Administrators Guide (Supporting Fabric OS v7.3.0) User Manual

ACL policy distribution to other switches...........................................240
Fabric-wide enforcement...................................................................241
Notes on joining a switch to the fabric...............................................242
Management interface security..................................................................... 244
Configuration examples.................................................................... 245
IPsec protocols..................................................................................246
Security associations........................................................................ 247
Authentication and encryption algorithms......................................... 247
IPsec policies.................................................................................... 248
IKE policies....................................................................................... 248
Creating the tunnel............................................................................250
Example of an end-to-end transport tunnel mode.............................251
Maintaining the Switch Configuration File............................................................................. 255
Configuration settings................................................................................... 255
Configuration file format ................................................................... 256
Configuration file backup...............................................................................257
Uploading a configuration file in interactive mode.............................257
Configuration file restoration......................................................................... 258
Restrictions....................................................................................... 258
Configuration download without disabling a switch...........................260
Configurations across a fabric.......................................................................261
Downloading a configuration file from one switch to another
switch of the same model............................................................ 262
Security considerations..................................................................... 262
Configuration management for Virtual Fabrics..............................................262
Uploading a configuration file from a switch with Virtual Fabrics
enabled........................................................................................262
Restoring a logical switch configuration using configDownload........263
Restrictions....................................................................................... 264
Brocade configuration form........................................................................... 264
Managing Virtual Fabrics...................................................................................................... 267
Virtual Fabrics overview................................................................................ 267
Logical switch overview.................................................................................268
Default logical switch.........................................................................268
Logical switches and fabric IDs.........................................................270
Port assignment in logical switches.................................................. 271
Logical switches and connected devices.......................................... 272
Management model for logical switches....................................................... 274
Logical fabric overview..................................................................................274
Logical fabric and ISLs......................................................................274
Base switch and extended ISLs........................................................ 276
Account management and Virtual Fabrics.................................................... 279
Setting up IP addresses for a logical switch..................................................279
Supported platforms for Virtual Fabrics.........................................................280
Supported port configurations in the fixed-port switches.................. 281
Supported port configurations in Brocade Backbones...................... 281
Virtual Fabrics interaction with other Fabric OS features..............................282
Limitations and restrictions of Virtual Fabrics................................................283
Restrictions on XISLs........................................................................284
Restrictions on moving ports ............................................................284
Enabling Virtual Fabrics mode...................................................................... 285
Disabling Virtual Fabrics mode..................................................................... 285
Configuring logical switches to use basic configuration values.....................286
Creating a logical switch or base switch....................................................... 287
Fabric OS Administrators Guide
9
53-1003130-01