Sign In
Upload
Manuals
Brands
HP Manuals
Software
Fabric OS v7.0.1
HP Fabric OS v7.0.1 Manuals
Manuals and User Guides for HP Fabric OS v7.0.1. We have
1
HP Fabric OS v7.0.1 manual available for free PDF download: Administrator's Manual
HP Fabric OS v7.0.1 Administrator's Manual (584 pages)
Brocade Fabric OS Administrator's Guide - Supporting Fabric OS v7.0.1 (53-1002446-01, March 2012)
Brand:
HP
| Category:
Software
| Size: 5.14 MB
Table of Contents
Table of Contents
3
About this Document
31
In this Chapter
31
How this Document Is Organized
31
Supported Hardware and Software
32
What's New in this Document
33
Document Conventions
34
Command Syntax Conventions
34
Notice to the Reader
35
Additional Information
36
Getting Technical Help
36
Document Feedback
37
Standard Features
39
Chapter 1 Understanding Fibre Channel Services
41
In this Chapter
41
Fibre Channel Services Overview
41
Figure 1 Well-Known Addresses
41
Management Server
42
Platform Services
42
Platform Services and Virtual Fabrics
43
Enabling Platform Services
43
Disabling Platform Services
43
Management Server Database
44
Displaying the Management Server ACL
44
Adding a Member to the ACL
44
Deleting a Member from the ACL
45
Viewing the Contents of the Management Server Database
46
Clearing the Management Server Database
47
Topology Discovery
47
Displaying Topology Discovery Status
47
Enabling Topology Discovery
47
Disabling Topology Discovery
48
Device Login
48
Principal Switch
49
E_Port Login
49
Fabric Login
49
Port Login Process
49
Rscns
50
Duplicate Port World Wide Name
51
High Availability of Daemon Processes
51
Table 1 Daemons that Are Automatically Restarted
51
Chapter 2 Performing Basic Configuration Tasks
53
In this Chapter
53
Fabric os Overview
53
Fabric os Command Line Interface
54
Console Sessions Using the Serial Port
54
Table 2 Terminal Port Parameters
54
Telnet or SSH Sessions
55
Getting Help on a Command
56
Table 3 Help Topic Contents
56
Password Modification
57
Default Account Passwords
57
The Ethernet Interface on Your Switch
58
Virtual Fabrics and the Ethernet Interface
58
Displaying the Network Interface Settings
59
Static Ethernet Addresses
60
DHCP Activation
61
Ipv6 Autoconfiguration
62
Date and Time Settings
63
Setting the Date and Time
63
Time Zone Settings
64
Network Time Protocol
65
Domain Ids
66
Displaying the Domain Ids
67
Setting the Domain ID
67
Table 4 Fabricshow Fields
67
Switch Names
68
Customizing the Switch Name
68
Chassis Names
68
Customizing Chassis Names
68
Fabric Name
69
Configuring the Fabric Name
69
High Availability Considerations for Fabric Names
69
Upgrade and Downgrade Considerations for Fabric Names
69
Config File Upload and Download Considerations for Fabric Names
69
Switch Activation and Deactivation
70
Disabling a Switch
70
Enabling a Switch
70
Switch and Backbone Shutdown
70
Powering off a Brocade Switch
70
Powering off a Brocade Backbone
71
Basic Connections
71
Device Connection
71
Switch Connection
72
Chapter 3 Performing Advanced Configuration Tasks
73
In this Chapter
73
Pids and PID Binding Overview
73
Core PID Addressing Mode
74
Fixed Addressing Mode
74
10-Bit Addressing Mode
74
256-Area Addressing Mode
75
WWN-Based PID Assignment
75
Ports
77
Setting Port Names
78
Port Identification by Slot and Port Number
78
Port Identification by Port Area ID
78
Port Identification by Index
79
Swapping Port Area Ids
79
Port Activation and Deactivation
80
Port Decommissioning
81
Setting Port Speeds
81
Setting the same Speed for All Ports on the Switch
81
Setting Port Speed for a Port Octet
82
Blade Terminology and Compatibility
82
Table 5 Core and CP Blade Terminology and Platform Support
82
Table 6 Port Blade Terminology, Numbering, and Platform Support
83
Core Blades
85
CP Blades
85
Port and Application Blade Compatibility
85
FX8-24 Compatibility Notes
86
Enabling and Disabling Blades
86
Table 7 Blade Compatibility Within Brocade Backbone Families
86
Enabling Blades
87
Disabling Blades
88
Blade Swapping
88
How Blades Are Swapped
89
Figure 2 Identifying the Blades
89
Swapping Blades
90
Figure 3 Blade Swap with Virtual Fabrics During the Swap
90
Figure 4 Blade Swap with Virtual Fabrics after the Swap
90
Power Management
91
Powering off a Port Blade
91
Powering on a Port Blade
91
Equipment Status
92
Checking Switch Operation
92
Verifying High Availability Features (Backbones Only)
92
Verifying Fabric Connectivity
93
Verifying Device Connectivity
93
Track and Control Switch Changes
93
Enabling the Track Changes Feature
94
Displaying the Status of the Track Changes Feature
94
Viewing the Switch Status Policy Threshold Values
94
Setting the Switch Status Policy Threshold Values
95
Audit Log Configuration
96
Verifying Host Syslog Prior to Configuring the Audit Log
97
Configuring an Audit Log for Specific Event Classes
97
Configuring FLOGI-Time Handling of Duplicate PWWN
98
Setting the Behavior for Handling Duplicate Pwwns
99
Table 8 Duplicate PWWN Behavior: Existing Login Takes Precedence over Second Login 60 Table 9 Duplicate PWWN Behavior: Second Login Overrides Existing Login
99
Chapter 4 Routing Traffic
101
In this Chapter
101
Routing Overview
101
Paths and Route Selection
102
Fspf
102
Figure 5 Principal Isls
102
Fibre Channel NAT
103
Inter-Switch Links
104
Figure 6 New Switch Added to Existing Fabric
104
Buffer Credits
105
Virtual Channels
105
Gateway Links
106
Figure 7 Virtual Channels on a Qos-Enabled ISL
106
Configuring a Link through a Gateway
107
Figure 8 Gateway Link Merging Sans
107
Routing Policies
108
Displaying the Current Routing Policy
108
Exchange-Based Routing
109
Port-Based Routing
109
AP Route Policy
109
Route Selection
110
Dynamic Load Sharing
111
Frame Order Delivery
112
Forcing In-Order Frame Delivery Across Topology Changes
112
Restoring Out-Of-Order Frame Delivery Across Topology Changes74
112
Lossless Dynamic Load Sharing on Ports
113
Lossless Core
114
Table 10 Combinations of Routing Policy and IOD with Lossless DLS Enabled
114
Configuring Lossless Dynamic Load Sharing
115
Lossless Dynamic Load Sharing in Virtual Fabrics
115
Enabling Forward Error Correction
115
Frame Redirection
116
Creating a Frame Redirect Zone
117
Deleting a Frame Redirect Zone
117
Figure 9 Single Host and Target
117
Viewing Redirect Zones
118
Chapter 5 Managing User Accounts
119
In this Chapter
119
User Accounts Overview
119
Role-Based Access Control
120
Table 11 Default Fabric os Roles
120
The Management Channel
121
Table 12 Permission Types
121
Managing User-Defined Roles
122
Table 13 Maximum Number of Simultaneous Sessions
122
Local Database User Accounts
123
Default Accounts
123
Table 14 Default Local User Accounts
124
Displaying Account Information
124
Local Account Passwords
125
Local Account Database Distribution
126
Distributing the Local User Database
126
Accepting Distributed User Databases on the Local Switch
126
Rejecting Distributed User Databases on the Local Switch
127
Password Policies
127
Password Strength Policy
127
Password History Policy
128
Password Expiration Policy
129
Account Lockout Policy
129
The Boot PROM Password
131
Setting the Boot PROM Password for a Switch with a Recovery String
131
Setting the Boot PROM Password for a Backbone with a Recovery String
132
Setting the Boot PROM Password for a Switch Without a Recovery String
133
Setting the Boot PROM Password for a Backbone Without a Recovery String
134
The Authentication Model Using RADIUS and LDAP
135
Table 15 Authentication Configuration Options
136
Fabric os User Accounts
137
Setting the Switch Authentication Mode
137
Fabric os Users on the RADIUS Server
138
Table 16 Syntax for VSA-Based Account Roles
138
Figure 10 Windows 2000 VSA Configuration
139
Table 17 Entries in Dictionary.brocade File
139
The RADIUS Server
141
Figure 11 Example of a Brocade DCT File
146
Figure 12 Example of the Dictiona.DCM File
146
LDAP Configuration and Microsoft Active Directory
147
Creating a Group
148
Authentication Servers on the Switch
150
Configuring Local Authentication as Backup
151
Chapter 6 Configuring Protocols
153
In this Chapter
153
Security Protocols
153
Table 18 Secure Protocol Support
153
Secure Copy
154
Setting up SCP for Configuration Uploads and Downloads
154
Table 19 Items Needed to Deploy Secure Protocols
154
Table 20 Main Security Scenarios
154
Secure Shell Protocol
155
SSH Public Key Authentication
155
Secure Sockets Layer Protocol
158
Browser and Java Support
158
SSL Configuration Overview
158
Certificate Authorities
159
Table 21 SSL Certificate Files
159
The Browser
161
Root Certificates for the Java Plug-In
162
Simple Network Management Protocol
163
SNMP and Virtual Fabrics
164
The Security Level
165
The Snmpconfig Command
165
Telnet Protocol
165
Blocking Telnet
165
Unblocking Telnet
167
Listener Applications
167
Ports and Applications Used by Switches
167
Table 22 Blocked Listener Applications
167
Port Configuration
168
Table 23 Access Defaults
168
Table 24 Port Information
168
Chapter 7 Configuring Security Policies
169
In this Chapter
169
ACL Policies Overview
169
How the ACL Policies Are Stored
169
Policy Members
170
ACL Policy Management
170
Table 25 Valid Methods for Specifying Policy Members
170
Activating Policy Changes
171
Deleting an ACL Policy
171
Displaying ACL Policies
171
Saving Changes Without Activating the Policies
171
Aborting Unsaved Policy Changes
172
Adding a Member to an Existing ACL Policy
172
Removing a Member from an ACL Policy
172
FCS Policies
173
FCS Policy Restrictions
173
Table 26 FCS Policy States
173
Ensuring Fabric Domains Share Policies
174
Creating an FCS Policy
174
Table 27 FCS Switch Operations
174
Modifying the Order of FCS Switches
175
FCS Policy Distribution
175
DCC Policies
176
Table 28 Distribution Policy States
176
Creating a DCC Policy
177
DCC Policy Restrictions
177
Table 29 DCC Policy States
177
Deleting a DCC Policy
178
DCC Policy Behavior with Fabric-Assigned Pwwns
179
Table 30 DCC Policy Behavior with FA-PWWN When Created Using Lockdown Support
179
SCC Policies
180
Table 31 DCC Policy Behavior When Created Manually with PWWN
180
Table 32 SCC Policy States
180
Creating an SCC Policy
181
Authentication Policy for Fabric Elements
181
E_Port Authentication
182
Figure 13 DH-CHAP Authentication
182
Device Authentication Policy
184
AUTH Policy Restrictions
185
Authentication Protocols
186
Secret Key Pairs for DH-CHAP
187
FCAP Configuration Overview
188
Table 33 FCAP Certificate Files
189
Fabric-Wide Distribution of the Auth Policy
191
IP Filter Policy
191
Creating an IP Filter Policy
191
Cloning an IP Filter Policy
192
Displaying an IP Filter Policy
192
Saving an IP Filter Policy
192
Activating an IP Filter Policy
192
Deleting an IP Filter Policy
193
IP Filter Policy Rules
193
Table 34 Supported Services
194
Table 35 Implicit IP Filter Rules
195
IP Filter Policy Enforcement
196
Table 36 Default IP Policy Rules
196
Adding a Rule to an IP Filter Policy
197
Deleting a Rule to an IP Filter Policy
197
Aborting an IP Filter Transaction
197
IP Filter Policy Distribution
197
Managing Filter Thresholds
198
Policy Database Distribution
198
Database Distribution Settings
199
Table 37 Interaction between Fabric-Wide Consistency Policy and Distribution Settings
199
Table 38 Supported Policy Databases
199
ACL Policy Distribution to Other Switches
200
Fabric-Wide Enforcement
201
Table 39 Fabric-Wide Consistency Policy Settings
201
Notes on Joining a Switch to the Fabric
202
Table 40 Merging Fabrics with Matching Fabric-Wide Consistency Policies
203
Management Interface Security
204
Table 41 Examples of Strict Fabric Merges
204
Table 42 Fabric Merges with Tolerant and Absent Combinations
204
Configuration Examples
205
Figure 14 Protected Endpoints Configuration
205
Figure 15 Gateway Tunnel Configuration
206
Figure 16 Endpoint-To-Gateway Tunnel Configuration
206
Ipsec Protocols
206
Authentication and Encryption Algorithms
207
Security Associations
207
Table 43 Algorithms and Associated Authentication Policies
207
IKE Policies
208
Ipsec Policies
208
Key Management
209
Creating the Tunnel
210
Example of an End-To-End Transport Tunnel Mode
212
Chapter 8 Maintaining the Switch Configuration File
215
In this Chapter
215
Configuration Settings
215
Configuration File Format
216
Configuration File Backup
218
Uploading a Configuration File in Interactive Mode
219
Configuration File Restoration
219
Restrictions
220
Table 44 CLI Commands to Display or Modify Switch Configuration Information
221
Configuration Download Without Disabling a Switch
222
Configurations Across a Fabric
223
Downloading a Configuration File from One Switch to Another same Model Switch
224
Security Considerations
224
Configuration Management for Virtual Fabrics
224
Uploading a Configuration File from a Switch with Virtual Fabrics Enabled
224
Restoring Logical Switch Configuration Using Configdownload
225
Restrictions
226
Brocade Configuration Form
227
Table 45 Brocade Configuration and Connection
227
Chapter 9 Installing and Maintaining Firmware
229
In this Chapter
229
Firmware Download Process Overview
229
Upgrading and Downgrading Firmware
230
Considerations for FICON CUP Environments
231
HA Sync State
231
Table 46 Backbone HA Sync States
231
Preparing for a Firmware Download
232
Connected Switches
233
Finding the Switch Firmware Version
233
Obtain and Decompress Firmware
233
Firmware Download on Switches
234
Switch Firmware Download Process Overview
234
Firmware Download on a Backbone
235
Backbone Firmware Download Process Overview
236
Firmware Download from a USB Device
239
Enabling USB
239
Viewing the USB File System
239
Downloading from USB Using the Relative Path
240
Downloading from USB Using the Absolute Path
240
FIPS Support
240
Public and Private Key Management
240
The Firmwaredownload Command
241
Power-On Firmware Checksum Test
242
Test and Restore Firmware on Switches
242
Testing a Different Firmware Version on a Switch
242
Test and Restore Firmware on Backbones
244
Testing Different Firmware Versions on Backbones
244
Validating a Firmware Download
246
Chapter 10 Managing Virtual Fabrics
249
In this Chapter
249
Virtual Fabrics Overview
249
Logical Switch Overview
250
Default Logical Switch
250
Figure 17 Switch before and after Enabling Virtual Fabrics
250
Logical Switches and Fabric Ids
251
Figure 18 Switch before and after Creating Logical Switches
251
Port Assignment in Logical Switches
252
Figure 19 Fabric Ids Assigned to Logical Switches
252
Figure 20 Assigning Ports to Logical Switches
252
Logical Switches and Connected Devices
253
Logical Fabric Overview
254
Figure 21 Logical Switches Connected to Devices and Non-Virtual Fabrics Switch
254
Figure 22 Logical Switches in a Single Chassis Belong to Separate Fabrics
254
Figure 23 Logical Switches Connected to Other Logical Switches through Physical Isls
255
Figure 24 Logical Switches Connected to Form Logical Fabrics
255
Logical Fabric and Isls
255
Base Switch and Extended Isls
256
Figure 25 Base Switches Connected by an XISL
256
Figure 26 Logical Isls Connecting Logical Switches
257
Figure 27 Logical Fabric Using Isls and Xisls
257
Management Model for Logical Switches
259
Account Management and Virtual Fabrics
259
Supported Platforms for Virtual Fabrics
260
Supported Port Configurations in the Fixed-Port Switches
260
Supported Port Configurations in the Brocade Backbones
260
Table 47 Blade and Port Types Supported on Logical Switches
260
Virtual Fabrics Interaction with Other Fabric os Features
261
Table 48 Virtual Fabrics Interaction with Fabric os Features
261
Limitations and Restrictions of Virtual Fabrics
262
Table 49 Maximum Number of Logical Switches Per Chassis
262
Restrictions on Moving Ports
263
Restrictions on Xisls
263
Enabling Virtual Fabrics Mode
263
Disabling Virtual Fabrics Mode
264
Configuring Logical Switches to Use Basic Configuration Values
265
Creating a Logical Switch or Base Switch
265
Executing a Command in a Different Logical Switch Context
267
Deleting a Logical Switch
268
Adding and Moving Ports on a Logical Switch
268
Displaying Logical Switch Configuration
269
Changing the Fabric ID of a Logical Switch
270
Changing a Logical Switch to a Base Switch
270
Setting up IP Addresses for a Virtual Fabric
272
Removing an IP Address for a Virtual Fabric
272
Configuring a Logical Switch to Use Xisls
272
Changing the Context to a Different Logical Fabric
273
Creating a Logical Fabric Using Xisls
273
Figure 28 Example of Logical Fabrics in Multiple Chassis and Xisls
273
Chapter 11 Administering Advanced Zoning
275
In this Chapter
275
Special Zones
275
Zoning Overview
276
Approaches to Zoning
277
Figure 29 Zoning Example
277
Zone Objects
278
Table 50 Approaches to Fabric-Based Zoning
278
Zone Aliases
279
Zone Configurations
279
Zoning Enforcement
280
Considerations for Zoning Architecture
281
Table 51 Considerations for Zoning Architecture
281
Best Practices for Zoning
282
Broadcast Zones
282
Broadcast Zones and Admin Domains
282
Broadcast Zones and FC-FC Routing
283
Figure 30 Broadcast Zones and Admin Domains
283
High Availability Considerations with Broadcast Zones
284
Loop Devices and Broadcast Zones
284
Broadcast Zones and Default Zoning Mode
284
Zone Aliases
284
Creating an Alias
285
Adding Members to an Alias
285
Removing Members from an Alias
286
Deleting an Alias
286
Viewing an Alias in the Defined Configuration
287
Zone Creation and Maintenance
287
Creating a Zone
287
Adding Devices (Members) to a Zone
288
Removing Devices (Members) from a Zone
288
Deleting a Zone
289
Viewing a Zone in the Defined Configuration
289
Validating a Zone
289
Default Zoning Mode
290
Setting the Default Zoning Mode
291
Viewing the Current Default Zone Access Mode
292
Zone Database Size
292
Zone Configurations
292
Creating a Zone Configuration
293
Adding Zones (Members) to a Zone Configuration
293
Removing Zones (Members) from a Zone Configuration
294
Enabling a Zone Configuration
294
Disabling a Zone Configuration
295
Deleting a Zone Configuration
295
Clearing Changes to a Configuration
296
Viewing All Zone Configuration Information
296
Viewing Selected Zone Configuration Information
297
Viewing the Configuration in the Effective Zone Database
297
Clearing All Zone Configurations
297
Zone Object Maintenance
298
Copying a Zone Object
298
Deleting a Zone Object
299
Renaming a Zone Object
300
Zone Configuration Management
300
Security and Zoning
300
Zone Merging
301
Fabric Segmentation and Zoning
303
Zone Merging Scenarios
303
Table 52 Zone Merging Scenarios: Defined and Effective Configurations
303
Table 53 Table
303
Table 55 Zone Merging Scenarios: TI Zones
305
Table 56 Zone Merging Scenarios: Default Access Mode
305
Table 57 Zone Merging Scenarios: Mixed Fabric os Versions
306
Chapter 12 Traffic Isolation Zoning
307
In this Chapter
307
Traffic Isolation Zoning Overview
307
TI Zone Failover
308
Figure 31 Traffic Isolation Zone Creating a Dedicated Path through the Fabric
308
Table 58 Traffic Behavior When Failover Is Enabled or Disabled in TI Zones
309
FSPF Routing Rules and Traffic Isolation
310
Figure 32 Fabric Incorrectly Configured for TI Zone with Failover Disabled
310
Figure 33 Dedicated Path Is the Only Shortest Path
311
Figure 40 Figure
311
Enhanced TI Zones
312
Figure 34 Dedicated Path Is Not the Shortest Path
312
Figure 35 Enhanced TI Zones
312
Illegal Configurations with Enhanced TI Zones
313
Traffic Isolation Zoning over FC Routers
314
Figure 37 Illegal ETIZ Configuration: Two Paths from One Port
314
Figure 38 Traffic Isolation Zoning over FCR
315
Figure 39 TI Zone in an Edge Fabric
315
TI Within an Edge Fabric
315
TI Within a Backbone Fabric
316
Limitations of TI Zones over FC Routers
317
General Rules for TI Zones
317
Supported Configurations for Traffic Isolation Zoning
318
Additional Configuration Rules for Enhanced TI Zones
319
Trunking with TI Zones
319
Limitations and Restrictions of Traffic Isolation Zoning
319
Admin Domain Considerations for Traffic Isolation Zoning
320
Virtual Fabric Considerations for Traffic Isolation Zoning
320
Figure 42 Dedicated Path with Virtual Fabrics
321
Figure 43 Creating a TI Zone in a Logical Fabric
321
Figure 44 Creating a TI Zone in a Base Fabric
321
Traffic Isolation Zoning over FC Routers with Virtual Fabrics
322
Figure 45 Example Configuration for TI Zones over FC Routers in Logical Fabrics
322
Creating a TI Zone
323
Figure 46 Logical Representation of TI Zones over FC Routers in Logical Fabrics
323
Creating a TI Zone in a Base Fabric
325
Modifying TI Zones
326
Changing the State of a TI Zone
327
Deleting a TI Zone
328
Displaying TI Zones
328
Troubleshooting TI Zone Routing Problems
329
Setting up TI over FCR (Sample Procedure)
330
Chapter 13 Bottleneck Detection
335
In this Chapter
335
Bottleneck Detection Overview
335
Types of Bottlenecks
336
How Bottlenecks Are Reported
336
Using Alerting Parameters to Determine Whether Alerts Are
337
Generated
337
Figure 48 Affected Seconds for Bottleneck Detection
337
Supported Configurations for Bottleneck Detection
338
Limitations of Bottleneck Detection
338
High Availability Considerations for Bottleneck Detection
338
Upgrade and Downgrade Considerations for Bottleneck
338
Detection
338
Trunking Considerations for Bottleneck Detection
339
Virtual Fabrics Considerations for Bottleneck Detection
339
Access Gateway Considerations for Bottleneck Detection
339
Advanced Bottleneck Detection Settings
339
Enabling Bottleneck Detection on a Switch
340
Excluding a Port from Bottleneck Detection
341
Displaying Bottleneck Detection Configuration Details
342
Changing Bottleneck Parameters
343
Displaying Bottleneck Statistics
345
Disabling Bottleneck Detection on a Switch
346
Chapter 14 In-Flight Encryption and Compression
347
In this Chapter
347
In-Flight Encryption and Compression Overview
347
Encryption and Compression Restrictions
348
Figure 49 Encryption and Compression on 16 Gbps Isls
348
How Encryption and Compression Are Enabled
349
Authentication and Key Generation
349
Availability Considerations
349
Virtual Fabrics Considerations
350
Recommendation for Compression
350
Configuring Encryption and Compression
350
Viewing the Encryption and Compression Configuration
351
Configuring and Enabling Authentication
352
Configuring Encryption
353
Configuring Compression
354
Disabling Encryption
354
Disabling Compression
355
Encryption and Compression Example
355
Example of Enabling Encryption and Compression on a Port
356
Example of Disabling Encryption and Compression
358
Chapter 15 NPIV
361
In this Chapter
361
NPIV Overview
361
Upgrade Considerations
362
Fixed Addressing Mode
362
10-Bit Addressing Mode
362
Table 59 Table
362
Configuring NPIV
363
Enabling and Disabling NPIV
364
Viewing NPIV Port Configuration Information
365
Viewing Virtual PID Login Information
366
Chapter 16 Dynamic Fabric Provisioning: Fabric-Assigned WWN
367
In this Chapter
367
Introduction to Dynamic Fabric Provisioning Using FA-PWWN
367
User- and Auto-Assigned FA-PWWN Behavior
368
Checking for Duplicate FA-Pwwns
368
Configuring FA-Pwwns
368
Configuring an FA-PWWN for an HBA Connected to an Access Gateway
369
Figure 50 Fabric-Assigned Port World Wide Name Provisioning Scenarios
369
Configuring an FA-PWWN for an HBA Connected to an Edge Switch
370
Supported Switches and Configurations for FA-PWWN
371
Firmware Upgrade and Downgrade Considerations for FA-PWWN
372
Security Considerations for FA-PWWN
372
Configuration Upload and Download Considerations for FA-PWWN
372
Restrictions of FA-PWWN
373
Access Gateway N_Port Failover with FA-PWWN
373
Chapter 17 Managing Administrative Domains
375
In this Chapter
375
Administrative Domains Overview
375
Figure 51 Fabric with Two Admin Domains
376
Figure 52 Filtered Fabric Views When Using Admin Domains
376
Admin Domain Access Levels
377
Admin Domain Features
377
Requirements for Admin Domains
377
System-Defined Admin Domains
378
Table 61 AD User Types
378
User-Defined Admin Domains
378
Figure 53 Fabric with AD0 and AD255
380
Home Admin Domains and Login
380
Admin Domain Member Types
381
Admin Domains and Switch Wwns
382
Figure 54 Fabric Showing Switch and Device Wwns
383
Figure 55 Filtered Fabric Views Showing Converted Switch Wwns
383
Admin Domain Compatibility, Availability, and Merging
384
Admin Domain Management for Physical Fabric Administrators
384
Setting the Default Zoning Mode for Admin Domains
384
Creating an Admin Domain
385
User Assignments to Admin Domains
386
Removing an Admin Domain from a User Account
388
Activating an Admin Domain
388
Deactivating an Admin Domain
389
Adding Members to an Existing Admin Domain
389
Removing Members from an Admin Domain
390
Renaming an Admin Domain
390
Deleting an Admin Domain
391
Deleting All User-Defined Admin Domains
392
Deleting All User-Defined Admin Domains Non-Disruptively
392
Figure 56 AD0 and Two User-Defined Admin Domains, AD1 and AD2
394
Figure 57 AD0 with Three Zones
394
Validating an Admin Domain Member List
396
SAN Management with Admin Domains
396
CLI Commands in an AD Context
397
Executing a Command in a Different AD Context
397
Displaying an Admin Domain Configuration
397
Table 62 Ports and Devices in CLI Output
397
Switching to a Different Admin Domain Context
398
Admin Domain Interactions with Other Fabric os Features
399
Table 63 Admin Domain Interaction with Fabric os Features
399
Admin Domains, Zones, and Zone Databases
400
Admin Domains and LSAN Zones
401
Configuration Upload and Download in an AD Context
402
Table 64 Configuration Upload and Download Scenarios in an AD Context
402
Licensed Features
403
Chapter 18 Administering Licensing
405
In this Chapter
405
Licensing Overview
405
Table 65 Available Brocade Licenses
406
Table 66 License Requirements and Location Name by Feature
411
Brocade 7800 Upgrade License
412
ICL Licensing
412
ICL 1St POD License
412
Table 67 Base to Upgrade License Comparison
412
ICL 2Nd POD License
413
ICL 8-Link License
413
ICL 16-Link License
413
Enterprise ICL License
413
8G Licensing
414
Slot-Based Licensing
414
Upgrade and Downgrade Considerations
415
Assigning a License to a Slot
415
Removing a License from a Slot
415
10G Licensing
415
Enabling 10 Gbps Operation on an FC Port
416
Enabling the 10-Gbe Ports on an FX8-24 Blade
418
Temporary Licenses
419
Restrictions on Upgrading Temporary Slot-Based Licenses
419
Date Change Restriction
420
Configupload and Download Considerations
420
Expired Licenses
420
Universal Temporary Licenses
420
Extending a Universal Temporary License
421
Universal Temporary License Shelf Life
421
Viewing Installed Licenses
421
Activating a License
421
Adding a Licensed Feature
421
Removing a Licensed Feature
422
Ports on Demand
423
Displaying Installed Licenses
424
Table 68 List of Available Ports When Implementing Pods
424
Activating Ports on Demand
425
Dynamic Ports on Demand
425
Displaying the Port License Assignments
426
Enabling Dynamic Ports on Demand
426
Disabling Dynamic Ports on Demand
427
Reserving a Port License
427
Releasing a Port from a POD Set
428
Chapter 19 Inter-Chassis Links
431
In this Chapter
431
Icls for the Brocade DCX 8510 Backbone Family
432
Figure 58 Minimum Configuration for 64 Gbps Icls
432
ICL Trunking on the Brocade DCX 8510-8 and DCX 8510-4
433
Icls for the Brocade DCX Backbone Family
433
ICL Trunking on the Brocade DCX and DCX-4S
434
Virtual Fabrics Considerations for Icls
434
Figure 59 DCX-4S Allowed ICL Connections
434
Supported Topologies for ICL Connections
435
Mesh Topology
435
Figure 60 ICL Triangular Topology with Brocade DCX 8510-8 Chassis
435
Core-Edge Topology
436
Figure 61 64 Gbps ICL Core-Edge Topology
436
Chapter 20 Monitoring Fabric Performance
437
In this Chapter
437
Advanced Performance Monitoring Overview
437
Types of Monitors
437
Restrictions for Installing Monitors
438
Monitoring
438
Table 69 Number of Logical Switches that Support Performance Monitors
438
Monitoring
439
End-To-End Performance Monitoring
439
Maximum Number of EE Monitors
439
Supported Port Configurations for EE Monitors
440
Adding EE Monitors
440
Figure 62 Setting End-To-End Monitors on a Port
440
Setting a Mask for an EE Monitor
441
Deleting EE Monitors
442
Displaying EE Monitor Counters
442
Figure 63 Mask Positions for End-To-End Monitors
442
Clearing EE Monitor Counters
443
Frame Monitoring
444
Creating Frame Types to be Monitored
444
Table 70 Maximum Number of Frame Monitors and Offsets Per Port
444
Deleting Frame Types
445
Table 71 Predefined Values at Offset 0
445
Adding Frame Monitors to a Port
446
Removing Frame Monitors from a Port
446
Saving Frame Monitor Configuration
446
Displaying Frame Monitors
447
Clearing Frame Monitor Counters
447
Top Talker Monitors
448
Top Talker Monitors and FC-FC Routing
449
Limitations of Top Talker Monitors
450
Figure 64 Fabric Mode Top Talker Monitors on FC Router Do Not Monitor any Flows
450
Figure 65 Fabric Mode Top Talker Monitors on FC Router Monitor Flows over the E_Port
450
Adding a Top Talker Monitor to a Port (Port Mode)
451
Adding Top Talker Monitors on All Switches in the Fabric (Fabric Mode)
451
Displaying the Top N Bandwidth-Using Flows on a Port (Port Mode)
451
Displaying Top Talking Flows for a Given Domain ID (Fabric Mode)
452
Deleting a Top Talker Monitor on a Port (Port Mode)
452
Deleting All Fabric Mode Top Talker Monitors
453
Trunk Monitoring
453
Saving and Restoring Monitor Configurations
453
Performance Data Collection
454
Chapter 21 Optimizing Fabric Behavior
455
In this Chapter
455
Adaptive Networking Overview
455
Ingress Rate Limiting
456
Limiting Traffic from a Particular Device
457
Disabling Ingress Rate Limiting
457
Qos: SID/DID Traffic Prioritization
457
License Requirements for SID/DID Prioritization
458
CS_CTL-Based Frame Prioritization
458
Table 72 Comparison between CS_CTL-Based and Qos Zone-Based Prioritization
458
Table 73 Virtual Channels Assigned to Qos Priority for Frame Prioritization
458
Prioritization
459
Enabling CS_CTL-Based Frame Prioritization
459
Disabling CS_CTL-Based Frame Prioritization
459
Qos Zone-Based Traffic Prioritization
459
Networking License
460
Manually Disabling Qos on Trunked Ports
460
Table 74 Virtual Channels Assigned to Qos Priority for Zone-Based Prioritization
460
Qos Zones
462
Qos on E_Ports
463
Figure 66 Qos Traffic Prioritization
463
Qos over FC Routers
464
Figure 67 Qos with E_Ports Enabled
464
Prioritization
465
Figure 68 Traffic Prioritization in a Logical Fabric
465
Prioritization
466
Setting Qos Zone-Based Traffic Prioritization
467
Setting Qos Zone-Based Traffic Prioritization over FC Routers
469
Disabling Qos Zone-Based Traffic Prioritization
469
Chapter 22 Managing Trunking Connections
471
In this Chapter
471
Trunking Overview
471
Types of Trunking
472
Masterless Trunking
472
License Requirements for Trunking
473
Port Groups for Trunking
473
Requirements for Trunk Groups
473
Figure 69 Trunk Group Configuration for the Brocade 5100
473
Supported Configurations for Trunking
474
High Availability Support for Trunking
474
Supported Platforms for Trunking
474
Recommendations for Trunking Groups
475
Configuring Trunk Groups
475
Enabling Trunking on a Port or Switch
476
Disabling Trunking on a Port or Switch
476
Displaying Trunking Information
477
ISL Trunking over Long Distance Fabrics
478
Ex_Port Trunking
478
Masterless Ex_Port Trunking
479
Supported Configurations and Platforms for Ex_Port Trunking441
479
Configuring Ex_Port Trunking
480
Displaying Ex_Port Trunking Information
480
F_Port Trunking
480
F_Port Trunking for Access Gateway
481
Figure 70 Switch in Access Gateway Mode Without F_Port Trunking
481
Figure 71 Switch in Access Gateway Mode with F_Port Masterless Trunking
481
Requirements for F_Port Trunking on an Access Gateway
482
F_Port Trunking for Brocade Adapters
482
F_Port Trunking Considerations
482
Table 76 F_Port Masterless Considerations
482
Trunk Area and Admin Domains
484
Table 77 PWWN Format for F_Port and N_Port Trunk Ports
484
F_Port Trunking in Virtual Fabrics
485
Configuring F_Port Trunking for Access Gateway
485
Configuring F_Port Trunking for Brocade Adapters
486
Displaying F_Port Trunking Information
486
Disabling F_Port Trunking
487
Enabling the DCC Policy on a Trunk Area
487
Chapter 23 Managing Long Distance Fabrics
489
In this Chapter
489
Long Distance Fabrics Overview
489
Extended Fabrics Device Limitations
490
Long Distance Link Modes
490
Configuring an Extended ISL
491
Enabling Long Distance When Connecting to TDM Devices
492
Buffer Credit Management
493
Buffer-To-Buffer Flow Control
493
Optimal Buffer Credit Allocation
494
Fibre Channel Gigabit Values Reference Definition
495
Allocating Buffer Credits Based on Full-Size Frames
495
Table 78 Fibre Channel Data Frames
495
Allocating Buffer Credits Based on Average-Size Frames
497
Allocating Buffer Credits for F_Ports
498
Displaying the Remaining Buffers in a Port Group
498
Buffer Credits for each Switch Model
499
Table 79 Buffer Credits
499
Maximum Configurable Distances for Extended Fabrics
500
Table 80 Configurable Distances for Extended Fabrics
500
Buffer Credit Recovery
501
Chapter 24 Using FC-FC Routing to Connect Fabrics
503
In this Chapter
503
FC-FC Routing Overview
503
License Requirements for FC-FC Routing
504
Supported Platforms for FC-FC Routing
504
Supported Configurations for FC-FC Routing
505
Unsupported Configurations for Network os Connectivity
505
Fibre Channel Routing Concepts
506
Figure 72 a Metasan with Inter-Fabric Links
506
Figure 73 a Metasan with Edge-To-Edge and Backbone Fabrics and LSAN Zones
507
Figure 74 Edge Sans Connected through a Backbone Fabric
509
Proxy Devices
509
FC-FC Routing Topologies
510
Figure 75 Metasan with Imported Devices
510
Figure 76 Sample Topology (Physical Topology)
511
Phantom Domains
511
Figure 77 Ex_Port Phantom Switch Topology
512
Setting up FC-FC Routing
513
Verifying the Setup for FC-FC Routing
513
Backbone Fabric Ids
515
Assigning Backbone Fabric Ids
515
FCIP Tunnel Configuration
516
Inter-Fabric Link Configuration
516
Configuring an IFL for both Edge and Backbone Connections
516
FC Router Port Cost Configuration
520
Port Cost Considerations
521
Setting Router Port Cost for an Ex_Port
521
Ex_Port Frame Trunking Configuration
522
LSAN Zone Configuration
523
Use of Admin Domains with LSAN Zones and FC-FC Routing
523
Zone Definition and Naming
523
LSAN Zones and Fabric-To-Fabric Communications
524
Controlling Device Communication with the LSAN
524
Configuring Backbone Fabrics for Interconnectivity
527
Setting the Maximum LSAN Count
527
HA and Downgrade Considerations for LSAN Zones
527
LSAN Zone Policies Using LSAN Tagging
528
Figure 78 Example of Setting up Speed LSAN Tag
529
LSAN Zone Binding
531
Figure 79 LSAN Zone Binding
532
Proxy PID Configuration
536
Fabric Parameter Considerations
536
Inter-Fabric Broadcast Frames
537
Displaying the Current Broadcast Configuration
537
Enabling Broadcast Frame Forwarding
537
Disabling Broadcast Frame Forwarding
537
Resource Monitoring
538
FC-FC Routing and Virtual Fabrics
539
Logical Switch Configuration for FC Routing
540
Figure 80 Ex_Ports in a Base Switch
540
Backbone-To-Edge Routing with Virtual Fabrics
541
Figure 81 Logical Representation of Ex_Ports in a Base Switch
541
Upgrade and Downgrade Considerations for FC-FC Routing
542
How Replacing Port Blades Affects Ex_Port Configuration
542
Figure 82 Backbone-To-Edge Routing Across Base Switch Using FC Router in Legacy Mode
542
Displaying the Range of Output Ports Connected to Xlate Domains
543
Interoperation of Fabric os and M-EOS Fabrics Using FC Router
545
Appendix A Interoperation of Fabric os and M-EOS Fabrics Using FC Router
545
In this Appendix
545
Interoperability Overview
545
Release Compatibility
545
Table 82 Fabric os and M-Eosc Interoperability Compatibility Matrix
546
Table 83 Fabric os and M-Eosn Interoperability Compatibility Matrix
546
Features of Connected Sans
547
Establishing Interoperability
547
Fabric Configurations for Interconnectivity
548
Connectivity Modes
548
Table 84 Values of Portcfgexport -M Option
548
Configuring the FC Router
549
Configuring LSAN Zones in the M-EOS Fabric
550
Correcting Errors if LSAN Devices Appear in Only One of the Fabrics
551
Completing the Configuration
551
Port Indexing
555
Appendix B Port Indexing
559
FIPS Support
559
Appendix C FIPS Support
559
In this Appendix
559
FIPS Overview
559
Zeroization Functions
559
Table 85 Zeroization Behavior
559
Conditional Tests
560
Power-On Self Tests
560
FIPS Mode Configuration
561
Table 86 FIPS Mode Restrictions
561
LDAP in FIPS Mode
562
Table 87 FIPS and Non-FIPS Modes of Operation
562
Table 88 Active Directory Keys to Modify
563
LDAP Certificates for FIPS Mode
564
Preparing the Switch for FIPS
565
Overview of Steps
565
Enabling FIPS Mode
566
Zeroizing for FIPS
568
Displaying FIPS Configuration
568
Hexadecimal Conversion
569
Hexadecimal Overview
569
Example Conversion of the Hexadecimal Triplet Ox616000
569
Table 89 Decimal to Hexadecimal Conversion Table
570
Appendix D Hexadecimal Conversion
573
Index
573
Advertisement
Advertisement
Related Products
HP Fabric OS 6.2.2e
HP StorageWorks Fabric OS 3.x
HP StorageWorks Fabric OS 3.1.x
HP StorageWorks Fabric OS 5 Advanced Web Tools
HP StorageWorks Fabric OS 5.x
HP StorageWorks Fabric OS 6.1.2b
HP StorageWorks Fabric OS 6.2.0b
HP StorageWorks Fabric OS 3.1
HP StorageWorks Secure Fabric OS 1.0
HP StorageWorks Fabric OS 6.2.0g
HP Categories
Desktop
Laptop
Server
Monitor
Switch
More HP Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL