HP AE370A - Brocade 4Gb SAN Switch 4/12 Manuals

Manuals and User Guides for HP AE370A - Brocade 4Gb SAN Switch 4/12. We have 18 HP AE370A - Brocade 4Gb SAN Switch 4/12 manuals available for free PDF download: Administrator's Manual, Hardware Reference Manual, Release Note, Manual, Frequently Asked Questions Manual, Frequently Asked Questions, Installation Instructions

HP AE370A - Brocade 4Gb SAN Switch 4/12 Administrator's Manual

HP AE370A - Brocade 4Gb SAN Switch 4/12 Administrator's Manual (576 pages)

HP StorageWorks Fabric OS 6.2 administrator guide (5697-0016, May 2009)  
Brand: HP | Category: Switch | Size: 4.15 MB
Table of contents
Table Of Contents3................................................................................................................................................................
About This Guide25................................................................................................................................................................
Supported Fabric Os 6.2.x Hp Storageworks Hardware25................................................................................................................................................................
Fabric Os 6.2 Administrator Guide25................................................................................................................................................................
Intended Audience26................................................................................................................................................................
Related Documentation26................................................................................................................................................................
Document Conventions And Symbols26................................................................................................................................................................
Document Conventions26................................................................................................................................................................
Rack Stability27................................................................................................................................................................
Hp Technical Support27................................................................................................................................................................
Customer Self Repair27................................................................................................................................................................
Product Warranties27................................................................................................................................................................
Subscription Service28................................................................................................................................................................
Hp Websites28................................................................................................................................................................
Documentation Feedback28................................................................................................................................................................
Fabric Os Overview29................................................................................................................................................................
Fabric Os Command Line Interface29................................................................................................................................................................
Getting Help On A Command29................................................................................................................................................................
Telnet Or Ssh Sessions30................................................................................................................................................................
Rules For Telnet Connections30................................................................................................................................................................
Connecting To Fabric Os Using Telnet30................................................................................................................................................................
Console Sessions Using The Serial Port31................................................................................................................................................................
Connecting To Fabric Os Through The Serial Port31................................................................................................................................................................
Password Modification31................................................................................................................................................................
Default Account Passwords32................................................................................................................................................................
Changing The Default Account Passwords At Login32................................................................................................................................................................
Default Administrative Account Names And Passwords32................................................................................................................................................................
The Ethernet Interface On Your Switch33................................................................................................................................................................
Virtual Fabrics And The Ethernet Interface33................................................................................................................................................................
Displaying The Network Interface Settings34................................................................................................................................................................
Static Ethernet Addresses35................................................................................................................................................................
Setting The Static Addresses For The Ethernet Network Interface35................................................................................................................................................................
Dhcp Activation35................................................................................................................................................................
Activating Dhcp36................................................................................................................................................................
Deactivating Dhcp36................................................................................................................................................................
Ipv6 Autoconfiguration37................................................................................................................................................................
Setting Ipv6 Autoconfiguration37................................................................................................................................................................
Date And Time Settings37................................................................................................................................................................
Setting The Date And Time37................................................................................................................................................................
Time Zone Settings38................................................................................................................................................................
Setting The Time Zone38................................................................................................................................................................
Setting The Time Zone Interactively39................................................................................................................................................................
Network Time Protocol39................................................................................................................................................................
Synchronizing The Local Time With An External Source40................................................................................................................................................................
Switch Names40................................................................................................................................................................
Customizing The Switch Name40................................................................................................................................................................
Chassis Names40................................................................................................................................................................
Customizing Chassis Names41................................................................................................................................................................
Domain Ids41................................................................................................................................................................
Displaying The Domain Ids41................................................................................................................................................................
Setting The Domain Id42................................................................................................................................................................
Licensed Features43................................................................................................................................................................
Icl Licensing45................................................................................................................................................................
8g Licensing45................................................................................................................................................................
Time-based Licenses46................................................................................................................................................................
High Availability Considerations46................................................................................................................................................................
Firmware Upgrade And Downgrade Consideration46................................................................................................................................................................
Configupload And Download Considerations46................................................................................................................................................................
Expired Licenses46................................................................................................................................................................
Viewing Installed Licenses46................................................................................................................................................................
Activating A License46................................................................................................................................................................
Adding A Licensed Feature47................................................................................................................................................................
Removing A Licensed Feature48................................................................................................................................................................
Ports On Demand49................................................................................................................................................................
List Of Available Ports When Implementing Pods49................................................................................................................................................................
Activating Ports On Demand50................................................................................................................................................................
Dynamic Ports On Demand50................................................................................................................................................................
Displaying The Port License Assignments50................................................................................................................................................................
Enabling Dynamic Ports On Demand51................................................................................................................................................................
Disabling Dynamic Ports On Demand52................................................................................................................................................................
Pod License Management52................................................................................................................................................................
Reserving A Port License52................................................................................................................................................................
Releasing A Port From A Pod Set53................................................................................................................................................................
Switch Activation And Deactivation54................................................................................................................................................................
Disabling A Switch54................................................................................................................................................................
Enabling A Switch54................................................................................................................................................................
Port Activation And Deactivation54................................................................................................................................................................
Disabling A Port55................................................................................................................................................................
Enabling A Port55................................................................................................................................................................
Basic Connections55................................................................................................................................................................
Device Connection56................................................................................................................................................................
Switch Connection56................................................................................................................................................................
Gateway Links56................................................................................................................................................................
Configuring A Link Through A Gateway56................................................................................................................................................................
Equipment Status57................................................................................................................................................................
Checking Switch Operation57................................................................................................................................................................
Verifying High Availability Features (directors And Enterprise-class Platforms Only)57................................................................................................................................................................
Verifying Fabric Connectivity58................................................................................................................................................................
Verifying Device Connectivity59................................................................................................................................................................
Displaying Switches In Access Gateway Mode60................................................................................................................................................................
Track And Control Switch Changes60................................................................................................................................................................
Enabling The Track Changes Feature60................................................................................................................................................................
Displaying The Status Of The Track Changes Feature60................................................................................................................................................................
Viewing The Switch Status Policy Threshold Values61................................................................................................................................................................
Setting The Switch Status Policy Threshold Values61................................................................................................................................................................
Audit Log Configuration62................................................................................................................................................................
Auditable Event Classes63................................................................................................................................................................
Auditcfg Event Class Operands63................................................................................................................................................................
Verifying Host Syslog Prior To Configuring The Audit Log64................................................................................................................................................................
Configuring An Audit Log For Specific Event Classes64................................................................................................................................................................
Switch And Enterprise-class Platform Shutdown65................................................................................................................................................................
Powering Off A Switch65................................................................................................................................................................
Powering Off An Enterprise-class Platform65................................................................................................................................................................
High Availability Of Daemon Processes66................................................................................................................................................................
Daemons That Are Automatically Restarted66................................................................................................................................................................
Managing User Accounts67................................................................................................................................................................
User Accounts Overview67................................................................................................................................................................
Role-based Access Control (rbac)67................................................................................................................................................................
Role Permissions68................................................................................................................................................................
Fabric Os Roles68................................................................................................................................................................
Permission Types68................................................................................................................................................................
Rbac Permissions Matrix69................................................................................................................................................................
The Management Channel70................................................................................................................................................................
Maximum Number Of Simultaneous Sessions70................................................................................................................................................................
Local Database User Accounts71................................................................................................................................................................
Default Accounts71................................................................................................................................................................
Displaying Account Information71................................................................................................................................................................
Creating An Account71................................................................................................................................................................
Default Local User Accounts71................................................................................................................................................................
Deleting An Account72................................................................................................................................................................
Changing Account Parameters73................................................................................................................................................................
Local Account Passwords73................................................................................................................................................................
Changing The Password For The Current Login Account74................................................................................................................................................................
Changing The Password For A Different Account74................................................................................................................................................................
Local Account Database Distribution74................................................................................................................................................................
Distributing The Local User Database74................................................................................................................................................................
Protection Of The Local User Database From Distributions75................................................................................................................................................................
Accepting Distribution Of User Databases On The Local Switch75................................................................................................................................................................
Rejecting Distributed User Databases On The Local Switch75................................................................................................................................................................
Password Policies75................................................................................................................................................................
Password Strength Policy75................................................................................................................................................................
Password History Policy76................................................................................................................................................................
Password Expiration Policy76................................................................................................................................................................
Upgrade And Downgrade Considerations For Password Management77................................................................................................................................................................
Account Lockout Policy77................................................................................................................................................................
Enabling The Admin Lockout Policy78................................................................................................................................................................
Unlocking An Account78................................................................................................................................................................
Disabling The Admin Lockout Policy78................................................................................................................................................................
Denial Of Service Implications78................................................................................................................................................................
The Boot Prom Password78................................................................................................................................................................
With A Recovery String79................................................................................................................................................................
Setting The Boot Prom Password For A Switch With A Recovery String79................................................................................................................................................................
Setting The Boot Prom Password For A Director With A Recovery String80................................................................................................................................................................
Without A Recovery String81................................................................................................................................................................
Setting The Boot Prom Password For A Switch Without A Recovery String81................................................................................................................................................................
Setting The Boot Prom Password For A Director Without A Recovery String81................................................................................................................................................................
Recovering Forgotten Passwords82................................................................................................................................................................
The Authentication Model83................................................................................................................................................................
Effects Of Using Radius Or Ldap Service On Fabric Os Features83................................................................................................................................................................
Setting The Switch Authentication Mode84................................................................................................................................................................
Authentication Configuration Options84................................................................................................................................................................
Fabric Os User Accounts85................................................................................................................................................................
Syntax For Vsa-based Account Roles85................................................................................................................................................................
Fabric Os Users On The Radius Server86................................................................................................................................................................
Windows 2000 Ias86................................................................................................................................................................
Linux Freeradius Server86................................................................................................................................................................
Dictionary.brocade File Entries86................................................................................................................................................................
Radius Configuration With Admin Domains Or Virtual Fabrics87................................................................................................................................................................
Acceptable Keys87................................................................................................................................................................
Radius Authentication87................................................................................................................................................................
The Radius Server88................................................................................................................................................................
Configuring Radius Server Support With Linux88................................................................................................................................................................
Adding The Brocade Attribute To The Server89................................................................................................................................................................
Creating The User89................................................................................................................................................................
Enabling Clients90................................................................................................................................................................
Configuring Radius Server Support With Windows 200090................................................................................................................................................................
Rsa Radius Server91................................................................................................................................................................
Setting Up The Rsa Radius Server91................................................................................................................................................................
Example Of A Brocade Dct File92................................................................................................................................................................
Ldap Configuration And Microsoft Active Directory93................................................................................................................................................................
Example Of The Dictiona.dcm File93................................................................................................................................................................
Creating A User94................................................................................................................................................................
Creating A Group94................................................................................................................................................................
Assigning The Group (role) To The User94................................................................................................................................................................
Adding An Admin Domain List94................................................................................................................................................................
Authentication Servers On The Switch95................................................................................................................................................................
Displaying The Current Radius Configuration95................................................................................................................................................................
Adding A Radius Server To The Switch Configuration96................................................................................................................................................................
Adding An Ldap Server To The Switch Configuration96................................................................................................................................................................
Enabling And Disabling A Radius Or Ldap Server96................................................................................................................................................................
Deleting A Radius Or Ldap Server From The Configuration97................................................................................................................................................................
Changing A Radius Server Configuration97................................................................................................................................................................
Changing An Ldap Server Configuration97................................................................................................................................................................
Changing The Order In Which Radius Or Ldap Servers Are Contacted For Service97................................................................................................................................................................
Configuring Local Authentication As Backup98................................................................................................................................................................
Configuring Standard Security Features101................................................................................................................................................................
Security Protocols101................................................................................................................................................................
Secure Protocol Support101................................................................................................................................................................
Secure File Copy102................................................................................................................................................................
Setting Up Scp For Configuploads And Downloads102................................................................................................................................................................
Items Needed To Deploy Secure Protocols102................................................................................................................................................................
Main Security Scenarios102................................................................................................................................................................
Simple Network Management Protocol103................................................................................................................................................................
Snmp And Virtual Fabrics104................................................................................................................................................................
Filtering Ports104................................................................................................................................................................
Switch And Chassis Context Enforcement104................................................................................................................................................................
The Security Level104................................................................................................................................................................
The Snmpconfig Command105................................................................................................................................................................
Secure Shell Protocol107................................................................................................................................................................
Ssh Public Key Authentication107................................................................................................................................................................
Allowed-user107................................................................................................................................................................
Configuring Ssh Authentication108................................................................................................................................................................
Deleting Keys On The Switch109................................................................................................................................................................
Secure Sockets Layer Protocol110................................................................................................................................................................
Browser And Java Support110................................................................................................................................................................
Ssl Configuration Overview110................................................................................................................................................................
Ssl Certificate Files110................................................................................................................................................................
Certificate Authorities111................................................................................................................................................................
Generating A Public And Private Key111................................................................................................................................................................
Generating And Storing A Csr111................................................................................................................................................................
Obtaining Certificates112................................................................................................................................................................
Installing A Switch Certificate112................................................................................................................................................................
The Browser112................................................................................................................................................................
Checking And Installing Root Certificates On Internet Explorer113................................................................................................................................................................
Checking And Installing Root Certificates On Mozilla Firefox113................................................................................................................................................................
Root Certificates For The Java Plug-in113................................................................................................................................................................
Installing A Root Certificate To The Java Plug-in113................................................................................................................................................................
Summary Of Certificate Commands114................................................................................................................................................................
Telnet Protocol114................................................................................................................................................................
Blocking Telnet114................................................................................................................................................................
Commands For Displaying And Deleting Ssl Certificates114................................................................................................................................................................
Unblocking Telnet115................................................................................................................................................................
Listener Applications115................................................................................................................................................................
Blocked Listener Applications115................................................................................................................................................................
Ports And Applications Used By Switches116................................................................................................................................................................
Access Defaults116................................................................................................................................................................
Port Configuration117................................................................................................................................................................
Port Information117................................................................................................................................................................
Configuring Advanced Security Features119................................................................................................................................................................
Acl Policies Overview119................................................................................................................................................................
How The Acl Policies Are Stored119................................................................................................................................................................
Security Database Size Restrictions119................................................................................................................................................................
Policy Members120................................................................................................................................................................
Acl Policy Management120................................................................................................................................................................
Valid Methods For Specifying Policy Members120................................................................................................................................................................
Displaying Acl Policies121................................................................................................................................................................
Fcs Policies121................................................................................................................................................................
Fcs Policy States121................................................................................................................................................................
Fcs Policy Restrictions122................................................................................................................................................................
Overview Of Fcs Policy Management122................................................................................................................................................................
Switch Operations122................................................................................................................................................................
Creating An Fcs Policy123................................................................................................................................................................
Modifying The Order Of Fcs Switches123................................................................................................................................................................
Fcs Policy Distribution124................................................................................................................................................................
Dcc Policies125................................................................................................................................................................
Distribution Policy States125................................................................................................................................................................
Dcc Policy States125................................................................................................................................................................
Dcc Policy Restrictions126................................................................................................................................................................
Creating A Dcc Policy126................................................................................................................................................................
Deleting A Dcc Policy127................................................................................................................................................................
Scc Policies127................................................................................................................................................................
Scc Policy States127................................................................................................................................................................
Creating An Scc Policy128................................................................................................................................................................
Acl Policy Modifications128................................................................................................................................................................
Saving Changes Without Activating The Policies128................................................................................................................................................................
Activating Policy Changes128................................................................................................................................................................
Deleting An Acl Policy128................................................................................................................................................................
Member Modification To Existing Policies129................................................................................................................................................................
Adding A Member To An Existing Acl Policy129................................................................................................................................................................
Removing A Member From An Acl Policy129................................................................................................................................................................
Aborting All Unsaved Changes129................................................................................................................................................................
Authentication Policy For Fabric Elements129................................................................................................................................................................
Dh-chap Authentication130................................................................................................................................................................
E_port Authentication131................................................................................................................................................................
Device Authentication Policy132................................................................................................................................................................
Auth Policy Restrictions133................................................................................................................................................................
Supported Hbas133................................................................................................................................................................
Authentication Protocols133................................................................................................................................................................
Viewing The Current Authentication Parameter Settings For A Switch134................................................................................................................................................................
Setting The Authentication Protocol Used By The Switch To Dh-chap134................................................................................................................................................................
Re-authenticating E_ports134................................................................................................................................................................
Secret Key Pairs135................................................................................................................................................................
Viewing The List Of Secret Key Pairs In The Current Switch Database135................................................................................................................................................................
Setting A Secret Key Pair135................................................................................................................................................................
Fabric-wide Distribution Of The Auth Policy136................................................................................................................................................................
Accept Distributions Configuration Parameter136................................................................................................................................................................
Ip Filter Policy137................................................................................................................................................................
Creating An Ip Filter Policy137................................................................................................................................................................
Cloning An Ip Filter Policy137................................................................................................................................................................
Displaying An Ip Filter Policy137................................................................................................................................................................
Saving An Ip Filter Policy138................................................................................................................................................................
Activating An Ip Filter Policy138................................................................................................................................................................
Deleting An Ip Filter Policy138................................................................................................................................................................
Ip Filter Policy Rules138................................................................................................................................................................
Supported Services139................................................................................................................................................................
Implicit Ip Filter Rules139................................................................................................................................................................
Ip Filter Policy Enforcement140................................................................................................................................................................
Adding A Rule To An Ip Filter Policy140................................................................................................................................................................
Default Ip Policy Rules140................................................................................................................................................................
Deleting A Rule To An Ip Filter Policy141................................................................................................................................................................
Aborting A Transaction Associated With Ip Filter141................................................................................................................................................................
Ip Filter Policy Distributions141................................................................................................................................................................
Ip Filter Policy Restrictions141................................................................................................................................................................
Policy Database Distribution141................................................................................................................................................................
Database Distribution Settings142................................................................................................................................................................
Interaction Between Fabric-wide Consistency Policy And Distribution Settings142................................................................................................................................................................
Displaying The Database Distribution Settings143................................................................................................................................................................
Enabling Local Switch Protection143................................................................................................................................................................
Disabling Local Switch Protection143................................................................................................................................................................
Supported Policy Databases143................................................................................................................................................................
Acl Policy Distribution To Other Switches144................................................................................................................................................................
Distributing The Local Acl Policies144................................................................................................................................................................
Fabric-wide Enforcement144................................................................................................................................................................
Acl Policy Database Distribution Behavior144................................................................................................................................................................
Displaying The Fabric-wide Consistency Policy145................................................................................................................................................................
Setting The Fabric-wide Consistency Policy145................................................................................................................................................................
Fabric-wide Consistency Policy Settings145................................................................................................................................................................
Notes On Joining A Switch To The Fabric146................................................................................................................................................................
Matching Fabric-wide Consistency Policies146................................................................................................................................................................
Non-matching Fabric-wide Consistency Policies147................................................................................................................................................................
Merging Fabrics With Matching Fabric-wide Consistency Policies147................................................................................................................................................................
Examples Of Strict Fabric Merges147................................................................................................................................................................
Securing The Management Interface148................................................................................................................................................................
Configuration Examples148................................................................................................................................................................
Endpoint-to-endpoint Transport Or Tunnel148................................................................................................................................................................
Fabric Merges With Tolerant/absent Combinations148................................................................................................................................................................
Gateway-to-gateway Tunnel149................................................................................................................................................................
Endpoint-to-gateway Tunnel149................................................................................................................................................................
Roadwarrior Configuration149................................................................................................................................................................
Protected Endpoints Configuration149................................................................................................................................................................
Gateway Tunnel Configuration149................................................................................................................................................................
Endpoint To Gateway Tunnel Configuration149................................................................................................................................................................
Nested Configurations150................................................................................................................................................................
Ipsec Protocols150................................................................................................................................................................
Security Associations150................................................................................................................................................................
Ipsec Sa-proposal150................................................................................................................................................................
Authentication And Encryption Algorithms150................................................................................................................................................................
Algorithms And Associated Authentication Policies150................................................................................................................................................................
Block Ciphers151................................................................................................................................................................
Hmac151................................................................................................................................................................
3des151................................................................................................................................................................
Blowfish151................................................................................................................................................................
Aes151................................................................................................................................................................
Null Encryption152................................................................................................................................................................
Ipsec Policies152................................................................................................................................................................
Ipsec Traffic Selector152................................................................................................................................................................
Ipsec Transform152................................................................................................................................................................
Ike Policies152................................................................................................................................................................
Key Management152................................................................................................................................................................
Pre-shared Keys153................................................................................................................................................................
Security Certificates153................................................................................................................................................................
Static Security Associations153................................................................................................................................................................
Creating The Tunnel153................................................................................................................................................................
Example Of An End-to-end Transport Tunnel Mode155................................................................................................................................................................
Fips Support156................................................................................................................................................................
Zeroization Functions156................................................................................................................................................................
Zeroization Behavior156................................................................................................................................................................
Power-on Self Tests157................................................................................................................................................................
Conditional Tests157................................................................................................................................................................
Fips Mode Configuration157................................................................................................................................................................
Ldap In Fips Mode158................................................................................................................................................................
Fips Mode Restrictions158................................................................................................................................................................
Fips And Non-fips Modes Of Operation158................................................................................................................................................................
Setting Up Ldap For Fips Mode159................................................................................................................................................................
Ldap Certificates For Fips Mode160................................................................................................................................................................
Importing An Ldap Switch Certificate160................................................................................................................................................................
Exporting An Ldap Switch Certificate160................................................................................................................................................................
Active Directory Keys To Modify160................................................................................................................................................................
Deleting An Ldap Switch Certificate161................................................................................................................................................................
Preparing The Switch For Fips161................................................................................................................................................................
Overview Of Steps161................................................................................................................................................................
Enabling Fips Mode162................................................................................................................................................................
Disabling Fips Mode163................................................................................................................................................................
Zeroizing For Fips163................................................................................................................................................................
Displaying Fips Configuration163................................................................................................................................................................
Maintaining The Switch Configuration File165................................................................................................................................................................
Configuration Settings165................................................................................................................................................................
Configuration File Format165................................................................................................................................................................
Chassis Section166................................................................................................................................................................
Switch Section167................................................................................................................................................................
Configuration File Backup167................................................................................................................................................................
Uploading A Configuration File In Interactive Mode167................................................................................................................................................................
Configuration File Restoration168................................................................................................................................................................
Restrictions169................................................................................................................................................................
Configuration Download Without Disabling A Switch170................................................................................................................................................................
Restoring A Configuration170................................................................................................................................................................
Cli Commands To Display Or Modify Switch Configuration Information170................................................................................................................................................................
Configurations Across A Fabric172................................................................................................................................................................
Downloading A Configuration File From One Switch To Another Same Model Switch173................................................................................................................................................................
Security Considerations173................................................................................................................................................................
Configuration Restoration In A Ficon Environment173................................................................................................................................................................
Backup And Restore In A Ficon Cup Environment173................................................................................................................................................................
B-series Configuration Form174................................................................................................................................................................
B-series Configuration And Connection174................................................................................................................................................................
Managing Virtual Fabrics175................................................................................................................................................................
Virtual Fabrics Overview175................................................................................................................................................................
Logical Switch175................................................................................................................................................................
Default Logical Switch175................................................................................................................................................................
Logical Switches And Fabric Ids176................................................................................................................................................................
Switch Before And After Enabling Virtual Fabrics176................................................................................................................................................................
Switch Before And After Creating Logical Switches176................................................................................................................................................................
Port Assignment In Logical Switches177................................................................................................................................................................
Fabric Ids Assigned To Logical Switches177................................................................................................................................................................
Assigning Ports To Logical Switches177................................................................................................................................................................
Logical Switches And Connected Devices178................................................................................................................................................................
Logical Switches Connected To Devices And Non-virtual Fabrics Switch178................................................................................................................................................................
Logical Fabric179................................................................................................................................................................
Logical Fabric And Isls179................................................................................................................................................................
Logical Switches In A Single Chassis Belonging To Separate Fabrics179................................................................................................................................................................
Logical Switches Connected To Other Logical Switches Through Physical Isls179................................................................................................................................................................
Logical Fabric And Isl Sharing180................................................................................................................................................................
Base Switches Connected By An Xisl181................................................................................................................................................................
Logical Isls Connecting Logical Switches181................................................................................................................................................................
Logical Fabric Formation182................................................................................................................................................................
Management Model For Logical Switches182................................................................................................................................................................
Logical Fabric Using Isls And Xisls182................................................................................................................................................................
Account Management And Virtual Fabrics183................................................................................................................................................................
Supported Platforms For Virtual Fabrics183................................................................................................................................................................
Supported Port Configurations In The Hp Storageworks 8/40 San Switch And Hp Storageworks 8/80 San Switch183................................................................................................................................................................
Supported Port Configurations In The Hp Storageworks Dc San Backbone Director And Hp Storageworks Dc04 San Director184................................................................................................................................................................
Virtual Fabrics Interaction With Other Fabric Os Features184................................................................................................................................................................
Virtual Fabrics Interaction With Fabric Os Features184................................................................................................................................................................
Limitations And Restrictions Of Virtual Fabrics185................................................................................................................................................................
Maximum Number Of Logical Switches Per Chassis185................................................................................................................................................................
Enabling Virtual Fabrics186................................................................................................................................................................
Disabling Virtual Fabrics186................................................................................................................................................................
Creating A Logical Switch Or Base Switch187................................................................................................................................................................
Deleting A Logical Switch188................................................................................................................................................................
Adding And Removing Ports On A Logical Switch188................................................................................................................................................................
Displaying Logical Switch Configuration189................................................................................................................................................................
Changing The Fabric Id Of A Logical Switch189................................................................................................................................................................
Changing A Logical Switch To A Base Switch189................................................................................................................................................................
Configuring A Logical Switch For Xisl Use189................................................................................................................................................................
Changing The Context To A Different Logical Fabric190................................................................................................................................................................
Creating A Logical Fabric Using Xisls190................................................................................................................................................................
Example Of Logical Fabrics In Multiple Chassis And Xisls191................................................................................................................................................................
Managing Administrative Domains193................................................................................................................................................................
Administrative Domains Overview193................................................................................................................................................................
Admin Domain Features194................................................................................................................................................................
Fabric With Two Admin Domains194................................................................................................................................................................
Filtered Fabric Views When Using Admin Domains194................................................................................................................................................................
Requirements For Admin Domains195................................................................................................................................................................
Admin Domain Access Levels195................................................................................................................................................................
User-defined Administrative Domains196................................................................................................................................................................
System-defined Administrative Domains196................................................................................................................................................................
Ad0196................................................................................................................................................................
Ad User Types196................................................................................................................................................................
Ad255197................................................................................................................................................................
Admin Domains And Login197................................................................................................................................................................
Fabric With Ad0 And Ad255197................................................................................................................................................................
Admin Domain Member Types198................................................................................................................................................................
Device Members198................................................................................................................................................................
Switch Port Members198................................................................................................................................................................
Switch Members199................................................................................................................................................................
Admin Domains And Switch Wwn199................................................................................................................................................................
Admin Domain Compatibility, Availability, And Merging200................................................................................................................................................................
Fabric Showing Switch And Device Wwns200................................................................................................................................................................
Filtered Fabric Views Showing Converted Switch Wwns200................................................................................................................................................................
Firmware Upgrade Considerations201................................................................................................................................................................
Admin Domain Management For Physical Fabric Administrators201................................................................................................................................................................
Setting The Default Zone Mode202................................................................................................................................................................
Creating An Admin Domain202................................................................................................................................................................
Assigning A User To An Admin Domain203................................................................................................................................................................
Creating A New User Account For Managing Admin Domains204................................................................................................................................................................
Assigning Admin Domains To An Existing User Account204................................................................................................................................................................
Creating A New Physical Fabric Administrator User Account204................................................................................................................................................................
Removing An Admin Domain From A User Account204................................................................................................................................................................
Activating An Admin Domain205................................................................................................................................................................
Deactivating An Admin Domain205................................................................................................................................................................
Adding Members To An Existing Admin Domainconnect To An Ad-capable Switch And Log In As Admin206................................................................................................................................................................
Removing Members From An Admin Domain206................................................................................................................................................................
Renaming An Admin Domain207................................................................................................................................................................
Deleting An Admin Domain207................................................................................................................................................................
Deleting All User-defined Admin Domains208................................................................................................................................................................
Validating An Admin Domain Member List208................................................................................................................................................................
San Management With Admin Domains209................................................................................................................................................................
Cli Commands In An Ad Context209................................................................................................................................................................
Ports And Devices In Cli Output209................................................................................................................................................................
Executing A Command In A Different Ad Context210................................................................................................................................................................
Displaying An Admin Domain Configuration210................................................................................................................................................................
Switching To A Different Admin Domain Context210................................................................................................................................................................
Admin Domain Interactions With Other Fabric Os Features211................................................................................................................................................................
Admin Domain Interaction With Fabric Os Features211................................................................................................................................................................
Admin Domains, Zones, And Zone Databases212................................................................................................................................................................
Admin Domains And Lsan Zones213................................................................................................................................................................
Configuration Upload And Download In An Ad Context214................................................................................................................................................................
Configuration Upload And Download Scenarios In An Ad Context214................................................................................................................................................................
Installing And Maintaining Firmware215................................................................................................................................................................
Firmware Download Process Overview215................................................................................................................................................................
Upgrading And Downgrading Firmware216................................................................................................................................................................
Effects Of Firmware Changes On Accounts And Passwords216................................................................................................................................................................
Considerations For Ficon Cup Environments216................................................................................................................................................................
High Available Sync State217................................................................................................................................................................
Preparing For A Firmware Download217................................................................................................................................................................
Enterprise-class Platform Ha Sync States217................................................................................................................................................................
Connected Switches218................................................................................................................................................................
Finding The Switch Firmware Version218................................................................................................................................................................
Obtain And Decompress Firmware219................................................................................................................................................................
Firmware Download On Switches219................................................................................................................................................................
Switch Firmware Download Process Overview219................................................................................................................................................................
Upgrading Firmware For Switch And Router Products220................................................................................................................................................................
Firmware Download On An Enterprise-class Platform221................................................................................................................................................................
Enterprise-class Platform Firmware Download Process Overview222................................................................................................................................................................
Upgrading Firmware On Enterprise-class Platforms (including Blades)222................................................................................................................................................................
Firmware Download From A Usb Device226................................................................................................................................................................
Enabling Usb226................................................................................................................................................................
Viewing The Usb File System226................................................................................................................................................................
Downloading The 6.2.0 Image Using The Relative Path227................................................................................................................................................................
Downloading The 6.2.0 Image Using The Absolute Path227................................................................................................................................................................
Public And Private Key Management227................................................................................................................................................................
Updating The Firmwarekey228................................................................................................................................................................
The Firmwaredownload Command228................................................................................................................................................................
Configuring The Switch For Signed Firmware228................................................................................................................................................................
Power-on Firmware Checksum Test229................................................................................................................................................................
Test And Restore Firmware On Switches229................................................................................................................................................................
Testing A Different Firmware Version On A Switch229................................................................................................................................................................
Test And Restore Firmware On Enterprise-class Platforms230................................................................................................................................................................
Testing Different Firmware Versions On Enterprise-class Platforms230................................................................................................................................................................
Validating A Firmware Download233................................................................................................................................................................
Administering Advanced Zoning235................................................................................................................................................................
Zoning Overview235................................................................................................................................................................
Zoning Example235................................................................................................................................................................
Zone Types236................................................................................................................................................................
Types Of Zoning236................................................................................................................................................................
Zone Objects237................................................................................................................................................................
Approaches To Fabric-based Zoning237................................................................................................................................................................
Zoning Schemes238................................................................................................................................................................
Zone Aliases238................................................................................................................................................................
Zone Configurations239................................................................................................................................................................
Zoning Enforcement239................................................................................................................................................................
Software-enforced Zoning239................................................................................................................................................................
Hardware-enforced Zoning240................................................................................................................................................................
Hardware-enforced Nonoverlapping Zones241................................................................................................................................................................
Enforcing Hardware Zoning241................................................................................................................................................................
Identifying The Enforced Zone Type242................................................................................................................................................................
Hardware-enforced Overlapping Zones242................................................................................................................................................................
Zoning With Hardware Assist (mixed-port And Wwn Zones)242................................................................................................................................................................
Session-based Hard Zoning242................................................................................................................................................................
Considerations For Zoning Architecture243................................................................................................................................................................
Best Practices For Zoning243................................................................................................................................................................
Broadcast Zones243................................................................................................................................................................
Supported Switches For Broadcast Zones244................................................................................................................................................................
Broadcast Zones And Admin Domains244................................................................................................................................................................
Broadcast Zones And Fc-fc Routing245................................................................................................................................................................
Upgrade And Downgrade Considerations For Broadcast Zones245................................................................................................................................................................
High Availability Considerations With Broadcast Zones245................................................................................................................................................................
Loop Devices And Broadcast Zones246................................................................................................................................................................
Backward Compatibility With Pre-5.3.0 Switches246................................................................................................................................................................
Broadcast Zones And Default Zoning246................................................................................................................................................................
Creating An Alias246................................................................................................................................................................
Adding Members To An Alias247................................................................................................................................................................
Removing Members From An Alias247................................................................................................................................................................
Deleting An Alias248................................................................................................................................................................
Viewing An Alias In The Defined Configuration249................................................................................................................................................................
Zone Creation And Maintenance249................................................................................................................................................................
Creating A Zone249................................................................................................................................................................
Adding Devices (members) To A Zone250................................................................................................................................................................
Removing Devices (members) From A Zone250................................................................................................................................................................
Deleting A Zone251................................................................................................................................................................
Viewing A Zone In The Defined Configuration251................................................................................................................................................................
Validating A Zone252................................................................................................................................................................
Default Zoning Mode253................................................................................................................................................................
Setting The Default Zoning Mode253................................................................................................................................................................
Viewing The Current Default Zone Access Mode253................................................................................................................................................................
Zoning Database Size And Zone Merging254................................................................................................................................................................
Zoning Database Limitations254................................................................................................................................................................
Resulting Database Size: 0 To 96k254................................................................................................................................................................
Resulting Database Size: 96k To 128k255................................................................................................................................................................
Resulting Database Size: 128k To 256k255................................................................................................................................................................
Zoning Configurations256................................................................................................................................................................
Resulting Database Size: 256k To 1m256................................................................................................................................................................
Creating A Zoning Configuration257................................................................................................................................................................
Adding Zones (members) To A Zoning Configuration257................................................................................................................................................................
Removing Zones (members) From A Zone Configuration258................................................................................................................................................................
Enabling A Zone Configuration258................................................................................................................................................................
Disabling A Zone Configuration258................................................................................................................................................................
Deleting A Zone Configuration259................................................................................................................................................................
Clearing Changes To A Configuration259................................................................................................................................................................
Viewing All Zone Configuration Information259................................................................................................................................................................
Viewing Selected Zone Configuration Information260................................................................................................................................................................
Viewing The Configuration In The Effective Zone Database260................................................................................................................................................................
Clearing All Zone Configurations261................................................................................................................................................................
Zone Object Maintenance261................................................................................................................................................................
Copying A Zone Object261................................................................................................................................................................
Deleting A Zone Object262................................................................................................................................................................
Renaming A Zone Object263................................................................................................................................................................
Zoning Configuration Management263................................................................................................................................................................
New Switch Or Fabric Additions263................................................................................................................................................................
Fabric Segmentation And Zoning265................................................................................................................................................................
Security And Zoning265................................................................................................................................................................
Resolving Zone Conflicts265................................................................................................................................................................
Zone Merging Scenarios266................................................................................................................................................................
10configuring Enterprise-class Platforms269................................................................................................................................................................
Ports269................................................................................................................................................................
Port Identification By Slot And Port Number270................................................................................................................................................................
Port Identification By Port Area Id271................................................................................................................................................................
Port Identification By Index271................................................................................................................................................................
Power Conservation274................................................................................................................................................................
Powering Off A Port Blade275................................................................................................................................................................
Powering On A Port Blade275................................................................................................................................................................
Disabling And Enabling Port Blades275................................................................................................................................................................
Disabling Port Blades275................................................................................................................................................................
Enabling Port Blades275................................................................................................................................................................
B-series Multi-protocol Router Blade Enabling Exceptions275................................................................................................................................................................
Hp Storageworks 4/256 San Director 48 Port 4gb Blade And Hp Storageworks San Director 48 Port 8gb Fc Blade Enabling Exceptions277................................................................................................................................................................
Blade Terminology And Compatibility277................................................................................................................................................................
Hp Storageworks Enterprise-class Platform Terminology And Abbreviations277................................................................................................................................................................
Cp Blades279................................................................................................................................................................
Core Blades280................................................................................................................................................................
Port And Application Blade Compatibility280................................................................................................................................................................
Port Blades Supported By Each Platform280................................................................................................................................................................
Displaying Slot Information281................................................................................................................................................................
Inter-chassis Links282................................................................................................................................................................
Led Behavior283................................................................................................................................................................
11routing Traffic285................................................................................................................................................................
Routing Overview285................................................................................................................................................................
Path Versus Route Selection285................................................................................................................................................................
Fspf285................................................................................................................................................................
Routing Policies286................................................................................................................................................................
Displaying The Current Routing Policy287................................................................................................................................................................
Exchange-based Routing287................................................................................................................................................................
Port-based Routing287................................................................................................................................................................
Ap Route Policy288................................................................................................................................................................
Routing In Virtual Fabrics288................................................................................................................................................................
Setting The Routing Policy288................................................................................................................................................................
Setting Up The Ap Route Policy288................................................................................................................................................................
Route Selection288................................................................................................................................................................
Dynamic Load Sharing289................................................................................................................................................................
Setting Dls289................................................................................................................................................................
Static Route Assignment289................................................................................................................................................................
Assigning A Static Route290................................................................................................................................................................
Removing A Static Route290................................................................................................................................................................
Frame Order Delivery290................................................................................................................................................................
Forcing In-order Frame Delivery Across Topology Changes291................................................................................................................................................................
Restoring Out-of-order Frame Delivery Across Topology Changes291................................................................................................................................................................
Interoperability For Merged Sans293................................................................................................................................................................
13configuring The Distributed Management Server295................................................................................................................................................................
Distributed Management Server Overview295................................................................................................................................................................
Platform Services In A Virtual Fabric295................................................................................................................................................................
Enabling Platform Services296................................................................................................................................................................
Disabling Platform Services296................................................................................................................................................................
Management Server Database296................................................................................................................................................................
Displaying The Management Server Acl296................................................................................................................................................................
Adding A Member To The Acl297................................................................................................................................................................
Deleting A Member From The Acl298................................................................................................................................................................
Viewing The Contents Of The Management Server Database299................................................................................................................................................................
Clearing The Management Server Database300................................................................................................................................................................
Topology Discovery300................................................................................................................................................................
Displaying Topology Discovery Status300................................................................................................................................................................
Enabling Topology Discovery300................................................................................................................................................................
Disabling Topology Discovery301................................................................................................................................................................
14iscsi Gateway Service303................................................................................................................................................................
Iscsi Gateway Service Overview303................................................................................................................................................................
Iscsi Session Translation303................................................................................................................................................................
Iscsi Gateway Network303................................................................................................................................................................
Iscsi Gateway Service Basic Implementation303................................................................................................................................................................
Basic Vs. Advanced Lun Mapping304................................................................................................................................................................
Basic Lun Mapping304................................................................................................................................................................
Advanced Lun Mapping304................................................................................................................................................................
Iscsi-to-fc Translation304................................................................................................................................................................
Iscsi Vt Basic Lun Mapping304................................................................................................................................................................
Iscsi Component Identification305................................................................................................................................................................
Iqn Prefix305................................................................................................................................................................
Iscsi Vt Advanced Lun Mapping305................................................................................................................................................................
Changing And Displaying The Iqn Prefix306................................................................................................................................................................
Access Control With Discovery Domains306................................................................................................................................................................
Iqn Example306................................................................................................................................................................
Switch-to-iscsi Initiator Authentication307................................................................................................................................................................
Load Balancing Through Connection Redirection307................................................................................................................................................................
Enabling And Disabling Connection Redirection For Load Balancing307................................................................................................................................................................
Discovery Domain Set Configuration Example307................................................................................................................................................................
Displaying Connection Redirection Status308................................................................................................................................................................
Supported Iscsi Initiators308................................................................................................................................................................
Checklist For Configuring Iscsi308................................................................................................................................................................
Iscsi Target Gateway Configuration Steps309................................................................................................................................................................
Hp Storageworks B-series Iscsi Director Blade Configuration310................................................................................................................................................................
Hp Storageworks B-series Iscsi Director Blade Port Numbering310................................................................................................................................................................
Enabling The Iscsi Gateway Service311................................................................................................................................................................
Hp Storageworks B-series Iscsi Director Blade Ports311................................................................................................................................................................
Enabling Gbe Ports312................................................................................................................................................................
Configuring The Gbe Interface313................................................................................................................................................................
Iscsi Virtual Target Configuration314................................................................................................................................................................
Automatic Iscsi Vt Creation314................................................................................................................................................................
Generating Iscsi Vts For Every Fc Target314................................................................................................................................................................
Generating An Iscsi Vt For A Specific Fc Target317................................................................................................................................................................
Manual Iscsi Vt Creation317................................................................................................................................................................
Mapping Luns On A Specific Port To An Iscsi Vt319................................................................................................................................................................
Deleting Luns From An Iscsi Vt320................................................................................................................................................................
Displaying The Iscsi Virtual Target Lun Map320................................................................................................................................................................
Displaying Iscsi Vt State And Status320................................................................................................................................................................
Discovery Domain And Domain Set Configuration321................................................................................................................................................................
Displaying Iscsi Initiator Iqns321................................................................................................................................................................
Creating Discovery Domains321................................................................................................................................................................
Creating And Enabling A Discovery Domain Sets322................................................................................................................................................................
Iscsi Initiator-to-vt Authentication Configuration322................................................................................................................................................................
Setting The User Name And Shared Secret322................................................................................................................................................................
Binding User Names To An Iscsi Vt323................................................................................................................................................................
Deleting User Names From An Iscsi Vt Binding List323................................................................................................................................................................
Displaying Chap Configurations323................................................................................................................................................................
Committing The Iscsi-related Configuration324................................................................................................................................................................
Resolving Conflicts Between Iscsi Configurations324................................................................................................................................................................
Lun Masking Considerations325................................................................................................................................................................
Iscsi Fc Zoning Overview325................................................................................................................................................................
Iscsi Gateway Service In An Iscsi Fc Zone326................................................................................................................................................................
Iscsi Fc Zone Creation327................................................................................................................................................................
Creating An Iscsi Fc Zone327................................................................................................................................................................
Zoning Configuration Creation330................................................................................................................................................................
Creating And Enabling A Zoning Configuration330................................................................................................................................................................
Isns Client Service Configuration331................................................................................................................................................................
Displaying Isns Client Service Status331................................................................................................................................................................
Enabling The Isns Client Service331................................................................................................................................................................
Iscsi Network With Isns Server And Clients331................................................................................................................................................................
Disabling The Isns Client Service333................................................................................................................................................................
Clearing The Isns Client Configuration333................................................................................................................................................................
15administering Npiv335................................................................................................................................................................
Npiv Overview335................................................................................................................................................................
Fixed Addressing Mode335................................................................................................................................................................
10-bit Addressing Mode335................................................................................................................................................................
Enabling And Disabling Npiv335................................................................................................................................................................
Configuring Npiv336................................................................................................................................................................
Configuration Scenarios337................................................................................................................................................................
Viewing Npiv Port Configuration Information337................................................................................................................................................................
Viewing Virtual Pid Login Information338................................................................................................................................................................
Optimizing Fabric Behavior341................................................................................................................................................................
Adaptive Networking Overview341................................................................................................................................................................
Traffic Isolation Routing341................................................................................................................................................................
Ti Zone Failover342................................................................................................................................................................
Traffic Isolation Zone Creating A Dedicated Path Through The Fabric342................................................................................................................................................................
Comparison Of Traffic Behavior When Failover Is Enabled Or Disabled In Ti Zones342................................................................................................................................................................
Additional Considerations When Disabling Failover343................................................................................................................................................................
Fspf Routing Rules And Traffic Isolation343................................................................................................................................................................
Fabric Incorrectly Configured For Ti Zone With Failover Disabled343................................................................................................................................................................
Traffic Isolation Routing Over Fc Routers344................................................................................................................................................................
Dedicated Path Is The Shortest Path344................................................................................................................................................................
Dedicated Path Is Not The Shortest Path344................................................................................................................................................................
Ti Within An Edge Fabric345................................................................................................................................................................
Traffic Isolation Routing Over Fcr345................................................................................................................................................................
Ti Within A Backbone Fabric346................................................................................................................................................................
Ti Zone In An Edge Fabric346................................................................................................................................................................
Limitations Of Ti Zones Over Fc Routers347................................................................................................................................................................
Ti Zone In A Backbone Fabric347................................................................................................................................................................
General Rules For Ti Zones348................................................................................................................................................................
Supported Configurations For Traffic Isolation Routing348................................................................................................................................................................
Misconfigured Ti Zone348................................................................................................................................................................
Trunking With Ti Zones349................................................................................................................................................................
Limitations And Restrictions Of Traffic Isolation Routing349................................................................................................................................................................
Admin Domain Considerations For Traffic Isolation Routing349................................................................................................................................................................
Virtual Fabric Considerations For Traffic Isolation Routing350................................................................................................................................................................
Dedicated Path With Virtual Fabrics350................................................................................................................................................................
Creating A Ti Zone In A Logical Fabric350................................................................................................................................................................
Traffic Isolation Routing Over Fc Routers With Virtual Fabrics351................................................................................................................................................................
Creating A Ti Zone In A Base Fabric351................................................................................................................................................................
Creating A Ti Zone352................................................................................................................................................................
Example Configuration For Ti Zones Over Fc Routers In Logical Fabrics352................................................................................................................................................................
Logical Representation Of Ti Zones Over Fc Routers In Logical Fabrics352................................................................................................................................................................
Examples Of Creating A Ti Zone353................................................................................................................................................................
Modifying Ti Zones355................................................................................................................................................................
Examples Of Modifying A Ti Zone355................................................................................................................................................................
Changing The State Of A Ti Zone356................................................................................................................................................................
Examples Of Setting The State Of A Ti Zone356................................................................................................................................................................
Deleting A Ti Zone356................................................................................................................................................................
Example Of Deleting A Ti Zone357................................................................................................................................................................
Displaying Ti Zones357................................................................................................................................................................
Setting Up Ti Over Fcr (sample Procedure)358................................................................................................................................................................
Ti Over Fcr Example358................................................................................................................................................................
Qos: Ingress Rate Limiting361................................................................................................................................................................
Limiting Traffic From A Particular Device362................................................................................................................................................................
Disabling Ingress Rate Limiting363................................................................................................................................................................
Qos: Sid/did Traffic Prioritization363................................................................................................................................................................
Qos Zones363................................................................................................................................................................
Virtual Channels Assigned To Qos Priority363................................................................................................................................................................
Qos On E_ports364................................................................................................................................................................
Qos Traffic Prioritization364................................................................................................................................................................
Virtual Fabric Considerations For Traffic Prioritization365................................................................................................................................................................
Qos With E_ports Enabled365................................................................................................................................................................
Supported Configurations For Traffic Prioritization366................................................................................................................................................................
Traffic Prioritization In A Logical Fabric366................................................................................................................................................................
Limitations And Restrictions For Traffic Prioritization367................................................................................................................................................................
Setting Traffic Prioritization367................................................................................................................................................................
Using The Fc-fc Routing Service369................................................................................................................................................................
Fc-fc Routing Service Overview369................................................................................................................................................................
Supported Platforms For Fibre Channel Routing369................................................................................................................................................................
Supported Configurations369................................................................................................................................................................
Integrated Routing370................................................................................................................................................................
Fibre Channel Routing Concepts370................................................................................................................................................................
A Metasan With Interfabric Links371................................................................................................................................................................
A Metasan With Edge-to-edge And Backbone Fabrics And Lsan Zones372................................................................................................................................................................
Proxy Devices373................................................................................................................................................................
Phantom Domains373................................................................................................................................................................
Metasan With Imported Devices374................................................................................................................................................................
Sample Topology (physical Topology)375................................................................................................................................................................
Fibre Channel Network Address Translation376................................................................................................................................................................
Ex_port Phantom Switch Topology376................................................................................................................................................................
Setting Up The Fc-fc Routing Service377................................................................................................................................................................
Verifying The Setup For Fc-fc Routing377................................................................................................................................................................
Backbone Fids379................................................................................................................................................................
Assigning Backbone Fids380................................................................................................................................................................
Fcip Tunnel Configuration380................................................................................................................................................................
Interfabric Link Configuration380................................................................................................................................................................
Configuring An Ifl For Both Edge And Backbone Connections381................................................................................................................................................................
Fc Router Port Cost Configuration385................................................................................................................................................................
Port Cost Considerations385................................................................................................................................................................
Upgrade, Downgrade, And Ha Considerations For Router Port Cost386................................................................................................................................................................
Setting Router Port Cost For An Ex_port386................................................................................................................................................................
Ex_port Frame Trunking Configuration386................................................................................................................................................................
Supported Configurations And Platforms387................................................................................................................................................................
High Availability Support387................................................................................................................................................................
Backward Compatibility Support387................................................................................................................................................................
Configuring Ex_port Frame Trunking387................................................................................................................................................................
Displaying Ex_port Trunking Information388................................................................................................................................................................
Lsan Zone Configuration388................................................................................................................................................................
Use Of Administrative Domains With Lsan Zones And Fcr388................................................................................................................................................................
Zone Definition And Naming388................................................................................................................................................................
Lsan Zones And Fabric-to-fabric Communications389................................................................................................................................................................
Controlling Device Communication With The Lsan (sample Procedure)389................................................................................................................................................................
Setting The Maximum Lsan Count391................................................................................................................................................................
Configuring Backbone Fabrics For Interconnectivity392................................................................................................................................................................
Ha And Downgrade Considerations For Lsan Zones392................................................................................................................................................................
Lsan Zone Policies Using Lsan Tagging392................................................................................................................................................................
Enforce Tag392................................................................................................................................................................
Speed Tag393................................................................................................................................................................
Rules For Lsan Tagging394................................................................................................................................................................
Configuring An Enforce Lsan Tag394................................................................................................................................................................
Example Of Setting Up Speed Lsan Tag394................................................................................................................................................................
Configuring A Speed Lsan Tag395................................................................................................................................................................
Removing An Lsan Tag395................................................................................................................................................................
Displaying The Lsan Tag Configuration395................................................................................................................................................................
Lsan Zone Binding396................................................................................................................................................................
How Lsan Zone Binding Works397................................................................................................................................................................
Lsan Information Stored In Each Fc Router With And Without Lsan Zone Binding397................................................................................................................................................................
Fc Router Matrix Definition398................................................................................................................................................................
Lsan Fabric Matrix Definition398................................................................................................................................................................
Upgrade, Downgrade, And Ha Considerations For Lsan Zone Binding398................................................................................................................................................................
Setting Up Lsan Zone Binding399................................................................................................................................................................
Viewing The Lsan Zone Binding Matrixes399................................................................................................................................................................
Proxy Pid Configuration399................................................................................................................................................................
Fabric Parameter Considerations400................................................................................................................................................................
Inter-fabric Broadcast Frames400................................................................................................................................................................
Displaying The Current Broadcast Configuration401................................................................................................................................................................
Enabling Broadcast Frame Forwarding401................................................................................................................................................................
Disabling Broadcast Frame Forwarding401................................................................................................................................................................
Resource Monitoring401................................................................................................................................................................
Fc-fc Routing And Virtual Fabrics403................................................................................................................................................................
Logical Switch Configuration For Fc Routing403................................................................................................................................................................
Backbone-to-edge Routing With Virtual Fabrics404................................................................................................................................................................
Ex_ports In A Base Switch404................................................................................................................................................................
Logical Representation Of Ex_ports In A Base Switch404................................................................................................................................................................
Upgrade And Downgrade Considerations For Fc-fc Routing405................................................................................................................................................................
How Replacing Port Blades Affects Ex_port Configuration405................................................................................................................................................................
Interoperability With Legacy Fcr Switches405................................................................................................................................................................
Backbone-to-edge Routing Across Base Switch Using Fc Router In Legacy Mode405................................................................................................................................................................
Range Of Output Ports406................................................................................................................................................................
Displaying The Range Of Output Ports Connected To The Xlate Domains406................................................................................................................................................................
Verifying Normal Operation Of Front Domain Consolidation406................................................................................................................................................................
Administering Advanced Performance Monitoring409................................................................................................................................................................
Advanced Performance Monitoring Overview409................................................................................................................................................................
Types Of Monitors Supported On Hp Storageworks Switch Models409................................................................................................................................................................
End-to-end Performance Monitoring410................................................................................................................................................................
Number Of Logical Switches That Support Performance Monitors410................................................................................................................................................................
End-to-end Monitors411................................................................................................................................................................
Adding End-to-end Monitors411................................................................................................................................................................
Monitoring The Traffic From Host A To Dev B412................................................................................................................................................................
Monitoring The Traffic From Dev B To Host A412................................................................................................................................................................
Setting End-to-end Monitors On A Port412................................................................................................................................................................
Proper Placement Of End-to-end Performance Monitors412................................................................................................................................................................
Setting A Mask For An End-to-end Monitor413................................................................................................................................................................
Deleting End-to-end Monitors414................................................................................................................................................................
Filter-based Performance Monitoring414................................................................................................................................................................
Adding Standard Filter-based Monitors415................................................................................................................................................................
Custom Filter-based Monitors416................................................................................................................................................................
Adding Custom Filter-based Monitors417................................................................................................................................................................
Deleting Filter-based Monitors417................................................................................................................................................................
Isl Performance Monitoring417................................................................................................................................................................
Predefined Values At Offset 0417................................................................................................................................................................
Top Talker Monitors418................................................................................................................................................................
Adding A Top Talker Monitor On An F_port419................................................................................................................................................................
Deleting A Top Talker Monitor On An F_port419................................................................................................................................................................
Displaying The Top N Bandwidth-using Flows On An F_port419................................................................................................................................................................
Adding Top Talker Monitors On All Switches In The Fabric (fabric Mode)420................................................................................................................................................................
Deleting The Fabric Mode Top Talker Monitors421................................................................................................................................................................
Displaying Top Talking Flows For A Given Domain Id (fabric Mode)421................................................................................................................................................................
Limitations Of Top Talker Monitors421................................................................................................................................................................
Trunk Monitoring422................................................................................................................................................................
Displaying Monitor Counters422................................................................................................................................................................
Clearing Monitor Counters424................................................................................................................................................................
Saving And Restoring Monitor Configurations425................................................................................................................................................................
Performance Data Collection426................................................................................................................................................................
Administering Extended Fabrics427................................................................................................................................................................
Licensing For Extended Fabrics427................................................................................................................................................................
Extended Fibre Channel Over Distance427................................................................................................................................................................
Distance Levels For Extended Inter-switch Links427................................................................................................................................................................
Buffer-to-buffer Credits427................................................................................................................................................................
Fibre Channel Data Frames428................................................................................................................................................................
Fc Switch Port Buffer Credit Requirements For Long-distance Calculations429................................................................................................................................................................
Determining How Many Ports Can Be Used For Long Distance429................................................................................................................................................................
Buffer Credits429................................................................................................................................................................
Example: Consider The Hp Storageworks 8/8 And 8/24 San Switches, Which Have A Single 24-port Port Group And A Total Of 676 Buffer Credits For That Port Group430................................................................................................................................................................
Displaying The Remaining Buffers In A Port Group430................................................................................................................................................................
Supported Distances432................................................................................................................................................................
Buffer Credit Recovery433................................................................................................................................................................
Fabric Considerations For Buffer Credit Management434................................................................................................................................................................
Configuring F_port Buffer Credits434................................................................................................................................................................
Configuring Ports To Support Long Distance434................................................................................................................................................................
Enabling Long Distance When Connecting To Time-division Multiplexing Devices435................................................................................................................................................................
Extended Fabrics Device Limitations436................................................................................................................................................................
Configuring An Extended Isl436................................................................................................................................................................
Administering Isl Trunking436................................................................................................................................................................
Isl Trunking Overview439................................................................................................................................................................
Distribution Of Traffic Over Isl Trunking Groups439................................................................................................................................................................
Standard Trunking Criteria440................................................................................................................................................................
Fabric Considerations For Isl Trunking440................................................................................................................................................................
Initializing Trunking On Ports441................................................................................................................................................................
Disabling And Re-enabling Ports441................................................................................................................................................................
Lossless Dynamic Load Sharing On Trunk Ports441................................................................................................................................................................
Configuring Lossless Dynamic Load Sharing On Trunk Ports442................................................................................................................................................................
Lossless Dynamic Load Sharing In Virtual Fabrics442................................................................................................................................................................
Example: How Dls Affects Other Logical Switches In The Fabric442................................................................................................................................................................
Performance Monitoring442................................................................................................................................................................
Adding A Monitor To An F_port Master Port443................................................................................................................................................................
Displaying Port Throughput Performance Information For All Ports On The Switch443................................................................................................................................................................
Isl Trunking444................................................................................................................................................................
Enabling Or Disabling Isl Trunking On A Port444................................................................................................................................................................
Enabling Or Disabling Isl Trunking For All Ports On A Switch444................................................................................................................................................................
Setting Port Speeds444................................................................................................................................................................
Long-distance Mode Definitions445................................................................................................................................................................
Setting The Same Speed For All Ports On The Switch446................................................................................................................................................................
Displaying Trunking Information447................................................................................................................................................................
Trunking Over Extended Fabrics447................................................................................................................................................................
Trunking Distances447................................................................................................................................................................
F_port Masterless Trunking448................................................................................................................................................................
Trunking Over Distance For The Hp Storageworks 4/256 San Director With Supported Blades448................................................................................................................................................................
F_port Trunking Considerations449................................................................................................................................................................
Switch In Access Gateway Mode Without F_port Trunking449................................................................................................................................................................
Switch In Access Gateway Mode With F_port Masterless Trunking449................................................................................................................................................................
F_port Masterless Trunking Considerations450................................................................................................................................................................
Setting Up F_port Trunking452................................................................................................................................................................
Pwwn Format For F_port And N_port Trunk Ports452................................................................................................................................................................
Assigning A Trunk Area453................................................................................................................................................................
Trunk Group Configuration For The Hp Storageworks 8/40 San Switch453................................................................................................................................................................
Enabling F_port Trunking454................................................................................................................................................................
Enabling The Dcc Policy On A Trunk Area456................................................................................................................................................................
Disabling F_port Trunking456................................................................................................................................................................
F_port Trunking Monitoring456................................................................................................................................................................
Configuration Management For Trunk Areas457................................................................................................................................................................
Example: How Trunk Area Assignment Affect The Port Domain,index457................................................................................................................................................................
Trunking For Switches In Access Gateway Mode457................................................................................................................................................................
F_port Trunking In Virtual Fabrics457................................................................................................................................................................
F_port Authentication458................................................................................................................................................................
Configuring E_port Authentication In Virtual Fabrics458................................................................................................................................................................
Configuring And Monitoring Fcip Extension Services461................................................................................................................................................................
Fcip Concepts461................................................................................................................................................................
Virtual Ports And Fcip Tunnels461................................................................................................................................................................
Virtual Port Types461................................................................................................................................................................
Tunnel And Virtual Port Numbering461................................................................................................................................................................
Compression On Fcip Tunnels462................................................................................................................................................................
Traffic Shaping462................................................................................................................................................................
Fcip Services License462................................................................................................................................................................
Platforms That Support San Extension Over Ip462................................................................................................................................................................
Network Using Fcip462................................................................................................................................................................
Qos Implementation Over Fcip463................................................................................................................................................................
Dscp Quality Of Service463................................................................................................................................................................
L2cos Quality Of Service463................................................................................................................................................................
When Both Dscp And L2cos Are Used463................................................................................................................................................................
Ipsec Implementation Over Fcip464................................................................................................................................................................
Ipsec Configuration465................................................................................................................................................................
Ipsec Parameters465................................................................................................................................................................
Creating An Ike And Ipsec Policy466................................................................................................................................................................
Displaying Ike And Ipsec Policy Settings467................................................................................................................................................................
Deleting An Ike And Ipsec Policy468................................................................................................................................................................
Viewing Ipsec Information For An Fcip Tunnel468................................................................................................................................................................
Virtual Fabrics And Fcip469................................................................................................................................................................
Tcp Byte Streaming469................................................................................................................................................................
Supported Third Party Wan Optimizer Hardware470................................................................................................................................................................
Options For Enhancing Tape I/o Performance470................................................................................................................................................................
Fcip Fastwrite And Tape Pipelining470................................................................................................................................................................
Constraints For Fcip Fastwrite And Tape Pipelining471................................................................................................................................................................
Fcip Fastwrite And Tape Pipelining Configurations471................................................................................................................................................................
Unsupported Configurations For Fastwrite And Tape Pipelining472................................................................................................................................................................
Fc Fastwrite Concepts473................................................................................................................................................................
Unsupported Configurations With Fastwrite And Tape Pipelining473................................................................................................................................................................
Platforms And Os Requirements For Fc Fastwrite474................................................................................................................................................................
Constraints For Fc Fastwrite474................................................................................................................................................................
How Fc Fastwrite Works474................................................................................................................................................................
Typical Network Topology For Fc Fastwrite474................................................................................................................................................................
Fc Fastwrite Flow Configuration Requirements475................................................................................................................................................................
Hardware Considerations For Fc Fastwrite475................................................................................................................................................................
Configuring And Enabling Fc Fastwrite475................................................................................................................................................................
Example: Enabling Fastwrite On A Switch476................................................................................................................................................................
Disabling Fc Fastwrite On A Blade Or Switch477................................................................................................................................................................
Example: Disabling Fc Fastwrite On A Switch478................................................................................................................................................................
Disabling Fc Fastwrite On A Port478................................................................................................................................................................
Fcip Services Configuration Guidelines478................................................................................................................................................................
Setting Persistently Disabled Ports479................................................................................................................................................................
Configuring Vex_ports479................................................................................................................................................................
Creating Ip Interfaces And Routes480................................................................................................................................................................
Creating An Fcip Tunnel482................................................................................................................................................................
Example: Creating An Fcip Tunnel483................................................................................................................................................................
Example: Creating An Fcip Tunnel With Fastwrite And Tape Pipelining Enabled484................................................................................................................................................................
Verifying The Fcip Tunnel Configuration484................................................................................................................................................................
Enabling Persistently Disabled Ports486................................................................................................................................................................
Managing Fcip Tunnels487................................................................................................................................................................
Modifying And Deleting Qos Settings489................................................................................................................................................................
Deleting An Fcip Tunnel490................................................................................................................................................................
Deleting An Ip Interface (ipif)490................................................................................................................................................................
Deleting An Iproute490................................................................................................................................................................
Managing The Vlan Tag Table490................................................................................................................................................................
Wan Performance Analysis Tools491................................................................................................................................................................
Ipperf Option491................................................................................................................................................................
Wan Tool Sessions With An Fcip Tunnel Online491................................................................................................................................................................
Fcip Port Bandwidth491................................................................................................................................................................
Wan Tool Performance Characteristics492................................................................................................................................................................
Wan Tool Analysis492................................................................................................................................................................
Starting An Ipperf Session492................................................................................................................................................................
Wan Tool Ipperf Syntax493................................................................................................................................................................
Testing A Connection494................................................................................................................................................................
Tracing A Route495................................................................................................................................................................
Fcip Tunnel Performance Characteristics496................................................................................................................................................................
Ficon Fabrics499................................................................................................................................................................
Fabric Os Support For Ficon499................................................................................................................................................................
Platforms Supporting Ficon500................................................................................................................................................................
Types Of Ficon Configurations500................................................................................................................................................................
Control Unit Port (cup)501................................................................................................................................................................
Ficon And Ficon Cup In Virtual Fabrics501................................................................................................................................................................
Example: The Configure Command501................................................................................................................................................................
Cup Limitations502................................................................................................................................................................
Ficon Commands502................................................................................................................................................................
User Security Considerations503................................................................................................................................................................
Switch Configuration503................................................................................................................................................................
Preparing A Switch For Ficon504................................................................................................................................................................
Single Switch Configuration504................................................................................................................................................................
Configuring A High-integrity Fabric504................................................................................................................................................................
Setting Unique Domain Ids505................................................................................................................................................................
Cascaded Configuration, Two Switches505................................................................................................................................................................
Cascaded Configuration, Three Switches505................................................................................................................................................................
Ficon Information506................................................................................................................................................................
Link Incidents506................................................................................................................................................................
Registered Listeners506................................................................................................................................................................
Node Identification Data506................................................................................................................................................................
Fru Failures506................................................................................................................................................................
Port Swapping507................................................................................................................................................................
Example: Port Swapping507................................................................................................................................................................
Clearing The Ficon Management Database507................................................................................................................................................................
Ficon Cup507................................................................................................................................................................
Setting Up Ficon Cup508................................................................................................................................................................
Ficon Management Server Mode508................................................................................................................................................................
Enabling Fmsmode509................................................................................................................................................................
Disabling Fmsmode509................................................................................................................................................................
Fmsmode And Ficon Cup509................................................................................................................................................................
Setting Up Ficon Cup If Fmsmode Is Already Enabled509................................................................................................................................................................
The Fmsmode Setting509................................................................................................................................................................
Setting The Mihpto Value509................................................................................................................................................................
Mode Register Bit Settings510................................................................................................................................................................
Ficon Cup Mode Register Bits510................................................................................................................................................................
Setting The Mode Register Bits511................................................................................................................................................................
Persistently Enabling And Disabling Ports511................................................................................................................................................................
Port And Switch Naming Standards511................................................................................................................................................................
Ficon Cup License Considerations512................................................................................................................................................................
Zoning And Pdcm Considerations512................................................................................................................................................................
Zoning And Link Incident Reporting512................................................................................................................................................................
Ficon Configuration Files512................................................................................................................................................................
Uploading The Configuration Files513................................................................................................................................................................
Downloading Configuration Files With Active=saved Mode Enabled513................................................................................................................................................................
Downloading Configuration Files With Active=saved Mode Disabled513................................................................................................................................................................
Configuration Information Record513................................................................................................................................................................
Ficon Configuration Worksheet513................................................................................................................................................................
Sample Iocp Configuration File514................................................................................................................................................................
Configuring And Monitoring Ficon Extension Services517................................................................................................................................................................
Ficon Extension Products Licensing517................................................................................................................................................................
Platforms That Support Ficon Extension Over Ip517................................................................................................................................................................
Fcip Configuration Requirements For Ficon Extension517................................................................................................................................................................
Configuration Requirements For Switches And Directors517................................................................................................................................................................
Configuration Of Sufficient Buffer Credits517................................................................................................................................................................
High Integrity Fabric Requirements For Cascaded Configurations517................................................................................................................................................................
Ficon Emulation Requirement For A Determinate Path518................................................................................................................................................................
One Ethernet Interface, One Ip Route And One Fcip Tunnel Between Sites518................................................................................................................................................................
Traffic Isolation Zoning518................................................................................................................................................................
Allow/prohibit For M-series Directors518................................................................................................................................................................
Ficon Emulation Concepts And Features518................................................................................................................................................................
Allow/prohibit Example518................................................................................................................................................................
Xrc Emulation519................................................................................................................................................................
Tape Write Pipelining519................................................................................................................................................................
Tape Read Pipelining519................................................................................................................................................................
Ficon Emulation Configuration519................................................................................................................................................................
Ficon Emulation Configuration Values521................................................................................................................................................................
Ficon Emulation Modification521................................................................................................................................................................
Ficon Performance Statistics522................................................................................................................................................................
Ficon Emulation Monitoring523................................................................................................................................................................
A Configuring The Pid Format527................................................................................................................................................................
Pids And Pid Binding Overview527................................................................................................................................................................
256-area Addressing Mode527................................................................................................................................................................
Pid Formats528................................................................................................................................................................
Impact Of Changing The Fabric Pid Format528................................................................................................................................................................
Host Reboots528................................................................................................................................................................
Static Pid Mapping Errors529................................................................................................................................................................
Changes To Configuration Data529................................................................................................................................................................
Pid Format Selection529................................................................................................................................................................
Evaluating The Fabric530................................................................................................................................................................
Pid Format Recommendations For Adding New Switches530................................................................................................................................................................
Changing The Pid Format532................................................................................................................................................................
Changing The Pid Format Online532................................................................................................................................................................
Changing The Pid Format Offline532................................................................................................................................................................
Hybrid Update533................................................................................................................................................................
Changing To Core Pid Format533................................................................................................................................................................
Port Number To Area Id Conversion534................................................................................................................................................................
Pid Format Changes534................................................................................................................................................................
Basic Procedure For Changing The Pid Format535................................................................................................................................................................
Hp-ux Procedure For Changing The Pid Format536................................................................................................................................................................
Aix Procedure For Changing The Pid Format537................................................................................................................................................................
Swapping Port Area Ids538................................................................................................................................................................
Physical Port Numbers And Logical Area Ids For Swapped Ports539................................................................................................................................................................
B Understanding Legacy Password Behavior541................................................................................................................................................................
Password Management Information541................................................................................................................................................................
Password Prompting Behaviors542................................................................................................................................................................
Password Migration During Firmware Changes543................................................................................................................................................................
Password Recovery Options543................................................................................................................................................................
Password Migration Behavior During Firmware Upgrade/downgrade543................................................................................................................................................................
C Mixed Fabric Configurations For Non-merge Sans545................................................................................................................................................................
D Migrating From An Mp Router To A 400 Mp Router547................................................................................................................................................................
Introduction To Mp Router Upgrades547................................................................................................................................................................
Non-redundant Configuration547................................................................................................................................................................
Non-redundant Router Configuration547................................................................................................................................................................
Configuration During The Upgrade547................................................................................................................................................................
Redundant Configuration548................................................................................................................................................................
Dual Backbone Configuration548................................................................................................................................................................
Configuring A New Fc Router549................................................................................................................................................................
E Inband Management551................................................................................................................................................................
Inband Management Overview551................................................................................................................................................................
Internal Ethernet Devices551................................................................................................................................................................
Ip Address And Routing Management552................................................................................................................................................................
Inband Management Process552................................................................................................................................................................
Setting The Ip Address For The Cp Inband Management Interface553................................................................................................................................................................
Setting The Ip Address For The Ge Inband Management Interface553................................................................................................................................................................
Adding A Route On The Cp553................................................................................................................................................................
Deleting A Route553................................................................................................................................................................
Viewing Ip Addresses And Routes554................................................................................................................................................................
Displaying Ip Routes554................................................................................................................................................................
Fips555................................................................................................................................................................
Examples Of Supported Configurations555................................................................................................................................................................
Configuring A Management Station On The Same Subnet555................................................................................................................................................................
Management Station On Same Subnet555................................................................................................................................................................
Configuring A Management Station On Different Subnets556................................................................................................................................................................
Management Station On A Different Subnet556................................................................................................................................................................
F Using Remote Switch559................................................................................................................................................................
About Remote Switch559................................................................................................................................................................
Remote Switch Capabilities559................................................................................................................................................................
Using Remote Switch With A Gateway559................................................................................................................................................................
Index561................................................................................................................................................................
Figures573................................................................................................................................................................
Windows 2000 Vsa Configuration573................................................................................................................................................................
Logical Switches Connected To Form Logical Fabrics573................................................................................................................................................................
Isolated Subfabrics573................................................................................................................................................................
Edge Sans Connected Through A Backbone Fabric574................................................................................................................................................................
Mask Positions For End-to-end Monitors574................................................................................................................................................................
Single Tunnel, Fastwrite And Tape Pipelining Enabled574................................................................................................................................................................
80 Multiple Tunnels To Multiple Ports, Fastwrite And Tape Pipelining Enabled On A Per-tunnel/per-port Basis574................................................................................................................................................................
Redundant Router Configuration574................................................................................................................................................................
Dual Backbone Fabric Configuration574................................................................................................................................................................
Tables575................................................................................................................................................................
License Requirements575................................................................................................................................................................
Port Numbering Schemes For The Hp Storageworks 4/256 San Director, Hp Storageworks Dc San Back- Bone Director And Hp Storageworks Dc04 San Director Switch Enterprise-class Platforms268576................................................................................................................................................................
Default Index/area_id Core Pid Assignment With No Port Swap576................................................................................................................................................................
69 Default Index/area_id Core Pid Assignment With No Port Swap For The Hp Storageworks Dc04 San Director576................................................................................................................................................................
Switch271576................................................................................................................................................................
Trunking Support For Hp Storageworks San Switch 4/32 And Hp Storageworks 4/64 San Switch576................................................................................................................................................................
Asic)444576................................................................................................................................................................
Address Identifier576................................................................................................................................................................
Default Mapping Of Dscp Priorities To L2cos Priorities576................................................................................................................................................................
Ipsec Terminology576................................................................................................................................................................
Fixed Policy Parameters576................................................................................................................................................................
Modifiable Policy Parameters576................................................................................................................................................................
Using Fcip Fastwrite And Tape Pipelining576................................................................................................................................................................
Fabric Os Commands Related To Ficon And Ficon Cup576................................................................................................................................................................
Effects Of Pid Format Changes On Configurations576................................................................................................................................................................
Account/password Characteristics Matrix576................................................................................................................................................................
Password Prompting Matrix576................................................................................................................................................................

Advertisement

HP AE370A - Brocade 4Gb SAN Switch 4/12 Administrator's Manual

HP AE370A - Brocade 4Gb SAN Switch 4/12 Administrator's Manual (518 pages)

HP StorageWorks Fabric OS 6.x administrator guide (5697-0015, May 2009)  
Brand: HP | Category: Switch | Size: 3.35 MB
Table of contents
Table Of Contents3................................................................................................................................................................
About This Guide19................................................................................................................................................................
Supported Fabric Os 6.x Hp Storageworks Hardware19................................................................................................................................................................
Switch Model Naming Matrix19................................................................................................................................................................
Intended Audience20................................................................................................................................................................
Related Documentation20................................................................................................................................................................
Document Conventions And Symbols20................................................................................................................................................................
Document Conventions20................................................................................................................................................................
Rack Stability21................................................................................................................................................................
Hp Technical Support21................................................................................................................................................................
Customer Self Repair21................................................................................................................................................................
Product Warranties21................................................................................................................................................................
Subscription Service22................................................................................................................................................................
Hp Websites22................................................................................................................................................................
Documentation Feedback22................................................................................................................................................................
Standard Features23................................................................................................................................................................
Overview23................................................................................................................................................................
Using The Cli23................................................................................................................................................................
Connecting To The Cli24................................................................................................................................................................
Using Telnet Or Ssh Session24................................................................................................................................................................
Using A Console Session On The Serial Port25................................................................................................................................................................
Changing Passwords25................................................................................................................................................................
Changing Default Account Passwords At Login26................................................................................................................................................................
Default Administrative Account Names And Passwords26................................................................................................................................................................
Configuring The Ethernet Interface27................................................................................................................................................................
Displaying The Network Interface Settings27................................................................................................................................................................
Setting Static Ethernet Addresses28................................................................................................................................................................
Configuring Dhcp29................................................................................................................................................................
Enabling Dhcp29................................................................................................................................................................
Disabling Dhcp29................................................................................................................................................................
Setting The Date And Time30................................................................................................................................................................
Setting Time Zones30................................................................................................................................................................
Synchronizing Local Time Using Ntp32................................................................................................................................................................
Customizing Switch Names33................................................................................................................................................................
Working With Domain Ids33................................................................................................................................................................
Licensed Features34................................................................................................................................................................
Generating A License Key35................................................................................................................................................................
Activating A License Key35................................................................................................................................................................
Removing A Licensed Feature36................................................................................................................................................................
Features And Required Licenses37................................................................................................................................................................
License Requirements37................................................................................................................................................................
Inter-chassis Link (icl) Licensing38................................................................................................................................................................
Time-based Licenses39................................................................................................................................................................
High Availability Considerations39................................................................................................................................................................
Firmware Upgrade And Downgrade Consideration39................................................................................................................................................................
Configupload And Configdownload Considerations39................................................................................................................................................................
Expired Licenses39................................................................................................................................................................
Ports On Demand (pod) Licensing39................................................................................................................................................................
Activating Pod40................................................................................................................................................................
Configuring Dynamic Ports On Demand40................................................................................................................................................................
How Ports Are Assigned To Licenses40................................................................................................................................................................
Displaying The Port License Assignment41................................................................................................................................................................
Activating Dynamic Ports On Demand41................................................................................................................................................................
Disabling Dynamic Ports On Demand42................................................................................................................................................................
Managing Pod Licenses42................................................................................................................................................................
Reserving A License42................................................................................................................................................................
Releasing A Port43................................................................................................................................................................
Disabling And Enabling Switches44................................................................................................................................................................
Disabling And Enabling Ports44................................................................................................................................................................
Making Basic Connections45................................................................................................................................................................
Connecting To Devices45................................................................................................................................................................
Connecting To Other Switches45................................................................................................................................................................
Linking Through A Gateway45................................................................................................................................................................
Checking Status46................................................................................................................................................................
Tracking And Controlling Switch Changes48................................................................................................................................................................
Configuring The Audit Log50................................................................................................................................................................
Auditable Event Classes51................................................................................................................................................................
Auditcfg Event Class Operands51................................................................................................................................................................
Shutting Down Switches And Directors53................................................................................................................................................................
High Availability Of Daemon Processes53................................................................................................................................................................
Daemons That Are Automatically Restarted54................................................................................................................................................................
Managing User Accounts55................................................................................................................................................................
Accessing The Management Channel55................................................................................................................................................................
Maximum Number Of Simultaneous Sessions55................................................................................................................................................................
Using Role-based Access Control (rbac)56................................................................................................................................................................
Fabric Os 6.x Roles56................................................................................................................................................................
Role Permissions57................................................................................................................................................................
Permission Types57................................................................................................................................................................
Rbac Permissions Matrix57................................................................................................................................................................
Managing The Local Database User Accounts59................................................................................................................................................................
About The Default Accounts59................................................................................................................................................................
Defining Local User Accounts59................................................................................................................................................................
Default Local User Accounts59................................................................................................................................................................
Recovering Accounts62................................................................................................................................................................
Changing Local Account Passwords62................................................................................................................................................................
Configuring The Local User Database63................................................................................................................................................................
Distributing The Local User Database63................................................................................................................................................................
Protecting The Local User Database From Distributions63................................................................................................................................................................
Configuring Password Policies64................................................................................................................................................................
Setting The Password Strength Policy64................................................................................................................................................................
Setting The Password History Policy65................................................................................................................................................................
Setting The Password Expiration Policy65................................................................................................................................................................
Upgrade And Downgrade Considerations66................................................................................................................................................................
Setting The Account Lockout Policy66................................................................................................................................................................
Denial Of Service Implications67................................................................................................................................................................
Authentication Model67................................................................................................................................................................
Authentication Configuration Options68................................................................................................................................................................
Creating Fabric Os User Accounts69................................................................................................................................................................
Syntax For Vsa-based Account Roles69................................................................................................................................................................
Managing Fabric Os Users On The Radius Server70................................................................................................................................................................
Windows 2000 Ias70................................................................................................................................................................
Linux Freeradius Server71................................................................................................................................................................
Radius Configuration And Admin Domains71................................................................................................................................................................
Dictionary.brocade File Entries71................................................................................................................................................................
Configuring The Radius Server72................................................................................................................................................................
Linux72................................................................................................................................................................
Windows 200073................................................................................................................................................................
Ldap Configuration And Microsoft's Active Directory75................................................................................................................................................................
Configuring Authentication Servers On The Switch77................................................................................................................................................................
Enabling And Disabling Local Authentication As Backup80................................................................................................................................................................
Boot Prom Password80................................................................................................................................................................
Setting The Boot Prom Password With A Recovery String81................................................................................................................................................................
Multi-protocal (mp) Router81................................................................................................................................................................
Hp Storageworks 4/8 Or 4/16, Brocade 4gb San Switch For Hp P-class Bladesystem, Brocade 4gb San Switch For Hp C-class Bladesystem, San Switch 4/32, 4/64 San Switch, San Switch 4/32b81................................................................................................................................................................
4/256 San Director And Dc San Backbone Director (short Name, Dc Director)82................................................................................................................................................................
Setting The Boot Prom Password Without A Recovery String83................................................................................................................................................................
Recovering Forgotten Passwords84................................................................................................................................................................
Configuring Standard Security Features85................................................................................................................................................................
Secure Protocols85................................................................................................................................................................
Secure Protocol Support85................................................................................................................................................................
Items Needed To Deploy Secure Protocols85................................................................................................................................................................
Ensuring Network Security86................................................................................................................................................................
Main Security Scenarios86................................................................................................................................................................
Configuring The Telnet Protocol87................................................................................................................................................................
Blocking Telnet87................................................................................................................................................................
Unblocking Telnet87................................................................................................................................................................
Blocking Listeners88................................................................................................................................................................
Accessing Switches And Fabrics88................................................................................................................................................................
Blocked Listener Applications88................................................................................................................................................................
Access Defaults88................................................................................................................................................................
Port Configuration89................................................................................................................................................................
Configuring For The Ssl Protocol89................................................................................................................................................................
Browser And Java Support89................................................................................................................................................................
Summary Of Ssl Procedures90................................................................................................................................................................
Choosing A Ca90................................................................................................................................................................
Generating A Public/private Key90................................................................................................................................................................
Ssl Certificate Files90................................................................................................................................................................
Generating And Storing A Csr91................................................................................................................................................................
Obtaining Certificates91................................................................................................................................................................
Installing A Switch Certificate92................................................................................................................................................................
Activating A Switch Certificate92................................................................................................................................................................
Configuring The Browser93................................................................................................................................................................
Installing A Root Certificate To The Java Plug-in93................................................................................................................................................................
Displaying And Deleting Certificates94................................................................................................................................................................
Troubleshooting Certificates94................................................................................................................................................................
Commands For Displaying And Deleting Ssl Certificates94................................................................................................................................................................
Ssl Messages And Actions94................................................................................................................................................................
Configuring For Snmp95................................................................................................................................................................
Setting The Security Level95................................................................................................................................................................
Using The Snmpconfig Command96................................................................................................................................................................
Configuring Secure File Copy98................................................................................................................................................................
Configuring Advanced Security Features99................................................................................................................................................................
About Access Control List (acl) Policies99................................................................................................................................................................
How The Acl Policies Are Stored99................................................................................................................................................................
Security Database Size Restrictions99................................................................................................................................................................
Identifying Policy Members100................................................................................................................................................................
Configuring Acl Policies100................................................................................................................................................................
Valid Methods For Specifying Policy Members100................................................................................................................................................................
Displaying Acl Policies101................................................................................................................................................................
Configuring An Fcs Policy101................................................................................................................................................................
Fcs Policy States101................................................................................................................................................................
Fcs Policy Restrictions102................................................................................................................................................................
Switch Operations102................................................................................................................................................................
Overview Of Steps To Create And Manage The Fcs Policies103................................................................................................................................................................
Modifying The Primary Fcs103................................................................................................................................................................
Distributing An Fcs Policy104................................................................................................................................................................
Configuring A Dcc Policy105................................................................................................................................................................
Dcc Policy Restrictions105................................................................................................................................................................
Distribution Policy States105................................................................................................................................................................
Dcc Policy States105................................................................................................................................................................
Creating A Dcc Policy106................................................................................................................................................................
Examples Of Creating Dcc Policies107................................................................................................................................................................
Creating An Scc Policy107................................................................................................................................................................
Scc Policy States107................................................................................................................................................................
Saving Changes To Acl Policies108................................................................................................................................................................
Activating Changes To Acl Policies108................................................................................................................................................................
Adding A Member To An Existing Policy108................................................................................................................................................................
Removing A Member From An Acl Policy109................................................................................................................................................................
Deleting An Acl Policy109................................................................................................................................................................
Aborting All Uncommitted Changes109................................................................................................................................................................
Configuring The Authentication Policy For Fabric Elements109................................................................................................................................................................
E_port Authentication110................................................................................................................................................................
Dh-chap Authentication110................................................................................................................................................................
Figures 1 Dh-chap Authentication110................................................................................................................................................................
Device Authentication Policy112................................................................................................................................................................
Auth Policy Restrictions112................................................................................................................................................................
Supported Configurations112................................................................................................................................................................
Selecting Authentication Protocols113................................................................................................................................................................
Re-authenticating Ports113................................................................................................................................................................
Managing Secret Key Pairs114................................................................................................................................................................
Fabric Wide Distribution Of The Auth Policy115................................................................................................................................................................
Accept Distributions Configuration Parameter116................................................................................................................................................................
Ip Filter Policy116................................................................................................................................................................
Creating An Ip Filter Policy116................................................................................................................................................................
Cloning An Ip Filter Policy116................................................................................................................................................................
Displaying An Ip Filter Policy117................................................................................................................................................................
Saving An Ip Filter Policy117................................................................................................................................................................
Activating An Ip Filter Policy117................................................................................................................................................................
Deleting An Ip Filter Policy118................................................................................................................................................................
Ip Filter Policy Rules118................................................................................................................................................................
Supported Services118................................................................................................................................................................
Ip Filter Policy Enforcement119................................................................................................................................................................
Implicit Ip Filter Rules119................................................................................................................................................................
Default Ip Policy Rules119................................................................................................................................................................
Creating Ip Filter Policy Rules120................................................................................................................................................................
Deleting Ip Filter Policy Rules120................................................................................................................................................................
Aborting A Switch Session Transaction120................................................................................................................................................................
Ip Filter Policy Distributions121................................................................................................................................................................
Ip Filter Policy Restrictions121................................................................................................................................................................
Distributing The Policy Database121................................................................................................................................................................
Configuring The Database Distribution Settings122................................................................................................................................................................
Interaction Between Fabric-wide Consistency Policy And Distribution Settings122................................................................................................................................................................
Supported Policy Databases122................................................................................................................................................................
Distributing Acl Policies To Other Switches123................................................................................................................................................................
Setting The Consistency Policy Fabric-wide124................................................................................................................................................................
Acl Policy Database Distribution Behavior124................................................................................................................................................................
Fabric-wide Consistency Policy Settings124................................................................................................................................................................
Notes On Joining A Switch To The Fabric125................................................................................................................................................................
Matching Fabric-wide Consistency Policies126................................................................................................................................................................
Merging Fabrics With Matching Fabric-wide Consistency Policies126................................................................................................................................................................
Non-matching Fabric-wide Consistency Policies127................................................................................................................................................................
Fips Support127................................................................................................................................................................
Examples Of Strict Fabric Merges127................................................................................................................................................................
Fabric Merges With Tolerant/absent Combinations127................................................................................................................................................................
Zeroization Functions128................................................................................................................................................................
Power-up Self Tests128................................................................................................................................................................
Zeroization Behavior128................................................................................................................................................................
Conditional Tests129................................................................................................................................................................
Fips Mode130................................................................................................................................................................
Fips Mode Restrictions130................................................................................................................................................................
Preparing The Switch For Fips131................................................................................................................................................................
Overview Of Steps131................................................................................................................................................................
Maintaining Configurations135................................................................................................................................................................
Maintaining Consistent Configuration Settings135................................................................................................................................................................
Displaying Configuration Settings135................................................................................................................................................................
Backing Up A Configuration135................................................................................................................................................................
Troubleshooting Configuration Upload136................................................................................................................................................................
Restoring Switch Information137................................................................................................................................................................
Restoring A Configuration137................................................................................................................................................................
Configuration Download Without Disabling A Switch137................................................................................................................................................................
Cli Commands To Display Switch Configuration Information137................................................................................................................................................................
Security Considerations139................................................................................................................................................................
Troubleshooting Configuration Download139................................................................................................................................................................
Messages Captured In The Logs140................................................................................................................................................................
Restoring Configurations In A Ficon Environment140................................................................................................................................................................
Downloading Configurations Across A Fabric140................................................................................................................................................................
Backup And Restore In A Ficon Cup Environment140................................................................................................................................................................
Configuration Form141................................................................................................................................................................
Configuration And Connection Information141................................................................................................................................................................
Managing Administrative Domains143................................................................................................................................................................
Fabric With Two Admin Domains144................................................................................................................................................................
Filtered Fabric Views144................................................................................................................................................................
Admin Domain Features145................................................................................................................................................................
Requirements For Admin Domains145................................................................................................................................................................
User-defined Administrative Domains145................................................................................................................................................................
System-defined Administrative Domains145................................................................................................................................................................
Ad0146................................................................................................................................................................
Ad255146................................................................................................................................................................
Admin Domain Access Levels147................................................................................................................................................................
Fabric With Ad0 And Ad255147................................................................................................................................................................
Ad User Types147................................................................................................................................................................
Admin Domains And Login148................................................................................................................................................................
Admin Domain Member Types148................................................................................................................................................................
Device Members148................................................................................................................................................................
Switch Port Members149................................................................................................................................................................
Switch Members149................................................................................................................................................................
Admin Domains And Switch Wwn149................................................................................................................................................................
Admin Domain Compatibility And Availability150................................................................................................................................................................
Admin Domains And Merging150................................................................................................................................................................
Fabric Showing Switch And Device Wwns150................................................................................................................................................................
Filtered Fabric Views Showing Converted Switch Wwns150................................................................................................................................................................
Compatibility151................................................................................................................................................................
Firmware Upgrade And Downgrade Scenarios151................................................................................................................................................................
Managing Admin Domains151................................................................................................................................................................
Isolated Subfabrics151................................................................................................................................................................
Understanding The Ad Transaction Model152................................................................................................................................................................
Implementing Admin Domains152................................................................................................................................................................
Creating An Admin Domain153................................................................................................................................................................
Assigning A User To An Admin Domain154................................................................................................................................................................
Activating And Deactivating Admin Domains155................................................................................................................................................................
Adding And Removing Admin Domain Members156................................................................................................................................................................
Renaming An Admin Domain156................................................................................................................................................................
Deleting An Admin Domain157................................................................................................................................................................
Deleting All User-defined Admin Domains157................................................................................................................................................................
Validating An Admin Domain Member List158................................................................................................................................................................
Using Admin Domains158................................................................................................................................................................
Using Cli Commands In An Ad Context158................................................................................................................................................................
Executing A Command In A Different Ad Context159................................................................................................................................................................
Displaying An Admin Domain Configuration159................................................................................................................................................................
Ports And Devices In Cli Output159................................................................................................................................................................
Switching To A Different Admin Domain Context160................................................................................................................................................................
Performing Zone Validation160................................................................................................................................................................
Admin Domain Interactions160................................................................................................................................................................
Admin Domain Interaction With Fabric Os Features161................................................................................................................................................................
Admin Domains, Zones, And Zone Databases162................................................................................................................................................................
Admin Domains And Lsan Zones162................................................................................................................................................................
Configuration Upload And Download In An Ad Context163................................................................................................................................................................
Configuration Upload And Download Scenarios In An Ad Context163................................................................................................................................................................
Installing And Maintaining Firmware165................................................................................................................................................................
About The Firmware Download Process165................................................................................................................................................................
Upgrading And Downgrading Firmware166................................................................................................................................................................
Effects Of Firmware Changes On Accounts And Passwords166................................................................................................................................................................
Considerations For Ficon Cup Environments166................................................................................................................................................................
Preparing For Firmware Downloads167................................................................................................................................................................
Checking Connected Switches168................................................................................................................................................................
Recommended Firmware168................................................................................................................................................................
Obtaining And Decompressing Firmware169................................................................................................................................................................
Performing Firmwaredownload On Switches169................................................................................................................................................................
Overview Of The Firmware Download Process On Switches169................................................................................................................................................................
Hp Storageworks 4/8 San Switch, 4/16 San Switch, Brocade 4gb San Switch For Hp P-class169................................................................................................................................................................
San Switch 4/32b, 400 Mp Router, And Firmware Download170................................................................................................................................................................
Downloading Firmware To A Director171................................................................................................................................................................
Overview Of The Firmware Download Process On Directors172................................................................................................................................................................
4/256 San Director And Dc Director Firmwaredownload Procedure172................................................................................................................................................................
Director Restrictions For Downgrading175................................................................................................................................................................
Firmwaredownload From A Usb Device176................................................................................................................................................................
Public And Private Key Management177................................................................................................................................................................
The Firmwaredownload Command178................................................................................................................................................................
Power-on Firmware Checksum Test179................................................................................................................................................................
Testing And Restoring Firmware On Switches179................................................................................................................................................................
Testing And Restoring Firmware On Directors180................................................................................................................................................................
Validating Firmwaredownload183................................................................................................................................................................
Troubleshooting Firmwaredownload184................................................................................................................................................................
Considerations For Downgrading Firmware To Fabric Os 5.3.0 Or Earlier184................................................................................................................................................................
Preinstallation Messages185................................................................................................................................................................
Blade Troubleshooting Tips191................................................................................................................................................................
Configuring Directors193................................................................................................................................................................
Changing A Director's Name193................................................................................................................................................................
Identifying Ports193................................................................................................................................................................
Director Port Numbering Schemes194................................................................................................................................................................
By Slot And Port Number194................................................................................................................................................................
By Port Area Id194................................................................................................................................................................
By Index194................................................................................................................................................................
Port Numbering Schemes For The 4/256 Director And Dc Director194................................................................................................................................................................
Default Index/area_id Core Pid Assignment With No Port Swap195................................................................................................................................................................
Basic Blade Management196................................................................................................................................................................
Powering Port Blades Off And On196................................................................................................................................................................
Disabling And Enabling Port Blades197................................................................................................................................................................
Fr4-18i Blade Exceptions197................................................................................................................................................................
Fc4-48 And Fc8-48 Blade Exceptions198................................................................................................................................................................
Conserving Power198................................................................................................................................................................
Blade Terminology And Compatibility199................................................................................................................................................................
Cp Blades199................................................................................................................................................................
Director Terminology And Abbreviations199................................................................................................................................................................
Core Blades200................................................................................................................................................................
Port Blade Compatibility200................................................................................................................................................................
Setting Chassis Configuration Options For The 4/256 Director200................................................................................................................................................................
Port Blades Supported By Each Director200................................................................................................................................................................
Supported Configuration Options200................................................................................................................................................................
Obtaining Slot Information201................................................................................................................................................................