Sign In
Upload
Manuals
Brands
HP Manuals
Storage
StoreFabric SN6500B
HP StoreFabric SN6500B Manuals
Manuals and User Guides for HP StoreFabric SN6500B. We have
4
HP StoreFabric SN6500B manuals available for free PDF download: Administrator's Manual, Quickspecs, Update Manual
HP StoreFabric SN6500B Administrator's Manual (666 pages)
Fabric OS Administrator's Guide, 7.1.0 (53-1002745-02, March 2013)
Brand:
HP
| Category:
Software
| Size: 6.13 MB
Table of Contents
Table of Contents
3
About this Document
33
How this Document Is Organized
33
Supported Hardware and Software
34
What's New in this Document
35
Document Conventions
36
Notice to the Reader
37
Additional Information
38
Getting Technical Help
38
Document Feedback
40
Standard Features
41
Fibre Channel Services Overview
43
Figure 1 Well-Known Addresses
43
Understanding Fibre Channel Services
43
Management Server
44
Platform Services
44
Disabling Platform Services
45
Enabling Platform Services
45
Management Server Database
45
Platform Services and Virtual Fabrics
45
Adding a Member to the ACL
46
Displaying the Management Server ACL
46
Deleting a Member from the ACL
47
Viewing the Contents of the Management Server Database
48
Clearing the Management Server Database
49
Displaying Topology Discovery Status
49
Enabling Topology Discovery
49
Topology Discovery
49
Disabling Topology Discovery
50
Device Login
51
E_Port Login Process
51
Principal Switch
51
Fabric Login Process
52
Port Login Process
52
Rscns
52
Duplicate Port World Wide Name
53
High Availability of Daemon Processes
53
Table 1 Daemons that Are Automatically Restarted
53
Chapter 1 Understanding Fibre Channel Services
55
Chapter 2 Performing Basic Configuration Tasks
55
Fabric os Overview
55
Console Sessions Using the Serial Port
56
Fabric os Command Line Interface
56
Table 2 Terminal Port Parameters
57
Table 3 Help Topic Contents
59
Table 4 Fabricshow Fields
73
Customizing the Switch Name
74
Setting the Domain ID
74
Switch Names
74
Chassis Names
75
Configuring the Fabric Name
75
Customizing Chassis Names
75
Fabric Name
75
Config File Upload and Download Considerations for Fabric
76
Disabling a Switch
76
Enabling a Switch
76
High Availability Considerations for Fabric Names
76
Names
76
Switch Activation and Deactivation
76
Switch and Backbone Shutdown
76
Upgrade and Downgrade Considerations for Fabric Names
76
Powering off a Brocade Backbone
77
Powering off a Brocade Switch
77
Basic Connections
78
Device Connection
78
Switch Connection
78
Default Account Passwords
61
Password Modification
61
The Switch Ethernet Interface
62
Displaying the Network Interface Settings
63
Virtual Fabrics and the Ethernet Interface
63
Static Ethernet Addresses
64
DHCP Activation
66
Ipv6 Autoconfiguration
68
Date and Time Settings
69
Setting the Date and Time
69
Time Zone Settings
69
Network Time Protocol
71
Domain Ids
72
Displaying the Domain Ids
73
Telnet or SSH Sessions
57
Getting Help on a Command
58
Viewing a History of Command Line Entries
59
Chapter 3 Performing Advanced Configuration Tasks
79
Port Identifiers (Pids) and PID Binding Overview
79
10-Bit Addressing Mode
80
Core PID Addressing Mode
80
Fixed Addressing Mode
80
256-Area Addressing Mode
81
WWN-Based PID Assignment
82
Backbone Port Blades
84
Port Types
84
Ports
84
Configuring Two Ethernet Ports on One CP8 Blade
85
Setting Port Names
86
Port Identification by Index
87
Port Identification by Port Area ID
87
Port Identification by Slot and Port Number
87
Configuring a Device-Switch Connection
88
Swapping Port Area Ids
88
Power Management
101
Checking Switch Operation
102
Equipment Status
102
Powering off a Port Blade
102
Powering on a Port Blade
102
Verifying Fabric Connectivity
103
Verifying High Availability Features (Backbones Only)
103
Enabling the Track Changes Feature
104
Track and Control Switch Changes
104
Verifying Device Connectivity
104
Displaying the Status of the Track Changes Feature
105
Viewing the Switch Status Policy Threshold Values
105
Setting the Switch Status Policy Threshold Values
106
Audit Log Configuration
107
Configuring an Audit Log for Specific Event Classes
108
Verifying Host Syslog Prior to Configuring the Audit Log
108
Duplicate PWWN Handling During Device Login
109
Table 10 Duplicate PWWN Behavior: Port Type Determines Which Login Takes Precedence
110
Figure 5 Principal Isls
112
Figure 6 New Switch Added to Existing Fabric
114
Figure 7 Virtual Channels on a Qos-Enabled ISL
116
Figure 8 Gateway Link Merging Sans
117
Table 11 Combinations of Routing Policy and IOD with Lossless DLS Enabled
126
Figure 9 Single Host and Target
130
Deleting a Frame Redirect Zone
131
Viewing Frame Redirect Zones
131
Managing User Accounts
133
User Accounts Overview
133
Role-Based Access Control
134
Configuring Lossless Dynamic Load Sharing
127
Lossless Dynamic Load Sharing in Virtual Fabrics
127
Enabling Forward Error Correction (FEC)
128
Limitations
128
Creating a Frame Redirect Zone
130
Frame Redirection
130
Configuring a Link through a Gateway
118
Routing Policies
118
Displaying the Current Routing Policy
119
Exchange-Based Routing
119
Port-Based Routing
119
AP Route Policies
120
Device-Based Routing
120
Dynamic Load Sharing
122
Route Selection
122
Changes
123
Forcing In-Order Frame Delivery Across Topology Changes
123
Frame Order Delivery
123
Restoring Out-Of-Order Frame Delivery Across Topology
123
Using Frame Viewer to Understand Why Frames Are Dropped
124
Lossless Dynamic Load Sharing on Ports
125
Lossless Core
126
Gateway Links
117
Buffer Credits
115
Congestions Versus Over-Subscription
115
Virtual Channels
115
Fibre Channel NAT
113
Inter-Switch Links
114
Port Activation and Deactivation
89
Port Decommissioning
90
Setting Port Modes
90
Setting All Ports on a Switch to the same Speed
92
Setting Port Speeds
92
Blade Terminology and Compatibility
93
Setting Port Speed for a Port Octet
93
Table 5 Core and CP Blade Terminology and Platform Support
93
Table 6 Port Blade Terminology, Numbering, and Platform Support
94
Table 7 Blade Compatibility Within Brocade Backbone Families
96
Blade Swapping
97
Disabling Blades
97
Enabling Blades
97
Figure 2 Identifying the Blades
98
How Blades Are Swapped
98
Figure 3 Blade Swap with Virtual Fabrics During the Swap
99
Figure 4 Blade Swap with Virtual Fabrics after the Swap
100
Table 8 Duplicate PWWN Behavior: First Login Takes Precedence over Second Login
109
Setting the Behavior for Handling Duplicate Pwwns
110
Table 9 Duplicate PWWN Behavior: Second Login Overrides First Login
110
Routing Overview
111
Routing Traffic
111
Fspf
112
Paths and Route Selection
112
Enabling and Disabling Switches
100
Swapping Blades
100
Core Blades
95
CP Blades
95
Enabling and Disabling Blades
96
FX8-24 Compatibility Notes
96
Port and Application Blade Compatibility
96
Table 12 Default Fabric os Roles
134
Admin Domain Considerations
135
Role Permissions
135
Table 13 Permission Types
135
Figure 12 Example of the Dictiona.DCM File
162
Creating a Group
164
LDAP Configuration and Openldap
165
TACACS+ Service
171
Table 20 Brocade Custom TACACS+ Attributes
172
Remote Authentication Configuration on the Switch
174
Configuring Local Authentication as Backup
176
Managing User-Defined Roles
136
Table 14 Maximum Number of Simultaneous Sessions
136
Table 15 Default Local User Accounts
138
Local Account Passwords
139
Accepting Distributed User Databases on the Local Switch
140
Distributing the Local User Database
140
Local User Account Database Distribution
140
Password Policies
141
Password Strength Policy
141
Rejecting Distributed User Databases on the Local Switch
141
Password History Policy
142
Account Lockout Policy
143
Password Expiration Policy
143
Setting the Boot PROM Password for a Switch with a Recovery String
145
The Boot PROM Password
145
Setting the Boot PROM Password for a Backbone with a Recovery String
146
Setting the Boot PROM Password for a Switch Without a Recovery String
147
Setting the Boot PROM Password for a Backbone Without a Recovery String
148
Remote Authentication
149
Remote Authentication Configuration
149
The Management Channel
136
Local Database User Accounts
137
Default Accounts
138
Switch Configuration
150
Table 16 LDAP Options
151
Table 17 Authentication Configuration Options
151
Table 18 Syntax for VSA-Based Account Roles
153
Fabric os Users on the RADIUS Server
154
Figure 10 Windows 2000 VSA Configuration
154
Table 19 Entries in Dictionary.brocade File
154
Figure 11 Example of a Brocade DCT File
161
LDAP Configuration and Microsoft Active Directory
162
Setting up a RADIUS Server
156
Fabric os User Accounts
152
Setting the Switch Authentication Mode
152
Chapter 4 Routing Traffic
177
Chapter 5 Managing User Accounts
177
Chapter 6 Configuring Protocols
177
Security Protocols
177
Table 21 Secure Protocol Support
177
Secure Copy
178
Table 22 Items Needed to Deploy Secure Protocols
178
Table 23 Main Security Scenarios
178
Table 24 SSL Certificate Files
185
Table 25 Blocked Listener Applications
192
Port Configuration
193
The Browser
186
Root Certificates for the Java Plugin
187
Simple Network Management Protocol
188
SNMP and Virtual Fabrics
189
Blocking Telnet
190
SNMP Configuration
190
SNMP Security Levels
190
Telnet Protocol
190
Unblocking Telnet
191
Listener Applications
192
Ports and Applications Used by Switches
192
Secure Shell Protocol
179
Setting up SCP for Configuration Uploads and Downloads
179
SSH Public Key Authentication
180
Browser and Java Support
182
Secure Sockets Layer Protocol
182
SSL Configuration Overview
183
Table 26 Access Defaults
193
Table 27 Port Information
193
Chapter 7 Configuring Security Policies
195
ACL Policies Overview
195
How the ACL Policies Are Stored
195
ACL Policy Management
196
Policy Members
196
Table 28 Valid Methods for Specifying Policy Members
196
Activating ACL Policy Changes
197
Deleting an ACL Policy
197
Displaying ACL Policies
197
Saving Changes Without Activating the Policies
197
Abandoning Unsaved ACL Policy Changes
198
Adding a Member to an Existing ACL Policy
198
Removing a Member from an ACL Policy
198
FCS Policies
199
FCS Policy Restrictions
199
Table 34 DCC Policy Behavior When Created Manually with PWWN
206
Table 35 SCC Policy States
206
Authentication Policy for Fabric Elements
207
Creating an SCC Policy
207
E_Port Authentication
208
ACL Policy Distribution to Other Switches
227
Fabric-Wide Enforcement
227
Table 43 Merging Fabrics with Matching Fabric-Wide Consistency Policies
229
Table 44 Examples of Strict Fabric Merges
230
Figure 14 Protected Endpoints Configuration
232
Figure 15 Gateway Tunnel Configuration
232
Figure 16 Endpoint-To-Gateway Tunnel Configuration
233
Table 46 Algorithms and Associated Authentication Policies
234
Table 47 CLI Commands to Display or Modify Switch Configuration Information
247
Configuration Download Without Disabling a Switch
248
Configuration Management for Virtual Fabrics
250
Configurations Across a Fabric
250
Downloading a Configuration File from One Switch to Another Switch of the same Model
250
Security Considerations
250
Configdownload
251
Uploading a Configuration File from a Switch with Virtual Fabrics Enabled
251
Restrictions
252
Brocade Configuration Form
253
IKE Policies
235
Creating the Tunnel
236
Example of an End-To-End Transport Tunnel Mode
238
Configuration Settings
241
Maintaining the Switch Configuration File
241
Configuration File Format
242
Configuration File Backup
244
Uploading a Configuration File in Interactive Mode
245
Configuration File Restoration
246
Restrictions
246
Table 29 FCS Policy States
199
Table 30 FCS Switch Operations
200
Table 31 Distribution Policy States
202
Table 32 DCC Policy States
203
Table 33 DCC Policy Behavior with FA-PWWN When Created Using Lockdown Support
205
SCC Policies
206
Authentication and Encryption Algorithms
234
IP Sec Policies
234
Creating a DCC Policy
204
DCC Policy Behavior with Fabric-Assigned Pwwns
205
Deleting a DCC Policy
205
Table 37 Supported Services
220
Table 38 Implicit IP Filter Rules
222
Table 39 Default IP Policy Rules
222
Table 41 Supported Policy Databases
226
Table 42 Fabric-Wide Consistency Policy Settings
228
Notes on Joining a Switch to the Fabric
229
DCC Policy Restrictions
203
Device Connection Control Policies
203
IP Sec Protocols
233
Security Associations
233
Creating an FCS Policy
201
Modifying the Order of FCS Switches
201
FCS Policy Distribution
202
Figure 13 DH-CHAP Authentication
208
Table 36 FCAP Certificate Files
215
Fabric-Wide Distribution of the Authorization Policy
217
IP Filter Policy
217
Cloning an IP Filter Policy
218
Creating an IP Filter Policy
218
Displaying an IP Filter Policy
218
Saving an IP Filter Policy
218
Activating an IP Filter Policy
219
Deleting an IP Filter Policy
219
IP Filter Policy Rules
219
Table 45 Fabric Merges with Tolerant and Absent Combinations
230
Configuration Examples
231
Management Interface Security
231
Ensuring Fabric Domains Share Policies
200
Device Authentication Policy
210
AUTH Policy Restrictions
211
Authentication Protocols
212
Secret Key Pairs for DH-CHAP
213
FCAP Configuration Overview
215
Aborting an IP Filter Transaction
223
Adding a Rule to an IP Filter Policy
223
Deleting a Rule from an IP Filter Policy
223
IP Filter Policy Enforcement
223
IP Filter Policy Distribution
224
Managing Filter Thresholds
224
Policy Database Distribution
224
Database Distribution Settings
225
Table 48 Brocade Configuration and Connection Form
253
Chapter 8 Maintaining the Switch Configuration File
255
Chapter 9 Installing and Maintaining Firmware
255
Firmware Download Process Overview
255
Considerations for FICON CUP Environments
257
HA Sync State
257
Upgrading and Downgrading Firmware
257
Preparing for a Firmware Download
258
Table 49 Backbone HA Sync States
258
Connected Switches
259
Finding the Switch Firmware Version
259
Obtaining and Decompressing Firmware
259
Firmware Download on Switches
260
Switch Firmware Download Process Overview
260
Backbone Firmware Download Process Overview
262
Firmware Download on a Backbone
262
Enabling the USB Device
265
Firmware Download from a USB Device
265
Viewing the USB File System
265
Downloading from the USB Device Using the Absolute Path
266
Downloading from the USB Device Using the Relative Path
266
FIPS Support
266
Public and Private Key Management
266
The Firmwaredownload Command
267
Power-On Firmware Checksum Test
268
Testing a Different Firmware Version on a Switch
268
Testing and Restoring Firmware on Switches
268
Testing and Restoring Firmware on Backbones
270
Testing Different Firmware Versions on Backbones
270
Validating a Firmware Download
273
Chapter 10 Managing Virtual Fabrics
275
Virtual Fabrics Overview
275
Default Logical Switch
276
Figure 17 Switch before and after Enabling Virtual Fabrics
276
Logical Switch Overview
276
Figure 18 Switch before and after Creating Logical Switches
277
Logical Switches and Fabric Ids
277
Figure 19 Fabric Ids Assigned to Logical Switches
278
Figure 20 Assigning Ports to Logical Switches
278
Port Assignment in Logical Switches
278
Logical Switches and Connected Devices
279
Figure 25 Base Switches Connected by an XISL
283
Figure 26 Logical Isls Connecting Logical Switches
284
Figure 27 Logical Fabric Using Isls and Xisls
284
Table 50 Blade and Port Types Supported on Logical Switches
287
Table 51 Virtual Fabrics Interaction with Fabric os Features
288
Table 52 Maximum Number of Logical Switches Per Chassis
289
Disabling Virtual Fabrics Mode
290
Enabling Virtual Fabrics Mode
290
Configuring Logical Switches to Use Basic Configuration Values
291
Creating a Logical Switch or Base Switch
292
Executing a Command in a Different Logical Switch Context
293
Deleting a Logical Switch
294
Adding and Moving Ports on a Logical Switch
295
Changing the Fabric ID of a Logical Switch
296
Displaying Logical Switch Configuration
296
Changing a Logical Switch to a Base Switch
297
Removing an IP Address for a Virtual Fabric
298
Setting up IP Addresses for a Virtual Fabric
298
Changing the Context to a Different Logical Fabric
299
Configuring a Logical Switch to Use Xisls
299
Creating a Logical Fabric Using Xisls
300
Figure 21 Logical Switches Connected to Devices and Non-Virtual Fabrics Switch
280
Figure 23 Logical Switches Connected to Other Logical Switches through Physical Isls
282
Figure 24 Logical Switches Connected to Form Logical Fabrics
282
Base Switch and Extended Isls
283
Restrictions on Moving Ports
289
Restrictions on Xisls
289
Figure 22 Logical Switches in a Single Chassis Belong to Separate Fabrics
280
Logical Fabric Overview
281
Management Model for Logical Switches
281
Logical Fabric and Isls
282
Limitations and Restrictions of Virtual Fabrics
288
Virtual Fabrics Interaction with Other Fabric os Features
288
Account Management and Virtual Fabrics
286
Supported Platforms for Virtual Fabrics
286
Supported Port Configurations in the Fixed-Port Switches
286
Supported Port Configurations in Brocade Backbones
287
Figure 28 Example of Logical Fabrics in Multiple Chassis and Xisls
300
Chapter 11 Administering Advanced Zoning
303
Zone Types
303
Zoning Overview
304
Approaches to Zoning
305
Figure 29 Zoning Example
305
Table 53 Approaches to Fabric-Based Zoning
306
Zone Objects
306
Zone Aliases
307
Zone Configurations
307
Zoning Enforcement
308
Considerations for Zoning Architecture
309
Table 55 Zone Merging Scenarios: Defined and Effective Configurations
339
Table 56 Table
339
Table 58 Zone Merging Scenarios: TI Zones
341
Table 59 Zone Merging Scenarios: Default Access Mode
341
Table 60 Zone Merging Scenarios: Mixed Fabric os Versions
342
Traffic Isolation Zoning Overview
345
Figure 31 Traffic Isolation Zone Creating a Dedicated Path through the Fabric
346
Table 61 Traffic Behavior When Failover Is Enabled or Disabled in TI Zones
347
Figure 32 Fabric Incorrectly Configured for TI Zone with Failover Disabled
348
Figure 33 Dedicated Path Is the Only Shortest Path
349
Enhanced TI Zones
350
Figure 34 Dedicated Path Is Not the Shortest Path
350
Figure 35 Enhanced TI Zones
350
Figure 36 Illegal ETIZ Configuration: Two Paths from One Port to Two Devices on the same Remote Domain
351
Illegal Configurations with Enhanced TI Zones
351
General Rules for TI Zones
356
Limitations of TI Zones over FC Routers
356
Traffic Isolation Zone Violation Handling for Trunk Ports
357
Bottleneck Detection Overview
375
How Bottlenecks Are Reported
376
Types of Bottlenecks
376
Limitations of Bottleneck Detection
377
Supported Configurations for Bottleneck Detection
377
Access Gateway Considerations for Bottleneck Detection
378
Detection
378
High Availability Considerations for Bottleneck Detection
378
Trunking Considerations for Bottleneck Detection
378
Virtual Fabrics Considerations for Bottleneck Detection
378
Back-End Credit Loss Detection and Recovery Support on Brocade 5300 Switches
379
Back-End Credit Loss Detection and Recovery Support on Brocade 6520 Switches
379
Credit Loss
379
Enabling Back-End Credit Loss Detection and Recovery
380
Enabling Bottleneck Detection on a Switch
380
Displaying Bottleneck Detection Configuration Details
381
Setting Bottleneck Detection Alerts
382
Setting both a Congestion Alert and a Latency Alert
383
Figure 49 Encryption and Compression on 16 Gbps Isls
394
Table 62 Number of Ports Supported Per Chip or Per Trunk
395
Table 63 Example ISL Connections
406
Figure 50 Ex_Ports, E_Ports, Ifls, and Isls
411
Table 64 Number of Supported NPIV Devices
420
Configuring NPIV
421
Enabling and Disabling NPIV
422
Viewing NPIV Port Configuration Information
423
Viewing Virtual PID Login Information
424
Ex_Port
412
Npiv
419
NPIV Overview
419
10-Bit Addressing Mode
420
Fixed Addressing Mode
420
Upgrade Considerations
420
Figure 42 Dedicated Path with Virtual Fabrics
361
Figure 43 Creating a TI Zone in a Logical Fabric
362
Figure 45 Example Configuration for TI Zones over FC Routers in Logical Fabrics
363
Figure 46 Logical Representation of TI Zones over FC Routers in Logical Fabrics
363
Figure 47 TI over FCR Example
371
Figure 48 Affected Seconds for Bottleneck Detection
383
Changing Bottleneck Detection Parameters
384
Setting a Congestion Alert Only
384
Setting a Latency Alert Only
384
Parameters
385
Advanced Bottleneck Detection Settings
388
Excluding a Port from Bottleneck Detection
389
Displaying Bottleneck Statistics
391
Disabling Bottleneck Detection on a Switch
392
In-Flight Encryption and Compression
393
In-Flight Encryption and Compression Overview
393
Encryption and Compression Restrictions
394
E_Port
407
Examples of Disabling Encryption and Compression
410
In-Flight Encryption/Compression on Ex_Ports
411
Working with Ex_Ports
411
Figure 38 Traffic Isolation Zoning over FCR
353
Figure 39 TI Zone in an Edge Fabric
354
Figure 40 TI Zone in a Backbone Fabric
355
Figure 41 TI Zone Misconfiguration
357
Additional Configuration Rules for Enhanced TI Zones
358
Supported Configurations for Traffic Isolation Zoning
358
Limitations and Restrictions of Traffic Isolation Zoning
359
Trunking with TI Zones
359
Admin Domain Considerations for Traffic Isolation Zoning
360
Virtual Fabrics Considerations for Traffic Isolation Zoning
361
How Encryption and Compression Are Enabled
396
Authentication and Key Generation
398
Availability Considerations
398
Configuring Encryption and Compression
399
Recommendation for Compression
399
Virtual Fabrics Considerations
399
Port Speed and Encryption/Compression Enabled Ports
401
Viewing the Encryption and Compression Configuration
401
Ports
402
Configuring and Enabling Authentication
403
Configuring Compression
404
Configuring Encryption
404
Disabling Compression
405
Disabling Encryption
405
Encryption and Compression Examples
406
TI Zones Within a Backbone Fabric
355
TI Zones Within an Edge Fabric
354
Creating a TI Zone
364
Creating a TI Zone in a Base Fabric
366
Modifying TI Zones
367
Changing the State of a TI Zone
368
Deleting a TI Zone
369
Displaying TI Zones
369
Troubleshooting TI Zone Routing Problems
370
Setting up TI over FCR (Sample Procedure)
371
Table 54 Considerations for Zoning Architecture
309
Figure 30 Broadcast Zones and Admin Domains
311
Broadcast Zones and Default Zoning Mode
312
High Availability Considerations with Broadcast Zones
312
Loop Devices and Broadcast Zones
312
Zone Aliases
312
Adding Members to an Alias
313
Creating an Alias
313
Deleting an Alias
314
Removing Members from an Alias
314
Viewing an Alias in the Defined Configuration
315
Creating a Zone
316
Displaying Existing Zones
316
Zone Creation and Maintenance
316
Adding Devices (Members) to a Zone
317
Removing Devices (Members) from a Zone
318
Replacing Zone Members
319
Deleting a Zone
320
Viewing a Zone in the Defined Configuration
322
Validating a Zone
323
Default Zoning Mode
326
Setting the Default Zoning Mode
326
Viewing the Current Default Zone Access Mode
327
Zone Database Size
327
Creating a Zone Configuration
328
Zone Configurations
328
Adding Zones (Members) to a Zone Configuration
329
Removing Zones (Members) from a Zone Configuration
329
Disabling a Zone Configuration
330
Enabling a Zone Configuration
330
Abandoning Zone Configuration Changes
331
Deleting a Zone Configuration
331
Viewing All Zone Configuration Information
331
Viewing Selected Zone Configuration Information
332
Viewing the Configuration in the Effective Zone Database
332
Clearing All Zone Configurations
333
Copying a Zone Object
333
Zone Object Maintenance
333
Deleting a Zone Object
334
Renaming a Zone Object
335
Security and Zoning
336
Zone Configuration Management
336
Zone Merging
336
Fabric Segmentation and Zoning
338
Zone Merging Scenarios
339
Traffic Isolation Zoning over FC Routers
352
Best Practices for Zoning
310
Broadcast Zones
310
Broadcast Zones and Admin Domains
310
Broadcast Zones and FC-FC Routing
311
Figure 44 Creating a TI Zone in a Base Fabric
362
Traffic Isolation Zoning over FC Routers with Virtual Fabrics
363
TI Zone Failover
346
FSPF Routing Rules and Traffic Isolation
349
Concurrent Zone Transactions
342
Chapter 12 Traffic Isolation Zoning
425
Chapter 13 Bottleneck Detection
425
Chapter 14 In-Flight Encryption and Compression
425
Chapter 15 NPIV
425
Chapter 16 Dynamic Fabric Provisioning: Fabric-Assigned PWWN
425
Introduction to Dynamic Fabric Provisioning Using FA-PWWN
425
Checking for Duplicate FA-Pwwns
426
Configuring FA-Pwwns
426
User- and Auto-Assigned FA-PWWN Behavior
426
Configuring an FA-PWWN for an HBA Connected to an Access Gateway
427
Figure 51 Fabric-Assigned Port World Wide Name Provisioning Scenarios
427
Configuring an FA-PWWN for an HBA Connected to an Edge Switch
428
Supported Switches and Configurations for FA-PWWN
429
Configuration Upload and Download Considerations for FA-PWWN
430
Firmware Upgrade and Downgrade Considerations for FA-PWWN
430
Security Considerations for FA-PWWN
430
Access Gateway N_Port Failover with FA-PWWN
431
Restrictions of FA-PWWN
431
Administrative Domains Overview
433
Managing Administrative Domains
433
Figure 52 Fabric with Two Admin Domains
434
Home Admin Domains and Login
438
Figure 55 Fabric Showing Switch and Device Wwns
441
Figure 57 AD0 and Two User-Defined Admin Domains, AD1 and AD2
452
Figure 58 AD0 with Three Zones
452
Table 66 Ports and Devices in CLI Output
455
Table 67 Admin Domain Interaction with Fabric os Features
457
Table 68 Configuration Upload and Download Scenarios in an AD Context
460
Admin Domains, Zones, and Zone Databases
458
Admin Domains and LSAN Zones
459
Configuration Upload and Download in an AD Context
460
Displaying an Admin Domain Configuration
456
Switching to a Different Admin Domain Context
456
Admin Domain Interactions with Other Fabric os Features
457
Figure 53 Filtered Fabric Views When Using Admin Domains
434
Table 65 AD User Types
436
Figure 54 Fabric with AD0 and AD255
438
Admin Domain Member Types
439
Admin Domains and Switch Wwns
440
SAN Management with Admin Domains
454
Validating an Admin Domain Member List
454
CLI Commands in an AD Context
455
Executing a Command in a Different AD Context
455
Figure 56 Filtered Fabric Views Showing Converted Switch Wwns
441
Admin Domain Compatibility, Availability, and Merging
442
Admin Domain Management for Physical Fabric Administrators
442
Creating an Admin Domain
443
Setting the Default Zoning Mode for Admin Domains
443
User Assignments to Admin Domains
444
Activating an Admin Domain
446
Removing an Admin Domain from a User Account
446
Adding Members to an Existing Admin Domain
447
Deactivating an Admin Domain
447
Removing Members from an Admin Domain
448
Renaming an Admin Domain
448
Deleting an Admin Domain
449
Deleting All User-Defined Admin Domains
450
Deleting All User-Defined Admin Domains Non-Disruptively
450
Licensed Features
461
Admin Domain Access Levels
435
Admin Domain Features
435
Requirements for Admin Domains
435
System-Defined Admin Domains
436
User-Defined Admin Domains
436
Chapter 17 Managing Administrative Domains
463
Advertisement
HP StoreFabric SN6500B Administrator's Manual (108 pages)
Brocade Access Gateway Administrator's Guide v7.1.0 (53-1002743-01, March 2013)
Brand:
HP
| Category:
Software
| Size: 1.14 MB
Table of Contents
Access Gateway
1
Table of Contents
5
About this Document
13
How this Document Is Organized
13
Supported Hardware and Software
14
What's New in this Document
14
Document Conventions
15
Text Formatting
15
Command Syntax Conventions
15
Notes, Cautions, and Warnings
16
Notice to the Reader
16
Key Terms for Access Gateway
17
Additional Information
18
Brocade Resources
18
Other Industry Resources
18
Optional Brocade Features
18
Getting Technical Help
18
Document Feedback
19
Chapter 1 Access Gateway Basic Concepts
21
Brocade Access Gateway Overview
21
Comparing Native Fabric and Access Gateway Modes
21
Figure 1 Switch Function in Native Mode
22
Fabric os Features in Access Gateway Mode
23
Figure 2 Switch Function in Access Gateway Mode
23
Buffer Credit Recovery Support
25
Table 1 Fabric os Components Supported on Access Gateway
25
Device Authentication Support
26
Forward Error Correction Support
26
Virtual Fabrics Support
26
Limitations and Considerations
28
Table 2 Behavior of Sending AG Switch and Receiving Fabric Switch with Different Policies Configured
28
Table 3 Behavior of Sending Device (HBA) and Receiving AG Switch with Different Policies Configured
28
Access Gateway Port Types
29
Comparison of Access Gateway Ports to Standard Switch
29
Ports
29
Figure 3 Port Usage Comparison
30
Figure 4 Diagnostic Port Configurations
30
Access Gateway Hardware Considerations
31
Table 4 Port Configurations
31
Chapter 2 Configuring Ports in Access Gateway Mode
33
Enabling and Disabling Access Gateway Mode
33
Port State Description
34
Table 5 Port State Description
34
Access Gateway Mapping
35
Port Mapping
36
Figure 5 Port Mapping Example
36
Table 6 Description of Port Mapping
36
Table 7 Access Gateway Default Port Mapping
37
F_Port Static Mapping
40
Device Mapping
41
Figure 6 Example of Device Mapping to N_Port Groups
43
Figure 7 Example Device Mapping to an N_Port
44
Considerations for Access Gateway Mapping
48
N_Port Configurations
50
Figure 8 Example of Adding an External F_Port (F9) on an Embedded Switch
50
Displaying N_Port Configurations
51
Persisting Port Online State
51
Unlocking N_Ports
51
D_Port Support
52
Limitations and Considerations
52
Saving Port Mappings
53
Chapter 3 Managing Policies and Features in Access Gateway Mode
55
Access Gateway Policies Overview
55
Displaying Current Policies
55
Access Gateway Policy Enforcement Matrix
56
Advanced Device Security Policy
56
How the ADS Policy Works
56
Table 8 Policy Enforcement Matrix
56
Enabling and Disabling the ADS Policy
57
Allow Lists
57
ADS Policy Considerations
59
Upgrade and Downgrade Considerations for the ADS Policy
59
Automatic Port Configuration Policy
59
How the APC Policy Works
59
Enabling and Disabling the APC Policy
60
APC Policy Considerations
60
Upgrade and Downgrade Considerations for the APC Policy
60
Port Grouping Policy
61
How Port Groups Work
61
Figure 9 Port Grouping Behavior
61
Adding an N_Port to a Port Group
62
Deleting an N_Port from a Port Group
62
Removing a Port Group
62
Figure 10 Port Group 1 (PG1) Setup
62
Renaming a Port Group
63
Disabling the Port Grouping Policy
63
Port Grouping Policy Modes
63
Creating a Port Group and Enabling Automatic Login Balancing Mode
64
Enabling MFNM Mode
65
Disabling MFNM Mode
65
Displaying the Current MFNM Mode Timeout Value
66
Setting the Current MFNM Mode Timeout Value
66
Port Grouping Policy Considerations
66
Upgrade and Downgrade Considerations for the Port Grouping Policy
67
Device Load Balancing Policy
67
Enabling the Device Load Balancing Policy
67
Disabling the Device Load Balancing Policy
67
Device Load Balancing Policy Considerations
68
Persistent ALPA Policy
68
Enabling the Persistent ALPA Policy
68
Disabling the Persistent ALPA Policy
69
Persistent ALPA Device Data
69
Clearing ALPA Values
69
Persistent ALPA Policy Considerations
70
Failover Policy
70
Failover with Port Mapping
70
Figure 11 Failover Behavior
72
Failover with Device Mapping
73
Enabling and Disabling the Failover Policy on an N_Port
74
Enabling and Disabling the Failover Policy for a Port Group
74
Upgrade and Downgrade Considerations for the Failover
75
Policy
75
Failback Policy
75
Failback Policy Configurations in Access Gateway
75
Enabling and Disabling the Failback Policy on an N_Port
76
Figure 12 Failback Behavior
76
Enabling and Disabling the Failback Policy for a Port Group
77
Upgrade and Downgrade Considerations for the Failback
77
Policy
77
Failback Policy Disabled on Unreliable Links
77
Monitoring)
77
Trunking in Access Gateway Mode
78
How Trunking Works
78
Configuring Trunking on the Edge Switch
78
Configuration Management for Trunk Areas
79
Table 9 Address Identifier
80
Enabling Trunking
81
Disabling F_Port Trunking
81
Monitoring Trunking
81
AG Trunking Considerations for the Edge Switch
82
Table 10 Access Gateway Trunking Considerations for the Edge Switch
84
Trunking Considerations for Access Gateway Mode
85
Upgrade and Downgrade Considerations for Trunking in Access Gateway Mode
85
Adaptive Networking on Access Gateway
85
Table 11 PWWN Format for F_Port and N_Port Trunk Ports
85
Figure 13 Starting Point for Qos
86
Qos: Ingress Rate Limiting
86
Qos: SID/DID Traffic Prioritization
86
Upgrade and Downgrade Considerations for Adaptive Networking in AG Mode
86
Adaptive Networking on Access Gateway Considerations
87
Per-Port NPIV Login Limit
87
Setting the Login Limit
87
Advanced Performance Monitoring
88
End-To-End Monitors
88
Frame Monitors
89
Limitations for Using APM
90
Considerations for the Brocade 8000
90
Port Mapping
90
Policy and Feature Support
90
Fabric os Command Support
91
Considerations for the Brocade 6505 and 6510
92
HP StoreFabric SN6500B Quickspecs (24 pages)
Fibre Channel Switch
Brand:
HP
| Category:
Switch
| Size: 0.38 MB
Table of Contents
Key Features and Benefits
2
Product Highlights
4
Service and Support
9
Family Information
12
Configuration Information
16
Step 1 - Base Configuration
16
Technical Specifications
20
Summary of Changes
23
Advertisement
HP StoreFabric SN6500B Update Manual (9 pages)
ISS Technology Update
Brand:
HP
| Category:
Server
| Size: 0.39 MB
Advertisement
Related Products
HP StorageWorks Ultrium 215
HP StorageWorks 4400 - Enterprise Virtual Array
HP SmartMemory
HP StoreOnce 2700
HP StoreVirtual 4630
HP StoreEver Series
HP StoreOnce 5100
HP StoreOnce 5500
HP StoreAll 8200
HP StorageWorks SN6000
HP Categories
Desktop
Laptop
Server
Monitor
Switch
More HP Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL