Sign In
Upload
Manuals
Brands
HP Manuals
Software
Fabric OS 7.1.0
HP Fabric OS 7.1.0 Firmware Release Manuals
Manuals and User Guides for HP Fabric OS 7.1.0 Firmware Release. We have
1
HP Fabric OS 7.1.0 Firmware Release manual available for free PDF download: Administrator's Manual
HP Fabric OS 7.1.0 Administrator's Manual (666 pages)
Fabric OS Administrator's Guide, 7.1.0 (53-1002745-02, March 2013)
Brand:
HP
| Category:
Software
| Size: 6.13 MB
Table of Contents
Table of Contents
3
About this Document
33
How this Document Is Organized
33
Supported Hardware and Software
34
What's New in this Document
35
Document Conventions
36
Notice to the Reader
37
Additional Information
38
Getting Technical Help
38
Document Feedback
40
Standard Features
41
Fibre Channel Services Overview
43
Figure 1 Well-Known Addresses
43
Understanding Fibre Channel Services
43
Management Server
44
Platform Services
44
Disabling Platform Services
45
Enabling Platform Services
45
Management Server Database
45
Platform Services and Virtual Fabrics
45
Adding a Member to the ACL
46
Displaying the Management Server ACL
46
Deleting a Member from the ACL
47
Viewing the Contents of the Management Server Database
48
Clearing the Management Server Database
49
Displaying Topology Discovery Status
49
Enabling Topology Discovery
49
Topology Discovery
49
Disabling Topology Discovery
50
Device Login
51
E_Port Login Process
51
Principal Switch
51
Fabric Login Process
52
Port Login Process
52
Rscns
52
Duplicate Port World Wide Name
53
High Availability of Daemon Processes
53
Table 1 Daemons that Are Automatically Restarted
53
Chapter 1 Understanding Fibre Channel Services
55
Chapter 2 Performing Basic Configuration Tasks
55
Fabric os Overview
55
Console Sessions Using the Serial Port
56
Fabric os Command Line Interface
56
Table 2 Terminal Port Parameters
57
Table 3 Help Topic Contents
59
Table 4 Fabricshow Fields
73
Customizing the Switch Name
74
Setting the Domain ID
74
Switch Names
74
Chassis Names
75
Configuring the Fabric Name
75
Customizing Chassis Names
75
Fabric Name
75
Config File Upload and Download Considerations for Fabric
76
Disabling a Switch
76
Enabling a Switch
76
High Availability Considerations for Fabric Names
76
Names
76
Switch Activation and Deactivation
76
Switch and Backbone Shutdown
76
Upgrade and Downgrade Considerations for Fabric Names
76
Powering off a Brocade Backbone
77
Powering off a Brocade Switch
77
Basic Connections
78
Device Connection
78
Switch Connection
78
Default Account Passwords
61
Password Modification
61
The Switch Ethernet Interface
62
Displaying the Network Interface Settings
63
Virtual Fabrics and the Ethernet Interface
63
Static Ethernet Addresses
64
DHCP Activation
66
Ipv6 Autoconfiguration
68
Date and Time Settings
69
Setting the Date and Time
69
Time Zone Settings
69
Network Time Protocol
71
Domain Ids
72
Displaying the Domain Ids
73
Telnet or SSH Sessions
57
Getting Help on a Command
58
Viewing a History of Command Line Entries
59
Chapter 3 Performing Advanced Configuration Tasks
79
Port Identifiers (Pids) and PID Binding Overview
79
10-Bit Addressing Mode
80
Core PID Addressing Mode
80
Fixed Addressing Mode
80
256-Area Addressing Mode
81
WWN-Based PID Assignment
82
Backbone Port Blades
84
Port Types
84
Ports
84
Configuring Two Ethernet Ports on One CP8 Blade
85
Setting Port Names
86
Port Identification by Index
87
Port Identification by Port Area ID
87
Port Identification by Slot and Port Number
87
Configuring a Device-Switch Connection
88
Swapping Port Area Ids
88
Power Management
101
Checking Switch Operation
102
Equipment Status
102
Powering off a Port Blade
102
Powering on a Port Blade
102
Verifying Fabric Connectivity
103
Verifying High Availability Features (Backbones Only)
103
Enabling the Track Changes Feature
104
Track and Control Switch Changes
104
Verifying Device Connectivity
104
Displaying the Status of the Track Changes Feature
105
Viewing the Switch Status Policy Threshold Values
105
Setting the Switch Status Policy Threshold Values
106
Audit Log Configuration
107
Configuring an Audit Log for Specific Event Classes
108
Verifying Host Syslog Prior to Configuring the Audit Log
108
Duplicate PWWN Handling During Device Login
109
Table 10 Duplicate PWWN Behavior: Port Type Determines Which Login Takes Precedence
110
Figure 5 Principal Isls
112
Figure 6 New Switch Added to Existing Fabric
114
Figure 7 Virtual Channels on a Qos-Enabled ISL
116
Figure 8 Gateway Link Merging Sans
117
Table 11 Combinations of Routing Policy and IOD with Lossless DLS Enabled
126
Figure 9 Single Host and Target
130
Deleting a Frame Redirect Zone
131
Viewing Frame Redirect Zones
131
Managing User Accounts
133
User Accounts Overview
133
Role-Based Access Control
134
Configuring Lossless Dynamic Load Sharing
127
Lossless Dynamic Load Sharing in Virtual Fabrics
127
Enabling Forward Error Correction (FEC)
128
Limitations
128
Creating a Frame Redirect Zone
130
Frame Redirection
130
Configuring a Link through a Gateway
118
Routing Policies
118
Displaying the Current Routing Policy
119
Exchange-Based Routing
119
Port-Based Routing
119
AP Route Policies
120
Device-Based Routing
120
Dynamic Load Sharing
122
Route Selection
122
Changes
123
Forcing In-Order Frame Delivery Across Topology Changes
123
Frame Order Delivery
123
Restoring Out-Of-Order Frame Delivery Across Topology
123
Using Frame Viewer to Understand Why Frames Are Dropped
124
Lossless Dynamic Load Sharing on Ports
125
Lossless Core
126
Gateway Links
117
Buffer Credits
115
Congestions Versus Over-Subscription
115
Virtual Channels
115
Fibre Channel NAT
113
Inter-Switch Links
114
Port Activation and Deactivation
89
Port Decommissioning
90
Setting Port Modes
90
Setting All Ports on a Switch to the same Speed
92
Setting Port Speeds
92
Blade Terminology and Compatibility
93
Setting Port Speed for a Port Octet
93
Table 5 Core and CP Blade Terminology and Platform Support
93
Table 6 Port Blade Terminology, Numbering, and Platform Support
94
Table 7 Blade Compatibility Within Brocade Backbone Families
96
Blade Swapping
97
Disabling Blades
97
Enabling Blades
97
Figure 2 Identifying the Blades
98
How Blades Are Swapped
98
Figure 3 Blade Swap with Virtual Fabrics During the Swap
99
Figure 4 Blade Swap with Virtual Fabrics after the Swap
100
Table 8 Duplicate PWWN Behavior: First Login Takes Precedence over Second Login
109
Setting the Behavior for Handling Duplicate Pwwns
110
Table 9 Duplicate PWWN Behavior: Second Login Overrides First Login
110
Routing Overview
111
Routing Traffic
111
Fspf
112
Paths and Route Selection
112
Enabling and Disabling Switches
100
Swapping Blades
100
Core Blades
95
CP Blades
95
Enabling and Disabling Blades
96
FX8-24 Compatibility Notes
96
Port and Application Blade Compatibility
96
Table 12 Default Fabric os Roles
134
Admin Domain Considerations
135
Role Permissions
135
Table 13 Permission Types
135
Figure 12 Example of the Dictiona.DCM File
162
Creating a Group
164
LDAP Configuration and Openldap
165
TACACS+ Service
171
Table 20 Brocade Custom TACACS+ Attributes
172
Remote Authentication Configuration on the Switch
174
Configuring Local Authentication as Backup
176
Managing User-Defined Roles
136
Table 14 Maximum Number of Simultaneous Sessions
136
Table 15 Default Local User Accounts
138
Local Account Passwords
139
Accepting Distributed User Databases on the Local Switch
140
Distributing the Local User Database
140
Local User Account Database Distribution
140
Password Policies
141
Password Strength Policy
141
Rejecting Distributed User Databases on the Local Switch
141
Password History Policy
142
Account Lockout Policy
143
Password Expiration Policy
143
Setting the Boot PROM Password for a Switch with a Recovery String
145
The Boot PROM Password
145
Setting the Boot PROM Password for a Backbone with a Recovery String
146
Setting the Boot PROM Password for a Switch Without a Recovery String
147
Setting the Boot PROM Password for a Backbone Without a Recovery String
148
Remote Authentication
149
Remote Authentication Configuration
149
The Management Channel
136
Local Database User Accounts
137
Default Accounts
138
Switch Configuration
150
Table 16 LDAP Options
151
Table 17 Authentication Configuration Options
151
Table 18 Syntax for VSA-Based Account Roles
153
Fabric os Users on the RADIUS Server
154
Figure 10 Windows 2000 VSA Configuration
154
Table 19 Entries in Dictionary.brocade File
154
Figure 11 Example of a Brocade DCT File
161
LDAP Configuration and Microsoft Active Directory
162
Setting up a RADIUS Server
156
Fabric os User Accounts
152
Setting the Switch Authentication Mode
152
Chapter 4 Routing Traffic
177
Chapter 5 Managing User Accounts
177
Chapter 6 Configuring Protocols
177
Security Protocols
177
Table 21 Secure Protocol Support
177
Secure Copy
178
Table 22 Items Needed to Deploy Secure Protocols
178
Table 23 Main Security Scenarios
178
Table 24 SSL Certificate Files
185
Table 25 Blocked Listener Applications
192
Port Configuration
193
The Browser
186
Root Certificates for the Java Plugin
187
Simple Network Management Protocol
188
SNMP and Virtual Fabrics
189
Blocking Telnet
190
SNMP Configuration
190
SNMP Security Levels
190
Telnet Protocol
190
Unblocking Telnet
191
Listener Applications
192
Ports and Applications Used by Switches
192
Secure Shell Protocol
179
Setting up SCP for Configuration Uploads and Downloads
179
SSH Public Key Authentication
180
Browser and Java Support
182
Secure Sockets Layer Protocol
182
SSL Configuration Overview
183
Table 26 Access Defaults
193
Table 27 Port Information
193
Chapter 7 Configuring Security Policies
195
ACL Policies Overview
195
How the ACL Policies Are Stored
195
ACL Policy Management
196
Policy Members
196
Table 28 Valid Methods for Specifying Policy Members
196
Activating ACL Policy Changes
197
Deleting an ACL Policy
197
Displaying ACL Policies
197
Saving Changes Without Activating the Policies
197
Abandoning Unsaved ACL Policy Changes
198
Adding a Member to an Existing ACL Policy
198
Removing a Member from an ACL Policy
198
FCS Policies
199
FCS Policy Restrictions
199
Table 34 DCC Policy Behavior When Created Manually with PWWN
206
Table 35 SCC Policy States
206
Authentication Policy for Fabric Elements
207
Creating an SCC Policy
207
E_Port Authentication
208
ACL Policy Distribution to Other Switches
227
Fabric-Wide Enforcement
227
Table 43 Merging Fabrics with Matching Fabric-Wide Consistency Policies
229
Table 44 Examples of Strict Fabric Merges
230
Figure 14 Protected Endpoints Configuration
232
Figure 15 Gateway Tunnel Configuration
232
Figure 16 Endpoint-To-Gateway Tunnel Configuration
233
Table 46 Algorithms and Associated Authentication Policies
234
Table 47 CLI Commands to Display or Modify Switch Configuration Information
247
Configuration Download Without Disabling a Switch
248
Configuration Management for Virtual Fabrics
250
Configurations Across a Fabric
250
Downloading a Configuration File from One Switch to Another Switch of the same Model
250
Security Considerations
250
Configdownload
251
Uploading a Configuration File from a Switch with Virtual Fabrics Enabled
251
Restrictions
252
Brocade Configuration Form
253
IKE Policies
235
Creating the Tunnel
236
Example of an End-To-End Transport Tunnel Mode
238
Configuration Settings
241
Maintaining the Switch Configuration File
241
Configuration File Format
242
Configuration File Backup
244
Uploading a Configuration File in Interactive Mode
245
Configuration File Restoration
246
Restrictions
246
Table 29 FCS Policy States
199
Table 30 FCS Switch Operations
200
Table 31 Distribution Policy States
202
Table 32 DCC Policy States
203
Table 33 DCC Policy Behavior with FA-PWWN When Created Using Lockdown Support
205
SCC Policies
206
Authentication and Encryption Algorithms
234
IP Sec Policies
234
Creating a DCC Policy
204
DCC Policy Behavior with Fabric-Assigned Pwwns
205
Deleting a DCC Policy
205
Table 37 Supported Services
220
Table 38 Implicit IP Filter Rules
222
Table 39 Default IP Policy Rules
222
Table 41 Supported Policy Databases
226
Table 42 Fabric-Wide Consistency Policy Settings
228
Notes on Joining a Switch to the Fabric
229
DCC Policy Restrictions
203
Device Connection Control Policies
203
IP Sec Protocols
233
Security Associations
233
Creating an FCS Policy
201
Modifying the Order of FCS Switches
201
FCS Policy Distribution
202
Figure 13 DH-CHAP Authentication
208
Table 36 FCAP Certificate Files
215
Fabric-Wide Distribution of the Authorization Policy
217
IP Filter Policy
217
Cloning an IP Filter Policy
218
Creating an IP Filter Policy
218
Displaying an IP Filter Policy
218
Saving an IP Filter Policy
218
Activating an IP Filter Policy
219
Deleting an IP Filter Policy
219
IP Filter Policy Rules
219
Table 45 Fabric Merges with Tolerant and Absent Combinations
230
Configuration Examples
231
Management Interface Security
231
Ensuring Fabric Domains Share Policies
200
Device Authentication Policy
210
AUTH Policy Restrictions
211
Authentication Protocols
212
Secret Key Pairs for DH-CHAP
213
FCAP Configuration Overview
215
Aborting an IP Filter Transaction
223
Adding a Rule to an IP Filter Policy
223
Deleting a Rule from an IP Filter Policy
223
IP Filter Policy Enforcement
223
IP Filter Policy Distribution
224
Managing Filter Thresholds
224
Policy Database Distribution
224
Database Distribution Settings
225
Table 48 Brocade Configuration and Connection Form
253
Chapter 8 Maintaining the Switch Configuration File
255
Chapter 9 Installing and Maintaining Firmware
255
Firmware Download Process Overview
255
Considerations for FICON CUP Environments
257
HA Sync State
257
Upgrading and Downgrading Firmware
257
Preparing for a Firmware Download
258
Table 49 Backbone HA Sync States
258
Connected Switches
259
Finding the Switch Firmware Version
259
Obtaining and Decompressing Firmware
259
Firmware Download on Switches
260
Switch Firmware Download Process Overview
260
Backbone Firmware Download Process Overview
262
Firmware Download on a Backbone
262
Enabling the USB Device
265
Firmware Download from a USB Device
265
Viewing the USB File System
265
Downloading from the USB Device Using the Absolute Path
266
Downloading from the USB Device Using the Relative Path
266
FIPS Support
266
Public and Private Key Management
266
The Firmwaredownload Command
267
Power-On Firmware Checksum Test
268
Testing a Different Firmware Version on a Switch
268
Testing and Restoring Firmware on Switches
268
Testing and Restoring Firmware on Backbones
270
Testing Different Firmware Versions on Backbones
270
Validating a Firmware Download
273
Chapter 10 Managing Virtual Fabrics
275
Virtual Fabrics Overview
275
Default Logical Switch
276
Figure 17 Switch before and after Enabling Virtual Fabrics
276
Logical Switch Overview
276
Figure 18 Switch before and after Creating Logical Switches
277
Logical Switches and Fabric Ids
277
Figure 19 Fabric Ids Assigned to Logical Switches
278
Figure 20 Assigning Ports to Logical Switches
278
Port Assignment in Logical Switches
278
Logical Switches and Connected Devices
279
Figure 25 Base Switches Connected by an XISL
283
Figure 26 Logical Isls Connecting Logical Switches
284
Figure 27 Logical Fabric Using Isls and Xisls
284
Table 50 Blade and Port Types Supported on Logical Switches
287
Table 51 Virtual Fabrics Interaction with Fabric os Features
288
Table 52 Maximum Number of Logical Switches Per Chassis
289
Disabling Virtual Fabrics Mode
290
Enabling Virtual Fabrics Mode
290
Configuring Logical Switches to Use Basic Configuration Values
291
Creating a Logical Switch or Base Switch
292
Executing a Command in a Different Logical Switch Context
293
Deleting a Logical Switch
294
Adding and Moving Ports on a Logical Switch
295
Changing the Fabric ID of a Logical Switch
296
Displaying Logical Switch Configuration
296
Changing a Logical Switch to a Base Switch
297
Removing an IP Address for a Virtual Fabric
298
Setting up IP Addresses for a Virtual Fabric
298
Changing the Context to a Different Logical Fabric
299
Configuring a Logical Switch to Use Xisls
299
Creating a Logical Fabric Using Xisls
300
Figure 21 Logical Switches Connected to Devices and Non-Virtual Fabrics Switch
280
Figure 23 Logical Switches Connected to Other Logical Switches through Physical Isls
282
Figure 24 Logical Switches Connected to Form Logical Fabrics
282
Base Switch and Extended Isls
283
Restrictions on Moving Ports
289
Restrictions on Xisls
289
Figure 22 Logical Switches in a Single Chassis Belong to Separate Fabrics
280
Logical Fabric Overview
281
Management Model for Logical Switches
281
Logical Fabric and Isls
282
Limitations and Restrictions of Virtual Fabrics
288
Virtual Fabrics Interaction with Other Fabric os Features
288
Account Management and Virtual Fabrics
286
Supported Platforms for Virtual Fabrics
286
Supported Port Configurations in the Fixed-Port Switches
286
Supported Port Configurations in Brocade Backbones
287
Figure 28 Example of Logical Fabrics in Multiple Chassis and Xisls
300
Chapter 11 Administering Advanced Zoning
303
Zone Types
303
Zoning Overview
304
Approaches to Zoning
305
Figure 29 Zoning Example
305
Table 53 Approaches to Fabric-Based Zoning
306
Zone Objects
306
Zone Aliases
307
Zone Configurations
307
Zoning Enforcement
308
Considerations for Zoning Architecture
309
Table 55 Zone Merging Scenarios: Defined and Effective Configurations
339
Table 56 Table
339
Table 58 Zone Merging Scenarios: TI Zones
341
Table 59 Zone Merging Scenarios: Default Access Mode
341
Table 60 Zone Merging Scenarios: Mixed Fabric os Versions
342
Traffic Isolation Zoning Overview
345
Figure 31 Traffic Isolation Zone Creating a Dedicated Path through the Fabric
346
Table 61 Traffic Behavior When Failover Is Enabled or Disabled in TI Zones
347
Figure 32 Fabric Incorrectly Configured for TI Zone with Failover Disabled
348
Figure 33 Dedicated Path Is the Only Shortest Path
349
Enhanced TI Zones
350
Figure 34 Dedicated Path Is Not the Shortest Path
350
Figure 35 Enhanced TI Zones
350
Figure 36 Illegal ETIZ Configuration: Two Paths from One Port to Two Devices on the same Remote Domain
351
Illegal Configurations with Enhanced TI Zones
351
General Rules for TI Zones
356
Limitations of TI Zones over FC Routers
356
Traffic Isolation Zone Violation Handling for Trunk Ports
357
Bottleneck Detection Overview
375
How Bottlenecks Are Reported
376
Types of Bottlenecks
376
Limitations of Bottleneck Detection
377
Supported Configurations for Bottleneck Detection
377
Access Gateway Considerations for Bottleneck Detection
378
Detection
378
High Availability Considerations for Bottleneck Detection
378
Trunking Considerations for Bottleneck Detection
378
Virtual Fabrics Considerations for Bottleneck Detection
378
Back-End Credit Loss Detection and Recovery Support on Brocade 5300 Switches
379
Back-End Credit Loss Detection and Recovery Support on Brocade 6520 Switches
379
Credit Loss
379
Enabling Back-End Credit Loss Detection and Recovery
380
Enabling Bottleneck Detection on a Switch
380
Displaying Bottleneck Detection Configuration Details
381
Setting Bottleneck Detection Alerts
382
Setting both a Congestion Alert and a Latency Alert
383
Figure 49 Encryption and Compression on 16 Gbps Isls
394
Table 62 Number of Ports Supported Per Chip or Per Trunk
395
Table 63 Example ISL Connections
406
Figure 50 Ex_Ports, E_Ports, Ifls, and Isls
411
Table 64 Number of Supported NPIV Devices
420
Configuring NPIV
421
Enabling and Disabling NPIV
422
Viewing NPIV Port Configuration Information
423
Viewing Virtual PID Login Information
424
Ex_Port
412
Npiv
419
NPIV Overview
419
10-Bit Addressing Mode
420
Fixed Addressing Mode
420
Upgrade Considerations
420
Figure 42 Dedicated Path with Virtual Fabrics
361
Figure 43 Creating a TI Zone in a Logical Fabric
362
Figure 45 Example Configuration for TI Zones over FC Routers in Logical Fabrics
363
Figure 46 Logical Representation of TI Zones over FC Routers in Logical Fabrics
363
Figure 47 TI over FCR Example
371
Figure 48 Affected Seconds for Bottleneck Detection
383
Changing Bottleneck Detection Parameters
384
Setting a Congestion Alert Only
384
Setting a Latency Alert Only
384
Parameters
385
Advanced Bottleneck Detection Settings
388
Excluding a Port from Bottleneck Detection
389
Displaying Bottleneck Statistics
391
Disabling Bottleneck Detection on a Switch
392
In-Flight Encryption and Compression
393
In-Flight Encryption and Compression Overview
393
Encryption and Compression Restrictions
394
E_Port
407
Examples of Disabling Encryption and Compression
410
In-Flight Encryption/Compression on Ex_Ports
411
Working with Ex_Ports
411
Figure 38 Traffic Isolation Zoning over FCR
353
Figure 39 TI Zone in an Edge Fabric
354
Figure 40 TI Zone in a Backbone Fabric
355
Figure 41 TI Zone Misconfiguration
357
Additional Configuration Rules for Enhanced TI Zones
358
Supported Configurations for Traffic Isolation Zoning
358
Limitations and Restrictions of Traffic Isolation Zoning
359
Trunking with TI Zones
359
Admin Domain Considerations for Traffic Isolation Zoning
360
Virtual Fabrics Considerations for Traffic Isolation Zoning
361
How Encryption and Compression Are Enabled
396
Authentication and Key Generation
398
Availability Considerations
398
Configuring Encryption and Compression
399
Recommendation for Compression
399
Virtual Fabrics Considerations
399
Port Speed and Encryption/Compression Enabled Ports
401
Viewing the Encryption and Compression Configuration
401
Ports
402
Configuring and Enabling Authentication
403
Configuring Compression
404
Configuring Encryption
404
Disabling Compression
405
Disabling Encryption
405
Encryption and Compression Examples
406
TI Zones Within a Backbone Fabric
355
TI Zones Within an Edge Fabric
354
Creating a TI Zone
364
Creating a TI Zone in a Base Fabric
366
Modifying TI Zones
367
Changing the State of a TI Zone
368
Deleting a TI Zone
369
Displaying TI Zones
369
Troubleshooting TI Zone Routing Problems
370
Setting up TI over FCR (Sample Procedure)
371
Table 54 Considerations for Zoning Architecture
309
Figure 30 Broadcast Zones and Admin Domains
311
Broadcast Zones and Default Zoning Mode
312
High Availability Considerations with Broadcast Zones
312
Loop Devices and Broadcast Zones
312
Zone Aliases
312
Adding Members to an Alias
313
Creating an Alias
313
Deleting an Alias
314
Removing Members from an Alias
314
Viewing an Alias in the Defined Configuration
315
Creating a Zone
316
Displaying Existing Zones
316
Zone Creation and Maintenance
316
Adding Devices (Members) to a Zone
317
Removing Devices (Members) from a Zone
318
Replacing Zone Members
319
Deleting a Zone
320
Viewing a Zone in the Defined Configuration
322
Validating a Zone
323
Default Zoning Mode
326
Setting the Default Zoning Mode
326
Viewing the Current Default Zone Access Mode
327
Zone Database Size
327
Creating a Zone Configuration
328
Zone Configurations
328
Adding Zones (Members) to a Zone Configuration
329
Removing Zones (Members) from a Zone Configuration
329
Disabling a Zone Configuration
330
Enabling a Zone Configuration
330
Abandoning Zone Configuration Changes
331
Deleting a Zone Configuration
331
Viewing All Zone Configuration Information
331
Viewing Selected Zone Configuration Information
332
Viewing the Configuration in the Effective Zone Database
332
Clearing All Zone Configurations
333
Copying a Zone Object
333
Zone Object Maintenance
333
Deleting a Zone Object
334
Renaming a Zone Object
335
Security and Zoning
336
Zone Configuration Management
336
Zone Merging
336
Fabric Segmentation and Zoning
338
Zone Merging Scenarios
339
Traffic Isolation Zoning over FC Routers
352
Best Practices for Zoning
310
Broadcast Zones
310
Broadcast Zones and Admin Domains
310
Broadcast Zones and FC-FC Routing
311
Figure 44 Creating a TI Zone in a Base Fabric
362
Traffic Isolation Zoning over FC Routers with Virtual Fabrics
363
TI Zone Failover
346
FSPF Routing Rules and Traffic Isolation
349
Concurrent Zone Transactions
342
Chapter 12 Traffic Isolation Zoning
425
Chapter 13 Bottleneck Detection
425
Chapter 14 In-Flight Encryption and Compression
425
Chapter 15 NPIV
425
Chapter 16 Dynamic Fabric Provisioning: Fabric-Assigned PWWN
425
Introduction to Dynamic Fabric Provisioning Using FA-PWWN
425
Checking for Duplicate FA-Pwwns
426
Configuring FA-Pwwns
426
User- and Auto-Assigned FA-PWWN Behavior
426
Configuring an FA-PWWN for an HBA Connected to an Access Gateway
427
Figure 51 Fabric-Assigned Port World Wide Name Provisioning Scenarios
427
Configuring an FA-PWWN for an HBA Connected to an Edge Switch
428
Supported Switches and Configurations for FA-PWWN
429
Configuration Upload and Download Considerations for FA-PWWN
430
Firmware Upgrade and Downgrade Considerations for FA-PWWN
430
Security Considerations for FA-PWWN
430
Access Gateway N_Port Failover with FA-PWWN
431
Restrictions of FA-PWWN
431
Administrative Domains Overview
433
Managing Administrative Domains
433
Figure 52 Fabric with Two Admin Domains
434
Home Admin Domains and Login
438
Figure 55 Fabric Showing Switch and Device Wwns
441
Figure 57 AD0 and Two User-Defined Admin Domains, AD1 and AD2
452
Figure 58 AD0 with Three Zones
452
Table 66 Ports and Devices in CLI Output
455
Table 67 Admin Domain Interaction with Fabric os Features
457
Table 68 Configuration Upload and Download Scenarios in an AD Context
460
Admin Domains, Zones, and Zone Databases
458
Admin Domains and LSAN Zones
459
Configuration Upload and Download in an AD Context
460
Displaying an Admin Domain Configuration
456
Switching to a Different Admin Domain Context
456
Admin Domain Interactions with Other Fabric os Features
457
Figure 53 Filtered Fabric Views When Using Admin Domains
434
Table 65 AD User Types
436
Figure 54 Fabric with AD0 and AD255
438
Admin Domain Member Types
439
Admin Domains and Switch Wwns
440
SAN Management with Admin Domains
454
Validating an Admin Domain Member List
454
CLI Commands in an AD Context
455
Executing a Command in a Different AD Context
455
Figure 56 Filtered Fabric Views Showing Converted Switch Wwns
441
Admin Domain Compatibility, Availability, and Merging
442
Admin Domain Management for Physical Fabric Administrators
442
Creating an Admin Domain
443
Setting the Default Zoning Mode for Admin Domains
443
User Assignments to Admin Domains
444
Activating an Admin Domain
446
Removing an Admin Domain from a User Account
446
Adding Members to an Existing Admin Domain
447
Deactivating an Admin Domain
447
Removing Members from an Admin Domain
448
Renaming an Admin Domain
448
Deleting an Admin Domain
449
Deleting All User-Defined Admin Domains
450
Deleting All User-Defined Admin Domains Non-Disruptively
450
Licensed Features
461
Admin Domain Access Levels
435
Admin Domain Features
435
Requirements for Admin Domains
435
System-Defined Admin Domains
436
User-Defined Admin Domains
436
Chapter 17 Managing Administrative Domains
463
Chapter 18 Administering Licensing
463
Licensing Overview
463
Table 69 Available Brocade Licenses
464
Table 70 License Requirements and Location Name by Feature
469
Table 71 Base to Upgrade License Comparison
471
Enterprise ICL License
472
ICL 16-Link License
472
ICL 8-Link License
472
8G Licensing
473
Slot-Based Licensing
474
Upgrade and Downgrade Considerations
474
10G Licensing
475
Assigning a License to a Slot
475
Removing a License from a Slot
475
Enabling 10 Gbps Operation on an FC Port
476
Enabling the 10-Gbe Ports on an FX8-24 Blade
477
Temporary Licenses
478
Configupload and Download Considerations
479
Date Change Restriction
479
Restrictions on Upgrading Temporary Slot-Based Licenses
479
Expired Licenses
480
Extending a Universal Temporary License
480
Universal Temporary License Shelf Life
480
Universal Temporary Licenses
480
Activating a License
481
Adding a Licensed Feature
481
Viewing Installed Licenses
481
Removing a Licensed Feature
482
Ports on Demand
483
Displaying Installed Licenses
484
Figure 62 Full Nine-Mesh Topology
496
Figure 63 64 Gbps ICL Core-Edge Topology
497
Table 73 Number of Logical Switches that Support Performance Monitors
500
End-To-End Performance Monitoring
501
Maximum Number of EE Monitors
501
Monitoring
501
Adding EE Monitors
502
Supported Port Configurations for EE Monitors
502
Figure 66 Fabric Mode Top Talker Monitors on FC Router Do Not Monitor any Flows
512
Figure 67 Fabric Mode Top Talker Monitors on FC Router Monitor Flows over the E_Port
512
Table 76 Comparison between CS_CTL-Based and Qos Zone-Based Prioritization
520
CS_CTL-Based Frame Prioritization
521
Table 77 Fabric Resources Assigned to Qos Priority for Frame Prioritization in CS_CTL Default
521
Table 78 Vcs Assigned to Qos Priority for Frame Prioritization in CS_CTL Auto Mode
521
Figure 68 Qos Traffic Prioritization
526
Figure 69 Qos with E_Ports Enabled
527
Qos over FC Routers
527
Figure 72 Switch in Access Gateway Mode Without F_Port Masterless Trunking
544
Figure 73 Switch in Access Gateway Mode with F_Port Masterless Trunking
544
Table 80 F_Port Masterless Trunking Considerations
546
F_Port Trunking in Virtual Fabrics
548
Table 83 Total FC Ports, Ports Per Port Group, and Unreserved Buffer Credits Per Port Group
564
Figure 74 a Metasan with Inter-Fabric Links
572
Figure 75 a Metasan with Edge-To-Edge and Backbone Fabrics and LSAN Zones
573
Figure 76 Edge Sans Connected through a Backbone Fabric
575
FC-FC Routing Topologies
576
Figure 77 Metasan with Imported Devices
576
Figure 78 Sample Topology (Physical Topology)
577
Figure 79 Ex_Port Phantom Switch Topology
578
Figure 80 Example of Setting up Speed LSAN Tag
596
Figure 81 LSAN Zone Binding
599
Figure 82 Ex_Ports in a Base Switch
607
Figure 83 Logical Representation of Ex_Ports in a Base Switch
608
Figure 84 Backbone-To-Edge Routing Across Base Switch Using FC Router in Legacy Mode
609
Port Indexing
611
Displaying the Range of Output Ports Connected to Xlate Domains
609
How Replacing Port Blades Affects Ex_Port Configuration
609
Upgrade and Downgrade Considerations for FC-FC Routing
609
Backbone-To-Edge Routing with Virtual Fabrics
608
Fabric Parameter Considerations
603
Proxy PID Configuration
603
Disabling Broadcast Frame Forwarding
604
Displaying the Current Broadcast Configuration
604
Enabling Broadcast Frame Forwarding
604
Inter-Fabric Broadcast Frames
604
Resource Monitoring
604
FC-FC Routing and Virtual Fabrics
606
Logical Switch Configuration for FC Routing
607
Phantom Domains
577
LSAN Zone Binding
598
FCR Authentication
579
Setting up FC-FC Routing
579
Verifying the Setup for FC-FC Routing
580
Backbone Fabric Ids
581
Assigning Backbone Fabric Ids
582
FCIP Tunnel Configuration
582
Configuring an IFL for both Edge and Backbone Connections
583
Inter-Fabric Link Configuration
583
FC Router Port Cost Configuration
587
Port Cost Considerations
588
Setting Router Port Cost for an Ex_Port
588
Ex_Port Frame Trunking Configuration
589
LSAN Zone Configuration
590
Use of Admin Domains with LSAN Zones and FC-FC Routing
590
Zone Definition and Naming
590
Controlling Device Communication with the LSAN
591
LSAN Zones and Fabric-To-Fabric Communications
591
Configuring Backbone Fabrics for Interconnectivity
593
HA and Downgrade Considerations for LSAN Zones
594
LSAN Zone Policies Using LSAN Tagging
594
Setting the Maximum LSAN Count
594
Table 81 PWWN Format for F_Port and N_Port Trunk Ports
548
Table 82 Fibre Channel Data Frames
558
Allocating Buffer Credits Based on Average-Size Frames
560
Calculating the Number of Buffers Required Given the Distance, Speed, and Frame Size
561
Configuring Buffers for a Single Port Directly
561
Configuring Buffers Using Frame Size
561
Allocating Buffer Credits for F_Ports
562
Monitoring Buffers in a Port Group
562
Buffer Credits Switch or Blade Model
563
Maximum Configurable Distances for Extended Fabrics
564
Proxy Devices
575
Figure 70 Traffic Prioritization in a Logical Fabric
529
Figure 71 Trunk Group Configuration for the Brocade 5100
535
Table 79 Trunking over Long-Distance for the Backbones and Blades
541
Configuring Ex_Port Trunking
542
Displaying Ex_Port Trunking Information
542
Masterless Ex_Port Trunking
542
Supported Configurations and Platforms for Ex_Port
542
Trunking
542
F_Port Trunking
543
F_Port Trunking for Access Gateway
543
Disabling F_Port Trunking
549
Displaying F_Port Trunking Information
549
Enabling the DCC Policy on a Trunk Area
550
Trunking with TI Zones
550
Long-Distance Fabrics Overview
551
Managing Long-Distance Fabrics
551
Extended Fabrics Device Limitations
552
Long -Distance Link Modes
552
Configuring an Extended ISL
553
Enabling Long Distance When Connecting to TDM Devices
554
Buffer Credit Management
555
Buffer-To-Buffer Flow Control
555
Optimal Buffer Credit Allocation
556
Buffer Credit Allocation Based on Full-Size Frames
557
Fibre Channel Gigabit Values Reference Definition
557
High Availability Support for Trunking
536
Requirements for Trunk Groups
536
Supported Platforms for Trunking
536
Recommendations for Trunk Groups
537
Configuring Trunk Groups
538
Disabling Trunking on a Port or Switch
538
Enabling Trunking on a Port or Switch
538
Displaying Trunking Information
539
ISL Trunking over Long-Distance Fabrics
540
Trunk Area and Admin Domains
540
Ex_Port Trunking
541
Table 72 List of Available Ports When Implementing Pods
484
Figure 59 Minimum Configuration for 64 Gbps Icls
492
Figure 60 DCX-4S Allowed ICL Connections
494
Figure 61 ICL Triangular Topology with Brocade DCX 8510-8 Chassis
495
Core-Edge Topology
496
Setting Qos Zone-Based Traffic Prioritization
530
Disabling Qos Zone-Based Traffic Prioritization
532
Setting Qos Zone-Based Traffic Prioritization over FC Routers
532
Managing Trunking Connections
533
Trunking Overview
533
Masterless Trunking
534
Types of Trunking
534
License Requirements for Trunking
535
Port Groups for Trunking
535
Supported Configurations for Trunking
535
Table 84 Configurable Distances for Extended Fabrics
564
Downgrade Considerations
565
Buffer Credit Recovery
566
Buffer Credit Recovery over an E_Port
566
Buffer Credit Recovery over an F_Port
566
Buffer Credit Recovery over an Ex_Port
567
Enabling and Disabling Buffer Credit Recovery
567
Disabling FEC on a Long-Distance Link
568
Enabling FEC on a Long-Distance Link
568
Forward Error Correction on Long-Distance Links
568
FC-FC Routing Overview
569
Using FC-FC Routing to Connect Fabrics
569
License Requirements for FC-FC Routing
570
Supported Platforms for FC-FC Routing
570
Network os Connectivity Limitations
571
Supported Configurations for FC-FC Routing
571
Fibre Channel Routing Concepts
572
Prioritization
528
Prioritization
529
Mesh Topology
495
Supported Topologies for ICL Connections
495
Figure 64 Setting End-To-End Monitors on a Port
502
Figure 65 Mask Positions for End-To-End Monitors
504
Table 74 Maximum Number of Frame Monitors and Offsets Per Port
506
Table 75 Predefined Values at Offset 0
507
Adding Frame Monitors to a Port
508
Displaying Frame Monitors
508
Removing Frame Monitors from a Port
508
Saving a Frame Monitor Configuration
508
Clearing Frame Monitor Counters
509
Top Talker Monitors
510
Top Talker Monitors and FC-FC Routing
511
Limitations of Top Talker Monitors
512
F_Port Trunking for Brocade Adapters
545
F_Port Trunking Considerations
546
Creating a Frame Monitor
507
Deleting Frame Types
507
ICL Trunking on the Brocade DCX 8510-8 and DCX 8510-4
493
Icls for the Brocade DCX Backbone Family
493
ICL Trunking on the Brocade DCX and DCX-4S
494
Virtual Fabrics Considerations for Icls
494
Clearing EE Monitor Counters
505
Frame Monitoring
505
Creating Frame Types to be Monitored
506
Qos Zone-Based Traffic Prioritization
523
Trunking Considerations before You Install the Adaptive Networking License
523
Manually Disabling Qos on Trunked Ports
524
Qos Zones
525
Qos on E_Ports
526
Activating Ports on Demand
485
Dynamic Ports on Demand
485
Displaying the Port License Assignments
486
Enabling Dynamic Ports on Demand
486
Disabling Dynamic Ports on Demand
487
Releasing a Port from a POD Set
488
Reserving a Port License
488
Adding a Top Talker Monitor to a Port (Port Mode)
513
Adding Top Talker Monitors on All Switches in the Fabric (Fabric Mode)
513
Displaying the Top N Bandwidth-Using Flows on a Port (Port Mode)
513
Deleting a Top Talker Monitor on a Port (Port Mode)
514
Displaying Top Talking Flows for a Given Domain ID (Fabric Mode)
514
Deleting All Fabric Mode Top Talker Monitors
515
Saving and Restoring Monitor Configurations
515
Trunk Monitoring
515
Performance Data Collection
516
Adaptive Networking Overview
517
Optimizing Fabric Behavior
517
Ingress Rate Limiting
518
Disabling Ingress Rate Limiting
519
Limiting Traffic from a Particular Device
519
Qos: SID/DID Traffic Prioritization
519
Virtual Fabrics Considerations
519
License Requirements for SID/DID Prioritization
520
Advanced Performance Monitoring Overview
499
Monitoring Fabric Performance
499
Types of Monitors
499
Monitoring
500
Restrictions for Installing Monitors
500
Brocade 7800 Upgrade License
470
ICL 1St POD License
471
ICL 2Nd POD License
471
ICL Licensing
471
Chapter 19 Inter-Chassis Links
491
Icls for the Brocade DCX 8510 Backbone Family
492
Setting a Mask for an EE Monitor
503
Deleting EE Monitors
504
Displaying EE Monitor Counters
504
Appendix A Port Indexing
615
FIPS Support
615
Appendix B FIPS Support
615
FIPS Overview
615
Zeroization Functions
615
Table 86 Zeroization Behavior
616
Conditional Tests
617
FIPS Mode Configuration
617
Power-On Self Tests
617
Table 87 FIPS Mode Restrictions
617
Table 88 Table
617
LDAP in FIPS Mode
618
LDAP Certificates for FIPS Mode
620
Preparing a Switch for FIPS
621
Enabling FIPS Mode
622
Overview of Steps
622
Zeroizing for FIPS
624
Displaying FIPS Configuration
625
Hexadecimal Conversion
627
Appendix C Hexadecimal Conversion
627
Example Conversion of the Hexadecimal Triplet Ox616000
627
Decimal-To-Hexadecimal Conversion Table
628
Table 90 Decimal-To-Hexadecimal Conversion Table
628
Advertisement
Advertisement
Related Products
HP Fabric OS 7.0.0
HP StorageWorks Fabric OS 3.2.1
HP StorageWorks Fabric OS 5.x MIB
HP StorageWorks Fabric OS 5.x
HP Fabric OS v7.0.1
HP StorageWorks Fabric OS 6.2.0g
HP StorageWorks Fabric OS 6.1.2b
HP StorageWorks Fabric OS 6.2.0b
HP StorageWorks Fabric OS 3.1
HP StorageWorks Fabric OS 4.1
HP Categories
Desktop
Laptop
Server
Monitor
Switch
More HP Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL