53-1002947-01 26 July 2013 Brocade Network Advisor IP User Manual Supporting Network Advisor 12.1.
Copyright © 2010-2013 Brocade Communications Systems, Inc. All Rights Reserved. Brocade, Brocade Assurance, the B-wing symbol, DCX, Fabric OS, MLX, SAN Health, VCS, and VDX are registered trademarks, and AnyIO, Brocade One, CloudPlex, Effortless Networking, ICX, NET Health, OpenScript, and The Effortless Network are trademarks of Brocade Communications Systems, Inc., in the United States and/or in other countries.
Contents About This Document In this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxxix How this document is organized . . . . . . . . . . . . . . . . . . . . . . . . . . xxxix Supported hardware and software . . . . . . . . . . . . . . . . . . . . . . . . . . xli What’s new in this document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xlvi Document conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Connecting to the database using the ODBC client (Linux systems) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Changing the database user password . . . . . . . . . . . . . . . . . . . 23 Supported open source software products. . . . . . . . . . . . . . . . . . . . 24 Chapter 2 Licenses Licenses overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Managed count . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Adding SNMPv1 and SNMPv2c credentials . . . . . . . . . . . . . . . . 56 Adding SNMPv3 credentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Editing SNMPv1 and SNMPv2c credentials. . . . . . . . . . . . . . . . 58 Editing SNMPv3 credentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Reordering SNMP credentials in the list . . . . . . . . . . . . . . . . . . 60 Deleting SNMP credentials from the list . . . . . . . . . . . . . . . . . . 61 Default IP user credentials . . . . .
Rediscovering a previously discovered fabric . . . . . . . . . . . . .111 Deleting a host adapter from discovery . . . . . . . . . . . . . . . . . .111 Viewing the host discovery state. . . . . . . . . . . . . . . . . . . . . . . .111 Troubleshooting host discovery. . . . . . . . . . . . . . . . . . . . . . . . .112 VM Manager discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .113 VM Manager discovery requirements . . . . . . . . . . . . . . . . . . .
Server Data restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .144 Restoring data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .144 Restoring data to a new server . . . . . . . . . . . . . . . . . . . . . . . .145 Event storage settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .145 Configuring event storage . . . . . . . . . . . . . . . . . . . . . . . . . . . .145 Storing historical events purged from repository. . . . .
Fabric tracking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .187 Enabling fabric tracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .187 Disabling fabric tracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .188 Accepting changes for a fabric . . . . . . . . . . . . . . . . . . . . . . . . .188 Accepting changes for all fabrics . . . . . . . . . . . . . . . . . . . . . . .
Assigning an AD user to an AD group . . . . . . . . . . . . . . . . . . . .215 Defining user accounts on the external LDAP server . . . . . . .216 User profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 Viewing your user profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . .218 Editing your user profile. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .219 Changing your password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Top Port Encode Error Out monitor . . . . . . . . . . . . . . . . . . . . . .254 Top Port Errors monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .255 Top Port Overflow Errors monitor . . . . . . . . . . . . . . . . . . . . . . .257 Top Port Receive EOF monitor. . . . . . . . . . . . . . . . . . . . . . . . . .258 Top Port Runtime Errors monitor . . . . . . . . . . . . . . . . . . . . . . .258 Top Port Sync Losses monitor . . . . . . . . . . . . . . . . . . . . . . . . . .
IP product status icons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .303 Event icons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .303 Customizing the main window . . . . . . . . . . . . . . . . . . . . . . . . . . . . .304 Zooming in and out of the Connectivity Map . . . . . . . . . . . . .304 Exporting the topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .304 Customizing application tables . . . . . . . . . . . . . . . . . . . . . .
Chapter 10 MRP Topology MRP Topology overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .343 Viewing a MRP Topology map. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .344 Viewing a MRP ring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .345 Configuring the application to show a dashed line. . . . . . . . . . . . .347 Selecting a topology map layout . . . . . . . . . . . . . . . . . . . . . . . . . . .348 Creating a customized layout . . . . . .
Chapter 12 Third-party tools About third-party tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .377 Starting third-party tools from the application . . . . . . . . . . . . . . . .378 Launching a Telnet session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .378 Launching an Telnet session from the IP tab . . . . . . . . . . . . .378 Launching an Element Manager . . . . . . . . . . . . . . . . . . . . . . . . . . .378 Launching HCM Agent . . . . . . . . . . . . . . . .
HCM Upgrade tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .406 Upgrading HCM on the Management server . . . . . . . . . . . . . .406 Chapter 14 SAN Device Configuration Configuration repository management . . . . . . . . . . . . . . . . . . . . . .407 Saving switch configurations on demand . . . . . . . . . . . . . . . .408 Restoring a switch configuration for a selected device. . . . . .409 Scheduling switch configuration backup . . . . . . . . . . . . . . . . .
Port commissioning deployment report . . . . . . . . . . . . . . . . . .453 Administrative Domain-enabled fabric support . . . . . . . . . . . . . . .454 AD-enabled fabric discovery . . . . . . . . . . . . . . . . . . . . . . . . . . .454 Management application behavior for AD-enabled fabrics. . .454 Management application support for AD-enabled fabrics . . .455 Chapter 15 Wireless Management Wireless management overview . . . . . . . . . . . . . . . . . . . . . . . . . . .459 Wireless devices . . . . . .
VCS product groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .478 Static product group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .478 Dynamic product group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .478 Port profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .479 AMPP characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .479 Life of a port profile . . . . . . . . . .
Adapter port WWN virtualization . . . . . . . . . . . . . . . . . . . . . . . . . . .512 Configuring FAWWNs on switch ports. . . . . . . . . . . . . . . . . . . .513 FAWWNs on attached AG ports . . . . . . . . . . . . . . . . . . . . . . . . .515 Role-based access control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .518 Host adapter management privileges . . . . . . . . . . . . . . . . . . .518 Host adapter administrator privileges . . . . . . . . . . . . . . . . . . .
Enabling a DCB port or LAG. . . . . . . . . . . . . . . . . . . . . . . . . . . .546 Deleting a LAG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .547 QoS configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .547 Priority-based flow control . . . . . . . . . . . . . . . . . . . . . . . . . . . . .548 Creating a DCB map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .548 Editing a DCB map . . . . . . . . . . . . . . . . . . . .
Deleting one or more FCoE login groups . . . . . . . . . . . . . . . . .589 Disabling the FCoE login management feature on a switch . .589 Enabling the FCoE login management feature on a switch . .590 Virtual FCoE port configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . .590 Viewing virtual FCoE ports. . . . . . . . . . . . . . . . . . . . . . . . . . . . .590 Clearing a stale entry. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring the ACL configuration type and operations . . . . .644 Configuring hit statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .644 Configuring L3 ACL advanced settings . . . . . . . . . . . . . . . . . . .645 Network configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .649 Network group configuration. . . . . . . . . . . . . . . . . . . . . . . . . . .653 Service configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Activating a zone configuration. . . . . . . . . . . . . . . . . . . . . . . . .698 Deactivating a zone configuration . . . . . . . . . . . . . . . . . . . . . .700 Renaming a zone configuration . . . . . . . . . . . . . . . . . . . . . . . .700 Deleting a zone configuration . . . . . . . . . . . . . . . . . . . . . . . . . .701 Duplicating a zone configuration . . . . . . . . . . . . . . . . . . . . . . .701 Creating an offline zone database . . . . . . . . . . . . . . . . . . . . . .
Assigning thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .733 Unblocking a port. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .734 Avoiding port fencing inheritance . . . . . . . . . . . . . . . . . . . . . . .734 Editing thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .735 Editing a C3 Discard Frames threshold . . . . . . . . . . . . . . . . . .735 Editing an Invalid CRCs threshold. . . . . . . . . . . . . . . . . . .
Swapping blades . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .769 Chapter 24 IP Element Manager In this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 771 Element Manager overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 771 Element Manager using the CLI. . . . . . . . . . . . . . . . . . . . . . . . . . . . 771 Accessing the IP Element Manager CLI . . . . . . . . . . . . . . . . . .
Chapter 26 IP Configuration Wizard Configuration requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .809 Payloads. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .810 Creating a payload configuration . . . . . . . . . . . . . . . . . . . . . . . . . . .811 Duplicating a payload configuration . . . . . . . . . . . . . . . . . . . . . . . .818 Modifying a payload configuration . . . . . . . . . . . . . . . . . . . . . . . . . .
CLI configuration scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .847 Configuring a one-time deployment schedule . . . . . . . . . . . . .847 Configuring an hourly deployment schedule . . . . . . . . . . . . . .847 Configuring a daily deployment schedule . . . . . . . . . . . . . . . .848 Configuring a weekly deployment schedule. . . . . . . . . . . . . . .848 Configuring a monthly deployment schedule. . . . . . . . . . . . . .848 Configuring a yearly deployment schedule . . . . . . .
Port VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .869 Adding or modifying port VLANs . . . . . . . . . . . . . . . . . . . . . . . .869 Adding or modifying dual mode ports. . . . . . . . . . . . . . . . . . . .872 Assigning DCB ports to a VLAN . . . . . . . . . . . . . . . . . . . . . . . . .872 Adding VLAN properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .873 Modifying port VLAN properties . . . . . . . . . . . . . . . . . . . . . . . .
Deploying target actions using the VLL Manager . . . . . . . . . .918 Deploying VLL properties using the VLL Manager . . . . . . . . . .919 Scheduling deployment using the VLL Manager . . . . . . . . . . .920 Reviewing the VLL Manager summary . . . . . . . . . . . . . . . . . . .920 Reviewing the VLL Manager configuration. . . . . . . . . . . . . . . .921 Creating a new VLL instance using duplicate . . . . . . . . . . . . .921 Editing a VLL instance . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Server port statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .963 Deleting a row from the Server Port Statistics list . . . . . . . . .964 Chapter 32 Global Server Load Balancing In this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .965 GSLB Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .965 Configuration requirements . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 34 Deployment Manager Introduction to the Deployment Manager . . . . . . . . . . . . . . . . . . 1003 Editing a deployment configuration . . . . . . . . . . . . . . . . . . . . . . . 1004 Duplicating a deployment configuration . . . . . . . . . . . . . . . . . . . 1004 Deleting a deployment configuration. . . . . . . . . . . . . . . . . . . . . . 1005 Deploying a configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1005 Viewing deployment logs . . . . . . . . . . . . . . . . .
Deleting an expression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1045 Viewing Historical Graphs/Tables . . . . . . . . . . . . . . . . . . . . . 1046 Mouse functions for graphs . . . . . . . . . . . . . . . . . . . . . . . . . 1050 MIB data collectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1051 Mapping a MIB object to a unit name . . . . . . . . . . . . . . . . . 1051 IP Custom performance reports. . . . . . . . . . . . . . . . . . . . . . . . . .
Removing a frame monitor from a port . . . . . . . . . . . . . . . . . . . . 1100 Removing a frame monitor from a switch . . . . . . . . . . . . . . . . . . .1101 Chapter 37 Power Center In this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1103 Power center overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1103 Data monitoring. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1104 Viewing PoE data for products .
Policy monitor scheduling. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1152 Editing a policy monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1153 Deleting a policy monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1154 Configuration rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1154 Viewing configuration rule details. . . . . . . . . . . . . . . . . . . . . 1156 Adding a configuration rule . . . . . . . . . . . . . .
SNMP informs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1198 Enabling or disabling SNMP informs . . . . . . . . . . . . . . . . . . 1198 Syslogs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Adding a syslog recipient. . . . . . . . . . . . . . . . . . . . . . . . . . . . Removing a syslog recipient . . . . . . . . . . . . . . . . . . . . . . . . . Syslog forwarding. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
E-mailing selected event details from the Master Log . . . . 1245 Displaying event properties from the Master Log . . . . . . . . 1245 Copying part of the Master Log. . . . . . . . . . . . . . . . . . . . . . . .1247 Copying the entire Master Log . . . . . . . . . . . . . . . . . . . . . . . .1247 Exporting the Master Log . . . . . . . . . . . . . . . . . . . . . . . . . . . .1247 Filtering events in the Master Log. . . . . . . . . . . . . . . . . . . . .
IP Address report. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1281 MAC Address report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1281 IP Physical Ports - Realtime report. . . . . . . . . . . . . . . . . . . . . . . . 1282 IP Stacking Ports - Realtime report . . . . . . . . . . . . . . . . . . . . . . . 1282 IP Physical Media - Realtime report . . . . . . . . . . . . . . . . . . . . . . . 1283 IP Deployment reports . . . . . . . . . . . . . . . . . .
Appendix D User Privileges About user privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1321 About Roles and Access Levels . . . . . . . . . . . . . . . . . . . . . . . . . . 1336 Appendix E Device Properties SAN device properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1339 Viewing Fabric properties . . . . . . . . . . . . . . . . . . . . . . . . . . . 1339 Viewing SAN device properties . . . . . . . . . . . . . . . . . . . . . . .
Zoning troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1407 Appendix I Database Fields In this appendix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1409 Database tables and fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1409 Views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1615 ADAPTER_PORT_CONFIG_INFO . . . . . . . . . . . . . . . . . . . . . . .
IFL_INFO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1646 ISL_INFO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1646 ISL_TRILL_INFO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1647 ISL_TRUNK_GROUP_MEMBER_INFO . . . . . . . . . . . . . . . . . . 1649 ISL_TRUNK_INFO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1649 L2_NEIGHBOR_INFO . . . . . . . . . . . . . . . . . . . . . . . . . . . .
MANAGED_ELEMENT_INFO. . . . . . . . . . . . . . . . . . . . . . . . . . 1693 SNMP_DATA_INFO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1694 SNMP_EXPR_DATA_INFO. . . . . . . . . . . . . . . . . . . . . . . . . . . . 1694 SNMP_DATA_VIEW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1694 VM_VNETWORK_INFO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1696 VCS_CLUSTER_MEMBER_INFO. . . . . . . . . . . . . . . . . . . . . . . 1698 RESET_VCS_LICENSED . . . .
xl Brocade Network Advisor IP User Manual 53-1002947-01
About This Document In this chapter • How this document is organized . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxxix • Supported hardware and software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xli • What’s new in this document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xlvi • Document conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xlviii • Additional information . . . . . . . . . . . . . .
• Chapter 14, “SAN Device Configuration,” provides Fabric OS device configuration instructions. • Chapter 15, “Wireless Management,” provides information about wireless devices. • Chapter 16, “VCS Management,” provides information on VCS fabrics. This chapter is for Network OS devices only. • Chapter 17, “Host Management,” provides information on how to configure an HBA. This chapter is for Fabric OS devices only. • Chapter 18, “Fibre Channel over Ethernet,” provides information on how to configure FCoE.
• Chapter 39, “Fault Management,” provides event management instructions. • Chapter 40, “Packet Capture (Pcap),” provides information on how to configure switches as sensors to capture packets. • • • • Chapter 41, “Technical Support,” provides server, client, and device supportSave instructions. Chapter 42, “Reports,” provides instructions for generating reports. Appendix A, “Application menus,” provides information about the main and shortcut menus.
TABLE 1 Fabric OS-supported hardware (Continued) Device name Terminology used in documentation Firmware level required Brocade 6510 switch 48-port, 16 Gbps switch Fabric OS v7.0.0 or later Brocade 6520 switch 96-port, 16 Gbps switch Fabric OS v7.1.0 or later Brocade 6547 embedded switch 48-port, 16 Gbps embedded switch Fabric OS v7.2.
TABLE 2 IronWare-supported hardware (Continued) Device name Terminology used in documentation Firmware level required FastIron CX 624S (FCX624S) Ethernet L2/L3 Edge switch, 24 1GbE RJ45 ports FastIron 06.0.00 and later FastIron CX 648S (FCX648S) Ethernet L2/L3 Edge switch, 48 1GbE RJ45 ports FastIron 06.0.00 and later FastIron CX 624S-HPOE (FCX624S-HPOE) Ethernet L2/L3 Edge switch, 24 1GbE RJ45 ports, 24 POE+ ports FastIron 06.0.
TABLE 2 IronWare-supported hardware (Continued) Device name xliv Terminology used in documentation Firmware level required ICX 6450-24 Premium router 24-port Campus LAN Premium router FastIron 07.4.00 and later ICX 6450-24-HPOE switch 24-port Campus LAN HPOE switch FastIron 07.4.00 and later ICX 6450-24-HPOE Base L3 router 24-port Campus LAN HPOE Base L3 router FastIron 07.4.00 and later ICX 6450-24-HPOE Base router 24-port Campus LAN HPOE Base router FastIron 07.4.
TABLE 2 IronWare-supported hardware (Continued) Device name Terminology used in documentation FastIron Edge X 648 Enterprise LAN Edge switch, 48 10/100/1000 Mbps ports FastIron Edge X 424HF Enterprise LAN Edge switch, 20 100/1000 Mbps SFP ports FastIron Edge X 624HF Enterprise LAN Edge switch, 20 100/1000 Mbps SFP ports FastIron WS devices Enterprise Campus switch Firmware level required Motorola Controllers RFS4000 series Wireless controller Mobility 5.
TABLE 2 IronWare-supported hardware (Continued) Device name Terminology used in documentation Firmware level required Brocade 6650 Base L3 Router Data Center base L3 router FastIron 7.5 and later Brocade 6650 Router Data Center router FastIron 7.5 and later 1 The Management application cannot discover or manage wireless access points running Mobility 5.1. Network OS hardware and software support Network Advisor 12.1.X supports the Network OS 3.0 firmware platform.
- Private VLAN Report Template Manager (IP) Server Management console — Common Access Card Authentication (new) Performance — Performance database views Fault Management — Master Log filters Zoning — Support for LSAN tagging configured through the CLI (Management application displays the tags) • Information that was changed: - View management — changes to Accept changes dialog box - Dashboard — Port status widgets and performance monitors enhancements - FICON — Cascaded FICON fabric merge - Deployment dia
Document conventions This section describes text formatting conventions and important notice formats used in this document.
Notice to the reader This document may contain references to the trademarks of the following corporations. These trademarks are the properties of their respective companies and corporations. These references are made for informational purposes only. Corporation Referenced trademarks and products Linus Torvalds Linux Microsoft Corporation Windows, Windows NT, Internet Explorer Netscape Communications Corporation Netscape Red Hat, Inc.
Other industry resources For additional resource information, visit the Technical Committee T11 website. This website provides interface standards for high-performance and mass storage applications for Fibre Channel, storage management, and other applications: http://www.t11.org For information about the Fibre Channel industry, visit the Fibre Channel Industry Association website: http://www.fibrechannel.
Getting technical help Contact your switch support supplier for hardware, firmware, and software support, including product repairs and part ordering. To expedite your call, have the following information available: 1. Management Application Serial Number To obtain the Management application serial number, select Help > License. The License dialog box displays. 2.
lii Brocade Network Advisor IP User Manual 53-1002947-01
Chapter Getting Started 1 In this chapter • User interface components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 • Management server and client. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 • Accessibility features for the Management application . . . . . . . . . . . . . . . . 16 • PostgreSQL database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 • Supported open source software products . . . . .
1 User interface components FIGURE 1 Main window 1. Menu bar — Lists commands you can perform on the Management application. The available commands vary depending on which tab (IP or Dashboard) you select. For a list of available commands, refer to Appendix A, “Application menus”. 2. Toolbar — Provides buttons that enable quick access to dialog boxes and functions. The available buttons vary depending on which tab (IP or Dashboard) you select.
Management server and client 1 Management server and client The Management application has two parts: the Server and the Client. The Server is installed on one machine and stores device-related information; it does not have a user interface. To view information through a user interface, you must log in to the Server through a Client. The Server and Clients may reside on the same machine, or on separate machines. If you are running Professional, the server and the client must be on the same machine.
1 Management server and client 5. Click Login. 6. Click OK on the Login Banner dialog box. The Management application displays. Launching a remote client To launch a remote client, complete the following steps. 1. Open a web browser and enter the IP address of the Management application server in the Address bar. If the web server port number does not use the default (443 if is SSL Enabled; otherwise, the default is 80), you must enter the web server port number in addition to the IP address.
Management server and client 1 Clearing previous versions of the remote client The remote client link in the Start menu does not automatically upgrade when you upgrade the Management application. You must clear the previous version from the Java cache. To clear the Java cache, complete the following steps. 1. Select Start > Settings > Control Panel > Java. The Java Control Panel dialog box displays. 2. Click View on the General tab. The Java Cache Viewer dialog box displays. 3.
1 Management server and client 4. Complete the following steps on the FTP/SCP/SFTP Server screen. a. Choose one of the following options: • Select Built-in FTP/SCP/SFTP Server to configure an internal FTP/SCP/SFTP server and select one of the following options: - Select Built-in FTP Server to configure an internal FTP server The internal FTP server uses a default account and port 21. You can configure your own account from the Options dialog box.
Management server and client a. Select an address from the Server IP Configuration list. b. Select an address from the Switch - Server IP Configuration Preferred Address list. 1 NOTE If the “hostname” contains invalid characters, the host name does not display in the list. Valid characters include alphanumeric and dash (-) characters. The IP address is selected by default. If the an IPv6 address is selected, server start up will fail.
1 Management server and client NOTE For Trial and Licensed software, the server requires 18 consecutive free ports beginning with the starting port number. e. Enter a port number in the Syslog Port Number field (default is 514). NOTE If the default syslog port number is already in use, you will not receive any syslog messages from the device. To find and stop the process currently running on the default Syslog port number, refer to the Installation and Migration Guide. f.
Management server and client 1 Viewing active sessions To view the Management application active sessions, complete the following steps. 1. Select Server > Active Sessions. The Active Sessions dialog box displays (Figure 5). FIGURE 4 Active Sessions dialog box 2. Review the active session information. The following information displays: • • • • • ID — Displays the name of the user (for example, Administrator). Description — Displays the description of the user (for example, Operator).
1 Management server and client Viewing server properties To view the Management application server properties, complete the following steps. 1. Select Server > Server Properties. The Server Properties dialog box displays. FIGURE 5 Server Properties dialog box 2. Review the information. TABLE 4 Server Properties Field/Component Description Free Memory The amount of free memory on the server. IP Address The IP address in IPv4 or IPv6 format. Java VM Name The Java Virtual Machine name.
Management server and client 1 Viewing port status The Port Status dialog box enables you to determine the availability of ports required for key Management application features.
1 Management server and client • Running Process – The name of the process using the port (not the Management applciation). Blank when the port is only used by the Management applciation server. If multiple processes occupy the same port, the process names display in a comma-separated list. • Recommended Actions — Suggested action to take to resolve the issues. 3. Click Close.
Management server and client TABLE 5 1 Port usage and firewall requirements (Continued) Port Number Ports Transport Description Communication Path Open in Firewall 492 TACACS+ Authentication port TCP TACACS+ server port for authentication if you use TACACS+ as an external authentication Server–TACACS+ Server Yes 69 TFTP UDP File upload/download to product Product-Server Yes 802 Management application HTTP server TCP Non-SSL HTTP/1.
1 Management server and client TABLE 5 Port usage and firewall requirements (Continued) Port Number Ports Transport Description Communication Path Open in Firewall 6362 LDAP Authentication SSL port TCP LDAP server port for authentication if you use LDAP as an external authentication and SSL is enabled Server–LDAP Server Yes 18122 RADIUS Authentication Server Port UDP RADIUS server port for authentication if you use RADIUS as an external authentication Server–RADIUS Server Yes 18132 RAD
Management server and client TABLE 5 1 Port usage and firewall requirements (Continued) Port Number Ports Transport Description Communication Path Open in Firewall 246092 Reserved for future use TCP Not used Client - Server No 2 Reserved for future use TCP Not used Client - Server No 246112 JBoss Transaction Services Recovery Manager port TCP Not used remotely Server Yes 246122 JBoss Transaction Status Manager port TCP Not used remotely Server Yes 246132 JBoss Pooled invoke
1 Accessibility features for the Management application Accessibility features for the Management application Accessibility features help users who have a disability, such as restricted mobility or limited vision, to use information technology products successfully. The following list includes the major accessibility features in the Management application: • Keyboard shortcuts • Look and Feel Keyboard shortcuts You can use the keystrokes shown in the table below to perform common functions.
Accessibility features for the Management application 1 Look and feel customization You can configure the Management application to mimic your system settings as well as define the size of the font. ‘Look’ refers to the appearance of graphical user interface widgets and ‘feel’ refers to the way the widgets behave.
1 PostgreSQL database Changing the font size The Options dialog box enables you to change the font size for all components including the Connectivity map of the Management application interface. Font size changes proportionately in relation to the system resolution. For example, if the system resolution is 1024 x 768, the default font size would be 8 and large font size would be 10. 1. Select Server > Options. The Options dialog box displays. 2. Select Look and Feel in the Category list. 3.
PostgreSQL database 1 4. Enter the port number (default is 5432) on which the PostgreSQL server is running in the Port field. 5. Enter your username (default is dcmuser) in the Username field. 6. Enter your password (password) in the Password field. 7. Click OK on the New Server Registration dialog box. The pgAdmin III application displays. 8. To browse data in the database, complete the following steps. a. Expand the Tables tree in the Object browser pane. b.
1 PostgreSQL database 7. Click Add. The Create a New Data Source dialog box displays. 8. Select PostgreSQL Unicode. 9. Click Finish. The PostgreSQL Unicode ODBC Driver (psqlODBC) Setup dialog box displays. 10. Enter a name for the data source in the Datasource field. 11. Enter the description of the database in the Description field. 12. Enter the name of the database in the Database field. 13.
PostgreSQL database 1 Installing the ODBC driver on Linux systems To install the ODBC driver and , complete the following steps. 1. Execute the following command in the terminal: > su >chmod 777 edb_psqlodbc.bin > ./edb_psqlodbc.bin 2. On the Setup psqlODBC screen click Next. 3. Install the file to the usual location for your system’s application files (for example, /opt/PostgreSQL/psqlODBC) on the Installation Directory screen and click Next.
1 PostgreSQL database Testing the connection on Linux systems To test the connection, complete the following steps. 1. Download and install Open Office. 2. Select File > New > Database. The Database Wizard displays. 3. On the Select database screen, complete the following steps. a. Select the Connect to an existing database option. b. Select ODBC from the list. c. Click Next. 4. On the Set up ODBC connection screen, complete the following steps. a. Click Browse. The datasource saved in the odbc.
PostgreSQL database 1 Changing the database user password To change the read/write or read only database password, complete the following steps in the Install_Home/bin directory. 1. Open a command window. 2. Type dbpassword User_Name Password New_Password Confirm_Password and press Enter. Where User_Name is your user name, Password is your current password, and New_Password and Confirm_Password are your new password.
1 Supported open source software products Supported open source software products Table 9 lists the open source software third-party software products used in this release. TABLE 9 24 Open source software third-party software products Open Source Software License Type 7-ZipLZMASDK 4.65 public domain Abator 1.1 Apache License v2.0 ApacheAnt 1.7.1 Apache License v2.0 ApacheCommonsBeanUtils 1.8.1 Apache License v2.0 ApacheCommonsCodec 1.4 Apache License v2.0 ApacheCommonsCollections 3.2.
Supported open source software products TABLE 9 1 Open source software third-party software products Open Source Software License Type dom4j 1.6.1 dom4j License EnterpriseDTFTP 1.5.6 LGPL GlazedLists 1.8.0 LGPL or MPL GoogleGuice 1.0 Apache HPInsightSoftwareVCEMWebClientSDK 6.2 HP SOFTWARE DEVELOPMENT KIT LICENSE AGREEMENT HornetQ 2.0.0 Apache License v2.0 iBATISDAOFramework 2.2.0 Apache iBatisforJava 2.3.4 Apache License v2.0 Infinispan 4.0.0 FINAL LGPL v2.
1 Supported open source software products TABLE 9 26 Open source software third-party software products Open Source Software License Type OpenSAML 2.3.0 Apache License v2.0 OpenSSLforLinux 1.0.0a OpenSSL License PostgreSQL 9.2.1 PostgreSQL License QualityFirstLibrary 0.99.0 Mozilla License V1.1 and qflib License Quartz Enterprise Job Scheduler 1.66 Apache License v2.0 RockSawRawSocketLibrary 1.0.0 Apache License v2.0 SafeNet Sentinel Caffe 1.6.
Chapter 2 Licenses In this chapter • Licenses overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Managed count . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Entering the license key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Upgrading the Management application . . . . . . . . . . . . . . . . . . . . . . . . . . . . • License downgrade . . . . . . . . . . . . .
2 Managed count Managed IP port count calculation NOTE If you exceed the maximum port count for your version, software functionality is impacted and you must reduce the port count using the Discover Setup - IP dialog box or contact your vendor to purchase an additional license for your version. The managed IP port count is calculated using the following rules: • • • • Only ports discovered from the IP tab are counted. The port must be a physical port.
Entering the license key 2 • Each set of three IronWare Ethernet Carrier router and/or Ethernet Edge router devices with an MPLS license are counted as one MPLS device. You must discover three devices before the Management application counts one MPLS device. NOTE Each IronWare Ethernet Carrier router or Ethernet Edge router device counts as one device in the Managed IP product count calculation.
2 Entering the license key 3. Click Update to extract the new license information. Review the new information in the License dialog box fields. • License Key — License keys consist of an asterisk (*) followed by unique string of alphanumeric characters. License keys verify ownership of the Management application software as well as determine the maximum port count allowed or any additional features that you receive as part of the license.
Upgrading the Management application 2 Upgrading the Management application The quickest and simplest method of moving from one version to another is to enter the new license information on the License dialog box. The following tables list the available upgrade paths.
2 License downgrade 5. Choose one of the following options: • If you configured authentication to CAC, enter your PIN in the CAC PIN field. • If you configured authentication to the local database, an external server (RADIUS, LDAP, or TACACS+), or a switch, complete the following steps. a. Enter your user name and password. The defaults are Administrator and password, respectively. NOTE Do not enter Domain\User_Name in the User ID field for LDAP server authentication. b.
License downgrade 2 Downgrading the MPLS product count You can downgrade from a license with MPLS to a license without MPLS. You can also downgrade from a license that allows more MPLS devices to a licence that allows fewer MPLS devices. The following table list the available downgrade paths.
2 License downgrade Downgrading to a license without Ethernet fabrics The following table list the available downgrade paths.
License downgrade 2 2. Browse to the license key file (.xml) in the License Key field and click Update. A message displays that details the support that will no longer be available after the license update. 3. Click Yes on the message to continue. The client closes after updating the license successfully. Restart the client for the changes to take effect.
2 36 License downgrade Brocade Network Advisor IP User Manual 53-1002947-01
Chapter 3 Patches In this chapter • Installing a patch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 • Uninstalling a patch. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 Installing a patch The patch installer enables you to update the Management application between releases. Each patch installer includes the previous patches within a specific release. For example, patch F (11.X.
3 Uninstalling a patch • Extracts patch files to the Install_Home folder. • Creates a back up (zip) of the original files to be updated and copies the zip file to the Install_Home\patch-backup directory (for example, Install_Home\patch-backup\na_11-3-0a.zip). The first time you apply a patch, the back up patch zip file uses the following naming convention: _-- .zip (for example, Install_Home\patch-backup\na_11-3-0a.zip).
Uninstalling a patch 3 6. Copy the artifact from the extracted folder to the source folder in the Install_Home/patch-backup directory. 7. Repeat step 5 and 6 for all artifacts listed in the restore.xml folder. 8. Go to the Install_Home/conf directory. 9. Open the version.properties file in a text editor. 10. Change the patch version (patch.version) value to the reverted patch (for example, if you are reverting from patch F to patch C then patch.version = c).
3 40 Uninstalling a patch Brocade Network Advisor IP User Manual 53-1002947-01
Chapter 4 Discovery In this chapter • IP discovery overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 • VDX/VCS discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 • Logical chassis cluster mode discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 • Configuring IP profile discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 • Configuring IP simple discovery . .
4 IP discovery overview Discovery is the method that the Management application uses to find data networking devices on the network. When the Management application discovers devices, it finds all IP addresses on a device and stores them in the Management application database. The Management application uses the primary address of a product to communicate with the product.
IP discovery overview 4 After creating the list of candidate IP addresses, discovery uses multiple threads to probe devices. You can define how many threads can be used at one time. Threads operate in parallel, so communication to multiple devices occurs simultaneously. Each thread takes one address from the list of candidate IP addresses and probes it. The first step in probing is to determine whether the device is reachable or not. Discovery provides two methods to determine reachability.
4 IP discovery overview Discovery of IPv6 addresses The Management application discovers both IPv4 and IPv6 addresses of devices that have the IPv6 MIB objects implemented. The Management application discovers IPv4 addresses of devices running IPv6 that do not have IPv6 MIB support. For more information, refer to “Defining global setting preferences” on page 69. NOTE IronWare IPv6 devices must support the set of MIBs presented in Table 16 on page 44.
IP discovery overview TABLE 16 4 Required MIB support for IronWare OS devices (Continued) IETF standard MIB name Required MIB object Data collected RFC 2465 IPv6-MIB ipv6MIBObjects ipv6NetToMediaTable ipv6MIBObjects.ipv6AddrTable From ipv6MIBObjects and ipv6NetToMediaTable for interface level information: • ifName/ifDescr • ifAlias • ifType • ifMtu • ifSpeed • ifPhysAddress • ifAdminStatus • ifOperStatus • ifLastChange From ipv6MIBObjects.
4 IP discovery overview Table 17 provides a list of MIB support required for third-party devices. TABLE 17 Required MIB support for third-party devices IETF standard MIB name Required MIB object Data collected RFC 1213 MIB-II mib-2.system mib-2.interfaces.ifTable mib-2.ip.ipAddrTable From mib-2.interfaces.ifTable for interface level information: • ifName/ifDescr • ifAlias • ifType • ifMtu • ifSpeed • ifPhysAddress • ifAdminStatus • ifOperStatus • ifLastChange From mib-2.ip.
VDX/VCS discovery TABLE 17 4 Required MIB support for third-party devices (Continued) IETF standard MIB name Required MIB object Data collected RFC 4133 ENTITY-MIB entPhysicalTable entAliasMappingTable (if available) For module (line card) information: Entire entPhysicalTable Entire entAliasMappingTable, if available RFC 4293 IP-MIB mib2.ip.
4 VDX/VCS discovery VCS devices use the following to determine reachability: • Reachable — The VDX/VCS product is online and is accessible by ICMP, Netconf, and SNMP; therefore, it is reachable. • Degraded Link — The VDX/VCS product is not accessible by one of the following: ICMP, Netconf, or SNMP. • Not Reachable — The VDX/VCS product is offline and is not accessible by any of the following: ICMP, Netconf, and SNMP. The following sections detail the VDX/VCS discovery behavior.
VDX/VCS discovery 4 • When you discover any member in a VCS fabric through individual IP device discovery, that member acts as the seed switch and discovers all other members in the VCS fabric. The principal switch of the VCS fabric displays as a VCS fabric. The VCS fabric members display as individual L2 (DCB) devices.
4 Logical chassis cluster mode discovery VCS fabric split and merge • If the seed switch looses connectivity with the VCS fabric but is still reachable from the Management application, the Management application selects another member of the VCS fabric to act as the seed switch and manages the original seed switch as a separate VCS fabric. When the original seed switch rejoins the original VCS fabric, the Management application uses the original seed switch as the seed switch for the merged VCS fabric.
Logical chassis cluster mode discovery 4 Logical chassis cluster discovery includes the following behavior: • Manual- or profile-based discovery is the same as for a cluster in fabric cluster mode. • Uses the IP address of any member of the logical chassis cluster for discovery. • Sets the cluster IP address to the IP address of the principal node. NOTE You can change the principal node for the cluster by running the logical-chassis principal-priority command from the NOS prompt.
4 Logical chassis cluster mode discovery Administratively removing a node from a logical chassis cluster You can remove a node from a logical chassis cluster by using the Network OS command line interface. For instructions, refer to the Network OS Administrator’s Guide and the Network OS Command Reference, versions 4.0 or later. Once the node is removed, all configurations corresponding to that node are removed from the cluster configuration database.
HyperEdge stack discovery FIGURE 10 4 Discover Setup - IP dialog box after rediscovery How the Management application handles a cluster mode change In Network OS release 4.0, an administrator can change the mode of a cluster from fabric cluster mode to logical chassis cluster mode, and vice versa. For instructions, refer to the Network OS Administrator’s Guide and the Network OS Command Reference. NOTE All cluster-specific configurations are lost during a cluster-mode change.
4 Configuring IP profile discovery Configuring IP profile discovery NOTE You must have the All IP Products AOR (area of responsibility) in your user account to discover new products. For more information about user accounts, refer to “User accounts” on page 196. To configure profile discovery, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. FIGURE 11 Discover Setup - IP dialog box 2. Click the Global Settings tab. 54 a.
Configuring IP simple discovery 4 3. Click the Profiles tab. a. To create a discovery profile, refer to “IP discovery profiles” on page 73. b. To include and exclude product types, refer to “IP Object identifier filters” on page 67. c. To include and exclude devices and enable ping sweep, refer to “Configuring address ranges” on page 75. d. To configure profile preferences, refer to “Configuring advanced discovery profile preferences” on page 87. 4. Click Start to start discovery.
4 IP SNMP credentials When a device is contacted, discovery tries the credentials in the order that they are listed on the SNMP tab on the Global Setting tab of the Discover Setup - IP dialog box until it finds one that matches the credentials on the device. Discovery tries the SNMPv3 credentials first. If none of the SNMPv3 credentials work, discovery tries the SNMPv1 and SNMPv2c credentials. Discovery must detect the read only credentials to proceed to the read-write credentials.
IP SNMP credentials 4 6. Click the right arrow button to add the read-write community string to the Selected Read-Write Community Strings list. NOTE Discovery uses the read-write community string to detect both SNMP read and SNMP write community strings. If the devices use multiple community strings, use the Up or Down buttons to place the most commonly used community string at the top of the Selected Read-Write Community Strings list to make discovery run more efficiently.
4 IP SNMP credentials 5. Enter the SNMPv3 user name in the User ID field. The user name can be from 1 through 16 characters long, case sensitive, and allows all printable ASCII characters. 6. Select one of the following protocols from the Authentication Protocol list: • None • HMAC_MD5 • HMAC_SHA 7. Enter the SNMPv3 authentication password in the Authentication Password field. The password can be from 8 through 16 characters long, case sensitive, and allows all printable ASCII characters.
IP SNMP credentials 4 5. Enter a unique label to identify the community string in the Display Label field the Add/Edit Read-Write Community Strings area. This label can be from 1 through 16 characters long, case sensitive, and allows all printable ASCII characters. 6. Enter the unique community string in the Community Strings field. The community string can be from 1 through 16 characters long, case sensitive, and allows all printable ASCII characters. The string displays as asterisks. 7.
4 IP SNMP credentials 7. Select one of the following protocols from the Authentication Protocol list: • None • HMAC_MD5 • HMAC_SHA 8. Enter the SNMPv3 authentication password in the Authentication Password field. The password can be from 8 through 16 characters long, case sensitive, and allows all printable ASCII characters. The password display as asterisks. 9.
Default IP user credentials 4 5. Click Apply to save your work. 6. Click Close to close the Discover Setup - IP dialog box. 7. Click Yes on the confirmation message. Deleting SNMP credentials from the list To delete an entry from the SNMPv3 read-write credentials or SNMPv1 or SNMPv2c read-write community strings lists, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Click the Global Settings tab. 3. Click the SNMP tab. 4.
4 Default IP user credentials • Enable Super User — The super user enable password configured on the device for Telnet login. You can configure the super user enable password by using the enable super-user-password CLI command. The super user enable password can be used to authenticate users with the super user privilege configured on the device. You can define more than one password for each password type. Discovery uses the passwords in the order they are listed when it probes the devices.
Default IP user credentials 4 c. Enter the user password in the Password field. d. Click the right arrow button. e. If the devices use multiple user names and passwords, use the Up or Down buttons to place the most commonly used at the top of the Login Prompt list to make discovery run more efficiently. 5. Enter an enable prompt user name and password by selecting Read/Write Enable Prompt from the Credential Type list and completing the following steps. FIGURE 16 a.
4 Default IP user credentials d. 7. If the devices use multiple user names and passwords, use the Up or Down buttons to place the most commonly used at the top of the Enable Super User list to make discovery run more efficiently. Click Apply to save your work. 8. Click Close to close the Discover Setup - IP dialog box. 9. Click Yes on the confirmation message. Editing login prompt user credentials To edit a login prompt user name and password, complete the following steps. 1.
Default IP user credentials 4 5. Select the user credential entry you want to edit in the Login Prompt List and click the left arrow button. The selected credentials display in the Add/edit Login Prompt area. 6. Edit the unique label to identify the credentials in the Display Label field. This label can be from 1 through 200 characters long, case sensitive, and allows all printable ASCII characters. 7. Edit the user name in the User ID field. 8. Edit the user password in the Password field. 9.
4 Default IP user credentials Reordering user credentials in the list Discovery tries the user credentials in order until one set of credentials is found that works, so place the most common ones first. To rearrange the user credentials, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Click the Global Settings tab. 3. Click the Default Passwords tab. 4.
IP Object identifier filters 4 IP Object identifier filters The object identifier (OID) filter allows you to select which product types to include or exclude from discovery. If you add a third-party product OID to the Included Product Types list during discovery and later move it to the Excluded Product Types list, note that you will not be able to discover a new device with that product OID.
4 IP Object identifier filters 5. In the top Add/Edit Product Types area, choose one of the following options: • Enter the device’s sysObjectID you want to include in the Product Type list. • Select an existing device sysObjectID from the Product Type list. Table 18 lists the default third party product types. TABLE 18 Default third-party product types Product sysObjectID Vendor .1.3.6.1.4.1.9. Cisco .1.3.6.1.4.1.4874. Juniper .1.3.6.1.4.1.2636.1. Juniper 6.
Defining global setting preferences 4 Deleting product types from the list To delete an entry from the Included Product Types or Excluded Product Type list, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Click the Global Settings tab. 3. Click the OID Filter tab. 4. Select an entry from the Included Product Types or Excluded Product Type list and click the left arrow button. 5. Click Apply to save your work. 6.
4 Defining global setting preferences 5. Select one of the following Ping Type options: • ICMP Ping (default). Go to step 7. • TCP Ping. Continue with step 6. 6. Enter the TCP port number (from 1 through 65536) in the TCP Ping Port field. The default is 23. 7. Enter the number of times (from 0 through 10) to ping the device when ping is unsuccessful in the Ping Retries field. The default is 0. 8. Select the Enable lazy polling check box to periodically rediscover all devices in the database.
Configuring event-based collection 4 12. Select the Prefer loopback addresses for products check box to enable discovery to choose an IP address associated with a router loopback interface to be the router primary IP address. Clear the check box to configure discovery to select the original IP address used to discover the device. 13. Select the Import SSL Certificate and Key check box to enable discovery to download and synchronize certificates from SSL capable Application products. 14.
4 Configuring event-based collection d. Select the Enable event triggered polling check box to enable adaptive discovery on the predefined SNMP traps. NOTE This settings cannot be disabled for DCB switches. NOTE Network OS devices must be running version 4.0 or later to enable this setting. NOTE For Network OS devices, adaptive discovery is also performed for Syslog events. The lazy polling function sends login and log messages to the Master Log and the switch console.
IP discovery profiles 4 IP discovery profiles NOTE You cannot configure a discovery profile if you do not have the All IP Products AOR (area of responsibility) in your user account. A discovery profile contains the settings you configure when discovery is run. These settings include address range parameters, ping sweep parameters, SNMP settings, default passwords, and other settings. The Management application is shipped with a default discovery profile named “Default”.
4 IP discovery profiles 3. Click Add. A new row (named “new_profile”) displays in the Discovery Profiles table. 4. Click “new_profile” in the Profile Name field to enter a unique name for the profile. This name can be from 1 through 255 characters long, case sensitive, and allows all printable ASCII characters. 5. Click the Address Ranges tab to configure address ranges for the profile. For step-by-step instructions, refer to “Configuring address ranges” on page 75. 6.
IP discovery profiles 4 5. Click the Address Ranges tab to configure address ranges for the profile. For step-by-step instructions, refer to “Configuring address ranges” on page 75 or “Editing address ranges” on page 79. 6. Click the Scheduling tab to configure a discovery schedule for the profile. For step-by-step instructions, refer to “Scheduling discovery” on page 81. 7. Click the Preferences tab to configure preferences for the profile.
4 IP discovery profiles 7. Exclude an address range by choosing one of the following options: • To exclude an address range using the CIDR subnet format, refer to “Excluding CIDR subnet addresses” on page 78. • To exclude an address range using the subnet format, refer to “Excluding subnet addresses” on page 78. • To exclude an address range using the address range format, refer to “Excluding IP addresses” on page 79.
IP discovery profiles 4 Adding subnet addresses To add subnet addresses (IPv4 only), complete the following steps. 1. Select Subnet from the Entry Type list. FIGURE 22 Include Subnet 2. Enter the IP address in the IP Address field. 3. Enter the subnet mask in the Subnet Mask field. 4. To exclude an address range using the Subnet format, refer to “Excluding subnet addresses” on page 78. 5. To finish configuring the address ranges, return to “Configuring address ranges” on page 75.
4 IP discovery profiles Excluding CIDR subnet addresses To exclude CIDR subnet addresses (IPv4 and IPv6), complete the following steps. 1. Select CIDR Subnet from the Entry Type list. FIGURE 24 Exclude CIDR Subnet 2. Enter the IP address in the IP Address field. 3. Enter the subnet mask bits in the Subnet Mask Bits field. For IPv4, the subnet mask bits is between 0 and 32. For IPv6, the subnet mask bits is between 0 and 128. 4.
IP discovery profiles 4 Excluding IP addresses NOTE To exclude a VCS fabric, you must add all members of the VCS fabric to the exclude list. To exclude an IP address range (IPv4 and IPv6), complete the following steps. 1. Select IP Address from the Entry Type list. FIGURE 26 Exclude Address Range 2. Enter the first IP address in the range in the first IP Address field. 3. Enter the last IP address in the range in the second IP Address field. 4.
4 IP discovery profiles 8. To edit an excluded address range, select the address range you want to edit in the Excluded IP Addresses list. 9. Click the left arrow button to display the address range details in the bottom Add/Edit IP Addresses area. 10. Edit the excluded address range by choosing one of the following options: • To edit the excluded addresses using the CIDR subnet format, refer to “Editing CIDR subnet addresses” on page 80.
IP discovery profiles 4 Scheduling discovery You can create multiple schedules (to a maximum of 32) for each profile. When it is time for a schedule to run, discovery handles schedules in the following manner: • If discovery is already running for the profile, the scheduled discovery drops. • If discovery is already running for a different profile, the scheduled discovery is queued. Once all discovery jobs in the queue finish, the scheduled discovery runs.
4 IP discovery profiles Configuring a one-time discovery schedule To configure a one-time discovery schedule, complete the following steps. 1. Select One Time from the Frequency list. FIGURE 28 Scheduling tab - One Time 2. Select the time of day you want discovery to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. 3. Click the Date list to select a date from the calendar. 4.
IP discovery profiles 4 Configuring a daily discovery schedule To configure a daily discovery schedule, complete the following steps. 1. Select Daily from the Frequency list. FIGURE 30 Scheduling tab - Daily 2. Select the time of day you want discovery to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. 3. Click the right arrow button to add the schedule to the Scheduled Discovery Cycles list. 4.
4 IP discovery profiles Configuring a monthly discovery schedule To configure a monthly discovery schedule, complete the following steps. 1. Select Monthly from the Frequency list. FIGURE 32 Scheduling tab - Monthly 2. Select the time of day you want discovery to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. 3.
IP discovery profiles 4 Suspending a discovery schedule To suspend a discovery profile schedule, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Click the Profiles tab 3. Select the profile for which you want to suspend a discovery schedule in the Discovery Profiles table and click the Scheduling tab. 4. Select the schedule you want to suspend in the Scheduled Discovery Cycles list and click the left arrow button. 5.
4 IP discovery profiles 7. Rearrange schedules in the Scheduled Discovery Cycles list by selecting an item in the list and clicking the Up or Down buttons to move it. 8. Click Apply to save your changes. 9. Click Close to close the Discover Setup - IP dialog box. 10. Click Yes on the confirmation message. Editing a one-time discovery schedule To edit a one-time discovery schedule, complete the following steps. 1. Select the time of day you want discovery to run from the Time (hh:mm) lists.
IP discovery profiles 4 3. Click the right arrow button to add the schedule to the Scheduled Discovery Cycles list. 4. To finish editing the discovery schedule, return to “Editing a discovery schedule” on page 85. Editing a monthly discovery schedule To edit a monthly discovery schedule, complete the following steps. 1. Select the time of day you want discovery to run from the Time (hh:mm) lists.
4 IP discovery profiles FIGURE 34 Preferences tab 4. Enter the maximum number (from 1 through 100) of simultaneous connections to devices allowed by discovery in the Maximum Threads field. 5. Enter the name of the file that contains specific IP addresses to probe in the Discovery Address File field. The file supports both IPv4 and IPv6 addresses. This file must be located in the Install_Home\conf\discovery\ip folder on the server. The default file is the discovery_addrs.
IP discovery profiles 4 Deleting a discovery profile You can delete any of the discovery profiles except the “Default” profile. To delete a discovery profile, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Click the Profiles tab. 3. Select the profile you want to delete in the Discovery Profiles table and click Delete. 4. Click Apply to save your changes. 5. Click Close to close the Discover Setup - IP dialog box. 6.
4 IP discovery profiles 3. Select the discovery profile on which you want to start discovery in the Discovery Profiles table and click Start. 4. Click Close to close the Discover Setup - IP dialog box. 5. Click Yes on the confirmation message. Starting discovery automatically To run discovery for a profile at startup, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Click the Profiles tab. 3.
IP discovery profiles 4 3. Review the status in the Status column of the Discovery Profiles table. Status updates dynamically for any changes. Options include the following statuses: • • • • • Running — Discovery is in progress for the profile. Waiting — Discovery will start for this profile once the current profile discovery completes. Scheduled — Discovery will be run for this profile at the scheduled time. Idle — Discovery is not running.
4 IP discovery profiles 7. Click Send to send the report. 8. Click Close to close the Discover Setup - IP dialog box. 9. Click Yes on the confirmation message. Exporting discovery reports To export a report for a discovery profile, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Click the Profiles tab. 3. Select the discovery profile for which you want to export a report in the Discovery Profiles table and click Report. 4.
Individual IP device discovery 4 Individual IP device discovery Simple discovery discovers the device with a specific IP address. It is triggered by device configuration changes on SNMP traps, certain configuration deployments to a device, and adding device or rediscovering a device. Adding an IP device to discovery NOTE You cannot discover new products if you do not have the All IP Products AOR (area of responsibility) in your user account.
4 Individual IP device discovery • Also try these settings — Select to use specific SNMP settings to contact the device. If you do not enter SNMP settings or if the settings do not authenticate on the device, the application uses the SNMP settings configured in the Global Settings tab to contact the device. NOTE You can configure both SNMPv3 and SNMPv1/SNMPv2c credentials at the same time; however, discovery tries the SNMPv3 credentials before trying the SNMPv1 and SNMPv2c credentials. 5.
Individual IP device discovery f. 4 Enter the privacy password in the Privacy Password field. The password can be from 1 through 16 characters long, case sensitive, and allows all printable ASCII characters. The password display as asterisks. 6. Configure the SNMPv3 read only credentials by completing the following steps. a. Click the SNMPv3 Read Only tab. b. Enter the SNMPv3 user name in the User ID field.
4 Individual IP device discovery b. Enter the community string in the Community field. The community string can be from 1 through 16 characters long, case sensitive, and allows all printable ASCII characters. The string displays as asterisks. NOTE If you do not enter a community string in the field, discovery uses the "public" and "private" community strings to probe the devices. 8. Configure the SNMPv1 and SNMPv2c read only credentials by completing the following steps. a.
Individual IP device discovery 4 Editing IP device discovery NOTE Although, you can configure third-party product password settings through discovery, the Management application ignores these third-party product settings. To edit one or more IP devices, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Select one or more IP devices you want to edit in the Discovered Products table.
4 Individual IP device discovery 5. Change the SNMPv3 read-write credentials by completing the following steps. NOTE These credentials are not applicable for DCB devices. a. Click the SNMPv3 Read/Write tab. FIGURE 39 b. SNMPv3 credentials Enter the SNMPv3 user name in the User ID field. The user name can be from 1 through 16 characters long, case sensitive, and allows all printable ASCII characters. c.
Individual IP device discovery c. 4 Select one of the following protocols from the Authentication Protocol list: • None • HMAC_MD5 • HMAC_SHA d. Enter the SNMPv3 authentication password in the Authentication Password field. The password can be from 8 through 16 characters long, case sensitive, and allows all printable ASCII characters. The password display as asterisks. e.
4 Individual IP device discovery a. Click the SNMPv1/v2c Read Only tab. b. Enter the unique community string in the Community field. The community string can be from 1 through 16 characters long, case sensitive, and allows all printable ASCII characters. The string displays as asterisks. NOTE If you do not enter a community string in the field, discovery uses the "public" and "private" community strings to probe the devices. 9. Change the Read/Write credentials by completing the following steps. a.
Individual IP device discovery 4 10. Change the Port Config credentials by completing the following steps. NOTE These credentials are not applicable for DCB, VDX, or VCS devices. a. Click the Port Config Credentials tab. FIGURE 42 b. Port Config credentials Change the unique user name in the Login Prompt User Name field. The user name can be from 1 through 16 characters long, case sensitive, and allows all printable ASCII characters. c. Change the password in the Login Prompt Password field.
4 Individual IP device discovery b. Change the unique user name in the Login Prompt User Name field. The user name can be from 1 through 16 characters long, case sensitive, and allows all printable ASCII characters. c. Change the password in the Login Prompt Password field. The password can be from 8 through 16 characters long, case sensitive, and allows all printable ASCII characters. The password display as asterisks. d. Change the unique user name in the Enable Prompt User Name field.
Host discovery 4 Host discovery The Management application enables you to discover individual hosts, import a group of Host from a comma separated values (CSV) file, or import all hosts from discovered fabrics or VM managers. NOTE Host discovery requires HCM Agent 2.0 or later. NOTE SMI and WMI discovery are not supported. Discovering Hosts by Network address or host name To discover a Host by Network address or host name, complete the following steps. 1. Select Discover > Host Adapters.
4 Host discovery FIGURE 45 Add Host Adapters dialog box 3. (Optional) Enter a discovery request name (such as, Manual 06/12/2009) in the Discovery Request Name field. 4. Select Network Address from the list. 5. Enter the IP address (IPv4 or IPv6 formats) or host name in the Network Address field. 6. Click Add. The IP address or host name of the Host displays in the Host List. 7.
Host discovery 4 13. Click OK on the Add Host Adapters dialog box. If an error occurs, a message displays. Click OK to close the error message and fix the problem. A Host Group displays in Discovered Hosts table with pending status. To update the status from pending you must close and reopen the Discover Host Adapters dialog box. 14. Click Close on the Discover Host Adapters dialog box. Importing Hosts from a CSV file To discover Hosts by importing a CSV file, complete the following steps. 1.
4 Host discovery The CSV file must meet the following requirements: • Comma separated IP address or host names • No commas within the values • No escaping supported For example, XX.XX.XXX.XXX, XX.XX.X.XXX, computername.company.com 6. Click Open. The CSV file is imported to the Add Host Adapters dialog box. During import, duplicate values are automatically dropped. When import is complete, the imported values display in the Host List. If the file cannot be imported, an error displays. 7.
Host discovery FIGURE 47 4 Add Host Adapters dialog box 3. Enter a discovery request name (such as, MyFabric) in the Discovery Request Name field. 4. Select Hosts in Fabrics from the list. 5. Select All fabrics or an individual fabric from the list. 6. Click Add. All hosts which are part of a managed fabric and have a registered host name display in the list. If no host with a registered host name exists, an error message displays. Click OK to close the error message. 7.
4 Host discovery 12. Click OK on the Add Host Adapters dialog box. If an error occurs, a message displays. Click OK to close the error message and fix the problem. A Host Group displays in Discovered Hosts table with pending status. To update the status from pending you must close and reopen the Discover Host Adapters dialog box. 13. Click Close on the Discover Host Adapters dialog box. Importing Hosts from a VM manager To discover Hosts from a discovered VM manager, complete the following steps. 1.
Host discovery 7. 4 Configure Host credentials by choosing one of the following options: • To configure HCM agent credentials, select the HCM agent option. Go to step 9. • To configure CIM server credentials, select the CIM server (ESXi only) option. Continue with step 8. If you do not need to configure Host credentials, skip to step 12. 8. Configure discovery authentication by choosing one of the following options: • To configure discovery with authentication, select the HTTPS from the Protocol list.
4 Host discovery 3. Configure Host credentials by choosing one of the following options: • To configure HCM agent credentials, select the HCM agent option. Go to step 5. • To configure CIM server credentials, select the CIM server (ESXi only) option. Continue with step 4. If you do not need to configure Host credentials, skip to step 8. 4. Configure discovery authentication by choosing one of the following options: • To configure discovery with authentication, select the HTTPS from the Protocol list.
Host discovery 4 Rediscovering a previously discovered fabric To return a host to active discovery, complete the following steps. 1. Select Discover > Host Adapters. The Discover Host Adapters dialog box displays. 2. Select the host you want to return to active discovery in the Previously Discovered Addresses table. 3. Click Discover. 4. Click OK on the confirmation message. The rediscovered host displays in the Discovered Hosts table. 5. Click Close on the Discover Host Adapters dialog box.
4 Host discovery TABLE 19 Discovery Status Icons Icon Description Displays when the fabric or host is managed and the management status is okay. Displays when the fabric or host is not managed. The Discovery Status field details the actual status message text, which varies depending on the situation.
VM Manager discovery 4 VM Manager discovery The Management application enables you to discover VM managers. VM Manager discovery requires vCenter Server 4.0 or later. NOTE vCenter discovery time is dynamically determined based on the number of hosts being managed by the vCenter. For every 50 hosts managed, the vCenter collection period increases 30 minutes. For 0-50 hosts managed, the collection duration is 30 minutes; for 50-100 hosts managed, the collection duration is one hour, and so on.
4 VM Manager discovery FIGURE 50 Discover VM Managers dialog box 2. Click Add. The Add VM Manager dialog box displays. FIGURE 51 Add VM Manager dialog box 3. Enter the IP address or host name in the Network Address field. 4. Enter the VM manager port number in the Port field. 5. Enter the VM manager username in the User ID field. 6. Enter the VM manager password Password field. 7.
VM Manager discovery 4 8. Select the Forward event to vCenter check box to enable event forwarding from the Management application to vCenter. Clear to disable event forwarding. 9. Click OK on the Add VM Manager dialog box. If an error occurs, a message displays. Click OK to close the error message and fix the problem. A VM manager displays in Discovered VM Managers table with pending status. To update the status from pending you must close and reopen the Discover VM Managers dialog box. 10.
4 VM Manager discovery 9. Refresh the Discover VM Managers list by clicking Refresh. 10. Click Close on the Discover VM Managers dialog box. Excluding a host from VM manager discovery To exclude host from VM manager discovery complete the following steps. 1. Select Discover > VM Managers. The Discover VM Managers dialog box displays. 2. Select the Host you want to exclude in the Discovered VM Managers list and click Exclude. 3. Click Close on the Discover VM Managers dialog box.
VM Manager discovery 4 Rediscovering a previously discovered VM manager To return a VM manager to active discovery, complete the following steps. 1. Select Discover > VM Managers. The Discover VM Managers dialog box displays. 2. Select the VM manager you want to return to active discovery in the Previously Discovered Addresses table. 3. Click Discover. 4. Click OK on the confirmation message. The rediscovered VM manager displays in the Discovered VM Managers table. 5.
4 IP Rediscovery The following are samples of actual ESX host status messages: • • • • Active Discovery pending, Excluded Conflict – Existing Host 3. Refresh the Discover VM Managers list by clicking Refresh. 4. Click Close on the Discover VM Managers dialog box. Troubleshooting VM manager discovery If you encounter discovery problems, complete the following checklist to ensure that discovery was set up correctly. Verify IP connectivity by issuing a ping command to the switch. 1.
IP Rediscovery 4 For VCS devices, rediscovery depends on what part of the fabric you select to rediscover. • If you select the VCS fabric, rediscovery refreshes the membership information. • If you select a VCS member, rediscovery refreshes the asset data for the selected member. • If you select a missing VCS member, rediscovery triggers the discovery of a new fabric (VCS-enabled) or a standalone VDX switch (VCS-disabled). 3. Click Rediscover. The Rediscover product dialog box displays.
4 IP Rediscovery Rediscovering a group To rediscover all devices in a group, complete the following steps. 1. Select the IP tab. 2. Select the group you want to rediscover in the Product List. You can select one group at a time. 3. Click Rediscover on the Product List toolbar. The Rediscover product dialog box displays. If you selected more than 10 devices, the client only sends the first 10 devices to the server.
Chapter Management Groups 5 In this chapter • Management groups overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 • Product group overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 • Port Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5 Product group overview • To filter the Network Objects Product List, refer to “Filtering devices in the Network Objects Product List” on page 319. • To update device configuration information on the Network Object view, refer to “IP Rediscovery” on page 118. Product group overview Once devices display in the Network Object view, you can associate the devices with a group. Product groups allow you to monitor and manage multiple devices at one time.
Product group overview 5 Product Type Serial # Status Vendor Model Firmware Build Label Location Contact Description User_defined_property1 (up to 3) Static product groups You can define a static product group by selecting the product you want to include in the group. Creating a static product group To create a product group, complete the following steps. 1. Select Network Objects from the view list on the Product List toolbar. 2.
5 Product group overview 6. Add products to the group by selecting the product in the Available Products list and clicking the right arrow button. NOTE You can add a standalone VDX product or a VCS fabric to a user-defined Product Group; however, the VCS fabric members are not included with the group. The selected products move from the Available Products list to the Selected Products list. 7.
Product group overview 5 Duplicating a static product group To duplicate a product group, complete the following steps. 1. Select Network Objects from the view list on the Product List toolbar. 2. Right-click the product group you want to duplicate in the Product List and select Duplicate Group. The Add Product Group dialog box displays. 3. Edit the name for the product group in the Name field. 4. Edit the description for the product group in the Description field. 5.
5 Product group overview Creating a dynamic product group To create a dynamic product group, complete the following steps. 1. Select Network Objects from the view list on the Product List toolbar. 2. Select Add Product Group > Dynamic from the Grouping list on the Product List toolbar. The Add Product Group - Dynamic dialog box displays. FIGURE 54 Add Product Group - Dynamic dialog box 3. Enter a unique name for the product group in the Name field. 4.
Product group overview • • • • • 5 Build Label Location Contact Description User_defined_property1 (up to 3) 8. Select one of the following from the Operator list. • Equals (valid for Regular Expression or Value type) • Not Equals (valid for Regular Expression or Value type) • Starts With (only valid for Value type) Not available if you select Status or Product Type from the Property list.
5 Product group overview 10. Select Value or Regular Expression from the Type list To enter another set of criteria, click Insert. A new row displays in the Group Criteria table. Continue with step 11. To test the group criteria, click Test. The Management application uses the group criteria to search the available products in your AOR. The products that meet the criteria display in the Test Results. table. For detailed information about the test results, refer to “Viewing test results” on page 129.
Product group overview 5 Duplicating a dynamic product group To copy a dynamic product group, complete the following steps. 1. Select Network Objects from the view list on the Product List toolbar. 2. Right-click the product group you want to edit in the Product List and select Duplicate Group. The Add Product Group - Dynamic dialog box displays. 3. Change the name for the product group in the Name field. 4. Change the description for the product group in the Description field. 5.
5 Product group overview • Description — The description of the product. • User_defined_property1 (up to 3) — A user-defined product property value. You can create up to 3 user-defined properties (refer to “Properties customization” on page 1366). Viewing product group properties To view group properties, complete the following steps. 1. Select Network Objects from the view list on the Product List toolbar. 2.
Port Groups 5 TABLE 20 Field/Component Description Firmware The firmware version of the product. Build Label The firmware build number. Location The physical location of the product. Contact The name of the person or group you should contact about the product. Description The description of the product. Connected AP Count The number of connected AP. User_defined_property (up to 3) A user-defined product property value.
5 Port Groups Creating a port group To create a port group, complete the following steps. 1. Select Network Objects from the view list on the Product List toolbar. 2. Select Add Port Group from the Grouping list on the Product List toolbar. The Add Port Group dialog box displays. 3. Enter a unique name for the port group in the Name field. 4. Enter a description for the port group in the Description field. 5. Select one of the following options: • All Ports — Select to display all ports.
Port Groups 5 5. Select one of the following options: • All Ports — Select to display all ports. • Ports Connected to APs — Select to display only ports connected to an access point (AP). 6. Add ports to the group by selecting the port in the Available Ports list and clicking the right arrow button. NOTE The Management port, peri port, and stack ports are not included in the Available Ports list. The selected ports move from the Available Ports list to the Selected Ports list.
5 Port Groups 6. Add ports to the group by selecting the port in the Available Ports list and clicking the right arrow button. NOTE The Management port, peri port, and stack ports are not included in the Available Ports list. The selected ports move from the Available Ports list to the Selected Ports list.
Port Groups 5 TABLE 21 Field/Component Description MAC Address The MAC Address of the port. Port Status The status of the port. Port State The state of the port. Type The port type. Speed The Speed of the port. L2/Tag Mode Indicates whether L2 tag mode is enabled or disabled. If enabled, indicates whether the port is tagged, untagged, or dual. Untagged VLAN ID The untagged VLAN identifier of the port. Duplex Mode The duplex mode of the port, such as auto-sense, full-duplex, or none.
5 136 Port Groups Brocade Network Advisor IP User Manual 53-1002947-01
Chapter 6 Application Configuration In this chapter • Server Data backup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Server Data restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Event storage settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Flyover settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Name settings .
6 Server Data backup • Syslog Registration — Use to automatically register the server as the syslog recipient on products. For more information, refer to “Syslog Registration settings” on page 158. • Trap Registration — Use to automatically register the server as the trap recipient on products. If SAN products have Informs enabled, the registration is for the Informs. For more information, refer to “SNMP Trap Registration settings” on page 159.
Server Data backup 6 Management server backup There are three options for backing up data to the Management server: • Configuring backup to a CD drive • Configuring backup to a hard drive • Configuring backup to a network drive The Management server is backed up to D:\Backup (Windows systems) by default. If there is not second hard disk, this is a rewritable (CD-RW) compact disk. Make sure you have a CD-RW disk in the CD recorder drive to ensure that backup can occur.
6 Server Data backup FIGURE 55 Options dialog box (Server Backup pane) 3. Select the Enable Backup check box, if necessary. 4. Enter the time (using a 24-hour clock) you want the backup process to begin in the Next Backup Start Time Hours and Minutes fields. 5. Select an interval from the Backup Interval drop-down list to set how often backup occurs. 6. Back up data to a hard drive by browsing to the hard drive and directory to which you want to back up your data. NOTE This requires a hard drive.
Server Data backup a. 6 Browse to the network share and directory to which you want to back up your data. NOTE You must specify the directory in a network share format (for example, \\network-name\share-name\directory). Do not use the drive letter format (C:\directory). b. (Windows only) Enter the name of the Windows domain or workgroup in which you are defined in the Domain Workgroup field. NOTE You must be authorized to write to the network device. c.
6 Server Data backup 3. Select the Enable Backup check box. 4. Click Apply or OK. Disabling backup Backup is enabled by default. If you want to stop the backup process, you need to disable backup. To disable the backup function, complete the following steps. 1. Select Server > Options. The Options dialog box displays. 2. Select Server Backup in the Category list. 3. Clear the Enable Backup check box. 4. Click Apply or OK.
Server Data backup 6 3. Select an interval from the Backup Interval drop-down list to set how often backup occurs. 4. Click Apply or OK. The minimum value is 6 hours and the maximum value is 24 hours. Starting immediate backup NOTE You must have backup privileges to use the Backup Now function. For more information about privileges, refer to “User Privileges” on page 1321.
6 Server Data restore • Number of files backed up on completion • Network share access problem when backup starts or during backup (not when the backup configuration is changed) Server Data restore NOTE You cannot restore data from a previous version of the Management application. NOTE You cannot restore data from a higher or lower configuration (Trial or Licensed version) of the Management application. NOTE You cannot restore data from a different package of the Management application.
Event storage settings 6 5. Browse to the backup location. Browse to the location specified in the Output Directory field on the Options dialog box Backup pane. 6. Click Restore. Upon completion, a message displays the status of the restore operation. Click OK to close the message and the Server Management Console. For the restored data to take effect, re-launch the Configuration Wizard using the instructions in “Launching the Configuration Wizard” on page 5.
6 Event storage settings 3. Enter the maximum number of events you want to be retained in the repository in the Maximum Events field. Depending on your installation, the maximum number of events stored are as follows: • Professional — 1 through 100,000 • Enterprise — 1 through 10,000,000 Default is 50,000. Older events are purged at midnight on the date the maximum event limit is reached regardless of the retention days. 4.
Flyover settings 6 Flyover settings You can configure your system to display information for products and connections in a pop-up window on the Connectivity Map. Configuring flyovers To display product and connection information in a pop-up window, complete the following steps. 1. Select Server > Options. The Options dialog box displays. 2. Select Flyovers in the Category list. 3. Select the Enable flyover display check box to enable flyover display on your system. 4.
6 Flyover settings FIGURE 58 a. Options dialog box (Flyovers pane, Connection tab) Select the protocol type from the Type list, if necessary. Depending on which protocol you select, some properties may not be available for all protocols. b. Select each property you want to display in the connection flyover from the Available Properties table. Depending on which protocol you select, some of the following properties may not be available for all protocols: IP • IP_Address:Port-IP_Address:Port c.
Name settings 6 Name settings You can use Names as a method of providing familiar simple names to products and ports in your SAN. Using your Management application you can: • Set names to be unique or non-unique. • Fix duplicate names. • Associate a name with a product, port WWN, or Fabric Assigned WWN currently being discovered. • Add a WWN and an associated name for a product or port that is not yet being discovered. • Remove or disassociate a name from a WWN.
6 Name settings • Duplicate Names table — Every instance of duplicate names. Fabric — The fabric name. FC Address — The Fibre Channel address. Names — The current name of the device. If you selected the Append Incremental numbers for all repetitive names option, the names display with the incremental numbering. If you selected the I will fix them myself option, this field becomes editable. Operational Status — The operational status of the device.
Name settings FIGURE 60 6 Configure Names dialog box 2. Select All Names from the Display list. Only devices with a name display. The table displays the following information. • Scope list — Select a search value (Name or WWN) from the list. • Search text box — Enter the name or WWN of the device for which you are searching. • Search button — Click to search on the value in the Search field. For more information, refer to “Searching for a device by name” on page 155.
6 Name settings • Fix Duplicates button — Click to launch the Fix Duplicates dialog box. For more information, refer to “Fixing duplicate names” on page 149. • Apply Names button — Click to apply unassigned (detached) names to newly discovered devices. For more information, refer to “Applying a name to a detached WWN” on page 153. • Detached WWN text box — Enter the WWN of the device you want to add. • Name text box — Enter a name for the device you want to add.
Name settings 6 4. Click Add. The new device displays in the table. If you set names to be unique on the Options dialog box and the name you entered already exists, a message indicating the name already in use displays. Click OK to close the message and change the name. 5. Click OK to close the Configure Names dialog box. 6. Click OK on the confirmation message. Applying a name to a detached WWN To apply a name to a detached wwn, complete the following steps. 1. Select Configure > Names.
6 Name settings Editing names To edit the name associated with a device, complete the following steps. 1. Select Configure > Names. The Configure Names dialog box displays. 2. Select All Names from the Display list. Only devices with a name display. The table displays the Name, WWN, Operational Status, Type, and a Description of the device. 3. Click the name you want to edit in the Name column. 4. Edit the name and press Enter. 5. Click OK to close the Configure Names dialog box. 6.
Name settings Device Character limit HBA port 256 Others names 128 6 To import names, complete the following steps. 1. Select Configure > Names. The Configure Names dialog box displays. 2. Click Import. The Import Files dialog displays. 3. Browse to the import (.csv) file location. 4. Select the file and click Import. 5. Click OK to close the Configure Names dialog box. 6. Click OK on the confirmation message.
6 Miscellaneous security settings 1. Select Configure > Names. The Configure Names dialog box displays. 2. Select All Names from the Display list. 3. Select WWN from the Scope list. 4. Enter the WWN you want to search for in the Search field. You can search on partial WWNs. NOTE To search for a device, the device must be discovered and display in the topology. 5. Click Search. All devices with the specified WWN (or partial WWN) are highlighted in the Display table.
Miscellaneous security settings FIGURE 61 6 Options dialog box (Security Misc pane) 3. Enter the server name in the Server Name field. The Server Name field cannot be empty. 4. Click OK on the confirmation message. 5. Click Apply or OK to save your work. Configuring login security To configure login security, complete the following steps. 1. Select Server > Options. The Options dialog box displays. 2. Select Security Misc in the Category list. 3.
6 Syslog Registration settings Configuring the login banner display To configure the login banner display, complete the following steps. 1. Select Server > Options. The Options dialog box displays. 2. Select Security Misc in the Category list. 3. Select the Display login banner upon client login check box. 4. Enter the message you want to display every time a user logs into this server in the Banner Message field. This field contains a maximum of 2048 characters. 5. Click Apply or OK to save your work.
SNMP Trap Registration settings 6 3. Select the Auto register server as Syslog recipient check box, if necessary. This check box is selected by default. 4. Click Apply or OK to save your work. Configuring the Syslog listing port number 1. Select Server > Options. The Options dialog box displays. 2. Select Syslog Registration in the Category pane. The Syslog Registration pane displays (Figure 62). 3.
6 SNMP Trap forwarding credential settings Configuring the SNMP trap listing port number 1. Select Server > Options. The Options dialog box displays. 2. Select Trap Registration in the Category pane. 3. Enter the SNMP listening port number of the Server in the SNMP Listening Port (Server) field, if necessary. The default SNMP listening port number is 162 and is automatically populated. 4. Click Apply or OK to save your work.
SNMP Trap forwarding credential settings 6 Configuring SNMP v3 credentials To configure a SNMP v1 or v2c credentials, complete the following steps. 1. Select Server > Options. The Options dialog box displays. 2. Select Trap Forwarding Credentials in the Category pane. The Trap Forwarding Credentials pane displays (Figure 64). 3. Enter the SNMP v3 name (case sensitive, 1 to 16 characters) to identify the credentials in the User Name field. Allows all printable ASCII characters. 4.
6 Software Configuration Software Configuration The Management application allows you to configure the following software settings: • • • • Client/Server IP — IP configuration settings. IP preferences — IP settings specific to IP product managemental. Memory allocation settings — Memory allocation for the client and server. Product communication settings — Connections between the server and SAN switches or IP products. • FTP/SCP/SFTP server settings — Internal or external FTP or SCP server settings.
Software Configuration 6 To configure the IP address used by the server for client-server communications, complete the following steps. 1. Select Server > Options. The Options dialog box displays. 2. Select Client/Server IP in the Category list to set the IP address. The Client/Server IP pane displays (Figure 65). FIGURE 65 Options dialog box (Client/Server IP option) 3. Choose one of the following options in the Server IP Configuration list. • Select All. Go to step 4. • Select a specific IP address.
6 Software Configuration Configuring an explicit server IP address If you selected a specific IP address from the Server IP Configuration screen during installation and the selected IP address changes, you will not be able to connect to the server. To connect to the new IP address, you must manually update the IP address information. To change the IP address, complete the following steps. 1. Choose one of the following options: • On Windows systems, select Start > Programs > Management_Application 12.X.
Software Configuration 6 8. Verify the IP address on the Server Configuration Summary screen and click Next. 9. Click Finish on the Start Server screen. 10. Click Yes on the restart server confirmation message. 11. Choose one of the following options: • If you configured authentication to CAC, enter your PIN in the CAC PIN field. • If you configured authentication to the local database, an external server (RADIUS, LDAP, or TACACS+), or a switch, enter your user name and password.
6 Software Configuration 3. Choose one of the following options in the Server IP Configuration list. • Select All. Go to step 4. • Select a specific IP address. Continue with step 5. • Select localhost. Continue with step 5. 4. Select the return IP address in the Client - Server IP Configuration Return Address list. When Server IP Configuration is set to All, you can select any available IP address as the Return Address.
Software Configuration 6 Configuring change manager preferences 1. Select Server > Options. The Options dialog box displays. 2. Select IP Preferences from the Software Configurations list in the Category pane. The IP Preferences pane displays (Figure 67). FIGURE 67 Options dialog box (IP Preferences pane) 3. Select the ConfigReadFlash check box to obtain configuration back up from flash. Clear to obtain configuration back up from DRAM. Default is clear (disabled). 4.
6 Software Configuration 8. Select the DoPostdeploymentBackup check box to turn on product configuration backup after a payload is deployed using the Configuration Wizard. 9. Select the DoPredeploymentBackup check box to turn on product configuration backup before a payload is deployed using the Configuration Wizard. 10. Enter the number of days to keep product configuration backup files on the server in the KeepDataForDays field. Minimum duration is 7 days. Maximum duration is 365. Default is 30.
Software Configuration 6 4. Click Apply or OK to save your work. Configuring IP device manager preferences This configuration is only applicable to the Ethernet router series switch running firmware version 5.4 or later. 1. Select Server > Options. The Options dialog box displays. 2. Select IP Preferences from the Software Configurations list in the Category pane. 3. Enter the number of Element Managers that can be launched from the Management application in the LaunchLimitforElementManagerGUI field.
6 Software Configuration 4. Select the PollingState check box to enable MPLS polling. 5. Click Apply or OK to save your work. Configuring name service preferences 1. Select Server > Options. The Options dialog box displays. 2. Select IP Preferences from the Software Configurations list in the Category pane. 3. Enter the maximum cache size for the DNS Lookup Manager in the DnsCacheSize field. 4.
Software Configuration 6 3. Select the EnableReverseDNSLookup check box to enable reverse DNS Look up on the L3/L4 IP Address so that the host name is displayed together with the IP Address. 4. Enter the number of days to retain the SFlow hourly data in the KeepDataForDays field. Minimum duration is 7 days. Maximum duration is 65 days. Reducing this parameter may result in expiring a large number of records on server restart and lead to reduced performance.
6 Software Configuration 3. Enter a number of days to display a warning for an expiring certificate in the DaysUntilExpiryWarning field. When the certificate reaches this value, the certificate displays orange. Default is 31. Minimum is 0. 4. Enter a number of days to display the next warning for an expiring certificate in the DaysUntilNextExpiryWarning field. 5. Click Apply or OK to save your work. Configuring SNMP preferences 1. Select Server > Options. The Options dialog box displays. 2.
Software Configuration 6 Memory allocation settings You can configure memory allocation for the client and server to improve performance. You can trigger switch polling when a state changes or you can poll at intervals when no state change occurs. NOTE SAN size is a consideration in selection of polling periods. Configuring memory allocation settings To configure memory allocation settings, complete the following steps. 1. Select Server > Options. The Options dialog box displays. 2.
6 Software Configuration 5. Enter the memory allocation (MB) for the server in the Server Memory Allocation field. If you enter an invalid value, an error message displays with the minimum value allowed. Click OK and edit the value again. The current configured number of megabytes for server memory allocation displays in the Current Value field. The default minimum number of megabytes for server memory allocation displays in the Default Minimum field.
Software Configuration 6 Configuring asset polling NOTE Asset polling is only applicable for Fabric OS DCB products discovered from the IP tab. Asset polling allows you set the length of time between state change polling. To maximize the efficiency of the polling feature (balance the amount of possible information with any possible performance impact), base your settings on the size of the SAN. To configure asset polling, complete the following steps. 1. Select Server > Options.
6 Software Configuration Viewing the network size status The Management application enables you to view the network size status at a glance by providing a status icon on the Status Bar. Double-click the icon to launch the Memory Allocation pane of the Options dialog box. NOTE If you exceed the recommended count, the network size status icon refreshes when the License is refreshed (every three hours) or after a client restart.
Software Configuration FIGURE 68 6 Options dialog box (Product Communication pane) 3. To connect using HTTP, complete the following steps. a. Select the Connect using HTTP option. b. Enter the connection port number in the Port # field. Go to step 5. The default HTTP port number is 80. NOTE To manage FIPS-enabled Fabric OS fabrics, you must configure Product Communication using the Connect using HTTPS (HTTP over SSL) only option. 4.
6 Software Configuration 3. (Fabric OS and Network OS products only) Select IPv4 (default) or IPv6 to set the preferred IP format. 4. Click Apply or OK to save your work. Changes to this option take effect after an application restart. 5. Click OK on the “changes take effect after application restart” message. Configuring IP communication To configure communication between IP product and the Management application server, complete the following steps. 1. Select Server > Options.
Software Configuration 6 • SCP then TFTP • TFTP then SCP 7. Select one of the following options to configure the web element manager communication: • HTTP • HTTPS (HTTP over SSL) • HTTPS then HTTP 8. Click Apply or OK to save your work. FTP/SCP/SFTP server settings NOTE For FIPS-enabled Fabric OS switches, you must configure the FTP/SCP/SFTP server communication to an external SCP server to download firmware and allow technical support.
6 Software Configuration Accessing the FTP server folder Choose from one of the following options to access the FTP server folder: • To access the internal FTP folder, select Monitor > Techsupport > View Repository. • To access the external FTP folder, type the following in a browser window: ftp://Username@External_FTP_Server_IP_Address (for example, ftp://admin@10.1.1.1) and press Enter. Type your password in the pop-up window and press Enter. The external FTP folder displays.
Software Configuration 6 Configuring an internal SCP or SFTP server NOTE SCP is supported on Fabric OS devices running 5.3 and later. NOTE SFTP is supported on Fabric OS devices running 7.0 and later. To configure the internal SCP or SFTP server settings, complete the following steps. 1. Select Server > Options. The Options dialog box displays. 2. Select FTP/SCP/SFTP in the Category list. The FTP/SCP/SFTP pane displays (Figure 70). FIGURE 71 Options dialog box (FTP/SCP/SFTP pane) 3.
6 Software Configuration Configuring an external FTP, SCP, or SFTP server NOTE For FIPS-enabled Fabric OS switches, you must configure the FTP/SCP/SFTP server communication to an external SCP or SFTP server to download firmware and allow technical support. NOTE SCP is supported on Fabric OS devices running 5.3 and later. NOTE SFTP is supported on Fabric OS devices running 7.0 and later. To configure external FTP, SCP, or SFTP server settings, complete the following steps. 1. Select Server > Options.
Software Configuration 6 5. To configure an external SCP server, complete the following steps. a. Select the SCP Server check box to configure the external SCP server. All fields are mandatory. b. Enter the IP address for the remote host in the SCP Host IP field. c. Enter a user name in the SCP Host User Name field. d. Enter the path to the remote host in the SCP Directory Path field. Use a slash (/) or period (.) to denote the root directory. e.
6 Software Configuration • If you are using the external FTP server, select the Use external FTP/SCP/SFTP Server option. For step-by-step instructions about configuring the built-in server, refer to “Configuring an external FTP, SCP, or SFTP server” on page 182. 4. Click Test. An “FTP, SCP, or SFTP Server running successfully” or an error message displays.
Software Configuration 6 5. Enter a port number in the Starting Port # field. The default is 24600. For Professional, the server requires 15 consecutive free ports beginning with the starting port number. For Trial and Licensed versions, the server requires 18 consecutive free ports beginning with the starting port number. 6. Click Apply or OK to save your work. NOTE Changes to this option take effect after application restart. 7. Click OK on the “changes take effect after application restart” message.
6 Software Configuration 5. Click Apply or OK to save your work. NOTE Changes to the server log levels reset to the default (INFO) after a server restart. NOTE Changes to the Log client support data log level is persisted on all clients launched from the same machine for the same server. client. log file properties • Client logs are collected separately for each server. After successful login, a log file is created and prefixed with the network address provided in the Login dialog box.
FIPS Support 6 FIPS Support To manage FIPS-enabled Fabric OS fabrics and switches, make sure you complete the following configuration requirements: • Configure Product Communication to HTTPS (refer to “Configuring SAN communication” on page 176) to allow communication between the server and the Fabric OS switches. • Configure an external SCP server (refer to “Configuring an external FTP, SCP, or SFTP server” on page 182) to allow firmware download, product technical support, and supportSave.
6 Fabric tracking • Device Ports — This table shows a brief summary of the device ports including status (whether the device port will be added ( ) or removed ( ) from the fabric), reason (why the device is missing), product type, port, fabric name, port WWN, node WWN, and attached port number.
Fabric tracking FIGURE 75 6 Accept changes summary message • Do not show me this again check box — Select if you do not want to see this dialog box again when you enable or disable fabric tracking or accept changes for a switch or fabric. • Switches — This table shows a brief summary of the switches including status (whether the device port will be added ( ) or removed ( ) from the fabric), name, fabric name, IP address, WWN, and domain ID.
6 Fabric tracking FIGURE 76 Accept all changes summary message • Do not show me this again check box — Select if you do not want to see this dialog box again when you enable or disable fabric tracking or accept changes for a switch or fabric. • Switches — This table shows a brief summary of the switches including status (whether the device port will be added ( ) or removed ( ) from the fabric), name, fabric name, IP address, WWN, and domain ID.
Fabric tracking 6 • Do not show me this again check box — Select if you do not want to see this dialog box again when you enable or disable fabric tracking or accept changes for a switch or fabric. • Switches — This table shows a brief summary of the switches including status (whether the device port will be added ( ) or removed ( ) from the fabric), name, fabric name, IP address, WWN, and domain ID. This table includes unmonitored switches which becomes segmented from the fabric.
6 192 Fabric tracking Brocade Network Advisor IP User Manual 53-1002947-01
Chapter 7 User Account Management In this chapter • Users overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • User accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Roles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Areas of responsibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
7 Users overview Viewing configured users To view configured users, complete the following steps. 1. Select Server > Users. The Users dialog box displays. 2. Click the Users tab, if necessary. FIGURE 77 Users dialog box - Users tab The Users dialog box contains the following fields and components: • Authentication-Primary — The primary authentication server type configured through the Server Management Console.
Users overview 7 • Users table — The configured users. User ID — The unique name used to identity a user. Full Name — The user’s full name. Roles — List of Roles the user belongs to separated by comma. Area Of Responsibility — List of AORs the user belongs to separated by comma. E-mail Notification — Whether e-mail notification is enabled for user. Account Enabled — Whether the user account status is enabled. Policy Violations — Whether there is a current policy violation for the user.
7 User accounts - Zone Administrator Operator Security Officer Host Administrator Report User Group Description — A description of the role. Add button — Click to add a new role (refer to “Creating a new role” on page 202). Edit button — Click to edit the selected role (refer to “Editing a role” on page 203). Duplicate button — Click to copy the selected role (refer to “Copying a role” on page 204). Delete button — Click to delete the selected role (refer to “Deleting a role” on page 204).
User accounts 7 Creating a new user account To create a new user account, complete the following steps. 1. Select Server > Users. The Users dialog box displays. 2. Click Add under the Users table. The Add User dialog box displays. FIGURE 78 Add User dialog box 3. Enter a unique name to identify the user in the User ID field. 4. Enter a password for the user in the Password and Confirm Password fields. Passwords displays as dots (.).
7 User accounts 11. Enter the e-mail address of the user in the E-mail Address field. Enter more than one e-mail address, separating each with a semi-colon. To send a text message or page via e-mail, use the following format number@carrier.com, where number is your phone number and carrier.com is the SMS server. For example, 3035551212@txt.att.net (text message) or 3035551212@page.att.net (page). NOTE Check with your carrier for the exact e-mail address. 12.
User accounts 7 Copying a user account You can create a user account by copying an existing one. When you copy an account, you copy the selected roles and AORs of that account. You can then enter a new user name, ID, e-mail address, and telephone number. To create a new user account from an existing account, complete the following steps. 1. Select Server > Users. The Users dialog box displays. 2. Select the user account you want to copy and click Duplicate under the Users table.
7 User accounts 3. Select the user account you want to copy user preferences to and click Paste User Preferences under the Users table. If you need to make any other changes to this user account, refer to “Editing a user account” on page 198. 4. Click Yes on the confirmation message. 5. Click Close to close the Users dialog box. Assigning roles and areas of responsibility to a user account To assign roles and AORs to an existing user account, complete the following steps. 1. Select Server > Users.
User accounts 7 Disabling a user account To make the user account inactive, but keep it in the database, you can disable the user account. NOTE You cannot disable the default "Administrator" account. To disable a user account, complete the following steps. 1. Select Server > Users. The Users dialog box displays. 2. Select the enabled user account you want to disable in the Users table and click Disable. 3. Click Yes on the confirmation message.
7 Roles Unlocking a user account NOTE You must have User Management Read and Write privileges to unlock a user account. You can unlock a user account when a user is locked out of the system because of too many invalid login attempts. To unlock a user account, complete the following steps. 1. Select Server > Users. The Users dialog box displays. 2. Select the locked user account you want to unlock in the Users table and click Unlock. 3. Click Yes on the confirmation message. 4.
Roles FIGURE 79 7 Add Role dialog box 3. Enter a name of the role in the Name field. 4. (Optional) Enter a short description for the role in the Description field. 5. Add or remove privileges as needed. For step-by-step instructions, refer to “Adding privileges to a role” on page 204 or “Removing privileges from a role” on page 205. 6. Click OK to save the new role and close the Add Role dialog box. The new role displays in the Roles list of the Users dialog box.
7 Roles 5. Click Close to close the Users dialog box. Copying a role You can create a new role by copying an existing one. When you copy a role, you copy the selected privileges in that role. To copy an existing role, complete the following steps. 1. Select Server > Users. The Users dialog box displays. 2. Select the role you want to copy in the Roles table and click Duplicate. The Duplicate Role dialog box displays. 3. Complete step 3 through step 5 in “Creating a new role” on page 202. 4.
Roles 7 3. Add read and write access by selecting the features to which you want to allow read and write access in the Available Privileges list and click the right arrow button to move the features to the Read & Write Privileges list. Select multiple features by holding down the CTRL key and clicking more than one privilege. The features are moved to the Read & Write Privileges list. 4.
7 Areas of responsibility Areas of responsibility NOTE You must have User Management Read and Write privileges to view, add, modify, or delete operational areas of responsibility. An area of responsibility (AOR) allows you to place Fabrics, Hosts, Products, Product Groups, Port Groups, and Application products into management groups that can be assigned to an Management application user.
Areas of responsibility FIGURE 80 7 Users dialog box - Users tab 3. Enter a name of the AOR in the Name field. 4. (Optional) Enter a short description for the AOR in the Description field. 5. Assign or remove products as needed. For step-by-step instructions, refer to “Assigning products to an AOR” on page 209 or “Removing products from an AOR” on page 210. 6. Click OK to save the new AOR and close the Add AOR dialog box. The new AOR displays in the AOR list of the Users dialog box. 7.
7 Areas of responsibility 4. Click OK to save the AOR and close the Edit AOR dialog box. If you make changes to the user’s role or AOR while the user is logged in, a confirmation message displays. When you click Yes on the confirmation message, the user is logged out and must log back in to see the changes. 5. Click Close to close the Users dialog box. Copying an AOR NOTE You cannot duplicate system AORs. To create a new AOR by copying an existing one, complete the following steps. 1.
Areas of responsibility 7 Assigning products to an AOR You can assign hostsIP products to an AOR from the Add, Edit, or Duplicate AOR dialog box. To assign hostsIP products to an AOR, complete the following steps. 1. Select Server > Users. The Users dialog box displays. 2. Click Add, Edit, or Duplicate under the AOR table. The Add AOR, Edit AOR, or Duplicate AOR dialog box displays. 3. Click the Hosts tab. 4.
7 Password policies Removing products from an AOR You can remove hostsIP products from and AOR from the Edit AOR or Duplicate AOR dialog box. To remove hostsIP products from the AOR, complete the following steps. 1. Select Server > Users. The Users dialog box displays. 2. Click Edit or Duplicate under the AOR table. The Edit AOR or Duplicate AOR dialog box displays. 3. In the Selected Products table, select the products or groups you want to remove and click the left arrow button.
Password policies 7 4. Enter the number of unique passwords you must use before you can reuse a password in the History Count field. Valid values are 1 through 24. The default is 1. When you update the History Count value, the current password history is not cleared. 5. Configure the password format by completing the following steps. a. Select the Empty Password - Allow check box to allow user accounts to be created or edited with empty passwords or to allow passwords with any format.
7 Password policies b. Enter the time frame after which the account automatically unlocks and resumes normal operation in the Lockout Duration field. Only enabled when the Lockout Threshold is greater than zero. If you specify zero, the user account is locked out indefinitely until an administrator manually unlocks it. Valid values are 0 through 99999. The default is 30. 7. Configure the password login policy by completing the following steps. a.
Authentication Server Groups on the Management server 7 5. Click Close on the View Policy Violators dialog box. 6. Click Close on the Users dialog box. Authentication Server Groups on the Management server NOTE You must have User Management Read and Write privileges to map roles and AORs to Active Directory (AD) groups.
7 Authentication Server Groups on the Management server Removing roles and AORs from an AD group To remove roles and AORs from an AD group, complete the following steps. 1. Select Server > Users. The Users dialog box displays. 2. Click the Authentication Server Groups tab. 3. Select the roles and AORs you want to remove in the Active Directory Groups table. Select multiple roles and AORs by holding down the CTRL key and clicking more than one role and AOR. 4. Click the left arrow button.
Authentication Server Groups on the Management server 7 Deleting an AD group Deleting an AD group deletes the roles and AORs assigned to the group and removes the group from the Active Directory Groups table. To delete an AD group, complete the following steps. 1. Select one or more AD groups that you want to delete from the Active Directory Groups table. 2. Click Delete. 3. Click Yes on the confirmation message. 4. Click OK on the deletion successful message. 5. Click OK to save your work.
7 Authentication Server Groups on the Management server Defining user accounts on the external LDAP server If you configure the external LDAP server as the primary authentication server in the server management console, you must define roles and AORs in the external LDAP server to match the Management application roles and AORs. Configuring roles and AORs on the external LDAP server Open the Management console on the Active Directory installed server and complete the following steps. 1.
User profiles 7 Configuring authorization details on the external LDAP server Open the ADSI Edit dialog box on the Active Directory installed server. 1. Select Start > Run. 2. Type adsiedit.msc and press Enter. 3. Right-click CN=User_Name in the CN=Users directory and select Properties. Where User_Name is the name of the user you created in “Creating an AD user account” on page 215. 4. Select NmAors in the Attributes list and click Edit. 5.
7 User profiles Viewing your user profile To view your user profile, complete the following steps. To edit your user profile, refer to “Editing your user profile” on page 219. 1. Select Server > User Profile. The User Profile dialog box displays the following information: • User ID — Displays your user identifier. • Full Name — Displays the name if entered while adding a user; otherwise, this field is blank. • Password — Displays your password as dots (.).
User profiles 7 Editing your user profile To edit your user profile, complete the following steps. 1. Select Server > User Profile. The User Profile dialog box displays. 2. Change your name in the Full Name field. 3. Change your password in the Password and Confirm Password fields. Passwords display as dots (.). 4. Change your user profile description in the Description field. 5. Change your phone number in the Phone Number field. 6.
7 User profiles If your password expires or your current password violates the password policy, you will be prompted to change your password from the Change Password dialog box. To view your password policy, click Password Policy - View. To change your password from the Change Password dialog box, complete the following steps. 1. Enter your current password in the Existing Password field. 2. Enter your new password in the New Password and Confirm Password fields. Passwords display as dots (.). 3.
User profiles 7 Resetting optional messages To reset all Management application optional messages to their default behaviors, complete the following steps. 1. Select Server > User Profile. The User Profile dialog box displays. 2. Click Optional Messages Reset. The Password Policy dialog box displays. 3. Click Yes on the confirmation message. A successful reset message displays. 4. Click OK on the User Profile dialog box.
7 User profiles 3. Enter the user name for the product in the Product Login Account - Username field. 4. Enter the password for the product in the Product Login Account - Password field. NOTE If Telnet is used to log in to the device and Telnet only requires a password, then enter the password in the Password field and leave the Username field blank. 5. (IronWare only) Enter the user name assigned to management privilege levels on the device in the Product Enable Account - Username field. 6.
Chapter 8 Dashboard Management In this chapter • Dashboard overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Default dashboards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Status widgets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Performance monitors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
8 Dashboard overview FIGURE 81 Dashboard tab 1. Menu bar — Lists commands you can perform on the dashboard. For a list of Dashboard tab menu commands, refer to “Dashboard main menus” on page 1299. The dashboard also provides a shortcut menu to reset the dashboard back to the defaults. Reset the dashboard back to the default settings by right-clicking in the white space and selected Reset to Default. 2. Toolbar — Provides buttons that enable quick access to dialog boxes and functions.
Dashboard overview 8 8. Status bar — Displays the connection, port, product, special event, Call Home, and backup status, as well as Server and User data. For more information about the status bar, refer to “Status bar” on page 299. Dashboard toolbar The toolbar (Figure 82) is located beneath the menu bar and provides icons and buttons to perform various functions. FIGURE 82 Toolbar The toolbar contains the following icons and buttons: 1.
8 Dashboard overview Dashboard messages The dashboard message bar (Figure 83) only displays when the Network Scope or Time Scope has changed. You can also view all dashboard messages and clear them. FIGURE 83 Dashboard message bar The toolbar contains the following fields and components: 1. Details button — Use to view dashboard messages. 2. Close button — Use to close the dashboard message bar.
Dashboard overview 8 General dashboard functions The Management application also provides the following general functions which are applicable to all widgets and monitors: • Preference persistence — Any customization you make to the dashboards are persisted in that dashboard.
8 Dashboard overview Filtering the dashboards list You can filter the list of dashboards to only display dashboard you need. 1. Click the Dashboards expand navigation bar. 2. Enter your filter criteria in the Filter text box. 3. To make the filter case sensitive or insensitive, choose one of the following options from the filter icon list: • Case sensitive — Select to make the filter case sensitive. • Case insensitive — Select to make the filter case insensitive. 4.
Dashboard overview 8 5. Click OK. The new dashboard displays in the Dashboards expand navigation bar and becomes the active dashboard. Deleting a user-defined dashboard You can delete a user-defined dashboard. 1. Click the Dashboards expand navigation bar. 2. Select the dashboard you want to delete and click Delete. 3. Click Yes on the confirmation message.
8 Dashboard overview 4. Click the Performance tab (Figure 85). The preconfigured performance monitors display. You can create up to 100 performance monitors; however, you can only display up to 30 performance monitors. For more information about performance monitors, refer to “Performance monitors” on page 246. FIGURE 85 Customize Dashboard dialog box, Performance tab 5. Select the Display check box in the Performance Monitors list for each performance monitor you want to add to the dashboard.
Dashboard overview 8 Exporting the dashboard display You can export the current dashboard display (all widgets and monitors) or a selected widget or monitor in a .png format. 1. Select one of the following options from the Export list: • Dashboard — Exports the current dashboard. • Name — Exports the selected widget (where Name is the name of the widget or monitor on the dashboard). The Export Dashboard to PNG File or Export Name to PNG File dialog box displays. 2.
8 Dashboard overview Setting the network scope You can configure the dashboard to display all objects in your area of responsibility (AOR) or a subset of objects (fabrics, devices, or groups). NOTE Network scope does not affect the Events widget. The Events widget always includes all objects in your AOR. From the dashboard, select a network from the Network Scope list.
Dashboard overview 8 Creating a customized network scope You can create a network scope from any objects in your AOR. You can create network scopes based on Fabrics, Products, Product Groups, or Ports. 1. Click the Network Scope ellipsis button. The Edit Scope dialog box displays with a list of existing user-defined network scopes in the Network Scopes list. FIGURE 86 Edit Scopes dialog box 2. Click Add. A new network scope displays in the Network Scopes list. 3.
8 Dashboard overview Editing a user-defined network scope You can edit any user-defined network scope. 1. Click the Network Scope ellipsis button. The Edit Scope dialog box displays with a list of existing user-defined network scopes in the Network Scopes list. 2. Select the network scope you want to edit in the Network Scopes list. The network scope details display in the right side fields. 3. Change the name for the scope in the Name field, if needed. 4.
Default dashboards 8 Setting the data display time frame Setting the time scope in the dashboard toolbar configures the data display time range for the status widgets and performance monitors that include a time range. NOTE Time scope does not affect the Events widget. For the Events widget, you set the time scope within the widget. NOTE sFlow monitors only display data for up to 1 day.
8 Status widgets • Bottom Port Utilization Percentage monitor (includes details for all ports, Initiator ports, ISL ports, and Target ports) IP Port Health The IP Ports Health dashboard provides the following preconfigured performance monitors: • • • • • • • • • Top Port Errors monitor Top Port CRC Errors monitor Top Port Discards monitor Top Port Receive EOF monitor Top Port Underflow Errors monitor Top Port Overflow Errors monitor Top Port Runtime Errors monitor Top Port Too Long Errors monitor Top P
Status widgets 8 Access Point Status widget The Access Point Status widget displays the access point (AP) status as a pie chart. FIGURE 87 Access Point Status widget The Access Point Status widget includes the following data: • Severity icon/product count/widget title — The color of the worst status followed by the product count with that status displays before the widget title. • Show list — A list of available managed AP products.
8 Status widgets Accessing additional data from the Access Point Status widget Double-click a section in the Access Point Status widget to navigate to a filtered view of the AP Products report. Events widget The Events widget (Figure 88) displays the number of events by severity level for a specified time range as a stacked bar graph.
Status widgets 8 • Network Scope — The network scope does not affect the Events widget. The Events widget always includes all objects in your AOR. • Time Scope — The time scope. The Events widget only includes events from products that are in your AOR. The x-axis represents the number of occurrences of a particular event severity during the selected time period. If you pause on a bar, a tooltip shows the number of events with that severity level during the selected time period.
8 Status widgets Host Adapter Inventory widget The Host Adapter Inventory widget (Figure 89) displays the host adapter products inventory as stacked bar graphs. FIGURE 89 Host Adapter Inventory widget The Host Adapter Inventory widget includes the following data: • Severity icon/Host product count/widget title — The color of the worst severity and the Host product count with that severity displays before the widget title. • Group By list — Use to customize this widget to display a specific grouping.
Status widgets 8 • Zoom in on an area of the widget by dragging the mouse (upper left corner to lower right corner) to select one or more bars. NOTE If the ratio between the longest and shortest bar reaches 5000:1, you should maximize the widget prior to using zoom. To return the widget to its original state, reverse the selection (drag from lower right corner to upper left corner).
8 Status widgets • Color legend — Displays the color legend below the bar chart. - Green — Reachable: IP product is online and accessible by IP (ICMP/TCP) and SNMP. - Orange — Degraded Link: IP product is accessible by IP (ICMP/TCP); however, it is not accessible by SNMP. - Maroon — Not Reachable: IP product is not online and not accessible by IP (ICMP/TCP). • Time Scope — The time scope.
Status widgets 8 IP Status widget The IP Status widget (Figure 91) displays the device status as a pie chart. FIGURE 91 IP Status widget The IP Status widget includes the following data: • Severity icon/product count/widget title — The color of the worst status followed by the product count with that status displays before to the widget title. • Pie chart — The device status as a percentage of the total number of devices. The pie chart displays the percentage in various colors on each slice.
8 Status widgets Accessing additional data from the IP Status widget Double-click a section in the IP Status widget to navigate to the IP Products - Status dialog box (where Status is the status of the section you selected). For more information, refer to “Viewing additional IP product data” on page 244 NOTE It takes a few moments to populate newly discovered products in the IP Products - Status dialog box (where Status is the section of the widget you selected). Viewing additional IP product data 1.
Status widgets 8 Status widget The Status widget (Figure 92) displays the number of products managed and the number of events within the selected event time range, as well as various IP management processes and their current state. FIGURE 92 Status widget The Status widget displays the following items for each product license: • • • • • • • • SAN Physical Switches — The number of discovered physical SAN switches. Hosts — The number of managed hosts. Events — The number of events within the last hour.
8 Performance monitors Performance monitors The Performance Dashboard provides a high-level overview of the performance on the network. This allows you to easily check the performance of devices, ports, and traffic on the network. The Performance Dashboard also provides several features to help you quickly access performance metrics and reports. The dashboards update every ten minutes regardless of the currently selected tab (IP) or the LAN size.
Performance monitors TABLE 26 8 Preconfigure performance monitors Monitor title Description Data collectors Bottom Port Utilization Percentage Table view of the port utilization percentage measure. There are four versions of this monitor based on the type of port: All ports, initiator ports, ISL ports, and Target ports.
8 Performance monitors • Connected_Port_Link (where Connected_Port_Link is Connected Port, Initiator, or Target) — Displays one of the following: - Connected Port — The ISL or IFL port on the connected device. Click to launch the switch port properties dialog box. - Initiator — The initiator port on the connected device. Click to launch the device properties dialog box. - Target — The target port on the connected device. Click to launch the device properties dialog box.
Performance monitors 8 Top Port C3 Discards monitor The Top Port C3 Discards monitor (Figure 93) displays the top ports with Class 3 frames discarded in a table. There are four port widgets: All, ISL, Initiator, and Target. FIGURE 93 Top Port C3 Discards monitor The Top Port C3 Discards monitor includes the following data: • Severity icon/monitor title — The worst severity of the data based on the error count shown next to the monitor title. • Port — The port affected by this monitor.
8 Performance monitors To customize the monitor to display data by a selected time frame as well as customize the display options, refer to “Editing a preconfigured performance monitor” on page 272. Accessing additional data from the Top Port C3 Discards monitor • Right-click a row in the monitor to access the shortcut menu available for the associated device. For more information about shortcut menus, refer to “Application menus” on page 1299.
Performance monitors 8 • C3 Discards RX TO — The number (error count) of Class 3 frames received at this port and discarded at the transmission port due to timeout errors for the duration specified in the monitor. • • • • • • • Product — The product affected by this monitor. Type — The type of port (for example, U-Port). Identifier — The port identifier. Port Number — The port number. State — The port state (for example, Enabled). Status — The port status (for example, Up).
8 Performance monitors • Connected_Port_Link (where Connected_Port_Link is Connected Port, Initiator, or Target) — Displays one of the following: - Connected Port — The ISL or IFL port on the connected device. Click to launch the switch port properties dialog box. - Initiator — The initiator port on the connected device. Click to launch the device properties dialog box. - Target — The target port on the connected device. Click to launch the device properties dialog box.
Performance monitors 8 Top Port Discards monitor The Top Port Discards monitor (Figure 96) displays the top ports with receive and transmit discards in a table. FIGURE 96 Top Port Discards monitor The Top Port Discards monitor includes the following data: • Severity icon/monitor title — The worst severity of the data based on the error count shown next to the monitor title. • Port — The port affected by this monitor.
8 Performance monitors • Status — The port status (for example, Up). • Refreshed — The time of the last update for the monitor. To customize the monitor to display data by a selected time frame as well as customize the display options, refer to “Editing a preconfigured performance monitor” on page 272. Accessing additional data from the Top Port Discards monitor • Right-click a row in the monitor to access the shortcut menu available for the associated device.
Performance monitors 8 • Encode Error Out/sec — The number (error rate) of encoding errors outside of frames per second for the duration specified in the monitor. • Encode Error Out — The number (error count) of encoding errors outside of frames for the duration specified in the monitor. • • • • • • • Product — The product affected by this monitor. Type — The type of port (for example, U-Port). Identifier — The port identifier. Port Number — The port number.
8 Performance monitors The Top Port Errors monitor includes the following data: • Severity icon/monitor title — The worst severity of the data based on the error count shown next to the monitor title. • Port — The port affected by this monitor. • Connected_Port_Link (where Connected_Port_Link is Connected Port, Initiator, or Target) — Displays one of the following: - Connected Port — The ISL or IFL port on the connected device. Click to launch the switch port properties dialog box.
Performance monitors 8 Top Port Overflow Errors monitor The Top Port Overflow Errors performance monitor (Figure 99) displays the top ports with overflow erros in a table. FIGURE 99 Top Port Overflow Errors performance monitor The Top Port Overflow Errors performance monitor includes the following data: • Threshold icon/object count/monitor title — The color associated with the threshold and number of objects within that threshold displays next to the monitor title.
8 Performance monitors • Refreshed — The time of the last update for the monitor. To edit a port performance monitor, refer to “Editing a preconfigured performance monitor” on page 272. Top Port Receive EOF monitor The Top Port Receive EOF performance monitor displays the top ports with received end-of-frames in a table.
Performance monitors 8 • Connected_Port_Link (where Connected_Port_Link is Connected Port, Initiator, or Target) — Displays one of the following: - Connected Port — The ISL or IFL port on the connected device. Click to launch the switch port properties dialog box. - Initiator — The initiator port on the connected device. Click to launch the device properties dialog box. - Target — The target port on the connected device. Click to launch the device properties dialog box.
8 Performance monitors The Top Port Sync Losses monitor includes the following data: • Severity icon/monitor title — The color of the worst severity of the data shown next to the monitor title. • Port — The port affected by this monitor. • Connected_Port_Link (where Connected_Port_Link is Connected Port, Initiator, or Target) — Displays one of the following: • • • • • • • • • - Connected Port — The ISL or IFL port on the connected device. Click to launch the switch port properties dialog box.
Performance monitors 8 • Connected_Port_Link (where Connected_Port_Link is Connected Port, Initiator, or Target) — Displays one of the following: - Connected Port — The ISL or IFL port on the connected device. Click to launch the switch port properties dialog box. - Initiator — The initiator port on the connected device. Click to launch the device properties dialog box. - Target — The target port on the connected device. Click to launch the device properties dialog box.
8 Performance monitors The Top Port Traffic monitor includes the following data: • Severity icon/monitor title — Displays the worst severity of the data shown next to the monitor title. • Port — The port affected by this monitor. • Connected_Port_Link (where Connected_Port_Link is Connected Port, Initiator, or Target) — Displays one of the following: • • • • • • • • • - Connected Port — The ISL or IFL port on the connected device. Click to launch the switch port properties dialog box.
Performance monitors 8 • Connected_Port_Link (where Connected_Port_Link is Connected Port, Initiator, or Target) — Displays one of the following: - Connected Port — The ISL or IFL port on the connected device. Click to launch the switch port properties dialog box. - Initiator — The initiator port on the connected device. Click to launch the device properties dialog box. - Target — The target port on the connected device. Click to launch the device properties dialog box.
8 Performance monitors • Connected_Port_Link (where Connected_Port_Link is Connected Port, Initiator, or Target) — Displays one of the following: • • • • • • • • • - Connected Port — The ISL or IFL port on the connected device. Click to launch the switch port properties dialog box. - Initiator — The initiator port on the connected device. Click to launch the device properties dialog box. - Target — The target port on the connected device. Click to launch the device properties dialog box.
Performance monitors 8 Bottom Port Utilization Percentage monitor The Bottom Port Utilization Percentage monitor (Figure 103) displays the bottom port utilization percentages in a table. FIGURE 103 Bottom Port Utilization Percentage monitor The Top Port Utilization Percentage monitor includes the following data: • Severity icon/monitor title — The worst severity of the data shown next to the monitor title. • Port — The port affected by this monitor.
8 Performance monitors Accessing additional data from the Top Port Utilization monitor • Right-click a row in the monitor to access the shortcut menu available for the associated device. For more information about shortcut menus, refer to “Application menus” on page 1299. • Double-click a row to navigate to the Historical Graphs/Tables dialog box. For more information, refer to “Performance Data” on page 1009.
Performance monitors 8 • Contact — A contact name for the product. • Refreshed — The time of the last update for the monitor. To customize the monitor to display data by a selected time frame as well as customize the display options, refer to “Editing a preconfigured performance monitor” on page 272. Accessing additional data from the Top Product CPU Utilization monitor • Right-click a row in the monitor to access the shortcut menu available for the associated device.
8 Performance monitors • • • • • • • Serial # — The serial number of the product. Model — The product model. Port Count — The number of ports on the product. Firmware — The firmware level running on the product. Location — The location of the product. Contact — A contact name for the product. Refreshed — The time of the last update for the monitor.
Performance monitors • • • • • • • • • • • • • 8 Max — The maximum value of the measure in the specified time range. Fabric — The fabric to which the device belongs. Product Type — The type of product (for example, switch). State — The product state (for example, Offline). Status — The product status (for example, Reachable). Tag — The product tag. Serial # — The serial number of the product. Model — The product model. Port Count — The number of ports on the product.
8 Performance monitors The Top Product Temperature monitor includes the following data: • Severity icon/temperature/monitor title — The worst severity of the data and the temperature displays next to the monitor title. • • • • • • • • • • • • • • • • Product — The product affected by this monitor. Min — The minimum value of the measure in the specified time range. Temperature — The top temperatures. Max — The maximum value of the measure in the specified time range.
Performance monitors 8 Top Products with Unused Ports monitor The Top Products with Unused Ports monitor (Figure 104) displays the top products with ports not in use in a table. FIGURE 108 Top Product CPU Utilization monitor The Top Products with Unused Ports monitor includes the following data: • • • • • • • • • • • • • • • • • Severity icon/monitor title — The worst severity of the data shown next to the monitor title. Product — The product affected by this monitor.
8 Performance monitors Accessing additional data from the Top Product CPU Utilization monitor • Right-click a row in the monitor to access the shortcut menu available for the associated device. For more information about shortcut menus, refer to “Application menus” on page 1299. • Double-click a row to navigate to the Historical Graphs/Tables dialog box. For more information, refer to “Performance Data” on page 1009.
User-defined performance monitors 8 • To specify a color based on values of cyan, magenta, yellow, and black, click the CMYK tab. Specify the values for cyan (0 through 255), magenta (0 through 255), yellow (0 through 255), black (0 through 255), and alpha (0 through 255). • To reset to the default color, click Reset. 5. Click OK to save your changes. User-defined performance monitors The Performance Dashboard makes it easy for you to customize performance monitors specific to your needs.
8 User-defined performance monitors • Port - Common - IP - Port Utilization Percentage — The memory utilization percentage. Traffic — The traffic in mbps. CRC Errors — The number of CRC errors. Errors — The number of errors. Discards — The number of discarded frames. Wireless Dropped Events — The number of dropped events. MAC Errors — The number of MAC errors. Back Packets Received — The number of bad packets received. Tx Errors — The number of transmit errors.
User-defined performance monitors • • • • • • • • • • • • • 8 Max — The maximum value of the measure in the specified time range. Fabric — The fabric to which the device belongs. Product Type — The type of product (for example, switch). State — The product state (for example, Offline). Status — The product status (for example, Reachable). Tag — The product tag. Serial # — The serial number of the product. Model — The product model. Port Count — The number of ports on the product.
8 User-defined performance monitors The top or bottom port performance monitor includes the following data: • Threshold icon/object count/monitor title — The color associated with the threshold and number of objects within that threshold displays next to the monitor title. • Severity icon/monitor title — The worst severity of the data based on the error count or error rate shown next to the monitor title. • Port — The port affected by this monitor.
User-defined performance monitors 8 Distribution performance monitors The distribution performance monitor (Figure 111) displays the distribution (number) of products or ports for each of the five percentage ranges defined for the selected measure in a bar graph. FIGURE 111 Distribution performance monitor example The distribution performance monitor includes the following data: • Monitor title — The user-defined monitor title.
8 User-defined performance monitors • Refreshed — The time of the last update for the monitor. To configure a distribution performance monitor, refer to “Configuring a user-defined product performance monitor” on page 279 or “Configuring a user-defined port performance monitor” on page 282. Accessing additional data from the Distribution monitors • Place the cursor on a bar in the graph to display the number of products included in the count for the selected bar.
User-defined performance monitors 8 • Network Scope — The network scope, such as Local or Published. Displays Local if you select the targets when creating the monitor. Displays Published if you select the Use Network Scope check box when creating the monitor. Place the cursor on a data point in graph line to view details. Place the cursor on an Event icon to view the event details. Right-click the graph to access the graph shortcut menu (refer to “Configuring the performance graph” on page 1027).
8 User-defined performance monitors 6. Select the type of monitor you are creating from the Monitor Type - Products area: • Top N — Select to monitor the top N (number) products affected by the selected measure. • Bottom N — Select to monitor the bottom N (number) products affected by the selected measure. • Distribution — Select to monitor the selected measure for five defined distribution percentages. • Time Series — Select to monitor a selected measure for a range of time and specified target. 7.
User-defined performance monitors c. 8 Click the color square to launch the Color dialog box. • To pick a color from a swatch, select the Swatches tab. Select a color from the display. • To specify a color based on hue, saturation, and brightness, click the HSV tab. Specify the hue (0 through 360 degrees), saturation (0 through 100%), value (0 through 100%), and transparency (0 through 100%). • To specify a color based on hue, saturation, and lightness, click the HSL tab.
8 User-defined performance monitors 3. Click the Performance tab. 4. Click Add. The Add Performance Dashboard Monitor dialog box displays. 5. Select Time Series from the Monitor Type - Product or Port area. 6. Select the port measure for the monitor in the Measure area 7. Display data for a specific duration from the Duration options. 8. Click Add beneath the Targets table. The Performance Dashboard Monitor Targets dialog box displays.
User-defined performance monitors 8 • Time Series — Select to monitor a selected measure for a range of time and specified targets. 6. Select the port measure for the monitor in the Measure area: Common • Port Utilization Percentage • Traffic • CRC Errors 7.
8 User-defined performance monitors • To specify a color based on values of red, green, and blue, click the RGB tab. Specify the values for red (0 through 255), green (0 through 255), blue (0 through 255), and alpha (0 through 255). • To specify a color based on values of cyan, magenta, yellow, and black, click the CMYK tab. Specify the values for cyan (0 through 255), magenta (0 through 255), yellow (0 through 255), black (0 through 255), and alpha (0 through 255).
User-defined performance monitors 8 • VLAN 6. Select the number of products to include in a selected measure by entering a number in the For Top N, Bottom N Monitors, N= text box. Valid values are from 1 through 25. The default is 10. 7. Configure the monitor to show only values greater than or less than a specified value by completing the following steps. a. Select the Show values check box. b. Select greater than or less than from the list. c. Enter a value in the field. 8.
8 User-defined performance monitors System Up Time — The system up time in days for the product. Ports Not In Use — The number of ports not in use for the product. Ping Packet Loss Percentage — The ping packet loss percentage for the product. AP Client Count — The number of AP clients for the product. Fabric — The fabric to which the device belongs. • • • • • • • • • • • Product Type — The type of product (for example, switch). State — The product state (for example, Offline).
User-defined performance monitors • • • • • • 8 Tx Errors — The number of transmit errors. Product — The product affected by this monitor. Type — The type of port (for example, U-Port). Identifier — The port identifier. Port Number — The port number. State — The port state (for example, Enabled). Status — The port status (for example, Up). 3. Click Close. Configuring a monitor from a performance graph 1. Configure the performance graph.
8 288 User-defined performance monitors Brocade Network Advisor IP User Manual 53-1002947-01
Chapter 9 View Management In this chapter • IP tab overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Icon legend. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Customizing the main window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Product List customization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Search . . . . . . . . . . . . .
9 IP tab overview FIGURE 113 Main Window - IP tab 1. Menu bar — Lists commands you can perform on the IP tab. Some menu items display as disabled unless you select the correct object from the product list or topology map. For a list of the many functions available on each menu, refer to “IP main menus” on page 1300. 2. IP main toolbar — Provides buttons that enable quick access to dialog boxes and functions. For more information, refer to “IP main toolbar” on page 291. 3.
IP tab overview 9 11. Status bar — Displays data regarding the connection, port, product, special event, call home, and backup status, as well as Server and User data. For more information, refer to “Status bar” on page 299. IP main toolbar The toolbar is located beneath the Menu bar and provides icons to perform various functions. 1 2 3 4 5 6 7 8 9 10 11 12 13 FIGURE 114 Main toolbar The icons on your toolbar vary based on the licensed features on your system. 1.
9 IP tab overview Product List toolbar This toolbar is located at the top of the product list and provides lists, links, and buttons to perform various functions. The items on this toolbar vary based on what you select from the Type list. 1 2 3 4 FIGURE 115 Product list toolbar 1. View list — Use to select the one of the following view types: Network Objects, IP Topology, L2 Topology, and VLAN Topology. The areas of the main display vary depending on the display type you select.
IP tab overview 9 Host Product List toolbar The Port Display buttons are located at the top right of the Product List and enable you to configure how ports display. You have the option of viewing connected (or occupied) product ports, unoccupied product ports, or attached ports. Not enabled until you discover a fabric or host. NOTE Occupied/connected ports are those that originate from a device, such as a switch. Attached ports are ports of the target devices that are connected to the originating device.
9 IP tab overview 7. Reset zoom list — Use to reset the zoom (Actual Size, Fit Content, 25%, 50%, 75%, 100%, 125%, 150%, 200%, or 500%) of the Topology Map. 8. Zoom In icon — Use to zoom in on the Topology Map. Host topology map toolbar The Host Topology map toolbar is located at the top right side of the View window and provides tools to export the topology, to zoom in and out of the Topology Map, collapse and expand groups, and fit the topology to the window. Not enabled until you discover a host.
IP tab overview 9 • Status — Displays the status for the produc, such as Reachable, Marginal, Degraded Link, or Not Reachable. • • • • • • • • • • State (Ethernet Fabrics only) — Displays the Ethernet Fabric state, such as online or offline. Vendor — Displays the name of the product’s vendor. Model — Displays the model number of the product. Port Count — Displays the number of ports on the product. Firmware — Displays the firmware version of the product.
9 IP tab overview Topology Map The Topology map displays the topology, including discovered and monitored devices and connections. For more information about topology maps, refer to “IP topology view manager” on page 317. FIGURE 119 Topology Map Topology Map functions • Two-way selection — Select an icon on the topology map and that device is highlighted in the Product List and vice versa. For more information about icons, refer to “Icon legend” on page 301.
IP tab overview 9 Topology map keyboard shortcuts For the L2, Ethernet Fabrics, IP, and VLAN topologies, you can use the keystrokes shown in the table below to perform common topology map functions. TABLE 29 Topology keyboard shortcuts Keyboard Shortcut Description Number Pad + Zoom in on the topology. Number Pad - Zoom out on the topology. Control + 0 Set the zoom level to 100%. Control + P Launch the Print dialog box. Control + E Launch the Export dialog box.
9 IP tab overview • • • • • • • • Count — The number of times the event occurred. • • • • • • First Event Product Time — The time and date the event first occurred on the product. Module Name — The name of the module on which the event occurred. Message ID — The message ID of the event. Product Address — The IP address of the product on which the event originated. Contributor — The name of the contributor on which the event occurred.
IP tab overview 9 Anchoring or floating the Minimap You can anchor or float the Minimap to customize your main window. • To float the Minimap and view it in a separate window, click the Detach icon ( ) in the upper right corner of the Minimap. • To anchor the Minimap and return the Minimap to its original location on the main window, do one of the following steps: - Click the Attach icon ( Click the Close icon ( ) in the upper right corner of the Minimap. ) in the upper right corner of the Minimap.
9 IP tab overview 4. Network Size Status — Displays a memory allocation status icon, which allows you to determine the current network size status. Double-click the icon to launch the Memory Allocation pane of the Options dialog box. Let the pointer pause on the backup status icon to display the following information in a tooltip. • Network size within limits icon — Network size is within the recommended count. • Ne work size exceeds limits icon — Network size exceeds the recommended count. 5.
Icon legend 9 Icon legend Various icons are used to illustrate devices and connections in a network. The following tables list icons that display on the Connectivity Map and Product List. IP product icons The following table lists the manageable IronWare and Network OS product icons that display on the topology. Manageable devices display with blue icons. Unmanageable devices display with gray icons. Some of the icons shown only display when certain features are licensed.
9 Icon legend Host product icons The following table lists the manageable Host product icons that display on the topology. Fabric OS manageable devices display with blue icons. Unmanageable devices display with gray icons. Some of the icons shown only display when certain features are licensed.
Icon legend 9 IP product status icons The following table lists the product status icons that display on the topology. TABLE 34 Icon Status No icon Reachable Degraded/Marginal Down/Failed Degraded Link Not Reachable Unknown/Link Down Unhealthy Event icons The following table lists the event icons that display on the topology and Master Log. For more information about events, refer to .
9 Customizing the main window Customizing the main window You can customize the main window to display only the data you need by displaying different levels of detail on the Connectivity Map (topology) or Product List. Zooming in and out of the Connectivity Map You can zoom in or out of the Connectivity Map to see products and ports. Zooming in To zoom in on the Connectivity Map, use one of the following methods: • Click the zoom-in icon ( ) on the Connectivity Map toolbar.
Customizing the main window 9 Customizing application tables You can customize any table in the Management application main interface (for example, the Master Log or the Product List) or in individual dialog boxes in the following ways: • • • • • • • • • Display only specific columns Display columns in a specific order Resize the columns to fit the contents Sort the table by a specific column or multiple columns Copy information from the table to another application Export information from the table Sea
9 Customizing the main window • Clear the check box to hide a column. OR Select the column name and click Hide. • Click Select All to select all check boxes. • Click Deselect All to clear all check boxes. • Click Restore Defaults to restore the table to the original settings. 3. Click OK. Changing the order of columns To change the order in which columns display, choose from one of the following options. Rearrange columns in a table by dragging and dropping the column to a new location. OR 1.
Customizing the main window 9 2. Open the application to which you want to copy the Product List information. 3. Select Edit > Paste (or press CTRL + V). 4. Save the file. Exporting table information You can export the entire table or a specific row to a text file. 1. Choose from one of the following options: • Right-click anywhere in the table and select Table > Export Table. • Select the table row that you want to export and select Table > Export Row.
9 Product List customization Product List customization NOTE Properties customization requires read and write permissions to the Properties - Add / Delete Columns privilege. You can customize the Product List by creating user-defined product and port property labels. You can also edit or delete user-defined property labels, as needed. You can create up to three user-defined property labels from the Product List for each of the following object types: product and port properties.
Search 9 Editing a property label You can only edit labels that you create on the Product List. To edit a user-defined property label (column heading), complete the following steps. 1. Right-click the column heading on the Product List for the property you want to edit and select Edit Column. The Edit Property dialog box displays. 2. Change the label and description for the property, as needed. The label must be unique and can be up to 30 characters. The description can be up to 126 characters.
9 Search The Search features contains a number of components. The following graphic illustrates the various areas, and descriptions of them are listed below. 1 2 3 4 1. Text field — Enter the text or unicode regular expression for which you want to search. 2. Search list — Select one of the following options: • Text option — Select this option if you entered a text string in the text field.
Search 9 Restricting a search by node When a device is assigned to a product group, it may be listed in the Product node, as well as Product Groups node. Therefore the search results include the device under both the Product node and the Product Group node. NOTE To search for a device, the device must be discovered and display in the topology. To restrict the search only to specific nodes, complete the following steps. 1. Select the Product node or Product Group node that you want to search. 2.
9 Address Finder 3. Press Ctrl and click the search icon. The search results display highlighted. Example If you search for IP address “192.1.1.101” and then press CTRL and click the search icon, the application only highlights “192.1.1.101”. This search does not highlight "SI-101 [192.1.1.101]". If you search for port "1/2" and then press CTRL and click the search icon, the application only highlights port “1/2”. This search does not highlight ports "1/2", "1/20", "1/21", "1/22", and so forth.
Address Finder 9 Finding IP addresses NOTE Address Finder is only supported on Network OS products running 3.0 or later. When searching for an IP address, Address Finder sends a couple of packets to the target IP address to prime Address Resolution Protocol (ARP) caches. It then looks in the Management application database to find all the Layer 3 devices on the target subnet, and then queries the ARP table of each one to find the target IP address.
9 Address Finder 4. Select the Find only in the selected products check box to limit the search to selected products. When you access Address Finder from the Element Manager interface (refer to “Element Manager interface overview” on page 773), the Find only in the selected products check box is selected by default to limit the search to the selected Ethernet router device. 5. Select the product you want to include in the search in the Available Products list. 6.
Address Finder 9 Finding MAC addresses NOTE MAC address search is supported on Network OS products running 2.1.0 or later. To find a MAC address, Address Finder searches the learned MAC address tables of each device that is in the database. To find a IP address, refer to “Finding IP addresses” on page 313. To find a MAC address, complete the following steps. 1. Click the IP tab. 2. Select Tools > Address Finder. The Address Finder dialog box displays. FIGURE 126 Address Finder dialog box 3.
9 Address Finder 4. Select the Find only in the selected products check box to limit the search to selected products. When you access Address Finder from the Element Manager interface (refer to “Element Manager interface overview” on page 773), the Find only in the selected products check box is selected by default to limit the search to the selected Ethernet router device. 5. Select the product you want to include in the search in the Available Products list. 6.
IP topology view manager 9 8. Click Port Properties to launch the Port Properties dialog box for the device. 9. Click Close to close the Address Finder dialog box. IP topology view manager The topology view manager enables you to choose how to view devices in your network. Topology views only contain devices included in your area of responsibility (AOR). To display topology views in the Management application, make sure you meet the following requirements.
9 Network Objects view Network Objects view The Network Objects view displays a list of discovered products in a table (Product List). This view allows you to manage user authentications and permissions on discovered devices. In addition, you can place devices into management groups, which are used for configuration, deployment, accounting, monitoring, and reporting processes. The following columns (presented here in alphabetical order) are included in the Product List: • Build Label.
Network Objects view 9 Filtering devices in the Network Objects Product List To filter specific devices from the Network Objects Product List, complete the following steps. 1. Select Network Objects from the view list on the Product List toolbar. 2. Click Filter. The Product Filter dialog box displays. Only the categories or objects listed under the Selected Categories list display on the Network Objects Product List.
9 IP Topology view IP Topology view The IP Topology view displays a map of the devices on your network. To display the topology map for IP, you must have the IP - Main Display - IP privilege. For more information about privileges, refer to “User Privileges” on page 1321. For more information about the components and customization of the topology map, refer to the following sections: • “IP topology map components” on page 326. • “Topology map elements” on page 326. • “Topology map layout” on page 328.
Ethernet Fabrics view 9 Ethernet Fabrics view The Ethernet Fabrics view displays a map of the traffic for VCS devices on your network. To view the fabric members and TRILL (Transparent Interconnection of Lots of Links) connections for a fabric, double-click the fabric in the Product List. To display the topology map for Ethernet Fabrics, you must have the Main Display - Ethernet Fabric privilege. For more information about privileges, refer to “User Privileges” on page 1321.
9 VLAN Topology view STP/RSTP topology You can display topology maps for STP or RSTP configurations from the VLAN Topology view. Before you display the STP or RSTP topology, make sure you meet the following requirements: • The devices are running FDP or LLDP. If you do not enable FDP or LLDP on a product, the product displays without any links. • The snIfStpTable MIB table (OID.1.3.6.1.4.1.1991.1.1.3.5.2) is enabled on the device and has either STP or RSTP configured.
VLAN Topology view TABLE 36 9 STP/RSTP Topology map elements Element Description # (U) # (T) # (D) The port or interface number used to create the link and one of the following: • (U) — Untagged port • (T) — Tagged port • (D) — Dual-mode port tool tips Link tool tips — identifies the devices at each end of the link to help you locate the devices on the map. Node tool tips — identifies the device name, IP address, and bridge ID of the node.
9 Host Topology view 9. Click Save. E-mailing an STP/RSTP Report To export an STP/RSTP report, complete the following steps. 1. Select VLAN Topology from the view list on the Product List toolbar. Mouse over the STP button. A tool tip appears, indicating whether STP is on or off. 2. If STP is off, click STP to turn it on. 3. Select a VLAN or PVLAN from the VLAN Product List. 4. Right-click a device on the topology map and select STP Report from the list. The STP/RSTP Report displays. 5. Click E-mail. 6.
Host Topology view • • • • IP Address. Displays the IP address (IPv4 or IPv6 format) of the product. • • • • • • • • • • • • • • • Port #. Displays the number of the port. 9 Location. Displays the physical location of the product. This field is editable at the fabric level. Model. Displays the model number of the product. Name. Displays the name of the product. This field is editable at the fabric, device, and port level. Port Count. Displays the number of ports on the product. Port Type.
9 IP topology map components IP topology map components Topology maps are divided into three sections: • Product List — The top left pane displays a list of all devices (topology tree) in your AOR. Devices display in topology groups. The Management application has a Search tool that you can use to find a device quickly. (Refer to “Using the Search tool” on page 53 for more information.
IP topology map components 9 Table 37 displays the elements included in the topology.
9 IP topology map components • Subnets — This node displays as a blue circle. Double-click a subnet to display the devices within the subnet. • Layer 2 Clouds — This node displays as a blue cloud. When two or more devices with FDP or LLDP enabled connect to a device or network without FDP or LLDP capability, the L2 cloud icon is displayed to represent the connection between the device types.
IP topology map components 9 • During a session, as you enter and exit any of the topology views, the last layout used is the one displayed when you return to that topology view. However, the layouts are reset to the default layouts when you logout of the Management application. The following examples show the differences between the layouts. They may or may not match the map drawn for your network.
9 IP topology map components Orthogonal The Orthogonal layout displays the nodes compactly with no overlaps, minimizes crisscrossing of connections, and tries to prevent nodes from touching each other. This layout is best for medium-sized sparse graphs since it produces clear representations of complex networks. Orthogonal (Merge Lines) The Orthogonal (Merge Lines) layout displays the nodes in a concise tree-like structure using vertical and horizontal line segments.
IP topology map components 9 Hierarchical The Hierarchical layout is best for a complex map. This layout might have a start point and end point, with some overall flow between those points. Circular The Circular layout distributes all nodes in a circle, with equal spacing between each neighbor node. Free Form This layout is the one you customize by repositioning the nodes on the map.
9 IP topology map components Selecting a topology map layout To change the topology layout, complete the following steps. 1. Select one of the following view types from the view list on the Product List toolbar. • • • • L2 Topology Ethernet Fabrics IP Topology VLAN Topology 2. Click the Topology Display icon on the Topology Map toolbar. The Topology Display dialog box displays. FIGURE 128 Topology Display dialog box 3. Select one of the following topology layouts in the Layout area.
IP topology map components 9 Creating a customized layout You can create one customized layout for each group node in each topology view. To customize the layout for a topology map, complete the following steps. 1. Select the view you want to customize from the view list on the Product List toolbar. • • • • IP Topology L2 Topology Ethernet Fabrics VLAN Topology 2. Click a node and drag it to a new position on the map. The application automatically changes the layout to Free Form.
9 IP topology map components • The interface name must use the exact format returned by the ifName MIB variable for that device.The interface name can be found in the Interface Name column of the Detailed Product Report, Physical Ports section. • If the ifName value contains a space in the name, then the interface name should be within double quotes. Examples 143.140.1.222|ethernet8/12 192.1.7.182|ethernet49 10.24.84.1|"ExT 0/15" 10.24.84.4|"ExT 0/16" 143.140.1.222|"ethernet 8/12" 192.1.7.
IP topology map components 9 2. Change the background color by selecting a color from the Color list. a. To select a color not included in the Color list, select More Colors from the Color list. The Choose a Color dialog box displays. b. Choose one of the following options to select the color you want: • To pick a color from a swatch, select the Swatches tab. Select a color from the display. • To specify a color based on hue, saturation, and value, click the HSV tab.
9 IP topology map components Adding a background image to a map Make sure you have the background image on your hard drive. You can use any image type (supported by Java), including GIF, JPG, JPEG, or PNG file format. NOTE The image file name cannot be longer than 64 characters. You can add a background image to each topology sub type. For example VLAN 5 and VLAN 14 can have different background images. To add a background image to a Topology Map, complete the following steps. 1.
IP topology map components 9 Deleting a background image from the library You can only delete images not in use in any topology or by any user. To delete a background image to a Topology Map, complete the following steps. 1. Click Map on the Topology Map tool bar. The Topology Background Map dialog box displays. 2. Select the image you want to delete in the Image Library list and click Delete. 3. Click OK on the Topology Background Map dialog box. 4. Click Yes on the confirmation message.
9 IP topology map components 5. To set additional options (such as poster print, headers, and footers), click Options. The Print Options dialog box displays. a. Click the General tab. b. Enter the number of rows in the Poster Rows field. c. Enter the number of columns in the Poster Columns field. d. Enter the number of columns in the Poster Columns field. e. To add poster coordinates, select the Add Poster Coords check box. f. Click the Title tab. g. Enter a title in the Text field. h.
Port actions 9 Port actions The Management application allows to you enable and disable port actions, display the port properties of the Network OS device to which the FCoE WWN is attached, as well as access performance monitoring from the Port tab of the Properties dialog box. Enabling port actions To enable port actions, complete the following steps. 1. Select one of the following view types from the view list on the Product List toolbar.
9 Port actions Displaying port properties for an attached device The Display Attached Port Properties option is only applicable for routed-in devices. The device must be managed by the Management application and part of your AOR. To display the port properties of the Network OS device to which the FCoE WWN is attached, complete the following steps. 1. Select one of the following view types from the view list on the Product List toolbar.
Port actions 9 4. Select one of the following from the Performance list. • Real Time Graph/Table • Historical Graph/Table The Real Time Graph/Table or Historical Graph/Table dialog box displays. To configure and generate real time performance, refer to “IP real-time performance monitoring” on page 1021. To configure and generate historical performance, refer to “IP historical performance monitoring” on page 1033. 5. Click OK to close the Device_Name Properties dialog box.
9 342 Port actions Brocade Network Advisor IP User Manual 53-1002947-01
Chapter 10 MRP Topology In this chapter • MRP Topology overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Viewing a MRP Topology map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Viewing a MRP ring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Configuring the application to show a dashed line . . . . . . . . . . . . . . . . . . . • Selecting a topology map layout. . . . . . . . . . . . . . .
10 Viewing a MRP Topology map - FastIron CX switches running FCX software release 04.0.00 and later. FastIron GS, FastIron LS, and FastIron WS running FGS software release 04.0.00 and later. You can use the CLI Configuration Manager to deploy MRP configurations to devices. You can also configure MRP using the device CLI. You can use the Element Manager to access the device or go directly to the device CLI.
Viewing a MRP ring 10 • Topology Map — The right pane displays the devices in a MRP ring using graphic elements (icons). Links between devices running FDP or LLDP display automatically on the topology maps. When you select a device on the Topology Map, the application highlights the device in the Product List. Viewing a MRP ring To view a MRP ring, click a ring in the Product List. The selected ring displays in the Topology Map.
10 Viewing a MRP ring TABLE 38 MRP Topology map elements Element Description The port is in a pre-forwarding or forwarding state and shows the direction of the packet flow. link with arrow head The port is in a blocking state or discarding. link with block MRP is disabled on the port. link with solid black circle # or # / # The forwarding or receiving port number of slot/port number.
Configuring the application to show a dashed line 10 • Save button. Use to save changes to the MRP Topology map. For more information about layout types, refer to “Creating a customized layout” on page 351. • Map button. Use to add a background image to the Topology Map. For more information about adding a background image, refer to “Adding a background image to a map” on page 336. • • • • • • Options button. Use to configure topology options. Fit Window icon.
10 Selecting a topology map layout Selecting a topology map layout To change the topology layout, select one of the following topology layouts from the layout type list on the Topology Map toolbar. • Fast Organic The Fast Organic layout is a variation on the Organic layout; however, connections are drawn closer to the nodes. The time it takes to draw the Fast Organic layout is proportional to the number of nodes squared. Generally, this layout is best for smaller networks.
Selecting a topology map layout 10 • Organic The Organic layout distributes the nodes evenly, makes connection lengths uniform, minimizes criss-crossing of connections, and tries to prevent nodes from touching each other. • Hierarchical The Hierarchical layout is best for a complex map. This layout might have a start point and end point, with some overall flow between those points.
10 Selecting a topology map layout • Self Organizing The Self Organizing layout distributes nodes and connections evenly on the display area in a linear layout. • Circular The Circular layout distributes all nodes in a circle, with equal spacing between each neighbor node.
Creating a customized layout 10 • Saved This layout is the one you customized by repositioning the nodes on the map. If you have not customized the layout, this Saved option is disabled. Also, if you select the Saved Layout Preferred check box on the Topology Options dialog box, this layout takes precedence over the default layout. The Management application redraws the MRP Topology map. For more information about layout types, refer to “Topology map layout” on page 328.
10 Customizing the MRP Topology map Customizing the MRP Topology map To customize the MRP Topology map, complete the following steps. 1. Click Options on the MRP Topology map tool bar. The MRP Topology Options dialog box displays. FIGURE 132 Topology Options dialog box 2. Change the background color by completing the following steps: a. Click the ellipsis button in the Background Color row. b. Select the color you want. c. Click OK. 3.
Refreshing MRP Topology data 10 8. Select the Saved Layout Preferred check box to set the customized layout as the default for the topology group. This parameter supersedes the Layout parameter. If you select this parameter, the Saved layout displays even if a different layout is indicated in the Layout parameter. 9. Click Close on the MRP Topology Options dialog box. Refreshing MRP Topology data To refresh the MRP Topology data, click Refresh.
10 Viewing MRP properties • Secondary Port — The secondary port of the device. • Secondary Port Active — The port number receiving RHPs. • Secondary Port State — The state (Pre-forwarding, Forwarding, Blocking, or Disabled) of the secondary port. • • • • Secondary Port Type — The secondary port type (Regular or Tunnel). State — Whether MRP is enabled or disabled on the device. State Changed — The number of MRP interface state changes that have occurred.
Chapter 11 Call Home In this chapter • Call Home overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Viewing Call Home configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Showing a Call Home center. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Hiding a Call Home center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Editing a Call Home center . . . . . . . . . . . . . . .
11 Call Home overview Call Home overview NOTE Call Home is supported on Windows systems for all modem and e-mail Call Home centers and is supported on UNIX for the e-mail Call Home centers. Call Home notification allows you to configure the Management application server to automatically send an e-mail alert or dial in to a support center to report system problems on specified devices (Fabric OS, IronWare, and Network OS switches, routers, and directors).
Viewing Call Home configurations 11 Call Home allows you to perform the following tasks: • Assign devices to and remove devices from the Call Home centers. • Define filters from the list of events generated by Fabric OS, IronWare, and Network OS devices. • Edit and remove filters available in the Call Home Event Filters table. • Apply filters to and remove filters from the devices individually or in groups.
11 Viewing Call Home configurations The Call Home dialog box contains the following fields and components: • Products List — Displays all discovered products. The list allows for multiple selections and manual sorting of columns. This list displays the following information: Product Icon — The status of the products’ manageability. Name — The name of the product. IP Address — The IP address (IPv4 or IPv6 format) of the product. Node WWN — The node world wide name of the product.
Viewing Call Home configurations 11 • Left arrow button (bottom) — Click to remove the selected event filter (refer to “Removing all event filter from a Call Home center” on page 374 or “Removing an event filter from a device” on page 375) from the selected Call Home center or product. Disabled when no event filter, product, or Call Home center is selected in the Call Home Centers list.
11 Showing a Call Home center Showing a Call Home center To show a Call Home center, complete the following steps. 1. Select Monitor > Event Notification > Call Home. The Call Home dialog box displays. 2. Click Show/Hide Centers (beneath the Call Home Centers list). The Centers dialog box displays with a predefined list of Call Home centers (Figure 134). FIGURE 134 Centers dialog box 3. Select the check boxes of the Call Home centers you want to display. Clear the check box to hide the Call Home center.
Editing a Call Home center 11 Editing a Call Home center To edit a Call Home center, select from the following procedures: • Editing the IBM Call Home center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Editing an e-mail Call Home center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Editing the EMC Call Home center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Editing the HP LAN Call Home center. . . . . . . . . . . . . . . . . . . . . . . . . .
11 Editing a Call Home center 8. Enter how often you want to retry the heartbeat interval in the Retry Interval field. The default is 10 seconds. 9. Enter the maximum number of retries in the Maximum Retries field. The default is 3. 10. Enter the primary phone number or extension of the Call Home center in the Call Home Center - Primary Connection field. 11. Enter the backup phone number or extension of the Call Home center in the Call Home Center - Backup Connection field. 12.
Editing a Call Home center 11 FIGURE 136 Configure Call Home Center dialog box (Brocade, IBM, NetApp, or Oracle E-mail option) 4. Make sure the Call Home center type you selected displays in the Call Home Centers list. If the Call Home center type is incorrect, select the correct type from the list. 5. Select the Enable check box to enable this Call Home center. 6. Enter your contact name in the Customer Details - Name field. 7. Enter your company name in the Customer Details - Company field. 8.
11 Editing a Call Home center 16. Enter an e-mail address in the E-mail Notification Settings - Send To Address field. For Brocade E-mail Call Home centers, enter callhomeemail@brocade.com. 17. Click Send Test to test the mail server. The selected Call Home center must be enabled to test the mail server. A faked event is generated and sent to the selected Call Home center. You must contact the Call Home center to verify that the event was received and in the correct format.
Editing a Call Home center - Source — Details about the product. Includes the following data: - Event Time Event Severity Event Reason Code FRU Code/Event Type Event Description Event Data — Information about the triggered event.
11 Editing a Call Home center Editing the EMC Call Home center To edit an EMC Call Home center, complete the following steps. 1. Select Monitor > Event Notification > Call Home. The Call Home dialog box displays. 2. Select the EMC Call Home center you want to edit in the Call Home Centers list. 3. Click Edit Centers (beneath the Call Home Centers list). The Configure Call Home Center dialog box displays (Figure 137). FIGURE 137 Configure Call Home Center dialog box (EMC option) 4.
Editing a Call Home center 11 13. Click OK. The Call Home dialog box displays with the Call Home center you edited highlighted in the Call Home Centers list. 14. Click OK to close the Call Home dialog box. Editing the HP LAN Call Home center To edit an HP LAN Call Home center, complete the following steps. 1. Select Monitor > Event Notification > Call Home. The Call Home dialog box displays. 2. Select the HP LAN Call Home center you want to edit in the Call Home Centers list. 3.
11 Enabling a Call Home center 8. Click Send Test to test the address. The selected Call Home center must be enabled to test the IP address. A faked event is generated and sent to the selected Call Home center. You must contact the Call Home center to verify that the event was received and in the correct format. NOTE The HP LAN Call Home alert displays the directory separation characters with a double backslash (\\) instead of a single backslash (\). 9. Click OK to close the “Test Event Sent” message.
Testing the Call Home center connection 11 Testing the Call Home center connection Once you add and enable a Call Home center, you should verify that Call Home is functional. To verify Call Home center functionality, complete the following steps. 1. Select Monitor > Event Notification > Call Home. 2. Click Edit Centers (beneath the Call Home Centers list). The Configure Call Home Center dialog box displays. 3. Select the Call Home center you want to check in the Call Home Centers list. 4.
11 Viewing Call Home status Viewing Call Home status You can view Call Home status from the main Management application window or from the Call Home Notification dialog box. The Management application enables you to view the Call Home status at a glance by providing a Call Home status icon on the status bar. Table 40 illustrates and describes the icons that indicate the current status of the Call Home function.
Assigning a device to the Call Home center 11 Assigning a device to the Call Home center Discovered devices (switches, routers, and directors) are not assigned to a corresponding Call Home center automatically. You must manually assign each device to a Call Home center before you use Call Home. To assign a device or multiple devices to a Call Home center, complete the following steps. 1. Select Monitor > Event Notification > Call Home. The Call Home dialog box displays. 2.
11 Defining an event filter 3. Click the left arrow button. A confirmation message displays. 4. Click OK. All devices assigned to the selected Call Home center display in the Products List. Any assigned filters are also removed. 5. Click OK to close the Call Home dialog box. Defining an event filter To define an event filter, complete the following steps. 1. Select Monitor > Event Notification > Call Home. The Call Home dialog box displays. 2. Click Add beneath the Call Home Event Filter list.
Assigning an event filter to a Call Home center 11 Assigning an event filter to a Call Home center Event filters allow Call Home center users to log in to a Management server and assign specific event filters to the devices. This limits the number of unnecessary or “acknowledge” events and improves the performance and effectiveness of the Call Home center. You can only select one event filter at a time; however, you can assign the same event filter to multiple devices or Call Home centers.
11 Overwriting an assigned event filter Overwriting an assigned event filter A device can only have one event filter at a time; therefore, when a new filter is applied to a device that already has a filter, you must confirm the new filter assignment. To overwrite an event filter, complete the following steps. 1. Select Monitor > Event Notification > Call Home. The Call Home dialog box displays. 2. Select the event filter you want to apply in the Call Home Event Filters list.
Removing an event filter from a device 11 Removing an event filter from a device To remove an event filter from a device, complete the following steps. 1. Select Monitor > Event Notification > Call Home. The Call Home dialog box displays. 2. Choose one of the following options in the Call Home Centers list: • Right-click a device to which the event filter is assigned and select Remove Filter. • Select an event filter assigned to a device and click the left arrow button.
11 376 Searching for an assigned event filter Brocade Network Advisor IP User Manual 53-1002947-01
Chapter 12 Third-party tools In this chapter • About third-party tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Starting third-party tools from the application . . . . . . . . . . . . . . . . . . . . . . • Launching a Telnet session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Launching HCM Agent. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Adding a tool . . . . . . . . . . . . . . . . . .
12 Starting third-party tools from the application Starting third-party tools from the application You can open third-party tools from the Tools menu or a device’s shortcut menu. Remember that you cannot open a tool that is not installed on your computer. You must install the tool on your computer and add the tool to the Tools menu or the device’s shortcut menu. NOTE Installing tools is only available with the Trial and Licensed version versions. To open an application, complete the following steps. 1.
Launching HCM Agent 12 On the Connectivity Map, right-click the device you want to manage and select Element Manager > Hardware. The Element Manager displays. OR 1. Select a device. 2. Select Configure > Element Manager > Hardware. The Element Manager displays. OR 1. Select a device. 2. Click the Element Manager icon on the toolbar. The Element Manager displays. Launching HCM Agent Use Fabric OS HCM Agent to enable and manage Fabric OS HBAs. You can open HCM Agent directly from the application.
12 Adding a tool Adding a tool You can specify third-party tools so they appear on the Setup Tools dialog box. From there, you can add them to the Tools menu and then open the tools directly from the Management application. To add a tool, complete the following steps. 1. Select Tools > Setup. The Setup Tools dialog box displays. 2. Click the Tools Menu tab. 3. Click Define. The Define Tools dialog box displays (Figure 139). FIGURE 139 Define Tools dialog box 4.
Entering the server IP address of a tool 12 Entering the server IP address of a tool If the third-party tool is a web-based application, you must enter the IP address of the applications server as a parameter to be able to open the application. To enter the server IP address, complete the following steps. 1. Select Tools > Setup. The Setup Tools dialog box displays. 2. Click the Tools Menu tab.
12 Adding an option to the Tools menu FIGURE 140 Setup Tools dialog box (Tools menu tab) 3. Type a label for the option as you want it to appear on the Tools menu in the Menu Text field. 4. Select the application from the Tool list, or click Define if you want to specify a new tool. To specify a new tool, refer to “Adding a tool” on page 380. 5. (Optional) Enter parameters, such as a URL, in the Parameters field. 6. (Optional) Select a keyboard shortcut in the Keystroke list.
Changing an option on the Tools menu 12 Changing an option on the Tools menu You can edit parameters for third-party tools that display on the Tools menu. To edit a option to the tools menu, complete the following steps. 1. Select Tools > Setup. The Setup Tools dialog box displays. 2. Click the Tools Menu tab. The Tool Menu Items table displays all configured tools, including the tool name as it displays on the Tools menu, parameters, and keystroke shortcuts. 3.
12 Adding an option to a device’s shortcut menu Adding an option to a device’s shortcut menu You can add an option to a device’s shortcut menu. To add an option to the device’s shortcut menu, complete the following steps. 1. Select Tools > Setup. The Setup Tools dialog box displays. 2. Click the Product Menu tab. The Product Popup Menu Items table displays all configured shortcut menu options. 3. Type or select the text in the Menu Text list as you want it to appear on the menu. 4.
Changing an option on a device’s shortcut menu 12 Changing an option on a device’s shortcut menu You can change the parameters for a tool that displays on a device’s shortcut menu. To edit an option to the device’s shortcut menu, complete the following steps. 1. Select Tools > Setup. The Setup Tools dialog box displays. 2. Click the Product Menu tab. The Product Popup Menu Items table displays all configured shortcut menu options. 3.
12 Removing an option from a device’s shortcut menu Removing an option from a device’s shortcut menu You can remove a tool that displays on a device’s shortcut menu. To remove an option to the device’s shortcut menu, complete the following steps. 1. Select Tools > Setup. The Setup Tools dialog box displays. 2. Click the Product Menu tab. The Product Popup Menu Items table displays all configured menu options. 3. Select the menu item you want to remove in the Product Popup Menu Items table. 4.
Chapter 13 Server Management Console In this chapter • Server Management Console overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Services tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Ports tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • AAA Settings tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Restore tab. . . .
13 Services tab Launching the SMC on Linux NOTE The Server Management Console is a graphical user interface and should be launched from the XConsole on Linux systems. Perform the following steps to launch the Server Management Console on Linux systems. 1. On the Management application server, go to the following directory: Install_Directory/bin 2. Type the following at the command line: .
Services tab 13 3. Review the following information for each available service. • • • • Name — The name of the server; for example, FTP Server or Database Server. Process Name — The name of the process; for example, postgres.exe (Database Server). Status — The status of the service; for example, started or stopped. Start Time — The date and time the service started. The Start Time for Service Location Protocol displays as ‘Not Available’. 4. Click Close to close the Server Management Console.
13 Services tab Starting all services NOTE The Start button restarts running services in addition to starting stopped services which causes client-server disconnect. To start all services, complete the following steps. 1. Launch the Server Management Console. 2. Click the Services tab. 3. Click Start to start all services. NOTE If the server is configured to use an external FTP server, the Server Management Console does not attempt to start the built-in FTP service. 4.
Ports tab 13 6. Select the database user name for which you want to change the password in the User Name field. Options include dcmadmin and dcmuser. Changing the dcmadmin password requires all Management application services, except for the database server, to be stopped and then re-started. Changing the dcmuser password requires all ODBC remote client sessions to be restarted. 7. Enter your current password in the Old Password field. 8.
13 AAA Settings tab AAA Settings tab Authentication enables you to configure an authentication server and establish authentication policies. You can configure the Management application to authenticate users against the local database (Management application server), an external server (RADIUS, LDAP, CAC or TACACS+), or a switch. Authentication is configured to the local database by default.
AAA Settings tab 13 3. Add or edit a Radius server by referring to “Configuring a Radius server” on page 393. 4. Rearrange the Radius servers in the table by selecting a server and click the Up or Down button to move it. 5. Delete a Radius server by selecting the server and click Delete. 6. Test the established active connection with the Radius server by clicking Test. Test attempts to contact the Radius server by issuing a ping command. 7.
13 AAA Settings tab 2. Enter the radius server’s IP address in the IP Address field. 3. Enter the TCP port, if necessary, used by the Radius server in the TCP Port field. Default is 1812. 4. Select the authentication policy (PAP or CHAP) from the Authentication Type field. Default is CHAP. 5. Enter the shared secret in the Shared Secret and Confirm Secret fields. 6.
AAA Settings tab 13 • Know how long you want to wait between attempts (default is 3 seconds) to reach the server if it is busy. This is expressed as a timeout value in seconds. Values are between 1 and 15. • Determine how many attempts (default is 3 times) to make to reach the server before stopping and assuming it is unreachable. Values are between 1 and 5.
13 AAA Settings tab 7. Enter your user name and password and click OK. Test attempts to contact the LDAP server by issuing a ping command and verifies the following: • Verifies connections to the LDAP Server • Verifies authentication with the LDAP Server • Verifies user privileges on the Local database 8. Set secondary authentication by selecting one of the following options from the Secondary Authentication list: • Local Database • None 9.
AAA Settings tab 13 Configuring an LDAP server To add or edit a LDAP server, complete the following steps. 1. Select the AAA Settings tab. 2. Select LDAP Server from the Primary Authentication list. 3. Choose one of the following options: • Click Add. • Select an existing LDAP server and click Edit. The Add or Edit LDAP Server dialog box displays (Figure 143). FIGURE 143 Add or Edit LDAP server 4. Enter the LDAP server’s hostname in the Network address field.
13 AAA Settings tab Configuring TACACS+ server authentication If you are using a TACACS+ server for authentication, make the following preparations first: • Make sure that the server you want to use is on the network that the Management application manages. • Make sure that the external server and its user accounts have been properly configured. For example, you must define roles and areas of responsibility (AOR) in the external server to match the Management application roles and AOR.
AAA Settings tab 13 Configuring a TACACS+ server To add or edit a TACACS+ server, complete the following steps. 1. Choose one of the following options from the AAA Settings tab: • Click Add. • Select an existing TACACS+ server and click Edit. The Add or Edit TACACS+ Server dialog box displays (Figure 143). FIGURE 144 Add or Edit TACACS+ Server 2. Enter the TACACS+ server’s hostname in the Network Address field. If DNS is not configured in your network, provide an IP address instead of the hostname. 3.
13 AAA Settings tab Configuring Common Access Card authentication NOTE Common Access Card (CAC) authentication does not support SMI Agent and launch-in-context dialog boxes. NOTE CAC authentication is only supported on Windows systems. Common Access Card (CAC) authentication requires the following preparations: • Make sure to connect the CAC reader to the Management application client workstation. • Make sure to obtain and install the active client library on the client workstation.
AAA Settings tab 13 3. Set the authorization preference by selecting one of the following options from the Authorization Preference list: • Local Database — Uses the AD server for authentication and the Management application local database for authorization. • Primary Authentication Server — Uses the AD server for authentication and authorization. If you select Primary Authentication Server or LDAP Authorization, CAC authentication uses the same AD servers for authentication and authorization. 4.
13 AAA Settings tab Configuring switch authentication Switch authentication enables you to authenticate a user account against the switch database and the Management application server. You can configure up to three switches and specify the fall back order if one or more of the switches is not available. NOTE Switch authentication is only supported on Fabric OS devices. To configure switch authentication, complete the following steps. 1. Select the AAA Settings tab. 2.
AAA Settings tab 13 To configure Windows authentication, complete the following steps. 1. Select the AAA Settings tab. 2. For Primary Authentication, select Windows Domain. 3. Enter the domain name in the Windows Domain Name field. 4. Set secondary authentication by selecting one of the following options from the Secondary Authentication list: • Local Database • None 5. Click Test. The Test Authentication dialog box displays. 1.
13 Restore tab Displaying the client authentication audit trail All responses to authentication requests coming from clients are logged to an audit trail log file. This file is automatically backed up on the first day of every month. 1. Select the AAA Settings tab. 2. Click Display next to Authentication Audit Trail. The Login dialog box displays. 3. Enter your username and password in the appropriate fields and click OK. The defaults are Administrator and password, respectively.
Technical Support Information tab 13 5. Click Restore. Upon completion, a message displays the status of the restore operation. Click OK to close the message and the Server Management Console. For the restored data to take effect, re-launch the Configuration Wizard using the instructions in “Launching the Configuration Wizard” on page 5.
13 HCM Upgrade tab HCM Upgrade tab The HCM Upgrade tab enables you to upgrade the Management application to include a new version of HCM. Upgrading HCM on the Management server To upgrade HCM, complete the following steps. 1. Select the HCM Upgrade tab. FIGURE 145 HCM Upgrade tab 2. Click Browse to select the HCM installation folder location (for example, C:\Program Files\BROCADE\Adapter on Windows systems and /opt/brocade/adapter on Linux systems). 3. Click Upgrade. 4. Click Close.
Chapter 14 SAN Device Configuration In this chapter • Configuration repository management . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Firmware management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Firmware management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Port commissioning overview . . .
14 Configuration repository management Saving switch configurations on demand NOTE Save switch configuration is only supported on Fabric OS switches. NOTE This feature requires a Trial or Licensed version. NOTE To save switch configuration on more than one switch at a time, you must have the Enhanced Group Management license.
Configuration repository management 14 4. Click OK. Configuration files from the selected switches are saved to the repository. 5. (Professional only) Browse to the location where you want to save the switch configuration. 6. (Professional only) Click Save Configuration. Configuration files from the selected switches are saved to the selected location. You can use this file to restore the saved configuration through the device’s Element Manager.
14 Configuration repository management Scheduling switch configuration backup NOTE Only available for Fabric OS products. NOTE This feature requires a Trial or Licensed version. NOTE The Enhanced Group Management (EGM) license must be activated on a switch to perform this procedure and to use the supportSave module. You can schedule a backup of one or more switch configurations. If a periodic backup is scheduled at the SAN level, that backup will apply to all switches from all fabrics discovered.
Configuration repository management 14 FIGURE 148 Schedule backup of switch configurations 2. Click the Enable scheduled backup check box. 3. Set the Schedule parameters. These include the following: - The desired Frequency for backup operations (daily, weekly, monthly). The Day you want back up to run. If Frequency is Daily, the Day list is grayed out. If Frequency is Weekly, choices are days of the week (Sunday through Saturday). If Frequency is Monthly, choices are days of the month (1 through 31).
14 Configuration repository management The Selected Fabrics table includes the following information: • Fabric Name — The world wide name of the fabric selected for backup configuration. • Status — The status of the fabric selected for backup configuration; for example, unknown or marginal. • # of Switches — The number of switches that are configured on the fabric selected for backup configuration. If any switches do not have the EGM license, a messages displays.
Configuration repository management 14 The Saved Switch Configurations table displays the following information. • Keep check box — Select to keep the associated configuration past the defined age limit. The configuration will be kept until it is manually deleted, or until the Keep check box is cleared to enable the age limit again • Backup Date/Time — The date and time the last backup occurred. This is the backup that will be restored.
14 Configuration repository management Viewing configuration file content NOTE This feature requires a Trial or Licensed version. You can view switch configuration file content in a text file. 1. Right-click a device in the Product List or the Connectivity Map, and select Configuration > Configuration Repository. The Switch Configuration Repository dialog box displays. 2. Click View.
Configuration repository management 14 Searching the configuration file content NOTE This feature requires a Trial or Licensed version. To search the configuration file content, complete the following steps. 1. Right-click a device in the Product List or the Connectivity Map, and select Configuration > Configuration Repository. The Switch Configuration Repository dialog box displays. 2. Click View. The configuration details display. 3.
14 Configuration repository management Deleting a configuration NOTE This feature requires a Trial or Licensed version. 1. Right-click a device in the Product List or the Connectivity Map, and select Configuration > Configuration Repository. The Switch Configuration Repository dialog box displays. 2. Select the configuration you want to delete, and click Delete. Exporting a configuration NOTE This feature requires a Trial or Licensed version. 1.
Configuration repository management 14 Keeping a copy past the defined age limit NOTE This feature requires a Trial or Licensed version. 1. Select Configure > Configuration > Configuration Repository. The Switch Configuration Repository dialog box displays. 2. Select the check box under Keep for the configuration you want to preserve. The configuration will be kept until it is manually deleted, or until the Keep check box is cleared to enable the age limit again. 3. Click OK.
14 Configuration repository management TABLE 41 Field/Component Description All FC option Replicates the entire configuration, including security settings. Warning: This is a disruptive operation and selected destination switches will be disabled prior to downloading the configuration. Partial FC option Replicates a part of the FC configuration. Select one of the following options: • Fabric Watch option — Lists switches with Fabric Watch configurations that you can replicate.
Configuration repository management TABLE 43 14 Step 4. Source Configuration (Continued) Field/Component Description Available Switches table (Configuration from the switch only) Lists the information related to the available switches, if you selected Configuration from the switch on the Source Location screen. All Levels A list of all switches. Additional Port Info Additional information about the port. Attached Port # The number of the attached port. BB Credit The BB Credit of the port.
14 Configuration repository management TABLE 44 420 Step 5. Destination Switches Field/Component Description Available Switches table Lists the available switches you can select to be applied to the selected switches table. All Levels A list of all switches. Additional Port Info Additional information about the port. Attached Port # The number of the attached port. BB Credit The BB Credit of the port. Class The class value of the FICON device port.
Configuration repository management TABLE 44 Step 5. Destination Switches (Continued) Field/Component Description Current Firmware The current firmware. Status The status of the switch . TABLE 45 14 Step 6. Validation Field/Component Description Validation Settings table The replication settings that have been configured in previous steps; for example, the configuration type, source configuration, and destination settings. Click Finish to approve the settings.
14 Configuration repository management 6. Summary, which lists the replication settings that successfully ran on all the selected destination switches. For more information about the fields and components of this step, refer to Table 51 on page 423. To proceed to the next step in the wizard, click Next. To return to the previous screen, click Previous.
Configuration repository management TABLE 49 14 Step 4. Select Destination Switches Field/Component Description Available Switches table Lists the available switches you can select to be applied to the selected switches table. Name The name of the available switch. Device Type The type of device port. Tag The tag number of the port. Serial # The serial number of the switch. WWN The switch port’s world wide name. IP Address The switch port’s IP address.
14 Firmware management Firmware management NOTE Only available for Fabric OS products. A firmware file repository (Windows systems only) is maintained on the server in the following location: C:\Program Files\Install_Directory\data\ftproot\Firmware\Switches\7.0\n.n.n\n.n.
Firmware management 14 FIGURE 152 Firmware download 3. Select one or more switches from the Available Switches table. The Available Switches table lists the switches that are available for firmware download. 4. Click the right arrow to move the switches to the Selected Switches table. If you selected any switches that do not support firmware download, a message displays. Click OK on the message. The switches that support firmware download display in the Selected Switches table.
14 Firmware management • Select the SCP Server option to download from the external SCP server. Continue with step 7. NOTE The Management application only supports WinSSHD as the third-party Windows external SCP server. Firmware upgrade and downgrade through WinSSHD is only supported on devices running Fabric OS 6.0 or later. • Select the SFTP Server option to download from the external SFTP server. Continue with step 7.
Firmware management 14 Displaying the firmware repository The firmware repository is available on the Firmware Management dialog box. The Management application supports .zip and .gz compression file types for firmware files. Initially, the firmware repository is configured to use the built-in FTP, SCP, or SFTP server. To use an external FTP server, refer to “Configuring an external FTP, SCP, or SFTP server” on page 182.
14 Firmware management • Release Notes View button — Click to view the release notes, if imported, which contain information about downloading firmware. For internal built-in FTP, SCP, or SFTP servers or external SCP or SFTP servers running on the same system as the Management application, if there is a space in the release note file name, you will not be able to view the release notes.
Firmware management 14 6. Enter or browse to the location of the MD5 file (.md5 file type). If the MD5 checksum file is located in the same directory as the firmware file and has the same file name (with the md5 extension), this field is auto-populated. The MD5 checksum file can be obtained from the Fabric OS product download site in the same location as the firmware file.
14 Ports Ports NOTE Only available for Fabric OS products. You can enable and disable ports, as well as view port details, properties, type, status, and connectivity. Viewing port connectivity The connected switch and switch port information displays for all ports. To view port connectivity, choose one of the following steps: • Right-click a Fabric and select Port Connectivity. • Right-click a product icon and select Port Connectivity. • Select a product icon and select Monitor > Port Connectivity.
Ports 14 • Refresh button — Click to refresh the dialog box. • Add Flow button — Select a port and click to add a flow definition (refer to “Provisioning flows” on page 1790). NOTE Flow Vision is supported on platforms running Fabric OS 7.2 and later. • Port connectivity table — Displays the ports connected to the selected fabric or device. Loop devices are displayed in multiple rows, one row for each related device port.
14 Ports - Device FC Address — The port FC address of the connected Host or target device. - Device Node WWN — The world wide name of the device node. - Port IP Address — The port’s IP address. - Vendor — The hardware vendor’s name. - Switch Status — The operational status. There are four possible operation status values: Device Port Type— The device port type; for example, U_Port (universal port), FL_Port (Fabric loop port), and so on.
Ports - 14 Switch In Order Delivery — Whether switch in-order delivery is enabled. Connected Port WWN — The world wide name of the connected port. Connected Port Name — The name of the connected port. Connected User Port Number — The port number of the connected user port. Connected Port Area ID Port Index — The area ID and the port index of the connected port. Connected Port Speed — The speed of the connected port. Connected Blade Number — The number of the connected blade.
14 Ports 3. Click a blank cell in the Relation column to select an action operation. The following actions are available: • • • • • • • • == != < > <= >= contains matches 4. Define a filter by entering a value that corresponds to the selected property in the Value column. 5. Repeat steps 2 through 4 as needed to define more filters. 6. Click OK. The Port Connectivity View dialog box displays. If filtering is already enabled, only those ports that meet the filter requirements display.
Ports 14 Viewing port details To view port details, complete the following steps. 1. Right-click the port for which you want to view more detailed information on the Port Connectivity View dialog box and select Show Details. The Port Details dialog box displays(Figure 155). FIGURE 157 Port Details dialog box 2. Review the port information. For the list of fields on the Port Details dialog box, refer to “Viewing port properties” on page 1347. 3. Sort the results by clicking on the column header. 4.
14 Ports Port types On the Connectivity Map, right-click a switch icon and select Show Ports. The port types display showing which ports are connected to which products. NOTE Show Ports is not applicable when the map display layout is set to Free Form (default). NOTE This feature is only available for connected products. On bridges and CNT products, only utilized Fibre Channel ports display. IP ports do not display. TABLE 52 Port types Port Type Description D A port in diagnostic mode.
Ports 14 2. Review the following information: • Product properties for both devices. • Connection properties. • Selected connection port properties. Depending on the device type at either end of the connection, some of the following fields (Table 53) may not be available for all products. TABLE 53 Port connection properties Field Description Product Properties table The product information for the two connected switches.
14 Ports TABLE 53 Port connection properties (Continued) Field Description dB Loss (dB) Selected Connection Properties table 438 The power loss (dB) value between the source and destination ports. Only available when historical performance data collection is enabled. For Network OS devices, this field requires firmware version 3.0 or later. Does not display in Professional edition or if SNMP commnunication fails during discovery or if either switch is not reachable through ISL or IFL.
Ports TABLE 53 14 Port connection properties (Continued) Field Description Manufacturer Plant The name of the manufacturing plant. Name The name of the switch. NPIV Enabled Whether the NPIV port is enabled. Parameter The parameter of the switch. Physical/Logical Whether the port is a physical port or a logical port. PID Format The port ID format of the switch. Port # The port number. Port Address The address of the port. Port Module The port’s module.
14 Ports Determining inactive iSCSI devices For router-discovered iSCSI devices, you can view all of the inactive iSCSI devices in one list. To do this, use the Ports Only view and then sort the devices by FC Address. The devices that have an FC address of all zeros are inactive. 1. Select View All, Levels, and then Ports Only from the main window. 2. Use the scroll bar to view the columns to the right and locate the FC Address column in the Ports Only list. 3.
Ports 14 Viewing port optics NOTE Only available for Fabric OS products. NOTE QSFP ports do not display in the Port Optics dialog box. Enables you to view port optics for FC, TE, GE, and XGE ports. To view port optics, complete the following steps. 1. Right-click the switch for which you want to view port optic information on the Connectivity Map and select Port Optics (SFP). The Port Optics (SFP) dialog box displays (Figure 158). FIGURE 158 Port Optics dialog box 2. Review the port optics information.
14 Ports No icon — No parameters exceed the threshold of that parameter. Unknown icon — The port is not a 16 Gbps capable port or the device is running Fabric OS 6.4.X or earlier. Error icon — Unable to retrieve status of the supported port. Slot/Port # — The slot and port number of the selected fabric. The port number includes the type of port (FC, TE, GE, or XGE). • • FC Address — The Fibre Channel address of the port. • TX Power — The power transmitted to the SFP in dBm and uWatts.
Port commissioning overview 14 5. Rearrange the columns by dragging and dropping the column header. 6. Click Close to close the Port Optics (SFP) dialog box. Refreshing port optics To refresh port optics, click Refresh. The Management application retrieves updated port optic information. Port commissioning overview NOTE Port commissioning is only supported on Fabric OS devices running Fabric OS 7.1 or later.
14 Port commissioning overview FIGURE 159 Port Commissioning Setup dialog box The Port Commissioning Setup dialog box has two main areas. The Add/Edit Systems and Credentials area enables you to register CIMOM servers (system and credentials) one at a time and contains the following fields and components: • Network Address — Enter the IP address (IPv4 or Ipv6 format) or host name of the CIMOM server in the field. • Description — (Optional) Enter a description of the CIMOM server in the field.
Port commissioning overview 14 • Status — The system connectivity status. Updates when you test the reachability of the CIMOM server and when you contact the CIMOM server to respond to the F-Port decommission or recommission request. Valid status options include: OK — CIMOM server contact successful with current credentials. Not Contacted Yet — CIMOM servers configured, connectivity not tested yet. Credentials Updated — Credentials changed, connectivity not tested yet.
14 Port commissioning overview 7. (Optional) Enter a password in the Password field. The password cannot be over 512 characters. 8. Click the right arrow button to add the new CIMOM server and credentials to the Systems List. The application validates the mandatory fields. 9. Select the new CIMOM server in the System List and click Test to check connectivity. When testing is complete, the updated status displays in the Status column of the Systems List for the selected CIMOM server. 10.
Port commissioning overview 14 Importing CIMOM servers and credentials You can import one or more CIMOM servers (system and credentials) using a CSV formatted file. You can import a maximum of 2,000 CIMOM servers. 1. Select Configure > Port Commissioning > Setup. The Port Commissioning Setup dialog box displays (Figure 159). 2. Click Import to import CIMOM server information from a file.
14 Port commissioning overview Changing CIMOM server credentials You can edit the CIMOM server credentials for one or more CIMOM servers at the same time. 1. Select Configure > Port Commissioning > Setup. The Port Commissioning Setup dialog box displays (Figure 159). 2. Select one or more CIMOM servers from the System List table and click Change Credentials. The Edit Credentials dialog box displays. If you selected one CIMOM server, the credentials for the selected server display in the dialog box.
Port commissioning overview 14 Deleting CIMOM server credentials 1. Select Configure > Port Commissioning > Setup. The Port Commissioning Setup dialog box displays (Figure 159). 2. Select one or more CIMOM server from the System List table and click the left arrow button. The details for the last selected CIMOM server row displays in the Add/Edit System and Credentials area. 3.
14 Port commissioning overview Recommissioning an F-Port NOTE You must configure at least one CIMOM server (refer to “Registering a CIMOM server” on page 445) before you can recommission an F-Port. Select the F-Port, then select Configure > Port Commissioning > Recommission > Port. While recommissioning is in progress, an up arrow icon displays next to the port icon in the Product List.
Port commissioning overview 14 Decommissioning all ports on a switch NOTE Fabric tracking must be enabled (refer to “Enabling fabric tracking” on page 187) to maintain the decommissioned port details (such as port type, device port wwn, and so on). Do not accept changes in the Management application client. 1. Select the switch or logical switch for which you want to decommission all ports, then select Configure > Port Commissioning > Decommission > All F-Ports on the Switch.
14 Port commissioning overview Decommissioning all ports on a blade NOTE (Virtual Fabrics only) All ports on the blade must be managed by the Management application. NOTE Fabric tracking must be enabled (refer to “Enabling fabric tracking” on page 187) to maintain the decommissioned port details (such as port type, device port wwn, and so on). Do not accept changes in the Management application client. 1.
Port commissioning overview 14 Recommissioning all ports on a switch Select the switch or logical switch for which you want to recommission all ports, then select Configure > Port Commissioning > Recommission > All F-Ports on the Switch. NOTE You can only recommission ports from the logical switch, not the physical chassis. While recommissioning is in progress, an up arrow icon displays next to the port icon in the Product List.
14 Administrative Domain-enabled fabric support The Deployment Results contains the following parameters: • Configuration Name — Name of the deployment. For example, Decommission/Recommission - switch_name, Decommission/Recommission switch_name - blade, or Decommission/Recommission - switch_name - Ports. • Product — The product name. • Status — The status of the deployment. For example, Allowed or Failed. • Reason — The port level status of the decommission or recommission.
Administrative Domain-enabled fabric support 14 • Performs basic user actions (for example, enabling or disabling a port or switch) in a physical fabric context. • Supports fault and event management. Note that since AD’s are not visualized in the Topology Map and Product List, the Master Log provides an unfiltered view of events for the entire AD-enabled fabric. • Web Tools launch (with Single sign on support where applicable) defaults to Default AD (AD0).
14 Administrative Domain-enabled fabric support TABLE 54 Feature support for AD-enabled fabrics (Continued) Feature AD context ADO AD255 Not supported All AD Fault Management User interface impact Displays all events from the switch in the Master Log regardless of AD membership. FCIP Tunnels Configuration X Firmware Management X None. Filters switches from an AD-enabled fabric from the dialog box. None. High Integrity Fabric (HIF) X Filters AD-enabled fabric from the Fabrics list.
Administrative Domain-enabled fabric support TABLE 54 14 Feature support for AD-enabled fabrics (Continued) Feature AD context ADO AD255 Not supported All AD Zone DB collection Zoning dialog box Brocade Network Advisor IP User Manual 53-1002947-01 X User interface impact None. X Filters AD-enabled fabric from the Fabrics list.
14 458 Administrative Domain-enabled fabric support Brocade Network Advisor IP User Manual 53-1002947-01
Chapter 15 Wireless Management In this chapter • Wireless management overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Wireless devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Wireless device discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Wireless devices on the dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Port groups. . . . . . . . . . . . . . . . . .
15 Wireless devices Wireless devices The Management application supports three models of wireless controllers. TABLE 55 Wireless controller models Device Name Firmware required RFS 4000 Mobility 5.3 or later RFS 6000 Mobility 5.3 or later RFS 7000 Mobility 5.3 or later The Management application supports four models of wireless access points. TABLE 56 Wireless access points Device Name Firmware required AP 650 Mobility 4.1.1 (standalone mode) Mobility 5.
Wireless devices on the dashboard 15 Wireless devices on the dashboard Wireless controllers and standalone access points display in the following dashboard widgets: • • • • IP Inventory IP Status AP Status Status NOTE Wireless access points in adaptive mode do not display in the dashboard.
15 View management View management Wireless controllers and standalone access points display in the Network Objects, L2 Topology, IP Topology, and VLAN Topology views. NOTE Wireless access points in adaptive mode do not display in the topology.
Element Manager 15 Browser and system requirements The Element Manager requires a browser supporting Adobe Flash Player 10. The system accessing the Element Manager should have a minimum of 512Mb RAM for the Element Manager to display and function properly. The following browsers have been validated with the Element Manager: • Firefox 3.6 • Internet Explorer 7.x • Internet Explorer 8.x NOTE Leading and trailing spaces are not allowed in any text fields in the Element Manager.
15 Configuration repository and backup management 4. Enter your password in the Password field. The default password admin123. 5. Click Login. The Element Manager displays. OR 1. Select Reports > Wired Products from the main menu. The Wired Products report displays. 2. Click the IP address of a product in the IP Address column. The Element Manager displays. Launching a Telnet session NOTE Wireless access points in adaptive mode do not display in the Management application.
CLI configuration management • • • • • • 15 “Exporting a configuration to a text file” on page 794 “Comparing configuration snapshots” on page 799 “Generating a configuration snapshot report” on page 800 “Viewing the pre- and post-configuration snapshot” on page 802 “Saving a configuration snapshot” on page 803 “Scheduling a configuration backup” on page 805 CLI configuration management CLI configuration provides a text-based interface that allows you to enter command line interface (CLI) commands to cr
15 Cluster mode Cluster mode A cluster is a set of wireless controllers working collectively to provide redundancy and load sharing. You can discover wireless controllers in cluster mode. To verify that the wireless controller is in cluster mode, check the following: 1. Check the Properties dialog box. Right-click the wireless controller and select Properties. The Properties dialog box displays. • If the controller is the active controller, the Access Points tab is included.
Performance management 15 Performance management NOTE Wireless access points in adaptive mode do not display in the Management application. Historical performance enables you to collect data from managed wireless devices. You can use the provided data collectors or create your own data collectors. Instructions for collecting historical performance data are detailed in “IP historical performance monitoring” on page 1033.
15 AP Products report AP Products report The AP Products report displays general and detailed configuration information about AP products that are under the management server. The information on the report comes from the software image version that is in the management application for that product. To ensure that the latest configuration information is in the management application, run the Discovery process or resynchronize the product.
AP Products report 15 The Detailed AP Products report contains the fields and components detailed in Table 58. TABLE 58 Detailed AP Products report Field/Component Description Status Whether the AP is online (green icon), offline (red icon), or pending adoption (gray icon). Name The device name used to identify AP. MAC Address The AP device MAC. Model The model of the AP. Serial Number The serial number of the AP. Firmware version The firmware level of the AP.
15 470 AP Products report Brocade Network Advisor IP User Manual 53-1002947-01
Chapter 16 VCS Management In this chapter • VCS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Logical chassis cluster operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Serial firmware update and activation for Network OS devices . . . . . . . . . • Support for Network OS VDX 2740 embedded switch . . . . . . . . . . . . . . . . • Network OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
16 VCS VCS mode types Beginning with Network OS 4.0, VCS mode encompasses two mode types: • Fabric cluster mode (shown in Figure 160)—The data path for nodes is distributed, but the configuration path is not distributed. Each node maintains its configuration database independently. • Logical chassis cluster mode (shown in Figure 161)—Both the data and configuration paths are distributed. The entire cluster can be configured from the principal node. Logical chassis mode requires Network OS 4.0 or later.
Logical chassis cluster operations 16 Ethernet Fabrics view management The Ethernet Fabrics view displays a map of the traffic for VCS devices on your network. To view the fabric members and Transparent Interconnection of Lots of Links (TRILL) connections for a fabric, double-click the fabric in the Product List. To display the topology map for Ethernet Fabrics, you must have the Main Display - Ethernet Fabric privilege. For more information about privileges, refer to “User Privileges” on page 1321.
16 Logical chassis cluster operations • If the cluster is configured with a virtual IP address after it is discovered by the Management application, the virtual IP address is collected and saved in the database for the next lazy polling or next adaptive collection. • If another switch becomes the principal switch, the Management application sets the cluster IP address to that of the new principal switch at the next lazy polling or next adaptive collection.
Logical chassis cluster operations 16 FIGURE 163 Discover Setup - IP dialog box before removal of node Figure 164 shows the Discover Setup - IP dialog box after the administrator has removed the node with the IP address of 172.26.5.130 from its logical chassis cluster. FIGURE 164 Discover Setup - IP dialog box after disabling the node from logical chassis cluster Figure 165 shows the Discover Setup - IP dialog box after The Management application has performed rediscovery.
16 Serial firmware update and activation for Network OS devices Serial firmware update and activation for Network OS devices With Network OS release 4.0, you can update and activate firmware on an entire cluster (either logical chassis mode or fabric cluster mode), on selected nodes in the cluster, or on nodes in standalone mode, by performing the following steps. 1. Click the IP tab in the upper-left corner of the Management application. 2.
Network OS 16 Network OS Network OS is a scalable network operating system available for the Network OS data center switching portfolio products, including the VDX product line.
16 VCS product groups VCS product groups The standalone Network OS switches and the VCS fabric are treated as a single Layer 2 (L2) switch for both static and dynamic product groups. The product group membership cannot contain fabric members. The standalone Network OS VDX switches are shown in Table 59. TABLE 59 Network OS-supported hardware Device name Firmware level required Network OS VDX 2730 10 Gbps connection blade v2.1.1_fuj Network OS VDX 2740 switch nos4.0.
Port profiles 16 Port profiles A port profile is a collection of network policies supported by the switch. By configuring port profiles on the Network OS VDX switch (refer to Table 59 for a list of supported VDX switches), the virtual machine (VM) that is configured on the virtual network interface card (vNIC) can migrate to any other port on that switch, but still retain the same network policies.
16 Port profiles Life of a port profile A port profile during creation goes through multiple states. Port profiles go through the following states: • Created — This state specifies that a port profile is created but may not be complete when the port profile is created or modified. • Activated — This state specifies that a port profile is activated and is available for MAC address-to-port profile association. If the created port profile is not complete, the activation fails.
Port profiles TABLE 60 16 AMPP behavior and failure descriptions (Continued) AMPP event Applicable behavior and failures Deleting a port profile An in-use error is generated if the port profile is in an activated state. AMPP forces you to de-activate the profile before deleting. If the port profile is in an inactive state, then deletion of the port profile removes all the MAC address associations as well.
16 Port profiles Assigning MAC addresses to a port profile Use the Assign MACs dialog box to select discovered Media Access Control (MAC) addresses and assign them to the selected port profiles. A maximum of 16,000 MAC addresses can be assigned to a port profile. NOTE MAC addresses cannot be added until the profile is activated. You must use the command line interface to activate the port profile. Refer to the Network OS Command Reference for instructions. 1.
Port profiles 16 Managing offline MAC addresses To add unique MAC addresses to the Discovered MACs list where you can assign them to a port profile, complete the following steps. 1. Select a VCS-capable switch from the device tree. 2. Right-click and select Properties. The Fabric Properties dialog box displays. 3. Click the Port Profiles tab. 4. In the Selected Profile Details area, click the Associated MACs tab. 5. Click Add. The Assign MACs dialog box displays. 6. Click Add Offline MACs.
16 Port profiles Comparing port profiles To summarize differences between the original port profiles and profiles on other switches, complete the following steps. NOTE A MAC address can be associated with only one profile at a time. 1. Select a VCS-capable switch from the device tree. 2. Right-click and select Properties. The Fabric Properties dialog box displays. 3. Click the Port Profiles tab. 4. In the Selected Profile Details area, click the Associated MACs tab.
Port profiles 16 6. Select a product from the Available Products with Profiles list and click one of the following match options as the comparison criteria. You can select multiple switches and fabrics. • MAC Match — Compares the MAC addresses in the reference profile to the MAC addresses contained in the target profile (one profile at a time). The MAC address comparison displays the following possible values: Same — The MAC addresses in the reference and matched profiles are the same.
16 Port profiles TABLE 61 Profile Comparison Summary list (Continued) Field/Component Description QoS Settings • • • • • • • • ACL Settings FCoE Settings NOTE: FCoE sub-profiles can be applied on default port profiles only and are supported on Network OS version 2.1 and later. You can view the FCoE profile association on Network Advisor version 11.3.0 and later. • • • • • • • • • • • • Mode — The mode of Quality of Service (QoS) assigned to the port Flow Control — Non-DCB mode.
System Monitor support on Network OS VDX platforms 16 FIGURE 171 Deploy Port Profiles to Products dialog box 5. Select an available target from the Available Targets list and click the right arrow button to move the target selected for configuration deployment to the Selected Targets list. NOTE If a fabric is selected and moved in a VCS fabric, all members are moved to the Selected Targets list. Individual members of a VCS fabric can be added and removed from the Selected Targets list. 6. Click OK.
16 System Monitor support on Network OS VDX platforms FRU monitoring System Monitor monitors the health of each component of the switch.
System Monitor support on Network OS VDX platforms 16 Resource monitoring System Monitor monitors CPU and memory usage of the system and alerts the user when configured thresholds are exceeded. When the CPU usage exceeds the limit, a system monitor alert is triggered. The default CPU limit is 75 percent. When configuring memory, the limit specifies a usage limit as a percentage of available resources.
16 System Monitor support on Network OS VDX platforms Security monitoring System Monitor monitors all attempts to breach your SAN security, helping you fine-tune your security measures. If there is a security breach, System Monitor sends a RASlog alert. The following security areas are monitored: • Telnet violation, which occurs when a Telnet connection request reaches a secure switch from an unauthorized IP address. • Login violation, which occurs when a secure fabric detects a login failure.
Ethernet fabric traceroute 16 Ethernet fabric traceroute NOTE All nodes in the VCS cluster must have the NETCONF interface availability for L2TraceRoute and must be running Network OS 3.0.0 or later. Traceroute diagnostics enables you to determine the connectivity, path, and reachability of the Ethernet fabric between a source port and a destination port within an individual VCS fabric.
16 Ethernet fabric traceroute 4. Choose one of the following options: • Assign appropriate RBridge ID—To use Address Finder to identify the RBridge ID of the source. The Management application finds the RBridge ID on which the MAC address is learned. • Select RBridge ID —To select an RBridge ID from a list of the RBridge IDs currently present in the cluster, select this option and select and RBridge ID from the list.
Ethernet fabric traceroute 16 13. Enter a value with which to increment the source and destination port numbers on each repeated request in the Increment field. Valid values are from 0 through 1000. The default is 1. If you do not want to increment the port on each repeated request, enter 0. For example, if you configure the source port to 5, the destination port to 7, the repeat count to 5, and the increment ports to 5, the port numbers shown in Table 64 are sent on each traceroute request.
16 Ethernet fabric traceroute • Outgoing Port: The port numbers in the path to the destination RBridge from the source RBridge. • Round Trip Delay: The round trip delay in microseconds. NOTE The round trip delay for the starting RBridge (edge) is always 0 microseconds for a successful trace as this represents a self-loop. • Status: Whether the traceroute succeeded or failed.
Chapter 17 Host Management In this chapter • Host management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Brocade adapters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • HCM software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Host adapter discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • VM Manager. . . . . . . . . .
17 Brocade adapters The Management application, in conjunction with HCM, provides end-to-end management capability. For information about configuring, monitoring, and managing individual adapters using the HCM GUI or the Brocade Command Utility (BCU), refer to the Adapters Administrator’s Guide.
Brocade adapters 17 Converged Network Adapters Table 66 describes available Brocade Converged Network Adapters (CNAs) for PCIe x 8 host bus interfaces, hereafter referred to as Brocade CNAs. These adapters provide reliable, high-performance host connectivity for mission-critical SAN environments.
17 HCM software AnyIOTM technology Although the Brocade 1860 Fabric Adapter can be shipped in a variety of small form-factor pluggable (SFP) transceiver configurations, you can change port function to the following modes using Brocade AnyIOTM technology, provided the correct SFP transceiver is installed for the port: • HBA or Fibre Channel mode — This mode utilizes the Brocade Fibre Channel storage driver. An 8 or 16 Gbps Fibre Channel SFP transceiver can be installed for the port.
HCM software 17 HCM features Common HBA and CNA management software features include the following: • Discovery using the agent software running on the servers attached to the SAN, which enables you to contact the devices in your SAN. • Configuration management, which enables you to configure local and remote systems.
17 Host adapter discovery Host adapter discovery The Management application enables you to discover individual hosts, import a group of hosts from a CSV file, or import host names from discovered fabrics. The maximum number of host discovery requests that can be accepted is 1000. Host discovery requires HCM Agent 2.0 or later. ESXi host adapter discovery requires the Brocade HBA CIM provider to be installed on the ESXi host.
HCM and Management application support on ESXi systems 17 Editing a VM Manager The fields in the Edit VM Manager dialog box are identical to the fields in the Add VM Manager dialog box except for the Network Address field, which you cannot edit. 1. Click Edit on the Discover VM Managers dialog box. The Edit VM Manager dialog box displays. 2. Enter the VMM server port number into the Port field. The valid port number range is from 0 through 65536. 3.
17 HCM and Management application support on ESXi systems Adding host adapter credentials for ESXi CIM-based discovery is available for ESXi versions 4.1 and later. The CIM server transport does not support operating systems other than ESXi. NOTE CIM server credentials are optional. If you do not provide credentials, basic authentication on the CIM server is disabled and the Management application attempts discovery without authentication.
Adapter software 17 Adapter software The Adapter Software dialog box allows you to perform the following tasks: • Select and import a driver file or delete existing drivers from the driver repository • Update the driver to the hosts NOTE For Linux and Solaris systems, you cannot upgrade to driver file version 3.0.3.0. You must upgrade to version 3.0.3.1 or later.
17 Adapter software 3. Select one or more hosts from the Selected Hosts list. You can select mutliple hosts, but if the selected host count is greater than 20, a batch of 20 hosts is initiated for the driver update first and the remaining hosts are queued. The Selected Hosts list displays the following information for hosts that have been selected for the driver update: • Host — The IP address of the host. • Operating System — The host operating system; for example, Microsoft Windows or Red Hat Linux.
Adapter software 17 FIGURE 177 Driver Repository dialog box 2. Click Import on the Driver Repository dialog box. The Import Driver Repository dialog box displays. 3. Locate the driver file using one of the following methods: • Search for the file you want from the Look In list. • Enter the name of the image file you want to import in the File Name field. 4. Click Open. After the import completes, you see a message that the driver imported successfully. 5. Click OK.
17 Adapter software Boot image repository The boot code image stored in the adapter’s flash memory contains the instructions that enable the server to locate the boot disk in SAN. The boot code image contains the basic input/output system (BIOS), extensible firmware interface (EFI), and open firmware which enable the adapters to be compatible with any system platform.
Adapter software 17 FIGURE 179 Boot Image Repository dialog box 4. Click Import on the Boot Image Repository dialog box. 5. The Import Boot Image dialog box displays. 6. Locate the boot image file using one of the following methods: • Search for the file you want from the Look In list. Boot image files version 2.0.0.0 and 2.1.0.0 are .zip files and other boot image files are .tar files. • Enter the name of the image file you want to import in the File Name field. 7. Click Open.
17 Bulk port configuration 3. From the Boot Image Management dialog box, click the Update button to download a boot image to one or more selected hosts. One of the following download status messages displays in the Status column of the Selected Hosts list: • • • • Ready Queued In progress Failed — If the download failed, the failure reason displays in the Message column of the Selected Hosts list; for example, failed to connect to HCM agent, a checksum error occurred, or the file is invalid.
Bulk port configuration 17 Configuring host adapter ports To create, edit, duplicate, or delete port configurations, complete the following steps. Select Host > Adapter Ports from the Configure menu. The Configure Host Adapter Ports dialog box, shown in Figure 180, displays. FIGURE 180 Configure Host Adapter Ports dialog box Adding a port configuration The Add Port Configuration dialog box allows you to create a maximum of 50 customized port configurations which you can then select and assign to ports.
17 Bulk port configuration FIGURE 181 Add Port Configuration dialog box 2. Enter a name for the port configuration in the Configuration Name field. A maximum of 128 alphanumeric characters is supported. 3. Configure at least one of the following port properties: - Port — Enable or disable the port. Enable is the default. - Target Rate Limiting — Enable the Target Rate Limiting feature to minimize congestion at the adapter port.
Bulk port configuration 17 Boot Speed — Set the port speed. Possible values are Auto Negotiate (to auto-negotiate the speed) and 1, 2, 4, 8, and 16 Gbps and unknown speeds. Boot Option — From the list, select one of the following: • Auto Discovered From Fabric — Enables Boot over SAN using boot LUN information stored in the fabric. This is the default setting. • First Visible LUN — Enables Boot over SAN from the first discovered LUN in the SAN. Bootup Delay — Enter a bootup delay value.
17 Adapter port WWN virtualization Editing a port configuration The Edit Port Configuration dialog box allows you to modify port configuration parameters that were configured using the Add Port Configuration dialog box. 1. Click Edit on the Configure Host Adapter Ports dialog box. The Edit Port Configuration dialog box displays. 2. Modify the parameters that are described in “Adding a port configuration” on page 509. 3. Click OK to save the changes. Duplicating a port configuration 1.
Adapter port WWN virtualization 17 Configuring FAWWNs on switch ports The Configure Fabric Assigned WWNs dialog box, shown in Figure 182, enables you to perform the following tasks: • Enable and disable the Fabric Assigned WWN feature status on a switch or Access Gateway port. • Set the type value to auto or user-defined. When the User button is clicked, the WWN is cleared from the table and editing is enabled. • Delete the Fabric Assigned WWN from the Fabric Assigned WWN - Configuration list.
17 Adapter port WWN virtualization Disabling the FAWWN feature on a switch or AG ports 1. Select Configure > Fabric Assigned WWN. or Right-click the switch and select Fabric Assigned WWN. The Configure Fabric Assigned WWNs dialog box displays. 2. Select a switch port from the Fabric Assigned WWN - Configuration list. 3. Click the Disable button. The selected switch’s FAWWN feature status is disabled. 4. Click OK. Auto-assigning a FAWWN to a switch or AG port 1. Select Configure > Fabric Assigned WWN.
Adapter port WWN virtualization 17 Modifying a FAWWN on a switch or AG port 1. Select Configure > Fabric Assigned WWN. or Right-click the switch and select Fabric Assigned WWN. The Configure Fabric Assigned WWNs dialog box displays. 2. Select a switch port or AG port from the Fabric Assigned WWN - Configuration list. 3. Click the User button. The Fabric Assigned WWNs parameters are now editable. Deleting a FAWWN from a switch or AG port 1. Select Configure > Fabric Assigned WWN.
17 Adapter port WWN virtualization FIGURE 183 Configure Fabric Assigned WWNs dialog box--Attached AG Ports tab Adding AG port FAWWNs 1. Select Configure > Fabric Assigned WWN. or Right-click the switch and select Fabric Assigned WWN. The Configure Fabric Assigned WWNs dialog box displays. 2. Click the Attached AG Ports tab. 3. Select a row in the Fabric Assigned WWN Configuration - AG Ports list. 4. Click Add. The Add AG Fabric Assigned WWN Configuration dialog box displays. 5.
Adapter port WWN virtualization 17 9. Click OK to add the rows for this configuration to the Fabric Assigned WWN Configuration - AG Ports list. Deleting AG port FAWWNs 1. Select Configure > Fabric Assigned WWN. or Right-click the switch and select Fabric Assigned WWN. The Configure Fabric Assigned WWNs dialog box displays. 2. Click the Attached AG Ports tab. 3. Select an online AG FAWWN row and click the Delete button.
17 Role-based access control Role-based access control The Management application enables you to create resource groups and assign users to the selected role within that group. This enables you to assign users to a role within the resource group. The Management application provides one preconfigured resource group (All Fabrics). When you create a resource group, all available roles are automatically assigned to the resource group.
Host performance management 17 Host performance management Real-time performance enables you to collect data from managed HBA and CNA ports. You can use real-time performance to configure the following options: • Select the polling rate from 20 seconds up to 1 minute. • Select up to 32 ports total from a maximum of 10 devices for graphing performance. • Choose to display the same Y-axis range for both the Tx MBps and Rx MBps measure types for easier comparison of graphs.
17 Host security authentication TABLE 68 Counters (Continued) FC port measures HBA port measures CNA port measures Transmitted FCoE pause frames Received FCS error frames Transmitted FCS error frames Received alignment error frames Received length error frames Received code error frames Instructions for generating real-time performance data are detailed in “Generating a real-time performance graph” on page 1016.
Host security authentication 17 FIGURE 184 Fibre Channel Security Protocol Configuration dialog box 3. Configure the following parameters on the Fibre Channel Security Protocol Configuration dialog box: a. Select the Enable Authentication check box to enable the authentication policy. If authentication is enabled, the port attempts to negotiate with the switch. If the switch does not participate in the authentication process, the port skips the authentication process. b.
17 supportSave on adapters supportSave on adapters Host management features support capturing support information for managed Brocade adapters, which are discovered in the Management application. You can trigger supportSave for multiple adapters at the same time. supportSave cannot be used to collect support information for ESXi hosts managed by a CIM Server. Refer to the Brocade Adapters Administrator’s Guide for information about supportSave on ESXi hosts.
Host fault management 17 Filtering event notifications The Management application provides notification of many different types of SAN events. If a user wants to receive notification of certain events, you can filter the events specifically for that user. NOTE The e-mail filter in the Management application is overridden by the firmware e-mail filter.
17 Backup support Backup support The Management application helps you to protect your data by backing it up automatically. The data can then be restored, as necessary. Configuring backup to a hard drive NOTE Configuring backup to a hard drive requires a hard drive. The drive should not be the same physical drive on which your operating system or the Management application is installed. To configure the backup function to a hard drive, complete the following steps. 1. Select Server > Options.
Backup support 17 Enabling backup Backup is enabled by default. However, if it has been disabled, complete the following steps to enable the function. 1. Select Server > Options. The Options dialog box displays. 2. Select Server Backup in the Category list. 3. Select the Enable Backup check box. 4. Click Apply or OK. Disabling backup Backup is enabled by default. If you want to stop the backup process, you must disable backup. To disable the backup function, complete the following steps. 1.
17 526 Backup support Brocade Network Advisor IP User Manual 53-1002947-01
Chapter 18 Fibre Channel over Ethernet In this chapter • FCoE overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Enhanced Ethernet features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • FCoE protocols supported. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • FCoE licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
18 Enhanced Ethernet features DCBX protocol Data Center Bridging Exchange (DCBX) protocol allows enhanced Ethernet devices to convey and configure their DCB capabilities and ensures a consistent configuration across the network. DCBX protocol is used between DCB devices, such as a converged network adapter (CNA) and an FCoE switch, to exchange configuration with directly connected peers.
FCoE protocols supported 18 Ethernet jumbo frames The basic assumption underlying FCoE is that TCP/IP is not required in a local data center network and the necessary functions can be provided with Enhanced Ethernet. The purpose of an “enhanced” Ethernet is to provide reliable, lossless transport for the encapsulated Fibre Channel traffic. Enhanced Ethernet provides support for jumbo Ethernet frames and in-order frame delivery.
18 FCoE licensing FCoE licensing The FCoE license enables Fibre Channel over Ethernet (FCoE) functionality on the following supported DCB switches: • • • • • Network OS 10 GbE 24-port 8 GbE 8 FC port switch Network OS VDX 6710, 6720, and 6730 switches Network OS VDX 6740 and 6740T switches Network OS VDX 8770-series switches Network OS VDX 2730 10 GbE connection blade for the Fujitsu PRIMERGY BX900 and BX400 Blade Servers Without the FCoE license, the DCB switches are pure Layer 2 Ethernet switches and
Saving running configurations 18 FIGURE 185 Save Running to Startup dialog box 2. Highlight a discovered DCB switch from the Available Switches list, and click the right arrow button to move the switch to the Selected Switches list. 3. Highlight the selected switch and click OK to start the configuration. The running configuration is saved to the selected switch, effective on the next system startup.
18 DCB configuration management DCB configuration management Depending on the platform, the DCB switch has one of the configurations shown in Table 69.
Switch policies 18 Switch policies You can configure and enable a number of DCB policies on a switch, port, or link aggregation group (LAG). The following switch policy configurations apply to all ports in a LAG: • DCB map and Traffic Class map • Link Layer Discovery Protocol (LLDP) The switch policies are described in the following sections.
18 DCB configuration DCB configuration To launch the DCB Configuration dialog box, select Configure > DCB from the menu bar. The DCB Configuration dialog box displays, showing the status of all DCB-related hardware and functions. NOTE For FOS DCB devices, the Protocol Down Reason column, shown in Figure 186, displays the values only for the external ports of embedded platforms but not for the internal ports.
DCB configuration 18 For more information about fabric cluster mode and logical chassis cluster mode, refer to the Network OS Administrator’s Guide and the Network OS Command Reference, versions 4.0 or later. The term VCS mode refers to both fabric cluster mode and logical chassis cluster mode unless otherwise indicated. NOTE In the Management application, a logical chassis cluster is shown without all its members; a fabric cluster is shown with all its members.
18 DCB configuration 5. Configure the following DCB Map parameters in the DCB Map area: • Name - Enter a name to identify the DCB map. • Precedence - Enter a value from 1 through 100. This number determines the map’s priority. • Priority Flow Control check box - Check to enable priority-based flow control on individual priority groups. • CoS - Click the CoS cell to launch the Edit CoS dialog box, where you can select and assign one or more priorities (PG ID 15.0 through 15.7).
DCB configuration 18 FIGURE 188 Edit Switch dialog box - LLDP-DCBX tab 4. Select the Global Configuration LLDP profile in the LLDP Profiles list. 5. Click the left arrow button to edit. 6. Select the FCoE Application and FCoE Logical Link check boxes in the Advertise list to advertise them on the network. 7. Click OK after changing the attributes of the current deployment. The Deployment Status dialog box displays. 8. Click Start on the Deployment Status dialog box to save the changes to the switch. 9.
18 DCB configuration 8. Select the DCB map you created in “Creating a DCB map to carry the LAN and SAN traffic” on page 535 from the Available DCB Maps list. 9. Click the LLDP-DCBX tab and select the Enable LLDP-DCBX on Te Port Number check box. 10. Select Assign the Global Configuration. 11. Click OK. The Deploy to Ports dialog box displays. 12. Click OK after changing the attributes of the current deployment. The Deployment Status dialog box displays. 13.
DCB configuration 18 Creating and activating VLAN classifiers on the DCB interface NOTE You can complete this procedure using the Management application for Fabric OS versions 7.0 and later. For Fabric OS versions earlier than Fabric OS 7.0, you must use the CLI. To create and activate the VLAN classifiers on the DCB interface, complete the following steps. 1. Log in to the switch and enter global configuration mode. switch:>cmsh switch#configure terminal 2.
18 DCB configuration 2. Select the DCB switch or one or more DCB ports from the Products/Ports list to add to a link aggregation group (LAG). 3. Click Add LAG or Edit LAG. The Add LAG or Edit LAG dialog box displays, as shown in Figure 189. FIGURE 189 Add LAG dialog box 4. Configure the following LAG parameters: NOTE Ports with 802.1x authentication or ports that are enabled in L2 mode or L3 mode are not supported in a LAG. • LAG ID - Enter the LAG identifier, using a value from 1 through 63.
DCB configuration 18 5. Select at least one available DCB port from the Available Members list and click the right arrow button to move it to the LAG Members list. The DCB ports are now part of the link aggregation group. 6. Continue to configure the following LAG parameters. These parameters are always enabled. • Type - Sets the limit on the size of the LAG. The type values include Standard, where the LAG is limited to 16 ports, and Brocade LAG, where the LAG is limited to 4 ports.
18 DCB configuration FIGURE 190 Edit Switch dialog box 4. Configure the policies for the Edit Switch dialog box tabs, which are described in the following sections: • • • • • “QoS configuration” on page 547 “FCoE provisioning” on page 554 “VLAN classifier configuration” on page 556 “LLDP-DCBX configuration” on page 560 “802.1x authentication” on page 564 5. When you have finished configuring the policies, apply the settings to the switch.
DCB configuration 18 Editing a DCB port 1. Select Configure > DCB. The DCB Configuration dialog box displays, showing the status of all DCB-related hardware and functions. 2. Select a DCB port from the Products/Ports list. 3. Click Edit. The Edit Port dialog box displays, as shown in Figure 191. FIGURE 191 Edit Port dialog box 4. Modify the following DCB port parameters as required: • Interface Mode - Select None or L2. For external ports, the L3 interface mode displays in addition to None or L2.
18 DCB configuration 5. When you have finished configuring the policies, apply the settings to the DCB port. NOTE Clicking Cancel when there are pending changes launches a pop-up dialog box. 6. Click OK when you have finished modifying the DCB port parameters. The Deploy to Ports dialog box displays. 7. Click OK after changing the attributes of the current deployment. The Deployment Status dialog box launches. 8.
DCB configuration 18 FIGURE 192 Edit LAG dialog box 4. Configure the following LAG parameters, as required: NOTE Ports with 802.1x authentication or ports that are enabled in L2 mode or L3 mode are not supported in a LAG. • LAG ID - The LAG identifier, which is not an editable field. • Status - Click the Enable check box to enable the LAG. You must enable the LAG to use the DCB functionality. • Interface Mode - Select None or L2.
18 DCB configuration 5. Continue to configure the following LAG parameters. These parameters are disabled until you add a DCB port to the LAG Members list. • Mode - The ports that are LAG members are in either Static or Dynamic mode. You cannot change the mode on existing members of a LAG. If the mode is set as Dynamic, you can change the dynamic mode type (to Active or Passive) only for newly-added ports, not for existing port members of a LAG.
QoS configuration 18 Deleting a LAG You can only delete a link aggregation group (LAG) that is selected from a single switch. If you select multiple switches or multiple ports from two or more switches, the Delete button is disabled. NOTE Deleting a LAG is not supported for Network OS products. You must use the command line interface to delete a LAG for Network OS products. Refer to the Network OS Command Reference for more information. 1. Select Configure > DCB.
18 QoS configuration Priority-based flow control Priority-based flow control (PFC) is an enhancement to the existing pause mechanism in Ethernet. PFC creates eight separate virtual links on the physical link and allows any of these links to be paused and restarted independently, enabling the network to create a no-drop Class of Service (CoS) for an individual virtual link. Table 70 shows examples of how priority grouping might be allocated in a 15-priority group scenario.
QoS configuration 18 FIGURE 193 QoS, Create DCB Map dialog box 4. Select DCB from the Map Type list. 5. Configure the following DCB map parameters in the DCB Map area: • Name - Enter a name to identify the DCB map. Only one DCB map (the default) is supported on Fabric OS version 6.3.1_dcb and version 7.0.0 and later. • Precedence - Enter a value from 1 through 100. This number determines the map’s priority.
18 QoS configuration 6. Click the right arrow button to add the map to the DCB Maps list. If a DCB map exists with the same name, a validation dialog box launches and you are asked if you want to overwrite the map. 7. Click OK. 8. When you have finished the configuration, click OK to launch the Deploy to Products dialog box. Editing a DCB map 1. Select Configure > DCB. The DCB Configuration dialog box displays, showing the status of all DCB-related hardware and functions. 2.
QoS configuration 18 3. Click the QoS tab on the Edit Switch dialog box. The QoS dialog box displays. 4. Select one or more DCB maps. 5. Click the left arrow button. The selected DCB map row is removed from the list. 6. When you have finished the configuration, click OK to launch the Deploy to Products dialog box. NOTE With Fabric OS version 7.0 and later, there is only one DCB map (default), that you cannot delete. 7. Click OK after changing the attributes of the current deployment.
18 QoS configuration • Priority Flow checkbox — Check to enable priority-based flow control on individual priority groups. • CoS — Lists the Class of Service (CoS) value that corresponds to the priority group ID rows. The CoS value must be mapped to at least one of the priority group IDs (0-7). 7. When you have finished the configuration, click OK to launch the Deploy to Ports/LAGs dialog box. Creating a Traffic Class map 1. Select Configure > DCB.
QoS configuration 18 Deleting a Traffic Class map 1. Select Configure > DCB. The DCB Configuration dialog box displays, showing the status of all DCB-related hardware and functions. 2. Select a switch, and click Edit. 3. Click the QoS tab on the Edit Switch dialog box. The QoS dialog box displays. 4. Select a Traffic Class map that you want to delete from the Traffic Class Maps list. 5. Click the left arrow button. The selected Traffic Class map row is removed from the list. 6.
18 FCoE provisioning FCoE provisioning The Management application supports FCoE provisioning only on Fabric OS version 6.3.1_dcb. The command line interface (CLI) supports FCoE provisioning for the following versions of Fabric OS: • • • • Fabric OS 6.3.1_cee Fabric OS 6.3.1_del Fabric OS 6.4.1_fcoe Fabric OS 7.0.x Refer to the Fabric OS Command Reference for CLI procedures. FCoE provisioning simplifies the number of steps required to configure a DCB port to carry the FCoE traffic.
FCoE provisioning 18 4. Accept the default VLAN ID of 1002, or change the value. The valid VLAN ID range is from 2 through 3583. 5. Click the right arrow button to move the FCoE map parameters into the FCoE Maps list. 6. When you have finished the configuration, click OK to launch the Deploy to Products dialog box. 7. Click OK after changing the attributes of the current deployment. The Deployment Status dialog box displays. 8.
18 VLAN classifier configuration VLAN classifier configuration The Management application supports VLAN classifier management only on Fabric OS 6.3.1_dcb and Fabric OS 7.0.0. VLAN classifier rules are used to define specific rules for classifying untagged packets to selected VLANs based on protocol and MAC addresses. The classified frames are then tagged with a VLAN ID. VLAN classifier rules can be categorized into the following areas: • 802.
VLAN classifier configuration 18 FIGURE 194 Edit Switch dialog box, VLAN Classifiers tab 4. Click the Add button under the Available Rules list. The Add Rules dialog box displays, as shown in Figure 195. FIGURE 195 Add Rules dialog box The Rule ID field is pre-populated with the next available rule ID number. 5. Keep the rule ID number as it is, or change the number using a value from 1 through 256. 6. Select a rule type. Valid rule types are MAC (MAC address-based rule) and Proto (802.
18 VLAN classifier configuration 9. Click OK to add the rule to the Available Rules list on the VLAN Classifiers tab of the Edit Switch dialog box and close the Add Rules dialog box. NOTE Clicking Apply also adds the rule to the Available Rules list on the VLAN Classifiers tab of the Edit Switch dialog box, and in addition, the Add Rules dialog box remains open and clears all entries for you to define the next rule. 10.
VLAN classifier configuration 18 Creating a VLAN classifier group You can assign existing rules to a selected VLAN classifier and form a VLAN classifier group. If no rules are available, you can add rules to a selected switch using the Add Rules dialog box. 1. Select Configure > DCB from the menu bar. The DCB Configuration dialog box displays, showing the status of all DCB-related hardware and functions. 2. Select a switch and click Edit. 3. Click the VLAN Classifiers tab on the Edit Switch dialog box.
18 LLDP-DCBX configuration LLDP-DCBX configuration Link Layer Discovery Protocol (LLDP) provides a solution for the configuration issues caused by increasing numbers and types of network devices in a LAN environment, because, with LLDP, you can statically monitor and configure each device on a network.
LLDP-DCBX configuration 18 Adding an LLDP profile NOTE When a TE port is selected to assign to an LLDP profile, a yellow banner displays with the following error message: “LLDP-DCBX is disabled on this switch. The configuration becomes functional when LLDP-DCBX is enabled on the switch.” 1. Select Configure > DCB. The DCB Configuration dialog box displays, showing the status of all DCB-related hardware and functions. 2. Select a switch, and click Edit. 3.
18 LLDP-DCBX configuration Editing an LLDP profile 1. Select Configure > DCB. The DCB Configuration dialog box displays, showing the status of all DCB-related hardware and functions. 2. Select a switch, and click Edit. 3. Click the LLDP-DCBX tab on the Edit Switch dialog box. The LLDP-DCBX Profile dialog box displays. 4. Select an LLDP profile in the LLDP Profile list. NOTE You can edit the profile. You cannot, however, delete or duplicate global configurations. 5.
LLDP-DCBX configuration 18 Assigning an LLDP profile to a port or ports in a LAG You create LLDP profiles using the Edit Switch dialog box, which you access from the DCB Configuration dialog box. Global configuration parameters, which is the default selection, are displayed in the Assigned Profile table. NOTE A yellow banner displayed on the LLDP-DCBX dialog box indicates that LLDP-DCBX is disabled on the switch. The configuration options become functional when LLDP-DCBX is enabled on the switch. 1.
18 802.1x authentication 802.1x authentication 802.1x is a standard authentication protocol that defines a client-server-based access control and authentication protocol. 802.1x restricts unknown or unauthorized clients from connecting to a LAN through publicly accessible ports. NOTE 802.1x is not supported for internal ports. A switch must be enabled for 802.1x authentication before you configure its parameters. See “Setting 802.1x parameters for a port” for more information. Enabling 802.
802.1x authentication 18 Setting 802.1x parameters for a port The 802.1x parameters can be configured whether or not the feature is enabled on the switch. The default parameters are initially populated when 802.1x is enabled, but you can change the default values as required. 1. Select Configure > DCB from the menu bar. The DCB Configuration dialog box displays, showing the status of all DCB-related hardware and functions. 2. Select a port and click Edit. 3. Click the 802.
18 Switch, port, and LAG deployment • Re-authentication Interval - The number of seconds between re-authentication attempts. The value range is 1 to 4294967295. The default value is 3600 seconds. This feature is not dependent on the re-authentication state being enabled. • Port Control - Select an authorization mode from the list to configure the ports for authorization. Options include auto, force-authorized, or force-unauthorized and the default value is auto. 6.
Switch, port, and LAG deployment 18 FIGURE 198 Deploy to Products dialog box FIGURE 199 Deploy to Ports dialog box Brocade Network Advisor IP User Manual 53-1002947-01 567
18 Switch, port, and LAG deployment FIGURE 200 Deploy to LAGs dialog box 4. Click one of the following deployment options: • • • • Deploy now Save and deploy now Save deployment only Schedule 5. Click one of the following save configuration options: • Save to running • Save to running and startup • Save to running and startup then reboot The name for the scheduled product deployment is pre-populated with a “DCB-MM-DD-YYYY-HR-MIN-SS” prefix. This is an editable field. 6.
Switch, port, and LAG deployment 18 8. Select one or more of the following configurations, to be deployed on the selected targets. NOTE These configurations can be pushed to target DCB switches, FOS version 6.3.1_cee or 6.3.1_del. For switches: • • • • • • QoS, DCB Map QoS, Traffic Class Map FCoE Map VLAN Classifiers and Rules LLDP Profiles 802.1x Configuration NOTE See “Source to target switch Fabric OS version compatibility for deployment” for restrictions.
18 Switch, port, and LAG deployment Source to target switch Fabric OS version compatibility for deployment Table 71 lists the restrictions that exist when deploying source switches to target switches. TABLE 71 Source to target switch Fabric OS version compatibility Source Fabric OS version and device Target Fabric OS version supported Comments Fabric OS DCB switch and FCOE10-24 DCB blade with Fabric OS version 6.4.2 or earlier.
Network OS switches in VCS mode 18 Network OS switches in VCS mode For a Network OS switch in VCS mode or standalone mode, you can use the management application to perform the following tasks: • View Network OS switches, ports, LAGs, and vLAGs and their basic configuration details and detailed DCB configurations. • • • • • • • • Enable and disable ports, LAGs, and vLAGs. View real-time performance graphs. View historical graphs and reports. View profiled port, LAG, and vLAG configurations.
18 Network OS switches in VCS mode Viewing switches in VCS mode 1. Launch the DCB Configuration dialog box using one of the following methods: • Select Configure > DCB from the menu bar. • Right-click the DCB switch from the device tree, and select Configure > DCB. • Right-click the DCB switch from the topology map and select Configure > DCB. The DCB Configuration dialog box displays, showing the status of all DCB-related hardware and functions. 2.
Network OS switches in VCS mode TABLE 72 18 QoS configuration parameters on VCS switch DCB Map Parameters Displays the following map parameters: PG ID — Lists the priority group ID (15.0 to 15.7 and 0 to 7). % Bandwidth — Lists the bandwidth value for priority group IDs 0-7. The total of all priority groups must equal 100%. • Priority Flow — Check to enable priority flow control on individual priority groups. • CoS — Lists the Class of Service (CoS) value that corresponds to the Priority Group ID rows.
18 Network OS switches in VCS mode Viewing VLAN classifiers and rules parameters on the Network OS switch Table 74 describes the parameters that display on the View Switch dialog box - VLAN Classifiers tab. TABLE 74 VLAN classifiers and rules configuration parameters on VCS switch Field/Component Available Rules VLAN Classifiers Description Displays the following Available Rules information: Rule ID — The rule identifier. Valid rule ID values are from 1 through 256.
Network OS switches in VCS mode 18 Viewing the 802.1x parameter on the Network OS switch Table 76 describes the parameter that displays on the View Switch dialog box - QoS tab. TABLE 76 802.1x configuration parameter on VCS switch Field/Component Description 802.1x Displays the enabled or disabled status of the 802.1x configuration on the Network OS switch. Viewing ports in VCS mode 1.
18 Network OS switches in VCS mode TABLE 77 Port parameters on the Network OS switch port (Continued) Field/Component Description MTU The maximum transmission unit (MTU) in bytes. The value range is from 1522 through 9216 and the default value is 2500. iSCSI Priority The CoS priority value for iSCSI traffic. The value range is from COS 0 through COS 7 and the default value is COS 4.
Network OS switches in VCS mode 18 QoS - Non-DCB TABLE 79 QoS (non-DCB) parameters on the Network OS switch port Field/Component Description Mode The mode of Quality of Service (QoS) assigned to the port (non-DCB). Trust Indicates whether the Ethernet trust of the port is enabled or disabled. NOTE: Applicable only for standalone Network OS devices. Flow Control The Ethernet priority flow control mode of the port. The default flow control mode is Off. Possible modes are as follows: • Off • 802.
18 Network OS switches in VCS mode Viewing LLDP-DCBX parameters on the Network OS switch port Table 81 describes the LLDP profiles table (in global configuration) and the LLDP profiles. TABLE 81 LLDP-DCBX parameters on the Network OS switch port Field/Component Description LLDP-DCBX Indicates whether LLDP-DCBX feature is enabled or disabled. LLDP Profile Parameters Displays the following LLDP profile parameters: Name — The name of the LLDP profile. Description — A description of the LLDP profile.
Network OS switches in VCS mode TABLE 82 18 802.1x parameter on the Network OS switch port (Continued) Field/Component Description Re-authentication Interval (sec) The number of seconds between re-authentication attempts. The value range is 1 to 4294967295. The default value is 3600 seconds. This feature is not dependent on the re-authentication state being enabled. Port Control The authorization mode to configure the ports for authorization.
18 Network OS switches in VCS mode TABLE 83 LAG parameters on the Network OS switch LAG (Continued) Field/Component Description Status Indicates whether the LAG is enabled or disabled. You must enable the LAG to use the DCB functionality. Default CoS The Cost of Service (CoS) value for incoming untagged frames. Values are 0-7 or if the port is profiled. The default CoS is 0. Type Displays the limit on the size of the LAG.
Network OS switches in VCS mode TABLE 84 18 QoS (DCB) parameters on the Network OS switch LAG. (Continued) Field/Component Description Precedence This number determines the map’s priority. Valid values are from 1 through 100. DCB Map Parameters • • • • PG ID — Lists the priority group ID (15.0 to 15.7 and 0 to 7). % Bandwidth — Lists the bandwidth value for priority group IDs 0-7. The total of all priority groups must equal 100%.
18 Network OS switches in VCS mode Viewing FCoE parameters on the Network OS switch LAG Table 86 describes the parameters that displays on the View LAG dialog box - FCoE tab. NOTE The Interface mode is None and the L2 mode is empty for the FCoE-provisioned LAG. TABLE 86 FCoE configuration parameters on VCS switch Field/Component FCoE Map Note: The default FCoE map contains both the default Fabric map and the default DCB map.
DCB performance 18 DCB performance Performance monitoring provides details about the quantity of traffic and errors a specific port or device generates on the fabric over a specific time frame. You can also use Performance features to indicate the devices that create the most traffic and to identify the ports that are most congested. The Performance menu items launch either SAN or IP performance dialog boxes based on which tab you select.
18 DCB performance Generating a real-time performance graph from the IP tab To generate a real-time performance graph for a Network OS or FOS DCB switch, complete the following steps. 1. Click the IP tab. 2. Select a DCB port from the DCB Configuration dialog box, and select Real Time Graph from the Performance list. A message displays, prompting you to close the DCB Configuration dialog box. 3. Click OK to close the DCB Configuration dialog and open the Performance dialog box.
DCB performance 18 Historical performance graph The Historical Performance Graph dialog box enables you to customize how you want the historical performance information to display. Generating a historical performance graph You can generate a historical performance graph by selecting both Network OS and FOS DCB devices from the IP Tab or by selecting only Network OS DCB devices from the IP tab. 1.
18 FCoE login groups FCoE login groups The FCoE Configuration dialog box allows you to manage the FCoE login configuration parameters on the DCB switches in all discovered fabrics. FCoE login configuration is created and maintained as a fabric-wide configuration. With the FCoE license, the FCoE Configuration dialog box displays virtual FCoE port information and enables you to manage the virtual port information.
FCoE login groups 18 • Click Edit to launch the Edit Login Group dialog box, where you can edit the login group parameters. See “Editing an FCoE login group” on page 588. • Click Delete to remove the login group from the list. See “Deleting one or more FCoE login groups” on page 589. Adding an FCoE login group Complete the following steps to add switches to a login group. You can manually add ports by entering the world wide name (WWN) or select available managed CNAs from all discovered hosts.
18 FCoE login groups • Port WWN — Click to enter the world wide name (WWN) of the port to associate with the selected switch. The member port WWN text field allows a maximum of 16 digits. • Managed CNAs — Click to show a list of products and ports which can be selected as login group members. 6. Select available members from the Products/Ports list and click the right arrow button to move the available members to the Selected Members list. 7. Click OK.
FCoE login groups 18 • Rename the login group by entering the new name into the Name field. The Allow All option must be selected to rename the login group. • Select one of the following options to add or remove login members into the Available Members list. The Allow Specific option must be selected to add or remove login members. • Port WWN — Click to enter the world wide name (WWN) of the port to associate with the selected switch. The member port WWN text field allows a maximum of 16 digits.
18 Virtual FCoE port configuration The FCoE Configuration dialog box displays. 2. Select an FCoE-enabled switch from the Login Groups list and click Disable. The FCoE Login Group Confirmation and Status dialog displays. 3. Review the changes carefully before you accept them. 4. Click Start to apply the changes, or click Close to abort the operation. The FCoE login management feature is disabled and all login groups on the selected switch are deleted.
Virtual FCoE port configuration 18 NOTE For Network OS switches running the Network OS version 3.0 and later, the Management application retrieves all dynamically and statically bonded virtual FCoE ports in the virtual FCoE port pool and displays them. If there are no bonded virtual FCoE ports on any cluster member, then the cluster is not displayed.
18 Virtual FCoE port configuration Clearing a stale entry A stale entry is a device that logged in and logged off but, because a port went down after an FLOGI was received, the device failed to receive the message. The entry in the FCoE Connected Devices table becomes stale and you must clear it manually. NOTE Clearing a stale entry is not supported for Network OS devices. 1. Select a virtual FCoE port from the FCoE Configuration dialog box and click Connected Devices.
Chapter 19 Telemetry In this chapter • Telemetry overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 593 • Policy-based routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 593 • ACL Accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
19 Policy-based routing The Management application creates an IPv4 PBR or IPv6 PBR based on the ACLs defined in the policy. • If any rule in the policy contains an IPv4 ACL, the Management application creates an IPv4 PBR applies the PBR to the ports. • If any rule in the policy contains an IPv6 ACL, the Management application creates an IPv6 PBR applies the PBR to the ports.
Policy-based routing 19 Source — Port (one or more) to which this PBR policy is bound. For PBR policies bound to multiple ports, displays all ports separated by commas. For globally applied PBR policies, displays blank. Match — L3 ACL policy associated with the rule. You can define up to 10 ACL policies (5 IPv4 and 5 IPv6) per rule. Next Hop — Destination for the packets that pass ACL filter. You can define multiple next hops. PBR selects the first next hop from the next hop list that is up.
19 Policy-based routing Adding a new policy 1. Select an Ethernet router, Ethernet core router, or Ehternet Backbone router product and select Configure > Policy Based Routing. The Product_Name PBR Configuration dialog box displays. 2. Select Add > New Policy. The PBR Policy Configuration dialog box displays. 3. Enter a name for the new policy and click OK on the PBR Policy Configuration dialog box. 4. To add one or more rules to the policy, refer to “Adding rules to a policy” on page 596. 5.
Policy-based routing 19 3. Enter a name for the rule in the Name field. The rule name can be up to 127 characters and must be unique within the policy. 4. Select one or more ACLs to use in the rule from the Available ACLs table. Each rule can match up to 10 ACLs (5 IPv4 and 5 IPv6) and can have multiple hops to a destination. The Available ACLs table displays the available IPv4 and IPv6 ACLs on this product. IPv4 and IPv6 have two separate policy lists.
19 Policy-based routing 16. Click OK on the Product_Name PBR Configuration dialog box. The Deploy to Products - PBR dialog box displays. To deploy the PBR policy, refer to “Deploying a PBR policy on demand” on page 599, “Saving a PBR policy deployment” on page 600, or “Scheduling a PBR policy deployment” on page 601. Adding policies from saved configurations 1. Select an Ethernet router, Ethernet core router, or Ehternet Backbone router product and select Configure > Policy Based Routing.
Policy-based routing 19 3. To edit the rule to the policy, refer to step 4 through step 14 in “Adding rules to a policy” on page 596. 4. Click OK on the Edit Rule - Policy_Name dialog box. 5. Click OK on the Product_Name PBR Configuration dialog box. The Deploy to Products - PBR dialog box displays. To deploy the PBR policy, refer to “Deploying a PBR policy on demand” on page 599, “Saving a PBR policy deployment” on page 600, or “Scheduling a PBR policy deployment” on page 601.
19 Policy-based routing 5. Click the Snapshot Use check box and click the ellipsis button to select the product monitoring template. NOTE The Snapshot Use check box is only available for IronWare products. The Pre-Post Snapshot Properties dialog box displays. 6. Select the product monitoring template you want to use from the CLI Template list. 7.
Policy-based routing 7. 19 Select one or more of the following to capture snapshots: • Select the Pre-deployment check box to capture a snapshot of the product’s configuration prior to deployment of the security configuration. • Select the Post-deployment check box to capture a snapshot of the product’s configuration after deployment of the security configuration.
19 Policy-based routing 7. Click OK on the Schedule Properties dialog box. 8. Click the Snapshot Use check box and click the ellipsis button to select the product monitoring template. NOTE The Snapshot Use check box is only available for IronWare products. The Pre-Post Snapshot Properties dialog box displays. 9. Select the product monitoring template you want to use from the CLI Template list. 10.
Policy-based routing 19 Configuring a daily deployment schedule To configure a daily deployment schedule, complete the following steps. 1. Select Daily from the Frequency list. 2. Select the time of day you want deployment to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. To finish configuring the deployment schedule, return to step 7 of “Scheduling a PBR policy deployment” on page 601.
19 ACL Accounting ACL Accounting NOTE ACL accounting is only supported on Ethernet router, Ethernet core router, or Ehternet Backbone router products running 5.4 or later. Ethernet router, Ethernet core router, or Ehternet Backbone router products monitor the number of times an ACL is used to filter incoming or outgoing traffic on an interface.
ACL Accounting 19 2. Select the Clear all counters on device check box. 3. Click OK on the ACL Accounting dialog box. Viewing ACL counters Before you can view ACL counters, you must enable ACL accounting on the product (refer to “Enabling or disabling ACL accounting” on page 604). To view ACL accounting on a product, select an Ethernet router, Ethernet core router, or Ehternet Backbone router product and select Configure > Security > Layer 2/3 ACL > Product.
19 606 ACL Accounting Brocade Network Advisor IP User Manual 53-1002947-01
Chapter 20 Security Management In this chapter • Security overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Layer 2 access control list management . . . . . . . . . . . . . . . . . . . . . . . . . . . • Layer 3 access control list policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Media Access Control (MAC) filter management. . . . . . . . . . . . . . . . . . . . . • Security configuration deployment. . . . . . . . . . . . . . .
20 Layer 2 access control list management You should configure the ACL on the device before you assign the ACL to an interface. You can create multiple ACLs and save them to the device configuration. However, the ACL does not filter traffic until you assign it to an interface. You can assign an ACL on a physical port, Virtual LAN (VLAN), or Link Aggregation Group (LAG). For IronWare OS products, you can create a standard ACL.
Layer 2 access control list management 20 FIGURE 211 Add - Layer 2 ACL Configuration dialog box 3. Enter a number for the ACL in the Number field. For IronWare 5.4 and later, ACL numbers range from 400 through 1399. For IronWare 5.3, ACL numbers range from 400 through 599. For IronWare less than 5.3, ACL numbers range from 400 through 499. 4. Select Permit or Deny from the Action list. 5.
20 Layer 2 access control list management • IPV6 — Internet Protocol, version 6 • Any — Any of the protocols 9. (Deny actions only) Select the Log Enable check box to generate a log for this configuration. 10. Click the right arrow button. The new ACL rule displays in the ACL Entries list. 11. To create additional rules for the same ACL, repeat step 4 through step 10. 12. Click OK on the Add - Layer 2 ACL Configuration dialog box. The new ACL rule displays in the ACLs list.
Layer 2 access control list management 20 Copying a Layer 2 ACL configuration (IronWare) To copy a Layer 2 ACL configuration, complete the following steps. 1. Select a device and select Configure > Security > Layer 2 ACL > Product. The Device_Name - Layer 2 ACL Configuration dialog box displays. 2. Select the ACL configuration you want to copy and click Duplicate. The Duplicate - Layer 2 ACL Configuration dialog box displays. 3. Enter a number for the ACL in the Number field. For IronWare 5.
20 Layer 2 access control list management Assigning a Layer 2 ACL configuration to an interface (IronWare) NOTE You cannot modify or delete a Layer 2 ACL that is bound to a port. To assign a Layer 2 ACL configuration to an interface, complete the following steps. 1. Select Configure > Security > Layer 2 ACL > Port. The Port Selection - Layer 2 ACL dialog box displays. FIGURE 212 Port Selection - Layer 2 ACL dialog box 2. Select a port in the Available Ports list and click the right arrow button. 3.
Layer 2 access control list management 20 FIGURE 213 Device_Name - Port_Number - Layer 2 ACL Configuration dialog box 4. (Ethernet routers only) Select a duration (1 Second, 1 Minute, 5 Minutes, or Cumulative) to track the number of times an ACL filter is used in the Hits Stats Duration list. Click Refresh to collect the hit statistics. The application updates the Hits column of the Details of Selected ACL list. 5.
20 Layer 2 access control list management 6. To assign an ACL configuration to outbound messages, select the Outbound check box and complete the following steps: NOTE You can only assign an ACL to an outbound message on an Application product. a. Select the Assign ACL option and choose one of the following options from the first Assign ACL list: • Select ACLs on this Product to assign ACLs deployed on the product to the port.
Layer 2 access control list management 20 Fabric OS Layer 2 ACL configuration NOTE Only available for Fabric OS DCB products. This section provides procedures for configuring a standard for extended Layer 2 ACL on a device, assigning the Layer 2 ACL to an interface, as well as clearing Layer 2 ACL assignments from a device. Creating a standard Layer 2 ACL configuration (Fabric OS) To create a standard Layer 2 ACL configuration, complete the following steps. 1.
20 Layer 2 access control list management Count specifies the number of times the ACL rule is applied. 9. Click the right arrow button. The new ACL entry displays in the ACL Entries list. To create additional ACL entries, repeat step 3 through step 9. 10. Click OK on the Add - Layer 2 ACL Configuration dialog box. The new ACL configuration displays in the ACLs list. To create additional ACLs, repeat step 2 through step 10. 11. Click OK on the Device_Name - Layer 2 ACL Configuration dialog box.
Layer 2 access control list management 20 The Deploy to Products - Layer 2 ACL dialog box displays. To save the configuration, refer to “Saving a security configuration deployment” on page 678 Copying a standard Layer 2 ACL configuration (Fabric OS) To copy a standard Layer 2 ACL configuration on a Fabric OS device, complete the following steps. 1. Select the device and select Configure > Security > Layer 2 ACL > Product. The Device_Name - Layer 2 ACL Configuration dialog box displays. 2.
20 Layer 2 access control list management FIGURE 215 Device_Name - Layer 2 ACL Configuration (Extended) dialog box 4. Enter a name for the ACL in the Name field. 5. Enter a sequence number for the ACL in the Sequence field. 6. Select Permit or Deny from the Action list. 7. In the Source list, select one of the following options: • Any • Host • MAC Selecting MAC or Host enables the Source field. Enter the source address on which the configuration filters traffic in the Source field. 8.
Layer 2 access control list management 20 12. Click the right arrow button. The new ACL entry displays in the ACL Entries list. To create additional ACL entries, repeat step 5 through step 12. 13. Click OK on the Add - Layer 2 ACL Configuration dialog box. The new ACL displays in the ACL Entries list. To create additional ACL entries, repeat step 2 through step 13. 14. Click OK on the Device_Name - Layer 2 ACL Configuration dialog box. The Deploy to Products - Layer 2 ACL dialog box displays.
20 Layer 2 access control list management Editing an extended Layer 2 ACL configuration (Fabric OS) To edit an extended Layer 2 ACL configuration on a Fabric OS device, complete the following steps. 1. Select the device and select Configure > Security > Layer 2 ACL > Product. The Device_Name - Layer 2 ACL Configuration dialog box displays. 2. Select the ACL you want to edit in the ACLs list and click Edit. The Configuration_Name Edit Extended Layer 2 ACL Configuration dialog box displays. 3.
Layer 2 access control list management 20 5. To add a new ACL rule, complete step 4 through step 12 in “Creating an extended Layer 2 ACL configuration (Fabric OS)” on page 617. The new ACL entry displays in the ACL Entries list. To add additional ACL entries, repeat step 5. 6. To delete an existing ACL rule, select the rule you want to edit in the ACL Entries list and click the left arrow button. 7. Click OK on the Duplicate - Layer 2 ACL Configuration dialog box.
20 Layer 2 access control list management 4. Select the Assign ACL option and choose one of the following options from the first Assign ACL list: • Select ACLs on this Product to assign ACLs deployed on the product to the port. The second list is populated with the ACLs deployed on the switch or associated with a save deployment object. • Select ACLs bound to this port to assign ACLs bound to the interface to the port. The second list is populated with the ACLs bound to the interface.
Layer 2 access control list management 20 4. Click OK on the Layer 2 ACL Saved Configurations dialog box. The new ACL displays in the ACLs list. 5. Click OK on the Device_Name - Layer 2 ACL Configuration dialog box. The Deploy to Products - Layer 2 ACL dialog box displays.
20 Layer 2 access control list management Network OS Layer 2 ACL configuration NOTE You cannot configure a Layer 2 ACL using the Management application. You must configure the Layer 2 ACL through the Network OS CLI (refer to the Network OS Command Reference). Once you configure Layer 2 ACLs through the Network OS CLI, you can use the Management application to view Layer 2 ACL configurations for a VCS fabric or standalone device.
Layer 2 access control list management 20 • Details of Selected ACLs list — Displays the details of the ACL selected in the ACLs list. The Details of Selected ACLs table includes the following details: Sequence — The Layer 2 ACL entry sequence number. Action — Whether the ACL permits or denies traffic. Source — The source MAC address on which the ACL filters traffic. Destination (Extended only) — The destination MAC address on which the ACL filters the traffic.
20 Layer 2 access control list management 2. Review the Layer 2 ACL configuration details. • ACLs list — Displays the ACLs to be deployed for this configuration. The ACLs list includes the following details: Operation — Displays the ACL operation (no action) during deployment. Name — The name of the ACL. Type — The ACL type. Options include: Extended or Standard. Details of Selected ACLs list — Displays the details of the ACL selected in the ACLs list.
Layer 3 access control list policy 20 FIGURE 219 Device/Fabric_Name - Port_Number - Layer 2 ACL Configuration dialog box 4. Review the Layer 2 ACL configuration details. Details of Selected ACL table — Displays the details of the ACL selected in the ACLs list.The Details of Selected ACL table includes the following details: • • • • Sequence — The Layer 2 ACL entry sequence number. Action — Whether the ACL permits or denies traffic. Source — The source MAC address on which the ACL filters traffic.
20 Layer 3 access control list policy You can create two types of ACLs: • Standard ACL — Use to permit and deny traffic based on the source IP address, host name, or network. You should use standard ACLs when you only need to filter traffic based the source. You can create up to 99 standard ACLs ranging from 1 through 99. For more information, refer to “Creating a standard L3 ACL configuration” on page 628.
Layer 3 access control list policy 20 FIGURE 221 Add - L3 ACL Configuration (Standard) dialog box 3. Select Standard from the Type list. 4. Enter a name or number for the ACL in the ACL Name/Number field. 5. Select Permit or Deny from the Action list. 6. Enter a description for the ACL in the Remarks field. 7. Choose one of the following options from the Source list: • To enter an IP address, select IP Address and complete the following steps: a.
20 Layer 3 access control list policy 12. Click OK on the Add - L3 ACL Configuration dialog box. The Device_Name - L3 ACL Configuration dialog box displays. 13. To set the configuration type and operations, refer to “Configuring the ACL configuration type and operations” on page 644. 14. (Ethernet routers only) To set the hit statistics duration, refer to “Configuring hit statistics” on page 644. 15. To deploy the configuration, click OK on the Device_Name - L3 ACL Configuration dialog box.
Layer 3 access control list policy b. 20 Complete step 5 through step 10 in “Creating a standard L3 ACL configuration” on page 628. The updated ACL rule displays in the ACL Entries list. To update additional rules for the same ACL, repeat step 4. 5. To add a new rule, complete step 5 through step 10 in “Creating a standard L3 ACL configuration” on page 628. The updated ACL rule displays in the ACL Entries list. To update additional rules for the same ACL, repeat step 5. 6.
20 Layer 3 access control list policy The updated ACL rule displays in the ACL Entries list. To update additional rules for the same ACL, repeat step 4. 6. To add a new rule, complete step 5 through step 10 in “Creating a standard L3 ACL configuration” on page 628. The updated ACL rule displays in the ACL Entries list. To update additional rules for the same ACL, repeat step 5. 7. To delete an existing rule, select the rule you want to delete in the ACL Entries list and click the left arrow button. 8.
Layer 3 access control list policy 20 FIGURE 222 Add - L3 ACL Configuration (Extended) dialog box 4. Enter a name or number for the ACL in the ACL Name/Number field. 5. Select Permit or Deny from the Action list. 6. Enter a description for the ACL in the Remarks field. 7. Choose one of the following options from the Source list: • To enter an IP address, select IP Address and complete the following steps: a.
20 Layer 3 access control list policy • To enter an IP address, select IP Address and complete the following steps: a. Enter the destination IP address on which the ACL filters traffic in the IP Address list and text field. b. Enter a portion of the destination IP address on which the ACL filters traffic in the Wildcard Mask field. • To select a network, select IP Address and choose a network from the list.
Layer 3 access control list policy 20 19. To deploy the configuration, click OK on the Device_Name - L3 ACL Configuration dialog box. The Deploy to Products - L3 ACL dialog box displays. To deploy the configuration, refer to “Security configuration deployment” on page 676. Editing an extended L3 ACL configuration To edit an extended L3 ACL configuration, complete the following steps. 1. Select the device and select Configure > Security > L3 ACL > Product.
20 Layer 3 access control list policy Copying an extended L3 ACL configuration To copy an extended L3 ACL configuration, complete the following steps. 1. Select the device and select Configure > Security > L3 ACL > Product. The Device_Name - L3 ACL Configuration dialog box displays. 2. Select the ACL configuration you want to copy in the ACLs list and click Duplicate. The Duplicate - L3 ACL Configuration dialog box displays with the default name ‘Copy of Original_Name’. 3.
Layer 3 access control list policy 20 Creating an IPv6 L3 ACL configuration To create an IPv6 L3 ACL configuration, complete the following steps. 1. Select an Ethernet router product and select Configure > Security > L3 ACL > Product. The Device_Name - L3 ACL Configuration dialog box displays. 2. Select New IPv6 from the Add list. The Add - L3 ACL (IPv6) Configuration dialog box displays. FIGURE 223 Add - L3 ACL (IPv6) Configuration dialog box 3.
20 Layer 3 access control list policy 7. Choose one of the following options from the Destination list: • To enter an IP address, select IP Address and complete the following steps: a. Enter the destination IP address on which the ACL filters traffic in the IP Address list and text field. You can enter the IPv6 address in compressed (for example, you can compress 2001:db8:0:0:0:0:2:1 can be shortened to 2001:db8::2:1) or raw format. b.
Layer 3 access control list policy 20 16. Click OK on the Add - L3 ACL (IPv 6) Configuration dialog box. The new ACL displays in the ACLs list. 17. To set the configuration type and operations, refer to “Configuring the ACL configuration type and operations” on page 644. 18. (Ethernet routers only) To set the hit statistics duration, refer to “Configuring hit statistics” on page 644. 19. To deploy the configuration, click OK on the Device_Name - L3 ACL Configuration dialog box.
20 Layer 3 access control list policy Copying an IPv6 L3 ACL configuration To copy an IPv6 L3 ACL configuration, complete the following steps. 1. Select an Ethernet router product and select Configure > Security > L3 ACL > Product. The Device_Name - L3 ACL Configuration dialog box displays. 2. Select the ACL configuration you want to copy in the ACLs list and click Duplicate. The Duplicate - L3 ACL (IPv6 ) Configuration dialog box displays with the default name ‘Copy of Original_Name’.
Layer 3 access control list policy 20 11. Click OK on the Duplicate - L3 ACL (IPv 6) Configuration dialog box. The new ACL displays in the ACLs list. 12. To set the configuration type and operations, refer to “Configuring the ACL configuration type and operations” on page 644. 13. (Ethernet routers only) To set the hit statistics duration, refer to “Configuring hit statistics” on page 644. 14. To deploy the configuration, click OK on the Device_Name - L3 ACL Configuration dialog box.
20 Layer 3 access control list policy FIGURE 226 Device_Name - Port_Number - ACL Port Configuration dialog box 4. (Ethernet routers only) Select a duration (1 Second, 1 Minute, 5 Minutes, or Cumulative) to track the number of times an ACL filter is used in the Hits Stats Duration list. Click Refresh to collect the hit statistics. The application updates the Hits column of the Details of Selected ACL list. 5.
Layer 3 access control list policy 20 6. To assign an ACL configuration to outbound messages, select the Outbound check box and complete the following steps: NOTE You can only assign an ACL to an outbound message on an Application product. a. Select the Assign ACL option and choose one of the following options from the first Assign ACL list: • Select ACLs on this Product to assign ACLs deployed on the product to the port.
20 Layer 3 access control list policy 5. To clear outbound messages, complete the following steps: a. Select the Outbound check box. b. Select the Clear ACL Assignment option. 6. Click OK on the Device_Name - Port_Number - Layer 3 ACL Configuration dialog box. The Deploy to Ports - L3 ACL dialog box displays.
Layer 3 access control list policy 20 3. Click Refresh to refresh the hit statistics. The Refresh Time field displays the last time the Management application client successfully collected the hit statistics. Configuring L3 ACL advanced settings You configure L3 ACL advanced settings for extended L3 ACL device configurations.
20 Layer 3 access control list policy • Max-throughput (4) — Select to have the ACL filters packets that match the maximum throughput TOS. The decimal value is 4. • Min-delay (8) — Select to have the ACL filter packets that match the minimum delay TOS. The decimal value is 8. 4. Select one of the following protocols from the Protocol list to filter the packet by protocol.
Layer 3 access control list policy b. 20 Enter a port number or select a port application name from the Start list. If you selected range from the Operator list, enter the port number or name of the lower numbered port in the range. Click the ellipsis button to launch the Service dialog box to see a list of services and service groups. For more information about services and service groups, refer to “Service configuration” on page 658. c.
20 Layer 3 access control list policy b. Choose one of the following code types: The available code types vary depending on the selected message type.
Layer 3 access control list policy 20 14. Click OK on the Advanced Settings dialog box.
20 Layer 3 access control list policy 1. Click the Networks tab. FIGURE 228 Network dialog box, Networks tab 2. Review the List of Networks table: • Name — The user-defined network name. • Subnet — The IP address of the subnet. • Mask — The IP address of the mask. 3. Click Close on the Network dialog box. To finish configuring the ACL, return to one of the above procedures. Creating a network You can access the Network dialog box when configuring a standard or extended L3 ACL device configuration.
Layer 3 access control list policy 20 3. Enter a name for the network in the Name field. 4. Enter a valid IP address (IPv4 format) in the Subnet field. 5. Enter a valid IP address in the Mask field. If you use the ACL Network as the source IP address, the Subnet mask from the ACL Network will be converted to Wildcard mask when deploying the ACL to the device. The Network dialog box only accepts subnet mask. 6. Click OK on the Add Network dialog box. 7. Click Close on the Network dialog box.
20 Layer 3 access control list policy Copying a network You can access the Network dialog box when configuring a standard or extended L3 ACL device configuration.
Layer 3 access control list policy 20 3. Click Yes on the confirmation message. 4. Click Close on the Network dialog box. To finish configuring the ACL, return to one of the above procedures. Network group configuration The Management application allows you to filter traffic from a specific network group. A network group is made up of one or more devices, networks, or network groups.
20 Layer 3 access control list policy 2. Review the List of Network Groups table: • • • • • Name — The user-defined network group name. Host Names — The name of each host in the network group. Address Range — The range of IP addresses for the network group. Networks — The name of each network in the network group. Network Groups — The name of each network group in the network group. 3. Click Close on the Network dialog box. To finish configuring the ACL, return to one of the above procedures.
Layer 3 access control list policy 20 4. To add a host to the network group, complete the following steps. a. Enter a valid host name in the Host Name field. b. Click the right arrow button to move the host name to the Selected table. 5. To add an address range to the network group, complete the following steps. a. Enter an IP address for the start of the range in the Start field. b. Enter an IP address for the end of the range in the End field. c.
20 Layer 3 access control list policy 5. To edit an address range to the network group, complete the following steps. a. Select the range you want to edit in the Selected table and click the left arrow button. b. Change the IP address for the start of the range in the Start field. c. Change the IP address for the end of the range in the End field. d. Click the right arrow button to move the address range back to the Selected table. 6.
Layer 3 access control list policy 20 5. To add a host to the network group, complete the following steps. a. Enter a valid host name in the Host Name field. b. Click the right arrow button to move the host name to the Selected table. 6. To edit an address range to the network group, complete the following steps. 7. a. Select the range you want to edit in the Selected table and click the left arrow button. b. Change the IP address for the start of the range in the Start field. c.
20 Layer 3 access control list policy Deleting a network group NOTE You cannot delete a network group that is in use. You can access the Network dialog box when configuring a standard or extended L3 ACL device configuration.
Layer 3 access control list policy 20 Viewing existing services You can access the Service dialog box when configuring an extended L3 ACL device configuration.
20 Layer 3 access control list policy Creating a service You can access the Service dialog box when configuring an extended L3 ACL device configuration.
Layer 3 access control list policy 20 Editing a service You can access the Service dialog box when configuring an extended L3 ACL device configuration.
20 Layer 3 access control list policy 4. Select one of the following protocol options: • TCP • UDP 5. Enter a port number in the Port field. 6. Click OK on the Duplicate Service dialog box. 7. Click Close on the Service dialog box. To finish configuring the advanced settings for the ACL, refer to “Configuring L3 ACL advanced settings” on page 645. Deleting a service You can access the Service dialog box when configuring an extended L3 ACL device configuration.
Layer 3 access control list policy 20 Service group configuration The Management application allows you to filter traffic from a specific service group. A service group is made up of one or more port ranges, services, or service groups.
20 Layer 3 access control list policy 3. Click Close on the Service dialog box. To finish configuring the advanced settings for the ACL, refer to “Configuring L3 ACL advanced settings” on page 645. Creating a service group You can access the Service dialog box when configuring an extended L3 ACL device configuration.
Layer 3 access control list policy 20 5. To add a service to the group, complete the following steps. a. Select one or more services to add to the group in the Services table. b. Click the right arrow button to move the selected services to the Selected table. 6. To add a service group to the group, complete the following steps. 7. a. Select one or more service groups to add to the group in the Services table. b.
20 Layer 3 access control list policy 6. Click OK on the Edit Service Group dialog box. The Service dialog box, Service Group tab displays with the new group in the List of Service Groups table. 7. Click Close on the Service dialog box. To finish configuring the advanced settings for the ACL, refer to “Configuring L3 ACL advanced settings” on page 645. Copying a service group You can access the Service dialog box when configuring an extended L3 ACL device configuration.
Media Access Control (MAC) filter management 20 Deleting a service group You can access the Service dialog box when configuring an extended L3 ACL device configuration.
20 Media Access Control (MAC) filter management You can configure and manage MAC filters at the device or interface (port/trunk) level. NOTE You can only apply MAC filters inbound traffic. When you configure MAC filters on a device, the MAC filter does not execute until you deploy it on an interface. Once deployed to an interface, the device performs the action associated with the first matching filter (of all filters deployed to the device) to the packet.
Media Access Control (MAC) filter management 20 FIGURE 237 Add MAC Filter dialog box 3. Enter a MAC filter number in the MAC Filter # field. MAC filter numbers range from 1 through 1024. 4. (Optional) Enter a description of the MAC filter in the Description field. The description is saved to the Management application database only. It is not saved to the switch. 5. Select Permit or Deny from the Action list. 6.
20 Media Access Control (MAC) filter management 9. In the Operator list, select one of the following to specify a binary operator: • • • • = (equal to) != (not equal to) > (greater than) < (less than). This field is not available when the Ethernet Type is none. 10. Enter the type of frame in the Frame Type field. This ia 2 byte hexadecimal value. Valid values include 0600 to FFFF. This field is not available when the Ethernet Type is none. 11. Click OK on the Add MAC Filter dialog box.
Media Access Control (MAC) filter management 20 4. Click OK on the MAC Filter Saved Configurations dialog box. The Device_Name - MAC Filter Configuration dialog box displays with the selected MAC filters in the MAC Filters table. If you selected a saved deployment configuration, all MAC filters associated with the saved deployment configuration display in the MAC Filters table. 5. Click OK on the Device_Name - MAC Filter Configuration dialog box. The Deploy to Products - MAC Filter dialog box displays.
20 Media Access Control (MAC) filter management 6. In the Destination Address list, select one of the following options: • Any • MAC Selecting MAC enables the Destination Address and Destination Mask fields. 7. a. Enter the destination MAC address on which the configuration filters traffic in the Destination Address field. b. Enter the mask associated with the destination MAC address in the Destination Mask field.
Media Access Control (MAC) filter management 20 4. Enter a description of the MAC filter in the Description field. 5. Select Permit or Deny from the Action list. 6. In the Source Address list, select one of the following options: • Any • MAC Selecting MAC enables the Source Address and Source Mask fields. 7. a. Enter the source MAC address on which the configuration filters traffic in the Source Address field. b. Enter the mask associated with the source MAC address in the Source Mask field.
20 Media Access Control (MAC) filter management Deleting a MAC filter 1. Select Configure > Security > MAC Filter > Product. The Device_Name - MAC Filter Configuration dialog box displays. 2. Select the MAC filter you want to delete in the MAC Filters table and click Delete. 3. Click Yes on the confirmation message. 4. Click OK on the Device_Name - MAC Filter Configuration dialog box. NOTE The MAC Filter is not deleted from the switch until you deploy the configuration to the switch.
Media Access Control (MAC) filter management 20 Clearing MAC filter assignments To clear a MAC filter assignment from a port or product, complete the following steps. 1. Select Configure > Security > MAC Filter > Port. The Port Selection - MAC Filter dialog box displays. 2. Select the port you want to clear the MAC filter from in the Available Ports list and click the right arrow button. You can select more ports or products from the Deploy to Ports - MAC Filter dialog box. 3.
20 Security configuration deployment Security configuration deployment Figure 240 shows the standard interface used to deploy security configurations. FIGURE 240 Deploy to Product/Ports dialog box Before you can deploy a security configuration, you must create the security configuration.
Security configuration deployment 20 Deploying a security configuration on demand To deploy a security configuration immediately, complete the following steps. FIGURE 241 Deploy to Product/Ports dialog box 1. Choose one of the following options: • Deploy now — Select to deploy the configuration immediately on the product or port without saving the deployment definition.
20 Security configuration deployment 7. Select one or more of the following to capture snapshots: • Select the Pre-deployment check box to capture a snapshot of the product’s configuration prior to deployment of the security configuration. • Select the Post-deployment check box to capture a snapshot of the product’s configuration after deployment of the security configuration.
Security configuration deployment 20 5. Click the Snapshot Use check box and click the ellipsis button to select the product monitoring template. NOTE The Snapshot Use check box is only available for IronWare products. The Pre-Post Snapshot Properties dialog box displays. 6. Select the product monitoring template you want to use from the CLI Template list. 7.
20 Security configuration deployment 2. Choose one of the following options: • Select New from the Add list. The Add - Layer 2 ACL Configuration dialog box displays. • Select an ACL in the list and click Edit. The Edit - Layer 2 ACL Configuration dialog box displays. 3. Configure the Layer 2 ACL and click OK on the Add/Edit - Layer 2 ACL Configuration dialog box. 4. Click OK on the Device_Name - Layer 2 ACL Configuration dialog box. The Deploy to Products - Layer 2 ACL dialog box displays. 5.
Security configuration deployment 20 Configuring a one-time deployment schedule To configure a one-time schedule, complete the following steps. 1. Select One Time from the Frequency list. 2. Select the time of day you want deployment to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. 3. Click the Date list to select a date from the calendar.
20 Security configuration deployment Configuring a monthly deployment schedule To configure a monthly schedule, complete the following steps. 1. Select Monthly from the Frequency list. 2. Select the time of day you want deployment to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. 3. Select the day you want deployment to run from the Day of the Month list (1 through 31).
Chapter 21 Zoning In this chapter • Zoning overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Zone database size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Zoning configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Zoning administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
21 Zoning overview Blue Zone Server 2 Server 1 Storage 2 Red Zone Storage 1 RAID Green Zone Storage 3 Server 3 FIGURE 244 Zoning NOTE A Network OS fabric supports zoning only if all devices in the fabric are running Network OS v2.1.0 or later. NOTE Zone objects based on physical port number or port ID (D,I ports) are not supported in Network OS fabrics. Online zoning Online zoning allows you to do the following: • • • • • • 684 View both defined and active zone information in the fabric.
Zoning overview 21 Offline zoning Offline zoning is supported in Network OS fabrics. Offline zoning is supported in Network OS and Fabric OS fabrics. NOTE Offline zoning is available only for Enterprise and Professional Plus editions. Offline zoning enables you to copy a fabric zone database and edit it offline. The benefits to offline zoning include the following: • You want to make changes to the zone database now, but apply them later.
21 Zone database size Zone database size The supported maximum zone database size is 1 MB. If the fabric contains only Backbone Chassis platforms, the supported maximum zone database size is 2 MB. NOTE Network OS recommends a maximum zone database size of 150 KB. As the size of the zone database increases, performance decreases. The Professional Edition does not support large zone databases. In the Professional Edition, the maximum size of the zone database without zone aliases is 32 KB.
Zoning configuration 21 For specific instructions, refer to “Activating a zone configuration” on page 698. 9. Set zoning policies, if necessary. For specific instructions, refer to “Enabling or disabling the default zone for fabrics” on page 692. 10. Click OK or Apply to save your changes. Any zones or zone configurations you have changed are saved in the zone database. Creating a zone 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2.
21 Zoning configuration Adding members to a zone Use this procedure to add a member to a zone when the member is listed in the Potential Members list of the Zone DB tab. Enterprise and Professional Plus editions: For instructions to add a member to a zone when the member is not listed in the Potential Members list, refer to the procedure “Creating a member in a zone” on page 689. 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2.
Zoning configuration 21 Creating a member in a zone Use this procedure to add a member to a zone when the member is not listed in the Potential Members list of the Zone DB tab. For instructions to add a member to a zone when the member is listed in the Potential Members list, refer to the procedure “Adding members to a zone” on page 688. 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Click the Zone DB tab if that tab is not automatically displayed. 3.
21 Zoning configuration Removing a member from a zone Use the following procedure to remove one or more members from a zone or zones. Note that the member is not deleted; it is only removed from the zone. 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Click the Zone DB tab if that tab is not automatically displayed. 3. Select a fabric from the Zoning Scope list.
Zoning configuration 7. 21 Click OK or Apply to save your changes. Any zones or zone configurations you have changed are saved in the zone database. Deleting a zone 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Click the Zone DB tab if that tab is not automatically displayed. 3. Select a fabric from the Zoning Scope list. This identifies the target entity for all subsequent zoning actions and displays the zoning database for the selected entity. 4.
21 Zoning configuration 5. (Optional) Type a new name for the zone and press Enter to save the name. Depending on the characters included in the name you enter, a message may display informing you the name contains characters that are not accepted by some switch vendors. Click OK and enter a different name or accept the default name assigned to the zone. (For zone name requirements and limitations, refer to “Zoning naming conventions” on page 685.) 6. Click OK or Apply to save your changes.
Zoning configuration 21 6. Make sure the appropriate fabric is named on the Zoning Policies dialog box. 7. Perform one of the following actions based on the task you want to complete: • To enable the default zone, click Enable, and then click OK. • To disable the default zone, click Disable, and then click OK. The Zoning Policies dialog box closes and the Zone DB tab displays. 8. Click OK or Apply to save your changes. Any zones or zone configurations you have changed are saved in the zone database.
21 Zoning configuration Editing a zone alias 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Click the Zone DB tab if that tab is not automatically displayed. 3. Select a fabric from the Zoning Scope list. 4. Select Alias from the Type list. 5. Select the alias you want to edit in the Alias list and click Edit. The Edit Alias dialog box displays. 6. Add members to the alias by completing the following steps. a.
Zoning configuration 21 6. Select one or more objects that you want to remove from the alias in the Alias list. (Press SHIFT or CTRL and click each member to select more than one member.) You can select objects from different zone aliases. 7. Right-click one of the selected objects and select Remove. The selected objects are removed from the associated zone aliases. 8. Click OK or Apply on the Zoning dialog box to save your changes. Exporting zone aliases 1. Select Configure > Zoning > Fabric.
21 Zoning configuration 3. Select a fabric from the Zoning Scope list. 4. Select Alias from the Type list. 5. Right-click the zone alias you want to delete and select Delete. 6. Click Yes on the confirmation message. The selected zone alias is deleted from the Alias list. 7. Click OK or Apply on the Zoning dialog box to save your changes. Duplicating a zone alias 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Click the Zone DB tab if that tab is not automatically displayed. 3.
Zoning configuration 7. 21 Add zones to the zone configuration. For step-by-step instructions, refer to “Adding zones to a zone configuration” on page 697. 8. Click OK or Apply to save your changes. Any zones or zone configurations you have changed are saved in the zone database. Viewing zone configuration properties 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Click the Zone DB tab if that tab is not automatically displayed. 3.
21 Zoning configuration Removing a zone from a zone configuration Use the following procedure to remove a zone from a zone configuration. Note that the zone is not deleted; it is only removed from the zone configuration. 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Click the Zone DB tab if that tab is not automatically displayed. 3. Select a fabric from the Zoning Scope list.
Zoning configuration 21 3. Select a fabric from the Zoning Scope list. This identifies the target entity for all subsequent zoning actions and displays the zoning database for the selected entity. 4. (Optional) Select a zone database from the Zone DB list (Enterprise and Professional Plus editions only). 5. Select the zone configuration you want to activate in the Zone Configurations list. 6. Click Activate. 7. Review the information in the Activate Zone Configuration dialog box. a.
21 Zoning configuration Deactivating a zone configuration Use this procedure to deactivate the active zone configuration. There are several conditions that could cause the Deactivate button to be unavailable. They include the following: • There is no active zone configuration in the selected fabric. • The fabric is not manageable. • You do not have Read/Write or Activate privileges for the selected fabric and the selected zone database (for FC fabrics and Network OS fabrics only).
Zoning configuration 21 6. Press Enter to save the new name. 7. Click OK or Apply to save your changes. Any zones or zone configurations you have changed are saved in the zone database. Deleting a zone configuration 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Click the Zone DB tab if that tab is not automatically displayed. 3. Select a fabric from the Zoning Scope list.
21 Zoning configuration 4. Select one or more zone configurations in the Zone Configurations list that you want to duplicate, then right-click and select one of the following options: • Duplicate - To duplicate the zone configuration or configurations. • Deep Duplicate - To duplicate the zone configuration or configurations and all included zones. The duplicated zone configuration or sets display in the Zone Configurations list. 5.
Zoning configuration 21 11. Set zoning policies, if necessary. For specific instructions, refer to “Enabling or disabling the default zone for fabrics” on page 692. 12. Click OK or Apply to save your changes. Any zones or zone configurations you have changed are saved in the zone database. Deleting an offline zone database 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Select a fabric from the Zoning Scope list.
21 Zoning configuration Merging fabrics When you merge fabrics, the defined and active zone configurations in both fabrics must match. 1. Compare and merge the two zone databases, and save the database to the offline repository. Refer to “Merging two zone databases” on page 704. 2. Ensure that the active zone configurations in each fabric are the same, including the same name. Refer to “Renaming a zone configuration” on page 700. 3. Load the newly merged zone database from the offline repository. 4.
Zoning configuration 21 FIGURE 245 Compare/Merge Zone DBs dialog box 3. Select a database from the Reference Zone DB list. 4. Select a database from the Editable Zone DB list. The Reference Zone DB and Editable Zone DB areas display all available element types (zone configurations, zones, and aliases) for the two selected zone databases. In the Editable Zone DB area, each element type and element display with an icon indicator (Table 88) to show the differences between the two databases. 5.
21 Zoning configuration 7. (Optional) Add elements (aliases, zones, and zone configurations) to the editable database by completing the following steps. a. Select one or more of the same element type in the Reference Zone DB area. These are the elements that are added to the editable zone database. b. Select an element in the Editable Zone DB area. You can add zone aliases and zone members to a zone. You can add zones to a zone configuration. And you can add zone configurations to the zone database.
Zoning configuration 21 8. Click Close to close the Compare/Merge Zone DBs dialog box and return to the Zoning dialog box. 9. In both fabrics, load the offline repository and activate the zone configuration from step b. Refer to “Activating a zone configuration” on page 698 for instructions. Saving a zone database to a switch 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Select a zone database from the Zone DB list. 3. Select Save to Switch from the Zone DB Operation list. 4.
21 Zoning administration 3. Select Import from the Zone DB Operation list. The Import Zone DB dialog box displays. 4. Browse to the zone database file (.xml format). 5. Click Import Zone DB. 6. Click OK to save your work and close the Zoning dialog box. Rolling back changes to the offline zone database Use this procedure to reverse changes made to an offline zone database. 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2.
Zoning administration 21 To compare two zone databases, complete the following steps. 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Select Compare from the Zone DB Operation list. The Compare/Merge Zone DBs dialog box displays, as shown in Figure 246. FIGURE 246 Compare/Merge Zone DBs dialog box 3. Select a database from the Reference Zone DB list. 4. Select a database from the Editable Zone DB list.
21 Zoning administration 6. Set the level of detail for the database areas by selecting one of the following options from the Tree Level list: NOTE This list is only available when you set the Comparison View to Full . • All Level — Displays all zone configurations, zones, and aliases. • Zone Configurations — Displays only zone configurations. • Zones — Displays only zones. 7. Select the Differences only check box to display only the differences between the selected databases. 8.
Zoning administration 21 Setting change limits on zoning activation Use this procedure to set a limit on the number of changes a user can make to the zone database before activating a zone configuration. If the user exceeds the limit, zone configuration activation is not allowed. By default, all fabrics allow unlimited changes. Changes include adding, removing, or modifying zones, aliases, and zone configurations. Use this procedure to set the following limits: • Set a different limit for each fabric.
21 Zoning administration Clearing the fabric zone database ATTENTION Clearing the zone database removes all zoning configuration information, including all aliases, zones, and zone configurations, in the fabric. Clearing the fabric zone database is disruptive to the fabric. 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Select a fabric from the Zoning Scope list.
Zoning administration 21 Finding a member in one or more zones Use this procedure to locate all instances of a member in the Zones list on the Zone DB tab. 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Click the Zone DB tab if that tab is not automatically displayed. 3. Select a fabric from the Zoning Scope list. This identifies the target entity for all subsequent zoning actions and displays the zoning database for the selected entity. 4.
21 Zoning administration 4. Select the zone you want to find in the Zones list. (Press SHIFT or CTRL and click each zone to select more than one zone.) 5. Click Find > between the Zones list and the Zone Configurations list. If the zone is found, all instances of the zone are highlighted in the Zone Configurations list. Finding a zone configuration member in the zones list Use this procedure to locate a zone configuration member in the Zones list on the Zone DB tab. 1. Select Configure > Zoning > Fabric.
Zoning administration 21 Listing un-zoned members Use this procedure to identify the device ports in the current fabric that are not part of the active zone configuration. 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Click the Zone DB tab if that tab is not automatically displayed. 3. Select a fabric from the Zoning Scope list. This identifies the target entity for all subsequent zoning actions and displays the zoning database for the selected entity. 4.
21 Zoning administration Replacing zone members You can replace one instance of a zone member in one zone, or all instances of the zone member in all the zones to which it belongs. 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Click the Zone DB tab if that tab is not automatically displayed. 3. Select a fabric from the Zoning Scope list. This identifies the target entity for all subsequent zoning actions and displays the zoning database for the selected entity. 4.
Zoning administration 21 5. Select WWN (default) in the corresponding Replace Using list. 6. Enter the WWN or select the name of the offline device in the corresponding Replace Value list. If the selected name has multiple device or device port WWNs assigned (names are set to non-unique in the Management application), the Device or Device Port WWN of Non-unique Name dialog box displays. The WWN list includes all device and device port WWNs assigned to the selected name. 7.
21 718 Zoning administration Brocade Network Advisor IP User Manual 53-1002947-01
Chapter 22 Port Fencing In this chapter • About port fencing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Adding thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Editing thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Removing thresholds.
22 About port fencing Viewing port fencing configurations NOTE This feature is only available for Fabric OS devices. NOTE This feature requires a Trial or Licensed version. Port Fencing allows you to protect your SAN from repeated operational problems experienced by ports. Use Port Fencing to set threshold limits for the number of specific port events permitted during a given time period on the selected object.
About port fencing 22 • Thresholds table — List of configured thresholds based on the threshold type selected in the Violation Type list. Limit (Fabric OS) — The number of events allowed for the assigned threshold. If the object has no fencing support or no fencing changes, this field displays two hyphens separated by a space (- -). When the object is only partially managed by the management application, this field displays as inactive (grayed-out).
22 Thresholds Operational State — The operational state of the port. Blocked Configuration — The current configuration of the port (Blocked or Unblocked). Port WWN — The port world wide name of the port. Connected Product — The device label of the connected object. Connected Port # — The port number of the connected port. Connected Port WWN — The port world wide name of the connected port. Connected Port Name — The name of the connected port configured in the Element Manager.
Thresholds 22 C3 Discard Frames threshold NOTE This threshold is only available for Fabric OS devices running 6.3 or later. Use this type of threshold to block a port when a C3 Discard Frames violation meets the Fabric OS switch threshold. This threshold is only supported on directors, switches, and blades with a 4 Gbps, 8 Gbps, or 16 Gbps ASIC.
22 Thresholds Invalid CRCs threshold NOTE This threshold is only available for Fabric OS devices. Use this type of threshold to block a port when an Invalid CRCs violation meets the Fabric OS switch threshold. Invalid words threshold NOTE This threshold is only available for Fabric OS devices. Use this type of threshold to block a port when an Invalid Words violation meets the Fabric OS switch threshold. Link Reset threshold NOTE This threshold is only available for Fabric OS devices.
Adding thresholds 22 Adding thresholds NOTE Only available for Fabric OS products. NOTE This feature requires a Trial or Licensed version. The Management application allows you to create Invalid CRCs, Invalid words, Link, Link Reset, Protocol Error, Security, and Sync Loss thresholds. Adding a C3 Discard Frames threshold NOTE This threshold is only available for Fabric OS devices running 6.3 or later. Use to block a port when a C3 Discard Frames violation type meets the Fabric OS switch threshold.
22 Adding thresholds 3. Click Add. The Add C3 Discard Frames Threshold dialog box displays. FIGURE 249 Add C3 Discard Frames Threshold dialog box 4. Enter a name for the threshold in the Name field. 5. Select one of the following options: • Default — Uses device defaults. Go to step 8. • Custom — Uses your selections. Continue with step 6. 6. Enter the number of C3 discarded frames allowed for the threshold in the Threshold errors field. 7.
Adding thresholds 22 Adding an Invalid CRCs threshold NOTE This threshold is only available for Fabric OS devices. NOTE This feature requires a Trial or Licensed version. Use to block a port when an Invalid CRC violation type meets the Fabric OS switch threshold. For default threshold values for Fabric OS devices, refer to Chapter 7 of the Fabric Watch Administrator's Guide. To add an Invalid CRCs threshold, complete the following steps. 1. Select Monitor > Fabric Watch > Port Fencing.
22 Adding thresholds 8. Click OK to add the Invalid CRCs threshold to the table and close the Add Invalid CRCs Threshold dialog box. To assign this threshold to fabrics, switches, or switch ports, refer to “Assigning thresholds” on page 733. 9. Click OK on the Port Fencing dialog box. Adding an Invalid Words threshold NOTE This threshold is only available for Fabric OS devices. NOTE This feature requires a Trial or Licensed version.
Adding thresholds 22 • Minute — the port is blocked as soon as the specified number of invalid words allowed is reached within a minute. • Hour — the port is blocked as soon as the specified number of invalid words allowed is reached within a hour. • Day — the port is blocked as soon as the specified number of invalid words allowed is reached within a day. 8. Click OK to add the Invalid Words threshold to the table and close the Add Invalid Words Threshold dialog box.
22 Adding thresholds 7. Select the time period for the threshold from the errors per list. The following choices are available: • None — the port is blocked as soon as the specified number of link resets allowed is met. • Second — the port is blocked as soon as the specified number of link resets allowed is reached within a second. • Minute — the port is blocked as soon as the specified number of link resets allowed is reached within a minute.
Adding thresholds 22 FIGURE 253 Add Protocol Error Threshold dialog box 4. Enter a name for the threshold in the Name field. 5. Select the Fabric OS check box. a. Select one of the following options: • Default — Uses device defaults. Go to step 6. • Custom — Uses your selections. Continue with step b. b. Enter the number of protocol errors allowed for the threshold from the Threshold errors field. c. Select the time period for the threshold from the errors per list.
22 Adding thresholds Adding a State Change threshold NOTE This threshold is only available for Fabric OS devices running 6.3 or later. NOTE This feature requires a Trial or Licensed version. Use to block a port when a state change violation type meets the Fabric OS switch threshold. For 4 Gbps Router, Extension Switches and Blades only, when you apply this threshold on an E Port, the threshold is also applied to the VE Ports (internally by Fabric OS).
Adding thresholds 22 • Hour — the port is blocked as soon as the specified number of state changes allowed is reached within a hour. • Day — the port is blocked as soon as the specified number of state changes allowed is reached within a day. 8. Click OK to add the state changes threshold to the table and close the Add State Change Threshold dialog box. To assign this threshold to fabrics, switches, or switch ports, refer to “Assigning thresholds” on page 733. 9. Click OK on the Port Fencing dialog box.
22 Adding thresholds Unblocking a port The Management application allows you to unblock a port (only if it was blocked by Port Fencing) once the problem that triggered the threshold is fixed. When a port is blocked an Attention icon ( ) displays next to the port node. To unblock a port, complete the following steps. 1. Select Monitor > Fabric Watch > Port Fencing. The Port Fencing dialog box displays. 2. Right-click anywhere in the Ports table and select Expand. 3.
Editing thresholds 22 Editing thresholds The Management application allows you to edit the name, number of events needed, and time period of ISL Protocol, Link, and Security thresholds. Editing a C3 Discard Frames threshold NOTE This threshold is only available for Fabric OS devices. NOTE This feature requires a Trial or Licensed version. Use to block a port when a C3 Discard Frames violation type meets the Fabric OS switch threshold. To edit a C3 Discard Frames threshold, complete the following steps.
22 Editing thresholds 3. Select the threshold you want to change and click Edit. The Edit Invalid CRCs Threshold dialog box displays. 4. Complete step 4 through step 7 in “Adding an Invalid CRCs threshold” on page 727. 5. Click OK on the Edit Invalid CRCs Threshold dialog box. If the threshold has already been assigned to ports, an “Are you sure you want to make the requested changes to this threshold on “X” ports?” message displays. Click OK to close.
Editing thresholds 22 Editing a Link Reset threshold NOTE This threshold is only available for Fabric OS devices. NOTE This feature requires a Trial or Licensed version. Use to block a port when the Link Reset violation type meets the Fabric OS switch threshold. To edit a Link Reset threshold, complete the following steps. 1. Select Monitor > Fabric Watch > Port Fencing. The Port Fencing dialog box displays. 2. Select Link Reset (Fabric OS only) from the Violation Type list. 3.
22 Editing thresholds 3. Select the threshold you want to change and click Edit. The Edit Protocol Error Threshold dialog box displays. 4. Complete step 4 through step 5 in “Adding a Protocol Error threshold” on page 730. 5. Click OK on the Edit Protocol Error Threshold dialog box. If the threshold has already been assigned to ports, an “Are you sure you want to make the requested changes to this threshold on “X” ports?” message displays. Click OK to close.
Editing thresholds 22 Finding assigned thresholds The Management application allows you to find all ports with a specific threshold applied. NOTE This search is performed on the threshold name. Since Fabric OS devices do not retain the threshold name, the ability to search for a threshold on a Fabric OS device is not available in most cases. To find assigned thresholds, complete the following steps. 1. Select Monitor > Fabric Watch > Port Fencing. The Port Fencing dialog box displays. 2.
22 Removing thresholds 4. Review the Thresholds table. • • • • • • • • • # (Number) — The line number for each threshold in the table. Status — The threshold status. Directly Assigned Indicator — Whether or not the threshold was directly assigned. Name — The threshold name. Limit — The number of events required to trigger the threshold. Period — The time limit required (for the number of events) to trigger a port blocking action. Area — The threshold type. Class — The port type.
Removing thresholds 22 A directly assigned icon ( ) displays next to each object with an assigned threshold which does not inherit a threshold from higher in the tree. NOTE If you remove a threshold from All Fabrics, it removes the threshold from individual Fabrics, switches, and switch ports in all Fabrics except for a Chassis group. You must remove repeat the procedure for the Chassis group. 5. Click OK on the Port Fencing dialog box.
22 742 Removing thresholds Brocade Network Advisor IP User Manual 53-1002947-01
Chapter 23 FICON Environments In this chapter • FICON configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Configuring a switch for FICON operation . . . . . . . . . . . . . . . . . . . . . . . . . . • Configuring an Allow/Prohibit Matrix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Configuring an Allow/Prohibit Matrix manually . . . . . . . . . . . . . . . . . . . . . .
23 Configuring a switch for FICON operation FIGURE 255 Cascaded configuration, two domains FIGURE 256 Cascaded configuration, three domains, but only two in a path Configuring a switch for FICON operation This section provides a basic guide for configuring a switch for FICON operation. Procedures assume that the switch is installed and IP addresses are assigned to the switch for discovery and access by the Management application.
Configuring a switch for FICON operation 23 Observe the following best practices: • Always check the version of firmware on a switch • Unless otherwise advised by a certified Fabric OS support professional, always load the most recently qualified firmware. • Before upgrading or downgrading firmware read the upgrade and downgrade considerations in the firmware release notes. 4. If incorporating more than one switch into a fabric, refer to planning steps in “Cascaded FICON fabric” on page 758. 5.
23 Configuring a switch for FICON operation • Required firmware for the switch. Refer to step 3. • Port addressing. The port address is important because it is implemented in HCD or IOCP. The easiest port addressing scheme is to start from 0x00 at the bottom left of the port card, increment on ports going up the card, then continue starting numbering from the bottom right of the next column of ports. Any port addressing scheme is possible however. 6.
Configuring a switch for FICON operation a. 23 Select a discovered switch from the Product List panel, and then select Element Manager > Admin. The Web Works Switch Administration window displays. b. Select the License tab and click Add. The Add License dialog box displays. c. Past or enter the license key in the License Key field. d. Click Add License. e. Repeat steps b through d for additional licenses. f. Click Refresh to display new licenses in the License tab. 8.
23 Configuring a switch for FICON operation FIGURE 259 Firmware download 11. Select the switches in the Available Switches panel where you want to download firmware, and then click the right arrow to move them under Selected Switches. 12. Click Download. 13. Select the Repository tab to import new firmware files for downloads. Refer to the “Firmware management” section in Chapter 14, “SAN Device Configuration” for more information on importing firmware. 14.
Configuring a switch for FICON operation 23 18. Define port fencing parameters for the switch using the following steps (optional): NOTE Although this is an optional step, best practice is to configure port fencing. a. Configure thresholds that you require for the switch using steps under the “Adding thresholds” in Chapter 22, “Port Fencing”. Following are recommend parameters for the various thresholds: • C3 Discard Frames = 2 per minute. • Invalid Words = 25 per minute.
23 Configuring FICON display 23. Enable bottleneck detection using the following Fabric OS bottlneckmon commands: • bottleneckmon --cfgcredittools -intport -recover onLrOnly - This command monitors for lost credits on links. This is necessary because occasional errors on links can cause lost credits that can result in IFCCs and poor performance over time.
Configuring an Allow/Prohibit Matrix 23 • Double-click a configuration file. • Select a configuration file and click the right arrow. A matrix displays in the Allow/Prohibit Matrix panel. The switch ports are displayed on both the vertical axis and horizontal axis. An Allow icon ( ) indicates communication is allowed between the ports, as shown in Figure 260 on page 751. FIGURE 260 Active Configuration in Allow/Prohibit Matrix panel 4.
23 Configuring an Allow/Prohibit Matrix manually Configuring an Allow/Prohibit Matrix manually To configure to allow or prohibit communication between specific ports manually, complete the following steps. 1. Select Configure > Allow/Prohibit Matrix. The Configure Allow/Prohibit Matrix dialog box displays. 2. Select a switch from Available Switches. Two default configurations (Active and IPL) are displayed in a tree structure under the switch. Existing configurations are also displayed. 3.
Saving or copying Allow/Prohibit Matrix configurations to another device 23 8. Click Add. The information displays in the Selected Ports for Modification list. To delete any of these manual configurations, select the configuration you want to delete in the Selected Ports for Modification list and click Remove. The Selected Ports for Modification list displays the following information: • Port Address 1 column — The port number of the first port for which you want to allow or prohibit communication.
23 Saving or copying Allow/Prohibit Matrix configurations to another device Copying an Allow/Prohibit Matrix configuration To duplicate an existing Allow/Prohibit Matrix configuration, complete the following steps. 1. Select Configure > Allow/Prohibit Matrix. The Configure Allow/Prohibit Matrix dialog box displays. 2. Select the Allow/Prohibit Matrix configuration you want to copy.
Saving or copying Allow/Prohibit Matrix configurations to another device 23 Saving an Allow/Prohibit Matrix configuration to another device To save an existing Allow/Prohibit Matrix configuration to another device, complete the following steps. 1. Select Configure > Allow/Prohibit Matrix. The Configure Allow/Prohibit Matrix dialog box displays. 2. Select the Allow/Prohibit Matrix configuration you want to save.
23 Activating an Allow/Prohibit Matrix configuration Activating an Allow/Prohibit Matrix configuration You must have an active zone configuration before you can activate an Allow/Prohibit Matrix configuration. 1. Select Configure > Allow/Prohibit Matrix. The Configure Allow/Prohibit Matrix dialog box displays. 2. Select the Allow/Prohibit Matrix configuration you want to activate.
Deleting an Allow/Prohibit Matrix configuration 23 Deleting an Allow/Prohibit Matrix configuration You cannot delete the active configuration, the IPL configuration, or a configuration that is marked as having uncommitted changes. 1. Select Configure > Allow/Prohibit Matrix. The Configure Allow/Prohibit Matrix dialog box displays. 2. Select the Allow/Prohibit Matrix configuration you want to delete.
23 Cascaded FICON fabric Cascaded FICON fabric NOTE You must have FICON Management privileges to configure a fabric for cascaded FICON. The Management application enables you to easily configure a fabric for cascaded FICON. Note that configuring a fabric for cascaded FICON may be disruptive to current I/O operations in the fabric, as this involves disabling and enabling the switches in the fabric.
Cascaded FICON fabric 23 FIGURE 265 Configure Cascaded FICON Fabric /Switch dialog box 2. Use the Fabric list to select the fabric you want to configure. NOTE (Fabric OS switches only) All switches in a fabric must be running Fabric OS version 5.3 or later. If a Fabric OS version earlier than version 5.3 is present in the topology, the fabric is not listed. 3. Select the FMS Mode check box to manage the fabric by a host-based management program using FICON CUP protocol.
23 Cascaded FICON fabric • Device-Based, enables device-based routing for the fabric if all switches in the fabric are 8 Gbps or greater platforms running Fabric OS 7.1 or later. If these requirements are not met, an error message displays. NOTE Either exchange based routing, port based routing, or device-based routing is enabled on all switches of the selected fabric. You cannot enable a mixed routing policy. 6. Click OK if you want to proceed.
Cascaded FICON fabric merge 23 Cascaded FICON fabric merge The Management application provides a wizard to help you merge two fabrics for cascaded FICON. Note that merging two cascaded FICON fabrics may be disruptive to current I/O operations in both fabrics as this involves disabling and enabling the switches in both fabrics. The merge process will not make any configuration changes on the primary (production) fabric that are disruptive.
23 Cascaded FICON fabric merge • (Optional) Configures long distance settings on selected ports of primary and secondary fabrics (requires an Extended Fabric license). NOTE If the distance between the merged fabrics is 10 km or greater, you must configure the connection as a long distance connection. Note that the merge wizard does not enable primary fabric switches for DLS, In-Order Delivery (IOD), insistent domain ID flag (IDID), and Advanced Performance Tuning (APT).
Cascaded FICON fabric merge 23 Merging two cascaded FICON fabrics If you want to join two cascaded FICON fabrics, they must be merged. If the distance between fabrics is 10 km or more, an Extended Fabrics license is required, and an extra step is required to configure the connection as a long distance connection. To successfully configure a long distance connection, use the same E_Ports and cable distance values used when configuring Extended Fabrics.
23 Cascaded FICON fabric merge 8. Click Next. The Check merge screen displays. A Status details table shows progress through merge check points. A rotating arrow under Status indicates a Merge check step is in progress. A blue check mark indicates successful completion of that Merge check. A red stop sign indicates a failed step. If the configuration is successful, all configuration items have blue check marks. 9. If the merge fails, but is recoverable, click Resolve. 10.
Cascaded FICON fabric merge 23 Resolving merge conflicts You can resolve the following types of switch configuration conflicts: • • • • Domain ID TOV Buffer To Buffer Credit Disable Device Probe NOTE This test will be skipped if all primary and secondary fabric switches are found to be Fabric OS 7.0 and later. • • • • • • Route Priority Per Frame Sequence Level Switching Suppress Class F Long Distance Setting Data Field Size VC Priority Note that not all tests support resolution.
23 Port groups 5. Perform step 11 through step 14 of the procedure “Merging two cascaded FICON fabrics” on page 763 to finish resolving a merge conflict. Port groups A port group is a group of FC ports from one or more switches within the same fabric. Port groups are user-specific; you can only view and manage port groups that you create. The ports display in the order in which you add them to the port group.
Port groups 23 FIGURE 266 Port Groups dialog box 2. Click New. 3. Enter a name for the port group in the Name field. 4. Enter a description for the port group in the Description field. 5. Select one or more ports to add to the group in the Group Type - FC Ports list. A port group must have at least one port in the Membership List. All ports must be from switches in the same fabric. 6. Click the right arrow button. The selected ports display in the Membership List. 7. Click Update.
23 Port groups Viewing port groups To view port groups, complete the following steps. 1. Select Configure > Port Groups. The Port Groups dialog box displays only port groups defined by you. If a fabric becomes un-monitored, any port groups associated with that fabric do not display in the Port Groups list. Once the fabric becomes monitored again, the associated port groups display in the Port Groups list.
Swapping blades 23 8. Click the left arrow button. The selected ports are removed from the Membership List. 9. Click Update. 10. Click OK. Deleting a port group To delete a port group, complete the following steps. 1. Select Configure > Port Groups. The Port Groups dialog box displays. 2. Select the port group you want to delete in the Port Groups list. 3. Click Remove. The selected ports are removed from the Port Groups list. 4. Click OK.
23 Swapping blades To swap blades, complete the following steps. 1. Select a chassis that contains at least two of the same type of blades. 2. Select Configure > Switch > Swap Blades. The Swap Blades dialog box displays. 3. Select the blade you want to replace from the first Swap Blades list. Once you select a blade, the second list automatically filters out the selected blade and any blade types that do not match the selected blade. 4.
Chapter 24 IP Element Manager In this chapter • Element Manager overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Element Manager using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Element Manager interface overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Web Management interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Web Management interface troubleshooting . . . . . . . . . . . .
24 Element Manager using the CLI Accessing the IP Element Manager CLI The Element Manager CLI uses SNMP to query the login authentication type (for example, Telnet Login or Enable Password Login) that the device uses to create the Telnet session token. If SNMP fails, the Element Manager CLI will not work for that device. To display the Element Manager CLI, complete the following steps. 1. Right-click a device on the Network Objects list or the IP or L2 Topology views and select CLI through Server.
Element Manager interface overview 24 Element Manager interface overview The Element Manager interface provides management and monitoring functions to troubleshoot issues on the Ethernet router series switch running firmware version 5.4 or later. Element Manager is accessible from the Management application and provides the details of the switch and its ports.
24 Element Manager interface overview 6. Status bar - Displays the Auto Rediscover progress and last discovered details of the switch. NOTE The User Administrator has control over what functions individual users can see and use in the Element Manager. For information on user privileges, refer to “User Privileges” on page 1321. Switch properties The switch properties area in the Element Manager displays details of the selected switch. The fields in Table 89 are non-editable.
Element Manager interface overview 24 FIGURE 269 Properties dialog box You can enable and disable port actions as well as access performance monitoring from the Ports tab of the Properties dialog box (Figure 270). Refer to “Port actions” on page 339 for more information.
24 Element Manager interface overview FIGURE 270 Properties dialog box - Ports tab Element Manager toolbar The Element Manager toolbar (Figure 271) is located beneath the switch properties area and provides the following icons and buttons to perform various functions. FIGURE 271 Element Manager - toolbar 1. View list — Select a view (Port, Table, or VLAN) from the list. For more information, refer to “Displaying port properties” on page 777. 2.
Element Manager interface overview 7. 24 Auto Rediscover check box — Select the check box to automatically refresh the Element Manager in every five-minute intervals. Clear the check box to stop auto-rediscovery. 8. Product List Search — Use to search for a port in the port list. For detailed instructions, refer to “Search” on page 309. 9. Help — Click to display the online help.
24 Element Manager interface overview Table 91 describes the properties of the VLAN View. TABLE 91 VLAN View - port properties Field/Component Description Identifier The identifier of the port. Name The name of the VLAN or port. Type The type of the port. Port Mode Indicates the tag mode of the port. • Tagged represents the port is in dual mode but is in the tagged state for that particular VLAN. • Untagged represents the port is untagged for that particular VLAN.
Element Manager interface overview 24 FIGURE 273 Comparing physical port properties Comparing physical and virtual port properties You can compare physical and virtual port properties. 1. From VLAN View, select one or more virtual ports and physical ports. 2. Right-click one of the selected ports, and select Properties (Figure 274).
24 Element Manager interface overview FIGURE 275 Comparing physical and virtual port properties Status indicator icons Table 92 describes the icons that are used to indicate the status of a switch, slot, or port. TABLE 92 Status icon Status indicator icons Description Indicates the port is down. Indicates the switch is not reachable. Indicates a degraded link (the switch is reachable but cannot receive SNMP). Indicates an IP slot containing a line card. Indicates an IP slot containing no line card.
Element Manager interface overview 24 Search NOTE The Search function retains your last 10 search criteria. Refer to “Search” on page 309 for more information. Table capabilities Refer to “Customizing application tables” on page 305 for information on table functions. Performance data You can use the following options to monitor the performance data of a switch.
24 Element Manager interface overview Historical performance monitoring Historical performance monitoring allows you create data collectors by choosing MIB object and by choosing or creating mathematical expressions. You can also configure a historical data graph or table to display data. 1. In the Element Manager, right-click a slot (or slots), trunk (or trunks), or port (or ports) and select Performance > Historical Graph/Table.
Web Management interface 24 Web Management interface The Element Manager allows you to access a device by connecting to its Web Management interface. NOTE You must have the Element Manager Read/Write privilege to change the device configuration through the Web Management interface. NOTE Web Management interface access must be enabled on the device.
24 Web Management interface troubleshooting Accessing the IP device front panel To display the Element Manager front panel, choose one of the following options: • Select Configure > Element Manager > Front Panel. • Right-click a device on the Network Objects list or the IP or L2 Topology views and select Element Manager > Front Panel. The Web Management interface - Front Panel displays (Figure 279). You can use the Front Panel to manage port configuration.
Chapter 25 Configuration Repository and Backup In this chapter • Configuration repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Configuration deviation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Change tracking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Configuration snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
25 Configuration repository FIGURE 280 Configuration Repository dialog box — Product Configurations tab The Configuration Repository dialog box displays the following information: • Product Name — The name of the backed-up product • Date — The date when the configuration file was stored in the server and the time when the last backup attempt occurred. • Version — The version of the configuration file.
Configuration repository 25 Running Config Change Trap — When a running configuration is changed for a device, the running config change trap is triggered and the configuration backup is captured. For Startup Config Change Trap and Running Config Change Trap, make the following configurations: - Enable DoBackupOnStartupConfigChangeTrap and DoBackupOnRunningConfigChangeTrap on the OPtions dialog box (refer to “Configuring change manager preferences” on page 167).
25 Configuration repository • Relative Time (mins) — Relative time from the selected backup time to the event occurred time. • User — Name of the user responsible for triggering the event. 6. Click the following buttons to access the corresponding dialog boxes: • Restore button — Select one or more configuration files from the Configurations list and click to restore to that configuration. To restore a configuration, refer to “Restoring a configuration” on page 792.
Configuration repository 25 5. Select one of the following save options from the list: • Save Running Configuration — Select to retrieve the running configuration from the device. If there is no change in the running configuration since the latest running configuration (available in the repository), then the retrieval is skipped. • Save Startup Configuration — Select to retrieve the startup configuration from the device.
25 Configuration repository Viewing the configuration 1. Click the IP tab. 2. Select Configure > Configuration > Configuration Repository. 3. Click the Product Configurations tab. 4. Select a configuration and click View to display configuration information. The View Configuration dialog box displays details of the selected configuration. NOTE You can view only one configuration at a time. • Description — Displays a description of the device configuration.
Configuration repository 25 FIGURE 282 Compare dialog box The Compare dialog box displays the following information: • Product — The IP address of the device. • Date — The Displays the date the device configuration was taken. • Change Navigator buttons/legend — The Enabled when there is at least one change between to two compared files. Go to first change button ( ) — Click to move to the first change. Go to previous change button ( ) — Click to move to the previous change.
25 Configuration repository • Events Associated with Differences table — Only available when you select two configuration backup files for the same product. List of events (up to 100) associated with the configurations. Right-click an event and select properties to view the Event Properties dialog box (refer to “Displaying event properties from the Master Log” on page 1245).
Configuration repository 25 • Startup • Startup and Reload 6. Review the status details for accuracy. Searching the configuration repository The Search Configuration Repository dialog box allows searching for products that have a particular configuration in the management server’s repository. Use the search feature to refine the configuration repository based on the filter criteria described in this section. 1. Click the IP tab. 2. Select Configure > Configuration > Configuration Repository. 3.
25 Configuration repository 7. Enable the following options, as required: • Match Case check box - Select the check box to make the search case-sensitive. • Regular expressions check box - Select the check box to use unicode regular expressions in your search. • Search options — Specify the following types of available searches: • Latest configurations — Searches the text in the most recent configurations of the selected products.
Configuration deviation 7. 25 Browse to the location to which you want export the configuration and click Export. The default locations for the product configuration are as follows: • Windows: Desktop\My Documents • Linux: \root If you select configurations from the same product, the default text file name is IP_Address_config.txt. IPv6 addresses use dashes (-) instead of colons (:) in file naming. If you select configurations from multiple products, the default text file name is MultiProduct_config.
25 Change tracking Change tracking Use the change tracking feature to compare the latest backup configuration file with the configuration that is designated as the baseline. 1. Click the IP tab. 2. Select Configure > Configuration > Configuration Repository. 3. Click the Change Tracking tab. The Change Tracking tab of the Configuration Repository dialog box displays, as shown in Figure 284.
Configuration snapshots 25 Re-sync — Occurs when a trap is generated by the device during a startup or running configuration change, or when a user performs a manual resynchronization of the device For Network OS devices, Re-sync backup occurs after manual rediscovery of the VCS cluster member device and when a CLI configuration deployment occurs on the product.
25 Configuration snapshots FIGURE 285 Configuration Repository dialog box - Configuration Snapshots tab The Configuration Snapshots tab displays the following information: • • • • Product Name — The name of the product Product Snapshots — The product snapshots Date — The date when the snapshot file was stored in the server Snapshot Type — The type of snapshot generated. There are three types: Manual: Generated manually by clicking the Save Snapshot button on the Backup Configuration Manager.
Configuration snapshots 25 • Delete button — Select one or more snapshots from the Configuration Snapshots list and click to manually delete the snapshots from the repository of the management server. • Report button — Click to launch the Configuration Snapshot Report dialog box. Refer to “Generating a configuration snapshot report” on page 800 for more information. Comparing configuration snapshots The Comparison dialog box allows you to display the contents of two configurations side-by-side.
25 Configuration snapshots • Change Navigator buttons/legend — The Enabled when there is at least one change between to two compared files. Go to first change button ( ) — Click to move to the first change. Go to previous change button ( ) — Click to move to the previous change. Go to next change button ( ) — Click to move to the next change. Go to last change button ( ) — Click to move to the last change. Number of changes label — Indicates the number of changes.
Configuration snapshots 25 FIGURE 287 Configuration Snapshot Report dialog box 5. Select the start date and end date of the configuration snapshots you want to view. 6. Click Find. The Management application displays the list of snapshots that match the start date and end date you specified. 7. You can expand each tree node to view details about the configuration snapshot.
25 Configuration snapshots Viewing the pre- and post-configuration snapshot You can create a device configuration payload that issues device-monitoring commands to the devices when the payload is deployed. Device-monitoring commands can be issued before (pre-configuration snapshot), after (post-configuration snapshot), or before and after (pre-payload deployment and post-payload deployment). Outputs of the device-monitoring commands are available as configuration snapshots.
Configuration snapshots • • • • 25 Reached bottom of the page icon — Displays when there are no more entries to display. Highlight grid — Click to highlight the text string. Match Case check box — Click to render the search case-sensitive. Repeats check box — Click to continue the search at the top when the bottom is reached. Saving a configuration snapshot You can select a CLI template from the Save Configuration Snapshot dialog box.
25 Configuration snapshots Searching the configuration snaphots The Search Pre/Post Snapshots dialog box allows searching for products that have a particular snapshot in the management server’s repository. Use the search feature to refine the snapshot repository based on the filter criteria described in this section. 1. Click the IP tab. 2. Select Configure > Configuration > Configuration Repository. 3. Click the Configuration Snapshots tab. 4. Click the Search button.
Schedule backup 25 • Match Case check box - Select the check box to make the search case-sensitive. • Regular expressions check box - Select the check box to use unicode regular expressions in your search. • Search options — Specify the following types of available searches: • Latest configurations — Searches the text in the most recent snapshots of the selected products. • All configurations — Searches the text in all snapshots of the selected products.
25 Schedule backup 1. Click the IP tab. 2. Select Configure > Configuration > Schedule Backup. The Schedule Backup dialog box displays. FIGURE 290 Schedule Backup dialog box 3. Select a backup configuration from the Backup Scheduler list. 4. Click the Edit button. The Edit Automatic Configuration Backup dialog box displays, as shown in Figure 291. FIGURE 291 Edit Automatic Configuration Backup dialog box 5. Enter the following information: • Frequency - The interval at which scheduled tasks are to run.
Schedule backup 25 6. Click OK. The new schedule appears in the Backup Scheduler list of the Schedule Backup dialog box. When scheduled backups begin, the Management application polls each product to check its current configuration. NOTE Software image backup is not initiated on VDX or VCS devices. Disabling a backup schedule To disable a scheduled backup, complete the following steps. 1. Select an entry in the Backup Scheduler list of the Schedule Backup dialog box. 2. Click Edit.
25 808 Schedule backup Brocade Network Advisor IP User Manual 53-1002947-01
Chapter 26 IP Configuration Wizard In this chapter • Configuration requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Payloads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Creating a payload configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Duplicating a payload configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Modifying a payload configuration .
26 Payloads Payloads Payloads are defined as product payloads or interface payloads. Product payloads are deployed to the devices, whereas interface payloads are deployed to ports. The available payloads are listed in Table 95. TABLE 95 Payloads available for deployment Payload name Description Product Payloads: 810 802.1Q Tag Type Sets the tag type, or tag ID, that identifies the aggregate VLAN.
Creating a payload configuration TABLE 95 26 Payloads available for deployment (Continued) Payload name Description TACACS+ Servers Indicates which TACACS/TACACS+ servers are to be used for authentication. Telnet Sets Telnet password and idle timeout value, and enables Telnet authentication on devices for use with AAA authentication. Time Zone/SNTP Specifies the time zone and specifies whether the date and time are to be set by an SNTP server clock.
26 Creating a payload configuration FIGURE 292 Configuration dialog box - Select Payload pane 3. Select Product Payloads or Interface Payloads, and select the payloads you want to configure. You can include more than one payload in a configuration. See Table 95 on page 810 for a brief description of the payloads. 4. Click Next. The next pane that displays depends on the payloads you are configuring. For example, Figure 293 shows the next pane for the SNMP Identification payload.
Creating a payload configuration 26 FIGURE 293 Configuration dialog box - Product Payload - SNMP Identification pane 5. Enter the required information for the payload and click Next. Click Help for detailed information on each payload you can define. After all of the payloads you have selected are configured, the Deployment Targets pane displays, as shown in Figure 294 on page 814.
26 Creating a payload configuration FIGURE 294 Configuration dialog box - Deployment Targets pane 6. In the Available Targets list, select the products, product groups, and IP subnets to which the payload configuration is to be deployed. • To select a target, expand the entry to display the entries under it, click the target in the Available Targets list, and click the right-arrow button to move it to the Selected Targets list. If the target is not on the list, run the discovery process.
Creating a payload configuration 26 FIGURE 295 Configuration dialog box - Deployment Properties pane 8. Select one of the persistence properties. • Don’t Save to Flash or Reload Select this option if you just want to update the device running configuration. The payload configuration is not saved to the device flash memory, nor is the device rebooted when the payload configuration is deployed.
26 Creating a payload configuration 9. (Optional) Enter the following information if you want the Management application to run and save a report before or after this configuration is deployed to the device. a. Select the Pre-Deployment check box if you want the Management application to run and save a report before this configuration is deployed. b. Select the Post-Deployment check box if you want the Management application to run and save a report after this configuration is deployed. c.
Creating a payload configuration 26 12. Select Save Without Scheduling Deployment or Schedule Deployment. If you select Schedule Deployment, select the frequency, time, and date parameters for the deployment. 13. Click Next. The Summary Page pane displays, as shown in Figure 297. FIGURE 297 Configuration dialog box - Summary Page pane 14. Review the information on the Summary Page pane. • The Deployment and Targets tab shows the deployment definition and the targets in the configuration.
26 Duplicating a payload configuration Duplicating a payload configuration You can create a payload configuration by copying an existing configuration. 1. Select Configure > Configuration Wizard. 2. Select a configuration from the Product Configurations list. 3. Click Duplicate. The Copy Configuration dialog box displays. 4. Enter a name for the new payload configuration.
Modifying a payload configuration 26 FIGURE 298 Configuration dialog box - Select Payload pane for editing a configuration 4. Add or remove payloads in the configuration. • To add a payload to the configuration, select either Product Payloads or Interface Payloads, and then select the payload you want to add. • To remove a payload from the configuration, clear the check box of the payload. Note that a configuration must have at least one payload.
26 Deploying a payload configuration Deploying a payload configuration Payload configurations are deployed to targets in one of the following ways: • On a scheduled basis, if a deployment schedule has been set up for the configuration. • On demand, if Save Without Scheduling Deployment is selected in the Deployment Schedule pane of the Configuration Wizard. Configurations can be manually deployed when required.
Chapter 27 CLI Configuration Management In this chapter • CLI configuration overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Viewing existing templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Product configuration templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Changing product credentials. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
27 Viewing existing templates Configuration requirements Before you use the CLI Configuration, you should meet the following requirements: • Telnet or SSH (or both) must be selected on the Management application server to match the protocol(s) with the devices. For more information about configuring Telnet or SSH, refer to “Product communication settings” on page 176.
Product configuration templates 27 Product configuration templates You can create, modify, duplicate, delete, verify, and deploy a product configuration from the CLI Configuration dialog box. Product configurations allow you to create device configuration by entering a set of configuration CLI commands. To view a list of existing configurations, refer to “Viewing existing templates” on page 822. For information about the example templates, refer to “CLI Templates” on page 1375.
27 Product configuration templates 4. Click the Target tab and complete the following steps. FIGURE 300 CLI Configuration Template dialog box - Target tab a. Select the devices to which you want the configuration deployed from the Available Targets table. The Available Targets table displays an inventory of the available product targets and includes the same detail as the Product List (refer to “IP Product List” on page 294).
Product configuration templates 27 5. Click the CLI Command tab and complete the following steps. FIGURE 301 CLI Template dialog box - CLI Commands tab a. (Configuration templates only) Select the Evaluate CLI responses check box to validate the CLI commands. You can prefix a dash (-) to a CLI command to ignore command validation even when you select the Evaluate CLI Response check box.
27 Product configuration templates c. To enter a parameter for a CLI command, select the parameter type from the CLI Commands list - Parameters folder and click the right arrow to move the parameter type to the CLI Commands text area. Parameters use the following format: $, where name is the parameter and data_type is the type of parameter.
Product configuration templates c. 27 Enter a value for each parameter in the associated field. Note that the Target column remains visible at all times in the Parameters table. Fields containing a green triangle ( ) in the lower right corner are editable. The fields only accepts valid values base on the parameter data type. Parameters include the following options: • • • • String — Enter a string with a maximum of 64 ASCII characters. Integer — Enter an integer with a maximum of 12 numeric characters.
27 Changing product credentials 11. Click OK. The Deployment Status dialog box displays, which allows you to view the progress and status of the deployment. Click Abort to stop the deployment. NOTE The abort action does not stop the tasks that have already started. When deployment is complete, click Report to view the CLI Deployments Report. 12. Click Close to close the Deployment Status dialog box. NOTE Closing the Deployment Status dialog box does not stop deployment.
Importing parameter values into a configuration 27 2. Enter the user name for the product in the Product Login Account - Username field. NOTE If Telnet is used to log in to the device and Telnet only requires a password, then enter the password in the Password field and leave the Username field blank. 3. Enter the password for the product in the Product Login Account - Password field. 4.
27 Previewing CLI commands TABLE 96 Different values for each target #Description of the template. This template provides different values for each target.. Target, LOOPBACK_INTERFACE|INTEGER, OSPF_AREA|INTEGER LOOPBACK_INTERFACE_IP|STRING 10.20.30.100, 1, 4, loopback1, 10.20.30.200, 2, 5, loopback2, Layer 2 Switch Products, 3, 6, loopback3, TABLE 97 Same value for each target #Description of the template. This template provides different values for each target..
CLI command guidelines 27 CLI command guidelines When adding CLI commands to the configuration, use the following guidelines: • Only configuration templates can be added to a template defined in the CLI Template dialog box. • Templates can be nested and the same template can be included several times as long as it does not cause a circular dependency. • Targets for deployment are only retrieved from the template you create, not any included templates.
27 CLI command guidelines • Click Deploy to deploy the configuration to the selected targets. Click Yes on the confirmation message. If you selected the Prompt for additional targets during manual deployment check box, the Target tab of the Deployment of Configuration_Name dialog box displays. Continue with step 6. If the configuration contains parameters that must be defined, the Deployment of Configuration_Name dialog box displays with a list of all parameters in the deployment. Go to step 7. 6.
Testing a configuration 27 • Click Deploy to deploy the configuration to the selected targets. Click Yes on the confirmation message. If you selected the Prompt for additional targets during manual deployment check box, the Target tab of the Deployment of Configuration_Name dialog box displays. Continue with step 6. If the configuration contains parameters that must be defined, the Deployment of Configuration_Name dialog box displays with a list of all parameters in the deployment. Go to step 7. 6.
27 Valid and invalid responses from devices 5. Edit the mode and the parameter values (refer to step 6), as needed. The Deployment Status dialog box displays detailing whether the configuration will deploy successfully. 6. Click Close to close the Deployment Status dialog box. Valid and invalid responses from devices When you deploy a configuration to a device, some commands may send responses back to the Management application.
Valid and invalid responses from devices 27 The strings on the left and the right side of the equal sign are Unicode regular expressions used for pattern matching. The expression on the left is matched against the command string, while the expression on the right is matched against the messages returned by the command that matches the pattern on the left.
27 Valid and invalid responses from devices Editing the Motorola Controller CLI responses properties file The MotorolaControllerCliResponse.properties file is under the Install_Home\conf\cli directory. Edit the file using a text editor. You can add a success response between the SUCCESS_RESPONSE_START and SUCCESS_RESPONSE_END tags using the following Unicode regular expressions format. #Success Map SUCCESS_RESPONSE_START ^su[port]*\s+s[witchd]*\s+=.*First Failure Data Capture.*enabled.
Deleting a configuration 27 Using a dash character in CLI Configuration manager You can override how the Management application treats messages without editing the CLI responses properties file. To do this, enter a dash (-) at the beginning of each configuration line. For example, to create a configuration that defines an IP address for port 3/2, enter the following commands in the CLI Configuration Manager: -interface ethernet 3/2 - ip address 192.45.6.110 255.255.255.
27 CLI configuration deployment CLI configuration deployment Deploy the configuration using one of the following methods: • At a scheduled date and time Schedule a configuration deployment in the CLI Template dialog box. For step-by-step instructions, refer to “Creating a new product configuration” on page 823 or “Creating a monitoring configuration” on page 839. • On demand To deploy an existing configuration on demand, refer to “Deploying a configuration on demand” on page 838.
Monitoring configurations 27 Monitoring configurations You can create, modify, duplicate, and delete a monitoring configuration from the CLI Configuration dialog box. Monitoring configurations allow you to create device reports by entering a set of show CLI commands. To view a list of existing configurations, refer to “Viewing existing templates” on page 822. For information about the example templates, refer to “CLI Templates” on page 1375.
27 Monitoring configurations 4. Click the Targets tab and complete the following steps. FIGURE 306 CLI Template dialog box - Target tab a. Select the devices to which you want the configuration deployed from the Available Targets table. You can deploy the configuration to individual devices, devices in a device group, or devices in an IP subnet.
Monitoring configurations 27 5. Click the CLI Command tab and complete the following steps. FIGURE 307 CLI Template dialog box - CLI Commands tab d. Enter the show commands in the CLI Commands text area. NOTE Only commands listed in the cliShowCommands.properties file can be entered for a monitoring configuration. For more information, refer to “Configuration error checking” on page 837. For a list of guidelines to use when entering CLI commands, refer to “CLI command guidelines” on page 831.
27 Monitoring configurations f. Edit the parameter by entering the variable or character string you want to use for the parameter in place of the name variable. NOTE Each parameter must be unique. The Management application does not check for duplicate parameters. show interface ethernet $ In the example, show interface ethernet is the CLI command, port is the parameter variable, SLOT_PORT is the parameter type, and [Slot#]/Port# is the format for the port number. g.
Monitoring configurations c. 27 Enter a value for each parameter in the associated field. Fields containing a green triangle ( ) in the lower right corner are editable. The fields only accepts valid values base on the parameter data type. Parameters include the following options: • • • • String — Enter a string with a maximum of 64 ASCII characters. Integer — Enter an integer with a maximum of 12 numeric characters. Slot/Port — Enter the slot number and port number.
27 Monitoring configurations 11. Click OK. The Deployment Status dialog box displays, which allows you to view the progress and status of the deployment. Click Abort to stop the deployment. NOTE The abort action does not stop the tasks that have already started. When deployment is complete, click Report to view the CLI Deployments Report. 12. Click Close to close the Deployment Status dialog box. NOTE Closing the Deployment Status dialog box does not stop deployment.
Monitoring configurations 27 8. Click OK. The Deployment Status dialog box displays, which allows you to view the progress and status of the deployment. Click Abort to stop the deployment. NOTE The abort action does not stop the tasks that have already started. When deployment is complete, click Report to view the CLI Deployments Report. 9. Click Close to close the Deployment Status dialog box. NOTE Closing the Deployment Status dialog box does not stop deployment.
27 CLI deployment reports 8. Click OK. The Deployment Status dialog box displays, which allows you to view the progress and status of the deployment. Click Abort to stop the deployment. NOTE The abort action does not stop the tasks that have already started. When deployment is complete, click Report to view the CLI Deployments Report. 9. Click Close to close the Deployment Status dialog box. NOTE Closing the Deployment Status dialog box does not stop deployment.
CLI configuration scheduling 27 3. Choose one of the following options: • To display a report for one device, click the IP address of the device on the list. • To display a report that includes all devices for which the report was generated, click the name of the report in the Template Name column. The Product CLI Report displays. To export a report refer to “Exporting and saving IP reports to a file” on page 1268.
27 CLI configuration scheduling Configuring a daily deployment schedule To configure a daily deployment schedule, complete the following steps. 1. Select Daily from the Frequency list. 2. Select the time of day you want deployment to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. To finish configuring the deployment schedule, return to step 8 of “Creating a new product configuration” on page 823.
CLI configuration scheduling 27 Configuring a yearly deployment schedule To configure a yearly schedule, complete the following steps. 1. Select Yearly from the Frequency list. 2. Select the time of day you want deployment to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. 3. Click the Date list to select a date from the calendar.
27 850 CLI configuration scheduling Brocade Network Advisor IP User Manual 53-1002947-01
Chapter 28 Image Repository for IP Products In this chapter • Obtaining software files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Products supporting the image import . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Boot image management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Software image management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Unified image management . . . . . . . . . .
28 Products supporting the image import Products supporting the image import Table 98 lists the products that support the boot images, software images, and unified images.
Boot image management 28 • Import — Opens the Import Boot Image dialog box that allows you to browse and select the boot or monitor image file you want to import into the Management application. Newly imported images are saved to the Management application. They are displayed on the Boot Images tab. • Delete — Deletes the boot or monitor image from the Management application. • Help — Provides information about the feature.
28 Boot image management c. Enter the image version in the Image Version field. d. Enter the label for the image in the either the Image Label field or the User Defined Label field. These fields are from 1 through 32 alphanumeric characters and allow the following special characters: underscore (_), period (.), and hyphen (-). The image file name excludes the file extension. For example, if the file name is M2B07504.bin, the Image Label is M2B07504.
Software image management 28 Software image management Software images are program files other than boot, monitor, or unified images. You can manage software images using the following Management application modules: • Discovery — Copies software images from IronWare and Network OS products on the network into the Management application. • Backup Scheduler — Copies software images from IronWare and Network OS products on a regularly scheduled basis.
28 Software image management 6. Click OK. After the import completes successfully, you see a message that the software image imported successfully. The Software Image table lists the image version and the image label.
Software image management 28 The Schedule Backup dialog box displays, as shown in Figure 309. FIGURE 309 Schedule Backup dialog box 3. Select the automatic software image backup task from the list, and click Edit. The Edit Automatic Software Image Backup dialog box displays, as shown in Figure 310. FIGURE 310 Edit Automatic Software Image Backup dialog box 4. Disable the scheduled backup or modify the frequency and time.
28 Unified image management Unified image management Unified images contain all images required to manage the product. Instead of upgrading each type of image separately, you can use a unified image to upgrade all image types. For example, a unified image for the BigIron RX Series contains boot, monitor, management, and interface images. When deployed, a unified image can update all image types on a product simultaneously.
Unified image management 28 The Unified Firmware Images tab contains the following buttons: • Import — Opens a dialog box that allows you to browse and select the unified image file you want to import into the Management application. Newly imported images are saved to the Management application. • Delete — Deletes the unified image from the Management application. • View — Opens a dialog box that allows you to enter the location of the release notes or search for the location of the release notes.
28 Unified image management 8. Click OK. After the import completes successfully, a message displays that the unified image imported successfully. The message also lists the image version and the image label.
Serial firmware update and activation for NOS devices 28 3. Upgrade the FPGA (pbifmetro.bin) image manually. 4. Reload the product. Deploying unified images to products The Management application stores previously imported unified images. These images can be placed in a unified image payload and deployed to products using the Configuration Wizard. NOTE Firmware images deploy to products one device at a time.
28 Serial firmware update and activation for NOS devices 8. Use the Serial Update and Firmware Activate check boxes as desired. For example: • You can select both boxes and enable the Firmware Activate check box to activate firmware on each node in a serial process. • You can leave the Serial Update check box clear and enable the Firmware Activate check box to activate firmware on each node in a parallel process.
Chapter 29 VLAN Management In this chapter • VLAN Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Port VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Spanning Tree Protocol configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • VLAN routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
29 VLAN Manager Private VLAN NOTE PVLAN read-only support is provided. Private VLAN (PVLAN) provides device isolation through the application of Layer 2 forwarding constraints. PVLAN allows end devices to share the same IP subnet while being Layer 2 isolated. This enables network designers to employ larger subnets and thereby reduce the address management overhead.
VLAN Manager 29 Displaying a list of VLANs To view the list of VLANs that were discovered on the network, select Configure > VLANs. The VLAN View tab of the VLAN Manager dialog box displays. The VLAN Manager toolbar contains the following buttons: • • • • Add — Launches the Add VLAN dialog box. Edit — Launches the Edit VLAN dialog box. Delete — Launches the Delete VLAN dialog box. STP — Allows you to configure STP, RSTP, MSTP, PVST, or RPVST information for a product, port, or VLAN.
29 VLAN Manager VLAN Manager tabs VLAN Manager has three views: • VLAN view Displays distinct Layer 2 broadcast domains by VLAN ID. If FDP or LLDP is not enabled on a device, each VLAN from each device is displayed in separate folders by VLAN ID. If FDP or LLDP is enabled on the devices, a VLAN folder shows device connectivity on the Layer 2 broadcast domains. If there are super-aggregated VLANs that have been configured on the network, VLANs are grouped by their super-aggregated VLAN memberships.
VLAN Manager 29 Displaying VLANs in the VLAN view The VLAN View tab displays all the VLANs discovered on the network and lists them by VLAN IDs (Figure 312). FIGURE 312 VLAN Manager dialog box - VLAN View tab To view the VLANs or products in the VLAN View tab, complete the following steps. 1. Click the VLAN View tab in the VLAN Manager dialog box. 2. Expand the folder under the VLAN View tab, then double-click a super-aggregated VLAN to display its port VLANs or Products.
29 VLAN Manager 3. Select a VLAN to expand the list of products listed under that VLAN. Use the Search tool to find VLANs, products, or ports quickly. A VLAN may be listed several times. For example, the first three VLAN1s have only one product. Each product in each VLAN is in its own broadcast domain and either does not have connectivity with other products or FDP or LLDP is not enabled on that product. The fourth VLAN1 has several products listed under it.
Port VLANs 29 FIGURE 313 VLAN Manager dialog box - Product View tab 2. Expand a product to display the port VLANs that have been configured on that product. 3. Click a VLAN in the list to display the interfaces on that product that belong to the VLAN. Port VLANs VLAN Manager facilitates the creation, modification, and deletion of port VLANs on products that are known to the Management application. It also aids in the bulk deployment of these VLANs. For example, VLAN 3 can be configured on four products.
29 Port VLANs FIGURE 314 Add VLAN dialog box - Ports tab 3. Enter a VLAN ID in the Configure VLAN field. You can enter more than one ID either by range (for example, 10-20, 30-40) or by separating individual IDs with a comma (for example, 10, 45, 79, 30). For DCB products, the VLAN ID range is from 1 through 3583 and for Network OS products the range is 1 through 4090. 4. Click the Load Products button.
Port VLANs 29 10. In the Select VLANs list, select the VLAN you want to assign to the selected interfaces. The list includes the default VLAN (VLAN1) and the VLAN or VLANs you are currently creating. You can assign one or more VLANs to the selected ports. In the Selected Ports list, each VLAN node is shown as Tagged, Untagged, or Dual Mode. If a port is already tagged in one VLAN, it can be marked as Tagged in other VLANs.
29 Port VLANs Adding or modifying dual mode ports You can configure an interface in a VLAN as a dual mode port by assigning it as a tagged port to one VLAN and as an untagged port to another VLAN. You can add a dual mode port to any VLAN except the default VLAN, VLAN 1. NOTE Dual mode is not supported on Network OS products. To add or modify a dual mode port, perform the following steps. 1.
Port VLANs 29 Adding VLAN properties The Add VLAN dialog box has two tabs: Ports and Properties. The VLAN properties vary for different products, for example: • When an IOS VLAN is selected, the Name, QoS, Spanning Tree and Router Interface fields and Transparent Flooding enable check box display. • When a DCB VLAN or product is selected and moved to the Products/VLAN list, the Name and Admin Status fields and the FCoE check box display. All the fields displayed for DCB products are read-only.
29 Port VLANs • Select Low (0) through High (7) for all other IronWare OS IP products. - Spanning Tree — Select the type of spanning tree protocol from the Spanning Tree list. The list options include STP, RSTP, and None. - Router Interface — If you want to add a virtual routing interface to the VLAN, enter the virtual routing interface number in this field. You can add an IP address to the virtual routing interface once the VLAN is deployed.
Port VLANs 29 Modifying port VLAN properties Complete the following steps to modify port VLANs using the VLAN View tab or the Product View tab on the Edit VLAN dialog box. 1. On the VLAN Manager dialog box, click the VLAN View or Product View tab. 2. If in the VLAN view, select and expand a VLAN entry, or if in the Product view, select and expand a product and click the Edit button. NOTE When a Network OS VLAN is selected, the Name and Admin fields display.
29 Spanning Tree Protocol configuration Deploying VLAN configurations The Deploy VLANs dialog box allows you to deploy a VLAN configuration to target products. Duplicate action is not supported. 1. Select a deployment option: • Click the Deploy now option if you want to deploy the VLAN definition. • Click the Save deployment only option if you want to save the VLAN definition without scheduling its deployment. • Click the Schedule option if you want to schedule the deployment of the VLAN definition. 2.
Spanning Tree Protocol configuration 29 • RSTP — Rapid Spanning Tree Protocol (IEEE 802.1w Internet standard) is a refinement of STP, which provides for faster spanning tree convergence after a topology change. • MSTP — Multiple Spanning Tree Protocol (IEEE 802.1s Internet standard) allows several VLANs to be mapped to a reduced number of spanning tree instances. This is possible because most networks do not need more than a few logical topologies.
29 Spanning Tree Protocol configuration FIGURE 317 STP Configuration dialog box 3. Select the target switch, VLAN, or port from the Target Context list. Target contexts and spanning tree options at the product, VLAN, or port level are listed in Table 101.
Spanning Tree Protocol configuration 29 10. The Force Version list is available only if you selected RSTP. This parameter forces the bridge to send BPDUs in a specific format. You can enter one of the following values: • 0: The bridge has been forced to operate in STP default mode. • 1: The bridge has been forced to operate in RSTP default mode. 11. Specify an interval in the Re-enable Port Interval field, available only if you selected RSTP.
29 Spanning Tree Protocol configuration 8. After the deployment has successfully completed, click Close to close the Deployment Status dialog box. Configuring MSTP on a product You can configure MSTP attributes from the VLAN View tab or the Product View tab on the VLAN Manager dialog box. 1. Perform one of the following tasks to select the VLAN on which MSTP will be configured: • On the VLAN View tab, expand the list of VLANs and select one or multiple VLANs on which MSTP will be configured.
Spanning Tree Protocol configuration 29 8. Enter the number of seconds a root bridge waits before it sends the next BPDU in the Hello Time field. The values range from 1 through 10 seconds. The default is 2 seconds. 9. Enter the number of seconds a bridge waits for a hello packet from the root bridge before initiating a topology change in the Max Age field. The values range from 6 through 40 seconds. The default is 20 seconds. 10.
29 VLAN routing 3. Select MSTP from the Spanning Tree list. The STP Configuration dialog box displays the Available MSTP Instances list. 4. Select an MSTP instance from the list under the Available MSTP Instances list, or enter the MSTP instance number. 5. Click Add. A new row is added to the Available MSTP Instances list. You can change the bridge priority, which is set, by default, to 32768. VLAN routing A VLAN restricts the broadcast domain to only its interface members.
VLAN routing 29 FIGURE 319 Virtual Port - IP Configuration dialog box 3. Complete one of the following steps: - To add a new IP address to the SVI, enter the IP address in the IP Address field and click the right arrow button to move it to the Selected IP Addresses list. - To modify an IP address of an SVI, select the IP address from the list and click the left arrow button to move the IP address back to the IP Parameters list.
29 VLAN routing 7. Click the Deploy now option. 8. Select a Save Configurations option: - Click the Save to running option to save the configuration while the system is running. - Click the Save to running and startup then reboot option to save the configuration both while the system is running and when the system starts up, and then automatically reboot. Click the Save to running and startup option to save the configuration both while the system is running and when the system starts up. 9.
Chapter 30 MPLS Management In this chapter • MPLS pre-configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • MPLS licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • MPLS overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • LSP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
30 MPLS licensing 7. Create VLL instances using the Customer-facing ports using the Management application (refer to “VLL manager” on page 910). 8. Create VPLS instances using the Customer-facing ports using the Management application (refer to “VPLS Manager” on page 926). MPLS licensing The following are MPLS capable products: • Ethernet Backbone router, Ethernet Core router, and Ethernet router running version 5.0.
MPLS overview 30 The following conditions must be met for inclusion in the MPLS Licensed and Configured Products product group: • Your version of the Management application supports MPLS. • Adding the product does not exceed the MPLS product license limit. For more information about how the Management application counts MPLS products, refer to “Managed MPLS product count calculation” on page 28.
30 LSP 2. Select the checkboxes and enter the required information in the fields provided as follows: - Advertise Labels ACL - Enables the 64 character text field for entering an Access Control List (ACL) name. - Hello Interval - The interval in seconds between sending LDP hello messages. The range is 1-32767. The hello interval must be smaller than the hold time set by Hello Timeout. - Use FEC 128 for autodiscovered peers - FEC 129 is the default.
LSP 30 • Setup priority for the LSP. • Metric for the LSP. • Whether the LSP includes or excludes links belonging to specified administrative groups. Viewing LSP Admin Group information MPLS interfaces on an LSP can be organized into administrative groups (admin groups). LSP admin groups are typically used to manage CSPF path selection by including or excluding network segments identified as admin groups. Take the following steps to view LSP admin groups. 1. Select Configure > MPLS > LSP. 2.
30 LSP Viewing LSP path information An LSP path is a list of router hops across an MPLS domain. Paths are configured separately from LSPs. This allows paths to be used by any LSP that knows the path name. Take the following steps to view LSP paths. 1. Select Configure > MPLS > LSP. 2. Select the Paths tab (Figure 323). FIGURE 323 LSP dialog box, Paths tab 3. A tree structure displays under Products/Paths with products at the top level.
LSP 30 Viewing RSVP LSP information Resource Reservation Protocol (RSVP) controls signalling messages sent to each LSR in the LSP to reserve resources for traffic-engineered paths and cause labels to be dynamically associated with interfaces. Take the following steps to view RSVP LSP information. The dialog box allows you to view a list of RSVP LSPs by product or by RSVP LSP name. You can also add, edit, duplicate, or delete RSVP LSPs, and launch the LDP Configuration wizard. 1.
30 LSP Viewing saved LSP configurations Take the following steps to view all saved LSP configurations. 1. Select Configure > MPLS > LSP. 2. Select the Saved Configurations tab (Figure 325). FIGURE 325 LSP dialog box, Saved Configurations tab Saved LSP configurations are listed by name, description, payload, and deployment schedule. Adding an LSP admin group MPLS interfaces can be organized into administrative groups (admin groups). Typically, an admin group is used to identify a network segment.
LSP 30 3. Click the Add button. The Admin Group Configuration dialog box of the Admin Group Configuration wizard displays (Figure 326). FIGURE 326 Add Admin Groups Configuration dialog box, Configuration Info pane 4. Enter an a name for the Admin Group in the Name field. A maximum of 32 ASCII characters is allowed. 5. Enter an Admin Group ID in the ID field. The ID must be an integer from 0 to 31. 6.
30 LSP FIGURE 327 Add Admin Groups Configuration dialog box, Deployment Properties pane 8. Select the desired properties. 9. Click Deploy. Editing an LSP admin group You can edit an LSP admin group by taking the following steps. 1. Select Configure > MPLS > LSP. 2. Select the Admin Groups tab. 3. Select the admin group you want to edit. 4. Click the Edit button. The Edit Admin Group Configuration dialog box of the Admin Group Configuration wizard displays (Figure 326).
LSP 30 Deleting an LSP admin group You can delete an LSP admin group by taking the following steps. 1. Select Configure > MPLS > LSP. 2. Select the Admin Groups tab. 3. Select the admin group to be deleted. 4. Click the Delete button. The Delete Admin Group Configuration dialog box of the Admin Group Configuration wizard displays. 5. Click on a series of Next buttons to deploy. Adding an LSP path An LSP path is a list of router hops across an MPLS domain. Paths are configured separately from LSPs.
30 LSP 5. Click the Add button. Use the Up and Down buttons to move the selected hop higher or lower in the table. An empty line is added under Hop Details. The first entry is always considered to be the local node and the Ingress LER. LER nodes should be then be added in order from Ingress to Egress. If you need to change the order, you can select an entry and use the Up and Down arrows to change its position. Actual routing depends on whether or not Type is set to Strict or Loose.
LSP 30 Duplicating an LSP path When you want to add a new LSP path, you can save work by duplicating an existing path and editing the name and any other parameters you may want to change. You can duplicate an LSP path by taking the following steps. 1. Select Configure > MPLS > LSP. 2. Select the Paths tab. 3. Select the path you want to duplicate. 4. Click the Duplicate button. The Path Configuration dialog box of the Path Configuration wizard displays (Figure 328).
30 LSP Configuring advanced RSVP LSP settings Resource Reservation Protocol (RSVP) can be used to send signalling messages to each LSR in the LSP to reserve resources and cause labels to be dynamically associated with interfaces. This enables you to engineer network traffic routing to avoid points of congestion and make efficient use of high bandwidth interfaces.
LSP 30 8. Click Advanced Settings to establish traffic engineering parameters. The RSVP LSP Advanced Settings dialog box has three tabs: Global, Paths, and Fast Reroute. The default view is the Global tab (Figure 331). FIGURE 331 RSVP LSP Advanced Settings Global tab From the Global tab you can set the following: - Adaptive checkbox - Select the Adaptive checkbox to allow you to change parameters while an LSP is in enabled state.
30 LSP You can place selected admin groups into any of the following categories: • Include All - An interface must be a member of all selected groups. • Include Any - An interface is included if it is a member of any of the selected groups. • Exclude All - Interfaces in the selected groups are excluded. - Bidirectional Forwarding Detection (BFD) check box - This check box allows you to enable or disable BFD.
LSP - 30 Path Select Mode - The choices are Manual and Unconditional. If Manual is chosen, traffic is shifted to an alternate path only if the selected path fails. If the path recovers, traffic is shifted back. If Unconditional is chosen, the traffic stays on the selected path even if the path fails. If you do not want to specify a path select mode or want to remove the configured path select mode, select None. • Primary - Selected by default.
30 LSP • Maximum Rate - Sets the maximum data rate supported for data bursts above the mean rate. • Maximum Burst - Sets the maximum number of bytes that can be handled at the maximum rate. - Use LSP for OSPF shortcuts - Enables the use of traffic engineering data carried in OSPF extensions that contain information about the interface’s metric, bandwidth reservations, and admin group memberships. - Use LSP for IS-IS shortcuts - Enables you to configure the IS-IS shortcut parameters.
LSP a. 30 Use the Primary Path Select button to display the Path Selector dialog box (Figure 334). FIGURE 334 Path Selector dialog box b. Select the path you want to use as the primary path from Available Paths, and use the right arrow to move the path to Selected Paths. c. Click OK. Secondary paths for the LSP are listed under Paths. Use the Add and Delete buttons to add or delete a secondary path. Use the up and down arrows to move entries up and down in the table. 10.
30 LSP From the Fast Reroute tab you can configure an LSP to request a facility backup provided by a bypass LSP in the event of a failure along the LSP path. Each LSR in an LSP except the egress router may act as a Point of Local Repair (PLR). If a failure occurs on an LSP, the PLR tries to initiate a bypass LSP to provide a backup route for the protected path. The PLR then becomes the ingress of a bypass LSP. The bypass LSP carries the traffic of the LSPs it protects around the break.
LSP 30 Editing an RSVP LSP You can edit an RSVP LSP by taking the following steps. 1. Select Configure > MPLS > LSP. 2. Select the RSVP LSP tab. 3. Select the RSVP LSP you want to edit. 4. Click the Edit button. The RSVP LSP Configuration dialog box of the RSVP LSP Configuration wizard displays (Figure 330). Refer to “Configuring advanced RSVP LSP settings” for a description of how to use the RSVP LSP Configuration wizard.
30 LSP FIGURE 337 Delete RSVP Configuration wizard 5. Click a series of Next buttons to deploy the payload. Editing a saved LSP configuration You can edit a saved LSP configuration by taking the following steps. 1. Select Configure > MPLS > LSP. 2. Select the Saved Configuration tab. 3. Select the saved configuration 4. Click the Edit button.
LSP 30 Deleting a saved LSP configuration You can delete a saved LSP configuration by taking the following steps. 1. Select Configure > MPLS > LSP. 2. Select the Saved Configuration tab. 3. Select the saved configuration 4. Click the Delete button. Displaying LSP Topologies Refer to the View Management chapter for descriptions for topology map layout options and navigation aids. You can display topology maps for configured LDP and RSVP LSPs by taking the following steps. 1.
30 LSP FIGURE 339 LSP Topology View Options 4. Use the LSP Type selector to limit the display to RSVP LSPs Only or LDP Tunnels Only. If you right-click on an LSP, three options are displayed (Figure 340).
MPLS Virtual Leased Line (VLL) overview 30 • Select Drill-down to LSP Hops Topology to display LSPs and hops as a line from the ingress router with an arrow to indicate direction. Operationally enabled LSPs are shown with a solid line. Operationally disabled LSPs are shown with a dotted line. • Select LSP Ping to launch the LSP Ping dialog box. • Select LSP Traceroute to launch the LSP Trace Route dialog box.
30 VLL manager The PE router pushes two labels onto the packet: • The inner VC label is used for determining what happens to the packet once it reaches the VLL peer. This label is significant only to the VLL peer. • The outer tunnel label is used for forwarding the packet through the MPLS domain. This label corresponds to an RSVP-signalled tunnel LSP. After applying the two labels to the packet, the PE router forwards it to the next LSR in the tunnel LSP. 3.
VLL manager 30 Viewing VLL instances To view currently defined VLL instances, do the following: 1. Select Configure > MPLS > VLL. 2. Select the VLL Manager Views tab (Figure 342). FIGURE 342 VLL Manager Views tab 3. You can filter output by name or by VCID by using the selector next to the VLL field. - You can use an Asterisk (*), as a wildcard character if you select By Name. You can enter individual VCIDs or a range of VCIDs if you select By VCID.
30 VLL manager 6. Click the Get button to begin the search for the VLL name. VLLs that match the filter criteria display under VLL Settings and Endpoint Settings. The table shows the following information: - VCID of the VLL. This cell is blank for a local VLL. Name of the VLL. Status of the VLL: • • • • - Conflict - Indicates if there are conflicts with VLL endpoint instances. Conflicts can arise, especially with VLLs configured using the product CLI.
VLL manager 30 • Raw: The ingress router does not add a VLAN ID to the packets. • Tag Mode • Tagged: If the endpoint is a tagged port, the device transmits the packet with the specified VLAN ID and forwards it out the specified interface. • Untagged: If the endpoint is an untagged port, the device removes any VLAN ID before transmitting it out the specified interface. • L2 Status - Layer 2 status (Up or Down). • Outer VLAN ID - Present if the Tag Mode for the endpoint is Tagged.
30 VLL manager 5. When you select a configuration, the following information displays in the fields below Saved Configurations: 6. Right click any entry in the table to display the Print pop up menu. Select Print from the menu to print the table. Adding or editing a VLL instance To add a new VLL instance do the following: 1. Select Configure > MPLS > VLL. 2. Select either the Views tab or the Saved Configurations tab. 3. Click the Add button.
VLL manager 30 9. Under Available Endpoints, expand the Devices folder to display the available devices. Then expand the device folder, and slot folder to select a port for an endpoint. Ports that run FDP or CDP protocol are filtered out because they cannot be a VLL or VPLS endpoint. For a remote VLL the two endpoints must come from different devices. For a Local VLL, the ports selected must be from the same device. 10. Use the right arrow button to move the port to the Selected Endpoints box.
30 VLL manager Configuring devices using the VLL Manager 1. From the Product Configuration pane of the VLL Configuration Wizard, click each device entry. The last discovered CoS and MTU settings for the device are displayed in the Discovered area. You can modify the settings under the Configured area. 2. Enter values for the following: - COS - From the drop down list, select the Class of Service (COS) you want to assign to this instance. Packets that go through this instance are assigned this instance.
VLL manager a. 30 From the Tag Mode list, select one of the following: • Tagged: If the endpoint is a tagged port, the device transmits the packet with the specified VLAN ID and forwards it out the specified interface. • Untagged: If the endpoint is an untagged port, the device removes any VLAN ID before transmitting it out the specified interface. b. For tagged ports only, enter a VLAN ID for the service provider end point tag in the Outer VLAN ID field.
30 VLL manager Deploying target actions using the VLL Manager 1. From the Deploy Target Actions pane, under the Resultant Endpoint Actions, Endpoint Targets column, select the device, or expand the folder for the device to display the VLAN ID (if the Tagged is configured for the port’s tag mode) and the port on which the VLL is to be assigned. 2. The Actions column displays the action to take when the VLL is deployed to the devices.
VLL manager 30 Deploying VLL properties using the VLL Manager 1. From the Deployment Properties pane of the VLL Configuration Wizard, under Persistence Properties, chose one of the following: - Do not Save to Flash or Reload - Use this option if you want to update the running configuration. The payload configuration is not saved to the device flash memory, nor is the device rebooted when the VLL configuration is deployed.
30 VLL manager Scheduling deployment using the VLL Manager 1. From the Deployment Schedule pane of the VLL Configuration Wizard, select from the following deployment options: - Save without scheduling deployment - saves the payload configuration without a deployment schedule. - Schedule Deployment - enables you to schedule a time for deployment using the Frequency, Time (hh:mm), and Date selectors. - Disable Schedule - Checkbox for disabling a scheduled deployment. 2. Click Next.
VLL manager 30 Reviewing the VLL Manager configuration 1. From the Summary pane of the VLL Configuration Wizard, review the information on the page. The Configuration tab displays the configuration in CLI format. 2. Click the Previous to return to pages that you want to modify. Click Cancel to cancel the configuration. When you have finished, click Next. The configuration is assigned a Configuration ID.
30 VLL manager Editing a VLL instance To edit a VLL instance, do the following: 1. Select Configure > MPLS > VLL. 2. Select either the Views tab or the Saved Configurations tab. 3. Select the instance you want to edit from the list of VLL instances. 4. Click the Edit button. The Target Selection dialog box displays. Deleting VLL instances You can delete a VLL configuration from a device, whether or not it is on a device covered by your MPLS license. Do the following. 1.
VLL manager 30 Filtering VLL traffic monitoring The VLL Manager Monitor dialog box allows you to monitor traffic on VLLs. 1. Select Monitor > MPLS > VLL. The VLL Monitor Dialog box displays (Figure 351). FIGURE 351 VLL Monitor dialog box 2. You can filter output by name or by VCID by using the selector next to the VLL field. - You can use an Asterisk (*), as a wildcard character if you select By Name. You can enter individual VCIDs or a range of VCIDs if you select By VCID.
30 Virtual Private LAN Services (VPLS) overview The VLL Instances table shows the following information: - VCID of the VLL - In Packets - Number of packets received by the A Endpoint. This data is not available in the NetIron CER and NetIron CES - Z Endpoint - Name and IP address of the device that serves as the last endpoint for the VLL - In Packets - Number of packets transmitted through the Z Endpoint. This data is not available in the NetIron CER and NetIron CES.
Virtual Private LAN Services (VPLS) overview 30 CE Device Customer A R2 R3 R1 CE Device CE Devices Customer A MPLS Domain Customer A VLAN 200 VLAN 100 Customer B Customer B CE Devices VLAN 200 VLAN 100 R4 FIGURE 352 VPLS configuration with two customer VPNs Unlike a Virtual Leased Line (VLL), a VPLS instance can have multiple endpoints. The PE device performs local and remote VLAN tag translation, so that multiple VLANs can be specified under a single VPLS instance.
30 VPLS Manager VPLS Manager The VPLS Manager allows you to manage VPLS instances. You can perform the following tasks from the VLL manager: • View current VPLS instances and peer topologies. • View VPLS configurations. • Add, edit, duplicate, or delete VPLS instances. NOTE When configuring VPLS, a check is made to determine if there are LSPs configured for the target products. You may proceed with configuration, but an LSP is needed for a working connection.
VPLS Manager 30 3. To specify new filter criteria, select By Name or By VCID from the VPLS list. You can use the following to filter the VPLS instances: • Asterisk (*) as a wildcard character if you select By Name. • Individual VCIDs or a range of VCIDs, separating each entry with a comma if you selected By VCID. 4. Click Get to begin the search. Information about products that match the search criteria displays under VPLS Settings, PE Products, and Endpoints on the Details tab.
30 VPLS Manager FIGURE 354 VPLS Manager Peer Topology tab Viewing Saved VPLS configurations To view current VPLS configurations, do the following: 1. Select Configure > MPLS > VPLS. 2. Select the Saved Configurations tab (Figure 355).
VPLS Manager 30 FIGURE 355 VPLS Manager Saved Configurations tab 3. You can use the Name field to filter output by configuration name. You can use an Asterisk (*) as a wild card character. 4. Click Get to begin the search. Configurations that match the filter criteria display under Saved Configurations, showing the configuration ID, the configuration name, and the name of the user that created the configuration.
30 VPLS Manager • Endpoints table — Displays the following information: Endpoints — Names and IP addresses of the endpoint devices. Tag Mode — Tagged if a VLAN tag is used. Untagged if a VLAN tag is not used. Outer VLAN ID — Present if the Tag Mode for the endpoint is Tagged. The service provider end point tag. Inner VLAN ID — Present if the Tag Mode for the endpoint is Tagged. The customer end point tag. L2 Status — Displays whether L2 is up or down. 5.
VPLS Manager 30 6. Use the right arrow button to move the port to the Selected Endpoints box. Make sure you select two endpoints from two different devices. NOTE The device folder lists all MPLS capable devices, whether or not they are covered by your MPLS license. If you select an MPLS capable device that in not covered by your MPLS license, you will not be able to configure VPLS services for that device.
30 VPLS Manager c. You can select the IP address of the peer by clicking the drop down arrow for Peer IP address. By default, the ingress IP address of a tunnel is selected. d. Enter the maximum number of MAC entries that the VPLS instance is allowed to learn. Determine the range of values you can enter by checking the configuration guide for your device. 3. Click Next. The Port Configuration page displays (Figure 358).
VPLS Manager 30 FIGURE 359 VPLS Configuration wizard Deploy Target Action dialog box The VPLS instance name and VCID are shown in the Name and VCID fields. Deploying target actions using VPLS Manager 1. From the Deploy Target Actions pane, the Endpoint Targets column lists the names and IP addresses of the devices to which the VPLS instance will be deployed. Expand the folder for a device to display any VLANs and ports to which the VPLS instance will be deployed.
30 VPLS Manager FIGURE 360 VPLS Configuration wizard Deployment Properties dialog box Deploying VPLS properties using VPLS Manager 1. From the Deployment Properties pane, choose one of the following persistence properties: - Do not Save to Flash or Reload - Use this option if you want to update the running configuration. The payload configuration is not saved to the device flash memory, nor is the device rebooted when the payload configuration is deployed.
VPLS Manager 30 FIGURE 361 VPLS Configuration wizard Deployment Schedule dialog box Scheduling deployment using VPLS Manager 1. If the Deployment Schedule dialog box displays, select from the following deployment options: - Save without scheduling deployment - saves the payload configuration without a deployment schedule. - Schedule Deployment - enables you to schedule a time for deployment using the Frequency, Time (hh:mm), and Date selectors. 2. Click Disable Schedule to disable a schedule.
30 VPLS Manager FIGURE 362 VPLS Configuration wizard Deployment Summary dialog box Reviewing the VPLS Manager summary 1. On the Deployment and Targets Summary pane, review the summary information. The Deployment and Targets tab displays the information you entered on the previous pages. The Configuration tab displays the configuration in CLI format. 2. Click the Previous to return to pages that you want to modify. Click Cancel to cancel the configuration. When you have finished, click Next.
VPLS Manager 30 4. The next available VCID in the VCID pool is automatically placed in the VCID field. You can change the VCID if desired as long as it is not used in a current VLL instance. 5. Modify any of the remaining values in the instance by following the procedure presented in “Adding or editing a VPLS instance” on page 930. NOTE The device folder under Available Endpoints lists all MPLS capable devices, whether or not they are in the All MPLS Licensed and Configured Devices group.
30 VPLS Manager Filtering for VPLS traffic monitoring The VPLS Manager Monitor allows you to filter and monitor VPLS traffic. 1. Select Monitor > MPLS > VPLS. The VPLS Monitor dialog box displays (Figure 363). FIGURE 363 VPLS Monitor dialog box 2. You can filter output by name or by VCID by using the selector next to the VPLS field. - You can use an Asterisk (*), as a wildcard character if you select By Name. You can enter individual VCIDs or a range of VCIDs if you select By VCID. 3.
VCID pools 30 VCID pools VCID pools contain VCID that can be used in a VLL or VPLS instance. You may create a combined VCID pool containing VCIDs that are shared by VLL and VPLS, or you may create a segmented VCID pool that provides separate VCID pools for VLL and VPLS configurations. Viewing, creating, and deleting VCID pools To view a VCID Pool and to create or delete VCID pools, do the following: 1. Select Configure > MPLS > VCID Pool. The VCID Pool dialog box displays (Figure 364).
30 802.1ag Connectivity Fault Management 5. Edit the Start and End fields to specify the desired range of VCIDs. You can use any numbers between 1 to 4294967294. If you are creating a segmented pool, be sure the VLL and VPLS VCIDs do not overlap. 6. Click OK. 802.1ag Connectivity Fault Management 802.1ag Connectivity Fault Management (CFM) is an IEEE standard used to define protocols and practices for Ethernet Operations, Administration, and Maintenance (OAM). 802.
802.1ag Connectivity Fault Management 30 1. Choose one of the following options: • From the VPLS Manager dialog box, Views tab, choose one of the following options: Select a device from the VPLS Peer Status/VPLS Name/VCID list and click 802.1ag CFM. Select the Peer Topology tab and right-click a device in the topology and select 802.1ag CFM. From the VLL Manager dialog box, Views tab, select an instance from the VLL Instances table and click 802.1ag CFM.
30 802.1ag Connectivity Fault Management 12. Select the MEP direction from the Direction list. Options include: • Up — Select to set the MEP direction away from the monitored VLAN. • Down — Select to set the MEP direction towards the monitored VLAN. 13. Click the right arrow button to move the defined MEP to the Selected Maintenance End Points table.
802.1ag Connectivity Fault Management 30 Editing a maintenance association You can access 802.1ag CFM from the following features: • VPLS Manager (requires the IP - MPLS – VLL prvilege with read-write or read-only permission) • VLL Manager (requires the IP - MPLS – VPLS prvilege with read-write or read-only permission) • VLAN Manager (requires the VLAN Manager prvilege with read-write or read-only permission) NOTE 802.
30 802.1ag Connectivity Fault Management 9. To add a MEP, complete the following steps. a. Select a product from the Product list. The list contains all products that are part of the VPLS. b. Select a VLAN ID from the VLAN ID list. The list contains all VLAN IDs in the VPLS. c. Select a port from the Port list. The list contains all VPLS end-points for the selected VLAN ID. d. Enter a unique identifier for the end-point in the End Point ID field. Valid values include 1 through 8191. e.
802.1ag Connectivity Fault Management 30 11. Click OK on the Edit Maintenance Association dialog box. The Deploy to Products dialog box displays. 12. Select one of the following options: • Save to running — Select to update the running configuration; however, the deployment is not saved to the product’s flash memory. • Save to running and startup — Select to update the running configuration as well as save the deployment configuration to the product’s flash memory.
30 802.1ag Connectivity Fault Management Adding a MEP to a maintenance association You can access 802.1ag CFM from the following features: • VPLS Manager (requires the IP - MPLS – VLL prvilege with read-write or read-only permission) • VLL Manager (requires the IP - MPLS – VPLS prvilege with read-write or read-only permission) • VLAN Manager (requires the VLAN Manager prvilege with read-write or read-only permission) NOTE 802.
802.1ag Connectivity Fault Management 30 10. Click OK on the Edit Maintenance Association dialog box. The Deploy to Products dialog box displays. 11. Select one of the following options: • Save to running — Select to update the running configuration; however, the deployment is not saved to the product’s flash memory. • Save to running and startup — Select to update the running configuration as well as save the deployment configuration to the product’s flash memory.
30 802.1ag Connectivity Fault Management Editing a MEP You can access 802.1ag CFM from the following features: • VPLS Manager (requires the IP - MPLS – VLL prvilege with read-write or read-only permission) • VLL Manager (requires the IP - MPLS – VPLS prvilege with read-write or read-only permission) • VLAN Manager (requires the VLAN Manager prvilege with read-write or read-only permission) NOTE 802.1ag CFM is only supported on IronWare Ethernet Routers devices running firmware release 5.2 or later.
802.1ag Connectivity Fault Management 30 11. Click OK on the Edit Maintenance Association dialog box. The Deploy to Products dialog box displays. 12. Select one of the following options: • Save to running — Select to update the running configuration; however, the deployment is not saved to the product’s flash memory. • Save to running and startup — Select to update the running configuration as well as save the deployment configuration to the product’s flash memory.
30 802.1ag Connectivity Fault Management Viewing the MEPs in a maintenance association You can access 802.1ag CFM from the following features: • VPLS Manager (requires the IP - MPLS – VLL prvilege with read-write or read-only permission) • VLL Manager (requires the IP - MPLS – VPLS prvilege with read-write or read-only permission) • VLAN Manager (requires the VLAN Manager prvilege with read-write or read-only permission) NOTE 802.
802.1ag Connectivity Fault Management 30 • To send a loopback message to a specific MEP or MIP in the domain, refer to “Sending a loopback message” on page 953. • To send a linktrace message to a specific MEP or MIP in the domain, refer to “Sending a linktrace message” on page 954.. 4. Click Close on the Configure 802.1ag CFM dialog box. Deleting a maintenance association You can access 802.
30 802.1ag Connectivity Fault Management Checking the connectivity status of remote MEPs Use the 802.1ag CFM Connectivity dialog box to check the status of all remote maintenance end points (MEP) for the selected MEP. You can access 802.
802.1ag Connectivity Fault Management • • • • 7. 30 Product - The product containing the remote MEP. Port - The port of the remote MEP. MAC Address - The MAC address of the remote MEP. Operational State - The state of the port attached to the MEP. Valid values include: Unknown, Idle, Start, Failed, and OK. Click Close on the 802.1ag CFM Connectivity dialog box. 8. Click Close on the Configure 802.1ag CFM dialog box.
30 802.1ag Connectivity Fault Management 3. Click Loopback. The 802.1ag CFM Loopback dialog box displays the product that contains the selected MEP, the domain, the maintenance association, and the port number of the selected MEP. 4. Select the MEP for which you want to send a loopback message to a specific maintenance end point (MEP) or maintenance intermediate point (MIP) in the domain in the Maintenance End Points (MEP) table. 5. Click Loopback. The 802.1ag CFM Loopback dialog box displays. 6.
802.1ag Connectivity Fault Management 30 To send a link trace message to a specific MEP or MIP in the domain, complete the following steps. 1. Choose one of the following options: • From the VPLS Manager dialog box, Views tab, choose one of the following options: Select a device from the VPLS Peer Status/VPLS Name/VCID list and click 802.1ag CFM. Select the Peer Topology tab and right-click a device in the topology and select 802.1ag CFM.
30 802.1ag Connectivity Fault Management 10. Review the hop details: - The Hop Details table lists the connectivity status for each remote MEP and MIP. The hop number. The MAC address of the remote MEP/MIP. Whether the MEP or MIP forwarded the message. The ingress or egress MEP and MIP. • For a linktrace on a VLAN service, displays the associated port name in the format of Slot_Number/Port_Number. • For a linktrace on a VLL or VPLS, displays the IPv4 address of the peer product.
802.1ag Connectivity Fault Management 30 • From the VLL Manager dialog box, Views tab, select an instance from the VLL Instances table and click 802.1ag CFM. • From the VLAN Manager dialog box - VLAN View or Product View, select a VLAN from list and click 802.1ag CFM. The Configure 802.1ag CFM dialog box displays the product that contains the selected MEP, the domain, the maintenance association, and the port number of the selected MEP. 2.
30 958 802.
Chapter 31 VIP Servers In this chapter • VIP Servers overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Viewing the VIP Servers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Viewing VIP Server information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Enabling or disabling servers or server ports . . . . . . . . . . . . . . . . . . . . . . . • Server port statistics . . . . . . . . . . . . . . . . .
31 Viewing the VIP Servers FIGURE 365 VIP Servers dialog box The View list allows you to select which real server, real server port, virtual server, or virtual server ports you want to view. For detailed information, refer to “Viewing VIP Server information” on page 961. The VIP Servers list displays the ServerIron devices that have been discovered by the Management application ports, and information about the real server or virtual server.
Viewing VIP Server information 31 Viewing VIP Server information 1. From the View list on the VIP Servers dialog box, select which ports you want to view from the following options: • Real server ports view of the virtual server, shown in Figure 366 • Virtual server ports view of the real server, shown in Figure 367 • Real server view of the virtual server, shown in Figure 368 on page 962 2.
31 Viewing VIP Server information FIGURE 368 Real server view of the virtual server The following fields describe the components in the VIP Servers list on the VIP Servers dialog box. VIP Servers list • The name and IP addresses of the real server or virtual server. • The name or port numbers of the real server port or virtual server port. • Only the servers in a Management application user’s AOR are listed in the list.
Enabling or disabling servers or server ports 31 Enabling or disabling servers or server ports If you have the VIP Server Manager privilege with read-write permission, you can enable and disable real servers, virtual servers, real server ports, and virtual server ports. If you have the VIP Server Manager Leaf Node privilege with read-write permission, you can enable and disable only the server leaf nodes.
31 Server port statistics • • • • • RX Packets — The number of packets received by the port. TX Packets — The number of packets transmitted by the port. RX Bytes — The number of bytes received by the port. TX Bytes — The number of bytes transmitted by the port. Last Update — The date and time when information for the server was updated.
Chapter 32 Global Server Load Balancing In this chapter • GSLB Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • GSLB policy management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • GSLB site management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • GSLB zone configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Controller configuration . . .
32 GSLB Manager Viewing the GSLB Manager To view the GSLB Manager, perform the following steps. Select Configure > Application Delivery > GSLB. The Policy Configuration tab in the GSLB dialog box, shown in Figure 369, displays. FIGURE 369 GSLB dialog box - Policy Configuration tab The GSLB dialog box displays the following buttons: • • • • Add — Creates a new GSLB policy, site, or zone definition and a new controller configuration. Edit — Modifies existing GSLB Manager definitions and configurations.
GSLB policy management 32 GSLB policy management A GSLB policy allows a GSLB ServerIron ADX product to evaluate each IP address in a DNS reply, based on defined criteria called metrics. The GSLB ServerIron ADX product can reorder the list of addresses and place the IP address for the best site at the top of the list. Creating a GSLB policy To create a GSLB policy, perform the following steps. 1. Select Configure > Application Delivery > GSLB. 2. Click the Policy Configuration tab.
32 GSLB policy management FIGURE 370 Policy Configuration dialog box - Metrics tab 4. Provide the following information on the Policy Configuration dialog box. a. Enter a policy name for the GSLB policy in the Policy Name field. The combination of a GSLB policy name and the Management application user who created it must be unique. b. Select the policy type from the Policy Type list. Options include the Global or Host policy types. c.
GSLB policy management e. 32 Select the tie breaker method from the Tie Breaker list. This value is used in case multiple addresses pass the policy criteria without one address emerging as the best choice: • Least Response: Selects the address of the site that has been selected least often in previous DNS responses. Note: ADX-type products do not support the Least Response tie-breaker method.
32 GSLB policy management Applying metrics on the Metrics tab The GSLB ServerIron ADX product evaluates each IP address in the DNS reply based on the metrics order. Based on the results, the GSLB ServerIron ADX product can reorder the list to place the IP address for the best site on the top of the list. To apply policy metrics, perform the following steps. 1. Click the Metrics tab on the Policy Configuration dial box. 2. Select the order from the Metric Order list.
GSLB policy management 32 Adding a prefix on the Prefix tab 1. Click the Prefix tab on the Policy Configuration dialog box, shown in Figure 371. 2. Click Add. A new row is added to the Geo Prefix/Static Prefix list. FIGURE 371 Policy Configuration dialog box - Prefix tab 3. Enter the IP address and select a location from the Location list. If you select NONE for the location, the prefix is considered static. If you select any other location, the prefix is considered geographical (Geo).
32 GSLB policy management Importing IP addresses from a file 1. Select Configure > Application Delivery > GSLB. 2. Click the Policy Configuration tab. 3. In the Geo Prefix/Static Prefix list, click Import. The List of Prefix Networks and Location dialog box displays. 4. Click Import on the Prefix tab of the Policy Configuration dialog box. The List of Prefix Networks and Locations dialog box, shown in Figure 372, displays. 5. Enter a list of prefix networks and locations in the text box.
GSLB site management 32 GSLB site management The Site Configuration dialog box allows you to configure a GSLB ServerIron ADX product with site parameters. A GSLB site contains GSLB ServerIron ADX products that belong to that site. Click the Site Configuration tab on the GSLB dialog box to view the GSLB sites that have been defined for the system, and perform one of the following tasks: • Click Add to create a new GSLB site. • Select an existing GSLB site, and click Edit if you want to modify it.
32 GSLB site management Adding ServerIron ADX products to the site You must add at least one site ADC/ADX product to create a site configuration. 1. Click the Add button. When you click Add, a row is added to the Site ADCs list. The ServerIron ADX products that the Management application has discovered appear in the Site ADC column. The name of the selected ServerIron ADX product displays in the ADC Name column. You can edit the ADC name. 2.
GSLB zone configuration 32 GSLB zone configuration When you manage GSLB zones, you specify the DNS zone name and the host information (applications) within each zone for which you want the GSLB ServerIron ADX product to provide GSLB. There are no defaults for zone parameters.
32 GSLB zone configuration 2. Enter a name for the zone in the Zone Name field. The combination of a GSLB zone name and the Management application user who created it must be unique. 3. Perform one of the following tasks: • Click the Add button to open the Add Hosts dialog box, where you can add hosts to a zone. • Select the host from the Hosts list, and click Edit to modify information for a host. • Select the host from the Hosts list, and click Delete to delete a host.
GSLB zone configuration 32 Adding a host to a zone The Add Hosts dialog box allows you to specify host information within each zone. NOTE When you specify the hosts and applications, the GSLB ServerIron queries the DNS server (the one for which the GSLB ServerIron is a proxy) for the IP addresses associated with the hosts and begins sending health checks to the hosts. 1. Enter the name of the host in the Host Name field.
32 GSLB zone configuration 7. Click Add to add an IP address and weight in the IP Weights list. The IP Weights list is used if IP Weights is specified in the selected policy (during site configuration using the Site Configuration dialog box). You assign a weight to an IP address so that the ServerIron ADX product distributes GSLB traffic among IP addresses in a DNS reply. 8. Enter the IP address to which you want to assign a weight in the IP Address column. 9.
Controller configuration 32 Controller configuration Once policies, sites, and zones are configured, you can assign and deploy a policy to a ServerIron ADX product that is the GSLB controller. The Controller Configuration tab on the GSLB dialog box allows you to assign and deploy a policy to a ServerIron product that is the GSLB controller, after policies, sites, and zones are configured. NOTE All configuration options on the Controller Configuration tab are deployed to the selected GSLB controller.
32 Controller configuration Creating a new GSLB controller configuration 1. Select Configure > Application Delivery > GSLB. 1. Click the Controller Configuration tab of the GSLB dialog box to view the controller definitions that have been defined for the system. 2. Click Add to create a new GSLB controller configuration, or select an existing GSLB controller configuration and click Edit or Duplicate. The Controller Configuration dialog box displays, as shown in Figure 376.
Controller configuration 32 6. Select the Enable Logging check box if you want to enable logging of the following information for DNS requests assisted by the GSLB ServerIron ADX product: • • • • • Source IP address (the address of the client making the request) Best IP address (site address provided by the ServerIron ADX product) Host Zone Metric used This parameter setting is deployed to the controller and to the site ServerIron ADX products specified in this configuration.
32 Controller configuration 11. When you have finished, click OK to add the configuration to the Available Zones/Host list on the Controller Configuration dialog box. Deploying a controller configuration Under GSLB Manager, only the entries under the Controller Configuration tab can be deployed to a ServerIron ADX product that will run the GSLB protocol. Controller configuration deployment can be scheduled or deployed on demand.
Controller configuration 32 FIGURE 377 Controller Configuration dialog box - Schedule tab 4. Provide the following information. a. Click the Save Without Scheduling Deployment option if you want to save the deployment definition without scheduling it. b. Click the Schedule Deployment option if you want to schedule and save the deployment definition. c.
32 Controller configuration f. Select the day of the week when the definition will be deployed. The Day of the Month list appears if you selected Monthly as the schedule type. g. Select the day of the month when the definition will be deployed. The Date list appears if you selected One Time or Yearly as the schedule type. h. 984 Indicate the date of the deployment. i. Open the calendar and select the date. ii. Select the Suspend Scheduling check box to disable the schedule.
Chapter SSL Certificates for ServerIron Products 33 In this chapter • SSL certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 985 • SSL certificate configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 986 • Generating a certificate signing request . . . . . . . . . . . . . . . . . . . . . . . . . . . 990 • Adding an SSL certificate and key file . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
33 SSL certificate configuration You must have the appropriate user privileges to access SSL Certificates. NOTE SSL Certificates does not generate signed certificates and keys. You can generate a certificate signing request (CSR), but the signed certificates and keys managed by SSL Certificates must be signed by a certificate authority (CA) and must be stored in an accessible location.
SSL certificate configuration 33 Accessing SSL certificates on the Certificate View tab The SSL Certificates dialog box Certificate View tab allows you to view, add, edit, duplicate, append, delete, chain, import, export, and deploy SSL certificates. You can also create a certificate signing request (CSR) and create key passwords from this tab.
33 SSL certificate configuration - Certificates selector — Use this selector to Add, Edit, Duplicate, Append, or Delete certificates. - Chain button — Use to chain certificates. View button — Use to view certificates. Import selector — Use this selector to import a certificate or key from a file or a product. Export button — Use to export a certificate. Deploy button — Use to deploy certificates. Signing Request button — Use to generate certificate signing request.
SSL certificate configuration 33 FIGURE 379 SSL Certificates dialog box - Product View tab The Product View tab contains the following fields and components. - Products — A product tree structure. When you select a product, certificates are displayed under Certificates. If the ADX is running software release 12.3.00 or later, you can only view and manage SSL certificates to Virtual IP servers that are in your Area of Responsibility (AOR).
33 Generating a certificate signing request - Need Deploy — Yes if the certificate or key is not deployed to the product. No if the certificate or key is deployed to the product. - View button — Launches the View Certificate dialog box. Delete button — Deletes a selected certificate. Import button — Import a certificate or key from a file. Deploy button — Launches the Deploy Certificate/Key dialog box.
Generating a certificate signing request 33 FIGURE 381 Generate CSR Key dialog box 7. Enter your organization’s user data: • • • • Common Name - A common name for the CSR (1 through 32 alphanumeric characters). Unit Name - A unit name for the CSR (1 through 32 alphanumeric characters). Organization - The name of your organization (1 through 64 alphanumeric characters). E-mail Address - The e-mail address for the CSR. This is the From: address when the CSR is submitted for signing.
33 Adding an SSL certificate and key file 10. Enter the key password in the Password field, if necessary. By default, the Password field displays the password (entered in the Certificate Signing Request dialog box) as asterisks (*). 11. Click OK. The generated CSR displays in the CSR field. 12. The CSR needs to be copied and pasted into a file. Obtain instructions from the CA for submitting the CSR for signing.
Editing an SSL certificate and key file 33 4. Paste the signed certificate request into the Certificate field. The certificate request must be in .PEM format, and must not be expired. No size limit is enforced. 5. If you want a key to accompany the certificate, select the With Private Key check box. This enables the Key Name, Key, and Password fields. If you select With Private Key, continue with step 6. If you do not select With Private Key, continue with step 9. 6. Enter a name in the Key Name field.
33 Duplicating an SSL certificate and key file Duplicating an SSL certificate and key file You can only edit the certificate name, the key name, and the certificate key decription from the Duplicate Certificate dialog box. 1. Select Configure > Application Delivery > SSL Certificates. The SSL Certificates dialog box displays. 2. From the Certificate View tab, use the Certificates arrow to select Duplicate . The Duplicate Certificate dialog box displays. 3. Change the name in the Certificate Name field.
Importing certificates and keys from file locations 33 Importing certificates and keys from file locations NOTE If the ADX is running software release 12.3.00 or later, you can only view and manage SSL certificates that are bound to Virtual IP servers that are in your Area of Responsibility (AOR).
33 Importing certificates and keys from products 8. Enter the password associated with the key in the Password field. 9. (Optional) Enter a description of the certificate in the Description field. 10. Click OK to import the certificate and key files. Importing certificates and keys from products NOTE If the ADX is running software release 12.3.00 or later, you can only view and manage SSL certificates that are bound to Virtual IP servers that are in your Area of Responsibility (AOR).
Exporting certificates and keys 33 3. Select a product from the Available Sources list. 4. Use the right arrow button to move the selected product to the Selected Sources list. 5. Click OK to import certificates and keys for the selected products. Exporting certificates and keys NOTE If the ADX is running software release 12.3.00 or later, you can only view and manage SSL certificates that are bound to Virtual IP servers that are in your Area of Responsibility (AOR).
33 Deploying certificates and keys Deploying certificates and keys NOTE If the ADX is running software release 12.3.00 or later, you can only view and manage SSL certificates that are bound to Virtual IP servers that are in your Area of Responsibility (AOR). To add a Virtual IP server to your AOR, refer to “Assigning products to an AOR” on page 209 You can deploy an SSL certificate and key to a ServerIron or ADX product using the following procedure. 1.
Creating key passwords 33 Creating key passwords You can create candidate key passwords used when importing SSL keys from a ServerIron product using the following procedure. 1. Select Configure > Application Delivery > SSL Certificates. The SSL Certificates dialog box displays. 2. From the Certificate View tab, click Key Passwords. The Key Passwords dialog box displays (Figure 386). FIGURE 386 Key Passwords dialog box 3.
33 Appending SSL certificates Appending SSL certificates NOTE If the ADX is running software release 12.3.00 or later, you can only view and manage SSL certificates that are bound to Virtual IP servers that are in your Area of Responsibility (AOR). To add a Virtual IP server to your AOR, refer to “Assigning products to an AOR” on page 209 You can append an SSL certificate with another certificate. 1. Select Configure > Application Delivery > SSL Certificates. The SSL Certificates dialog box displays. 2.
Chaining SSL certificates 33 3. Click Chain. The Chain Certificates dialog box displays (Figure 387). FIGURE 387 Chain Certificates dialog box The Certificates table includes the following details: • ID — A unique system-assigned ID for each certificate entry. • Status — Possible values are Valid, About to Expire, or Expired. • Certificate — The user-assigned certificate name. The same name may be used on different products. • Key — The user-assigned key name.
33 Deleting SSL certificates 4. Select the certificate you want to chain to the certificate you selected in step 2. The Chain status for the selected certificate must be Yes. Make sure the Status for the second certificate is Yes. The description of the certificate displays in the Description field, if a description was entered when the certificate was created. 5. Click OK.
Chapter 34 Deployment Manager In this chapter • Introduction to the Deployment Manager . . . . . . . . . . . . . . . . . . . . . . . . • Editing a deployment configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Duplicating a deployment configuration . . . . . . . . . . . . . . . . . . . . . . . . . • Deleting a deployment configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Deploying a configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
34 Editing a deployment configuration Editing a deployment configuration 1. Select Configure > Task Scheduler. The Task Scheduler dialog box displays, as shown in Figure 388. FIGURE 388 Task Scheduler dialog box 2. Select a deployment configuration in the Saved or Scheduled tab. Policy-based routing configurations cannot be edited. 3. Click Edit. A dialog box specific to the type of deployment displays. This is the same dialog box that was used when the deployment was created. 4.
Deleting a deployment configuration 34 3. Click Duplicate. A dialog box specific to the type of deployment displays. This is the same dialog box that was used when the original deployment was created. 4. Update the dialog box with any information you want to change. A copy of the deployment configuration is created with the name “originalName copyn”. For example, if the original name is “test”, the new name is “test copy1”. If you duplicate “test” again, the name of the second duplicate is “test copy2”.
34 Generating a deployment report Generating a deployment report 1. Select Configure > Task Scheduler. The Task Scheduler dialog box displays. 2. Select a deployment in the Saved, Scheduled, or Log tab. 3. Click Report. An HTML report displays. You can click the Configuration Name or Deployment Time to see additional details. Generating a deployment configuration snapshot report 1. Select Configure > Task Scheduler. The Task Scheduler dialog box displays. 2.
Searching the configuration snapshots 34 4. Identify the targets you want to search. Select a target in the Available Targets list and click the right arrow to move the target to the Selected Targets list. 5. Define search criteria. You can specify whether the targets should contain or not contain specific text, and whether to display all configurations, the most recent configurations, or only those configurations that fall within a specific date range. 6. Click Find.
34 1008 Searching the configuration snapshots Brocade Network Advisor IP User Manual 53-1002947-01
Chapter 35 Performance Data In this chapter • SAN performance overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • SAN real-time performance data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • IP performance monitoring and traffic analysis . . . . . . . . . . . . . . . . . . . • IP configuration requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • IP real-time performance monitoring . . . . . . . . . . . . . . . . . . . . . . . .
35 SAN performance overview SAN performance measures Performance measures enable you to select one or more measures to define the graph or report. The measures available to you depend on the object type from which you want to gather performance data. NOTE Devices with 10GE ports must be running Fabric OS 6.4.1 or later to obtain the correct TE_Port statistics (TX/RX). NOTE Devices with 10GE ports must have the RMON MIB enabled on the switch.
SAN performance overview • • • • • • • • • • • • • • • • • • • • • • Dropped Packets — Available for FCIP tunnels only. • • • • Dropped Frames — Available for managed HBA ports and managed CNA ports. 35 Compression Ratio — Available for FCIP tunnels only. Latency — Available for FCIP tunnels only. Link Retransmits — Available for FCIP tunnels only. Timeout Retransmits — Available for FCIP tunnels only. Fast Retransmits — Available for FCIP tunnels only.
35 SAN performance overview Example of Management application Server IP address included in access control list FCRRouter:admin> snmpconfig --show accesscontrol SNMP access list configuration: Entry 0: Access host subnet area 172.26.1.
SAN performance overview 35 Community (rw): [OrigEquipMfr] Trap Recipient's IP address : [172.26.24.26] Trap recipient Severity level : (0..5) [4] Trap recipient Port : (0..65535) [162] Community (rw): [custom] Trap Recipient's IP address : [172.26.1.158] Trap recipient Severity level : (0..5) [4] Trap recipient Port : (0..65535) [162] Community (ro): [custom] Trap Recipient's IP address : [0.0.0.0] Community (ro): [common] Trap Recipient's IP address : [0.0.0.
35 SAN performance overview Priv Protocol [DES(1)/noPriv(2)/3DES(3)/AES128(4)/AES2(5)/AES256(6)]): (2..2) [2] User (ro): [snmpuser1] Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3] Priv Protocol [DES(1)/noPriv(2)/3DES(3)/AES128(4)/AES2(5)/AES256(6)]): (2..2) [2] User (ro): [snmpuser2] Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3] Priv Protocol [DES(1)/noPriv(2)/3DES(3)/AES128(4)/AES2(5)/AES256(6)]): (2..2) [2] User (ro): [snmpuser3] Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..
SAN performance overview 35 SNMP SET Security Level: No security - To set the SNMP security level, use the snmpconfig --set secLevel command. Example of checking SNMP security level snmpconfig --set secLevel 0 Select SNMP GET Security Level (0 = No security, 1 = Authentication only, 2 = Authentication and Privacy, 3 = No Access): (0..3) [0] • To collect performance data for GE ports and FCIP statistics, make sure that SNMP v3 credentials match and that FCIP-MIB capability is enabled.
35 SAN real-time performance data SAN real-time performance data Real-time performance monitoring enables you to collect data from managed devices in your SAN. Real-time performance monitoring is only supported on the following managed objects: FC (E_Ports and F_Ports), GE_Ports, E_Port trunks, 10GE_Ports, managed HBA Ports, managed CNA Ports, and FCIP tunnels. You can use real-time performance monitoring to configure the following options: • Select the polling rate from 10 seconds up to 1 minute.
SAN real-time performance data 35 FIGURE 389 Realtime Port Selector dialog box NOTE You can set columns in right side of the dialog box for FICON display using Server > Options > SAN DIsplay. The first eight columns will display FC Address, Serial #, Tag, Product Type, Model, Vendor, Port Name, Port Type, and Port WWN. 3. Select the object type from the Show list by which you want to graph performance. NOTE Devices with 10GE ports must be running Fabric OS 6.4.
35 SAN real-time performance data Filtering real-time performance data To filter real-time performance data from the Real Time Performance Graphs dialog box, complete the following steps. 1. Open the Real Time Performance Graphs dialog box. For step-by-step instructions, refer to “Generating a real-time performance graph” on page 1016. 2. Select how the data is measured, in received frames, transmitted frames, or CRC errors.
SAN real-time performance data • • • • 35 Port Type - Type of port being monitored. Graph - Graph of data over time. Destination - The destination device. Destination Port - The port through which the selected device is connected to the destination device. • Destination Tunnel ID - The ID of the destination FCIP tunnel. • Destination Port Type - The port type through which the selected device is connected to the destination device.
35 IP performance monitoring and traffic analysis IP performance monitoring and traffic analysis Use information in the following sections to monitor IP performance and analyze IP traffic. • IP configuration requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • IP real-time performance monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • IP historical performance monitoring. . . . . . . . . . . . . . . . . . . . . . . . . . . .
IP real-time performance monitoring 35 IP real-time performance monitoring Real-time performance monitoring allows you to view a snapshot of current performance data. You can enable real-time performance monitoring without configuring historical data collectors. The data is not stored in the database. Performance monitoring allows you to define a data collector by mapping a Management Information Base (MIB) object to a unit name (refer to “MIB data collectors” on page 1051).
35 IP real-time performance monitoring 2. Select the products you want in the Available Products list and click the right arrow button to move them to the Selected Products list. NOTE You cannot select more than 100 products and ports. 3. Select the ports you want in the Available Ports list and click the right arrow button to move them to the Selected Ports list. 4. Click OK. The Real Time Graphs/Tables dialog box displays. 5.
IP real-time performance monitoring TABLE 102 35 Collection status icons Failed. No value was ever collected for this collectible. Warning: Data collection failed in the last polling cycle. Successful: Last collection successful. Scheduled but not currently active. • Last Value - The last (most current) value collected. • Last Time Polled - The time that the collector was last polled. 10. Click Sources to add products and ports to or remove products and ports from real-time performance monitoring.
35 IP real-time performance monitoring 5. The Real Time Graphs/Tables dialog box displays. Adding measures to products To add measures to products, complete the following steps. 1. Right-click a device and select Performance > Real Time Graph/Table. The Real Time Graphs/Tables dialog box displays. 2. Select Products from the Show list. The available products display in a list. 3. Select a product in the list and click Measures. The Select measures - Real Time Graphs/Tables dialog box displays. 4.
IP real-time performance monitoring 35 3. Select a product in the list and click Measures. The Select measures - Real Time Graphs/Tables dialog box displays. 4. Select Device Measures from the Show list. 5. To remove an MIB or expression from the product, complete the following steps. a. Select the MIB or expression you want to remove from the product in the Selected Measures list. Select multiple MIBs and expressions by holding down the CTRL key and clicking more than one MIB or expression. b.
35 IP real-time performance monitoring 8. Click OK. The Real Time Graphs/Tables dialog box displays. Removing measures from ports To remove measures from ports, complete the following steps. 1. Right-click a device and select Performance > Real Time Graph/Table. The Real Time Graphs/Tables dialog box displays. 2. Select Products from the Show list. The available products display in a list. 3. Expand the list and select a port in the list and click Measures.
IP real-time performance monitoring 35 2. Add all collectibles defined for a port by completing the following steps. a. Select Show > Products to show devices on the network that are being polled for collectible data. b. Select the port you want to include in performance in the tree. Press CTRL and click to select multiple ports. c. Click the right arrow button. The graph and table are populated with the collectible performance values.
35 IP real-time performance monitoring • Select Fit in window to fit the graph in the window. • Select Go to Latest to go to the latest data point on the graph. • Select the Use Logarithmic Axis check box to present data on a logarithmic or non-logarithmic axis. • Select the Show Values check box to annotate data point values in the graph. • Select the Enable Auto Scrolling check box to automatically jump to display the new data when new data is collected while the graph is in view.
IP real-time performance monitoring 35 NOTE Although these settings will apply to all performance graphics in the management application. the change will not reflect instantly on the Performance Dashboard monitor that displays the graph. Rather it will be updated the next time those monitors are launched. 3. Click Options to launch the Graph Options dialog box. Refer to “Configuring graph options” on page 1029 for instructions on using this dialog box. 4.
35 IP real-time performance monitoring FIGURE 392 Graph Options dialog box (Historical Graphs/Tables dialog box) NOTE Figure 392 illustrates the Graph Options dialog box available from the Historical Graphs/Tables dialog box. The Graph Options dialog box available from the Real Time Graphs/Tables dialog box is similar, but has fewer control options. 2. Select the type of chart style from the Chart Style list. Available chart styles include Line Chart, Area Chart, or Bar Chart. 3.
IP real-time performance monitoring 35 • (Historical graphs and monitors only) Plot Min/Max - Plots minimum and maximum values along with the average data. The range between the minimum and maximum values will be represented by the width of a color band surrounding the data points as shown in the following illustration. Note that this option is not available if you select Minimum Interval granularity. It also does not apply and is not available for Real Time Performance graphs.
35 IP real-time performance monitoring 5. In the Time Range area, select one of the following options: • Select Relative time to set a time range relative to the present for the display of historical data. a. (Historical graphs and monitors only) Select the granularity of the data points to display on the graph from the Granularity list. Options are 5 minutes, 30 minutes, 2 hours, or 1 day. NOTE The graph will not update dynamically if the granularity is 30 Minutes, 2 Hours, or 1 day.
IP historical performance monitoring 35 Printing a graph To print a graph, complete the following steps. 1. Right-click the graph and select Print. The Page Setup dialog box displays. 2. Edit the paper, orientation, and margins, as needed. 3. Click Printer to select a printer. 4. Click OK. IP historical performance monitoring Historical performance monitoring allows you create data collectors by choosing MIB object and by choosing or creating mathematical expressions.
35 IP historical performance monitoring Editing system collectors Subject to the following restrictions, you can edit system collectors using the Data Collector wizard (refer to “Adding or editing a historical data collector” on page 1035).
IP historical performance monitoring 35 • Enabled - Whether or not the data collector is enabled (Yes) or disabled (No). • Polling Interval - The time interval, in minutes, between attempts to contact the information source and gather data. • Collectibles Type - At what level the data will be collected and the types of MIB objects used: - Product Level - SNMP data is collected at the product (device) level. - Port Level - SNMP data is collected at the port level.
35 IP historical performance monitoring • Click the Add button The Data Collector wizard Collector Basics dialog box displays where you can add values for a new collector. FIGURE 396 Data Collector wizard Collector Basics pane 3. Enter a descriptive name for the data collector in the Name field. 4. Use the Polling Interval list to set the polling interval. The choices are 1 minute, 5 minutes, 10 minutes, 15 minutes, and 30 minutes. 5. Select the Target Type.
IP historical performance monitoring 35 • If you select Monthly, the Time (hh:mm) and Day of the Month selectors display. • If you select Weekly, the Time (hh:mm) and Day of the Week selectors display. • If you select Daily, the Time (hh:mm) selector displays. • Duration - Enter a value in the Duration field, and then select the unit of measure. The options are Minutes, Hours, and Days. 7. Click Next on the Collector Basics dialog box. The MIB Objects dialog box displays.
35 IP historical performance monitoring 11. Click Next on the MIB Objects dialog box. The Expressions dialog box displays. FIGURE 398 Data Collector wizard Expressions dialog box The Available Expressions list shows all expressions that are available by default and any that have been defined by the user. 12. Select an expression from the Available Expressions list. A description of the expression displays under Details of . 13.
IP historical performance monitoring 35 FIGURE 399 Data Collector wizard Select Sources dialog box The Available Products/Ports tree structure includes all products and ports that can be monitored. You can expand folders to display all available products and ports. If you have selected Port Level on the Collector Basics dialog box, trunk objects will be included as available targets in the form of LAG, vLAG, or Trill objects. Only ifindex-based MIBs or expressions are supported. 15.
35 IP historical performance monitoring FIGURE 400 Data Collector wizard MIB Index dialog box You can define index values for each MIB object that requires an index. 17. From the MIB Instances list, select the required MIB variable. The Complete SNMP OID, the Index Name, and the Index Value display beneath the MIB Instances list. 18. You have several options for entering index information: • Select the Dynamic walk check box to dynamically select index values for a particular index.
IP historical performance monitoring 35 19. Click Next on the MIB Index dialog box. The Threshold & Rearm dialog box displays. FIGURE 401 Data Collector wizard Threshold & Rearm dialog box This dialog box allows you to establish a a threshold value that triggers a trap message when the threshold is met, and to establish conditions for repeating threshold check and trap messages. 20. Select Enable threshold and rearm events to enable the Threshold and Rearm selectors. 21.
35 IP historical performance monitoring Adding third-party device MIB objects manually To add a third-party device MIB object manually, complete the following steps. 1. Copy the third-party device MIB objects to the Install_Home\conf\mibs\ip directory. 2. Go to Install_Home\conf\mibs and open the mibs_to_compile.txt in a text editor. 3. Add the MIB file names to the mibs_to_compile.txt file. 4. Save and close the mibs_to_compile.txt file. 5.
IP historical performance monitoring 35 3. Click Duplicate. The Data Collector wizard is launched. The wizard is pre-populated with the data for the selected data collector. The Name field shows the name of the collector followed by the word copy. Go to any step to edit any of the values. 4. Click Finish on any of the wizard dialog boxes when you are done.
35 IP historical performance monitoring Adding, editing, or duplicating a user-defined expression You may want to create an expression to collect information in a specific way. For example, you may want the total count of all received and transmitted packets on an interface, requiring a value derived from two MIB objects; the MIB object for the incoming packet count and the MIB object for the outgoing packet count. Take the following steps to add a user-defined expression. 1.
IP historical performance monitoring 35 6. Select a MIB object from the Available MIB Objects tree structure. A description of the MIB object displays in the MIB Details field. 7. Build your expression in the Expressions field using the operators above the field. • MIB Object.Abs — The raw value of the MIB variable that is polled from the product will be used in the SNMP expression calculation. • MIB Object.
35 IP historical performance monitoring Viewing Historical Graphs/Tables 1. Select Monitor > Performance > Historical Graphs/Tables. 2. Select the Data Monitoring tab. The main features are a tree structure and a graph area. You can collapse the tree structure to expand the graph area. FIGURE 404 Historical Graphs/Tables Data Monitoring tab 3. Use the Show selector to toggle the tree structure display in the left panel between Products and Collectibles.
IP historical performance monitoring 35 FIGURE 405 SAN Fibre Channel port display FIGURE 406 SAN FCIP tunnel display Brocade Network Advisor IP User Manual 53-1002947-01 1047
35 IP historical performance monitoring FIGURE 407 Wireless controller and APs display • Select Collectibles and the left panel displays measures (MIB objects and expressions) currently being collected. Select a measure, and the targets (products or ports) from which the measure was collected display in the right panel. If SAN historical data collection is enabled, corresponding SAN products and ports display. Measures also display for SAN products, ports, and FCIP tunnels that appear in the device tree.
IP historical performance monitoring 35 If a table is displayed, the first column displays the time of the collection. The remaining columns display the value of each collectible at the specified time. There is one column for every collectible you select to display. 7. Select the Collection Status Summary tab. FIGURE 408 Historical Graphs/Tables Collection Status Summary tab The Collection Status Summary tab provides a high level overview of all defined collectors.
35 IP historical performance monitoring • Last Time Polled - The time that the collector was last polled. When you use the Show selector to select Products, devices and ports display in a tree structure in the left-most column. If you select a device or port, the right collectibles column lists all the collectors that have been defined for the device or port.
MIB data collectors 35 MIB data collectors The Management application enables you to define a data collector by mapping a MIB object to a unit name in the mib_unit.properties file. This property file is located in the Install_Home/conf/mibs directory. The default mib_unit.properties file contains commonly used MIB unit definitions. Once mapped, the unit name displays on the line chart of the performance graphs when you select that MIB object as a data collector.
35 IP Custom performance reports IP Custom performance reports You can create customized reports and run or schedule them in the same manner as a standard report. You can modify, copy, or delete customized reports. Select the report from the Report Definitions tab, then click the Edit, Duplicate, or Delete button. Creating a custom report Complete the following steps to create a report. 1. Select Monitor > Performance > Custom Reports.
IP Custom performance reports 35 FIGURE 410 Add/Edit /Duplicate Report Definition dialog box - Collection Items tab By default, the Collection Items tab is selected. On this tab, the collectibles in all data collector configurations are listed by device in the Available Collection Items list. 3. Select the collectible you want to include in the report and click the right arrow button to move it to the Selected Collection Items list.
35 IP Custom performance reports 5. To schedule the report to run at a specific time, click the Time Settings tab. FIGURE 411 Add/Edit Report Definition dialog box - Time Settings tab You can choose from the following settings: • Relative Time - Enables you to select a time range relative to the present for the display of historical data. The choices are incremental from the last 30 minutes to the last 24 hours.
IP Custom performance reports 35 6. To arrange the order of the columns in the generated report, click the Result Settings tab. FIGURE 412 Add/Edit Report Definition dialog box - Result Settings tab • Data types that will be collected are listed in the Available Columns list. Select the data type you want to include in the report and click the right arrow button to move it to the Selected Columns box. • Select a data type to be used to sort the report.
35 IP Custom performance reports 7. Click the Identification tab. FIGURE 413 Add/Edit Report Definition dialog box - Identification tab 8. Enter a name for the report in the Name field. You can use up to 64 alphanumeric characters. This name appears under the Name column on the SNMP Monitor reports tree. This name must be unique for each SNMP Monitor report. 9. Enter a title for the report, which will be used as the title of a generated report, in the Title field.
IP Custom performance reports 35 12. Select the user accounts that will be able to view and run this definition in the Available Users list and click the right arrow button to move those user accounts into the Selected Roles box. Click the left arrow button to move the user accounts back to the Available Users list. You can share this definition with specific Management application users.
35 IP sFlow configuration IP sFlow configuration The Management application supports the creation of sFlow reports to capture traffic data. Configuring sFlow You can use the sFlow configuration wizard to configure an sFlow data collector and a destination for the sFlow data collector. 1. Select Monitor > Traffic Analysis > Configure sFlow. The Interface Payload - sFlow Configuration dialog box displays.
IP sFlow configuration 35 2. Click Next. The Interface Payload - sFlow Settings dialog box displays. FIGURE 415 Interface Payload - sFlow Settings dialog box 3. Under Global Settings, select Enable to have the sFlow report enabled when it is deployed. Select Disable to deploy the sFlow report as initially disabled. 4. Use the Rate Sampling selector to choose either Adaptive or Custom sampling. If you choose Adaptive, the management server selects the sampling interval and traffic sampling rate.
35 IP sFlow configuration If you choose Custom, you may set your own sampling interval and traffic sampling rate. - Global Settings • Counter sampling Interval - defines the interval in seconds between samples. The range is 0 to 86400. • Traffic sampling rate - the ratio between the total number of incoming packets and the number of flow samples taken at the product level. The ratio is expressed as n to 1; for example, if you specify a sampling rate of 100, the ratio is 100:1.
IP sFlow configuration c. 35 Click OK. A new row appears under Collector Details for the collector you just added. NOTE A limit of four collectors is enforced in the Collector Details table. If you add more than four collectors, an error message displays. An error message also displays if you try to add a collector with the same IP address and UDP port combination as an existing collector. NOTE For VCS devices running Network OS v4.0 and above, you can deploy up to five collectors.
35 IP sFlow configuration 15. Review the configuration summary and click Deploy. Creating custom sFlow reports You may create custom sFlow reports if you want to capture traffic analysis information that is not available in the standard reports. 1. Select Monitor > Traffic Analysis > Custom Reports. The Traffic Analyzer Custom Reports dialog box displays. FIGURE 416 Traffic Analyzer Custom Reports dialog box, Definition tab 2. Select the Report Definitions tab. 3. Click the Add button.
IP sFlow configuration 35 4. Select the Product & Port tab. FIGURE 417 Add Report Definitions dialog box, Product & Port tab The Product & Port tab contains tables of available products and ports that may be selected for sFlow data collection. 5. Determine if you want a report on only one product or port or on two or more products or ports, and select either Single or Multiple as appropriate. Options are displayed differently depending on your choice of Single or Multiple.
35 IP sFlow configuration For VCS fabrics, if you select Single mode, the following report definition behavior may occur: - Displays all ports from all members of the selected VCS fabric in the available ports tables on the Product & Port tab. - Automatically includes fabric changes (adding or deleting members) when you run the report.
IP sFlow configuration 35 8. If you do not chose the Prompt check box, complete the following for each field. - Source VM — Enter the name, IP address, or MAC address of the source VMs in comma separated value (CSV) format or click the ellipsis button to the right of the field to select the VMs from the Select VMs dialog box.
35 IP sFlow configuration 12. Select the Layer 3 & 4 tab. FIGURE 420 Add Report Definitions dialog box, Layer 3 & 4 tab 13. Examine each listed item and decide the following: - Do you want to enter values in the field, or be prompted to enter the value when running the report? If you want to be prompted, select the Prompt check box.
IP sFlow configuration 35 - Layer 4 Protocols — The layer 4 protocols you can use as a filter depends on which layer 3 protocols you selected. Enter the L4 protocols in comma separated value (CSV) format or click the ellipsis button to the right of the field to select the protocols from the Layer 4 Protocols dialog box. - Source Ports — Enter the ports in comma separated value (CSV) format or click the ellipsis button to the right of the field to select the ports from the L4 Source Port dialog box.
35 IP sFlow configuration 18. Examine each listed item and decide the following: Do you want to enter values in the field, or be prompted to enter the value when running the report? If you want to be prompted, select the Prompt check box. If you do not chose the Prompt check box, you may enter any of the following in the fields provided: - Source Subnet Bits - Enter the source subnet of the route. Destination Subnet Bits - Enter the destination subnet of the route. Local AS - Enter the local AS number.
IP sFlow configuration 35 21. Select the Result Settings tab. FIGURE 424 Add Report Definitions dialog box, Result Settings tab 22. Select one of the following options for displaying report data from Result Type list: - Detailed Table - Displays data in table format. - Bottom N Chart and Table - Displays a pie chart of the bottom N talkers above the tabular data. Top N Chart and Table - Displays a pie chart of the top N talkers for your selected sorting options above tabular data.
35 IP sFlow configuration FIGURE 425 Add Report Definitions dialog box, Result Settings tab 23. If you selected Bottom N Chart and Table or Top N Chart and Table, select the top or bottom number (N) of talkers that you want in the report by clicking the arrows on the selector to the right of the Result Type list. Select a minimum of 5, with increments of 5 to a maximum of 25.
IP sFlow configuration 35 26. Select the Identification tab. Add Report Definitions dialog box displays, as shown in Figure 426 on page 1071. FIGURE 426 Add Report Definitions dialog box, Identification tab 27. Enter a name for the report in the Name field. The name must be unique among all sFlow reports, and can be a maximum of 64 alphanumeric characters. 28. Enter the report title in the Title field. The Title field supports a maximum of 128 alphanumeric characters. 29.
35 IP sFlow configuration FIGURE 427 Example report for top 5 MAC Talkers Scheduling custom sFlow reports You can schedule a custom sFlow report from the Schedules tab of the Custom Reports dialog box. 1. Select Monitor > Traffic Analysis > Custom Reports. 2. Select the Schedules tab. Custom sFlow Reports dialog box displays, as shown in Figure 428 on page 1073.
IP sFlow configuration 35 FIGURE 428 Custom sFlow Reports dialog box, Schedules tab 3. Click Add. The Add Schedule dialog box displays, as shown in Figure 429 on page 1074.
35 IP sFlow configuration FIGURE 429 Add Schedule dialog box 4. Enter a name for the schedule in the Name field. 5. Use the Report Definition selector to select the report definition you want to schedule. NOTE Report definitions that included a prompt are not listed. 6. Use the Format selector to choose either HTML or CSV format. 7. Use the Frequency selector to choose to run the data collector on a Yearly, Monthly, Weekly, Daily, Hourly, or One Time basis.
IP Traffic analyzer monitoring and sFlow reports 35 12. You may include text that you want to add before the auto-generated report content in the Body Prologue field. 13. You may include text that you want to add after the auto-generated report content in the Body Epilogue field. 14. Click OK. Suspending a custom sFlow report schedule To suspend the schedule of a custom sFlow report, complete the following steps. 1. Select Monitor > Traffic Analysis > Custom Reports. 2. Select the Schedules tab. 3.
35 IP Traffic analyzer monitoring and sFlow reports 802.1X configuration requirements 802.1X user information can be displayed on sFlow reports. To ensure that this information is displayed, do the following: • Make sure the device and software release it is running supports 802.1X. • 802.1X must be enabled on the device ports. • Clients must be running software platforms that support 802.1X (for example, Windows XP operating system). • RADIUS authentication servers must have the 802.
IP Traffic analyzer monitoring and sFlow reports 35 4. To launch the sFlow Configuration wizard and configure an sFlow data collector, select Configure sFlow. Selecting a report Use the report header to configure the report display. This section explains the available fields and selection options. Report list Select the type of traffic that you want to view from the list. • • • • For Layer 2 reports, select MAC, VM, or VLAN. For L3/L4 reports, select IPv4, IPv6, IPX, AppleTalk (AT), VM, or Others.
35 IP Traffic analyzer monitoring and sFlow reports How End Date/Time and Span works: Assume you have seven days of sFlow data from June 1 through 7. You want to view the first four hours of data during June 2. From the End Date/Time lists, select 6/2 for day and 4 am for time. In the Span list, select 4h. The resulting report shows four hours of data for June 2, beginning at 12 am and ending at 4 am.
IP Traffic analyzer monitoring and sFlow reports 35 • Apply rate limiting policies to a port. • Apply ACL policies to a port. Show DNS Name Select this check box if you want domain name server (DNS) names of IP addresses to be displayed on the report. Include Remaining Talkers The sFlow monitoring reports display the top five talkers and remaining talkers. To exclude any remaining talkers in the chart area, select this check box.
35 IP Traffic analyzer monitoring and sFlow reports If the Graph check box is selected, a graph appears below the report header. Data for the most current time on the report is displayed when a report is requested. The navigation arrows in the report header allow you to display the next or previous panel of the report. Refer to the “Selecting a report” on page 1077 for information on what the graph represents.
IP Traffic analyzer monitoring and sFlow reports 35 Viewing top MAC talkers The Top MAC Talkers report shows the top pairs of source and destination MAC addresses being used on the network. Follow the steps below to display the report. 1. Select Monitor > Traffic Analysis > Monitor sFlow. 2. On the Monitor sFlow dialog box, choose one of the following options: • To view a report for a product group, click the report icon for the product group you want.
35 IP Traffic analyzer monitoring and sFlow reports 4. In the Reports list, select VLAN. The report presents the following information: • • • • • VLAN - The ID of the source and destination VLANs used by the users. Ethernet QOS - The 802.1p priority tag configured on the incoming and outgoing traffic. Port - The ID of the port on which the traffic is being received and being sent. For VCS fabrics, the send and receive ports are from different devices.
IP Traffic analyzer monitoring and sFlow reports 35 5. In the next list, select All. The report provides the following information: • L3 columns - Source - The source IP addresses of the IPv4 traffic and VM hosts (Top VM Talkers reports). If enabled, host names of the IP address are shown in parentheses. - Destination - The destination IP addresses of the IPv4 traffic and VM hosts (Top VM Talkers reports). If enabled, host names of the IP address are shown in parentheses.
35 IP Traffic analyzer monitoring and sFlow reports 4. In the Reports list, select IPV4. 5. In the next list, select TCP. The report shows the following information: • IPV4 - Source - The source IP addresses of the IPv4 traffic. If enabled, host names of the IP address are shown in parentheses. - Destination - The destination IP addresses of the IPv4 traffic. If enabled, host names of the IP address are shown in parentheses.
IP Traffic analyzer monitoring and sFlow reports 35 Viewing IPv4 – top UDP talkers The Top IPV4–UDP Talkers report shows the top users of IPv4 UDP services. Complete the following steps to display the report. 1. Select Monitor > Traffic Analysis > Monitor sFlow. 2. On the Monitor sFlow dialog box, choose one of the following options: • To view a report for a device group, click the report icon for the device group you want.
35 IP Traffic analyzer monitoring and sFlow reports • Mbytes - Size of the traffic in megabytes for the time duration shown on the report. A subtotal is displayed for each of the top users. This subtotal is displayed by source and destination IP addresses. If the report is for a device group, the name and IP address of the device that the traffic accessed appear in parentheses. If the report is for an individual device, only the source and destination IP addresses appear.
IP Traffic analyzer monitoring and sFlow reports 35 • Frames - Size of the traffic in frames. • Mbytes - Size of the traffic in megabytes for the time duration shown on the report. A subtotal is displayed for each of the top users. This subtotal is displayed by source and destination IP addresses. If the report is for a device group, the name and IP address of the device that the traffic accessed appear in parentheses.
35 IP Traffic analyzer monitoring and sFlow reports Viewing other Layer 3 or Layer 4 Top Talkers The Others report under the Layer3/Layer 4 report category provides information on Layer 3 protocols excluding IPV4, IPV6, IPX, and AppleTalk services. Complete the following steps to display the report. 1. Select Monitor > Traffic Analysis > Monitor sFlow. 2.
IP Traffic analyzer monitoring and sFlow reports 35 Enabling and viewing TCP reports You can monitor TCP traffic to determine if there is any unusual activity on the network, such as TCP attacks. Identifying unusual activity will aid in understanding the nature of the traffic and the ports that are affected, so that you can take corrective actions. For example, you may decide to disable a port on which TCP attacks are being received.
35 IP Traffic analyzer monitoring and sFlow reports Complete the following steps to change these combinations. 1. Select Server > Options. The Options dialog box displays. 2. Select IP Preferences from the Software Configurations list in the Category pane. 3. Go to the SFlowDataMonitoring preferences section. 4. Click in the TCPFlags_InvalidCombos parameter field to edit the invalid bit combinations. 5. Click Apply or OK to save your work.
IP Traffic analyzer monitoring and sFlow reports 35 • IP - The source and destination IP address of the traffic and the TOS or DSCP value assigned to it. • TCP Port - The name or number of the TCP port of incoming and outgoing traffic. • User (802.1X) - Name of the user who originated the traffic and the user who received the traffic. This name is the ID the client used to gain access to the network. • Frames - Size of the traffic in frames.
35 IP traffic accounting • “Viewing IPv4 – top UDP talkers” on page 1085 • “Viewing other Layer 3 or Layer 4 Top Talkers” on page 1088 • “Viewing BGP paths report” on page 1091 Troubleshooting sFlow reports If the sFlow Monitoring report launches with an error on RedHat Linux, use the following steps to resolve. 1. Stop the server. 2. Run the command unset DISPLAY on the terminal. 3. Restart the server.
IP traffic accounting 35 FIGURE 431 Traffic Accounting dialog box 2. Use the Start Date and End Date selectors to specify the time period for the accounting report. 3. Under Port Groups, select one of the listed groups. 4. You have three options for displaying traffic accounting information: • Click Summary to view the entire accounting summary report for the selected group. • Click In Traffic to view inbound traffic on the ports in the selected group.
35 1094 IP traffic accounting Brocade Network Advisor IP User Manual 53-1002947-01
Chapter 36 Frame Monitor In this chapter • Frame Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Creating a custom frame monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Editing a frame monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Assigning a frame monitor to a port. . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Finding frame monitor assignments . . . . . . . . . . . . . . . .
36 Frame Monitor Frame types The frame type can be a standard type (for example, a SCSI read command filter that counts the number of SCSI read commands that have been transmitted by the port) or a user-defined frame type customized for your particular use.
Creating a custom frame monitor 36 Frame Monitoring requirements To configure Frame Monitoring, the following requirements must be met: • The switch must be running Fabric OS 7.0.0 or later. • Frame Monitoring requires the Advanced Performance Monitoring license and the Fabric Watch license. NOTE The Advanced Performance Monitoring license is required to configure frame monitors. The monitoring functionality requires the Fabric Watch license.
36 Creating a custom frame monitor 2. Select the Switch option. The Products / Monitors list displays the switches that support Frame Monitoring. 3. Enter the monitor data in the Configure Monitor area. 4. Select one or more switches in the Products / Monitors list, and click the right arrow button to assign the frame monitor to those switches. 5. Select the Port option. 6. Expand the switch in the Products / Ports list. The Monitors list displays all of the frame monitors defined for that switch. 7.
Editing a frame monitor 36 11. Click Start. The frame monitor configuration is applied to the switches. 12. Click Close after configuration is complete (indicated by “Completed” in the Progress column). Editing a frame monitor 1. Select Monitor > Fabric Watch > Frame Monitor. The Frame Monitor dialog box displays. 2. Select the Switch option. 3. Expand the Products / Monitors list to display the frame monitors for each switch. 4. Select a frame monitor and click the left arrow button.
36 Finding frame monitor assignments 6. Click the right arrow button to move the frame monitor to the selected ports. The Monitor Details list displays the monitors that are assigned to a selected port. If no monitors are assigned, or if more than one port is selected, the Monitor Details list does not display. 7. Click OK. The Frame Monitor Configuration Status dialog box displays. 8. Click Start. The frame monitor configuration is applied to the ports. 9.
Removing a frame monitor from a switch 36 8. Click Start. The frame monitor configuration is applied to the ports. 9. Click Close after configuration is complete (indicated by “Completed” in the Progress column). Removing a frame monitor from a switch When you remove a frame monitor from a switch, the frame monitor is automatically removed from all assigned ports in the switch. You can remove only custom frame types; you cannot remove the pre-defined frame types. 1.
36 1102 Removing a frame monitor from a switch Brocade Network Advisor IP User Manual 53-1002947-01
Chapter 37 Power Center In this chapter • Power center overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Data monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • PoE power on demand . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Schedule PoE power deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • PoE thresholds. . . . . . . . . . . . . . . . . . . . . . . .
37 Data monitoring Data monitoring Power Center enables you to view PoE data for ports and products in both table and chart formats. Viewing PoE data for products To view PoE data for a product, complete the following steps. 1. Select Monitor > Power Center. The Power Center dialog box displays. 2. Select PoE Products from the View list. FIGURE 434 Power Center dialog box 3.
Data monitoring 37 • Allocation % — The percentage of allocated capacity. For example, if the Capacity (W) is 480 W and Allocation (W) is 120 W, then the Allocation percentage is 25. Only displays when the product running agent version 7.2.2 or later. If the product is running a agent version 7.2.1 or earlier, “-“ displays. • Consumption (W) — The power consumed by all powered devices connected to the product in Watts. • Consumption % — The current power consumed as a percentage of allocated power.
37 Data monitoring 4. Review the details in the Port Data list: • • • • • • Product filter — The name of the Product. Port filter — The port identifier. Name filter — The port name. Status filter — The Ethernet status of the port. Values include: Up and Down. State filter — The Ethernet state of the port. Values include: Enabled and Disabled. Admin State filter — The PoE administrative state of the port. Values include: On (enabled) and Off (disabled). • Oper.
Data monitoring 37 4. Use the following filters to sort the Port Data list: • • • • • • • Product filter Port filter Name filter Status filter State filter Admin State filter Oper. State filter The administrative state must be On for operational state to be On. • • • • • • • • • Allocation (W) filter Consumption (W) filter Consumption % filter Type filter Class filter Priority filter Mfr. filter. Model filter Software filter 5. Click Close to close the Power Center dialog box.
37 Data monitoring FIGURE 436 Attached Devices tab of the Properties dialog box 4. Review the details in the Attached Devices tab: • POE Port Count — The number of PoE ports, that have power devices which support LLDP, connected to the selected device. • • • • • • System name — The system name of the connected device. System capabilities — The system capabilities enabled on the remote system. Enabled capabilties — The system capabilities enabled on the connected device.
Data monitoring 37 • Med Serial number — The serial number on the connected device. • Med Manufacturer — The manufacturer name on the connected device. • Med Model name — The model name on the connected device. 5. Click OK to close the Properties dialog box. 6. Click Close to close the Power Center dialog box. Viewing PoE charts To view a PoE chart, complete the following steps. 1. Select Monitor > Power Center. The Power Center dialog box displays. 2. Select Charts from the View list. 3.
37 Data monitoring FIGURE 438 Product Power Consumption Percentage bar graph Displays the power consumption percentages for all products in a bar graph using the following colors: • • • • • 0 – 20 % = Green 20 – 40 % = Blue 40 – 60 % = Yellow 60 – 80 % = Orange 80 – 100 % = Red Click a bar in the chart to display the products panel and highlight the corresponding products.
Data monitoring 37 FIGURE 440 Product Power Top Allocations stacked bar graph Displays the top five products with the highest power allocation values in Watts in a stacked bar graph. Click a bar in the chart to display the products panel and highlight the corresponding product. FIGURE 441 Product Power Top Consumers stacked bar graph Displays the top five products with the highest power consumption values in Watts in a stacked bar graph.
37 Data monitoring FIGURE 442 PoE Port Utilization pie chart Displays how many ports with PoE turned on and how many with connected devices in a pie chart using the following colors: • PoE Off = Red • PoE On - Unconnected = Blue • PoE On - Connected = Green Click the pie chart to display the products panel and highlight the All Products row. 4. Click Close to close the Power Center dialog box.
PoE power on demand 37 Configuring automatic data refresh To configure automatic refresh the PoE data, complete the following steps. 1. Select Monitor > Power Center. The Power Center dialog box displays. 2. Select the Auto refresh check box to refresh the data automatically at a specified interval. 3. Select the auto refresh interval from the Interval (min) list. Options include: 15, 30, or 60. 4. Click Close to close the Power Center dialog box.
37 PoE power on demand 3. Select a product in the PoE Product list. The selected Product’s PoE ports display in the Port Data list. The PoE operational state (On or Off) for each port displays in the Admin State column. 4. Select one or more ports and click PoE On. 5. Click Yes on the confirmation message. The Deployment Status dialog box displays, which allows you to view the progress and status of the deployment. Click Abort to stop the deployment.
Schedule PoE power deployment 37 6. Click Close to close the Deployment Status dialog box. NOTE Closing the Deployment Status dialog box does not stop deployment. The updated PoE operational state of the selected port displays in the Admin State column. 7. Click Close to close the Power Center dialog box. Schedule PoE power deployment You can define a deployment schedule on a port, product, port group, or product group.
37 Schedule PoE power deployment FIGURE 444 Schedule PoE On/Off dialog box 4. (Ports only) Select a port from the Port list. 5. Enter a name for the schedule in the Schedule Name field. 6. Enter a description for the schedule in the Description field. 7. Select the Enable check box to enable the schedule. 8. Select the PoE On option to enable PoE. 9.
Schedule PoE power deployment 37 Configuring a one-time deployment schedule To configure a one-time schedule, complete the following steps. 1. Select One Time from the Frequency list. 2. Select the time of day you want deployment to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. 3. Click the Date list to select a date from the calendar.
37 Schedule PoE power deployment Configuring a daily deployment schedule To configure a daily deployment schedule, complete the following steps. 1. Select Daily from the Frequency list. 2. Select the time of day you want deployment to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM.
Schedule PoE power deployment 37 Configuring a monthly deployment schedule To configure a monthly schedule, complete the following steps. 1. Select Monthly from the Frequency list. 2. Select the time of day you want deployment to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. 3. Select the day you want deployment to run from the Day of the Month list (1 through 31).
37 Schedule PoE power deployment Scheduling a power down deployment To schedule a power down deployment on one or more PoE-capable ports, complete the following steps. 1. Select Monitor > Power Center. The Power Center dialog box displays. 2. Select PoE Products from the View list. 3. Select a port, product, port group, or product group in the PoE Product list and click Schedule PoE On/Off. The Schedule PoE On/Off dialog box displays. 4. (Ports only) Select a port from the Port list. 5.
Schedule PoE power deployment 37 Updating a power deployment schedule To update a power deployment on one or more PoE-capable ports, complete the following steps. 1. Select Monitor > Power Center. The Power Center dialog box displays. 2. Select PoE Products from the View list. 3. Select a port, product, port group, or product group in the PoE Product list and click Schedule PoE On/Off. The Schedule PoE On/Off dialog box displays. 4. Select the schedule you want to update from the All Schedules list.
37 Schedule PoE power deployment Viewing the configured ports for a power deployment schedule To view all ports to which a power deployment schedule is configured, complete the following steps. 1. Select Monitor > Power Center. The Power Center dialog box displays. 2. Select PoE Products from the View list. 3. Select a port, product, port group, or product group in the PoE Product list and click Schedule PoE On/Off. The Schedule PoE On/Off dialog box displays. 4.
Schedule PoE power deployment 37 • Type — The type of the device connected to the port. Values include: 802.3af and 802.3at. • Class — The class of the device connected to the port. Values include: Class 0 through Class 4. • Priority — The priority of the device connected to the port. Values include: invalid, critical, high, low, medium, and other. • Mfr.. — The manufacturer of the device connected to the port. This information is obtained using LLDP neighbor details command.
37 PoE thresholds PoE thresholds Power Center enables you to define a threshold on a product or port. You cannot define a threshold on a product group or port group. You can define Product thresholds using the following measures: • PoE Capacity — The total PoE capacity of the product in Watts. NOTE PoE capacity requires the product to be running agent version 7.2.2 or later. • PoE Allocation — The amount of allocated power to the product in Watts. • Allocation % — The percentage of available capacity.
PoE thresholds 37 FIGURE 446 Thresholds dialog box 3. Choose one of the following measures: • • • • • • PoE Capacity (The product must be running agent version 7.2.2 or later.) PoE Allocation Allocation % (The product must be running agent version 7.2.2 or later.) PoE Consumption Consumption % Allocations Count (The product must be running agent version 7.2.2 or later.) 4. Select one of the following from the Conditions list: • > • < • == 5.
37 PoE thresholds 7. Select the time period to be monitored for the number of threshold events in the Interval (min) list. The time period starts with the first event and runs its full duration if the event limit is not reached. Interval values, in minutes, include: • 15 • 30 • 60 Click Refresh on the Power Center dialog box to determine if any thresholds are triggered. 8. Click Add. The new threshold displays in the All Thresholds list. 9.
PoE thresholds 37 FIGURE 447 Thresholds dialog box 3. Choose one of the following measures: • Port allocation • Port consumption • Port consumption % 4. Select one of the following from the Conditions list: • > • < • == 5. Enter the number of events that must be generated to trigger the threshold event in the Value field. The value should not exceed the capacity of the product. If you select a percentage measure, the value should be less than or equal to 100. 6.
37 PoE thresholds 7. Select the time period to be monitored for the number of threshold events in the Interval (min) list. The time period starts with the first event and runs its full duration if the event limit is not reached. Interval values, in minutes, include: • 15 • 30 • 60 8. Click Add. The new threshold displays in the All Thresholds list. 9. Select the Enabled check box of the new threshold in the All Thresholds list to enable the threshold on the product. 10.
PoE thresholds 37 Updating a PoE threshold To update a PoE threshold, complete the following steps. 1. Select Monitor > Power Center. The Power Center dialog box displays. 2. Select a product in the PoE Product list and click Thresholds. The Thresholds dialog box displays with the thresholds defined for that product. 3. Select the threshold you want to edit in the All Thresholds list. The selected threshold displays in the Thresholds Editor area. 4.
37 PoE thresholds 12. Click Refresh on the Power Center dialog box to determine if any thresholds are triggered. 13. Click Close to close the Power Center dialog box. Enabling PoE thresholds To enable PoE thresholds, complete the following steps. 1. Select Monitor > Power Center. The Power Center dialog box displays. 2. Select a product in the PoE Product list and click Thresholds. The Thresholds dialog box displays with the thresholds defined for that product. 3.
Viewing PoE performance 37 Deleting PoE thresholds 1. Select Monitor > Power Center. The Power Center dialog box displays. 2. Select a product in the PoE Product list and click Thresholds. The Thresholds dialog box displays with the thresholds defined for that product. 3. Select the threshold you want to delete and click Delete. Select more than one threshold to delete by pressing Ctrl and clicking each threshold you want to delete. 4. Click Close to close the Thresholds dialog box. 5.
37 Viewing PoE performance FIGURE 448 Real Time Power Graphs/Tables dialog box 4. Select the measures you want to include and click the right arrow button to display it on the Data Monitoring tab. Product power measures include the following: • Allocation (W) • Allocation % 5. Click the Data Monitoring tab to view a performance monitoring graph or table. • Click the Graph option to view a performance graph. The legend under the graph shows what data each color represents.
Viewing PoE performance 37 6. Click the Collection Status Summary tab to view the following information: The Collection Status Summary tab provides a high level overview of all defined collectors. The information is displayed in the following columns: • Product - Shows the product name and IP address. There maybe multiple instances of the product name for each collectible assigned to the product. • Port - The port name when a port is selected.
37 Viewing PoE performance The Real Time Power Graphs/Tables dialog box displays. FIGURE 449 Real Time Power Graphs/Tables dialog box 4. Select the measures you want to include and click the right arrow button to display it on the Data Monitoring tab. Port power measures include the following: • Allocation (W) — snAgentPoePortWattage • Consumption (W) — snAgentPoePortConsumed • Consumption % 5. Click the Data Monitoring tab to view a performance monitoring graph or table.
Viewing PoE performance 37 6. Click the Collection Status Summary tab to view the following information: The Collection Status Summary tab provides a high level overview of all defined collectors. The information is displayed in the following columns: • Product - Shows the product name and IP address. There maybe multiple instances of the product name for each collectible assigned to the product. • Port - The port name when a port is selected.
37 1136 Viewing PoE performance Brocade Network Advisor IP User Manual 53-1002947-01
Chapter 38 Policy Monitor In this chapter • Policy monitor overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Preconfigured policy monitors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Viewing policy monitor status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Viewing existing policy monitors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Adding a policy monitor . . . . . . . . . . . . . . . . . . . .
38 Policy monitor overview Fabric policy monitors Fabric policy monitors enable you to set the following policy monitors on Ethernet fabrics (refer to “Adding a policy monitor” on page 1146): • Check zoning status — This fabric policy monitor enables you to determine if zoning is enabled or disabled on the fabric. Zoning plays a key role in the management of device communication. When you enforce zoning, devices not in the same zone cannot communicate.
Policy monitor overview 38 Some devices can function as both initiator and target. If the application finds this type of device as one of the active zone members, this device port is treated as both initiator and target: - Target (storage port) — The application counts the number of initiator ports zoned to this storage port. - Initiator — The application counts this device as an initiator port for other storage ports in the same zone.
38 Policy monitor overview • Check for HTTPS (secure HTTP) configuration — This switch and router policy monitor enables you to check each target to see if HTTPS is active for device data transmission. NOTE Not supported on Network OS products and the following IronWare products: Ethernet Core routers, Ethernet Carrier Routers, Ethernet Edge router, and Data Center switch, as well as the 6650 Ethernet switch, router, and L3 router.
Policy monitor overview 38 Rule Violation Fix — If the policy monitor report shows a violation, enable SSH on the device. Disable Telnet settings on the device, if enabled. • Check for SNMPv3 (secure SNMP) configuration — This switch and router policy monitor enables you to check each target to see if SNMPv3 is active for device data transmission and SNMPv1 and SNMPv2 are not configured. NOTE For this check to pass, you must discover the products using SNMPv3 credentials.
38 Policy monitor overview Make sure to configure the host port mapping. (refer to “Host port mapping overview” on page 707) - Host adaptor discovery with 2.1 or later driver for host to unmanaged fabric connections (refer to “Host discovery” on page 103) Make sure there are Brocade HBAs on the host. - Fabric plus Host adapter discovery with 2.1 or earlier driver (refer to “Host discovery” on page 103) Make sure there are Brocade HBAs on the host.
Policy monitor overview 38 Rule Violation Fix — If the policy monitor report shows a violation, the Administrator can add redundant connections (either a host to attached fabrics or attached fabrics to a target LUN or more inter-fabric routes) to establish a complete path from host to target LUN.
38 Preconfigured policy monitors Management policy monitor The management policy monitor enables you to set a policy monitor on the Management application. Check to see if the server backup is enabled and working — This management policy monitor enables you to determine if backup is enabled for the Management application server and if the backup output directory is accessible and writable. Server backup automatically backs up the Management application database on a user-defined schedule.
Viewing policy monitor status 38 Viewing policy monitor status You can view policy monitor status from the main Management application window or from the Policy Monitor dialog box. The Management application enables you to view the policy monitor status at a glance by providing a policy monitor status icon on the Status Bar. The following table illustrates and describes the icons that indicate the current status of the policy monitor function.
38 Adding a policy monitor 2. Review the policy monitor details: • Name — The user-defined name of the policy. • Description — A description of the policy. • Alert — Select to receive e-mail alerts and have the policy monitor status icon display in the Status bar when the monitor fails or partially fails. • Frequency — The frequency (one time, hourly, daily, weekly, or monthly) at which the policy is scheduled. • Next Run — The time the policy will run again. • Last Run — The time the policy ran last.
Adding a policy monitor 38 FIGURE 451 Add Policy Monitor dialog box, Fabric Checks tab 3. Enter a user-defined name for the policy in the Name field. The name must be unique. It cannot be over 64 characters, nor can the field be empty. It cannot include asterisks. 4. Enter a description of the policy in the Description field. The description cannot be over 128 characters. It cannot include asterisks. 5.
38 Adding a policy monitor To configure weekly deployment, refer to “Configuring a weekly policy monitor schedule” on page 1153. To configure monthly deployment, refer to “Configuring a monthly policy monitor schedule” on page 1153. 6. To set policy monitors for fabrics, select the Fabric Checks tab and complete the following steps. a. Select the Check zoning status check box to determine if zoning is enabled or disabled on the fabric.
Adding a policy monitor 7. 38 To set policy monitors for switches, select the Switch/Router Checks tab (Figure 452) and complete the following steps. FIGURE 452 Add Policy Monitor dialog box, Switch/Router Checks tab a. Select one or more of the following checks in the Available Checks list to include them in the policy monitor: For more information about these checks and fixes for rule violations, refer to “Switch and router policy monitors” on page 1139.
38 Adding a policy monitor • Select the Check for SNMPv3 (secure SNMP) configuration check to check each target to see if SNMPv3 is active for device data transmission and SNMPv1 and SNMPv2 are not configured. • Select the Check for VLAN configurations match for each connection (IP only) check to determine the consistency of VLAN configurations for each connection on the selected IP devices. b. Click the right arrow button to move the selected checks to the Selected Checks list. c.
Adding a policy monitor b. 38 Enter the minimum number of connections between the host and the attached fabric in the Minimum Connections field. The default is 2. c. Select the Check for connections through two fabrics to each target LUN check box to determine if there are redundant connections between the host group and the target LUN. For more information about this check and a fix for rule violations, refer to “Host policy monitors” on page 1141. d.
38 Policy monitor scheduling Policy monitor scheduling You can schedule a policy monitor to run automatically.
Editing a policy monitor 38 3. Click OK on the Schedule Properties dialog box. To finish configuring the policy monitor, return to step 6 of “Adding a policy monitor” on page 1146. Configuring a weekly policy monitor schedule To configure a weekly schedule, complete the following steps. 1. Select Weekly from the Frequency list. 2. Select the time of day you want deployment to run from the Time (hh:mm) lists.
38 Deleting a policy monitor 4. Change the description of the policy in the Description field. The description cannot be over 128 characters. It cannot include asterisks. 5. To edit the policy monitor checks, repeat step 5 through step 9 of “Adding a policy monitor” on page 1146. 6. Click OK on the Edit Monitor dialog box. The updated policy monitor displays in the Monitors list of the Policy Monitor dialog box. 7. Click Close on the Policy Monitor dialog box.
Configuration rules 38 Predefined configuration rules The Management application provides the following predefined configuration rules: • No Interface Shutdown Rule — The rule fails when any interface (10 Gbps port or LAG) on the device shuts down. Table 107 defines the logical expressions for this rule.
38 Configuration rules TABLE 108 Port Profile Interface Rule expressions (Continued) AND/OR ( Block/Condition Name ) Details - Description/Condition/Configuration Network OS Interface Port Profiled Checks whether the interface port profiled. This condition should be used with in an interface block. Matches - Lines in any order port-profile-port End: Network OS LAG Interfaces ! Viewing configuration rule details 1. Select Monitor > Policy Monitor. The Policy Monitor dialog box displays. 2.
Configuration rules 38 • Description — A description for the rule. The description cannot be over 1024 ASCII characters. • Library list — Contains a list of predefined and user-defined conditions or blocks. You cannot modify or delete predefined conditions or blocks. For more information, about predefined conditions and blocks, refer to “Predefined conditions” on page 1167 and “Predefined blocks” on page 1173.
38 Configuration rules • Selected Conditions/Block list — Contains the logical expression of one or more conditions and blocks for the rule. The Selected Conditions/Block list contains the following details: AND/OR — To change the logical operator separator, select AND or OR from the AND/OR column. Valid values include AND and OR. The first item in a rule and the first connector in a block display empty fields and cannot be edited.
Configuration rules 38 4. Select Add > Configuration Rule. The Add Configuration Rule dialog box displays (Figure 455). 5. Enter a name for the rule in the Name field. The name cannot be over 128 characters. The only special characters allowed are an underscore (_) or space. 6. Enter a description for the rule in the Description field. The description cannot be over 1024 ASCII characters. 7.
38 Configuration rules 12. To move a condition or block down in the rule, select one condition or block (except the last item) and click Move Down. You can only move one item (condition or entire block) down at a time. If you move a condition from the first position in the rule or in a block, the logical operator (AND/OR column) is automatically populated. You can move a condition into a block by moving it between the start and end of a block.
Configuration rules 38 10. Click OK on the Add Monitor dialog box. The updated policy monitor displays in the Monitors table of the Policy Monitor dialog box. 11. Click Close on the Policy Monitor dialog box. Editing a configuration rule You can edit your own rules to compare content against a baseline. 1. Select Monitor > Policy Monitor. The Policy Monitor dialog box displays. 2. Click Edit. The Edit Monitor dialog box displays. 3. Click the Switch/Router Checks tab. 4.
38 Configuration rules Importing a configuration rule You can import user-defined configuration rules (xml format) one at a time. Imported rules must meet the following criteria: • The rule cannot have the same name as a predefined configuration rule. • The rule cannot have any invalid rule or condition parameters. • The rule cannot have any invalid block parameters. 1. From the Add Monitor or Edit Monitor dialog box, select Import from the Export list. The Import Configuration Rule dialog box displays.
Configuration rules 38 • Configuration the lines below list — Not available in the View Condition dialog box. • Configuration text box — The configuration lines with which you want to compare the product configuration. • Lines in exact order check box — Not available in the View Condition dialog box. • Remediation text box — Details how to correct the failure, if the condition fails. Remediation content displays in the Configuration Rule Report for each failed condition.
38 Configuration rules 6. Enter a user-defined name for the rule in the Name field. The name must be unique. The name cannot be over 128 characters. The only special character allowed is an underscore (_). 7. Enter a description of the rule in the Description field. The description cannot be over 1024 ASCII characters. 8. Select the backup configuration file you want to use by completing the following steps. a. Click the Product ellipsis button complete the steps in “Selecting a product” on page 1165.
Configuration rules 38 Selecting a product You can only select one product at a time. 1. From the Add Condition dialog box, click the Product ellipsis button to select a product. The Select Product dialog box displays. 2. Select a product from the Available Products list, and click the right arrow button to move the product to the Selected Product table. The Available Products list contains the same fields as the IP Product list (refer to “IP Product List” on page 294). 3.
38 Configuration rules Editing a user-defined configuration condition NOTE You cannot edit a predefined configuration condition. 1. Select Monitor > Policy Monitor. The Policy Monitor dialog box displays. 2. Click Edit. The Edit Monitor dialog box displays. 3. Click the Switch/Router Checks tab. 4. Select the configuration rule you want to edit in the Available Checks list and click Edit. The Edit Configuration Rule dialog box displays. 5. Select the user-defined condition you want to edit and click Edit.
Configuration rules 38 Predefined conditions The Management application provides predefined conditions. Table 109 lists the predefined conditions that can be used in a block or at the configuration rule level. For example, interface conditions should be used in a port or LAG interface block and SNMP conditions can be used at the rule level.
38 Configuration rules TABLE 109 Predefined conditions (Continued) Name Description Use Matches/ regular Not Matches expression Configuration Lines in exact order Network OS SNMP community strings configured check Checks whether SNMP community strings are configured. Yes Matches snmp-server community private rw snmp-server community public No IronWare OS Interface name check Checks whether the port is named or not. Yes Matches port-name.
Configuration rules TABLE 109 38 Predefined conditions (Continued) Name Description Use Matches/ regular Not Matches expression Configuration Lines in exact order RFS Radio Interface check Checks whether the specified profile is configured with Radio interfaces. This condition should be used inside the profile block. If the profile name is not specified in the configuration or if the user selects all the profiles (profile.*), then it will match against the first available profile.
38 Configuration rules 5. Select the predefined block you want to view and click Edit/View. The View Block dialog box displays. This dialog box contains the following fields and components: • • • • Name — The name of the selected block. Description — The description of the selected block. Use regular expression check box — Not available for the View Block dialog box. Block Start — The start of the selected block used to match a block start label in the device configuration.
Configuration rules 38 6. Enter a user-defined name for the block in the Name field. The name must be unique. The name cannot be over 128 characters. The only special character allowed is an underscore (_). 7. Enter a description of the block in the Description field. The description cannot be over 1024 ASCII characters. 8. Select the Use regular expression check box to use a regular expression in the Block Start field. This enables you to match one or more blocks in the device configuration. 9.
38 Configuration rules 6. Change the user-defined name for the rule in the Name field, if necessary. The name must be unique. The name cannot be over 128 characters. The only special character allowed is an underscore (_). 7. Change the description of the rule in the Description field, if necessary. The description cannot be over 1024 ASCII characters. 8. To edit a configuration block, repeat step 8 through step 10 of “Adding a configuration block” on page 1170. 9. Click OK on the Add Block dialog box.
38 Configuration rules 12. Click Close on the Policy Monitor dialog box. Deleting conditions and blocks You can only delete user-defined conditions or blocks. Before you delete a user-defined condition or block, you must remove it from any rules. 1. From the Add Configuration Rule or Edit Configuration Rule dialog box, select one or more user-defined conditions or blocks you want to delete. 2. Click Delete. 3. Click Yes on the confirmation message. 4.
38 Running a policy monitor Running a policy monitor Before you run a policy monitor, make sure your policy monitors are valid. Valid policy monitors must have at least one policy selected with one or more targets. Management checks do not require a target. To run an existing policy monitor, complete the following steps. 1. Select Monitor > Policy Monitor. The Policy Monitor dialog box displays. 2. Select the policy you want to run in the Monitors list. 3. Click Run.
Viewing a policy monitor report 38 Viewing a policy monitor report NOTE You must run the policy monitor at least once before you can view a report. To view an existing policy monitor report, complete the following steps. 1. Select Monitor > Policy Monitor. The Policy Monitor dialog box displays. 2. Select the policy for which you want to view a report in the Monitors list. 3. Click Report. NOTE If you have run this policy more than once, the latest report displays.
38 Viewing a policy monitor report Check the number of initiator ports zoned to each storage port is less than Configured_Value. This check provides the following additional detail for this check: Storage Port — WWN of the storage port. Initiator Count — Number of initiator ports zoned to the storage port. Initiator Port — WWN of the initiator port. Zone — Zone name containing the initiator/storage port zoning pair. Check zones that do not contain any online member.
Viewing a policy monitor report 38 Configuration Rule Checks — Switch checks provide the following information for each selected check: - Block/Condition Name — Name of the block or condition. - Condition Details — Details about the condition. Matched Block — Name of the matched block. Status — Whether the configurations matched (Passed) or did not match (Failed). Failed Condition — Name of the failed condition.
38 Viewing historical reports for all policy monitors Viewing historical reports for all policy monitors 1. Select Monitor > Policy Monitor. The Policy Monitor dialog box displays. 2. Click History. The Report History dialog box displays the last 10 reports run for all monitors. The Report History dialog box retains up to 10 reports for each policy monitor. • Name — Name of the policy monitor. • Date — Date and time the report was finished. • Result — Result of the policy monitor run.
Chapter 39 Fault Management In this chapter • Fault management overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Event notification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Defining filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • SNMP traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • SNMP informs . . . . . . . . . . . .
39 Event notification Restrictions The following items affect Fault Management operation. Supported IP address types The Management application receives traps and syslog messages for physical IP addresses only. Event Purging The default maximum number of days that historical events are stored is 365. You can select a different default (from 1 to 365 ) in the Options dialog box under Event Storage. Event Archiving The default number of days that purged events are archived is 30.
Event notification 39 2. Select the Enable E-mail Event Notification check box to enable the application to send e-mail messages in case of event notifications. 3. Enter the IP address or the name of the SMTP mail server that the server can use to send the e-mail notifications in the E-mail Server field. The Management application accepts IP addresses in IPv4 and IPv6 formats. The IPv4 format is valid when the operating system has IPv4 mode only or dual stack mode.
39 Defining filters Defining filters The Define Filter dialog box, shown in Figure 460, allows you to define event filters by product, event category, and severity. You can define event filters on SAN products, IP products, or hosts. Setting up basic event filtering To set up advanced event filtering on the selected events for a user, complete the following steps. 1. Select Server > Users. The Users dialog box displays. 2. Select a user in the Users list and click Edit. The Edit User dialog box displays.
Defining filters 39 6. Select the Allow Products check box to control whether or not all products are always displayed. 7. - When selected (the default), all products, even newly-added products, are added to the Selected Products to be displayed list. - If the check box is cleared, only the products listed in the Selected Products to be displayed list are shown in the Master Log and all newly-added products are added to the Available Products list.
39 Defining filters FIGURE 461 Define Filter dialog box - Advanced tab 5. Select the Start Date check box to display only the events that were logged after the specified start date. The default start date and time is the current date and time. 6. To include events in the event filter, complete the following steps. a. Select the event type you want to include from the Event Category list. All event types are listed in alphabetical order. b.
SNMP traps 7. 39 To exclude events from the event filter, complete the following steps. NOTE You can configure a maximum of ten filters to be included. a. Select the event type you want to remove from the Event Category list. All event types are listed in alphabetical order. b. Select the event column for the event from the Event Column list. All event columns are listed in alphabetical order. c. Enter all or part of the event type value in the Value Contains field. d.
39 SNMP traps Adding a trap recipient to one or more switches The SNMP Trap Recipients dialog box allows you to register any recipient as a trap recipient on selected products. You can register different recipients for different products. NOTE You can register and unregister other recipient servers on the Fabric OS switches on a per-switch basis. For IP products, you can perform registration only at the switch level. To add a trap recipient to one or more switches, complete the following steps. 1.
SNMP traps 7. 39 Click the View Recipients button to list the recipients that correspond to a selected fabric or product from the Available list. The Trap Recipients - Fabric dialog box or the Trap Recipients - IP address dialog box (depending on which product you selected) displays a list of configured recipients. 8. Click OK. The Management application registers the recipient IP address as an SNMP trap recipient.
39 SNMP traps FIGURE 463 SNMP Trap Forwarding dialog box Adding a trap destination The Add Trap Destination dialog box allows you to configure destinations for forwarding SNMP traps. To add a trap destination, complete the following steps. 1. Select Monitor > SNMP Setup > Trap Forwarding. The SNMP Trap Forwarding dialog box, shown in Figure 463, displays. 2. Select the Enable trap forwarding check box. 3. Click Add in the Destinations area of the SNMP Trap Forwarding dialog box.
SNMP traps 39 FIGURE 464 Add Trap Destination dialog box 4. Enter a general description of the trap destination in the Description field. 5. Enter the IP address of the trap destination in the IP Address field. This is a mandatory field. IPv4 and IPv6 addresses are accepted, but a DNS name is not accepted. 6. Enter the SNMP trap listening port of the recipient in the Port # field. This is a mandatory field. Valid numeric values range from 1 through 65535.
39 SNMP traps FIGURE 465 Add Trap Filter dialog box 3. Enter a unique name for the trap filter in the Filter Name field. 4. Enter a general description of the trap filter in the Description field. 5. Select the Forward Application Messages check box to forward application events. 6. Select the Forward pseudo events check box to forward pseudo events. 7. Select a severity level from the Severity pulldown menu. The severity level can be one of the following, and appear in descending order of severity.
SNMP traps - 39 Info Debug Traps with the selected severity and those with higher severity levels are forwarded. For example, by default, Critical severity is selected. Therefore, traps with Critical, Alert, and Emergency severity levels are forwarded. To have all traps forwarded, select Debug, the lowest severity level. 8. Select the SAN, IP, or Hosts tab. Depending on the tab selected, the products available to which you can add a trap filter display in the Available Products list. 9.
39 SNMP traps FIGURE 466 Event Reception dialog box - Trap Credentials tab By default, the Management application receives SNMP v1 and v2c traps from IronWare OS and Network OS IP products that have any SNMP community strings. You can accept or restrict SNMP v1 and v2c traps by selecting one of the following check boxes in the Event Reception dialog box: • Do not accept SNMP v1/v2c traps Use this option to turn off receiving SNMP v1 and v2c traps.
SNMP traps TABLE 111 39 SNMP security and authentication SNMP credential type Privacy protocol Authentication Result v1 No authentication No privacy protocol Community string Uses a community string to match for authentication. v2c No authentication No privacy protocol Community string Uses a community string to match for authentication. v3 No authentication No privacy protocol User name Uses a user name to match for authentication.
39 SNMP traps 5. Select an authentication protocol from the Auth Protocol list. You can select -None-, HMAC-MD5, or HMAC_SHA. HMAC_MD5 is the default. If you select no authentication, the Management application uses the user name to match for authentication. 6. Type a password in the Auth Password field and re-type the password in the Auth Confirm Password field. 7. Select a privacy protocol from the Priv Protocol list. You can select -None-, CBC_DES, or CFB_AES_128.
SNMP traps 39 To add the MIB file that contains the trap you want to register to mibs_to_compile.txt, complete the following steps. 1. Go to \conf\mibs\ (Windows) or /conf/mibs/ (UNIX) directory and copy the MIB file into that directory. You may want to copy the MIB into a subdirectory of that directory. 2. In the \conf\mibs\ (Windows) or /conf/mibs/ (UNIX) directory, search for the mibs_to_compile.txt file. 3.
39 SNMP traps Registering traps Traps must be registered in the Event Reception dialog box to make them available. To register traps, complete the following steps. 1. Select Monitor > SNMP Setup > Event Reception. 2. Click the Trap Configuration tab. The Trap Configuration tab of the Event Reception dialog box, shown in Figure 469, displays. The Registered and Not Registered buttons at the top of the Traps tree serves as a filter for the traps.
SNMP traps - Information about the trap - Recommended action specified by the user 39 Any variable bindings (varbinds) that the trap uses. Information about the varbind, its name, OID, and type, is displayed 5. Enter the following information: a. Select the severity level you want to assign to the trap from the Severity list. If you do not select a severity, it defaults to Emergency. b. Enter the message you want to display for this trap in the Message field.
39 SNMP informs 4. Select a trap to display its current definition. You can change the severity, message, or alias of the trap. 5. When you have finished, click OK or Apply to accept your entries. If you modified a default trap, its status changes from Registered - Default to Registered Customized. Reverting the customization of a registered trap to default To revert to the default definitions of registered-customized traps, complete the following steps. 1. Click the Trap Configuration tab. 2.
Syslogs 39 3. Select a product in the SNMP Informs Capable Products list and click the appropriate Action button, depending on whether you want to enable or disable SNMP informs for that product. 4. Click OK. Syslogs Use the Options dialog box to automatically register the Management application server as the syslog recipient on all managed SAN and IP products. The syslog listening port number is 514 by default. If you change the port number from 514, auto-registration is disabled.
39 Syslogs 2. Select Add from the Action list. 3. Enter the IP address of the syslog port (the recipient server) in the Recipient IP Address field. This is a mandatory field. IPv4 addresses are accepted, but a DNS name is not accepted. 4. Enter the syslog port of the recipient in the Recipient Port field. Valid numeric values range from 1 through 65535. The default value is 514. NOTE For IronWare products, a non-default port can be registered.
Syslogs 39 FIGURE 471 Syslog Forwarding dialog box 2. Select the Enable syslog forwarding check box. 3. Click Add. The Add Syslog Destination dialog box, shown in Figure 472, displays. The Enable and Syslog Repeater check boxes are selected by default. FIGURE 472 Add Syslog Destination dialog box 4. Enter a general description of the syslog destination in the Description field. 5. Enter the IP address of the syslog destination in the IP Address field. This is a mandatory field.
39 Syslogs 6. Enter the syslog listening port of the recipient in the Port # field. This is a mandatory field. Valid numeric values range from 1 through 65535. The default is 514. 7. Select the Enable check box to enable syslog forwarding to this recipient. 8. Select the Syslog Repeater check box if you want to forward all syslogs, whether the source is managed or unmanaged. If the Syslog Repeater check box is unselected, syslogs from the managed products are sent to the server.
Syslogs 39 6. (Optional) For additional filtering, enter a text string using from 1 through 512 characters or wild card symbols in the Regular Expression field. The regular expression is used to describe a pattern in text. You can use an asterisk (*) to indicate a wildcard, as in the following examples: 7. *cdef: Matches a message ending with cdef abc*: Matches a message beginning with abc *abc*: Matches a message that contains abc Select a severity level from the Severity pulldown menu.
39 Event action definitions Event action definitions To reduce the amount of events being logged in the Management application database, the Event Actions dialog box allows you to control what events the Management application monitors, on which products they are to be monitored, how often they are to be monitored, and what to do when the monitored events are generated. This information can be defined by creating an event action definition.
Event action definitions 39 3. Enter a name and description for the event action and select the Enabled check box. 4. Click Next to advance to the Events pane. Selecting an event for an event action To select an event for an event action, complete the following steps. 1. Select Monitor > Event Processing > Event Actions. The Event Actions dialog box displays. 2. Click Next to advance to the Events pane. By default, the Events pane of the Add Event Action dialog box displays, shown in Figure 475.
39 Event action definitions 4. By default, all traps are listed in the Available Traps list, under the folders for the MIB to which they belong. You can limit the list by doing any of the following: - Click one of the following buttons: • MIB Information, if you want the default SNMP name for the traps to be displayed. • MIB Alias, if you want the aliases for the traps to be displayed. - Use the Trap Filter tool to limit the trap list to the trap severities you want.
Event action definitions 39 FIGURE 476 Available Varbinds and Selected Varbinds lists 3. Select the varbind you want to include in the configuration and click the right arrow button to move it to the Selected Varbinds list. If you selected more than one trap and those traps have the same varbinds, then their varbinds are listed in the Available Varbinds list. However, if the traps you selected have different varbinds, the Available Varbinds list is empty. 4.
39 Event action definitions Selecting source address products and ports The Sources pane of the Add Event Action dialog box, shown in Figure 477, allows you to enter the IP address, the world wide name, or the name of the source to use as event senders. Alternatively, you can select source address products to use as event senders from the available list of sources. You can select from the available list of SAN products, IP products, or hosts by selecting the appropriate tab.
Event action definitions 7. 39 Select the event senders you want from the Available Sources list, then click the right arrow button to move them in the Selected Sources list. - If you selected a non-IronWare OSNetwork OSproduct as the source, that product can send e-mail alerts only. - If you selected Pseudo Events from the Events pane of the Add Event Action dialog box, and there is only one pseudo event available, double-click the pseudo event in the Available Sources list.
39 Event action definitions To configure the event action policies, complete the following steps. 1. Click Take actions for the selected events when they occur (default) if you want the action to be triggered each time the selected events occur. 2. Click Take actions for the selected events based on below criteria if you want the action to be triggered only when the occurrence of the event meets the specified criteria.
Event action definitions 39 Editing event actions The Action Group - Actions pane of the Edit Event Action dialog box, shown in Figure 479, defines what action the Management application takes when the criteria are met. FIGURE 479 Action Group - Actions pane of the Edit Event Action dialog box To configure the policies for the event action, complete the following steps. 1.
39 Event action definitions 2. Select the Auto Acknowledge check box to suppress events without being in troubleshooting mode. Activating this also helps to avoid cluttering Master Log with unwanted messages without modifying filters. NOTE Auto Acknowledge is enabled only when Take actions for the selected events when they occur is selected in the Policy step of the Event Actions Wizard.
Event action definitions 39 11. You can either select an existing CLI configuration or create a new one and select that configuration. After selecting a CLI configuration, the name of the CLI configuration is displayed in the Selected Configuration field. - Has Parameters - Displays Yes if the CLI configuration has parameters that require values to be entered before it can be deployed, and displays No if no parameter needs to be defined.
39 Event action definitions 15. From the Transformation column, specify what you want Event Processor to do with the value in the attribute: - None — Event Processor only reports the occurrence of the product. - Find Intruder MAC — Find the product with the IP address in the attribute that matches the intruder MAC address and deploy the CLI configuration to that product. - Find Port — Find the port on a product with the IP address in the attribute and deploy the CLI configuration to that port.
Event action definitions 39 Acknowledging special events When the Management application receives and processes events selected as special events, the following status bar icon displays: FIGURE 480 Status bar with highlighted special events icon To configure special event acknowledgements, complete the following steps. 1. Click the special events icon to launch the Special Events dialog box, shown in Figure 481.
39 Event action definitions Configuring event action e-mail settings The Action Group - E-Mail Settings pane of the Add Event Action dialog box, shown in Figure 482, allows you to select e-mail recipients from a list, add new e-mail recipients, and compose e-mail messages. FIGURE 482 Action Group - E-Mail Settings pane of the Add Event Action dialog box To configure the e-mail settings for the event action, complete the following steps. 1.
Event action definitions 39 5. If you want an epilogue to be placed at the end of the e-mail message, enter up to 255 characters in the Body Epilogue field. NOTE The prologue, the event action message, and the epilogue form the body of the e-mail alert. 6. Click Finish. The Summary pane of the Edit Event Action dialog box displays an overview of the e-mail configuration you are creating. 7. Review your entries and take one of the following actions: - Click Finish to approve the configuration.
39 Event action definitions 3. Click Edit to display the Edit Event Action dialog box. 4. Make the changes you want to make to the definition. You can perform this action in any of the panes of the Add Event Action dialog box. 5. Click Finish to save your definition. Deleting an event action definition To delete an event action definition, complete the following steps. 1. Select Monitor > Event Processing > Event Actions. The Event Actions dialog box displays. 2.
Event action definitions 39 2. Click the Import Snort® Rule button. The Import Snort® Rule File dialog box displays, shown in Figure 484. FIGURE 484 Import Snort® Rule File dialog box 3. Enter the complete path of the Snort rule file located on the Syslog server. 4. Click OK to import the Snort rules. 5. While still in the Add Event Action dialog box, continue to click Next until you advance to the Action Group - Actions pane. 6.
39 Pseudo events Pseudo events A pseudo event is a combination of different SNMP traps that you decide would constitute a single event. For example, there are two separate SNMP traps for link up and link down occurrences. You might decide that these two occurrences should be just one event. Displaying pseudo event definitions To display the properties of a pseudo event definition, complete the following steps. 1. Select Monitor > Event Processing > Pseudo Events.
Pseudo events 39 Setting pseudo event policies The Policy pane of the Add Pseudo Event dialog box, shown in Figure 486, allows you to create escalation, resolve, and flapping policies for the pseudo event, and then specify the time duration for each of these policies in minutes or seconds. FIGURE 486 Policy pane of the Add Pseudo Event dialog box To create policies for a pseudo event definition, complete the following steps. 1.
39 Pseudo events 3. Click the Flapping button to create a flapping policy, and then enter the number of occurrences and the duration of time before the Management application performs the action specified in an event action. Specify the number of flapping times in minutes or seconds. The flapping policy checks to see if the event consistently transitions between two opposite states during a specified length of time. If it does, then the specified action in the definition is performed.
Pseudo events 39 FIGURE 487 Events pane of the Add Pseudo Event dialog box 3. From the Available Traps list, select the trap for the down state of a product or interface. By default, all traps known to the Management application are included in the Available Traps list, which is a list of all traps that are available based on the MIB and filter criteria. 4. Select a trap for the Selected Down Trap list and a trap for the Selected Up Trap list. You cannot select the same trap for up and down conditions.
39 Pseudo events Creating a pseudo event definition by copying an existing definition You can create a pseudo event definition by copying an existing definition. To create a pseudo event definition by copying an existing definition, complete the following steps. 1. Select Monitor > Event Processing > Pseudo Events. 2. Select the pseudo event definition that you want to copy from the Pseudo Events list. 3. Click the Duplicate button. The Pseudo Events dialog box, shown in Figure 485, displays.
Pseudo events 39 4. Click Yes to delete the selected definition. The definition is removed from the Pseudo Events list. Adding a pseudo event on the escalation policy Use the escalation policy to be notified if a critical event occurs on a product, port, or system. When the event occurs, the escalation policy waits for a duration of time to see if the event remains in that state. If it does, then the specified action in the definition is performed.
39 Pseudo events Creating an event action with a pseudo event on the escalation policy To create an event action with a pseudo event on the escalation policy, complete the following steps. 1. Select Monitor > Event Processing > Event Actions. The Event Actions dialog box displays. 2. Click Add to display the Identification pane of the Add Event Action dialog box. 3. Enter a name and description for the event action and select the Enabled check box to enable the event. 4.
Pseudo events 39 17. If you want an epilogue to be placed at the end of the e-mail message, enter up to 255 characters in the Body Epilogue field. NOTE The prologue, the event action message, and the epilogue form the body of the e-mail alert. 18. Click Next to advance to the Summary pane. 19. Click Finish. The Summary pane of the Add Event Action dialog box displays an overview of the e-mail configuration you are creating.
39 Pseudo events Creating an event action with a pseudo event on the resolving policy To create an event action with a pseudo event on the resolving policy, complete the following steps. 1. Select Monitor > Event Processing > Event Actions. The Event Actions dialog box displays. 2. Click Add to display the Identification pane of the Add Event Action dialog box. 3. Enter a name and description for the event action and select the Enabled check box to enable the event. 4.
Pseudo events 39 Adding a pseudo event on the flapping policy The flapping policy checks to see if the event consistently transitions between two opposite states during a specified length of time. If it does, then the specified action in the definition is performed. The following two-part procedure uses both the Add Pseudo Events dialog box and the Add Event Actions dialog box to create an event action with the flapping policy. To add a pseudo event on the flapping policy, complete the following steps. 1.
39 Pseudo events 6. Select the pseudo event you created and click Next. The Sources pane of the Add Event Action dialog box displays. 7. Select the source that you will use to monitor this event from the Selected Sources list. 8. Click Next to advance to the Policy pane of the Add Event Action dialog box. The Policy pane of the Add Event Action dialog box displays. 9. Click the Take actions for the selected events when they occur button if you want to take action for the selected events when they occur.
Event custom reports 39 14. Select the Apply as a Logging Policy check box to indicate whether or not you want the event occurrence to be logged in the Management application database: - Select Log to log the occurrence in the Management application database. Select Drop to not log the occurrence in the Management application database. 15. Click Next to advance to the Summary pane. 16. Click Finish. For more information about adding an event action, refer to “Event action definitions” on page 1204.
39 Event custom reports Defining report settings You can configure report settings so that you see only a restricted set of information in a report. NOTE You can change the number of displayed event custom report records by following the procedure in “Configuring custom report preferences” on page 168. By default, 1000 records display, even if the event count is greater than 1000. NOTE You must first enter a name and title on the Identification tab before you can run the result settings.
Event custom reports 39 NOTE The Available Column list lists the attributes you can include in the report. Each attribute represents a column on the report. 5. Select the attribute you want, then click the right arrow to move your selection to the Selected Columns list. To remove an attribute from the Selected Columns list, select the attribute that you want to remove, then click the left arrow button.
39 Event custom reports FIGURE 490 Add/Edit Report Definition dialog box - Identification tab 5. In the Name field, enter a name for the definition. This name appears under the Name column on the Report Definitions tab of the Event Custom Reports dialog box. This name must be unique for each report group. This is a required parameter. 6. In the Title field, enter a title for the definition, which will be used as the title of a generated report. This is a required parameter. 7.
Event custom reports 39 10. Select the roles that will have view and run access to this definition, then press the right arrow button to move the role in the Selected Roles list. All Management application users who have the selected roles will be able to view, copy, and run the definition. NOTE You can share the available users definition with specific Management application users.
39 Event custom reports FIGURE 491 Add/Edit Report Definition dialog box - Product tab 4. Click the Filter tab. The Add/Edit Report Definition dialog box - Filter tab, shown in Figure 492, displays.
Event custom reports 39 5. To limit the search results to traps, syslog, and pseudo event messages with a specific text string, enter the text string in the Description field. You can use an asterisk (*) to indicate a wildcard, as in the following examples: - *cdef: Matches a message ending with cdef abc*: Matches a message beginning with abc *abc*: Matches a message that contains abc For example, if you want to find the events that have the text “Auth” in the message, enter “*Auth*”.
39 Event custom reports FIGURE 493 Add/Edit Report Definition dialog box - Time Settings tab 4. Choose between relative time (the default) and absolute time. - Click Relative Time if you want to filter traffic based on when the report is generated, and then select a relative time from the Range list. Relative time is calculated based on the date and time the report is generated. - Click Absolute Time if you want to filter traffic sent at a specific date and time. a.
Event custom reports 39 Creating a new report definition by copying an existing definition The simplest way to create a new report definition is by copying an existing definition. To create a new report definition is by copying an existing definition, complete the following steps. 1. Select the definition you want to copy from the Report Definitions tab of the Event Custom Reports dialog box. 2. Click Duplicate.
39 Event custom report schedules Deleting a report definition You can delete a report definition, but only if it belongs to you. To delete a report definition, complete the following steps. 1. To access the dialog box, select Reports > Event Custom Reports. The Event Custom Reports dialog box displays. 2. Click the Report Definitions tab of the Event Custom Reports dialog box and select the definition you want to delete. 3. Click the Delete button.
Event custom report schedules • • • • 39 Duplicate — Creates a copy of the selected report schedule. Delete — Deletes the selected schedule from the Schedules list. Enable — Enables the selected schedule. Disable — Disables the selected schedule.
39 Event custom report schedules 7. Select one of the following periods from the Frequency list: - One Time - Daily — If you selected Daily as the schedule type, Time (hh:mm) appears. - Monthly — If you selected Monthly as the schedule type, Day of the month appears. Select the day of the month when the report will be generated. - Yearly — If you selected Yearly as the schedule type, Day of the year appears. Select the day of the year when the report will be generated.
Event logs 39 Event logs You can view all events that take place through the Master Log at the bottom of the main window. You can also view a specific log by selecting an option from the Logs submenu of the Monitor menu. The logs are described in the following list: • Audit Log — Displays all Application Events raised by the application modules and all Audit Syslog messages from the switches and Brocade HBAs.
39 Event logs 3. Right-click one of the selected rows and select Copy Rows. 4. Open the application to which you want to paste the data. 5. Click where you want to paste the data. 6. Press CTRL+V (or select Edit > Paste from the other application). All data and column headings are pasted. 7. Click Close to close the dialog box. Copying an entire log entry You can copy data from logs to other applications. Use this method to analyze or store the data using another tool.
Event logs 39 E-mailing all event details from the Master Log NOTE You must configure e-mail notification before you can e-mail event details from the Master Log. To configure e-mail notification, refer to “Configuring e-mail notification” on page 1180. To e-mail all event details from the Master Log, complete the following steps. 1. Right-click an entry in the Master Log. 2. Select E-mail > All. The E-mail dialog box displays. 3.
39 Event logs TABLE 112 Event Properties Event Field Description Probable Cause The most likely reason the event occurred. Description A description of the event. Count Number of times this event occurred on the host. Origin The event’s origin, for example, SNMP trap. Message ID The message associated with the event. Port Name The port name associated with the event. First Event Server Time The time the event occurred. Fabric Name The VCS fabric name.
Event logs 39 Copying part of the Master Log You can copy data from logs to other applications. Use this method to analyze or store the data using another tool. To copy part of the Master Log, complete the following steps. 1. Select the rows you want to copy in the Master Log: - To select contiguous rows, select the first row you want to copy, press Shift, and click the contiguous row or rows you want to copy.
39 Event logs Filtering events in the Master Log You can filter the events that display in the Master Log on the main window. By default, all event types display in the Selected Events list. When you select a filter from the Filter drop-down menu, the Master Log refreshes to display the events associated with that filter. This filter setting is kept when you exit the client. For more information about the Master Log, refer to “Master Log” on page 297.
Event logs 39 3. Use the following to include or exclude products. - To include an event type in the filter, select the event from the Available Products list and click the right arrow. - To exclude an event type from the filter, select the event from the Selected Products to be displayed list and click the left arrow. - To include all products, select the Allow All Products check box. 4. Select from the following to include or exclude event types.
39 Event logs The ‘none’ filter The filter named none is the default configuration filter. You cannot to edit or delete this filter. Selecting this filter lets you view Master Log events with no filtering applied. This is the default filter selected when no other filter is applied by the user or when there is no migrated filter. Editing a Filter To edit a filter, select the filter you want to edit in the Filters panel and make the desired changes to the filter configuration.
Chapter Packet Capture (Pcap) 40 In this chapter • Configuring packet captures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1251 Configuring packet captures Organizations can configure switches as sensors to capture packets through the embedded sFlow capability and send them back to the Management application, which acts as an sFlow collector. The Management application then converts the sFlow data to Pcap format, which is understood by a variety of open source products.
40 Configuring packet captures 5. Enter the full path of the command that will be invoked to launch the PCAP-aware tool into the Pcap Tool Location text box. For example, if SNORT is installed under the C:\\SNORT\ directory, enter the following commands to launch SNORT: C:\\SNORT\bin\SNORT.exe -c C:\\SNORT\etc\SNORT.conf -Xeds -K none 6. Specify the working directory for the PCAP-aware tool in the Working Directory text box.
Chapter Technical Support 41 In this chapter • Server and client support save. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1253 • Device technical support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1257 Server and client support save You can use Technical Support to collect SupportSave data for the Management server and clients.
41 Server and client support save 4. Select the Include Database check box to include the database in the support save and choose one of the following options. • Select the Partial (Excludes historical performance data and events) option to exclude historical performance data and events from the database capture. • Select the Full option to capture the entire database. Clear the Include Database check box to exclude the database in the support save. 5.
Server and client support save 41 4. Enter a file name for the server support save file in the File Name field. The default file name is DCM-SS-Time_Stamp. 5. Select the Include Database check box to include the database in the support save and choose one of the following options. • Select the Partial (Excludes historical performance data and events) option to exclude historical performance data and events from the database capture. • Select the Full option to capture the entire database.
41 Server and client support save Client support save using a command line interface Use the following procedures to capture client support save files through the command line interface (CLI). Capturing client support save using the CLI (Windows) To capture client support save files through the CLI, complete the following steps. 1. Go to the following location: • (Local client) User_Home/Management_Application_Name/localhost • (Remote client) User_Home/Management_Application_Name/Server IP 2.
Device technical support 41 Device technical support You can use Technical Support to collect SupportSave data (such as, RASLOG, TRACE and so on) and switch events from Fabric OS, IronWare, and Network OS devices. To gather technical support information for the Management application server, refer to “Capturing technical support information” on page 405. Scheduling technical support information collection You can capture technical support and event information for up to 50 devices.
41 Device technical support FIGURE 499 Technical SupportSave dialog box, Schedule tab 3. Select the Enable scheduled Technical Support Data check box. 4. Select how often you want the scheduled collection to occur from the Frequency list. 5. Select the start date for the scheduled collection from the Start Date list. This list is only available when you select Weekly or Monthly from the Frequency list. 6. Select the time you want the scheduled collection to begin from the Start Time Hour and Minute lists.
Device technical support 41 • Contact — The primary contact at the customer site. • Description — A description of the customer site. • Role — A description of the customer site. a. Right-click in the Available IP Products table and select Expand All. b. Select the products you want to collect data for in the Available IP Products table and click the right arrow to move them to the Selected Products and Hosts table.
41 Device technical support a. Right-click in the Available Hosts table and select Expand All. b. Select the products you want to collect data for in the Available Hosts table and click the right arrow to move them to the Selected Products and Hosts table. The Selected Products and Hosts table displays the following information: IP Address — The IP address of the selected product or host. For VCS-enabled product’s, the IP address of the selected node. Name — The name of the selected product or host.
Device technical support 41 To capture technical support and event information for specified devices, complete the following steps. 1. Select Monitor > Technical Support > Product/Host SupportSave. The Technical SupportSave dialog box displays. 2. Click the Generate Now tab, if necessary. FIGURE 500 Technical SupportSave dialog box, Generate Now tab 3. Click the IP Products tab, if necessary, and complete the following steps. a. Right-click in the Available IP Products table and select Expand All. b.
41 Device technical support Technical SupportSave data for Network OS products in either standalone or VCS mode are saved to the following directory: Install_Home\data\ftproot\technicalsupport\ipproducts\NOS Technical SupportSave uses the following naming convention for the VCS-enabled Network OS device support save files: IPProd-Fabric_Name-Seed_Switch_IP-Time_Stamp\IPProd-Fabric_Name-Product_NameProduct_IP-Time_Stamp A consolidated fabric zip file is created only in the when the Management application i
Device technical support 41 Viewing the technical support repository You can only view technical support save files that are captured in the default location. Table 113 details the default locations for the technical support save files.
41 Device technical support Saving technical support information to another location To save technical support information to a location other than the default, complete the following steps. 1. Select Monitor > Technical Support > View Repository. The Technical Support Repository dialog box displays. 2. Select a device support save file and click Save. The Save dialog box displays. 3. Browse to the location where you want to save the support file. 4. Click Save on the Save dialog box. 5.
Device technical support 41 Copying technical support information to an external FTP server NOTE You cannot copy technical support information to an external FTP server collected from the remote client. To copy the SupportSave data located in the built-in FTP server to an external FTP server, complete the following steps. 1. Select Monitor > Technical Support > View Repository. The Technical Support Repository dialog box displays. 2. Select the file you want to copy in the table. 3.
41 1266 Device technical support Brocade Network Advisor IP User Manual 53-1002947-01
Chapter 42 Reports In this chapter • Reports overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Viewing IP reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Exporting and saving IP reports to a file . . . . . . . . . . . . . . . . . . . . . . . . . • Exporting IP reports to e-mail recipients . . . . . . . . . . . . . . . . . . . . . . . . . • IP report contents . . . . . . . . . . . . . . . . . . . . . . . . . .
42 Viewing IP reports Viewing IP reports Reports are available from the Reports menu. You must have the Reports privilege to access the reports. For more information about privileges, refer to “User Privileges” on page 1321. • Click the Reports button on the menu bar to display the report options. • Click a report option to display the report that you want. NOTE ATM ports are not displayed in the reports. The ATM module may appear in the reports, but the modules will be listed as having no ports.
IP report contents 42 FIGURE 501 Report via E-Mail dialog box 2. Click the ellipsis button next to the E-mail Recipients field. The Users dialog box displays. 3. Select the preconfigured e-mail user account from the list and click OK. 4. Enter additional e-mail addresses in the Other Recipients field. 5. Enter text in the Subject field to change the subject of the e-mail. 6. Enter text in the Body field to send a message with the report. 7. Click Send to send the report.
42 IP Wired Products report IP Wired Products report The Wired Products report displays general and detailed configuration information about wired products that are under the management server. The information on the report comes from the software image version that is in the management application for that product. To ensure that the latest configuration information is in the management application, run the discovery process or resynchronize the product.
IP Wired Products report TABLE 114 42 Wired Products report fields and components (Continued) Field/Component Description Serial Number The serial number of the product. Admin Status The administrative status of the product. Possible status includes: Normal — The product is in normal operating mode. Troubleshooting — The product is in troubleshooting mode. • • Model The model of the product. Firmware The firmware level of the product. Contact The contact name for the product.
42 IP Wired Products report Detailed Product Report To view the details of a Wired Products report, click the name of a wired product in the Wired Products report. To launch the Detailed Product Report from the topology, right-click the product on the Network Objects, L2 Topology, Ethernet Fabrics, IP Topology, or VLAN Topology view and select Detailed Report. NOTE This report is not available for VCS clusters. The Detailed Product Report displays (Table 115).
IP Wired Products report TABLE 115 42 Detailed Product Report fields and components (Continued) Modules Module information shows what modules are installed on the product. Unit/Slot Number — For products that support stacking, you can view the unit number and slot number. Slot Number — For products that do not support stacking, you can view the slot number. • Type — For wireless products, the type shows the model name of the product. For wired products, the type of module installed in the slot.
42 IP Wired Products report TABLE 115 Detailed Product Report fields and components (Continued) Cluster Peer (MCT switches only) 1274 Cluster peer information for a Multi-Chassis Trunk (MCT) switch. Information includes: Peer Product — The name and IP address of the MCT peer product. Peer IP Address — The VE interface IP address of the MCT peer. Peer RBridge ID — The RBridge ID of the MCT peer. ICL Name — The name of the ICL used to reach the MCT peer.
IP Wired Products report TABLE 115 42 Detailed Product Report fields and components (Continued) AP List Count Brocade Network Advisor IP User Manual 53-1002947-01 Access Point information for wireless controllers. The table title includes the number of access points attached to the selected device. Information includes: • Product Status — Whether the AP is online (green icon), offline (red icon), or pending adoption (gray icon). • Name — The device name used to identify AP.
42 IP Wired Products report Detailed Cluster Report NOTE This report is only available for VCS clusters. To launch the Detailed Cluster Report from the topology, right-click the VCS cluster on the Network Objects, L2 Topology, Ethernet Fabrics, IP Topology, or VLAN Topology view and select Detailed Report. The Detailed Cluster Report displays (Table 116).
IP Wired Products report TABLE 116 42 Detailed Cluster Report fields and components (Continued) Admin Status Modules IP Addresses Ethernet Ports FC Ports Brocade Network Advisor IP User Manual 53-1002947-01 Admin status information includes the following: Name — The name of the product. Click the name of a product to launch the Detailed Product Report. • Status — Whether the product is in normal operating mode or troubleshooting mode. • Status Last Updated — When the last status update occurred.
42 IP Module report TABLE 116 Detailed Cluster Report fields and components (Continued) Physical Ports Realtime The name of the device with drill-down support. When you click on the name, the “IP Physical Ports - Realtime report” launches (refer to “IP Physical Ports - Realtime report” on page 1282). Physical Media Realtime The name of the device with drill-down support.
IP Port VLANs report 42 IP Port VLANs report A list of port VLANs configured on IronWare or third-party products is available in the Port VLANs report. Lists of protocol VLANs are available in the port VLAN structure. For IronWare and Network OS products, these reports reflect the VLAN information available in VLAN Manager. To access the Port VLANs report, select Reports > VLANs. To display information about a VLAN, click its ID. The Port VLANs report has the parameters described in Table 118.
42 IP Subnet report IP Subnet report The IP Subnet report displays the list of IP subnets discovered on the network. To appear on this list, the subnet must contain at least one discovered product. To view the IP Subnet report, select Reports > IP Subnet Reports. The IP Subnet report has the parameters described in Table 120. TABLE 120 IP Subnet report fields and components Field/Component Description IP Address The list of IP subnets discovered on the network.
IP Address report 42 IP Address report The IP Address report displays all discovered IP addresses of wired products on the network. To view the IP Address report, select Reports > IP Address Report. The IP Address report has the parameters described in Table 122. TABLE 122 IP Address report fields and components Field/Component Description IP Address The IP address of the product, access point, or interface. These addresses are in numerical order. Click to launch the Web Element Manager.
42 IP Physical Ports - Realtime report IP Physical Ports - Realtime report The Physical Ports - Realtime report shows the status of physical interfaces of products that have been discovered on the network. To display the report, choose one of the following options; • Right-click the device in the IP Products dialog box and select Physical Ports Report. • Right-click the device on the Network Objects, L2 Topology, Ethernet Fabrics, IP Topology, or VLAN Topology view and select Physical Ports Report.
IP Physical Media - Realtime report 42 IP Physical Media - Realtime report The Physical Media - Realtime report shows the port optics (SFP) details of Network OS devices. To display the report, complete the following steps. 1. Right-click the device on the topology and select Detailed Report. 2. Click the device name in the Physical Media - Realtime table. The Physical Media - Realtime report has the parameters described in Table 126.
42 IP Deployment reports IP Deployment reports Deployment reports provide information about deployments performed from the Management application. These deployments include device configuration deployments, software image backups, Realm Manager deployments, and configuration backups. The reports are available in case administrators want to know whether a deployment succeeded or failed. Deployment reports are not available for third-party devices. Viewing a deployment report 1.
Reports Template Manager overview 42 Reports Template Manager overview The Report Template Manager enables you to run, import, export, or delete preconfigured and user-defined reports. Preconfigured reports The Management application provides four preconfigured reports: • Products List — This report displays general and detailed configuration information about products discovered by the Management application. For more information, refer to “IP Wired Products report” on page 1270.
42 Reports Template Manager overview Accessing the Report Template Manager 1. Select Reports > Report Manager. The Report Template Manager dialog box displays (Figure 503). FIGURE 503 Report Template Manager dialog box The Report Template Manager dialog box includes the following fields and components: • Report Templates table — Lists all reports. Title — The title of the report, which must be unique. File — The file name of the report, which must be unique.
Reports Template Manager overview 42 Viewing a report 1. Select Reports > Report Manager. The Report Template Manager dialog box displays. 2. Select the report you want to run in the Report Templates table. 3. Click Run. If one or more parameters are required for the report, the Parameter dialog box displays (Figure 504). FIGURE 504 Parameter dialog box 4. Enter the parameters (such as IP address, source port name, or destination port name). NOTE The parameter fields cannot be empty.
42 Reports Template Manager overview Importing a report template You can use the BIRT report designer to create user-defined report templates that you can then import into Report Template Manager. 1. Select Reports > Report Manager. The Report Template Manager dialog box displays. 2. Click Import. The Open dialog box displays. 3. Browse to the location from which you want to import the report and click Open.
Reports Template Manager overview 42 Report content and functions Each report contains the following information: • The name of the report displayed at the top of the report. • The date and time the report was generated. • The report data, presented in a tabular format. Depending on the report type, you can perform the following functions: • Sort a table by clicking a column head. Click a column head again to reverse the sort order. • Launch a more detailed report by clicking a link within the report.
42 Reports Template Manager overview Products List report The Products List report displays general and detailed configuration information about all discovered products (Figure 505). The information on the report comes from the software image version that is in the Management application for that product. To ensure that the latest configuration information is in the Management application, run the discovery process or resynchronize the product.
Reports Template Manager overview TABLE 127 42 Products List report fields and components (Continued) Field/Component Description IP Address The IP address of the product. Product Type The type of product. Serial Number The serial number of the product. Admin Status The administrative status of the product. Possible status includes: Normal — The product is in normal operating mode. Troubleshooting — The product is in troubleshooting mode. • • Model The model of the product.
42 Reports Template Manager overview Table 128 describes the fields and components of the Detailed Product Report. TABLE 128 Detailed Product Report fields and components Field/Component Description Product The IP address of the product. System Information Admin Status Modules Ethernet Ports 1292 System information includes the following: Alias Name — An optional name that is entered using the Properties dialog box.
Reports Template Manager overview TABLE 128 42 Detailed Product Report fields and components (Continued) Physical Ports Physical port information for each port on the product. Identifier — The port identifier of the physical interfaces on the product. Port Name — The port name of the physical interfaces on the product. Type — The type of port of the physical interfaces on the product. Speed (Mbps) — The speed of the physical interfaces on the product.
42 Reports Template Manager overview Table 129 describes the fields and components of the Detailed Cluster Report. TABLE 129 Detailed Cluster Report fields and components Field/Component Description Cluster The name of the cluster. System Information Nodes Admin Status 1294 System information includes the following: Alias Name — An optional name that is entered using the Properties dialog box.
Reports Template Manager overview TABLE 129 42 Detailed Cluster Report fields and components (Continued) Modules Ethernet Ports Module information shows what modules are installed on the product. Slot Number — For products that do not support stacking, you can view the slot number. • Type — The type of module installed in the slot. • Serial Number — The serial number of the module. For wired products, the serial number cell may be blank. • Ports — The number of ports on the product.
42 Reports Template Manager overview Table 130 describes the fields and components of the Ports Tx/Rx Ratio report. TABLE 130 Ports Tx/Rx Ratio report fields and components Field/Component Description Summary table Location The location of the device. Device Name The name of the device. Click the device name link to launch the Detailed Product Report. IP Address The IP address of the device. Total Received (MB) The total data received (the sum of Rx in Rx Details table) in megabytes.
Reports Template Manager overview 42 Low Traffic Ports report The Low Traffic Ports report details the port utilization that is less than or equal to the percentage and number of days you specify (Figure 509). FIGURE 509 Low Traffic Ports report Table 131 describes the fields and components of the Low Traffic Ports report. TABLE 131 Low Traffic Ports report fields and components Field/Component Description Location The location of the device. Device Name The name of the device.
42 Reports Template Manager overview Exporting data from the report You can export data from a report to CSV, PDF, or Word. 1. Run a report (refer to “Viewing a report” on page 1287). 2. From the report, click the Export Report icon on the Report toolbar. The Export Report dialog box displays. 3. Select an export format (PDF or Word) from the Export Format list. 4. Configure what content to export by selecting one of the following options: • Select All pages to export the entire report.
Appendix A Application menus In this appendix • Dashboard main menus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1299 • IP main menus. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1300 • IP shortcut menus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1306 Dashboard main menus The menu bar is located at the top of the main window.
A IP main menus Menu Command Command Options License — Select to view or change your License information. About Management_Application_Name — Select to view the application information, such as the company information and release number. IP main menus The menu bar is located at the top of the main window. The following table outlines the many functions available on each menu. Menu Command Command Options Server Menu Users. Select to configure users and user groups. User Profile.
IP main menus Menu Command A Command Options Show Panels. Select to choose which panels to display. All Panels. Select to show all panels. Topology Map. Select to only show the topology map. Product List. Select to only show the Product List. Master Log. Select to only show the Master Log. Main Display. Select to choose which topology to display Network Objects. Select to display Network Objects. L2 Topology. Select to display the L2 topology map. Ethernet Fabrics.
A IP main menus Menu Command Command Options Static. Select to create a product group based on device. Dynamic. Select to create a product group based on device attributes. Add Port Group. Select to create a port management group. Edit Group. Select to edit a management group. Duplicate Group. Select to duplicate a management group. Delete Group. Select to delete a management group. Configure Menu Element Manager. Select to configure a selected device. Front Panel.
IP main menus Menu Command A Command Options Application Delivery. Select to choose an application delivery method. VIP Servers. Select to monitor and configure real and virtual servers. GSLB. Select to create global server load balancing (GSLB) policies. SSL Certificates. Select to manage SSL certificates. MPLS. Select to configure the multiprotocol label switches service (MPLS). VLL. Select to configure virtual leased line (VLL) services. VPLS. Select to configure virtual private LAN services (VPLS).
A IP main menus Menu Command Command Options Set Change Limits. Select to set zone limits for zone activation. List Zone Members. (Trial and Licensed version Only) Select to display all members in a zone. Monitor Menu Performance. Select to monitor IP devices. Dashboard — Select to launch the Performance Dashboard. Historical Data Collectors. Select to monitor historical data. Real-Time Graph/Tables.
IP main menus Menu Command A Command Options Event Processing. Select to configure event processing. Pseudo Events. Select to configure pseudo events. Event Actions. Select to configure events actions. Logs. Select to display logs. Audit. Select to display a history of user actions performed through the application (except login/logout). Product Event. Select to display errors related to SNMP traps and Client-Server communications. Product Status.
A IP shortcut menus Menu Command Command Options IP Subnets. Select to run a report of IP subnets on the network. IP Addresses. Select to run a report on IP addresses on the network. MAC Addresses. Select to run a report of MAC addresses on the network. Product CLI. Select to run a product CLI report. Deployment. Select to run a deployment report. Host Adapters — Select to run a Host product report. Inventory Report — Select to run a Host inventory report.
IP shortcut menus A • L2 Cloud The table below details the command options available for each component. Component Menu/Submenu Commands Comments Element Manager > Front Panel Web Displays the IronWare device’s front panel. Launches the device’s Web Management Interface. Configuration > Save Restore Configuration Repository Schedule Backup Launches the Configuration dialog box with selected device highlighted. Launches the Configuration dialog box with selected device highlighted.
A IP shortcut menus Component Menu/Submenu Commands Comments Table > Copy “Cell_Value” Copy Row Copy Table Export Row Export Table Print Search Select All Size All Columns To Fit Expand All Collapse All Customize Only available from Product List. Copies the information in the selected cell. Copies all information in the selected row. Copies all information in the table. Copies all information in the selected row. Copies all information in the table. Launches the Print dialog box.
IP shortcut menus Component Menu/Submenu Commands A Comments Fabric Watch > Configure Port Fencing Frame Monitor Performance Thresholds Technical Support > Product / Host SupportSave View Repository Events Port Connectivity Port Optics (SFP) Telnet Telnet through Server Network Objects Table > Copy 'Device_Name Group' Copy Row Copy Table Export Row Export Table Search Select All Size All Columns To Fit Expand All Collapse All Customize Only available from Product List.
A IP shortcut menus Component Menu/Submenu Commands Comments Fabric Watch > Configure Port Fencing Frame Monitor Performance Thresholds Technical Support > Product / Host SupportSave View Repository Events CLI through Server Setup Tools Network Objects Ethernet Fabric Detailed Report Generates and displays a Detailed Report for the selected device Physical Ports Report Generates and displays a Physical Ports Report for the selected device L2 sFlow Report Generates and displays a Layer 2 sFlow Repo
IP shortcut menus Component Menu/Submenu Commands Comments Properties Displays the Properties dialog box for the selected device. Table > Copy “Cell_Value” Copy Row Copy Table Export Row Export Table Print Search Select All Size All Columns To Fit Expand All Collapse All Customize Only available from Product List. Copies the information in the selected cell. Copies all information in the selected row. Copies all information in the table. Copies all information in the selected row.
A 1312 IP shortcut menus Brocade Network Advisor IP User Manual 53-1002947-01
Appendix B Call Home Event Tables In this appendix This appendix provides information about the specific events that display when using Call Home. This information is shown in the following Event Table. • IP Call Home Event . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1313 • Network OS Call Home Event . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
B Call Home Event Tables TABLE 133 Network OS Call Home Event (Continued) Event reason code FRU code/Event type Description Severity 1431 FW-1431 Faulty fans. 3 1432 FW-1432 Faulty WWN cards. 3 1433 FW-1433 Faulty CPs. 3 1434 FW-1434 Faulty blades. 3 1435 FW-1435 Flash usage is out of range.
Appendix C Event Categories In this appendix This section provides information about the events that display in each of the following categories: • Link incident events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Product status events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Product audit events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Security events . . . . . . . . . . . .
C Product audit events If the event is a RASLOG and if the RASLOG ID matches any of the RASLOGS listed below, then the event is categorized as a product status event. • • • • • • • • • • • • • • • • • • • • • FW-1424 FW-1425 FW-1426 FW-1427 FW-1428 FW-1429 FW-1430 FW-1431 FW-1432 FW-1433 FW-1434 FW-1435 FW-1436 FW-1437 FW-1438 FW-1439 FW-1440 FW-1441 FW-1442 FW-1443 FW-1444 Product audit events Events that are used to track audit information are categorized as product audit events.
Security events C Security events Security events are those that indicate authentication success or failure, a security violation, or user login and logout. Security events for FC devices For FOS switches, if the event is a RASLOG event and the RASLOG ID contains 'SEC', then the event is categorized as a security event. Security events for IP devices For IOS devices, if the event OID starts with any of the following OIDs, then the event is categorized as a security event.
C User action events • • • • • • • • • • • • • • • • • 1.3.6.1.4.1.1991.1.6.1.7.4.2.13 [localMacAddrAuthFail] 1.3.6.1.4.1.1991.1.6.1.7.4.2.14 [pppLogonFail] 1.3.6.1.4.1.1991.1.6.1.7.4.2.18 [dot1xSupplicantAuthenticated] 1.3.6.1.4.1.1991.1.7.2.2.2.9 [apAuthFailureTooMany] 1.3.6.1.4.1.1991.1.8.2.1.4.0.2 [userLoginNotification] 1.3.6.1.4.1.1991.1.8.2.1.4.0.3 [userLogOffNotification] 1.3.6.1.4.1.1991.1.8.2.1.4.0.4 [userLoginFailNotification] 1.3.6.1.4.1.1991.1.11.1.1.2.2.2.32 [mwlAuthFailure] 1.3.6.1.4.1.
Product events C Product events All other events originating from the product are categorized as product events. IP Performance monitoring events IP performance monitoring events, listed in Table 134, occur when users select the option to forward events to the vCenter during VM Manager discovery. TABLE 134 Performance monitoring IP threshold events Trap name OID Description bnaRisingThresholdCrossed 1.3.6.1.4.1.1991.1.13.2.0.
C 1320 IP Performance monitoring events Brocade Network Advisor IP User Manual 53-1002947-01
Appendix User Privileges D In this appendix • About user privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1321 • About Roles and Access Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1336 About user privileges The Management application provides the User Administrator with a high level of control over what functions individual users can see and use.
D About user privileges TABLE 135 Application privileges and behavior Privilege Description No Privilege Read-Only Read/Write Active Session Management Allows you view active client sessions and disconnect an unwanted user. Disables the Active Sessions command from the Server menu. Enables the Active Sessions command from the Server menu. Disables all commands and functions on the dialog box except the Close and Help. Enables the Active Sessions command from the Server menu.
About user privileges TABLE 135 D Application privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Element Manager Product Administration An Element Manager privilege that enables most functionally. Disables the functions described in the Element Manager User Manual for which you do not have rights. Displays the message, “You do not have rights to perform this action.” Same as No Privilege.
D About user privileges TABLE 135 Application privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Fault Management Allows you to control access to the SNMP Trap Registration and Forwarding dialog box, the Event Storage option of the Options dialog box, the Syslog Registration and Forwarding dialog box, as well as the Export and Clear functions in the Event Log dialog box and the Show and Hide functions in the Customize Columns dialog box.
About user privileges TABLE 135 D Application privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Firmware Management Allows you to download firmware to selected switches and manage the firmware repository. Disables the Firmware Management command from the Configure menu and right-click menu. Enables the Firmware Management command from the Configure menu and right-click menu. Disables all commands and functions on the dialog box except the Close and Help.
D About user privileges TABLE 135 Application privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Policy Monitor Allows you to configure policy monitors. Disables Policy Monitor command on the Monitor menu. Enables Policy Monitor command on the Monitor menu. Allows you to open the Policy Monitor dialog box; however, disables the Add, Delete, and Run buttons. No changes can be made. Enables you to use the Edit, Report, and History buttons to view content.
About user privileges TABLE 135 D Application privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Security Allows you to enable and configure SANtegrity features. Disables the Security command from the Configure > Switch > Replicate menu. Disables the Security Log command on the Monitor > Logs menu. Disables the Security Misc command from the Server > Options menu. Disables the Security command from the Configure > Switch > Replicate menu.
D About user privileges TABLE 135 Application privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Technical Support Data Collection Allows you to capture support data from Fabric OS switches. Disables the SupportSave, Upload Failure Data Capture, and View Repository commands from the Monitor > Technical Support menu and right-click menu. Enables the View Repository command from the Monitor > Technical Support menu and right-click menu.
About user privileges TABLE 135 D Application privileges and behavior (Continued) Privilege Description Web Services Allows you to use Web Services API. Zoning Activation (Fabric and offline zone database) Allows you to activate a zone configuration selected in the Zoning dialog box. NOTE You must also have the Zoning Offline and Zoning Online privileges to launch the Zoning dialog box.
D About user privileges TABLE 135 Application privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Zoning Online Allows you to edit any of the fabric zone databases in the available fabrics within the Zoning dialog box from the client side and then save to the switch. In Zoning dialog box, the Zone DB list includes online and offline zones; however, if an online zone is selected, the contents are not loaded into the Zoning dialog box.
About user privileges TABLE 135 D Application privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Zoning Offline Allows you to edit the zone database in offline mode and save the zone database to the repository or to the switch. In Zoning dialog box, the Zone DB list includes offline zones; however, if an offline zone is selected, the contents are not loaded into the Zoning dialog box.
D About user privileges TABLE 135 Application privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Zoning - LSAN Allows you to edit and activate LSAN zones for the LSAN fabrics that are available within the Zoning dialog box. Prerequisite: Both the backbone fabrics as well as all directly connected edge fabrics must be added to a resource group and a user with LSAN Zoning privilege must be assigned to this specific resource group.
About user privileges TABLE 136 D IP privileges and behavior Privilege Description No Privilege Read-Only Read/Write IP - Address Finder Allows you to use Address Finder. Address Finder finds MAC addresses that are in the forwarding tables at the moment when the search is performed. Disables the Address Finder command. Enables the Address Finder command; however, disables functions on the dialog box. Enables the Address Finder command and all functions on the dialog box.
D About user privileges TABLE 136 IP privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write IP - Element Manager Port Config Allows you to access the device from Element Manager. For read-write access to a device Web Management Interface to manage specific ports, but not for global configuration of a device. Disables the Element Manager - Port Config command. Enables the Element Manager - Port Config command; however, disables functions on the dialog box.
About user privileges TABLE 136 D IP privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write IP - MPLS - VLL Allows you to manage VLL configurations. Disables the MPLS command. Enables the MPLS command; however, disables functions on the dialog box. Enables the MPLS command and all VLL functions on the dialog box. IP - MPLS - VPLS Allows you to manage VPLS configurations Disables the MPLS command.
D About Roles and Access Levels TABLE 136 IP privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write IP - VIP-Server Mgr Leaf Node (Real Server Port View) Allows you to manage VIP Server using the Real Server Port View. When assigned to user as Read-Write privilege, only leaf node can be disabled/enable Disables the VIP Server command. Enables the VIP Server command; however, disables functions on the dialog box.
About Roles and Access Levels TABLE 137 D Application Features and Role Access Levels (Continued) Feature Roles with Read/Write Access Element Manager - Product Administration IP System Administrator, Event Management IP System Administrator, Network Administrator Fabric Watch IP System Administrator, Fault Management IP System Administrator, Network Administrator Operator FCoE Management SAN System Administrator, Network Administrator Security Administrator, Zone Administrator, Security Of
D About Roles and Access Levels TABLE 138 IP Features and Role Access Levels Feature Roles with Read/Write Access IP - Address Finder IP System Administrator, Network Administrator IP - CLI IP System Administrator IP - CLI Configuration IP System Administrator, Network Administrator IP - CLI - Port Config IP System Administrator IP - Deployment Reports IP System Administrator, Report User Group, Network Administrator IP - Discover Setup IP System Administrator IP - Element Manager - Port C
Appendix E Device Properties In this appendix • SAN device properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • IP device properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Host properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Properties customization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
E SAN device properties TABLE 139 Fabric properties Field/Component Description Active Zone Configuration Whether active zone configuration is activated on the fabric. Last Discovery The date and time of last discovery. Tracked Whether the fabric is tracked. Location The customer site location. Contact The primary contact at the customer site. Add button Click to add a user-defined property. For more information, refer to “Adding a property field” on page 1367.
SAN device properties TABLE 140 E Device properties (Continued) Field/Component Description Discovery Status The discovery status of the switch. Examples include ‘Discovered: Seed Switch’ and ‘Discovered: Not Reachable’. Domain ID The device’s domain ID, which is the top-level addressing hierarchy of the domain. Fabric The fabric name. Fabric Name The name specified through the device Element Manager. Fabric Watch Whether Fabric Watch is up or down.
E SAN device properties TABLE 140 1342 Device properties (Continued) Field/Component Description Node Name The name of the node. Node WWN The world wide name of the node. Physical/Logical Whether the device is a physical device or a logical device. Port Count The number of ports. Port Type The port type. Preshared key configured Whether the preshared key is configured for the FCIP tunnel. Reason The device status. Remote Switch Name The remote switch name of the trunk.
SAN device properties TABLE 140 E Device properties (Continued) Field/Component Description WWN The world wide name of the device. Add button Click to add a user-defined property. For more information, refer to “Adding a property field” on page 1367. Edit button Click to edit a user-defined property. For more information, refer to “Editing a property field” on page 1367. Delete button Click to delete a user-defined property.
E 1344 SAN device properties Field Description (Status) Lists two kinds of data: the LUN’s health and the state of the LUN’s disks. The colored icon in the lower-left corner indicates the LUN’s health. In most cases, there is also a number that represents the RAID type. The possible RAID types are 0, 1, 5, or 10, and the number does not display if the RAID type is different from those. The following are examples of generic LUN status icons: Normal. All disks are operating normally and online.
SAN device properties E Field Description Operational Status The operational status of the product. OS Type The operating system. Protocol The LUN protocol. Size (GB) The total size of this LUN’s storage, in gigabytes. State The state of the LUN. Storage LUN ID The storage product’s LUN ID number for this LUN. Storage Ports The total number of storage ports assigned to the server or the port, or bound to the LUN. Type The level or type of RAID storage. Possible values are as follows: 0.
E SAN device properties Viewing iSCSI Properties dialog box NOTE Only available for Fabric OS products. The iSCSI Properties dialog box displays information related to iSCSI. To view the properties for an iSCSI device, complete the following steps. 1. Right-click a product icon and select Properties . The Properties dialog box displays. 2. Select the iSCSI tab. NOTE Some fields may not be available for all products. 1346 Field Description Agent The Caffeine agent version number.
SAN device properties E Field Description iSNS Service Whether the product is registered with an iSNS server. Location The location of the product. Management Link The management link status (Up/Down) of the product. Name (Product) The name of the product. OS The name of the operating system running on the product. OS Build The operating system build running on the product. OS Release The operating system release running on the product. Portal Addresses The list of IP addresses.
E SAN device properties To add user-defined property labels, refer to “Adding a property field” on page 1367. Fields containing a green triangle ( ) in the lower right corner are editable. FIGURE 510 Port Properties dialog box NOTE Depending on the port type, some of the following properties may not be available for all products. TABLE 141 1348 Port properties Field Description Additional Port Info Additional error information relating to the selected port. Address The address of the port.
SAN device properties TABLE 141 E Port properties (Continued) Field Description Class The class of the port. Class of Service The class of service. Compression Whether compression is enabled or disabled. Connected Devices The number of connected devices. Click the icon in the right side of the field to open the Virtual FCoE Port Connected Devices dialog box. Connected Switch The name of the connected switch. Delete button Click to delete.
E SAN device properties TABLE 141 Port properties (Continued) Field Description Index The index of the Virtual FCoE Port. Interface Count The interface count. IP Address The device’s IP address. IPSec Policy # 1350 The IPSec policy number. Also includes the following information: Authentication Algorithm Encryption Algorithm SA Life • • • iSCSI button Click to launch the Element Manager. iSCSI Capable Whether the port is iSCSI capable or not.
SAN device properties TABLE 141 E Port properties (Continued) Field Description Port Module The port’s module. Port NPIV Number of NPIV ports. Port Speed (Gb/s) The port speed, in Gbits per second. Port State The port state (online or offline). Port Status The port’s operational status (online or offline). Port Type The port type. Port WWN The port’s world wide name. Preshared key configured Whether the preshared key is configured for the FCIP tunnel.
E IP device properties TABLE 141 Port properties (Continued) Field Description Type The type of port, for example, U_port. Unit Type The unit type of the node. User Port # The number of the user port. Vendor The product vendor. # Virtual FCoE port count The number of virtual FCoE ports on the device. There is a one-to-one mapping of TE ports to virtual FCoE ports. Therefore, the number of virtual session ports is one for directly connected devices.
IP device properties E 2. Right-click the device in the Product List and select Properties. The Device_Name Properties dialog box displays. 3. Review the device and port properties. To add user-defined property labels, refer to “Adding a property field” on page 1367. Fields containing a green triangle ( ) in the lower right corner are editable. NOTE Some fields are not available for all products. Field/Component Description Properties tab Select to display information about the device.
E IP device properties Field/Component 1354 Description FDMI Manufacturer The manufacturer of the FDMI. Location The physical location of the product. Contact The name of the person or group you should contact about the product. Description The description of the product. Connected AP count Number of APs connected to the controller or switch. Managed AP count Only applicable to the selected controller. Number of APs that the selected controller manages.
IP device properties E Field/Component Description Nodes tab Select to display information about nodes in the fabric. For detailed information about this tab, refer to “Viewing VCS fabric properties” on page 1356. Port Profiles tab Select to display information about port profiles for the fabric members. For detailed information about this tab, refer to “Viewing VCS fabric properties” on page 1356. Ports tab Select to display information about ports on the device.
E IP device properties Field/Component Description Connected AP count Number of APs connected to the controller or switch. Managed AP count Only applicable to the selected controller. Number of APs that the selected controller manages. Name The device name used to identify AP. Device MAC The AP device MAC. Model The model of the AP. Serial Number The serial number of the AP. Firmware version The firmware level of the AP. Status IP address of the controller which manages the AP.
IP device properties Field/Component E Description System Name The name of the product. IP Address The IP address (IPv4 or IPv6 format) of the product. Product Type The fabric’s product type, which is a Layer 2 switch. VCS Mode The VCS mode of the switch, which can be enabled or disabled. VCS ID The VCS ID configured in the fabric. Config Mode The configuration mode of the fabric, which is Local Only for a management fabric and fabric. Node Count The number of fabric nodes in the fabric.
E IP device properties Field/Component Config Mode The configuration mode of the fabric, which is Local Only or Distributed. Licensed Features The licensed features available on the device. RBridge ID The routing bridge identifier associated with the VCS fabric member. Status The health status of the switch. Admin Status The administrative status of the switch, for example, Normal. Memo Additional comments regarding the switch. Vendor The switch vendor.
IP device properties Field/Component E Description ACL Displays the type of access control list (ACL) profile (Standard or Extended), if an ACL is associated with the port profile. Associated MACs list Lists the following details of the Media Access Control (MAC) addresses associated with the port profile: • MAC — The MAC address associated with the port profile. • Name — The name of the vNIC associated with the selected MAC address.
E IP device properties Field/Component Description Trust Indicates whether the Ethernet trust of the port is enabled or disabled. Flow Control The Ethernet priority flow control mode of the port. Possible modes are as follows: • Off (the default) • 802.3x pause • Tx On or Off • Rx On or Off • Priority Flow Control. For this mode, the Tx and Rx values for each CoS display in the table.
IP device properties Field/Component Port Actions list Description Select one of the following options: Enable Disable Display Attached Port Properties • • • Performance list Select to launch the Performance dialog box. Fabric and Edge Ports properties • • • • • • • • • • • • • • • Brocade Network Advisor IP User Manual 53-1002947-01 E Identifier — The identifier of the port. Name — The name of the port. This is an editable field. Enter a name (up to 64 characters) for the port.
E IP device properties Field/Component FC Ports properties Description • • • • • • • • • • • • • • • • • • • • • 1362 Identifier — The identifier of the port. Name — The name of the port. This is an editable field. Enter a name (up to 64 characters) for the port. WWN — The world wide name of the device. FC Address — The Fibre Channel address. Each FC port has both an address identifier and a world wide name. Status — The operational status. Additional Info — Additional information about the port.
IP device properties Field/Component E Description SFP/Port Optics Click to view the SFP/Port Optic information: • TX Power — The power transmitted to the SFP in dBm and uWatts. • RX Power — The power received from the port in dBm and uWatts. • Transceiver Temp (C) — The temperature of the SFP transceiver. • Voltage (mVolts) — The voltage across the port in mVolts. • Transceiver Current (mAmps) — The laser bias current value in mAmps.
E Host properties Host properties You can view device and port properties from the Product List or the map. You can customize the Host Properties dialog boxes by creating user-defined property labels (refer to “Adding a property field” on page 1367). NOTE You cannot create user-defined property labels at the adapter level. You can also edit property fields to change information. Fields containing a green triangle ( the lower right corner are editable.
Host properties TABLE 31 E Adapter port properties (Continued) Field Description Class of Service The class of the port; for example, Class-2 or Class-3. Switch The name of the switch. Fabric The name of the Fabric. VM Port Name The port name of the virtual machine associated with the host. Preboot Created Indicates whether preboot was created on the virtual port. PCI Function Index The PCI function number associated with the physical port.
E Properties customization TABLE 31 Adapter port properties (Continued) Field Description FCSP Status Whether FC-SP authentication is being used. Algorithm The configured authentication algorithm. Group The DH group, which is DH-null (group 0), which is the only option. Error Status The health status of the Fibre Channel Security Protocol parameters. QoS Configured QoS State Indicates whether QoS is enabled or disabled. Operating QoS State Indicates whether QoS is on or off.
Properties customization E Property fields containing a green triangle ( ) in the lower right corner are editable. To edit a field with a green triangle ( ), click in the field and make your changes. Adding a property field You can add up to three new user-defined properties to the Properties and Ports tabs of the device Properties dialog box. To add a user-defined property, complete the following steps. 1. Right-click any product icon and select Properties. The Properties dialog box displays. 2.
E Properties customization 5. Select Port or Property from the Type list, if available. 6. Click OK. Deleting a property field NOTE Properties customization requires read and write permissions to the Properties - Add / Delete Columns privilege. You can delete any user-defined property from the Properties dialog box. To delete a user-defined property, complete the following steps. 1. Right-click any product icon and select Properties. The Properties dialog box displays. 2.
Appendix F Regular Expressions In this appendix This appendix presents a summary of Unicode regular expression constructs that you can use in the Management application. • Characters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Character classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Predefined character classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
F Regular Expressions TABLE 1 Matches \e The escape character ('\u001B') \cx The control character corresponding to x TABLE 2 Character classes Construct Matches [abc] a, b, or c (simple class) [^abc] Any character except a, b, or c (negation) [a-zA-Z] a through z or A through Z, inclusive (range) [a-d[m-p]] a through d, or m through p: [a-dm-p] (union) [a-z&&[def]] d, e, or f (intersection) [a-z&&[^bc]] a through z, except for b and c: [ad-z] (subtraction) [a-z&&[^m-p]] a through z
Regular Expressions TABLE 4 POSIX character classes (US-ASCII only) Construct Matches \p{Blank} A space or a tab: [ \t] \p{Cntrl} A control character: [\x00-\x1F\x7F] \p{XDigit} A hexadecimal digit: [0-9a-fA-F] \p{Space} A whitespace character: [ \t\n\x0B\f\r] TABLE 5 java.lang.Character classes (simple java character type) Construct Matches \p{javaLowerCase} Equivalent to java.lang.Character.isLowerCase() \p{javaUpperCase} Equivalent to java.lang.Character.
F Regular Expressions TABLE 8 Construct Matches X? X, once or not at all X* X, zero or more times X+ X, one or more times X{n} X, exactly n times X{n,} X, at least n times X{n,m} X, at least n but not more than m times TABLE 9 Reluctant quantifiers Construct Matches X?? X, once or not at all X*? X, zero or more times X+? X, one or more times X{n}? X, exactly n times X{n,}? X, at least n times X{n,m}? X, at least n but not more than m times TABLE 10 Possessive quantifiers Co
Regular Expressions TABLE 12 F Back references Construct Matches \n Whatever the nth capturing group matched Quotation \ Nothing, but quotes the following character \Q Nothing, but quotes all characters until \E \E Nothing, but ends quoting started by \Q TABLE 13 Special constructs (non-capturing) Construct Matches (?:X) X, as a non-capturing group (?idmsux-idmsux) Nothing, but turns match flags on–off (?idmsux-idmsux:X) X, as a non-capturing group with the given flags on–off (?=X)
F 1374 Regular Expressions Brocade Network Advisor IP User Manual 53-1002947-01
Appendix G CLI Templates In this appendix The Management application provides preconfigured Configuration templates for IronWare and Network OS devices. By default, all preconfigured templates are configure to prompt for additional targets during manual deployment. The preconfigured templates include the following: • HyperEdge – Stack Enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • HyperEdge – Stack Disable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
G CLI Templates • Network OS – Configure RX Symbol Errors Monitor . . . . . . . . . . . . . . . . • Network OS – Configure Standard L2 Access List . . . . . . . . . . . . . . . . . • Network OS – Create CoS Mutation Map. . . . . . . . . . . . . . . . . . . . . . . . . • Network OS – Create LLDP Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Network OS – Create Port Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Network OS – Create Traffic Class Map . . . . .
CLI Templates TABLE 14 Feature HyperEdge – Stack Enable Description HyperEdge To enable stacking mode.
G CLI Templates TABLE 22 Feature HyperEdge – Peri Trunk Creation Description HyperEdge To create peripheral trunks.
CLI Templates TABLE 28 G MCT Cluster Creation Feature Description CLI Commands MCT Create a session VLAN. vlan $ name Session-VLAN tagged ethernet $ router-interface ve $ interface ve $ ip address $ MCT Create a keep–alive VLAN.
G CLI Templates TABLE 33 Feature Description CLI Commands MCT Delete a cluster client. cluster $ $ no client $ TABLE 34 MPLS – Loopback Interface Configuration Feature Description CLI Commands MPLS Loopback interface configuration used for device reachability using OSPF. It assigns an IP address and advertises the interface through OSPF.
CLI Templates TABLE 37 G Network OS – Associate MAC to Port Profile Feature Description CLI Commands AMPP Associates the MAC to the existing port profile no port-profile $ activate no port-profile $ static $ no port-profile $ static $ no port-profile $ static $ port-profile $ activate port-profile $
G CLI Templates TABLE 40 Feature Description CLI Commands Network OS This template is used to configure high threshold value to fence an interface when Inter Frame Gap(IFG) minimum length (typical value is 12) violation occurs. Possible values for timebase are day, hour, minute and none.
CLI Templates TABLE 43 Network OS – Configure RX Symbol Errors Monitor Feature Description CLI Commands Network OS This template is used to configure threshold and alert values for RX Symbol Errors Monitoring. Possible values for timebase are day, hour, minute and none. Buffer value cannot be more than average of high plus low threshold. Supported Values for High and Low Threshold Action Parameters are email, raslog, all, and none.
G CLI Templates TABLE 47 Feature Description CLI Commands AMPP Creates the port profile and its sub profile.
CLI Templates TABLE 51 Network OS – Delete Port Profiles Feature Description CLI Commands AMPP Removes the port profile. no port-profile $ activate no port-profile $ TABLE 52 Network OS – Update ACL on Port Profile Feature Description CLI Commands AMPP Adds a security profile to a port profile.
G CLI Templates TABLE 56 Feature Description CLI Commands VLAN To remove PVLAN type from VLAN interface. interface vlan $ no private-vlan TABLE 57 Private VLAN – Associate Secondary VLAN with Primary VLAN Feature Description CLI Commands VLAN To associate secondary VLAN with primary VLAN.
CLI Templates TABLE 62 G Private VLAN – Map primary and secondary VLAN to promiscuous port Feature Description CLI Commands VLAN To assign Primary Vlan to Promiscuous port. This command also maps a Promiscuous port to selected secondary VLANs.
G CLI Templates TABLE 68 Feature Description CLI Commands VLAN To display the private vlan status. show vlan private-vlan TABLE 69 VRF – VRF Creation Feature Description CLI Commands VRF To create VRF in specific RBridge. rbridge-id $ vrf $ TABLE 70 VRF – VRF Deletion Feature Description CLI Commands VRF To delete VRF from specific RBridge.
CLI Templates TABLE 75 VRF – Display VRF Information Feature Description CLI Commands VLAN To display the VRF details. show vrf detail show vrf rbridge-id $ show vrf $ TABLE 76 IronWare OS VLAN – Remove interfaces from VLAN as untagged Feature Description CLI Commands VLAN To remove interfaces from the VLAN as untagged.
G CLI Templates TABLE 84 Feature Description CLI Commands VLAN To disable spanning tree protocol on VLAN. vlan $ no spanning-tree TABLE 85 Network OS VLAN – VLAN Interface Creation Feature Description CLI Commands VLAN To create a VLAN Interface. interface vlan $ TABLE 86 Network OS VLAN – VLAN Interface Deletion Feature Description CLI Commands VLAN To delete a VLAN Interface.
CLI Templates TABLE 91 G Network OS VLAN – Disable Native VLAN Configuration Feature Description CLI Commands VLAN To disable native VLAN from a trunk interface. interface tengigabitethernet $ no switchport trunk native-vlan $ TABLE 92 Network OS VLAN – Access Interface Configuration Feature Description CLI Commands VLAN To configure the interface as an access interface.
G 1392 CLI Templates Brocade Network Advisor IP User Manual 53-1002947-01
Appendix H Troubleshooting In this chapter • Application Configuration Wizard troubleshooting . . . . . . . . . . . . . . . . . • Browser troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Client browser troubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Configuration backup and restore troubleshooting . . . . . . . . . . . . . . . . • Firmware download troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . .
H Application Configuration Wizard troubleshooting Application Configuration Wizard troubleshooting The following section states a possible issue and the recommended solution for Management application Configuration Wizard errors. Problem Resolution Unable to launch the Management application Configuration Wizard on a Windows Vista, Windows 7,or Windows 2008 R2 system The Windows Vista, Windows 7,or Windows 2008 R2 system enables the User Access Control (UAC) option by default.
Client browser troubleshooting H Client browser troubleshooting The following section states a possible issue and the recommended solution for client browser errors. Problem Resolution Downloading Client from a Internet Explorer Browser over HTTPS • If the JNLP file does not launch automatically, use one of the following options: Complete the following steps. 1 Save the JNLP file to the local host. 2 Launch the JNLP file manually. • In Internet Explorer 7, complete the following steps.
H Firmware download troubleshooting Firmware download troubleshooting The following section states a possible issue and the recommended solution for firmware download errors. Problem Resolution If you configured an internal FTP server and the Management application server is running IPv6, firmware download is not supported. Choose from one of the following options: • If the Management application is running IPv6 only, configure an external FTP server.
Launch Client troubleshooting H Launch Client troubleshooting The following section states a possible issue and the recommended solution if you are unable to launch the remote client. Problem Resolution Remote client does not upgrade from versions prior to 11.0. The remote client does not automatically upgrade when you select the remote client shortcut of client versions earlier than 11.0. To clear the old client and launch the new remote client version, complete the following steps.
H Launch Client troubleshooting Problem Resolution Unable to log into the Client (the application does not launch when you use a valid user name and password and exceptions are thrown in the client side). Use one the following procedures to configure the IP address in the host file. Windows operating systems 1 Log in using the 'Administrator' privilege. 2 Select Start > Run. 3 Type drivers in the Open field and press Enter. 4 Go to the ‘etc’ folder and open the ‘hosts’ file using a text editor.
Master Log and Switch Console troubleshooting H Master Log and Switch Console troubleshooting The following section states a possible issue and the recommended solution for switch console errors. Problem Resolution Too many login and log messages received on switch console and and Master Log due to lazy polling. NOTE: This setting cannot be disabled for DCB switches. To disable lazy polling, complete the following steps. 1 Select Discover > IP Products. The Discover Setup - IP dialog box displays.
H Patch troubleshooting Problem Resolution An error message with the following text displays: Real Time statistics collection has failed. Please see master log for details. 8 1400 To collect data, the SNMP credentials in the Management application and switch must match. SNMP v1 or v3: The community strings entered in the Address Properties dialog box SNMP tab must match the one entered in the switch.
Patch troubleshooting Problem Resolution An error message with the following text displays: Real Time statistics collection has failed. Please see master log for details. 9 H To collect GigE port and FCIP statistics, you must enable the FCIP-MIB capability.
H Patch troubleshooting Problem Resolution An error message with the following text displays: Real Time statistics collection has failed. Please see master log for details. 11 To collect data on Virtual Fabric-enabled switches, the Fabric OS user must have access to all Virtual Fabrics. The SNMPv3 user name must be the same as the Fabric OS user name. If the SNMPv3 and Fabric OS user names do not match, data is not collected for the virtual switches with the non-default VF ID.
Professional edition login troubleshooting H Professional edition login troubleshooting The following section states a possible issue and the recommended solution for Professional edition login errors. TABLE 96 Professional edition login troubleshooting Problem Resolution Login Failed. Only one client allowed. One client session is active or has not yet timed out.
H Server Management Console troubleshooting Server Management Console troubleshooting The following section states a possible issue and the recommended solution for server management console errors. Problem Resolution Unable to launch the SMC on a Windows Vista,Windows 7 , or Windows 2008 R2 system The Windows Vista,Windows 7,or Windows 2008 R2 system enables the User Access Control (UAC) option by default. When the UAC option is enabled, the SMC cannot launch.
Supportsave troubleshooting H Problem Resolution Unable to launch the SMC on a Windows Vista or Windows 7 system continued Disable using the Group Policy by completing the following steps. You can perform this procedure on you local machine using Local Group Policy editor or for many computers at the same time using the Active Directory-based Group Policy Object (GPO) editor. To disable using the Local Group Policy editor, complete the following steps.
H Technical support data collection troubleshooting Technical support data collection troubleshooting The following section states a possible issue and the recommended solution for technical support data collection errors.
Zoning troubleshooting TABLE 97 H Wireless troubleshooting Problem Master log warning message The Management application successfully registers itself as syslog recipient on the wireless controller as the secondary or ternary recipient (primary slot is already occupied). The wireless controller sends syslog messages to secondary or ternary recipients only if primary recipient is not reachable.
H 1408 Zoning troubleshooting Brocade Network Advisor IP User Manual 53-1002947-01
Appendix I Database Fields In this appendix • Database tables and fields. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1409 • Views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1615 Database tables and fields NOTE The primary keys are marked by an asterisk (*) TABLE 98 ACH_CALL_CENTER Field Definition Format ID * Unique generated database identifier. int NAME Name of the Call Center.
I Database tables and fields TABLE 100 Definition Format Size TYPE Type of the event. varchar 256 CONTRIBUTOR_PATTERN Indicates the Contributor pattern to be used for searching the event contributor in event description. In some cases, FOS uses same message id for different events (e.g MAPS events). To increase the filtering capability of Call Home events, this contributor pattern string is used along with message id.
I Database tables and fields TABLE 105 ADAPTER_DRIVER_FILE_DETAILS Field Definition Format ID Unique generated database identifier.
I Database tables and fields TABLE 110 AOR_HOST_MAP Field Definition Format AOR_ID ID of AOR int HOST_ID HOST ID which is in the AOR int TABLE 111 AOR_INM_PORT_GROUP_MAP Field Definition Format AOR_ID ID of AOR int PORT_GROUP_ID IP of port group int TABLE 112 Definition Format AOR_ID The column holds ID of an AOR. It is Foreign Key and refers to ID column of AOR table int VIP_SERVER_ID The column holds ID of VIP Server.
I Database tables and fields TABLE 114 BIRTREPORT_PARAMETER (Continued) Field DATA_TYPE Format Data type of the parameter. Possible values are: 1 - String 2 - Float 3 - Decimal 4 - Date and Time 5 - Boolean 6 - Integer 7 - Date 8 - Time int Value of the Parameter. varchar 256 Size • • • • • • • • PARAMETER_VALUE TABLE 115 Definition Size BIRTREPORT_RUN_TEMPLATE Field Definition Format ID The primary key of the table.
I Database tables and fields TABLE 117 Field Definition Format ID Unique generated database identifier.
I Database tables and fields TABLE 121 CARD (Continued) Field Definition Format Size STATE State of the blade, such as ENABLED or DISABLED. varchar 32 POWER_STATE State of power supply to the blade. varchar 16 varchar 32 ATTN_STATE SERIAL_NUMBER Factory serial number of the blade. varchar 32 PART_NUMBER The part number assigned by the organization responsible for producing or manufacturing the blade. varchar 32 TRUNKING_SUPPORTED 1 = trunking is supported on this blade.
I Database tables and fields TABLE 121 Definition Format HEADER_VERSION The OEM or vendor-assigned version number. int GIGE_MODE Determines the port operating mode for GE ports. 0 - 1G 1 - 10G 2 - Dual mode 3 - Failover mode Default value -1 means it is not applicable. smallint TABLE 122 • • • • Definition Format CARD_ID * DB ID of the card. int CAPABILITY_ * Name of the capability detected on the card. varchar ENABLED 1 = the capability is enabled on the card. Default value is 0.
I Database tables and fields TABLE 126 CEE_PORT (Continued) Field Definition Format IF_INDEX Interface index int IF_NAME Interface name varchar 256 IF_MODE Gige port mode (L2, L3, none) varchar 8 L2_MODE L2 mode (hybrid, trunk, access) varchar 32 VLAN_ID List of VLAN this port belongs to text LAG_ID LAG ID this port belongs to int IP_ADDRESS Port''s configured IP address varchar 128 MAC_ADDRESS Port''s MAC address varchar 64 PORT_SPEED Speed in Gb/sec.
I Database tables and fields TABLE 128 Definition Format Size ENTITY_CATEGORY Holds the type of the entity to whom the column name belongs to like Port, Fabric, IPProduct, VCSInterface, etc' varchar 128 COLUMN_INDEX Used to differentiate user defined columns and static columns. For static it is 0 and for user defined columns it is 1,2,3. small int DESCRIPTION Holds description of the column. varchar ICON_ID Holds Icon Id for the column. Currently it is unused.
I Database tables and fields TABLE 133 CNA_ETH_PORT Field Definition Format ID ID of the Eth port int ETH_DEV Ethernet device varchar ETH_LOG_LEVEL Log level for the Ethernet device. Possible values are 0 - Log Invalid 1 - Log Critical 2 - Log Error 3 - Log Warning 4 - Log Info int NAME Name of the port varchar 256 MAC_ADDRESS MAC Address varchar 64 IOC_ID IO controller ID. The default value is 0.
I Database tables and fields TABLE 135 Definition Format Size MAX_BANDWIDTH Maximum guaranteed bandwidth. Value will be in Gbps (1 to 10). varchar 64 MIN_BANDWIDTH Minimum guaranteed bandwidth. Value will be in Gbps (0 to 10). int PORT_NUMBER Physical port number of adapter. int PORT_TYPE Type of this port. For example, ETH. varchar CREATION_TIME Creation time of this DB record. timestamp CONFIGURATION_STATUS Indicates current configuration status of the port.
I Database tables and fields TABLE 138 COLLECTOR_MIB_OBJECT_ENTRY Field Definition Format COLLECTOR_MIB_OBJECT_ ENTRY_ID Primary key autogenerated ID. int COLLECTOR_ID ID of the PERF_COLLECTOR. int MIB_OBJECT_ID MIB_OBJECT table DB ID. int TABLE 139 COLLECTOR_SNMP_EXPRESSION_ENTRY Field Definition Format COLLECTOR_SNMP_EXPRE SSION_ENTRY_ID Primary key autogenerated ID. int COLLECTOR_ID ID of the PERF_COLLECTOR. int EXPRESSION_ID Id of the SNMP_EXPRESSION.
I Database tables and fields TABLE 141 1422 CORE_SWITCH (Continued) Field Definition Format REACHABLE Determines whether the switch is reachable from the Management application. 1 is reachable and 0 is unreachable smallint UNREACHABLE_TIME Time when the switch becomes unreachable. timestamp OPERATIONAL_STATUS Chassis operational status like FRU, Power Supply etc.. varchar CREATION_TIME Core switch record creation time. This tells us when the intial discovery has happened.
I Database tables and fields TABLE 141 CORE_SWITCH (Continued) Field Definition Format Size NAT_PRIVATE_IP_ADDRESS NAT private IP Address. Feature available from NMS DC Eureka release onwards. During a successful NAT translation the Private IP that gets translated will be stored in this field. The new translated IP Address will be stored in the existing IP_ADDRESS field. All the NAT look up will be done using the NAT Private IP Address.
I Database tables and fields TABLE 145 CORE_SWITCH_DETAILS (Continued) Field Definition Format Size FC_MASK FC IP Address ethernet mask. char 64 FC_IP Fibre Channel IP address. char 64 FC_CERTIFICATE FC IP Address. smallint SW_LICENSE_ID License ID of the chassis. char 23 SUPPLIER_SERIAL_ NUMBER Supplier serial number for the switch. varchar 32 PART_NUMBER Partnumber of the switch varchar 32 CHECK_BEACON Denotes if Switch Beacon is enabled or not on the switch.
I Database tables and fields TABLE 145 CORE_SWITCH_DETAILS (Continued) Field Definition Format Size VENDOR_VERSION Required by integrated SMI agent to populate Brocade_Product.Version property. varchar 32 VENDOR_PART_NUMBER Required by integrated SMI agent to populate Brocade_Product.SKUNumber property. varchar 32 SNMP_INFORMS_ENABLED Flag to denote whether SNMP informs option in the switch is enabled or disabled. Default value is 0.
I Database tables and fields TABLE 147 CRYPTO_LUN Field Definition Format ID Unique generated database identifier. int CRYPTO_TARGET_CONTAI NER_ID Foreign key reference to the CRYPTO_TARGET_CONTAINER that contains the host for which these LUNs are configured. int SERIAL_NUMBER The LUN serial number, used to identify the physical LUN. varchar ENCRYPTION_STATE Boolean. • True (1) if LUN is being encrypted. • False (0) if cleartext. The default value is 0.
I Database tables and fields TABLE 147 CRYPTO_LUN (Continued) Field Definition Format DECRYPT_EXISTING_DATA Not used. When configuring disk LUN that was previously encrypted and is to become cleartext, this property tells the switch whether or not to start a re-keying operation to decrypt the existing LUN data. This property does not need to be persisted. This feature is no longer supported in FOS. smallint KEY_ID Hex-encoded binary key vault ID for the current data encryption key for this LUN.
I Database tables and fields TABLE 147 Definition Format Size NEW_LUN_TYPE This field indicates the role of the LUN configured in the SRDF mode. The values could be R1, R2 or UNKNOWN. Feature available only from 6.4 release onwards and for RSA key vaults. CryptoLuncollector fills in this value. varchar 64 DISABLE_WRITE_EARLY_A CK This variable indicates whether write early acknowledgement is enabled (if value is 0) or disabled (if value is 1).
I Database tables and fields TABLE 148 CRYPTO_SWITCH (Continued) Field Definition Format PRIMARY_VAULT_LINK_ STATUS The status of the link key for the primary key vault. Link keys are used only for NetApp LKM key vaults. For possible values, see the enum definition in the DTO class. Default value is 0. smallint BACKUP_VAULT_LINK_ STATUS The status of the link key for the backup key vault. Link keys are used only for NetApp LKM key vaults.
I Database tables and fields TABLE 149 Definition Format FAILOVER_STATUS Indicates whether this container''s target is being encrypted by the encryption engine on which the container is configured (value 0) or by another encryption engine in the HA Cluster (value 1). Default value is 0.. smallint FAILOVER_STATUS_2 Failover status from the HA Cluster peer. smallint DEVICE_STATUS The physical target storage device operational status when the virtual initiator last attempted to access the target.
I Database tables and fields TABLE 151 DASHBOARD (Continued) Field Definition Format CREATION_TIME Time when dashboard was created. timestamp LAST_OPENED_TIME Time when dashboard was last opened. timestamp TABLE 152 Size DASHBOARD_CANVAS Field Definition Format ID Dashboard Canvas ID. int NAME Name of the Dashboard canvas. varchar 128 DESCRIPTION Description of the dashboard canvas.
I Database tables and fields TABLE 154 Definition PROVIDER_GROUP The Group to which the Provider belong to. varchar Similar providers will have same group name. PROVIDER_ORDER The order of execution passed to the Job Executor framework. Provider belong to same group will have different order number. Default: 0 TABLE 155 1432 DASHBOARD_PROVIDER Field Format Size 128 int DASHBOARD_WIDGET Field Definition Format Size ID ID of the dashboard widget. Auto incremented.
I Database tables and fields TABLE 155 DASHBOARD_WIDGET (Continued) Field Definition Format installation_type Indicates the widgets is SAN Only (0) / IP Only (1) / SAN_IP (2)' int shared_provider Can the provider be shared? 0 - Not Shared 1 - Shared. int TABLE 156 Size DASHBOARD_WIDGET_PREFERENCE Field Definition Format ID Auto incremented widget preference ID. int WIDGET_ID Foreign Key to DASHBOARD_WIDGET(ID). int USER_ID Foreign Key to USER_ (ID).
I Database tables and fields TABLE 157 Definition Format Size MAIN_MEASURE The Additional measures based on the FAVORITE.MAIN_MEASURE varchar 40 ADDITIONAL_MEASURE The Additional measures based on the FAVORITE.MAIN_MEASURE int TABLE 158 DEFAULT_WIDGET_PREFERENCE Field Definition Format ID Auto incremented Dashboard Widget Preference ID. int dashboard_id Foreign Key to DASHBOARD(ID). int widget_id Foreign Key to DASHBOARD_WIDGET(ID).
I Database tables and fields TABLE 159 DEPLOYMENT_CONFIGURATION (Continued) Field Definition Format SNAPSHOT_ENABLED 1 indicates that snapshot is applied to the configuration smallint CLI_TEMPLATE_ID Identifies the CLI template details.
I Database tables and fields TABLE 161 Definition Format PRODUCT_ID This record will be per product. Hence this will have the id of the product. int PRODUCT_TYPE_ID Foreign Key references TARGET_TYPE(id). This identifies the PRODUCT_ID. (Whether it is switch, device, etc). int STATUS Indicated the product deployment status 1-Aborted 2-Succesful 3-Partial Failure 4-Failed smallint MESSAGE Message to be displayed in the report.
I Database tables and fields TABLE 163 DEPLOYMENT_TARGET_MAP (Continued) Field Definition Format TARGET_TYPE_ID Foreign Key references TARGET_TYPE (id) Identifies the target type int TARGET_PARENT_ID Identifies the parent of the target. If, switch, device, port group, device group it will be same as target id. If it is port/interfaces the parent id will be the switch id int TABLE 164 Size DEVICE Field Definition Format DEVICE_ID Primary key for this table.
I Database tables and fields TABLE 164 DEVICE (Continued) Field Definition Format Size IS_SLB Flag to identify whether the device supports server load balancing or not. num (1,0) varchar 64 varchar 64 LAST_PROBE_TIME varchar 64 LAST_PROBE_STATUS varchar 64 FIRST_SEEN_TIME LAST_SEEN_TIME 1438 Time when the device is getting discovered by recent collection. IS_SFLOW_CAPABLE Flag to identify whether the device is SFlow capable or not.
I Database tables and fields TABLE 164 DEVICE (Continued) Field Definition Format Size TACPLUS_USERNAME_READ_ONL Y TACACS+ username for read only access. varchar 512 TACPLUS_PASSWORD_READ_ONL Y TACACS+ password for read only access. varchar 512 ENABLE_PASSWORD_PORT_CFG Enable password configured in device used for port configuration. varchar 512 ENABLE_PASSWORD_READ_ONLY Enable password for read only access. varchar 512 ADMIN_STATUS Device admin status.
I Database tables and fields TABLE 164 DEVICE (Continued) Field Definition Format PORT_COUNT Record the number of presented physical ports on the device. int SERIAL_NUMBER Record the serial number of the device. If there is no serial number, an empty string will be stored.
I Database tables and fields TABLE 164 DEVICE (Continued) Field Definition Format NETCONF_TRANSPORT The transport protocol used to connect to this device through Netconf. Possible values are: • 0=Netconf not supported by this device • 1=SSH • 2=HTTPS • 3=HTTP • 4=WING_HTTPS • 5=WING_HTTP smallint POE_CAPABLE The POE capability of device. Possible values are: • 0 = POE is not supported by this device • 1 = POE is supported with IEEE 802.
I Database tables and fields TABLE 164 1442 DEVICE (Continued) Field Definition Format Size VCS_LICENSED Indicates whether the cluster device has VCS license or not. Possible values are 0 for not applicable, 1 for licensed, 2 for not licensed. 0 is default. Clusters with 2 or less nodes will have value of 0 as all those clusters are automatically licensed. Clusters with 3 or more nodes will have values 1 or 2 depending on whether the license was acquired or not.
I Database tables and fields TABLE 164 DEVICE (Continued) Field Definition Format Size USER_DEFINED_VALUE_3 User defined value used for product. varchar 256 CLUSTER_MEMBER_STATE Indicates the state of the member in Fabric Cluster and Management Cluster. States can be Online, Offline, Rejoining etc.. For all other devices this column will be empty. varchar 64 TABLE 165 DEVICE_ENCLOSURE Field Definition Format ID* Unique generated database identifier.
I Database tables and fields TABLE 165 Definition Format TRUSTED Flag to mark the enclosure trusted. Default value is 0. smallint CREATION_TIME Time when enclosure was created. Default is ’now()’. timestamp MISSING Flag to indicate missing enclosure. Default value is 0. smallint MISSING_TIME Time when the enclosure is found to be missing. timestamp HOST_NAME Host Name corresponding to the Device Enclsoure.
I Database tables and fields TABLE 167 DEVICE_FDMI_DETAILS (Continued) Field Definition Format Size FIRMWARE_VERSION Holds the firmware version of the device available via FDMI ex: 2.1.0.2 varchar 64 DRIVER_VERSION Holds the driver version of the device available via FDMI, ex: 2.1.0.
I Database tables and fields TABLE 169 DEVICE_GROUP_ENTRY Field Definition Format DEVICE_GROUP_ID Database ID of the DEVICE_GROUP instance which the device is member of. int DEVICE_GROUP_ENTRY_ID Unique database auto generated identifier. int DEVICE_ID Database ID of the member DEVICE. int TABLE 170 DEVICE_NODE Field Definition Format ID* Unique generated database identifier. int FABRIC_ID Fabric DB ID to which this device node belongs. int WWN Device node WWN.
I Database tables and fields TABLE 171 DEVICE_PORT Field Definition Format NODE_ID Reference to the ID of the Device Node of which this device port is a part of. int DOMAIN_ID Stores the Domain ID of the switch to which this device port is connected to. int WWN Stores the Device Port WWN char 23 SWITCH_PORT_WWN Stores the switch port wwn to which this device port is physically connected to.
I Database tables and fields TABLE 172 Field Definition Format DEVICE_PORT_ID The primary key of the DevicePort int GIGE_PORT_ID The primary key of the GigEPort. int DIRECT_ATTACH Indicates whether the device port is directly attached to the CEE 10G TE port. smallint VIRTUAL_FCOE_PORT_ID The value of virtual_fcoe_port_id in the Device_Port_Gige_Port_Link table is applicable only for NOS devices.
I Database tables and fields TABLE 174 ENCRYPTION_ENGINE (Continued) Field Definition Format STATE Administrative state for this engine. 0 = disabled, 1 = enabled. The default value is 0. smallint SP_CERTIFICATE The public key certificate, in PEM format, for the Security Processor within the Encryption Engine. Used to create link keys for Decru LKM key vaults. varchar EE_STATE The operational status of this Encryption Engine.
I Database tables and fields TABLE 175 ENCRYPTION_GROUP (Continued) Field Definition Format Size LEADER_SWITCH_WWN The Node WWN of the current group leader switch. Each encryption group has one group leader switch. char 23 DEPLOYMENT_MODE Indicates Transparent (0) or NonTransparent (1) deployment mode. Only Transparent mode is currently supported. All switches in the Encryption Group share the same deployment mode.
I Database tables and fields TABLE 175 ENCRYPTION_GROUP (Continued) Field Definition Format KEY_VAULT_TYPE Indicates the type of key vault used by switches in this Encryption Group. 0 = Decru Lifetime Key Manager (LKM), 1 = RSA Key Manager (RKM), 2 = Brocade internal key storage (for demo use only). The default value is 0. smallint PRIMARY_KEY_VAULT_ID Foreign key reference to the KEY_VAULT record that describes the primary key vault for this Encryption Group.
I Database tables and fields TABLE 177 Definition Format Size AUTHENTICATION_MODE Indicates the configured User Authentication mode for the encryption group. Possible values are None, Username, UserPass, and NA. varchar 32 CERTIFICATE_TYPE Indicates the configured Certificate Type for the encryption group. Possible values are self, CASign, and NA. varchar 32 Size TABLE 178 ENCRYPTION_TAPE_POOL Field Definition Format ID Unique generated database identifier.
I Database tables and fields TABLE 180 ETHERNET_INTERFACE Field Definition INTERFACE_ID TABLE 181 Format int ETHERNET_ISL Field Definition Format ID Unique generated database identifier. int SOURCE_PORT_ID The unique id of the source port. int DEST_PORT_ID The unique id of the destination port. int MISSING Flag to identify whether the ethernet isl link is missing from the switch. smallint, MISSING_TIME Time when the ethernet isl link is missing from the switch.
I Database tables and fields TABLE 182 Definition Format EVENT_DESCRIPTION_ID Indicates the identifier of the event description in the EVENT_DESCRIPTION table. int LAST_OCCURRENCE_HOST _TIME Indicates the the Management application server timestamp when this event occurred last. timestamp EVENT_COUNT Indicates the number of occurrences of the event. Count indicates the number of times the same event occurred in a given ten minute window.
I Database tables and fields TABLE 184 EVENT_CATEGORY Field Definition Format ID Unique generated database identifier. int DESCRIPTION Holds the event categories. Possible values : Unknown- 0, Product Event- 1, Link Incident Event- 2 , Product Audit Event- 3, Product Status Event- 4, Security Event- 5 , User Action Event- 6, Management Server Event- 7. varchar 50 Size TABLE 185 Size EVENT_DESCRIPTION Field Definition Format ID Unique generated database identifier.
I Database tables and fields TABLE 186 Definition Format Size USER_NAME Captures the user information from audit Syslog messages. Varchar 512 PORT_NAME Shows the PortName for the corresponding port. Varchar 255 MAC_ADDRESS 'Indicates the MAC address of the Access Point from which this event is received. If the event is received from the wireless controller or any other products, this will be empty.
I Database tables and fields TABLE 188 EVENT_POLICY_SOURCE_ENTRY (Continued) Field Definition Format DEVICE_GROUP_ID A reference key to the Device Group Do not maintain it as a foreign key constraints. The default value is 0. int PORT_GROUP_ID A reference key to the Port Group Do not maintain it as a foreign key constraints. The default value is 0.
I Database tables and fields TABLE 190 Definition Format Size OPERATOR4 AND operator used to append the rule. varchar 12 WWN Source WWN. varchar 1024 OPERATOR5 AND operator used to append the rule. varchar 12 COUNT Count of the specified event. int OPERATOR6 AND operator used to append the rule. varchar DURATION Duration of the specified event. bigint STATE State of the rule: • 0 = Disabled • 1 = Enabled smallint SEVERITY_LEVEL Event severity level. Default value is 4.
I Database tables and fields TABLE 191 FABRIC (Continued) Field Definition Format MANAGEMENT_STATE Bit map to indicate various management indications for the fabric. Default value is 0. smallint TRACK_CHANGES 1 = changes (member switches, ISL and devices) in the fabric are tracked. Default value is 0. smallint STATS_COLLECTION 1 = statistics collection is enabled on the fabric. Default value is 0. smallint CREATION_TIME When the fabric record is inserted, i.e., created.
I Database tables and fields TABLE 191 Definition Format BOTTLENECK_STATUS Holds bottleneck status of fabric. Default is 0, Values are 0 or 1. int VCS_LICENSED Indicates whether the fabric has VCS license or not. Possible values are 0 for not applicable, 1 for licensed, 2 for not licensed. 0 is default. Fabrics representing clusters with 2 or less nodes will have value of 0 as all those are automatically licensed.
I Database tables and fields TABLE 194 FABRIC_MEMBER (Continued) Field Definition Format MISSING_TIME When it is missed from the fabric; null if the member is entrusted. timestamp LAST_UPDATE Last Updated time for the record. bigint TABLE 195 FABRIC_THRESHOLD_SETTING Field Definition Format FABRIC_ID* References the ID in FABRIC table int POLICY_ID* References the ID in THRESHOLD_POLICY table int TABLE 196 Definition Format FABRIC_ID Foreign key to ID in fabric table.
I Database tables and fields TABLE 198 FAVORITES (Continued) Field Definition Format CUSTOM_FROM The starting time. timestamp CUSTOM_TO The ending time. timestamp GRANULARITY The granularity. varchar THRESHOLD The reference line. int MAIN_MEASURE The measure of FC/FCIP/GE. varchar ADDITIONAL_MEASURE The additional measures. int CUSTOM_SELECTION_OBJE CT_TYPE Represents the selected filter type.
I Database tables and fields TABLE 201 FCIP_TUNNEL (Continued) Field Definition Format COMMUNICATION_RATE Bandwidth specified for the tunnel. double precision MIN_RETRANSMIT_TIME FCIP Tunnel Parameter. int SELECTIVE_ACK_ENABLED FCIP Tunnel Parameter. smallint KEEP_ALIVE_TIMEOUT FCIP Tunnel Parameter. int MAX_RETRANSMISSION FCIP Tunnel Parameter. int WAN_TOV_ENABLED Is WAN TOV enabled. Default value is 0. smallint TUNNEL_STATUS Tunnel Status (Active/Inactive).
I Database tables and fields TABLE 201 FCIP_TUNNEL (Continued) Field 1464 Definition Format FICON_TR_EMUL_ENABLED Whether Ficon_Tape_Read_Emulation is enabled on that tunnel. Default value is 0. smallint FICON_DEBUG_FLAGS FICON_DEBUG_FLAGS for that particular tunnel. Default value is -1. double precision REMOTE_WWN Configured WWN of the Remote Node. char CDC CDC Flag. Default value is 0. smallint ADMIN_STATUS Admin Status of the Tunnel. Default value is 0.
I Database tables and fields TABLE 201 FCIP_TUNNEL (Continued) Field Definition Format TURBO_WRITE_ENABLED Whether turbo write (fast write) is enabled or not (0,1). Default value is 0. smallint TAPE_ACCELERATION_ENA BLED Whether turbo write (fast write) is enabled or not (0,1). Default value is 0. smallint IPSEC_ENABLED Default value is 0. smallint PRESHARED_KEY The preshared key on tunnel. char QOS_HIGH QoS high value. smallint QOS_MEDIUM QoS medium value.
I Database tables and fields TABLE 202 1466 FCIP_TUNNEL_CIRCUIT (Continued) Field Definition Format VLAN_TAG VLAN Tag of the circuit. The default value is -1 int SELECTIVE_ACK Select acknowledgement flag.The default value is 0. smallint QOS_MAPPING QOS Mapping. The default value is 0. smallint PATH_MTU_DISCOVERY MTU Discovery Path. The default value is 0. smallint MIN_COMM_RATE Minimum communication int Speed. The default value is 0. MAX_COMM_RATE Maximum communication int Speed.
I Database tables and fields TABLE 202 FCIP_TUNNEL_CIRCUIT (Continued) Field Definition Format ENABLED Is circuit enabled. Default: 0, Values: 0|1. The default value is 0. smallint MISMATCHED_CONFIGURATIONS If a tunnel is down due to mismatched configurations on local and remote end, this property specifies the list of such mismatched configurations. varchar 1024 CIRCUIT_STATUS_STRING Circuit Status string value from switch for the tunnel varchar 256 L2COS_F_CLASS The default value is 0.
I Database tables and fields TABLE 203 Definition Format RX The number of octets or bytes that have been received by this port. One second periodic polling of the port. This value is saved and compared with the next polled value to compute net throughput. Note, for Fibre Channel, ordered sets are not included in the count.
I Database tables and fields TABLE 205 FCR_ROUTE Field Definition Format ID* Unique generated database identifier. int BB_FABRIC_ID Backbone fabric DB ID. int FCR_FABRIC_ID FID assigned to edge fabric. int SWITCH_WWN WWN of the router switch. varchar NR_PORT_ID Route parameter. int FCRP_COST Route parameter. int EX_PORT_WWN Ex_port WWN. varchar 128 Field Definition Format Size FEATURE_ID* ID used to uniquely identify the feature. int 6 NAME Name of the feature.
I Database tables and fields TABLE 209 Definition Format Size MANUFACTURER Manufacturer of the device, typically IBM. varchar 64 MANUFACTURER_PLANT Plant number where the device is manufactured. varchar 64 SEQUENCE_NUMBER Device sequence number. varchar 32 TAG FICON device property, e.g., 809a or 809b. varchar 16 FLAG FICON device property, e.g., 0x10 (hex). varchar 8 PARAMS FICON device property string, e.g., Valid channel port.
I Database tables and fields TABLE 212 FOUNDRY_DEVICE Field Definition Format DEVICE_ID Database ID of the DEVICE instance. int IMAGE_VERSION Firmware image version currently running in the device. varchar 128 PRODUCT_TYPE Product type of the device computed based on sysoid and version of main board. To get the main board version for devices, refer octet 28 of snChasMainBrdId MIB in foundry.mib.
I Database tables and fields TABLE 214 FOUNDRY_PHYSICAL_DEVICE (Continued) Field Definition Format Size SERIAL_NUMBER The serial number of the chassis. varchar 32 PRODUCT_TYPE Product type based on sysoid or architecture type and management module main board id. varchar 32 Size TABLE 215 FOUNDRY_PHYSICAL_PORT Field Definition Format PHYSICAL_PORT_ID Database ID of PHYSICAL_PORT instance. int CONNECTOR_TYPE The type of connector that the port offers.
I Database tables and fields TABLE 218 FRU (Continued) Field Definition Format Size PART_NUMBER provides the part number of the FRU element, requested by SMIA and values filled in by Switch Asset Collector.
I Database tables and fields TABLE 218 FRU (Continued) Field Definition Format CREATION_TIME provides the record creation time, standard columns for Management applciation and values filled in by Switch Asset Collector timestamp LAST_UPDATE_TIME provides the record creation time, standard columns for Management applciation and values filled in by Switch Asset Collector timestamp PREVIOUS_OP_STATUS provides the previous operational status of FRU element, requested by SMIA and values filled in b
I Database tables and fields TABLE 221 GIGE_PORT (Continued) Field Definition Format SPEED Port speed details. Default value is 0. bigint MAX_SPEED Port maximum speed supported. bigint MAC_ADDRESS MAC Address of that port. varchar 64 PORT_NAME GigE Port Name. varchar 64 OPERATIONAL_STATUS LED status. int LED_STATE LED status. smallint SPEED_LED_STATE GigE Port type details. smallint PORT_TYPE Port type for the GigE Port.
I Database tables and fields TABLE 223 Definition Format PORT_ID References the ID in SWITCH_PORT table. int CREATION_TIME The polling time. timestamp TX Transmit (TX) value in bytes. double precision RX Receive (RX) value in bytes. double precision TX_UTILIZATION Transmit utilization (TX%) value in percentage. double precision RX_UTILIZATION Receive utilization (RX%) value in percentage. double precision DROPPED_PACKETS Number of dropped packets.
Database tables and fields TABLE 227 I HBA Field Definition Format ID Unique generated database identifier. int HOST_ID ID of the Device Enclosure (Host) to which this HBA belongs to. int NAME User defined name of the HBA varchar 128 POWER_MODE Power mode of the HBA varchar 256 MODEL Model code of the HBA varchar 256 MODEL_DESCRIPTION Model description for the HBA varchar 256 OPERATING_STATUS Current operating status of the HBA: 1: Enabled/0: Disabled. The default value is 0.
I Database tables and fields TABLE 227 1478 HBA (Continued) Field Definition Format Size PCI_REG_NEG_LANE_COUNT The set number of PCI lanes that were initially negotiated. The default value is 8. int PCI_REG_GENERATION PCI generation varchar TRUSTED Denotes whether HBA is trusted by user or not. When the host first time discovered, all the HBAs will be trusted by default. If any HBA added later, then it will be in untrusted stated. 0 denotes untrusted and 1 is for trusted.
I Database tables and fields TABLE 227 HBA (Continued) Field Definition Format Size VPD_EXT_CAPABILITY EXT_CAPABILITY of the device varchar 256 VPD_OEM OEM details of the device varchar 256 VPD_OEM_INFO OEM related information of the device varchar 256 MAX_PCIF Maximum number of Pci functions. smallint CARD_MODE The mode that the card is operating on. smallint DRIVER_CARD_MODE It is the same as card type but uses new values applicable for 3.0 and later driver versions.
I Database tables and fields TABLE 229 HBA_PORT (Continued) Field Definition Format MISSING_TIME States the missing time of the this port. timestamp OPERATING_SPEED Operating speed of the hba port. The default value is 0.
I Database tables and fields TABLE 230 HBA_PORT_DETAIL (Continued) Field Definition Format BOOT_SPEED Boot speed for the port in Gbps. Possible values are 0 - AUTO_NEGOTIATE and 2, 4, 8, 16 Gbps. The default value is 0. int BOOT_TOPOLOGY Boot topology for the port. Possible values are 0 Point to Point , 1 - Loop. The default value is 1. int BOOTUP_DELAY On starting system how long system needs to wait for user action. Configured value ranges 0,1,2,5 and 10 minutes. Default value is 0.
I Database tables and fields TABLE 230 HBA_PORT_DETAIL (Continued) Field Definition Format Size RECIEVE_BUFFER_CREDIT Receiving buffer-to-buffer credits (BB_credits) for the port. varchar 64 TRANSMIT_BUFFER_CREDI T Transmitting buffer-to-buffer credits (BB_credits) for the port. varchar 64 FCSP_AUTH_STATE Indicates whether FC-SP authentication is on or off. The default value is 0. smallint FCSP_STATUS The status of FC-SP authentication. The default value is 'Disabled'.
I Database tables and fields TABLE 230 HBA_PORT_DETAIL (Continued) Field Definition Format Size FEC_STATE State of FEC. The FEC (Forward Error Correction) is an error recovery mechanism that allows the receiver of the corrupted frame to correct the error without referring back to the port which transmitted the frame. Supported on prowler card in FC mode. Applicable values are Online, Offline and Not Supported. Note : Not Supported on (PORT_MEDIA_MEZZANINE_CARD).
I Database tables and fields TABLE 232 HBA_PORT_FCOE_DETAILS (Continued) Field Definition Format MTU Maximum transmission unit in bytes of the FCoE port. Default - 2112, 0 - auto int PATH_TOV The value between 0 and 60 that specifies the time-out session.
I Database tables and fields TABLE 233 HBA_REMOTE_PORT (Continued) Field Definition Format Size STATE Indicates whether the device is online or offline. The default value is ‘Offline’. varchar 64 SUPPORTED_COS The types of classes that are supported on the remote port; for example, Class-3 varchar 32 DEVICE_TYPE The type of the device; for example, Disk or Tape. varchar 64 BIND_TYPE The persistent bind type. The default value is 0.
I Database tables and fields TABLE 233 HBA_REMOTE_PORT (Continued) Field TASK_RENTRY_IDENT_SUP PORT CONFIRMED_COMPLETION S_SUPPORT TABLE 234 Format The number of PRLI responses from the target to the initiator and begins when HBA Port starts FCP exchanges.Zero would mean unsupported and nonzero value implies supported. The default value is 0. int The number of confirmed completions on the remote port and begins when HBA Port starts FCP exchanges.
I Database tables and fields TABLE 235 HBA_TARGET (Continued) Field Definition Format TRUSTED Denotes whether target is trusted or not. 0 denotes untrusted and 1 is for trusted. smallint CREATION_TIME Creation time of the entry timestamp MISSING Flag to indicate if the remote LUN is missing. The default value is 0. smallint MISSING_TIME Time at which the LUN is marked missing. timestamp TARGET_ID The identifier of the target device as reported by each HBA port. The default value is 0.
I Database tables and fields TABLE 237 HOST_DISCOVERY_REQ_GROUP Field Definition Format ID Auto generated primary key int NAME Unique name for the host request. The default value is ‘ New Host Group'. varchar( Primary key from the host discovery options table. Points to the associated discovery options int Reflects the status of the request E.g. 0-> Completed, 1->Delete Pending. The default value is 0.
I Database tables and fields TABLE 240 INM_IP_INTERFACE (Continued) Field Definition SUBNET_MASK PRIMARY_IP TABLE 241 Format Size varchar 40 Indicates if the IP address is the primary IP address of the Interface. 1 - Primary 0 - Secondary.
I Database tables and fields TABLE 242 Field Definition Format ID Unique generated database identifier. serial DEPLOYMENT_ID Deployment configuration ID. Foreign Key for DEPLOYMENT table. int CLEAR_CONFIGURATION 1/0 corresponding to ''Clear Assignment'' / ''Assign Configuration'' for interface level configuration. smallint WRITE_TO_DEVICE 1/0 corresponding to Write to device/not write to device for outbound traffic. smallint BINDING_DIRECTION Represents the binding direction.
I Database tables and fields TABLE 245 IP_ROUTE (Continued) Field Definition Format Size NET_MASK Subnet Mask for the Route. varchar 64 GATEWAY Gateway for the Route. varchar 64 IP_ADDRESS IP Address created after ''”&”'' operation of gateway. varchar 64 METRIC Metric. int FLAG Flag. int CHECKSUM Check Sum. varchar GIGE_PORT_TYPE Whether the IP interface is created on a 10G cross port or not. Non-zero value denotes a cross port.
I Database tables and fields TABLE 248 Definition Format CREATION_TIME Creation time of the ISL record in the Management application database. timestamp MISSING Denotes whether ISL link is missing or not. • 0 denotes present • 1 states that ISL is missing smallint MISSING_TIME States the missing time of the this ISL. timestamp missing_reason The ISL disabled reason. For an ISL either one or both ends might have been disabled.
I Database tables and fields TABLE 249 ISL_CONNECTION Field Definition Format SOURCE_MASTER_PORT This column will hold the trunk master port for the source port, if the connection is trunked. For the master connection it will have its source por''s port number. For non-trunk connections it will have the default value -1. int TARGET_MASTER_PORT This column will hold the trunk master port for the target port, if the connection is trunked.
I Database tables and fields TABLE 251 Definition Format MISSING Denotes whether ISL trunk member is missing or not. 0 denotes present and 1 states that ISL trunk member is missing. smallint MISSING_TIME We could change this as "States the missing time of the this ISL trunk member. If the member is not missing then it will be null. timestamp TABLE 252 Size KEY_VAULT Field Definition Format ID Unique generated database identifier.
I Database tables and fields TABLE 254 L2_ACL_INTERFACE_DEPLOY_MAP (Continued) Field Definition Format OUTBOUND_L2_ACL_ID L2 Access control List ID of the L2 ACL selected for outbound. Foreign Key for L2_ACCESS_CONTROL_LIST table. int OUTBOUND_WRITE_TO_DEVICE 1/0 corresponding to Write to device/not write to device for outbound traffic.
I Database tables and fields TABLE 256 Definition Format Size MAC_ADDRESS MAC address of LAG(Port-Channel). varchar 64 IP_ADDRESS Primary IPAddress of the LAG varchar 128 NET_MASK Netmask of the Primary IPAddress of the LAG varchar 128 MINIMUM_LINKS Least number of operationally UP links to declare the port-channel UP. range 1..16. int MTU Maximum transmission unit in bytes. range 1522..9208. int LOAD_BALANCE Load balancing details.
I Database tables and fields TABLE 259 LAUNCH_IN_CONTEXT_MODULE (Continued) Field Definition Format READ_WRITE_ACCESS Specifies the read or write access privilege required to launch this dialog. 0 = no access is required to launch this dialog. 1 = At least the read-only access is required for the above privilege to launch this dialog. 2 = The read-write access is required for the above privilege to launch the dialog.
I Database tables and fields TABLE 260 LICENSE (Continued) Field Definition Format SUB_TYPE Sub Type of license: • 0 - Base, • 1 - Addon. The default value is 0. smallint VALID Is this license still considered: 0 - No, 1 - Yes. The default value is 1. smallint TABLE 261 • • LICENSE_DOWNGRADE_DETAILS Field Definition Format Size ID Primary key ID. PREVIOUS_LICENSE_INFO Previous License information during downgrade.
I Database tables and fields TABLE 264 LICENSED_FEATURE Field Definition Format ID* Unique generated database identifier. int NAME License feature name, a short text description. varchar 64 DESCRIPTION Optional detailed description about the license feature. varchar 256 TABLE 265 Size LINK Field Definition Format LINK_ID Unique database generated identifier. int TYPE Type of the link. Currently it is always U.
I Database tables and fields TABLE 268 Definition Format TAG_ENABLED Indicates whether the LSAN tag is enabled or not. Possible values are 0 -false, 1 - true. smallint ENFORCE_TAGS List of enforcement tags configured in FC router. Enforce tag reduces the resources used in an FC router by limiting the number of LSAN zones that will be enforced in that FC router. There can be maximum of 8 enforce tags per FC router. varchar 128 SPEED_TAGS Speed tag configured in FC router.
I Database tables and fields TABLE 272 LSAN_ZONE_MEMBER Field Definition Format LSAN_ZONE_ID* LSAN_ZONE record reference. int MEMBER_PORT_WWN* Zone member WWN. char 23 Field Definition Format Size MCT_CLIENT_ID MCT Client db ID. int RBRIDGE_ID MCT Client rbridge ID. int CLIENT_NAME MCT Client name. varchar PORT_ID MCT Client port foreign key. int OPER_STATE MCT Client operational state.
I Database tables and fields TABLE 278 Field Definition Format ID The primary key of the table. int HOST_TIME The time at which the server processed the event. timestamp CATEGORY The violations category. i.e. Port Health, Fabric Health, etc. int VIOLATION_TYPE The type of the violation. i.e. CRC, ITW. int MANAGED_ELEMENT_ID The managed element corresponding to this event. int ORIGIN_FABRIC_ID The fabric from which the event originated. Retaining this id as historical data.
I Database tables and fields TABLE 280 MAPS_EVENT_CAUSE_ACTION Field Definition Format VIOLATION_TYPE The type of the violation. i.e. CRC, ITW, as defined in MapsConstants. int ACTION Description of the recommended action for the MAPS violation. varchar 4096 Size TABLE 281 MAPS_POLICY Field Definition Format ID The primary key of the table. int VIRTUAL_SWITCH_ID The id of the virtual switch. int NAME The name of the MAPS policy.
I Database tables and fields TABLE 284 MODULE Field Definition Format MODULE_TYPE_ID Primary key for this table. int MODULE_TYPE Type of the module. NAME Name of the module configured in this device. DESCRIPTION Description of the module. varchar 128 NUM_PORTS Number of ports present in this module. num (4,0) TABLE_SUBTYPE Identifies the table name which more properties/attributes about this module stored. Possible value is FOUNDRY_MODULE.
I Database tables and fields TABLE 287 MPLS_ADMIN_GROUP Field Definition Format MPLS_ADMIN_GROUP_DB_ID Unique database generated identifier. int NAME The group name that this administrative group is associated with. varchar ID Identifies the administrative group. int DEVICE_ID Database ID of the DEVICE instance from which this admin group is retrieved.
I Database tables and fields TABLE 291 Field Definition Format MPLS_PATH_HOP_DB_ID Unique database generated identifier. int HOP_INDEX Index of the MPLS hop. int HOP_IP_ADDRESS The Tunnel Hop Address for this tunnel hop. varchar HOP_TYPE Denotes whether this tunnel hop is routed in a strict or loose fashion. Possible Values are Strict-1 and Loose-2. smallint MPLS_PATH_DB_ID Database ID of the MPLS_PATH Instance which this hop is part of.
Database tables and fields TABLE 292 I MPLS_RSVP_LSP (Continued) Field Definition Format Size IS_LSP_FOR_ISIS_SHORTCUTS_ ANNOUNCE Flag that indicates if the LSP is to be announced into ISIS domain. num (1,0) LSP_FOR_ISIS_SHORTCUTS_AN NOUNCE_METRIC If announced into ISIS domain metric used by the LSP. int TABLE 293 MPLS_RSVP_LSP_ACTUALLY_ROUTED_HOP Field Definition Format MPLS_RSVP_LSP_ACTUALLY_RO UTED_HOP_DB_ID Unique database generated identifier.
I Database tables and fields TABLE 296 Definition Format Size HOP_LIMIT Represents the limit for the number of hops the LSP can traverse. Accepted range is 0 - 255. num (3,0) IS_FACILITY_BACKUP Specifies whether the request for Facility backup is enabled or not. If the FRR mode is facility then this value will be 1. 0 otherwise. num (1,0) SETUP_PRIORITY The setup priority for MPLS Fast Reroute.Allowed range between 0-7. num (1,0) HOLD_PRIORITY 'The hold priority for MPLS Fast Reroute.
TABLE 297 Database tables and fields I Size MPLS_RSVP_LSP_PARAMETERS (Continued) Field Definition Format REOPTIMIZE_TIMER The number of seconds from the beginning of one reoptimization attempt to the beginning of the next attempt. Valid range is 300-65535 seconds. 0 is also accepted. int MPLS_LSP_DB_ID Database ID of the MPLS_RSVP_LSP instance which these parameters are associated with.
I Database tables and fields TABLE 300 Definition Format VLL_MODE Specifies the Virtual Local Loop (VLL) Mode. Possible values are Unknown-0, Raw-1 and Taggged-2. smallint STATUS Status of the MPLS Service. All Peers Up-1, All Peers Down-2, Some Peers Down-3, Undefined-0. smallint CONFLICTS The type of Conflict. Possible values are None-0, Name Mismatch-1, VLL Mode Mismatch-2, Peer Incomplete-4, No Endpoints-8, Peer Missing-16, Duplicate VCID-32, Unknown-65535.
I Database tables and fields TABLE 302 MPLS_SERVICE_ENDPOINT_RELATION (Continued) Field Definition Format TAG_TYPE The type of tagging supported. Possible values are Untagged-1, Dual-2 and Inner VLAN/ISID-3. ISID applicable only when dual tagging enabled for VPLS. smallint INNER_VLAN_ID This value indicates the inner tag for this endpoint. If tagging type is dual, then it returns the inner vlan id of the end point (VLL/VPLS). If tagging type is ISID and Untagged this value will be 0.
I Database tables and fields TABLE 305 1512 MRP_RING_DEVICE (Continued) Field Definition Format Size MRP_RING_NAME User configured name for the ring. varchar 255 TOPO_GRP_ID Topology group ID. int STATE Whether MRP is enabled or disabled on the device. Disabled-1, Enabled -2. smallint ROLE Represents role of device in MRP topology. Master-2, Member-3.
I Database tables and fields TABLE 306 N2F_PORT_MAP Field Definition Format ID* Unique generated database identifier. int VIRTUAL_SWITCH_ID Virtual switch ID of AG for N to F_port mapping, foreign key to VIRTUAL_SWITCH table. int N_PORT Port number of port type N_Port which is being mapped, One N_Port can be mapped to multiple F_ports. smallint F_PORT Port number of port type F_Port which is being mapped.
I Database tables and fields TABLE 310 Definition Format Size SRCPORT Comma separated list of source switch ports. varchar 1024 DSTPORT Comma separated list of destination switch ports. varchar 1024 BIDIR This specifies if traffic in both direction has to be monitored, where, 0 - false, 1 - true. smallint SFID Source fabric ID.
I Database tables and fields TABLE 311 NP_SUB_FLOW Field Definition Format FEATURE Feature this sub flow is associated with. Feature can be one of the following: Monitor - 0, Generator - 1, Mirror - 2 int SRCDEV Source device port. varchar 32 DSTDEV Destination device port. varchar 32 SRCPORT Switch Source port. varchar 32 DSTPORT Switch Destination port.
I Database tables and fields TABLE 314 Field Definition Format ID Unique generated database identifier. int WWN The Wwn of the phantom port. char VIRTUAL_SWITCH_ID The id of the phantom switch. int PORT_NUMBER The port number of the phantom port. The default value is -1. smallint PORT_ID The portId of the phantom port. The default value is 000000. varchar SPEED The speed of the phantom port. The default value is 0. int MAX_SPEED The max speed of the phantom port.
I Database tables and fields TABLE 316 PHYSICAL_INTERFACE Field Definition Format INTERFACE_ID Primary key for this table. int PHYSICAL_PORT_ID Foreign key which refers PHYSICAL_PORT table. int SPEED_IN_MB Interface speed in Mega Bytes. int PHYSICAL_ADDRESS MAC address of this interface. varchar LINK_ID Foreign key which refers LINK table. int DUPLEX_MODE Interface duplex mode. Full/Half/Auto.
I Database tables and fields TABLE 317 Field Definition Format PHYSICAL_PORT_ID Database unique generated identifier. int PORT_NUM Port number from interface identifier. smallint MODULE_ID Database ID of the module which this port is present. int IS_PORT_PRESENT This flag is to indicate whether the port is presented in the device. Unknown-0, Present-1 and Not present -2. smallint TABLE_SUBTYPE PHYSICAL_PORT table sub type.
I Database tables and fields TABLE 321 PM_DASHBOARD_WIDGET Field Definition Format DASHBOARD_WIDGET_ID Primary key column. int TIME_SCOPE Time in unit of seconds, for which the data has to be fetched from DB going back from now applicable for top N, distribution, and top Flow, time series. int REFRESHING_INTERVAL The widget refreshing interval in seconds, in 11.3 we will fix it at 600 (10 mins) and not expose it to user. int MONITOR_TYPE The widget refreshing interval in seconds, in 11.
I Database tables and fields TABLE 321 Definition Format LEVEL5_ENABLED Enable / disable the fifth threshold check. This value is applicable only for Top N, Top Flow widgets. Default is 0. smallint LEVEL5_VALUE Limit value for the fifth percentage band. In case of Top N, Top Flow widgets only three percentage band s are available. This value is not applicable. Default is 0. double precision LEVEL5_COLOR RGB color for the fifth percentage band.
I Database tables and fields TABLE 322 PM_DATA_COLLECTOR (Continued) Field Definition Format Size THRESHOLD_OP Stores the threshold operator value. varchar 10 REARM_OP Stores the rearm operator value. varchar 10 IS_REARM_ABS Whether or not the rearm. Default - 0. smallint THRESHOLD_SEVERITY The severity for the threshold event. smallint REARM_SEVERITY The severity for the rearm event. smallint IS_SYSTEM Indicates whether this is a system built in collector, user cannot delete it.
I Database tables and fields TABLE 326 Field Definition Format WIDGET_ID The id of the widget definition. int MEASURE_TYPE stores measure type id of the widget, a widget could map to multiple measure types. int TABLE 327 Size PM_WIDGET_MONITOR_TYPE Field Definition Format Type Primary key column. int NAME Storing the NAME of the monitor type. varchar 64 Size TABLE 328 Size PM_WIDGET_TARGET_ENTRY Field Definition Format WIDGET_ID The ID of the widget definition.
I Database tables and fields TABLE 331 PM_WIDGET_USER_ENTRY Field Definition Format WIDGET_ID The ID of the widget definition. int USER_ID ID of the user who is using the widget definition. int TABLE 332 POE_THRESHOLD Field Definition Format ID Unique generated database identifier. serial TYPE This field indicates if the threshold is defined for product and port level measure.
I Database tables and fields TABLE 334 Field Definition Format SWITCH_PORT_ID The database ID of the switch port that the configuration belongs to. int BOTTLENECK_DETECT _ENABLED Flag indicates if bottleneck detection is enabled or not. The default value is 0. smallint ALERTS_ENABLED Flag indicates if bottleneck detection alerts is enabled or not.The default value is -1. smallint CONGESTION_ THRESHOLD Value of bottleneck detection congestion threshold in percent. The default value is -1.
I Database tables and fields TABLE 336 PORT_COMMISSION_CIMOM_SERVER (Continued) Field Definition Format Size PASSWORD Password to be used for authenticating. Stored in encrypted format. varchar 512 STATUS Status before and after contacting the CIMOM Server. Possible values are 0 - OK, 1- Not Contacted Yet , 2 - Credentials Updated, 3 - Credentials Failed, 4 - Not Reachable. int LAST_CONTACTED_TIME Last time CIMOM server contacted.
I Database tables and fields TABLE 338 PORT_FENCING_POLICY_MAP (Continued) Field Definition Format Size SUB_LEVEL • • • char 23 NODE WWN of Node which policy assigned. char 23 Directly assigned or inherited from root level. 0 = Directly assigned 1 = Indirectly assigned smallint INHERITANCE TABLE 339 • • PORT_PROFILE Field Definition Format ID Auto generated id for the created profile int SWITCH_ME_ID Incase of a VCS discovery in M/C mode this is the cluster meid.
I Database tables and fields TABLE 341 PORT_PROFILE_MAC_MAP Field Definition Format ID Auto generated ID for the created profile int PROFILE_ID DB id of the port profile int MAC Mac address mapped to the port profile varchar 32 NAME User assigned name to the mac varchar 256 Size TABLE 342 Size PORT_PROFILE_QOS_MAP Field Definition Format ID Auto-generated ID for the created profile int PROFILE_ID DB ID of the port profile int DCB_MODE If the mode is dcb or non dcb.
I Database tables and fields TABLE 343 Definition Format COS2_RX RX setting for this cos field 0: NO 1: YES smallint COS6_TX TX setting for this cos field 0: NO 1: YES smallint COS6_RX RX setting for this cos field 0: NO 1: YES smallint COS7_TX TX setting for this cos field 0: NO 1: YES smallint COS7_RX RX setting for this cos field 0: NO 1: YES smallint TABLE 344 Size PORT_PROFILE_VLAN_MAP Field Definition Format ID Unique generated database identifier.
I Database tables and fields TABLE 345 PORT_VLAN (Continued) Field Definition Format PVLAN_TYPE pvlan_type value for vlan.0- Normal VLAN. The following are PVLAN Types applicable for NOS4.0 and above.1- Primary PVLAN, 2- Isolated secondary PVLAN, 3- Community secondary PVLAN. int PRIMARY_VLAN_ID Private VLAN domain is built with one primary VLAN and one or more secondary VLANs.
I Database tables and fields TABLE 348 Field Definition Format VLAN_DB_ID Database ID of the VLAN instance which is associated with the protocol. int PROTOCOL Protocol for VLAN. Possible values are 1-IP, 2-IPX, 3-AppleTalk, 4-DECnet, 5-NetBIOS, 6-Other and 7-IPv6. num (4,0) TABLE 349 Size QRTZ_BLOB_TRIGGERS Field Definition Format Size TRIGGER_NAME* Name of the trigger. varchar 80 TRIGGER_GROUP* Name of the trigger group. varchar 80 BLOB_DATA The Scheduler info.
I Database tables and fields TABLE 352 QRTZ_FIRED_TRIGGERS (Continued) Field Definition Format IS_STATEFUL Whether the job implements the interface StatefulJob. boolean REQUESTS_RECOVERY True or false. boolean TABLE 353 size QRTZ_JOB_DETAILS Field Definition Format Size JOB_NAME* Name of the job. varchar 80 JOB_GROUP* Name of the job group. varchar 80 DESCRIPTION Description of the job (optional). varchar 120 JOB_CLASS_NAME The instance of the job that will be executed.
I Database tables and fields TABLE 357 Definition Format Size CHECKIN_INTERVAL Repeat interval. num (13,0) RECOVERER Misfire instruction.
I Database tables and fields TABLE 362 RECOVERY_CARD_GROUP_MAPPING (Continued) Field Definition Format SMART_CARD_ID Foreign key reference to the SMART_CARD that is registered as a recovery card for the encryption group. int POSITION_ The position of the card within the recovery card set. 1 = first card, 2 = second card, etc. int Field Definition Format ID* Meta Data for available reports. int NAME Report name. varchar 128 DESCRIPTION Report type description.
I Database tables and fields TABLE 366 Field Definition Format RESOURCE_GROUP_ID* Resource group ID. int FABRIC_ID* Fabric ID, which is in the resource group. int TABLE 367 Size RESOURCE_GROUP Field Definition Format ID* Unique generated database identifier. int NAME Resource group name. varchar 128 DESCRIPTION Resource group description.
I Database tables and fields TABLE 371 SAN Field Definition Format ID* Unique generated database identifier. int NAME Name of this SAN. varchar 256 CONTACT Contact person for this SAN. varchar 256 LOCATION Location of this SAN. varchar 256 DESCRIPTION Description. varchar 256 STATS_COLLECTION 1 = statistics collection is enabled; otherwise, 0. Default value is 0. smallint CREATION_TIME time at which this record was created. Default value is ’now()’.
I Database tables and fields TABLE 373 Field Definition Format ID Unique generated database identifier. int HOST The FQDN or the ip address of the host varchar 256 DOMAIN The domain of the SCOM server host varchar 256 USER_NAME The domain user to login into the SCOM Server varchar 64 PASSWORD The password to login into the SCOM Server varchar 64 VERSION The version of SCOM. Default is 6.1.7221.0 which is SCOM 2007 R2. The default value is '6.1.7221.0' .
I Database tables and fields TABLE 375 SELECTED_FLYOVER_PROPERTY (Continued) Field Definition Format Size USER_NAME* The name of the user who selected the property to be shown on flyover. varchar 128 POSITION_ The user preferred position of the selected flyover property. int Field Definition Format ID Unique generated database identifier.
I Database tables and fields TABLE 376 Definition Format LAST_UPDATE_TIME provides the record last updated time, standard columns for Management applciation and values filled in by Switch Asset Collector timestamp FRU_TYPE provides the type of the sensor, requested by SMIA and values filled in by Switch Asset Collector will be available only from FOS 6.4 switches and above. The values represents FAN,PS, SLOT etc. The default value is -1.
I Database tables and fields TABLE 378 SFLOW_HOUR_SUMMARY Field Definition Format SRC_MAC MAC address of the source in the received sFlow packet. byte DEST_MAC MAC address of the destination in the received sFlow packet. byte L3_SRC_ADDR L3 address of the source in the received sFlow packet. byte L3_DEST_ADDR L3 address of the destination in the received sFlow packet. byte L3_PROTOCOL L3 protocol value in the received sFlow packet. For example, ARP.
I Database tables and fields TABLE 378 Definition IN_PORT_TYPE This column is used to store the port type of the smallint incoming traffic interface. For VCS switch the value of • 0 means its edge port. • 1 means its trill port. For other devices Default value is 0. OUT_PORT_TYPE smallint This column is used to store the port type of the outgoing traffic interface. For VCS switch the value of • 0 means its edge port. • 1 means its trill port. For other devices Default value is 0.
I Database tables and fields TABLE 380 SFLOW_MINUTE_BGP (Continued) Field Definition Format IN_PORT_TYPE Port type of the incoming traffic interface. For VCS member the value of, • 0 means its edge port. • 1 means its fabric port. For other devices Default value is 0. smallint OUT_PORT_TYPE Port type of the outgoing traffic interface. For VCS member the value of, • 0 means its edge port • 1 means its fabric port. For other devices Default value is 0.
I Database tables and fields TABLE 382 Definition Format SRC_MAC MAC address of the Source in the received sFlow packet. bytea DEST_MAC MAC address of the destination in the received sFlow packet. bytea TABLE 383 Definition Format MAX_SLNUM Maximum row count. bigint Size SFLOW_MINUTE_MAC Field Definition Format SLNUM This column is used to store a counter value to identify the total row count. bigserial TIME_IN_SECONDS Data collection time in seconds.
I Database tables and fields TABLE 386 SFLOW_MINUTE_SUMMARY Field Definition Format SLNUM This column is used to store a counter value to identify the total row count. bigserial TIME_IN_SECONDS Data collection time in seconds. int DEVICE_ID ID of the product which sends the sflow traffic. int FRAMES Number of frames transmitted through the sflow sample collected. bigint BYTES Number of bytes transmitted through the sflow sample collected.
I Database tables and fields TABLE 388 Field Definition Format MAX_SLNUM Maximum row count. bigint TABLE 389 Definition Format SFLOW_REPORT_L3_SOURCE_ID Primary key autogenerated ID. int REPORT_DEFINITION_ID Report definition ID. int ADDRESS_GROUP_ID ACL network group IDs mapped with a report definition. int IP_SUBNET_DEFINITION_ID Subnet IDs mapped with a Report definition.
I Database tables and fields TABLE 391 SFLOW_STAGING (Continued) Field Definition Format L3_SRC_ADDR L3 address of the source in the received sFlow packet. bytea L3_DEST_ADDR L3 address of the destination in the received sFlow packet. bytea L3_PROTOCOL L3 protocol value in the received sFlow packet. For example, ARP. int IP_TOS Type of service ID in the received sFlow packet. smallint L4_PROTOCOL L4 protocol value in the received sFlow packet. For example, IGP.
I Database tables and fields TABLE 392 SFLOW_STAGING_SLNUM Field Definition Format MIN_SLNUM Maximum row count. bigint Definition Format TABLE 393 SLOT Field Size SLOT_ID int PHYSICAL_DEVICE_ID int CORE_SWITCH_ID int SLOT_NUM num (4,0) Size TABLE 394 1546 Size SMART_CARD Field Definition Format ID Unique generated database identifier. int CARD_TYPE Indicates how this smart card is configured: 0 = authorization card. The default value is 0.
I Database tables and fields TABLE 395 SMIA_SAN_NAME Field Definition Format Size NAME 'This will be the principal switch WWN of the fabric.'; varchar 24 ELEMENT_NAME User friendly name to identify the SAN varchar 32 IS_PRIMARY_FABRIC This value will indicate whether principal switch WWN has primary ownership or not. In case of simple FC fabric, the value will be always 1.
I Database tables and fields TABLE 397 Definition Format Size WRITE_COMMUNITY_ STRING The SNMP Write-Only Community String is like a password. It is sent along with each SNMP Set-Request and allows (or denies) access to a device. The default value is "private". This is applicable if the agent is configured to operate in SNMPv1. varchar 64 USER_NAME A human readable string representing the name of the user. This is applicable if the agent is configured to operate in SNMPv3.
I Database tables and fields TABLE 398 SNMP_DATA (Continued) Field Definition Format COLLECTOR_ID Correspoding collector table ID. int MIB_INDEX Index value for a MIB varaible. For scalar value it will be empty. varchar 256 Size TABLE 399 Size SNMP_DATA_1DAY Field Definition Format ID Primary key autogenerated ID. int MIB_OBJECT_ID The DB ID of MIB_OBJECT.
I Database tables and fields TABLE 401 SNMP_DATA_30MIN (Continued) Field Definition Format VALUE Value collected by the engine double precision TIME_IN_SECONDS Time at which collection occured in seconds int COLLECTOR_ID DB Id of the collector object used for collection int MIB_INDEX MIB index used for collection if applicable char 256 Size TABLE 402 SNMP_EXPR_DATA Field Definition Format ID Primary key column. serial EXPRESSION_ID MIB object ID.
I Database tables and fields TABLE 404 SNMP_EXPR_DATA_2HOUR (Continued) Field Definition Format TARGET_TYPE smallint TARGET_ID int VALUE double precision TIME_IN_SECONDS int COLLECTOR_ID int TABLE 405 SNMP_EXPR_DATA_30MIN Field Definition Format ID Primary key autogenerated ID int EXPRESSION_ID DB ID of the expression object used for collection int TARGET_TYPE Target/Source type can be device:0 or interface/ports:1' smallint TARGET_ID DB Id of the target which can be device o
I Database tables and fields TABLE 407 1552 SNMP_PROFILE (Continued) Field Definition Format Size RETRY_COUNT Number of times to retry if get/set request to the SNMP agent times out. Default value is 3. smallint TIMEOUT Timeout value in seconds before for a get/set request to the SNMP agent. Default value is 5. smallint VERSION SNMP agent version running on the switch as in SNMPv1 and SNMPv3 varchar 6 READ_COMMUNITY_STRING The SNMP Read-Only Community String is like a password.
I Database tables and fields TABLE 408 SOURCE_OBJECT_TYPE Field Definition Format ID* Unique generated database identifier. int TYPE_NAME Type of the object to which the event applies, such as Fabric, Switch or Port. char 64 DESCRIPTION Description of the object varchar 255 Size TABLE 409 SSL_CERTIFICATE_VIP_SERVER_MAP Field Definition Format SSL_CERTIFICATE_ID Foreign key to SSL_CERTIFICATE_ID in ssl_certificate table int VIP_SERVER_ID The column holds ID of VIP Server.
I Database tables and fields TABLE 411 STATS_AGING (Continued) Field Definition Format POLICY_TYPE The type of the aging ploicy. • 100 - Default aging (1 day 5 mins samples, 3 days 30 mins samples,7 days 2 hrs sample and 2 years 1 day samples) • 101 - 5 mins to 1 day aging(8 days 5 mins samples and 90 days of 1 day samples) smallint ACTIVE The active state of the policy.
I Database tables and fields TABLE 414 SWITCH_BOTTLENECK_CONFIG Field Definition Format LATENCY_SEVERITY The factor by which throughput must drop in a second in order for that second to be considered affected by latency bottlenecking. Range (1 to 1000). int LATENCY_TIME The minimum fraction of a second that must be affected by latency in order for that second to be considered affected by latency bottlenecking. Range (0 to 1).
I Database tables and fields TABLE 417 Definition Format Size PRODUCT_FAMILY This represents the product family that each OID belongs to. varchar 128 BRIEF_PRODUCT_FAMILY Shorter name for the product family. varchar 32 SPEED Switch max speed. Value 0 represents NotAvailable. smallint MULTI_CP_CAPABLE Switch is multi cp cabable or not. 0 means single CP and 1 means multi. smallint MIN_IMAGE_VERSION Supported min firmware version.
I Database tables and fields TABLE 418 SWITCH_PORT (Continued) Field Definition Format Size LOCKED_PORT_TYPE Indicates the locked port type of the port. Ports can be locked down so that they can come up only in that mode. varchar 16 CATEGORY Denotes the category of the switch. 1 denotes FC port and 2 denotes gige port. smallint PROTOCOL The protocol used by the port. FC, FCIP etc. varchar 16 SPEED Actual speed at which the port is currently operating.
I Database tables and fields TABLE 418 1558 SWITCH_PORT (Continued) Field Definition Format Size RATE_LIMITED Denotes if the port has Rate Limiting Enabled. smallint QOS_CAPABLE Indicates if the port is QOS capable. smallint QOS_ENABLED Indicates if the port is QOS enabled. smallint TUNNEL_CONFIGURED Denotes if the port has a fcip tunnel configured. smallint FCIP_TUNNEL_UP Denotes if the fcip tunnel that is configured is up. smallint FCR_FABRIC_ID Stores the FCR fabric ID.
I Database tables and fields TABLE 418 SWITCH_PORT (Continued) Field Definition Format LATENCY_DETECT_SUPPOR TED Whether the port supports latency detection. 1 means true and 0 means false smallint PREVIOUS_STATE Fields copies the old state of the port . The field could be used to track the state change information for the switch port . SwitchAssetCollector sets this field during the collection time.
I Database tables and fields TABLE 418 Definition Format FEATURES_ACTIVE Holds as a bit mask the features that are active. Please note that this is different from the enabled value which is found in the FEATURES_ENABLED column. Each bit would represent features like Encryption, compression etc. The bit mask and their corresponding Features are defined as an enum in the domain model class - SwitchPort.java. int DISABLED_REASON The Switch Port disabled reason.
I Database tables and fields TABLE 422 TARGET_TYPE Field Definition Format ID Unique generated database identifier. serial TYPE Type of the target device. Some possible values are • Switch • Device • Port • Host • Port Group • Product Group • VLAN • Fabric varchar 64 Size TABLE 423 Size THIRD_PARTY_DEVICE Field Definition Format DEVICE_ID Primary key for this table. int DEVICE_TYPE Type of the third party device.
I Database tables and fields TABLE 425 Definition Format ME_ID ME_ID of the target. int VALUE 30 mins aggregated data. double precision TABLE 426 Definition Format TIME_IN_SECONDS Time when the record is inserted. int TARGET_TYPE Target type of the PM collector data. For device level collector the target type is 0, for port level it is 1. smallint MEASURE_ID ID of the measure. int TARGET_ID Target ID of the PM collector data.
I Database tables and fields TABLE 428 TIME_SERIES_DATA_30MIN Field Definition Format TARGET_ID Target ID of the PM collector data. For device level collector it will use deviceId, for port level it will use interfaceId. int COLLECTOR_ID ID of the data_collector. int MEASURE_INDEX Stores the index_map value in case of an expression. varchar ME_ID ME_ID of the target. int VALUE 30 mins aggregated data.
I Database tables and fields TABLE 430 Field Definition Format TIME_IN_SECONDS Time when value of the measure retrieved from the corresponding target. int TARGET_TYPE Target type of the PM collector data. For IP_DEVICE(0), IP_PORT(1), IP_TRUNK(2), FOS_DEVICE(3), FC_PORT(4), GE_PORT(5), TE_PORT(6), HBA_PORT(7), CNA_PORT(8), VIRTUAL_FCOE_PORT(9), FCIP_TUNNEL(10), EE_MONITOR(11), IP_DEVICE_GROUP(12), IP_PORT_GROUP(13), VIRTUAL_GROUP(14), TRILL_TRUNK(15), ALL_SAN_PRODUCTS(16).
I Database tables and fields TABLE 431 TIME_SERIES_DATA_1_2HOUR (Continued) Field Definition Format VALUE Stores the 2 hours aggregated data. double precision MIN_VALUE Minimum value in 30 min table while aggregating 2 hours of data. double precision MAX_VALUE Maximum value in 30 min table while aggregating 2 hours of data.
I Database tables and fields TABLE 433 Field Definition Format TIME_IN_SECONDS Time when value of the measure retrieved from the corresponding target. int TARGET_TYPE Target type of the PM collector data. For IP_DEVICE(0), IP_PORT(1), IP_TRUNK(2), FOS_DEVICE(3), FC_PORT(4), GE_PORT(5), TE_PORT(6), HBA_PORT(7), CNA_PORT(8), VIRTUAL_FCOE_PORT(9), FCIP_TUNNEL(10), EE_MONITOR(11), IP_DEVICE_GROUP(12), IP_PORT_GROUP(13), VIRTUAL_GROUP(14), TRILL_TRUNK(15), ALL_SAN_PRODUCTS(16).
I Database tables and fields TABLE 434 TIME_SERIES_DATA_2_1DAY (Continued) Field Definition Format VALUE Stores One day aggregated data. double precision MIN_VALUE Minimum value in 2 hour table while aggregating 1 day data. double precision MAX_VALUE Maximum value in 2 hour table while aggregating 1 day data. double precision TABLE 435 Size TIME_SERIES_DATA_2_2HOUR Field Definition Format TIME_IN_SECONDS Time when value of the measure retrieved from the corresponding target.
I Database tables and fields TABLE 436 Field Definition Format TIME_IN_SECONDS Time when value of the measure retrieved from the corresponding target. int TARGET_TYPE Target type of the PM collector data. For IP_DEVICE(0), IP_PORT(1), IP_TRUNK(2), FOS_DEVICE(3), FC_PORT(4), GE_PORT(5), TE_PORT(6), HBA_PORT(7), CNA_PORT(8), VIRTUAL_FCOE_PORT(9), FCIP_TUNNEL(10), EE_MONITOR(11), IP_DEVICE_GROUP(12), IP_PORT_GROUP(13), VIRTUAL_GROUP(14), TRILL_TRUNK(15), ALL_SAN_PRODUCTS(16).
I Database tables and fields TABLE 437 TIME_SERIES_DATA_3 (Continued) Field Definition Format VALUE Stores the raw data received from the device. double precision SUM_VALUE Named after SUM_VALUE to be consistent with column names in aggregated data tables.Stores the delta changes for counter values between two samples, only used for counter values, 0 for all other types of measures.
I Database tables and fields TABLE 439 Definition Format TARGET_ID Target ID of the PM collector data. For device level collector it will use deviceId/virtualSwitchId, for port level it will use interfaceId/switchPortId/ fcipTunnelId/devicePortId. int COLLECTOR_ID DB ID of the pm_data_collector. int MEASURE_INDEX Stores the index_map value in case of an expression. varchar ME_ID ME_ID of the target. int VALUE Stores the 2 hours aggregated data.
I Database tables and fields TABLE 441 TIME_SERIES_DATA_4 Field Definition Format TIME_IN_SECONDS Time when value of the measure retrieved from the corresponding target. int TARGET_TYPE Target type of the PM collector data. smallint MEASURE_ID ID of the measure (MIB/Expression). int TARGET_ID Target ID of the PM collector data. For device level collector it will use deviceId/virtualSwitchId, for port level it will use interfaceId/switchPortId/ fcipTunnelId/devicePortId.
I Database tables and fields TABLE 442 Definition Format MAX_VALUE Maximum value in 2 hour table while aggregating 1 day data. double precision SUM_VALUE Named after SUM_VALUE to be consistent with column names in aggregated data tables.Stores the delta changes for counter values between two samples, only used for counter values, 0 for all other types of measures.
I Database tables and fields TABLE 444 TIME_SERIES_DATA_4_30MIN (Continued) Field Definition Format TARGET_ID Target ID of the PM collector data. For device level collector it will use deviceId/virtualSwitchId, for port level it will use interfaceId/switchPortId/ fcipTunnelId/devicePortId. int COLLECTOR_ID DB ID of the pm_data_collector. int MEASURE_INDEX Stores the index_map value in case of an expression. varchar ME_ID ME_ID of the target.
I Database tables and fields TABLE 448 TRILL Field Definition Format ID Unique generated database identifier. int CLUSTER_ME_ID The Management Element ID of the VCS Cluster in the VirtualSwitch int SOURCE_ME_ID The Management Element ID of the source VirtualSwitch. int SOURCE_DOMAIN_ID The source vcs member id int SOURCE_PORT The source port number as retrieved from the switch.
I Database tables and fields TABLE 451 TRUNK_GROUP_INTERFACE Field Definition INTERFACE_ID Size int VLAG TABLE 452 Format Specifies whether the lag is a vlag or not smallint TRUNK_GROUP_MEMBER Field Definition Format TRUNK_GROUP_MEMBER_I D Primary key for this table. int INTERFACE_ID Foreign key which refers INTERACE table. int TRUNK_INTERFACE_ID Foreign key which refers TRUNK_GROUP_INTERACE table. int Field Definition Format ID * Unique generated database identifier.
I Database tables and fields TABLE 453 Definition Format Size IP_PRODUCT_LOGIN_NAME User CLI credential login user name. varchar 256 IP_PRODUCT_LOGIN_PASS WORD User CLI credential login password. varchar 768 IP_PRODUCT_ENABLE_USE R_NAME User CLI credential enable user name. varchar 256 IP_PRODUCT_ENABLE_PAS SWORD User CLI credential enable password. varchar 768 TABLE 454 USER_DEFINED_DEVICE_DETAIL Field Definition Format Size WWN WWN of the device.
I Database tables and fields TABLE 456 USERDEFINED_NETWORK_SCOPE_MEMBERSHIP Field Definition Format PRODUCT_ME_ID Foreign Key MANAGED_ELEMENT.ID. The ME ID of the device in the membership. This can be null if user does not include Switch in his custom membership. int SWITCH_PORT_ID Foreign Key SWITCH_PORT.ID. The ID of the switch Port in the membership. This can be null if user does not include Switch Port in his custom membership. int INTERFACE_ID Foreign Key INTERFACE. INTERFACE_ID.
I Database tables and fields TABLE 461 V_PORT_DETAIL Field Definition Format DEVICE_PORT_ID Primary key from the owner device port table. int STATE Flag to indicate whether port is online or offline varchar 32 FCP_INITIATOR The role of the virtual port; for example, FCP Initiator varchar 256 SWITCH_IP IP of the switch, the V port is connected to varchar 128 VF_ID VF ID for the V port smallint Field Definition Format VCN_ICL_ID Virtual Cluster Node ICL DB ID.
I Database tables and fields TABLE 464 VCN_PEER Field Definition Format VCN_PEER_ID Virtual Cluster Node Peer db id. int IP_ADDRESS Peer ip address. varchar RBRIDGE_ID Peer rbridge id. int ICL_NAME Cluster ICL name used for this peer. varchar Cluster Peer fast failover state: Disabled(0) Enabled(1). smallint KEEP_ALIVE_INTERVAL Cluster Peer keep alive interval in seconds. INET HOLD_TIME Cluster Peer hold time in seconds.
I Database tables and fields TABLE 466 VIP_SERVER Field Definition Format ID Primary Key field for the VIP_SERVER int TYPE Even Policy Type smallint • • Size 0? Virtual Server 1 ? Real Server DEVICE_ID This is the foreign key reference key to the Device Table int IP_ADDRESS The IP Address for the Virtual Server or Real Server varchar 128 NAME The Name of Virtual Server or Real Server varchar 256 TABLE 467 VIP_SERVER_BINDING Field Definition Format ID Primary Key field for th
I Database tables and fields TABLE 468 VIRTUAL_FCOE_PORT (Continued) Field Definition Format DEVICE_COUNT The number of devices associated with this Virtual FCoE Port. The default value is 0. smallint PEER_MAC The Peer FCF MAC if this Virtual FCoE Port is a FCoE VE-port varchar TABLE 469 Size VIRTUAL_FCOE_PORT_MAC_MEMBER Field Definition Format VIRTUAL_FCOE_PORT_ID The unique id of virtual fcoe port the member belongs to int MAC_ADDRESS Mac address of member.
I Database tables and fields TABLE 470 Definition Format INVALID_TX Invalid transmissions double precision CRC_ERRORS Cyclic Redundancy check error double precision TABLE 471 1582 VIRTUAL_FCOE_PORT_STAT (Continued) Field Size VIRTUAL_FCOE_PORT_STAT_2HR Field Definition Format ID Unique generated database identifier.
I Database tables and fields TABLE 471 VIRTUAL_FCOE_PORT_STAT_2HR (Continued) Field Definition DATA_GAPS_5MIN DATA_GAPS_30MIN TABLE 472 Format Size smallint Data gap in 30 minutes table smallint VIRTUAL_FCOE_PORT_STAT_30M Field Definition Format ID Unique generated database identifier.
I Database tables and fields TABLE 473 VIRTUAL_PORT_WWN_DETAILS Field Definition ID Unique generated database identifier. SWITCH_ID If the VPWWN is constructed based on AG Node WWN and AG_Port_Index then this is id of connected switch. int SWITCH_PORT_NUMBER If the VPWWN is configured for AG , this value will have the default value(-1). smallint AG_NODE_WWN If the VPWWN is configured for Switch Port , this value will have the default value.
I Database tables and fields TABLE 474 VIRTUAL_SWITCH (Continued) Field Definition Format Stores the switch capability for Admin domain. 1 is capable 0 is not capable. smallint FABRIC_IDID_MODE Denotes if Insistent Domain ID mode is enabled. smallint OPERATIONAL_STATUS Stores the operational status of the switch. varchar MAX_ZONE_CONFIG_SIZE Denotes the maximum supported zone DB size in bytes. int CREATION_TIME Creation time of the record.
I Database tables and fields TABLE 474 VIRTUAL_SWITCH (Continued) Field Definition Format L3_CAPABLE If the switch supports L3. smallint LF_ENABLED Logical Fabric Enabled/Disabled for a Virtual Switch. Default value is 0. smallint DEFAULT_LOGICAL_SWITCH Check to see whether virtual switch is a default logical switch or not. 1 is true and 0 is false. Default value is 0. smallint FEATURES_SUPPORTED Contains the features supported as a bit mask. Default value is 0.
I Database tables and fields TABLE 474 VIRTUAL_SWITCH (Continued) Field Definition Format MAX_FCIP_TUNNELS The maximun number of tunnels that can be created in this switch,-1 means not supported. Default value is -1. int MAX_FCIP_CIRCUITS The maximun number of circuits that can be created in this switch, -1 means not supported. Default value is -1. int FCIP_LICENSED FCIP Advanced Extension Licensing is available. 1 means licensed and 0 means not licensed, -1 means not supported.
I Database tables and fields TABLE 474 Definition CLUSTER_TYPE smallint This column is used to determine whether VCS is in Fabric Cluster or Management Cluster. The values will be populated by the VCS collector during the discovery of the VCS switch. The default value of -1 means that its a non VCS device. Following are the values and their enums UNKNOWN("vcs-unknown-cluster"), STAND_ALONE("vcs-stand-alone"), FABRIC_CLUSTER("vcs-fabric-cluster"), MANAGEMENT_CLUSTER("vcs-management-cluster").
I Database tables and fields TABLE 478 VLAN Field Definition Format VLAN_DB_ID Unique database generated identifier. int DEVICE_ID Database ID of the DEVICE instance which is associated with the vlan. int NAME Name for vlan. varchar 32 TABLE_SUBTYPE Table subtype possible value is VLAN.
I Database tables and fields TABLE 484 Field Definition Format MPLS_SERVICE_DEVICE_RELATI ON_DB_ID Database ID inherited from MPLS_SERVICE_DEVICE_RELATION. int VLL_DEVICE_RELATION.VLL_MO DE Represents the VLL mode. Possible values are Unknown-0, Raw-1 and Taggged-2. int TABLE 485 Size VLL_ENDPOINT_RELATION Field Definition Format MPLS_SERVICE_ENDPOINT_REL ATION_DB_ID Database ID inherited from MPLS_SERVICE_ENDPOINT_RELATION.
I Database tables and fields TABLE 486 VMOTION_EVENT (Continued) Field Definition Format Size VCENTER_HOST The FQDN or the ip address of the vcenter. varchar 256 VNIC_MACS Comma separated vnic mac addresses. varchar 256 START_TIME Start time of the vmotion event. timestamp END_TIME End time of the vmotion event, could be null cause of a failed vmotion. timestamp STATUS VMotion event status. 0 = info, 1 = warning, 2 = failed.
I Database tables and fields TABLE 489 Field Definition Format ID Primary key. int DATACENTER_ID Foreign to vm_data_center. int NAME Name of the datastore. varchar ACCESSIBLE The connectivity status of this datastore. If this is set to false, meaning the datastore is not accessible, this datastores capacity and freespace properties cannot be validated. 0 = no 1 = yes. smallint STATUS Status of the datastore could be normal, enteringMaintenance, inMaintenance.
I Database tables and fields TABLE 490 VM_DV_PORT (Continued) Field Definition Format CONFLICT Whether the port is a conflict port. A port could be marked as conflict if an entity is discovered connecting to a port that is already occupied, or if the port is created by the host without conferring with Virtual Center Server. A conflict port will not have its runtime state persisted and the port can''t move away from the host, i.
I Database tables and fields TABLE 491 Definition Format Size DESCRIPTION A description string of the portgroup varchar 256 UPLINK_PORT_GROUP Whether this portgroup is an uplink portgroup smallint KEY The key for the port group varchar MOR_ID The managed object reference number assigned by the hypervisor int TABLE 492 1594 VM_DV_PORT_GROUP (Continued) Field 64 VM_DV_SWITCH Field Definition Format ID Unique generated database identifier.
I Database tables and fields TABLE 492 VM_DV_SWITCH (Continued) Field Definition Format DVS_OPER_SUPPORTED Whether this switch allow Virtual Center users to modify DVS configuration at switch level, except for host memeber, policy and scope operations smallint CREATION_TIME The create time of the switch timestamp UPLINK_PORT_NAME The uniform name of uplink ports on each host varchar VM_DATA_CENTER_ID A foreign key referencing VM_DATACENTER table instance to which this host is associated wit
I Database tables and fields TABLE 494 VM_FC_HBA (Continued) Field Definition Format The type of the fiber channel port. One of : Fabric Loop Point to point Unknown smallint SPEED The current operating speed of the adapter in bits per second.
I Database tables and fields TABLE 496 VM_HOST (Continued) Field Definition Format Size CPU_TYPE Text summary of CPU hardware, such as: Intel(R) Xeon(TM) CPU 2.6 GHz varchar 64 CPU_RESOURCES Text summary of CPU resources, such as "20 GHz total, 15 GHz reserved". May be a different format for different VM vendors varchar 64 MEM_RESOURCES Text summary of memory resources, such as "7 GB total, 5 GB reserved".
I Database tables and fields TABLE 498 Definition Format Size DVS_NAME The name of the DistributedVirtualSwitch that the HostProxySwitch is part of varchar 256 DVS_UUID The uuid of the DistributedVirtualSwitch that the HostProxySwitch is a part of varchar 256 KEY_ The proxy switch key varchar 256 NUM_PORTS The number of ports that this switch currently has int NUM_PORTS_AVAILABLE The number of ports that are available on this virtual switch int UPLINK_PORT_NAMES varchar 256 Size T
I Database tables and fields TABLE 500 VM_HOST_VIRTUAL_NIC (Continued) Field Definition Format VM_DV_PORT_ID Foreign key to the vm_dv_port table. DV Port with which this vmknic is associated int MTU The MTU of the port int VM_HOST_ID FOREIGN KEY to the vm_host table int MOR_ID The managed object reference number assigned by the hypervisor int PORT_GROUP_KEY The key for the port group varchar BINARY_MAC MAC address in binary format. bytea BINARY_IP IP address in binary format.
I Database tables and fields TABLE 502 Definition Format REVERSE_POLICY The flag to indicate whether or not the teaming policy is applied to inbound frames as well. For example, if the policy is explicit failover, a broadcast request goes through uplink1 and comes back through uplink2. Then if the reverse policy is set, the frame is dropped when it is received from uplink2. This reverse policy is useful to prevent the virtual machine from getting reflections.
I Database tables and fields TABLE 503 VM_PATH (Continued) Field Definition Format FABRIC_ID Identifies the fabric that contains this path. Not a foreign key reference. Copied here for convenience. Determined by locating the HBA port WWN or target port WWN in the DEVICE_PORT table. Zero if the fabric is not managed. The default value is 0. int HBA_PORT The HBAs physical port WWN for this path char 23 VM_PORT_WWN The initiator port WWN used by the VM.
I Database tables and fields TABLE 504 Definition Format DUPLEX The flag to indicate whether or not the link is capable of full-duplex ("true") or only half-duplex ("false"). smallint MAC_ADDRESS The media access control (MAC) address of the physical network adapter. varchar 17 PCI Device hash of the PCI device corresponding to this physical network adapter. varchar 256 WAKE_ON_LAN_SUPPO RTED Flag indicating whether the NIC is wake-on-LAN capable. 0 - false, 1 - true.
I Database tables and fields TABLE 506 VM_STANDARD_VIRTUAL_SWITCH Field Definition Format ID Unique generated database identifier. serial NAME The name of the virtual switch. varchar PORTS_COUNT The number of ports that this virtual switch currently has. int PORTS_AVAILABLE The number of ports that are available on this virtual switch. int MTU The maximum transmission unit (MTU) associated with this virtual switch in bytes.
I Database tables and fields TABLE 508 Definition Format VM_STANDARD_VIRTUA L__SWITCH_ID Foreign Key to the vm_standard_virtual_switch table. The standard virtual swtich on which this port group exists. int MOR_ID The managed object reference number assigned by the hypervisor. int TABLE 509 1604 VM_STD_VSWITCH_PORT_GROUP (Continued) Field Size VM_STORAGE Field Definition Format Size ID Uniquely identifies this LUN. serial HOST_ID Identifies the server that accesses this LUN.
I Database tables and fields TABLE 510 VM_STORAGE_HBA_REMOTE_PORT_MAP Field Definition Format VM_STORAGE_ID A foreign key referencing VM_STORAGE (ID). int HBA_REMOTE_PORT_ID A foreign key referencing HBA_REMOTE_PORT (ID). int TABLE 511 VM_TRAFFIC_SHAPING_POLICY Field Definition Format ID Unique generated database identifier. serial ENABLED 'The flag to indicate whether or not traffic shaper is enabled on the port.
I Database tables and fields TABLE 512 VM_VCENTER (Continued) Field Format Size MANAGED_ELEMENT_ID A foreign key referencing MANAGED_ELEMENT(ID). int FAULT_MONITORING_ST ATE Flag to indicate whether fault monitoring is registered or not for a VM Host. Possible values are: 1.Not registered 2.Registered (Default) smallint NAME The name of the VCenter. varchar 64 UUID Unique identifier for vCenter server instance.
I Database tables and fields TABLE 514 VM_VIRTUAL_ETHERNET_ADAPTER (Continued) Field Definition Format ADDRESS_TYPE MAC address type. Valid values for address type are: • Manual • Statically assigned MAC address. • Generated • Automatically generated MAC address. • Assigned • MAC address assigned by VirtualCenter. smallint MAC_ADDRESS MAC address assigned to the virtual network adapter. Clients can set this property to any of the allowed address types.
I Database tables and fields TABLE 515 VM_VIRTUAL_MACHINE Field Definition Format ID Uniquely identifies the virtual machine serial HOST_ID Identifies the server that contains this VM int HYPERVISOR_VM_ID The VM number assigned by the hypervisor. Some hypervisors identify VMs by number as well as by name int NAME User-assigned name for the VM varchar 80 DESCRIPTION Optional user-entered notes describing the VM. (Annotation in VMware terminology.
I Database tables and fields TABLE 515 VM_VIRTUAL_MACHINE (Continued) Field Definition Format Size UNCOMMITTED_STORA GE Additional Provisioned storage for a particular virtual machine. varchar 64 UNSHARED_STORAGE Exclusive storage for a particular virtual machine. varchar 64 Size TABLE 516 VM_VIRTUAL_MACHINE_DATASTORE_MAP Field Definition Format VM_DATASTORE_DETAIL S_ID A foreign key referencing VM_DATASTORE_DETAILS(ID).
I Database tables and fields TABLE 519 Field Definition Format ID Unique generated database identifier. serial VCEM_PROFILE_ID Foreign key references the ID of the VCEM server that the domain belongs to. int VR_CONN_DOMAIN_GROUP_I D Nullable foreign key references the ID of the domain group that the domain may belong to. int VCEM_ASSIGNED_ID The ID assigned by the VCEM server.
I Database tables and fields TABLE 522 VR_CONN_MODULE Field Definition Format ID Unique generated database identifier. serial VR_CONN_DOMAIN_ID Foreign key references the domain ID that the module belongs to. int VCEM_ASSIGNED_ID The ID assigned by VCEM. varchar 256 WWN The WWN of the module. char 23 PRODUCT_NAME The product name of the module. varchar 256 SERIAL_NUMBER The serial number of the module. varchar 32 STATUS The current status of the module.
I Database tables and fields TABLE 524 VR_CONN_SERVER_PROFILE Field Definition Format ID Unique generated database identifier. serial VCEM_PROFILE_ID Foreign key references the ID of the VCEM server that the server profile belongs to. int VR_CONN_DOMAIN_GROUP_I D Nullable foreign key references the ID of the domain group that the server profile may belong to. int VCEM_ASSIGNED_ID The ID assigned by the VCEM server.
I Database tables and fields TABLE 527 ZONE (Continued) Field Definition Format TYPE The zone type. int SUB_TYPE The zone subtype. int ACTIVATE For TI zones only, zone is activated. Default value is 0. smallint CONFIGURED_FAILOVER Configured Failover state of the TI Zone. smallint CONFIGURED_ACTIVATE Configured active state of the TI Zone. smallint ENABLED_FAILOVER Enabled Failover state of the TI Zone. smallint ENABLED_ACTIVATE Enabled Active state of the TI Zone.
I Database tables and fields TABLE 531 Definition Format Size CREATED_BY Created by user name. varchar 128 LAST_MODIFIED_BY Last modified by user name. varchar 128 LAST_APPLIED_BY Last saved to switch user name. varchar 128 DEFAULT_ZONE_STATUS All access or no access when no active zone configuration. smallint ZONE_TXN_SUPPORTED Zoning commands support transaction. smallint MCDATA_DEFAULT_ZONE McData switch default zoning mode.
I Views TABLE 535 ZONE_MEMBER (Continued) Field Definition Format Size VALUE Member value (D,P or WWN). varchar 256 ZONE_ID PK of owning zone. int Field Definition Format ID* Unique generated database identifier. int ZONE_DB_ID PK of owning zone DB. int NAME Zone set name. varchar ACTIVE 1 = active zone set 0 = otherwise. smallint TABLE 536 ZONE_SET Size 64 Views ADAPTER_PORT_CONFIG_INFO create or replace view ADAPTER_PORT_CONFIG_INFO as select ADAPTER_PORT_CONFIG.
I Views where ((AG_N_PORT.REMOTE_PORT_WWN = EDGE_F_PORT.WWN) or (AG_N_PORT.REMOTE_PORT_WWN = EDGE_F_PORT.LOGICAL_PORT_WWN and EDGE_F_PORT.TRUNK_MASTER = 1)) and AG_N_PORT.TYPE = 'N-Port'; BOOT_IMAGE_FILE_DETAILS_INFO create or replace view BOOT_IMAGE_FILE_DETAILS_INFO as select BOOT_IMAGE_FILE_DETAILS.BOOT_IMAGE_NAME, BOOT_IMAGE_FILE_DETAILS.MAJOR_VERSION, BOOT_IMAGE_FILE_DETAILS.MINOR_VERSION, BOOT_IMAGE_FILE_DETAILS.MAINTENANCE, BOOT_IMAGE_FILE_DETAILS.PATCH, BOOT_IMAGE_FILE_DETAILS.
Views I CNA_PORT_DETAILS_INFO create or replace view CNA_PORT_DETAILS_INFO as select CNA_PORT.ID, CNA_PORT.PORT_NUMBER, CNA_PORT.PORT_WWN, CNA_PORT.NODE_WWN, CNA_PORT.PHYSICAL_PORT_TYPE, CNA_PORT.NAME, CNA_PORT.MAC_ADDRESS, CNA_PORT.MEDIA, CNA_PORT.CEE_STATE, CNA_PORT.HBA_ID, CNA_PORT.CREATION_TIME as CNA_PORT_CREATION_TIME, CNA_ETH_PORT.ID as ETH_PORT_ID, CNA_ETH_PORT.ETH_DEV, CNA_ETH_PORT.ETH_LOG_LEVEL, CNA_ETH_PORT.NAME as ETH_PORT_NAME, CNA_ETH_PORT.MAC_ADDRESS as ETH_MAC_ADDRESS, CNA_ETH_PORT.
I Views CNA_ETH_PORT.CREATION_TIME as ETH_PORT_CREATION_TIME, HBA_PORT.DEVICE_PORT_ID, CNA_ETH_PORT.MTU, CNA_PORT.ALARM_WARNING from CNA_PORT left outer join HBA_PORT on CNA_PORT.ID = HBA_PORT.CNA_PORT_ID left outer join CNA_ETH_PORT on CNA_PORT.ID = CNA_ETH_PORT.CNA_PORT_ID; CORE_SWITCH_DETAILS_INFO create or replace view CORE_SWITCH_DETAILS_INFO as select CORE_SWITCH.ID, CORE_SWITCH.IP_ADDRESS, CORE_SWITCH.WWN, CORE_SWITCH.NAME, CORE_SWITCH.TYPE, CORE_SWITCH.MODEL, CORE_SWITCH.
Views I CORE_SWITCH_DETAILS.EGM_CAPABLE, CORE_SWITCH_DETAILS.SUB_TYPE, CORE_SWITCH_DETAILS.PARTITION, CORE_SWITCH_DETAILS.MAX_NUM_OF_BLADES, CORE_SWITCH_DETAILS.VENDOR_VERSION, CORE_SWITCH_DETAILS.VENDOR_PART_NUMBER, CORE_SWITCH_DETAILS.RNID_SEQUENCE_NUMBER, CORE_SWITCH_DETAILS.CONTACT, CORE_SWITCH_DETAILS.LOCATION, CORE_SWITCH_DETAILS.DESCRIPTION, CORE_SWITCH_DETAILS.IP_ADDRESS_PREFIX, CORE_SWITCH_DETAILS.DOMAIN_NAME, CORE_SWITCH_DETAILS.FRAME_LOG_SIZE, CORE_SWITCH_DETAILS.
I Views LUN.THIN_PROVISION_LUN from CRYPTO_LUN LUN, CRYPTO_HOST where LUN.CRYPTO_HOST_ID = CRYPTO_HOST.ID; CRYPTO_TARGET_ENGINE_INFO create or replace view CRYPTO_TARGET_ENGINE_INFO as select CRYPTO_TARGET_CONTAINER.ID TARGET_CONTAINER_ID, CRYPTO_TARGET_CONTAINER.NAME, CRYPTO_TARGET_CONTAINER.VT_NODE_WWN, CRYPTO_TARGET_CONTAINER.VT_PORT_WWN, CRYPTO_TARGET_CONTAINER.FAILOVER_STATUS, CRYPTO_TARGET_CONTAINER.FAILOVER_STATUS_2, CRYPTO_TARGET_CONTAINER.DEVICE_STATUS, CRYPTO_TARGET_CONTAINER.
Views I DASHBOARD_CANVAS, DASHBOARD_CANVAS_PREFERENCE where DASHBOARD.ID = DASHBOARD_CANVAS_PREFERENCE.DASHBOARD_ID and DASHBOARD_CANVAS.ID = DASHBOARD_CANVAS_PREFERENCE.DASHBOARD_CANVAS_ID; DEPLOYMENT_INFO create or replace view DEPLOYMENT_INFO as select DEPLOYMENT_CONFIGURATION.ID as ID, DEPLOYMENT_CONFIGURATION.NAME as NAME, DEPLOYMENT_CONFIGURATION.DESCRIPTION as DESCRIPTION, DEPLOYMENT_HANDLER.MODULE as MODULE, DEPLOYMENT_HANDLER.SUB_MODULE as SUB_MODULE, DEPLOYMENT_STATUS.
I Views DEPLOYMENT_HANDLER.MODULE, DEPLOYMENT_HANDLER.SUB_MODULE, DEPLOYMENT_STATUS.DEPLOYMENT_TIME, DEPLOYMENT_CONFIGURATION.DEPLOY_OPTION as DEPLOYMENT_OPTION, DEPLOYMENT_STATUS.STATUS, DEPLOYMENT_STATUS.DEPLOYED_BY, DEPLOYMENT_CONFIGURATION.CREATED_BY as CREATOR, DEPLOYMENT_CONFIGURATION.SCHEDULE_ENABLED, DEPLOYMENT_CONFIGURATION.SNAPSHOT_ENABLED, DEPLOYMENT_CONFIGURATION.MANAGEMENT_FLAG, DEPLOYMENT_HANDLER.PRIVILEGE_ID, DEPLOYMENT_HANDLER.HANDLER_CLASS, DEPLOYMENT_HANDLER.
Views I left join DEVICE_ENCLOSURE_MEMBER on DEVICE_PORT.ID = DEVICE_ENCLOSURE_MEMBER.DEVICE_PORT_ID left join DEVICE_NODE DN on DEVICE_PORT.NODE_ID = DN.ID left join USER_DEFINED_DEVICE_DETAIL USERDEFINEDDETAILS on DN.WWN = USERDEFINEDDETAILS.WWN; EE_MONITOR_STATS_5MIN_INFO create or replace view EE_MONITOR_STATS_5MIN_INFO as select VIRTUAL_SWITCH.
I Views EE_MONITOR_STATS_1DAY_INFO create or replace view EE_MONITOR_STATS_1DAY_INFO as select VIRTUAL_SWITCH.
Views I sum(case when MEASURE_ID = 36 then value else 0 end) as RECEIVE_EOF, sum(case when MEASURE_ID = 40 then value else 0 end) as UNDERFLOW_ERRORS, sum(case when MEASURE_ID = 41 then value else 0 end) as OVERFLOW_ERRORS, sum(case when MEASURE_ID = 43 then value else 0 end) as ALIGNMENT_ERRORS, sum(case when MEASURE_ID = 42 then value else 0 end) as RUNT_ERRORS, sum(case when MEASURE_ID = 43 then value else 0 end) as TOO_LONG_ERRORS, sum(case when MEASURE_ID = 39 then value else 0 end) as CRC_ERRORS fro
I Views sum(case when MEASURE_ID = 43 then value else 0 end) as TOO_LONG_ERRORS, sum(case when MEASURE_ID = 39 then value else 0 end) as CRC_ERRORS from TIME_SERIES_DATA_1_1DAY, VIRTUAL_SWITCH where ME_ID = MANAGED_ELEMENT_ID and COLLECTOR_ID = 12 group by ME_ID, TARGET_TYPE, TARGET_ID, TIME_IN_SECONDS,VIRTUAL_SWITCH_ID order by TIME_IN_SECONDS desc; SWITCH_INFO create or replace view SWITCH_INFO as select CORE_SWITCH.ID as PHYSICAL_SWITCH_ID, CORE_SWITCH.NAME as PHYSICAL_SWITCH_NAME, CORE_SWITCH.
Views I VIRTUAL_SWITCH.USER_DEFINED_VALUE_1, VIRTUAL_SWITCH.USER_DEFINED_VALUE_2, VIRTUAL_SWITCH.USER_DEFINED_VALUE_3, VIRTUAL_SWITCH.INTEROP_MODE, VIRTUAL_SWITCH.CRYPTO_CAPABLE, VIRTUAL_SWITCH.FCR_CAPABLE, VIRTUAL_SWITCH.FCIP_CAPABLE, VIRTUAL_SWITCH.LF_ENABLED, VIRTUAL_SWITCH.FCOE_CAPABLE, VIRTUAL_SWITCH.L2_CAPABLE, VIRTUAL_SWITCH.L3_CAPABLE, VIRTUAL_SWITCH.DEFAULT_LOGICAL_SWITCH, VIRTUAL_SWITCH.FEATURES_SUPPORTED, VIRTUAL_SWITCH.FMS_MODE, VIRTUAL_SWITCH.DYNAMIC_LOAD_SHARING, VIRTUAL_SWITCH.
I Views DEVICE_INFO create or replace view DEVICE_INFO as select distinct DEVICE_NODE.ID as DEVICE_NODE_ID, DEVICE_NODE.WWN as DEVICE_NODE_WWN, DEVICE_NODE.TYPE as DEVICE_NODE_TYPE, DEVICE_NODE.SYMBOLIC_NAME as DEVICE_NODE_SYMBOLIC_NAME, DEVICE_NODE.DEVICE_TYPE, DEVICE_NODE.FDMI_HOST_NAME, DEVICE_NODE.VENDOR, DEVICE_NODE.CAPABILITY_, DEVICE_NODE.AG, DEVICE_PORT.ID as DEVICE_PORT_ID, DEVICE_PORT.DOMAIN_ID as DEVICE_PORT_DOMAIN_ID, DEVICE_PORT.WWN as DEVICE_PORT_WWN, DEVICE_PORT.NUMBER, DEVICE_PORT.
Views I SWITCH_INFO.DOMAIN_ID as VIRTUAL_SWITCH_DOMAIN_ID, SWITCH_INFO.VIRTUAL_FABRIC_ID, SWITCH_INFO.BASE_SWITCH, SWITCH_INFO.STATE as VIRTUAL_SWITCH_STATE, SWITCH_INFO.STATUS as VIRTUAL_SWITCH_STATUS, SWITCH_INFO.FABRIC_ID, SWITCH_INFO.MONITORED, SWITCH_INFO.CRYPTO_CAPABLE from DEVICE_NODE, DEVICE_PORT, SWITCH_PORT, SWITCH_INFO where DEVICE_PORT.NODE_ID = DEVICE_NODE.ID and DEVICE_PORT.SWITCH_PORT_WWN = SWITCH_PORT.WWN and SWITCH_PORT.VIRTUAL_SWITCH_ID = SWITCH_INFO.ID and DEVICE_NODE.
I Views DEVICE_NODE.PROXY_DEVICE, DEVICE_NODE.AG, DEVICE_NODE.PREVIOUS_MISSING_STATE, USER_DEFINED_DEVICE_DETAIL.NAME, USER_DEFINED_DEVICE_DETAIL.TYPE as USER_DEFINED_TYPE, USER_DEFINED_DEVICE_DETAIL.IP_ADDRESS, USER_DEFINED_DEVICE_DETAIL.CONTACT, USER_DEFINED_DEVICE_DETAIL.LOCATION, USER_DEFINED_DEVICE_DETAIL.DESCRIPTION, USER_DEFINED_DEVICE_DETAIL.USER_DEFINED_VALUE1, USER_DEFINED_DEVICE_DETAIL.USER_DEFINED_VALUE2, USER_DEFINED_DEVICE_DETAIL.USER_DEFINED_VALUE3, FABRIC.
Views I FICON_DEVICE_PORT.MANUFACTURER, FICON_DEVICE_PORT.MANUFACTURER_PLANT, FICON_DEVICE_PORT.SEQUENCE_NUMBER, FICON_DEVICE_PORT.TAG, FICON_DEVICE_PORT.FLAG, FICON_DEVICE_PORT.PARAMS, USER_DEFINED_DEVICE_DETAIL.NAME, USER_DEFINED_DEVICE_DETAIL.TYPE as USER_DEFINED_TYPE, USER_DEFINED_DEVICE_DETAIL.IP_ADDRESS, USER_DEFINED_DEVICE_DETAIL.CONTACT, USER_DEFINED_DEVICE_DETAIL.LOCATION, USER_DEFINED_DEVICE_DETAIL.DESCRIPTION, USER_DEFINED_DEVICE_DETAIL.USER_DEFINED_VALUE1, USER_DEFINED_DEVICE_DETAIL.
I Views from DEVICE_PORT_GIGE_PORT_LINK, DEVICE_PORT where DEVICE_PORT_GIGE_PORT_LINK.DEVICE_PORT_ID = DEVICE_PORT.ID; DEV_PORT_MAC_ADDR_MAP_INFO create or replace view DEV_PORT_MAC_ADDR_MAP_INFO as select DEVICE_PORT_MAC_ADDRESS_MAP.DEVICE_PORT_ID, DEVICE_PORT_MAC_ADDRESS_MAP.MAC_ADDRESS, DEVICE_NODE.ID as DEVICE_NODE_ID, DEVICE_NODE.FABRIC_ID, DEVICE_PORT.TRUSTED, DEVICE_PORT.CREATION_TIME, DEVICE_PORT.MISSING, DEVICE_PORT.
Views I ISL_INFO create or replace view ISL_INFO as select distinct ISL.ID, ISL.FABRIC_ID, ISL.COST, ISL.TYPE, ISL.SOURCE_DOMAIN_ID, ISL.SOURCE_PORT_NUMBER, ISL.MISSING, ISL.MISSING_TIME, ISL.TRUSTED, ISL.CREATION_TIME, ISL.TRUNKED, SOURCE_VIRTUAL_SWITCH.ID as SOURCE_SWITCH_ID, SOURCE_VIRTUAL_SWITCH.NAME as SOURCE_SWITCH_NAME, SOURCE_VIRTUAL_SWITCH.WWN as SOURCE_SWITCH_WWN, SOURCE_VIRTUAL_SWITCH.CORE_SWITCH_ID as SOURCE_CORE_SWITCH_ID, SOURCE_VIRTUAL_SWITCH.
I Views SOURCE_SWITCH_PORT.VIRTUAL_SWITCH_ID = SOURCE_VIRTUAL_SWITCH.ID and SOURCE_SWITCH_PORT.CATEGORY = 1 and SOURCE_SWITCH_PORT.USER_PORT_NUMBER = ISL.SOURCE_PORT_NUMBER and DEST_FABRIC_MEMBER.FABRIC_ID = ISL.FABRIC_ID and DEST_VIRTUAL_SWITCH.ID = DEST_FABRIC_MEMBER.VIRTUAL_SWITCH_ID and DEST_VIRTUAL_SWITCH.DOMAIN_ID = ISL.DEST_DOMAIN_ID and DEST_SWITCH_PORT.VIRTUAL_SWITCH_ID = DEST_VIRTUAL_SWITCH.ID and DEST_SWITCH_PORT.CATEGORY = 1 and DEST_SWITCH_PORT.USER_PORT_NUMBER = ISL.
Views I EVENT.ID as ID, EVENT.ME_ID as ME_ID, EVENT.SEVERITY as SEVERITY, EVENT.AREA as AREA, EVENT.ACKNOWLEDGED as ACKNOWLEDGED, EVENT.SOURCE_NAME as SOURCE_NAME, EVENT.SOURCE_ADDR as SOURCE_ADDR, EVENT.LAST_OCCURRENCE_HOST_TIME as LAST_OCCURRENCE_HOST_TIME, EVENT.FIRST_OCCURRENCE_HOST_TIME as FIRST_OCCURRENCE_HOST_TIME, EVENT.EVENT_COUNT as EVENT_COUNT, EVENT.EVENT_KEY as EVENT_KEY, EVENT.EVENT_AUDIT as AUDIT, EVENT.RESOLVED as RESOLVED, EVENT.ACKED_TIME as ACKED_TIME, EVENT.
I Views EVENT.ME_ID as ME_ID, EVENT.SEVERITY as SEVERITY, EVENT.AREA as AREA, EVENT.ACKNOWLEDGED as ACKNOWLEDGED, EVENT.SOURCE_NAME as SOURCE_NAME, EVENT.SOURCE_ADDR as SOURCE_ADDR, EVENT.LAST_OCCURRENCE_HOST_TIME as LAST_OCCURRENCE_HOST_TIME, EVENT.FIRST_OCCURRENCE_HOST_TIME as FIRST_OCCURRENCE_HOST_TIME, EVENT.EVENT_COUNT as EVENT_COUNT, EVENT.EVENT_AUDIT as AUDIT, EVENT.EVENT_ACTION_ID, EVENT.SPECIAL_EVENT, EVENT_ORIGIN.ID as ORIGIN, EVENT_CATEGORY.ID as EVENT_CATEGORY, EVENT_DESCRIPTION.
Views I FABRIC.USER_DEFINED_VALUE_3, FABRIC.PRINCIPAL_SWITCH_WWN, FABRIC.ZONE_TRANSACTION_TIMEOUT, FABRIC.FABRIC_MODEL, FABRIC.ENHANCED_TI_ZONE_SUPPORT, FABRIC.FABRIC_NAME, VIRTUAL_SWITCH.ID as SEED_SWITCH_ID, VIRTUAL_SWITCH.VIRTUAL_FABRIC_ID, VIRTUAL_SWITCH.INTEROP_MODE, CORE_SWITCH.IP_ADDRESS as SEED_SWITCH_IP_ADDRESS, (select count(*) from FABRIC_MEMBER where FABRIC_MEMBER.FABRIC_ID = FABRIC.ID) as SWITCH_COUNT from FABRIC, CORE_SWITCH, VIRTUAL_SWITCH, FABRIC_MEMBER where FABRIC.
I Views FCIP_TUNNEL_CIRCUIT.L2_COS_LOW, FCIP_TUNNEL_CIRCUIT.DSCP_F_CLASS, FCIP_TUNNEL_CIRCUIT.DSCP_HIGH, FCIP_TUNNEL_CIRCUIT.DSCP_MEDIUM, FCIP_TUNNEL_CIRCUIT.DSCP_LOW, FCIP_TUNNEL_CIRCUIT.FAILOVER_CIRCUIT, FCIP_TUNNEL_CIRCUIT.FAILOVER_GROUP_ID, GIGE_PORT.PORT_NUMBER GIGE_PORT_NUMBER, GIGE_PORT.SLOT_NUMBER GIGE_PORT_SLOT_NUMBER, FCIP_CIRCUIT_PORT_MAP.SWITCH_PORT_ID GIGE_PORT_ID, SWITCH_PORT.VIRTUAL_SWITCH_ID, SWITCH_PORT.
Views I FCIP_TUNNEL.TRUNKING_ALGORITHM, FCIP_TUNNEL.EXTENDED_TUNNEL, FCIP_TUNNEL.VIRTUAL_SWITCH_ID, FCIP_TUNNEL.CIRCUIT_COUNT, FCIP_TUNNEL.MISMATCHED_CONFIG_DETAILS, FCIP_TUNNEL.SLOT_NUMBER, FCIP_TUNNEL.FICON_ENABLED, FCIP_TUNNEL.TPERF_ENABLED, FCIP_TUNNEL.AUTH_KEY, FCIP_TUNNEL.CONNECTED_COUNT, FCIP_TUNNEL.TUNNEL_STATUS_STRING, FCIP_TUNNEL.COMPRESSION_MODE, FCIP_TUNNEL.TURBO_WRITE_ENABLED, FCIP_TUNNEL.TAPE_ACCELERATION_ENABLED, FCIP_TUNNEL.IPSEC_ENABLED, FCIP_TUNNEL.PRESHARED_KEY, FCIP_TUNNEL.
I Views FRU_INFO create or replace view FRU_INFO as select FRU.ID, FRU.CORE_SWITCH_ID, FRU.TAG, FRU.PART_NUMBER, FRU.SERIAL_NUMBER, FRU.VENDOR_PART_NUMBER, FRU.VENDOR_SERIAL_NUMBER, FRU.CAN_BE_FRUED, FRU.SLOT_NUMBER, FRU.MANUFACTURER_DATE, FRU.UPDATE_DATE, FRU.VERSION, FRU.MANUFACTURER, FRU.VENDOR_EQUIPMENT_TYPE, FRU.OPERATIONAL_STATUS, FRU.TOTAL_OUTPUT_POWER, FRU.SPEED, FRU.CREATION_TIME, FRU.LAST_UPDATE_TIME, FRU.PREVIOUS_OP_STATUS, FRU.VENDOR, CORE_SWITCH.WWN as PHYSICAL_SWITCH_WWN, VIRTUAL_SWITCH.
Views I where GIGE_PORT_ETHERNET_CLOUD_LINK.SWITCH_PORT_ID = GIGE_PORT.ID and GIGE_PORT.SWITCH_PORT_ID = SWITCH_PORT.ID and SWITCH_PORT.VIRTUAL_SWITCH_ID = VIRTUAL_SWITCH.ID; GIGE_PORT_INFO create or replace view GIGE_PORT_INFO as select GIGE_PORT.ID, GIGE_PORT.SWITCH_PORT_ID, GIGE_PORT.PORT_NUMBER, GIGE_PORT.SLOT_NUMBER, GIGE_PORT.ENABLED, GIGE_PORT.SPEED, GIGE_PORT.MAX_SPEED, GIGE_PORT.MAC_ADDRESS, GIGE_PORT.PORT_NAME, GIGE_PORT.OPERATIONAL_STATUS, GIGE_PORT.LED_STATE, GIGE_PORT.
I Views HBA_PORT.CONFIGURED_TOPOLOGY, HBA_PORT.MAX_SPEED_SUPPORTED, HBA_PORT.OPERATING_STATE, HBA_PORT.OPERATING_TOPOLOGY, HBA_PORT.SUPPORTED_FC4_TYPES, HBA_PORT.SUPPORTED_COS, HBA_PORT.TRUSTED as HBA_PORT_TRUSTED, HBA_PORT.CREATION_TIME as HBA_PORT_CREATION_TIME, HBA_PORT.MISSING as HBA_PORT_MISSING, HBA_PORT.MISSING_TIME as HBA_PORT_MISSING_TIME, HBA_PORT.OPERATING_SPEED, HBA_PORT.CNA_PORT_ID, HBA_PORT.PORT_NWWN, HBA_PORT.PHYSICAL_PORT_WWN, HBA_PORT.SWITCH_IP, HBA_PORT.PRINCIPAL_SWITCH_WWN, HBA_PORT.
I Views HBA_PORT_DETAIL.QOS_LOW_BW_ALLOCATION, HBA_PORT_DETAIL.MEDIA as MEDIA, HBA_PORT_DETAIL.IOC_ID as IOC_ID, HBA_PORT_DETAIL.PREBOOT_DISABLED, HBA_PORT_FCOE_DETAILS.BANDWIDTH as FCOE_BANDWIDTH, HBA_PORT_FCOE_DETAILS.FIP_STATE, HBA_PORT_FCOE_DETAILS.DISCOVERY_PRIORITY, HBA_PORT_FCOE_DETAILS.FCF_FCMAP, HBA_PORT_FCOE_DETAILS.FCF_FPMA_MAC, HBA_PORT_FCOE_DETAILS.FCF_MAC, HBA_PORT_FCOE_DETAILS.FCF_MODE, HBA_PORT_FCOE_DETAILS.FCF_NAMEID, HBA_PORT_FCOE_DETAILS.FCPIM_MPIO_MODE, HBA_PORT_FCOE_DETAILS.
I Views HBA_REMOTE_PORT.FC_ADDRESS, HBA_REMOTE_PORT.FRAME_DATA_SIZE, HBA_REMOTE_PORT.SPEED, HBA_REMOTE_PORT.STATE, HBA_REMOTE_PORT.SUPPORTED_COS, HBA_REMOTE_PORT.DEVICE_TYPE, HBA_REMOTE_PORT.BIND_TYPE, HBA_REMOTE_PORT.TARGET_ID, HBA_REMOTE_PORT.ROLE, HBA_REMOTE_PORT.VENDOR, HBA_REMOTE_PORT.PRODUCT_ID, HBA_REMOTE_PORT.PRODUCT_VERSION, HBA_REMOTE_PORT.QOS_PRIORITY, HBA_REMOTE_PORT.QOS_FLOW_ID, HBA_REMOTE_PORT.CURRENT_SPEED, HBA_REMOTE_PORT.TRL_ENFORCED, HBA_REMOTE_PORT.BUS_NO, HBA_REMOTE_PORT_LUN.
Views I DEPLOYMENT_STATUS, HEALTH_STATUS, HEALTH_TARGET_STATUS where DEPLOYMENT_STATUS.DEPLOYMENT_CONFIGURATION_ID = DEPLOYMENT_CONFIGURATION.ID and HEALTH_STATUS.DEPLOYMENT_STATUS_ID = DEPLOYMENT_STATUS.ID and HEALTH_TARGET_STATUS.HEALTH_STATUS_ID = HEALTH_STATUS.ID; HOST_DISCOVERY_REQUEST_INFO create or replace view HOST_DISCOVERY_REQUEST_INFO as select HOST_DISCOVERY_REQUEST.ID, HOST_DISCOVERY_REQUEST.HOST_NAME AS REQUEST_HOST_NAME, HOST_DISCOVERY_REQUEST.DEVICE_ENCLOSURE_ID, HOST_DISCOVERY_REQUEST.
I Views DEVICE_ENCLOSURE.LAST_UPDATE_TIME, DEVICE_ENCLOSURE.LAST_UPDATE_MODULE, DEVICE_ENCLOSURE.TRUSTED, DEVICE_ENCLOSURE.CREATION_TIME, DEVICE_ENCLOSURE.MISSING, DEVICE_ENCLOSURE.MISSING_TIME, DEVICE_ENCLOSURE.HOST_NAME, DEVICE_ENCLOSURE.SYSLOG_REGISTERED, DEVICE_ENCLOSURE.VIRTUALIZATION, DEVICE_ENCLOSURE.MANAGED_ELEMENT_ID, HOST_DISCOVERY_REQUEST.MANAGEMENT_STATE_DETAILS from HOST_DISCOVERY_REQUEST join HOST_DISCOVERY_OPTION on HOST_DISCOVERY_REQUEST.HOST_DISCOVERY_OPTION_ID = HOST_DISCOVERY_OPTION.
Views I SOURCE_VIRTUAL_SWITCH.MANAGEMENT_STATE as SOURCE_VIRTUAL_SWITCH_MANAGEMENT_STATE, SOURCE_VIRTUAL_SWITCH.MONITORED as SOURCE_VIRTUAL_SWITCH_MONITORED, SOURCE_SWITCH_PORT.ID as SOURCE_SWITCH_PORT_ID, SOURCE_SWITCH_PORT.WWN as SOURCE_SWITCH_PORT_WWN, SOURCE_SWITCH_PORT.NAME as SOURCE_SWITCH_PORT_NAME, SOURCE_SWITCH_PORT.TYPE as PORT_TYPE, SOURCE_SWITCH_PORT.KIND as SOURCE_SWITCH_PORT_KIND, SOURCE_SWITCH_PORT.PHYSICAL_PORT as SOURCE_PHYSICAL_PORT, SOURCE_SWITCH_PORT.
I Views ISL.MISSING, ISL.SOURCE_DOMAIN_ID, ISL.SOURCE_PORT_NUMBER, SOURCE_DEVICE.MANAGED_ELEMENT_ID as SOURCE_ME_ID, SOURCE_DEVICE.DEVICE_ID as SOURCE_DEVICE_ID, SOURCE_DEVICE.SYS_NAME as SOURCE_DEVICE_NAME, SOURCE_SWITCH_PORT.ID as SOURCE_SWITCH_PORT_ID, SOURCE_SWITCH_PORT.NAME as SOURCE_SWITCH_PORT_NAME, SOURCE_SWITCH_PORT.IDENTIFIER as SOURCE_SWITCH_PORT_IDENTIFIER, SOURCE_SWITCH_PORT.TYPE as PORT_TYPE, SOURCE_SWITCH_PORT.KIND as SOURCE_SWITCH_PORT_KIND, SOURCE_SWITCH_PORT.
Views I ISL_TRUNK_GROUP_MEMBER_INFO CREATE VIEW isl_trunk_group_member_info AS select ISL_TRUNK_GROUP.ID, ISL_TRUNK_GROUP.VIRTUAL_SWITCH_ID, ISL_TRUNK_GROUP.MASTER_USER_PORT, ISL_TRUNK_MEMBER.MISSING, ISL_TRUNK_MEMBER.TRUSTED, ISL_TRUNK_MEMBER.MISSING_TIME, ISL_TRUNK_MEMBER.PORT_NUMBER, SWITCH_PORT.WWN, SWITCH_PORT.TYPE, SWITCH_PORT.STATUS, SWITCH_PORT.SPEED, SWITCH_PORT.ID as SWITCH_PORT_ID from ISL_TRUNK_GROUP, ISL_TRUNK_MEMBER, SWITCH_PORT where ISL_TRUNK_GROUP.id = ISL_TRUNK_MEMBER.
I Views ISL_TRUNK_GROUP, ISL_INFO, CORE_SWITCH SOURCE_CORE_SWITCH, CORE_SWITCH DEST_CORE_SWITCH, VIRTUAL_SWITCH SOURCE_VIRTUAL_SWITCH, VIRTUAL_SWITCH DEST_VIRTUAL_SWITCH where ISL_INFO.SOURCE_SWITCH_ID = ISL_TRUNK_GROUP.VIRTUAL_SWITCH_ID and ISL_INFO.SOURCE_PORT_NUMBER = ISL_TRUNK_GROUP.MASTER_USER_PORT and ISL_INFO.SOURCE_SWITCH_ID = SOURCE_VIRTUAL_SWITCH.ID and SOURCE_VIRTUAL_SWITCH.CORE_SWITCH_ID = SOURCE_CORE_SWITCH.ID and ISL_INFO.DEST_SWITCH_ID = DEST_VIRTUAL_SWITCH.ID and DEST_VIRTUAL_SWITCH.
Views I MAPS_EVENT_DETAILS.SWITCH_ENABLED_ACTIONS, VIRTUAL_SWITCH.NAME as SWITCH_NAME, SWITCH_PORT.NAME as SWITCH_PORT_NAME, SWITCH_PORT.WWN as SWITCH_PORT_WWN, SWITCH_PORT.SLOT_NUMBER as SWITCH_PORT_SLOT, SWITCH_PORT.PORT_NUMBER as SWITCH_PORT_NUMBER, SWITCH_PORT.PORT_ID as SWITCH_PORT_PORT_ID, FCIP_TUNNEL_CIRCUIT.CIRCUIT_NUMBER, FCIP_TUNNEL_CIRCUIT.SLOT_NUMBER as FCIP_SLOT_NUMBER, FCIP_TUNNEL_CIRCUIT.VE_PORT_NUMBER as FCIP_PORT_NUMBER, MAPS_EVENT_CAUSE_ACTION.CAUSE, MAPS_EVENT_CAUSE_ACTION.
I Views TEMP_FOUNDRY_MODULE.CODE_FLASH_SIZE, TEMP_FOUNDRY_MODULE.MODULE_TYPE, TEMP_MODULE.DESCRIPTION as MODULE_TYPE_TXT from ( select distinct MODULE.MODULE_ID, MODULE.NUM_PORTS, MODULE.IS_PRESENT, MODULE.IS_MANAGEMENT_MODULE, MODULE.NUM_CPUS, MODULE.HW_REVISION, MODULE.SW_REVISION, SLOT.SLOT_NUM, PHYSICAL_DEVICE.DEVICE_ID, PHYSICAL_DEVICE.PHYSICAL_DEVICE_ID, PHYSICAL_DEVICE.UNIT_NUMBER, PHYSICAL_DEVICE.UNIT_PRESENT, DEVICE.MANAGED_ELEMENT_ID, DEVICE.IP_ADDRESS, MODULE.
Views I AG_F_PORT.REMOTE_NODE_WWN from NPORT_WWN_MAP, SWITCH_PORT AG_N_PORT, SWITCH_PORT AG_F_PORT, VIRTUAL_SWITCH AG_SWITCH where NPORT_WWN_MAP.VIRTUAL_SWITCH_ID = AG_N_PORT.VIRTUAL_SWITCH_ID and NPORT_WWN_MAP.N_PORT = AG_N_PORT.USER_PORT_NUMBER and NPORT_WWN_MAP.VIRTUAL_SWITCH_ID = AG_F_PORT.VIRTUAL_SWITCH_ID and NPORT_WWN_MAP.DEVICE_PORT_WWN = AG_F_PORT.REMOTE_PORT_WWN AND AG_N_PORT.VIRTUAL_SWITCH_ID = AG_SWITCH.ID and AG_SWITCH.
I Views when TEMP_DEVICE.OPER_STATUS = 5 then 'DOWN' else 'UNKNOWN' end as OPER_STATUS_TXT, TEMP_DEVICE.FABRIC_WATCH_STATUS, TEMP_DEVICE.FABRIC_WATCH_STATUS_REASON, TEMP_DEVICE.ADMIN_STATUS, case when TEMP_DEVICE.ADMIN_STATUS = 1 then 'TROUBLESHOOTING' else 'NORMAL' end as ADMIN_STATUS_TXT, TEMP_DEVICE.ADMIN_STATUS_LAST_UPDATED, TEMP_DEVICE.MEMO, TEMP_DEVICE.MEMO_LAST_UPDATED, TEMP_DEVICE.SYS_OID, TEMP_DEVICE.RBRIDGE_ID, TEMP_DEVICE.IP_ADDRESS, TEMP_FOUNDRY_DEVICE.PRODUCT_TYPE, case when TEMP_DEVICE.
Views I else 'UNKNOWN' end as CATEGORY_TXT, TEMP_DEVICE.SUB_CATEGORY, case when TEMP_DEVICE.SUB_CATEGORY = 1 then 'DCB 8000' when TEMP_DEVICE.SUB_CATEGORY = 2 then 'DCB 8470' when TEMP_DEVICE.SUB_CATEGORY = 3 then 'DCB M8428' when TEMP_DEVICE.SUB_CATEGORY = 4 then 'DCX' when TEMP_DEVICE.SUB_CATEGORY = 5 then 'DCX-4S' when TEMP_DEVICE.SUB_CATEGORY = 6 then 'VCS/VDX' when TEMP_DEVICE.SUB_CATEGORY = 7 then 'VDX 6720-24' when TEMP_DEVICE.SUB_CATEGORY = 8 then 'VDX 6720-60' when TEMP_DEVICE.
I Views PORT_BOTTLENECK_CONF_INFO This view provides combine port bottleneck configuration and enough information from switch port for the client to identify the port. create or replace view PORT_BOTTLENECK_CONF_INFO as select PORT_BOTTLENECK_CONFIG.SWITCH_PORT_ID, PORT_BOTTLENECK_CONFIG.BOTTLENECK_DETECT_ENABLED, PORT_BOTTLENECK_CONFIG.ALERTS_ENABLED, PORT_BOTTLENECK_CONFIG.CONGESTION_THRESHOLD, PORT_BOTTLENECK_CONFIG.LATENCY_THRESHOLD, PORT_BOTTLENECK_CONFIG.WINDOW_, PORT_BOTTLENECK_CONFIG.
Views I SWITCH_PORT.PORT_NUMBER, SWITCH_PORT.SLOT_NUMBER, SWITCH_PORT.FICON_SUPPORTED, SWITCH_PORT.STATE, SWITCH_PORT.USER_PORT_NUMBER, VIRTUAL_SWITCH.NAME as VIRTUAL_SWITCH_NAME, VIRTUAL_SWITCH.ID as SWITCH_ID, FABRIC.NAME as FABRIC_NAME, FABRIC.MANAGED as FABRIC_MANAGED, PORT_GROUP.ID as PORT_GROUP_ID, PORT_GROUP_MEMBER.ID as PORT_GROUP_MEMBER_ID from SWITCH_PORT, VIRTUAL_SWITCH, FABRIC, FABRIC_MEMBER, PORT_GROUP_MEMBER, PORT_GROUP where VIRTUAL_SWITCH .ID = SWITCH_PORT.
I Views PORT_PROFILE.ACTIVATED, PORT_PROFILE_QOS_MAP.DCB_MODE, PORT_PROFILE_QOS_MAP.ETHERNET_MODE, PORT_PROFILE_QOS_MAP.PAUSE_TX, PORT_PROFILE_QOS_MAP.PAUSE_RX, PORT_PROFILE_QOS_MAP.COS_COS, PORT_PROFILE_QOS_MAP.TRAFFIC_CLASS, PORT_PROFILE_QOS_MAP.COS, PORT_PROFILE_QOS_MAP.CEE_MAP, PORT_PROFILE_QOS_PFC_MAP.COS0_TX, PORT_PROFILE_QOS_PFC_MAP.COS0_RX, PORT_PROFILE_QOS_PFC_MAP.COS1_TX, PORT_PROFILE_QOS_PFC_MAP.COS1_RX, PORT_PROFILE_QOS_PFC_MAP.COS2_TX, PORT_PROFILE_QOS_PFC_MAP.
Views I select PORT_PROFILE_MAC_MAP.PROFILE_ID, PORT_PROFILE_MAC_MAP.MAC, PORT_PROFILE_MAC_MAP.NAME as MAC_NAME, VM_VIRTUAL_ETHERNET_ADAPTER.PORT_GROUP_NAME, VM_VIRTUAL_ETHERNET_ADAPTER.DISPLAY_LABEL, VM_VIRTUAL_MACHINE.NAME as VM_NAME, VM_VCENTER_MEMBER.HOST_NAME as HOST_NAME, VM_VCENTER.NAME as VCENTER_NAME, INTERFACE.IDENTIFIER from PORT_PROFILE_MAC_MAP left outer join VM_VIRTUAL_ETHERNET_ADAPTER on PORT_PROFILE_MAC_MAP.MAC = VM_VIRTUAL_ETHERNET_ADAPTER.
I Views sflow_hour_summary.out_priority, sflow_hour_summary.in_vlan, sflow_hour_summary.out_vlan, sflow_hour_summary.l3_protocol, sflow_hour_summary.l4_src_port, sflow_hour_summary.l4_dest_port, sflow_hour_summary.time_in_seconds, sflow_hour_summary.src_mac, sflow_hour_summary.dest_mac, sflow_hour_summary.l3_src_addr, sflow_hour_summary.l3_dest_addr, sflow_hour_summary.tcp_flags, sflow_hour_summary.local_as, sflow_hour_summary.src_as, sflow_hour_summary.src_peer_as, sflow_hour_summary.
Views I LEFT JOIN vm_address_info vm3 ON sflow_staging.l3_src_addr = vm3.vm_address LEFT JOIN vm_address_info vm2 ON sflow_staging.dest_mac = vm2.mac_address LEFT JOIN vm_address_info vm4 ON sflow_staging.l3_dest_addr = vm4.vm_address WHERE sflow_staging.slnum >= (( SELECT sflow_staging_slnum.min_slnum FROM sflow_staging_slnum LIMIT 1)); SFLOW_MINUTE_L3_VIEW create or replace view SFLOW_MINUTE_L3_VIEW AS select SFLOW_MINUTE_L3.DEVICE_ID, SFLOW_MINUTE_L3.TIME_IN_SECONDS, SFLOW_MINUTE_L3.
I Views from SFLOW_STAGING LEFT JOIN VM_ADDRESS_INFO VM1 ON SFLOW_STAGING.L3_SRC_ADDR = VM1.VM_ADDRESS LEFT JOIN VM_ADDRESS_INFO VM2 ON SFLOW_STAGING.L3_DEST_ADDR = VM2.VM_ADDRESS where SFLOW_STAGING.SLNUM >= (( SELECT SFLOW_STAGING_SLNUM.MIN_SLNUM FROM SFLOW_STAGING_SLNUM LIMIT 1)); SFLOW_MINUTE_MAC_VIEW create or replace view SFLOW_MINUTE_MAC_VIEW AS select SFLOW_MINUTE_MAC.DEVICE_ID, SFLOW_MINUTE_MAC.TIME_IN_SECONDS, SFLOW_MINUTE_MAC.SRC_MAC, SFLOW_MINUTE_MAC.DEST_MAC, SFLOW_MINUTE_MAC.
Views I VM2.VM_HOST_ADDRESS AS DEST_VM_HOST_ADDRESS, VM1.VM_ID AS SRC_VM_ID, VM2.VM_ID AS DEST_VM_ID, VM1.VM_HOST_ID AS SRC_VM_HOST_ID, VM2.VM_HOST_ID AS DEST_VM_HOST_ID FROM SFLOW_STAGING LEFT JOIN VM_ADDRESS_INFO VM1 ON SFLOW_STAGING.SRC_MAC = VM1.MAC_ADDRESS LEFT JOIN VM_ADDRESS_INFO VM2 ON SFLOW_STAGING.DEST_MAC = VM2.MAC_ADDRESS WHERE SFLOW_STAGING.SLNUM >= (( SELECT SFLOW_STAGING_SLNUM.
I Views SENSOR_INFO create or replace view SENSOR_INFO as select SENSOR.ID, SENSOR.CORE_SWITCH_ID, SENSOR.SENSOR_ID, SENSOR.CURRENT_READING, SENSOR.TYPE, SENSOR.SUB_TYPE, SENSOR.DESCRIPTION, SENSOR.STATUS, SENSOR.OPERATIONAL_STATUS, SENSOR.PART_NUMBER, SENSOR.SERIAL_NUMBER, SENSOR.VERSION, SENSOR.CREATION_TIME, SENSOR.LAST_UPDATE_TIME, SENSOR.FRU_TYPE, SENSOR.UNIT_NUMBER, SENSOR.STATE, CORE_SWITCH.WWN as PHYSICAL_SWITCH_WWN, VIRTUAL_SWITCH.SWITCH_MODE as VIRTUAL_SWITCH_MODE, VIRTUAL_SWITCH.
Views I and SC.CARD_TYPE = 0 union select SC.ID SMART_CARD_ID, SC.CARD_TYPE, SC.CARD_INFO, SC.CARDCN_ID, SC.FIRST_NAME, SC.LAST_NAME, SC.NOTES, SC.CREATION_TIME, -1 ENGINE_ID, EG.ID ENCRYPTION_GROUP_ID, EG.NAME GROUP_NAME, RCGM.POSITION_ CARD_POSITION, -1 CRYPTO_SWITCH_ID, -1 SLOT_NUMBER from SMART_CARD SC, ENCRYPTION_GROUP EG, RECOVERY_CARD_GROUP_MAPPING RCGM where SC.ID = RCGM.SMART_CARD_ID and EG.ID = RCGM.ENCRYPTION_GROUP_ID and SC.CARD_TYPE = 1 union select SC.ID SMART_CARD_ID, SC.CARD_TYPE, SC.
I Views SWITCH_CONFIG.CONFIG_DATA, SWITCH_CONFIG.CEE_CONFIG_DATA, SWITCH_CONFIG.KEEP_COPY, SWITCH_CONFIG.CREATED_BY, SWITCH_CONFIG.COMMENTS, SWITCH_CONFIG.CONFIG_TYPE, SWITCH_CONFIG_DETAIL.IP_ADDRESS, SWITCH_CONFIG_DETAIL.WWN, SWITCH_CONFIG_DETAIL.PHYSICAL_SWITCH_WWN, SWITCH_CONFIG_DETAIL.MODEL_NUMBER as SWITCH_MODEL_NUMBER from SWITCH_CONFIG, SWITCH_CONFIG_DETAIL where SWITCH_CONFIG.ID= SWITCH_CONFIG_DETAIL.
Views I VIRTUAL_SWITCH.LAST_UPDATE_TIME, VIRTUAL_SWITCH.USER_NAME, VIRTUAL_SWITCH.PASSWORD, VIRTUAL_SWITCH.MANAGEMENT_STATE, VIRTUAL_SWITCH.STATE, VIRTUAL_SWITCH.STATUS, VIRTUAL_SWITCH.STATUS_REASON, VIRTUAL_SWITCH.FABRIC_IDID_MODE, VIRTUAL_SWITCH.LOGICAL_ID, VIRTUAL_SWITCH.USER_DEFINED_VALUE_1, VIRTUAL_SWITCH.USER_DEFINED_VALUE_2, VIRTUAL_SWITCH.USER_DEFINED_VALUE_3, VIRTUAL_SWITCH.FMS_MODE, VIRTUAL_SWITCH.DYNAMIC_LOAD_SHARING, VIRTUAL_SWITCH.PORT_BASED_ROUTING, VIRTUAL_SWITCH.
I Views CORE_SWITCH_DETAILS.SUB_TYPE, CORE_SWITCH_DETAILS.PARTITION, CORE_SWITCH_DETAILS.MAX_NUM_OF_BLADES, CORE_SWITCH_DETAILS.SNMP_INFORMS_ENABLED, CORE_SWITCH_DETAILS.VENDOR_VERSION, CORE_SWITCH_DETAILS.VENDOR_PART_NUMBER, CORE_SWITCH_DETAILS.CONTACT, CORE_SWITCH_DETAILS.LOCATION, CORE_SWITCH_DETAILS.DESCRIPTION, CORE_SWITCH_DETAILS.RNID_SEQUENCE_NUMBER, CORE_SWITCH_DETAILS.FIRMWARE_VERSION as CSD_FIRMWARE_VERSION, CORE_SWITCH_DETAILS.CHASSIS_PACKAGE_TYPE, CORE_SWITCH_DETAILS.
Views I SWITCH_PORT.AREA_ID, SWITCH_PORT.MAC_ADDRESS, SWITCH_PORT.PORT_MOD, SWITCH_PORT.TYPE, SWITCH_PORT.FULL_TYPE, SWITCH_PORT.STATUS, SWITCH_PORT.HEALTH, SWITCH_PORT.STATUS_MESSAGE, SWITCH_PORT.PHYSICAL_PORT, SWITCH_PORT.LOCKED_PORT_TYPE, SWITCH_PORT.CATEGORY, SWITCH_PORT.PROTOCOL, SWITCH_PORT.SPEED, SWITCH_PORT.SPEEDS_SUPPORTED, SWITCH_PORT.MAX_PORT_SPEED, SWITCH_PORT.DESIRED_CREDITS, SWITCH_PORT.BUFFER_ALLOCATED, SWITCH_PORT.ESTIMATED_DISTANCE, SWITCH_PORT.ACTUAL_DISTANCE, SWITCH_PORT.
I Views SWITCH_PORT.SPEED_NEGOTIATED, SWITCH_PORT.IDENTIFIER, SWITCH_PORT.PORT_CAPABILITIES, SWITCH_PORT.FAKE_PORT, SWITCH_PORT.XISL_PORT_LIST, SWITCH_PORT.PORT_COMMISSION_STATE, SWITCH_PORT.FEATURES_ENABLED, SWITCH_PORT.FEATURES_ACTIVE, SWITCH_PORT.DISABLED_REASON, VIRTUAL_SWITCH.WWN as VIRTUAL_SWITCH_WWN, VIRTUAL_SWITCH.ROLE as SWITCH_ROLE, VIRTUAL_SWITCH.VIRTUAL_FABRIC_ID as VIRTUAL_FABRIC_ID, VIRTUAL_SWITCH.DOMAIN_ID as DOMAIN_ID, VIRTUAL_SWITCH.INTEROP_MODE as INTEROP_MODE, VIRTUAL_SWITCH.
Views I VIRTUAL_SWITCH.BASE_SWITCH, VIRTUAL_SWITCH.MAX_ZONE_CONFIG_SIZE, VIRTUAL_SWITCH.CREATION_TIME, VIRTUAL_SWITCH.LAST_UPDATE_TIME, VIRTUAL_SWITCH.USER_NAME, VIRTUAL_SWITCH.PASSWORD, VIRTUAL_SWITCH.MANAGEMENT_STATE, VIRTUAL_SWITCH.STATE, VIRTUAL_SWITCH.STATUS, VIRTUAL_SWITCH.STATUS_REASON, VIRTUAL_SWITCH.MONITORED, VIRTUAL_SWITCH.USER_DEFINED_VALUE_1, VIRTUAL_SWITCH.USER_DEFINED_VALUE_2, VIRTUAL_SWITCH.USER_DEFINED_VALUE_3, FABRIC_MEMBER.FABRIC_ID, FABRIC_MEMBER.TRUSTED, FABRIC_MEMBER.
I Views TIME_SERIES_DATA_INFO CREATE VIEW time_series_data_info AS ( ( ( ( ( ( select * from TIME_SERIES_DATA_1 union all select TIME_SERIES_DATA_1_30MIN.TIME_IN_SECONDS, TIME_SERIES_DATA_1_30MIN.TARGET_TYPE, TIME_SERIES_DATA_1_30MIN.MEASURE_ID, TIME_SERIES_DATA_1_30MIN.TARGET_ID, TIME_SERIES_DATA_1_30MIN.COLLECTOR_ID, TIME_SERIES_DATA_1_30MIN.MEASURE_INDEX, TIME_SERIES_DATA_1_30MIN.ME_ID, TIME_SERIES_DATA_1_30MIN.VALUE, TIME_SERIES_DATA_1_30MIN.
Views I TIME_SERIES_DATA_2_2HOUR.VALUE, TIME_SERIES_DATA_2_2HOUR.SUM_VALUE from TIME_SERIES_DATA_2_2HOUR) union all select TIME_SERIES_DATA_2_1DAY.TIME_IN_SECONDS, TIME_SERIES_DATA_2_1DAY.TARGET_TYPE, TIME_SERIES_DATA_2_1DAY.MEASURE_ID, TIME_SERIES_DATA_2_1DAY.TARGET_ID, TIME_SERIES_DATA_2_1DAY.COLLECTOR_ID, TIME_SERIES_DATA_2_1DAY.MEASURE_INDEX, TIME_SERIES_DATA_2_1DAY.ME_ID, TIME_SERIES_DATA_2_1DAY.VALUE, TIME_SERIES_DATA_2_1DAY.
I Views (measure.name::text || '.'::text) || tsd.measure_index::text AS collectible_name, measure.detail AS collectible_detail, tsd.value, tsd.time_in_seconds, tsd.measure_index FROM time_series_data_info tsd JOIN switch_port sp ON tsd.target_type = 4 AND tsd.target_id = sp.id JOIN virtual_switch vs ON sp.virtual_switch_id = vs.id JOIN device de ON vs.managed_element_id = de.managed_element_id JOIN pm_data_collector ON pm_data_collector.id = tsd.collector_id JOIN measure ON measure.id = tsd.
Views I SOURCE_DEVICE.DEVICE_ID AS SOURCE_DEVICE_ID, TRILL.DEST_DOMAIN_ID, TRILL.DEST_PORT_NUMBER, TRILL.DEST_PORT_NAME as DEST_SWITCH_PORT_NAME, TRILL.DEST_ME_ID, DEST_DEVICE.DEVICE_ID AS DEST_DEVICE_ID from TRILL, device VCS_DEVICE, device SOURCE_DEVICE, VIRTUAL_SWITCH SOURCE_VIRTUAL_SWITCH, device DEST_DEVICE, VIRTUAL_SWITCH DEST_VIRTUAL_SWITCH where SOURCE_DEVICE.MANAGED_ELEMENT_ID = TRILL.SOURCE_ME_ID and DEST_DEVICE.MANAGED_ELEMENT_ID = TRILL.DEST_ME_ID and VCS_DEVICE.MANAGED_ELEMENT_ID = TRILL.
I Views ROLE.ID ROLE_ID, ROLE.NAME ROLE_NAME, USER_.NAME USER_NAME from USER_, RESOURCE_GROUP, ROLE, USER_RESOURCE_MAP, USER_ROLE_MAP where USER_ROLE_MAP.USER_NAME = USER_.NAME and USER_ROLE_MAP.ROLE_ID = ROLE.ID and USER_RESOURCE_MAP.RESOURCE_GROUP_ID = RESOURCE_GROUP.ID and USER_RESOURCE_MAP.USER_NAME = USER_.NAME; VIRTUAL_FCOE_PORT_INFO create or replace view VIRTUAL_FCOE_PORT_INFO as select VIRTUAL_FCOE_PORT.ID, VIRTUAL_FCOE_PORT.VIRTUAL_SWITCH_ID, VIRTUAL_FCOE_PORT.PORT_WWN, VIRTUAL_FCOE_PORT.
Views I VIRTUAL_PORT_WWN_DETAILS.SWITCH_PORT_NUMBER, VIRTUAL_PORT_WWN_DETAILS.SLOT_NUMBER, coalesce(CS1.IP_ADDRESS, CS2.IP_ADDRESS, UDDD.IP_ADDRESS) as IP_ADDRESS, coalesce(VS1.NAME, VS2.NAME, UDDD.NAME) as SWITCH_NAME, coalesce(VS1.WWN, VS2.WWN) as SWITCH_WWN, VIRTUAL_PORT_WWN_DETAILS.AG_NODE_WWN, VIRTUAL_PORT_WWN_DETAILS.AG_PORT_NUMBER, VIRTUAL_PORT_WWN_DETAILS.STATUS, VIRTUAL_PORT_WWN_DETAILS.TYPE, VIRTUAL_PORT_WWN_DETAILS.USER_VPWWN, VIRTUAL_PORT_WWN_DETAILS.AUTO_VPWWN, VIRTUAL_PORT_WWN_DETAILS.
I Views AND VM_VIRTUAL_MACHINE.HOST_ID = VM_VCENTER_MEMBER.VM_HOST_ID; VM_CONNECTIVITY_INFO This view combines fabric and VM information to derive end to end connectivity information for the VM. create or replace view VM_CONNECTIVITY_INFO as select VM_VCENTER.HOST AS VCENTER_HOST, DEVICE_PORT.SWITCH_PORT_WWN, DEVICE_PORT.DOMAIN_ID, device_port.id as device_port_id, DEVICE_PORT.NUMBER, CORE_SWITCH.IP_ADDRESS, CORE_SWITCH.NAME AS CORE_NAME, VM_VCENTER.ID AS VCENTER_ID, DEVICE_ENCLOSURE.
Views I VM_DATA_CENTER, VM_HOST where VM_PATH.HBA_PORT = DEVICE_PORT.WWN and VM_PATH.VM_ID = VM_VIRTUAL_MACHINE.ID and VM_PATH.STORAGE_ID = VM_STORAGE.ID and VM_STORAGE.HOST_ID = DEVICE_ENCLOSURE.ID and DEVICE_ENCLOSURE.ID = VM_HOST.DEVICE_ENCLOSURE_ID and DEVICE_ENCLOSURE.ID = VM_VIRTUAL_MACHINE.HOST_ID and VM_HOST.VM_DATACENTER_ID = VM_DATA_CENTER.ID and VM_DATA_CENTER.VCENTER_ID = VM_VCENTER.ID and DEVICE_PORT.SWITCH_PORT_WWN = SWITCH_PORT.WWN and SWITCH_PORT.VIRTUAL_SWITCH_ID = VIRTUAL_SWITCH.
I Views CORE_SWITCH, SWITCH_PORT, VIRTUAL_SWITCH, DEVICE_NODE, FABRIC, DEVICE_PORT_MAC_ADDRESS_MAP, GIGE_PORT, VM_STORAGE, VM_PATH, DEVICE_ENCLOSURE, VM_VIRTUAL_MACHINE, VM_VCENTER, VM_DATA_CENTER, VM_HOST where VM_PATH.HBA_PORT = DEVICE_PORT.WWN and VM_PATH.VM_ID = VM_VIRTUAL_MACHINE.ID and VM_PATH.STORAGE_ID = VM_STORAGE.ID and VM_STORAGE.HOST_ID = DEVICE_ENCLOSURE.ID and DEVICE_ENCLOSURE.ID = VM_HOST.DEVICE_ENCLOSURE_ID and DEVICE_ENCLOSURE.ID = VM_VIRTUAL_MACHINE.HOST_ID and VM_HOST.
Views I VM_EE_MONITOR_INFO This view provides combined ee_monitor, ee_monitor_stats, device_port and device_node tables to get the EE Monitor information for vmplug-in. create or replace view VM_EE_MONITOR_INFO as select distinct EE_MONITOR.NAME, EE_MONITOR.SWITCH_PORT_ID, EE_MONITOR.SOURCE_PORT_ID, EE_MONITOR.DEST_PORT_ID, EE_MONITOR_STATS.TX, EE_MONITOR_STATS.RX, EE_MONITOR_STATS.CRCERRORS, EE_MONITOR_STATS.CREATION_TIME, SOURCE_PORT.PORT_ID as SID, DEST_PORT.PORT_ID as DID, SOURCE_NODE.
I Views VM_HOST.NODE_WWN as HOST_NODE_WWN, VM_HOST.HYPERVISOR_NAME, VM_HOST.HYPERVISOR_TYPE, VM_HOST.CPU_COUNT, VM_HOST.CPU_TYPE, VM_HOST.CPU_RESOURCES as HOST_CPU_RESOURCES, VM_HOST.MEM_RESOURCES as HOST_MEM_RESOURCES, VM_HOST.LICENSE_SERVER, VM_HOST.BOOT_TIME as HOST_BOOT_TIME, VM_HOST.CLUSTER_NAME as CLUSTER_NAME, VM_VIRTUAL_MACHINE.ID as VM_ID, VM_VIRTUAL_MACHINE.HYPERVISOR_VM_ID, VM_VIRTUAL_MACHINE.NAME as VM_NAME, VM_VIRTUAL_MACHINE.DESCRIPTION as VM_DESCRIPTION, VM_VIRTUAL_MACHINE.
Views I VM_PATH.TARGET_PORT, VM_PATH.HBA_NODE, VM_PATH.VM_NODE_WWN, VM_PATH.TARGET_NODE as PATH_TARGET_NODE, VM_PATH.HBA_NAME, VM_PATH.USAGE as PATH_USAGE, VM_PATH.ENABLED as PATH_ENABLED, VM_PATH.ACTIVE as PATH_ACTIVE, VM_PATH.PREFERRED as PATH_PREFERRED from VM_STORAGE join VM_PATH on VM_STORAGE.ID = VM_PATH.STORAGE_ID; VM_STATISTICS_INFO This view gets the FC port statistics for the VM Connectivity data. create or replace view VM_STATISTICS_INFO as select distinct DEVICE_PORT.
I Views and SWITCH_PORT.ID = FC_PORT_STATS.PORT_ID and SWITCH_PORT.VIRTUAL_SWITCH_ID = VIRTUAL_SWITCH.ID and VIRTUAL_SWITCH.CORE_SWITCH_ID = CORE_SWITCH.ID and FC_PORT_STATS.CREATION_TIME in (select MAX(CREATION_TIME) from FC_PORT_STATS group by PORT_ID) union select DEVICE_PORT.SWITCH_PORT_WWN, DEVICE_PORT.DOMAIN_ID, DEVICE_ENCLOSURE.IP_ADDRESS as HYPERVISOR_HOST, VM_PATH.HBA_PORT as ADAPTER_PORT_WWN, VM_VIRTUAL_MACHINE.HYPERVISOR_VM_ID, VM_VIRTUAL_MACHINE.NAME as VM_NAME, CORE_SWITCH.
Views I VR_CONN_MODULE_INFO create or replace view VR_CONN_MODULE_INFO as select distinct VR_CONN_MODULE.ID, VR_CONN_MODULE.VR_CONN_DOMAIN_ID, VR_CONN_MODULE.VCEM_ASSIGNED_ID, VR_CONN_MODULE.WWN, VR_CONN_MODULE.PRODUCT_NAME, VR_CONN_MODULE.SERIAL_NUMBER, VR_CONN_MODULE.STATUS, VR_CONN_MODULE.IO_BAY, VR_CONN_MODULE.VENDOR, VR_CONN_MODULE.CREATION_TIME, VR_CONN_MODULE.LAST_UPDATE_TIME, VR_CONN_DOMAIN.NAME as DOMAIN_NAME, VR_CONN_DOMAIN.GUID as DOMAIN_GUID, VR_CONN_DOMAIN.
I Views VR_CONN_MODULE.SERIAL_NUMBER, VR_CONN_MODULE.STATUS, VR_CONN_MODULE.IO_BAY, VR_CONN_MODULE.VENDOR, VR_CONN_MODULE.CREATION_TIME, VR_CONN_MODULE.LAST_UPDATE_TIME, VR_CONN_DOMAIN.NAME as DOMAIN_NAME, VR_CONN_DOMAIN.GUID as DOMAIN_GUID, VR_CONN_DOMAIN.FIRMWARE_VERSION, VR_CONN_DOMAIN_GROUP.NAME as DOMAIN_GROUP_NAME, VCEM_PROFILE.ID as VCEM_PROFILE_ID, VCEM_PROFILE.DISCOVERY_STATUS, VCEM_PROFILE.LAST_FAILURE_TIMESTAMP as VCEM_LAST_FAILED_TIME, VCEM_PROFILE.
Views I VR_CONN_MODULE.IO_BAY, VR_CONN_DOMAIN.ID as VR_CONN_DOMAIN_ID, VCEM_PROFILE.ID as VCEM_PROFILE_ID, SWITCH_PORT.ID as SWITCH_PORT_ID, VIRTUAL_SWITCH.ID as VIRTUAL_SWITCH_ID from VR_CONN_MODULE_PORT inner join VR_CONN_MODULE on VR_CONN_MODULE.ID = VR_CONN_MODULE_PORT.VR_CONN_MODULE_ID inner join VR_CONN_DOMAIN on VR_CONN_DOMAIN.ID = VR_CONN_MODULE.VR_CONN_DOMAIN_ID inner join VCEM_PROFILE on VCEM_PROFILE.ID = VR_CONN_DOMAIN.VCEM_PROFILE_ID left outer join SWITCH_PORT on SWITCH_PORT.
I Views inner join VR_CONN_DOMAIN on VR_CONN_DOMAIN.GUID = VR_CONN_SERVER_PROFILE.BAY_ENCLOSURE_UUID inner join VCEM_PROFILE on VCEM_PROFILE.ID = VR_CONN_SERVER_PROFILE.VCEM_PROFILE_ID inner join VR_CONN_MODULE on VR_CONN_MODULE.VR_CONN_DOMAIN_ID = VR_CONN_DOMAIN.ID and VR_CONN_MODULE.IO_BAY = VR_CONN_FC_CONNECTION.CONNECTION_BAY inner join VR_CONN_MODULE_PORT on VR_CONN_MODULE_PORT.VR_CONN_MODULE_ID = VR_CONN_MODULE.ID and VR_CONN_MODULE_PORT.POSITION_ = VR_CONN_FC_CONNECTION.
Views I VM_HOST_VIRTUAL_NIC, VM_VCENTER_MEMBER, VM_VCENTER where VM_HOST_VIRTUAL_NIC.VM_HOST_ID = VM_VCENTER_MEMBER.VM_HOST_ID AND VM_VCENTER_MEMBER.VM_VCENTER_ID = VM_VCENTER.ID union all select VM_PHYSICAL_NIC.MAC_ADDRESS, VM_PHYSICAL_NIC.DEVICE_NAME, NULL::UNKNOWN AS PORT_GROUP_NAME, NULL::UNKNOWN AS VIRTUAL_MACHINE_NAME, VM_VCENTER_MEMBER.HOST_NAME, VM_VCENTER.NAME AS VCENTER_NAME from VM_PHYSICAL_NIC, VM_VCENTER_MEMBER, VM_VCENTER where VM_PHYSICAL_NIC.VM_HOST_ID = VM_VCENTER_MEMBER.
I Views ZONE_DB.LAST_APPLIED, ZONE_DB.LAST_APPLIED_BY, ZONE_DB.DEFAULT_ZONE_STATUS, ZONE_DB.MCDATA_DEFAULT_ZONE, ZONE_DB.MCDATA_SAFE_ZONE, ZONE_DB.ZONE_TXN_SUPPORTED, ZONE_DB.ZONE_CONFIG_SIZE, ZONE_DB.ZONE_AVAILABLE_SIZE, ZONE_DB_CONFIG.ID AS CONFIG_ID, ZONE_DB_CONFIG.DEFINED_CONTENT, ZONE_DB_CONFIG.ACTIVE_CONTENT, ZONE_DB_CONFIG.TI_ZONE_CONTENT from ZONE_DB, ZONE_DB_CONFIG where ZONE_DB.ID = ZONE_DB_CONFIG.
Views I where SLNUM <= (select MAX_SLNUM from SFLOW_MINUTE_BGP_SLNUM fetch first 1 rows only) union all select DEVICE_ID, TIME_IN_SECONDS, SRC_AS, SFLOW_IP_ROUTE_INFO_ID, IN_VLAN, OUT_VLAN, FRAMES, BYTES from SFLOW_STAGING where SLNUM >= (select MIN_SLNUM from SFLOW_STAGING_SLNUM fetch first 1 rows only) and SRC_AS != 0 OR SFLOW_IP_ROUTE_INFO_ID != 0; -- Name: sflow_minute_l3_view; Type: VIEW; Schema: dcm; Owner: dcmadmin create or replace view SFLOW_MINUTE_L3_VIEW as select DEVICE_ID, TIME_IN_SECONDS, L3
I Views V.VLAN_DB_ID = PV.VLAN_DB_ID; create view PROTOCOL_VLAN_INFO as select V.*, PORT_VLAN_DB_ID, IS_DYNAMIC, PROTOCOL from VLAN V, SUB_PORT_VLAN SPV, PROTOCOL_VLAN PV where V.VLAN_DB_ID = SPV.VLAN_DB_ID AND SPV.VLAN_DB_ID = PV.VLAN_DB_ID; -- Name: wired_interface; Type: VIEW; Schema: dcm; Owner: dcmadmin CREATE VIEW wired_interface AS SELECT l2.device_id, l2.device_ip_address, l2.physical_device_id, l2.unit_number, l2.slot_id, l2.slot_num, l2.module_id, l2.physical_port_id, l2.port_num, l2.
Views I PHYSICAL_DEVICE_INFO create or replace view PHYSICAL_DEVICE_INFO as select PHYSICAL_DEVICE.PHYSICAL_DEVICE_ID as PD_PHYSICAL_DEVICE_ID, PHYSICAL_DEVICE.DEVICE_ID, PHYSICAL_DEVICE.DESCRIPTION, PHYSICAL_DEVICE.NUM_SLOTS, PHYSICAL_DEVICE.TABLE_SUBTYPE, PHYSICAL_DEVICE.UNIT_NUMBER, PHYSICAL_DEVICE.UNIT_NEIGHBOR1, PHYSICAL_DEVICE.UNIT_NEIGHBOR2, PHYSICAL_DEVICE.UNIT_PRESENT, FOUNDRY_PHYSICAL_DEVICE.PHYSICAL_DEVICE_ID as FPD_PHYSICAL_DEVICE_ID, FOUNDRY_PHYSICAL_DEVICE.
I Views coalesce (CS_VS.IP_ADDRESS, CS_ME.IP_ADDRESS, DEVICE_ENCLOSURE.IP_ADDRESS) as SAN_IP_ADDRESS, VIRTUAL_SWITCH.VIRTUAL_FABRIC_ID, coalesce (VIRTUAL_SWITCH.WWN, CS_ME.WWN, DEVICE.NODE_WWN) as NODE_WWN from MANAGED_ELEMENT left outer join VIRTUAL_SWITCH on MANAGED_ELEMENT.ID = VIRTUAL_SWITCH.MANAGED_ELEMENT_ID left outer join CORE_SWITCH CS_ME on (MANAGED_ELEMENT.ID = CS_ME.MANAGED_ELEMENT_ID) left outer join CORE_SWITCH CS_VS on (CS_VS.ID = VIRTUAL_SWITCH.
Views I WHERE snmp_expression.expression_id = se.expression_id) AS collectible_detail, se.value, se.time_in_seconds, '' AS mib_index FROM snmp_expr_data_info se JOIN device de ON se.target_id = de.device_id WHERE se.target_type = 0 UNION ALL SELECT de.device_id, de.ip_address AS device_ip, sd.target_type, de.device_id AS target_id, de.sys_name AS target_name, 0 AS collectible_type, sd.mib_object_id AS collectible_id, sd.collector_id, ( SELECT perf_collector.
I Views FROM snmp_expression WHERE snmp_expression.expression_id = se.expression_id) AS collectible_detail, se.value, se.time_in_seconds, '' AS mib_index FROM snmp_expr_data_info se JOIN interface ifs ON se.target_type = 1 AND se.target_id = ifs.interface_id JOIN device de ON ifs.device_id = de.device_id) UNION ALL SELECT de.device_id, de.ip_address AS device_ip, sd.target_type, sp.id AS target_id, sp.name AS target_name, 0 AS collectible_type, sd.mib_object_id AS collectible_id, sd.
Views I VM_DV_PORT_GROUP.NAME as PGRP_NAME, VM_DV_SWITCH.NAME as VSWITCH_NAME, VNIC_DV_PORT.NAME as DVPORT_NAME, VM_PHYSICAL_NIC.DEVICE_NAME as PNIC_NAME, VM_PHYSICAL_NIC.MAC_ADDRESS as PNIC_MAC, DEVICE.SYS_NAME as SWITCH_NAME, DEVICE.IP_ADDRESS as SWITCH_IP, PHYSICAL_PORT.PORT_NUM as SWITCH_PORT, INTERFACE.PORT_STATUS as SWITCH_PORT_STATUS from VM_HOST left join VM_VIRTUAL_MACHINE on VM_HOST.DEVICE_ENCLOSURE_ID = VM_VIRTUAL_MACHINE.
I Views VM_STD_VSWITCH_PORT_GROUP, VM_STANDARD_VIRTUAL_SWITCH, VM_PHYSICAL_NIC, VM_HOST_END_DEV_CONNECTIVITY, INTERFACE, DEVICE, PHYSICAL_INTERFACE, PHYSICAL_PORT where VM_VIRTUAL_MACHINE.ID = VM_VIRTUAL_ETHERNET_ADAPTER.VIRTUAL_MACHINE_ID and VM_VIRTUAL_ETHERNET_ADAPTER.VM_STD_VSWITCH_PORT_GROUP_ID is not null and VM_VIRTUAL_ETHERNET_ADAPTER.VM_STD_VSWITCH_PORT_GROUP_ID = VM_STD_VSWITCH_PORT_GROUP.ID and VM_STD_VSWITCH_PORT_GROUP.VM_STANDARD_VIRTUAL__SWITCH_ID = VM_STANDARD_VIRTUAL_SWITCH.
Views I end; $BODY$ LANGUAGE plpgsql VOLATILE COST 100; ALTER FUNCTION reset_vcs_licensed(integer) OWNER TO dcmadmin; TRILL_TRUNK_INFO create or replace view TRILL_TRUNK_INFO as select TRILL_TRUNK_GROUP.ID, TRILL_TRUNK_GROUP.ME_ID, TRILL_TRUNK_GROUP.MASTER_PORT_NUMBER, TRILL_TRUNK_MEMBER.PORT_NUMBER as MEMBER_PORT_NUMBER, MEMBER_DEVICE.DEVICE_ID, MASTER_INTERFACE.INTERFACE_ID as MASTER_INTERFACE_ID, MASTER_INTERFACE.IF_NAME as MASTER_IF_NAME, MEMBER_INTERFACE.
I Views l2.speed_in_mb, l2.physical_address, l2.interface_id AS radioif_id, wireless.radio_type, wireless.is_enabled, wireless.is_auto_channel, wireless.tx_power, wireless.channel_number, wireless.max_data_rate, wireless.beacon_rate, wireless.dtim, wireless.rts_threshold, wireless.is_turbo_mode, wireless.radio_g_mode, wireless.max_associated_clients FROM ((SELECT DISTINCT d.device_id, d.ip_address AS device_ip_address, pd.physical_device_id, pd.unit_number, s.slot_id, s.slot_num, msp.module_id, pp.
Views I L2.IDENTIFIER, L2.TABLE_SUBTYPE, case when L2.TABLE_SUBTYPE like 'GBIT_ETHERNET_INTERFACE' then 'GIGABIT ETHERNET' when L2.TABLE_SUBTYPE like 'POS_INTERFACE' then 'POS' else L2.TABLE_SUBTYPE end as TABLE_SUBTYPE_TXT, L2.TAG_MODE, case when L2.TAG_MODE = 1 then 'TAGGED' when L2.TAG_MODE = 2 then 'UNTAGGED' when L2.TAG_MODE = 3 then 'DUAL' else null end as TAG_MODE_TXT, L2.USER_DEFINED_VALUE_1, L2.USER_DEFINED_VALUE_2, L2.USER_DEFINED_VALUE_3, L2.SPEED_IN_MB, L2.PHYSICAL_ADDRESS, L2.
I Views CEE_PORT.IF_NAME, CEE_PORT.IF_MODE, CEE_PORT.L2_MODE, CEE_PORT.VLAN_ID, CEE_PORT.LAG_ID, CEE_PORT.IP_ADDRESS, CEE_PORT.MAC_ADDRESS, CEE_PORT.PORT_SPEED, CEE_PORT.ENABLED, CEE_PORT.OCCUPIED, CEE_PORT.LAST_UPDATE, CEE_PORT.NET_MASK, CEE_PORT.PROTOCOL_DOWN_REASON, CEE_PORT.MAC_ACL_POLICY, CEE_PORT.QOS_TYPE, CEE_PORT.QOS_NAME, CEE_PORT.DOT1X_ENABLED, CEE_PORT.PORT_ROLE, CEE_PORT.AMPP_PROFILE_MODE, CORE_SWITCH.IP_ADDRESS as PHYSICAL_SWITCH_IP, CORE_SWITCH.WWN as PHYSICAL_SWITCH_WWN, GIGE_PORT.
A access levels defined, 1336 features, 1336–1337, 1338–?? roles, 1336 accessing FTP server folder, 180 activating Allow/Prohibit Matrix configuration, 756 zone configuration, 698 active session management, roles and access levels, 1336 active sessions, viewing, 9 adapter software using to manage driver files, 503 adapters HBA models, 496 types of, 496 types of converged network adapters, 497 types of fabric adapters, 497 types of HBAs, 496 Adding C3 discard frames threshold, 725 state change threshold, 732
editing, 361 Brocade International, 361 e-mail, 362 EMC, 366 HP LAN, 367 IBM, 361 enabling, 368 enabling support save, 368 hiding, 360 removing a device, 371 removing all devices and filters, 371 removing event filters, 374 test connection, 369 viewing, 360 configuring, 356 roles and access levels, 1336 status, determining, 300 system requirements, 357 viewing status, 370 call home event filters table removing event filters, 375 cascaded FICON fabric configuring, 758 cascaded FICON fabrics, 743 merging, 763
log entry parts, 1243 master log, 1247 master log parts, 1247 zones, 691 creating zone, 687 zone alias, 693 zone configuration, 696 zone databases, 702 zone members, 689 zone sets, 696 CUP, FICON, 743 D data real time performance, 1016 data backup, 138 data backup and restore, 524 data restore, 144 database fields Sybase and Derby, 1409 database, restoring, 404 DCB switches, L2 mode compatibility, 872 deactivating zone configuration, 700 default zone (fabrics) disabling, 692 enabling, 692 defining, event f
E Edit menu, 1300 editing property fields, 1368 property labels, 309, 1367 thresholds, 735 zone alias, 694 editing system collectors, 1034 Element Manager, launching launching Element Manager, 378 e-mail event notification setup roles and access levels, 1336 e-mail filter override, 523 e-mail notification configuring, 1180 emailing technical support information, 1264 enabling call home centers, 368 default zone for fabrics, 692 port connectivity view filter, 434 ports, 433 support save for call home centers
F fabric assigned WWN adding AG ports, 516 auto-assigning to a switch or AG port, 514 deleting from a switch or AG port, 515 disabling on switch or AG port, 514 manually assigning to a switch or AG port, 514 modifying on a switch or AG port, 515 moving across switches, 517 on attached AG ports, 515 fabric properties, 1339 fabric properties dialog boxes, customizing, 1339 Fabric Watch notification types, 488 fabrics deleting from discovery, 110 status, determining, 300 zone database, clearing, 712 fault mana
GSLB policy adding a prefix, 971 deleting a prefix entry, 971 importing IP addresses from a file, 972 managing, 967 metrics, 970 GSLB site management adding and deleting Serverirons to the site, 974 GSLB zone management deleting a zone configuration, 978 H HCM features, 499 software overview, 498 statistics monitoring, 499 HCM Agent, launching, 379 Help menu, 1299, 1306 high integrity fabric configuration setttings, 758 high integrity fabrics (HIF), requirements, 743 host adapter discovery, 500 host adapte
module report, 1278 port VLAN report, 1279 viewing, 1268 iSCSI devices, identifying inactive, 440, 1347 iSCSI properties dialog box, 1346 ISL protocol threshold, 724 adding, 730 K keep switch configuration, 417 L launch remote client, 4 launching Server Management Console, 387 launching HCM Agent, 379 launching Telnet, 378 LDAP server configuring, 394 license MPLS devices, 888, 921, 926, 937, 938 license update roles and access levels, 1337 link reset threshold, 724 link reset thresholds adding, 729 listi
Monitoring requirements sFlow, 1075 SNMP, 1021 monitoring statistics, 499 MPLS Manager licenses, 888, 921, 926, 937, 938 MSTP adding an instance, 881 assigning an instance to a VLAN, 881 configuring on a product, 880 N names adding to existing device, 152 adding to new device, 152 editing, 154 exporting, 154 fixing duplicates, 149 importing, 154 removing from device, 153 searching by, 155 viewing, 150 names, overview, 149 naming conventions, 685 network size status, determining, 300 new device, adding name
showing connected, 436 view connectivity, 430 viewing, 435 viewing connection properties, 436 viewing types, 436 priorities, threshold, 722 privileges user, 1321 Product list columns, 294 product overview, 497 products icons, 301, 302 status, determining, 300 properties dialog box iSCSI tab, 1346 Port tab, 1347 Storage tab, 1343 properties edit roles and access levels, 1337 property fields editing, 1368 property labels adding, 308, 1367 deleting, 309, 1368 editing, 309, 1367 pseudo event definitions, 1220 a
S saving switch configuration files, 408, 409 zone databases to switch, 707 scheduling technical support information collection, 1257 search names, 155 WWN, 155 searching configuration file, 415 members in zones, 713 Potential Members list, 713 zones in zone configuration, 713 Zones list, 714 security configuring, 156 roles and access levels, 1337 security authentication configuring using the GUI, 520 server IP address, explicit, 164 Server Management Console about, 387 launching, 387 Server menu, 1299, 130
status backup, 142 host discovery, 111, 117 memory allocation, 176 status bar, 299 storage events configuring, 145 storage properties, 1343 support mode configuring, 185 SVI managing IP addresses, 882 Switch authentication configuring, 402 switch configuration backup, 410 deleting, 416 exporting, 416 file, search content, 415 file, view content, 414 importing, 416 keeping past age limit, 417 replicating, 417, 421 restore, 412 Sybase database fields, 1409 syslog forwarding, 1200 adding a destination, 1200 ad
viewing, 739 viewing on a specific device, 739 thresholds table removing thresholds, 741 tips, turning on and off, 148 tips, viewing, 148 tool tips, turning on and off, 148 tool tips, viewing, 148 toolbox, 294 tools adding, 377 adding menu options, 381 adding to device shortcut menu, 384 changing menu options, 383 changing option on device shortcut menu, 385 changing server address, 381 removing menu options, 383 removing option from device shortcut menu, 386 Tools menu, 1306 tooltips configuring, 147 topol
deploying configurations, 876 displaying, 865 displaying by products, 868 displaying in the global view, 867 modifying port, 875 VLAN management in a VCS environment, 865 VLAN Manager configuration requirements, 864 default VLAN, 863 definition of, 863 super-aggregated VLAN, 863 using to display by products, 868 views, 866 VLAN routing, 882 managing IP addresses on an SVI, 882 VLL Manager, 888, 910, 926 copy, 921 delete, 922 edit, 922, 937 VLL Monitor, 938 VM Manager deleting, 501 discovery, 500 editing, 50
zone set creating, 696 naming conventions, 685 zone set.