HP Storage Essentials SRM 6.0 User Guide for Enterprise Edition and Standard Edition SRM Software (July 2008)
Provisioning Manager518
About Provisioning Brocade Switches After Upgrading
After you upgrade the management server, perform Discovery Data Collection for any subset of
elements that includes the Brocade switch before performing any provisioning operations that
involve that switch. For more information, see ”Discovering Switches, Storage Systems, NAS
Devices, and Tape Libraries” on page 19.
Managing Zones
This section contains the following topics:
• SAN Zoning Overview, page 518
• Accessing Information About Zone Aliases, page 523
• Creating a Zone Alias, page 524
• Modifying a Zone Alias, page 525
• Deleting a Zone Alias, page 526
• Accessing Information About Zoning, page 526
• Creating a Zone in a Fabric, page 527
• Adding and Removing Zone Members, page 528
• Deleting a Zone, page 528
• Accessing Information About Zone Sets, page 528
• Creating a Zone Set, page 529
• Modifying a Zone Set, page 530
• Deleting a Zone Set, page 531
• Copying a Zone Set, page 531
• Activating a Zone Set, page 532
• Zones and Zone Sets Listed Twice, page 533
• Changing the Amount of Information Collected from the Inactive Zone Database (Cisco
Switches), page 534
SAN Zoning Overview
Use SAN zoning to control what can be seen in the storage area network (SAN). SAN zoning lets
you group elements into zones, which can then be grouped into active and inactive zone sets. Only
elements in an active zone set can be seen. A switch fabric can have multiple zone sets, but only
one zone set can be active.
Uses of Zones
Zones are an excellent way to split hardware resources because they work by exclusion. For
example, you can set up your switch ports so that elements connected to some of the ports appear
in one zone and the rest appear in another zone. Members of a zone can only communicate with
other members of the same zone. If two elements are not in the same zone, they cannot
communicate.
Zones are usually created for a particular task, such as controlling access between devices or
groups. You might create zones based on an application or an operating system. For example,