HP AE370A - Brocade 4Gb SAN Switch 4/12 Manuals

Manuals and User Guides for HP AE370A - Brocade 4Gb SAN Switch 4/12. We have 17 HP AE370A - Brocade 4Gb SAN Switch 4/12 manuals available for free PDF download: Administrator's Manual, Hardware Reference Manual, Release Note, Manual, Frequently Asked Questions, Installation Instructions

HP AE370A - Brocade 4Gb SAN Switch 4/12 Administrator's Manual

HP AE370A - Brocade 4Gb SAN Switch 4/12 Administrator's Manual (576 pages)

HP StorageWorks Fabric OS 6.2 administrator guide (5697-0016, May 2009)  
Brand: HP | Category: Switch | Size: 4.15 MB
Table of contents
Table Of Contents3................................................................................................................................................................
About This Guide25................................................................................................................................................................
Supported Fabric Os 6.2.x Hp Storageworks Hardware25................................................................................................................................................................
Fabric Os 6.2 Administrator Guide25................................................................................................................................................................
Intended Audience26................................................................................................................................................................
Related Documentation26................................................................................................................................................................
Document Conventions And Symbols26................................................................................................................................................................
Rack Stability27................................................................................................................................................................
Hp Technical Support27................................................................................................................................................................
Customer Self Repair27................................................................................................................................................................
Product Warranties27................................................................................................................................................................
Subscription Service28................................................................................................................................................................
Hp Websites28................................................................................................................................................................
Documentation Feedback28................................................................................................................................................................
Fabric Os Overview29................................................................................................................................................................
Fabric Os Command Line Interface29................................................................................................................................................................
Getting Help On A Command29................................................................................................................................................................
Telnet Or Ssh Sessions30................................................................................................................................................................
Rules For Telnet Connections30................................................................................................................................................................
Connecting To Fabric Os Using Telnet30................................................................................................................................................................
Console Sessions Using The Serial Port31................................................................................................................................................................
Connecting To Fabric Os Through The Serial Port31................................................................................................................................................................
Password Modification31................................................................................................................................................................
Default Account Passwords31................................................................................................................................................................
Changing The Default Account Passwords At Login32................................................................................................................................................................
The Ethernet Interface On Your Switch33................................................................................................................................................................
Virtual Fabrics And The Ethernet Interface33................................................................................................................................................................
Displaying The Network Interface Settings34................................................................................................................................................................
Static Ethernet Addresses35................................................................................................................................................................
Setting The Static Addresses For The Ethernet Network Interface35................................................................................................................................................................
Dhcp Activation35................................................................................................................................................................
Activating Dhcp36................................................................................................................................................................
Deactivating Dhcp36................................................................................................................................................................
Ipv6 Autoconfiguration37................................................................................................................................................................
Setting Ipv6 Autoconfiguration37................................................................................................................................................................
Date And Time Settings37................................................................................................................................................................
Setting The Date And Time37................................................................................................................................................................
Time Zone Settings38................................................................................................................................................................
Setting The Time Zone38................................................................................................................................................................
Setting The Time Zone Interactively39................................................................................................................................................................
Network Time Protocol39................................................................................................................................................................
Synchronizing The Local Time With An External Source40................................................................................................................................................................
Switch Names40................................................................................................................................................................
Customizing The Switch Name40................................................................................................................................................................
Chassis Names40................................................................................................................................................................
Customizing Chassis Names41................................................................................................................................................................
Setting The Domain Id42................................................................................................................................................................
Domain Ids43................................................................................................................................................................
Licensed Features43................................................................................................................................................................
Icl Licensing45................................................................................................................................................................
License Requirements45................................................................................................................................................................
Time-based Licenses46................................................................................................................................................................
High Availability Considerations46................................................................................................................................................................
Firmware Upgrade And Downgrade Consideration46................................................................................................................................................................
Configupload And Download Considerations46................................................................................................................................................................
Expired Licenses46................................................................................................................................................................
Removing A Licensed Feature48................................................................................................................................................................
List Of Available Ports When Implementing Pods49................................................................................................................................................................
Activating Ports On Demand50................................................................................................................................................................
Ports On Demand51................................................................................................................................................................
Dynamic Ports On Demand52................................................................................................................................................................
Disabling Dynamic Ports On Demand52................................................................................................................................................................
Pod License Management52................................................................................................................................................................
Reserving A Port License52................................................................................................................................................................
Releasing A Port From A Pod Set53................................................................................................................................................................
Switch Activation And Deactivation54................................................................................................................................................................
Disabling A Switch54................................................................................................................................................................
Enabling A Switch54................................................................................................................................................................
Port Activation And Deactivation54................................................................................................................................................................
Disabling A Port55................................................................................................................................................................
Enabling A Port55................................................................................................................................................................
Basic Connections55................................................................................................................................................................
Device Connection56................................................................................................................................................................
Switch Connection56................................................................................................................................................................
Gateway Links56................................................................................................................................................................
Configuring A Link Through A Gateway56................................................................................................................................................................
Equipment Status57................................................................................................................................................................
Checking Switch Operation57................................................................................................................................................................
Verifying High Availability Features (directors And Enterprise-class Platforms Only)57................................................................................................................................................................
Verifying Fabric Connectivity58................................................................................................................................................................
Verifying Device Connectivity59................................................................................................................................................................
Displaying Switches In Access Gateway Mode60................................................................................................................................................................
Track And Control Switch Changes60................................................................................................................................................................
Enabling The Track Changes Feature60................................................................................................................................................................
Displaying The Status Of The Track Changes Feature60................................................................................................................................................................
Viewing The Switch Status Policy Threshold Values61................................................................................................................................................................
Setting The Switch Status Policy Threshold Values61................................................................................................................................................................
Audit Log Configuration62................................................................................................................................................................
Auditable Event Classes63................................................................................................................................................................
Auditcfg Event Class Operands63................................................................................................................................................................
Verifying Host Syslog Prior To Configuring The Audit Log64................................................................................................................................................................
Configuring An Audit Log For Specific Event Classes64................................................................................................................................................................
Switch And Enterprise-class Platform Shutdown65................................................................................................................................................................
Powering Off A Switch65................................................................................................................................................................
Powering Off An Enterprise-class Platform65................................................................................................................................................................
High Availability Of Daemon Processes66................................................................................................................................................................
Daemons That Are Automatically Restarted66................................................................................................................................................................
Managing User Accounts67................................................................................................................................................................
User Accounts Overview67................................................................................................................................................................
Role-based Access Control (rbac)67................................................................................................................................................................
Fabric Os Roles68................................................................................................................................................................
Permission Types68................................................................................................................................................................
Rbac Permissions Matrix69................................................................................................................................................................
Role Permissions70................................................................................................................................................................
The Management Channel70................................................................................................................................................................
Maximum Number Of Simultaneous Sessions70................................................................................................................................................................
Local Database User Accounts71................................................................................................................................................................
Default Accounts71................................................................................................................................................................
Displaying Account Information71................................................................................................................................................................
Creating An Account71................................................................................................................................................................
Default Local User Accounts71................................................................................................................................................................
Deleting An Account72................................................................................................................................................................
Changing Account Parameters73................................................................................................................................................................
Local Account Passwords73................................................................................................................................................................
Changing The Password For The Current Login Account74................................................................................................................................................................
Changing The Password For A Different Account74................................................................................................................................................................
Local Account Database Distribution74................................................................................................................................................................
Distributing The Local User Database74................................................................................................................................................................
Protection Of The Local User Database From Distributions75................................................................................................................................................................
Accepting Distribution Of User Databases On The Local Switch75................................................................................................................................................................
Rejecting Distributed User Databases On The Local Switch75................................................................................................................................................................
Password Policies75................................................................................................................................................................
Password Strength Policy75................................................................................................................................................................
Password History Policy76................................................................................................................................................................
Password Expiration Policy76................................................................................................................................................................
Upgrade And Downgrade Considerations For Password Management77................................................................................................................................................................
Account Lockout Policy77................................................................................................................................................................
Enabling The Admin Lockout Policy78................................................................................................................................................................
Unlocking An Account78................................................................................................................................................................
Disabling The Admin Lockout Policy78................................................................................................................................................................
Denial Of Service Implications78................................................................................................................................................................
With A Recovery String79................................................................................................................................................................
The Boot Prom Password80................................................................................................................................................................
Without A Recovery String81................................................................................................................................................................
Setting The Boot Prom Password For A Switch Without A Recovery String81................................................................................................................................................................
Setting The Boot Prom Password For A Director Without A Recovery String81................................................................................................................................................................
Recovering Forgotten Passwords82................................................................................................................................................................
The Authentication Model83................................................................................................................................................................
Effects Of Using Radius Or Ldap Service On Fabric Os Features83................................................................................................................................................................
Setting The Switch Authentication Mode84................................................................................................................................................................
Authentication Configuration Options84................................................................................................................................................................
Fabric Os User Accounts85................................................................................................................................................................
Syntax For Vsa-based Account Roles85................................................................................................................................................................
Fabric Os Users On The Radius Server86................................................................................................................................................................
Windows 2000 Ias86................................................................................................................................................................
Dictionary.brocade File Entries86................................................................................................................................................................
Linux Freeradius Server88................................................................................................................................................................
The Radius Server90................................................................................................................................................................
Enabling Clients90................................................................................................................................................................
Radius Authentication91................................................................................................................................................................
Rsa Radius Server91................................................................................................................................................................
Setting Up The Rsa Radius Server91................................................................................................................................................................
Ldap Configuration And Microsoft Active Directory93................................................................................................................................................................
Creating A User94................................................................................................................................................................
Creating A Group94................................................................................................................................................................
Assigning The Group (role) To The User94................................................................................................................................................................
Adding An Admin Domain List94................................................................................................................................................................
Authentication Servers On The Switch95................................................................................................................................................................
Displaying The Current Radius Configuration95................................................................................................................................................................
Adding A Radius Server To The Switch Configuration96................................................................................................................................................................
Adding An Ldap Server To The Switch Configuration96................................................................................................................................................................
Enabling And Disabling A Radius Or Ldap Server96................................................................................................................................................................
Deleting A Radius Or Ldap Server From The Configuration97................................................................................................................................................................
Changing A Radius Server Configuration97................................................................................................................................................................
Changing An Ldap Server Configuration97................................................................................................................................................................
Changing The Order In Which Radius Or Ldap Servers Are Contacted For Service97................................................................................................................................................................
Configuring Local Authentication As Backup98................................................................................................................................................................
Configuring Standard Security Features101................................................................................................................................................................
Security Protocols101................................................................................................................................................................
Secure Protocol Support101................................................................................................................................................................
Secure File Copy102................................................................................................................................................................
Setting Up Scp For Configuploads And Downloads102................................................................................................................................................................
Items Needed To Deploy Secure Protocols102................................................................................................................................................................
Main Security Scenarios102................................................................................................................................................................
Simple Network Management Protocol103................................................................................................................................................................
Snmp And Virtual Fabrics104................................................................................................................................................................
Filtering Ports104................................................................................................................................................................
Switch And Chassis Context Enforcement104................................................................................................................................................................
The Security Level104................................................................................................................................................................
The Snmpconfig Command105................................................................................................................................................................
Secure Shell Protocol107................................................................................................................................................................
Ssh Public Key Authentication107................................................................................................................................................................
Allowed-user107................................................................................................................................................................
Configuring Ssh Authentication108................................................................................................................................................................
Deleting Keys On The Switch109................................................................................................................................................................
Secure Sockets Layer Protocol110................................................................................................................................................................
Browser And Java Support110................................................................................................................................................................
Ssl Configuration Overview110................................................................................................................................................................
Ssl Certificate Files110................................................................................................................................................................
Certificate Authorities111................................................................................................................................................................
Generating A Public And Private Key111................................................................................................................................................................
Generating And Storing A Csr111................................................................................................................................................................
Obtaining Certificates112................................................................................................................................................................
Installing A Switch Certificate112................................................................................................................................................................
The Browser112................................................................................................................................................................
Checking And Installing Root Certificates On Internet Explorer113................................................................................................................................................................
Checking And Installing Root Certificates On Mozilla Firefox113................................................................................................................................................................
Root Certificates For The Java Plug-in113................................................................................................................................................................
Installing A Root Certificate To The Java Plug-in113................................................................................................................................................................
Summary Of Certificate Commands114................................................................................................................................................................
Telnet Protocol114................................................................................................................................................................
Blocking Telnet114................................................................................................................................................................
Commands For Displaying And Deleting Ssl Certificates114................................................................................................................................................................
Unblocking Telnet115................................................................................................................................................................
Listener Applications115................................................................................................................................................................
Blocked Listener Applications115................................................................................................................................................................
Ports And Applications Used By Switches116................................................................................................................................................................
Access Defaults116................................................................................................................................................................
Port Configuration117................................................................................................................................................................
Port Information117................................................................................................................................................................
Configuring Advanced Security Features119................................................................................................................................................................
Acl Policies Overview119................................................................................................................................................................
How The Acl Policies Are Stored119................................................................................................................................................................
Security Database Size Restrictions119................................................................................................................................................................
Policy Members120................................................................................................................................................................
Acl Policy Management120................................................................................................................................................................
Valid Methods For Specifying Policy Members120................................................................................................................................................................
Displaying Acl Policies121................................................................................................................................................................
Fcs Policies121................................................................................................................................................................
Fcs Policy States121................................................................................................................................................................
Fcs Policy Restrictions122................................................................................................................................................................
Overview Of Fcs Policy Management122................................................................................................................................................................
Switch Operations122................................................................................................................................................................
Creating An Fcs Policy123................................................................................................................................................................
Modifying The Order Of Fcs Switches123................................................................................................................................................................
Fcs Policy Distribution124................................................................................................................................................................
Dcc Policies125................................................................................................................................................................
Distribution Policy States125................................................................................................................................................................
Dcc Policy States125................................................................................................................................................................
Dcc Policy Restrictions126................................................................................................................................................................
Creating A Dcc Policy126................................................................................................................................................................
Deleting A Dcc Policy127................................................................................................................................................................
Scc Policies127................................................................................................................................................................
Scc Policy States127................................................................................................................................................................
Creating An Scc Policy128................................................................................................................................................................
Acl Policy Modifications128................................................................................................................................................................
Saving Changes Without Activating The Policies128................................................................................................................................................................
Activating Policy Changes128................................................................................................................................................................
Deleting An Acl Policy128................................................................................................................................................................
Member Modification To Existing Policies129................................................................................................................................................................
Adding A Member To An Existing Acl Policy129................................................................................................................................................................
Removing A Member From An Acl Policy129................................................................................................................................................................
Aborting All Unsaved Changes129................................................................................................................................................................
Authentication Policy For Fabric Elements129................................................................................................................................................................
Dh-chap Authentication130................................................................................................................................................................
E_port Authentication131................................................................................................................................................................
Device Authentication Policy132................................................................................................................................................................
Auth Policy Restrictions133................................................................................................................................................................
Supported Hbas133................................................................................................................................................................
Authentication Protocols133................................................................................................................................................................
Viewing The Current Authentication Parameter Settings For A Switch134................................................................................................................................................................
Setting The Authentication Protocol Used By The Switch To Dh-chap134................................................................................................................................................................
Re-authenticating E_ports134................................................................................................................................................................
Secret Key Pairs135................................................................................................................................................................
Viewing The List Of Secret Key Pairs In The Current Switch Database135................................................................................................................................................................
Setting A Secret Key Pair135................................................................................................................................................................
Fabric-wide Distribution Of The Auth Policy136................................................................................................................................................................
Accept Distributions Configuration Parameter136................................................................................................................................................................
Ip Filter Policy137................................................................................................................................................................
Creating An Ip Filter Policy137................................................................................................................................................................
Cloning An Ip Filter Policy137................................................................................................................................................................
Displaying An Ip Filter Policy137................................................................................................................................................................
Saving An Ip Filter Policy138................................................................................................................................................................
Activating An Ip Filter Policy138................................................................................................................................................................
Deleting An Ip Filter Policy138................................................................................................................................................................
Ip Filter Policy Rules138................................................................................................................................................................
Supported Services139................................................................................................................................................................
Implicit Ip Filter Rules139................................................................................................................................................................
Ip Filter Policy Enforcement140................................................................................................................................................................
Adding A Rule To An Ip Filter Policy140................................................................................................................................................................
Default Ip Policy Rules140................................................................................................................................................................
Deleting A Rule To An Ip Filter Policy141................................................................................................................................................................
Aborting A Transaction Associated With Ip Filter141................................................................................................................................................................
Ip Filter Policy Distributions141................................................................................................................................................................
Ip Filter Policy Restrictions141................................................................................................................................................................
Policy Database Distribution141................................................................................................................................................................
Database Distribution Settings142................................................................................................................................................................
Interaction Between Fabric-wide Consistency Policy And Distribution Settings142................................................................................................................................................................
Displaying The Database Distribution Settings143................................................................................................................................................................
Enabling Local Switch Protection143................................................................................................................................................................
Disabling Local Switch Protection143................................................................................................................................................................
Supported Policy Databases143................................................................................................................................................................
Acl Policy Distribution To Other Switches144................................................................................................................................................................
Distributing The Local Acl Policies144................................................................................................................................................................
Fabric-wide Enforcement144................................................................................................................................................................
Acl Policy Database Distribution Behavior144................................................................................................................................................................
Displaying The Fabric-wide Consistency Policy145................................................................................................................................................................
Setting The Fabric-wide Consistency Policy145................................................................................................................................................................
Fabric-wide Consistency Policy Settings145................................................................................................................................................................
Notes On Joining A Switch To The Fabric146................................................................................................................................................................
Matching Fabric-wide Consistency Policies146................................................................................................................................................................
Non-matching Fabric-wide Consistency Policies147................................................................................................................................................................
Merging Fabrics With Matching Fabric-wide Consistency Policies147................................................................................................................................................................
Examples Of Strict Fabric Merges147................................................................................................................................................................
Securing The Management Interface148................................................................................................................................................................
Configuration Examples148................................................................................................................................................................
Endpoint-to-endpoint Transport Or Tunnel148................................................................................................................................................................
Fabric Merges With Tolerant/absent Combinations148................................................................................................................................................................
Gateway-to-gateway Tunnel149................................................................................................................................................................
Endpoint-to-gateway Tunnel149................................................................................................................................................................
Roadwarrior Configuration149................................................................................................................................................................
Protected Endpoints Configuration149................................................................................................................................................................
Gateway Tunnel Configuration149................................................................................................................................................................
Endpoint To Gateway Tunnel Configuration149................................................................................................................................................................
Nested Configurations150................................................................................................................................................................
Ipsec Protocols150................................................................................................................................................................
Security Associations150................................................................................................................................................................
Ipsec Sa-proposal150................................................................................................................................................................
Authentication And Encryption Algorithms150................................................................................................................................................................
Algorithms And Associated Authentication Policies150................................................................................................................................................................
Block Ciphers151................................................................................................................................................................
Hmac151................................................................................................................................................................
Blowfish151................................................................................................................................................................
Null Encryption152................................................................................................................................................................
Ipsec Policies152................................................................................................................................................................
Ipsec Traffic Selector152................................................................................................................................................................
Ipsec Transform152................................................................................................................................................................
Ike Policies152................................................................................................................................................................
Key Management152................................................................................................................................................................
Pre-shared Keys153................................................................................................................................................................
Security Certificates153................................................................................................................................................................
Static Security Associations153................................................................................................................................................................
Creating The Tunnel153................................................................................................................................................................
Example Of An End-to-end Transport Tunnel Mode155................................................................................................................................................................
Fips Support156................................................................................................................................................................
Zeroization Functions156................................................................................................................................................................
Zeroization Behavior156................................................................................................................................................................
Power-on Self Tests157................................................................................................................................................................
Conditional Tests157................................................................................................................................................................
Fips Mode Configuration157................................................................................................................................................................
Ldap In Fips Mode158................................................................................................................................................................
Fips Mode Restrictions158................................................................................................................................................................
Fips And Non-fips Modes Of Operation158................................................................................................................................................................
Setting Up Ldap For Fips Mode159................................................................................................................................................................
Ldap Certificates For Fips Mode160................................................................................................................................................................
Importing An Ldap Switch Certificate160................................................................................................................................................................
Exporting An Ldap Switch Certificate160................................................................................................................................................................
Active Directory Keys To Modify160................................................................................................................................................................
Deleting An Ldap Switch Certificate161................................................................................................................................................................
Preparing The Switch For Fips161................................................................................................................................................................
Overview Of Steps161................................................................................................................................................................
Enabling Fips Mode162................................................................................................................................................................
Disabling Fips Mode163................................................................................................................................................................
Zeroizing For Fips163................................................................................................................................................................
Displaying Fips Configuration163................................................................................................................................................................
Maintaining The Switch Configuration File165................................................................................................................................................................
Configuration Settings165................................................................................................................................................................
Configuration File Format165................................................................................................................................................................
Chassis Section166................................................................................................................................................................
Switch Section167................................................................................................................................................................
Configuration File Backup167................................................................................................................................................................
Uploading A Configuration File In Interactive Mode167................................................................................................................................................................
Configuration File Restoration168................................................................................................................................................................
Restrictions169................................................................................................................................................................
Configuration Download Without Disabling A Switch170................................................................................................................................................................
Restoring A Configuration170................................................................................................................................................................
Cli Commands To Display Or Modify Switch Configuration Information170................................................................................................................................................................
Configurations Across A Fabric172................................................................................................................................................................
Downloading A Configuration File From One Switch To Another Same Model Switch173................................................................................................................................................................
Security Considerations173................................................................................................................................................................
Configuration Restoration In A Ficon Environment173................................................................................................................................................................
Backup And Restore In A Ficon Cup Environment173................................................................................................................................................................
B-series Configuration Form174................................................................................................................................................................
B-series Configuration And Connection174................................................................................................................................................................
Managing Virtual Fabrics175................................................................................................................................................................
Virtual Fabrics Overview175................................................................................................................................................................
Logical Switch175................................................................................................................................................................
Default Logical Switch175................................................................................................................................................................
Logical Switches And Fabric Ids176................................................................................................................................................................
Switch Before And After Enabling Virtual Fabrics176................................................................................................................................................................
Switch Before And After Creating Logical Switches176................................................................................................................................................................
Port Assignment In Logical Switches177................................................................................................................................................................
Fabric Ids Assigned To Logical Switches177................................................................................................................................................................
Assigning Ports To Logical Switches177................................................................................................................................................................
Logical Switches And Connected Devices178................................................................................................................................................................
Logical Switches Connected To Devices And Non-virtual Fabrics Switch178................................................................................................................................................................
Logical Fabric179................................................................................................................................................................
Logical Fabric And Isls179................................................................................................................................................................
Logical Switches In A Single Chassis Belonging To Separate Fabrics179................................................................................................................................................................
Logical Switches Connected To Other Logical Switches Through Physical Isls179................................................................................................................................................................
Logical Fabric And Isl Sharing180................................................................................................................................................................
Logical Switches Connected To Form Logical Fabrics180................................................................................................................................................................
Base Switches Connected By An Xisl181................................................................................................................................................................
Logical Isls Connecting Logical Switches181................................................................................................................................................................
Logical Fabric Formation182................................................................................................................................................................
Management Model For Logical Switches182................................................................................................................................................................
Logical Fabric Using Isls And Xisls182................................................................................................................................................................
Account Management And Virtual Fabrics183................................................................................................................................................................
Supported Platforms For Virtual Fabrics183................................................................................................................................................................
Switch183................................................................................................................................................................
Dc04 San Director184................................................................................................................................................................
Virtual Fabrics Interaction With Other Fabric Os Features184................................................................................................................................................................
Virtual Fabrics Interaction With Fabric Os Features184................................................................................................................................................................
Limitations And Restrictions Of Virtual Fabrics185................................................................................................................................................................
Maximum Number Of Logical Switches Per Chassis185................................................................................................................................................................
Enabling Virtual Fabrics186................................................................................................................................................................
Disabling Virtual Fabrics186................................................................................................................................................................
Creating A Logical Switch Or Base Switch187................................................................................................................................................................
Deleting A Logical Switch188................................................................................................................................................................
Adding And Removing Ports On A Logical Switch188................................................................................................................................................................
Displaying Logical Switch Configuration189................................................................................................................................................................
Changing The Fabric Id Of A Logical Switch189................................................................................................................................................................
Changing A Logical Switch To A Base Switch189................................................................................................................................................................
Configuring A Logical Switch For Xisl Use189................................................................................................................................................................
Changing The Context To A Different Logical Fabric190................................................................................................................................................................
Creating A Logical Fabric Using Xisls190................................................................................................................................................................
Example Of Logical Fabrics In Multiple Chassis And Xisls191................................................................................................................................................................
Managing Administrative Domains193................................................................................................................................................................
Administrative Domains Overview193................................................................................................................................................................
Admin Domain Features194................................................................................................................................................................
Fabric With Two Admin Domains194................................................................................................................................................................
Filtered Fabric Views When Using Admin Domains194................................................................................................................................................................
Requirements For Admin Domains195................................................................................................................................................................
Admin Domain Access Levels195................................................................................................................................................................
User-defined Administrative Domains196................................................................................................................................................................
System-defined Administrative Domains196................................................................................................................................................................
Ad User Types196................................................................................................................................................................
Ad255197................................................................................................................................................................
Admin Domains And Login197................................................................................................................................................................
Fabric With Ad0 And Ad255197................................................................................................................................................................
Admin Domain Member Types198................................................................................................................................................................
Device Members198................................................................................................................................................................
Switch Port Members198................................................................................................................................................................
Switch Members199................................................................................................................................................................
Admin Domains And Switch Wwn199................................................................................................................................................................
Admin Domain Compatibility, Availability, And Merging200................................................................................................................................................................
Fabric Showing Switch And Device Wwns200................................................................................................................................................................
Filtered Fabric Views Showing Converted Switch Wwns200................................................................................................................................................................
Firmware Upgrade Considerations201................................................................................................................................................................
Admin Domain Management For Physical Fabric Administrators201................................................................................................................................................................
Isolated Subfabrics201................................................................................................................................................................
Setting The Default Zone Mode202................................................................................................................................................................
Creating An Admin Domain202................................................................................................................................................................
Assigning A User To An Admin Domain203................................................................................................................................................................
Creating A New User Account For Managing Admin Domains204................................................................................................................................................................
Assigning Admin Domains To An Existing User Account204................................................................................................................................................................
Creating A New Physical Fabric Administrator User Account204................................................................................................................................................................
Removing An Admin Domain From A User Account204................................................................................................................................................................
Activating An Admin Domain205................................................................................................................................................................
Deactivating An Admin Domain205................................................................................................................................................................
Adding Members To An Existing Admin Domainconnect To An Ad-capable Switch And Log In As Admin206................................................................................................................................................................
Removing Members From An Admin Domain206................................................................................................................................................................
Renaming An Admin Domain207................................................................................................................................................................
Deleting An Admin Domain207................................................................................................................................................................
Deleting All User-defined Admin Domains208................................................................................................................................................................
Validating An Admin Domain Member List208................................................................................................................................................................
San Management With Admin Domains209................................................................................................................................................................
Cli Commands In An Ad Context209................................................................................................................................................................
Ports And Devices In Cli Output209................................................................................................................................................................
Executing A Command In A Different Ad Context210................................................................................................................................................................
Displaying An Admin Domain Configuration210................................................................................................................................................................
Switching To A Different Admin Domain Context210................................................................................................................................................................
Admin Domain Interactions With Other Fabric Os Features211................................................................................................................................................................
Admin Domain Interaction With Fabric Os Features211................................................................................................................................................................
Admin Domains, Zones, And Zone Databases212................................................................................................................................................................
Admin Domains And Lsan Zones213................................................................................................................................................................
Configuration Upload And Download In An Ad Context214................................................................................................................................................................
Configuration Upload And Download Scenarios In An Ad Context214................................................................................................................................................................
Installing And Maintaining Firmware215................................................................................................................................................................
Firmware Download Process Overview215................................................................................................................................................................
Upgrading And Downgrading Firmware216................................................................................................................................................................
Effects Of Firmware Changes On Accounts And Passwords216................................................................................................................................................................
Considerations For Ficon Cup Environments216................................................................................................................................................................
High Available Sync State217................................................................................................................................................................
Preparing For A Firmware Download217................................................................................................................................................................
Enterprise-class Platform Ha Sync States217................................................................................................................................................................
Connected Switches218................................................................................................................................................................
Finding The Switch Firmware Version218................................................................................................................................................................
Obtain And Decompress Firmware219................................................................................................................................................................
Firmware Download On Switches219................................................................................................................................................................
Switch Firmware Download Process Overview219................................................................................................................................................................
Upgrading Firmware For Switch And Router Products220................................................................................................................................................................
Firmware Download On An Enterprise-class Platform221................................................................................................................................................................
Enterprise-class Platform Firmware Download Process Overview222................................................................................................................................................................
Upgrading Firmware On Enterprise-class Platforms (including Blades)222................................................................................................................................................................
Firmware Download From A Usb Device226................................................................................................................................................................
Enabling Usb226................................................................................................................................................................
Viewing The Usb File System226................................................................................................................................................................
Downloading The 6.2.0 Image Using The Relative Path227................................................................................................................................................................
Downloading The 6.2.0 Image Using The Absolute Path227................................................................................................................................................................
Public And Private Key Management227................................................................................................................................................................
Updating The Firmwarekey228................................................................................................................................................................
The Firmwaredownload Command228................................................................................................................................................................
Configuring The Switch For Signed Firmware228................................................................................................................................................................
Power-on Firmware Checksum Test229................................................................................................................................................................
Test And Restore Firmware On Switches229................................................................................................................................................................
Testing A Different Firmware Version On A Switch229................................................................................................................................................................
Test And Restore Firmware On Enterprise-class Platforms230................................................................................................................................................................
Testing Different Firmware Versions On Enterprise-class Platforms230................................................................................................................................................................
Validating A Firmware Download233................................................................................................................................................................
Administering Advanced Zoning235................................................................................................................................................................
Zoning Overview235................................................................................................................................................................
Zoning Example235................................................................................................................................................................
Zone Types236................................................................................................................................................................
Types Of Zoning236................................................................................................................................................................
Approaches To Fabric-based Zoning236................................................................................................................................................................
Zone Objects237................................................................................................................................................................
Zoning Schemes238................................................................................................................................................................
Zone Aliases238................................................................................................................................................................
Zone Configurations238................................................................................................................................................................
Zoning Enforcement239................................................................................................................................................................
Software-enforced Zoning239................................................................................................................................................................
Hardware-enforced Zoning239................................................................................................................................................................
Hardware-enforced Nonoverlapping Zones241................................................................................................................................................................
Enforcing Hardware Zoning241................................................................................................................................................................
Identifying The Enforced Zone Type242................................................................................................................................................................
Hardware-enforced Overlapping Zones242................................................................................................................................................................
Zoning With Hardware Assist (mixed-port And Wwn Zones)242................................................................................................................................................................
Session-based Hard Zoning242................................................................................................................................................................
Considerations For Zoning Architecture243................................................................................................................................................................
Best Practices For Zoning243................................................................................................................................................................
Broadcast Zones243................................................................................................................................................................
Supported Switches For Broadcast Zones244................................................................................................................................................................
Broadcast Zones And Admin Domains244................................................................................................................................................................
Broadcast Zones And Fc-fc Routing245................................................................................................................................................................
Upgrade And Downgrade Considerations For Broadcast Zones245................................................................................................................................................................
High Availability Considerations With Broadcast Zones245................................................................................................................................................................
Loop Devices And Broadcast Zones246................................................................................................................................................................
Backward Compatibility With Pre-5.3.0 Switches246................................................................................................................................................................
Broadcast Zones And Default Zoning246................................................................................................................................................................
Creating An Alias246................................................................................................................................................................
Adding Members To An Alias247................................................................................................................................................................
Removing Members From An Alias247................................................................................................................................................................
Deleting An Alias248................................................................................................................................................................
Viewing An Alias In The Defined Configuration249................................................................................................................................................................
Zone Creation And Maintenance249................................................................................................................................................................
Creating A Zone249................................................................................................................................................................
Adding Devices (members) To A Zone250................................................................................................................................................................
Removing Devices (members) From A Zone250................................................................................................................................................................
Deleting A Zone251................................................................................................................................................................
Viewing A Zone In The Defined Configuration251................................................................................................................................................................
Validating A Zone252................................................................................................................................................................
Default Zoning Mode253................................................................................................................................................................
Setting The Default Zoning Mode253................................................................................................................................................................
Viewing The Current Default Zone Access Mode253................................................................................................................................................................
Zoning Database Size And Zone Merging254................................................................................................................................................................
Zoning Database Limitations254................................................................................................................................................................
Resulting Database Size: 0 To 96k254................................................................................................................................................................
Resulting Database Size: 96k To 128k255................................................................................................................................................................
Resulting Database Size: 128k To 256k255................................................................................................................................................................
Zoning Configurations256................................................................................................................................................................
Resulting Database Size: 256k To 1m256................................................................................................................................................................
Creating A Zoning Configuration257................................................................................................................................................................
Adding Zones (members) To A Zoning Configuration257................................................................................................................................................................
Removing Zones (members) From A Zone Configuration258................................................................................................................................................................
Enabling A Zone Configuration258................................................................................................................................................................
Disabling A Zone Configuration258................................................................................................................................................................
Deleting A Zone Configuration259................................................................................................................................................................
Clearing Changes To A Configuration259................................................................................................................................................................
Viewing All Zone Configuration Information259................................................................................................................................................................
Viewing Selected Zone Configuration Information260................................................................................................................................................................
Viewing The Configuration In The Effective Zone Database260................................................................................................................................................................
Clearing All Zone Configurations261................................................................................................................................................................
Zone Object Maintenance261................................................................................................................................................................
Copying A Zone Object261................................................................................................................................................................
Deleting A Zone Object262................................................................................................................................................................
Renaming A Zone Object263................................................................................................................................................................
Zoning Configuration Management263................................................................................................................................................................
New Switch Or Fabric Additions263................................................................................................................................................................
Fabric Segmentation And Zoning265................................................................................................................................................................
Security And Zoning265................................................................................................................................................................
Resolving Zone Conflicts265................................................................................................................................................................
Zone Merging Scenarios266................................................................................................................................................................
Configuring Enterprise-class Platforms269................................................................................................................................................................
Ports269................................................................................................................................................................
Port Identification By Slot And Port Number270................................................................................................................................................................
Port Identification By Port Area Id271................................................................................................................................................................
Port Identification By Index271................................................................................................................................................................
Default Index/area_id Core Pid Assignment With No Port Swap271................................................................................................................................................................
Power Conservation274................................................................................................................................................................
69 Default Index/area_id Core Pid Assignment With No Port Swap For The Hp Storageworks Dc04 San Director274................................................................................................................................................................
Powering Off A Port Blade275................................................................................................................................................................
Powering On A Port Blade275................................................................................................................................................................
Disabling And Enabling Port Blades275................................................................................................................................................................
Disabling Port Blades275................................................................................................................................................................
Enabling Port Blades275................................................................................................................................................................
B-series Multi-protocol Router Blade Enabling Exceptions275................................................................................................................................................................
Hp Storageworks 4/256 San Director 48 Port 4gb Blade And Hp Storageworks San Director 48 Port 8gb Fc Blade Enabling Exceptions277................................................................................................................................................................
Blade Terminology And Compatibility277................................................................................................................................................................
Hp Storageworks Enterprise-class Platform Terminology And Abbreviations277................................................................................................................................................................
Cp Blades279................................................................................................................................................................
Core Blades280................................................................................................................................................................
Port And Application Blade Compatibility280................................................................................................................................................................
Port Blades Supported By Each Platform280................................................................................................................................................................
Displaying Slot Information281................................................................................................................................................................
Inter-chassis Links282................................................................................................................................................................
Led Behavior283................................................................................................................................................................
Routing Traffic285................................................................................................................................................................
Routing Overview285................................................................................................................................................................
Path Versus Route Selection285................................................................................................................................................................
Fspf285................................................................................................................................................................
Routing Policies286................................................................................................................................................................
Displaying The Current Routing Policy287................................................................................................................................................................
Exchange-based Routing287................................................................................................................................................................
Port-based Routing287................................................................................................................................................................
Ap Route Policy288................................................................................................................................................................
Routing In Virtual Fabrics288................................................................................................................................................................
Setting The Routing Policy288................................................................................................................................................................
Setting Up The Ap Route Policy288................................................................................................................................................................
Route Selection288................................................................................................................................................................
Dynamic Load Sharing289................................................................................................................................................................
Setting Dls289................................................................................................................................................................
Static Route Assignment289................................................................................................................................................................
Assigning A Static Route290................................................................................................................................................................
Removing A Static Route290................................................................................................................................................................
Frame Order Delivery290................................................................................................................................................................
Interoperability For Merged Sans293................................................................................................................................................................
Configuring The Distributed Management Server295................................................................................................................................................................
Distributed Management Server Overview295................................................................................................................................................................
Platform Services295................................................................................................................................................................
Platform Services In A Virtual Fabric295................................................................................................................................................................
Enabling Platform Services296................................................................................................................................................................
Disabling Platform Services296................................................................................................................................................................
Management Server Database296................................................................................................................................................................
Displaying The Management Server Acl296................................................................................................................................................................
Adding A Member To The Acl297................................................................................................................................................................
Deleting A Member From The Acl298................................................................................................................................................................
Viewing The Contents Of The Management Server Database299................................................................................................................................................................
Clearing The Management Server Database300................................................................................................................................................................
Topology Discovery300................................................................................................................................................................
Displaying Topology Discovery Status300................................................................................................................................................................
Enabling Topology Discovery300................................................................................................................................................................
Disabling Topology Discovery301................................................................................................................................................................
Iscsi Gateway Service303................................................................................................................................................................
Iscsi Gateway Service Overview303................................................................................................................................................................
Iscsi Session Translation303................................................................................................................................................................
Iscsi Gateway Network303................................................................................................................................................................
Iscsi Gateway Service Basic Implementation303................................................................................................................................................................
Basic Vs. Advanced Lun Mapping304................................................................................................................................................................
Basic Lun Mapping304................................................................................................................................................................
Advanced Lun Mapping304................................................................................................................................................................
Iscsi-to-fc Translation304................................................................................................................................................................
Iscsi Vt Basic Lun Mapping304................................................................................................................................................................
Iscsi Component Identification305................................................................................................................................................................
Iqn Prefix305................................................................................................................................................................
Iscsi Vt Advanced Lun Mapping305................................................................................................................................................................
Changing And Displaying The Iqn Prefix306................................................................................................................................................................
Access Control With Discovery Domains306................................................................................................................................................................
Iqn Example306................................................................................................................................................................
Switch-to-iscsi Initiator Authentication307................................................................................................................................................................
Load Balancing Through Connection Redirection307................................................................................................................................................................
Enabling And Disabling Connection Redirection For Load Balancing307................................................................................................................................................................
Discovery Domain Set Configuration Example307................................................................................................................................................................
Displaying Connection Redirection Status308................................................................................................................................................................
Supported Iscsi Initiators308................................................................................................................................................................
Checklist For Configuring Iscsi308................................................................................................................................................................
Iscsi Target Gateway Configuration Steps309................................................................................................................................................................
Hp Storageworks B-series Iscsi Director Blade Configuration310................................................................................................................................................................
Hp Storageworks B-series Iscsi Director Blade Port Numbering310................................................................................................................................................................
Enabling The Iscsi Gateway Service311................................................................................................................................................................
Hp Storageworks B-series Iscsi Director Blade Ports311................................................................................................................................................................
Enabling Gbe Ports312................................................................................................................................................................
Configuring The Gbe Interface313................................................................................................................................................................
Iscsi Virtual Target Configuration314................................................................................................................................................................
Automatic Iscsi Vt Creation314................................................................................................................................................................
Generating Iscsi Vts For Every Fc Target314................................................................................................................................................................
Generating An Iscsi Vt For A Specific Fc Target317................................................................................................................................................................
Manual Iscsi Vt Creation317................................................................................................................................................................
Mapping Luns On A Specific Port To An Iscsi Vt319................................................................................................................................................................
Deleting Luns From An Iscsi Vt320................................................................................................................................................................
Displaying The Iscsi Virtual Target Lun Map320................................................................................................................................................................
Displaying Iscsi Vt State And Status320................................................................................................................................................................
Discovery Domain And Domain Set Configuration321................................................................................................................................................................
Displaying Iscsi Initiator Iqns321................................................................................................................................................................
Creating Discovery Domains321................................................................................................................................................................
Creating And Enabling A Discovery Domain Sets322................................................................................................................................................................
Iscsi Initiator-to-vt Authentication Configuration322................................................................................................................................................................
Setting The User Name And Shared Secret322................................................................................................................................................................
Binding User Names To An Iscsi Vt323................................................................................................................................................................
Deleting User Names From An Iscsi Vt Binding List323................................................................................................................................................................
Displaying Chap Configurations323................................................................................................................................................................
Committing The Iscsi-related Configuration324................................................................................................................................................................
Resolving Conflicts Between Iscsi Configurations324................................................................................................................................................................
Lun Masking Considerations325................................................................................................................................................................
Iscsi Fc Zoning Overview325................................................................................................................................................................
Iscsi Gateway Service In An Iscsi Fc Zone326................................................................................................................................................................
Iscsi Fc Zone Creation327................................................................................................................................................................
Creating An Iscsi Fc Zone327................................................................................................................................................................
Zoning Configuration Creation330................................................................................................................................................................
Creating And Enabling A Zoning Configuration330................................................................................................................................................................
Isns Client Service Configuration331................................................................................................................................................................
Displaying Isns Client Service Status331................................................................................................................................................................
Enabling The Isns Client Service331................................................................................................................................................................
Iscsi Network With Isns Server And Clients331................................................................................................................................................................
Disabling The Isns Client Service333................................................................................................................................................................
Clearing The Isns Client Configuration333................................................................................................................................................................
Administering Npiv335................................................................................................................................................................
Npiv Overview335................................................................................................................................................................
Fixed Addressing Mode335................................................................................................................................................................
Bit Addressing Mode335................................................................................................................................................................
Enabling And Disabling Npiv335................................................................................................................................................................
Configuring Npiv336................................................................................................................................................................
Configuration Scenarios337................................................................................................................................................................
Viewing Npiv Port Configuration Information337................................................................................................................................................................
Viewing Virtual Pid Login Information338................................................................................................................................................................
Optimizing Fabric Behavior341................................................................................................................................................................
Adaptive Networking Overview341................................................................................................................................................................
Traffic Isolation Routing341................................................................................................................................................................
Ti Zone Failover342................................................................................................................................................................
Traffic Isolation Zone Creating A Dedicated Path Through The Fabric342................................................................................................................................................................
Comparison Of Traffic Behavior When Failover Is Enabled Or Disabled In Ti Zones342................................................................................................................................................................
Additional Considerations When Disabling Failover343................................................................................................................................................................
Fspf Routing Rules And Traffic Isolation343................................................................................................................................................................
Fabric Incorrectly Configured For Ti Zone With Failover Disabled343................................................................................................................................................................
Traffic Isolation Routing Over Fc Routers344................................................................................................................................................................
Dedicated Path Is The Shortest Path344................................................................................................................................................................
Dedicated Path Is Not The Shortest Path344................................................................................................................................................................
Ti Within An Edge Fabric345................................................................................................................................................................
Traffic Isolation Routing Over Fcr345................................................................................................................................................................
Ti Within A Backbone Fabric346................................................................................................................................................................
Ti Zone In An Edge Fabric346................................................................................................................................................................
Limitations Of Ti Zones Over Fc Routers347................................................................................................................................................................
Ti Zone In A Backbone Fabric347................................................................................................................................................................
General Rules For Ti Zones348................................................................................................................................................................
Supported Configurations For Traffic Isolation Routing348................................................................................................................................................................
Misconfigured Ti Zone348................................................................................................................................................................
Trunking With Ti Zones349................................................................................................................................................................
Limitations And Restrictions Of Traffic Isolation Routing349................................................................................................................................................................
Admin Domain Considerations For Traffic Isolation Routing349................................................................................................................................................................
Virtual Fabric Considerations For Traffic Isolation Routing350................................................................................................................................................................
Dedicated Path With Virtual Fabrics350................................................................................................................................................................
Creating A Ti Zone In A Logical Fabric350................................................................................................................................................................
Traffic Isolation Routing Over Fc Routers With Virtual Fabrics351................................................................................................................................................................
Creating A Ti Zone In A Base Fabric351................................................................................................................................................................
Creating A Ti Zone352................................................................................................................................................................
Example Configuration For Ti Zones Over Fc Routers In Logical Fabrics352................................................................................................................................................................
Logical Representation Of Ti Zones Over Fc Routers In Logical Fabrics352................................................................................................................................................................
Examples Of Creating A Ti Zone353................................................................................................................................................................
Modifying Ti Zones355................................................................................................................................................................
Examples Of Modifying A Ti Zone355................................................................................................................................................................
Changing The State Of A Ti Zone356................................................................................................................................................................
Examples Of Setting The State Of A Ti Zone356................................................................................................................................................................
Deleting A Ti Zone356................................................................................................................................................................
Example Of Deleting A Ti Zone357................................................................................................................................................................
Displaying Ti Zones357................................................................................................................................................................
Setting Up Ti Over Fcr (sample Procedure)358................................................................................................................................................................
Ti Over Fcr Example358................................................................................................................................................................
Qos: Ingress Rate Limiting361................................................................................................................................................................
Limiting Traffic From A Particular Device362................................................................................................................................................................
Disabling Ingress Rate Limiting363................................................................................................................................................................
Qos: Sid/did Traffic Prioritization363................................................................................................................................................................
Qos Zones363................................................................................................................................................................
Virtual Channels Assigned To Qos Priority363................................................................................................................................................................
Qos On E_ports364................................................................................................................................................................
Qos Traffic Prioritization364................................................................................................................................................................
Virtual Fabric Considerations For Traffic Prioritization365................................................................................................................................................................
Qos With E_ports Enabled365................................................................................................................................................................
Supported Configurations For Traffic Prioritization366................................................................................................................................................................
Traffic Prioritization In A Logical Fabric366................................................................................................................................................................
Limitations And Restrictions For Traffic Prioritization367................................................................................................................................................................
Setting Traffic Prioritization367................................................................................................................................................................
Using The Fc-fc Routing Service369................................................................................................................................................................
Fc-fc Routing Service Overview369................................................................................................................................................................
Supported Platforms For Fibre Channel Routing369................................................................................................................................................................
Supported Configurations369................................................................................................................................................................
Integrated Routing370................................................................................................................................................................
Fibre Channel Routing Concepts370................................................................................................................................................................
A Metasan With Interfabric Links371................................................................................................................................................................
A Metasan With Edge-to-edge And Backbone Fabrics And Lsan Zones372................................................................................................................................................................
Proxy Devices373................................................................................................................................................................
Edge Sans Connected Through A Backbone Fabric373................................................................................................................................................................
Routing Types374................................................................................................................................................................
Phantom Domains374................................................................................................................................................................
Metasan With Imported Devices374................................................................................................................................................................
Sample Topology (physical Topology)375................................................................................................................................................................
Fibre Channel Network Address Translation376................................................................................................................................................................
Ex_port Phantom Switch Topology376................................................................................................................................................................
Setting Up The Fc–fc Routing Service377................................................................................................................................................................
Verifying The Setup For Fc–fc Routing377................................................................................................................................................................
Backbone Fids379................................................................................................................................................................
Assigning Backbone Fids380................................................................................................................................................................
Fcip Tunnel Configuration380................................................................................................................................................................
Interfabric Link Configuration380................................................................................................................................................................
Configuring An Ifl For Both Edge And Backbone Connections381................................................................................................................................................................
Fc Router Port Cost Configuration385................................................................................................................................................................
Port Cost Considerations385................................................................................................................................................................
Upgrade, Downgrade, And Ha Considerations For Router Port Cost386................................................................................................................................................................
Setting Router Port Cost For An Ex_port386................................................................................................................................................................
Ex_port Frame Trunking Configuration386................................................................................................................................................................
Supported Configurations And Platforms387................................................................................................................................................................
High Availability Support387................................................................................................................................................................
Backward Compatibility Support387................................................................................................................................................................
Configuring Ex_port Frame Trunking387................................................................................................................................................................
Displaying Ex_port Trunking Information388................................................................................................................................................................
Lsan Zone Configuration388................................................................................................................................................................
Use Of Administrative Domains With Lsan Zones And Fcr388................................................................................................................................................................
Zone Definition And Naming388................................................................................................................................................................
Lsan Zones And Fabric-to-fabric Communications389................................................................................................................................................................
Controlling Device Communication With The Lsan (sample Procedure)389................................................................................................................................................................
Setting The Maximum Lsan Count391................................................................................................................................................................
Configuring Backbone Fabrics For Interconnectivity392................................................................................................................................................................
Ha And Downgrade Considerations For Lsan Zones392................................................................................................................................................................
Lsan Zone Policies Using Lsan Tagging392................................................................................................................................................................
Enforce Tag392................................................................................................................................................................
Speed Tag393................................................................................................................................................................
Rules For Lsan Tagging394................................................................................................................................................................
Configuring An Enforce Lsan Tag394................................................................................................................................................................
Example Of Setting Up Speed Lsan Tag394................................................................................................................................................................
Configuring A Speed Lsan Tag395................................................................................................................................................................
Removing An Lsan Tag395................................................................................................................................................................
Displaying The Lsan Tag Configuration395................................................................................................................................................................
Lsan Zone Binding396................................................................................................................................................................
How Lsan Zone Binding Works397................................................................................................................................................................
Lsan Information Stored In Each Fc Router With And Without Lsan Zone Binding397................................................................................................................................................................
Fc Router Matrix Definition398................................................................................................................................................................
Lsan Fabric Matrix Definition398................................................................................................................................................................
Upgrade, Downgrade, And Ha Considerations For Lsan Zone Binding398................................................................................................................................................................
Setting Up Lsan Zone Binding399................................................................................................................................................................
Viewing The Lsan Zone Binding Matrixes399................................................................................................................................................................
Proxy Pid Configuration399................................................................................................................................................................
Fabric Parameter Considerations400................................................................................................................................................................
Inter-fabric Broadcast Frames400................................................................................................................................................................
Displaying The Current Broadcast Configuration401................................................................................................................................................................
Enabling Broadcast Frame Forwarding401................................................................................................................................................................
Disabling Broadcast Frame Forwarding401................................................................................................................................................................
Resource Monitoring401................................................................................................................................................................
Fc-fc Routing And Virtual Fabrics403................................................................................................................................................................
Logical Switch Configuration For Fc Routing403................................................................................................................................................................
Backbone-to-edge Routing With Virtual Fabrics404................................................................................................................................................................
Ex_ports In A Base Switch404................................................................................................................................................................
Logical Representation Of Ex_ports In A Base Switch404................................................................................................................................................................
Upgrade And Downgrade Considerations For Fc-fc Routing405................................................................................................................................................................
How Replacing Port Blades Affects Ex_port Configuration405................................................................................................................................................................
Interoperability With Legacy Fcr Switches405................................................................................................................................................................
Backbone-to-edge Routing Across Base Switch Using Fc Router In Legacy Mode405................................................................................................................................................................
Range Of Output Ports406................................................................................................................................................................
Displaying The Range Of Output Ports Connected To The Xlate Domains406................................................................................................................................................................
Verifying Normal Operation Of Front Domain Consolidation406................................................................................................................................................................
Administering Advanced Performance Monitoring409................................................................................................................................................................
Advanced Performance Monitoring Overview409................................................................................................................................................................
End-to-end Monitors409................................................................................................................................................................
Types Of Monitors Supported On Hp Storageworks Switch Models409................................................................................................................................................................
End-to-end Performance Monitoring410................................................................................................................................................................
Number Of Logical Switches That Support Performance Monitors410................................................................................................................................................................
Adding End-to-end Monitors411................................................................................................................................................................
Monitoring The Traffic From Host A To Dev B412................................................................................................................................................................
Monitoring The Traffic From Dev B To Host A412................................................................................................................................................................
Setting End-to-end Monitors On A Port412................................................................................................................................................................
Proper Placement Of End-to-end Performance Monitors412................................................................................................................................................................
Setting A Mask For An End-to-end Monitor413................................................................................................................................................................
Deleting End-to-end Monitors414................................................................................................................................................................
Filter-based Performance Monitoring414................................................................................................................................................................
Mask Positions For End-to-end Monitors414................................................................................................................................................................
Adding Standard Filter-based Monitors415................................................................................................................................................................
Custom Filter-based Monitors416................................................................................................................................................................
Adding Custom Filter-based Monitors417................................................................................................................................................................
Deleting Filter-based Monitors417................................................................................................................................................................
Isl Performance Monitoring417................................................................................................................................................................
Predefined Values At Offset 0417................................................................................................................................................................
Top Talker Monitors418................................................................................................................................................................
Adding A Top Talker Monitor On An F_port419................................................................................................................................................................
Deleting A Top Talker Monitor On An F_port419................................................................................................................................................................
Displaying The Top N Bandwidth-using Flows On An F_port419................................................................................................................................................................
Adding Top Talker Monitors On All Switches In The Fabric (fabric Mode)420................................................................................................................................................................
Deleting The Fabric Mode Top Talker Monitors421................................................................................................................................................................
Displaying Top Talking Flows For A Given Domain Id (fabric Mode)421................................................................................................................................................................
Limitations Of Top Talker Monitors421................................................................................................................................................................
Trunk Monitoring422................................................................................................................................................................
Displaying Monitor Counters422................................................................................................................................................................
Clearing Monitor Counters424................................................................................................................................................................
Saving And Restoring Monitor Configurations425................................................................................................................................................................
Performance Data Collection426................................................................................................................................................................
Administering Extended Fabrics427................................................................................................................................................................
Licensing For Extended Fabrics427................................................................................................................................................................
Extended Fibre Channel Over Distance427................................................................................................................................................................
Distance Levels For Extended Inter-switch Links427................................................................................................................................................................
Buffer-to-buffer Credits427................................................................................................................................................................
Fibre Channel Data Frames428................................................................................................................................................................
Fc Switch Port Buffer Credit Requirements For Long-distance Calculations429................................................................................................................................................................
Determining How Many Ports Can Be Used For Long Distance429................................................................................................................................................................
Buffer Credits429................................................................................................................................................................
Displaying The Remaining Buffers In A Port Group430................................................................................................................................................................
Example: Consider The Hp Storageworks 8/8 And 8/24 San Switches, Which Have A Single 24-port Port Group And A Total Of 676 Buffer Credits For That Port Group430................................................................................................................................................................
Supported Distances431................................................................................................................................................................
Buffer Credit Recovery433................................................................................................................................................................
Fabric Considerations For Buffer Credit Management434................................................................................................................................................................
Configuring F_port Buffer Credits434................................................................................................................................................................
Configuring Ports To Support Long Distance434................................................................................................................................................................
Enabling Long Distance When Connecting To Time-division Multiplexing Devices435................................................................................................................................................................
Extended Fabrics Device Limitations436................................................................................................................................................................
Configuring An Extended Isl436................................................................................................................................................................
Administering Isl Trunking436................................................................................................................................................................
Isl Trunking Overview439................................................................................................................................................................
Distribution Of Traffic Over Isl Trunking Groups439................................................................................................................................................................
Standard Trunking Criteria440................................................................................................................................................................
Fabric Considerations For Isl Trunking440................................................................................................................................................................
Initializing Trunking On Ports441................................................................................................................................................................
Disabling And Re-enabling Ports441................................................................................................................................................................
Lossless Dynamic Load Sharing On Trunk Ports441................................................................................................................................................................
Configuring Lossless Dynamic Load Sharing On Trunk Ports442................................................................................................................................................................
Lossless Dynamic Load Sharing In Virtual Fabrics442................................................................................................................................................................
Example: How Dls Affects Other Logical Switches In The Fabric442................................................................................................................................................................
Performance Monitoring442................................................................................................................................................................
Isl Trunking442................................................................................................................................................................
Adding A Monitor To An F_port Master Port443................................................................................................................................................................
Displaying Port Throughput Performance Information For All Ports On The Switch443................................................................................................................................................................
Enabling Or Disabling Isl Trunking On A Port444................................................................................................................................................................
Enabling Or Disabling Isl Trunking For All Ports On A Switch444................................................................................................................................................................
Setting Port Speeds444................................................................................................................................................................
Long-distance Mode Definitions445................................................................................................................................................................
Setting The Same Speed For All Ports On The Switch446................................................................................................................................................................
Displaying Trunking Information447................................................................................................................................................................
Trunking Over Extended Fabrics447................................................................................................................................................................
Trunking Distances447................................................................................................................................................................
F_port Masterless Trunking448................................................................................................................................................................
Trunking Over Distance For The Hp Storageworks 4/256 San Director With Supported Blades448................................................................................................................................................................
F_port Trunking Considerations449................................................................................................................................................................
Switch In Access Gateway Mode Without F_port Trunking449................................................................................................................................................................
Switch In Access Gateway Mode With F_port Masterless Trunking449................................................................................................................................................................
F_port Masterless Trunking Considerations450................................................................................................................................................................
Setting Up F_port Trunking452................................................................................................................................................................
Pwwn Format For F_port And N_port Trunk Ports452................................................................................................................................................................
Assigning A Trunk Area453................................................................................................................................................................
Trunk Group Configuration For The Hp Storageworks 8/40 San Switch453................................................................................................................................................................
Address Identifier453................................................................................................................................................................
Enabling F_port Trunking454................................................................................................................................................................
Enabling The Dcc Policy On A Trunk Area456................................................................................................................................................................
Disabling F_port Trunking456................................................................................................................................................................
F_port Trunking Monitoring456................................................................................................................................................................
Configuration Management For Trunk Areas457................................................................................................................................................................
Example: How Trunk Area Assignment Affect The Port Domain,index457................................................................................................................................................................
Trunking For Switches In Access Gateway Mode457................................................................................................................................................................
F_port Trunking In Virtual Fabrics457................................................................................................................................................................
F_port Authentication458................................................................................................................................................................
Configuring E_port Authentication In Virtual Fabrics458................................................................................................................................................................
Configuring And Monitoring Fcip Extension Services461................................................................................................................................................................
Fcip Concepts461................................................................................................................................................................
Virtual Ports And Fcip Tunnels461................................................................................................................................................................
Virtual Port Types461................................................................................................................................................................
Tunnel And Virtual Port Numbering461................................................................................................................................................................
Compression On Fcip Tunnels462................................................................................................................................................................
Traffic Shaping462................................................................................................................................................................
Fcip Services License462................................................................................................................................................................
Platforms That Support San Extension Over Ip462................................................................................................................................................................
Network Using Fcip462................................................................................................................................................................
Qos Implementation Over Fcip463................................................................................................................................................................
Dscp Quality Of Service463................................................................................................................................................................
L2cos Quality Of Service463................................................................................................................................................................
When Both Dscp And L2cos Are Used463................................................................................................................................................................
Default Mapping Of Dscp Priorities To L2cos Priorities463................................................................................................................................................................
Ipsec Implementation Over Fcip464................................................................................................................................................................
Ipsec Terminology464................................................................................................................................................................
Ipsec Configuration465................................................................................................................................................................
Ipsec Parameters465................................................................................................................................................................
Creating An Ike And Ipsec Policy466................................................................................................................................................................
Fixed Policy Parameters466................................................................................................................................................................
Modifiable Policy Parameters466................................................................................................................................................................
Displaying Ike And Ipsec Policy Settings467................................................................................................................................................................
Deleting An Ike And Ipsec Policy468................................................................................................................................................................
Viewing Ipsec Information For An Fcip Tunnel468................................................................................................................................................................
Virtual Fabrics And Fcip469................................................................................................................................................................
Tcp Byte Streaming469................................................................................................................................................................
Supported Third Party Wan Optimizer Hardware470................................................................................................................................................................
Options For Enhancing Tape I/o Performance470................................................................................................................................................................
Fcip Fastwrite And Tape Pipelining470................................................................................................................................................................
Constraints For Fcip Fastwrite And Tape Pipelining471................................................................................................................................................................
Fcip Fastwrite And Tape Pipelining Configurations471................................................................................................................................................................
Single Tunnel, Fastwrite And Tape Pipelining Enabled471................................................................................................................................................................
Using Fcip Fastwrite And Tape Pipelining471................................................................................................................................................................
Unsupported Configurations For Fastwrite And Tape Pipelining472................................................................................................................................................................
Fc Fastwrite Concepts473................................................................................................................................................................
Unsupported Configurations With Fastwrite And Tape Pipelining473................................................................................................................................................................
Platforms And Os Requirements For Fc Fastwrite474................................................................................................................................................................
Constraints For Fc Fastwrite474................................................................................................................................................................
How Fc Fastwrite Works474................................................................................................................................................................
Typical Network Topology For Fc Fastwrite474................................................................................................................................................................
Fc Fastwrite Flow Configuration Requirements475................................................................................................................................................................
Hardware Considerations For Fc Fastwrite475................................................................................................................................................................
Configuring And Enabling Fc Fastwrite475................................................................................................................................................................
Example: Enabling Fastwrite On A Switch476................................................................................................................................................................
Disabling Fc Fastwrite On A Blade Or Switch477................................................................................................................................................................
Example: Disabling Fc Fastwrite On A Switch478................................................................................................................................................................
Disabling Fc Fastwrite On A Port478................................................................................................................................................................
Fcip Services Configuration Guidelines478................................................................................................................................................................
Creating Ip Interfaces And Routes478................................................................................................................................................................
Setting Persistently Disabled Ports479................................................................................................................................................................
Configuring Vex_ports479................................................................................................................................................................
Creating An Fcip Tunnel482................................................................................................................................................................
Example: Creating An Fcip Tunnel483................................................................................................................................................................
Example: Creating An Fcip Tunnel With Fastwrite And Tape Pipelining Enabled484................................................................................................................................................................
Verifying The Fcip Tunnel Configuration484................................................................................................................................................................
Enabling Persistently Disabled Ports486................................................................................................................................................................
Managing Fcip Tunnels487................................................................................................................................................................
Modifying And Deleting Qos Settings489................................................................................................................................................................
Deleting An Fcip Tunnel490................................................................................................................................................................
Deleting An Ip Interface (ipif)490................................................................................................................................................................
Deleting An Iproute490................................................................................................................................................................
Managing The Vlan Tag Table490................................................................................................................................................................
Wan Performance Analysis Tools491................................................................................................................................................................
Ipperf Option491................................................................................................................................................................
Wan Tool Sessions With An Fcip Tunnel Online491................................................................................................................................................................
Fcip Port Bandwidth491................................................................................................................................................................
Starting An Ipperf Session491................................................................................................................................................................
Wan Tool Performance Characteristics492................................................................................................................................................................
Wan Tool Analysis492................................................................................................................................................................
Wan Tool Ipperf Syntax492................................................................................................................................................................
Testing A Connection494................................................................................................................................................................
Tracing A Route495................................................................................................................................................................
Fcip Tunnel Performance Characteristics496................................................................................................................................................................
Ficon Fabrics499................................................................................................................................................................
Fabric Os Support For Ficon499................................................................................................................................................................
Platforms Supporting Ficon500................................................................................................................................................................
Types Of Ficon Configurations500................................................................................................................................................................
Control Unit Port (cup)501................................................................................................................................................................
Ficon And Ficon Cup In Virtual Fabrics501................................................................................................................................................................
Example: The Configure Command501................................................................................................................................................................
Cup Limitations502................................................................................................................................................................
Ficon Commands502................................................................................................................................................................
Fabric Os Commands Related To Ficon And Ficon Cup502................................................................................................................................................................
User Security Considerations503................................................................................................................................................................
Switch Configuration503................................................................................................................................................................
Preparing A Switch For Ficon504................................................................................................................................................................
Single Switch Configuration504................................................................................................................................................................
Configuring A High-integrity Fabric504................................................................................................................................................................
Link Incidents504................................................................................................................................................................
Setting Unique Domain Ids505................................................................................................................................................................
Cascaded Configuration, Two Switches505................................................................................................................................................................
Cascaded Configuration, Three Switches505................................................................................................................................................................
Ficon Information506................................................................................................................................................................
Registered Listeners506................................................................................................................................................................
Node Identification Data506................................................................................................................................................................
Fru Failures506................................................................................................................................................................
Port Swapping507................................................................................................................................................................
Example: Port Swapping507................................................................................................................................................................
Clearing The Ficon Management Database507................................................................................................................................................................
Ficon Cup507................................................................................................................................................................
Setting Up Ficon Cup508................................................................................................................................................................
Ficon Management Server Mode508................................................................................................................................................................
Enabling Fmsmode508................................................................................................................................................................
Disabling Fmsmode509................................................................................................................................................................
Fmsmode And Ficon Cup509................................................................................................................................................................
Setting Up Ficon Cup If Fmsmode Is Already Enabled509................................................................................................................................................................
The Fmsmode Setting509................................................................................................................................................................
Setting The Mihpto Value509................................................................................................................................................................
Mode Register Bit Settings510................................................................................................................................................................
Setting The Mode Register Bits510................................................................................................................................................................
Ficon Cup Mode Register Bits510................................................................................................................................................................
Persistently Enabling And Disabling Ports511................................................................................................................................................................
Port And Switch Naming Standards511................................................................................................................................................................
Ficon Cup License Considerations512................................................................................................................................................................
Zoning And Pdcm Considerations512................................................................................................................................................................
Zoning And Link Incident Reporting512................................................................................................................................................................
Ficon Configuration Files512................................................................................................................................................................
Uploading The Configuration Files513................................................................................................................................................................
Downloading Configuration Files With Active=saved Mode Enabled513................................................................................................................................................................
Downloading Configuration Files With Active=saved Mode Disabled513................................................................................................................................................................
Configuration Information Record513................................................................................................................................................................
Ficon Configuration Worksheet513................................................................................................................................................................
Sample Iocp Configuration File514................................................................................................................................................................
Configuring And Monitoring Ficon Extension Services517................................................................................................................................................................
Ficon Extension Products Licensing517................................................................................................................................................................
Platforms That Support Ficon Extension Over Ip517................................................................................................................................................................
Fcip Configuration Requirements For Ficon Extension517................................................................................................................................................................
Configuration Requirements For Switches And Directors517................................................................................................................................................................
Xrc Emulation517................................................................................................................................................................
Tape Write Pipelining517................................................................................................................................................................
Tape Read Pipelining517................................................................................................................................................................
One Ethernet Interface, One Ip Route And One Fcip Tunnel Between Sites518................................................................................................................................................................
Traffic Isolation Zoning518................................................................................................................................................................
Allow/prohibit For M-series Directors518................................................................................................................................................................
Ficon Emulation Concepts And Features518................................................................................................................................................................
Allow/prohibit Example518................................................................................................................................................................
Ficon Emulation Configuration519................................................................................................................................................................
Ficon Emulation Configuration Values521................................................................................................................................................................
Ficon Emulation Modification521................................................................................................................................................................
Ficon Performance Statistics522................................................................................................................................................................
Ficon Emulation Monitoring523................................................................................................................................................................
A Configuring The Pid Format527................................................................................................................................................................
Pids And Pid Binding Overview527................................................................................................................................................................
Area Addressing Mode527................................................................................................................................................................
Impact Of Changing The Fabric Pid Format528................................................................................................................................................................
Host Reboots528................................................................................................................................................................
Static Pid Mapping Errors529................................................................................................................................................................
Changes To Configuration Data529................................................................................................................................................................
Pid Format Selection529................................................................................................................................................................
Effects Of Pid Format Changes On Configurations529................................................................................................................................................................
Evaluating The Fabric530................................................................................................................................................................
Pid Format Recommendations For Adding New Switches530................................................................................................................................................................
Changing The Pid Format531................................................................................................................................................................
Changing The Pid Format Online532................................................................................................................................................................
Changing The Pid Format Offline532................................................................................................................................................................
Pid Format Changes532................................................................................................................................................................
Hybrid Update533................................................................................................................................................................
Changing To Core Pid Format533................................................................................................................................................................
Port Number To Area Id Conversion534................................................................................................................................................................
Basic Procedure For Changing The Pid Format535................................................................................................................................................................
Hp-ux Procedure For Changing The Pid Format536................................................................................................................................................................
Aix Procedure For Changing The Pid Format537................................................................................................................................................................
Swapping Port Area Ids538................................................................................................................................................................
Physical Port Numbers And Logical Area Ids For Swapped Ports539................................................................................................................................................................
B Understanding Legacy Password Behavior541................................................................................................................................................................
Password Management Information541................................................................................................................................................................
Account/password Characteristics Matrix541................................................................................................................................................................
Password Prompting Behaviors542................................................................................................................................................................
Password Prompting Matrix542................................................................................................................................................................
Password Migration During Firmware Changes543................................................................................................................................................................
Password Recovery Options543................................................................................................................................................................
Password Migration Behavior During Firmware Upgrade/downgrade543................................................................................................................................................................
C Mixed Fabric Configurations For Non-merge Sans545................................................................................................................................................................
D Migrating From An Mp Router To A 400 Mp Router547................................................................................................................................................................
Introduction To Mp Router Upgrades547................................................................................................................................................................
Non-redundant Configuration547................................................................................................................................................................
Redundant Configuration547................................................................................................................................................................
Dual Backbone Configuration547................................................................................................................................................................
Dual Backbone Fabric Configuration548................................................................................................................................................................
Configuring A New Fc Router549................................................................................................................................................................
E Inband Management551................................................................................................................................................................
Inband Management Overview551................................................................................................................................................................
Internal Ethernet Devices551................................................................................................................................................................
Ip Address And Routing Management552................................................................................................................................................................
Inband Management Process552................................................................................................................................................................
Setting The Ip Address For The Cp Inband Management Interface553................................................................................................................................................................
Setting The Ip Address For The Ge Inband Management Interface553................................................................................................................................................................
Adding A Route On The Cp553................................................................................................................................................................
Deleting A Route553................................................................................................................................................................
Viewing Ip Addresses And Routes554................................................................................................................................................................
Displaying Ip Routes554................................................................................................................................................................
Fips555................................................................................................................................................................
Examples Of Supported Configurations555................................................................................................................................................................
Configuring A Management Station On The Same Subnet555................................................................................................................................................................
Management Station On Same Subnet555................................................................................................................................................................
Configuring A Management Station On Different Subnets556................................................................................................................................................................
Management Station On A Different Subnet556................................................................................................................................................................
F Using Remote Switch559................................................................................................................................................................
About Remote Switch559................................................................................................................................................................
Remote Switch Capabilities559................................................................................................................................................................
Using Remote Switch With A Gateway559................................................................................................................................................................
Index561................................................................................................................................................................
Example Of A Brocade Dct File573................................................................................................................................................................
Example Of The Dictiona.dcm File573................................................................................................................................................................
Switch Model Naming Matrix575................................................................................................................................................................
Document Conventions575................................................................................................................................................................
Default Administrative Account Names And Passwords575................................................................................................................................................................

Advertising

HP AE370A - Brocade 4Gb SAN Switch 4/12 Administrator's Manual

HP AE370A - Brocade 4Gb SAN Switch 4/12 Administrator's Manual (518 pages)

HP StorageWorks Fabric OS 6.x administrator guide (5697-0015, May 2009)  
Brand: HP | Category: Switch | Size: 3.35 MB
Table of contents
Table Of Contents3................................................................................................................................................................
About This Guide19................................................................................................................................................................
Supported Fabric Os 6.x Hp Storageworks Hardware19................................................................................................................................................................
Switch Model Naming Matrix19................................................................................................................................................................
Intended Audience20................................................................................................................................................................
Related Documentation20................................................................................................................................................................
Document Conventions And Symbols20................................................................................................................................................................
Document Conventions20................................................................................................................................................................
Rack Stability21................................................................................................................................................................
Hp Technical Support21................................................................................................................................................................
Customer Self Repair21................................................................................................................................................................
Product Warranties21................................................................................................................................................................
Subscription Service22................................................................................................................................................................
Hp Websites22................................................................................................................................................................
Documentation Feedback22................................................................................................................................................................
Standard Features23................................................................................................................................................................
Overview23................................................................................................................................................................
Using The Cli23................................................................................................................................................................
Connecting To The Cli24................................................................................................................................................................
Using Telnet Or Ssh Session24................................................................................................................................................................
Using A Console Session On The Serial Port25................................................................................................................................................................
Changing Passwords25................................................................................................................................................................
Changing Default Account Passwords At Login26................................................................................................................................................................
Default Administrative Account Names And Passwords26................................................................................................................................................................
Configuring The Ethernet Interface27................................................................................................................................................................
Displaying The Network Interface Settings27................................................................................................................................................................
Setting Static Ethernet Addresses28................................................................................................................................................................
Configuring Dhcp29................................................................................................................................................................
Enabling Dhcp29................................................................................................................................................................
Disabling Dhcp29................................................................................................................................................................
Setting The Date And Time30................................................................................................................................................................
Setting Time Zones30................................................................................................................................................................
Synchronizing Local Time Using Ntp32................................................................................................................................................................
Customizing Switch Names33................................................................................................................................................................
Working With Domain Ids33................................................................................................................................................................
Licensed Features34................................................................................................................................................................
Generating A License Key35................................................................................................................................................................
Activating A License Key35................................................................................................................................................................
Removing A Licensed Feature36................................................................................................................................................................
Features And Required Licenses37................................................................................................................................................................
License Requirements37................................................................................................................................................................
Inter-chassis Link (icl) Licensing38................................................................................................................................................................
Time-based Licenses39................................................................................................................................................................
High Availability Considerations39................................................................................................................................................................
Firmware Upgrade And Downgrade Consideration39................................................................................................................................................................
Configupload And Configdownload Considerations39................................................................................................................................................................
Expired Licenses39................................................................................................................................................................
Ports On Demand (pod) Licensing39................................................................................................................................................................
Activating Pod40................................................................................................................................................................
Configuring Dynamic Ports On Demand40................................................................................................................................................................
How Ports Are Assigned To Licenses40................................................................................................................................................................
Displaying The Port License Assignment41................................................................................................................................................................
Activating Dynamic Ports On Demand41................................................................................................................................................................
Disabling Dynamic Ports On Demand42................................................................................................................................................................
Managing Pod Licenses42................................................................................................................................................................
Reserving A License42................................................................................................................................................................
Releasing A Port43................................................................................................................................................................
Disabling And Enabling Switches44................................................................................................................................................................
Disabling And Enabling Ports44................................................................................................................................................................
Making Basic Connections45................................................................................................................................................................
Connecting To Devices45................................................................................................................................................................
Connecting To Other Switches45................................................................................................................................................................
Linking Through A Gateway45................................................................................................................................................................
Checking Status46................................................................................................................................................................
Tracking And Controlling Switch Changes48................................................................................................................................................................
Configuring The Audit Log50................................................................................................................................................................
Auditable Event Classes51................................................................................................................................................................
Auditcfg Event Class Operands51................................................................................................................................................................
Shutting Down Switches And Directors53................................................................................................................................................................
High Availability Of Daemon Processes53................................................................................................................................................................
Daemons That Are Automatically Restarted54................................................................................................................................................................
Managing User Accounts55................................................................................................................................................................
Accessing The Management Channel55................................................................................................................................................................
Maximum Number Of Simultaneous Sessions55................................................................................................................................................................
Using Role-based Access Control (rbac)56................................................................................................................................................................
Fabric Os 6.x Roles56................................................................................................................................................................
Role Permissions57................................................................................................................................................................
Permission Types57................................................................................................................................................................
Rbac Permissions Matrix57................................................................................................................................................................
Managing The Local Database User Accounts59................................................................................................................................................................
About The Default Accounts59................................................................................................................................................................
Defining Local User Accounts59................................................................................................................................................................
Default Local User Accounts59................................................................................................................................................................
Recovering Accounts62................................................................................................................................................................
Changing Local Account Passwords62................................................................................................................................................................
Configuring The Local User Database63................................................................................................................................................................
Distributing The Local User Database63................................................................................................................................................................
Protecting The Local User Database From Distributions63................................................................................................................................................................
Configuring Password Policies64................................................................................................................................................................
Setting The Password Strength Policy64................................................................................................................................................................
Setting The Password History Policy65................................................................................................................................................................
Setting The Password Expiration Policy65................................................................................................................................................................
Upgrade And Downgrade Considerations66................................................................................................................................................................
Setting The Account Lockout Policy66................................................................................................................................................................
Denial Of Service Implications67................................................................................................................................................................
Authentication Model67................................................................................................................................................................
Authentication Configuration Options68................................................................................................................................................................
Creating Fabric Os User Accounts69................................................................................................................................................................
Syntax For Vsa-based Account Roles69................................................................................................................................................................
Managing Fabric Os Users On The Radius Server70................................................................................................................................................................
Windows 2000 Ias70................................................................................................................................................................
Linux Freeradius Server71................................................................................................................................................................
Radius Configuration And Admin Domains71................................................................................................................................................................
Dictionary.brocade File Entries71................................................................................................................................................................
Configuring The Radius Server72................................................................................................................................................................
Linux72................................................................................................................................................................
Windows 200073................................................................................................................................................................
Ldap Configuration And Microsoft's Active Directory75................................................................................................................................................................
Configuring Authentication Servers On The Switch77................................................................................................................................................................
Enabling And Disabling Local Authentication As Backup80................................................................................................................................................................
Boot Prom Password80................................................................................................................................................................
Multi-protocal (mp) Router81................................................................................................................................................................
Hp Storageworks 4/8 Or 4/16, Brocade 4gb San Switch For Hp P-class Bladesystem, Brocade 4gb San Switch For Hp C-class Bladesystem, San Switch 4/32, 4/64 San Switch, San Switch 4/32b81................................................................................................................................................................
San Director And Dc San Backbone Director (short Name, Dc Director)82................................................................................................................................................................
Recovering Forgotten Passwords84................................................................................................................................................................
Configuring Standard Security Features85................................................................................................................................................................
Secure Protocols85................................................................................................................................................................
Secure Protocol Support85................................................................................................................................................................
Items Needed To Deploy Secure Protocols85................................................................................................................................................................
Ensuring Network Security86................................................................................................................................................................
Main Security Scenarios86................................................................................................................................................................
Configuring The Telnet Protocol87................................................................................................................................................................
Blocking Telnet87................................................................................................................................................................
Unblocking Telnet87................................................................................................................................................................
Blocking Listeners88................................................................................................................................................................
Accessing Switches And Fabrics88................................................................................................................................................................
Blocked Listener Applications88................................................................................................................................................................
Access Defaults88................................................................................................................................................................
Port Configuration89................................................................................................................................................................
Configuring For The Ssl Protocol89................................................................................................................................................................
Browser And Java Support89................................................................................................................................................................
Summary Of Ssl Procedures90................................................................................................................................................................
Choosing A Ca90................................................................................................................................................................
Generating A Public/private Key90................................................................................................................................................................
Ssl Certificate Files90................................................................................................................................................................
Generating And Storing A Csr91................................................................................................................................................................
Obtaining Certificates91................................................................................................................................................................
Installing A Switch Certificate92................................................................................................................................................................
Activating A Switch Certificate92................................................................................................................................................................
Configuring The Browser93................................................................................................................................................................
Installing A Root Certificate To The Java Plug-in93................................................................................................................................................................
Displaying And Deleting Certificates94................................................................................................................................................................
Troubleshooting Certificates94................................................................................................................................................................
Commands For Displaying And Deleting Ssl Certificates94................................................................................................................................................................
Ssl Messages And Actions94................................................................................................................................................................
Configuring For Snmp95................................................................................................................................................................
Setting The Security Level95................................................................................................................................................................
Using The Snmpconfig Command96................................................................................................................................................................
Configuring Secure File Copy98................................................................................................................................................................
Configuring Advanced Security Features99................................................................................................................................................................
About Access Control List (acl) Policies99................................................................................................................................................................
How The Acl Policies Are Stored99................................................................................................................................................................
Security Database Size Restrictions99................................................................................................................................................................
Identifying Policy Members100................................................................................................................................................................
Configuring Acl Policies100................................................................................................................................................................
Valid Methods For Specifying Policy Members100................................................................................................................................................................
Displaying Acl Policies101................................................................................................................................................................
Configuring An Fcs Policy101................................................................................................................................................................
Fcs Policy States101................................................................................................................................................................
Fcs Policy Restrictions102................................................................................................................................................................
Switch Operations102................................................................................................................................................................
Overview Of Steps To Create And Manage The Fcs Policies103................................................................................................................................................................
Modifying The Primary Fcs103................................................................................................................................................................
Distributing An Fcs Policy104................................................................................................................................................................
Configuring A Dcc Policy105................................................................................................................................................................
Dcc Policy Restrictions105................................................................................................................................................................
Distribution Policy States105................................................................................................................................................................
Dcc Policy States105................................................................................................................................................................
Creating A Dcc Policy106................................................................................................................................................................
Examples Of Creating Dcc Policies107................................................................................................................................................................
Creating An Scc Policy107................................................................................................................................................................
Scc Policy States107................................................................................................................................................................
Saving Changes To Acl Policies108................................................................................................................................................................
Activating Changes To Acl Policies108................................................................................................................................................................
Adding A Member To An Existing Policy108................................................................................................................................................................
Removing A Member From An Acl Policy109................................................................................................................................................................
Deleting An Acl Policy109................................................................................................................................................................
Aborting All Uncommitted Changes109................................................................................................................................................................
Configuring The Authentication Policy For Fabric Elements109................................................................................................................................................................
E_port Authentication110................................................................................................................................................................
Figures 1 Dh-chap Authentication110................................................................................................................................................................
Device Authentication Policy112................................................................................................................................................................
Auth Policy Restrictions112................................................................................................................................................................
Supported Configurations112................................................................................................................................................................
Selecting Authentication Protocols113................................................................................................................................................................
Re-authenticating Ports113................................................................................................................................................................
Managing Secret Key Pairs114................................................................................................................................................................
Fabric Wide Distribution Of The Auth Policy115................................................................................................................................................................
Accept Distributions Configuration Parameter116................................................................................................................................................................
Ip Filter Policy116................................................................................................................................................................
Creating An Ip Filter Policy116................................................................................................................................................................
Cloning An Ip Filter Policy116................................................................................................................................................................
Displaying An Ip Filter Policy117................................................................................................................................................................
Saving An Ip Filter Policy117................................................................................................................................................................
Activating An Ip Filter Policy117................................................................................................................................................................
Deleting An Ip Filter Policy118................................................................................................................................................................
Ip Filter Policy Rules118................................................................................................................................................................
Supported Services118................................................................................................................................................................
Ip Filter Policy Enforcement119................................................................................................................................................................
Implicit Ip Filter Rules119................................................................................................................................................................
Default Ip Policy Rules119................................................................................................................................................................
Creating Ip Filter Policy Rules120................................................................................................................................................................
Deleting Ip Filter Policy Rules120................................................................................................................................................................
Aborting A Switch Session Transaction120................................................................................................................................................................
Ip Filter Policy Distributions121................................................................................................................................................................
Ip Filter Policy Restrictions121................................................................................................................................................................
Distributing The Policy Database121................................................................................................................................................................
Configuring The Database Distribution Settings122................................................................................................................................................................
Interaction Between Fabric-wide Consistency Policy And Distribution Settings122................................................................................................................................................................
Supported Policy Databases122................................................................................................................................................................
Distributing Acl Policies To Other Switches123................................................................................................................................................................
Setting The Consistency Policy Fabric-wide124................................................................................................................................................................
Acl Policy Database Distribution Behavior124................................................................................................................................................................
Fabric-wide Consistency Policy Settings124................................................................................................................................................................
Notes On Joining A Switch To The Fabric125................................................................................................................................................................
Matching Fabric-wide Consistency Policies126................................................................................................................................................................
Merging Fabrics With Matching Fabric-wide Consistency Policies126................................................................................................................................................................
Non-matching Fabric-wide Consistency Policies127................................................................................................................................................................
Fips Support127................................................................................................................................................................
Examples Of Strict Fabric Merges127................................................................................................................................................................
Fabric Merges With Tolerant/absent Combinations127................................................................................................................................................................
Zeroization Functions128................................................................................................................................................................
Power-up Self Tests128................................................................................................................................................................
Zeroization Behavior128................................................................................................................................................................
Conditional Tests129................................................................................................................................................................
Fips Mode130................................................................................................................................................................
Fips Mode Restrictions130................................................................................................................................................................
Preparing The Switch For Fips131................................................................................................................................................................
Overview Of Steps131................................................................................................................................................................
Maintaining Configurations135................................................................................................................................................................
Maintaining Consistent Configuration Settings135................................................................................................................................................................
Displaying Configuration Settings135................................................................................................................................................................
Backing Up A Configuration135................................................................................................................................................................
Troubleshooting Configuration Upload136................................................................................................................................................................
Restoring Switch Information137................................................................................................................................................................
Configuration Download Without Disabling A Switch137................................................................................................................................................................
Restoring A Configuration137................................................................................................................................................................
Cli Commands To Display Switch Configuration Information137................................................................................................................................................................
Security Considerations139................................................................................................................................................................
Troubleshooting Configuration Download139................................................................................................................................................................
Messages Captured In The Logs140................................................................................................................................................................
Restoring Configurations In A Ficon Environment140................................................................................................................................................................
Downloading Configurations Across A Fabric140................................................................................................................................................................
Backup And Restore In A Ficon Cup Environment140................................................................................................................................................................
Configuration Form141................................................................................................................................................................
Configuration And Connection Information141................................................................................................................................................................
Managing Administrative Domains143................................................................................................................................................................
Fabric With Two Admin Domains144................................................................................................................................................................
Filtered Fabric Views144................................................................................................................................................................
Admin Domain Features145................................................................................................................................................................
Requirements For Admin Domains145................................................................................................................................................................
User-defined Administrative Domains145................................................................................................................................................................
System-defined Administrative Domains145................................................................................................................................................................
Ad255146................................................................................................................................................................
Admin Domain Access Levels147................................................................................................................................................................
Fabric With Ad0 And Ad255147................................................................................................................................................................
Ad User Types147................................................................................................................................................................
Admin Domains And Login148................................................................................................................................................................
Admin Domain Member Types148................................................................................................................................................................
Device Members148................................................................................................................................................................
Switch Port Members149................................................................................................................................................................
Switch Members149................................................................................................................................................................
Admin Domains And Switch Wwn149................................................................................................................................................................
Admin Domain Compatibility And Availability150................................................................................................................................................................
Admin Domains And Merging150................................................................................................................................................................
Fabric Showing Switch And Device Wwns150................................................................................................................................................................
Filtered Fabric Views Showing Converted Switch Wwns150................................................................................................................................................................
Compatibility151................................................................................................................................................................
Firmware Upgrade And Downgrade Scenarios151................................................................................................................................................................
Managing Admin Domains151................................................................................................................................................................
Isolated Subfabrics151................................................................................................................................................................
Understanding The Ad Transaction Model152................................................................................................................................................................
Implementing Admin Domains152................................................................................................................................................................
Creating An Admin Domain153................................................................................................................................................................
Assigning A User To An Admin Domain154................................................................................................................................................................
Activating And Deactivating Admin Domains155................................................................................................................................................................
Adding And Removing Admin Domain Members156................................................................................................................................................................
Renaming An Admin Domain156................................................................................................................................................................
Deleting An Admin Domain157................................................................................................................................................................
Deleting All User-defined Admin Domains157................................................................................................................................................................
Validating An Admin Domain Member List158................................................................................................................................................................
Using Admin Domains158................................................................................................................................................................
Using Cli Commands In An Ad Context158................................................................................................................................................................
Executing A Command In A Different Ad Context159................................................................................................................................................................
Displaying An Admin Domain Configuration159................................................................................................................................................................
Ports And Devices In Cli Output159................................................................................................................................................................
Switching To A Different Admin Domain Context160................................................................................................................................................................
Performing Zone Validation160................................................................................................................................................................
Admin Domain Interactions160................................................................................................................................................................
Admin Domain Interaction With Fabric Os Features161................................................................................................................................................................
Admin Domains, Zones, And Zone Databases162................................................................................................................................................................
Admin Domains And Lsan Zones162................................................................................................................................................................
Configuration Upload And Download In An Ad Context163................................................................................................................................................................
Configuration Upload And Download Scenarios In An Ad Context163................................................................................................................................................................
Installing And Maintaining Firmware165................................................................................................................................................................
About The Firmware Download Process165................................................................................................................................................................
Upgrading And Downgrading Firmware166................................................................................................................................................................
Effects Of Firmware Changes On Accounts And Passwords166................................................................................................................................................................
Considerations For Ficon Cup Environments166................................................................................................................................................................
Preparing For Firmware Downloads167................................................................................................................................................................
Checking Connected Switches168................................................................................................................................................................
Recommended Firmware168................................................................................................................................................................
Obtaining And Decompressing Firmware169................................................................................................................................................................
Performing Firmwaredownload On Switches169................................................................................................................................................................
Overview Of The Firmware Download Process On Switches169................................................................................................................................................................
Hp Storageworks 4/8 San Switch, 4/16 San Switch, Brocade 4gb San Switch For Hp P-class169................................................................................................................................................................
Bladesystem, Brocade 4gb San Switch For Hp C-class Bladesystem, San Switch 4/32, 4/64 San Switch San Switch 4/32b, 400 Mp Router, And Firmware Download170................................................................................................................................................................
Downloading Firmware To A Director171................................................................................................................................................................
Overview Of The Firmware Download Process On Directors172................................................................................................................................................................
San Director And Dc Director Firmwaredownload Procedure172................................................................................................................................................................
Director Restrictions For Downgrading175................................................................................................................................................................
Firmwaredownload From A Usb Device176................................................................................................................................................................
Public And Private Key Management177................................................................................................................................................................
The Firmwaredownload Command178................................................................................................................................................................
Power-on Firmware Checksum Test179................................................................................................................................................................
Testing And Restoring Firmware On Switches179................................................................................................................................................................
Testing And Restoring Firmware On Directors180................................................................................................................................................................
Validating Firmwaredownload183................................................................................................................................................................
Troubleshooting Firmwaredownload184................................................................................................................................................................
Considerations For Downgrading Firmware To Fabric Os 5.3.0 Or Earlier184................................................................................................................................................................
Preinstallation Messages185................................................................................................................................................................
Blade Troubleshooting Tips191................................................................................................................................................................
Configuring Directors193................................................................................................................................................................
Changing A Director's Name193................................................................................................................................................................
Identifying Ports193................................................................................................................................................................
Director Port Numbering Schemes194................................................................................................................................................................
By Slot And Port Number194................................................................................................................................................................
By Index194................................................................................................................................................................
Port Numbering Schemes For The 4/256 Director And Dc Director194................................................................................................................................................................
Default Index/area_id Core Pid Assignment With No Port Swap195................................................................................................................................................................
Basic Blade Management196................................................................................................................................................................
Powering Port Blades Off And On196................................................................................................................................................................
Disabling And Enabling Port Blades197................................................................................................................................................................
Fr4-18i Blade Exceptions197................................................................................................................................................................
Fc4-48 And Fc8-48 Blade Exceptions198................................................................................................................................................................
Conserving Power198................................................................................................................................................................
Blade Terminology And Compatibility199................................................................................................................................................................
Cp Blades199................................................................................................................................................................
Director Terminology And Abbreviations199................................................................................................................................................................
Core Blades200................................................................................................................................................................
Port Blade Compatibility200................................................................................................................................................................
Setting Chassis Configuration Options For The 4/256 Director200................................................................................................................................................................
Port Blades Supported By Each Director200................................................................................................................................................................
Supported Configuration Options200................................................................................................................................................................
Obtaining Slot Information201................................................................................................................................................................
Chassis Configuration Options201................................................................................................................................................................
Routing Traffic203................................................................................................................................................................
About Data Routing And Routing Policies203................................................................................................................................................................
Specifying The Routing Policy203................................................................................................................................................................
Assigning A Static Route204................................................................................................................................................................
Specifying Frame Order Delivery204................................................................................................................................................................
Using Dynamic Load Sharing205................................................................................................................................................................
Viewing Routing Path Information206................................................................................................................................................................
Viewing Routing Information Along A Path208................................................................................................................................................................
Using The Fc-fc Routing Service211................................................................................................................................................................
Supported Platforms211................................................................................................................................................................
Fibre Channel Routing Concepts211................................................................................................................................................................
A Metasan With Interfabric Links212................................................................................................................................................................
A Metasan With Edge-to-edge And Backbone Fabrics213................................................................................................................................................................
Proxy Devices214................................................................................................................................................................
Edge Sans Connected Through A Backbone Fabric214................................................................................................................................................................
Routing Types215................................................................................................................................................................
Fibre Channel Nat And Phantom Domains215................................................................................................................................................................
Metasan With Imported Devices215................................................................................................................................................................
Setting Up The Fc-fc Routing Service216................................................................................................................................................................
Performing Verification Checks217................................................................................................................................................................
Assigning Backbone Fabric Ids218................................................................................................................................................................
Configuring Fcip Tunnels (optional)219................................................................................................................................................................
Configuring Fc-fc Routing To Work With Secure Fabric Os (optional)219................................................................................................................................................................
Configuring Dh-chap Secret220................................................................................................................................................................
Configuring An Interfabric Link221................................................................................................................................................................
Portcfgexport Options223................................................................................................................................................................
Configuring The Fc Router Port Cost (optional)226................................................................................................................................................................
Using Router Port Cost227................................................................................................................................................................
Upgrade, Downgrade, And Ha Considerations227................................................................................................................................................................
Port Cost Considerations228................................................................................................................................................................
Setting A Proxy Pid228................................................................................................................................................................
Matching Fabric Parameters228................................................................................................................................................................
Configuring Ex_port Frame Trunking (optional)229................................................................................................................................................................
Supported Configurations And Platforms230................................................................................................................................................................
High Availability Support230................................................................................................................................................................
Backward Compatibility Support230................................................................................................................................................................
Using Ex_port Frame Trunking230................................................................................................................................................................
Trunking Commands230................................................................................................................................................................
Configuring Lsans And Zoning231................................................................................................................................................................
Use Of Administrative Domains With Lsan Zones And Fcr231................................................................................................................................................................
Defining And Naming Zones232................................................................................................................................................................
Lsan Zones And Fabric-to-fabric Communications232................................................................................................................................................................
Lsan Zone Binding (optional)235................................................................................................................................................................
Dual Backbone Configuration236................................................................................................................................................................
Maximum Lsan Count236................................................................................................................................................................
Configuring Backbone Fabrics For Interconnectivity237................................................................................................................................................................
Ha And Downgrade Considerations237................................................................................................................................................................
Ipfc Over Fcr237................................................................................................................................................................
Broadcast Configuration238................................................................................................................................................................
Monitoring Resources239................................................................................................................................................................
Routing Echo240................................................................................................................................................................
Interoperability With Legacy Fcr Switches241................................................................................................................................................................
Backward Compatibility242................................................................................................................................................................
Front Domain Consolidation242................................................................................................................................................................
Using Front Domain Consolidation242................................................................................................................................................................
Hardware And Firmware Compatibility For Nonsecure Fabrics242................................................................................................................................................................
Range Of Output Ports243................................................................................................................................................................
Interoperating With An M-eos Fabric245................................................................................................................................................................
Brocade-mcdata M-eosc Interoperability Compatibility Matrix245................................................................................................................................................................
Mcdata Mi10k Interoperability246................................................................................................................................................................
Brocade-mcdata M-eosn Interoperability Compatibility Matrix246................................................................................................................................................................
Configuring The Fabrics For Interconnectivity247................................................................................................................................................................
Connectivity Modes248................................................................................................................................................................
Configuring The Fc Router248................................................................................................................................................................
Portcfgexport -m Values248................................................................................................................................................................
Configuring M-eos For Interconnection251................................................................................................................................................................
Efcm San Status251................................................................................................................................................................
San Pilot And Efcm Zone Screens252................................................................................................................................................................
Lsan Zoning With M-eos254................................................................................................................................................................
Adding A Zone Set Name In San Pilot254................................................................................................................................................................
Completing The Configuration255................................................................................................................................................................
Migrating From An Mp Router To A 400 Mp Router257................................................................................................................................................................
Configurations257................................................................................................................................................................
Non-redundant Configuration257................................................................................................................................................................
Non-redundant Router Configuration257................................................................................................................................................................
Redundant Configuration258................................................................................................................................................................
Configuration During The Upgrade258................................................................................................................................................................
Redundant Router Configuration258................................................................................................................................................................
Devices Directly Connected To Router259................................................................................................................................................................
Dual Backbone Fabric Configuration259................................................................................................................................................................
Administering Ficon Fabrics261................................................................................................................................................................
Overview Of Fabric Os Support For Ficon261................................................................................................................................................................
Supported Switches262................................................................................................................................................................
Types Of Ficon Configurations262................................................................................................................................................................
Control Unit Port (cup)262................................................................................................................................................................
Ficon Commands263................................................................................................................................................................
Fabric Os Commands Related To Ficon And Ficon Cup263................................................................................................................................................................
User Security Considerations264................................................................................................................................................................
Configuring Switches264................................................................................................................................................................
Preparing A Switch265................................................................................................................................................................
Configuring A Single Switch265................................................................................................................................................................
Configuring A High-integrity Fabric265................................................................................................................................................................
Setting A Unique Domain Id266................................................................................................................................................................
Cascaded Configuration, Two Switches266................................................................................................................................................................
Cascaded Configuration, Three Switches266................................................................................................................................................................
Displaying Information267................................................................................................................................................................
Link Incidents267................................................................................................................................................................
Registered Listeners267................................................................................................................................................................
Node Identification Data267................................................................................................................................................................
Fru Failures267................................................................................................................................................................
Swapping Ports268................................................................................................................................................................
Clearing The Ficon Management Database268................................................................................................................................................................
Using Ficon Cup268................................................................................................................................................................
Setup Summary269................................................................................................................................................................
Enabling And Disabling Ficon Management Server Mode269................................................................................................................................................................
Setting Up Cup When Ficon Management Server Mode Is Enabled270................................................................................................................................................................
Displaying The Fmsmode Setting270................................................................................................................................................................
Displaying Mode Register Bit Settings271................................................................................................................................................................
Ficon Cup Mode Register Bits271................................................................................................................................................................
Setting Mode Register Bits272................................................................................................................................................................
Persistently Enabling/disabling Ports272................................................................................................................................................................
Port And Switch Naming Standards273................................................................................................................................................................
Adding And Removing Ficon Cup Licenses273................................................................................................................................................................
Zoning And Pdcm Considerations273................................................................................................................................................................
Zoning And Link Incident Reporting273................................................................................................................................................................
Troubleshooting274................................................................................................................................................................
Backing Up And Restoring Ficon Configuration Files275................................................................................................................................................................
Recording Configuration Information276................................................................................................................................................................
Ficon Configuration Worksheet276................................................................................................................................................................
Sample Iocp Configuration File277................................................................................................................................................................
Configuring The Distributed Management Server279................................................................................................................................................................
Introduction279................................................................................................................................................................
Enabling And Disabling The Platform Services279................................................................................................................................................................
Controlling Access280................................................................................................................................................................
Configuring The Server Database283................................................................................................................................................................
Controlling Topology Discovery283................................................................................................................................................................
Working With Diagnostic Features285................................................................................................................................................................
About Fabric Os Diagnostics285................................................................................................................................................................
Viewing Power-on Self Test285................................................................................................................................................................
Viewing Switch Status287................................................................................................................................................................
Viewing Port Information289................................................................................................................................................................
Error Summary Description292................................................................................................................................................................
Viewing Equipment Status293................................................................................................................................................................
Viewing The System Message Log294................................................................................................................................................................
Viewing The Port Log294................................................................................................................................................................
Commands For Port Log Management295................................................................................................................................................................
Configuring For Syslogd296................................................................................................................................................................
Configuring The Host296................................................................................................................................................................
Fabric Os To Unix Message Severities296................................................................................................................................................................
Configuring The Switch297................................................................................................................................................................
Viewing And Saving Diagnostic Information298................................................................................................................................................................
Setting Up Automatic Trace Dump Transfers298................................................................................................................................................................
About Troubleshooting301................................................................................................................................................................
Most Common Problem Areas301................................................................................................................................................................
Common Troubleshooting Problems And Tools301................................................................................................................................................................
Gathering Information For Technical Support302................................................................................................................................................................
Troubleshooting Questions302................................................................................................................................................................
Analyzing Connection Problems304................................................................................................................................................................
Restoring A Segmented Fabric307................................................................................................................................................................
Correcting Zoning Setup Issues309................................................................................................................................................................
Types Of Zone Discrepancies309................................................................................................................................................................
Commands For Debugging Zoning309................................................................................................................................................................
Recognizing Mq-write Errors311................................................................................................................................................................
Correcting Device Login Issues313................................................................................................................................................................
Identifying Media-related Issues315................................................................................................................................................................
Component Test Descriptions316................................................................................................................................................................
Correcting Link Failures317................................................................................................................................................................
Switch Component Tests317................................................................................................................................................................
Correcting Marginal Links319................................................................................................................................................................
Switchshow Output And Suggested Action319................................................................................................................................................................
Loopback Modes319................................................................................................................................................................
Inaccurate Information In The System Message Log320................................................................................................................................................................
Tracing Fibre Channel Information320................................................................................................................................................................
Ftrace Configurable Parameters320................................................................................................................................................................
Configuring Ftrace For A Tunnel321................................................................................................................................................................
Displaying Ftrace For A Tunnel321................................................................................................................................................................
Recognizing Port Initialization And Fcp Auto Discovery Process322................................................................................................................................................................
Using Port Mirroring322................................................................................................................................................................
Supported Hardware323................................................................................................................................................................
Port Combinations For Port Mirroring323................................................................................................................................................................
Port Mirroring Considerations324................................................................................................................................................................
Creating, Deleting, And Displaying Port Mirroring324................................................................................................................................................................
Administering Npiv327................................................................................................................................................................
About Npiv327................................................................................................................................................................
Enabling And Disabling Npiv327................................................................................................................................................................
Configuring Npiv327................................................................................................................................................................
Configuration Scenarios328................................................................................................................................................................
Viewing Npiv Port Configuration Information328................................................................................................................................................................
Displaying Login Information330................................................................................................................................................................
Optimizing Fabric Behavior331................................................................................................................................................................
Introduction To Adaptive Networking331................................................................................................................................................................
Top Talkers331................................................................................................................................................................
Traffic Isolation331................................................................................................................................................................
Traffic Isolation Zone Creating A Dedicated Path Through The Fabric331................................................................................................................................................................
Ti Zone Failover332................................................................................................................................................................
Fspf Routing Rules And Traffic Isolation332................................................................................................................................................................
Dedicated Path (shortest Path)332................................................................................................................................................................
General Rules For Ti Zones333................................................................................................................................................................
Dedicated Path (but Not The Shortest Path)333................................................................................................................................................................
Supported Configurations For Traffic Isolation334................................................................................................................................................................
Ti Zone Misconfiguration334................................................................................................................................................................
Limitations And Restrictions Of Traffic Isolation335................................................................................................................................................................
Admin Domain Considerations For Traffic Isolation335................................................................................................................................................................
Creating A Ti Zone335................................................................................................................................................................
Modifying Ti Zones336................................................................................................................................................................
Activating And Deactivating A Ti Zone337................................................................................................................................................................
Deleting A Ti Zone338................................................................................................................................................................
Displaying Ti Zones338................................................................................................................................................................
Qos: Ingress Rate Limiting338................................................................................................................................................................
Qos: Sid/did Traffic Prioritization339................................................................................................................................................................
Qos Zones340................................................................................................................................................................
Qos Traffic Prioritization340................................................................................................................................................................
Qos On E_ports341................................................................................................................................................................
Supported Configurations For Traffic Prioritization341................................................................................................................................................................
Qos With E_ports Enabled341................................................................................................................................................................
Setting Traffic Prioritization342................................................................................................................................................................
Administering Advanced Performance Monitoring343................................................................................................................................................................
About Advanced Performance Monitoring343................................................................................................................................................................
Types Of Monitors Supported On Brocade Switch Models343................................................................................................................................................................
Advanced Performance Monitoring Commands344................................................................................................................................................................
Monitoring Al_pas345................................................................................................................................................................
Monitoring End-to-end Performance345................................................................................................................................................................
Adding End-to-end Monitors346................................................................................................................................................................
Setting End-to-end Monitors On A Port346................................................................................................................................................................
Setting A Mask For End-to-end Monitors347................................................................................................................................................................
Proper Placement Of End-to-end Performance Monitors347................................................................................................................................................................
Deleting End-to-end Monitors348................................................................................................................................................................
Mask Positions For End-to-end Monitors348................................................................................................................................................................
Monitoring Filter-based Performance349................................................................................................................................................................
Adding Standard Filter-based Monitors349................................................................................................................................................................
Commands To Add Filter-based Monitors349................................................................................................................................................................
Adding Custom Filter-based Monitors350................................................................................................................................................................
Deleting Filter-based Monitors351................................................................................................................................................................
Monitoring Isl Performance351................................................................................................................................................................
Predefined Values At Offset 0351................................................................................................................................................................
Identifying Top Bandwidth Users (top Talkers)352................................................................................................................................................................
Using Top Talker Monitors In Port Mode353................................................................................................................................................................
Using Top Talker Monitors In Fabric Mode354................................................................................................................................................................
Limitations Of Top Talker Monitors355................................................................................................................................................................
Monitoring Trunks355................................................................................................................................................................
Displaying Monitor Counters355................................................................................................................................................................
Known Display Problem And Workaround359................................................................................................................................................................
Clearing Monitor Counters359................................................................................................................................................................
Saving And Restoring Monitor Configurations361................................................................................................................................................................
Collecting Performance Data361................................................................................................................................................................
Administering Extended Fabrics363................................................................................................................................................................
Extended Fabrics Licensing363................................................................................................................................................................
Extended Fibre Channel Over Distance363................................................................................................................................................................
Distance Levels For Extended Inter-switch Links (isls)363................................................................................................................................................................
Buffer-to-buffer Credits363................................................................................................................................................................
Fibre Channel Data Frames364................................................................................................................................................................
Fc Switch Port Buffer Credit Requirements For Long Distance Calculations365................................................................................................................................................................
Determining How Many Ports Can Be Configured For Long Distance365................................................................................................................................................................
Displaying The Remaining Buffers In A Port Group366................................................................................................................................................................
Fabric Considerations368................................................................................................................................................................
Switch, Port Speed, And Distance With Asic And Buffers368................................................................................................................................................................
Long Distance Link Initialization Activation369................................................................................................................................................................
Extended Fabrics Device Limitations369................................................................................................................................................................
Configuring An Extended Isl369................................................................................................................................................................
Extended Isl Modes: 3xxx Switches (bloom And Bloom Ii Asics)371................................................................................................................................................................
Administering Isl Trunking373................................................................................................................................................................
About Isl Trunking373................................................................................................................................................................
Distribution Of Traffic Over Isl Trunking Groups373................................................................................................................................................................
Standard Trunking Criteria374................................................................................................................................................................
Ex_port Trunking374................................................................................................................................................................
Initializing Trunking On Ports375................................................................................................................................................................
Monitoring Traffic375................................................................................................................................................................
Enabling And Disabling Isl Trunking377................................................................................................................................................................
Setting Port Speeds378................................................................................................................................................................
Displaying Trunking Information379................................................................................................................................................................
Trunking Over Extended Fabrics380................................................................................................................................................................
Trunking Distances381................................................................................................................................................................
Troubleshooting Trunking Problems381................................................................................................................................................................
Listing Link Characteristics381................................................................................................................................................................
Trunking Support For San Switch 4/32, 4/32b And 4/64 San Switch (condor Asic)381................................................................................................................................................................
84 Trunking Support For 4/256 San Director And Dc Directors With Supported Blades (condor And Condor2381................................................................................................................................................................
Recognizing Buffer Underallocation382................................................................................................................................................................
Administering Advanced Zoning383................................................................................................................................................................
About Zoning383................................................................................................................................................................
Zoning Example383................................................................................................................................................................
Zone Types384................................................................................................................................................................
Types Of Zoning384................................................................................................................................................................
Approaches To Fabric-based Zoning384................................................................................................................................................................
Zone Objects385................................................................................................................................................................
Zoning Schemes386................................................................................................................................................................
Zone Aliases386................................................................................................................................................................
Zone Configurations386................................................................................................................................................................
Zoning Enforcement387................................................................................................................................................................
Software-enforced Zoning387................................................................................................................................................................
Hardware-enforced Zoning387................................................................................................................................................................
Enforcing Hardware Zoning388................................................................................................................................................................
Hardware-enforced Nonoverlapping Zones389................................................................................................................................................................
Hardware-enforced Overlapping Zones389................................................................................................................................................................
Zoning With Hardware Assist (mixed-port And Wwn Zones)389................................................................................................................................................................
Considerations For Zoning Architecture390................................................................................................................................................................
Session-based Hard Zoning390................................................................................................................................................................
Best Practices For Zoning391................................................................................................................................................................
Broadcast Zones391................................................................................................................................................................
Supported Switches For Broadcast Zones392................................................................................................................................................................
Broadcast Zones And Admin Domains392................................................................................................................................................................
High Availability Considerations With Broadcast Zones393................................................................................................................................................................
Loop Devices And Broadcast Zones393................................................................................................................................................................
Backward Compatibility With Pre-5.3.0 Switches393................................................................................................................................................................
Broadcast Zones And Default Zoning393................................................................................................................................................................
Creating And Managing Zone Aliases394................................................................................................................................................................
Creating And Maintaining Zones396................................................................................................................................................................
Activating Default Zones399................................................................................................................................................................
Merging Zones400................................................................................................................................................................
Zoning Database Limitations400................................................................................................................................................................
Resulting Database Size: 0 To 96k401................................................................................................................................................................
Resulting Database Size: 96k To 128k401................................................................................................................................................................
Resulting Database Size: 128k To 256k402................................................................................................................................................................
Resulting Database Size: 256k To 1m402................................................................................................................................................................
Creating And Modifying Zoning Configurations404................................................................................................................................................................
Maintaining Zone Objects407................................................................................................................................................................
Managing Zoning Configurations In A Fabric410................................................................................................................................................................
Adding A New Switch Or Fabric410................................................................................................................................................................
Splitting A Fabric412................................................................................................................................................................
Using Zoning To Administer Security412................................................................................................................................................................
Resolving Zone Conflicts412................................................................................................................................................................
Configuring And Monitoring Fcip Extension Services415................................................................................................................................................................
Fcip Services Licensing415................................................................................................................................................................
Platforms That Support San Extension Over Ip416................................................................................................................................................................
Fr4-18i Port Numbering416................................................................................................................................................................
Multi-protocol Router Port Numbering416................................................................................................................................................................
Fcip Concepts417................................................................................................................................................................
Virtual Ports And Fcip Tunnels417................................................................................................................................................................
Virtual Port Types417................................................................................................................................................................
Tunnel And Virtual Port Numbering417................................................................................................................................................................
Compression418................................................................................................................................................................
Traffic Shaping418................................................................................................................................................................
Qos Concepts And Implementation Over Fcip418................................................................................................................................................................
Network Using Fcip418................................................................................................................................................................
Layer Three Diffserv Code Points (dscp)419................................................................................................................................................................
Vlan Tagging And Layer Two Class Of Service (l2cos)419................................................................................................................................................................
When Both Dscp And L2cos Are Used419................................................................................................................................................................
Default Mapping Of Dscp Priorities To L2cos Priorities419................................................................................................................................................................
Ipsec Concepts And Implementation Over Fcip420................................................................................................................................................................
Ipsec Terminology420................................................................................................................................................................
Options For Enhancing Tape Write I/o Performance421................................................................................................................................................................
Fcip Fastwrite And Tape Pipelining421................................................................................................................................................................
Constraints For Fcip Fastwrite And Tape Pipelining422................................................................................................................................................................
Fcip Fastwrite/tape Pipelining Configurations422................................................................................................................................................................
Using Fcip Fastwrite And Tape Pipelining422................................................................................................................................................................
Unsupported Configurations423................................................................................................................................................................
Single Tunnel, Fastwrite And Tape Pipelining Enabled423................................................................................................................................................................
Multiple Tunnels To Multiple Ports, Fastwrite And Tape Pipelining Enabled On A Per-tunnel/per-port Basis423................................................................................................................................................................
Ficon Emulation Concepts424................................................................................................................................................................
Unsupported Configurations With Fastwrite And Tape Pipelining424................................................................................................................................................................
Xrc Emulation425................................................................................................................................................................
Tape Write Pipelining425................................................................................................................................................................
Tape Read Pipelining425................................................................................................................................................................
Device Level Acknowledgment425................................................................................................................................................................
Tin/tir Emulation425................................................................................................................................................................
Read Block Id Emulation425................................................................................................................................................................
Ftrace Concepts425................................................................................................................................................................
Fcip Services Configuration Guidelines426................................................................................................................................................................
Checklist For Configuring Fcip Links426................................................................................................................................................................
Command Checklist For Configuring Fcip Links426................................................................................................................................................................
Configuring Ipsec427................................................................................................................................................................
Ipsec Parameters428................................................................................................................................................................
Fixed Policy Parameters428................................................................................................................................................................
Modifiable Policy Parameters428................................................................................................................................................................
Managing Policies429................................................................................................................................................................
Persistently Disabling Ports431................................................................................................................................................................
Configuring Vex Ports431................................................................................................................................................................
Configuring Ip Interfaces And Ip Routes432................................................................................................................................................................
Configuring Fcip Tunnels434................................................................................................................................................................
Configuring Ficon Emulation435................................................................................................................................................................
Configuring Ftrace437................................................................................................................................................................
Verifying The Fcip Tunnel Configuration437................................................................................................................................................................
Enabling Persistently Disabled Ports440................................................................................................................................................................
Modify And Delete Command Options442................................................................................................................................................................
Modifying Fcip Tunnels442................................................................................................................................................................
Modifying/deleting Qos Settings443................................................................................................................................................................
Ficon Emulation Modify Operations443................................................................................................................................................................
Deleting An Fcip Tunnel445................................................................................................................................................................
Deleting An Ip Interface (ipif)445................................................................................................................................................................
Deleting An Iproute445................................................................................................................................................................
Deleting An Ftrace Configuration445................................................................................................................................................................
Maintaining Vlan Tag Tables445................................................................................................................................................................
Troubleshooting Fcip Links446................................................................................................................................................................
Wan Performance Analysis Tools447................................................................................................................................................................
About The Ipperf Option447................................................................................................................................................................
Running Wan Tool Sessions With An Fcip Tunnel Online447................................................................................................................................................................
Fcip Port Bandwidth447................................................................................................................................................................
Wan Tool Performance Characteristics448................................................................................................................................................................
Starting Wan Tool Analysis448................................................................................................................................................................
Wan Tool Ipperf Syntax449................................................................................................................................................................
Using Portcmd Ping450................................................................................................................................................................
Using Portcmd Traceroute451................................................................................................................................................................
Fcip Tunnel Performance Characteristics452................................................................................................................................................................
Ficon Performance Statistics455................................................................................................................................................................
Ftrace Output Control And Display456................................................................................................................................................................
Fc Fastwrite Concepts457................................................................................................................................................................
Platforms And Os Requirements For Fc Fastwrite458................................................................................................................................................................
Constraints For Fc Fastwrite458................................................................................................................................................................
How Fc Fastwrite Works458................................................................................................................................................................
Typical Network Topology For Fc Fastwrite458................................................................................................................................................................
Fc Fastwrite Flow Configuration Requirements459................................................................................................................................................................
Hardware Considerations For Fc Fastwrite459................................................................................................................................................................
Configuring And Enabling Fc Fastwrite460................................................................................................................................................................
Disabling Fc Fastwrite On A Blade Or Switch462................................................................................................................................................................
Disabling Fc Fastwrite On A Port462................................................................................................................................................................
A Configuring The Pid Format463................................................................................................................................................................
About Pids And Pid Binding463................................................................................................................................................................
Summary Of Pid Formats463................................................................................................................................................................
Impact Of Changing The Fabric Pid Format464................................................................................................................................................................
Host Reboots464................................................................................................................................................................
Static Pid Mapping Errors464................................................................................................................................................................
Changes To Configuration Data465................................................................................................................................................................
Selecting A Pid Format465................................................................................................................................................................
Effects Of Pid Format Changes On Configurations465................................................................................................................................................................
Evaluating The Fabric466................................................................................................................................................................
Pid Format Recommendations For Adding New Switches466................................................................................................................................................................
Planning The Update Procedure468................................................................................................................................................................
Online Update468................................................................................................................................................................
Offline Update469................................................................................................................................................................
Hybrid Update469................................................................................................................................................................
Changing To Core Pid Format469................................................................................................................................................................
Converting Port Number To Area Id470................................................................................................................................................................
San Director With Extended Edge Pid471................................................................................................................................................................
Performing Pid Format Changes472................................................................................................................................................................
Basic Procedure472................................................................................................................................................................
Hp/ux Procedure473................................................................................................................................................................
Aix Procedure475................................................................................................................................................................
Swapping Port Area Ids476................................................................................................................................................................
B Implementing An Interoperable Fabric477................................................................................................................................................................
Understanding Brocade And Mcdata Interoperability477................................................................................................................................................................
Determining Mcdata-aware Features477................................................................................................................................................................
Mcdata-aware Features477................................................................................................................................................................
Determining Mcdata-unaware Features478................................................................................................................................................................
Mcdata-unaware Features478................................................................................................................................................................
Supported Connectivity For Fabric 6.0479................................................................................................................................................................
Feature Support And Interoperability479................................................................................................................................................................
Typical Configuration479................................................................................................................................................................
Complete Feature Compatibility Matrix479................................................................................................................................................................
M-eos 9.6.2 Features Supported In Fabric Os 6.0481................................................................................................................................................................
Port Number Offset481................................................................................................................................................................
Npiv481................................................................................................................................................................
Trunking482................................................................................................................................................................
M-eos 9.6.2 Features Not Supported By Fabric Os 6.0482................................................................................................................................................................
Domain Id Offset Configuration482................................................................................................................................................................
Diagnostic Test Differences482................................................................................................................................................................
Optional 6.0 Licensing482................................................................................................................................................................
Supported Optional Features482................................................................................................................................................................
Unsupported Features483................................................................................................................................................................
Fabric Os Interoperability With M-eos483................................................................................................................................................................
Supported Features Mcdata Fabric Mode (interopmode 2)484................................................................................................................................................................
Supported Features Mcdata Open Fabric Mode (interopmode 3)484................................................................................................................................................................
Unsupported Features Mcdata Fabric And Open Fabric Modes484................................................................................................................................................................
Mcdata Fabric Mode Configuration Restrictions484................................................................................................................................................................
Mcdata Open Fabric Mode Configuration Restrictions485................................................................................................................................................................
Upgrade And Downgrade Restrictions485................................................................................................................................................................
Zoning Restrictions485................................................................................................................................................................
Zone Name Restrictions486................................................................................................................................................................
Activating Zones In Mcdata Fabric Mode486................................................................................................................................................................
Default Zone486................................................................................................................................................................
Safe Zone487................................................................................................................................................................
Activating Zone Configurations On A Standalone Switch487................................................................................................................................................................
Activating Zone Configurations Fabric-wide487................................................................................................................................................................
Verifying The Effective Zone Configuration487................................................................................................................................................................
Moving To Mcdata Open Fabric Mode From Earlier Fabric Os Versions489................................................................................................................................................................
Enabling Mcdata Open Fabric Mode489................................................................................................................................................................
Enabling Mcdata Fabric Mode490................................................................................................................................................................
Enabling Brocade Native Mode491................................................................................................................................................................
Enabling Fabric Os L2 Santegrity (fabric Binding)491................................................................................................................................................................
Fcr Santegrity (fabric Binding)492................................................................................................................................................................
Enabling Fcr Fabric Binding492................................................................................................................................................................
Support For Coordinated Hot Code Load493................................................................................................................................................................
Activating Hot Code Load494................................................................................................................................................................
Hot Code Upgrade Considerations494................................................................................................................................................................
C Understanding Legacy Password Behavior495................................................................................................................................................................
Password Management Information495................................................................................................................................................................
Account/password Characteristics Matrix495................................................................................................................................................................
Password Prompting Behaviors496................................................................................................................................................................
Password Prompting Matrix496................................................................................................................................................................
Password Migration During Firmware Changes497................................................................................................................................................................
Password Recovery Options497................................................................................................................................................................
Password Migration Behavior During Firmware Upgrade/downgrade497................................................................................................................................................................
D Using Remote Switch499................................................................................................................................................................
About Remote Switch499................................................................................................................................................................
Remote Switch Capabilities499................................................................................................................................................................
Using Remote Switch With A Gateway499................................................................................................................................................................
E Zone Merging Scenarios501................................................................................................................................................................
Index505................................................................................................................................................................
Correcting I2c Bus Errors507................................................................................................................................................................
HP AE370A - Brocade 4Gb SAN Switch 4/12 Administrator's Manual

HP AE370A - Brocade 4Gb SAN Switch 4/12 Administrator's Manual (496 pages)

HP StorageWorks Fabric OS 6.1.1 administrator guide (5697-0235, December 2009)  
Brand: HP | Category: Switch | Size: 3.14 MB
Table of contents
Table Of Contents3................................................................................................................................................................
About This Guide19................................................................................................................................................................
Supported Fabric Os 6.1.x Hp Storageworks Hardware19................................................................................................................................................................
Switch Model Naming Matrix19................................................................................................................................................................
Intended Audience20................................................................................................................................................................
Related Documentation20................................................................................................................................................................
Document Conventions And Symbols20................................................................................................................................................................
Document Conventions20................................................................................................................................................................
Rack Stability21................................................................................................................................................................
Hp Technical Support21................................................................................................................................................................
Customer Self Repair21................................................................................................................................................................
Product Warranties21................................................................................................................................................................
Subscription Service22................................................................................................................................................................
Hp Websites22................................................................................................................................................................
Documentation Feedback22................................................................................................................................................................
Standard Features23................................................................................................................................................................
Overview23................................................................................................................................................................
Fabric Os Command Line Interface23................................................................................................................................................................
Getting Help On A Command23................................................................................................................................................................
Connecting To The Cli24................................................................................................................................................................
Using Telnet Or Ssh Session24................................................................................................................................................................
Using A Console Session On The Serial Port25................................................................................................................................................................
Changing Passwords25................................................................................................................................................................
Changing Default Account Passwords At Login26................................................................................................................................................................
Default Administrative Account Names And Passwords26................................................................................................................................................................
Configuring The Ethernet Interface27................................................................................................................................................................
Displaying The Network Interface Settings27................................................................................................................................................................
Setting Static Ethernet Addresses28................................................................................................................................................................
Activating Dhcp29................................................................................................................................................................
Enabling Dhcp29................................................................................................................................................................
Disabling Dhcp30................................................................................................................................................................
Setting The Date And Time30................................................................................................................................................................
Setting Time Zones31................................................................................................................................................................
Synchronizing Local Time Using Ntp32................................................................................................................................................................
Synchronizing Local Time With An External Source32................................................................................................................................................................
Customizing Switch Names33................................................................................................................................................................
Working With Domain Ids33................................................................................................................................................................
Licensed Features34................................................................................................................................................................
Generating A License Key35................................................................................................................................................................
Activating A License Key35................................................................................................................................................................
Removing A Licensed Feature36................................................................................................................................................................
Features And Required Licenses37................................................................................................................................................................
License Requirements37................................................................................................................................................................
Inter-chassis Link (icl) Licensing38................................................................................................................................................................
Gbps Licensing38................................................................................................................................................................
Time-based Licenses39................................................................................................................................................................
High Availability Considerations39................................................................................................................................................................
Firmware Upgrade And Downgrade Consideration39................................................................................................................................................................
Configupload And Configdownload Considerations39................................................................................................................................................................
Expired Licenses39................................................................................................................................................................
Ports On Demand (pod) Licensing39................................................................................................................................................................
Activating Pod40................................................................................................................................................................
Configuring Dynamic Ports On Demand40................................................................................................................................................................
How Ports Are Assigned To Licenses40................................................................................................................................................................
Displaying The Port License Assignment41................................................................................................................................................................
Activating Dynamic Ports On Demand41................................................................................................................................................................
Disabling Dynamic Ports On Demand42................................................................................................................................................................
Managing Pod Licenses42................................................................................................................................................................
Reserving A License43................................................................................................................................................................
Releasing A Port From A Pod Set44................................................................................................................................................................
Disabling And Enabling Switches44................................................................................................................................................................
Disabling And Enabling Ports45................................................................................................................................................................
Making Basic Connections45................................................................................................................................................................
Connecting To Devices45................................................................................................................................................................
Connecting To Other Switches46................................................................................................................................................................
Linking Through A Gateway46................................................................................................................................................................
Checking Switch Status47................................................................................................................................................................
Switch Operation47................................................................................................................................................................
High Availability (ha) Features47................................................................................................................................................................
Fabric Connectivity48................................................................................................................................................................
Device Connectivity48................................................................................................................................................................
Show Switches In Access Gateway Mode48................................................................................................................................................................
Tracking And Controlling Switch Changes49................................................................................................................................................................
Switch Status Policy Threshold Values49................................................................................................................................................................
Configuring The Audit Log51................................................................................................................................................................
Auditable Event Classes52................................................................................................................................................................
Auditcfg Event Class Operands52................................................................................................................................................................
Switch And Platform-class Platform Shutdown54................................................................................................................................................................
High Availability Of Daemon Processes55................................................................................................................................................................
Daemons That Are Automatically Restarted55................................................................................................................................................................
Managing User Accounts57................................................................................................................................................................
Accessing The Management Channel57................................................................................................................................................................
Maximum Number Of Simultaneous Sessions57................................................................................................................................................................
Role-based Access Control (rbac)58................................................................................................................................................................
Fabric Os 6.1.x Roles58................................................................................................................................................................
Role Permissions59................................................................................................................................................................
Permission Types59................................................................................................................................................................
Rbac Permissions Matrix59................................................................................................................................................................
Managing The Local Database User Accounts61................................................................................................................................................................
About The Default Accounts61................................................................................................................................................................
Defining Local User Accounts61................................................................................................................................................................
Default Local User Accounts61................................................................................................................................................................
Recovering Accounts63................................................................................................................................................................
Changing Local Account Passwords63................................................................................................................................................................
Configuring The Local User Database64................................................................................................................................................................
Distributing The Local User Database64................................................................................................................................................................
Protecting The Local User Database From Distributions65................................................................................................................................................................
Configuring Password Policies65................................................................................................................................................................
Setting The Password Strength Policy65................................................................................................................................................................
Setting The Password History Policy66................................................................................................................................................................
Setting The Password Expiration Policy66................................................................................................................................................................
Upgrade And Downgrade Considerations For Password Management67................................................................................................................................................................
Setting The Account Lockout Policy67................................................................................................................................................................
Denial Of Service Implications69................................................................................................................................................................
Authentication Model69................................................................................................................................................................
Authentication Configuration Options70................................................................................................................................................................
Creating Fabric Os User Accounts71................................................................................................................................................................
Syntax For Vsa-based Account Roles71................................................................................................................................................................
Managing Fabric Os Users On The Radius Server72................................................................................................................................................................
Windows 2000 Ias72................................................................................................................................................................
Linux Freeradius Server73................................................................................................................................................................
Radius Configuration And Admin Domains73................................................................................................................................................................
Figures 1 Windows 2000 Vsa Configuration73................................................................................................................................................................
Dictionary.brocade File Entries73................................................................................................................................................................
Configuring The Radius Server74................................................................................................................................................................
Configuring Radius Server Support With Linux74................................................................................................................................................................
Configuring Radius Server Support With Windows 200076................................................................................................................................................................
Rsa Radius Server77................................................................................................................................................................
Setting Up The Rsa Radius Server77................................................................................................................................................................
Ldap Configuration And Microsoft's Active Directory78................................................................................................................................................................
Example Of A Brocade Dct File78................................................................................................................................................................
Example Of The Dictiona.dcm File78................................................................................................................................................................
Adding The Adlist80................................................................................................................................................................
Configuring Authentication Servers On The Switch80................................................................................................................................................................
Configuring Local Authentication As Backup83................................................................................................................................................................
Boot Prom Password83................................................................................................................................................................
San Director And Dc San Backbone Director (short Name, Dc Director)85................................................................................................................................................................
Recovering Forgotten Passwords87................................................................................................................................................................
Configuring Standard Security Features89................................................................................................................................................................
Security Protocols89................................................................................................................................................................
Secure Protocol Support89................................................................................................................................................................
The Ssh Protocol90................................................................................................................................................................
Items Needed To Deploy Secure Protocols90................................................................................................................................................................
Main Security Scenarios90................................................................................................................................................................
Ssh Public Key Authentication91................................................................................................................................................................
Allowed-user91................................................................................................................................................................
Configuring Ssh Authentication91................................................................................................................................................................
Authentication Setup Overview91................................................................................................................................................................
Deleting Keys On The Switch93................................................................................................................................................................
Configuring The Telnet Protocol93................................................................................................................................................................
Blocking Telnet93................................................................................................................................................................
Unblocking Telnet94................................................................................................................................................................
Configuring For The Ssl Protocol94................................................................................................................................................................
Browser And Java Support94................................................................................................................................................................
Summary Of Ssl Procedures95................................................................................................................................................................
Choosing A Certificate Authority95................................................................................................................................................................
Generating A Public And Private Key95................................................................................................................................................................
Ssl Certificate Files95................................................................................................................................................................
Generating And Storing A Csr96................................................................................................................................................................
Obtaining Certificates96................................................................................................................................................................
Installing A Switch Certificate97................................................................................................................................................................
Activating A Switch Certificate97................................................................................................................................................................
Configuring The Browser98................................................................................................................................................................
Installing A Root Certificate To The Java Plug-in98................................................................................................................................................................
Summary Of Certificate Commands99................................................................................................................................................................
Configuring For Snmp99................................................................................................................................................................
Commands For Displaying And Deleting Ssl Certificates99................................................................................................................................................................
Setting The Security Level100................................................................................................................................................................
Using The Snmpconfig Command100................................................................................................................................................................
Secure File Copy103................................................................................................................................................................
Setting Up Scp For Configuploads And Downloads104................................................................................................................................................................
Listener Applications104................................................................................................................................................................
Blocked Listener Applications104................................................................................................................................................................
Ports And Applications Used By Switches105................................................................................................................................................................
Port Configuration105................................................................................................................................................................
Access Defaults105................................................................................................................................................................
Port Information105................................................................................................................................................................
Configuring Advanced Security Features107................................................................................................................................................................
Acl Policies Overview107................................................................................................................................................................
How The Acl Policies Are Stored107................................................................................................................................................................
Security Database Size Restrictions107................................................................................................................................................................
Identifying Policy Members108................................................................................................................................................................
Acl Policy Management108................................................................................................................................................................
Valid Methods For Specifying Policy Members108................................................................................................................................................................
Displaying Acl Policies109................................................................................................................................................................
Fcs Policies109................................................................................................................................................................
Fcs Policy States109................................................................................................................................................................
Fcs Policy Restrictions110................................................................................................................................................................
Switch Operations110................................................................................................................................................................
Overview Of Fcs Policy Management111................................................................................................................................................................
Modifying The Primary Fcs111................................................................................................................................................................
Distributing An Fcs Policy112................................................................................................................................................................
Configuring A Dcc Policy113................................................................................................................................................................
Distribution Policy States113................................................................................................................................................................
Dcc Policy States113................................................................................................................................................................
Dcc Policy Restrictions114................................................................................................................................................................
Creating A Dcc Policy114................................................................................................................................................................
Examples Of Creating Dcc Policies115................................................................................................................................................................
Creating An Scc Policy116................................................................................................................................................................
Acl Policy Modifications116................................................................................................................................................................
Activating Changes To Acl Policies116................................................................................................................................................................
Scc Policy States116................................................................................................................................................................
Adding A Member To An Existing Policy117................................................................................................................................................................
Removing A Member From An Acl Policy117................................................................................................................................................................
Deleting An Acl Policy117................................................................................................................................................................
Aborting All Uncommitted Changes117................................................................................................................................................................
Configuring The Authentication Policy For Fabric Elements118................................................................................................................................................................
Dh-chap Authentication118................................................................................................................................................................
E_port Authentication119................................................................................................................................................................
Device Authentication Policy120................................................................................................................................................................
Auth Policy Restrictions120................................................................................................................................................................
Supported Hbas121................................................................................................................................................................
Authentication Protocols121................................................................................................................................................................
E_port Re-authentication121................................................................................................................................................................
Secret Key Pairs122................................................................................................................................................................
Fabric-wide Distribution Of The Auth Policy124................................................................................................................................................................
Accept Distributions Configuration Parameter124................................................................................................................................................................
Ip Filter Policy124................................................................................................................................................................
Creating An Ip Filter Policy124................................................................................................................................................................
Cloning An Ip Filter Policy124................................................................................................................................................................
Displaying An Ip Filter Policy125................................................................................................................................................................
Saving An Ip Filter Policy125................................................................................................................................................................
Activating An Ip Filter Policy125................................................................................................................................................................
Deleting An Ip Filter Policy125................................................................................................................................................................
Ip Filter Policy Rules126................................................................................................................................................................
Supported Services126................................................................................................................................................................
Ip Filter Policy Enforcement127................................................................................................................................................................
Implicit Ip Filter Rules127................................................................................................................................................................
Default Ip Policy Rules127................................................................................................................................................................
Creating Ip Filter Policy Rules128................................................................................................................................................................
Deleting Ip Filter Policy Rules128................................................................................................................................................................
Switch Session Transactions128................................................................................................................................................................
Aborting A Switch Session Transaction128................................................................................................................................................................
Ip Filter Policy Distributions128................................................................................................................................................................
Ip Filter Policy Restrictions129................................................................................................................................................................
Distributing The Policy Database129................................................................................................................................................................
Interaction Between Fabric-wide Consistency Policy And Distribution Settings129................................................................................................................................................................
Configuring The Database Distribution Settings130................................................................................................................................................................
Supported Policy Databases130................................................................................................................................................................
Distributing Acl Policies To Other Switches131................................................................................................................................................................
Setting The Consistency Policy Fabric-wide132................................................................................................................................................................
Acl Policy Database Distribution Behavior132................................................................................................................................................................
Fabric-wide Consistency Policy Settings133................................................................................................................................................................
Notes On Joining A Switch To The Fabric134................................................................................................................................................................
Matching Fabric-wide Consistency Policies134................................................................................................................................................................
Non-matching Fabric-wide Consistency Policies135................................................................................................................................................................
Merging Fabrics With Matching Fabric-wide Consistency Policies135................................................................................................................................................................
Examples Of Strict Fabric Merges135................................................................................................................................................................
Fips Support136................................................................................................................................................................
Zeroization Functions136................................................................................................................................................................
Fabric Merges With Tolerant/absent Combinations136................................................................................................................................................................
Zeroization Behavior136................................................................................................................................................................
Power-up Self Tests137................................................................................................................................................................
Conditional Tests137................................................................................................................................................................
Fips Mode137................................................................................................................................................................
Fips Mode Restrictions137................................................................................................................................................................
Ldap In Fips Mode138................................................................................................................................................................
Fips Mode Of Operation138................................................................................................................................................................
Additional Microsoft Active Directory Settings140................................................................................................................................................................
Ldap Certificates For Fips Mode140................................................................................................................................................................
Importing An Ldap Switch Certificate140................................................................................................................................................................
Active Directory Keys To Modify140................................................................................................................................................................
Exporting An Ldap Switch Certificate141................................................................................................................................................................
Deleting An Ldap Switch Certificate141................................................................................................................................................................
Preparing The Switch For Fips141................................................................................................................................................................
Overview Of Steps142................................................................................................................................................................
Disabling Fips Mode143................................................................................................................................................................
Zeroizing For Fips143................................................................................................................................................................
Displaying Fips Configuration143................................................................................................................................................................
Maintaining The Switch Configuration File145................................................................................................................................................................
Configuration Settings145................................................................................................................................................................
Displaying Configuration Settings145................................................................................................................................................................
Backing Up A Configuration145................................................................................................................................................................
Restoring A Configuration147................................................................................................................................................................
Configuration Download Without Disabling A Switch147................................................................................................................................................................
Cli Commands To Display Or Modify Switch Configuration Information147................................................................................................................................................................
Security Considerations149................................................................................................................................................................
Restoring Configurations In A Ficon Environment149................................................................................................................................................................
Backup And Restore In A Ficon Cup Environment149................................................................................................................................................................
Downloading Configurations Across A Fabric150................................................................................................................................................................
Configuration Form151................................................................................................................................................................
Configuration And Connection Information151................................................................................................................................................................
Managing Administrative Domains153................................................................................................................................................................
Fabric With Two Admin Domains154................................................................................................................................................................
Filtered Fabric Views When Using Admin Domains154................................................................................................................................................................
Admin Domain Features155................................................................................................................................................................
Requirements For Admin Domains155................................................................................................................................................................
Admin Domain Access Levels155................................................................................................................................................................
User-defined Administrative Domains156................................................................................................................................................................
System-defined Administrative Domains156................................................................................................................................................................
Ad User Types156................................................................................................................................................................
Ad255157................................................................................................................................................................
Admin Domains And Login157................................................................................................................................................................
Fabric With Ad0 And Ad255157................................................................................................................................................................
Admin Domain Member Types158................................................................................................................................................................
Device Members158................................................................................................................................................................
Switch Port Members158................................................................................................................................................................
Switch Members159................................................................................................................................................................
Admin Domains And Switch Wwn159................................................................................................................................................................
Admin Domain Compatibility And Availability160................................................................................................................................................................
Admin Domains And Merging160................................................................................................................................................................
Fabric Showing Switch And Device Wwns160................................................................................................................................................................
Filtered Fabric Views Showing Converted Switch Wwns160................................................................................................................................................................
Compatibility161................................................................................................................................................................
Firmware Upgrade Considerations161................................................................................................................................................................
Admin Domain Management For Physical Fabric Administrators161................................................................................................................................................................
Understanding The Ad Transaction Model161................................................................................................................................................................
Isolated Subfabrics161................................................................................................................................................................
Setting The Default Zone Mode162................................................................................................................................................................
Creating An Admin Domain162................................................................................................................................................................
Assigning A User To An Admin Domain163................................................................................................................................................................
Removing An Admin Domain From A User Account164................................................................................................................................................................
Activating And Deactivating Admin Domains165................................................................................................................................................................
Adding And Removing Admin Domain Members166................................................................................................................................................................
Renaming An Admin Domain167................................................................................................................................................................
Deleting An Admin Domain167................................................................................................................................................................
Deleting All User-defined Admin Domains168................................................................................................................................................................
Validating An Admin Domain Member List168................................................................................................................................................................
San Management With Admin Domains169................................................................................................................................................................
Using Cli Commands In An Ad Context169................................................................................................................................................................
Executing A Command In A Different Ad Context170................................................................................................................................................................
Displaying An Admin Domain Configuration170................................................................................................................................................................
Ports And Devices In Cli Output170................................................................................................................................................................
Switching To A Different Admin Domain Context171................................................................................................................................................................
Admin Domain Interactions171................................................................................................................................................................
Admin Domain Interaction With Fabric Os Features171................................................................................................................................................................
Admin Domains, Zones, And Zone Databases172................................................................................................................................................................
Admin Domains And Lsan Zones173................................................................................................................................................................
Configuration Upload And Download In An Ad Context174................................................................................................................................................................
Configuration Upload And Download Scenarios In An Ad Context174................................................................................................................................................................
Installing And Maintaining Firmware175................................................................................................................................................................
Firmware Download Process Overview175................................................................................................................................................................
Upgrading And Downgrading Firmware176................................................................................................................................................................
Effects Of Firmware Changes On Accounts And Passwords176................................................................................................................................................................
Considerations For Ficon Cup Environments176................................................................................................................................................................
Preparing For A Firmware Download177................................................................................................................................................................
Checking Connected Switches178................................................................................................................................................................
Recommended Firmware178................................................................................................................................................................
Finding The Firmware Version179................................................................................................................................................................
Obtaining And Decompressing Firmware179................................................................................................................................................................
Firmware Download On Switches180................................................................................................................................................................
Overview Of The Firmware Download Process On Switches180................................................................................................................................................................
Downloading Firmware To A Director181................................................................................................................................................................
Overview Of The Firmware Download Process On Directors182................................................................................................................................................................
San Director And Dc Director Firmwaredownload Procedure182................................................................................................................................................................
Firmwaredownload From A Usb Device185................................................................................................................................................................
Enabling Usb185................................................................................................................................................................
Viewing The Usb File System185................................................................................................................................................................
Downloading The 6.1.1 Image Using The Relative Path186................................................................................................................................................................
Downloading The 6.1.1 Image Using The Absolute Path186................................................................................................................................................................
Director Restrictions For Downgrading186................................................................................................................................................................
Public And Private Key Management186................................................................................................................................................................
Updating The Firmwarekey187................................................................................................................................................................
The Firmwaredownload Command188................................................................................................................................................................
Configuring The Switch For Signed Firmware188................................................................................................................................................................
Power-on Firmware Checksum Test188................................................................................................................................................................
Testing And Restoring Firmware On Switches189................................................................................................................................................................
Testing A Different Firmware Version On A Switch189................................................................................................................................................................
Testing And Restoring Firmware On Directors190................................................................................................................................................................
Validating Firmwaredownload192................................................................................................................................................................
Administering Advanced Zoning195................................................................................................................................................................
About Zoning195................................................................................................................................................................
Zoning Example195................................................................................................................................................................
Zone Types196................................................................................................................................................................
Types Of Zoning196................................................................................................................................................................
Approaches To Fabric-based Zoning196................................................................................................................................................................
Zone Objects197................................................................................................................................................................
Zoning Schemes198................................................................................................................................................................
Zone Aliases198................................................................................................................................................................
Zone Configurations198................................................................................................................................................................
Zoning Enforcement199................................................................................................................................................................
Software-enforced Zoning199................................................................................................................................................................
Hardware-enforced Zoning199................................................................................................................................................................
Enforcing Hardware Zoning200................................................................................................................................................................
Hardware-enforced Non-overlapping Zones201................................................................................................................................................................
Hardware-enforced Overlapping Zones202................................................................................................................................................................
Zoning With Hardware Assist (mixed-port And Wwn Zones)202................................................................................................................................................................
Session-based Hard Zoning202................................................................................................................................................................
Identifying The Enforced Zone Type203................................................................................................................................................................
Considerations For Zoning Architecture203................................................................................................................................................................
Best Practices For Zoning203................................................................................................................................................................
Broadcast Zones204................................................................................................................................................................
Supported Switches For Broadcast Zones204................................................................................................................................................................
Broadcast Zones And Admin Domains204................................................................................................................................................................
Broadcast Zones And Fc-fc Routing205................................................................................................................................................................
Upgrade And Downgrade Considerations205................................................................................................................................................................
High Availability Considerations With Broadcast Zones206................................................................................................................................................................
Loop Devices And Broadcast Zones206................................................................................................................................................................
Backward Compatibility With Pre-5.3.0 Switches206................................................................................................................................................................
Broadcast Zones And Default Zoning206................................................................................................................................................................
Creating And Managing Zone Aliases206................................................................................................................................................................
Creating And Maintaining Zones209................................................................................................................................................................
Default Zoning Mode212................................................................................................................................................................
Setting The Default Zoning Mode212................................................................................................................................................................
Viewing The Current Default Zone Access Mode213................................................................................................................................................................
Zone Database Size And Zone Merging Merging Zones213................................................................................................................................................................
Zoning Database Limitations213................................................................................................................................................................
Resulting Database Size: 0 To 96k214................................................................................................................................................................
Resulting Database Size: 96k To 128k214................................................................................................................................................................
Resulting Database Size: 128k To 256k215................................................................................................................................................................
Resulting Database Size: 256k To 1m215................................................................................................................................................................
Zoning Configurations216................................................................................................................................................................
Maintaining Zone Objects219................................................................................................................................................................
Zoning Configuration Management221................................................................................................................................................................
New Switch Or Fabric Additions221................................................................................................................................................................
Fabric Segmentation And Zoning223................................................................................................................................................................
Security And Zoning223................................................................................................................................................................
Zone Conflict Resolution223................................................................................................................................................................
Configuring Directors225................................................................................................................................................................
Identifying Ports225................................................................................................................................................................
Director Port Numbering Schemes226................................................................................................................................................................
Port Identification By Slot And Port Number226................................................................................................................................................................
Port Identification By Port Area Id226................................................................................................................................................................
Port Numbering Schemes For The 4/256 Director And Dc Director226................................................................................................................................................................
Port Identification By Index227................................................................................................................................................................
Default Index/area_id Core Pid Assignment With No Port Swap227................................................................................................................................................................
Basic Blade Management229................................................................................................................................................................
Customizing Enterprise-class Platform Names229................................................................................................................................................................
Powering Port Blades Off And On229................................................................................................................................................................
Disabling And Enabling Port Blades229................................................................................................................................................................
Fr4-18i Blade Exceptions230................................................................................................................................................................
Fc4-48 And Fc8-48 Blade Exceptions230................................................................................................................................................................
Conserving Power230................................................................................................................................................................
Blade Terminology And Compatibility231................................................................................................................................................................
Director Terminology And Abbreviations231................................................................................................................................................................
Cp Blades232................................................................................................................................................................
Core Blades232................................................................................................................................................................
Port Blade Compatibility232................................................................................................................................................................
Setting Chassis Configuration Options For The 4/256 Director233................................................................................................................................................................
Port Blades Supported By Each Director233................................................................................................................................................................
Supported Configuration Options233................................................................................................................................................................
Displaying Slot Information234................................................................................................................................................................
Platform Configuration Options234................................................................................................................................................................
Inter-chassis Link Behavior Between Two Hp Storageworks Dc Directors235................................................................................................................................................................
Led Behavior235................................................................................................................................................................
Routing Traffic237................................................................................................................................................................
Data Routing And Routing Policies237................................................................................................................................................................
Static Route Assignment238................................................................................................................................................................
Frame Order Delivery239................................................................................................................................................................
Dynamic Load Sharing239................................................................................................................................................................
Setting Dls240................................................................................................................................................................
Viewing Routing Path Information240................................................................................................................................................................
Viewing Routing Information Along A Path242................................................................................................................................................................
Implementing An Interoperable Fabric245................................................................................................................................................................
Configuring The Distributed Management Server247................................................................................................................................................................
Distributed Management Server Overview247................................................................................................................................................................
Platform Services247................................................................................................................................................................
Enabling Platform Services248................................................................................................................................................................
Disabling Platform Services248................................................................................................................................................................
Accessing The Management Server Database248................................................................................................................................................................
Displaying The Management Server Acl248................................................................................................................................................................
Adding A Member To The Acl249................................................................................................................................................................
Deleting A Member From The Acl249................................................................................................................................................................
Viewing The Contents Of The Management Server Database250................................................................................................................................................................
Clearing The Management Server Database251................................................................................................................................................................
Topology Discovery251................................................................................................................................................................
Iscsi Gateway Services253................................................................................................................................................................
Overview Of Iscsi Gateway Service253................................................................................................................................................................
Iscsi Session Translation253................................................................................................................................................................
Iscsi Gateway Network253................................................................................................................................................................
Iscsi Gateway Service Basic Implementation253................................................................................................................................................................
Basic Versus Advanced Lun Mapping254................................................................................................................................................................
Basic Lun Mapping254................................................................................................................................................................
Iscsi-to-fc Translation254................................................................................................................................................................
Iscsi Vt Basic Lun Mapping254................................................................................................................................................................
Advanced Lun Mapping255................................................................................................................................................................
Iscsi Component Identification255................................................................................................................................................................
Iqn Prefix255................................................................................................................................................................
Iscsi Vt Advanced Lun Mapping255................................................................................................................................................................
Changing And Displaying The Iqn Prefix256................................................................................................................................................................
Access Control With Discovery Domains256................................................................................................................................................................
Iqn Example256................................................................................................................................................................
Switch-to-iscsi Initiator Authentication257................................................................................................................................................................
Load Balancing Through Connection Redirection257................................................................................................................................................................
Discovery Domain Set Configuration Example257................................................................................................................................................................
Enabling And Disabling Connection Redirection For Load Balancing258................................................................................................................................................................
Displaying Connection Redirection Status258................................................................................................................................................................
Supported Iscsi Initiators259................................................................................................................................................................
Checklist For Configuring Iscsi259................................................................................................................................................................
Iscsi Target Gateway Configuration Steps259................................................................................................................................................................
Fc4-16ip Blade Configuration261................................................................................................................................................................
Fc4-16ip Port Numbering261................................................................................................................................................................
Fc4-16ip Ports261................................................................................................................................................................
Enabling The Iscsi Gateway Service262................................................................................................................................................................
Enabling Gbe Ports262................................................................................................................................................................
Configuring The Gbe Interface263................................................................................................................................................................
Iscsi Virtual Target Configuration264................................................................................................................................................................
Automatic Iscsi Vt Creation265................................................................................................................................................................
Generating Iscsi Vts For Every Fc Target265................................................................................................................................................................
Generating An Iscsi Vt For A Specific Fc Target267................................................................................................................................................................
Manual Iscsi Vt Creation268................................................................................................................................................................
Mapping Luns On A Specific Port To An Iscsi Vt270................................................................................................................................................................
Deleting Luns From An Iscsi Vt270................................................................................................................................................................
Displaying The Iscsi Virtual Target Lun Map271................................................................................................................................................................
Displaying Iscsi Vt State And Status271................................................................................................................................................................
Discovery Domain And Domain Set Configuration271................................................................................................................................................................
Displaying Iscsi Initiator Iqns272................................................................................................................................................................
Creating Discovery Domains272................................................................................................................................................................
Creating And Enabling A Discovery Domain Sets272................................................................................................................................................................
Iscsi Initiator-to-vt Authentication Configuration273................................................................................................................................................................
Setting The User Name And Shared Secret273................................................................................................................................................................
Binding User Names To An Iscsi Vt273................................................................................................................................................................
Deleting User Names From An Iscsi Vt Binding List274................................................................................................................................................................
Displaying Chap Configurations274................................................................................................................................................................
Committing The Iscsi-related Configuration274................................................................................................................................................................
Resolving Conflicts Between Iscsi Configurations275................................................................................................................................................................
Lun Masking Considerations275................................................................................................................................................................
Iscsi Fc Zoning Overview276................................................................................................................................................................
Iscsi Gateway Service In An Iscsi Fc Zone276................................................................................................................................................................
Iscsi Fc Zone Creation277................................................................................................................................................................
Creating An Iscsi Fc Zone277................................................................................................................................................................