregation Group
479
Creating a Traffic Class Map
480
Editing a Traffic Class Map
480
Deleting a Traffic Class Map
481
Aggregation Group
481
LLDP-DCBX Configuration
483
Configuring LLDP for Fcoe
483
Adding an LLDP Profile
484
Editing an LLDP Profile
485
Deleting an LLDP Profile
485
Assigning an LLDP Profile to a Port or Ports in a LAG
486
Access Control List Configuration
488
Adding an ACL to a Switch
488
Editing the Parameters of an ACL
490
Deleting an ACL
491
Assigning an ACL to a Port or Link Aggregation Group
491
Spanning Tree Protocol Configuration
493
Enabling Spanning Tree Protocol
493
Setting Spanning Tree Parameters for a Switch
494
STP Configurable Parameters at the Port or LAG Level
497
X Authentication
498
Enabling 802.1X Authentication
498
Disabling 802.1X
499
Setting 802.1X Parameters for a Switch
499
CEE Switch Management Using Web Tools
501
CEE Switch Management Using Telnet
502
Virtual Fcoe Port Configuration
502
Viewing Virtual Fcoe Ports
503
Clearing a Stale Entry
504
18 In this Chapter
505
FICON Configurations
505
Configuring a PDCM Allow/Prohibit Matrix
506
Chapter 18 FICON Environments
508
Configuring an Allow/Prohibit Manually
508
Copying a PDCM Configuration
509
Saving a PDCM Configuration to Another Device
511
Activating a PDCM Configuration
512
Deleting a PDCM Configuration
513
Changing the PDCM Matrix Display
513
Cascaded FICON Fabric
514
Configuring a Cascaded FICON Fabric
515
Cascaded FICON Fabric Merge
517
Merging Two Cascaded FICON Fabrics
518
Resolving Merge Conflicts
520
Port Groups
521
Creating a Port Group
521
Viewing Port Groups
522
Editing a Port Group
523
Deleting a Port Group
523
Swapping Blades
524
Chapter 19 FC-FC Routing Service Management
525
Devices that Support Fibre Channel Routing
525
In this Chapter
525
Fibre Channel Routing Overview
526
Guidelines for Setting up FC-FC Routing
527
Connecting Edge Fabrics to a Backbone Fabric
528
Configuring Routing Domain Ids
530
20 In this Chapter
531
Encryption Center Features
532
Encryption User Privileges
533
Chapter 20 Encryption Configuration
534
Registering Authentication Cards from a Card Reader
534
Smart Card Usage
534
Registering Authentication Cards from the Database
535
De-Registering an Authentication Card
536
Using Authentication Cards
536
Enabling or Disabling the System Card Requirement
537
Registering System Cards from a Card Reader
537
De-Registering a System Card
538
Tracking Smart Cards
538
Editing Smart Cards
539
Configuring Blade Processor Links
540
Network Connections
540
Encryption Node Initialization and Certificate Generation
541
Steps for Connecting to an RKM Appliance
542
Supported Encryption Key Manager Appliances
542
Exporting the KAC Certificate Signing Request (CSR)
543
Importing the Signed KAC Certificate
543
Submitting the CSR to a Certificate Authority
543
RKM Appliance
544
RKM Key Vault High Availability Deployment
545
Steps for Connecting to an LKM Appliance
545
Establishing the Trusted Link
546
The Netapp Datafort Management Console
546
Obtaining and Importing the LKM Certificate
547
Disk Keys and Tape Pool Keys (Brocade Native Mode Support)
548
Exporting and Registering the Switch KAC Certificates on LKM
548
LKM Key Vault High Availability Deployment
548
LKM Key Vault Deregistration
549
Steps for Connecting to an SKM Appliance
549
Tape LUN and DF -Compatible Tape Pool Support
549
Configuring a Brocade Group on SKM
550
Password
551
Setting up the Local Certificate Authority (CA) on SKM
552
Creating and Installing the SKM Server Certificate
553
Downloading the Local CA Certificate from SKM
553
Enabling SSL on the Key Management System (KMS) Server
554
Creating an SKM High Availability Cluster
555
SKM Appliance
555
Adding SKM Appliances to the Cluster
556
Importing a Signed KAC Certificate into a Switch
557
Signing the Brocade Encryption Node KAC Certificates
557
Setting up TEMS Network Connections
558
Steps for Connecting to a TEMS Appliance
558
Creating a Client on TEMS
559
Establishing TEMS Key Vault Credentials on the Switch
560
Gathering Information
561
Creating a New Encryption Group
562
Adding a Switch to an Encryption Group
574
Replacing an Encryption Engine in an Encryption Group
578
Creating High Availability (HA) Clusters
579
Removing Engines from an HA Cluster
580
Swapping Engines in an HA Cluster
581
Failback Option
581
Invoking Failback
581
Adding Encryption Targets
582
Configuring Hosts for Encryption Targets
589
Adding Target Disk Luns for Encryption
590
Remote Replication Luns
592
SRDF Pairs
592
Metadata Requirements and Remote Replication
593
Adding Target Tape Luns for Encryption
594
Configuring Encrypted Tape Storage in a Multi-Path Environment
595
Re-Balancing the Encryption Engine
596
Master Keys
597
Active Master Key
597
Alternate Master Key
597
Master Key Actions
598
Reasons Master Keys Can be Disabled
598
Saving the Master Key to a File
598
Saving a Master Key to a Key Vault
600
Saving a Master Key to a Smart Card Set
601
Restoring a Master Key from a File
603
Restoring a Master Key from a Key Vault
604
Restoring a Master Key from a Smart Card Set
605
Creating a New Master Key
606
Zeroizing an Encryption Engine
607
Encryption Targets Dialog Box
608
Redirection Zones
610
Disk Device Decommissioning
611
Decommissioning Luns
611
Displaying and Deleting Decommissioned Key Ids
612
Viewing and Editing Switch Encryption Properties
612
Properties
615
Importing a Signed Public Key Certificate from Properties
615
Enabling the Encryption Engine State from Properties
616
Disabling the Encryption Engine State from Properties
616
Viewing and Editing Group Properties
616
General Tab
617
Members Tab
618
Consequences of Removing an Encryption Switch
619
Security Tab
621
HA Clusters Tab
622
Engine Operations Tab
622
Link Keys Tab
623
Tape Pools Tab
623
Encryption-Related Acronyms in Log Messages
625
Chapter 21 Virtual Fabrics
627
Virtual Fabrics Overview
627
In this Chapter
627
Terminology
628
Virtual Fabrics Requirements
628
Configuring Virtual Fabrics
630
Enabling Virtual Fabrics on a Discovered Device
631
Disabling Virtual Fabrics on a Discovered Device
631
Creating a Logical Switch or Base Switch
631
Finding the Physical Chassis for a Logical Switch
633
Finding the Logical Switch from a Physical Chassis
634
Assigning Ports to a Logical Switch
634
Removing Ports from a Logical Switch
635
Deleting a Logical Switch
636
Configuring Fabric-Wide Parameters for a Logical Fabric
636
Applying Logical Fabric Settings to All Associated Logical Switches
637
Moving a Logical Switch to a Different Fabric
638
Changing a Logical Switch to a Base Switch
639
Chapter 22 Zoning
641
Zoning Overview
641
In this Chapter
641
Types of Zones
641
Online Zoning
642
Offline Zoning
642
Accessing Zoning
643
Zoning Naming Conventions
643
Administrator Zoning Privileges
643
Zoning Configuration
645
Configuring Zoning for the SAN
645
Creating a New Zone
646
Viewing Zone Properties
647
Adding Members to a Zone
647
Creating a New Member in a Zone by WWN
648
Creating a New Member in a Zone by Domain, Port Index
650
Creating a New Member in a Zone by Alias
651
Enabling or Disabling the Default Zone for Fabrics
652
Enabling or Disabling Safe Zoning Mode for Fabrics
653
Creating a Zone Alias
653
Editing a Zone Alias
654
Removing an Object from a Zone Alias
655
Exporting Zone Aliases
655
Renaming a Zone Alias
655
Creating a Zone Configuration
656
Viewing Zone Configuration Properties
656
Adding Zones to a Zone Configuration
657
Activating a Zone Configuration
658
Deactivating a Zone Configuration
660
Creating an Offline Zone Database
661
Refreshing a Zone Database
662
Merging Two Zone Databases
662
Saving a Zone Database to a Switch
664
Exporting an Offline Zone Database
665
Importing an Offline Zone Database
665
Rolling Back Changes to the Offline Zone Database
665
LSAN Zoning
666
Configuring LSAN Zoning
666
Creating a New LSAN Zone
667
Adding Members to the LSAN Zone
667
Creating a New Member in an LSAN Zone
668
Activating LSAN Zones
669
Traffic Isolation Zoning
670
Enhanced TI Zones
670
Configuring Traffic Isolation Zoning
671
Creating a Traffic Isolation Zone
672
Adding Members to a Traffic Isolation Zone
673
Enabling a Traffic Isolation Zone
674
Disabling a Traffic Isolation Zone
674
Enabling Failover on a Traffic Isolation Zone
675
Disabling Failover on a Traffic Isolation Zone
675
Zoning Administration
676
Comparing Zone Databases
676
Managing Zone Configuration Comparison Alerts
678
Setting Change Limits on Zoning Activation
678
Deleting a Zone
679
Deleting a Zone Alias
679
Deleting a Zone Configuration
680
Deleting an Offline Zone Database
680
Clearing the Fabric Zone Database
681
Removing All User Names from a Zone Database
681
Duplicating a Zone
682
Duplicating a Zone Alias
683
Duplicating a Zone Configuration
683
Finding a Member in One or more Zones
684
Finding a Zone Member in the Potential Member List
684
Finding Zones in a Zone Configuration
685
Finding a Zone Configuration Member in the Zones List
685
Listing Zone Members
686
Removing a Member from a Zone
686
Removing a Zone from a Zone Configuration
687
Removing an Offline Device
687
Renaming a Zone
688
Renaming a Zone Configuration
688
Replacing Zone Members
689
Replacing an Offline Device by WWN
690
Replacing an Offline Device by Name
691
23 In this Chapter
693
FC Troubleshooting
693
In this Chapter
693
Chapter 23 Troubleshooting
694
Tracing FC Routes
694
Troubleshooting Device Connectivity
695
Confirming Fabric Device Sharing
696
Configuring IP Ping
697
IP Troubleshooting
697
Tracing IP Routes
699
Viewing FCIP Tunnel Performance
700
Client Browser Troubleshooting
701
Fabric Tracking Troubleshooting
701
FICON Troubleshooting
702
Firmware Download Troubleshooting
702
Launch Client Troubleshooting
703
Names Troubleshooting
705
Performance Troubleshooting
705
Port Fencing Troubleshooting
709
Server Management Console Troubleshooting
710
Supportsave Troubleshooting
711
View All List Troubleshooting
712
Zoning Troubleshooting
712
Appendix A Application Menus
713
Main Menus
713
Shortcut Menus
720
Call Home Event Table
733
In this Appendix
733
CONSRV Events Table
735
Thermal Event Reason Codes Table
735
Brocade Events Table
736
About User Privileges
737
Appendix D Sybase and Derby Database Fields
713
In this Appendix
713
Appendix C User Privileges
737
In this Appendix
737
About Roles and Access Levels
755
Appendix B Call Home Event Tables
757
In this Appendix
757
Database Tables and Fields
758
Advanced Call Home
758
Capability
759
Client_View
760
Collector
763
Config
766
Connected End Devices
768
Device
769
EE- Monitor
776
Event/Fm
778
Fabric
784
FC Port Stats
787
Fcip
790
FCIP Tunnel Stats
793
Gige Port Stats
795
License
800
Encryption Device
801
Encryption Container
807
Meta SAN
812
Network
814
Others
815
Port Fencing
816
Quartz
817
Reports
820
Role Based Access Control
820
Snmp
823
Stats
826
Switch
828
Switch Details
833
Switch Port
838
Switch SNMP Info
843
Threshold
845
User Interface
846
Zoning 1
847
Zoning 2
849
Advertisement
Advertisement
Related Products
Brocade Communications Systems DCFM
Brocade Communications Systems DCFM Professional Plus
Brocade Communications Systems DCX 8510-4
Brocade Communications Systems DS-5100B - Connectrix Switch - 8Gb Fibre Channel
Brocade Communications Systems DCX Backbone
Brocade Communications Systems DCX
Brocade Communications Systems DCX 8510-8
Brocade Communications Systems DCX-4S
Brocade Communications Systems 53-1001763-02
Brocade Communications Systems 53-1001778-01
Brocade Communications Systems Categories
Switch
Software
Network Router
Storage
Server
More Brocade Communications Systems Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL