HP StorageWorks 8/40 - SAN Switch Manuals

Manuals and User Guides for HP StorageWorks 8/40 - SAN Switch. We have 10 HP StorageWorks 8/40 - SAN Switch manuals available for free PDF download: Administrator's Manual, Hardware Reference Manual, Release Note

HP StorageWorks 8/40 - SAN Switch Administrator's Manual

HP StorageWorks 8/40 - SAN Switch Administrator's Manual (576 pages)

HP StorageWorks Fabric OS 6.2 administrator guide (5697-0016, May 2009)  
Brand: HP | Category: Switch | Size: 4.15 MB
Table of contents
Table Of Contents3................................................................................................................................................................
About This Guide25................................................................................................................................................................
Supported Fabric Os 6.2.x Hp Storageworks Hardware25................................................................................................................................................................
Fabric Os 6.2 Administrator Guide25................................................................................................................................................................
Intended Audience26................................................................................................................................................................
Related Documentation26................................................................................................................................................................
Document Conventions And Symbols26................................................................................................................................................................
Rack Stability27................................................................................................................................................................
Hp Technical Support27................................................................................................................................................................
Customer Self Repair27................................................................................................................................................................
Product Warranties27................................................................................................................................................................
Subscription Service28................................................................................................................................................................
Hp Websites28................................................................................................................................................................
Documentation Feedback28................................................................................................................................................................
Fabric Os Overview29................................................................................................................................................................
Fabric Os Command Line Interface29................................................................................................................................................................
Getting Help On A Command29................................................................................................................................................................
Telnet Or Ssh Sessions30................................................................................................................................................................
Rules For Telnet Connections30................................................................................................................................................................
Connecting To Fabric Os Using Telnet30................................................................................................................................................................
Console Sessions Using The Serial Port31................................................................................................................................................................
Connecting To Fabric Os Through The Serial Port31................................................................................................................................................................
Password Modification31................................................................................................................................................................
Default Account Passwords31................................................................................................................................................................
Changing The Default Account Passwords At Login32................................................................................................................................................................
The Ethernet Interface On Your Switch33................................................................................................................................................................
Virtual Fabrics And The Ethernet Interface33................................................................................................................................................................
Displaying The Network Interface Settings34................................................................................................................................................................
Static Ethernet Addresses35................................................................................................................................................................
Setting The Static Addresses For The Ethernet Network Interface35................................................................................................................................................................
Dhcp Activation35................................................................................................................................................................
Activating Dhcp36................................................................................................................................................................
Deactivating Dhcp36................................................................................................................................................................
Ipv6 Autoconfiguration37................................................................................................................................................................
Setting Ipv6 Autoconfiguration37................................................................................................................................................................
Date And Time Settings37................................................................................................................................................................
Setting The Date And Time37................................................................................................................................................................
Time Zone Settings38................................................................................................................................................................
Setting The Time Zone38................................................................................................................................................................
Setting The Time Zone Interactively39................................................................................................................................................................
Network Time Protocol39................................................................................................................................................................
Synchronizing The Local Time With An External Source40................................................................................................................................................................
Switch Names40................................................................................................................................................................
Customizing The Switch Name40................................................................................................................................................................
Chassis Names40................................................................................................................................................................
Customizing Chassis Names41................................................................................................................................................................
Setting The Domain Id42................................................................................................................................................................
Domain Ids43................................................................................................................................................................
Licensed Features43................................................................................................................................................................
Icl Licensing45................................................................................................................................................................
License Requirements45................................................................................................................................................................
Time-based Licenses46................................................................................................................................................................
High Availability Considerations46................................................................................................................................................................
Firmware Upgrade And Downgrade Consideration46................................................................................................................................................................
Configupload And Download Considerations46................................................................................................................................................................
Expired Licenses46................................................................................................................................................................
Removing A Licensed Feature48................................................................................................................................................................
List Of Available Ports When Implementing Pods49................................................................................................................................................................
Activating Ports On Demand50................................................................................................................................................................
Ports On Demand51................................................................................................................................................................
Dynamic Ports On Demand52................................................................................................................................................................
Disabling Dynamic Ports On Demand52................................................................................................................................................................
Pod License Management52................................................................................................................................................................
Reserving A Port License52................................................................................................................................................................
Releasing A Port From A Pod Set53................................................................................................................................................................
Switch Activation And Deactivation54................................................................................................................................................................
Disabling A Switch54................................................................................................................................................................
Enabling A Switch54................................................................................................................................................................
Port Activation And Deactivation54................................................................................................................................................................
Disabling A Port55................................................................................................................................................................
Enabling A Port55................................................................................................................................................................
Basic Connections55................................................................................................................................................................
Device Connection56................................................................................................................................................................
Switch Connection56................................................................................................................................................................
Gateway Links56................................................................................................................................................................
Configuring A Link Through A Gateway56................................................................................................................................................................
Equipment Status57................................................................................................................................................................
Checking Switch Operation57................................................................................................................................................................
Verifying High Availability Features (directors And Enterprise-class Platforms Only)57................................................................................................................................................................
Verifying Fabric Connectivity58................................................................................................................................................................
Verifying Device Connectivity59................................................................................................................................................................
Displaying Switches In Access Gateway Mode60................................................................................................................................................................
Track And Control Switch Changes60................................................................................................................................................................
Enabling The Track Changes Feature60................................................................................................................................................................
Displaying The Status Of The Track Changes Feature60................................................................................................................................................................
Viewing The Switch Status Policy Threshold Values61................................................................................................................................................................
Setting The Switch Status Policy Threshold Values61................................................................................................................................................................
Audit Log Configuration62................................................................................................................................................................
Auditable Event Classes63................................................................................................................................................................
Auditcfg Event Class Operands63................................................................................................................................................................
Verifying Host Syslog Prior To Configuring The Audit Log64................................................................................................................................................................
Configuring An Audit Log For Specific Event Classes64................................................................................................................................................................
Switch And Enterprise-class Platform Shutdown65................................................................................................................................................................
Powering Off A Switch65................................................................................................................................................................
Powering Off An Enterprise-class Platform65................................................................................................................................................................
High Availability Of Daemon Processes66................................................................................................................................................................
Daemons That Are Automatically Restarted66................................................................................................................................................................
Managing User Accounts67................................................................................................................................................................
User Accounts Overview67................................................................................................................................................................
Role-based Access Control (rbac)67................................................................................................................................................................
Fabric Os Roles68................................................................................................................................................................
Permission Types68................................................................................................................................................................
Rbac Permissions Matrix69................................................................................................................................................................
Role Permissions70................................................................................................................................................................
The Management Channel70................................................................................................................................................................
Maximum Number Of Simultaneous Sessions70................................................................................................................................................................
Local Database User Accounts71................................................................................................................................................................
Default Accounts71................................................................................................................................................................
Displaying Account Information71................................................................................................................................................................
Creating An Account71................................................................................................................................................................
Default Local User Accounts71................................................................................................................................................................
Deleting An Account72................................................................................................................................................................
Changing Account Parameters73................................................................................................................................................................
Local Account Passwords73................................................................................................................................................................
Changing The Password For The Current Login Account74................................................................................................................................................................
Changing The Password For A Different Account74................................................................................................................................................................
Local Account Database Distribution74................................................................................................................................................................
Distributing The Local User Database74................................................................................................................................................................
Protection Of The Local User Database From Distributions75................................................................................................................................................................
Accepting Distribution Of User Databases On The Local Switch75................................................................................................................................................................
Rejecting Distributed User Databases On The Local Switch75................................................................................................................................................................
Password Policies75................................................................................................................................................................
Password Strength Policy75................................................................................................................................................................
Password History Policy76................................................................................................................................................................
Password Expiration Policy76................................................................................................................................................................
Upgrade And Downgrade Considerations For Password Management77................................................................................................................................................................
Account Lockout Policy77................................................................................................................................................................
Enabling The Admin Lockout Policy78................................................................................................................................................................
Unlocking An Account78................................................................................................................................................................
Disabling The Admin Lockout Policy78................................................................................................................................................................
Denial Of Service Implications78................................................................................................................................................................
With A Recovery String79................................................................................................................................................................
The Boot Prom Password80................................................................................................................................................................
Without A Recovery String81................................................................................................................................................................
Setting The Boot Prom Password For A Switch Without A Recovery String81................................................................................................................................................................
Setting The Boot Prom Password For A Director Without A Recovery String81................................................................................................................................................................
Recovering Forgotten Passwords82................................................................................................................................................................
The Authentication Model83................................................................................................................................................................
Effects Of Using Radius Or Ldap Service On Fabric Os Features83................................................................................................................................................................
Setting The Switch Authentication Mode84................................................................................................................................................................
Authentication Configuration Options84................................................................................................................................................................
Fabric Os User Accounts85................................................................................................................................................................
Syntax For Vsa-based Account Roles85................................................................................................................................................................
Fabric Os Users On The Radius Server86................................................................................................................................................................
Windows 2000 Ias86................................................................................................................................................................
Dictionary.brocade File Entries86................................................................................................................................................................
Linux Freeradius Server88................................................................................................................................................................
The Radius Server90................................................................................................................................................................
Enabling Clients90................................................................................................................................................................
Radius Authentication91................................................................................................................................................................
Rsa Radius Server91................................................................................................................................................................
Setting Up The Rsa Radius Server91................................................................................................................................................................
Ldap Configuration And Microsoft Active Directory93................................................................................................................................................................
Creating A User94................................................................................................................................................................
Creating A Group94................................................................................................................................................................
Assigning The Group (role) To The User94................................................................................................................................................................
Adding An Admin Domain List94................................................................................................................................................................
Authentication Servers On The Switch95................................................................................................................................................................
Displaying The Current Radius Configuration95................................................................................................................................................................
Adding A Radius Server To The Switch Configuration96................................................................................................................................................................
Adding An Ldap Server To The Switch Configuration96................................................................................................................................................................
Enabling And Disabling A Radius Or Ldap Server96................................................................................................................................................................
Deleting A Radius Or Ldap Server From The Configuration97................................................................................................................................................................
Changing A Radius Server Configuration97................................................................................................................................................................
Changing An Ldap Server Configuration97................................................................................................................................................................
Changing The Order In Which Radius Or Ldap Servers Are Contacted For Service97................................................................................................................................................................
Configuring Local Authentication As Backup98................................................................................................................................................................
Configuring Standard Security Features101................................................................................................................................................................
Security Protocols101................................................................................................................................................................
Secure Protocol Support101................................................................................................................................................................
Secure File Copy102................................................................................................................................................................
Setting Up Scp For Configuploads And Downloads102................................................................................................................................................................
Items Needed To Deploy Secure Protocols102................................................................................................................................................................
Main Security Scenarios102................................................................................................................................................................
Simple Network Management Protocol103................................................................................................................................................................
Snmp And Virtual Fabrics104................................................................................................................................................................
Filtering Ports104................................................................................................................................................................
Switch And Chassis Context Enforcement104................................................................................................................................................................
The Security Level104................................................................................................................................................................
The Snmpconfig Command105................................................................................................................................................................
Secure Shell Protocol107................................................................................................................................................................
Ssh Public Key Authentication107................................................................................................................................................................
Allowed-user107................................................................................................................................................................
Configuring Ssh Authentication108................................................................................................................................................................
Deleting Keys On The Switch109................................................................................................................................................................
Secure Sockets Layer Protocol110................................................................................................................................................................
Browser And Java Support110................................................................................................................................................................
Ssl Configuration Overview110................................................................................................................................................................
Ssl Certificate Files110................................................................................................................................................................
Certificate Authorities111................................................................................................................................................................
Generating A Public And Private Key111................................................................................................................................................................
Generating And Storing A Csr111................................................................................................................................................................
Obtaining Certificates112................................................................................................................................................................
Installing A Switch Certificate112................................................................................................................................................................
The Browser112................................................................................................................................................................
Checking And Installing Root Certificates On Internet Explorer113................................................................................................................................................................
Checking And Installing Root Certificates On Mozilla Firefox113................................................................................................................................................................
Root Certificates For The Java Plug-in113................................................................................................................................................................
Installing A Root Certificate To The Java Plug-in113................................................................................................................................................................
Summary Of Certificate Commands114................................................................................................................................................................
Telnet Protocol114................................................................................................................................................................
Blocking Telnet114................................................................................................................................................................
Commands For Displaying And Deleting Ssl Certificates114................................................................................................................................................................
Unblocking Telnet115................................................................................................................................................................
Listener Applications115................................................................................................................................................................
Blocked Listener Applications115................................................................................................................................................................
Ports And Applications Used By Switches116................................................................................................................................................................
Access Defaults116................................................................................................................................................................
Port Configuration117................................................................................................................................................................
Port Information117................................................................................................................................................................
Configuring Advanced Security Features119................................................................................................................................................................
Acl Policies Overview119................................................................................................................................................................
How The Acl Policies Are Stored119................................................................................................................................................................
Security Database Size Restrictions119................................................................................................................................................................
Policy Members120................................................................................................................................................................
Acl Policy Management120................................................................................................................................................................
Valid Methods For Specifying Policy Members120................................................................................................................................................................
Displaying Acl Policies121................................................................................................................................................................
Fcs Policies121................................................................................................................................................................
Fcs Policy States121................................................................................................................................................................
Fcs Policy Restrictions122................................................................................................................................................................
Overview Of Fcs Policy Management122................................................................................................................................................................
Switch Operations122................................................................................................................................................................
Creating An Fcs Policy123................................................................................................................................................................
Modifying The Order Of Fcs Switches123................................................................................................................................................................
Fcs Policy Distribution124................................................................................................................................................................
Dcc Policies125................................................................................................................................................................
Distribution Policy States125................................................................................................................................................................
Dcc Policy States125................................................................................................................................................................
Dcc Policy Restrictions126................................................................................................................................................................
Creating A Dcc Policy126................................................................................................................................................................
Deleting A Dcc Policy127................................................................................................................................................................
Scc Policies127................................................................................................................................................................
Scc Policy States127................................................................................................................................................................
Creating An Scc Policy128................................................................................................................................................................
Acl Policy Modifications128................................................................................................................................................................
Saving Changes Without Activating The Policies128................................................................................................................................................................
Activating Policy Changes128................................................................................................................................................................
Deleting An Acl Policy128................................................................................................................................................................
Member Modification To Existing Policies129................................................................................................................................................................
Adding A Member To An Existing Acl Policy129................................................................................................................................................................
Removing A Member From An Acl Policy129................................................................................................................................................................
Aborting All Unsaved Changes129................................................................................................................................................................
Authentication Policy For Fabric Elements129................................................................................................................................................................
Dh-chap Authentication130................................................................................................................................................................
E_port Authentication131................................................................................................................................................................
Device Authentication Policy132................................................................................................................................................................
Auth Policy Restrictions133................................................................................................................................................................
Supported Hbas133................................................................................................................................................................
Authentication Protocols133................................................................................................................................................................
Viewing The Current Authentication Parameter Settings For A Switch134................................................................................................................................................................
Setting The Authentication Protocol Used By The Switch To Dh-chap134................................................................................................................................................................
Re-authenticating E_ports134................................................................................................................................................................
Secret Key Pairs135................................................................................................................................................................
Viewing The List Of Secret Key Pairs In The Current Switch Database135................................................................................................................................................................
Setting A Secret Key Pair135................................................................................................................................................................
Fabric-wide Distribution Of The Auth Policy136................................................................................................................................................................
Accept Distributions Configuration Parameter136................................................................................................................................................................
Ip Filter Policy137................................................................................................................................................................
Creating An Ip Filter Policy137................................................................................................................................................................
Cloning An Ip Filter Policy137................................................................................................................................................................
Displaying An Ip Filter Policy137................................................................................................................................................................
Saving An Ip Filter Policy138................................................................................................................................................................
Activating An Ip Filter Policy138................................................................................................................................................................
Deleting An Ip Filter Policy138................................................................................................................................................................
Ip Filter Policy Rules138................................................................................................................................................................
Supported Services139................................................................................................................................................................
Implicit Ip Filter Rules139................................................................................................................................................................
Ip Filter Policy Enforcement140................................................................................................................................................................
Adding A Rule To An Ip Filter Policy140................................................................................................................................................................
Default Ip Policy Rules140................................................................................................................................................................
Deleting A Rule To An Ip Filter Policy141................................................................................................................................................................
Aborting A Transaction Associated With Ip Filter141................................................................................................................................................................
Ip Filter Policy Distributions141................................................................................................................................................................
Ip Filter Policy Restrictions141................................................................................................................................................................
Policy Database Distribution141................................................................................................................................................................
Database Distribution Settings142................................................................................................................................................................
Interaction Between Fabric-wide Consistency Policy And Distribution Settings142................................................................................................................................................................
Displaying The Database Distribution Settings143................................................................................................................................................................
Enabling Local Switch Protection143................................................................................................................................................................
Disabling Local Switch Protection143................................................................................................................................................................
Supported Policy Databases143................................................................................................................................................................
Acl Policy Distribution To Other Switches144................................................................................................................................................................
Distributing The Local Acl Policies144................................................................................................................................................................
Fabric-wide Enforcement144................................................................................................................................................................
Acl Policy Database Distribution Behavior144................................................................................................................................................................
Displaying The Fabric-wide Consistency Policy145................................................................................................................................................................
Setting The Fabric-wide Consistency Policy145................................................................................................................................................................
Fabric-wide Consistency Policy Settings145................................................................................................................................................................
Notes On Joining A Switch To The Fabric146................................................................................................................................................................
Matching Fabric-wide Consistency Policies146................................................................................................................................................................
Non-matching Fabric-wide Consistency Policies147................................................................................................................................................................
Merging Fabrics With Matching Fabric-wide Consistency Policies147................................................................................................................................................................
Examples Of Strict Fabric Merges147................................................................................................................................................................
Securing The Management Interface148................................................................................................................................................................
Configuration Examples148................................................................................................................................................................
Endpoint-to-endpoint Transport Or Tunnel148................................................................................................................................................................
Fabric Merges With Tolerant/absent Combinations148................................................................................................................................................................
Gateway-to-gateway Tunnel149................................................................................................................................................................
Endpoint-to-gateway Tunnel149................................................................................................................................................................
Roadwarrior Configuration149................................................................................................................................................................
Protected Endpoints Configuration149................................................................................................................................................................
Gateway Tunnel Configuration149................................................................................................................................................................
Endpoint To Gateway Tunnel Configuration149................................................................................................................................................................
Nested Configurations150................................................................................................................................................................
Ipsec Protocols150................................................................................................................................................................
Security Associations150................................................................................................................................................................
Ipsec Sa-proposal150................................................................................................................................................................
Authentication And Encryption Algorithms150................................................................................................................................................................
Algorithms And Associated Authentication Policies150................................................................................................................................................................
Block Ciphers151................................................................................................................................................................
Hmac151................................................................................................................................................................
Blowfish151................................................................................................................................................................
Null Encryption152................................................................................................................................................................
Ipsec Policies152................................................................................................................................................................
Ipsec Traffic Selector152................................................................................................................................................................
Ipsec Transform152................................................................................................................................................................
Ike Policies152................................................................................................................................................................
Key Management152................................................................................................................................................................
Pre-shared Keys153................................................................................................................................................................
Security Certificates153................................................................................................................................................................
Static Security Associations153................................................................................................................................................................
Creating The Tunnel153................................................................................................................................................................
Example Of An End-to-end Transport Tunnel Mode155................................................................................................................................................................
Fips Support156................................................................................................................................................................
Zeroization Functions156................................................................................................................................................................
Zeroization Behavior156................................................................................................................................................................
Power-on Self Tests157................................................................................................................................................................
Conditional Tests157................................................................................................................................................................
Fips Mode Configuration157................................................................................................................................................................
Ldap In Fips Mode158................................................................................................................................................................
Fips Mode Restrictions158................................................................................................................................................................
Fips And Non-fips Modes Of Operation158................................................................................................................................................................
Setting Up Ldap For Fips Mode159................................................................................................................................................................
Ldap Certificates For Fips Mode160................................................................................................................................................................
Importing An Ldap Switch Certificate160................................................................................................................................................................
Exporting An Ldap Switch Certificate160................................................................................................................................................................
Active Directory Keys To Modify160................................................................................................................................................................
Deleting An Ldap Switch Certificate161................................................................................................................................................................
Preparing The Switch For Fips161................................................................................................................................................................
Overview Of Steps161................................................................................................................................................................
Enabling Fips Mode162................................................................................................................................................................
Disabling Fips Mode163................................................................................................................................................................
Zeroizing For Fips163................................................................................................................................................................
Displaying Fips Configuration163................................................................................................................................................................
Maintaining The Switch Configuration File165................................................................................................................................................................
Configuration Settings165................................................................................................................................................................
Configuration File Format165................................................................................................................................................................
Chassis Section166................................................................................................................................................................
Switch Section167................................................................................................................................................................
Configuration File Backup167................................................................................................................................................................
Uploading A Configuration File In Interactive Mode167................................................................................................................................................................
Configuration File Restoration168................................................................................................................................................................
Restrictions169................................................................................................................................................................
Configuration Download Without Disabling A Switch170................................................................................................................................................................
Restoring A Configuration170................................................................................................................................................................
Cli Commands To Display Or Modify Switch Configuration Information170................................................................................................................................................................
Configurations Across A Fabric172................................................................................................................................................................
Downloading A Configuration File From One Switch To Another Same Model Switch173................................................................................................................................................................
Security Considerations173................................................................................................................................................................
Configuration Restoration In A Ficon Environment173................................................................................................................................................................
Backup And Restore In A Ficon Cup Environment173................................................................................................................................................................
B-series Configuration Form174................................................................................................................................................................
B-series Configuration And Connection174................................................................................................................................................................
Managing Virtual Fabrics175................................................................................................................................................................
Virtual Fabrics Overview175................................................................................................................................................................
Logical Switch175................................................................................................................................................................
Default Logical Switch175................................................................................................................................................................
Logical Switches And Fabric Ids176................................................................................................................................................................
Switch Before And After Enabling Virtual Fabrics176................................................................................................................................................................
Switch Before And After Creating Logical Switches176................................................................................................................................................................
Port Assignment In Logical Switches177................................................................................................................................................................
Fabric Ids Assigned To Logical Switches177................................................................................................................................................................
Assigning Ports To Logical Switches177................................................................................................................................................................
Logical Switches And Connected Devices178................................................................................................................................................................
Logical Switches Connected To Devices And Non-virtual Fabrics Switch178................................................................................................................................................................
Logical Fabric179................................................................................................................................................................
Logical Fabric And Isls179................................................................................................................................................................
Logical Switches In A Single Chassis Belonging To Separate Fabrics179................................................................................................................................................................
Logical Switches Connected To Other Logical Switches Through Physical Isls179................................................................................................................................................................
Logical Fabric And Isl Sharing180................................................................................................................................................................
Logical Switches Connected To Form Logical Fabrics180................................................................................................................................................................
Base Switches Connected By An Xisl181................................................................................................................................................................
Logical Isls Connecting Logical Switches181................................................................................................................................................................
Logical Fabric Formation182................................................................................................................................................................
Management Model For Logical Switches182................................................................................................................................................................
Logical Fabric Using Isls And Xisls182................................................................................................................................................................
Account Management And Virtual Fabrics183................................................................................................................................................................
Supported Platforms For Virtual Fabrics183................................................................................................................................................................
Switch183................................................................................................................................................................
Dc04 San Director184................................................................................................................................................................
Virtual Fabrics Interaction With Other Fabric Os Features184................................................................................................................................................................
Virtual Fabrics Interaction With Fabric Os Features184................................................................................................................................................................
Limitations And Restrictions Of Virtual Fabrics185................................................................................................................................................................
Maximum Number Of Logical Switches Per Chassis185................................................................................................................................................................
Enabling Virtual Fabrics186................................................................................................................................................................
Disabling Virtual Fabrics186................................................................................................................................................................
Creating A Logical Switch Or Base Switch187................................................................................................................................................................
Deleting A Logical Switch188................................................................................................................................................................
Adding And Removing Ports On A Logical Switch188................................................................................................................................................................
Displaying Logical Switch Configuration189................................................................................................................................................................
Changing The Fabric Id Of A Logical Switch189................................................................................................................................................................
Changing A Logical Switch To A Base Switch189................................................................................................................................................................
Configuring A Logical Switch For Xisl Use189................................................................................................................................................................
Changing The Context To A Different Logical Fabric190................................................................................................................................................................
Creating A Logical Fabric Using Xisls190................................................................................................................................................................
Example Of Logical Fabrics In Multiple Chassis And Xisls191................................................................................................................................................................
Managing Administrative Domains193................................................................................................................................................................
Administrative Domains Overview193................................................................................................................................................................
Admin Domain Features194................................................................................................................................................................
Fabric With Two Admin Domains194................................................................................................................................................................
Filtered Fabric Views When Using Admin Domains194................................................................................................................................................................
Requirements For Admin Domains195................................................................................................................................................................
Admin Domain Access Levels195................................................................................................................................................................
User-defined Administrative Domains196................................................................................................................................................................
System-defined Administrative Domains196................................................................................................................................................................
Ad User Types196................................................................................................................................................................
Ad255197................................................................................................................................................................
Admin Domains And Login197................................................................................................................................................................
Fabric With Ad0 And Ad255197................................................................................................................................................................
Admin Domain Member Types198................................................................................................................................................................
Device Members198................................................................................................................................................................
Switch Port Members198................................................................................................................................................................
Switch Members199................................................................................................................................................................
Admin Domains And Switch Wwn199................................................................................................................................................................
Admin Domain Compatibility, Availability, And Merging200................................................................................................................................................................
Fabric Showing Switch And Device Wwns200................................................................................................................................................................
Filtered Fabric Views Showing Converted Switch Wwns200................................................................................................................................................................
Firmware Upgrade Considerations201................................................................................................................................................................
Admin Domain Management For Physical Fabric Administrators201................................................................................................................................................................
Isolated Subfabrics201................................................................................................................................................................
Setting The Default Zone Mode202................................................................................................................................................................
Creating An Admin Domain202................................................................................................................................................................
Assigning A User To An Admin Domain203................................................................................................................................................................
Creating A New User Account For Managing Admin Domains204................................................................................................................................................................
Assigning Admin Domains To An Existing User Account204................................................................................................................................................................
Creating A New Physical Fabric Administrator User Account204................................................................................................................................................................
Removing An Admin Domain From A User Account204................................................................................................................................................................
Activating An Admin Domain205................................................................................................................................................................
Deactivating An Admin Domain205................................................................................................................................................................
Adding Members To An Existing Admin Domainconnect To An Ad-capable Switch And Log In As Admin206................................................................................................................................................................
Removing Members From An Admin Domain206................................................................................................................................................................
Renaming An Admin Domain207................................................................................................................................................................
Deleting An Admin Domain207................................................................................................................................................................
Deleting All User-defined Admin Domains208................................................................................................................................................................
Validating An Admin Domain Member List208................................................................................................................................................................
San Management With Admin Domains209................................................................................................................................................................
Cli Commands In An Ad Context209................................................................................................................................................................
Ports And Devices In Cli Output209................................................................................................................................................................
Executing A Command In A Different Ad Context210................................................................................................................................................................
Displaying An Admin Domain Configuration210................................................................................................................................................................
Switching To A Different Admin Domain Context210................................................................................................................................................................
Admin Domain Interactions With Other Fabric Os Features211................................................................................................................................................................
Admin Domain Interaction With Fabric Os Features211................................................................................................................................................................
Admin Domains, Zones, And Zone Databases212................................................................................................................................................................
Admin Domains And Lsan Zones213................................................................................................................................................................
Configuration Upload And Download In An Ad Context214................................................................................................................................................................
Configuration Upload And Download Scenarios In An Ad Context214................................................................................................................................................................
Installing And Maintaining Firmware215................................................................................................................................................................
Firmware Download Process Overview215................................................................................................................................................................
Upgrading And Downgrading Firmware216................................................................................................................................................................
Effects Of Firmware Changes On Accounts And Passwords216................................................................................................................................................................
Considerations For Ficon Cup Environments216................................................................................................................................................................
High Available Sync State217................................................................................................................................................................
Preparing For A Firmware Download217................................................................................................................................................................
Enterprise-class Platform Ha Sync States217................................................................................................................................................................
Connected Switches218................................................................................................................................................................
Finding The Switch Firmware Version218................................................................................................................................................................
Obtain And Decompress Firmware219................................................................................................................................................................
Firmware Download On Switches219................................................................................................................................................................
Switch Firmware Download Process Overview219................................................................................................................................................................
Upgrading Firmware For Switch And Router Products220................................................................................................................................................................
Firmware Download On An Enterprise-class Platform221................................................................................................................................................................
Enterprise-class Platform Firmware Download Process Overview222................................................................................................................................................................
Upgrading Firmware On Enterprise-class Platforms (including Blades)222................................................................................................................................................................
Firmware Download From A Usb Device226................................................................................................................................................................
Enabling Usb226................................................................................................................................................................
Viewing The Usb File System226................................................................................................................................................................
Downloading The 6.2.0 Image Using The Relative Path227................................................................................................................................................................
Downloading The 6.2.0 Image Using The Absolute Path227................................................................................................................................................................
Public And Private Key Management227................................................................................................................................................................
Updating The Firmwarekey228................................................................................................................................................................
The Firmwaredownload Command228................................................................................................................................................................
Configuring The Switch For Signed Firmware228................................................................................................................................................................
Power-on Firmware Checksum Test229................................................................................................................................................................
Test And Restore Firmware On Switches229................................................................................................................................................................
Testing A Different Firmware Version On A Switch229................................................................................................................................................................
Test And Restore Firmware On Enterprise-class Platforms230................................................................................................................................................................
Testing Different Firmware Versions On Enterprise-class Platforms230................................................................................................................................................................
Validating A Firmware Download233................................................................................................................................................................
Administering Advanced Zoning235................................................................................................................................................................
Zoning Overview235................................................................................................................................................................
Zoning Example235................................................................................................................................................................
Zone Types236................................................................................................................................................................
Types Of Zoning236................................................................................................................................................................
Approaches To Fabric-based Zoning236................................................................................................................................................................
Zone Objects237................................................................................................................................................................
Zoning Schemes238................................................................................................................................................................
Zone Aliases238................................................................................................................................................................
Zone Configurations238................................................................................................................................................................
Zoning Enforcement239................................................................................................................................................................
Software-enforced Zoning239................................................................................................................................................................
Hardware-enforced Zoning239................................................................................................................................................................
Hardware-enforced Nonoverlapping Zones241................................................................................................................................................................
Enforcing Hardware Zoning241................................................................................................................................................................
Identifying The Enforced Zone Type242................................................................................................................................................................
Hardware-enforced Overlapping Zones242................................................................................................................................................................
Zoning With Hardware Assist (mixed-port And Wwn Zones)242................................................................................................................................................................
Session-based Hard Zoning242................................................................................................................................................................
Considerations For Zoning Architecture243................................................................................................................................................................
Best Practices For Zoning243................................................................................................................................................................
Broadcast Zones243................................................................................................................................................................
Supported Switches For Broadcast Zones244................................................................................................................................................................
Broadcast Zones And Admin Domains244................................................................................................................................................................
Broadcast Zones And Fc-fc Routing245................................................................................................................................................................
Upgrade And Downgrade Considerations For Broadcast Zones245................................................................................................................................................................
High Availability Considerations With Broadcast Zones245................................................................................................................................................................
Loop Devices And Broadcast Zones246................................................................................................................................................................
Backward Compatibility With Pre-5.3.0 Switches246................................................................................................................................................................
Broadcast Zones And Default Zoning246................................................................................................................................................................
Creating An Alias246................................................................................................................................................................
Adding Members To An Alias247................................................................................................................................................................
Removing Members From An Alias247................................................................................................................................................................
Deleting An Alias248................................................................................................................................................................
Viewing An Alias In The Defined Configuration249................................................................................................................................................................
Zone Creation And Maintenance249................................................................................................................................................................
Creating A Zone249................................................................................................................................................................
Adding Devices (members) To A Zone250................................................................................................................................................................
Removing Devices (members) From A Zone250................................................................................................................................................................
Deleting A Zone251................................................................................................................................................................
Viewing A Zone In The Defined Configuration251................................................................................................................................................................
Validating A Zone252................................................................................................................................................................
Default Zoning Mode253................................................................................................................................................................
Setting The Default Zoning Mode253................................................................................................................................................................
Viewing The Current Default Zone Access Mode253................................................................................................................................................................
Zoning Database Size And Zone Merging254................................................................................................................................................................
Zoning Database Limitations254................................................................................................................................................................
Resulting Database Size: 0 To 96k254................................................................................................................................................................
Resulting Database Size: 96k To 128k255................................................................................................................................................................
Resulting Database Size: 128k To 256k255................................................................................................................................................................
Zoning Configurations256................................................................................................................................................................
Resulting Database Size: 256k To 1m256................................................................................................................................................................
Creating A Zoning Configuration257................................................................................................................................................................
Adding Zones (members) To A Zoning Configuration257................................................................................................................................................................
Removing Zones (members) From A Zone Configuration258................................................................................................................................................................
Enabling A Zone Configuration258................................................................................................................................................................
Disabling A Zone Configuration258................................................................................................................................................................
Deleting A Zone Configuration259................................................................................................................................................................
Clearing Changes To A Configuration259................................................................................................................................................................
Viewing All Zone Configuration Information259................................................................................................................................................................
Viewing Selected Zone Configuration Information260................................................................................................................................................................
Viewing The Configuration In The Effective Zone Database260................................................................................................................................................................
Clearing All Zone Configurations261................................................................................................................................................................
Zone Object Maintenance261................................................................................................................................................................
Copying A Zone Object261................................................................................................................................................................
Deleting A Zone Object262................................................................................................................................................................
Renaming A Zone Object263................................................................................................................................................................
Zoning Configuration Management263................................................................................................................................................................
New Switch Or Fabric Additions263................................................................................................................................................................
Fabric Segmentation And Zoning265................................................................................................................................................................
Security And Zoning265................................................................................................................................................................
Resolving Zone Conflicts265................................................................................................................................................................
Zone Merging Scenarios266................................................................................................................................................................
Configuring Enterprise-class Platforms269................................................................................................................................................................
Ports269................................................................................................................................................................
Port Identification By Slot And Port Number270................................................................................................................................................................
Port Identification By Port Area Id271................................................................................................................................................................
Port Identification By Index271................................................................................................................................................................
Default Index/area_id Core Pid Assignment With No Port Swap271................................................................................................................................................................
Power Conservation274................................................................................................................................................................
69 Default Index/area_id Core Pid Assignment With No Port Swap For The Hp Storageworks Dc04 San Director274................................................................................................................................................................
Powering Off A Port Blade275................................................................................................................................................................
Powering On A Port Blade275................................................................................................................................................................
Disabling And Enabling Port Blades275................................................................................................................................................................
Disabling Port Blades275................................................................................................................................................................
Enabling Port Blades275................................................................................................................................................................
B-series Multi-protocol Router Blade Enabling Exceptions275................................................................................................................................................................
Hp Storageworks 4/256 San Director 48 Port 4gb Blade And Hp Storageworks San Director 48 Port 8gb Fc Blade Enabling Exceptions277................................................................................................................................................................
Blade Terminology And Compatibility277................................................................................................................................................................
Hp Storageworks Enterprise-class Platform Terminology And Abbreviations277................................................................................................................................................................
Cp Blades279................................................................................................................................................................
Core Blades280................................................................................................................................................................
Port And Application Blade Compatibility280................................................................................................................................................................
Port Blades Supported By Each Platform280................................................................................................................................................................
Displaying Slot Information281................................................................................................................................................................
Inter-chassis Links282................................................................................................................................................................
Led Behavior283................................................................................................................................................................
Routing Traffic285................................................................................................................................................................
Routing Overview285................................................................................................................................................................
Path Versus Route Selection285................................................................................................................................................................
Fspf285................................................................................................................................................................
Routing Policies286................................................................................................................................................................
Displaying The Current Routing Policy287................................................................................................................................................................
Exchange-based Routing287................................................................................................................................................................
Port-based Routing287................................................................................................................................................................
Ap Route Policy288................................................................................................................................................................
Routing In Virtual Fabrics288................................................................................................................................................................
Setting The Routing Policy288................................................................................................................................................................
Setting Up The Ap Route Policy288................................................................................................................................................................
Route Selection288................................................................................................................................................................
Dynamic Load Sharing289................................................................................................................................................................
Setting Dls289................................................................................................................................................................
Static Route Assignment289................................................................................................................................................................
Assigning A Static Route290................................................................................................................................................................
Removing A Static Route290................................................................................................................................................................
Frame Order Delivery290................................................................................................................................................................
Interoperability For Merged Sans293................................................................................................................................................................
Configuring The Distributed Management Server295................................................................................................................................................................
Distributed Management Server Overview295................................................................................................................................................................
Platform Services295................................................................................................................................................................
Platform Services In A Virtual Fabric295................................................................................................................................................................
Enabling Platform Services296................................................................................................................................................................
Disabling Platform Services296................................................................................................................................................................
Management Server Database296................................................................................................................................................................
Displaying The Management Server Acl296................................................................................................................................................................
Adding A Member To The Acl297................................................................................................................................................................
Deleting A Member From The Acl298................................................................................................................................................................
Viewing The Contents Of The Management Server Database299................................................................................................................................................................
Clearing The Management Server Database300................................................................................................................................................................
Topology Discovery300................................................................................................................................................................
Displaying Topology Discovery Status300................................................................................................................................................................
Enabling Topology Discovery300................................................................................................................................................................
Disabling Topology Discovery301................................................................................................................................................................
Iscsi Gateway Service303................................................................................................................................................................
Iscsi Gateway Service Overview303................................................................................................................................................................
Iscsi Session Translation303................................................................................................................................................................
Iscsi Gateway Network303................................................................................................................................................................
Iscsi Gateway Service Basic Implementation303................................................................................................................................................................
Basic Vs. Advanced Lun Mapping304................................................................................................................................................................
Basic Lun Mapping304................................................................................................................................................................
Advanced Lun Mapping304................................................................................................................................................................
Iscsi-to-fc Translation304................................................................................................................................................................
Iscsi Vt Basic Lun Mapping304................................................................................................................................................................
Iscsi Component Identification305................................................................................................................................................................
Iqn Prefix305................................................................................................................................................................
Iscsi Vt Advanced Lun Mapping305................................................................................................................................................................
Changing And Displaying The Iqn Prefix306................................................................................................................................................................
Access Control With Discovery Domains306................................................................................................................................................................
Iqn Example306................................................................................................................................................................
Switch-to-iscsi Initiator Authentication307................................................................................................................................................................
Load Balancing Through Connection Redirection307................................................................................................................................................................
Enabling And Disabling Connection Redirection For Load Balancing307................................................................................................................................................................
Discovery Domain Set Configuration Example307................................................................................................................................................................
Displaying Connection Redirection Status308................................................................................................................................................................
Supported Iscsi Initiators308................................................................................................................................................................
Checklist For Configuring Iscsi308................................................................................................................................................................
Iscsi Target Gateway Configuration Steps309................................................................................................................................................................
Hp Storageworks B-series Iscsi Director Blade Configuration310................................................................................................................................................................
Hp Storageworks B-series Iscsi Director Blade Port Numbering310................................................................................................................................................................
Enabling The Iscsi Gateway Service311................................................................................................................................................................
Hp Storageworks B-series Iscsi Director Blade Ports311................................................................................................................................................................
Enabling Gbe Ports312................................................................................................................................................................
Configuring The Gbe Interface313................................................................................................................................................................
Iscsi Virtual Target Configuration314................................................................................................................................................................
Automatic Iscsi Vt Creation314................................................................................................................................................................
Generating Iscsi Vts For Every Fc Target314................................................................................................................................................................
Generating An Iscsi Vt For A Specific Fc Target317................................................................................................................................................................
Manual Iscsi Vt Creation317................................................................................................................................................................
Mapping Luns On A Specific Port To An Iscsi Vt319................................................................................................................................................................
Deleting Luns From An Iscsi Vt320................................................................................................................................................................
Displaying The Iscsi Virtual Target Lun Map320................................................................................................................................................................
Displaying Iscsi Vt State And Status320................................................................................................................................................................
Discovery Domain And Domain Set Configuration321................................................................................................................................................................
Displaying Iscsi Initiator Iqns321................................................................................................................................................................
Creating Discovery Domains321................................................................................................................................................................
Creating And Enabling A Discovery Domain Sets322................................................................................................................................................................
Iscsi Initiator-to-vt Authentication Configuration322................................................................................................................................................................
Setting The User Name And Shared Secret322................................................................................................................................................................
Binding User Names To An Iscsi Vt323................................................................................................................................................................
Deleting User Names From An Iscsi Vt Binding List323................................................................................................................................................................
Displaying Chap Configurations323................................................................................................................................................................
Committing The Iscsi-related Configuration324................................................................................................................................................................
Resolving Conflicts Between Iscsi Configurations324................................................................................................................................................................
Lun Masking Considerations325................................................................................................................................................................
Iscsi Fc Zoning Overview325................................................................................................................................................................
Iscsi Gateway Service In An Iscsi Fc Zone326................................................................................................................................................................
Iscsi Fc Zone Creation327................................................................................................................................................................
Creating An Iscsi Fc Zone327................................................................................................................................................................
Zoning Configuration Creation330................................................................................................................................................................
Creating And Enabling A Zoning Configuration330................................................................................................................................................................
Isns Client Service Configuration331................................................................................................................................................................
Displaying Isns Client Service Status331................................................................................................................................................................
Enabling The Isns Client Service331................................................................................................................................................................
Iscsi Network With Isns Server And Clients331................................................................................................................................................................
Disabling The Isns Client Service333................................................................................................................................................................
Clearing The Isns Client Configuration333................................................................................................................................................................
Administering Npiv335................................................................................................................................................................
Npiv Overview335................................................................................................................................................................
Fixed Addressing Mode335................................................................................................................................................................
Bit Addressing Mode335................................................................................................................................................................
Enabling And Disabling Npiv335................................................................................................................................................................
Configuring Npiv336................................................................................................................................................................
Configuration Scenarios337................................................................................................................................................................
Viewing Npiv Port Configuration Information337................................................................................................................................................................
Viewing Virtual Pid Login Information338................................................................................................................................................................
Optimizing Fabric Behavior341................................................................................................................................................................
Adaptive Networking Overview341................................................................................................................................................................
Traffic Isolation Routing341................................................................................................................................................................
Ti Zone Failover342................................................................................................................................................................
Traffic Isolation Zone Creating A Dedicated Path Through The Fabric342................................................................................................................................................................
Comparison Of Traffic Behavior When Failover Is Enabled Or Disabled In Ti Zones342................................................................................................................................................................
Additional Considerations When Disabling Failover343................................................................................................................................................................
Fspf Routing Rules And Traffic Isolation343................................................................................................................................................................
Fabric Incorrectly Configured For Ti Zone With Failover Disabled343................................................................................................................................................................
Traffic Isolation Routing Over Fc Routers344................................................................................................................................................................
Dedicated Path Is The Shortest Path344................................................................................................................................................................
Dedicated Path Is Not The Shortest Path344................................................................................................................................................................
Ti Within An Edge Fabric345................................................................................................................................................................
Traffic Isolation Routing Over Fcr345................................................................................................................................................................
Ti Within A Backbone Fabric346................................................................................................................................................................
Ti Zone In An Edge Fabric346................................................................................................................................................................
Limitations Of Ti Zones Over Fc Routers347................................................................................................................................................................
Ti Zone In A Backbone Fabric347................................................................................................................................................................
General Rules For Ti Zones348................................................................................................................................................................
Supported Configurations For Traffic Isolation Routing348................................................................................................................................................................
Misconfigured Ti Zone348................................................................................................................................................................
Trunking With Ti Zones349................................................................................................................................................................
Limitations And Restrictions Of Traffic Isolation Routing349................................................................................................................................................................
Admin Domain Considerations For Traffic Isolation Routing349................................................................................................................................................................
Virtual Fabric Considerations For Traffic Isolation Routing350................................................................................................................................................................
Dedicated Path With Virtual Fabrics350................................................................................................................................................................
Creating A Ti Zone In A Logical Fabric350................................................................................................................................................................
Traffic Isolation Routing Over Fc Routers With Virtual Fabrics351................................................................................................................................................................
Creating A Ti Zone In A Base Fabric351................................................................................................................................................................
Creating A Ti Zone352................................................................................................................................................................
Example Configuration For Ti Zones Over Fc Routers In Logical Fabrics352................................................................................................................................................................
Logical Representation Of Ti Zones Over Fc Routers In Logical Fabrics352................................................................................................................................................................
Examples Of Creating A Ti Zone353................................................................................................................................................................
Modifying Ti Zones355................................................................................................................................................................
Examples Of Modifying A Ti Zone355................................................................................................................................................................
Changing The State Of A Ti Zone356................................................................................................................................................................
Examples Of Setting The State Of A Ti Zone356................................................................................................................................................................
Deleting A Ti Zone356................................................................................................................................................................
Example Of Deleting A Ti Zone357................................................................................................................................................................
Displaying Ti Zones357................................................................................................................................................................
Setting Up Ti Over Fcr (sample Procedure)358................................................................................................................................................................
Ti Over Fcr Example358................................................................................................................................................................
Qos: Ingress Rate Limiting361................................................................................................................................................................
Limiting Traffic From A Particular Device362................................................................................................................................................................
Disabling Ingress Rate Limiting363................................................................................................................................................................
Qos: Sid/did Traffic Prioritization363................................................................................................................................................................
Qos Zones363................................................................................................................................................................
Virtual Channels Assigned To Qos Priority363................................................................................................................................................................
Qos On E_ports364................................................................................................................................................................
Qos Traffic Prioritization364................................................................................................................................................................
Virtual Fabric Considerations For Traffic Prioritization365................................................................................................................................................................
Qos With E_ports Enabled365................................................................................................................................................................
Supported Configurations For Traffic Prioritization366................................................................................................................................................................
Traffic Prioritization In A Logical Fabric366................................................................................................................................................................
Limitations And Restrictions For Traffic Prioritization367................................................................................................................................................................
Setting Traffic Prioritization367................................................................................................................................................................
Using The Fc-fc Routing Service369................................................................................................................................................................
Fc-fc Routing Service Overview369................................................................................................................................................................
Supported Platforms For Fibre Channel Routing369................................................................................................................................................................
Supported Configurations369................................................................................................................................................................
Integrated Routing370................................................................................................................................................................
Fibre Channel Routing Concepts370................................................................................................................................................................
A Metasan With Interfabric Links371................................................................................................................................................................
A Metasan With Edge-to-edge And Backbone Fabrics And Lsan Zones372................................................................................................................................................................
Proxy Devices373................................................................................................................................................................
Edge Sans Connected Through A Backbone Fabric373................................................................................................................................................................
Routing Types374................................................................................................................................................................
Phantom Domains374................................................................................................................................................................
Metasan With Imported Devices374................................................................................................................................................................
Sample Topology (physical Topology)375................................................................................................................................................................
Fibre Channel Network Address Translation376................................................................................................................................................................
Ex_port Phantom Switch Topology376................................................................................................................................................................
Setting Up The Fc–fc Routing Service377................................................................................................................................................................
Verifying The Setup For Fc–fc Routing377................................................................................................................................................................
Backbone Fids379................................................................................................................................................................
Assigning Backbone Fids380................................................................................................................................................................
Fcip Tunnel Configuration380................................................................................................................................................................
Interfabric Link Configuration380................................................................................................................................................................
Configuring An Ifl For Both Edge And Backbone Connections381................................................................................................................................................................
Fc Router Port Cost Configuration385................................................................................................................................................................
Port Cost Considerations385................................................................................................................................................................
Upgrade, Downgrade, And Ha Considerations For Router Port Cost386................................................................................................................................................................
Setting Router Port Cost For An Ex_port386................................................................................................................................................................
Ex_port Frame Trunking Configuration386................................................................................................................................................................
Supported Configurations And Platforms387................................................................................................................................................................
High Availability Support387................................................................................................................................................................
Backward Compatibility Support387................................................................................................................................................................
Configuring Ex_port Frame Trunking387................................................................................................................................................................
Displaying Ex_port Trunking Information388................................................................................................................................................................
Lsan Zone Configuration388................................................................................................................................................................
Use Of Administrative Domains With Lsan Zones And Fcr388................................................................................................................................................................
Zone Definition And Naming388................................................................................................................................................................
Lsan Zones And Fabric-to-fabric Communications389................................................................................................................................................................
Controlling Device Communication With The Lsan (sample Procedure)389................................................................................................................................................................
Setting The Maximum Lsan Count391................................................................................................................................................................
Configuring Backbone Fabrics For Interconnectivity392................................................................................................................................................................
Ha And Downgrade Considerations For Lsan Zones392................................................................................................................................................................
Lsan Zone Policies Using Lsan Tagging392................................................................................................................................................................
Enforce Tag392................................................................................................................................................................
Speed Tag393................................................................................................................................................................
Rules For Lsan Tagging394................................................................................................................................................................
Configuring An Enforce Lsan Tag394................................................................................................................................................................
Example Of Setting Up Speed Lsan Tag394................................................................................................................................................................
Configuring A Speed Lsan Tag395................................................................................................................................................................
Removing An Lsan Tag395................................................................................................................................................................
Displaying The Lsan Tag Configuration395................................................................................................................................................................
Lsan Zone Binding396................................................................................................................................................................
How Lsan Zone Binding Works397................................................................................................................................................................
Lsan Information Stored In Each Fc Router With And Without Lsan Zone Binding397................................................................................................................................................................
Fc Router Matrix Definition398................................................................................................................................................................
Lsan Fabric Matrix Definition398................................................................................................................................................................
Upgrade, Downgrade, And Ha Considerations For Lsan Zone Binding398................................................................................................................................................................
Setting Up Lsan Zone Binding399................................................................................................................................................................
Viewing The Lsan Zone Binding Matrixes399................................................................................................................................................................
Proxy Pid Configuration399................................................................................................................................................................
Fabric Parameter Considerations400................................................................................................................................................................
Inter-fabric Broadcast Frames400................................................................................................................................................................
Displaying The Current Broadcast Configuration401................................................................................................................................................................
Enabling Broadcast Frame Forwarding401................................................................................................................................................................
Disabling Broadcast Frame Forwarding401................................................................................................................................................................
Resource Monitoring401................................................................................................................................................................
Fc-fc Routing And Virtual Fabrics403................................................................................................................................................................
Logical Switch Configuration For Fc Routing403................................................................................................................................................................
Backbone-to-edge Routing With Virtual Fabrics404................................................................................................................................................................
Ex_ports In A Base Switch404................................................................................................................................................................
Logical Representation Of Ex_ports In A Base Switch404................................................................................................................................................................
Upgrade And Downgrade Considerations For Fc-fc Routing405................................................................................................................................................................
How Replacing Port Blades Affects Ex_port Configuration405................................................................................................................................................................
Interoperability With Legacy Fcr Switches405................................................................................................................................................................
Backbone-to-edge Routing Across Base Switch Using Fc Router In Legacy Mode405................................................................................................................................................................
Range Of Output Ports406................................................................................................................................................................
Displaying The Range Of Output Ports Connected To The Xlate Domains406................................................................................................................................................................
Verifying Normal Operation Of Front Domain Consolidation406................................................................................................................................................................
Administering Advanced Performance Monitoring409................................................................................................................................................................
Advanced Performance Monitoring Overview409................................................................................................................................................................
End-to-end Monitors409................................................................................................................................................................
Types Of Monitors Supported On Hp Storageworks Switch Models409................................................................................................................................................................
End-to-end Performance Monitoring410................................................................................................................................................................
Number Of Logical Switches That Support Performance Monitors410................................................................................................................................................................
Adding End-to-end Monitors411................................................................................................................................................................
Monitoring The Traffic From Host A To Dev B412................................................................................................................................................................
Monitoring The Traffic From Dev B To Host A412................................................................................................................................................................
Setting End-to-end Monitors On A Port412................................................................................................................................................................
Proper Placement Of End-to-end Performance Monitors412................................................................................................................................................................
Setting A Mask For An End-to-end Monitor413................................................................................................................................................................
Deleting End-to-end Monitors414................................................................................................................................................................
Filter-based Performance Monitoring414................................................................................................................................................................
Mask Positions For End-to-end Monitors414................................................................................................................................................................
Adding Standard Filter-based Monitors415................................................................................................................................................................
Custom Filter-based Monitors416................................................................................................................................................................
Adding Custom Filter-based Monitors417................................................................................................................................................................
Deleting Filter-based Monitors417................................................................................................................................................................
Isl Performance Monitoring417................................................................................................................................................................
Predefined Values At Offset 0417................................................................................................................................................................
Top Talker Monitors418................................................................................................................................................................
Adding A Top Talker Monitor On An F_port419................................................................................................................................................................
Deleting A Top Talker Monitor On An F_port419................................................................................................................................................................
Displaying The Top N Bandwidth-using Flows On An F_port419................................................................................................................................................................
Adding Top Talker Monitors On All Switches In The Fabric (fabric Mode)420................................................................................................................................................................
Deleting The Fabric Mode Top Talker Monitors421................................................................................................................................................................
Displaying Top Talking Flows For A Given Domain Id (fabric Mode)421................................................................................................................................................................
Limitations Of Top Talker Monitors421................................................................................................................................................................
Trunk Monitoring422................................................................................................................................................................
Displaying Monitor Counters422................................................................................................................................................................
Clearing Monitor Counters424................................................................................................................................................................
Saving And Restoring Monitor Configurations425................................................................................................................................................................
Performance Data Collection426................................................................................................................................................................
Administering Extended Fabrics427................................................................................................................................................................
Licensing For Extended Fabrics427................................................................................................................................................................
Extended Fibre Channel Over Distance427................................................................................................................................................................
Distance Levels For Extended Inter-switch Links427................................................................................................................................................................
Buffer-to-buffer Credits427................................................................................................................................................................
Fibre Channel Data Frames428................................................................................................................................................................
Fc Switch Port Buffer Credit Requirements For Long-distance Calculations429................................................................................................................................................................
Determining How Many Ports Can Be Used For Long Distance429................................................................................................................................................................
Buffer Credits429................................................................................................................................................................
Displaying The Remaining Buffers In A Port Group430................................................................................................................................................................
Example: Consider The Hp Storageworks 8/8 And 8/24 San Switches, Which Have A Single 24-port Port Group And A Total Of 676 Buffer Credits For That Port Group430................................................................................................................................................................
Supported Distances431................................................................................................................................................................
Buffer Credit Recovery433................................................................................................................................................................
Fabric Considerations For Buffer Credit Management434................................................................................................................................................................
Configuring F_port Buffer Credits434................................................................................................................................................................
Configuring Ports To Support Long Distance434................................................................................................................................................................
Enabling Long Distance When Connecting To Time-division Multiplexing Devices435................................................................................................................................................................
Extended Fabrics Device Limitations436................................................................................................................................................................
Configuring An Extended Isl436................................................................................................................................................................
Administering Isl Trunking436................................................................................................................................................................
Isl Trunking Overview439................................................................................................................................................................
Distribution Of Traffic Over Isl Trunking Groups439................................................................................................................................................................
Standard Trunking Criteria440................................................................................................................................................................
Fabric Considerations For Isl Trunking440................................................................................................................................................................
Initializing Trunking On Ports441................................................................................................................................................................
Disabling And Re-enabling Ports441................................................................................................................................................................
Lossless Dynamic Load Sharing On Trunk Ports441................................................................................................................................................................
Configuring Lossless Dynamic Load Sharing On Trunk Ports442................................................................................................................................................................
Lossless Dynamic Load Sharing In Virtual Fabrics442................................................................................................................................................................
Example: How Dls Affects Other Logical Switches In The Fabric442................................................................................................................................................................
Performance Monitoring442................................................................................................................................................................
Isl Trunking442................................................................................................................................................................
Adding A Monitor To An F_port Master Port443................................................................................................................................................................
Displaying Port Throughput Performance Information For All Ports On The Switch443................................................................................................................................................................
Enabling Or Disabling Isl Trunking On A Port444................................................................................................................................................................
Enabling Or Disabling Isl Trunking For All Ports On A Switch444................................................................................................................................................................
Setting Port Speeds444................................................................................................................................................................
Long-distance Mode Definitions445................................................................................................................................................................
Setting The Same Speed For All Ports On The Switch446................................................................................................................................................................
Displaying Trunking Information447................................................................................................................................................................
Trunking Over Extended Fabrics447................................................................................................................................................................
Trunking Distances447................................................................................................................................................................
F_port Masterless Trunking448................................................................................................................................................................
Trunking Over Distance For The Hp Storageworks 4/256 San Director With Supported Blades448................................................................................................................................................................
F_port Trunking Considerations449................................................................................................................................................................
Switch In Access Gateway Mode Without F_port Trunking449................................................................................................................................................................
Switch In Access Gateway Mode With F_port Masterless Trunking449................................................................................................................................................................
F_port Masterless Trunking Considerations450................................................................................................................................................................
Setting Up F_port Trunking452................................................................................................................................................................
Pwwn Format For F_port And N_port Trunk Ports452................................................................................................................................................................
Assigning A Trunk Area453................................................................................................................................................................
Trunk Group Configuration For The Hp Storageworks 8/40 San Switch453................................................................................................................................................................
Address Identifier453................................................................................................................................................................
Enabling F_port Trunking454................................................................................................................................................................
Enabling The Dcc Policy On A Trunk Area456................................................................................................................................................................
Disabling F_port Trunking456................................................................................................................................................................
F_port Trunking Monitoring456................................................................................................................................................................
Configuration Management For Trunk Areas457................................................................................................................................................................
Example: How Trunk Area Assignment Affect The Port Domain,index457................................................................................................................................................................
Trunking For Switches In Access Gateway Mode457................................................................................................................................................................
F_port Trunking In Virtual Fabrics457................................................................................................................................................................
F_port Authentication458................................................................................................................................................................
Configuring E_port Authentication In Virtual Fabrics458................................................................................................................................................................
Configuring And Monitoring Fcip Extension Services461................................................................................................................................................................
Fcip Concepts461................................................................................................................................................................
Virtual Ports And Fcip Tunnels461................................................................................................................................................................
Virtual Port Types461................................................................................................................................................................
Tunnel And Virtual Port Numbering461................................................................................................................................................................
Compression On Fcip Tunnels462................................................................................................................................................................
Traffic Shaping462................................................................................................................................................................
Fcip Services License462................................................................................................................................................................
Platforms That Support San Extension Over Ip462................................................................................................................................................................
Network Using Fcip462................................................................................................................................................................
Qos Implementation Over Fcip463................................................................................................................................................................
Dscp Quality Of Service463................................................................................................................................................................
L2cos Quality Of Service463................................................................................................................................................................
When Both Dscp And L2cos Are Used463................................................................................................................................................................
Default Mapping Of Dscp Priorities To L2cos Priorities463................................................................................................................................................................
Ipsec Implementation Over Fcip464................................................................................................................................................................
Ipsec Terminology464................................................................................................................................................................
Ipsec Configuration465................................................................................................................................................................
Ipsec Parameters465................................................................................................................................................................
Creating An Ike And Ipsec Policy466................................................................................................................................................................
Fixed Policy Parameters466................................................................................................................................................................
Modifiable Policy Parameters466................................................................................................................................................................
Displaying Ike And Ipsec Policy Settings467................................................................................................................................................................
Deleting An Ike And Ipsec Policy468................................................................................................................................................................
Viewing Ipsec Information For An Fcip Tunnel468................................................................................................................................................................
Virtual Fabrics And Fcip469................................................................................................................................................................
Tcp Byte Streaming469................................................................................................................................................................
Supported Third Party Wan Optimizer Hardware470................................................................................................................................................................
Options For Enhancing Tape I/o Performance470................................................................................................................................................................
Fcip Fastwrite And Tape Pipelining470................................................................................................................................................................
Constraints For Fcip Fastwrite And Tape Pipelining471................................................................................................................................................................
Fcip Fastwrite And Tape Pipelining Configurations471................................................................................................................................................................
Single Tunnel, Fastwrite And Tape Pipelining Enabled471................................................................................................................................................................
Using Fcip Fastwrite And Tape Pipelining471................................................................................................................................................................
Unsupported Configurations For Fastwrite And Tape Pipelining472................................................................................................................................................................
Fc Fastwrite Concepts473................................................................................................................................................................
Unsupported Configurations With Fastwrite And Tape Pipelining473................................................................................................................................................................
Platforms And Os Requirements For Fc Fastwrite474................................................................................................................................................................
Constraints For Fc Fastwrite474................................................................................................................................................................
How Fc Fastwrite Works474................................................................................................................................................................
Typical Network Topology For Fc Fastwrite474................................................................................................................................................................
Fc Fastwrite Flow Configuration Requirements475................................................................................................................................................................
Hardware Considerations For Fc Fastwrite475................................................................................................................................................................
Configuring And Enabling Fc Fastwrite475................................................................................................................................................................
Example: Enabling Fastwrite On A Switch476................................................................................................................................................................
Disabling Fc Fastwrite On A Blade Or Switch477................................................................................................................................................................
Example: Disabling Fc Fastwrite On A Switch478................................................................................................................................................................
Disabling Fc Fastwrite On A Port478................................................................................................................................................................
Fcip Services Configuration Guidelines478................................................................................................................................................................
Creating Ip Interfaces And Routes478................................................................................................................................................................
Setting Persistently Disabled Ports479................................................................................................................................................................
Configuring Vex_ports479................................................................................................................................................................
Creating An Fcip Tunnel482................................................................................................................................................................
Example: Creating An Fcip Tunnel483................................................................................................................................................................
Example: Creating An Fcip Tunnel With Fastwrite And Tape Pipelining Enabled484................................................................................................................................................................
Verifying The Fcip Tunnel Configuration484................................................................................................................................................................
Enabling Persistently Disabled Ports486................................................................................................................................................................
Managing Fcip Tunnels487................................................................................................................................................................
Modifying And Deleting Qos Settings489................................................................................................................................................................
Deleting An Fcip Tunnel490................................................................................................................................................................
Deleting An Ip Interface (ipif)490................................................................................................................................................................
Deleting An Iproute490................................................................................................................................................................
Managing The Vlan Tag Table490................................................................................................................................................................
Wan Performance Analysis Tools491................................................................................................................................................................
Ipperf Option491................................................................................................................................................................
Wan Tool Sessions With An Fcip Tunnel Online491................................................................................................................................................................
Fcip Port Bandwidth491................................................................................................................................................................
Starting An Ipperf Session491................................................................................................................................................................
Wan Tool Performance Characteristics492................................................................................................................................................................
Wan Tool Analysis492................................................................................................................................................................
Wan Tool Ipperf Syntax492................................................................................................................................................................
Testing A Connection494................................................................................................................................................................
Tracing A Route495................................................................................................................................................................
Fcip Tunnel Performance Characteristics496................................................................................................................................................................
Ficon Fabrics499................................................................................................................................................................
Fabric Os Support For Ficon499................................................................................................................................................................
Platforms Supporting Ficon500................................................................................................................................................................
Types Of Ficon Configurations500................................................................................................................................................................
Control Unit Port (cup)501................................................................................................................................................................
Ficon And Ficon Cup In Virtual Fabrics501................................................................................................................................................................
Example: The Configure Command501................................................................................................................................................................
Cup Limitations502................................................................................................................................................................
Ficon Commands502................................................................................................................................................................
Fabric Os Commands Related To Ficon And Ficon Cup502................................................................................................................................................................
User Security Considerations503................................................................................................................................................................
Switch Configuration503................................................................................................................................................................
Preparing A Switch For Ficon504................................................................................................................................................................
Single Switch Configuration504................................................................................................................................................................
Configuring A High-integrity Fabric504................................................................................................................................................................
Link Incidents504................................................................................................................................................................
Setting Unique Domain Ids505................................................................................................................................................................
Cascaded Configuration, Two Switches505................................................................................................................................................................
Cascaded Configuration, Three Switches505................................................................................................................................................................
Ficon Information506................................................................................................................................................................
Registered Listeners506................................................................................................................................................................
Node Identification Data506................................................................................................................................................................
Fru Failures506................................................................................................................................................................
Port Swapping507................................................................................................................................................................
Example: Port Swapping507................................................................................................................................................................
Clearing The Ficon Management Database507................................................................................................................................................................
Ficon Cup507................................................................................................................................................................
Setting Up Ficon Cup508................................................................................................................................................................
Ficon Management Server Mode508................................................................................................................................................................
Enabling Fmsmode508................................................................................................................................................................
Disabling Fmsmode509................................................................................................................................................................
Fmsmode And Ficon Cup509................................................................................................................................................................
Setting Up Ficon Cup If Fmsmode Is Already Enabled509................................................................................................................................................................
The Fmsmode Setting509................................................................................................................................................................
Setting The Mihpto Value509................................................................................................................................................................
Mode Register Bit Settings510................................................................................................................................................................
Setting The Mode Register Bits510................................................................................................................................................................
Ficon Cup Mode Register Bits510................................................................................................................................................................
Persistently Enabling And Disabling Ports511................................................................................................................................................................
Port And Switch Naming Standards511................................................................................................................................................................
Ficon Cup License Considerations512................................................................................................................................................................
Zoning And Pdcm Considerations512................................................................................................................................................................
Zoning And Link Incident Reporting512................................................................................................................................................................
Ficon Configuration Files512................................................................................................................................................................
Uploading The Configuration Files513................................................................................................................................................................
Downloading Configuration Files With Active=saved Mode Enabled513................................................................................................................................................................
Downloading Configuration Files With Active=saved Mode Disabled513................................................................................................................................................................
Configuration Information Record513................................................................................................................................................................
Ficon Configuration Worksheet513................................................................................................................................................................
Sample Iocp Configuration File514................................................................................................................................................................
Configuring And Monitoring Ficon Extension Services517................................................................................................................................................................
Ficon Extension Products Licensing517................................................................................................................................................................
Platforms That Support Ficon Extension Over Ip517................................................................................................................................................................
Fcip Configuration Requirements For Ficon Extension517................................................................................................................................................................
Configuration Requirements For Switches And Directors517................................................................................................................................................................
Xrc Emulation517................................................................................................................................................................
Tape Write Pipelining517................................................................................................................................................................
Tape Read Pipelining517................................................................................................................................................................
One Ethernet Interface, One Ip Route And One Fcip Tunnel Between Sites518................................................................................................................................................................
Traffic Isolation Zoning518................................................................................................................................................................
Allow/prohibit For M-series Directors518................................................................................................................................................................
Ficon Emulation Concepts And Features518................................................................................................................................................................
Allow/prohibit Example518................................................................................................................................................................
Ficon Emulation Configuration519................................................................................................................................................................
Ficon Emulation Configuration Values521................................................................................................................................................................
Ficon Emulation Modification521................................................................................................................................................................
Ficon Performance Statistics522................................................................................................................................................................
Ficon Emulation Monitoring523................................................................................................................................................................
A Configuring The Pid Format527................................................................................................................................................................
Pids And Pid Binding Overview527................................................................................................................................................................
Area Addressing Mode527................................................................................................................................................................
Impact Of Changing The Fabric Pid Format528................................................................................................................................................................
Host Reboots528................................................................................................................................................................
Static Pid Mapping Errors529................................................................................................................................................................
Changes To Configuration Data529................................................................................................................................................................
Pid Format Selection529................................................................................................................................................................
Effects Of Pid Format Changes On Configurations529................................................................................................................................................................
Evaluating The Fabric530................................................................................................................................................................
Pid Format Recommendations For Adding New Switches530................................................................................................................................................................
Changing The Pid Format531................................................................................................................................................................
Changing The Pid Format Online532................................................................................................................................................................
Changing The Pid Format Offline532................................................................................................................................................................
Pid Format Changes532................................................................................................................................................................
Hybrid Update533................................................................................................................................................................
Changing To Core Pid Format533................................................................................................................................................................
Port Number To Area Id Conversion534................................................................................................................................................................
Basic Procedure For Changing The Pid Format535................................................................................................................................................................
Hp-ux Procedure For Changing The Pid Format536................................................................................................................................................................
Aix Procedure For Changing The Pid Format537................................................................................................................................................................
Swapping Port Area Ids538................................................................................................................................................................
Physical Port Numbers And Logical Area Ids For Swapped Ports539................................................................................................................................................................
B Understanding Legacy Password Behavior541................................................................................................................................................................
Password Management Information541................................................................................................................................................................
Account/password Characteristics Matrix541................................................................................................................................................................
Password Prompting Behaviors542................................................................................................................................................................
Password Prompting Matrix542................................................................................................................................................................
Password Migration During Firmware Changes543................................................................................................................................................................
Password Recovery Options543................................................................................................................................................................
Password Migration Behavior During Firmware Upgrade/downgrade543................................................................................................................................................................
C Mixed Fabric Configurations For Non-merge Sans545................................................................................................................................................................
D Migrating From An Mp Router To A 400 Mp Router547................................................................................................................................................................
Introduction To Mp Router Upgrades547................................................................................................................................................................
Non-redundant Configuration547................................................................................................................................................................
Redundant Configuration547................................................................................................................................................................
Dual Backbone Configuration547................................................................................................................................................................
Dual Backbone Fabric Configuration548................................................................................................................................................................
Configuring A New Fc Router549................................................................................................................................................................
E Inband Management551................................................................................................................................................................
Inband Management Overview551................................................................................................................................................................
Internal Ethernet Devices551................................................................................................................................................................
Ip Address And Routing Management552................................................................................................................................................................
Inband Management Process552................................................................................................................................................................
Setting The Ip Address For The Cp Inband Management Interface553................................................................................................................................................................
Setting The Ip Address For The Ge Inband Management Interface553................................................................................................................................................................
Adding A Route On The Cp553................................................................................................................................................................
Deleting A Route553................................................................................................................................................................
Viewing Ip Addresses And Routes554................................................................................................................................................................
Displaying Ip Routes554................................................................................................................................................................
Fips555................................................................................................................................................................
Examples Of Supported Configurations555................................................................................................................................................................
Configuring A Management Station On The Same Subnet555................................................................................................................................................................
Management Station On Same Subnet555................................................................................................................................................................
Configuring A Management Station On Different Subnets556................................................................................................................................................................
Management Station On A Different Subnet556................................................................................................................................................................
F Using Remote Switch559................................................................................................................................................................
About Remote Switch559................................................................................................................................................................
Remote Switch Capabilities559................................................................................................................................................................
Using Remote Switch With A Gateway559................................................................................................................................................................
Index561................................................................................................................................................................
Example Of A Brocade Dct File573................................................................................................................................................................
Example Of The Dictiona.dcm File573................................................................................................................................................................
Switch Model Naming Matrix575................................................................................................................................................................
Document Conventions575................................................................................................................................................................
Default Administrative Account Names And Passwords575................................................................................................................................................................

Advertisement

HP StorageWorks 8/40 - SAN Switch Administrator's Manual

HP StorageWorks 8/40 - SAN Switch Administrator's Manual (492 pages)

HP StorageWorks Fabric OS 6.1.x administrator guide (5697-0234, November 2009)  
Brand: HP | Category: Switch | Size: 3.06 MB
Table of contents
Table Of Contents3................................................................................................................................................................
About This Guide19................................................................................................................................................................
Supported Fabric Os 6.1.x Hp Storageworks Hardware19................................................................................................................................................................
Switch Model Naming Matrix19................................................................................................................................................................
Intended Audience20................................................................................................................................................................
Related Documentation20................................................................................................................................................................
Document Conventions And Symbols20................................................................................................................................................................
Document Conventions20................................................................................................................................................................
Rack Stability21................................................................................................................................................................
Hp Technical Support21................................................................................................................................................................
Customer Self Repair21................................................................................................................................................................
Product Warranties21................................................................................................................................................................
Subscription Service22................................................................................................................................................................
Hp Websites22................................................................................................................................................................
Documentation Feedback22................................................................................................................................................................
Standard Features23................................................................................................................................................................
Overview23................................................................................................................................................................
Using The Cli23................................................................................................................................................................
Connecting To The Cli24................................................................................................................................................................
Using Telnet Or Ssh Session24................................................................................................................................................................
Using A Console Session On The Serial Port25................................................................................................................................................................
Changing Passwords25................................................................................................................................................................
Changing Default Account Passwords At Login26................................................................................................................................................................
Default Administrative Account Names And Passwords26................................................................................................................................................................
Configuring The Ethernet Interface27................................................................................................................................................................
Displaying The Network Interface Settings27................................................................................................................................................................
Setting Static Ethernet Addresses28................................................................................................................................................................
Activating Dhcp29................................................................................................................................................................
Enabling Dhcp29................................................................................................................................................................
Disabling Dhcp29................................................................................................................................................................
Setting The Date And Time30................................................................................................................................................................
Setting Time Zones30................................................................................................................................................................
Synchronizing Local Time Using Ntp32................................................................................................................................................................
Customizing Switch Names33................................................................................................................................................................
Working With Domain Ids33................................................................................................................................................................
Licensed Features34................................................................................................................................................................
Generating A License Key35................................................................................................................................................................
Activating A License Key35................................................................................................................................................................
Removing A Licensed Feature36................................................................................................................................................................
Features And Required Licenses37................................................................................................................................................................
License Requirements37................................................................................................................................................................
Inter-chassis Link (icl) Licensing38................................................................................................................................................................
Gb Licensing38................................................................................................................................................................
Time-based Licenses39................................................................................................................................................................
High Availability Considerations39................................................................................................................................................................
Firmware Upgrade And Downgrade Consideration39................................................................................................................................................................
Configupload And Configdownload Considerations39................................................................................................................................................................
Expired Licenses39................................................................................................................................................................
Ports On Demand (pod) Licensing39................................................................................................................................................................
Activating Pod40................................................................................................................................................................
Configuring Dynamic Ports On Demand40................................................................................................................................................................
How Ports Are Assigned To Licenses40................................................................................................................................................................
Displaying The Port License Assignment41................................................................................................................................................................
Activating Dynamic Ports On Demand41................................................................................................................................................................
Disabling Dynamic Ports On Demand42................................................................................................................................................................
Managing Pod Licenses42................................................................................................................................................................
Reserving A License42................................................................................................................................................................
Releasing A Port43................................................................................................................................................................
Disabling And Enabling Switches44................................................................................................................................................................
Disabling And Enabling Ports44................................................................................................................................................................
Making Basic Connections45................................................................................................................................................................
Connecting To Devices45................................................................................................................................................................
Connecting To Other Switches45................................................................................................................................................................
Linking Through A Gateway45................................................................................................................................................................
Checking Switch Status46................................................................................................................................................................
Switch Operation46................................................................................................................................................................
High Availability (ha) Features47................................................................................................................................................................
Fabric Connectivity47................................................................................................................................................................
Device Connectivity47................................................................................................................................................................
Show Switches In Access Gateway Mode48................................................................................................................................................................
Tracking And Controlling Switch Changes48................................................................................................................................................................
Configuring The Audit Log50................................................................................................................................................................
Auditable Event Classes51................................................................................................................................................................
Auditcfg Event Class Operands51................................................................................................................................................................
Shutting Down Switches And Directors53................................................................................................................................................................
High Availability Of Daemon Processes53................................................................................................................................................................
Daemons That Are Automatically Restarted54................................................................................................................................................................
Managing User Accounts55................................................................................................................................................................
Accessing The Management Channel55................................................................................................................................................................
Maximum Number Of Simultaneous Sessions55................................................................................................................................................................
Using Role-based Access Control (rbac)56................................................................................................................................................................
Fabric Os 6.1.x Roles56................................................................................................................................................................
Role Permissions57................................................................................................................................................................
Permission Types57................................................................................................................................................................
Rbac Permissions Matrix57................................................................................................................................................................
Managing The Local Database User Accounts59................................................................................................................................................................
About The Default Accounts59................................................................................................................................................................
Defining Local User Accounts59................................................................................................................................................................
Default Local User Accounts59................................................................................................................................................................
Recovering Accounts62................................................................................................................................................................
Changing Local Account Passwords62................................................................................................................................................................
Configuring The Local User Database63................................................................................................................................................................
Distributing The Local User Database63................................................................................................................................................................
Protecting The Local User Database From Distributions63................................................................................................................................................................
Configuring Password Policies64................................................................................................................................................................
Setting The Password Strength Policy64................................................................................................................................................................
Setting The Password History Policy65................................................................................................................................................................
Setting The Password Expiration Policy65................................................................................................................................................................
Upgrade And Downgrade Considerations66................................................................................................................................................................
Setting The Account Lockout Policy66................................................................................................................................................................
Denial Of Service Implications67................................................................................................................................................................
Authentication Model67................................................................................................................................................................
Authentication Configuration Options68................................................................................................................................................................
Creating Fabric Os User Accounts69................................................................................................................................................................
Syntax For Vsa-based Account Roles69................................................................................................................................................................
Managing Fabric Os Users On The Radius Server70................................................................................................................................................................
Windows 2000 Ias70................................................................................................................................................................
Linux Freeradius Server71................................................................................................................................................................
Radius Configuration And Admin Domains71................................................................................................................................................................
Dictionary.brocade File Entries71................................................................................................................................................................
Configuring The Radius Server72................................................................................................................................................................
Linux72................................................................................................................................................................
Windows 200073................................................................................................................................................................
Rsa Radius Server74................................................................................................................................................................
Setting Up The Rsa Radius Server75................................................................................................................................................................
Figures 1 Example Of A Brocade Dct File75................................................................................................................................................................
Ldap Configuration And Microsoft's Active Directory76................................................................................................................................................................
Example Of The Dictiona.dcm File76................................................................................................................................................................
Adding The Adlist77................................................................................................................................................................
Configuring Authentication Servers On The Switch78................................................................................................................................................................
Enabling And Disabling Local Authentication As Backup81................................................................................................................................................................
Boot Prom Password81................................................................................................................................................................
San Director And Dc San Backbone Director (short Name, Dc Director)83................................................................................................................................................................
Recovering Forgotten Passwords85................................................................................................................................................................
Configuring Standard Security Features87................................................................................................................................................................
Security Protocols87................................................................................................................................................................
Secure Protocol Support87................................................................................................................................................................
The Ssh Protocol88................................................................................................................................................................
Items Needed To Deploy Secure Protocols88................................................................................................................................................................
Main Security Scenarios88................................................................................................................................................................
Ssh Public Key Authentication89................................................................................................................................................................
Allowed-user89................................................................................................................................................................
Authentication89................................................................................................................................................................
Authentication Setup Overview89................................................................................................................................................................
Configuring The Allowed-user89................................................................................................................................................................
Generating A Key Pair For Host-to-switch Authentication (incoming)90................................................................................................................................................................
Generating A Key Pair For Switch-to-host Authentication (outgoing)90................................................................................................................................................................
Importing The Public Key To The Switch For Host-to-switch Authentication (incoming)90................................................................................................................................................................
Exporting The Public Key For Switch-to-host Authentication (outgoing)91................................................................................................................................................................
Appending The Public Key On A Remote Host91................................................................................................................................................................
Testing The Setup91................................................................................................................................................................
Deleting Keys On The Switch91................................................................................................................................................................
Configuring The Telnet Protocol92................................................................................................................................................................
Blocking Telnet92................................................................................................................................................................
Unblocking Telnet92................................................................................................................................................................
Configuring For The Ssl Protocol93................................................................................................................................................................
Browser And Java Support93................................................................................................................................................................
Summary Of Ssl Procedures93................................................................................................................................................................
Ssl Certificate Files93................................................................................................................................................................
Choosing A Ca94................................................................................................................................................................
Generating A Public/private Key94................................................................................................................................................................
Generating And Storing A Csr94................................................................................................................................................................
Obtaining Certificates95................................................................................................................................................................
Installing A Switch Certificate95................................................................................................................................................................
Activating A Switch Certificate96................................................................................................................................................................
Configuring The Browser96................................................................................................................................................................
Installing A Root Certificate To The Java Plug-in97................................................................................................................................................................
Summary Of Certificate Commands97................................................................................................................................................................
Commands For Displaying And Deleting Ssl Certificates97................................................................................................................................................................
Configuring For Snmp98................................................................................................................................................................
Setting The Security Level98................................................................................................................................................................
Using The Snmpconfig Command99................................................................................................................................................................
Secure File Copy101................................................................................................................................................................
Setting Up Scp For Configuploads And Downloads101................................................................................................................................................................
Listener Applications102................................................................................................................................................................
Ports And Applications Used By Switches102................................................................................................................................................................
Blocked Listener Applications102................................................................................................................................................................
Access Defaults102................................................................................................................................................................
Port Configuration103................................................................................................................................................................
Port Information103................................................................................................................................................................
Configuring Advanced Security Features105................................................................................................................................................................
About Access Control List (acl) Policies105................................................................................................................................................................
How The Acl Policies Are Stored105................................................................................................................................................................
Security Database Size Restrictions105................................................................................................................................................................
Identifying Policy Members106................................................................................................................................................................
Configuring Acl Policies106................................................................................................................................................................
Valid Methods For Specifying Policy Members106................................................................................................................................................................
Displaying Acl Policies107................................................................................................................................................................
Configuring An Fcs Policy107................................................................................................................................................................
Fcs Policy Restrictions108................................................................................................................................................................
Fcs Policy States108................................................................................................................................................................
Switch Operations108................................................................................................................................................................
Overview Of Steps To Create And Manage The Fcs Policies109................................................................................................................................................................
Modifying The Primary Fcs109................................................................................................................................................................
Distributing An Fcs Policy110................................................................................................................................................................
Configuring A Dcc Policy111................................................................................................................................................................
Distribution Policy States111................................................................................................................................................................
Dcc Policy States111................................................................................................................................................................
Dcc Policy Restrictions112................................................................................................................................................................
Creating A Dcc Policy112................................................................................................................................................................
Examples Of Creating Dcc Policies113................................................................................................................................................................
Creating An Scc Policy114................................................................................................................................................................
Saving Changes To Acl Policies114................................................................................................................................................................
Scc Policy States114................................................................................................................................................................
Activating Changes To Acl Policies115................................................................................................................................................................
Adding A Member To An Existing Policy115................................................................................................................................................................
Removing A Member From An Acl Policy115................................................................................................................................................................
Deleting An Acl Policy115................................................................................................................................................................
Aborting All Uncommitted Changes116................................................................................................................................................................
Configuring The Authentication Policy For Fabric Elements116................................................................................................................................................................
E_port Authentication117................................................................................................................................................................
Dh-chap Authentication117................................................................................................................................................................
Device Authentication Policy118................................................................................................................................................................
Auth Policy Restrictions119................................................................................................................................................................
Supported Configurations119................................................................................................................................................................
Selecting Authentication Protocols119................................................................................................................................................................
Re-authenticating Ports120................................................................................................................................................................
Managing Secret Key Pairs120................................................................................................................................................................
Fabric Wide Distribution Of The Auth Policy122................................................................................................................................................................
Accept Distributions Configuration Parameter122................................................................................................................................................................
Ip Filter Policy123................................................................................................................................................................
Creating An Ip Filter Policy123................................................................................................................................................................
Cloning An Ip Filter Policy123................................................................................................................................................................
Displaying An Ip Filter Policy124................................................................................................................................................................
Saving An Ip Filter Policy124................................................................................................................................................................
Activating An Ip Filter Policy124................................................................................................................................................................
Deleting An Ip Filter Policy125................................................................................................................................................................
Ip Filter Policy Rules125................................................................................................................................................................
Supported Services125................................................................................................................................................................
Ip Filter Policy Enforcement126................................................................................................................................................................
Implicit Ip Filter Rules126................................................................................................................................................................
Default Ip Policy Rules126................................................................................................................................................................
Creating Ip Filter Policy Rules127................................................................................................................................................................
Deleting Ip Filter Policy Rules127................................................................................................................................................................
Switch Session Transactions127................................................................................................................................................................
Aborting A Switch Session Transaction128................................................................................................................................................................
Ip Filter Policy Distributions128................................................................................................................................................................
Ip Filter Policy Restrictions128................................................................................................................................................................
Distributing The Policy Database128................................................................................................................................................................
Configuring The Database Distribution Settings129................................................................................................................................................................
Interaction Between Fabric-wide Consistency Policy And Distribution Settings129................................................................................................................................................................
Supported Policy Databases129................................................................................................................................................................
Distributing Acl Policies To Other Switches130................................................................................................................................................................
Setting The Consistency Policy Fabric-wide131................................................................................................................................................................
Acl Policy Database Distribution Behavior131................................................................................................................................................................
Fabric-wide Consistency Policy Settings132................................................................................................................................................................
Notes On Joining A Switch To The Fabric133................................................................................................................................................................
Matching Fabric-wide Consistency Policies133................................................................................................................................................................
Merging Fabrics With Matching Fabric-wide Consistency Policies133................................................................................................................................................................
Non-matching Fabric-wide Consistency Policies134................................................................................................................................................................
Examples Of Strict Fabric Merges134................................................................................................................................................................
Fips Support135................................................................................................................................................................
Zeroization Functions135................................................................................................................................................................
Fabric Merges With Tolerant/absent Combinations135................................................................................................................................................................
Zeroization Behavior135................................................................................................................................................................
Power-up Self Tests136................................................................................................................................................................
Conditional Tests136................................................................................................................................................................
Fips Mode136................................................................................................................................................................
Fips Mode Restrictions136................................................................................................................................................................
Ldap In Fips Mode137................................................................................................................................................................
Fips Mode Of Operation137................................................................................................................................................................
Addtional Microsoft Active Directory Settings139................................................................................................................................................................
Ldap Certificates For Fips Mode139................................................................................................................................................................
Importing An Ldap Switch Certificate139................................................................................................................................................................
Active Directory Keys To Modify139................................................................................................................................................................
Exporting An Ldap Switch Certificate140................................................................................................................................................................
Deleting An Ldap Switch Certificate140................................................................................................................................................................
Preparing The Switch For Fips140................................................................................................................................................................
Overview Of Steps141................................................................................................................................................................
Disabling Fips Mode142................................................................................................................................................................
Zeroizing For Fips142................................................................................................................................................................
Displaying Fips Configuration142................................................................................................................................................................
Maintaining The Switch Configuration File143................................................................................................................................................................
Maintaining Consistent Configuration Settings143................................................................................................................................................................
Displaying Configuration Settings143................................................................................................................................................................
Backing Up A Configuration143................................................................................................................................................................
Restoring A Configuration145................................................................................................................................................................
Configuration Download Without Disabling A Switch145................................................................................................................................................................
Cli Commands To Display Or Modifiy Switch Configuration Information145................................................................................................................................................................
Security Considerations147................................................................................................................................................................
Restoring Configurations In A Ficon Environment147................................................................................................................................................................
Downloading Configurations Across A Fabric148................................................................................................................................................................
Backup And Restore In A Ficon Cup Environment148................................................................................................................................................................
Configuration Form149................................................................................................................................................................
Configuration And Connection Information149................................................................................................................................................................
Managing Administrative Domains151................................................................................................................................................................
Fabric With Two Admin Domains152................................................................................................................................................................
Filtered Fabric Views152................................................................................................................................................................
Admin Domain Features153................................................................................................................................................................
Requirements For Admin Domains153................................................................................................................................................................
Admin Domain Access Levels153................................................................................................................................................................
User-defined Administrative Domains154................................................................................................................................................................
System-defined Administrative Domains154................................................................................................................................................................
Ad User Types154................................................................................................................................................................
Ad255155................................................................................................................................................................
Admin Domains And Login155................................................................................................................................................................
Fabric With Ad0 And Ad255155................................................................................................................................................................
Admin Domain Member Types156................................................................................................................................................................
Device Members156................................................................................................................................................................
Switch Port Members156................................................................................................................................................................
Switch Members157................................................................................................................................................................
Admin Domains And Switch Wwn157................................................................................................................................................................
Admin Domain Compatibility And Availability158................................................................................................................................................................
Admin Domains And Merging158................................................................................................................................................................
Fabric Showing Switch And Device Wwns158................................................................................................................................................................
Filtered Fabric Views Showing Converted Switch Wwns158................................................................................................................................................................
Compatibility159................................................................................................................................................................
Firmware Upgrade Considerations159................................................................................................................................................................
Managing Admin Domains159................................................................................................................................................................
Understanding The Ad Transaction Model159................................................................................................................................................................
Isolated Subfabrics159................................................................................................................................................................
Setting The Default Zone Mode160................................................................................................................................................................
Creating An Admin Domain160................................................................................................................................................................
Assigning A User To An Admin Domain161................................................................................................................................................................
Activating And Deactivating Admin Domains162................................................................................................................................................................
Adding And Removing Admin Domain Members163................................................................................................................................................................
Renaming An Admin Domain164................................................................................................................................................................
Deleting An Admin Domain164................................................................................................................................................................
Deleting All User-defined Admin Domains165................................................................................................................................................................
Validating An Admin Domain Member List165................................................................................................................................................................
San Management With Admin Domains166................................................................................................................................................................
Using Cli Commands In An Ad Context166................................................................................................................................................................
Executing A Command In A Different Ad Context167................................................................................................................................................................
Displaying An Admin Domain Configuration167................................................................................................................................................................
Ports And Devices In Cli Output167................................................................................................................................................................
Switching To A Different Admin Domain Context168................................................................................................................................................................
Performing Zone Validation168................................................................................................................................................................
Admin Domain Interactions168................................................................................................................................................................
Admin Domain Interaction With Fabric Os Features169................................................................................................................................................................
Admin Domains, Zones, And Zone Databases170................................................................................................................................................................
Admin Domains And Lsan Zones170................................................................................................................................................................
Configuration Upload And Download In An Ad Context171................................................................................................................................................................
Configuration Upload And Download Scenarios In An Ad Context171................................................................................................................................................................
Installing And Maintaining Firmware173................................................................................................................................................................
About The Firmware Download Process173................................................................................................................................................................
Upgrading And Downgrading Firmware174................................................................................................................................................................
Effects Of Firmware Changes On Accounts And Passwords174................................................................................................................................................................
Considerations For Ficon Cup Environments174................................................................................................................................................................
Preparing For Firmware Downloads175................................................................................................................................................................
Checking Connected Switches176................................................................................................................................................................
Recommended Firmware176................................................................................................................................................................
Finding The Firmware Version177................................................................................................................................................................
Obtaining And Decompressing Firmware177................................................................................................................................................................
Performing Firmwaredownload On Switches178................................................................................................................................................................
Overview Of The Firmware Download Process On Switches178................................................................................................................................................................
Downloading Firmware To A Director179................................................................................................................................................................
Overview Of The Firmware Download Process On Directors180................................................................................................................................................................
San Director And Dc Director Firmwaredownload Procedure180................................................................................................................................................................
Firmwaredownload From A Usb Device183................................................................................................................................................................
Enabling Usb183................................................................................................................................................................
Viewing The Usb File System183................................................................................................................................................................
Downloading The 6.1.0 Image Using The Relative Path184................................................................................................................................................................
Downloading The 6.1.0 Image Using The Absolute Path184................................................................................................................................................................
Director Restrictions For Downgrading184................................................................................................................................................................
Public And Private Key Management184................................................................................................................................................................
Updating The Firmwarekey185................................................................................................................................................................
The Firmwaredownload Command186................................................................................................................................................................
Configuring The Switch For Signed Firmware186................................................................................................................................................................
Power-on Firmware Checksum Test186................................................................................................................................................................
Testing And Restoring Firmware On Switches187................................................................................................................................................................
Testing A Different Firmware Version On A Switch187................................................................................................................................................................
Testing And Restoring Firmware On Directors188................................................................................................................................................................
Validating Firmwaredownload190................................................................................................................................................................
Administering Advanced Zoning193................................................................................................................................................................
About Zoning193................................................................................................................................................................
Zoning Example193................................................................................................................................................................
Zone Types194................................................................................................................................................................
Types Of Zoning194................................................................................................................................................................
Approaches To Fabric-based Zoning194................................................................................................................................................................
Zone Objects195................................................................................................................................................................
Zoning Schemes196................................................................................................................................................................
Zone Aliases196................................................................................................................................................................
Zone Configurations196................................................................................................................................................................
Zoning Enforcement197................................................................................................................................................................
Software-enforced Zoning197................................................................................................................................................................
Hardware-enforced Zoning197................................................................................................................................................................
Enforcing Hardware Zoning198................................................................................................................................................................
Hardware-enforced Nonoverlapping Zones199................................................................................................................................................................
Hardware-enforced Overlapping Zones200................................................................................................................................................................
Zoning With Hardware Assist (mixed-port And Wwn Zones)200................................................................................................................................................................
Session-based Hard Zoning200................................................................................................................................................................
Considerations For Zoning Architecture201................................................................................................................................................................
Best Practices For Zoning202................................................................................................................................................................
Broadcast Zones202................................................................................................................................................................
Supported Switches For Broadcast Zones202................................................................................................................................................................
Broadcast Zones And Admin Domains202................................................................................................................................................................
Broadcast Zones And Fc-fc Routing203................................................................................................................................................................
High Availability Considerations With Broadcast Zones203................................................................................................................................................................
Loop Devices And Broadcast Zones203................................................................................................................................................................
Backward Compatibility With Pre-5.3.0 Switches203................................................................................................................................................................
Broadcast Zones And Default Zoning203................................................................................................................................................................
Creating And Managing Zone Aliases204................................................................................................................................................................
Creating And Maintaining Zones206................................................................................................................................................................
Default Zoning Mode209................................................................................................................................................................
Setting The Default Zoning Mode209................................................................................................................................................................
Viewing The Current Default Zone Access Mode209................................................................................................................................................................
Merging Zones210................................................................................................................................................................
Zoning Database Limitations210................................................................................................................................................................
Resulting Database Size: 0 To 96k210................................................................................................................................................................
Resulting Database Size: 96k To 128k211................................................................................................................................................................
Resulting Database Size: 128k To 256k211................................................................................................................................................................
Resulting Database Size: 256k To 1m212................................................................................................................................................................
Creating And Modifying Zoning Configurations213................................................................................................................................................................
Maintaining Zone Objects216................................................................................................................................................................
Managing Zoning Configurations In A Fabric219................................................................................................................................................................
New Switch Or Fabric Additions219................................................................................................................................................................
Fabric Segmentation221................................................................................................................................................................
Security And Zoning221................................................................................................................................................................
Zone Conflict Resolution221................................................................................................................................................................
Configuring Directors223................................................................................................................................................................
Identifying Ports223................................................................................................................................................................
Director Port Numbering Schemes224................................................................................................................................................................
By Slot And Port Number224................................................................................................................................................................
By Index224................................................................................................................................................................
Port Numbering Schemes For The 4/256 Director And Dc Director224................................................................................................................................................................
Default Index/area_id Core Pid Assignment With No Port Swap225................................................................................................................................................................
Basic Blade Management226................................................................................................................................................................
Changing A Director's Name226................................................................................................................................................................
Powering Port Blades Off And On227................................................................................................................................................................
Disabling And Enabling Port Blades227................................................................................................................................................................
Fr4-18i Blade Exceptions227................................................................................................................................................................
Fc4-48 And Fc8-48 Blade Exceptions228................................................................................................................................................................
Conserving Power228................................................................................................................................................................
Blade Terminology And Compatibility229................................................................................................................................................................
Cp Blades229................................................................................................................................................................
Director Terminology And Abbreviations229................................................................................................................................................................
Core Blades230................................................................................................................................................................
Port Blade Compatibility230................................................................................................................................................................
Setting Chassis Configuration Options For The 4/256 Director230................................................................................................................................................................
Port Blades Supported By Each Director230................................................................................................................................................................
Supported Configuration Options230................................................................................................................................................................
Displaying Slot Information231................................................................................................................................................................
Chassis Configuration Options231................................................................................................................................................................
Inter Chassis Link Behavior Between Two Hp Storageworks Dc Directors232................................................................................................................................................................
Led Behavior232................................................................................................................................................................
Routing Traffic233................................................................................................................................................................
Data Routing And Routing Policies233................................................................................................................................................................
Static Route Assignment234................................................................................................................................................................
Frame Order Delivery234................................................................................................................................................................
Dynamic Load Sharing235................................................................................................................................................................
Setting Dls235................................................................................................................................................................
Viewing Routing Path Information236................................................................................................................................................................
Viewing Routing Information Along A Path238................................................................................................................................................................
Implementing An Interoperable Fabric241................................................................................................................................................................
Configuring The Distributed Management Server243................................................................................................................................................................
Platform Services243................................................................................................................................................................
Enabling Platform Services244................................................................................................................................................................
Disabling Platform Services244................................................................................................................................................................
Accessing The Management Server Database244................................................................................................................................................................
Displaying The Management Server Acl244................................................................................................................................................................
Adding A Member To The Acl245................................................................................................................................................................
Deleting A Member From The Acl246................................................................................................................................................................
Viewing The Contents Of The Management Server Database247................................................................................................................................................................
Clearing The Management Server Database247................................................................................................................................................................
Controlling Topology Discovery247................................................................................................................................................................
Iscsi Gateway Services249................................................................................................................................................................
Overview Of Iscsi Gateway Service249................................................................................................................................................................
Iscsi Session Translation249................................................................................................................................................................
Iscsi Gateway Network249................................................................................................................................................................
Iscsi Gateway Service Basic Implementation249................................................................................................................................................................
Basic Versus Advanced Lun Mapping250................................................................................................................................................................
Basic Lun Mapping250................................................................................................................................................................
Iscsi-to-fc Translation250................................................................................................................................................................
Iscsi Vt Basic Lun Mapping250................................................................................................................................................................
Advanced Lun Mapping251................................................................................................................................................................
Iscsi Component Identification251................................................................................................................................................................
Iqn Prefix251................................................................................................................................................................
Iscsi Vt Advanced Lun Mapping251................................................................................................................................................................
Changing And Displaying The Iqn Prefix252................................................................................................................................................................
Access Control With Discovery Domains252................................................................................................................................................................
Iqn Example252................................................................................................................................................................
Switch-to-iscsi Initiator Authentication253................................................................................................................................................................
Load Balancing Through Connection Redirection253................................................................................................................................................................
Discovery Domain Set Configuration Example253................................................................................................................................................................
Enabling And Disabling Connection Redirection For Load Balancing254................................................................................................................................................................
Displaying Connection Redirection Status254................................................................................................................................................................
Supported Iscsi Initiators255................................................................................................................................................................
Checklist For Configuring Iscsi255................................................................................................................................................................
Iscsi Target Gateway Configuration Steps255................................................................................................................................................................
Fc4-16ip Blade Configuration257................................................................................................................................................................
Fc4-16ip Port Numbering257................................................................................................................................................................
Fc4-16ip Ports257................................................................................................................................................................
Enabling The Iscsi Gateway Service258................................................................................................................................................................
Enabling Gbe Ports258................................................................................................................................................................
Configuring The Gbe Interface259................................................................................................................................................................
Iscsi Virtual Target Configuration260................................................................................................................................................................
Automatic Iscsi Vt Creation261................................................................................................................................................................
Generating Iscsi Vts For Every Fc Target261................................................................................................................................................................
Generating An Iscsi Vt For A Specific Fc Target263................................................................................................................................................................
Manual Iscsi Vt Creation263................................................................................................................................................................
Mapping Luns On A Specific Port To An Iscsi Vt265................................................................................................................................................................
Deleting Luns From An Iscsi Vt265................................................................................................................................................................
Displaying The Iscsi Virtual Target Lun Map266................................................................................................................................................................
Displaying Iscsi Vt State And Status266................................................................................................................................................................
Discovery Domain And Domain Set Configuration266................................................................................................................................................................
Displaying Iscsi Initiator Iqns267................................................................................................................................................................
Creating Discovery Domains267................................................................................................................................................................
Creating And Enabling A Discovery Domain Sets267................................................................................................................................................................
Iscsi Initiator-to-vt Authentication Configuration268................................................................................................................................................................
Setting The User Name And Shared Secret268................................................................................................................................................................
Binding User Names To An Iscsi Vt268................................................................................................................................................................
Deleting User Names From An Iscsi Vt Binding List269................................................................................................................................................................
Displaying Chap Configurations269................................................................................................................................................................
Committing The Iscsi-related Configuration269................................................................................................................................................................
Resolving Conflicts Between Iscsi Configurations270................................................................................................................................................................
Lun Masking Considerations270................................................................................................................................................................
Iscsi Fc Zoning Overview271................................................................................................................................................................
Iscsi Gateway Service In An Iscsi Fc Zone271................................................................................................................................................................
Iscsi Fc Zone Creation272................................................................................................................................................................
Creating An Iscsi Fc Zone272................................................................................................................................................................
Zoning Configuration Creation275................................................................................................................................................................
Creating And Enabling A Zoning Configuration275................................................................................................................................................................
Isns Client Service Configuration276................................................................................................................................................................
Displaying Isns Client Service Status276................................................................................................................................................................
Enabling The Isns Client Service276................................................................................................................................................................
Iscsi Network With Isns Server And Clients276................................................................................................................................................................
Disabling The Isns Client Service277................................................................................................................................................................
Clearing The Isns Client Configuration278................................................................................................................................................................
Administering Npiv279................................................................................................................................................................
About Npiv279................................................................................................................................................................
Enabling And Disabling Npiv279................................................................................................................................................................
Configuring Npiv279................................................................................................................................................................
Configuration Scenarios280................................................................................................................................................................
Viewing Npiv Port Configuration Information280................................................................................................................................................................
Displaying Login Information282................................................................................................................................................................
Optimizing Fabric Behavior283................................................................................................................................................................
Introduction To Adaptive Networking283................................................................................................................................................................
Top Talkers283................................................................................................................................................................
Traffic Isolation283................................................................................................................................................................
Ti Zone Failover284................................................................................................................................................................
Fspf Routing Rules And Traffic Isolation284................................................................................................................................................................
Traffic Isolation Zone Creating A Dedicated Path Through The Fabric284................................................................................................................................................................
General Rules For Ti Zones285................................................................................................................................................................
Dedicated Path (shortest Path)285................................................................................................................................................................
Dedicated Path (but Not The Shortest Path)285................................................................................................................................................................
Supported Configurations For Traffic Isolation286................................................................................................................................................................
Ti Zone Misconfiguration286................................................................................................................................................................
Limitations And Restrictions Of Traffic Isolation287................................................................................................................................................................
Admin Domain Considerations For Traffic Isolation287................................................................................................................................................................
Creating A Ti Zone287................................................................................................................................................................
Modifying Ti Zones288................................................................................................................................................................
Activating And Deactivating A Ti Zone289................................................................................................................................................................
Deleting A Ti Zone290................................................................................................................................................................
Displaying Ti Zones290................................................................................................................................................................
Qos: Ingress Rate Limiting290................................................................................................................................................................
Qos: Sid/did Traffic Prioritization291................................................................................................................................................................
Qos Zones292................................................................................................................................................................
Qos Traffic Prioritization292................................................................................................................................................................
Qos On E_ports293................................................................................................................................................................
Supported Configurations For Traffic Prioritization293................................................................................................................................................................
Qos With E_ports Enabled293................................................................................................................................................................
Setting Traffic Prioritization294................................................................................................................................................................
Using The Fc-fc Routing Service295................................................................................................................................................................
Supported Platforms295................................................................................................................................................................
Fibre Channel Routing Concepts295................................................................................................................................................................
A Metasan With Interfabric Links296................................................................................................................................................................
A Metasan With Edge-to-edge And Backbone Fabrics297................................................................................................................................................................
Proxy Devices298................................................................................................................................................................
Edge Sans Connected Through A Backbone Fabric298................................................................................................................................................................
Routing Types299................................................................................................................................................................
Fibre Channel Nat And Phantom Domains299................................................................................................................................................................
Metasan With Imported Devices299................................................................................................................................................................
Setting Up The Fc-fc Routing Service300................................................................................................................................................................
Performing Verification Checks301................................................................................................................................................................
Assigning Backbone Fabric Ids302................................................................................................................................................................
Configuring Fcip Tunnels (optional)303................................................................................................................................................................
Configuring Fc-fc Routing To Work With Secure Fabric Os (optional)303................................................................................................................................................................
Configuring Dh-chap Secret304................................................................................................................................................................
Configuring An Interfabric Link305................................................................................................................................................................
Portcfgexport Options307................................................................................................................................................................
Configuring The Fc Router Port Cost (optional)310................................................................................................................................................................
Using Router Port Cost311................................................................................................................................................................
Upgrade, Downgrade, And Ha Considerations311................................................................................................................................................................
Port Cost Considerations312................................................................................................................................................................
Setting A Proxy Pid312................................................................................................................................................................
Matching Fabric Parameters312................................................................................................................................................................
Configuring Ex_port Frame Trunking (optional)313................................................................................................................................................................
Supported Configurations And Platforms314................................................................................................................................................................
High Availability Support314................................................................................................................................................................
Backward Compatibility Support314................................................................................................................................................................
Using Ex_port Frame Trunking314................................................................................................................................................................
Trunking Commands314................................................................................................................................................................
Configuring Lsans And Zoning315................................................................................................................................................................
Use Of Administrative Domains With Lsan Zones And Fcr315................................................................................................................................................................
Defining And Naming Zones316................................................................................................................................................................
Lsan Zones And Fabric-to-fabric Communications316................................................................................................................................................................
Lsan Zone Binding (optional)319................................................................................................................................................................
Dual Backbone Configuration320................................................................................................................................................................
Maximum Lsan Count320................................................................................................................................................................
Configuring Backbone Fabrics For Interconnectivity321................................................................................................................................................................
Ha And Downgrade Considerations321................................................................................................................................................................
Ipfc Over Fcr321................................................................................................................................................................
Broadcast Configuration322................................................................................................................................................................
Monitoring Resources323................................................................................................................................................................
Routing Echo324................................................................................................................................................................
Interoperability With Legacy Fcr Switches325................................................................................................................................................................
Backward Compatibility326................................................................................................................................................................
Front Domain Consolidation326................................................................................................................................................................
Using Front Domain Consolidation326................................................................................................................................................................
Hardware And Firmware Compatibility For Nonsecure Fabrics326................................................................................................................................................................
Range Of Output Ports327................................................................................................................................................................
Administering Advanced Performance Monitoring329................................................................................................................................................................
About Advanced Performance Monitoring329................................................................................................................................................................
Types Of Monitors Supported On B-series Switch Models329................................................................................................................................................................
End-to-end Performance Monitoring330................................................................................................................................................................
End-to-end Monitors330................................................................................................................................................................
Setting A Mask For End-to-end Monitors331................................................................................................................................................................
Setting End-to-end Monitors On A Port331................................................................................................................................................................
Proper Placement Of End-to-end Performance Monitors331................................................................................................................................................................
Advanced Performance Monitoring Commands332................................................................................................................................................................
Monitoring Al_pas333................................................................................................................................................................
Adding End-to-end Monitors333................................................................................................................................................................
Setting A Mask For An End-to-end Monitor334................................................................................................................................................................
Deleting End-to-end Monitors334................................................................................................................................................................
Mask Positions For End-to-end Monitors334................................................................................................................................................................
Filter-based Performance Monitoring335................................................................................................................................................................
Adding Standard Filter-based Monitors335................................................................................................................................................................
Commands To Add Filter-based Monitors335................................................................................................................................................................
Adding Custom Filter-based Monitors336................................................................................................................................................................
Deleting Filter-based Monitors337................................................................................................................................................................
Isl Performance Monitoring337................................................................................................................................................................
Predefined Values At Offset 0337................................................................................................................................................................
Top Talker Monitors338................................................................................................................................................................
Adding A Top Talker Monitor On An F_port338................................................................................................................................................................
Deleting A Top Talker Monitor On An F_port339................................................................................................................................................................
Displaying The Top N Bandwidth-using Flows On An F_port339................................................................................................................................................................
Using Top Talker Monitors In Fabric Mode340................................................................................................................................................................
Adding Top Talker Monitors On All Switches In The Fabric340................................................................................................................................................................
Deleting The Fabric Mode Top Talker Monitors340................................................................................................................................................................
Displaying Top Talking Flows On The Switch For A Given Domain Id340................................................................................................................................................................
Limitations Of Top Talker Monitors341................................................................................................................................................................
Trunk Monitoring341................................................................................................................................................................
Displaying Monitor Counters341................................................................................................................................................................
Clearing Monitor Counters344................................................................................................................................................................
Saving And Restoring Monitor Configurations346................................................................................................................................................................
Collecting Performance Data346................................................................................................................................................................
Administering Extended Fabrics347................................................................................................................................................................
Extended Fabrics Licensing347................................................................................................................................................................
Extended Fibre Channel Over Distance347................................................................................................................................................................
Distance Levels For Extended Inter-switch Links (isls)347................................................................................................................................................................
Buffer-to-buffer Credits347................................................................................................................................................................
Fibre Channel Data Frames348................................................................................................................................................................
Fc Switch Port Buffer Credit Requirements For Long Distance Calculations349................................................................................................................................................................
Determining How Many Ports Can Be Configured For Long Distance349................................................................................................................................................................
Displaying The Remaining Buffers In A Port Group350................................................................................................................................................................
Switch, Port Speed, And Distance With Asic And Buffers352................................................................................................................................................................
Buffer Credit Recovery353................................................................................................................................................................
Fabric Considerations353................................................................................................................................................................
Long Distance Link Initialization Activation353................................................................................................................................................................
Extended Fabrics Device Limitations353................................................................................................................................................................
Configuring An Extended Isl354................................................................................................................................................................
Extended Isl Modes: B-series 2gb Switches (bloom And Bloom Ii Asics)355................................................................................................................................................................
Administering Isl Trunking357................................................................................................................................................................
About Isl Trunking357................................................................................................................................................................
Distribution Of Traffic Over Isl Trunking Groups357................................................................................................................................................................
Standard Trunking Criteria358................................................................................................................................................................
Initializing Trunking On Ports359................................................................................................................................................................
Performance Monitoring359................................................................................................................................................................
Adding A Monitor To An F_port Master Port359................................................................................................................................................................
Displaying Port Throughput Performance360................................................................................................................................................................
Enabling And Disabling Isl Trunking361................................................................................................................................................................
Setting Port Speeds362................................................................................................................................................................
Long-distance Mode Definitions362................................................................................................................................................................
Setting The Same Speed For All Ports On The Switch363................................................................................................................................................................
Displaying Trunking Information364................................................................................................................................................................
Trunking Over Extended Fabrics365................................................................................................................................................................
Trunking Distances365................................................................................................................................................................
F_port Masterless Trunking365................................................................................................................................................................
Trunking Support For San Switch 4/32, 4/32b And 4/64 San Switch (condor Asic)365................................................................................................................................................................
81 Trunking Support For 4/256 San Director And Dc Directors With Supported Blades (condor And Condor2365................................................................................................................................................................
Switch In Access Gateway Mode Without F_port Trunking366................................................................................................................................................................
Switch In Access Gateway Mode With F_port Masterless Trunking366................................................................................................................................................................
F_port Masterless Trunking Considerations367................................................................................................................................................................
Setting Up F_port Trunking369................................................................................................................................................................
Pwwn Format For F_port And N_port Trunk Ports369................................................................................................................................................................
Assigning A Trunk Area370................................................................................................................................................................
Trunk Group Configuration For The San Switch 8/40370................................................................................................................................................................
Address Identifier370................................................................................................................................................................
Enabling F_port Trunking371................................................................................................................................................................
Enabling The Dcc Policy On Trunk372................................................................................................................................................................
Disabling F_port Trunking373................................................................................................................................................................
F_port Trunking Monitoring373................................................................................................................................................................
Configuration Management For Trunk Areas373................................................................................................................................................................
Trunking For Access Gateway373................................................................................................................................................................
Configuring And Monitoring Fcip Extension Services375................................................................................................................................................................
Fcip Services Licensing375................................................................................................................................................................
Platforms That Support San Extension Over Ip376................................................................................................................................................................
Fr4-18i Port Numbering376................................................................................................................................................................
Multi-protocol Router Port Numbering376................................................................................................................................................................
Fcip Concepts377................................................................................................................................................................
Virtual Ports And Fcip Tunnels377................................................................................................................................................................
Virtual Port Types377................................................................................................................................................................
Tunnel And Virtual Port Numbering377................................................................................................................................................................
Compression378................................................................................................................................................................
Traffic Shaping378................................................................................................................................................................
Qos Concepts And Implementation Over Fcip378................................................................................................................................................................
Layer Three Diffserv Code Points (dscp)378................................................................................................................................................................
Vlan Tagging And Layer Two Class Of Service (l2cos)378................................................................................................................................................................
Ipsec Concepts And Implementation Over Fcip379................................................................................................................................................................
Default Mapping Of Dscp Priorities To L2cos Priorities379................................................................................................................................................................
Ipsec Terminology380................................................................................................................................................................
Options For Enhancing Tape Write I/o Performance381................................................................................................................................................................
Fcip Fastwrite And Tape Pipelining381................................................................................................................................................................
Constraints For Fcip Fastwrite And Tape Pipelining381................................................................................................................................................................
Fcip Fastwrite/tape Pipelining Configurations382................................................................................................................................................................
Using Fcip Fastwrite And Tape Pipelining382................................................................................................................................................................
Unsupported Configurations383................................................................................................................................................................
Multiple Tunnels To Multiple Ports, Fastwrite And Tape Pipelining Enabled On A Per-tunnel/per-port Basis383................................................................................................................................................................
Ficon Emulation Concepts384................................................................................................................................................................
Unsupported Configurations With Fastwrite And Tape Pipelining384................................................................................................................................................................
Xrc Emulation385................................................................................................................................................................
Tape Write Pipelining385................................................................................................................................................................
Tape Read Pipelining385................................................................................................................................................................
Device Level Acknowledgment385................................................................................................................................................................
Tin/tir Emulation385................................................................................................................................................................
Read Block Id Emulation385................................................................................................................................................................
Ftrace Concepts385................................................................................................................................................................
Fcip Services Configuration Guidelines386................................................................................................................................................................
Checklist For Configuring Fcip Links386................................................................................................................................................................
Command Checklist For Configuring Fcip Links386................................................................................................................................................................
Configuring Ipsec387................................................................................................................................................................
Ipsec Parameters388................................................................................................................................................................
Fixed Policy Parameters388................................................................................................................................................................
Modifiable Policy Parameters388................................................................................................................................................................
Managing Policies389................................................................................................................................................................
Persistently Disabling Ports391................................................................................................................................................................
Configuring Vex Ports391................................................................................................................................................................
Configuring Ip Interfaces And Ip Routes392................................................................................................................................................................
Configuring Fcip Tunnels394................................................................................................................................................................
Configuring Ficon Emulation395................................................................................................................................................................
Configuring Ftrace397................................................................................................................................................................
Verifying The Fcip Tunnel Configuration397................................................................................................................................................................
Enabling Persistently Disabled Ports400................................................................................................................................................................
Modify And Delete Command Options402................................................................................................................................................................
Modifying Fcip Tunnels402................................................................................................................................................................
Modifying/deleting Qos Settings403................................................................................................................................................................
Ficon Emulation Modify Operations403................................................................................................................................................................
Deleting An Fcip Tunnel405................................................................................................................................................................
Deleting An Ip Interface (ipif)405................................................................................................................................................................
Deleting An Iproute405................................................................................................................................................................
Deleting An Ftrace Configuration405................................................................................................................................................................
Maintaining Vlan Tag Tables405................................................................................................................................................................
Troubleshooting Fcip Links406................................................................................................................................................................
Wan Performance Analysis Tools407................................................................................................................................................................
About The Ipperf Option407................................................................................................................................................................
Running Wan Tool Sessions With An Fcip Tunnel Online407................................................................................................................................................................
Fcip Port Bandwidth407................................................................................................................................................................
Wan Tool Performance Characteristics408................................................................................................................................................................
Starting Wan Tool Analysis408................................................................................................................................................................
Wan Tool Ipperf Syntax409................................................................................................................................................................
Using Portcmd Ping410................................................................................................................................................................
Using Portcmd Traceroute411................................................................................................................................................................
Fcip Tunnel Performance Characteristics412................................................................................................................................................................
Ficon Fabrics415................................................................................................................................................................
Overview Of Fabric Os Support For Ficon415................................................................................................................................................................
Supported Switches416................................................................................................................................................................
Types Of Ficon Configurations416................................................................................................................................................................
Control Unit Port (cup)416................................................................................................................................................................
Ficon Commands417................................................................................................................................................................
Fabric Os Commands Related To Ficon And Ficon Cup417................................................................................................................................................................
User Security Considerations418................................................................................................................................................................
Configuring Switches418................................................................................................................................................................
Preparing A Switch419................................................................................................................................................................
Configuring A Single Switch419................................................................................................................................................................
Configuring A High-integrity Fabric419................................................................................................................................................................
Setting A Unique Domain Id420................................................................................................................................................................
Cascaded Configuration, Two Switches420................................................................................................................................................................
Cascaded Configuration, Three Switches420................................................................................................................................................................
Displaying Information421................................................................................................................................................................
Link Incidents421................................................................................................................................................................
Registered Listeners421................................................................................................................................................................
Node Identification Data421................................................................................................................................................................
Fru Failures421................................................................................................................................................................
Swapping Ports422................................................................................................................................................................
Clearing The Ficon Management Database422................................................................................................................................................................
Using Ficon Cup422................................................................................................................................................................
Setup Summary423................................................................................................................................................................
Enabling And Disabling Ficon Management Server Mode423................................................................................................................................................................
Setting Up Cup When Ficon Management Server Mode Is Enabled424................................................................................................................................................................
Displaying The Fmsmode Setting424................................................................................................................................................................
Displaying Mode Register Bit Settings425................................................................................................................................................................
Ficon Cup Mode Register Bits425................................................................................................................................................................
Setting Mode Register Bits426................................................................................................................................................................
Persistently Enabling/disabling Ports426................................................................................................................................................................
Port And Switch Naming Standards427................................................................................................................................................................
Adding And Removing Ficon Cup Licenses427................................................................................................................................................................
Zoning And Pdcm Considerations427................................................................................................................................................................
Zoning And Link Incident Reporting427................................................................................................................................................................
Troubleshooting428................................................................................................................................................................
Backing Up And Restoring Ficon Configuration Files429................................................................................................................................................................
Recording Configuration Information430................................................................................................................................................................
Ficon Configuration Worksheet430................................................................................................................................................................
Sample Iocp Configuration File431................................................................................................................................................................
Configuring And Monitoring Ficon Extension Services433................................................................................................................................................................
Ficon Extension Products Licensing433................................................................................................................................................................
Platforms That Support Ficon Extension Over Ip434................................................................................................................................................................
Mp Router Port Numbering434................................................................................................................................................................
Fcip Configuration Requirements For Ficon Extension435................................................................................................................................................................
Configuration Requirements For Switches And Directors435................................................................................................................................................................
Ensure Sufficient Buffer Credits Are Configured435................................................................................................................................................................
High Integrity Fabric Requirements For Cascaded Configurations435................................................................................................................................................................
Ficon Emulation Requirement For A Determinate Path435................................................................................................................................................................
One Ethernet Interface, One Ip Route And One Fcip Tunnel Between Sites435................................................................................................................................................................
Traffic Isolation Zoning435................................................................................................................................................................
Allow/prohibit For M-series Directors435................................................................................................................................................................
Cross-coupled Configurations436................................................................................................................................................................
Ficon Emulation Concepts And Features436................................................................................................................................................................
Allow/prohibit Example436................................................................................................................................................................
Cross-coupled Configuration436................................................................................................................................................................
Displaying Ficon Emulation Configuration Values439................................................................................................................................................................
Ficon Performance Statistics441................................................................................................................................................................
Monitoring Ficon Emulation442................................................................................................................................................................
A Configuring The Pid Format445................................................................................................................................................................
About Pids And Pid Binding445................................................................................................................................................................
Summary Of Pid Formats445................................................................................................................................................................
Impact Of Changing The Fabric Pid Format446................................................................................................................................................................
Host Reboots446................................................................................................................................................................
Static Pid Mapping Errors446................................................................................................................................................................
Changes To Configuration Data447................................................................................................................................................................
Selecting A Pid Format447................................................................................................................................................................
Effects Of Pid Format Changes On Configurations447................................................................................................................................................................
Evaluating The Fabric448................................................................................................................................................................
Pid Format Recommendations For Adding New Switches448................................................................................................................................................................
Planning The Update Procedure450................................................................................................................................................................
Online Update450................................................................................................................................................................
Offline Update451................................................................................................................................................................
Hybrid Update451................................................................................................................................................................
Changing To Core Pid Format451................................................................................................................................................................
Converting Port Number To Area Id452................................................................................................................................................................
Performing Pid Format Changes453................................................................................................................................................................
Basic Procedure453................................................................................................................................................................
Hp/ux Procedure454................................................................................................................................................................
Aix Procedure455................................................................................................................................................................
Swapping Port Area Ids456................................................................................................................................................................
B Understanding Legacy Password Behaviour459................................................................................................................................................................
Password Management Information459................................................................................................................................................................
Account/password Characteristics Matrix459................................................................................................................................................................
Password Prompting Behaviors460................................................................................................................................................................
Password Prompting Matrix460................................................................................................................................................................
Password Migration During Firmware Changes461................................................................................................................................................................
Password Recovery Options461................................................................................................................................................................
Password Migration Behavior During Firmware Upgrade/downgrade461................................................................................................................................................................
C Interoperating With An M-eos Fabric463................................................................................................................................................................
D Migrating From An Mp Router To A 400 Mp Router465................................................................................................................................................................
Configurations465................................................................................................................................................................
Non-redundant Configuration465................................................................................................................................................................
Non-redundant Router Configuration465................................................................................................................................................................
Redundant Configuration466................................................................................................................................................................
Configuration During The Upgrade466................................................................................................................................................................
Redundant Router Configuration466................................................................................................................................................................
Devices Directly Connected To Router467................................................................................................................................................................
Configuring A New Fc Router467................................................................................................................................................................
Dual Backbone Fabric Configuration467................................................................................................................................................................
E Using Remote Switch469................................................................................................................................................................
About Remote Switch469................................................................................................................................................................
Remote Switch Capabilities469................................................................................................................................................................
Using Remote Switch With A Gateway469................................................................................................................................................................
Zone Merging Scenarios473................................................................................................................................................................
F Zone Merging Scenarios473................................................................................................................................................................
Network Using Fcip489................................................................................................................................................................
Single Tunnel, Fastwrite And Tape Pipelining Enabled489................................................................................................................................................................
Index492................................................................................................................................................................
HP StorageWorks 8/40 - SAN Switch Administrator's Manual

HP StorageWorks 8/40 - SAN Switch Administrator's Manual (447 pages)

HP StorageWorks Fabric OS 5.2.x administrator guide (5697-0014, May 2009)  
Brand: HP | Category: Software | Size: 3.43 MB
Table of contents
Table Of Contents3................................................................................................................................................................
About This Guide15................................................................................................................................................................
Supported Hp Storageworks Hardware15................................................................................................................................................................
Intended Audience16................................................................................................................................................................
Related Documentation16................................................................................................................................................................
Glossary Of Terms16................................................................................................................................................................
Document Conventions And Symbols16................................................................................................................................................................
Hp Technical Support17................................................................................................................................................................
Hp-authorized Reseller17................................................................................................................................................................
Helpful Web Sites17................................................................................................................................................................
Introducing Fabric Os Cli Procedures19................................................................................................................................................................
About Procedural Differences19................................................................................................................................................................
Scope And References19................................................................................................................................................................
About The Cli20................................................................................................................................................................
Help Information21................................................................................................................................................................
Displaying Command Help21................................................................................................................................................................
Displaying Additional Help Topics21................................................................................................................................................................
Performing Basic Configuration Tasks23................................................................................................................................................................
Connecting To The Cli23................................................................................................................................................................
Using Telnet Or Ssh Session23................................................................................................................................................................
How To Connect Via Telnet23................................................................................................................................................................
Setting The Default Account Passwords24................................................................................................................................................................
Using A Console Session On The Serial Port24................................................................................................................................................................
How To Connect Via The Serial Port24................................................................................................................................................................
Changing Default Passwords Summary25................................................................................................................................................................
How To Change Default Passwords At Login26................................................................................................................................................................
Configuring The Ethernet Interface26................................................................................................................................................................
How To Display Network Interface Settings27................................................................................................................................................................
Static Ethernet Addressing Summary27................................................................................................................................................................
How To Set Static Addresses For The Ethernet Network Interface27................................................................................................................................................................
Configuring Dhcp28................................................................................................................................................................
Dhcp Summary28................................................................................................................................................................
How To Enable Dhcp28................................................................................................................................................................
How To Disable Dhcp28................................................................................................................................................................
Setting The Date And Time29..................................................................................................................................................