53-1003153-01 11 July 2014 Brocade Network Advisor IP User Manual Supporting Network Advisor 12.3.
Copyright © 2014 Brocade Communications Systems, Inc. All Rights Reserved. Brocade, the B-wing symbol, Brocade Assurance, ADX, AnyIO, DCX, Fabric OS, FastIron, HyperEdge, ICX, MLX, MyBrocade, NetIron, OpenScript, VCS, VDX, and Vyatta are registered trademarks, and The Effortless Network and the On-Demand Data Center are trademarks of Brocade Communications Systems, Inc., in the United States and in other countries. Other brands and product names mentioned may be trademarks of others.
Title Summary of changes Date Brocade Network Advisor IP User Manual 53-1002695-01 Updated for Network Advisor 12.0.0. December 2012 Brocade Network Advisor IP User Manual 53-1002947-01 Updated for Network Advisor 12.1.0. August 2012 Brocade Network Advisor IP User Manual 53-1003056-01 Updated for Network Advisor 12.2.0. January 2014 Brocade Network Advisor IP User Manual 53-1003153-01 Updated for Network Advisor 12.3.0.
iv Brocade Network Advisor IP User Manual 53-1003153-01
Contents About This Document How this document is organized . . . . . . . . . . . . . . . . . . . . . . . . . . . .xliii Supported hardware and software . . . . . . . . . . . . . . . . . . . . . . . . . . xlv What’s new in this document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . li Document conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Text formatting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Changing the database user password . . . . . . . . . . . . . . . . . . . 26 Supported open source software products. . . . . . . . . . . . . . . . . . . . 27 Chapter 2 Patches Installing a patch. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Uninstalling a patch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Chapter 3 Discovery IP discovery overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Scheduling discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Suspending a discovery schedule . . . . . . . . . . . . . . . . . . . . . . . 79 Editing a discovery schedule. . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 Configuring advanced discovery profile preferences . . . . . . . . 82 Deleting a discovery profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 Creating a discovery address file . . . . . . . . . . . . . . . . . . . . . . . .
Dynamic product groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .121 Viewing product group properties . . . . . . . . . . . . . . . . . . . . . . .126 Deleting a product group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .127 Port Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .128 Editing a port group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .129 Duplicating a port group . . . . . . . . . . . . . . . . . .
Configuring SNMP v3 credentials . . . . . . . . . . . . . . . . . . . . . . .161 Software Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .161 Client/Server IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .162 IP preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .166 Memory allocation settings . . . . . . . . . . . . . . . . . . . . . . . . . . . .173 Product communication settings . . . . . . . . . . . . . . .
Configuring the CLI credential policy . . . . . . . . . . . . . . . . . . . .214 Chapter 7 Web Client Web client overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .218 Dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .218 Dashboard expand navigation bar . . . . . . . . . . . . . . . . . . . . . .219 Dashboard toolbar . . . . . .
Exporting a user-defined dashboard definition . . . . . . . . . . . .320 Importing a user-defined dashboard definition . . . . . . . . . . . .321 Setting the dashboard display . . . . . . . . . . . . . . . . . . . . . . . . .321 Customizing the dashboard widgets and monitors . . . . . . . . .321 Exporting the dashboard display . . . . . . . . . . . . . . . . . . . . . . .323 Printing the dashboard display . . . . . . . . . . . . . . . . . . . . . . . . .323 Attaching and detaching the Dashboard tab . . . .
User-defined performance monitors . . . . . . . . . . . . . . . . . . . . . . . . 371 Measures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371 Top or bottom product performance monitors. . . . . . . . . . . . .372 Top or bottom port performance monitors. . . . . . . . . . . . . . . .373 Distribution performance monitors . . . . . . . . . . . . . . . . . . . . . 374 Time series performance monitors. . . . . . . . . . . . . . . . . . . . . .
L2 Topology view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .418 Ethernet Fabrics view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419 VLAN Topology view. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419 Host Topology view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .422 IP topology map components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .424 Topology map elements. . . .
Enabling supportSave. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .464 Testing the Call Home center connection . . . . . . . . . . . . . . . . . . . .465 Disabling a Call Home center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .465 Viewing Call Home status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .466 Assigning a device to the Call Home center . . . . . . . . . . . . . . . . . .467 Removing a device from a Call Home center . . . . . . . . . . . .
Changing the database password . . . . . . . . . . . . . . . . . . . . . .486 Ports tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .487 AAA Settings tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .488 Configuring Radius server authentication . . . . . . . . . . . . . . . .488 Configuring LDAP server authentication . . . . . . . . . . . . . . . . .490 Configuring TACACS+ server authentication . . . . . . . . . . . . . .
Wireless device properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .532 Element Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .533 Launching the Element Manager . . . . . . . . . . . . . . . . . . . . . . .533 Launching a Telnet session. . . . . . . . . . . . . . . . . . . . . . . . . . . .534 Configuration repository and backup management . . . . . . . . . . . .535 CLI configuration management . . . . . . . . . . . . . . . . . . . . . . . . . . .
Security monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .559 Port statistics monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . .559 Interface error types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .560 Ethernet fabric traceroute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .560 Exporting diagnostic data . . . . . . . . . . . . . . . . . . . . . . . . . . . . .565 Chapter 16 Host Management Host management . . . . . . . .
Priority-based flow control . . . . . . . . . . . . . . . . . . . . . . . . . . . . .598 Ethernet jumbo frames . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .599 FCoE protocols supported . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .599 Ethernet link layer protocols supported . . . . . . . . . . . . . . . . . .599 FCoE protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .599 FCoE licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Enabling 802.1x authentication . . . . . . . . . . . . . . . . . . . . . . . .635 Disabling 802.1x authentication . . . . . . . . . . . . . . . . . . . . . . .635 Setting 802.1x parameters for a port. . . . . . . . . . . . . . . . . . . .635 Switch, port, and LAG deployment . . . . . . . . . . . . . . . . . . . . . . . . . .637 Deploying DCB product, port, and LAG configurations . . . . . .637 Source to target switch Fabric OS version compatibility for deployment. . . . . . . . . . . . . . . . . . . . . . .
IronWare Layer 2 ACL configuration . . . . . . . . . . . . . . . . . . . . .680 Fabric OS Layer 2 ACL configuration . . . . . . . . . . . . . . . . . . . .687 Creating a Layer 2 ACL from a saved configuration. . . . . . . . .694 Deleting a Layer 2 ACL configuration from the application. . .695 Deleting a Layer 2 ACL configuration from the switch. . . . . . .695 Network OS Layer 2 ACL configuration. . . . . . . . . . . . . . . . . . .696 Layer 3 access control list policy . . . . . . . . . . . . . . . . . .
Creating a member in a zone . . . . . . . . . . . . . . . . . . . . . . . . . . 761 Removing a member from a zone. . . . . . . . . . . . . . . . . . . . . . . 761 Renaming a zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .762 Deleting a zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .763 Duplicating a zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .763 Customizing the zone member display. . . . . . . . . . . . . . . . . . .
Chapter 21 Port Fencing About port fencing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .789 Viewing port fencing configurations . . . . . . . . . . . . . . . . . . . . .790 Thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .792 C3 Discard Frames threshold . . . . . . . . . . . . . . . . . . . . . . . . . .793 Invalid CRCs threshold. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .794 Link Reset threshold . . . . .
Cascaded FICON fabric merge . . . . . . . . . . . . . . . . . . . . . . . . . . . . .829 Merging two cascaded FICON fabrics. . . . . . . . . . . . . . . . . . . .830 Resolving merge conflicts . . . . . . . . . . . . . . . . . . . . . . . . . . . . .833 Port groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .834 Viewing port groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .835 Editing a port group . . . . . . . . . . . . . . . . . . . . . .
Change tracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 874 RASLog events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 876 Configuration snapshots. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .882 Comparing configuration snapshots. . . . . . . . . . . . . . . . . . . . .883 Generating a configuration snapshot report . . . . . . . . . . . . . .885 Viewing the pre- and post-configuration snapshot . . . . . . . . .
Editing a monitoring configuration . . . . . . . . . . . . . . . . . . . . . .929 CLI deployment reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .930 CLI configuration scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .931 Configuring a one-time deployment schedule . . . . . . . . . . . . .931 Configuring an hourly deployment schedule . . . . . . . . . . . . . .931 Configuring a daily deployment schedule . . . . . . . . . . . . . . . .
Deploying VLAN configurations . . . . . . . . . . . . . . . . . . . . . . . . .964 Spanning Tree Protocol configuration . . . . . . . . . . . . . . . . . . . . . . .965 Configuring STP or RSTP on a port VLAN . . . . . . . . . . . . . . . . .965 Deploying an STP configuration on a port VLAN . . . . . . . . . . .967 Configuring MSTP on a product . . . . . . . . . . . . . . . . . . . . . . . .968 VLAN routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Filtering VLL traffic monitoring . . . . . . . . . . . . . . . . . . . . . . . .1012 Virtual Private LAN Services (VPLS) overview . . . . . . . . . . . . . . . .1013 VPLS Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1015 Viewing VPLS instances and peer topologies . . . . . . . . . . . .1015 Viewing Saved VPLS configurations . . . . . . . . . . . . . . . . . . . .1018 Adding or editing a VPLS instance . . . . . . . . . . . . . . . . . . . . .
Controller configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1067 Creating a new GSLB controller configuration . . . . . . . . . . . 1067 Deploying a controller configuration. . . . . . . . . . . . . . . . . . . 1069 Scheduling a deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . .1070 Chapter 32 SSL Certificates for ServerIron Products SSL certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
IP performance monitoring and traffic analysis . . . . . . . . . . . . . 1112 IP configuration requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . 1113 IP real-time performance monitoring. . . . . . . . . . . . . . . . . . . . . . 1113 Adding collectibles to monitoring . . . . . . . . . . . . . . . . . . . . . 1119 The graph and table are populated with the collectible performance values. The selected collectibles display beneath the graph.1119 Removing collectibles from monitoring . . . . .
Viewing VCS fabric Top Talker reports . . . . . . . . . . . . . . . . . 1183 Troubleshooting sFlow reports . . . . . . . . . . . . . . . . . . . . . . . 1184 IP traffic accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1184 Chapter 35 Frame Monitor Frame Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1187 Creating a custom frame monitor . . . . . . . . . . . . . . . . . . . . . . . . 1189 Editing a frame monitor . . . . . . . . . . .
Fabric policy monitors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Switch and router configuration policy managers . . . . . . . . Host configuration policy managers . . . . . . . . . . . . . . . . . . . Management configuration policy manager . . . . . . . . . . . . 1230 1231 1233 1235 Preconfigured configuration policy managers . . . . . . . . . . . . . . 1235 Viewing configuration policy manager status . . . . . . . . . . . . . . . 1236 Viewing existing configuration policy managers . .
Removing a trap recipient from one or more switches . . . . SNMP trap forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Event reception . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Adding an SNMP v3 credential . . . . . . . . . . . . . . . . . . . . . . . Adding an SNMP v1 or v2c community string . . . . . . . . . . . Importing a new MIB into the Management application. . . Trap customization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Adding or editing an event report schedule . . . . . . . . . . . . . 1336 Event logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing event logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Copying part of a log entry . . . . . . . . . . . . . . . . . . . . . . . . . . Copying an entire log entry . . . . . . . . . . . . . . . . . . . . . . . . . . Exporting the entire log . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
IP Address List report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1377 MAC Address List report . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1378 IP Physical Ports - Realtime report . . . . . . . . . . . . . . . . . . . . 1378 IP Stacking Ports - Realtime report. . . . . . . . . . . . . . . . . . . . 1379 Physical Media - Realtime report . . . . . . . . . . . . . . . . . . . . . 1379 Deployment reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
About user privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1423 About Roles and Access Levels . . . . . . . . . . . . . . . . . . . . . . . . . . 1439 Appendix E Device Properties Viewing SAN device properties. . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing SAN device properties . . . . . . . . . . . . . . . . . . . . . . . Viewing storage properties . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing iSCSI properties . . . . . . . . . . . . . . . . . .
Views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1751 ADAPTER_PORT_CONFIG_INFO . . . . . . . . . . . . . . . . . . . . . . .1751 AG_CONNECTION_INFO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1751 BIRTREPORT_SCHEDULE_INFO . . . . . . . . . . . . . . . . . . . . . . .1752 BOOT_IMAGE_FILE_DETAILS_INFO . . . . . . . . . . . . . . . . . . . . .1753 CNA_ETH_PORT_CONFIG_INFO . . . . . . . . . . . . . . . . . . . . . . .1753 CNA_PORT_DETAILS_INFO .
IFL_REPORT_INFO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1793 ISL_INFO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1796 ISL_REPORT_INFO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1797 ISL_TRILL_INFO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1799 ISL_TRUNK_GROUP_MEMBER_INFO . . . . . . . . . . . . . . . . . . 1800 ISL_TRUNK_INFO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
VR_CONN_NPIV_INFO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1848 VMM_DISCOVERED_MAC_INFO . . . . . . . . . . . . . . . . . . . . . . 1849 VM_VIRTUAL_ETHERNET_ADAPTER_INFO . . . . . . . . . . . . . . 1850 ZONE_DB_INFO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1850 ZONE_DB_REPORT_INFO . . . . . . . . . . . . . . . . . . . . . . . . . . . .1851 AP_USAGE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1851 EVENTS . . . . . . . . . . .
About This Document In this chapter • How this document is organized . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xliii • Supported hardware and software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xlv • What’s new in this document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . li • Document conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . liv • Additional information . . . . . . . . . . .
• Chapter 14, “Wireless Management,” provides information about wireless devices. • Chapter 15, “VCS Management,” provides information on VCS fabrics. This chapter is for Network OS devices only. • Chapter 16, “Host Management,” provides information on how to configure an HBA. This chapter is for Fabric OS devices only. • Chapter 17, “Fibre Channel over Ethernet,” provides information on how to configure FCoE. This chapter is for Fabric OS devices only.
• Chapter 39, “Packet Capture (Pcap),” provides information on how to configure switches as sensors to capture packets. • • • • Chapter 40, “Technical Support,” provides server, client, and device supportSave instructions. Chapter 41, “Reports,” provides instructions for generating reports. Appendix A, “Application menus,” provides information about the main and shortcut menus. Appendix B, “Call Home Event Tables,” provides supplemental information about call home event tables.
TABLE 1 Fabric OS-supported hardware (Continued) Device name Terminology used in documentation Firmware level required Brocade 6520 switch 96-port, 16 Gbps switch Fabric OS v7.1.0 or later Brocade 6547 embedded switch 48-port, 16 Gbps embedded switch Fabric OS v7.2.0 or later Brocade 7840 switch 16 Gbps 24-FC port, 18 GbE port Switch Fabric OS v7.3.
TABLE 2 IronWare-supported hardware (Continued) Device name Terminology used in documentation Firmware level required FastIron family Ethernet switch See individual device. FastIron CX 624S (FCX624S) Ethernet L2/L3 Edge switch, 24 1GbE RJ45 ports FastIron 06.0.00 and later FastIron CX 648S (FCX648S) Ethernet L2/L3 Edge switch, 48 1GbE RJ45 ports FastIron 06.0.00 and later FastIron CX 624S-HPOE (FCX624S-HPOE) Ethernet L2/L3 Edge switch, 24 1GbE RJ45 ports, 24 POE+ ports FastIron 06.0.
TABLE 2 IronWare-supported hardware (Continued) Device name xlviii Terminology used in documentation Firmware level required ICX 6450-24 Base router 24-port Campus LAN Base router FastIron 07.4.00 and later ICX 6450-24 Premium router 24-port Campus LAN Premium router FastIron 07.4.00 and later ICX 6450-24-HPOE switch 24-port Campus LAN HPOE switch FastIron 07.4.00 and later ICX 6450-24-HPOE Base L3 router 24-port Campus LAN HPOE Base L3 router FastIron 07.4.
TABLE 2 IronWare-supported hardware (Continued) Device name Terminology used in documentation FastIron Edge Switch X-Series Enterprise LAN Edge switch FastIron Edge X 424 Enterprise LAN Edge switch, 24 10/100/1000 Mbps ports FastIron Edge X 624 Enterprise LAN Edge switch, 24 10/100/1000 Mbps ports FastIron Edge X 448 Enterprise LAN Edge switch, 48 10/100/1000 Mbps ports FastIron Edge X 648 Enterprise LAN Edge switch, 48 10/100/1000 Mbps ports FastIron Edge X 424HF Enterprise LAN Edge switch,
TABLE 2 IronWare-supported hardware (Continued) Device name Terminology used in documentation ServerIron family Application product Firmware level required ServerIron ADX 1000 Application switch ServerIron ADX 1000F Application Fiber switch ADX 12.3.03 or later ServerIron ADX 4000 4U Application Delivery chassis ADX 12.1.00 or later ServerIron ADX 10000 10U Application Delivery chassis ADX 12.1.
What’s new in this document The following changes have been made since this document was last released: • Information that was added: - Dashboard - Device Configuration - Bottlenecked Ports widget Bottleneck Graph dialog box Dashboard playback Dashboard privileges Saving switch configurations Adaptive Backup support Switch Configuration File Manager Change tracking Application Configuration Importing OUI and editing product type mapping Brocade Network Advisor IP User Manual 53-100
• Information that was changed: - Menu - SAN Device Property - FCIP lii Host port mapping overview IP Element Manager - Product group overview Host Port Mapping - Cascaded FICON fabric Group Management - Support for Brocade 7840 FICON - Defining filters Event action definitions Pseudo events Event logs Flow Vision - Fabric Binding overview Fault Management - Discovering fabrics Host Discovery Fabric Binding - Restoring a configuration
- Monitoring and Alerting Policy Suite - Configuring Virtual Fabrics VLAN Management - Product List SAN port icon SAN product status icons Virtual Fabrics - Application privileges and behavior View Management - Users overview Copying and pasting user preferences User Privileges - Device technical support User Account Management - AAA Settings tab Technical Support - Port Commissioning Server Management Console - Policy monitor
- Wireless devices Zoning Listing zone members Information that was deleted: • - Performance dashboard For further information about new features and documentation updates for this release, refer to the release notes. Document conventions This section describes text formatting conventions and important notice formats used in this document.
For definitions of SAN-specific terms, visit the Storage Networking Industry Association online dictionary at: http://www.snia.org/education/dictionary Notice to the reader This document may contain references to the trademarks of the following corporations. These trademarks are the properties of their respective companies and corporations. These references are made for informational purposes only.
Other industry resources For additional resource information, visit the Technical Committee T11 website. This website provides interface standards for high-performance and mass storage applications for Fibre Channel, storage management, and other applications: http://www.t11.org For information about the Fibre Channel industry, visit the Fibre Channel Industry Association website: http://www.fibrechannel.
Provide the title and version number of the document and as much detail as possible about your comment, including the topic heading and page number and your suggestions for improvement.
lviii Brocade Network Advisor IP User Manual 53-1003153-01
Chapter Getting Started 1 In this chapter • User interface components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 • Management server and client. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 • Accessibility features for the Management application . . . . . . . . . . . . . . . . 17 • PostgreSQL database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 • Supported open source software products . . . . .
1 User interface components NOTE Some widgets may be hidden. To display a widget to the Dashboard tab, click the Customize Dashboard icon (“Customizing the dashboard widgets and monitors” on page 321). FIGURE 1 Main window 1. Menu bar — Lists commands you can perform on the Management application. The available commands vary depending on which tab (IP or Dashboard) you select. For a list of available commands, refer to Appendix A, “Application menus”. 2.
1 Management server and client Management server and client The Management application has two parts: the Server and the Client. The Server is installed on one machine and stores device-related information; it does not have a user interface. To view information through a user interface, you must log in to the Server through a Client. The Server and Clients may reside on the same machine, or on separate machines. If you are running Professional, the server and the client must be on the same machine.
1 Management server and client Launching a remote client NOTE For higher performance, use a 64-bit JRE. To launch a remote client, complete the following steps. 1. Open a web browser and enter the IP address of the Management application server in the Address bar. If the web server port number does not use the default (443 if is SSL Enabled; otherwise, the default is 80), you must enter the web server port number in addition to the IP address. For example, IP_Address:Port_Number.
Management server and client 1 The Management application displays. Clearing previous versions of the remote client The remote client link in the Start menu does not automatically upgrade when you upgrade the Management application. You must clear the previous version from the Java cache. To clear the Java cache, complete the following steps. 1. Select Start > Settings > Control Panel > Java. The Java Control Panel dialog box displays. 2. Click View on the General tab.
1 Management server and client FIGURE 3 Management application web client log in page 2. Enter your user name and password. NOTE Do not enter Domain\User_Name in the User ID field for LDAP server authentication. 3. Press Enter or click the log in arrow icon. 4. Click OK on the Login Banner. The Management application web client displays.
Management server and client 1 1. Choose one of the following options: • On Windows systems, select Start > Programs > Management_Application_Name 12.X.X > Management_Application_Name Configuration. • On UNIX systems, execute sh Install_Home/bin/configwizard on the terminal. 2. Click Next on the Welcome screen. 3. Click Yes on the confirmation message. 4. Complete the following steps on the FTP/SCP/SFTP Server screen. a.
1 Management server and client • • • • • Options dialog box (does not display all IP addresses) a. Select an address from the Server IP Configuration list. b. Select an address from the Switch - Server IP Configuration Preferred Address list.
1 Management server and client d. Enter a port number in the Starting Port Number field (default is 24600). NOTE For Professional software, the server requires 15 consecutive free ports beginning with the starting port number. NOTE For Trial and Licensed software, the server requires 18 consecutive free ports beginning with the starting port number. e. Enter a port number in the Syslog Port Number field (default is 514).
1 Management server and client Viewing active sessions To view the Management application active sessions, complete the following steps. 1. Select Server > Active Sessions. The Active Sessions dialog box displays (Figure 5). FIGURE 5 Active Sessions dialog box 2. Review the active session information. The following information displays: • • • • • • ID — Displays the name of the user (for example, Administrator). Full Name — Displays the full name of the user.
Management server and client 1 Viewing server properties To view the Management application server properties, complete the following steps. 1. Select Server > Server Properties. The Server Properties dialog box displays. FIGURE 6 Server Properties dialog box 2. Review the information. TABLE 4 Server Properties Field/Component Description Free Memory The amount of free memory on the server. IP Address The IP address in IPv4 or IPv6 format. Java VM Name The Java Virtual Machine name.
1 Management server and client Viewing port status The Port Status dialog box enables you to determine the availability of ports required for key Management application features.
Management server and client 1 • Running Process – The name of the process using the port (not the Management applciation). Blank when the port is only used by the Management applciation server. If multiple processes occupy the same port, the process names display in a comma-separated list. • Recommended Actions — Suggested action to take to resolve the issues. 3. Click Close.
1 Management server and client TABLE 5 Port usage and firewall requirements (Continued) Port Number Ports Transport Description Communication Path Open in Firewall 492 TACACS+ Authentication port TCP TACACS+ server port for authentication if you use TACACS+ as an external authentication Server–TACACS+ Server Yes 69 TFTP UDP File upload/download to product Product-Server Yes 802 Management application HTTP server TCP Non-SSL HTTP/1.
Management server and client TABLE 5 1 Port usage and firewall requirements (Continued) Port Number Ports Transport Description Communication Path Open in Firewall 6362 LDAP Authentication SSL port TCP LDAP server port for authentication if you use LDAP as an external authentication and SSL is enabled Server–LDAP Server Yes 18122 RADIUS Authentication Server Port UDP RADIUS server port for authentication if you use RADIUS as an external authentication Server–RADIUS Server Yes 18132 RAD
1 Management server and client TABLE 5 Port usage and firewall requirements (Continued) Port Number Ports Transport Description Communication Path Open in Firewall 246092 Reserved for future use TCP Not used Client - Server No 2 Reserved for future use TCP Not used Client - Server No 246112 JBoss Transaction Services Recovery Manager port TCP Not used remotely Server Yes 246122 JBoss Transaction Status Manager port TCP Not used remotely Server Yes 246132 JBoss Pooled invoke
Accessibility features for the Management application TABLE 5 1 Port usage and firewall requirements (Continued) Port Number Ports Transport Description Communication Path Open in Firewall 34568 HCM Agent discovery port TCP Used for HBA management via JSON Server - Managed Host Yes 555561 Launch in Context (LIC) client hand shaking port TCP Client port used to check if a Management application client opened using LIC is running on the same host Client No NOTE: If this port is in use, th
1 Accessibility features for the Management application TABLE 6 Keyboard shortcuts Menu Item or Function Keyboard Shortcut Internet Explorer SHIFT + F2 Master Log F5 FireFox SHIFT + F1 Paste CTRL + V Product List F9 Properties Alt-Enter Select All CTRL + A Show Ports F4 SSH Shift-F5 View Utilization CTRL + U Zoom In CTRL + NumPad+ Zoom Out CTRL + NumPad- Look and feel customization You can configure the Management application to mimic your system settings as well as define the
Accessibility features for the Management application 1 2. Select Look and Feel in the Category list. 3. Choose from one of the following options: • Select Default to configure the look and feel back to the Management application defaults. • Select System to configure the Management application to have the look and feel of your system. This changes the look and feel for the components that use ‘Java Metal Look and Feel’.
1 Product improvement Product improvement To improve its products, Brocade is collecting usage statistics from the field. If you agree to participate in the program, the Network Advisor server will transmit data back to the secure Brocade web server (HTTPS). The Brocade web server is hosted in a Brocade network.
1 Product improvement Disabling product improvement data transfer You can disable feature usage data transfer from the Options dialog box once your system is up and running. To disable feature usage data transfer from the application, complete the following steps. 1. Select Server > Options. The Options dialog box displays. 2. Select Product Improvement in the Category list. 3. Select the No, thank you option. 4. Click OK to save your selection and close the Options dialog box.
1 PostgreSQL database 11. When the file is successfully created, the client changes the state of the data transfer to “Uploading” and transmits the data. The client transmits the data securely to the Brocade web server using the Apache HTTP Components third-party library. The client communicates with the Brocade web server using an authorization token. 12. When the transfer is complete, the client updates the Brocade web server database with the transfer status (success or failure).
PostgreSQL database 1 Connecting to the database using the ODBC client (Windows systems) The Open Database Connectivity (ODBC) driver enables you to configure the data source name (DSN) for the database. To install the ODBC driver and create a new data source, complete the following steps. 1. Double-click edb_psqlodbc.exe located on the DVD (DVD_Drive/Management_Application/odbc/Windows). 2.
1 PostgreSQL database 20. Click Save. 21. Click OK on the ODBC Data Source Administrator dialog box. 22. To export data, select Data > Import External Data > New Database Query and complete the steps in the Data Connection Wizard. Connecting to the database using the ODBC client (Linux systems) NOTE The ODBC driver is not supported on 64-bit Linux systems. You must have the Open Database Connectivity (ODBC) driver to allow remote clients to export data and generate reports.
1 PostgreSQL database Adding the Datasourse on Linux systems Before you edit the INI files, make sure the PostgreSQL database is up and running. NOTE For RedHat and Oracle Enterprise systems, the odbc.ini and odbcinst.ini files are located in /etc. For SUSE systems, the odbc.ini and odbcinst.ini files are located in /etc/unixODBC. 1. Open the odbc.ini file in an editor and enter the datasource information as follows: [TestDB] Description = PostgreSQL 8.4 Driver = /opt/PostgreSQL/psqlODBC/lib/psqlodbcw.
1 PostgreSQL database 5. On the Set up user authentication screen, complete the following steps. a. Enter the database user name in the User name field. b. Select the Password required check box. c. Click Test Connection to test the connection. The Authentication Password dialog box displays. d. Enter the database password in the Password field and click OK. e. Click OK on the Connection Test dialog box.
Supported open source software products 1 3. Launch the Server Management Console. 4. Click the Services tab. 5. Click Stop to stop all services. 6. Click Close to close the Server Management Console. 7. Launch the Server Management Console. 8. Click Start to start all services. NOTE If the server is configured to use an external FTP server, the Server Management Console does not attempt to start the built-in FTP service. 9. Click Close to close the Server Management Console.
1 Supported open source software products TABLE 9 28 Open source software third-party software products Open Source Software License Type Apache Extras Companion for Apache log4j 1.1 Apache License v2.0 ApacheFTPServer 1.0.3 Apache License v2.0 Apache Log4j 1.2.16 Apache License v2.0 ASM 3.2 Custom License Axis 1.4 Apache License v2.0 AXL Radius Client API 3.29 AXL Radius Client License BeanScriptingFramework 2.4.0 Apache License v2.0 BeanShell 2.
Supported open source software products TABLE 9 1 Open source software third-party software products Open Source Software License Type JFreeChart 1.0.13 LGPL v2.1 JGoodiesForms 1.2.1 BSD JGoodiesLooks 2.2.2 BSD JGraph 5.13.0.1 BSD Style JIDE 2.10.1 JIDE Software License Jmesa 2.4.5 Apache JSON-RPCJava 1.0.1 Apache License v2.0 KajabityTools 0.1 Apache License v2.0 L2Fprod.comCommonComponents 7.3 Apache License v2.0 MaverickJavaSSHAPI 1.4.
1 30 Supported open source software products Brocade Network Advisor IP User Manual 53-1003153-01
Chapter 2 Patches In this chapter • Installing a patch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 • Uninstalling a patch. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Installing a patch The patch installer enables you to update the Management application between releases. Each patch installer includes the previous patches within a specific release. For example, patch F (11.X.
2 Uninstalling a patch • Extracts patch files to the Install_Home folder. • Creates a back up (zip) of the original files to be updated and copies the zip file to the Install_Home\patch-backup directory (for example, Install_Home\patch-backup\na_11-3-0a.zip). The first time you apply a patch, the back up patch zip file uses the following naming convention: _-- .zip (for example, Install_Home\patch-backup\na_11-3-0a.zip).
Uninstalling a patch 2 6. Copy the artifact from the extracted folder to the source folder in the Install_Home/patch-backup directory. 7. Repeat step 5 and 6 for all artifacts listed in the restore.xml folder. 8. Go to the Install_Home/conf directory. 9. Open the version.properties file in a text editor. 10. Change the patch version (patch.version) value to the reverted patch (for example, if you are reverting from patch F to patch C then patch.version = c).
2 34 Uninstalling a patch Brocade Network Advisor IP User Manual 53-1003153-01
Chapter 3 Discovery In this chapter • IP discovery overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 • VDX/VCS discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 • Logical chassis cluster mode discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 • Configuring IP profile discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 • Configuring IP simple discovery . .
3 IP discovery overview IP discovery overview NOTE Discovery only displays products that are assigned to your area of responsibility (AOR). For more information about user accounts, refer to “Areas of responsibility” on page 203. NOTE You must have the Discover Setup - IP privilege to configure and run discovery. For more information about privileges, refer to “User Privileges” on page 1423.
IP discovery overview 3 2. Discovery queries the database to retrieve the IP address for each previously discovered device and adds these IP addresses to the list of candidate IP addresses. 3. Discovery adds the IP addresses from the IP address file to the list of candidate addresses. 4. As the discovery cycle proceeds, discovery adds addresses from the ping sweep address ranges to the list of candidate addresses. 5.
3 IP discovery overview Configuration requirements Before configuring discovery, obtain the following information: • SNMPv1 and SNMPv2c read-write community strings or SNMPv3 read-write credentials for the devices to be included in discovery. Make sure that devices you want to manage have the SNMP credentials configured. For more information, refer to “IP SNMP credentials” on page 50. • Device IP addresses and subnets to probe during discovery.
IP discovery overview TABLE 10 3 Required MIB support for IronWare OS devices (Continued) IETF standard MIB name Required MIB object Data collected RFC 1213 MIB-II mib-2.system mib-2.interfaces.ifTable mib-2.ip.ipAddrTable From mib-2.interfaces.ifTable for interface level information: • ifName/ifDescr • ifAlias • ifType • ifMtu • ifSpeed • ifPhysAddress • ifAdminStatus • ifOperStatus • ifLastChange From mib-2.ip.ipAddrTable for IP subnet information: • ipAdEntAddr • ipAdEntNetMask From mib-2.ip.
3 IP discovery overview Table 11 provides a list of MIB support required for third-party devices. TABLE 11 Required MIB support for third-party devices IETF standard MIB name Required MIB object Data collected RFC 1213 MIB-II mib-2.system mib-2.interfaces.ifTable mib-2.ip.ipAddrTable From mib-2.interfaces.ifTable for interface level information: • ifName/ifDescr • ifAlias • ifType • ifMtu • ifSpeed • ifPhysAddress • ifAdminStatus • ifOperStatus • ifLastChange From mib-2.ip.
VDX/VCS discovery TABLE 11 3 Required MIB support for third-party devices (Continued) IETF standard MIB name Required MIB object Data collected RFC 4133 ENTITY-MIB entPhysicalTable entAliasMappingTable (if available) For module (line card) information: Entire entPhysicalTable Entire entAliasMappingTable, if available RFC 4293 IP-MIB mib2.ip.
3 VDX/VCS discovery VCS devices use the following to determine reachability: • Reachable — The VDX/VCS product is online and is accessible by ICMP, Netconf, and SNMP; therefore, it is reachable. • Degraded Link — The VDX/VCS product is not accessible by one of the following: ICMP, Netconf, or SNMP. • Not Reachable — The VDX/VCS product is offline and is not accessible by any of the following: ICMP, Netconf, and SNMP. The following sections detail the VDX/VCS discovery behavior.
VDX/VCS discovery 3 # # A sample entry: # 10:00:00:05:33:51:62:42 172.26.20.10 # # Changes to this file do not require restarting the management server. 3. Select File > Save. Standalone discovery • When you discover a VDX device that is not VCS-enabled, it displays as an individual L2 (DCB) device. • When you enable VCS mode on a discovered VDX device, after rediscovery the VDX displays as a VCS fabric. VCS fabric discovery NOTE Professional edition can only discover a VCS fabric with one member.
3 VDX/VCS discovery Seed switch failover The Management application uses the seed switch to discover other members in the VCS fabric. When you discover devices through individual discovery, the seed switch is the first member you discover in the VCS fabric. When you discover devices through profile discovery, the seed switch is the principal switch in the VCS fabric.
Logical chassis cluster mode discovery 3 Logical chassis cluster mode discovery Logical chassis cluster mode requires Network OS 4.0 or later and is one of two types of VCS modes. In logical chassis cluster mode, both the data and configuration paths are distributed. The entire cluster can be configured from the principal node.
3 Logical chassis cluster mode discovery • The State column in the Discover Setup - IP dialog shown in Figure 8 applies only to nodes that are in logical chassis mode. Possible states are: - Online—A node that is currently connected and operational. - Offline—A cluster member node that cannot be reached by the primary cluster node. - Rejoining—A node that is in the process of rejoining its cluster. - Replacing—A node that is being replaced.
Logical chassis cluster mode discovery FIGURE 9 3 Discover Setup - IP dialog box before removal of node Figure 10 shows the Discover Setup - IP dialog box after the administrator has removed the node with the IP address of 172.26.5.130 from its logical chassis cluster. FIGURE 10 Discover Setup - IP dialog box after disabling the node from logical chassis cluster Figure 11 shows the Discover Setup - IP dialog box after The Management application has performed rediscovery.
3 HyperEdge stack discovery NOTE All cluster-specific configurations are lost during a cluster-mode change. On refresh collection, the Management application detects the mode change and retains all database entries related to the cluster. HyperEdge stack discovery HyperEdge stacks must contain at least one ICX 6610 device and one ICX 6650 device and all stacking members must be running IronWare 8.0 or later (the exact same version). HyperEdge stacks support up to 8 units in stack.
Configuring IP profile discovery FIGURE 12 3 Discover Setup - IP dialog box 2. Click the Global Settings tab. a. To set SNMP credentials, refer to “IP SNMP credentials” on page 50. b. To configure default user names and passwords, refer to “Default IP user credentials” on page 56. c. To configure global setting preferences, refer to “Defining global setting preferences” on page 64. 3. Click the Profiles tab. a. To create a discovery profile, refer to “IP discovery profiles” on page 67. b.
3 Configuring IP simple discovery Configuring IP simple discovery NOTE You must have the All IP Products AOR (area of responsibility) in your user account to discover new products. For more information about user accounts, refer to “User accounts” on page 193. To configure simple discovery, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. To add individual devices, refer to “Adding an IP device to discovery” on page 87. 3.
IP SNMP credentials 3 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Click the Global Settings tab. 3. Click the SNMP tab. FIGURE 13 SNMPv1 or SNMPv2c credentials 4. Enter a unique label to identify the community string in the Display Label field of the Add/Edit Read-Write Community Strings list. This label can be from 1 through 16 characters long, case sensitive, and allows all printable ASCII characters. 5.
3 IP SNMP credentials 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Click the Global Settings tab. 3. Click the SNMP tab. FIGURE 14 SNMPv3 credentials 4. Enter a unique label to identify the credentials in the Display Label field of the Add/Edit SNMPv3 Read-Write Credentials area. This label can be from 1 through 16 characters long, case sensitive, and allows all printable ASCII characters. 5. Enter the SNMPv3 user name in the User ID field.
IP SNMP credentials 3 10. Click the right arrow button to add the SNMPv3 read-write credentials to the Selected SNMPv3 Read-Write Credentials list. NOTE If the devices use multiple credentials, use the Up or Down buttons to place the most commonly used credentials at the top of the Selected SNMPv3 Read-Write Credentials list to make discovery run more efficiently. 11. Click Apply to save your work. 12. Click Close to close the Discover Setup - IP dialog box. 13. Click Yes on the confirmation message.
3 IP SNMP credentials NOTE If the Selected Read-Write Community Strings list does not contain write community strings, the auto registration fails for traps on IP products. 8. Click Apply to save your work. 9. Click Close to close the Discover Setup - IP dialog box. 10. Click Yes on the confirmation message. Editing SNMPv3 credentials To edit SNMPv3 read-write credentials, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2.
IP SNMP credentials 3 The password can be from 1 through 16 characters long, case sensitive, and allows all printable ASCII characters. The password display as asterisks. 11. Click the right arrow button to add the SNMPv3 read-write credentials to the Selected SNMPv3 Read-Write Credentials list.
3 Default IP user credentials • Select the SNMPv3 read-write credentials you want to delete in the Selected SNMPv3 Read-Write Credentials list and click the left arrow button. • Select the SNMPv1 or SNMPv2c read-write community string you want to delete in the Selected Read-Write Community Strings list and click the left arrow button. 5. Click Apply to save your work. 6. Click Close to close the Discover Setup - IP dialog box. 7. Click Yes on the confirmation message.
Default IP user credentials FIGURE 15 3 Default Passwords 4. Enter a login prompt user name and password by selecting Read/Write Login Prompt from the Credential Type list and completing the following steps. FIGURE 16 a. Read/Write Login Prompt Enter a unique label to identify the credentials in the Display Label field. This label can be from 1 through 200 characters long, case sensitive, and allows all printable ASCII characters. b. Enter the user name in the User ID field. c.
3 Default IP user credentials 5. Enter an enable prompt user name and password by selecting Read/Write Enable Prompt from the Credential Type list and completing the following steps. FIGURE 17 a. Read/Write Enable Prompt Enter a unique label to identify the credentials in the Display Label field. This label can be from 1 through 200 characters long, case sensitive, and allows all printable ASCII characters. b. Enter the user name in the User ID field. c.
Default IP user credentials 3 8. Click Close to close the Discover Setup - IP dialog box. 9. Click Yes on the confirmation message. Editing login prompt user credentials To edit a login prompt user name and password, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Click the Global Settings tab. 3. Click the Default Passwords tab. 4. Select Read/Write Login Prompt from the Credential Type list. 5.
3 Default IP user credentials 6. Edit the unique label to identify the credentials in the Display Label field. This label can be from 1 through 200 characters long, case sensitive, and allows all printable ASCII characters. 7. Edit the user name in the User ID field. 8. Edit the user password in the Password field. 9. Click the right arrow button. 10.
Default IP user credentials 3 Reordering user credentials in the list Discovery tries the user credentials in order until one set of credentials is found that works, so place the most common ones first. To rearrange the user credentials, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Click the Global Settings tab. 3. Click the Default Passwords tab. 4.
3 IP Object identifier filters IP Object identifier filters The object identifier (OID) filter allows you to select which product types to include or exclude from discovery. If you add a third-party product OID to the Included Product Types list during discovery and later move it to the Excluded Product Types list, note that you will not be able to discover a new device with that product OID.
IP Object identifier filters 3 5. In the top Add/Edit Product Types area, choose one of the following options: • Enter the device’s sysObjectID you want to include in the Product Type list. • Select an existing device sysObjectID from the Product Type list. Table 13 lists the default third party product types. TABLE 13 Default third-party product types Product sysObjectID Vendor .1.3.6.1.4.1.9. Cisco .1.3.6.1.4.1.4874. Juniper .1.3.6.1.4.1.2636.1. Juniper 6.
3 Defining global setting preferences Deleting product types from the list To delete an entry from the Included Product Types or Excluded Product Type list, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Click the Global Settings tab. 3. Click the OID Filter tab. 4. Select an entry from the Included Product Types or Excluded Product Type list and click the left arrow button. 5. Click Apply to save your work. 6.
Defining global setting preferences 3 5. Select one of the following Ping Type options: • ICMP Ping (default). Go to step 7. • TCP Ping. Continue with step 6. 6. Enter the TCP port number (from 1 through 65536) in the TCP Ping Port field. The default is 23. 7. Enter the number of times (from 0 through 10) to ping the device when ping is unsuccessful in the Ping Retries field. The default is 0. 8. Select the Enable lazy polling check box to periodically rediscover all devices in the database.
3 Configuring event-based collection Clear the check box to configure discovery to select the original IP address used to discover the device. 13. Select the Import SSL Certificate and Key check box to enable discovery to download and synchronize certificates from SSL capable Application products. 14. Choose one of the following options: • Select the Discard all old topology information for each product discovered option to delete all existing device topology data when running discovery.
IP discovery profiles 3 NOTE This settings cannot be disabled for DCB switches. NOTE Network OS devices must be running version 4.0 or later to enable this setting. NOTE For Network OS devices, adaptive discovery is also performed for Syslog events. The lazy polling function sends login and log messages to the Master Log and the switch console. If you are receiving too many messages due to lazy polling, clear the check box to disable off lazy polling.
3 IP discovery profiles To configure a discovery profile, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Click the Profiles tab FIGURE 21 Profile tab 3. Click Add. A new row (named “new_profile”) displays in the Discovery Profiles table. 4. Click “new_profile” in the Profile Name field to enter a unique name for the profile. This name can be from 1 through 255 characters long, case sensitive, and allows all printable ASCII characters. 5.
IP discovery profiles 3 To configure default user names and passwords, refer to “Default IP user credentials” on page 56. To configure global setting preferences, refer to “Defining global setting preferences” on page 64. 9. Click Apply to save your changes. 10. Click Close to close the Discover Setup - IP dialog box. 11. Click Yes on the confirmation message.
3 IP discovery profiles 11. Click Yes on the confirmation message. Configuring address ranges To include and exclude addresses from profile discovery, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Click the Profiles tab 3. Select the profile you want to edit in the Discovery Profiles table and click the Address Ranges tab. 4.
IP discovery profiles 3 Adding CIDR subnet addresses To add CIDR subnet addresses (IPv4 and IPv6), complete the following steps. 1. Select CIDR Subnet from the Entry Type list. FIGURE 22 Include CIDR Subnet 2. Enter the IP address in the IP Address field. 3. Enter the number of subnet mask bits in the Subnet Mask Bits field. For IPv4, the number of subnet mask bits is from 0 through 32. For IPv6, the number of subnet mask bits is from 0 through128. 4.
3 IP discovery profiles Adding IP addresses To add an IP address range (IPv4 and IPv6), complete the following steps. 1. Select IP Address from the Entry Type list. FIGURE 24 Include Address Range 2. Enter the first IP address in the range in the first IP Address field. 3. Enter the last IP address in the range in the second IP Address field. 4. To exclude an address range using the IP Address format, refer to “Excluding IP addresses” on page 73. 5.
IP discovery profiles 3 Excluding subnet addresses To exclude subnet addresses (IPv4 only), complete the following steps. 1. Select Subnet from the Entry Type list. FIGURE 26 Exclude Subnet 2. Enter the IP address in the IP Address field. 3. Enter the subnet mask in the Subnet Mask field. 4. To include an address range using the Subnet format, refer to “Adding subnet addresses” on page 71. 5. To finish configuring the address ranges, return to “Configuring address ranges” on page 70.
3 IP discovery profiles Editing address ranges 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Click the Profiles tab 3. Select the profile you want to edit in the Discovery Profiles table and click the Address Ranges tab. 4. To edit an included address range, select the address range you want to edit in the Included IP Addresses list. 5. Click the left arrow button to display the address range details in the top Add/Edit IP Addresses area. 6.
IP discovery profiles 3 For IPv6, the number of subnet mask bits is from 0 through 128. 3. To finish editing the address ranges, return to “Editing address ranges” on page 74. Editing subnet addresses To edit the subnet address (IPv4 only) range, complete the following steps. 1. Change the IP address in the IP Address field. 2. Change the subnet mask in the Subnet Mask field. 3. To finish editing the address ranges, return to “Editing address ranges” on page 74.
3 IP discovery profiles • To configure discovery to run only once, refer to “Configuring a one-time discovery schedule” on page 76. • To configure hourly discovery, refer to “Configuring an hourly discovery schedule” on page 77. • To configure daily discovery, refer to “Configuring a daily discovery schedule” on page 77. • To configure weekly discovery, refer to “Configuring a weekly discovery schedule” on page 78.
IP discovery profiles 3 Configuring an hourly discovery schedule To configure an hourly discovery schedule, complete the following steps. 1. Select Hourly from the Frequency list. FIGURE 30 Scheduling tab - Hourly 2. Select the minute past the hour you want discovery to run from the Minutes past the hour list. Where the minute value is from 00 through 59. 3. To finish configuring the discovery schedule, return to “Scheduling discovery” on page 75.
3 IP discovery profiles Configuring a weekly discovery schedule To configure a weekly discovery schedule, complete the following steps. 1. Select Weekly from the Frequency list. FIGURE 32 Scheduling tab - Weekly 2. Select the time of day you want discovery to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. 3. Select the day you want discovery to run from the Day of the Week list. 4.
IP discovery profiles 3 Configuring a yearly discovery schedule To configure a yearly discovery schedule, complete the following steps. 1. Select Yearly from the Frequency list. FIGURE 34 Scheduling tab - Yearly 2. Select the time of day you want discovery to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. 3. Click the Date list to select a date from the calendar. 4.
3 IP discovery profiles Editing a discovery schedule To edit a discovery schedule, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Click the Profiles tab 3. Select the profile you want to edit in the Discovery Profiles table and click the Scheduling tab. 4. Select the schedule you want to edit from the Scheduled Discovery Cycles list. 5. Click the left arrow button to display the schedule in the Add/Edit Schedules area. 6.
IP discovery profiles 3 Editing an hourly discovery schedule To edit an hourly discovery schedule, complete the following steps. 1. Select the minute past the hour you want discovery to run from the Minutes past the Hour list. Where the minute value is from 00 through 59. 2. Click the right arrow button to add the schedule to the Scheduled Discovery Cycles list. 3. To finish editing the discovery schedule, return to “Editing a discovery schedule” on page 80.
3 IP discovery profiles Editing a yearly discovery schedule To edit a yearly discovery schedule, complete the following steps. 1. Select the time of day you want discovery to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. 2. Click the Date list to select a date from the calendar. 3. Click the right arrow button to add the schedule to the Scheduled Discovery Cycles list. 4.
IP discovery profiles 3 5. Enter the name of the file that contains specific IP addresses to probe in the Discovery Address File field. The file supports both IPv4 and IPv6 addresses. This file must be located in the Install_Home\conf\discovery\ip folder on the server. The default file is the discovery_addrs.txt file; however, you can create additional files. To create a discovery address file, refer to “Creating a discovery address file” on page 83. 6.
3 IP discovery profiles #this file, as long as they are not # excluded by any scoping restrictions. # 10.1.2.54 10.55.2.68 3. Select File > Save. 4. Browse to the Install_Home\conf\discovery\ip folder. This file must be saved to the Install_Home\conf\discovery\ip folder on the server. 5. Enter a name for the file. 6. Click Save. Starting discovery manually To start discovery for a profile, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2.
IP discovery profiles 3 Stopping discovery To stop discovery for a profile, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Click the Profiles tab. 3. Select the discovery profile on which you want to stop discovery in the Discovery Profiles table and click Stop. 4. Click Close to close the Discover Setup - IP dialog box. 5. Click Yes on the confirmation message.
3 IP discovery profiles 4. Click Close to close the Discover Setup - IP dialog box. 5. Click Yes on the confirmation message. E-mailing discovery reports To e-mail a report for a discovery profile, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Click the Profiles tab. 3. Select the discovery profile for which you want to e-mail a report in the Discovery Profiles table and click Report. 4.
Individual IP device discovery 3 8. Click Close to close the Discover Setup - IP dialog box. 9. Click Yes on the confirmation message. Viewing the discovery log The discovery log displays the status of the current discovery activity. To configure the discovery log size, refer to “Defining global setting preferences” on page 64. To view the discovery log, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Click the Profiles tab. 3.
3 Individual IP device discovery 2. Click Add. The Add product dialog box displays. FIGURE 36 Add product dialog box 3. Choose one of the following options: • Enter the IP address (IPv4 or IPv6) of the IP device in the Network Address field. • Enter the host name or DNS name (up to 64 characters) of the IP device in the Network Address field. NOTE The Management application does not validate the Network address until you save your work. 4.
Individual IP device discovery FIGURE 37 b. 3 SNMPv3 credentials Enter the SNMPv3 user name in the User ID field. The user name can be from 1 through 16 characters long, case sensitive, and allows all printable ASCII characters. c. Select one of the following protocols from the Authentication Protocol list: • None • HMAC_MD5 • HMAC_SHA d. Enter the SNMPv3 authentication password in the Authentication Password field.
3 Individual IP device discovery d. Enter the SNMPv3 authentication password in the Authentication Password field. The password can be from 8 through 16 characters long, case sensitive, and allows all printable ASCII characters. The password display as asterisks. e. Select one of the following privacy protocol types from the Privacy Protocol list: • None • CBC-DES • CFB_AES-128 If you select a privacy protocol, the selected protocol encrypts the SNMP request and response packets. f.
Individual IP device discovery 3 9. Configure the Read/Write credentials by completing the following steps. a. Click the Read/Write Credentials tab. FIGURE 39 b. Read/Write credentials Enter the unique user name in the Login Prompt User Name field. The user name can be from 1 through 200 characters long, case sensitive, and allows all printable ASCII characters. c. Enter the password in the Login Prompt Password field.
3 Individual IP device discovery 3. Click Edit. The Edit product dialog box displays. 4. Select one of the following options: • Try only configured Discovery SNMP settings — Select to use the SNMP settings configured in the Global Settings tab to contact the device. • Also try these settings — Select to use specific SNMP settings to contact the device.
Individual IP device discovery e. 3 Select one of the following privacy protocol types from the Privacy Protocol list: • None • CBC-DES • CFB_AES-128 If you select a privacy protocol, the selected protocol encrypts the SNMP request and response packets. f. Enter the privacy password in the Privacy Password field. The password can be from 1 through 16 characters long, case sensitive, and allows all printable ASCII characters. The password display as asterisks. 6.
3 Individual IP device discovery FIGURE 41 b. SNMPv1/v2c settings Enter the unique community string in the Community field. The community string can be from 1 through 16 characters long, case sensitive, and allows all printable ASCII characters. The string displays as asterisks. NOTE If you do not enter a community string in the field, discovery uses the "public" and "private" community strings to probe the devices. 8.
Individual IP device discovery c. 3 Change the unique user name in the Login Prompt User Name field. The user name can be from 1 through 200 characters long, case sensitive, and allows all printable ASCII characters. d. Change the password in the Login Prompt Password field. The password can be from 1 through 200 characters long, case sensitive, and allows all printable ASCII characters. The password display as asterisks. e. Change the unique user name in the Enable Prompt User Name field.
3 Individual IP device discovery 11. Change the Read Only credentials by completing the following steps. NOTE These credentials are not applicable for DCB, VDX, or VCS devices. a. Click the Read Only Credentials tab. FIGURE 44 a. Read Only credentials Change the unique user name in the Login Prompt User Name field. The user name can be from 1 through 16 characters long, case sensitive, and allows all printable ASCII characters. b. Change the password in the Login Prompt Password field.
Host discovery 3 Deleting IP devices from discovery To delete one or more IP devices from discovery, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Select the IP devices you want to remove from discovery in the Discovered Products table. Select multiple devices by holding down the CTRL key and clicking more than one device. NOTE You cannot delete an active member from a VCS fabric. 3. Click Delete.
3 Host discovery 1. Import the host certificate when the Enable Certificate Validation check box is selected. Discovery will occur successfully even without importing the certificate when the Enable Certificate Validation checkbox is not selected. 2. Restarting the Server Management Console (SMC) is necessary whether the Enable Certificate Validation check box is selected or not. 3.
Host discovery FIGURE 46 3 Add Host Adapters dialog box 3. (Optional) Enter a discovery request name (such as, Manual 06/12/2009) in the Discovery Request Name field. 4. Select Network Address from the list. 5. Enter the IP address (IPv4 or IPv6 formats) or host name in the Network Address field. 6. Click Add. The IP address or host name of the Host displays in the Host List. 7.
3 Host discovery The HCM agent default is admin. Leave this field blank for the CIM server. 11. Enter your password in the Password field. The HCM agent default is password. Leave this field blank for the CIM server. 12. Repeat step 5 through step 11 for each Host you want to discover. 13. Click OK on the Add Host Adapters dialog box. If an error occurs, a message displays. Click OK to close the error message and fix the problem.
Host discovery 3 The CSV file must meet the following requirements: • Comma-separated IP addresses or host names • No commas within the values • No escaping supported For example, XX.XX.XXX.XXX, XX.XX.X.XXX, computername.company.com 6. Click Open. The CSV file is imported to the Add Host Adapters dialog box. During import, duplicate values are automatically dropped. When import is complete, the imported values display in the Host List. If the file cannot be imported, an error displays. 7.
3 Host discovery 2. Click Add. The Add Host Adapters dialog box displays. FIGURE 48 Add Host Adapters dialog box 3. Enter a discovery request name (such as MyFabric) in the Discovery Request Name field. 4. Select Hosts in Fabrics from the list. 5. Select All fabrics or an individual fabric from the host list. 6. Click Add. All hosts that are part of a managed fabric and have a registered host name display in the host list. If no host with a registered host name exists, an error message displays.
Host discovery 3 The HCM agent default is admin. Leave this field blank for the CIM server. 11. Enter your password in the Password field. The HCM agent default is password. Leave this field blank for the CIM server. 12. Click OK on the Add Host Adapters dialog box. If an error occurs, a message displays. Click OK to close the error message and fix the problem. A host group displays in the Discovered Hosts table of the Discover Host Adapters dialog box. The discovery status is updated dynamically. 13.
3 Host discovery 7. Configure Host credentials by choosing one of the following options: • To configure HCM agent credentials, select the HCM agent option. Go to step 9. • To configure CIM server credentials, select the CIM server (ESXi only) option. Continue with step 8. • To configure WMI server credentials, select the Windows Management Instrumentation (WMI) option. Continue with step 8. If you do not need to configure Host credentials, skip to step 12. 8.
Host discovery FIGURE 50 3 Edit Host Adapters dialog box 3. Configure Host credentials by choosing one of the following options: • To configure HCM agent credentials, select the HCM agent option. Go to step 5. • To configure CIM server credentials, select the CIM server (ESXi only) option. Continue with step 4. • To configure WMI server credentials, select the Windows Management Instrumentation (WMI) option. Continue with step 4. If you do not need to configure Host credentials, skip to step 8. 4.
3 Host discovery 1. Select Discover > Host Adapters. The Discover Host Adapters dialog box displays. 2. Select the host you want to delete from active discovery in the Discovered Hosts table. 3. Click Delete. 4. Click OK on the confirmation message. The deleted host displays in the Previously Discovered Addresses table. 5. Click Close on the Discover Host Adapters dialog box. Rediscovering a host to active discovery To rediscover a host to active discovery, complete the following steps. 1.
Host discovery 3 2. Select the host you want to delete permanently from discovery in the Previously Discovered Addresses table. 3. Click Delete. 4. Click OK on the confirmation message. 5. Click Close on the Discover Host Adapters dialog box. Viewing the host discovery state The Management application enables you to view device discovery status through the Discover Host Adapters dialog box. To view the discovery status of a device, complete the following steps. 1. Select Discover > Host Adapters.
3 VM Manager discovery • Discovery ignored. One or more adapters in the host are already a part of auto/manual enclosure {}. Please delete the enclosure and try again. • • • • • • Discovered Discovering.... Rediscovering... Deleting.... Internal Error No Adapters found Troubleshooting host discovery If you encounter discovery problems, complete the following checklist to ensure that discovery was set up correctly.
VM Manager discovery 3 VM Manager discovery requirements • Discovery of a vCenter server (refer to “Discovering a VM manager” on page 109, step 4 and step 5), requires a vCenter user with read-only or read-write privilege on the vCenter server node and all objects in the inventory below the vCenter server.
3 VM Manager discovery FIGURE 52 Add VM Manager dialog box 3. Enter the IP address or host name in the Network Address field. 4. Enter the VM manager port number in the Port field. 5. Enter the VM manager username in the User ID field. 6. Enter the VM manager password Password field. 7. Select the Enable display of network information in vSphere client check box to enable vSphere client plug-in registration. Clear to disable vSphere client plug-in registration. 8.
VM Manager discovery FIGURE 53 3 Edit VM Manager dialog box 3. Change the VM manager port number in the Port field. 4. Enter the VM manager username in the User ID field. 5. Enter the VM manager user password Password field. 6. Select the Enable display of network information in vSphere client check box to enable vSphere client plug-in registration. Clear to disable vSphere client plug-in registration. 7.
3 VM Manager discovery Removing a VM manager from active discovery If you decide you no longer want the Management application to discover and monitor a specific VM manager, you can delete it from active discovery. Deleting a VM manager also deletes the data on the server (both system collected and user-defined data) except for user-assigned names for the device port, device node, and device enclosure information. To delete a VM manager from active discovery, complete the following steps. 1.
VM Manager discovery 3 5. Refresh the Discover VM Managers list by clicking Refresh. 6. Click Close on the Discover VM Managers dialog box. Viewing the VM manager discovery state The Management application enables you to view device discovery status through the Discover VM Managers dialog box. To view the discovery status of a device, complete the following steps. 1. Select Discover > VM Managers. The Discover VM Managers dialog box displays. 2.
3 IP Rediscovery IP Rediscovery When you change device configuration using the CLI or Web Management Interface, the updated configuration information does not automatically update in the Management application. You must rediscover devices to update configuration information. For VCS devices, if you do not have the All IP Products AOR (area of responsibility) in your user account, you can not rediscover missing fabric members.
IP Rediscovery 3 Rediscovering IP devices from the Product List For VCS devices, if you do not have the All IP Products AOR (area of responsibility) in your user account, you can not rediscover missing fabric members. To rediscover one or more IP devices from the Product List, complete the following steps. 1. Select the IP tab. 2. Select the IP devices you want to rediscover in the Product List. Select multiple devices by holding down the CTRL key and clicking more than one device.
3 IP Rediscovery Enabling password validation on rediscovery To define global setting preferences, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Click the Global Settings tab. 3. Click the Preferences tab. 4. Select the Enable password validation on rediscover check box to enable password validation when rediscovering devices. 5. Click Apply to close the Discover Setup - IP dialog box. 6.
Chapter Management Groups 4 In this chapter • Management groups overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 • Product group overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 • Port Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4 Product group overview • To filter the Network Objects Product List, refer to “Filtering devices in the Network Objects Product List” on page 416. • To update device configuration information on the Network Object view, refer to “IP Rediscovery” on page 114. Product group overview Once devices display in the Network Object view, you can associate the devices with a group. Product groups allow you to monitor and manage multiple devices at one time.
Product group overview 4 - Static — You can define a product group by selecting the product you want to include in the group. - Dynamic — You can define a product group using the following product attributes: Name IP Address Product Type Serial # Status Vendor Model Firmware Build Label Location Contact Description VLANs User_defined_property1 (up to 3) Static product groups You can define a static product group by selecting the product you want to include in the group.
4 Product group overview 3. Enter a unique name (maximum 64 characters) for the product group in the Name field. 4. Enter a description (maximum 255 characters) for the product group in the Description field. 5. Select the Topology Display Enable check box to display the product group in the L2 Topology view. 6. Add products to the group by selecting the product in the Available Products list and clicking the right arrow button.
Product group overview 4 Duplicating a static product group To duplicate a product group, complete the following steps. 1. Select Network Objects from the view list on the Product List toolbar. 2. Right-click the product group you want to duplicate in the Product List and select Duplicate Group. The Add Product Group dialog box displays. 3. Edit the name for the product group in the Name field. 4. Edit the description for the product group in the Description field. 5.
4 Product group overview • User_defined_property1 (up to 3) — A user-defined product property value. You can create up to three user-defined properties (refer to “Properties customization” on page 1473). Creating a dynamic product group To create a dynamic product group, complete the following steps. 1. Select Network Objects from the view list on the Product List toolbar. 2. Select Add Product Group > Dynamic from the Grouping list on the Product List toolbar.
Product group overview 4 NOTE You can add a standalone VDX product or a VCS fabric to a user-defined Product Group; however, the VCS fabric members are not included with the group. • • • • • • • Firmware Build Label Location Contact Description VLANs User_defined_property1 (up to 3) 8.
4 Product group overview If you selected Product Type from the Property list, the following predefined values are populated in the Value/Regular Expression field: • • • • • L2 Switch Load Balancer Router Wireless Controller Wireless Standalone AP To fetch products that have an empty value for a property, select the operator Equals from the Operator list and leave the Value/Regular Expression field blank.
Product group overview 4 The Edit Product Group - Dynamic dialog box displays. 3. Change the name for the product group in the Name field. 4. Change the description for the product group in the Description field. 5. Select the Topology Display Enable check box to display the product group in the L2 Topology view. 6. To add a new row, complete step 6 through step 11 of “Creating a dynamic product group” on page 122. 7. To delete a row, select the row and click Delete. 8.
4 Product group overview Viewing test results To test the group criteria, click Test. The Management application uses the group criteria to search the available products in your AOR. The products that meet the criteria display in the Test Results. table. This table includes the following details: • • • • • • • • • • • • • • • • Group/Product — The name of the product or product group. Name — The name of the product. IP Address — The IP address (IPv4 or IPv6 format) of the product.
Product group overview TABLE 15 4 Product Group Properties fields and components Field/Component Description Product Count The number of products in the group. Performance list Select to launch the real time or historical performance. Name The name of the product. Alias The alias. Host Name The host name. System Name The system name. IP Address The IP address (IPv4 or IPv6 format) of the product. System OID The system's object identifier. Device Type The type of device.
4 Port Groups Ctrl and click to select more than one group to delete. A confirmation message displays. 3. Click Yes. The group is deleted from the User-Defined Groups folder of the Product list. Port Groups Port groups allow you to group ports together across network devices to perform common port-based configuration and monitoring activities. Once configured you can use port groups to perform the following: • Deploy common configurations to all ports in a group.
Port Groups 7. 4 Remove ports from the group by selecting the port in the Selected Ports list and clicking the left arrow button. The selected ports move from the Selected Ports list to the Available Ports list. 8. Click OK. The new group displays in the Port Groups folder of the Product list. Editing a port group To edit a port group, complete the following steps. 1. Select Network Objects from the view list on the Product List toolbar. 2.
4 Port Groups 3. Edit the name for the port group in the Name field. 4. Edit the description for the port group in the Description field. 5. Select one of the following options: • All Ports — Select to display all ports. • Ports Connected to APs — Select to display only ports connected to an access point (AP). 6. Add ports to the group by selecting the port in the Available Ports list and clicking the right arrow button.
Port Groups TABLE 16 4 Port Group Properties fields and components Field/Component Port Actions list Description Select one of the following options: Enable Disable Display Attached Port Properties • • • Performance list Select to launch the real time or historical performance. Identifier The identifier of the port. Name The name of the port. MAC Address The MAC Address of the port. Port Status The status of the port. Port State The state of the port. Type The port type.
4 Port Groups Deleting a port group You can delete more than one group at a time. To delete a port group, complete the following steps. 1. Select Network Objects from the view list on the Product List toolbar. 2. Right-click the port group you want to delete in the Product List and select Delete Group. Ctrl and click to select more than one group to delete. A confirmation message displays. 3. Click Yes. The group is deleted from the Ports Groups folder of the Product list.
Chapter 5 Application Configuration In this chapter • Server Data backup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Server Data restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • SAN data collection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Event storage settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Flyover settings .
5 Server Data backup • Server Backup — Use to configure backup settings. Backup is a service process that periodically copies and stores application files to an output directory. The output directory is relative to the server and must use a network share format to support backup to the network. If you use a network path as the output directory, you must add network credentials. For more information, refer to “Server Data backup” on page 134 and “Server Data restore” on page 140.
Server Data backup 5 What is backed up? The data is backed up to the following directories: • Backup\databases — contains database and log files. • Backup\data — contains IP product firmware and configurations. • Backup\conf – contains the Management application configuration files.
5 Server Data backup FIGURE 56 Options dialog box (Server Backup pane) 3. Select the Enable Backup check box, if necessary. 4. Enter the time (using a 24-hour clock) you want the backup process to begin in the Next Backup Start Time Hours and Minutes fields. 5. Select an interval from the Backup Interval drop-down list to set how often backup occurs. 6. Backup data to a hard drive by browsing to the hard drive and directory to which you want to backup your data. NOTE This requires a hard drive.
Server Data backup a. 5 Browse to the network share and directory to which you want to backup your data. NOTE You must specify the directory in a network share format (for example, \\network-name\share-name\directory). Do not use the drive letter format (C:\directory). b. (Windows only) Enter the name of the Windows domain or workgroup in which you are defined in the Domain Workgroup field. NOTE You must be authorized to write to the network device. c.
5 Server Data backup 3. Select the Enable Backup check box. 4. Click Apply or OK. Disabling backup Backup is enabled by default. If you want to stop the backup process, you need to disable backup. To disable the backup function, complete the following steps. 1. Select Server > Options. The Options dialog box displays. 2. Select Server Backup in the Category list. 3. Clear the Enable Backup check box. 4. Click Apply or OK.
Server Data backup 5 3. Select an interval from the Backup Interval drop-down list to set how often backup occurs. 4. Click Apply or OK. The minimum value is 6 hours and the maximum value is 24 hours. Starting immediate backup NOTE You must have backup privileges to use the Backup Now function. For more information about privileges, refer to “User Privileges” on page 1423.
5 Server Data restore • Network share access problem when backup starts or during backup (not when the backup configuration is changed) Server Data restore NOTE You cannot restore data from a previous version of the Management application. NOTE You cannot restore data from a higher or lower configuration (Trial or Licensed version) of the Management application. NOTE You cannot restore data from a different package of the Management application.
SAN data collection 5 Browse to the location specified in the Output Directory field on the Options dialog box Backup pane. 6. Click Restore. Upon completion, a message displays the status of the restore operation. Click OK to close the message and the Server Management Console. For the restored data to take effect, re-launch the Configuration Wizard using the instructions in “Launching the Configuration Wizard” on page 6.
5 SAN data collection The Management application uses the short tick interval to ping the switch for a periodic reachability check. If the reachability check succeeds, then the Management application runs pending collectors triggered by an event. When no SNMP traps or syslog events occur, the Management application uses the lazy polling interval to schedule collection of configuration and status changes. The lazy polling interval process schedules any pending collectors for the next short tick.
Product communication protocols 5 • SwitchAssetCollector – Collects data about the switch including, inventory details, port level data, any blades that may be present (on directors), AG-port mapping, and auto trace dump settings. This is the major collector for switch data. • • • • • FCIPCollector – Collects FCIP-related data on the older FCIP switches. XFCIPCollector – Collects extended FCIP-related data on the newer FCIP switches.
5 Product communication protocols TABLE 18 Product communication protocols Protocol Description Management application use Communicates with device type NETCONF The Network Configuration Protocol (NETCONF), is an IETF network management protocol. NETCONF provides mechanisms to install, manipulate, and delete the configuration of network devices. Its operations are realized on top of a simple Remote Procedure Call (RPC) layer.
Event storage settings TABLE 18 5 Product communication protocols Protocol Description Management application use Communicates with device type SCP Secure copy (SCP) is a means of securely transferring computer files between a local host and a remote host or between two remote hosts. It is based on the Secure Shell (SSH) protocol. Used for firmware download. For Fabric OS and Network OS devices, used to collect technical support information.
5 Flyover settings 3. Enter the maximum number of events you want to be retained in the repository in the Maximum Events field. Depending on your installation, the maximum number of events stored are as follows: • Professional — 1 through 100,000 • Enterprise — 1 through 10,000,000 Default is 50,000. Older events are purged at midnight on the date the maximum event limit is reached regardless of the retention days. 4.
Flyover settings 5 2. Select Flyovers in the Category list. 3. Select the Enable flyover display check box to enable flyover display on your system. 4. Select the Include labels check box to include labels on flyover displays. 5. Add product properties you want to display on flyover by selecting the Product tab (Figure 58) and completing the following steps. FIGURE 58 Options dialog box (Flyovers pane, Product tab) a. Select the protocol type from the Type list, if necessary. b.
5 Flyover settings FIGURE 59 a. Options dialog box (Flyovers pane, Connection tab) Select the protocol type from the Type list, if necessary. Depending on which protocol you select, some properties may not be available for all protocols. b. Select each property you want to display in the connection flyover from the Available Properties table. Depending on which protocol you select, some of the following properties may not be available for all protocols: IP • IP_Address:Port-IP_Address:Port c.
Name settings 5 Name settings You can use Names as a method of providing familiar simple names to products and ports in your SAN. Using your Management application you can: • Set names to be unique or non-unique. • Fix duplicate names. • Associate a name with a product, port WWN, or Fabric Assigned WWN currently being discovered. • Add a WWN and an associated name for a product or port that is not yet being discovered. • Remove or disassociate a name from a WWN.
5 Name settings • Duplicate Names table — Every instance of duplicate names. Fabric — The fabric name. FC Address — The Fibre Channel address. Names — The current name of the device. If you selected the Append Incremental numbers for all repetitive names option, the names display with the incremental numbering. If you selected the I will fix them myself option, this field becomes editable. Operational Status — The operational status of the device.
Name settings FIGURE 61 5 Configure Names dialog box 2. Select All Names from the Display list. Only devices with a name display. The table displays the following information. • Scope list — Select a search value (Name or WWN) from the list. • Search text box — Enter the name or WWN of the device for which you are searching. • Search button — Click to search on the value in the Search field. For more information, refer to “Searching for a device by name” on page 155.
5 Name settings • Fix Duplicates button — Click to launch the Fix Duplicates dialog box. For more information, refer to “Fixing duplicate names” on page 149. • Apply Names button — Click to apply unassigned (detached) names to newly discovered devices. For more information, refer to “Applying a name to a detached WWN” on page 153. • Detached WWN text box — Enter the WWN of the device you want to add. • Name text box — Enter a name for the device you want to add.
Name settings 5 Adding a name to a new device To add a new device and name it, complete the following steps. 1. Select Configure > Names. The Configure Names dialog box displays. 2. Enter the WWN of the device in the Detached WWN field. 3. Enter a name for the device in the Name field. 4. Click Add. The new device displays in the table. If you set names to be unique on the Options dialog box and the name you entered already exists, a message indicating the name already in use displays.
5 Name settings 6. Click OK on the confirmation message. Editing names To edit the name associated with a device, complete the following steps. 1. Select Configure > Names. The Configure Names dialog box displays. 2. Select All Names from the Display list. Only devices with a name display. The table displays the Name, WWN, Operational Status, Type, and a Description of the device. 3. Click the name you want to edit in the Name column. 4. Edit the name and press Enter. 5.
Name settings TABLE 19 5 Name length limitations Device Character limit Fabric OS switch port 6.4.X or earlier 32 (24 character limit when in FICON mode) HBA 256 HBA port 256 Others names 128 To import names, complete the following steps. 1. Select Configure > Names. The Configure Names dialog box displays. 2. Click Import. The Import Files dialog displays. 3. Browse to the import (.csv) file location. 4. Select the file and click Import. 5. Click OK to close the Configure Names dialog box. 6.
5 Miscellaneous security settings Searching for a device by WWN You can search for objects (switch, fabric, product, ports, or N Ports) by WWN (world wide name). To search for a WWN in the Connectivity Map, refer to “Searching for a device” on page 408. To search by WWN, complete the following steps. 1. Select Configure > Names. The Configure Names dialog box displays. 2. Select All Names from the Display list. 3. Select WWN from the Scope list. 4. Enter the WWN you want to search for in the Search field.
Miscellaneous security settings FIGURE 62 5 Options dialog box (Security Misc pane) 3. Enter the server name in the Server Name field. The Server Name field cannot be empty. 4. Click OK on the confirmation message. 5. Click Apply or OK to save your work. Configuring login security To configure login security, complete the following steps. 1. Select Server > Options. The Options dialog box displays. 2. Select Security Misc in the Category list. 3.
5 Syslog Registration settings 1. Select Server > Options. The Options dialog box displays. 2. Select Security Misc in the Category list. 3. Select the Display login banner upon client login check box. 4. Enter the message you want to display every time a user logs into this server in the Banner Message field. This field contains a maximum of 2048 characters. 5. Click Apply or OK to save your work. Disabling the login banner To disable the login banner display, complete the following steps. 1.
SNMP Trap Registration settings 5 This check box is selected by default. 4. Click Apply or OK to save your work. Configuring the Syslog listing port number 1. Select Server > Options. The Options dialog box displays. 2. Select Syslog Registration in the Category pane. The Syslog Registration pane displays (Figure 63). 3. Enter the Syslog listening port number of the Server in the Syslog Listening Port (Server) field, if necessary.
5 SNMP Trap forwarding credential settings Configuring the SNMP trap listing port number 1. Select Server > Options. The Options dialog box displays. 2. Select Trap Registration in the Category pane. 3. Enter the SNMP listening port number of the Server in the SNMP Listening Port (Server) field, if necessary. The default SNMP listening port number is 162 and is automatically populated. 4. Click Apply or OK to save your work.
Software Configuration 5 Configuring SNMP v3 credentials To configure a SNMP v1 or v2c credentials, complete the following steps. 1. Select Server > Options. The Options dialog box displays. 2. Select Trap Forwarding Credentials in the Category pane. The Trap Forwarding Credentials pane displays (Figure 65). 3. Enter the SNMP v3 name (case sensitive, 1 to 16 characters) to identify the credentials in the User Name field. Allows all printable ASCII characters. 4.
5 Software Configuration Client/Server IP You can configure connections between the client or switches and the Management application server. Configuring the server IP address If your Operating System is IPv4-enabled or IPv6-enabled (running in dual mode), the server binds using an IPv4 address. IPv6 only mode does not support server to client communication (the IPv6 address cannot be bound to the server).
Software Configuration FIGURE 66 5 Options dialog box (Client/Server IP option) 3. Choose one of the following options in the Server IP Configuration list. • Select All. Go to step 4. • Select a specific IP address. Continue with step 5. • Select localhost. Continue with step 5. When Server IP Configuration is set to All, you can select any available IP address as the Return Address. If you select a specific IP address, the Return Address list shows the same IP address and you cannot change it. 4.
5 Software Configuration 1. Choose one of the following options: • On Windows systems, select Start > Programs > Management_Application 12.X.X > Management_Application Configuration. • On UNIX systems, execute sh Install_Home/bin/configwizard on the terminal. 2. Click Next on the Welcome screen. 3. Click Yes on the confirmation message. 4. Click Next on the FTP Server screen. 5. Complete the following steps on the Server IP Configuration screen (Figure 67).
Software Configuration 5 • If you configured authentication to the local database, an external server (RADIUS, LDAP, or TACACS+), or a switch, enter your user name and password. The defaults are Administrator and password, respectively. NOTE Do not enter Domain\User_Name in the User ID field for LDAP server authentication. 12. Click Login. 13. Click OK on the Login Banner. Configuring the application to use dual network cards Issues with Client-to-Server connectivity can be due to different reasons.
5 Software Configuration NOTE Changes take effect after you restart the Management Server. NOTE You can only restart the server using the Server Management Console (Start > Programs > Management_Application_Name 12.X.X > Server Management Console). 6. Click OK on the “changes take effect after “application restart” message. IP preferences You can configure the following preferences for IP products. • Configuring change manager preferences . . . . . . . . . . . . . . . . . . . . . . . . .
Software Configuration FIGURE 68 5 Options dialog box (IP Preferences pane) 3. Select the ConfigReadFlash check box to obtain configuration backup from flash. Clear the check box to obtain configuration backup from DRAM. The default is clear (disabled). 4. Enter the number of configurations to retain per product in the ConfigsRetainedPerProduct field. The maximum is 30 and the minimum is 5. The default is 20.
5 Software Configuration 11. Enter the number of days to keep product configuration backup files on the server in the KeepDataForDays field. The minimum duration is 7 days. The maximum duration is 365. The default is 30. Reducing this parameter may result in expiring a large number of records on server restart and lead to reduced performance. If millions of records are impacted, this may last several hours. 12. Click Apply or OK to save your work. Configuring custom report preferences 1.
Software Configuration 5 Configuring IP device manager preferences This configuration is only applicable to the Ethernet router series switch running firmware version 5.4 or later. 1. Select Server > Options. The Options dialog box displays. 2. Select IP Preferences from the Software Configurations list in the Category pane. 3. Enter the number of Element Managers that can be launched from the Management application in the LaunchLimitforElementManagerGUI field. The minimum is 1. The maximum is 6.
5 Software Configuration 4. Select the PollingState check box to enable MPLS polling. 5. Click Apply or OK to save your work. Configuring name service preferences 1. Select Server > Options. The Options dialog box displays. 2. Select IP Preferences from the Software Configurations list in the Category pane. 3. Enter the maximum cache size for the DNS Lookup Manager in the DnsCacheSize field. 4.
Software Configuration 5 3. Select the EnableReverseDNSLookup check box to enable reverse DNS lookup on the Layer 3/Layer 4 IP address so that the host name is displayed together with the IP address. 4. Enter the number of days to retain the sFlow hourly data in the KeepDataForDays field. The minimum duration is 7 days. The maximum duration is 65 days. Reducing this parameter may result in expiring a large number of records on server restart and lead to reduced performance.
5 Software Configuration 3. Enter the number of days to display a warning for an expiring certificate in the DaysUntilExpiryWarning field. When the certificate reaches this value, the certificate displays orange. The minimum is 0. The default is 31. 4. Enter the number of days to display the next warning for an expiring certificate in the DaysUntilNextExpiryWarning field. 5. Click Apply or OK to save your work. Configuring SNMP preferences 1. Select Server > Options. The Options dialog box displays. 2.
Software Configuration 5 Memory allocation settings You can configure memory allocation for the client and server to improve performance. You can trigger switch polling when a state changes or you can poll at intervals when no state change occurs. NOTE SAN size is a consideration in the selection of polling periods. Configuring memory allocation settings To configure memory allocation settings, complete the following steps. 1. Select Server > Options. The Options dialog box displays. 2.
5 Software Configuration 5. Enter the memory allocation (MB) for the server in the Server Memory Allocation field. If you enter an invalid value, an error message displays with the minimum value allowed. Click OK and edit the value again. The current configured number of megabytes for server memory allocation displays in the Current Value field. The default minimum number of megabytes for server memory allocation displays in the Default Minimum field.
Software Configuration 5 Configuring asset polling NOTE Asset polling is only applicable for Fabric OS DCB products discovered from the IP tab. Asset polling allows you set the length of time between state change polling. To maximize the efficiency of the polling feature (balancing the amount of possible information with any possible performance impact), base your settings on the size of the SAN. To configure asset polling, complete the following steps. 1. Select Server > Options.
5 Software Configuration Viewing the network size status The Management application enables you to view the network size status at a glance by providing a status icon on the status bar. Double-click the icon to launch the Memory Allocation pane of the Options dialog box. NOTE If you exceed the recommended count, the network size status icon refreshes when the license is refreshed (every three hours) or after a client restart.
Software Configuration FIGURE 69 5 Options dialog box (Product Communication pane) 3. To connect using HTTP, complete the following steps. a. Select the Connect using HTTP option. b. Enter the connection port number in the Port # field. Continue with step 6. The default HTTP port number is 80. NOTE To manage FIPS-enabled Fabric OS fabrics, you must configure Product Communication using the Connect using HTTPS (HTTP over SSL) only or HTTPS then HTTP option. 4.
5 Software Configuration Configuring the preferred IP format To configure the preferred IP format for the Management application server to connect with Fabric OS and Network OS devices, complete the following steps. 1. Select Server > Options. The Options dialog box displays. 2. Select Product Communication from the Software Configurations list in the Category pane. The Product Communication pane displays (Figure 69). 3.
Software Configuration a. Select the SSH then Telnet option. b. Enter the connection port number in the SSH Port field. Continue with step 6. 5 6. Select one of the following options to determine configuration file transfer communication: • • • • 7. SCP only TFTP only SCP then TFTP TFTP then SCP Select one of the following options to configure the web element manager communication: • HTTP • HTTPS (HTTP over SSL) • HTTPS then HTTP 8. Click Apply or OK to save your work.
5 Software Configuration The built-in SCP/SFTP servers use the port 22 by default. To view the port status for the FTP and SCP/SFTP servers, refer to “Viewing port status” on page 12. Accessing the FTP server folder Choose from one of the following options to access the FTP server folder: • To access the internal FTP folder, select Monitor > Techsupport > View Repository.
Software Configuration 5 Configuring an internal SCP or SFTP server NOTE SCP is supported on Fabric OS devices running 5.3 and later. NOTE SFTP is supported on Fabric OS devices running 7.0 and later. To configure the internal SCP or SFTP server settings, complete the following steps. 1. Select Server > Options. The Options dialog box displays. 2. Select FTP/SCP/SFTP in the Category list. The FTP/SCP/SFTP pane displays (Figure 71). FIGURE 72 Options dialog box (FTP/SCP/SFTP pane) 3.
5 Software Configuration Configuring an external FTP, SCP, or SFTP server NOTE For FIPS-enabled Fabric OS switches, you must configure the FTP/SCP/SFTP server communication to an external SCP or SFTP server to download firmware and allow technical support. NOTE SCP is supported on Fabric OS devices running 5.3 and later. NOTE SFTP is supported on Fabric OS devices running 7.0 and later. To configure external FTP, SCP, or SFTP server settings, complete the following steps. 1. Select Server > Options.
Software Configuration a. 5 Select the SCP Server check box to configure the external SCP server. All fields are mandatory. b. Enter the IP address for the remote host in the SCP Host IP field. c. Enter a user name in the SCP Host User Name field. d. Enter the path to the remote host in the SCP Directory Path field. Use a slash (/) or period (.) to denote the root directory. e. Enter the password in the Password Required for SCP field. f. Select SCP from the Preferred Protocol (Secured) list.
5 Software Configuration For step-by-step instructions about configuring the built-in server, refer to “Configuring an external FTP, SCP, or SFTP server” on page 182. 4. Click Test. An “FTP, SCP, or SFTP Server running successfully” or an error message displays. If you receive an error message, make sure your credentials are correct, the server is running, the remote directory path exists, and you have the correct access permission; then try again. 5. Click OK on the message. 6.
Software Configuration 5 For Professional, the server requires 15 consecutive free ports beginning with the starting port number. For Trial and Licensed versions, the server requires 18 consecutive free ports beginning with the starting port number. 6. Click Apply or OK to save your work. NOTE Changes to this option take effect after application restart. 7. Click OK on the “changes take effect after application restart” message.
5 Software Configuration NOTE Changes to the server log levels reset to the default (INFO) after a server restart. NOTE Changes to the Log client support data log level is persisted on all clients launched from the same machine for the same server. client. log file properties • Client logs are collected separately for each server. After successful login, a log file is created and prefixed with the network address provided in the Login dialog box. For example, 172.26.1.1.client.log or localhost.client.
FIPS Support 5 FIPS Support To manage FIPS-enabled Fabric OS fabrics and switches, make sure you complete the following configuration requirements: • Configure Product Communication to HTTPS (refer to “Configuring SAN communication” on page 176) to allow communication between the server and the Fabric OS switches. • Configure an external SCP server (refer to “Configuring an external FTP, SCP, or SFTP server” on page 182) to allow firmware download, product technical support, and supportSave.
5 188 FIPS Support Brocade Network Advisor IP User Manual 53-1003153-01
Chapter 6 User Account Management In this chapter • Users overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • User accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Roles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Areas of responsibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6 Users overview FIGURE 76 Users dialog box - Users tab The Users dialog box contains the following fields and components: • Authentication-Primary — The primary authentication server type configured through the Server Management Console. • Secondary — The secondary authentication server type configured through Server Management Console. • Authorization — The authorization source configured through the Server Management Console.
Users overview 6 • Users table — The configured users. User ID — The unique name used to identity a user. Full Name — The user’s full name. Roles — List of roles the user belongs to separated by commas. Area Of Responsibility — List of Area Of Responsibility (AORs) the user belongs to separated by commas. E-mail Notification — Whether e-mail notification is enabled for the user. Account Enabled — Whether the user account status is enabled.
6 Users overview Default system roles for IP only environments include: - IP System Administrator Network Administrator Report User Group Default system roles for SAN plus IP environments include: - SAN System Administrator IP System Administrator Network Administrator Security Administrator Zone Administrator Operator Security Officer Host Administrator Report User Group Description — A description of the role. Add button — Click to add a new role (refer to “Creating a new role” on page 199).
User accounts 6 User accounts NOTE You must have User Management Read and Write privileges to add new accounts, set passwords for accounts, and apply roles to the accounts. For a list of privileges, refer to “User Privileges” on page 1423. Management application user accounts contain the identification of the Management application user, as well as privileges, roles, and AORs assigned to the user. Privileges provide access to the features in Management application.
6 User accounts 4. Enter a password for the user in the Password and Confirm Password fields. Passwords displays as dots (.). For password policy details, refer to “Viewing your password policy” on page 212. 5. Select the Account Status - Enable check box to enable the account of the user. Account Status is enabled by default. 6. (Optional) Enter the full name of the user in the Full Name field. 7. (Optional) Enter a description for the user in the Description field. 8.
User accounts 6 Editing a user account To make changes to an existing user account, complete the following steps. 1. Select Server > Users. The Users dialog box displays. 2. Select the user account you want to edit and click Edit under the Users table. The Edit User dialog box displays. 3. Complete step 3 through step 13 in “Creating a new user account” on page 193. 4. Click OK to save the user account and close the Edit User dialog box.
6 User accounts Copying and pasting user preferences You can copy user preference settings, such as window and dialog box sizes, table column and sort order, as well as other customizations, and all the user-defined views (including fabrics and hosts) from the selected user account to one or more other user accounts. If the fabric and hosts from the original user account are not included in the other user's AOR, then the copied fabrics and hosts do not display in the other user's views.
User accounts 6 5. Click Save.The file is saved to the location you selected. If the export is successful, the following message displays: User profile data exported successfully to -UserProfile-
6 User accounts Removing roles and areas of responsibility from a user account To remove roles and AORs from an existing user account, complete the following steps. 1. Select Server > Users. The Users dialog box displays. 2. Select the user account you want to edit and click Edit under the Users table. The Edit User dialog box displays. 3.
Roles 6 4. Click Close to close the Users dialog box. Deleting a user account NOTE You cannot delete the default "Administrator" user account. To permanently delete a user account from the server, complete the following steps. 1. Select Server > Users. The Users dialog box displays. 2. Select the user you want to delete in the Users table and click Delete. 3. Click Yes on the confirmation message. If currently accessing the server, the user will be logged out once the user account is deleted. 4.
6 Roles 1. Select Server > Users. The Users dialog box displays. 2. Click Add under the Roles table. The Add Role dialog box displays. FIGURE 78 Add Role dialog box 3. Enter a name of the role in the Name field. 4. (Optional) Enter a short description for the role in the Description field. 5. Add or remove privileges as needed. For step-by-step instructions, refer to “Adding privileges to a role” on page 201 or “Removing privileges from a role” on page 202. 6.
Roles 6 4. Click OK to save the role and close the Edit Role dialog box. If you make changes to the user’s role or AOR while the user is logged in, a confirmation message displays. When you click OK on the confirmation message, the user is logged out and must log back in to see the changes. 5. Click Close to close the Users dialog box. Copying a role You can create a new role by copying an existing one. When you copy a role, you copy the selected privileges in that role.
6 Roles 2. Click Add, Edit, or Duplicate under the Roles table. The Add Roles, Edit Roles, or Duplicate Roles dialog box displays. 3. Add read and write access by selecting the features to which you want to allow read and write access in the Available Privileges list and click the right arrow button to move the features to the Read & Write Privileges list. Select multiple features by holding down the CTRL key and clicking more than one privilege. The features are moved to the Read & Write Privileges list.
Areas of responsibility 6 Areas of responsibility NOTE You must have User Management Read and Write privileges to view, add, modify, or delete operational areas of responsibility. An area of responsibility (AOR) allows you to place Fabrics, Hosts, Products, Product Groups, Port Groups, and Application products into management groups that can be assigned to an Management application user.
6 Areas of responsibility FIGURE 79 Users dialog box - Users tab 3. Enter a name of the AOR in the Name field. 4. (Optional) Enter a short description for the AOR in the Description field. 5. Assign or remove products as needed. For step-by-step instructions, refer to “Assigning products to an AOR” on page 205 or “Removing products from an AOR” on page 207. 6. Click OK to save the new AOR and close the Add AOR dialog box. The new AOR displays in the AOR list of the Users dialog box. 7.
Areas of responsibility 6 If you make changes to the user’s role or AOR while the user is logged in, a confirmation message displays. When you click Yes on the confirmation message, the user is logged out and must log back in to see the changes. 5. Click Close to close the Users dialog box. Copying an AOR NOTE You cannot duplicate system AORs. To create a new AOR by copying an existing one, complete the following steps. 1. Select Server > Users. The Users dialog box displays. 2.
6 Areas of responsibility The Add AOR, Edit AOR, or Duplicate AOR dialog box displays. 3. Click the Hosts tab. 4. Select the hosts you want to assign to the AOR in the Available Hosts table and click the right arrow button to move the products to the Selected Products table. Select multiple hosts by holding down the CTRL key and clicking more than one host. 5. Click the IP Products tab. 6.
Password policies 6 Removing products from an AOR You can remove hostsIP products from and AOR from the Edit AOR or Duplicate AOR dialog box. To remove hostsIP products from the AOR, complete the following steps. 1. Select Server > Users. The Users dialog box displays. 2. Click Edit or Duplicate under the AOR table. The Edit AOR or Duplicate AOR dialog box displays. 3. In the Selected Products table, select the products or groups you want to remove and click the left arrow button.
6 Password policies Valid values are 1 through 24. The default is 1. When you update the History Count value, the current password history is not cleared. 5. Configure the password format by completing the following steps. a. Select the Empty Password - Allow check box to allow user accounts to be created or edited with empty passwords or to allow passwords with any format. Empty Password is enabled by default. b. Enter the minimum password length in the Minimum Length field.
Password policies 6 Only enabled when the Lockout Threshold is greater than zero. If you specify zero, the user account is locked out indefinitely until an administrator manually unlocks it. Valid values are 0 through 99999. The default is 30. 7. Configure the password login policy by completing the following steps. a. Select Concurrent Login or Single Login from the Login Mode list. Single Login allows only one user to login at a time. If you selected Single Login, continue with step b.
6 User profiles 6. Click Close on the Users dialog box. User profiles User profiles contain the standard identification information of the user account, such as name, password, phone number, and e-mail address.
User profiles 6 • Account State — Displays the current state of the account. Valid states include: Active Locked out by user manager Locked out threshold reached Password expired Password format policy violated Password history policy violated E-mail Notification Enable check box — Select to enable e-mail notification. • • Filter — Click to configure e-mail notification (refer to “Configuring e-mail notification” on page 213).
6 User profiles NOTE Check with your carrier for the exact e-mail address. 9. To configure the application to use the CLI login credentials of the user for all CLI deployments, Configure. To configure the User CLI Credentials, refer to “Configuring CLI credentials” on page 214. These credentials will be used for all CLI deployments and will override the CLI credentials configured during discovery or in the CLI template. 10. Click OK on the User Profile dialog box to save your changes.
User profiles 6 • Lower Case Characters — The minimum number of lowercase characters required in the password. • Number of Digits — The minimum number of digits required in the password. • Punctuation Required — The minimum number of punctuation characters required in the password. • Maximum Repeat — The maximum number that the same character can repeat without a different intervening character in the password.
6 User profiles 5. Click OK on the User Profile dialog box. Configuring CLI credentials NOTE This feature requires a Trial or Licensed version. To configure CLI credentials, complete the following steps. 1. Select Server > User Profile. The User Profile dialog box displays. 2. Click Configure to set up basic event filter. The CLI Credential dialog box displays. 3. Enter the user name for the product in the Product Login Account - Username field. 4.
User profiles 6 2. Click the Policy tab. 3. Select the Use User CLI Credential check box in the CLI Credential area. A confirmation message displays. Click Yes on the message. Make sure to configure the User CLI Credentials in the User Profile dialog box (refer to “Configuring CLI credentials” on page 214). These credentials will be used for all CLI deployments and will override the CLI credentials configured during discovery or in the CLI template. 4. Click OK on the Users dialog box.
6 216 User profiles Brocade Network Advisor IP User Manual 53-1003153-01
Chapterpage 7 Web Client In this chapter • Web client overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Inventory. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Reports.
7 Dashboard • “Inventory expand navigation bar” on page 263 • “Reports expand navigation bar” on page 282 3. Right pane — Displays the detail for the feature selected in the left pane. For more information, refer to: • • • • “Dashboard” on page 218 “Inventory” on page 262 “Events” on page 280 “Reports” on page 281 License License keys are encoded form of supported configuration or features.
Dashboard 7 The dashboard refreshes every ten seconds regardless of the size of your network. Note that data may become momentarily out of sync between the dashboard and other areas of the application. For example, if you remove a product from the network while another user navigates from the dashboard to a more detailed view of the product, the product may not appear in the detailed view.
7 Dashboard Dashboard toolbar The dashboard toolbar (Figure 82) is located above the status widgets or performance monitors and provides a information about the selected dashboard as well as buttons to perform various functions. FIGURE 82 Dashboard toolbar The dashboard toolbar contains the following fields and components: 1. Collapse/Expand buttons — Click the Expand button to hide the expand navigation bar. Click the Collapse button to display the expand navigation bar. 2.
7 Dashboard customization Accessing a dashboard NOTE If you change the dashboard in the Java client, change is reflected in the web client and vice versa. To access a specific dashboard, complete the following steps. 1. Click the Dashboard icon. The Dashboard expand navigation bar displays. 2. Select the dashboard you want to view from the Dashboards list. Options include: • Default Dashboards — Displays the three preconfigured dashboards.
7 Dashboard customization 1. Click the Scope arrow. FIGURE 83 Scope dialog box 2. Select a network from the Network Scope list. The default network scope is All. The available network scopes include the following options: • • • • • All products and fabrics Any Ethernet fabric Any system-defined group Any user-defined group Any user-defined customized network If you select a fabric scope, dashboard widgets displays data for all products and ports in the fabric.
7 Dashboard customization Setting the time interval Setting the global time interval in the dashboard toolbar configures the data display time range for all the applicable widgets. Time interval in the Scope list allows you to select a specific time range for which you want to display data in the dashboard. NOTE Time Interval does not affect the Status and Inventory widgets. 1. Click the Scope arrow. 2. Select a duration from the Time Scope list. The default time scope is 30 minutes.
7 Dashboard customization • • • • • • • 224 Top Port Discards monitor Top Port Receive EOF monitor Top Port Underflow Errors monitor “Table functions” on page 281Top Port Overflow Errors monitor Top Port Runtime Errors monitor Top Port Too Long Errors monitor Top Port Alignment Errors monitor Brocade Network Advisor IP User Manual 53-1003153-01
7 Dashboard customization Product Status and Traffic The Product Status and Traffic dashboard provides the following preconfigured status widgets and performance monitors: • Status widget • When you launch the Port page, the detailed view closes.When you launch the Port page, the detailed view closes.
7 Dashboard customization • Port Health Violations widget — Table view of out of range port health violations. There are four versions of this monitor based on the type of port: All ports, initiator ports, ISL ports, and Target ports. • Status widget — List view of various status attributes. Access Point Status widget The Access Point Status widget displays the access point (AP) status as a pie chart. The Access Point Status widget includes the following data: • Widget title — The name of the widget.
Dashboard customization 7 • Widget summary — The product count for each status (worst to best order) with the associated icon displays underneath the widget title. • Show Syslog check box — Select to include Syslog information (default) on the Event Summary. • Bar chart — The event severity using the color-codes in Table 21.
7 Dashboard customization • Widget title — The name of the widget. • Widget summary — The product count for each status (worst to best order) displays underneath the widget title. • Category list — Use to customize this widget to display a specific grouping. Options include: Model (default), Location, Driver, BIOS, and OS Type. • Bar chart — Displays each group as a separate bar on the graph. Displays the current state of all Host products discovered for a group in various colors on each bar.
7 Dashboard customization 2. Click the close (X) button. IP Inventory widget The IP Inventory widget (Figure 85) displays the IP products inventory as stacked bar graphs. For a VCS fabric, each VCS fabric is counted as an individual product. FIGURE 85 IP Inventory widget The IP Inventory widget includes the following data: • Widget title — The name of the widget. • Show Legend icon — Click to display the color legend for the widget below the x-axis.
7 Dashboard customization • • • • • Firmware — Displays the product inventory by firmware release. Model — Displays the product inventory by model. Product Type — Displays the product inventory by product type. Location — Displays the product inventory by physical location. Contact — Displays the product inventory by contact name. IP Status widget The IP Status widget (Figure 86) displays the device status as a pie chart.
7 Dashboard customization Color legend — Displays the color legend below the pie chart. Click the Show Legend icon to display. - Green — Reachable: IP product is online and accessible by IP (ICMP/TCP) and SNMP. - Violet — Unhealthy: One or more units are not present, unit power is off, or the stacking connection is down. - Blue — Not Reachable: IP product is not online and not accessible by IP (ICMP/TCP).
7 Dashboard customization The Status widget displays the following items for each product license: • • • • • • Time Scope — The time scope. Hosts — The number of managed hosts. Ethernet Fabrics — The number of managed Ethernet fabrics. IP Products — The number of managed IP products. sFlow — The current sFlow state. IP Discovery Status — The current IP discovery status. Fabric Watch widgets The widget includes the Fabric Watch threshold violations for devices running Network OS 3.0.0 or later .
7 Dashboard customization • Name — A list of the Fabric Watch dashboard categories with an out of range violation. Click to access additional details for the violations. For more information, refer to “Viewing additional violations data” on page 233. If there are no violations for a category, the category does not display.
7 Dashboard customization • Rule Name (MAPS only support) — The rule name. • Table functions — For a description of how to use the table functionality, refer to “Table functions” on page 281. 2. Click the close (X) button. Port Health Violations widget The Port Health Violations widget displays the number of violations for each product based on the selected fabric and a specified time range. There are four port health violation widgets: All, ISL, Initiator, and Target.
7 Dashboard customization • SFP Temperature — The physical temperature of the SFP transceiver, in degrees Celsius. • SFP Power On Hours — The number of hours the 16 Gbps SFP transceiver is powered on. • Refreshed — The time of the last update for the widget. Network OS Fabric Watch violations with appropriate counter values are displayed for the following categories. • Abnormal Frame Terminations — The number of frames abnormally terminated.
7 Dashboard customization TABLE 22 Preconfigure performance monitors Monitor title Description Data collectors Top Port Underflow Errors Table view of the underflow errors measure All SAN TE port collector Top Port Utilization Percentage Table view of the port utilization percentage measure. There are four versions of this monitor based on the type of port: All ports, initiator ports, ISL ports, and Target ports.
7 Dashboard customization Top Port Alignment Errors monitor The Top Port Alignment Errors performance monitor displays the top ports with alignment errors in a table. The Top Port Alignment Errors performance monitor includes the following data: • Widget title — The name of the widget. • View Details icon — Click to launch the Detailed View page. • Widget summary — The product count for each status (worst to best) displays underneath the widget title. • Top value — The highest value in the table.
7 Dashboard customization • Widget title — The name of the widget. • View Details icon — Click to launch the Detailed View page. • Widget summary — The product count for each status (worst to best) displays underneath the widget title. • Top value — The highest value in the table. • Port — The port affected by this monitor. Click to launch the Port Page (refer to “Port summary view” on page 276). When you launch the Port page, the detailed view closes.
7 Dashboard customization • Top value — The highest value in the table. • Port — The port affected by this monitor. Click to launch the Port Page (refer to “Port summary view” on page 276). When you launch the Port page, the detailed view closes.
7 Dashboard customization • Port — The port affected by this monitor. Click to launch the Port Page (refer to “Port summary view” on page 276). When you launch the Port page, the detailed view closes. • Connected_Port (where Connected_Port is Connected Port, Initiator, or Target) — Displays the address of the port: • CRC Errors/sec — The number (error rate) of cyclic redundancy check (CRC) errors per second for the duration specified in the monitor.
7 Dashboard customization • RX Discards/sec — The number (error rate) of receive discard errors per second for the duration specified in the monitor. • RX Discards — The number (error count) of receive discard errors. • TX Discards/sec — The number (error rate) of transmit discard errors for the duration specified in the monitor. • TX Discards — The number (error count) of transmit discard errors. Viewing additional details for the Top Port Discards monitor 1. Click the View Details icon.
7 Dashboard customization • Encode Error Out/sec — The number (error rate) of encoding errors outside of frames per second for the duration specified in the monitor. • Encode Error Out — The number (error count) of encoding errors outside of frames for the duration specified in the monitor. Viewing additional details for the Top Port Encode Error Out monitor 1. Click the View Details icon.
7 Dashboard customization • TX Errors — The number (error count) of transmit errors. Viewing additional details for the Top Port Errors monitor 1. Click the View Details icon. A more detailed widget displays which includes the following data: • Scope — The scope configured for the dashboard. • Port — The port affected by this monitor. Click to launch the Port Page (refer to “Port summary view” on page 76). When you launch the Port page, the detailed view closes.
7 Dashboard customization Viewing additional details for the Top Port Overflow Errors monitor 1. Click the View Details icon. A more detailed widget displays which includes the following data: • Scope — The scope configured for the dashboard. • Port — The port affected by this monitor. Click to launch the Port Page (refer to “Port summary view” on page 276). When you launch the Port page, the detailed view closes.
7 Dashboard customization • Port — The port affected by this monitor. Click to launch the Port Page (refer to “Port summary view” on page 276). When you launch the Port page, the detailed view closes. • Connected_Port (where Connected_Port is Connected Port, Initiator, or Target) — Displays the address of the port: • Receive EOF — The number (count) of end of frames received. • Receive EOF/sec — The number (rate) of end of frames received per second for the duration specified in the monitor.
7 Dashboard customization • Runtime Errors— The number (error count) of runtime errors for the duration specified in the monitor. • Runtime Errors/sec — The number (error rate) of runtime errors per second for the duration specified in the monitor. • • • • • • Product — The product affected by this monitor. Type — The type of port (for example, U-Port). Identifier — The port identifier. Port Number — The port number. State — The port state (for example, Enabled).
Dashboard customization 7 • State — The port state (for example, Online). • Status — The port status (for example, In_Sync, No_Sync). 2. Click the close (X) button.
7 Dashboard customization Top Port Too Long Errors monitor The Top Port Too Long Errors performance monitor displays the top ports with frames longer than the maximum frame size allowed errors in a table. The Top Port Too Long Errors performance monitor includes the following data: • Widget title — The name of the widget. • View Details icon — Click to launch the Detailed View page. • Widget summary — The product count for each status (worst to best) displays underneath the widget title.
7 Dashboard customization Top Port Traffic monitor The Top Port Traffic monitor (Figure 89) displays the top ports with receive and transmit traffic in a table. FIGURE 89 Top Port Traffic monitor The Top Port Traffic monitor includes the following data: • Widget title — The name of the widget. • View Details icon — Click to launch the Detailed View page. • Widget summary — The product count for each status (worst to best) displays underneath the widget title.
7 Dashboard customization • Port Number — The port number. • State — The port state (for example, Enabled). • Status — The port status (for example, Up). 2. Click the close (X) button. Top Port Underflow Errors monitor The Top Port Underflow Errors performance monitor displays the top ports with underflow errors in a table. The Top Port Underflow Errors performance monitor includes the following data: • Widget title — The name of the widget. • View Details icon — Click to launch the Detailed View page.
Dashboard customization 7 Top Port Utilization Percentage monitor The Top Port Utilization monitor (Figure 90) displays the top port utilization percentages in a table. FIGURE 90 Top Port Utilization monitor The Top Port Utilization monitor includes the following data: • Widget title — The name of the widget. • View Details icon — Click to launch the Detailed View page. • Widget summary — The product count for each status (worst to best) displays underneath the widget title.
7 Dashboard customization • Port — The port affected by this monitor. Click to launch the Port Page (refer to “Port summary view” on page 276). When you launch the Port page, the detailed view closes. • Connected_Port (where Connected_Port is Connected Port, Initiator, or Target) — Displays the address of the port: • • • • • • • • RX Port Utilization Percentage — The top receive port utilization percentages. TX Port Utilization Percentage — The top transmit port utilization percentages.
7 Dashboard customization Viewing additional details for the Bottom Port Utilization Percentage monitor 1. Click the View Details icon. FIGURE 93 Bottom Port Utilization Detailed View A more detailed widget displays which includes the following data: • Scope — The scope configured for the dashboard. • Port — The port affected by this monitor. Click to launch the Port Page (refer to “Port summary view” on page 276). When you launch the Port page, the detailed view closes.
7 Dashboard customization The Top Product CPU Utilization monitor includes the following data: • Widget title — The name of the widget. • View Details icon — Click to launch the Detailed View page. • Widget summary — The product count for each status (worst to best) displays underneath the widget title. • Top value — The top value and the time that value was reported. • Product — The product affected by this monitor.
7 Dashboard customization • Firmware — The firmware level running on the product. • Location — The location of the product. • Contact — A contact name for the product. 2. Click the close (X) button. Top Product Memory Utilization monitor The Top Product Memory Utilization monitor (Figure 96) displays the top product memory utilization percentages in a table.
7 Dashboard customization Viewing additional details for the Top Product Memory Utilization monitor 256 Brocade Network Advisor IP User Manual 53-1003153-01
7 Dashboard customization 1. Click the View Details icon. FIGURE 97 Top Product Memory Utilization Detailed View A more detailed widget displays which includes the following data: • Scope — The scope configured for the dashboard. • Product — The product affected by this monitor. Click to launch the Product page for this device (refer to “Product summary view” on page 269). When you launch the Product page, the detailed view closes.
7 Dashboard customization Top Product Response Time monitor The Top Product Response Time monitor (Figure 98) displays the top product response time in a table. FIGURE 98 Top Product Response Time monitor The Top Product Response Time monitor includes the following data: • Widget title — The name of the widget. • View Details icon — Click to launch the Detailed View page. • Widget summary — The product count for each status (worst to best) displays underneath the widget title.
7 Dashboard customization • Product — The product affected by this monitor. Click to launch the Product page for this device (refer to “Product summary view” on page 269). When you launch the Product page, the detailed view closes. • • • • • • • • • • • • • • Min — The minimum value of the measure in the specified time range. Response Time (ms) — The top response time in milliseconds. Max — The maximum value of the measure in the specified time range. Fabric — The fabric to which the device belongs.
7 Dashboard customization • Temperature — The top temperatures. Pause on a rown to display the minimum, current, and maximum vaules for the selected row. This field also displays minimum (black) and maximum (red) pointers. • Fabric — The fabric to which the device belongs. Viewing additional details for the Top Product Temperature monitor 1. Click the View Details icon.
7 Dashboard customization Top Products with Unused Ports monitor The Top Products with Unused Ports monitor (Figure 94) displays the top products with ports not in use in a table. FIGURE 102 Top Product CPU Utilization monitor The Top Products with Unused Ports monitor includes the following data: • Widget title — The name of the widget. • View Details icon — Click to launch the Detailed View page. • Widget summary — The product count for each status (worst to best) displays underneath the widget title.
7 Inventory • • • • • • • • • • Product Type — The type of product (for example, switch). State — The product state (for example, Offline). Status — The product status (for example, Reachable). Tag — The product tag. Serial # — The serial number of the product. Model — The product model. Port Count — The number of ports on the product. Firmware — The firmware level running on the product. Location — The location of the product. Contact — A contact name for the product. 2. Click the close (X) button.
Inventory 7 Inventory expand navigation bar The Inventory expand navigation bar (Figure 81) is located on the left side of the page and provides a list of discovered fabric and products. FIGURE 104 Expand navigation bar The expand navigation bar contains the following components: • IP Products and Ethernet fabrics — List of discovered fabrics and products. Click a fabric to display the Fabric Page in the center pane (“Fabric summary view” on page 263).
7 Inventory The fabric summary displays with two panes: Fabric Page and Properties. FIGURE 105 Fabric summary 3. Review the fabric summary data. FIGURE 106 Fabric Page area The Fabric Page area contains the following fields and components: • • • • Show/Hide pane arrow — Click to show or hide the Product List pane. Fabric Page — Displays the name of the selected fabric. Refreshed time — Displays the time of the last application update. Show/Hide pane arrow — Click to show or hide the Properties pane.
7 Inventory • • • • • • • • • State — Displays the state for the product and the port. Status — Displays the status for the product and the port. Tag — Displays the tag number of the product. Serial # — Displays the serial number of the product. Model — Displays the model number of the product. Port Count — Displays the number of ports on the product. Firmware — Displays the firmware version of the product. Location — Displays the physical location of the product.
7 Inventory The Target Details table displays the following details for targets in the fabric: • • • • • • • Collapse/Expand button — Click to collapse or expand the view. All — Displays the number of targets in the fabric. Port Name — Displays the port name. Connected Switch — Displays the name of the switch connected to the port. Symbolic Name — Displays the symbolic name (nickname) for the HBA port. Port Type — Displays the port type; for example, N_Port. Host Name — Displays the name of the host.
Inventory 7 • Severity — Displays the severity icon for the event. When the same event (Warning or Error) occurs repeatedly, the Management application automatically eliminates the additional occurrences. • • • • Time — Displays the time and date the event last occurred on the server. Description — Displays a description of the event. Source Name — Displays the product on which the event occurred. Source Address — Displays the IP address (IPv4 or IPv6 format) of the product on which the event occurred.
7 Inventory Viewing fabric properties To view fabric properties, complete the following steps. 1. Click the Inventory icon. 2. Select a fabric in the Product List pane. The fabric summary displays with two panes: Fabric Page and Properties. The fabric properties displays on the right side of the page. FIGURE 111 Fabric Properties pane The fabric properties pane contains the following fields: • Highlights area - Name — Displays the name of the selected fabric.
Inventory 7 Product summary view The Product summary displays the Product List, summary, and properties panes for the selected product. Viewing the product summary To view product properties, complete the following steps. 1. Click the Inventory icon. 2. Select a product in the Product List pane. The product summary displays with two panes: Product Page and Properties. FIGURE 112 Product summary 3. Review the product summary data.
7 Inventory • Show/Hide pane arrow — Click to show or hide the Properties pane. FIGURE 114 Product Performance area The Product Performance area displays the following information for the selected product: • Collapse/Expand button — Click to collapse or expand the view. • Avg. CPU Utilization — Displays the average percentage of CPU utilization in graphical format. • Avg. Memory Utilization — Displays the average percentage of memory utilization in graphical format.
7 Inventory • Performance graph/table — Displays the performance data when configured. To configure a graph or table, refer to “Configuring a port measure performance graph” on page 273. • Show/Hide Legend button — Click to show or hide the performance graph legend. • Close Performance button — Click to close the performance graph or table. • Update button — Select or clear the ports in the table and click to update the graph or table.
7 Inventory • Table functions — For a description of how to use the Events table functionality, refer to “Table functions” on page 281. FIGURE 116 Violations table “Table functions” on page 281 FIGURE 117 Events table The Events table displays the following details for events triggered in the fabric: • Collapse/Expand button — Click to collapse or expand the view. • All — Displays the total number of events triggered.
Inventory 7 • Emergency icon — Displays the total number of Emergency events triggered. Click to only display Emergency events in the table. • Alert icon — Displays the total number of Alert events triggered. Click to only display Alert events in the table. • Critical icon — Displays the total number of Critical events triggered. Click to only display Critical events in the table. • Error icon — Displays the total number of Error events triggered. Click to only display Error events in the table.
7 Inventory The Settings dialog box displays. FIGURE 118 Settings dialog box 5.
7 Inventory • • • • 7. 1 Day — Displays data for 24 hours. 3 Days — Displays data for 3 days. 1 Week — Displays data for 1 week. 1 Month — Displays data for 30 days. Click Apply. The port performance graph displays in the Port Details area. 8. Add ports to the graph by selecting the check box for each port you want to include in the graph. Select the check box in the table header to select all ports in the table. Remove ports from the graph by clearing the check box. 9. Click Update.
7 Inventory 3. Review the product properties data. The product Properties pane displays on the right side of the page. The Highlights area displays the following data for the selected product. • • • • • • • • • • • • Name — Displays the name of the product. System Name — Displays the system name of the product. IP Address — Displays the IP address of the product. Product Type — Displays the type of product. VCS Mode — Displays whether VCS mode is enabled or disabled.
Inventory 7 The port summary displays with two panes: Port Page and Properties. FIGURE 120 Port summary 4. Review the port summary data. The Ports Details area displays the following data for the selected product: • Collapse/Expand button — Click to collapse or expand the view. • Performance graph/table — Displays the performance data when configured. To configure a graph or table, refer to “Configuring a port measure performance graph” on page 273.
7 Inventory • Table button — Click to show the performance data in a table. The table includes the performance measures you selected and the time the measure was collected. If you have not selected performance measures, the table displays receive and transmit utilization measures by default. FIGURE 121 Violations table “Table functions” on page 281Viewing port properties To view properties for a port, complete the following steps. 1. Click the Inventory icon. 2. Select a product in the Product List pane.
Inventory 7 The port summary displays with two panes: Port Page and Properties. FIGURE 122 Port Properties pane 4. Review the port properties data. The port Properties pane displays on the right side of the page. For Ironware port properties, the Highlights area displays the following data for the selected port. • • • • • Identifier — Displays the identifier of the port. Name — Displays the name of the port. MAC Address — Displays the MAC address of the port.
7 Events • Role — Displays the role of the port (such as Fabric, Edge, Stacking, or Peri Port). For MCT switches, the port role is either ICL or MCT. Events Click the Events icon to display the Events page. FIGURE 123 Events page The Events page contains the following fields and components: • Scope — Only displays when you access this page from the Events widget. Displays the network scope and time scope configured for the dashboard.
7 Reports • Description — Displays a description of the event. • Source Name — Displays the product on which the event occurred. • Source Address — Displays the IP address (IPv4 or IPv6 format) of the product on which the event occurred. • Category — Displays the type of event that occurred (for example, client/server communication events). • • • • Count — Displays the number of times the event occurred. Message ID — Displays the message ID of the event.
7 Reports The Management application only retains a maximum 10,000 reports. In addition, the Management application only retains reports for a maximum of 2 years. Note that the Management application purges reports nightly. FIGURE 124 Reports page The Reports page has three tabs: 1. Reports tab — Displays generated reports. Enables you to view generated reports. 2. Schedules tab — Displays configured schedules. Enables you to configure or delete schedules. 3.
7 Reports General report page functions • Popup notification — When you make changes in the reports pages, a popup notification detailing the change displays (such as, Report Schedule changed). • Blue text — Click to launch a report, schedule, and so on. • Sort — Click a column head to sort the list. Click a column head again to reverse the sort order • Navigate through the table by using the following icons at the bottom of the table.
7 Reports FIGURE 125 Select Fabric dialog box FIGURE 126 Select Switch dialog box 3. Double-click the fabric or switch in the Available list to move it to the Selected list. You can only select one fabric or switch on which you want to run a report. Remove the fabric or switch from the Selected list by double-clicking the fabric or switch. 4. Click OK. When report generation is complete, the report displays in a new browser tab and a new entry displays in the Generated Reports tab.
7 Reports Generated reports The Reports tab provides quick access to all generated reports. Generated Reports toolbar The toolbar is located on the upper right side of the tab and provides buttons and fields to perform various functions. FIGURE 127 Generated Reports toolbar 1. Delete button — Select one or more reports that you want to remove from the list and click to delete. You can only delete reports that you generate.
7 Reports Downloading a generated report You can download data from a report to CSV, PDF, or XLS. 1. Run a report (refer to “Generating a report” on page 283). 2. Select the report in Generated Reports tab and click Download on the Generated Reports toolbar. The Export Report dialog box displays. 3. Select an export format (PDF or Word) from the Export Format list. • PDF -— Portable Document Format • XLS — Excel spreadsheet • CSV — comma-separated values 4. Click OK on the Export Report dialog box.
7 Reports 4. Activate button — Click to activate a report schedule. For step-by-step instructions, refer to “Activating a schedule” on page 292. 5. Deactivate button — Click to deactivate a report schedule. For step-by-step instructions, refer to “Deactivating a schedule” on page 292. Configuring a new schedule You can schedule one or more reports to generate at a specific frequency. 1. Click the Reports icon. 2. Click the Schedules tab. A list of scheduled reports display.
7 Reports FIGURE 130 Add Schedule dialog box - General tab 4. Enter a unique name for the schedule in the Name field. The name can be up to 128 characters. 5. Select the report templates that you want to include in the schedule from the Available Templates list. 6. Click Add. 7. Select a report in the Selected Templates and Criteria list. Depending on the reports you selected, you may need to enter parameters.
7 Reports 9. Click Next. FIGURE 131 Add Schedule dialog box - Schedule Settings tab 10. Select the frequency (Hourly, Daily (default), Weekly, Monthly, and Yearly) from the Frequency list. Depending on the frequency you select, different date and time fields display. 11. Enter the time (hour and minutes) that you want to generate the report in the Time field. 12. Enter the date that you want to generate the report in the Date field. 13.
7 Reports The Select Fabric dialog box displays. FIGURE 132 Select Fabric dialog box 3. Double-click the fabric that you want to include in the report. 4. Click Ok on the Select Fabric dialog box. Selecting switches The Switch Report requires that you select a switch from a list of discovered switches. 1. Select one of the Switch reports in the Selected Templates and Criteria list. 2. Click Choose Switch. The Select Switch dialog box displays.
Reports 7 3. Double-click the switch that you want to include in the report. 4. Click Ok on the Select Switch dialog box. Viewing reports from a schedule 1. Click the Reports icon. 2. Click the Schedule tab. 3. Click the date and time of the reports in the Last Used column. The Last Run Reports for Schedule dialog box displays. 4. Click the name of the report you want to view from the list of reports in the schedule. The report launches in a new browser tab.
7 Reports 4. Configure a new schedule from an existing schedule by entering a unique name for the schedule in the Name field. The name can be up to 128 characters. 5. Select the report templates that you want to include in the schedule from the Available Templates list and clicking Add. Remove a report template from the schedule by selecting it in the Selected Templates and Criteria list and clicking Remove. 6. Select a report in the Selected Templates and Criteria list.
7 Reports A list of scheduled reports display. 3. Select the schedule you want to deactivate and click Deactivate. Report templates The Templates page enables you to run, import, export, share, or delete reports. Templates toolbar The toolbar is located on the upper right side of the tab and provides buttons and fields to perform various functions. FIGURE 134 Templates toolbar 1. Delete button — Select one or more templates that you want to remove from the list and click to delete.
7 Reports • Shared icon — Displays whether the report is shared or not. • Table functions — For a list of general table functions in the Reports page, refer to “General report page functions” on page 283 Viewing a report 1. Click the Reports icon. The Reports page displays with two panes: Templates list and Reports tabs. 2. Click All Templates in the Templates list. 3. Click the Templates tab. A list of existing report templates display. 4. Launch a report by clicking the report title.
7 Reports 4. Browse to the location to which you want to export the report and click Save. If a report with the same file name already exists, click Yes on the overwrite message to overwrite the report. When the export is complete, click OK on the successful export message. Importing report templates You can import external report design (.rptdesign) files into the Management application. The report title must be unique. 1. Click the Reports icon. 2. Click the Templates tab.
7 Reports Default reports The Management application web client provides default reports for both SAN and IP products. Presenting and archiving data about a network is equally as important as gathering the data. Through the web client, you can generate reports about the network. You can send the reports to network administrators, support consultants, and others interested in the network’s architecture, or archive the reports for future reference.
7 Reports TABLE 23 Fabric Summary report fields and components (Continued) Field/Component Description AG Port Count The number of ports on AG devices in the fabric. Location The location of the fabric. Description The description of the fabric. Contact The name of the person or group you should contact about the fabric. Discovered Time The date and time the fabric was discovered. Last Changed Time The date and time when there was a change in the fabric.
7 Reports TABLE 23 Fabric Summary report fields and components (Continued) Field/Component Description Node WWN The world wide name of the node. Port WWN The world wide name of the port. FC Address The FC address of the device. User Defined Device Name The user-defined device name for the switch. User Defined IP Address The user-defined IP address for the switch. Location The location of the switch. Contact The name of a contact person for the switch.
Reports TABLE 23 7 Fabric Summary report fields and components (Continued) Field/Component Description Switch WWN The world wide name of the virtual switch. Switch IP Address The IP address of the physical switch. Click to launch the Switch report. Port Name The port name. Port WWN The world wide name of the port. FC Address The FC address of the port. Domain ID The domain ID of the switch. Port Index The port index of the IFL port on the backbone or edge switch.
7 Reports TABLE 23 Fabric Summary report fields and components (Continued) Field/Component Description Port Type The AG port type. Physical/Logical Port Whether the AG port is Physical or Logical. Device Name The name of the connected device. Device Vendor The vendor of the connected device. Role The role of the connected device. Node WWN The node WWN of the connected device. Port WWN The port WWN of the connected device. IP Address The IP address of the backbone switch.
Reports TABLE 24 7 Fabric Ports report fields and components (Continued) Field/Component Description Fabric Ports/AG Port Details table IP Address The IP address of the switch. Switch Name The name of the switch. Click to launch the Switch Report. Domain ID/ Port # The domain ID and port number of the switch. Zone Whether the zone is online or offline. Connected Device Details about the connected device. Device Name The name of the connected device.
7 TABLE 24 Reports Fabric Ports report fields and components (Continued) Field/Component 302 Description Switch WWN The switch WWN of the AG. Slot #/Port # The slot and port number of the AG (typically the F_port). Port Index The port index for the F_port. Port Speed(Gbps) The port speed for the F_port. Port Status The switch port status. Port State The switch port state. Port Type The AG port type. Physical/Logical Port Whether the AG port is Physical or Logical.
Reports 7 Switch Report The Switch Report provides a information about the selected switch and ports. Table 25 describes the fields and components of the Switch Report. For general report content and table functions, refer to “Report content and functions” on page 309. TABLE 25 Switch Report fields and components Field/Component Description Switch Details table Name The name of the switch. WWN The world wide name of the switch.
7 Reports TABLE 25 Switch Report fields and components (Continued) Field/Component Description Connected Device/ Switch WWN The world wide name of the connected device. Port Name The port name of the connected device. Port Speed (GBPS) The port speed in gigabits per second. Port Status The port status. For example, Online, Offline, No light and so on. Port State The port state. For example, Online or Offline. Port Type The port type. For example, F-Port, L-Port, and so on.
Reports TABLE 25 7 Switch Report fields and components (Continued) Field/Component Description Role The role of the connected device. Node WWN The node WWN of the connected device. Port WWN The port WWN of the connected device. IP Address The IP address of the backbone switch. Switch WWN The switch WWN of the backbone switch. Switch Name The switch name of the backbone switch. Domain ID The domain ID of the switch to which the AG is connected.
7 Reports TABLE 26 Zoning Summary report fields and components (Continued) Field/Component Description WWN Members For zone_name/alias_name The name of this area is based on the zone name or alias name. Member Properties Logged In Whether the zone member is logged in or not. Port Name The port name. Port WWN The world wide name of the port. Node Name The node name. Node WWN The world wide name of the node. Connected Switch Properties Switch Name The name of the connected switch.
7 Reports TABLE 27 Host Adapter Inventory Report fields and components (Continued) Field/Component Description Server Location The server’s location. Server Contact A contact name for the server. Server Description A description of the server. HCM Agent/ CIM Provider Version The version of the Host Connectivity Manager (HCM) application and the CIM provider. Adapter Name The adapter’s name. Adapter HCM Name The adapter’s HCM name. Adapter Node The adapter’s node name.
7 Reports Host Adapter with Unsupported and Faulty SFP reports The Adapters Faulty SFP report lists all Brocade adapters with unsupported or faulty small form-factor pluggable (SFP) transceivers. This report is only available for Brocade adapters. For adapters with unsupported SFPs, this report is the same as the Adapters Inventory report filtered to show only those hosts with adapter ports that have unsupported SFPs.
7 Reports TABLE 28 Adapters Faulty SFP report fields and components (Continued) Field/Component Description Temperature (c) The port temperature, measured in Celsius. Bias Current (mA) The low-level DC current (the Bias Current), measured in mA. Tx Power (mW) The transmitted power, measured in mW. Rx Power (mW) The received power, measured in mW. Voltage (V) The voltage; for example, 1.8V, 3.3V, or 5.0V. Alarm/Warning Indicates whether an alarm has been triggered.
7 Reports Exporting data from the report You can export data from a report to CSV, PDF, or XLS. 1. Run a report (refer to “Generating a report” on page 283). 2. From the report, click the Export Report icon on the Report toolbar. The Export Report dialog box displays. 3. Select an export format (PDF or Word) from the Export Format list. • PDF -— Portable Document Format • XLS — Excel spreadsheet • CSV — comma-separated values 4.
Chapter 8 Dashboard Management In this chapter • Dashboard overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Default dashboards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Status widgets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Performance monitors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
8 Dashboard overview FIGURE 136 Dashboard tab 1. Menu bar — Lists commands you can perform on the dashboard. For a list of Dashboard tab menu commands, refer to “Dashboard main menus” on page 1399. The dashboard also provides a shortcut menu to reset the dashboard back to the defaults. Reset the dashboard back to the default settings by right-clicking in the white space and selected Reset to Default. 2. Toolbar — Provides buttons that enable quick access to dialog boxes and functions.
Dashboard overview 8 8. Status bar — Displays the connection, port, product, special event, Call Home, and backup status, as well as Server and User data. For more information about the status bar, refer to “Status bar” on page 397. Dashboard toolbar The toolbar (Figure 137) is located beneath the menu bar and provides icons and buttons to perform various functions. FIGURE 137 Toolbar The toolbar contains the following icons and buttons: 1.
8 Dashboard overview Dashboard messages The dashboard message bar (Figure 138) only displays when Scope (Network Scope and Time Scope) has changed in other clients. You can also view all dashboard messages and clear them. FIGURE 138 Dashboard message bar The toolbar contains the following fields and components: 1. Details button — Use to view dashboard messages. 2. Close button — Use to close the dashboard message bar.
Dashboard overview 8 6. Options button — Use to share, unshare, export, and import a user-defined dashboard. For more information, refer to “Sharing a user-defined dashboard definition” on page 319, “Unsharing a user-defined dashboard definition” on page 320, “Exporting a user-defined dashboard definition” on page 320, and “Importing a user-defined dashboard definition” on page 321.
8 Dashboard overview Accessing a dashboard From the Dashboards expand navigation bar, double-click the dashboard you want to view. Options include: • IP Port Health — Displays preconfigured IP performance monitors. You can display additional status widgets and performance monitors in this dashboard. • Product Status and Traffic — Displays preconfigured status widgets and performance monitors. You can display additional widgets and monitors in this dashboard.
Dashboard overview 7. 8 Press Enter. The filter results display in the Dashboards expand navigation bar. To stop the filter, click the stop filter (X) icon in the Filter text box. Creating a user-defined dashboard You can create a dashboard and customize it with the status widgets and performance monitors you need to monitor your network. 1. Click the Dashboards expand navigation bar. 2. Click Add. The Add Custom Dashboard dialog box displays. 3. Enter a name and description for the dashboard.
8 Dashboard overview 1. Click the Dashboards expand navigation bar. 2. Select a user-defined dashboard you want to share under My Dashboard, click Options and then select Share. The following message displays: “The selected dashboard will be shared with all users”. 3. Click OK. The selected user-defined dashboard is shared with all users and is displayed with a shared icon. NOTE You cannot share default dashboards and shared dashboards.
Dashboard overview 8 Importing a user-defined dashboard definition You can import a user-defined dashboard definition from the file system to the Management application. 1. Click the Dashboards expand navigation bar. 2. Select a user-defined dashboard you want to share under Dashboard, click Options, and then select Import. The Import dialog box displays. 3. Browse the path and click Select. A successfully imported information message displays. 4. Click OK.
8 Dashboard overview 4. Click the Performance tab (Figure 140). The preconfigured performance monitors display. You can create up to 100 performance monitors; however, you can only display up to 30 performance monitors. For more information about performance monitors, refer to “Performance monitors” on page 343. FIGURE 140 Customize Dashboard dialog box, Performance tab 5. Select the Display check box in the Performance Monitors list for each performance monitor you want to add to the dashboard.
Dashboard overview 8 Exporting the dashboard display You can export the current dashboard display (all widgets and monitors) or a selected widget or monitor in a .png format. 1. Select one of the following options from the Export list: • Dashboard — Exports the current dashboard. • Name — Exports the selected widget (where Name is the name of the widget or monitor on the dashboard). The Export Dashboard to PNG File or Export Name to PNG File dialog box displays. 2.
8 Dashboard overview Customizing the dashboard scope You can customize the dashboard display by setting the network scope and time scope in the Scope list (Figure 141). . FIGURE 141 Scope list Setting the network scope You can configure the dashboard to display all objects in your area of responsibility (AOR) or a subset of objects (fabrics, devices, or groups) using the network scope selection. Default network scopes are visible to all users.
Dashboard overview 8 The available network scopes include the following list of options: • • • • • • All Any SAN fabric Any Ethernet fabric Any system-defined group Any user-defined group (IP product and port group) Any user-defined customized network If you select a fabric scope, dashboard widgets display data for all products and ports in the fabric. If you select a product scope, dashboard widgets display data for the selected products and the ports that belong to the selected products.
8 Dashboard overview FIGURE 142 Edit Scopes dialog box 4. Click Add. A new network scope displays in the Network Scopes list. 5. Enter a name for the scope in the Name field. 6. Select one of the following options: • Fabrics — Select to create your network from one or more fabrics. • Products — Select to create your network from one or more products or product groups. • Ports — Select to create your network from one or more ports or port groups. 7.
Dashboard overview 8 The objects display in the Selected Targets list. 6. To remove an object from the Selected Targets list, select it and click the left arrow button. 7. Click OK to save your changes and close the Edit Scopes dialog box. Deleting a user-defined network scope You can delete any user-defined network scope. 1. Click the Scope list. 2. Click Manage Network Scopes. The Edit Scopes dialog box displays with a list of existing user-defined network scopes in the Network Scopes list. 3.
8 Dashboard overview FIGURE 143 Historical mode message bar You can click View current data on the message bar to view the current data. If you select the Stay current option, all the widgets will start refreshing data in the configured auto-refresh interval. Use the spin box to select a specific time for the selected date. NOTE If the start date is within 8 days of the current date, then the granularity of the spin box will be 5 minutes.
Dashboard overview 8 If you click the Rewind or Forward button for the first time, data refresh will be in 1x speed with 5 minutes or 30 minutes granularity based on the time scope. For example, consider the current time as September 9, 2013, 7:00 AM. In the Scope list, if you set the duration as 30 minutes and the time scope as September 9, 2013, 6:15 AM, data will be displayed for all the applicable widgets based on the given time range (September 9, 2013, 5:45 AM to September 9, 2013, 6:15 AM).
8 Default dashboards Default dashboards The Management application provides preconfigured dashboards which provide high-level overview of the network, the current states of managed devices, and performance of devices, ports, and traffic on the network.
Status widgets 8 • Bottleneck Graph dialog boxDisplay Range is 150 minutes and the Display Interval is 300 seconds — Bar chart view of events grouped by severity and range • Host Adapter Inventory widget — Stacked bar chart view of Host Adapters grouped by selected category • IP Inventory widget — Stacked bar chart view of IP devices grouped by operational status and selected category • IP Status widget — Pie chart view of IP devices categorized by operational and reachability status • Out of Range Vi
8 Status widgets TABLE 29 AP status color codes Color Type Green Online — AP is managed by controller and online. Red Offline — AP is managed by controller, but is offline. Gray Pending Adoption — Controller found AP but not managed. Customizing the Access Point Status widget You can customize the Access Point Status widget to display status for a specific product. Change the grouping by selecting one of the following from the Show list: • • • • All — Displays all the AP products.
Status widgets 8 • Bar chart — The event severity using the color codes in Table 30. TABLE 30 Event severity color codes Color Red ( Severity ) Emergency Brick Red( ) Alert Brick Red ( ) Critical Brick Red ( ) Error Gold ( ) Warning Grey ( ) Notice Blue ( ) Info • Network Scope — Select to display the events count of the products present in the selected network scope. • Time Scope — Select to display the events count of the products present in the selected time range and duration.
8 Status widgets Host Adapter Inventory widget The Host Adapter Inventory widget (Figure 146) displays the host adapter products inventory as stacked bar graphs. FIGURE 146 Host Adapter Inventory widget The Host Adapter Inventory widget includes the following data: • Severity icon/Host product count/widget title — The color of the worst severity and the Host product count with that severity displays before the widget title. • Group By list — Use to customize this widget to display a specific grouping.
Status widgets 8 NOTE The OS type is blank when the host has only Emulex host adapters with the Brocade drivers not installed. • Zoom in on an area of the widget by dragging the mouse (upper left corner to lower right corner) to select one or more bars. NOTE If the ratio between the longest and shortest bar reaches 5000:1, you should maximize the widget prior to using zoom. To return the widget to its original state, reverse the selection (drag from lower right corner to upper left corner).
8 Status widgets • Bar chart — Displays each group as a separate bar on the graph. Displays the current state of all products discovered for a group in various colors on each bar. Displays the color legend below the x-axis. Tooltips showing the number of devices in that state are shown when you pause on the bar. • Color legend — Displays the color legend below the bar chart. - Green — Reachable: IP product is online and accessible by IP (ICMP/TCP) and SNMP.
Status widgets 8 IP Status widget The IP Status widget (Figure 148) displays the device status as a pie chart. FIGURE 148 IP Status widget The IP Status widget includes the following data: • Severity icon/product count/widget title — The color of the worst status followed by the product count with that status displays before the widget title. • Pie chart — The device status as a percentage of the total number of devices. The pie chart displays the percentage in various colors on each slice.
8 Status widgets NOTE It takes a few moments to populate newly discovered products in the IP Products - Status dialog box (where Status is the section of the widget you selected). Viewing additional IP product data 1. Double-click a section in the IP Status or IP Inventory widgets. The IP Products - Status dialog box (where Status is the section of the widget you selected) displays with the following fields and components: • • • • • • • • • • • • Product — The product name.
Fabric Watch widgets 8 Status widget The Status widget (Figure 149) displays the number of products managed and the number of events within the selected event time range, as well as various IP management processes and their current states. FIGURE 149 Status widget The Status widget displays the following items for each product license: • • • • • • • SAN Physical Switches — The number of discovered physical SAN switches. Hosts — The number of managed hosts.
8 Fabric Watch widgets Out of Range Violations widget The Out of Range Violations widget (Figure 150) displays the number of violations for each Fabric Watch category, and the number of network objects (such as ports, trunks, and switches) for Network OS devices with the Fabric Watch violation based on the selected fabric and a specified time range. By default, this widget refreshes every minute.
Fabric Watch widgets 8 • Violation Count — The total number of Fabric Watch rule violations for each category. Always displays whether or not there is a violation. • Network Object Count — The number and network object type (such as switch, virtual machine, port, trunk, and so on) with a Fabric Watch violation for each category. Always displays whether or not there is a violation. • Refreshed — The time of the last update for the widget.
8 Fabric Watch widgets • Connected_Port_Link (where Connected_Port_Link is Connected Port, Initiator, or Target) — Displays one of the following: - Connected Port — The ISL or IFL port on the connected device. Click to launch the switch port properties dialog box. - Initiator — The initiator port on the connected device. Click to launch the device properties dialog box. - Target — The target port on the connected device. Click to launch the device properties dialog box.
Performance monitors 8 • To display data for a specific fabric or group, refer to “Creating a customized network scope” on page 325. • To display data for a specific duration, refer to “Setting the time scope” on page 327. • Sort the contents by clicking the column header. Click the same column header again to reverse the sort order. Accessing additional data from the widget • Right-click a row in the widget to access the shortcut menu available for the associated device.
8 Performance monitors TABLE 31 Preconfigure performance monitors Monitor title Description Data collectors Top Port Encode Error Out Table view of the encode error out measure. There are four versions of this monitor based on the type of port: All ports, initiator ports, ISL ports, and Target ports.
Performance monitors 8 Displaying performance monitors on the dashboard 1. From the Dashboards expand navigation bar, double-click the desired dashboard. The selected Dashboard displays. 2. Click the Customize Dashboard icon. The Customize Dashboard dialog box displays. 3. Select the check box in the Display column for each performance monitor you want to display on the Dashboard. 4. Click OK.
8 Performance monitors • Alignment Errors/sec — The number (error rate) of alignment errors per second for the duration specified in the monitor. • • • • • • • Product — The product affected by this monitor. Type — The type of port (for example, U-Port). Identifier — The port identifier. Port Number — The port number. State — The port state (for example, Enabled). Status — The port status (for example, Up). Refreshed — The time of the last update for the monitor.
Performance monitors 8 • Connected_Port_Link (where Connected_Port_Link is Connected Port, Initiator, or Target) — Displays one of the following: - Connected Port — The ISL or IFL port on the connected device. Click to launch the switch port properties dialog box. - Initiator — The initiator port on the connected device. Click to launch the device properties dialog box. - Target — The target port on the connected device. Click to launch the device properties dialog box.
8 Performance monitors Top Port C3 Discards RX TO monitor The Top Port C3 Discards RX TO monitor (Figure 154) displays the top ports with receive Class 3 frames received at this port and discarded at the transmission port due to timeout in a table. FIGURE 154 Top Port C3 Discards RX TO monitor The Top Port C3 Discards RX TO monitor includes the following data: • Severity icon/monitor title — The worst severity of the data based on the error count shown next to the monitor title.
Performance monitors 8 • Status — The port status (for example, Up). • Refreshed — The time of the last update for the monitor. To customize the monitor to display data by a selected time frame as well as customize the display options, refer to “Editing a preconfigured performance monitor” on page 370. Accessing additional data from the Top Port C3 Discards RX TO monitor • Right-click a row in the monitor to access the shortcut menu available for the associated device.
8 Performance monitors • Connected_Port_Link (where Connected_Port_Link is Connected Port, Initiator, or Target) — Displays one of the following: - Connected Port — The ISL or IFL port on the connected device. Click to launch the switch port properties dialog box. - Initiator — The initiator port on the connected device. Click to launch the device properties dialog box. - Target — The target port on the connected device. Click to launch the device properties dialog box.
Performance monitors 8 Top Port Discards monitor The Top Port Discards monitor (Figure 156) displays the top ports with receive and transmit discards in a table. FIGURE 156 Top Port Discards monitor The Top Port Discards monitor includes the following data: • Severity icon/monitor title — The worst severity of the data based on the error count shown next to the monitor title. • Port — The port affected by this monitor.
8 Performance monitors • Status — The port status (for example, Up). • Refreshed — The time of the last update for the monitor. To customize the monitor to display data by a selected time frame as well as customize the display options, refer to “Editing a preconfigured performance monitor” on page 370. Accessing additional data from the Top Port Discards monitor • Right-click a row in the monitor to access the shortcut menu available for the associated device.
Performance monitors 8 • Encode Error Out/sec — The number (error rate) of encoding errors outside of frames per second for the duration specified in the monitor. • Encode Error Out — The number (error count) of encoding errors outside of frames for the duration specified in the monitor. • • • • • • • • • • CRC Errors — The number of CRC errors. Link Failures — The number of link failures. Invalid Transmissions — The number of invalid transmissions. Product — The product affected by this monitor.
8 Performance monitors The Top Port Errors monitor includes the following data: • Severity icon/monitor title — The worst severity of the data based on the error count shown next to the monitor title. • Port — The port affected by this monitor. • Connected_Port_Link (where Connected_Port_Link is Connected Port, Initiator, or Target) — Displays one of the following: - Connected Port — The ISL or IFL port on the connected device. Click to launch the switch port properties dialog box.
Performance monitors 8 Top Port Overflow Errors monitor The Top Port Overflow Errors performance monitor (Figure 159) displays the top ports with overflow errors in a table. FIGURE 159 Top Port Overflow Errors performance monitor The Top Port Overflow Errors performance monitor includes the following data: • Threshold icon/object count/monitor title — The color associated with the threshold and number of objects within that threshold displays next to the monitor title.
8 Performance monitors To edit a port performance monitor, refer to “Editing a preconfigured performance monitor” on page 370. Top Port Receive EOF monitor The Top Port Receive EOF performance monitor (Figure 160) displays the top ports with received end-of-frames in a table.
Performance monitors 8 • Connected_Port_Link (where Connected_Port_Link is Connected Port, Initiator, or Target) — Displays one of the following: - Connected Port — The ISL or IFL port on the connected device. Click to launch the switch port properties dialog box. - Initiator — The initiator port on the connected device. Click to launch the device properties dialog box. - Target — The target port on the connected device. Click to launch the device properties dialog box.
8 Performance monitors • Severity icon/monitor title — The color of the worst severity of the data shown next to the monitor title. • Port — The port affected by this monitor. • Connected_Port_Link (where Connected_Port_Link is Connected Port, Initiator, or Target) — Displays one of the following: • • • • • • • • • • • • - Connected Port — The ISL or IFL port on the connected device. Click to launch the switch port properties dialog box. - Initiator — The initiator port on the connected device.
Performance monitors 8 • Connected_Port_Link (where Connected_Port_Link is Connected Port, Initiator, or Target) — Displays one of the following: - Connected Port — The ISL or IFL port on the connected device. Click to launch the switch port properties dialog box. - Initiator — The initiator port on the connected device. Click to launch the device properties dialog box. - Target — The target port on the connected device. Click to launch the device properties dialog box.
8 Performance monitors • Severity icon/monitor title — Displays the worst severity of the data shown next to the monitor title. NOTE The Top Port Traffic widget displays the threshold colors based on the port speed. Click edit icon of the widget to customize the threshold values. • Port — The port affected by this monitor.
Performance monitors 8 • Connected_Port_Link (where Connected_Port_Link is Connected Port, Initiator, or Target) — Displays one of the following: - Connected Port — The ISL or IFL port on the connected device. Click to launch the switch port properties dialog box. - Initiator — The initiator port on the connected device. Click to launch the device properties dialog box. - Target — The target port on the connected device. Click to launch the device properties dialog box.
8 Performance monitors • Connected_Port_Link (where Connected_Port_Link is Connected Port, Initiator, or Target) — Displays one of the following: • • • • • • • • • - Connected Port — The ISL or IFL port on the connected device. Click to launch the switch port properties dialog box. - Initiator — The initiator port on the connected device. Click to launch the device properties dialog box. - Target — The target port on the connected device. Click to launch the device properties dialog box.
Performance monitors 8 Bottom Port Utilization Percentage monitor The Bottom Port Utilization Percentage monitor (Figure 163) displays the bottom port utilization percentages in a table. FIGURE 163 Bottom Port Utilization Percentage monitor The Top Port Utilization Percentage monitor includes the following data: • Severity icon/monitor title — The worst severity of the data shown next to the monitor title. • Port — The port affected by this monitor.
8 Performance monitors Accessing additional data from the Top Port Utilization monitor • Right-click a row in the monitor to access the shortcut menu available for the associated device. For more information about shortcut menus, refer to “Application menus” on page 1399. • Double-click a row to navigate to the Historical Graphs/Tables dialog box. For more information, refer to “Performance Data” on page 1099.
Performance monitors 8 • Contact — A contact name for the product. • Refreshed — The time of the last update for the monitor. To customize the monitor to display data by a selected time frame as well as customize the display options, refer to “Editing a preconfigured performance monitor” on page 370. Accessing additional data from the Top Product CPU Utilization monitor • Right-click a row in the monitor to access the shortcut menu available for the associated device.
8 Performance monitors • • • • • • • Serial # — The serial number of the product. Model — The product model. Port Count — The number of ports on the product. Firmware — The firmware level running on the product. Location — The location of the product. Contact — A contact name for the product. Refreshed — The time of the last update for the monitor.
Performance monitors • • • • • • • • • • • • • 8 Max — The maximum value of the measure in the specified time range. Fabric — The fabric to which the device belongs. Product Type — The type of product (for example, switch). State — The product state (for example, Offline). Status — The product status (for example, Reachable). Tag — The product tag. Serial # — The serial number of the product. Model — The product model. Port Count — The number of ports on the product.
8 Performance monitors • Severity icon/temperature/monitor title — The worst severity of the data and the temperature displays next to the monitor title. • • • • • • • • • • • • • • • • Product — The product affected by this monitor. Min — The minimum value of the measure in the specified time range. Temperature — The top temperatures. Max — The maximum value of the measure in the specified time range. Fabric — The fabric to which the device belongs.
Performance monitors 8 Top Products with Unused Ports monitor The Top Products with Unused Ports monitor (Figure 164) displays the top products with ports not in use in a table. FIGURE 168 Top Product CPU Utilization monitor The Top Products with Unused Ports monitor includes the following data: • • • • • • • • • • • • • • • • • Severity icon/monitor title — The worst severity of the data shown next to the monitor title. Product — The product affected by this monitor.
8 Performance monitors Accessing additional data from the Top Product CPU Utilization monitor • Right-click a row in the monitor to access the shortcut menu available for the associated device. For more information about shortcut menus, refer to “Application menus” on page 1399. • Double-click a row to navigate to the Historical Graphs/Tables dialog box. For more information, refer to “Performance Data” on page 1099.
User-defined performance monitors 8 • To reset to the default color, click Reset. 5. Click OK to save your changes. User-defined performance monitors You can customize performance monitors specific to your needs. You can define up to 100 performance monitors; however, you can only display up to 30 performance monitors at a time.
8 User-defined performance monitors • Port - Common - IP - Port Utilization Percentage — The memory utilization percentage. Traffic — The traffic in mbps. CRC Errors — The number of CRC errors. Errors — The number of errors. Discards — The number of discarded frames. SFP Ethernet Tx Power — The SFP Ethernet Tx power in dbm. SFP Ethernet Rx Power — The SFP Ethernet Rx power in dbm. SFP Ethernet Temperature — The SFP temperature in Celsius.
User-defined performance monitors 8 By default, products display sorted by the Measure_Type value (Top products sort from highest to lowest and bottom products sort lowest to highest). Click a column head to sort the columns by that value. • • • • • • • • • • • • • Max — The maximum value of the measure in the specified time range. Fabric — The fabric to which the device belongs. Product Type — The type of product (for example, switch). State — The product state (for example, Offline).
8 User-defined performance monitors The top or bottom port performance monitor includes the following data: • Threshold icon/object count/monitor title — The color associated with the threshold and number of objects within that threshold displays next to the monitor title. • Severity icon/monitor title — The worst severity of the data based on the error count or error rate shown next to the monitor title. • Port — The port affected by this monitor.
User-defined performance monitors 8 FIGURE 171 Distribution performance monitor example The distribution performance monitor includes the following data: • Monitor title — The user-defined monitor title. • Number of Products/Ports (y-axis) — The y-axis always displays a numbered range (zero to the maximum number of objects) for the products or ports affected by the selected measure. • Measure_Type (x-axis) — The x-axis display depends on the Measure_Type you selected for this monitor.
8 User-defined performance monitors Accessing additional data from the Distribution monitors • Place the cursor on a bar in the graph to display the number of products included in the count for the selected bar. For example, the tooltip “(Data Item 3, 22.6-33.8) = 6” means that there are six products within the third percentage range (displays the temperatures within the percentage range) for the selected measure (product temperature).
User-defined performance monitors 8 To configure a time series performance monitor, refer to “Configuring a user-defined product performance monitor” on page 377 or “Configuring a user-defined port performance monitor” on page 380. Top sFlows performance monitors The top sFlows performance monitors display the top sFlow measures based on available flow data in a table.
8 User-defined performance monitors • Time Series — Select to monitor a selected measure for a range of time and specified target. 6. Select the product measure for the monitor in the Measure area: • • • • • • • • • 7.
User-defined performance monitors 8 • To specify a color based on values of red, green, and blue, click the RGB tab. Specify the values for red (0 through 255), green (0 through 255), blue (0 through 255), and alpha (0 through 255). • To specify a color based on values of cyan, magenta, yellow, and black, click the CMYK tab. Specify the values for cyan (0 through 255), magenta (0 through 255), yellow (0 through 255), black (0 through 255), and alpha (0 through 255).
8 User-defined performance monitors The Performance Dashboard Monitor Targets dialog box displays. Depending on the type of measure you select, you can add IP products/ports to the list of targets. If you selected a product measure, continue with step 8. If you selected an IP port measure, continue with step 8. 8. Click the IP tab. 9. Select IP targets from the Available IP Sources list. 10. Click the right arrow button to move the targets to the Selected Sources list. 11.
User-defined performance monitors Common • Port Utilization Percentage • Traffic • CRC Errors 8 IP • • • • • • Errors Discards SFP Ethernet Tx Power SFP Ethernet Rx Power SFP Ethernet Temperature SFP Ethernet Current Wireless • Dropped Events • MAC Errors • Back Packets Received • Tx Errors 6. (Top N and Bottom N monitors only) Select the number of ports to include in a selected measure by entering a number in the For Top N, Bottom N Monitors, N= text box. Valid values are from 1 through 25.
8 User-defined performance monitors • To specify a color based on values of red, green, and blue, click the RGB tab. Specify the values for red (0 through 255), green (0 through 255), blue (0 through 255), and alpha (0 through 255). • To specify a color based on values of cyan, magenta, yellow, and black, click the CMYK tab. Specify the values for cyan (0 through 255), magenta (0 through 255), yellow (0 through 255), black (0 through 255), and alpha (0 through 255).
User-defined performance monitors 8 5. Select the number of products to include in a selected measure by entering a number in the For Top N, Bottom N Monitors, N= text box. Valid values are from 1 through 25. The default is 10. 6. Configure the monitor to show only values greater than or less than a specified value by completing the following steps. 7. a. Select the Show values check box. b. Select greater than or less than from the list. c. Enter a value in the field.
8 User-defined performance monitors • Measure_Type — This column depends on which measure you select for the monitor. Memory Utilization Percentage — The memory utilization percentage for the product. CPU Utilization Percentage — The CPU utilization percentage for the product. Temperature — The temperature in Celsius for the product. Fan Speed — The fan speed in RPM for the product. Response Time — The response time in seconds for the product.
User-defined performance monitors Discards — The number of discarded frames. SFP Ethernet Tx Power — The SFP Ethernet Tx power in dbm. SFP Ethernet Rx Power — The SFP Ethernet Rx power in dbm. SFP Ethernet Temperature — The SFP temperature in Celsius. SFP Ethernet Current — The SFP Ethernet current in mA. Wireless - Dropped Events — The number of dropped events. • • • • • • 8 MAC Errors — The number of MAC errors. Back Packets Received — The number of bad packets received.
8 386 User-defined performance monitors Brocade Network Advisor IP User Manual 53-1003153-01
Chapter 9 View Management In this chapter • IP tab overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Master Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Minimap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Status bar. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9 IP tab overview FIGURE 173 Main Window - IP tab 1. Menu bar — Lists commands you can perform on the IP tab. Some menu items display as disabled unless you select the correct object from the product list or topology map. For a list of the many functions available on each menu, refer to “IP main menus” on page 1400. 2. IP main toolbar — Provides buttons that enable quick access to dialog boxes and functions. For more information, refer to “IP main toolbar” on page 389. 3.
IP tab overview 9 11. Status bar — Displays data regarding the connection, port, product, special event, call home, and backup status, as well as Server and User data. For more information, refer to “Status bar” on page 397. IP main toolbar The toolbar is located beneath the Menu bar and provides icons to perform various functions. 1 2 3 4 5 6 7 8 9 10 11 12 13 FIGURE 174 Main toolbar The icons on your toolbar vary based on the licensed features on your system. 1.
9 IP tab overview 1 2 3 4 FIGURE 175 Product list toolbar 1. View list — Use to select the one of the following view types: Network Objects, IP Topology, L2 Topology, and VLAN Topology. The areas of the main display vary depending on the display type you select. • Network Objects — Displays the Product List toolbar, Product List, and Master Log. • L2 Topology — Displays the Product List toolbar, Product List, Topology Map toolbar, Topology Map, Master Log, and Minimap.
IP tab overview 9 Host Product List toolbar The Port Display buttons are located at the top right of the Product List and enable you to configure how ports display. You have the option of viewing connected (or occupied) product ports, unoccupied product ports, or attached ports. Not enabled until you discover a fabric or host. NOTE Occupied/connected ports are those that originate from a device, such as a switch. Attached ports are ports of the target devices that are connected to the originating device.
9 IP tab overview 7. Reset zoom list — Use to reset the zoom (Actual Size, Fit Content, 25%, 50%, 75%, 100%, 125%, 150%, 200%, or 500%) of the Topology Map. 8. Zoom In icon — Use to zoom in on the Topology Map. Host topology map toolbar The Host Topology map toolbar is located at the top right side of the View window and provides tools to export the topology, to zoom in and out of the Topology Map, collapse and expand groups, and fit the topology to the window. Not enabled until you discover a host.
IP tab overview 9 • Status — Displays the status for the produc, such as Reachable, Marginal, Degraded Link, or Not Reachable. • • • • • • • • • • State (Ethernet Fabrics only) — Displays the Ethernet Fabric state, such as online or offline. Vendor — Displays the name of the product’s vendor. Model — Displays the model number of the product. Port Count — Displays the number of ports on the product. Firmware — Displays the firmware version of the product.
9 IP tab overview FIGURE 179 Topology Map Topology Map functions • Two-way selection — Select an icon on the topology map and that device is highlighted in the Product List and vice versa. For more information about icons, refer to “Icon legend” on page 398. • Node/Device double-click — Double-click a node (subnet) to display the devices beneath it. Double-click a device to display the Properties dialog box for the selected device.
Master Log TABLE 34 9 Topology keyboard shortcuts Keyboard Shortcut Description Control + 0 Set the zoom level to 100%. Control + P Launch the Print dialog box. Control + E Launch the Export dialog box. Control + , Launch the Topology Display dialog box. Right Arrow Move the selection to the node on the right (if available). Left Arrow Move the selection to the node on the left (if available). Up Arrow Move the selection to the node above the current selection (if available).
9 Minimap • • • • Contributor — The name of the contributor on which the event occurred. • • • • • • First Event Product Time — The time and date the event first occurred on the product. Node WWN — The world wide name of the node on which the event occurred. Fabric Name — The name of the fabric on which the event occurred. Operational Status — The operational status (such as, unknown, healthy, marginal, or down) of the product on which the event occurred.
Status bar 9 • To anchor the Minimap and return the Minimap to its original location on the main window, do one of the following steps: - Click the Attach icon ( Click the Close icon ( ) in the upper right corner of the Minimap. ) in the upper right corner of the Minimap. Double-click the logo in the upper left corner of the Minimap. Click the logo in the upper left corner of the Minimap and select Close (ALT + F4).
9 Icon legend • Network size within limits icon — Network size is within the recommended count. • Ne work size exceeds limits icon — Network size exceeds the recommended count. 5. Server Port Status — Displays port status for the following ports: CIM Indication for Event Handling, CIM Indication for HCM Proxy, FTP,SCP/SFTP, SNMP Trap, Syslog, , Web Server (HTTP), and Web Server (HTTPS). Click to launch the Port Status dialog box.
Icon legend 9 IP product icons The following table lists the manageable IronWare and Network OS product icons that display on the topology. Manageable devices display with blue icons. Unmanageable devices display with gray icons. Some of the icons shown only display when certain features are licensed.
9 Icon legend TABLE 36 Icon Description Icon Description Host Unmanaged Host VM Host Virtual HBA Ethernet Cloud Layer 2 Cloud IP group icons The following table lists the manageable IP product group icons that display on the topology. TABLE 37 Icon Description Icon Description Switch Group, Product Group IP port icons The following table lists the IP port icons that display in the Product List.
Customizing the main window 9 TABLE 39 Icon Status Unknown/Link Down Unhealthy Event icons The following table lists the event icons that display on the topology and Master Log. For more information about events, refer to .
9 Customizing the main window • Press CTRL and the plus sign on the number pad on the keyboard. FIGURE 182 Zoom dialog box Zooming out To zoom out of the Connectivity Map, use one of the following methods: • Click the zoom-out icon ( ) on the Connectivity Map toolbar. • Press CTRL and the minus sign on the number pad on the keyboard. Exporting the topology You can save the topology to an image (PNG format). 1. Click Export in the toolbar. The Export Topology To PNG File dialog box displays. 2.
Customizing the main window 9 • Collapse the table Displaying columns To only display specific columns, complete the following steps. 1. Right-click anywhere in the table and select Customize or Table > Customize. The Customize Columns dialog box displays. FIGURE 183 Customize Columns dialog box 2. Choose from the following options: • Select the check box to display a column. OR Select the column name and click Show. • Clear the check box to hide a column. OR Select the column name and click Hide.
9 Customizing the main window 1. Right-click anywhere in the table and select Customize or Table > Customize. The Customize Columns dialog box displays. 2. Select the name of the column you want to move and use the Move Up button and Move Down button to move it to a new location. 3. Click OK. Resizing the columns You can resize a single column or all columns in the table. To resize a single column, right-click the column header and select Size Column to Fit or Table > Size Column to Fit.
Product List customization 9 3. Enter the file name in the File Name field. 4. Click Save. Searching for information in a table You can search for information in the table by any of the values found in the table. 1. Right-click anywhere in the table and select Table > Search. The focus moves to the Search field. FIGURE 184 Search field 2. Enter all or part of the search text in the Search field and press Enter. The first instance is highlighted in the table. 3.
9 Product List customization Property fields containing a green triangle ( ) in the lower right corner are editable. To edit a field with a green triangle ( ), click in the field and make your changes. Adding a property label You can create up to three user-defined product and port property labels from the Product List. To add a new property label (column heading), complete the following steps. 1. Right-click any column heading on the Product List and select Add Column.
Search 9 Deleting a property label You can only delete labels that you created on the Product List. To delete a label, complete the following steps. 1. Right-click the user-defined column heading on the Product List you want to delete and select Delete Column. 2. Click Yes on the confirmation message. The column you selected is deleted from the Product List as well as the Properties dialog box. Search You can search for a objects by text or regular expression.
9 Search Searching for a device You can search for a device by name, WWN, or device type. When searching in the Connectivity Map, make sure you search the right view (View > Manage View > Display View > View_Name) with the appropriate options of port display (View > Port Display > Display_Option) and connected end devices (View > Port Display > Show All) enabled. To search for a device, complete the following steps. 1. Enter your search criteria in the search field.
Address Finder 9 • Regular Expression — Enter a Unicode regular expression in the search text box. (For hints, refer to “Regular Expressions” on page 1477.) All products in the Product List that contain the search text display highlighted. This search is case insensitive. 4. Press Enter or click the search icon. The search results display highlighted. Searching for an exact match To search for an exact match, complete the following steps. 1.
9 Address Finder Address Finder locates where hosts are connected to your network from traffic on the network. The list of interfaces provides information on the location of the source of the address, relative to each network device, although the source may be directly or indirectly connected to the listed interfaces.
Address Finder 9 FIGURE 185 Address Finder dialog box 3. Select the IP Address option and enter the IP address (IPv4 or IPv6 format) that you want to find. NOTE IPv6 address search is only supported on Ethernet router products running IronWare OS 5.4 or later. NOTE IPv6 address search is not supported on Network OS products. 4. Select the Find only in the selected products check box to limit the search to selected products.
9 Address Finder • Target MAC Address — The MAC address you wanted to find. • Target IP Address — The IP address you wanted to find. Sort the search results by clicking the column header. Click the same column header again to reverse the sort order. NOTE Address Finder cannot detect IP addresses assigned to POS or ATM ports. However, Address Finder will find IP addresses across a POS or ATM port. You can sort the search results by a specific column by clicking the column header.
Address Finder 9 FIGURE 186 Address Finder dialog box 3. Select the MAC Address option and enter the address in hexadecimal characters in the field. You can use any of the following methods to separate the characters in the address: • • • • • Hyphens (for example: aa-bb-cc-dd-ee-ff) Periods (for example: aa.bb.cc.dd.ee.
9 Address Finder NOTE When you find targets using the MAC address wildcard, the Products Found table shows the IP addresses of hosts connected to the routers. IP addresses of hosts connected to L2 switches are blank because Layer 2 switches typically do not learn the IP addresses of end nodes attached to the Layer 2 switch as it is not in the ARP table of the switch. NOTE You cannot use special addresses (such as a broadcast MAC address (FFFF.FFFF.FFFF) or any MAC in multicast range (0100.5E00.
IP topology view manager 9 IP topology view manager The topology view manager enables you to choose how to view devices in your network. Topology views only contain devices included in your area of responsibility (AOR). To display topology views in the Management application, make sure you meet the following requirements.
9 Network Objects view Network Objects view The Network Objects view displays a list of discovered products in a table (Product List). This view allows you to manage user authentications and permissions on discovered devices. In addition, you can place devices into management groups, which are used for configuration, deployment, accounting, monitoring, and reporting processes. The following columns (presented here in alphabetical order) are included in the Product List: • Build Label.
Network Objects view 9 1. Select Network Objects from the view list on the Product List toolbar. 2. Click Filter. The Product Filter dialog box displays. Only the categories or objects listed under the Selected Categories list display on the Network Objects Product List. Available categories include: • • • • • Contact — Lists the contact name for the discovered products. Firmware — Lists the firmware on the discovered products. Location — Lists the location of the discovered products.
9 IP Topology view IP Topology view The IP Topology view displays a map of the devices on your network. To display the topology map for IP, you must have the IP - Main Display - IP privilege. For more information about privileges, refer to “User Privileges” on page 1423. For more information about the components and customization of the topology map, refer to the following sections: • “IP topology map components” on page 424. • “Topology map elements” on page 424. • “Topology map layout” on page 426.
Ethernet Fabrics view 9 Ethernet Fabrics view The Ethernet Fabrics view displays a map of the traffic for VCS devices on your network. To view the fabric members and TRILL (Transparent Interconnection of Lots of Links) connections for a fabric, double-click the fabric in the Product List. To display the topology map for Ethernet Fabrics, you must have the Main Display - Ethernet Fabric privilege. For more information about privileges, refer to “User Privileges” on page 1423.
9 VLAN Topology view • “Viewing STP/RSTP topology” on page 420. • “Topology map layout” on page 426. For more information about functions you can perform on the topology map, refer to “Topology Map functions” on page 394. STP/RSTP topology You can display topology maps for STP or RSTP configurations from the VLAN Topology view. Before you display the STP or RSTP topology, make sure you meet the following requirements: • The devices are running FDP or LLDP.
VLAN Topology view TABLE 41 9 STP/RSTP Topology map elements Element Description The port is in a blocking state or discarding. link with block The port is in a disabled state. link with diamond # (U) # (T) # (D) The port or interface number used to create the link and one of the following: • (U) — Untagged port • (T) — Tagged port • (D) — Dual-mode port tool tips Link tool tips — identifies the devices at each end of the link to help you locate the devices on the map.
9 Host Topology view 6. Click Save. The Save As dialog box displays. 7. Browse to the location where you want to save the report. 8. Enter a name for the report in the File Name field. 9. Click Save. E-mailing an STP/RSTP Report To export an STP/RSTP report, complete the following steps. 1. Select VLAN Topology from the view list on the Product List toolbar. Mouse over the STP button. A tool tip appears, indicating whether STP is on or off. 2. If STP is off, click STP to turn it on. 3.
Host Topology view 9 • Description. Displays the description of the product. This field is editable at the fabric level. • Domain ID. Displays the Domain ID for the product in the format xx(yy), where xx is the normalized value and yy is the actual value on the wire. • • • • • • FC Address. Displays the Fibre Channel address of the port. • • • • • • • • • • • • • • • Port #. Displays the number of the port. Firmware. Displays the firmware version of the product. IP Address.
9 IP topology map components IP topology map components Topology maps are divided into three sections: • Product List — The top left pane displays a list of all devices (topology tree) in your AOR. Devices display in topology groups. The Management application has a Search tool that you can use to find a device quickly. (Refer to “Using the Search tool” on page 53 for more information.
IP topology map components 9 Table 42 displays the elements included in the topology.
9 IP topology map components • Layer 2 Clouds — This node displays as a blue cloud. When two or more devices with FDP or LLDP enabled connect to a device or network without FDP or LLDP capability, the L2 cloud icon is displayed to represent the connection between the device types. This icon means that IronWare OS or Network OS devices are not directly connected to each other and each IronWare OS or Network OS device does not have Layer 2 information from other devices.
IP topology map components 9 The following examples show the differences between the layouts. They may or may not match the map drawn for your network. Also, some of the examples may look alike; however, the layouts may look different on networks with more devices. Organic The Organic layout distributes the nodes evenly, makes connection lengths uniform, minimizes crisscrossing of connections, and tries to prevent nodes from touching each other.
9 IP topology map components Orthogonal (Merge Lines) The Orthogonal (Merge Lines) layout displays the nodes in a concise tree-like structure using vertical and horizontal line segments. Hierarchical The Hierarchical layout is best for a complex map. This layout might have a start point and end point, with some overall flow between those points.
IP topology map components 9 Circular The Circular layout distributes all nodes in a circle, with equal spacing between each neighbor node. Free Form This layout is the one you customize by repositioning the nodes on the map. Selecting a topology map layout To change the topology layout, complete the following steps. 1. Select one of the following view types from the view list on the Product List toolbar. • • • • L2 Topology Ethernet Fabrics IP Topology VLAN Topology 2.
9 IP topology map components FIGURE 188 Topology Display dialog box 3. Select one of the following topology layouts in the Layout area. • • • • • • Organic Orthogonal Orthogonal (Merge Lines) Hierarchical Circular Free Form 4. Click Recompute Layout Now. The Management application redraws the Topology Map. 5. Click OK on the Topology Display dialog box. Creating a customized layout You can create one customized layout for each group node in each topology view.
IP topology map components 9 a. Use Ctrl + click to select one or more nodes or click in an empty part of the topology and drag a box around the nodes you want to move. b. Select one of the highlighted nodes and drag the selected nodes to a new position on the map. 3. Repeat step 2 until you have repositioned all nodes. Navigation to another view topology or tab or exiting the application automatically saves your changes.
9 IP topology map components Device_One_IP_Address|Interface_Name Device_Two_IP_Address|Interface_Name where Device_One_IP_Address is the IP address for the device at one end of the link, Interface_Name the is the exact format returned by the ifName MIB variable for the device, and Device_Two_IP_Address is the IP address for the device at the other end of the link. 3. Save and close the topology_data.txt file. The customized topology links display during the next L2 neighbor collection for the devices.
IP topology map components 9 • To specify a color based on values of cyan, magenta, yellow, and black, click the CMYK tab. Specify the values for cyan, magenta, yellow, black, and alpha (0 to 255). c. Click OK on the Choose a Color dialog box. 3. Add an image to the background by selecting an image from the Image list. To import an image, refer to “Adding a background image to a map” on page 433. 4.
9 IP topology map components 3. Browse to the map image. 4. Click Open. The imported image displays in the Image list. 5. Set the background image mode by selecting one of the following from the Mode list: • Dynamic — Select when the background image is considered to be part of the displayed contents and not a decoration. In this mode, an object on a specific point of the image, stays on that specific point during zooming or scrolling on the topology.
IP topology map components 9 2. Browse to the location where you want to save the map image. 3. Enter a name for the map in the File Name field. 4. Select the export file type in the File of Type list. Options include: PNG, GIF, JPG, BMP, PDF, and EMF. 5. Click Save. Printing a map To print a Topology Map, complete the following steps. 1. Click the Print icon on the Topology Map tool bar. The Print dialog box displays. 2. To configure the page setup, click Page on the Print dialog box.
9 Port actions m. Enter a footer in the Text field. n. Select a color for the footer from the Footer Color list. o. Select a color for the title from the Text Color list. p. Enter a title in the Text area. q. Enter the font size in the Font size field. r. Click OK on the Print Options dialog box. 6. Click Print. The Print dialog box displays. 7. Select a printer from the Name list. 8. Click OK on the Print dialog box. 9. Click the close (X) button on the Print dialog box.
Port actions 9 Disabling port actions To disable port actions, complete the following steps. 1. Select one of the following view types from the view list on the Product List toolbar. • • • • • Network Object IP Topology L2 Topology Ethernet Fabrics VLAN Topology 2. Right-click the device in the Product List and select Properties. The Device_Name Properties dialog box displays. 3. Click the Port tab. 4. Select Disable from the Port Actions list. 5. Click OK to close the dialog box.
9 Port actions 1. Select one of the following view types from the view list on the Product List toolbar. • • • • • Network Object IP Topology L2 Topology Ethernet Fabrics VLAN Topology 2. Right-click the device in the Product List and select Properties. The Device_Name Properties dialog box displays. 3. Click the Port tab. 4. Select one of the following from the Performance list. • Real Time Graph/Table • Historical Graph/Table The Real Time Graph/Table or Historical Graph/Table dialog box displays.
Chapter 10 MRP Topology In this chapter • MRP Topology overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Viewing a MRP Topology map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Viewing a MRP ring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Configuring the application to show a dashed line . . . . . . . . . . . . . . . . . . . • Selecting a topology map layout. . . . . . . . . . . . . . .
10 Viewing a MRP Topology map You can use the CLI Configuration Manager to deploy MRP configurations to devices. You can also configure MRP using the device CLI. You can use the Element Manager to access the device or go directly to the device CLI. You must enable the MRP trap on the devices so that the Management application can monitor MRP ring status. For more information about MRP rings and configuration instructions, refer to your hardware’s configuration guide.
Viewing a MRP ring 10 When you select a device on the Topology Map, the application highlights the device in the Product List. Viewing a MRP ring To view a MRP ring, click a ring in the Product List. The selected ring displays in the Topology Map. FIGURE 191 MRP Topology dialog box MRP Topology maps are comprised of nodes (rings) and connections (devices). Table 43 displays the basic elements included in a MRP topology map.
10 Viewing a MRP ring TABLE 43 MRP Topology map elements Element Description The port is in a blocking state or discarding. link with block MRP is disabled on the port. link with solid black circle # or # / # The forwarding or receiving port number of slot/port number. To make the forwarding and receiving port number data visible on the map, you must enable Link Information Visibility (default is disabled) on the MRP Topology Options dialog box.
Configuring the application to show a dashed line • • • • • • 10 Options button. Use to configure topology options. Fit Window icon. Use to scale the map to fit within the Topology Map area. Actual Size icon. Use to scale the map to fit within the Topology Map area. Zoom In icon. Use to zoom in on the Topology Map. Zoom Out icon. Use to zoom out on the Topology Map. Export icon. Use to export the topology to a PNG file. For export instructions, refer to “Exporting the topology” on page 434.
10 Selecting a topology map layout • Organic The Organic layout distributes the nodes evenly, makes connection lengths uniform, minimizes criss-crossing of connections, and tries to prevent nodes from touching each other. • Hierarchical The Hierarchical layout is best for a complex map. This layout might have a start point and end point, with some overall flow between those points.
Selecting a topology map layout 10 • Self Organizing The Self Organizing layout distributes nodes and connections evenly on the display area in a linear layout. • Circular The Circular layout distributes all nodes in a circle, with equal spacing between each neighbor node.
10 Creating a customized layout • Saved This layout is the one you customized by repositioning the nodes on the map. If you have not customized the layout, this Saved option is disabled. Also, if you select the Saved Layout Preferred check box on the Topology Options dialog box, this layout takes precedence over the default layout. The Management application redraws the MRP Topology map. For more information about layout types, refer to “Topology map layout” on page 426.
Customizing the MRP Topology map 10 3. Repeat step 2 until you have repositioned all nodes. 4. Click Save on the MRP Topology map toolbar to retain the changes you made. Customizing the MRP Topology map To customize the MRP Topology map, complete the following steps. 1. Click Options on the MRP Topology map tool bar. The MRP Topology Options dialog box displays. FIGURE 192 Topology Options dialog box 2. Change the background color by completing the following steps: a.
10 Refreshing MRP Topology data 7. Click the Layout row and select the layout you want from the list. 8. Select the Saved Layout Preferred check box to set the customized layout as the default for the topology group. This parameter supersedes the Layout parameter. If you select this parameter, the Saved layout displays even if a different layout is indicated in the Layout parameter. 9. Click Close on the MRP Topology Options dialog box.
Viewing MRP properties • • • • • Ring Name — The MRP ring name. • • • • Secondary Port Type — The secondary port type (Regular or Tunnel). 10 Role — The role (Master or Member) of the device. Secondary Port — The secondary port of the device. Secondary Port Active — The port number receiving RHPs. Secondary Port State — The state (Pre-forwarding, Forwarding, Blocking, or Disabled) of the secondary port. State — Whether MRP is enabled or disabled on the device.
10 450 Viewing MRP properties Brocade Network Advisor IP User Manual 53-1003153-01
Chapter 11 Call Home In this chapter • Call Home overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Viewing Call Home configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Showing a Call Home center. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Hiding a Call Home center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Editing a Call Home center . . . . . . . . . . . . . . .
11 Call Home overview Call Home notification allows you to configure the Management application server to automatically send an e-mail alert or dial in to a support center to report system problems on specified devices (Fabric OS, IronWare, and Network OS switches, routers, and directors). If you are upgrading from a previous release, all of your Call Home settings are preserved.
Viewing Call Home configurations 11 Call Home allows you to perform the following tasks: • Assign devices to and remove devices from the Call Home centers. • Define filters from the list of events generated by Fabric OS, IronWare, and Network OS devices. • Edit and remove filters available in the Call Home Event Filters table. • Apply filters to and remove filters from the devices individually or in groups.
11 Viewing Call Home configurations The Call Home dialog box contains the following fields and components: • Products List — Displays all discovered products. The list allows for multiple selections and manual sorting of columns. This list displays the following information: Product Icon — The status of the products’ manageability. Name — The name of the product. IP Address — The IP address (IPv4 or IPv6 format) of the product. Node WWN — The node world wide name of the product.
Viewing Call Home configurations 11 • Left arrow button (bottom) — Click to remove the selected event filter (refer to “Removing all event filter from a Call Home center” on page 470 or “Removing an event filter from a device” on page 471) from the selected Call Home center or product. Disabled when no event filter, product, or Call Home center is selected in the Call Home Centers list.
11 Showing a Call Home center Showing a Call Home center To show a Call Home center, complete the following steps. 1. Select Monitor > Event Notification > Call Home. The Call Home dialog box displays. 2. Click Show/Hide Centers (beneath the Call Home Centers list). The Centers dialog box displays with a predefined list of Call Home centers (Figure 194). FIGURE 194 Centers dialog box 3. Select the check boxes of the Call Home centers you want to display. Clear the check box to hide the Call Home center.
Editing a Call Home center 11 Editing a Call Home center To edit a Call Home center, select from the following procedures: • Editing the IBM Call Home center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Editing an e-mail Call Home center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Editing the EMC Call Home center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Editing the HP LAN Call Home center. . . . . . . . . . . . . . . . . . . . . . . . . .
11 Editing a Call Home center 8. Enter how often you want to retry the heartbeat interval in the Retry Interval field. The default is 10 seconds. 9. Enter the maximum number of retries in the Maximum Retries field. The default is 3. 10. Enter the primary phone number or extension of the Call Home center in the Call Home Center - Primary Connection field. 11. Enter the backup phone number or extension of the Call Home center in the Call Home Center - Backup Connection field. 12.
Editing a Call Home center 11 FIGURE 196 Configure Call Home Center dialog box (Brocade, IBM, NetApp, or Oracle E-mail option) 4. Make sure the Call Home center type you selected displays in the Call Home Centers list. If the Call Home center type is incorrect, select the correct type from the list. 5. Select the Enable check box to enable this Call Home center. 6. Enter your contact name in the Customer Details - Name field. 7. Enter your company name in the Customer Details - Company field. 8.
11 Editing a Call Home center 16. Enter an e-mail address in the E-mail Notification Settings - Send To Address field. For Brocade E-mail Call Home centers, enter callhomeemail@brocade.com. 17. Click Send Test to test the mail server. The selected Call Home center must be enabled to test the mail server. A faked event is generated and sent to the selected Call Home center. You must contact the Call Home center to verify that the event was received and in the correct format.
Editing a Call Home center - Source — Details about the product. Includes the following data: - Event Time Event Severity Event Reason Code FRU Code/Event Type Event Description Event Data — Information about the triggered event.
11 Editing a Call Home center Editing the EMC Call Home center To edit an EMC Call Home center, complete the following steps. 1. Select Monitor > Event Notification > Call Home. The Call Home dialog box displays. 2. Select the EMC Call Home center you want to edit in the Call Home Centers list. 3. Click Edit Centers (beneath the Call Home Centers list). The Configure Call Home Center dialog box displays (Figure 197). FIGURE 197 Configure Call Home Center dialog box (EMC option) 4.
Editing a Call Home center 11 13. Click OK. The Call Home dialog box displays with the Call Home center you edited highlighted in the Call Home Centers list. 14. Click OK to close the Call Home dialog box. Editing the HP LAN Call Home center To edit an HP LAN Call Home center, complete the following steps. 1. Select Monitor > Event Notification > Call Home. The Call Home dialog box displays. 2. Select the HP LAN Call Home center you want to edit in the Call Home Centers list. 3.
11 Enabling a Call Home center 8. Click Send Test to test the address. The selected Call Home center must be enabled to test the IP address. A faked event is generated and sent to the selected Call Home center. You must contact the Call Home center to verify that the event was received and in the correct format. NOTE The HP LAN Call Home alert displays the directory separation characters with a double backslash (\\) instead of a single backslash (\). 9. Click OK to close the “Test Event Sent” message.
Testing the Call Home center connection 11 Testing the Call Home center connection Once you add and enable a Call Home center, you should verify that Call Home is functional. To verify Call Home center functionality, complete the following steps. 1. Select Monitor > Event Notification > Call Home. 2. Click Edit Centers (beneath the Call Home Centers list). The Configure Call Home Center dialog box displays. 3. Select the Call Home center you want to check in the Call Home Centers list. 4.
11 Viewing Call Home status Viewing Call Home status You can view Call Home status from the main Management application window or from the Call Home Notification dialog box. The Management application enables you to view the Call Home status at a glance by providing a Call Home status icon on the status bar. Table 45 illustrates and describes the icons that indicate the current status of the Call Home function.
Assigning a device to the Call Home center 11 Assigning a device to the Call Home center Discovered devices (switches, routers, and directors) are not assigned to a corresponding Call Home center automatically. You must manually assign each device to a Call Home center before you use Call Home. To assign a device or multiple devices to a Call Home center, complete the following steps. 1. Select Monitor > Event Notification > Call Home. The Call Home dialog box displays. 2.
11 Defining an event filter 3. Click the left arrow button. A confirmation message displays. 4. Click OK. All devices assigned to the selected Call Home center display in the Products List. Any assigned filters are also removed. 5. Click OK to close the Call Home dialog box. Defining an event filter To define an event filter, complete the following steps. 1. Select Monitor > Event Notification > Call Home. The Call Home dialog box displays. 2. Click Add beneath the Call Home Event Filter list.
Assigning an event filter to a Call Home center 11 Assigning an event filter to a Call Home center Event filters allow Call Home center users to log in to a Management server and assign specific event filters to the devices. This limits the number of unnecessary or “acknowledge” events and improves the performance and effectiveness of the Call Home center. You can only select one event filter at a time; however, you can assign the same event filter to multiple devices or Call Home centers.
11 Overwriting an assigned event filter Overwriting an assigned event filter A device can only have one event filter at a time; therefore, when a new filter is applied to a device that already has a filter, you must confirm the new filter assignment. To overwrite an event filter, complete the following steps. 1. Select Monitor > Event Notification > Call Home. The Call Home dialog box displays. 2. Select the event filter you want to apply in the Call Home Event Filters list.
Removing an event filter from a device 11 Removing an event filter from a device To remove an event filter from a device, complete the following steps. 1. Select Monitor > Event Notification > Call Home. The Call Home dialog box displays. 2. Choose one of the following options in the Call Home Centers list: • Right-click a device to which the event filter is assigned and select Remove Filter. • Select an event filter assigned to a device and click the left arrow button.
11 472 Searching for an assigned event filter Brocade Network Advisor IP User Manual 53-1003153-01
Chapter 12 Third-party tools In this chapter • About third-party tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Starting third-party tools from the application . . . . . . . . . . . . . . . . . . . . . . • Launching a Telnet session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Launching HCM Agent. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Adding a tool . . . . . . . . . . . . . . . . . .
12 Launching a Telnet session 1. Select the device. 2. Use one of the following techniques: • Select Tools > Product Menu > Tool_Name. • Select Tools > Tool_Name. • Right-click the device, and select the tool from the menu. If the third-party tool is a web-based application, you must enter the IP address of the applications server as a parameter to be able to open the application.
Launching HCM Agent 12 1. Select a device. 2. Click the Element Manager icon on the toolbar. The Element Manager displays. Launching HCM Agent Use Fabric OS HCM Agent to enable and manage Fabric OS HBAs. You can open HCM Agent directly from the application. For more information about HCM Agent, refer to the HCM Agent Administrator’s Guide. For more information about Fabric OS HBAs, refer to the documentation for the specific device.
12 Entering the server IP address of a tool FIGURE 199 Define Tools dialog box 4. Type the tool’s name in the Tool Name field as you want it to appear on the Tools menu. 5. Type or browse to the path of the executable file in the Path field. 6. Type or browse to the path of the folder that you want to set as your working folder in the Working Folder field. 7. Click Add to add the tool. The Setup Tools dialog box displays with the new tool added to the Tools Menu Item table.
Adding an option to the Tools menu 12 NOTE You must click Edit before clicking OK; otherwise, your changes will be lost. 6. Click OK to save your work and close the Setup Tools dialog box. Adding an option to the Tools menu You can add third-party tools to the Tools menu which enables you to launch tools directly from the application. To add a option to the tools menu, complete the following steps. 1. Select Tools > Setup. The Setup Tools dialog box displays. 2. Click the Tools Menu tab.
12 Changing an option on the Tools menu The new tool displays in the Tool Menu Items table. NOTE You must click Add before clicking OK; otherwise, the new menu option is not created. 8. Click OK to save your work and close the Setup Tools dialog box. The tool you configured now displays on the Tools menu. Changing an option on the Tools menu You can edit parameters for third-party tools that display on the Tools menu. To edit a option to the tools menu, complete the following steps. 1.
Adding an option to a device’s shortcut menu 12 If the tool is not being utilized, no confirmation message displays. 5. Click Update to remove the tool. 6. Click OK to save your work and close the Setup Tools dialog box. Adding an option to a device’s shortcut menu You can add an option to a device’s shortcut menu. To add an option to the device’s shortcut menu, complete the following steps. 1. Select Tools > Setup. The Setup Tools dialog box displays. 2. Click the Product Menu tab.
12 Changing an option on a device’s shortcut menu 11. Click OK to save your work and close the Setup Tools dialog box. Changing an option on a device’s shortcut menu You can change the parameters for a tool that displays on a device’s shortcut menu. To edit an option to the device’s shortcut menu, complete the following steps. 1. Select Tools > Setup. The Setup Tools dialog box displays. 2. Click the Product Menu tab. The Product Popup Menu Items table displays all configured shortcut menu options. 3.
Removing an option from a device’s shortcut menu 12 Removing an option from a device’s shortcut menu You can remove a tool that displays on a device’s shortcut menu. To remove an option to the device’s shortcut menu, complete the following steps. 1. Select Tools > Setup. The Setup Tools dialog box displays. 2. Click the Product Menu tab. The Product Popup Menu Items table displays all configured menu options. 3. Select the menu item you want to remove in the Product Popup Menu Items table. 4.
12 482 Removing an option from a device’s shortcut menu Brocade Network Advisor IP User Manual 53-1003153-01
Chapter 13 Server Management Console In this chapter • Server Management Console overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Services tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Ports tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • AAA Settings tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Restore tab. . . .
13 Services tab Launching the SMC on Linux NOTE The Server Management Console is a graphical user interface and should be launched from the XConsole on Linux systems. Perform the following steps to launch the Server Management Console on Linux systems. 1. On the Management application server, go to the following directory: Install_Directory/bin 2. Type the following at the command line: .
Services tab 13 3. Review the following information for each available service. • • • • Name — The name of the server; for example, FTP Server or Database Server. Process Name — The name of the process; for example, postgres.exe (Database Server). Status — The status of the service; for example, started or stopped. Start Time — The date and time the service started. The Start Time for Service Location Protocol displays as ‘Not Available’. 4. Click Close to close the Server Management Console.
13 Services tab Starting all services NOTE The Start button restarts running services in addition to starting stopped services which causes client-server disconnect. To start all services, complete the following steps. 1. Launch the Server Management Console. 2. Click the Services tab. 3. Click Start to start all services. NOTE If the server is configured to use an external FTP server, the Server Management Console does not attempt to start the built-in FTP service. 4.
Ports tab 13 6. Select the database user name for which you want to change the password in the User Name field. Options include dcmadmin and dcmuser. Changing the dcmadmin password requires all Management application services, except for the database server, to be stopped and then re-started. Changing the dcmuser password requires all ODBC remote client sessions to be restarted. 7. Enter your current password in the Old Password field. 8.
13 AAA Settings tab AAA Settings tab Authentication enables you to configure an authentication server and establish authentication policies. You can configure the Management application to authenticate users against the local database (Management application server), an external server (RADIUS, LDAP, CAC or TACACS+), or a switch. Authentication is configured to the local database by default.
AAA Settings tab 13 1. Select the AAA Settings tab. 2. Select Radius Server from the Primary Authentication list. 3. Add or edit a Radius server by referring to “Configuring a Radius server” on page 489. 4. Rearrange the Radius servers in the table by selecting a server and click the Up or Down button to move it. 5. Delete a Radius server by selecting the server and click Delete. 6. Test the established active connection with the Radius server by clicking Test.
13 AAA Settings tab FIGURE 202 Add or Edit Radius Server 2. Enter the radius server’s IP address in the IP Address field. 3. Enter the TCP port, if necessary, used by the Radius server in the TCP Port field. Default is 1812. 4. Select the authentication policy (PAP or CHAP) from the Authentication Type field. Default is CHAP. 5. Enter the shared secret in the Shared Secret and Confirm Secret fields. 6.
AAA Settings tab 13 If you configure the external LDAP server as the primary authentication server, make the following preparations first: • Make sure that the external LDAP server and its user accounts have been properly configured (refer to “LDAP server configuration” on page 502). For example, you must define roles and areas of responsibility (AOR) in the external server to match the Management application roles and AOR.
13 AAA Settings tab NOTE You can add any number of LDAP servers to the configuration. 4. Rearrange the LDAP servers in the table by selecting a server and clicking the Up or Down button to move it. 5. Delete a LDAP server by selecting the server and clicking Delete. 6. Test the established active connection with the LDAP server by clicking Test. The Test Authentication dialog box displays. 7. Enter your user name and password and click OK.
AAA Settings tab 13 • LDAP Authorization Use to assign roles and AORs to user groups and not to individual users. When roles and AORs are assigned to a group, all AD users in the group can obtain the roles and AORS assigned to the group. To assign roles and AORs to an AD Group, refer “Assigning roles and AORs to an AD group” on page 506. You do not need to create users in the local database. 11. Click Apply to save the configuration.
13 AAA Settings tab Default is 3 seconds. 8. Enter the number of attempts to be made to reach a server before assuming it is unreachable in the Attempts field. Default is 3 attempts. 9. Click OK to return to step 4 on the AAA Settings tab. Configuring TACACS+ server authentication If you are using a TACACS+ server for authentication, make the following preparations first: • Make sure that the server you want to use is on the network that the Management application manages.
AAA Settings tab 13 To display the authentication audit trail, refer to “Displaying the client authentication audit trail” on page 499. 12. Click Close to close the Server Management Console. Confirm authentication and authorization by logging into the Management application server (refer to “Logging into a server from the server machine” on page 3). Configuring a TACACS+ server To add or edit a TACACS+ server, complete the following steps. 1.
13 AAA Settings tab • Attempts — The number of attempts made to reach a server before determining it is unreachable. Default is 3. Configuring Common Access Card authentication NOTE Common Access Card (CAC) authentication does not support SMI Agent and launch-in-context dialog boxes. NOTE CAC authentication is only supported on Windows systems.
AAA Settings tab 13 1. Select the AAA Settings tab. 2. Select CAC from the Primary Authentication list. 3. Set the authorization preference by selecting one of the following options from the Authorization Preference list: • Local Database — Uses the AD server for authentication and the Management application local database for authorization. • Primary Authentication Server — Uses the AD server for authentication and authorization.
13 AAA Settings tab To configure switch authentication, complete the following steps. 1. Select the AAA Settings tab. 2. For Primary Authentication, select Switch. 3. Click Add. 4. Enter the switch IP address and click OK. You can add up to three switches. 5. Select a switch and click the Up or Down button to set the fall back order. 6. Select a switch and click Delete to remove a switch from the list. 7.
AAA Settings tab 13 • None 5. Click Test. The Test Authentication dialog box displays. 1. In the User ID field, choose one of the following options: • To authenticate a user account against the current domain, enter your user name. • To authenticate a user account against a different domain, enter Domain\User_Name. 2. Enter your password in the Password field and click OK. Test verifies your user ID and password on the Windows domain and verifies user privileges on the Management application server. 3.
13 Radius server configuration The defaults are Administrator and password, respectively. The Authentication Audit Trail log displays. The audit trail shows user names that have attempted to log in to the Management application, and changes to user authentication. 4. Click the Client to Server Authentication tab to view the client to server authentication status. 5. Click the Authentication Settings Changes tab to view the previous authentication changes.
Radius server configuration 13 1. Open the user configuration file (such as users.conf) a text editor (such as Notepad). 2.
13 LDAP server configuration 6. Save and close the file. LDAP server configuration NOTE You must have User Management Read and Write privileges to map roles and AORs to Active Directory (AD) groups. NOTE You must configure a Lightweight Directory Access Protocol (LDAP) server as the primary authentication server and set Authentication Server Groups as the authorization preference (refer to “Configuring LDAP server authentication” on page 490).
LDAP server configuration 13 10. Assign a new password with at least one special character and one number and click OK.. 11. Close the Active Directory Users and Computers dialog box. Assigning an AD user to an AD group To assign a new group in Active Directory Users and Computers, complete the following steps. For more information, click F1 for help or refer to www.microsoft.com 1. Open the Active Directory Users and Computers console.
13 LDAP server configuration 9. Create the NmAors attribute by completing the following steps. a. Enter NmAors in the Common Name field. b. Enter NmAors in the LDAP Display Name field. c. Enter a unique object identifier in the Unique x500 Object ID field. d. Enter a description of the attribute in the Description field. e. Select Case Insensitive String in the Syntax list. f. Click OK. 10.
LDAP server configuration 13 4. Type mmc and press Enter. 5. Select File > Add/Remove Snap-in. The Add/Remove Snap-in dialog box displays. 6. Click Add. The Add Standalone Snap-in dialog box displays. 7. Select Active Directory Schema from the Available standalone snap-ins list and click Add. 8. Click Close on the Add Standalone Snap-in dialog box. The Active Directory Schema displays in the Add/Remove Snap-in dialog box. 9. Click OK on the Add/Remove Snap-in dialog box. 10.
13 LDAP server configuration Assigning roles and AORs to an AD group Using Authentication Server Groups, you assign users to groups within the Authentication Server Groups server, and assign roles and AORs to the groups within the Management application. To assign roles and AORs to an AD group, complete the following steps. 1. Select Server > Users. The Users dialog box displays. 2. Click the Authentication Server Groups tab. 3.
LDAP server configuration 13 1. Select Server > Users. The Users dialog box displays. 2. Click the Authentication Server Groups tab. 3. Click Fetch. The Fetch AD Group dialog box displays. FIGURE 205 Fetch AD Group dialog box 4. Select the LDAP server network address from the Network Address list. 5. Enter the TCP port number in the TCP Port field, if necessary. The default TCP port number is 389 if security is not enabled. The default TCP port number is 636 if security is enabled. 6.
13 Restore tab The Active Directory Groups table displays with all AD groups available in the specified LDAP server, as well as any AD groups already mapped in the Management application server (local database). To assign or remove roles and AORs, refer to “Assigning roles and AORs to an AD group” on page 506 or “Removing roles and AORs from an AD group” on page 506. 12. Click Close to close the Users dialog box.
Technical Support Information tab 13 4. Click Browse to select the path (defined in the Output Directory field on the Options dialog box - Backup pane) to the database backup location. 5. Click Restore. Upon completion, a message displays the status of the restore operation. Click OK to close the message and the Server Management Console. For the restored data to take effect, re-launch the Configuration Wizard using the instructions in “Launching the Configuration Wizard” on page 6.
13 HCM Upgrade tab 5. Click OK. HCM Upgrade tab The HCM Upgrade tab enables you to upgrade the Management application to include a new version of HCM. Upgrading HCM on the Management server To upgrade HCM, complete the following steps. 1. Select the HCM Upgrade tab. FIGURE 206 HCM Upgrade tab 2. Click Browse to select the HCM installation folder location (for example, C:\Program Files\BROCADE\Adapter on Windows systems and /opt/brocade/adapter on Linux systems). 3. Click Upgrade. 4. Click Close.
SMI Agent Configuration Tool 13 • CIMOM tab — enables you to configure the CIMOM server port, the CIMOM Bind Network Address, and the CIMOM log. • Certificate Management tab — enables you to import Client and Indication certificates, export Server certificates, as well as view and delete current certificates. • Summary tab — enables you to view the CIMOM server configuration and current configuration.
13 SMI Agent Configuration Tool FIGURE 208 SMIA Configuration Tool dialog box Launching the SMIA configuration tool on Unix NOTE All Management application services must be running before you can log into the SMIA Configuration Tool. To start the Management application services, click Start on the Server Management Console dialog box. Perform the following steps to launch the Server Management Console on Unix systems. 1.
SMI Agent Configuration Tool 13 Launching a remote SMIA configuration tool To launch a remote SMIA configuration tool, complete the following steps. 1. Open a web browser and enter the IP address of the Management application server in the Address bar. If the web server port number does not use the default (443 if is SSL Enabled; otherwise, the default is 80), you must enter the web server port number in addition to the IP address. For example, IP_Address:Web_Server_Port_Number.
13 SMI Agent Configuration Tool By default, the Management application SMI Agent is configured to advertise itself as a Service Agent (SA). The advertised SLP template shows its location (IP address) and the WBEM Services it supports.
SMI Agent Configuration Tool 13 ,(RegisteredProfilesSupported=SNIA:SMI-S,DMTF:Profile Registration,SNIA:FC HBA,DMTF:LaunchInContext,SNIA:Fan,SNIA:Fabric,SNIA:Switch,DMTF:Role Based Authorization,SNIA:Power Supply,SNIA:Sensors,SNIA:Server) • slptool findattrs service:wbem:http://IP_Address:Port NOTE Where IP_Address:Port is the IP address and port number that display when you use the slptool findsrvs service:wbem command.
13 SMI Agent Configuration Tool 4. Type # Install_Home/cimom/bin/slptool findsrvs service:wbem and press Enter to verify the SLP service is advertising its WBEM services. 5. Choose one of the following options to verify the SLP service is advertising the WBEM SLP template over its configured client protocol adapters. • Type # Install_Home/cimom /bin/slptool findattrs service:wbem:http://IP_Address:Port and press Enter.
SMI Agent Configuration Tool 13 Home tab The Home tab of the SMIA Configuration Tool enables you to access the following Management application features or information: • Fabric Discovery — enables you to view discovered fabrics, discover new fabrics, as well as edit the default SNMP configuration. For step-by-step instructions, refer to “VCS fabric discovery” on page 43. • Host Discovery — enables you to view discovered hosts, discover new hosts, as well as edit the default SNMP configuration.
13 SMI Agent Configuration Tool Authentication tab NOTE You must have User Management Read and Write privileges to make changes on the CIMOM tab. For more information about privileges, refer to “User Privileges” on page 1423. The Authentication tab enables you to configure mutual authentication for Client and Indication using a secure protocol.
SMI Agent Configuration Tool 13 4. Click Apply. NOTE Changes on this tab take effect after the next CIMOM server restart. NOTE You can only restart the server using the Server Management Console (Start > Programs > Management_Application_Name 12.X.X > Server Management Console). 5. Click Close to close the SMIA Configuration Tool dialog box. Configuring CIMOM server authentication CIMOM server authentication is the authentication mechanism between the CIM client and the CIMOM Server.
13 SMI Agent Configuration Tool CIMOM tab NOTE You must have SAN - SMI Operation Read and Write privileges to view or make changes on the CIMOM tab. For more information about privileges, refer to “User Privileges” on page 1423. The CIMOM tab enables you to configure the CIMOM server port, the CIMOM Bind Network Address, and the CIMOM log. Configuring the SMI Agent port number To configure the SMI Agent port number, complete the following steps. 1. Click the CIMOM tab. FIGURE 210 CIMOM tab 2.
SMI Agent Configuration Tool 13 4. Click Apply. NOTE Changes on this tab take effect after the next CIMOM server restart. NOTE You can only restart the server using the Server Management Console (Start > Programs > Management_Application_Name 12.X.X > Server Management Console). If you disabled SSL, a confirmation message displays. Click Yes to continue. 5. Click Close to close the SMIA Configuration Tool dialog box.
13 SMI Agent Configuration Tool Configuring the CIMOM log NOTE You must have SAN - SMI Operation Read and Write privileges to view or make changes on the CIMOM tab. For more information about privileges, refer to “User Privileges” on page 1423. To configure the CIMOM log, complete the following steps. 1. Click the CIMOM tab. 2. Select a log category from the Log Level list to start logging support data for the server. Options include the following: • Off — select to turn off logging support data.
SMI Agent Configuration Tool 13 Certificate Management tab NOTE You must have SMI Operation Read and Write privileges to view or make changes on the Certificate Management tab. For more information about privileges, refer to “User Privileges” on page 1423. The Certificate Management tab enables you to manage your CIM client and Indication authentication certificates.
13 SMI Agent Configuration Tool 5. Click Import. The new certificate displays in the Certificates list and text box. If the certificate location is not valid, an error message displays. Click OK to close the message and reenter the full path to the certificate location. If you did not enter a certificate name, an error message displays. Click OK to close the message and enter a name for the certificate. If the certificate file is empty or corrupted, an error message displays.
SMI Agent Configuration Tool 13 Deleting a certificate NOTE You must have SMI Operation Read and Write privileges to view or make changes to the Certificate Management tab. For more information about privileges, refer to “User Privileges” on page 1423. To delete a certificate, complete the following steps. 1. Click the Certificate Management tab. 2. Select Client or Indication from the Authentication list. The appropriate certificates display in the Certificates list. 3.
13 SMI Agent Configuration Tool 1. Click the Summary tab. FIGURE 212 Summary tab 2. Review the summary. NOTE When the CIMOM server is stopped, the server configuration information does not display on the Summary tab. The following information is included in the summary. 526 Field/Component Description Client Mutual Authentication Displays whether or not the client mutual authentication is enabled or disabled for the Server Configuration and the Current Configuration.
SMI Agent Configuration Tool 13 Field/Component Description Log Level Displays the log level for the Server Configuration and the Current Configuration. Options include the following: • 10000 — Off • 1000 — Severe • 900 — Warning • 800 — Info (default) • 700 — Config • 500 — Fine • 400 — Finer • 300 — Finest • 0 — All Managed Ports Displays the number of managed ports. For more information about managed port count rules, refer to “Managed count” on page 35.
13 528 SMI Agent Configuration Tool Brocade Network Advisor IP User Manual 53-1003153-01
Chapter 14 Wireless Management In this chapter • Wireless management overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Wireless devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Wireless device discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Wireless devices on the dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Port groups. . . . . . . . . . . . . . . . . .
14 Wireless devices Wireless devices The Management application supports the following models of wireless controllers. TABLE 46 Wireless controller models Device Name Firmware required Aruba 3200XM ArubaOS_MMC_6.3.1.3_42233 Aruba 3400XM ArubaOS_MMC_6.3.1.3_42233 Aruba 3600XM ArubaOS_MMC_6.3.1.3_42233 Aruba 7210 ArubaOS_MMC_6.3.1.3_42233 Aruba 7220 ArubaOS_MMC_6.3.1.3_42233 Aruba 7240 ArubaOS_MMC_6.3.1.3_42233 RFS 4000 Mobility 5.3 or later RFS 6000 Mobility 5.
Wireless device discovery 14 Wireless device discovery The Management application enables you to discover individual wireless devices or multiple wireless devices using a discovery profile. NOTE Wireless access points in adaptive mode cannot be discovered by the Management application.
14 View management You can see all port groups; however, under each group, you can only see devices that belong to your area of responsibility (AOR). You can only see user-defined port groups that belong to your AOR.
Element Manager 14 Element Manager NOTE Wireless access points in adaptive mode do not display in the Management application. The Management application enables you to perform additional configuration of the wireless devices using an Element Manager (web-based graphical user interface (GUI)) or command line interface (CLI). The Element Manager (Brocade Mobility) is a software management application that allows full control of all managed features for the wireless devices in your IP network.
14 Element Manager If the device credentials do not match the credentials provided in discovery, the Element Manager login dialog box displays. Continue with step 2. 2. Enter your user name in the Username field. The default user name is admin. 3. Enter your password in the Password field. The default password admin123. 4. Click Login. The Element Manager displays. OR 1. Select a device in the Product List. 2. Select Configure > Element Manager > Web. The Element Manager login dialog box displays. 3.
Configuration repository and backup management 14 The Telnet session window displays. Configuration repository and backup management NOTE Requires Mobility 5.3 or later. Configuration repository and backup allows you to display each product configuration, including the name of the product, the version number of the configuration, the software release the product is running, and the product type, compare configurations, and backup configurations to the management server.
14 Cluster mode # you can pass either yes(1) or no(2) or stop the execution(3) # CLIConfigManager.ValueForConfirmationCLICommands=1 CLIConfigManager.ValueForConfirmationCLICommands.MinInt=1 CLIConfigManager.ValueForConfirmationCLICommands.MaxInt=3 CLIConfigManager.ValueForConfirmationCLICommands.IsDisplay=false 3. Save and close the file. Cluster mode A cluster is a set of wireless controllers working collectively to provide redundancy and load sharing.
Performance management 14 “Displaying VLANs in the VLAN view” on page 953 “Displaying VLANs by products” on page 955 Performance management NOTE Wireless access points in adaptive mode do not display in the Management application. Historical performance enables you to collect data from managed wireless devices. You can use the provided data collectors or create your own data collectors.
14 AP Products report AP Products report The AP Products report displays general and detailed configuration information about AP products that are under the management server. The information on the report comes from the software image version that is in the management application for that product. To ensure that the latest configuration information is in the management application, run the Discovery process or resynchronize the product.
AP Products report 14 The Detailed AP Products report contains the fields and components detailed in Table 49. TABLE 49 Detailed AP Products report Field/Component Description Status Whether the AP is online (green icon), offline (red icon), or pending adoption (gray icon). Name The device name used to identify AP. MAC Address The AP device MAC. Model The model of the AP. Serial Number The serial number of the AP. Firmware version The firmware level of the AP.
14 540 AP Products report Brocade Network Advisor IP User Manual 53-1003153-01
Chapter 15 VCS Management In this chapter • VCS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Logical chassis cluster operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Serial firmware update and activation for Network OS devices . . . . . . . . . • Support for Network OS VDX 2740 embedded switch . . . . . . . . . . . . . . . . • Network OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
15 VCS VCS mode types Beginning with Network OS 4.0, VCS mode encompasses two mode types: • Fabric cluster mode (shown in Figure 213)—The data path for nodes is distributed, but the configuration path is not distributed. Each node maintains its configuration database independently. • Logical chassis cluster mode (shown in Figure 214)—Both the data and configuration paths are distributed. The entire cluster can be configured from the principal node. Logical chassis mode requires Network OS 4.0 or later.
Logical chassis cluster operations 15 Ethernet Fabrics view management The Ethernet Fabrics view displays a map of the traffic for VCS devices on your network. To view the fabric members and Transparent Interconnection of Lots of Links (TRILL) connections for a fabric, double-click the fabric in the Product List. To display the topology map for Ethernet Fabrics, you must have the Main Display - Ethernet Fabric privilege. For more information about privileges, refer to “User Privileges” on page 1423.
15 Logical chassis cluster operations • If the cluster is configured with a virtual IP address after it is discovered by the Management application, the virtual IP address is collected and saved in the database for the next lazy polling or next adaptive collection. • If another switch becomes the principal switch, the Management application sets the cluster IP address to that of the new principal switch at the next lazy polling or next adaptive collection.
Logical chassis cluster operations 15 FIGURE 216 Discover Setup - IP dialog box before removal of node Figure 217 shows the Discover Setup - IP dialog box after the administrator has removed the node with the IP address of 172.26.5.130 from its logical chassis cluster. FIGURE 217 Discover Setup - IP dialog box after disabling the node from logical chassis cluster Figure 218 shows the Discover Setup - IP dialog box after The Management application has performed rediscovery.
15 Serial firmware update and activation for Network OS devices NOTE All cluster-specific configurations are lost during a cluster-mode change. On refresh collection, the Management application detects the mode change and retains all database entries related to the cluster. Serial firmware update and activation for Network OS devices With Network OS release 4.
Support for Network OS VDX 2740 embedded switch 15 Support for Network OS VDX 2740 embedded switch The Network OS VDX 2740 switch is a 10GB VDX, embedded Network OS switch module for IBM Pure System Chassis. The VDX 2740 switch gets discovered by the Management application in the same manner as any other device. Upon discovering this switch, the Management application registers as the Element Manager for the VDX 2740 switch.
15 VCS product groups VCS product groups The standalone Network OS switches and the VCS fabric are treated as a single Layer 2 (L2) switch for both static and dynamic product groups. The product group membership cannot contain fabric members. The standalone Network OS VDX switches are shown in Table 50. TABLE 50 Network OS-supported hardware Device name Firmware level required Network OS VDX 2730 10 Gbps connection blade v2.1.1_fuj Network OS VDX 2740 switch nos4.0.
Port profiles 15 Port profile VLAN profile QoS profile Security profile FIGURE 219 Port profile contents NOTE A port profile does not contain some of the interface-level configurations, such as LLDP, SPAN, LAG, and so on. AMPP characteristics Note the following points regarding the Automatic Migration of Port Profiles (AMPP) feature: • Port groups and port profiles are collections of network policies. The vNICs inherit these network policies. • Port profiles are associated with physical switches.
15 Port profiles • Associated — This state specifies that one or more MAC addresses have been associated with this port profile within the fabric. • Applied — This state indicates that the port profile is applied on the profiled port where the associated MAC address appears. Configuration of two different port profiles can coexist on a profiled port, but the application of the later port profile fails if there is a conflict.
Port profiles 15 Port profile configuration using the Management application You can manage MAC addresses and port profiles from the Port Profiles tab of the Fabric_Name Properties dialog box, as shown in Figure 220. FIGURE 220 Fabric_Name Properties dialog box — Port Profile tab Assigning MAC addresses to a port profile Use the Assign MACs dialog box to select discovered Media Access Control (MAC) addresses and assign them to the selected port profiles.
15 Port profiles FIGURE 221 Assign MACs dialog box 6. From the Source list, select Virtual Machine Managers or Switch Port Connectivity as the source of the discovered MAC address. 7. Select a discovered MAC address to assign to the port profile and click the right arrow button to add it to the Selected MACs list. 8. Click OK.
Port profiles 15 FIGURE 222 Assign Offline MACs dialog box 7. To manage offline MAC addresses, perform one of the following tasks: • To assign an offline MAC address to the selected, activated profile, enter the MAC address in the MAC list and click Add. Alternatively, select an offline MAC address from the MAC List and click Add to assign it to the Port Profile list. • To remove a MAC address from the MAC List, select it from the list and click Remove. • To select and import a CSV file, click Import.
15 Port profiles 5. Click Compare. The Profile Comparison Summary dialog box displays, as shown in Figure 223. NOTE A green circle icon in the comparison summary indicates a complete match to the MAC address on the target switch; a yellow triangle icon indicates a partial match. FIGURE 223 Profile Comparison Summary dialog box 6. Select a product from the Available Products with Profiles list and click one of the following match options as the comparison criteria.
Port profiles 15 • Name Match — Compares the original profile with the profile with the same name on the target switch. • Network Match — Finds a profile on the target switch to provide the same networking settings on the target switch. NOTE Select a column or multiple columns in the Comparison Summary list, as shown in Table 52, and click Remove to remove it as matching criteria. The Reference Profile column cannot be removed.
15 Port profiles TABLE 52 Profile Comparison Summary list (Continued) Field/Component Description QoS Settings • • • • • • • • ACL Settings FCoE Settings NOTE: FCoE sub-profiles can be applied on default port profiles only and are supported on Network OS version 2.1 and later. You can view the FCoE profile association on Network Advisor version 11.3.0 and later. • • • • • • • • • • • • Mode — The mode of Quality of Service (QoS) assigned to the port Flow Control — Non-DCB mode.
System Monitor support on Network OS VDX platforms 15 FIGURE 224 Deploy Port Profiles to Products dialog box 5. Select an available target from the Available Targets list and click the right arrow button to move the target selected for configuration deployment to the Selected Targets list. NOTE If a fabric is selected and moved in a VCS fabric, all members are moved to the Selected Targets list. Individual members of a VCS fabric can be added and removed from the Selected Targets list. 6. Click OK.
15 System Monitor support on Network OS VDX platforms • • • • • • • • • Fan — Configures fan settings Power — Configures power settings Temp — Displays the threshold for the temperature sensor component CID-card — Displays the threshold for the CID card component SFP — Displays the threshold for the small form factor pluggable (SFP) device compact-flash — Displays the threshold for the compact flash device MM — Displays the threshold for the management module LineCard — Displays the threshold for the lin
System Monitor support on Network OS VDX platforms 15 • Limit — Specifies the default CPU limit. When the limit is exceeded, System Monitor sends out a RASlog WARNING message. When usage returns below the limit, System Monitor sends a RASlog INFO message. Valid values range from 0 to 80 percent, and the default value is different for different systems. • Low_limit — Specifies a lower usage limit for memory as a percentage of available memory.
15 Ethernet fabric traceroute Interface error types Table 54 describes the interface counters that System Monitor monitors on external interfaces. TABLE 54 Interface errors monitored by System Monitor Interface error Description Port Fence support Threshold defaults CRC Align Errors The total number of frames received that had a length (excluding framing bits but including Frame Check Sequence (FCS) octets) of from 64 through 1518 octets.
Ethernet fabric traceroute 15 • Right-click the VM and select Diagnostics > Traceroute. • Right-click the VCS and select Diagnostics > Traceroute. The Traceroute dialog box displays (see Figure 225). The Source field displays the corresponding VM MAC addresses by default and the Destination field is blank. If you do not have the privilege to lauch traceroute, the following warning message displays: You do not have privilege to perform this operation. Click OK to close the warning message.
15 Ethernet fabric traceroute FIGURE 226 Select Source - Traceroute dialog box In the Select Source - Traceroute dialog box, you can either search from the Available MAC Addresses list or select a row containing the required source MAC address, VM name, or IP address and click OK. This list contains all the discovered port MAC addresses (host or device) connected to the VCS cluster. The format of the selected source address is displayed based on the conditions in the following table.
Ethernet fabric traceroute 15 4. Choose one of the following options: • Assign appropriate RBridge ID — Select this option to use Address Finder to identify the RBridge ID of the source. The Management application finds the RBridge ID on which the MAC address is learned. • Select RBridge ID — Select this option to select an RBridge ID from the list of the RBridge IDs currently present in the cluster.
15 Ethernet fabric traceroute 13. Enter a value with which to increment the source and destination port numbers on each repeated request in the Increment field. Valid values are from 0 through 1000. The default is 1. If you do not want to increment the port on each repeated request, enter 0. For example, if you configure the source port to 5, the destination port to 7, the repeat count to 5, and the increment ports to 5, the port numbers shown in Table 55 are sent on each traceroute request.
Ethernet fabric traceroute 15 • Outgoing Port: The port numbers in the path to the destination RBridge from the source RBridge. • Round Trip Delay: The round trip delay in microseconds. NOTE The round trip delay for the starting RBridge (edge) is always 0 microseconds for a successful trace as this represents a self-loop. • Status: Whether the traceroute succeeded or failed.
15 566 Ethernet fabric traceroute Brocade Network Advisor IP User Manual 53-1003153-01
Chapter 16 Host Management In this chapter • Host management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Supported adapters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • HCM software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Host adapter discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • VM Manager. . . . . . . . . . .
16 Supported adapters Supported adapters The following sections describe the supported adapter types: • “Host Bus Adapters” • “Converged Network Adapters” • “Fabric Adapters” Host Bus Adapters Table 56 describes the Fibre Channel Host Bus Adapters (HBAs) that provide reliable, high-performance host connectivity for mission-critical SAN environments. The supported HBAs are listed in Table 56.
Supported adapters 16 Converged Network Adapters Table 57 describes available Converged Network Adapters (CNAs) for PCIe x 8 host bus interfaces, hereafter referred to as CNAs. These adapters provide reliable, high-performance host connectivity for mission-critical SAN environments.
16 HCM software • HBA or Fibre Channel mode — This mode utilizes the Brocade Fibre Channel storage driver. An 8 or 16 Gbps Fibre Channel SFP transceiver can be installed for the port. The port provides Host Bus Adapter (HBA) functions on a single port so that you can connect your host system to devices on the Fibre Channel SAN. Ports with 8 Gbps SFP transceivers configured in HBA mode can operate at 2, 4, or 8 Gbps.
HCM software 16 HCM features Common HBA and CNA management software features include the following: • Discovery using the agent software running on the servers attached to the SAN, which enables you to contact the devices in your SAN. • Configuration management, which enables you to configure local and remote systems.
16 Host adapter discovery Host adapter discovery The Management application enables you to discover individual hosts, import a group of hosts from a CSV file, or import host names from discovered fabrics. The maximum number of host discovery requests that can be accepted is 1000. Host discovery requires HCM Agent 2.0 or later. ESXi host adapter discovery requires the vendor-specific HBA CIM provider to be installed on the ESXi host.
HCM and Management application support on ESXi systems 16 6. Click OK. The VMM discovery process begins. When complete, the vCenter server and all ESX and ESXi hosts managed by that vCenter display in the Host product tree. Editing a VM Manager The fields in the Edit VM Manager dialog box are identical to the fields in the Add VM Manager dialog box except for the Network Address field, which you cannot edit. 1. Click Edit on the Discover VM Managers dialog box. The Edit VM Manager dialog box displays. 2.
16 HCM and Management application support on ESXi systems • HCM Proxy Service CIM Indication Listener Port — This port is used to listen for CIM indications from ESXi hosts managed through HCM instances launched by the Management application. You can learn the value of these ports through the Port Status dialog box. • Fault Management CIM Indication Listener Port — This port is used to listen for CIM indications from ESXi hosts managed through the Management application’s host adapter discovery.
Adapter software 16 3. Select CIM server (ESXi only) as the Contact option. 4. (Optional) Select HTTP or HTTPS from the Protocol list. HTTPS is the default. 5. Click OK. Adapter software The Adapter Software dialog box allows you to perform the following tasks: • Select and import a driver file or delete existing drivers from the driver repository • Update the driver to the hosts NOTE For Linux and Solaris systems, you cannot upgrade to driver file version 3.0.3.0. You must upgrade to version 3.0.3.
16 Adapter software • Name — The name of the host. The first three digits indicate the host’s operating system; for example, WIN or LIN. • Operating System — The host operating system; for example, Microsoft Windows or Red Hat Linux. • Driver Version — The host’s current driver version. • Architecture — The host’s architecture; for example, 32-bit or 64-bit. 3. Select one or more hosts from the Selected Hosts list.
Adapter software 16 FIGURE 231 Driver Repository dialog box 2. Click Import on the Driver Repository dialog box. The Import Driver Repository dialog box displays. 3. Locate the driver file using one of the following methods: • Search for the file you want from the Look In list. • Enter the name of the image file you want to import in the File Name field. 4. Click Open. After the import completes, you see a message that the driver imported successfully. 5. Click OK.
16 Adapter software Importing a boot image into the repository Boot images are required for adapters that are shipped without a boot image or when it is necessary to overwrite images on adapters that contain older or corrupted boot image versions. 1. From the Management application menu bar, select Configure > Host > Adapter Software. 2. Click the Boot Image tab. The Boot Image Management dialog box, shown in Figure 232, displays. FIGURE 232 Boot Image Management dialog box 3.
Adapter software 16 6. Locate the boot image file using one of the following methods: • Search for the file you want from the Look In list. Boot image files version 2.0.0.0 and 2.1.0.0 are .zip files and other boot image files are .tar files. • Enter the name of the image file you want to import in the File Name field. 7. Click Open. After the import completes, you see a message that the boot image imported successfully.
16 Bulk port configuration The boot image is removed from the boot image repository. Backing up boot image files You can back up the boot image files from the repository using the Options dialog box. Refer to “Backup support” on page 594 for instructions. Bulk port configuration Use the Adapter Host Port Configuration dialog box to create and assign port-level configurations to either a single or multiple adapter ports at a time. You can save up to 50 port-level configurations.
Bulk port configuration 16 FIGURE 234 Configure Host Adapter Ports dialog box Adding a port configuration The Add Port Configuration dialog box allows you to create a maximum of 50 customized port configurations which you can then select and assign to ports. 1. Click Add on the Configure Host Adapter Ports dialog box. The Add Port Configuration dialog box, shown in Figure 235, displays.
16 Bulk port configuration FIGURE 235 Add Port Configuration dialog box 2. Enter a name for the port configuration in the Configuration Name field. A maximum of 128 alphanumeric characters is supported. 3. Configure at least one of the following port properties: - Port — Enable or disable the port. Enable is the default. - Target Rate Limiting — Enable the Target Rate Limiting feature to minimize congestion at the adapter port.
Bulk port configuration 16 Boot Speed — Set the port speed. Possible values are Auto Negotiate (to auto-negotiate the speed) and 1, 2, 4, 8, and 16 Gbps and unknown speeds. Boot Option — From the list, select one of the following: • Auto Discovered From Fabric — Enables Boot over SAN using boot LUN information stored in the fabric. This is the default setting. • First Visible LUN — Enables Boot over SAN from the first discovered LUN in the SAN. Bootup Delay — Enter a bootup delay value.
16 Adapter port WWN virtualization Editing a port configuration The Edit Port Configuration dialog box allows you to modify port configuration parameters that were configured using the Add Port Configuration dialog box. 1. Click Edit on the Configure Host Adapter Ports dialog box. The Edit Port Configuration dialog box displays. 2. Modify the parameters that are described in “Adding a port configuration” on page 581. 3. Click OK to save the changes. Duplicating a port configuration 1.
Adapter port WWN virtualization 16 • Set the type value to auto or user-defined. When the User button is clicked, the WWN is cleared from the table and editing is enabled. • Delete the Fabric Assigned WWN from the Fabric Assigned WWN - Configuration list. FIGURE 236 Configure Fabric Assigned WWNs dialog box Enabling the FAWWN feature on a switch or AG ports 1. Select Configure > Fabric Assigned WWN. or Right-click the switch and select Fabric Assigned WWN.
16 Adapter port WWN virtualization The Configure Fabric Assigned WWNs dialog box displays. 2. Select a switch port from the Fabric Assigned WWN - Configuration list. 3. Click the Disable button. The selected switch’s FAWWN feature status is disabled. 4. Click OK. Auto-assigning a FAWWN to a switch or AG port 1. Select Configure > Fabric Assigned WWN. or Right-click the switch and select Fabric Assigned WWN. The Configure Fabric Assigned WWNs dialog box displays. 2.
Adapter port WWN virtualization 16 Deleting a FAWWN from a switch or AG port 1. Select Configure > Fabric Assigned WWN. or Right-click the switch and select Fabric Assigned WWN. The Configure Fabric Assigned WWNs dialog box displays. 2. Select a switch port or AG port from the Fabric Assigned WWN - Configuration list. 3. Click the Delete button. The Fabric Assigned WWN row is deleted from the Fabric Assigned WWN - Configuration list for the selected switch port or AG port.
16 Adapter port WWN virtualization Adding AG port FAWWNs 1. Select Configure > Fabric Assigned WWN. or Right-click the switch and select Fabric Assigned WWN. The Configure Fabric Assigned WWNs dialog box displays. 2. Click the Attached AG Ports tab. 3. Select a row in the Fabric Assigned WWN Configuration - AG Ports list. 4. Click Add. The Add AG Fabric Assigned WWN Configuration dialog box displays. 5. Enter a valid world wide name (WWN), with or without colons, for the Access Gateway node.
Role-based access control 16 The Configure Fabric Assigned WWNs dialog box displays. 2. Click the Attached AG Ports tab. 3. Right-click the WWN row you want to move, select the Copy Row option, and paste the contents into a text editor. 4. Select an online AG FAWWN row and click the Delete button. 5. Select a switch from the Switch list and click Add to launch the Add AG Fabric Assigned WWN Configuration dialog box. 6.
16 Host performance management • Port Mapping • Virtual Network Management Instructions for managing resource groups and users using roles and privileges are detailed in “User accounts,”“Roles,” and “Areas of responsibility,” in Chapter 6, “User Account Management”. Host performance management Real-time performance enables you to collect data from managed HBA and CNA ports. You can use real-time performance to configure the following options: • Select the polling rate from 20 seconds up to 1 minute.
Host security authentication TABLE 59 16 Counters (Continued) FC port measures HBA port measures CNA port measures Invalid ordered sets Non-frame coding error Received paused frames Transmitted paused frames Received FCoE pause frames Transmitted FCoE pause frames Received FCS error frames Transmitted FCS error frames Received alignment error frames Received length error frames Received code error frames Instructions for generating real-time performance data are detailed in “Generating a real-time p
16 Host security authentication FIGURE 238 Fibre Channel Security Protocol Configuration dialog box 3. Configure the following parameters on the Fibre Channel Security Protocol Configuration dialog box: a. Select the Enable Authentication check box to enable the authentication policy. If authentication is enabled, the port attempts to negotiate with the switch. If the switch does not participate in the authentication process, the port skips the authentication process. b.
supportSave on adapters 16 supportSave on adapters Host management features support capturing support information for managed Brocade adapters, which are discovered in the Management application. You can trigger supportSave for multiple adapters at the same time. supportSave cannot be used to collect support information for ESXi hosts managed by a CIM Server. Refer to the Brocade Adapters Administrator’s Guide for information about supportSave on ESXi hosts.
16 Backup support Filtering event notifications The Management application provides notification of many different types of SAN events. If a user wants to receive notification of certain events, you can filter the events specifically for that user. NOTE The e-mail filter in the Management application is overridden by the firmware e-mail filter.
Backup support 16 The currently defined directory displays in the Output Directory field. 3. Select the Enable Backup check box, if necessary. 4. Choose one or more of the following options: • Select the Include Adapter Boot Image check box to back up boot image files from the boot image repository. • Select the Include FTP Root directory check box.
16 596 Backup support Brocade Network Advisor IP User Manual 53-1003153-01
Chapter 17 Fibre Channel over Ethernet In this chapter • FCoE overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Enhanced Ethernet features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • FCoE protocols supported. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • FCoE licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
17 Enhanced Ethernet features DCBX protocol Data Center Bridging Exchange (DCBX) protocol allows enhanced Ethernet devices to convey and configure their DCB capabilities and ensures a consistent configuration across the network. DCBX protocol is used between DCB devices, such as a converged network adapter (CNA) and an FCoE switch, to exchange configuration with directly connected peers.
FCoE protocols supported 17 Ethernet jumbo frames The basic assumption underlying FCoE is that TCP/IP is not required in a local data center network and the necessary functions can be provided with Enhanced Ethernet. The purpose of an “enhanced” Ethernet is to provide reliable, lossless transport for the encapsulated Fibre Channel traffic. Enhanced Ethernet provides support for jumbo Ethernet frames and in-order frame delivery.
17 FCoE licensing FCoE licensing The FCoE license enables Fibre Channel over Ethernet (FCoE) functionality on the following supported DCB switches: • • • • • Network OS 10 GbE 24-port 8 GbE 8 FC port switch Network OS VDX 6710, 6720, and 6730 switches Network OS VDX 6740 and 6740T switches Network OS VDX 8770-series switches Network OS VDX 2730 10 GbE connection blade for the Fujitsu PRIMERGY BX900 and BX400 Blade Servers Without the FCoE license, the DCB switches are pure Layer 2 Ethernet switches and
Saving running configurations 17 FIGURE 239 Save Running to Startup dialog box 2. Highlight a discovered DCB switch from the Available Switches list, and click the right arrow button to move the switch to the Selected Switches list. 3. Highlight the selected switch and click OK to start the configuration. The running configuration is saved to the selected switch, effective on the next system startup.
17 DCB configuration management DCB configuration management Depending on the platform, the DCB switch has one of the configurations shown in Table 60.
Switch policies 17 Switch policies You can configure and enable a number of DCB policies on a switch, port, or link aggregation group (LAG). The following switch policy configurations apply to all ports in a LAG: • DCB map and Traffic Class map • Link Layer Discovery Protocol (LLDP) The switch policies are described in the following sections.
17 DCB configuration DCB configuration To launch the DCB Configuration dialog box, select Configure > DCB from the menu bar. The DCB Configuration dialog box displays, showing the status of all DCB-related hardware and functions. NOTE For FOS DCB devices, the Protocol Down Reason column, shown in Figure 240, displays the values only for the external ports of embedded platforms but not for the internal ports.
DCB configuration 17 In release 12.1 of the Management application, you cannot perform DCB configuration on Network OS VDX switches. You can only view Network OS switch configuration in the Management application DCB dialog. Refer to “Network OS switches in VCS mode” on page 641 for more information. NOTE Editable operations from the Management application on Network OS products are not supported for this release.
17 DCB configuration FIGURE 241 Edit Switch dialog box - QoS tab 4. Select DCB from the Map Type list. 5. Configure the following DCB Map parameters in the DCB Map area: • Name - Enter a name to identify the DCB map. • Precedence - Enter a value from 1 through 100. This number determines the map’s priority. • Priority Flow Control check box - Check to enable priority-based flow control on individual priority groups.
DCB configuration 17 If a DCB map exists with the same name, a validation dialog box launches and you are asked if you want to overwrite the map. 7. Click OK. 8. When you have finished the configuration, click OK to launch the Deploy to Products dialog box. Configuring LLDP To configure LLDP, complete the following steps. 1. Select Configure > DCB. The DCB Configuration dialog box displays. 2. Select the switch to edit from the Product/Ports list and click Edit. The Edit Switch dialog box displays. 3.
17 DCB configuration 8. Click Start on the Deployment Status dialog box to save the changes to the switch. 9. Click Close to close the Deployment Status dialog box. Configuring the DCB interface with the DCB map and global LLDP profile To configure the DCB interface, complete the following steps. 1. Select Configure > DCB. The DCB Configuration dialog box displays. 2. Select the Te port connected to the CNA from the Product/Ports list and click Edit..
DCB configuration 17 3. Click the DCB tab. 4. Click the VLAN tab. 5. Click Add. The VLAN Configuration dialog box displays. 6. Enter the VLAN identifier in the VLAN ID field. 7. Click OK on the VLAN Configuration dialog box. 8. Select the VLAN you created and click Edit to convert the VLAN to FCoE VLAN. 9. Select the FCoE check box. 10. Select the DCB interface to carry the FCoE traffic from the Selection List and click Add to add it to the Selected List. 11.
17 DCB configuration • The Add LAG button on the DCB Configuration dialog box is enabled when a single DCB switch or ports of a single DCB switch are selected. • The Add LAG button is disabled when multiple switches are selected, ports from different switches are selected, or LAGs are selected. • The Edit LAG button is enabled when a single LAG, port, or switch is selected. Creating a LAG is not supported for Network OS products.
DCB configuration 17 • LAG ID - Enter the LAG identifier, using a value from 1 through 63. Duplicate LAG IDs are not allowed. • Status - Click the Enable check box to enable the LAG. You must enable the LAG to use the DCB functionality. • Interface Mode - Select None or L2. Ports that are in L2 mode cannot be added to a LAG. The L3 interface mode option is displayed in the Edit LAG dialog box only. • L2 Mode - Select Access or Trunk: Access mode allows only one VLAN and allows only untagged frames.
17 DCB configuration Editing a DCB switch 1. Select Configure > DCB. The DCB Configuration dialog box displays, showing the status of all DCB-related hardware and functions. 2. Select the DCB switch from the Products/Ports list. 3. Click Edit. The Edit Switch dialog box displays (Figure 244). FIGURE 244 Edit Switch dialog box 4.
DCB configuration 17 8. Click Start on the Deployment Status dialog box to save the changes to the selected devices. 9. Click Close to close the Deployment Status dialog box. Editing a DCB port 1. Select Configure > DCB. The DCB Configuration dialog box displays, showing the status of all DCB-related hardware and functions. 2. Select a DCB port from the Products/Ports list. 3. Click Edit. The Edit Port dialog box displays, as shown in Figure 245. FIGURE 245 Edit Port dialog box 4.
17 DCB configuration • IP/Netmask - The netmask is used to divide an IP address into subnets. It specifies which portion of the IP address represents the network and which portion represents the host, and can only be configured if the interface mode is L3. Primary - The primary IP address assigned to a 10 Gbps DCB/FC switch module. Secondary - The secondary IP address is optional. Secondary IP addresses are helpful when the interface port is part of multiple subnets. 5.
DCB configuration 17 FIGURE 246 Edit LAG dialog box 4. Configure the following LAG parameters, as required: NOTE Ports with 802.1x authentication or ports that are enabled in L2 mode or L3 mode are not supported in a LAG. • LAG ID - The LAG identifier, which is not an editable field. • Status - Click the Enable check box to enable the LAG. You must enable the LAG to use the DCB functionality. • Interface Mode - Select None or L2.
17 DCB configuration 5. Continue to configure the following LAG parameters. These parameters are disabled until you add a DCB port to the LAG Members list. • Mode - The ports that are LAG members are in either Static or Dynamic mode. You cannot change the mode on existing members of a LAG. If the mode is set as Dynamic, you can change the dynamic mode type (to Active or Passive) only for newly-added ports, not for existing port members of a LAG.
QoS configuration 17 4. Click Start on the Confirmation and Status dialog box to save the changes to the selected ports or LAGs. The selected DCB ports or LAGs are enabled in the DCB Configuration dialog box. 5. Click Close to close the Confirmation and Status dialog box. Deleting a LAG You can only delete a link aggregation group (LAG) that is selected from a single switch. If you select multiple switches or multiple ports from two or more switches, the Delete button is disabled.
17 QoS configuration TABLE 61 Priority grouping allocated in a 15-priority group example Priority group ID Bandwidth (%) Priority flow control 0 55 on 1 25 on 2 0 off 3 0 off 4 5 off 5 0 off 6 15 on 7 0 off 15.0-15.7 Strict priority on No bandwidth % configuration allowed Creating a DCB map The procedure in this section applies only for Fabric OS versions earlier than Fabric OS 7.0.
QoS configuration 17 FIGURE 247 QoS, Create DCB Map dialog box 4. Select DCB from the Map Type list. 5. Configure the following DCB map parameters in the DCB Map area: • Name - Enter a name to identify the DCB map. NOTE Only one DCB map (the default) is supported on Fabric OS version 6.3.1_dcb and version 7.0.0 and later. • Precedence - Enter a value from 1 through 100. This number determines the map’s priority.
17 QoS configuration • If you set a CoS value to one or more of the PG IDs 0-7, you must also enter a non-zero bandwidth percentage. The total bandwidth percentage must equal 100. • For PG IDs 0-7 that do not have an assigned CoS value or PFC enabled, the bandwidth percentage must be 0. 6. Click the right arrow button to add the map to the DCB Maps list. If a DCB map exists with the same name, a validation dialog box launches and you are asked if you want to overwrite the map. 7. Click OK. 8.
QoS configuration 17 1. Select Configure > DCB. The DCB Configuration dialog box displays, showing the status of all DCB-related hardware and functions. 2. Select a switch, and click Edit. 3. Click the QoS tab on the Edit Switch dialog box. The QoS dialog box displays. 4. Select one or more DCB maps. 5. Click the left arrow button. The selected DCB map row is removed from the list. 6. When you have finished the configuration, click OK to launch the Deploy to Products dialog box.
17 QoS configuration Assigning a DCB map to a port or link aggregation group The Edit Port dialog box - QoS tab allows you to assign DCB maps to ports and LAGs on a selected switch. NOTE QoS maps are created using the Edit Switch dialog box, accessible from the DCB Configuration dialog box. A port can have either a DCB map or a Traffic Class map assigned to it, but it cannot have both. 1. Select Configure > DCB.
QoS configuration 17 6. Click the Traffic Class cell in a CoS row and directly enter a value from 0-7. You can leave the cell empty to indicate zero (0). 7. Click the right arrow button to add the map to the Traffic Class Maps list. If the name of the Traffic Class map already exists, an overwrite warning message displays. Click Yes to overwrite the existing Traffic Class map. 8. When you have finished the configuration, click OK to launch the Deploy to Products dialog box.
17 QoS configuration 8. Click Start on the Deployment Status dialog box to save the changes to the selected devices. Assigning a Traffic Class map to a port or link aggregation group You can assign a Traffic Class map to a port or ports under the LAG; however, a port does not require a Traffic Class map be assigned to it. A port can have either a DCB map or a Traffic Class map assigned to it, but it cannot have both. NOTE You cannot configure QoS or LLDP-DCBX on a LAG. 1. Select Configure > DCB.
FCoE provisioning 17 FCoE provisioning The Management application supports FCoE provisioning only on Fabric OS version 6.3.1_dcb. The command line interface (CLI) supports FCoE provisioning for the following versions of Fabric OS: • • • • Fabric OS 6.3.1_cee Fabric OS 6.3.1_del Fabric OS 6.4.1_fcoe Fabric OS 7.0.x Refer to the Fabric OS Command Reference for CLI procedures. FCoE provisioning simplifies the number of steps required to configure a DCB port to carry the FCoE traffic.
17 FCoE provisioning 4. Accept the default VLAN ID of 1002, or change the value. The valid VLAN ID range is from 2 through 3583. 5. Click the right arrow button to move the FCoE map parameters into the FCoE Maps list. 6. When you have finished the configuration, click OK to launch the Deploy to Products dialog box. 7. Click OK after changing the attributes of the current deployment. The Deployment Status dialog box displays. 8.
VLAN classifier configuration 17 5. When you have finished the configuration, click OK to launch the Deploy to Ports dialog box. 6. Click OK after changing the attributes of the current deployment. The Deployment Status dialog box displays. 7. Click Start on the Deployment Status dialog box to save the changes to the selected devices. VLAN classifier configuration The Management application supports VLAN classifier management only on Fabric OS 6.3.1_dcb and Fabric OS 7.0.0.
17 VLAN classifier configuration FIGURE 248 Edit Switch dialog box, VLAN Classifiers tab 4. Click the Add button under the Available Rules list. The Add Rules dialog box displays, as shown in Figure 249. FIGURE 249 Add Rules dialog box The Rule ID field is pre-populated with the next available rule ID number. 5. Keep the rule ID number as it is, or change the number using a value from 1 through 256. 6. Select a rule type. Valid rule types are MAC (MAC address-based rule) and Proto (802.
VLAN classifier configuration 17 9. Click OK to add the rule to the Available Rules list on the VLAN Classifiers tab of the Edit Switch dialog box and close the Add Rules dialog box. NOTE Clicking Apply also adds the rule to the Available Rules list on the VLAN Classifiers tab of the Edit Switch dialog box, and in addition, the Add Rules dialog box remains open and clears all entries for you to define the next rule. 10.
17 VLAN classifier configuration Creating a VLAN classifier group You can assign existing rules to a selected VLAN classifier and form a VLAN classifier group. If no rules are available, you can add rules to a selected switch using the Add Rules dialog box. 1. Select Configure > DCB from the menu bar. The DCB Configuration dialog box displays, showing the status of all DCB-related hardware and functions. 2. Select a switch and click Edit. 3. Click the VLAN Classifiers tab on the Edit Switch dialog box.
LLDP-DCBX configuration 17 LLDP-DCBX configuration Link Layer Discovery Protocol (LLDP) provides a solution for the configuration issues caused by increasing numbers and types of network devices in a LAN environment, because, with LLDP, you can statically monitor and configure each device on a network.
17 LLDP-DCBX configuration Adding an LLDP profile NOTE When a TE port is selected to assign to an LLDP profile, a yellow banner displays with the following error message: “LLDP-DCBX is disabled on this switch. The configuration becomes functional when LLDP-DCBX is enabled on the switch.” 1. Select Configure > DCB. The DCB Configuration dialog box displays, showing the status of all DCB-related hardware and functions. 2. Select a switch, and click Edit. 3.
LLDP-DCBX configuration 17 Editing an LLDP profile 1. Select Configure > DCB. The DCB Configuration dialog box displays, showing the status of all DCB-related hardware and functions. 2. Select a switch, and click Edit. 3. Click the LLDP-DCBX tab on the Edit Switch dialog box. The LLDP-DCBX Profile dialog box displays. 4. Select an LLDP profile in the LLDP Profile list. NOTE You can edit the profile. You cannot, however, delete or duplicate global configurations. 5.
17 802.1x authentication Assigning an LLDP profile to a port or ports in a LAG You create LLDP profiles using the Edit Switch dialog box, which you access from the DCB Configuration dialog box. Global configuration parameters, which is the default selection, are displayed in the Assigned Profile table. NOTE A yellow banner displayed on the LLDP-DCBX dialog box indicates that LLDP-DCBX is disabled on the switch. The configuration options become functional when LLDP-DCBX is enabled on the switch. 1.
802.1x authentication 17 Enabling 802.1x authentication 802.1x authentication is enabled or disabled globally on the switch using the Edit Switch dialog box. 1. Select Configure > DCB from the menu bar. The DCB Configuration dialog box displays, showing the status of all DCB-related hardware and functions. 2. Select a switch and click Edit. 3. Click the 802.1x tab on the Edit Switch dialog box. 4. Click the Enable 802.1x check box to enable 802.1x authentication, and click OK. 5. Configure the 802.
17 802.1x authentication FIGURE 251 802.1x dialog box 5. Configure the following 802.1x parameters: • Wait Period - The number of seconds the switch waits before sending an EAP request. The value range is 15 to 65535 seconds. The default value is 30. • Retry Count - The maximum number of times that the switch restarts the authentication process before setting the switch to an unauthorized state. The value range is 1 to 10. The default value is 2.
Switch, port, and LAG deployment 17 Switch, port, and LAG deployment The Deploy to Products, Deploy to Ports, and Deploy to LAGs dialog boxes provide the flexibility to commit DCB configurations either right away or at a scheduled time. These dialog boxes also allow you to commit the switch-level configuration changes to one or more target switches. NOTE Deployment from the Management application to a Network OS device is not supported.
17 Switch, port, and LAG deployment FIGURE 253 Deploy to Ports dialog box FIGURE 254 Deploy to LAGs dialog box 638 Brocade Network Advisor IP User Manual 53-1003153-01
Switch, port, and LAG deployment 17 4. Click one of the following deployment options: • • • • Deploy now Save and deploy now Save deployment only Schedule 5. Click one of the following save configuration options: • Save to running • Save to running and startup • Save to running and startup then reboot The name for the scheduled product deployment is pre-populated with a “DCB-MM-DD-YYYY-HR-MIN-SS” prefix. This is an editable field. 6. Provide a description for the product/port/LAG deployment. 7.
17 Switch, port, and LAG deployment NOTE On the Deploy to Ports dialog box, you can write port configurations to the switch by enabling the check box at the bottom of the dialog box. For LAGs: • LAG attributes (Interface Mode, etc.) • QoS, DCB Map / Traffic Class Map • LLDP Profiles 9. Click to move the available targets selected for configuration deployment to the Selected Targets list. 10. Click OK. The Deployment Status dialog box launches. 11.
Network OS switches in VCS mode TABLE 62 17 Source to target switch Fabric OS version compatibility (Continued) Source Fabric OS version and device Target Fabric OS version supported Comments Fabric OS Converged 10 GbE switch module for IBM BladeCenter with Fabric OS 6.3.1_cee and 6.3.1_dcb Allows Fabric OS Converged 10 Gbe switch module for IBM BladeCenter with Fabric OS 6.3.1_cee, Fabric OS 6.3.1_dcb. Both source and target switches must support the FCoE map and VLAN classifiers.
17 Network OS switches in VCS mode Supported VCS platforms The following switches are supported in a virtual fabric switching environment: • VDX 2730 10 GbE connection blade for the Fujitsu PRIMERGY BX900 and BX400 Blade Servers • • • • • • • • • VDX 6710 VDX 6720-24 VDX 6720-60 VDX 6730-32 VDX 6730-76 VDX 6740 VDX 6740T VDX 8770-4 VDX 8770-8 Viewing switches in VCS mode 1. Launch the DCB Configuration dialog box using one of the following methods: • Select Configure > DCB from the menu bar.
Network OS switches in VCS mode 17 Viewing QoS parameters on the Network OS switch Table 63 describes the parameters that displays on the View Switch dialog box - QoS tab. NOTE Network OS switches in VCS mode support only the DCB map. Network OS switches in standalone mode supports both the DCB and Traffic Class maps. TABLE 63 QoS configuration parameters on VCS switch Map Type Displays the map type: DCB or Traffic Class for a Standalone Network OS switch or DCB for Network OS switches in VCS mode.
17 Network OS switches in VCS mode Viewing VLAN classifiers and rules parameters on the Network OS switch Table 65 describes the parameters that display on the View Switch dialog box - VLAN Classifiers tab. TABLE 65 VLAN classifiers and rules configuration parameters on VCS switch Field/Component Available Rules VLAN Classifiers Description Displays the following Available Rules information: Rule ID — The rule identifier. Valid rule ID values are from 1 through 256.
Network OS switches in VCS mode 17 Viewing the 802.1x parameter on the Network OS switch Table 67 describes the parameter that displays on the View Switch dialog box - QoS tab. TABLE 67 802.1x configuration parameter on VCS switch Field/Component Description 802.1x Displays the enabled or disabled status of the 802.1x configuration on the Network OS switch. Viewing ports in VCS mode 1.
17 Network OS switches in VCS mode TABLE 68 Port parameters on the Network OS switch port (Continued) Field/Component Description MTU The maximum transmission unit (MTU) in bytes. The value range is from 1522 through 9216 and the default value is 2500. iSCSI Priority The CoS priority value for iSCSI traffic. The value range is from COS 0 through COS 7 and the default value is COS 4.
Network OS switches in VCS mode 17 QoS - Non-DCB TABLE 70 QoS (non-DCB) parameters on the Network OS switch port Field/Component Description Mode The mode of Quality of Service (QoS) assigned to the port (non-DCB). Trust Indicates whether the Ethernet trust of the port is enabled or disabled. NOTE: Applicable only for standalone Network OS devices. Flow Control The Ethernet priority flow control mode of the port. The default flow control mode is Off. Possible modes are as follows: • Off • 802.
17 Network OS switches in VCS mode Viewing LLDP-DCBX parameters on the Network OS switch port Table 72 describes the LLDP profiles table (in global configuration) and the LLDP profiles. TABLE 72 LLDP-DCBX parameters on the Network OS switch port Field/Component Description LLDP-DCBX Indicates whether LLDP-DCBX feature is enabled or disabled. LLDP Profile Parameters Displays the following LLDP profile parameters: Name — The name of the LLDP profile. Description — A description of the LLDP profile.
Network OS switches in VCS mode TABLE 73 17 802.1x parameter on the Network OS switch port (Continued) Field/Component Description Re-authentication Interval (sec) The number of seconds between re-authentication attempts. The value range is 1 to 4294967295. The default value is 3600 seconds. This feature is not dependent on the re-authentication state being enabled. Port Control The authorization mode to configure the ports for authorization.
17 Network OS switches in VCS mode TABLE 74 LAG parameters on the Network OS switch LAG (Continued) Field/Component Description Status Indicates whether the LAG is enabled or disabled. You must enable the LAG to use the DCB functionality. Default CoS The Cost of Service (CoS) value for incoming untagged frames. Values are 0-7 or if the port is profiled. The default CoS is 0. Type Displays the limit on the size of the LAG.
Network OS switches in VCS mode TABLE 75 17 QoS (DCB) parameters on the Network OS switch LAG. (Continued) Field/Component Description Precedence This number determines the map’s priority. Valid values are from 1 through 100. DCB Map Parameters • • • • PG ID — Lists the priority group ID (15.0 to 15.7 and 0 to 7). % Bandwidth — Lists the bandwidth value for priority group IDs 0-7. The total of all priority groups must equal 100%.
17 Network OS switches in VCS mode TABLE 77 FCoE configuration parameters on VCS switch Field/Component FCoE Map Note: The default FCoE map contains both the default Fabric map and the default DCB map. Fabric Map Description Displays the following information about the FCoE map: Fabric Map — The name of the Fabric map. The default Fabric map consists of virtual fabric and FCoE VLAN-related information. • DCB Map — The name of the DCB map.
DCB performance 17 DCB performance Performance monitoring provides details about the quantity of traffic and errors a specific port or device generates on the fabric over a specific time frame. You can also use Performance features to indicate the devices that create the most traffic and to identify the ports that are most congested. The Performance menu items launch either SAN or IP performance dialog boxes based on which tab you select.
17 DCB performance Generating a real-time performance graph from the IP tab To generate a real-time performance graph for a Network OS or FOS DCB switch, complete the following steps. 1. Click the IP tab. 2. Select a DCB port from the DCB Configuration dialog box, and select Real Time Graph from the Performance list. A message displays, prompting you to close the DCB Configuration dialog box. 3. Click OK to close the DCB Configuration dialog and open the Performance dialog box.
DCB performance 17 Historical performance graph The Historical Performance Graph dialog box enables you to customize how you want the historical performance information to display. Generating a historical performance graph You can generate a historical performance graph by selecting both Network OS and FOS DCB devices from the IP Tab or by selecting only Network OS DCB devices from the IP tab. 1.
17 FCoE login groups FCoE login groups The FCoE Configuration dialog box allows you to manage the FCoE login configuration parameters on the DCB switches in all discovered fabrics. FCoE login configuration is created and maintained as a fabric-wide configuration. With the FCoE license, the FCoE Configuration dialog box displays virtual FCoE port information and enables you to manage the virtual port information.
FCoE login groups 17 • Click Edit to launch the Edit Login Group dialog box, where you can edit the login group parameters. See “Editing an FCoE login group” on page 658. • Click Delete to remove the login group from the list. See “Deleting one or more FCoE login groups” on page 659. Adding an FCoE login group Complete the following steps to add switches to a login group. You can manually add ports by entering the world wide name (WWN) or select available managed CNAs from all discovered hosts.
17 FCoE login groups • Port WWN — Click to enter the world wide name (WWN) of the port to associate with the selected switch. The member port WWN text field allows a maximum of 16 digits. • Managed CNAs — Click to show a list of products and ports which can be selected as login group members. 6. Select available members from the Products/Ports list and click the right arrow button to move the available members to the Selected Members list. 7. Click OK.
FCoE login groups 17 • Rename the login group by entering the new name into the Name field. The Allow All option must be selected to rename the login group. • Select one of the following options to add or remove login members into the Available Members list. The Allow Specific option must be selected to add or remove login members. • Port WWN — Click to enter the world wide name (WWN) of the port to associate with the selected switch. The member port WWN text field allows a maximum of 16 digits.
17 FCoE login groups The FCoE login management feature is disabled and all login groups on the selected switch are deleted. The value in the FCoE Login Management State column for the selected switch is Disabled and no login groups appear under the switch after the FCoE Configuration dialog box refresh operation. • “FCoE login groups” Enabling the FCoE login management feature on a switch 1. Select Configure > FCoE from the menu bar. or Right-click the DCB device and select FCoE.
Virtual FCoE port configuration 17 Virtual FCoE port configuration The virtual FCoE port has the following configuration features: • Displays the virtual FCoE ports on each of the DCB devices, which provides the Ethernet with bridging capability • One-to-one mapping of FCoE ports with 10 Gbps Ethernet ports • Option to enable or disable the virtual FCoE ports • Option to view the end devices connected to a virtual FCoE port Viewing virtual FCoE ports Configuration of virtual FCoE ports requires install
17 Virtual FCoE port configuration FIGURE 261 Virtual FCoE Ports dialog box 3. Select one or more virtual ports from the Ports list. 4. Perform one of the following tasks: • Click Enable to enable a selected virtual FCoE port from the Virtual FCoE Ports tab. • Click Disable to disable a selected virtual FCoE port from the Virtual FCoE Ports tab. • Click Connected Devices to view a list of FCoE virtual ports and to what they are directly connected. 5. Click Close to close the dialog box.
Virtual FCoE port configuration 17 On closing the DCB Confirmation and Status dialog box, the FCoE Configuration Dialog refreshes the data and the latest information about the FCoE ports are displayed.
17 664 Virtual FCoE port configuration Brocade Network Advisor IP User Manual 53-1003153-01
Chapter 18 Telemetry In this chapter • Telemetry overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 665 • Policy-based routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 665 • ACL Accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
18 Policy-based routing The Management application creates an IPv4 PBR or IPv6 PBR based on the ACLs defined in the policy. • If any rule in the policy contains an IPv4 ACL, the Management application creates an IPv4 PBR applies the PBR to the ports. • If any rule in the policy contains an IPv6 ACL, the Management application creates an IPv6 PBR applies the PBR to the ports.
Policy-based routing 18 Source — Port (one or more) to which this PBR policy is bound. For PBR policies bound to multiple ports, displays all ports separated by commas. For globally applied PBR policies, displays blank. Match — L3 ACL policy associated with the rule. You can define up to 10 ACL policies (5 IPv4 and 5 IPv6) per rule. Next Hop — Destination for the packets that pass ACL filter. You can define multiple next hops. PBR selects the first next hop from the next hop list that is up.
18 Policy-based routing Adding a new policy 1. Select an Ethernet router, Ethernet core router, or Ehternet Backbone router product and select Configure > Policy Based Routing. The Product_Name PBR Configuration dialog box displays. 2. Select Add > New Policy. The PBR Policy Configuration dialog box displays. 3. Enter a name for the new policy and click OK on the PBR Policy Configuration dialog box. 4. To add one or more rules to the policy, refer to “Adding rules to a policy” on page 668. 5.
Policy-based routing 18 The rule name can be up to 127 characters and must be unique within the policy. 4. Select one or more ACLs to use in the rule from the Available ACLs table. Each rule can match up to 10 ACLs (5 IPv4 and 5 IPv6) and can have multiple hops to a destination. The Available ACLs table displays the available IPv4 and IPv6 ACLs on this product. IPv4 and IPv6 have two separate policy lists. IPv4 PBR rules can only have IPv4 ACLs and IPv4 addresses in the next hop.
18 Policy-based routing Adding policies from saved configurations 1. Select an Ethernet router, Ethernet core router, or Ehternet Backbone router product and select Configure > Policy Based Routing. The Product_Name PBR Configuration dialog box displays. 2. Select Add > From Saved Configurations. The PBR Saved Configurations dialog box displays. 3. Select the configuration you want to add from the list and click OK. 4. Click OK on the Product_Name PBR Configuration dialog box.
Policy-based routing 18 The Deploy to Products - PBR dialog box displays. To deploy the PBR policy, refer to “Deploying a PBR policy on demand” on page 671, “Saving a PBR policy deployment” on page 672, or “Scheduling a PBR policy deployment” on page 673. Deleting a policy or rule 1. Select an Ethernet router, Ethernet core router, or Ehternet Backbone router product and select Configure > Policy Based Routing. The Product_Name PBR Configuration dialog box displays. 2.
18 Policy-based routing 6. Select the product monitoring template you want to use from the CLI Template list. 7. Select one or more of the following to capture snapshots: • Select the Pre-deployment check box to capture a snapshot of the product’s configuration prior to deployment of the security configuration. • Select the Post-deployment check box to capture a snapshot of the product’s configuration after deployment of the security configuration.
Policy-based routing 7. 18 Select one or more of the following to capture snapshots: • Select the Pre-deployment check box to capture a snapshot of the product’s configuration prior to deployment of the security configuration. • Select the Post-deployment check box to capture a snapshot of the product’s configuration after deployment of the security configuration.
18 Policy-based routing 7. Click OK on the Schedule Properties dialog box. 8. Click the Snapshot Use check box and click the ellipsis button to select the product monitoring template. NOTE The Snapshot Use check box is only available for IronWare products. The Pre-Post Snapshot Properties dialog box displays. 9. Select the product monitoring template you want to use from the CLI Template list. 10.
Policy-based routing 18 Configuring a daily deployment schedule To configure a daily deployment schedule, complete the following steps. 1. Select Daily from the Frequency list. 2. Select the time of day you want deployment to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. To finish configuring the deployment schedule, return to step 7 of “Scheduling a PBR policy deployment” on page 673.
18 ACL Accounting ACL Accounting NOTE ACL accounting is only supported on Ethernet router, Ethernet core router, or Ehternet Backbone router products running 5.4 or later. Ethernet router, Ethernet core router, or Ehternet Backbone router products monitor the number of times an ACL is used to filter incoming or outgoing traffic on an interface.
ACL Accounting 18 2. Select the Clear all counters on device check box. 3. Click OK on the ACL Accounting dialog box. Viewing ACL counters Before you can view ACL counters, you must enable ACL accounting on the product (refer to “Enabling or disabling ACL accounting” on page 676). To view ACL accounting on a product, select an Ethernet router, Ethernet core router, or Ehternet Backbone router product and select Configure > Security > Layer 2/3 ACL > Product.
18 678 ACL Accounting Brocade Network Advisor IP User Manual 53-1003153-01
Chapter 19 Security Management In this chapter • Security overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Layer 2 access control list management . . . . . . . . . . . . . . . . . . . . . . . . . . . • Layer 3 access control list policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Media Access Control (MAC) filter management. . . . . . . . . . . . . . . . . . . . . • Security configuration deployment. . . . . . . . . . . . . . .
19 Layer 2 access control list management You should configure the ACL on the device before you assign the ACL to an interface. You can create multiple ACLs and save them to the device configuration. However, the ACL does not filter traffic until you assign it to an interface. You can assign an ACL on a physical port, Virtual LAN (VLAN), or Link Aggregation Group (LAG). For IronWare OS products, you can create a standard ACL.
Layer 2 access control list management 19 FIGURE 265 Add - Layer 2 ACL Configuration dialog box 3. Enter a number for the ACL in the Number field. For IronWare 5.4 and later, ACL numbers range from 400 through 1399. For IronWare 5.3, ACL numbers range from 400 through 599. For IronWare less than 5.3, ACL numbers range from 400 through 499. 4. Select Permit or Deny from the Action list. 5.
19 Layer 2 access control list management • Any — Any of the protocols 9. (Deny actions only) Select the Log Enable check box to generate a log for this configuration. 10. Click the right arrow button. The new ACL rule displays in the ACL Entries list. 11. To create additional rules for the same ACL, repeat step 4 through step 10. 12. Click OK on the Add - Layer 2 ACL Configuration dialog box. The new ACL rule displays in the ACLs list. To create additional ACL, repeat step 2 through step 12. 13.
Layer 2 access control list management 19 Copying a Layer 2 ACL configuration (IronWare) To copy a Layer 2 ACL configuration, complete the following steps. 1. Select a device and select Configure > Security > Layer 2 ACL > Product. The Device_Name - Layer 2 ACL Configuration dialog box displays. 2. Select the ACL configuration you want to copy and click Duplicate. The Duplicate - Layer 2 ACL Configuration dialog box displays. 3. Enter a number for the ACL in the Number field. For IronWare 5.
19 Layer 2 access control list management Assigning a Layer 2 ACL configuration to an interface (IronWare) NOTE You cannot modify or delete a Layer 2 ACL that is bound to a port. To assign a Layer 2 ACL configuration to an interface, complete the following steps. 1. Select Configure > Security > Layer 2 ACL > Port. The Port Selection - Layer 2 ACL dialog box displays. FIGURE 266 Port Selection - Layer 2 ACL dialog box 2. Select a port in the Available Ports list and click the right arrow button. 3.
Layer 2 access control list management 19 FIGURE 267 Device_Name - Port_Number - Layer 2 ACL Configuration dialog box 4. (Ethernet routers only) Select a duration (1 Second, 1 Minute, 5 Minutes, or Cumulative) to track the number of times an ACL filter is used in the Hits Stats Duration list. Click Refresh to collect the hit statistics. The application updates the Hits column of the Details of Selected ACL list. 5.
19 Layer 2 access control list management 6. To assign an ACL configuration to outbound messages, select the Outbound check box and complete the following steps: NOTE You can only assign an ACL to an outbound message on an Application product. a. Select the Assign ACL option and choose one of the following options from the first Assign ACL list: • Select ACLs on this Product to assign ACLs deployed on the product to the port.
Layer 2 access control list management 19 Fabric OS Layer 2 ACL configuration NOTE Only available for Fabric OS DCB products. This section provides procedures for configuring a standard for extended Layer 2 ACL on a device, assigning the Layer 2 ACL to an interface, as well as clearing Layer 2 ACL assignments from a device. Creating a standard Layer 2 ACL configuration (Fabric OS) To create a standard Layer 2 ACL configuration, complete the following steps. 1.
19 Layer 2 access control list management The new ACL entry displays in the ACL Entries list. To create additional ACL entries, repeat step 3 through step 9. 10. Click OK on the Add - Layer 2 ACL Configuration dialog box. The new ACL configuration displays in the ACLs list. To create additional ACLs, repeat step 2 through step 10. 11. Click OK on the Device_Name - Layer 2 ACL Configuration dialog box. The Deploy to Products - Layer 2 ACL dialog box displays.
Layer 2 access control list management 19 The Duplicate - Layer 2 ACL Configuration dialog box displays with the default name ‘Copy of Original_Name’. 3. Enter a new name for the ACL in the Name field. 4. To edit an existing ACL rule, complete the following steps. a. Select the rule you want to edit in the ACL Entries list and click the left arrow button. b. Complete step 5 through step 9 in “Creating a standard Layer 2 ACL configuration (Fabric OS)” on page 687.
19 Layer 2 access control list management FIGURE 269 Device_Name - Layer 2 ACL Configuration (Extended) dialog box 4. Enter a name for the ACL in the Name field. 5. Enter a sequence number for the ACL in the Sequence field. 6. Select Permit or Deny from the Action list. 7. In the Source list, select one of the following options: • Any • Host • MAC Selecting MAC or Host enables the Source field. Enter the source address on which the configuration filters traffic in the Source field. 8.
Layer 2 access control list management 19 The new ACL entry displays in the ACL Entries list. To create additional ACL entries, repeat step 5 through step 12. 13. Click OK on the Add - Layer 2 ACL Configuration dialog box. The new ACL displays in the ACL Entries list. To create additional ACL entries, repeat step 2 through step 13. 14. Click OK on the Device_Name - Layer 2 ACL Configuration dialog box. The Deploy to Products - Layer 2 ACL dialog box displays.
19 Layer 2 access control list management The Duplicate - Layer 2 ACL Configuration dialog box displays with the default name ‘Copy of Original_Name’. 3. Enter a new name for the ACL in the Name field. 4. To edit an existing ACL rule, complete the following steps. a. Select the rule you want to edit in the ACL Entries list and click the left arrow button. b. Complete step 5 through step 12 in “Creating an extended Layer 2 ACL configuration (Fabric OS)” on page 689.
Layer 2 access control list management 19 The Device_Name - Port_Number/LAG LAG_Number- Layer 2 ACL Configuration dialog box displays.
19 Layer 2 access control list management 4. Select the Assign ACL option and choose one of the following options from the first Assign ACL list: • Select ACLs on this Product to assign ACLs deployed on the product to the port. The second list is populated with the ACLs deployed on the switch or associated with a save deployment object. • Select ACLs bound to this port to assign ACLs bound to the interface to the port. The second list is populated with the ACLs bound to the interface.
Layer 2 access control list management 19 4. Click OK on the Layer 2 ACL Saved Configurations dialog box. The new ACL displays in the ACLs list. 5. Click OK on the Device_Name - Layer 2 ACL Configuration dialog box. The Deploy to Products - Layer 2 ACL dialog box displays.
19 Layer 2 access control list management Network OS Layer 2 ACL configuration NOTE You cannot configure a Layer 2 ACL using the Management application. You must configure the Layer 2 ACL through the Network OS CLI (refer to the Network OS Command Reference). Once you configure Layer 2 ACLs through the Network OS CLI, you can use the Management application to view Layer 2 ACL configurations for a VCS fabric or standalone device.
Layer 2 access control list management 19 • Details of Selected ACLs list — Displays the details of the ACL selected in the ACLs list. The Details of Selected ACLs table includes the following details: Sequence — The Layer 2 ACL entry sequence number. Action — Whether the ACL permits or denies traffic. Source — The source MAC address on which the ACL filters traffic. Destination (Extended only) — The destination MAC address on which the ACL filters the traffic.
19 Layer 2 access control list management 2. Review the Layer 2 ACL configuration details. • ACLs list — Displays the ACLs to be deployed for this configuration. The ACLs list includes the following details: Operation — Displays the ACL operation (no action) during deployment. Name — The name of the ACL. Type — The ACL type. Options include: Extended or Standard. Details of Selected ACLs list — Displays the details of the ACL selected in the ACLs list.
Layer 3 access control list policy 19 FIGURE 273 Device/Fabric_Name - Port_Number - Layer 2 ACL Configuration dialog box 4. Review the Layer 2 ACL configuration details. Details of Selected ACL table — Displays the details of the ACL selected in the ACLs list.The Details of Selected ACL table includes the following details: • • • • Sequence — The Layer 2 ACL entry sequence number. Action — Whether the ACL permits or denies traffic. Source — The source MAC address on which the ACL filters traffic.
19 Layer 3 access control list policy You can create two types of ACLs: • Standard ACL — Use to permit and deny traffic based on the source IP address, host name, or network. You should use standard ACLs when you only need to filter traffic based the source. You can create up to 99 standard ACLs ranging from 1 through 99. For more information, refer to “Creating a standard L3 ACL configuration” on page 700.
Layer 3 access control list policy 19 FIGURE 275 Add - L3 ACL Configuration (Standard) dialog box 3. Select Standard from the Type list. 4. Enter a name or number for the ACL in the ACL Name/Number field. 5. Select Permit or Deny from the Action list. 6. Enter a description for the ACL in the Remarks field. 7. Choose one of the following options from the Source list: • To enter an IP address, select IP Address and complete the following steps: a.
19 Layer 3 access control list policy 12. Click OK on the Add - L3 ACL Configuration dialog box. The Device_Name - L3 ACL Configuration dialog box displays. 13. To set the configuration type and operations, refer to “Configuring the ACL configuration type and operations” on page 716. 14. (Ethernet routers only) To set the hit statistics duration, refer to “Configuring hit statistics” on page 716. 15. To deploy the configuration, click OK on the Device_Name - L3 ACL Configuration dialog box.
Layer 3 access control list policy b. 19 Complete step 5 through step 10 in “Creating a standard L3 ACL configuration” on page 700. The updated ACL rule displays in the ACL Entries list. To update additional rules for the same ACL, repeat step 4. 5. To add a new rule, complete step 5 through step 10 in “Creating a standard L3 ACL configuration” on page 700. The updated ACL rule displays in the ACL Entries list. To update additional rules for the same ACL, repeat step 5. 6.
19 Layer 3 access control list policy The updated ACL rule displays in the ACL Entries list. To update additional rules for the same ACL, repeat step 4. 6. To add a new rule, complete step 5 through step 10 in “Creating a standard L3 ACL configuration” on page 700. The updated ACL rule displays in the ACL Entries list. To update additional rules for the same ACL, repeat step 5. 7. To delete an existing rule, select the rule you want to delete in the ACL Entries list and click the left arrow button. 8.
Layer 3 access control list policy 19 FIGURE 276 Add - L3 ACL Configuration (Extended) dialog box 4. Enter a name or number for the ACL in the ACL Name/Number field. 5. Select Permit or Deny from the Action list. 6. Enter a description for the ACL in the Remarks field. 7. Choose one of the following options from the Source list: • To enter an IP address, select IP Address and complete the following steps: a.
19 Layer 3 access control list policy • To select a network, select IP Address and choose a network from the list. To configure a network, click the ellipsis button and refer to “Network configuration” on page 721. • To enter a host name, select Host and enter the destination host name on which the ACL filters traffic in the Host list and text field. 9. Enter a VLAN identifier (valid values are from 1 to 4095) from the VLAN list. 10. Select the Log Enable check box to enable logging. 11.
Layer 3 access control list policy a. 19 Select the rule you want to edit in the ACL Entries list and click the left arrow button. The rule displays in the ACL Entry area. b. Complete step 5 through step 12 in “Creating an extended L3 ACL configuration” on page 704. The updated ACL rule displays in the ACL Entries list. To edit additional rules for the same ACL, repeat step 3. 4. To add a new rule, complete step 5 through step 12 in “Creating an extended L3 ACL configuration” on page 704.
19 Layer 3 access control list policy a. Select the rule you want to edit in the ACL Entries list and click the left arrow button. The rule displays in the ACL Entry area. b. Complete step 5 through step 12 in “Creating an extended L3 ACL configuration” on page 704. The updated ACL rule displays in the ACL Entries list. To edit additional rules for the same ACL, repeat step 4. 5. To add a new rule, complete step 5 through step 12 in “Creating an extended L3 ACL configuration” on page 704.
Layer 3 access control list policy 19 Creating an IPv6 L3 ACL configuration To create an IPv6 L3 ACL configuration, complete the following steps. 1. Select an Ethernet router product and select Configure > Security > L3 ACL > Product. The Device_Name - L3 ACL Configuration dialog box displays. 2. Select New IPv6 from the Add list. The Add - L3 ACL (IPv6) Configuration dialog box displays. FIGURE 277 Add - L3 ACL (IPv6) Configuration dialog box 3.
19 Layer 3 access control list policy • To enter an IP address, select IP Address and complete the following steps: a. Enter the destination IP address on which the ACL filters traffic in the IP Address list and text field. You can enter the IPv6 address in compressed (for example, you can compress 2001:db8:0:0:0:0:2:1 can be shortened to 2001:db8::2:1) or raw format. b. Enter the prefix length (1 through 128) in the Prefix Length field.
Layer 3 access control list policy 19 The new ACL displays in the ACLs list. 17. To set the configuration type and operations, refer to “Configuring the ACL configuration type and operations” on page 716. 18. (Ethernet routers only) To set the hit statistics duration, refer to “Configuring hit statistics” on page 716. 19. To deploy the configuration, click OK on the Device_Name - L3 ACL Configuration dialog box. The Deploy to Products - L3 ACL dialog box displays.
19 Layer 3 access control list policy Copying an IPv6 L3 ACL configuration To copy an IPv6 L3 ACL configuration, complete the following steps. 1. Select an Ethernet router product and select Configure > Security > L3 ACL > Product. The Device_Name - L3 ACL Configuration dialog box displays. 2. Select the ACL configuration you want to copy in the ACLs list and click Duplicate. The Duplicate - L3 ACL (IPv6 ) Configuration dialog box displays with the default name ‘Copy of Original_Name’.
Layer 3 access control list policy 19 11. Click OK on the Duplicate - L3 ACL (IPv 6) Configuration dialog box. The new ACL displays in the ACLs list. 12. To set the configuration type and operations, refer to “Configuring the ACL configuration type and operations” on page 716. 13. (Ethernet routers only) To set the hit statistics duration, refer to “Configuring hit statistics” on page 716. 14. To deploy the configuration, click OK on the Device_Name - L3 ACL Configuration dialog box.
19 Layer 3 access control list policy FIGURE 280 Device_Name - Port_Number - ACL Port Configuration dialog box 4. (Ethernet routers only) Select a duration (1 Second, 1 Minute, 5 Minutes, or Cumulative) to track the number of times an ACL filter is used in the Hits Stats Duration list. Click Refresh to collect the hit statistics. The application updates the Hits column of the Details of Selected ACL list. 5.
Layer 3 access control list policy a. 19 Select the Assign ACL option and choose one of the following options from the first Assign ACL list: • Select ACLs on this Product to assign ACLs deployed on the product to the port. The second list is populated with the ACLs deployed on the switch or associated with a save deployment object. • Select ACLs bound to this port to assign ACLs bound to the interface to the port. The second list is populated with the ACLs bound to the interface.
19 Layer 3 access control list policy Configuring the ACL configuration type and operations To configure the ACL configuration type and operation, complete the following steps. 1. Select the configuration type by choosing one of the following options: • Incremental — Deploys add and delete operations. During deployment, the Management application checks all ACLs to determine if the ACL name or number matches any ACL number already deployed on a switch.
Layer 3 access control list policy 19 Configuring L3 ACL advanced settings You configure L3 ACL advanced settings for extended L3 ACL device configurations.
19 Layer 3 access control list policy • Max-throughput (4) — Select to have the ACL filters packets that match the maximum throughput TOS. The decimal value is 4. • Min-delay (8) — Select to have the ACL filter packets that match the minimum delay TOS. The decimal value is 8. 4. Select one of the following protocols from the Protocol list to filter the packet by protocol.
Layer 3 access control list policy b. 19 Enter a port number or select a port application name from the Start list. If you selected range from the Operator list, enter the port number or name of the lower numbered port in the range. Click the ellipsis button to launch the Service dialog box to see a list of services and service groups. For more information about services and service groups, refer to “Service configuration” on page 730. c.
19 Layer 3 access control list policy b. Choose one of the following code types: The available code types vary depending on the selected message type.
Layer 3 access control list policy 19 14. Click OK on the Advanced Settings dialog box.
19 Layer 3 access control list policy 1. Click the Networks tab. FIGURE 282 Network dialog box, Networks tab 2. Review the List of Networks table: • Name — The user-defined network name. • Subnet — The IP address of the subnet. • Mask — The IP address of the mask. 3. Click Close on the Network dialog box. To finish configuring the ACL, return to one of the above procedures. Creating a network You can access the Network dialog box when configuring a standard or extended L3 ACL device configuration.
Layer 3 access control list policy 19 3. Enter a name for the network in the Name field. 4. Enter a valid IP address (IPv4 format) in the Subnet field. 5. Enter a valid IP address in the Mask field. If you use the ACL Network as the source IP address, the Subnet mask from the ACL Network will be converted to Wildcard mask when deploying the ACL to the device. The Network dialog box only accepts subnet mask. 6. Click OK on the Add Network dialog box. 7. Click Close on the Network dialog box.
19 Layer 3 access control list policy Copying a network You can access the Network dialog box when configuring a standard or extended L3 ACL device configuration.
Layer 3 access control list policy 19 3. Click Yes on the confirmation message. 4. Click Close on the Network dialog box. To finish configuring the ACL, return to one of the above procedures. Network group configuration The Management application allows you to filter traffic from a specific network group. A network group is made up of one or more devices, networks, or network groups.
19 Layer 3 access control list policy 2. Review the List of Network Groups table: • • • • • Name — The user-defined network group name. Host Names — The name of each host in the network group. Address Range — The range of IP addresses for the network group. Networks — The name of each network in the network group. Network Groups — The name of each network group in the network group. 3. Click Close on the Network dialog box. To finish configuring the ACL, return to one of the above procedures.
Layer 3 access control list policy 19 4. To add a host to the network group, complete the following steps. a. Enter a valid host name in the Host Name field. b. Click the right arrow button to move the host name to the Selected table. 5. To add an address range to the network group, complete the following steps. a. Enter an IP address for the start of the range in the Start field. b. Enter an IP address for the end of the range in the End field. c.
19 Layer 3 access control list policy 5. To edit an address range to the network group, complete the following steps. a. Select the range you want to edit in the Selected table and click the left arrow button. b. Change the IP address for the start of the range in the Start field. c. Change the IP address for the end of the range in the End field. d. Click the right arrow button to move the address range back to the Selected table. 6.
Layer 3 access control list policy 19 5. To add a host to the network group, complete the following steps. a. Enter a valid host name in the Host Name field. b. Click the right arrow button to move the host name to the Selected table. 6. To edit an address range to the network group, complete the following steps. 7. a. Select the range you want to edit in the Selected table and click the left arrow button. b. Change the IP address for the start of the range in the Start field. c.
19 Layer 3 access control list policy Deleting a network group NOTE You cannot delete a network group that is in use. You can access the Network dialog box when configuring a standard or extended L3 ACL device configuration.
Layer 3 access control list policy 19 Viewing existing services You can access the Service dialog box when configuring an extended L3 ACL device configuration.
19 Layer 3 access control list policy Creating a service You can access the Service dialog box when configuring an extended L3 ACL device configuration.
Layer 3 access control list policy 19 Editing a service You can access the Service dialog box when configuring an extended L3 ACL device configuration.
19 Layer 3 access control list policy 4. Select one of the following protocol options: • TCP • UDP 5. Enter a port number in the Port field. 6. Click OK on the Duplicate Service dialog box. 7. Click Close on the Service dialog box. To finish configuring the advanced settings for the ACL, refer to “Configuring L3 ACL advanced settings” on page 717. Deleting a service You can access the Service dialog box when configuring an extended L3 ACL device configuration.
Layer 3 access control list policy 19 Service group configuration The Management application allows you to filter traffic from a specific service group. A service group is made up of one or more port ranges, services, or service groups.
19 Layer 3 access control list policy 3. Click Close on the Service dialog box. To finish configuring the advanced settings for the ACL, refer to “Configuring L3 ACL advanced settings” on page 717. Creating a service group You can access the Service dialog box when configuring an extended L3 ACL device configuration.
Layer 3 access control list policy 19 5. To add a service to the group, complete the following steps. a. Select one or more services to add to the group in the Services table. b. Click the right arrow button to move the selected services to the Selected table. 6. To add a service group to the group, complete the following steps. 7. a. Select one or more service groups to add to the group in the Services table. b.
19 Layer 3 access control list policy 6. Click OK on the Edit Service Group dialog box. The Service dialog box, Service Group tab displays with the new group in the List of Service Groups table. 7. Click Close on the Service dialog box. To finish configuring the advanced settings for the ACL, refer to “Configuring L3 ACL advanced settings” on page 717. Copying a service group You can access the Service dialog box when configuring an extended L3 ACL device configuration.
Media Access Control (MAC) filter management 19 Deleting a service group You can access the Service dialog box when configuring an extended L3 ACL device configuration.
19 Media Access Control (MAC) filter management You can configure and manage MAC filters at the device or interface (port/trunk) level. NOTE You can only apply MAC filters inbound traffic. When you configure MAC filters on a device, the MAC filter does not execute until you deploy it on an interface. Once deployed to an interface, the device performs the action associated with the first matching filter (of all filters deployed to the device) to the packet.
Media Access Control (MAC) filter management 19 FIGURE 291 Add MAC Filter dialog box 3. Enter a MAC filter number in the MAC Filter # field. MAC filter numbers range from 1 through 1024. 4. (Optional) Enter a description of the MAC filter in the Description field. The description is saved to the Management application database only. It is not saved to the switch. 5. Select Permit or Deny from the Action list. 6.
19 Media Access Control (MAC) filter management 9. In the Operator list, select one of the following to specify a binary operator: • • • • = (equal to) != (not equal to) > (greater than) < (less than). This field is not available when the Ethernet Type is none. 10. Enter the type of frame in the Frame Type field. This ia 2 byte hexadecimal value. Valid values include 0600 to FFFF. This field is not available when the Ethernet Type is none. 11. Click OK on the Add MAC Filter dialog box.
Media Access Control (MAC) filter management 19 4. Click OK on the MAC Filter Saved Configurations dialog box. The Device_Name - MAC Filter Configuration dialog box displays with the selected MAC filters in the MAC Filters table. If you selected a saved deployment configuration, all MAC filters associated with the saved deployment configuration display in the MAC Filters table. 5. Click OK on the Device_Name - MAC Filter Configuration dialog box. The Deploy to Products - MAC Filter dialog box displays.
19 Media Access Control (MAC) filter management 6. In the Destination Address list, select one of the following options: • Any • MAC Selecting MAC enables the Destination Address and Destination Mask fields. 7. a. Enter the destination MAC address on which the configuration filters traffic in the Destination Address field. b. Enter the mask associated with the destination MAC address in the Destination Mask field.
Media Access Control (MAC) filter management 19 4. Enter a description of the MAC filter in the Description field. 5. Select Permit or Deny from the Action list. 6. In the Source Address list, select one of the following options: • Any • MAC Selecting MAC enables the Source Address and Source Mask fields. 7. a. Enter the source MAC address on which the configuration filters traffic in the Source Address field. b. Enter the mask associated with the source MAC address in the Source Mask field.
19 Media Access Control (MAC) filter management Deleting a MAC filter 1. Select Configure > Security > MAC Filter > Product. The Device_Name - MAC Filter Configuration dialog box displays. 2. Select the MAC filter you want to delete in the MAC Filters table and click Delete. 3. Click Yes on the confirmation message. 4. Click OK on the Device_Name - MAC Filter Configuration dialog box. NOTE The MAC Filter is not deleted from the switch until you deploy the configuration to the switch.
Media Access Control (MAC) filter management 19 Clearing MAC filter assignments To clear a MAC filter assignment from a port or product, complete the following steps. 1. Select Configure > Security > MAC Filter > Port. The Port Selection - MAC Filter dialog box displays. 2. Select the port you want to clear the MAC filter from in the Available Ports list and click the right arrow button. You can select more ports or products from the Deploy to Ports - MAC Filter dialog box. 3.
19 Security configuration deployment Security configuration deployment Figure 294 shows the standard interface used to deploy security configurations. FIGURE 294 Deploy to Product/Ports dialog box Before you can deploy a security configuration, you must create the security configuration.
Security configuration deployment 19 Deploying a security configuration on demand To deploy a security configuration immediately, complete the following steps. FIGURE 295 Deploy to Product/Ports dialog box 1. Choose one of the following options: • Deploy now — Select to deploy the configuration immediately on the product or port without saving the deployment definition.
19 Security configuration deployment • Select the Pre-deployment check box to capture a snapshot of the product’s configuration prior to deployment of the security configuration. • Select the Post-deployment check box to capture a snapshot of the product’s configuration after deployment of the security configuration. If you select the Post-deployment check box, enter the amount of time (between 1 and 300 seconds) you want the application to wait before capturing the snapshot in the Delay field. 8.
Security configuration deployment 19 5. Click the Snapshot Use check box and click the ellipsis button to select the product monitoring template. NOTE The Snapshot Use check box is only available for IronWare products. The Pre-Post Snapshot Properties dialog box displays. 6. Select the product monitoring template you want to use from the CLI Template list. 7.
19 Security configuration deployment 2. Choose one of the following options: • Select New from the Add list. The Add - Layer 2 ACL Configuration dialog box displays. • Select an ACL in the list and click Edit. The Edit - Layer 2 ACL Configuration dialog box displays. 3. Configure the Layer 2 ACL and click OK on the Add/Edit - Layer 2 ACL Configuration dialog box. 4. Click OK on the Device_Name - Layer 2 ACL Configuration dialog box. The Deploy to Products - Layer 2 ACL dialog box displays. 5.
Security configuration deployment 19 Configuring a one-time deployment schedule To configure a one-time schedule, complete the following steps. 1. Select One Time from the Frequency list. 2. Select the time of day you want deployment to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. 3. Click the Date list to select a date from the calendar.
19 Security configuration deployment Configuring a monthly deployment schedule To configure a monthly schedule, complete the following steps. 1. Select Monthly from the Frequency list. 2. Select the time of day you want deployment to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. 3. Select the day you want deployment to run from the Day of the Month list (1 through 31).
Chapter 20 Zoning In this chapter • Zoning overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Zone database size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Zoning configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Zoning administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
20 Zoning overview Blue Zone Server 2 Server 1 Storage 2 Red Zone Storage 1 RAID Green Zone Storage 3 Server 3 FIGURE 298 Zoning NOTE A Network OS fabric supports zoning only if all devices in the fabric are running Network OS v2.1.0 or later. NOTE Zone objects based on physical port number or port ID (D,I ports) are not supported in Network OS fabrics. Online zoning Online zoning allows you to do the following: • • • • • • 756 View both defined and active zone information in the fabric.
Zoning overview 20 Offline zoning Offline zoning is supported in Network OS fabrics. Offline zoning is supported in Network OS and Fabric OS fabrics. NOTE Offline zoning is available only for Enterprise and Professional Plus editions. Offline zoning enables you to copy a fabric zone database and edit it offline. The benefits to offline zoning include the following: • You want to make changes to the zone database now, but apply them later.
20 Zone database size Zone database size The supported maximum zone database size is 1 MB. If the fabric contains only Backbone Chassis platforms, the supported maximum zone database size is 2 MB. NOTE Network OS recommends a maximum zone database size of 150 KB. As the size of the zone database increases, performance decreases. The Professional Edition does not support large zone databases. In the Professional Edition, the maximum size of the zone database without zone aliases is 32 KB.
Zoning configuration 20 For specific instructions, refer to “Activating a zone configuration” on page 770. 9. Set zoning policies, if necessary. For specific instructions, refer to “Enabling or disabling the default zone for fabrics” on page 764. 10. Click OK or Apply to save your changes. Any zones or zone configurations you have changed are saved in the zone database. Creating a zone 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2.
20 Zoning configuration Adding members to a zone Use this procedure to add a member to a zone when the member is listed in the Potential Members list of the Zone DB tab. Enterprise and Professional Plus editions: For instructions to add a member to a zone when the member is not listed in the Potential Members list, refer to the procedure “Creating a member in a zone” on page 761. 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2.
Zoning configuration 20 Creating a member in a zone Use this procedure to add a member to a zone when the member is not listed in the Potential Members list of the Zone DB tab. For instructions to add a member to a zone when the member is listed in the Potential Members list, refer to the procedure “Adding members to a zone” on page 760. 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Click the Zone DB tab if that tab is not automatically displayed. 3.
20 Zoning configuration 2. Click the Zone DB tab if that tab is not automatically displayed. 3. Select a fabric from the Zoning Scope list. This identifies the target entity for all subsequent zoning actions and displays the zoning database for the selected entity. 4. Click the plus sign (+) by the appropriate zone in the Zones list to expand the listing and show the zone’s members. 5.
Zoning configuration 20 Deleting a zone 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Click the Zone DB tab if that tab is not automatically displayed. 3. Select a fabric from the Zoning Scope list. This identifies the target entity for all subsequent zoning actions and displays the zoning database for the selected entity. 4. Select one or more zones in the Zones list that you want to delete, then right-click and select Delete.
20 Zoning configuration 6. Click OK or Apply to save your changes. Any zones or zone configurations you have changed are saved in the zone database. Customizing the zone member display In the Zoning dialog box, you can customize which properties are displayed and in what order. 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays, based on the Configure > Zoning menu selection. 2. Click the Zone DB tab if that tab is not automatically displayed. 3.
Zoning configuration 20 The Zoning Policies dialog box closes and the Zone DB tab displays. 8. Click OK or Apply to save your changes. Any zones or zone configurations you have changed are saved in the zone database. Creating a zone alias An alias is a logical group of port index numbers and WWNs. Specifying groups of ports or devices as an alias makes zone configuration easier by enabling you to configure zones using an alias rather than inputting a long string of individual members.
20 Zoning configuration 3. Select a fabric from the Zoning Scope list. 4. Select Alias from the Type list. 5. Select the alias you want to edit in the Alias list and click Edit. The Edit Alias dialog box displays. 6. Add members to the alias by completing the following steps. a. Select an option from the Type list to choose how to display the objects in the Potential Members list. For Network OS fabrics, WWN is selected by default and cannot be changed. b.
Zoning configuration 20 Exporting zone aliases 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Click the Zone DB tab if that tab is not automatically displayed. 3. Select a fabric from the Zoning Scope list. 4. Select Alias from the Type list. 5. Click Export. The Export Alias dialog box displays. 6. Browse to the location to which you want to export the zone alias data. 7. Enter a name for the export file in the File Name field. 8. Click Export Alias. 9.
20 Zoning configuration Duplicating a zone alias 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Click the Zone DB tab if that tab is not automatically displayed. 3. Select a fabric from the Zoning Scope list. 4. Select Alias from the Type list. 5. Right-click the zone alias you want to duplicate and select Duplicate. The duplicated zone alias displays in the Alias list (for example, _Copy). 6. Edit the name.
Zoning configuration 20 Viewing zone configuration properties 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Click the Zone DB tab if that tab is not automatically displayed. 3. Select a fabric from the Potential Members list. 4. Right-click the zone configuration you want to review in the Zone Configurations list and select Properties. The Zone Configuration Properties dialog box displays. 5. Review the zone configuration properties. 6.
20 Zoning configuration 4. Click the plus sign (+) by the appropriate zone configuration in the Zone Configurations list to expand the listing and show the zone configuration members. 5. Perform one of the following actions: • Right-click the name of the zone you want to remove in the Zone Configurations list and select Remove. • To remove multiple zones, select the zones to be removed from the zone configuration, and click the left arrow between the Zones list and the Zone Configurations list.
Zoning configuration 20 a. Make sure the selected zone configuration is the one you want to activate. b. (Optional) Select the Generate a report with the activation of new zone configuration check box to generate the Zone Configuration Activation report. c. If you are activating a zone configuration from the offline zone database, select or clear the Save only the selected zone configuration to the existing zone database in the fabric check box.
20 Zoning configuration 5. Click Yes on the confirmation message. If the deactivation succeeded, the zone configuration no longer displays in the Active Zone Configuration tab. If the deactivation failed, the zone configuration still displays in the Active Zone Configuration tab. 6. Click OK or Apply to save your changes. Any zones or zone configurations you have changed are saved in the zone database. Renaming a zone configuration 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2.
Zoning configuration 20 NOTE If you select “Do not show me this again.” on the confirmation message, the next time you delete a zone configuration, it will be deleted without requesting confirmation from you. If you delete something in error, click Cancel on the Zoning dialog box to exit without saving changes since the last operation (Apply or Activate). When you reopen the dialog box, the zone configuration is restored. 6. Click OK or Apply to save your changes.
20 Zoning configuration 2. Click the Zone DB tab if that tab is not automatically displayed. 3. Select a zone database from the Zone DB list. 4. Select Save As from the Zone DB Operation list. The Save Zone DB As dialog box displays. 5. Enter a name for the database in the Zone DB Name field and click OK. 6. Select a fabric from the Zoning Scope list. This identifies the target entity for all subsequent zoning actions and displays the zoning database for the selected entity.
Zoning configuration 20 The message closes and the selected zone configurations are removed from the Zone Configurations list. 6. Click OK to save your work and close the Zoning dialog box. Any zones or zone configurations you have changed are saved in the zone database. Refreshing a zone database 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Click the Zone DB tab if that tab is not automatically displayed. 3. Select a zone database from the Zone DB list. 4.
20 Zoning configuration Merging two zone databases If a zone or zone configuration is merged, the resulting zone or zone configuration includes all members that were marked for addition or removal as well as all members not otherwise marked. NOTE: You cannot merge the following zones with a Network OS fabric: • • • • • Zones with aliases (can merge with Network OS 3.0.0 and later) Zones with D,I members TI zones QoS zones Redirection zones 1. Select Configure > Zoning > Fabric.
Zoning configuration 20 5. (Optional) Merge elements (zone configurations, zones, or aliases) by completing the following steps: a. Select one or more of the same element type from the Reference Zone DB area. You can select zone configurations, zones, or aliases, but do not mix element types. b. Select the same type of element in the Editable Zone DB area. If you selected a zone configuration in the Reference Zone DB area, you must select a zone configuration in the Editable Zone DB area. c.
20 Zoning configuration 2. Select Compare from the Zone DB Operation list. The Compare/Merge Zone DBs dialog box displays, as shown in Figure 299. 3. Select the database for the first fabric from the Reference Zone DB list. 4. Select the database for the second fabric from the Editable Zone DB list. 5. Set up a zone configuration that contains the active zones in both fabrics: a. Select the name of the active zone configuration from the Reference Zone DB area. b.
Zoning administration 20 5. Click Export Zone DB. 6. Click OK to save your work and close the Zoning dialog box. Importing an offline zone database NOTE You cannot import an online zone database. You cannot import a zone database that contains zones with duplicate members. 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Select an offline zone database from the Zone DB list. 3. Select Import from the Zone DB Operation list. The Import Zone DB dialog box displays. 4.
20 Zoning administration Comparing zone databases You can compare zone databases against one another to identify any and all differences between their memberships prior to sending them to the switch. Once the two databases have been compared, icons display to show the differences between the two databases. These icons are illustrated and described in Table 79. TABLE 79 Icon Compare icon indicators Description Added — Displays when an element is added to the editable database.
Zoning administration 20 The Reference Zone DB and Editable Zone DB areas display all available element types (zone configurations, zones, and aliases) for the two selected zone databases. In the Editable Zone DB area, each element type and element display with an icon indicator (Table 79) to show the differences between the two databases. 5.
20 Zoning administration Setting change limits on zoning activation Use this procedure to set a limit on the number of changes a user can make to the zone database before activating a zone configuration. If the user exceeds the limit, zone configuration activation is not allowed. By default, all fabrics allow unlimited changes. Changes include adding, removing, or modifying zones, aliases, and zone configurations. Use this procedure to set the following limits: • Set a different limit for each fabric.
Zoning administration 20 This identifies the target entity for all subsequent zoning actions and displays the zoning databases for the selected entity. 3. Select the Fabric Zone DB from the Zone DB list. 4. Select Clear All from the Zone DB Operation list. 5. Click Yes on the confirmation message. The message closes and the Fabric Zone DB is cleared of all zoning configurations. 6. Click OK to close the Zoning dialog box.
20 Zoning administration If the member is found, all instances of the zone member found are highlighted in the Zones list. Finding a zone member in the potential member list Use this procedure to locate a zone member in the Potential Members list on the Zone DB tab. 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Click the Zone DB tab if that tab is not automatically displayed. 3. Select a fabric from the Zoning Scope list.
Zoning administration 20 This identifies the target entity for all subsequent zoning actions and displays the zoning database for the selected entity. 4. Select the zone configuration member (for example, the zone) in the Zone Configurations list that you want to find in the Zones list. (Press SHIFT or CTRL and click each zone configuration member to select more than one zone configuration member.) 5. Click Find < between the Zones list and the Zone Configurations list.
20 Zoning administration Removing an offline device The Management application enables you to remove an offline device from all zones and zone aliases in the selected zone DB. 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Select a fabric from the Zoning Scope list. This identifies the target entity for all subsequent zoning actions and displays the zoning database for the selected entity. 3. Select Offline Utility from the Zone DB Operation list.
Zoning administration 20 6. Enter the WWN, name, domain and port index numbers, or alias — whichever is appropriate for the method you chose in step 5. When you choose the WWN method, you may define a name for the replacement zone member. 7. Click OK. The new zone member replaces the old zone member in the Zones list and the Replace Zone Member dialog box closes. 8. Click OK or Apply to save your changes. Any zones or zone configurations you have changed are saved in the zone database.
20 Zoning administration 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Select a fabric from the Zoning Scope list. This identifies the target entity for all subsequent zoning actions and displays the zoning database for the selected entity. 3. Select Offline Utility from the Zone DB Operation list. The Offline Device Management dialog box displays. 4. Clear the Remove column check box for the offline device you want to replace. 5.
Chapter 21 Port Fencing In this chapter • About port fencing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Adding thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Editing thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Removing thresholds.
21 About port fencing Viewing port fencing configurations NOTE This feature is only available for Fabric OS devices. NOTE This feature requires a Trial or Licensed version. Port Fencing allows you to protect your SAN from repeated operational problems experienced by ports. Use Port Fencing to set threshold limits for the number of specific port events permitted during a given time period on the selected object.
About port fencing 21 • Thresholds table — List of configured thresholds based on the threshold type selected in the Violation Type list. Limit (Fabric OS) — The number of events allowed for the assigned threshold. If the object has no fencing support or no fencing changes, this field displays two hyphens separated by a space (- -). When the object is only partially managed by the management application, this field displays as inactive (grayed-out).
21 Thresholds Operational State — The operational state of the port. Blocked Configuration — The current configuration of the port (Blocked or Unblocked). Port WWN — The port world wide name of the port. Connected Product — The device label of the connected object. Connected Port # — The port number of the connected port. Connected Port WWN — The port world wide name of the connected port. Connected Port Name — The name of the connected port configured in the Element Manager.
Thresholds 21 C3 Discard Frames threshold NOTE This threshold is only available for Fabric OS devices running 6.3 or later. Use this type of threshold to block a port when a C3 Discard Frames violation meets the Fabric OS switch threshold. This threshold is only supported on directors, switches, and blades with a 4 Gbps, 8 Gbps, or 16 Gbps ASIC.
21 Thresholds Invalid CRCs threshold NOTE This threshold is only available for Fabric OS devices. Use this type of threshold to block a port when an Invalid CRCs violation meets the Fabric OS switch threshold. Invalid words threshold NOTE This threshold is only available for Fabric OS devices. Use this type of threshold to block a port when an Invalid Words violation meets the Fabric OS switch threshold. Link Reset threshold NOTE This threshold is only available for Fabric OS devices.
Adding thresholds 21 Adding thresholds NOTE Only available for Fabric OS products. NOTE This feature requires a Trial or Licensed version. The Management application allows you to create Invalid CRCs, Invalid words, Link, Link Reset, Protocol Error, Security, and Sync Loss thresholds. Adding a C3 Discard Frames threshold NOTE This threshold is only available for Fabric OS devices running 6.3 or later. Use to block a port when a C3 Discard Frames violation type meets the Fabric OS switch threshold.
21 Adding thresholds FIGURE 303 Add C3 Discard Frames Threshold dialog box 4. Enter a name for the threshold in the Name field. 5. Select one of the following options: • Default — Uses device defaults. Go to step 8. • Custom — Uses your selections. Continue with step 6. 6. Enter the number of C3 discarded frames allowed for the threshold in the Threshold errors field. 7. Select the time period for the threshold from the errors per list.
Adding thresholds 21 Adding an Invalid CRCs threshold NOTE This threshold is only available for Fabric OS devices. NOTE This feature requires a Trial or Licensed version. Use to block a port when an Invalid CRC violation type meets the Fabric OS switch threshold. For default threshold values for Fabric OS devices, refer to Chapter 7 of the Fabric Watch Administrator's Guide. To add an Invalid CRCs threshold, complete the following steps. 1. Select Monitor > Fabric Watch > Port Fencing.
21 Adding thresholds 8. Click OK to add the Invalid CRCs threshold to the table and close the Add Invalid CRCs Threshold dialog box. To assign this threshold to fabrics, switches, or switch ports, refer to “Assigning thresholds” on page 803. 9. Click OK on the Port Fencing dialog box. Adding an Invalid Words threshold NOTE This threshold is only available for Fabric OS devices. NOTE This feature requires a Trial or Licensed version.
Adding thresholds 21 • Minute — the port is blocked as soon as the specified number of invalid words allowed is reached within a minute. • Hour — the port is blocked as soon as the specified number of invalid words allowed is reached within a hour. • Day — the port is blocked as soon as the specified number of invalid words allowed is reached within a day. 8. Click OK to add the Invalid Words threshold to the table and close the Add Invalid Words Threshold dialog box.
21 Adding thresholds 7. Select the time period for the threshold from the errors per list. The following choices are available: • None — the port is blocked as soon as the specified number of link resets allowed is met. • Second — the port is blocked as soon as the specified number of link resets allowed is reached within a second. • Minute — the port is blocked as soon as the specified number of link resets allowed is reached within a minute.
Adding thresholds 21 FIGURE 307 Add Protocol Error Threshold dialog box 4. Enter a name for the threshold in the Name field. 5. Select the Fabric OS check box. a. Select one of the following options: • Default — Uses device defaults. Go to step 6. • Custom — Uses your selections. Continue with step b. b. Enter the number of protocol errors allowed for the threshold from the Threshold errors field. c. Select the time period for the threshold from the errors per list.
21 Adding thresholds Adding a State Change threshold NOTE This threshold is only available for Fabric OS devices running 6.3 or later. NOTE This feature requires a Trial or Licensed version. Use to block a port when a state change violation type meets the Fabric OS switch threshold. For 4 Gbps Router, Extension Switches and Blades only, when you apply this threshold on an E Port, the threshold is also applied to the VE Ports (internally by Fabric OS).
Adding thresholds 21 • Day — the port is blocked as soon as the specified number of state changes allowed is reached within a day. 8. Click OK to add the state changes threshold to the table and close the Add State Change Threshold dialog box. To assign this threshold to fabrics, switches, or switch ports, refer to “Assigning thresholds” on page 803. 9. Click OK on the Port Fencing dialog box. Assigning thresholds You can assign thresholds to any active object in the Ports table.
21 Editing thresholds 2. Right-click anywhere in the Ports table and select Expand. 3. Select a blocked port from the Ports table. 4. Click Unblock. 5. Click OK on the message. If you did not solve the root problem, the threshold will trigger again. 6. Click OK on the Port Fencing dialog box. Avoiding port fencing inheritance When you directly assign a threshold to an object, the threshold is inherited by all subordinate objects in the tree (unless they already have directly assigned thresholds).
Editing thresholds 21 Use to block a port when a C3 Discard Frames violation type meets the Fabric OS switch threshold. To edit a C3 Discard Frames threshold, complete the following steps. 1. Select Monitor > Fabric Watch > Port Fencing. The Port Fencing dialog box displays. 2. Select C3 Discard Frames (Fabric OS only) from the Violation Type list. 3. Select the threshold you want to change and click Edit. The Edit C3 Discard Frames dialog box displays. 4.
21 Editing thresholds Editing an Invalid Words threshold NOTE This threshold is only available for Fabric OS devices. NOTE This feature requires a Trial or Licensed version. Use to block a port when the Invalid Word Threshold violation type meets the Fabric OS switch threshold. To edit an Invalid Words threshold, complete the following steps. 1. Select Monitor > Fabric Watch > Port Fencing. The Port Fencing dialog box displays. 2. Select Invalid Words (Fabric OS only) from the Violation Type list. 3.
Editing thresholds 21 If the threshold has already been assigned to ports, an “Are you sure you want to make the requested changes to this threshold on “X” ports?” message displays. Click OK to close. To assign this threshold to fabrics, switches, or switch ports, refer to “Assigning thresholds” on page 803. 6. Click OK on the Port Fencing dialog box. Editing a Protocol Error threshold NOTE This threshold is only available for Fabric OS devices. NOTE This feature requires a Trial or Licensed version.
21 Editing thresholds Use to block a port when a state change violation type meets the Fabric OS switch threshold. For 4 Gbps Router, Extension Switches and Blades only, when you apply this threshold on an E Port, the threshold is also applied to the VE Ports (internally by Fabric OS). To edit an State Change threshold, complete the following steps. 1. Select Monitor > Fabric Watch > Port Fencing. The Port Fencing dialog box displays. 2. Select State Change (Fabric OS only) from the Violation Type list.
Removing thresholds 21 5. Click OK on the Port Fencing dialog box. Viewing all thresholds on a specific Fabric OS device NOTE This threshold is only available for Fabric OS devices. NOTE This feature requires a Trial or Licensed version. To view all thresholds assigned to a specific switch, complete the following steps. 1. Select Monitor > Fabric Watch > Port Fencing. The Port Fencing dialog box displays. 2. Right-click anywhere in the Ports table and select Expand. 3.
21 Removing thresholds 1. Select Monitor > Fabric Watch > Port Fencing. The Port Fencing dialog box displays. 2. Select a threshold type from the Violation Type list. 3. Select the object with the threshold you want to remove in the Ports table. 4. Click the left arrow. NOTE If the selected object inherits a threshold assignment from an object higher in the tree, you cannot remove the threshold.
Chapter 22 FICON Environments In this chapter • FICON configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Configuring a switch for FICON operation . . . . . . . . . . . . . . . . . . . . . . . . . . • Configuring an Allow/Prohibit Matrix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Configuring an Allow/Prohibit Matrix manually . . . . . . . . . . . . . . . . . . . . . .
22 Configuring a switch for FICON operation FIGURE 309 Cascaded configuration, two domains FIGURE 310 Cascaded configuration, three domains, but only two in a path Configuring a switch for FICON operation This section provides a basic guide for configuring a switch for FICON operation. Procedures assume that the switch is installed and IP addresses are assigned to the switch for discovery and access by the Management application.
Configuring a switch for FICON operation 22 Observe the following best practices: • Always check the version of firmware on a switch • Unless otherwise advised by a certified Fabric OS support professional, always load the most recently qualified firmware. • Before upgrading or downgrading firmware read the upgrade and downgrade considerations in the firmware release notes. 4. If incorporating more than one switch into a fabric, refer to planning steps in “Cascaded FICON fabric” on page 826. 5.
22 Configuring a switch for FICON operation • Required firmware for the switch. Refer to step 3. • Port addressing. The port address is important because it is implemented in HCD or IOCP. The easiest port addressing scheme is to start from 0x00 at the bottom left of the port card, increment on ports going up the card, then continue starting numbering from the bottom right of the next column of ports. Any port addressing scheme is possible however. 6.
Configuring a switch for FICON operation 22 • To manually configure SNMP for discovery, select Manual to activate the SNMP tab, then select the SNMP tab. Fill out the fields as required. . FIGURE 312 Add Fabric Discovery dialog box (SNMP tab) Refer to the “SAN discovery overview” section in Chapter 3, “Discovery” for more information on using these dialog boxes. 7. Add all required licenses to the switch using the following steps: a.
22 Configuring a switch for FICON operation FIGURE 313 Selecting Firmware Management from Configure menu The Firmware Management dialog box displays. 10. Select the Download tab (Figure 314). FIGURE 314 Firmware download 11. Select the switches in the Available Switches panel where you want to download firmware, and then click the right arrow to move them under Selected Switches. 12. Click Download.
Configuring a switch for FICON operation 22 13. Select the Repository tab to import new firmware files for downloads. Refer to the “Firmware management” section in Chapter 14, “SAN Device Configuration” for more information on importing firmware. 14. If you are not using virtual fabrics or you do not plan to enable virtual fabrics and only use the default switch, skip to step 15.
22 Configuring FICON display The recommended policy is to disable the default zone (No Access). Although enabling the default zone (All Access) can be used for FICON environments, prohibiting connection between ports using the Configure Allow/Prohibit Matrix dialog box requires activating at least one zone.
Configuring an Allow/Prohibit Matrix 22 Configuring an Allow/Prohibit Matrix The Allow/Prohibit Matrix is a FICON port attribute that can be used to prohibit communication between specific ports. Allow/Prohibit Matrix are not recommended on E_Ports (inter-switch links). The Allow/Prohibit Matrix can be manipulated by host-based management programs using FICON Control Unit Port (CUP), or from a Management application program to create policies and determine paths for data and command flows.
22 Configuring an Allow/Prohibit Matrix manually A prohibit icon ( ) displays at the intersection point. If you know the port addresses of the ports for which you want to prohibit or allow communication and do not want to search the matrix for the exact port intersection point, use the procedure in “Configuring an Allow/Prohibit Matrix manually” on page 820. 5. Repeat step 4 as needed to create the matrix you want to apply.
Configuring an Allow/Prohibit Matrix manually 22 FIGURE 316 Manual Allow/Prohibit dialog box NOTE The Manual Allow/Prohibit dialog box is only available for Fabric OS products. 5. Select one of the following options: • Select Allow to allow communication between two specific ports. • Select Prohibit to prohibit communication between two specific ports. 6. Enter the port number of the first port for which you want to allow or prohibit communication in the Port Address 1 field. 7.
22 Saving or copying Allow/Prohibit Matrix configurations to another device Saving or copying Allow/Prohibit Matrix configurations to another device When copying or saving a configuration from a small switch (source switch with fewer ports; for example, 64 ports) to a larger switch (destination switch with a larger number of ports; for example, 256 ports) only the port address range of the smaller switch will be affected on the larger switch.
Saving or copying Allow/Prohibit Matrix configurations to another device 22 6. Select the check box for the switch to which you want to save the configuration in the Selected Switch list. 7. Click OK. A message displays stating that the outstanding port configuration is discarded when copying a configuration from the switch with more ports to a switch with fewer ports and vice versa. Click OK to close the message. The copied configuration displays in the Available Switches list under the selected switch.
22 Activating an Allow/Prohibit Matrix configuration A message displays stating that the outstanding port configuration is discarded when copying a configuration from the switch with more ports to a switch with fewer ports and vice versa. Click OK to close the message. The saved configuration displays in the Available Switches table under the selected switch.
Deleting an Allow/Prohibit Matrix configuration 22 Deleting an Allow/Prohibit Matrix configuration You cannot delete the active configuration, the IPL configuration, or a configuration that is marked as having uncommitted changes. 1. Select Configure > Allow/Prohibit Matrix. The Configure Allow/Prohibit Matrix dialog box displays. 2. Select the Allow/Prohibit Matrix configuration you want to delete.
22 Cascaded FICON fabric Cascaded FICON fabric NOTE You must have FICON Management privileges to configure a fabric for cascaded FICON. NOTE If HIF mode is not enabled and the FMS mode is deployed, then the fabric will set the HIF key. The Management application enables you to easily configure a fabric for cascaded FICON. Note that configuring a fabric for cascaded FICON may be disruptive to current I/O operations in the fabric, as this involves disabling and enabling the switches in the fabric.
Cascaded FICON fabric 22 Configuring a cascaded FICON fabric The FICON wizard automatically creates HIFC settings that support a cascaded FICON fabric. 1. Select Configure > FICON > Configure Fabric or right-click a fabric in the product tree and select FICON > Configure Fabric. The Configure Cascaded FICON Fabric screen of the FICON Configuration dialog box displays, as shown in Figure 320. FIGURE 320 Configure Cascaded FICON Fabric /Switch dialog box 2.
22 Cascaded FICON fabric 5. Select the DLS check box to enable Dynamic Load Sharing (DLS) or Lossless DLS only on switches that support lossless DLS. For more information, refer to “Enabling DLS” on page 828. You must enable DLS to select routing policies. 6. Select one of the following options to enable port-based, exchange-based, or device-based routing on switches: • Port-Based enables port-based routing on 4 Gbps platform switches.
Cascaded FICON fabric merge 22 Cascaded FICON fabric merge The Management application provides a wizard to help you merge two fabrics for cascaded FICON. Note that merging two cascaded FICON fabrics may be disruptive to current I/O operations in both fabrics as this involves disabling and enabling the switches in both fabrics. The merge process will not make any configuration changes on the primary (production) fabric that are disruptive.
22 Cascaded FICON fabric merge • (Optional) Configures long distance settings on selected ports of primary and secondary fabrics (requires an Extended Fabric license). NOTE If the distance between the merged fabrics is 10 km or greater, you must configure the connection as a long distance connection. Note that the merge wizard does not enable primary fabric switches for DLS, In-Order Delivery (IOD), insistent domain ID flag (IDID), and Advanced Performance Tuning (APT).
Cascaded FICON fabric merge 22 1. Select Configure > FICON > Merge Fabrics or right-click a fabric in the product tree and select FICON > Merge Fabrics. The Overview screen of the cascade FICON fabrics merge wizard displays. NOTE Cascade FICON fabrics merge wizard is only available for Fabric OS products. 2. Click Next. The Select fabrics screen displays. 3. Select the two fabrics you want to merge under Available Fabrics, and click the right arrow to move them to Selected Fabrics.
22 Cascaded FICON fabric merge 9. Click Next. The Check merge screen displays. A Status details table shows progress through merge check points. A rotating arrow under Status indicates a merge check step is in progress. A blue check mark indicates successful completion of that merge check. A red stop sign indicates a failed step. If the configuration is successful, all configuration items have blue check marks. 10. If the merge fails, but is recoverable, click Resolve. 11.
Cascaded FICON fabric merge 22 Resolving merge conflicts You can resolve the following types of switch configuration conflicts: • • • • Domain ID TOV Buffer To Buffer Credit Disable Device Probe NOTE This test will be skipped if all primary and secondary fabric switches are found to be running Fabric OS 7.0 and later. • • • • • • Route Priority Per Frame Sequence Level Switching Suppress Class F Long Distance Setting Data Field Size VC Priority Note that not all tests support resolution.
22 Port groups 5. Perform step 12 through step 15 of the procedure “Merging two cascaded FICON fabrics” on page 830 to finish resolving a merge conflict. Port groups A port group is a group of FC ports from one or more switches within the same fabric. Port groups are user-specific; you can only view and manage port groups that you create. The ports display in the order in which you add them to the port group.
Port groups 22 FIGURE 321 Port Groups dialog box 2. Click New. 3. Enter a name for the port group in the Name field. 4. Enter a description for the port group in the Description field. 5. Select one or more ports to add to the group in the Group Type - FC Ports list. A port group must have at least one port in the Membership List. All ports must be from switches in the same fabric. 6. Click the right arrow button. The selected ports display in the Membership List. 7. Click Update.
22 Port groups If a device is removed from a fabric, then all ports associated with that device are automatically removed permanently from the port group. If the port group only contains ports from the removed device, then the port group is removed permanently from the Port Groups dialog box. If a fabric or device is added to the topology while the Port Groups dialog box is open, it does not display in the Group Type - FC Ports tree until you close and reopen the Port Groups dialog box. 2.
Swapping blades 22 2. Select the port group you want to delete in the Port Groups list. 3. Click Remove. The selected ports are removed from the Port Groups list. 4. Click OK. Swapping blades NOTE Blade-based port swap is mainly used for FICON and is only applicable for port blades. However, the Management application does not block blade-based port swap for other application blades, including the 8 Gbps 24-port blade. You can swap all of the ports from one blade to another blade.
22 Swapping blades 7. Click Yes on the confirmation message. Once the swap blade operation is complete, a “success” or “failure” message displays.
Chapter 23 IP Element Manager In this chapter • Element Manager overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Element Manager CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Element Manager interface overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Web Management interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Web Management interface troubleshooting . . . . . . . . .
23 Element Manager CLI Accessing the IP Element Manager CLI The Element Manager CLI uses SNMP to query the login authentication type (for example, Telnet Login or Enable Password Login) that the device uses to create the Telnet session token. If SNMP fails, the Element Manager CLI will not work for that device. To display the Element Manager CLI, complete the following steps. 1. Right-click a device on the Network Objects list or the IP or L2 Topology views and select CLI through Server.
Element Manager interface overview 23 Element Manager interface overview The Element Manager interface provides management and monitoring functions to troubleshoot issues on the Ethernet router series switch running firmware version 5.4 or later. Element Manager is accessible from the Management application and provides the details of the switch and its ports.
23 Element Manager interface overview 4. Element Manager toolbar - Provides quick access to dialog boxes and functions. For more information, refer to “Element Manager toolbar” on page 844. 5. Port properties list - Displays the port properties for the selected view (Port, Table, or VLAN). For more information, refer to “Displaying port properties” on page 845. 6. Status bar - Displays the Auto Rediscover progress and last discovered details of the switch.
Element Manager interface overview 23 FIGURE 324 Properties dialog box You can enable and disable port actions as well as access performance monitoring from the Ports tab of the Properties dialog box (Figure 325). Refer to “Port actions” on page 436 for more information.
23 Element Manager interface overview FIGURE 325 Properties dialog box - Ports tab Element Manager toolbar The Element Manager toolbar (Figure 326) is located beneath the switch properties. FIGURE 326 Element Manager - toolbar The Element Manager toolbar provides the following icons and buttons: 1. View list — Select a view (Port, Table, or VLAN) from the list. For more information, refer to “Displaying port properties” on page 845. 2.
Element Manager interface overview 23 6. Rediscover button — Click to manually refresh the Element Manager and display the latest information from the switch. 7. Auto Rediscover check box — Select the check box to automatically refresh the Element Manager in five-minute intervals. Clear the check box to stop auto-rediscovery. 8. Product List Search — Use to search for a port in the port list. For detailed instructions, refer to “Search” on page 407. 9. Help — Click to display the online help.
23 Element Manager interface overview TABLE 81 Port View and Table View port properties (Continued) Field/Component SFP / Port Optics tab Description Select to display the details of all the SFP and port optics. NOTE: To export SFP details, click the link under the Physical Ports - SFP Details section of Detailed Report. Tx Power The power transmitted by the port in a device. Rx Power The power received by the port in a device. Transceiver Temperature The temperature of the port, in Celsius.
Element Manager interface overview 23 Comparing physical port properties You can compare multiple physical port properties, for example, a healthy port with an offline port. 1. From Port View or Table View, select two or more ports (press Ctrl and click each port). 2. Right-click one of the selected ports, and select Properties. FIGURE 327 Physical port properties For example, in Figure 327, ports 1/1, 1/3, and 1/5 are selected.
23 Element Manager interface overview 1. From VLAN View, select one or more virtual ports and physical ports. 2. Right-click one of the selected ports, and select Properties (Figure 329). FIGURE 329 Physical and virtual port properties The selected port properties are displayed in the Port Properties dialog box, where the selected physical port properties are displayed under the Ports tab and the selected virtual port properties are displayed under the Virtual Interfaces tab, as shown in Figure 330.
Element Manager interface overview 23 Status indicator icons Table 83 describes the icons that are used to indicate the status of a switch, slot, or port. TABLE 83 Status indicator icons Status icon Description Indicates the port is down. Indicates the switch is not reachable. Indicates a degraded link (the switch is reachable but cannot receive SNMP). Indicates an IP slot containing a line card. Indicates an IP slot containing no line card. Indicates a port in an IP slot containing no line card.
23 Element Manager interface overview • Collapse the table. Refer to “Customizing application tables” on page 402 for information on table functions. Performance data You can use the following options to monitor the performance data of a switch: • Real Time Graph/Table • Historical Graph/Table Real-time performance monitoring Real-time performance monitoring allows you to view a snapshot of the current performance data. To monitor the real-time performance of the switch, complete the following steps.
Configure dialog box 23 1. In the Element Manager, right-click a slot (or slots), trunk (or trunks), or port (or ports) and select Performance > Historical Graph/Table. Or Select a slot (or slots), trunk (or trunks), or port (or ports), and select Historical Graph/Table from the Performance button on the Element Manager toolbar, as shown in Figure 332.
23 Management Module switchover A warning message displays: You want to reset the selected interface statistics. Do you want to continue? Click Yes to clear all the statistics of the port. FIGURE 333 Resetting port counters Enable or Disable Enable or disable on a module will perform module power on or off. It is applicable only to the configuration module. To enable or disable a port, right-click a slot (or slots), trunk (or trunks), or port (or ports) and select Enable or Disable.
Switch Fabric Module 23 To access the MR switch over dialog box from Element Manager, right-click a module (or modules), trunk (or trunks), or port (or ports) and select MR Switch Over. FIGURE 334 MR Switch Over The MR Switch Over Status dialog box is displayed and confirms if the Management Module is active (as shown in Figure 335). NOTE MR Switch Over option will be disabled for single Management Module switch.
23 Port mirroring FIGURE 336 Switch Fabric Module Port mirroring Port mirroring analyzes the traffic flowing in a port by monitoring the particular port. Port mirroring helps to monitor the inbound traffic, outbound traffic, or both. Configuring port mirroring 1. Click the Configure icon in the Element Manager toolbar. 2. Select Port Mirroring (as shown in Figure 337). The Port Mirroring dialog box is displayed (as shown in Figure ).
Port mirroring 23 • Right pane (Monitored Ports) — Displays the monitored ports of a device. - Identifier — Displays the ports where traffic must be monitored. - Mode — Displays if the traffic is inbound (TX), outbound (RX), or both. - Add — Adds monitored ports. - Edit — Edits the monitored ports. - Delete — Deletes the monitored ports. Adding a port to port mirroring To add mirror ports in a device, perform the following steps. 1. Select Configure > Port Mirroring.
23 sFlow sFlow The IP Element Manager supports sFlow to capture traffic data and configure sFlow collector. Configuring sFlow in Element Manager 1. Click the Configure icon in the Element Manager toolbar. 2. Select sFlow (as shown in Figure 338). or To access the sFlow from Element Manager, right-click a module (or modules), trunk (or trunks), or port (or ports) and select sFlow. FIGURE 338 sFlow dialog box 3. To configure sFlow, refer to “Configuring sFlow” on page 1149.
VRRP-E: VRRP/ VRRP-E management 23 FIGURE 339 Selecting VRRP/VRRP-E The Manage VRRP/VRRP-E dialog box is displayed (as shown in Figure 340). The Manage VRRP dialog box provides the following buttons to perform various functions. - Add — Adds the VRRP/VRRP-E router configuration. Delete — Deletes the VRRP/VRRP-E router configuration. FIGURE 340 Manage VRRP/VRRP-E dialog box Adding a VRRP/VRRP-E router To add a VRRP/VRRP-E router in an MLX device, perform the following steps. 1.
23 VRF management Select Add > IPV4 > Basic or Advanced. Or Select Add > IPV6 > Basic or Advanced. The dialog box displays based on the selection of IPV4 or IPV6 with the Basic or Advanced configuration. 3. Enter the Parameters value. Or Click Import to import the predefined parameter values in a comma-separated value (CSV) file. 4. (Optional) Click Preview to list the commands to be executed with replaced parameters. 5. Click OK.
VRF management 23 Configuring VRF in an MLX device 1. Click the Configure icon in the Element Manager toolbar. 2. Select VRF (as shown in Figure 341). FIGURE 341 Selecting VRF The Manage VRF dialog box is displayed (as shown in Figure 342).The Manage VRF dialog box provides the following buttons to perform various functions. - Add — Adds VRF in the MLX device. Delete — Deletes VRF in the MLX device.
23 VRF management Adding VRF in an MLX device To add VRF in an MLX device, perform the following steps. 1. Select Configure > VRF. The Manage VRF dialog box is displayed. 2. Select Add > IPV4 > Basic or Advanced. Or Select Add > IPV6 > Basic or Advanced. The dialog box displays based on the selection of IPV4 or IPV6 with the Basic or Advanced configuration. 3. Enter the Parameters value. Or Click Import to import the predefined parameter values in a comma-separated value (CSV) file. 4.
Web Management interface 23 Web Management interface The Element Manager allows you to access a device by connecting to its Web Management interface. NOTE You must have the Element Manager Read/Write privilege to change the device configuration through the Web Management interface. NOTE Web Management interface access must be enabled on the device.
23 Web Management interface troubleshooting Accessing the IP device front panel To display the Element Manager front panel, choose one of the following options: • Select Configure > Element Manager > Front Panel. • Right-click a device on the Network Objects list or the IP or L2 Topology views and select Element Manager > Front Panel. The Web Management interface - Front Panel displays (Figure 344). You can use the Front Panel to manage port configuration.
Chapter 24 Configuration File Manager and Backup In this chapter • Configuration file manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Configuration deviation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Change tracking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Configuration snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
24 Configuration file manager FIGURE 345 Configuration File Manager dialog box — Product Configurations tab The Configuration File Manager dialog box displays the following information: • Product Name — The name of the backed-up product. • Date — The date when the configuration file was stored in the server and the time when the last backup attempt occurred. • Version — The version of the configuration file. The version number is incremented by one for each new version.
Configuration file manager 24 NOTE The Adaptive backup type is supported only on Network OS devices; it is not supported on the IronWare devices. Manual — Occurs when a user clicks the Save Running/Startup Configuration button. Scheduled — Occurs when backups are regularly scheduled. Startup Config Change Trap — When startup configuration is changed for a device, the Startup Config Change Trap is triggered and the configuration backup is captured.
24 Configuration file manager NOTE The Events Associated with Differences table is blank for configuration files triggered on a Fabric OS DCB device. NOTE The Events Associated with Differences table is blank when you select configuration files from different products. The Events Associated with Differences table is only available when you select two configuration backup files for the same product. List of events (up to 100) associated with the configurations.
Configuration file manager 24 • Export button — Select one or more configurations and click to launch the Export Configuration dialog box, which allows you to export the configurations to a text file. Refer to “Exporting a configuration to a text file” on page 873 for more information. Saving the configuration status Use the Save Configuration Status dialog box to show the progress of the configuration retrieval for the product you select.
24 Configuration file manager FIGURE 346 Save Configuration Status dialog box 6. Review the progress and status of the configuration retrieval for the products you selected in the Status column and the Status Details field. 7. Click Close to close the dialog box, or click Abort to cancel the operation. Viewing the configuration 1. Click the IP tab. 2. Select Configure > Configuration File > Configuration File Manager. 3. Click the Product Configurations tab. 4.
Configuration file manager 24 • Previous button — Click to display the previous configuration (from current choice) in the Configurations list. • Next button — Click to display the next configuration (from current choice) in the Configurations list. • Export button — Click to export the currently viewed configuration to a text file. Comparing product configurations The Comparison dialog box allows you to display the contents of two configurations side-by-side.
24 Configuration file manager • Change Navigator buttons/legend — The Enabled when there is at least one change between to two compared files. Go to first change button ( ) — Click to move to the first change. Go to previous change button ( ) — Click to move to the previous change. Go to next change button ( ) — Click to move to the next change. Go to last change button ( ) — Click to move to the last change. Number of changes label — Indicates the number of changes.
Configuration file manager 24 6. Click Close. Restoring a configuration 1. Click the IP tab. 2. Select Configure > Configuration File > Configuration File Manager. 3. Click the Product Configurations tab. 4. Select the configuration you want to restore from the Configurations list. To restore configurations for multiple products, select one configuration for each product. 5. Click Restore. If you select to restore a VCS configuration, a message displays.
24 Configuration file manager FIGURE 348 Search Configuration File Manager dialog box 5. Select a product from the Available Products list and click the right arrow button to move one or more products to the Selected Products list. Press Ctrl or Shift and then click each product to select more than one product. 6. Enter a search text string, with a limit of 255 characters, into the Containing Text field. This text string is used to search on configurations of the selected products. 7.
Configuration deviation 24 NOTE To create the product groups, you must have the Configuration Management privilege. 12. Click Close to close the Search Configuration File Manager dialog box. Exporting a configuration to a text file The Export button on the Configuration File Manager dialog box allows you to export the configuration of the selected product to a text file. You must have the Configuration Management privilege in your Management application user account to perform this task.
24 Change tracking Viewing configuration deviation status The Management application enables you to view the configuration deviation status at a glance by providing a configuration deviation status icon on the Status Bar. Point to the configuration deviation status icon on the Status Bar. Depending on the status, one of the following status icons displays.
Change tracking 24 FIGURE 349 Configuration File Manager dialog box - Change Tracking tab The Configuration Change Tracking list displays the following information: • Name — The product name and IP address. • Baseline Time — The date and time when the baseline configuration for the device was copied into the repository of the management server. • • • • Backup Time — The time when the last backup attempt occurred for the selected device. Change Status — The change status of the latest device backup.
24 Change tracking NOTE The Adaptive backup type is supported only on the Network OS devices; it is not supported on the IronWare devices. - Startup Config Change Trap — Occurs when a startup configuration is changed. - Manual — Occurs when a user clicks the Save Running/Startup Configuration button.
Change tracking TABLE 86 24 Configuration change events for Adaptive backup (Continued) Message ID Type Description FABR-1014 LOG Indicates that the switch received an RBridge ID other than the one it requested. The port was disabled because the requested insistent RBridge ID could not be obtained. FABR-1030 LOG Indicates that the RBridge ID has changed. FABR-1041 LOG Indicates that a link reset was received before the completion of the trunking protocol on the port.
24 Change tracking TABLE 86 878 Configuration change events for Adaptive backup (Continued) Message ID Type Description NSM-2006 DCE Indicates that the specified port-profile has been removed successfully. NSM-2007 DCE Indicates that the port-profile configuration mode has been enabled on the specified interface using the port-profile-port command.
Change tracking TABLE 86 24 Configuration change events for Adaptive backup (Continued) Message ID Type Description NSM-2032 DCE Indicates that the specified port-profile has been removed successfully. NSM-2033 DCE Indicates that the VLAN sub-profile has been deleted successfully. NSM-2034 DCE Indicates that the Fibre Channel over Ethernet (FCoE) sub-profile has been deleted successfully. NSM-2044 DCE Indicates that the specified domain is created.
24 Change tracking TABLE 86 880 Configuration change events for Adaptive backup (Continued) Message ID Type Description SFLO-1003 LOG Indicates that the global sFlow sampling rate has been changed to the specified value. SFLO-1004 LOG Indicates that the global sFlow counter sampling interval has been changed to the specified value. SFLO-1005 LOG Indicates that the sFlow sampling rate has been changed on the specified port.
Change tracking TABLE 86 24 Configuration change events for Adaptive backup (Continued) Message ID Type Description SWCH-1007 LOG Indicates that the specified switch port is disabled due to the reason displayed in the message. UDLD-1000 LOG Indicates that the UniDirectional Link Detection (UDLD) protocol is enabled globally. UDLD-1001 LOG Indicates that the UniDirectional Link Detection (UDLD) protocol is disabled globally.
24 Configuration snapshots TABLE 86 Configuration change events for Adaptive backup (Continued) Message ID Type Description ZONE-1042 LOG The effective configuration has been disabled. ZONE-1043 LOG The Default Zone access mode is set to No Access. Configuration snapshots The Configuration File Manager dialog box - Configuration Snapshots tab, allows you to compare two configuration snapshots; for example, the pre-configuration and post-configuration snapshots. 1. Click the IP tab. 2.
Configuration snapshots 24 • CLI Template — The name of the snapshot template used for the pre- or post-snapshot deployment. • Status — The snapshot status 4. Click the following buttons to access the corresponding dialog boxes: • Search button — Click to launch the Search Pre/Post Snapshots dialog box, which allows you to search the contents of snapshots in the repository of the management server. Refer to “Searching the Configuration File Manager” on page 871 for more information.
24 Configuration snapshots FIGURE 351 Compare dialog box The Compare dialog box displays the following information: • Product — The IP address of the device. • Date — The Displays the date the device configuration was taken. • Change Navigator buttons/legend — The Change Navigator buttons and legends are enabled when there is at least one change between two compared files.
Configuration snapshots 24 • Match Case check box — Click to render the search case-sensitive. • Repeats check box — Click to continue the search at the top when the bottom is reached. • Whole Words check box — Click to continue the search. Displays the combination of Highlight, Match Case, and Repeats searches. 6. Click Close. Generating a configuration snapshot report If the configuration snapshot list is too long, you can condense the list by running a report.
24 Configuration snapshots • Change — The device configuration deployment included both pre- and post-configuration snapshot options. There is a difference between the pre-configuration snapshot and the post- configuration snapshot. • No Change — The device configuration deployment included pre-configuration and post-configuration snapshots. There is no difference between the two snapshots. • Error — An error was encountered in one or more devices during the deployment of the snapshots.
Configuration snapshots 24 • Snapshot Type — The type of snapshot generated. There are three types: Manual: Generated manually by clicking the Save Snapshot button on the Backup Configuration Manager. Pre-Snapshot: Generated before the new configuration was deployed to the device. Post-Snapshot: Generated after the new configuration was deployed to the device. CLI Command — The name of the device-monitoring template from the CLI Configuration Manager used for the pre- or post-snapshot deployment.
24 Configuration snapshots 7. Click OK to save the configuration snapshot. The Save Snapshot Status dialog box displays details of the backup status. • Backup Status list — Displays the product name and IP address, as well as the progress and status of the configuration save. • Status Details — Displays details of a pending configuration save. Click Abort to abort a pending configuration save.
Schedule backup 24 Press Ctrl or Shift and then click each product to select more than one product. 6. Enter a search text string, with a limit of 255 characters, into the Containing Text field. This text string is used to search on snapshots of the selected products. Press Ctrl or Shift and then click each product to select more than one product. 7. Enable the following options, as required: • Match Case check box - Select the check box to make the search case-sensitive.
24 Schedule backup NOTE The Management application enables you to save the same switch configuration to the repository using two methods: on demand (Configure > Configuration File > Save), on defining a schedule (Configuration File> Schedule Backup), or by defining the adaptive backup support (Resync or Adaptive). To schedule a configuration backup, complete the following steps. 1. Click the IP tab. 2. Select Configure > Configuration File > Schedule Backup. The Schedule Backup dialog box displays.
Schedule backup 24 • Day of the week - If you selected Weekly as the frequency type, select the day from the list. • Day of the month - If you selected Monthly as the frequency type, select the day of the month from the list. 6. Click OK. The new schedule appears in the Backup Scheduler list of the Schedule Backup dialog box. When scheduled backups begin, the Management application polls each product to check its current configuration. NOTE Software image backup is not initiated on VDX or VCS devices.
24 892 Schedule backup Brocade Network Advisor IP User Manual 53-1003153-01
Chapter 25 IP Configuration Wizard In this chapter • Configuration requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Payloads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Creating a payload configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Duplicating a payload configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Modifying a payload configuration .
25 Payloads Payloads Payloads are defined as product payloads or interface payloads. Product payloads are deployed to the devices, whereas interface payloads are deployed to ports. The available payloads are listed in Table 87. TABLE 87 Payloads available for deployment Payload name Description Product Payloads: 894 802.1Q Tag Type Sets the tag type, or tag ID, that identifies the aggregate VLAN.
Creating a payload configuration TABLE 87 25 Payloads available for deployment (Continued) Payload name Description TACACS+ Servers Indicates which TACACS/TACACS+ servers are to be used for authentication. Telnet Sets Telnet password and idle timeout value, and enables Telnet authentication on devices for use with AAA authentication. Time Zone/SNTP Specifies the time zone and specifies whether the date and time are to be set by an SNTP server clock.
25 Creating a payload configuration FIGURE 357 Configuration dialog box - Select Payload pane 3. Select Product Payloads or Interface Payloads, and select the payloads you want to configure. You can include more than one payload in a configuration. See Table 87 on page 894 for a brief description of the payloads. 4. Click Next. The next pane that displays depends on the payloads you are configuring. For example, Figure 358 shows the next pane for the SNMP Identification payload.
Creating a payload configuration 25 FIGURE 358 Configuration dialog box - Product Payload - SNMP Identification pane 5. Enter the required information for the payload and click Next. Click Help for detailed information on each payload you can define. After all of the payloads you have selected are configured, the Deployment Targets pane displays, as shown in Figure 359 on page 898.
25 Creating a payload configuration FIGURE 359 Configuration dialog box - Deployment Targets pane 6. In the Available Targets list, select the products, product groups, and IP subnets to which the payload configuration is to be deployed. • To select a target, expand the entry to display the entries under it, click the target in the Available Targets list, and click the right-arrow button to move it to the Selected Targets list. If the target is not on the list, run the discovery process.
Creating a payload configuration 25 FIGURE 360 Configuration dialog box - Deployment Properties pane 8. Select one of the persistence properties. • Don’t Save to Flash or Reload Select this option if you just want to update the device running configuration. The payload configuration is not saved to the device flash memory, nor is the device rebooted when the payload configuration is deployed.
25 Creating a payload configuration 9. (Optional) Enter the following information if you want the Management application to run and save a report before or after this configuration is deployed to the device. a. Select the Pre-Deployment check box if you want the Management application to run and save a report before this configuration is deployed. b. Select the Post-Deployment check box if you want the Management application to run and save a report after this configuration is deployed. c.
Creating a payload configuration 25 12. Select Save Without Scheduling Deployment or Schedule Deployment. If you select Schedule Deployment, select the frequency, time, and date parameters for the deployment. 13. Click Next. The Summary Page pane displays, as shown in Figure 362. FIGURE 362 Configuration dialog box - Summary Page pane 14. Review the information on the Summary Page pane. • The Deployment and Targets tab shows the deployment definition and the targets in the configuration.
25 Duplicating a payload configuration Duplicating a payload configuration You can create a payload configuration by copying an existing configuration. 1. Select Configure > Configuration Wizard. 2. Select a configuration from the Product Configurations list. 3. Click Duplicate. The Copy Configuration dialog box displays. 4. Enter a name for the new payload configuration.
Modifying a payload configuration 25 FIGURE 363 Configuration dialog box - Select Payload pane for editing a configuration 4. Add or remove payloads in the configuration. • To add a payload to the configuration, select either Product Payloads or Interface Payloads, and then select the payload you want to add. • To remove a payload from the configuration, clear the check box of the payload. Note that a configuration must have at least one payload.
25 Deploying a payload configuration Deploying a payload configuration Payload configurations are deployed to targets in one of the following ways: • On a scheduled basis, if a deployment schedule has been set up for the configuration. • On demand, if Save Without Scheduling Deployment is selected in the Deployment Schedule pane of the Configuration Wizard. Configurations can be manually deployed when required.
Chapter 26 CLI Configuration Management In this chapter • CLI configuration overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Viewing existing templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Product configuration templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Changing product credentials. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
26 Viewing existing templates Configuration requirements Before you use the CLI Configuration, you should meet the following requirements: • Telnet or SSH (or both) must be selected on the Management application server to match the protocol(s) with the devices. For more information about configuring Telnet or SSH, refer to “Product communication settings” on page 176.
Product configuration templates 26 Product configuration templates You can create, modify, duplicate, delete, verify, and deploy a product configuration from the CLI Configuration dialog box. Product configurations allow you to create device configuration by entering a set of configuration CLI commands. To view a list of existing configurations, refer to “Viewing existing templates” on page 906. For information about the example templates, refer to “CLI Templates” on page 1483.
26 Product configuration templates 4. Click the Target tab and complete the following steps. FIGURE 365 CLI Configuration Template dialog box - Target tab a. Select the devices to which you want the configuration deployed from the Available Targets table. The Available Targets table displays an inventory of the available product targets and includes the same detail as the Product List (refer to “IP Product List” on page 392).
Product configuration templates 26 5. Click the CLI Commands tab and complete the following steps. FIGURE 366 CLI Template dialog box - CLI Commands tab a. (Configuration templates only) Select the Evaluate CLI responses check box to validate the CLI commands. You can add a dash (-) to the beginning of a CLI command to ignore command validation even when you select the Evaluate CLI responses check box.
26 Product configuration templates c. To enter a parameter for a CLI command, select the parameter type from the CLI Commands list - Parameters folder and click the right arrow to move the parameter type to the CLI Commands text area. Parameters use the following format: $, where name is the parameter and data_type is the type of parameter.
Product configuration templates c. 26 Enter a value for each parameter in the associated field. Note that the Target column remains visible at all times in the Parameters table. Fields containing a green triangle ( ) in the lower right corner are editable. The fields only accepts valid values base on the parameter data type. Parameters include the following options: • • • • String — Enter a string with a maximum of 64 ASCII characters. Integer — Enter an integer with a maximum of 12 numeric characters.
26 Changing product credentials 11. Click OK. The Deployment Status dialog box displays, which allows you to view the progress and status of the deployment. Click Abort to stop the deployment. NOTE The abort action does not stop the tasks that have already started. When deployment is complete, click Report to view the CLI Deployments Report. 12. Click Close to close the Deployment Status dialog box. NOTE Closing the Deployment Status dialog box does not stop deployment.
Importing parameter values into a configuration 26 2. Enter the user name for the product in the Product Login Account - Username field. NOTE If Telnet is used to log in to the device and Telnet only requires a password, then enter the password in the Password field and leave the Username field blank. 3. Enter the password for the product in the Product Login Account - Password field. 4.
26 Previewing CLI commands TABLE 88 Different values for each target #Description of the template. This template provides different values for each target.. Target, LOOPBACK_INTERFACE|INTEGER, OSPF_AREA|INTEGER LOOPBACK_INTERFACE_IP|STRING 10.20.30.100, 1, 4, loopback1, 10.20.30.200, 2, 5, loopback2, Layer 2 Switch Products, 3, 6, loopback3, TABLE 89 Same value for each target #Description of the template. This template provides different values for each target..
CLI command guidelines 26 CLI command guidelines When adding CLI commands to the configuration, use the following guidelines: • Only configuration templates can be added to a template defined in the CLI Template dialog box. • Templates can be nested and the same template can be included several times as long as it does not cause a circular dependency. • Targets for deployment are only retrieved from the template you create, not any included templates.
26 CLI command guidelines • Click Deploy to deploy the configuration to the selected targets. Click Yes on the confirmation message. If you selected the Prompt for additional targets during manual deployment check box, the Target tab of the Deployment of Configuration_Name dialog box displays. Continue with step 6. If the configuration contains parameters that must be defined, the Deployment of Configuration_Name dialog box displays with a list of all parameters in the deployment. Go to step 7. 6.
Testing a configuration 26 • Click Deploy to deploy the configuration to the selected targets. Click Yes on the confirmation message. If you selected the Prompt for additional targets during manual deployment check box, the Target tab of the Deployment of Configuration_Name dialog box displays. Continue with step 6. If the configuration contains parameters that must be defined, the Deployment of Configuration_Name dialog box displays with a list of all parameters in the deployment. Go to step 7. 6.
26 Valid and invalid responses from devices 5. Edit the mode and the parameter values (refer to step 6), as needed. The Deployment Status dialog box displays detailing whether the configuration will deploy successfully. 6. Click Close to close the Deployment Status dialog box. Valid and invalid responses from devices When you deploy a configuration to a device, some commands may send responses back to the Management application.
Valid and invalid responses from devices 26 The strings on the left and the right side of the equal sign are Unicode regular expressions used for pattern matching. The expression on the left is matched against the command string, while the expression on the right is matched against the messages returned by the command that matches the pattern on the left.
26 Valid and invalid responses from devices Editing the Motorola Controller CLI responses properties file The MotorolaControllerCliResponse.properties file is under the Install_Home\conf\cli directory. Edit the file using a text editor. You can add a success response between the SUCCESS_RESPONSE_START and SUCCESS_RESPONSE_END tags using the following Unicode regular expressions format. #Success Map SUCCESS_RESPONSE_START ^su[port]*\s+s[witchd]*\s+=.*First Failure Data Capture.*enabled.
Deleting a configuration 26 NOTE If the response message does not fall in any of the categories above, it is treated as a success response from the device and stops the validation process. Using a dash character in CLI Configuration manager You can override how the Management application treats messages without editing the CLI responses properties file. To do this, enter a dash (-) at the beginning of each configuration line.
26 CLI configuration deployment 2. Select one or more configurations to delete in the Templates table and click Delete. 3. Click Yes on the “Do you want to delete?” message to confirm. 4. Click Close to close the CLI Configuration dialog box. CLI configuration deployment Deploy the configuration using one of the following methods: • At a scheduled date and time Schedule a configuration deployment in the CLI Template dialog box.
Monitoring configurations 26 NOTE Closing the Deployment Status dialog box does not stop deployment. To check the results of the deployment in the Product CLI Report, refer to “CLI deployment reports” on page 930. For details about valid and invalid responses when you deploy a configuration, refer to “Valid and invalid responses from devices” on page 918. Monitoring configurations You can create, modify, duplicate, and delete a monitoring configuration from the CLI Configuration dialog box.
26 Monitoring configurations 4. Click the Targets tab and complete the following steps. FIGURE 371 CLI Template dialog box - Target tab a. Select the devices to which you want the configuration deployed from the Available Targets table. You can deploy the configuration to individual devices, devices in a device group, or devices in an IP subnet.
Monitoring configurations 26 5. Click the CLI Command tab and complete the following steps. FIGURE 372 CLI Template dialog box - CLI Commands tab d. Enter the show commands in the CLI Commands text area. NOTE Only commands listed in the cliShowCommands.properties file can be entered for a monitoring configuration. For more information, refer to “Configuration error checking” on page 921. For a list of guidelines to use when entering CLI commands, refer to “CLI command guidelines” on page 915.
26 Monitoring configurations f. Edit the parameter by entering the variable or character string you want to use for the parameter in place of the name variable. NOTE Each parameter must be unique. The Management application does not check for duplicate parameters. show interface ethernet $ In the example, show interface ethernet is the CLI command, port is the parameter variable, SLOT_PORT is the parameter type, and [Slot#]/Port# is the format for the port number. g.
Monitoring configurations c. 26 Enter a value for each parameter in the associated field. Fields containing a green triangle ( ) in the lower right corner are editable. The fields only accepts valid values base on the parameter data type. Parameters include the following options: • • • • String — Enter a string with a maximum of 64 ASCII characters. Integer — Enter an integer with a maximum of 12 numeric characters. Slot/Port — Enter the slot number and port number.
26 Monitoring configurations 11. Click OK. The Deployment Status dialog box displays, which allows you to view the progress and status of the deployment. Click Abort to stop the deployment. NOTE The abort action does not stop the tasks that have already started. When deployment is complete, click Report to view the CLI Deployments Report. 12. Click Close to close the Deployment Status dialog box. NOTE Closing the Deployment Status dialog box does not stop deployment.
Monitoring configurations 26 8. Click OK. The Deployment Status dialog box displays, which allows you to view the progress and status of the deployment. Click Abort to stop the deployment. NOTE The abort action does not stop the tasks that have already started. When deployment is complete, click Report to view the CLI Deployments Report. 9. Click Close to close the Deployment Status dialog box. NOTE Closing the Deployment Status dialog box does not stop deployment.
26 CLI deployment reports 8. Click OK. The Deployment Status dialog box displays, which allows you to view the progress and status of the deployment. Click Abort to stop the deployment. NOTE The abort action does not stop the tasks that have already started. When deployment is complete, click Report to view the CLI Deployments Report. 9. Click Close to close the Deployment Status dialog box. NOTE Closing the Deployment Status dialog box does not stop deployment.
CLI configuration scheduling 26 3. Choose one of the following options: • To display a report for one device, click the IP address of the device on the list. • To display a report that includes all devices for which the report was generated, click the name of the report in the Template Name column. The Product CLI Report displays. To export a report refer to “Exporting and saving IP reports to a file” on page 1365.
26 CLI configuration scheduling Configuring a daily deployment schedule To configure a daily deployment schedule, complete the following steps. 1. Select Daily from the Frequency list. 2. Select the time of day you want deployment to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. To finish configuring the deployment schedule, return to step 8 of “Creating a new product configuration” on page 907.
CLI configuration scheduling 26 Configuring a yearly deployment schedule To configure a yearly schedule, complete the following steps. 1. Select Yearly from the Frequency list. 2. Select the time of day you want deployment to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. 3. Click the Date list to select a date from the calendar.
26 934 CLI configuration scheduling Brocade Network Advisor IP User Manual 53-1003153-01
Chapter 27 Image Repository for IP Products In this chapter • Obtaining software files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Products supporting the image import . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Boot image management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Software image management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Unified image management . . . . . . . . . .
27 Products supporting the image import Products supporting the image import Table 90 lists the products that support the boot images, software images, and unified images.
Boot image management 27 • Delete — Deletes the boot or monitor image from the Management application. • Help — Provides information about the boot image feature. • Update — Updates the firmware images by way of the Firmware Management dialog box. NOTE The image features discussed in this section are available only to the products listed in “Products supporting the image import” on page 936.
27 Boot image management These fields allow from 1 through 32 alphanumeric characters and allow the following special characters: underscore (_), period (.), and hyphen (-). The image file name excludes the file extension. For example, if the file name is M2B07504.bin, the Image Label is M2B07504. Enter additional information for the image in the User Defined Label field. This entry appears under the More Information column of the Boot Images list of the Firmware Management dialog box. e.
Software image management 27 Software image management Software images are program files other than boot, monitor, or unified images. You can manage software images using the following Management application modules: • Discovery — Copies software images from IronWare products on the network into the Management application. • Backup Scheduler — Copies software images from IronWare products on a regularly scheduled basis.
27 Software image management After the import completes successfully, you see a message that the software image imported successfully. The Software Image tab lists the image version and the image label.
Software image management 27 You can change the default schedule from the Backup Scheduler by performing the following tasks. 1. Click the IP tab. 2. From the Management application menu bar, select Configure > Configuration > Schedule Backup. or Right-click Configuration > Schedule Backup. The Schedule Backup dialog box displays, as shown in Figure 374. FIGURE 374 Schedule Backup dialog box 3. Select the automatic software image backup task from the list, and click Edit.
27 Unified image management 1. Click the Software Images tab on the Firmware Management dialog box. 2. Select the software image that you want to delete. 3. Click the Delete button. A confirmation warning displays. 4. Click Yes to continue with the delete, or No to cancel it. Unified image management Unified images contain all images required to manage the product. Instead of upgrading each type of image separately, you can use a unified image to upgrade all image types.
Unified image management 27 FIGURE 376 Firmware Management dialog box - Unified Firmware Images tab The Unified Firmware Images tab contains the following buttons: • Import — Opens a dialog box that allows you to browse and select the unified image file you want to import into the Management application. Newly imported images are saved to the Management application. • Delete — Deletes the unified image from the Management application.
27 Unified image management NOTE You must install the Management application on an external FTP server or SCP server to activate the Import Firmware Image from File dialog box. 6. In the Import Firmware Image from File field, enter the location of the unified image, or click Browse to search for an existing image file. The image file can be in one of the following formats: .tar, .gz, .zip, or .bin. 7.
Unified image management 27 Updating unified images Use the Firmware Management dialog box to update firmware images. You can access the Firmware Management dialog box using he following method. 1. Select Configure > Firmware > Management. 2. Click the Unified Firmware Images tab on the Firmware Management dialog box. 3. Click Update. For NetIron CER/CES devices running 5.4, when deploying the simplified firmware image from 5.4 to 5.5, complete the following steps. 1.
27 Unified image management 1. Select Configure > Firmware > Management. The Firmware Management dialog box displays. 2. Click the desired Image tab and click Update. The Product Payload- Image Update: Software pane displays. 3. Click Next. The Deployment Target pane displays, as shown in Figure 377. FIGURE 377 Firmware Management dialog box - Deployment Targets pane 4.
Unified image management 27 FIGURE 378 Firmware Management dialog box -Summary Page pane 9. Review the information on the Summary Page pane. • The Deployment And Targets tab shows the deployment definition and the targets in the configuration. The Selected Targets list in table format allows you to verify to which devices the payloads in the configuration are deployed. • The Configuration tab summarizes the payloads in the configuration you have created. 10. Click Deploy.
27 Serial firmware update and activation for Network OS devices Serial firmware update and activation for Network OS devices With Network OS release 4.0, you can update and activate firmware on an entire cluster (either logical chassis mode or fabric cluster mode), on selected nodes in the cluster, or on nodes in standalone mode, by performing the following steps. 1. Click the IP tab in the upper-left corner of the Management application. 2.
Chapter 28 VLAN Management In this chapter • VLAN Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Port VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Spanning Tree Protocol configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • VLAN routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
28 VLAN Manager Super-aggregated VLAN A super-aggregated VLAN allows multiple VLANs to be placed within another VLAN. This feature allows you to construct Layer 2 paths and channels. It is useful for Virtual Private Network (VPN) applications in which you need to provide a private, dedicated, Ethernet connection for an individual client that can transparently reach its subnet across multiple networks. Private VLAN NOTE PVLAN read-only support is provided.
VLAN Manager 28 FIGURE 381 Remote Switch Port Analyzer Transparent LAN Support Transparent LAN Support (TLS) supports the VLAN group rather than an individual VLAN. The TLS service provided is associated with a single transparent VLANs that represents all the VLAN in a group. When Transparent LAN Support (TLS) is assigned to a Virtual Fabric VLAN, the ports that are tagged to TLS allow you to configure multiple cTags.
28 VLAN Manager Displaying a list of VLANs To view the list of VLANs that were discovered on the network, select Configure > VLANs. The VLAN View tab of the VLAN Manager dialog box displays. The VLAN Manager tool bar contains the following buttons: • • • • Add — Launches the Add VLAN dialog box. Edit — Launches the Edit VLAN dialog box. Delete — Launches the Delete VLAN dialog box. STP — Allows you to configure STP, RSTP, MSTP, PVST, or RPVST information for a product, port, or VLAN.
VLAN Manager 28 VLAN Manager tabs VLAN Manager has three views: • VLAN view Displays distinct Layer 2 broadcast domains by VLAN ID. If FDP or LLDP is not enabled on a device, each VLAN from each device is displayed in separate folders by VLAN ID. If FDP or LLDP is enabled on the devices, a VLAN folder shows device connectivity on the Layer 2 broadcast domains. If there are super-aggregated VLANs that have been configured on the network, VLANs are grouped by their super-aggregated VLAN memberships.
28 VLAN Manager FIGURE 383 VLAN Manager dialog box - VLAN View tab To view the VLANs or products in the VLAN View tab, complete the following steps. 1. Click the VLAN View tab in the VLAN Manager dialog box. 2. Expand the folder under the VLAN View tab, then double-click a super-aggregated VLAN to display its port VLANs or products. VLANs are listed by their topologically distinct broadcast domains.
VLAN Manager 28 • Port Type — A description of the type of interface on the product, for example, ETHERNET_INTERFACE or VIRTUAL_INTERFACE. • Port Name — The name of the interface, if one was configured. • Port Mode — Indicates the tag mode of the interface. Tagged represents the port is in dual mode but is in the tagged state for that particular VLAN. Untagged represents the port is untagged for that particular VLAN. The third port mode is Converged. • STP — Indicates whether STP is enabled or disabled.
28 VLAN Manager FIGURE 384 VLAN Manager dialog box - Product View tab 2. Expand a product to display the port VLANs that have been configured on that product. 3. Click a VLAN in the list to display the interfaces on that product that belong to the VLAN. 4. Click MAC Group IDs to display the MAC group address (Figure 385). The MAC group address dialog box is displayed.
VLAN Manager 28 Enabling or disabling the VCS Virtual Fabric mode To enable or disable the VCS Virtual Fabric mode, complete the following steps. 1. Select Configuration Manager > VLAN Manager. The VLAN Manager dialog box with the VLAN View option displays (as shown in Figure 386). 2. In the Ports list, select a product and click Manage. FIGURE 386 VLAN Manager dialog box - VLAN View option The Manage VCS Virtual Fabric dialog box displays (as shown in Figure 387).
28 Port VLANs Port VLANs VLAN Manager facilitates the creation, modification, and deletion of port VLANs on products that are known to the Management application. It also aids in the bulk deployment of these VLANs. For example, VLAN 3 can be configured on four products. If the VLAN definition for VLAN 3 is modified, the new definition can be deployed to all four products at one time.
Port VLANs 28 4. Click the Load Products button. Products that already have the entered VLAN IDs configured on them are automatically moved to the Selected Products list. The Load Products button is disabled by default. 5. Under the Available Products list, select one or more products to which the VLAN will be assigned. You can also use the Search tool to find ports. 6. Click the right arrow button to move your selection to the Selected Products list. 7.
28 Port VLANs The Select Classifiers button is disabled by default. To enable the button, select an untagged and classifier-configured port in the Selected Ports list.. FIGURE 389 Select Classifier Groups dialog box NOTE The cTag classifier list is disabled when Untagged is selected.
Port VLANs 7. 28 Click the Untag button and click the left arrow to assign the port as an untagged port to the selected VLAN. The Selected Ports list shows the interface listed under the VLAN to which it was assigned. 8. Select the same interface from the Available Ports list. 9. Select another VLAN from the Select VLANs list. 10. Click the Tag button and click the right arrow to assign the port as a tagged port to the second VLAN.
28 Port VLANs FIGURE 390 Add VLAN dialog box — Properties tab 2. Click the VLAN View option to view the products to which the VLANs are to be deployed, or click the Product View option to display the VLANs that are to be deployed to that product. 3. Select the Fabric OS (FOS) VLAN, IronWare (IOS) VLAN, or Network OS (NOS) VLAN type from the Target Context list. You must select only one VLAN type. If multiple VLAN types are selected, the target context becomes the default and an error message displays. 4.
Port VLANs 28 • Transparent VLAN Flooding (NetIron 5.4 and later) — Selecting this check box allows packets to be forwarded without any form of CPU intervention including MAC learning and MAC destination lookups. NOTE Because this feature floods all VLAN packets in hardware, it is not expected to work in conjunction with routing functions. For FOS VLAN properties: - Name — Displays the name of the VLAN, which is editable.
28 Port VLANs Deleting port VLANs from products Deleting a port VLAN removes all the interfaces on a product from that VLAN. A port VLAN can be deleted in both the VLAN and Product views. Deleting a port VLAN in VLAN view 1. On the VLAN Manager dialog box, select VLAN View. 2. Select the VLAN to be deleted. You can select multiple VLANs by holding down the Ctrl and Shift keys and clicking the VLAN nodes. 3. Click Delete to launch the Deploy VLANs dialog box. 4.
Spanning Tree Protocol configuration 28 4. Enter a description in the Description field that will be used to identify the configured VLAN. 5. Click the Schedule check box, which is available if you selected Schedule as a deployment option, to select a frequency. 6. Click the Snapshots check box if you want the Management application to run and save a report after this configuration is deployed to the device. You can run snapshots before and after deployments only for IronWare products.
28 Spanning Tree Protocol configuration 1. Perform one of the following tasks to select the VLAN on which STP or RSTP will be configured: • On the VLAN View tab, expand the list of VLANs and select one or multiple VLANs on which STP or RSTP will be configured. • On the Product View tab, expand the product, product group, or IP subnet folder that contains the products on which the VLAN you want is configured.
Spanning Tree Protocol configuration TABLE 93 28 Spanning tree configuration matrix (Continued) Target context STP type NOS VLAN MSTP NOS Port STP, RSTP, MSTP, PVST, and RPVST 4. Select the type of Spanning Tree Protocol from the Spanning Tree list. 5. Select the Enable check box if you want to enable the protocol you selected. 6. Enter a value in the Priority field to identify the root bridge in a spanning tree (instance of STP).
28 Spanning Tree Protocol configuration 1. Select a deployment option: • Click the Deploy now option if you want to deploy the STP configuration. • Click the Save deployment only option if you want to save the STP configuration without scheduling its deployment. • Click the Schedule option if you want to schedule the deployment of the STP configuration. 2. Select a Save Configuration option: • Click the Save to running option to save the configuration while the system is running.
Spanning Tree Protocol configuration 28 FIGURE 392 STP Configuration dialog box (with MSTP selected) 5. Select the Enable check box if you want to enable MSTP. 6. Enter a value in the Priority field to identify the root bridge in a spanning tree (instance of MSTP). The bridge with the lowest value has the highest priority and is the root. A higher numerical value means a lower priority; thus, the highest priority is 0. The values range from 0 through 61440. The default is 32768. 7.
28 VLAN routing Assigning an MSTP instance to a VLAN NOTE For Network OS products in standalone mode, you can configure from 1 through 31 MSTP instances and for Fabric OS DCB switches, you can configure from 1 through 15 MSTP instances; for the Fabric OS converged 10 GbE switch module for the IBM BladeCenter, you can configure from 1 through 31 MSTP instances. 1. Click the STP button on the VLAN Manager dialog box to display the STP Configuration dialog box. 2.
VLAN routing 28 NOTE An SVI is also called a Virtual Routing Interface (VRI) in IronWare OS terms and Virtual Ethernet (VE) in Network OS terms. The SVI in DCB products, VRI in IronWare OS products, and VE in Network OS products are the same. Managing IP addresses on an SVI Switch Virtual Interfaces (SVIs) can be added to port VLANs when you create or modify VLAN definitions. SVIs can only be created in Layer 3 products.
28 VLAN routing • Primary or Secondary options (DCB products only) — Indicates whether the IP address is the primary or secondary IP address of the VLAN. • Type — Select the type of IP address you want to assign to the VLAN. Choose CIDR or IP/Subnet. • Enter the IP address in the fields provided: - If you chose the CIDR format, enter a subnet address in the subnet_address/subnet_mask_bits format (for example, 192.168.2.10/24).
Chapter MPLS Management 29 In this chapter • MPLS pre-configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 973 • MPLS licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 974 • MPLS overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 975 • LSP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
29 MPLS licensing 7. Create VLL instances using the Customer-facing ports using the Management application (refer to “VLL manager” on page 999). 8. Create VPLS instances using the Customer-facing ports using the Management application (refer to “VPLS Manager” on page 1015). MPLS licensing The following are MPLS capable products: • Ethernet Backbone router, Ethernet Core router, and Ethernet router running version 5.0.
MPLS overview 29 The following conditions must be met for inclusion in the MPLS Licensed and Configured Products product group: • Your version of the Management application supports MPLS. • Adding the product does not exceed the MPLS product license limit. For more information about how the Management application counts MPLS products, refer to Brocade Network Advisor Software Licensing Guide.
29 LSP 1. Select the Set option to set the selected settings in the product configuration. This creates a new configuration newly or overwrites the existing configuration. Unset removes the settings. NOTE To enable MPLS on the target devices, select the Set option then click Add and complete the wizard. 2.
LSP 29 In addition to the topology information in the TED, the product considers attributes and requirements specified in configuration statements for the LSP. The LSP allows you to specify and adjust many of the parameters used when the product calculates a traffic-engineered path for a signalled LSP, including the following: • • • • • • An RSVP signalled LSP address for the egress LER. Explicit path to be used by the LSP. Bandwidth required by the LSP. Setup priority for the LSP. Metric for the LSP.
29 LSP 3. Use the View selector to choose between displaying by Product or Admin Group ID. - Product - The product view shows a tree structure under Products/Admin Groups with products at the top level. Click the product name to expand the tree and display any associated admin groups. - ID - The ID view groups admin group instances by admin group ID. An admin group instance may be configured in multiple products, so the same product may be displayed under different admin group IDs. 4.
LSP 29 4. Select a path to display the path name in the Name field, the Product name in the Product field, and the Hop Details. The Hop Details include the following: - Hop IP Address - The IP addresses for all the defined hops are listed. Hop Type - Either Strict or Loose. Strict means that the node must be directly connected to the previous node on the Hop Details list. Loose, means that there may be one or more hops between the previous node on the Hop Details list.
29 LSP Viewing RSVP LSP information Resource Reservation Protocol (RSVP) controls signalling messages sent to each LSR in the LSP to reserve resources for traffic-engineered paths and cause labels to be dynamically associated with interfaces. Take the following steps to view RSVP LSP information. The dialog box allows you to view a list of RSVP LSPs by product or by RSVP LSP name. You can also add, edit, duplicate, or delete RSVP LSPs, and launch the LDP Configuration wizard. 1.
LSP 29 Viewing saved LSP configurations Take the following steps to view all saved LSP configurations. 1. Select Configure > MPLS > LSP. 2. Select the Saved Configurations tab (Figure 399). FIGURE 399 LSP dialog box, Saved Configurations tab Saved LSP configurations are listed by name, description, payload, and deployment schedule.
29 LSP Adding an LSP admin group MPLS interfaces can be organized into administrative groups (admin groups). Typically, an admin group is used to identify a network segment. You can use admin groups to manage CSPF path selection by including or excluding network segments identified as admin groups. If you include an admin group, only those segments in that admin group are selected. If you exclude an admin group, that admin group is excluded from CSPF path selection.
LSP 29 FIGURE 401 Add Admin Groups Configuration dialog box, Deployment Properties pane 8. Select the desired properties. 9. Click Deploy. Editing an LSP admin group You can edit an LSP admin group by taking the following steps. 1. Select Configure > MPLS > LSP. 2. Select the Admin Groups tab. 3. Select the admin group you want to edit. 4. Click the Edit button. The Edit Admin Group Configuration dialog box of the Admin Group Configuration wizard displays (Figure 400).
29 LSP Deleting an LSP admin group You can delete an LSP admin group by taking the following steps. 1. Select Configure > MPLS > LSP. 2. Select the Admin Groups tab. 3. Select the admin group to be deleted. 4. Click the Delete button. The Delete Admin Group Configuration dialog box of the Admin Group Configuration wizard displays. 5. Click on a series of Next buttons to deploy. Adding an LSP path An LSP path is a list of router hops across an MPLS domain. Paths are configured separately from LSPs.
LSP 29 5. Click the Add button. Use the Up and Down buttons to move the selected hop higher or lower in the table. An empty line is added under Hop Details. The first entry is always considered to be the local node and the Ingress LER. LER nodes should be then be added in order from Ingress to Egress. If you need to change the order, you can select an entry and use the Up and Down arrows to change its position. Actual routing depends on whether or not Type is set to Strict or Loose.
29 LSP Duplicating an LSP path When you want to add a new LSP path, you can save work by duplicating an existing path and editing the name and any other parameters you may want to change. You can duplicate an LSP path by taking the following steps. 1. Select Configure > MPLS > LSP. 2. Select the Paths tab. 3. Select the path you want to duplicate. 4. Click the Duplicate button. The Path Configuration dialog box of the Path Configuration wizard displays (Figure 402).
LSP 29 Configuring advanced RSVP LSP settings Resource Reservation Protocol (RSVP) can be used to send signalling messages to each LSR in the LSP to reserve resources and cause labels to be dynamically associated with interfaces. This enables you to engineer network traffic routing to avoid points of congestion and make efficient use of high bandwidth interfaces.
29 LSP 8. Click Advanced Settings to establish traffic engineering parameters. The RSVP LSP Advanced Settings dialog box has three tabs: Global, Paths, and Fast Reroute. The default view is the Global tab (Figure 405). FIGURE 405 RSVP LSP Advanced Settings Global tab From the Global tab you can set the following: - Adaptive checkbox - Select the Adaptive checkbox to allow you to change parameters while an LSP is in enabled state.
LSP 29 You can place selected admin groups into any of the following categories: • Include All - An interface must be a member of all selected groups. • Include Any - An interface is included if it is a member of any of the selected groups. • Exclude All - Interfaces in the selected groups are excluded. - Bidirectional Forwarding Detection (BFD) check box - This check box allows you to enable or disable BFD.
29 LSP - Path Select Mode - The choices are Manual and Unconditional. If Manual is chosen, traffic is shifted to an alternate path only if the selected path fails. If the path recovers, traffic is shifted back. If Unconditional is chosen, the traffic stays on the selected path even if the path fails. If you do not want to specify a path select mode or want to remove the configured path select mode, select None. • Primary - Selected by default.
LSP 29 • Maximum Rate - Sets the maximum data rate supported for data bursts above the mean rate. • Maximum Burst - Sets the maximum number of bytes that can be handled at the maximum rate. - Use LSP for OSPF shortcuts - Enables the use of traffic engineering data carried in OSPF extensions that contain information about the interface’s metric, bandwidth reservations, and admin group memberships. - Use LSP for IS-IS shortcuts - Enables you to configure the IS-IS shortcut parameters.
29 LSP a. Use the Primary Path Select button to display the Path Selector dialog box (Figure 408). FIGURE 408 Path Selector dialog box b. Select the path you want to use as the primary path from Available Paths, and use the right arrow to move the path to Selected Paths. c. Click OK. Secondary paths for the LSP are listed under Paths. Use the Add and Delete buttons to add or delete a secondary path. Use the up and down arrows to move entries up and down in the table. 10.
29 LSP From the Fast Reroute tab you can configure an LSP to request a facility backup provided by a bypass LSP in the event of a failure along the LSP path. Each LSR in an LSP except the egress router may act as a Point of Local Repair (PLR). If a failure occurs on an LSP, the PLR tries to initiate a bypass LSP to provide a backup route for the protected path. The PLR then becomes the ingress of a bypass LSP. The bypass LSP carries the traffic of the LSPs it protects around the break.
29 LSP Editing an RSVP LSP You can edit an RSVP LSP by taking the following steps. 1. Select Configure > MPLS > LSP. 2. Select the RSVP LSP tab. 3. Select the RSVP LSP you want to edit. 4. Click the Edit button. The RSVP LSP Configuration dialog box of the RSVP LSP Configuration wizard displays (Figure 404). Refer to “Configuring advanced RSVP LSP settings” for a description of how to use the RSVP LSP Configuration wizard.
LSP 29 FIGURE 411 Delete RSVP Configuration wizard 5. Click a series of Next buttons to deploy the payload. Editing a saved LSP configuration You can edit a saved LSP configuration by taking the following steps. 1. Select Configure > MPLS > LSP. 2. Select the Saved Configuration tab. 3. Select the saved configuration 4. Click the Edit button.
29 LSP Deleting a saved LSP configuration You can delete a saved LSP configuration by taking the following steps. 1. Select Configure > MPLS > LSP. 2. Select the Saved Configuration tab. 3. Select the saved configuration 4. Click the Delete button. Displaying LSP Topologies Refer to the View Management chapter for descriptions for topology map layout options and navigation aids. You can display topology maps for configured LDP and RSVP LSPs by taking the following steps. 1.
LSP 29 FIGURE 413 LSP Topology View Options 4. Use the LSP Type selector to limit the display to RSVP LSPs Only or LDP Tunnels Only. If you right-click on an LSP, three options are displayed (Figure 414).
29 MPLS Virtual Leased Line (VLL) overview • Select Drill-down to LSP Hops Topology to display LSPs and hops as a line from the ingress router with an arrow to indicate direction. Operationally enabled LSPs are shown with a solid line. Operationally disabled LSPs are shown with a dotted line. • Select LSP Ping to launch the LSP Ping dialog box. • Select LSP Traceroute to launch the LSP Trace Route dialog box.
VLL manager 29 The PE router pushes two labels onto the packet: • The inner VC label is used for determining what happens to the packet once it reaches the VLL peer. This label is significant only to the VLL peer. • The outer tunnel label is used for forwarding the packet through the MPLS domain. This label corresponds to an RSVP-signalled tunnel LSP. After applying the two labels to the packet, the PE router forwards it to the next LSR in the tunnel LSP. 3.
29 VLL manager 1. Select Configure > MPLS > VLL. 2. Select the VLL Manager Views tab (Figure 416).
VLL manager 29 3. You can filter output by name or by VCID by using the selector next to the VLL field. - You can use an Asterisk (*), as a wildcard character if you select By Name. You can enter individual VCIDs or a range of VCIDs if you select By VCID. NOTE If you choose By VCID you can search only for remote VLLs (VLLs whose endpoints are on two different products), but not for local VLLs (VLLs whose endpoints are on the same product). 4.
29 VLL manager • • • • All peers are up. All peers are down. Some peers are down. VCID - The VCID of the VLL. Endpoint Settings display the following information about the A Endpoint and Z Endpoint of the selected VLL in the fields below: • • • • Name - The endpoint device name and IP address. COS - Class of Service associated with the endpoint. VLL Mode Tagged: A VLAN ID tag is added to the packets on the ingress router.
VLL manager 29 FIGURE 417 VLL Manager Saved Configurations tab 3. You can use the Name field to filter output by configuration name. You can use an Asterisk (*) as a wild card character. 4. Click the Get button to begin the search. Configurations that match the filter criteria display under Saved Configurations, showing the configuration ID, the configuration name, and the RBAC user name that created the configuration. 5.
29 VLL manager Adding or editing a VLL instance To add a new VLL instance do the following: 1. Select Configure > MPLS > VLL. 2. Select either the Views tab or the Saved Configurations tab. 3. Click the Add button. The VLL Configuration wizard Target Selector dialog box displays (Figure 418). FIGURE 418 VLL Manager Target Selector dialog box 4. Enter a name for the endpoint in the Name field. The name must be unique on each product and cannot contain spaces, asterisks (*), or question marks (?). 5.
VLL manager 29 11. Click Next. The VLL Configuration wizard Product Configuration dialog box displays (Figure 419). FIGURE 419 VLL Configuration wizard Device Configuration dialog box NOTE If you are configuring a local VLL, you cannot make changes to this dialog box. If you are configuring a non-local VLL, select a device from the device list. Configuring devices using the VLL Manager 1. From the Product Configuration pane of the VLL Configuration Wizard, click each device entry.
29 VLL manager 3. Click Next. The VLL Configuration wizard Port Configuration dialog box displays (Figure 420). FIGURE 420 VLL Configuration wizard Port Configuration dialog box The last discovered port settings for VLLs are displayed in the Discovered Endpoint Settings table. You can make changes to the settings in the Configured Endpoint Settings table. 4.
VLL manager 29 • You can only define one dual tagged endpoint per port. • You cannot define a dual tagged endpoint on a port if there is a 802.1ag configuration defined on the port. c. For tagged ports only, enter a VLAN ID for the customer end point in the Inner VLAN ID field. Packets with this VLAN ID are transmitted out the specified interface. d. From the COS list, select a COS for the port. This field applies only to local VLLs. 5. Click Apply. If any of the endpoints 6. Click Next.
29 VLL manager FIGURE 422 VLL configuration wizard Deployment Properties Deploying VLL properties using the VLL Manager 1. From the Deployment Properties pane of the VLL Configuration Wizard, under Persistence Properties, chose one of the following: - Do not Save to Flash or Reload - Use this option if you want to update the running configuration. The payload configuration is not saved to the device flash memory, nor is the device rebooted when the VLL configuration is deployed.
VLL manager 29 3. Click Next. If you did not select Save configuration on the Deployment Properties dialog box, the Summary dialog box displays (Figure 424), and you may skip to step 1. If you selected Save configuration on the Deployment Properties dialog box, the Deployment Schedule dialog box displays (Figure 423). Refer to “Scheduling deployment using the VLL Manager” on page 1009. FIGURE 423 VLL configuration wizard Deployment Schedule dialog box Scheduling deployment using the VLL Manager 1.
29 VLL manager 2. Click Next. The VLL configuration wizard Summary dialog box displays (Figure 424). FIGURE 424 VLL configuration wizard Summary dialog box Reviewing the VLL Manager summary 1. From the Summary pane of the VLL Configuration Wizard, review the VLL configuration wizard Summary information. The Deployment and Targets tab displays the information you entered on the previous pages. The Configuration tab displays the configuration in CLI format. Reviewing the VLL Manager configuration 1.
VLL manager 29 Creating a new VLL instance using duplicate To create a new VLL instance using duplicate, do the following. 1. Select Configure > MPLS > VLL. 2. Select either the Views tab or the Saved Configurations tab. 3. Select the instance you want to duplicate from the list of VLL instances. 4. Click the Duplicate button. The Target Selection dialog box displays. 5. The text Source_Name_Copy is displayed for Name. Enter a unique name for the new instance.
29 VLL manager Filtering VLL traffic monitoring The VLL Manager Monitor dialog box allows you to monitor traffic on VLLs. 1. Select Monitor > MPLS > VLL. The VLL Monitor Dialog box displays (Figure 425). FIGURE 425 VLL Monitor dialog box 2. You can filter output by name or by VCID by using the selector next to the VLL field. - You can use an Asterisk (*), as a wildcard character if you select By Name. You can enter individual VCIDs or a range of VCIDs if you select By VCID.
Virtual Private LAN Services (VPLS) overview 29 5. Click the Get button to begin the search. VLLs that match the filter criteria display under VLL Instances. NOTE If a VLL is from a device that is not covered by the MPLS license, the row is grayed out. You will not be able to edit that VLL, but you can delete it from the device. The VLL Instances table shows the following information: - VCID of the VLL - In Packets - Number of packets received by the A Endpoint.
29 Virtual Private LAN Services (VPLS) overview CE Device Customer A R2 R3 R1 CE Device CE Devices Customer A MPLS Domain Customer A VLAN 200 VLAN 100 Customer B Customer B CE Devices VLAN 200 VLAN 100 R4 FIGURE 426 VPLS configuration with two customer VPNs Unlike a Virtual Leased Line (VLL), a VPLS instance can have multiple endpoints. The PE device performs local and remote VLAN tag translation, so that multiple VLANs can be specified under a single VPLS instance.
VPLS Manager 29 VPLS Manager The VPLS Manager allows you to manage VPLS instances. You can perform the following tasks from the VLL manager: • View current VPLS instances and peer topologies. • View VPLS configurations. • Add, edit, duplicate, or delete VPLS instances. NOTE When configuring VPLS, a check is made to determine if there are LSPs configured for the target products. You may proceed with configuration, but an LSP is needed for a working connection.
29 VPLS Manager 3. To specify new filter criteria, select By Name or By VCID from the VPLS list. You can use the following to filter the VPLS instances: • Asterisk (*) as a wildcard character if you select By Name. • Individual VCIDs or a range of VCIDs, separating each entry with a comma if you selected By VCID. 4. Click Get to begin the search. Information about products that match the search criteria displays under VPLS Settings, PE Products, and Endpoints on the Details tab.
VPLS Manager 29 FIGURE 428 VPLS Manager Peer Topology tab Brocade Network Advisor IP User Manual 53-1003153-01 1017
29 VPLS Manager Viewing Saved VPLS configurations To view current VPLS configurations, do the following: 1. Select Configure > MPLS > VPLS. 2. Select the Saved Configurations tab (Figure 429). FIGURE 429 VPLS Manager Saved Configurations tab 3. You can use the Name field to filter output by configuration name. You can use an Asterisk (*) as a wild card character. 4. Click Get to begin the search.
VPLS Manager 29 • PE Products table — Displays the following information: PE Devices — Names and IP addresses of the endpoint devices. Peers Up — The number of peers that are up. Endpoints Up — The number of endpoints that are up. Endpoints table — Displays the following information: • Endpoints — Names and IP addresses of the endpoint devices. Tag Mode — Tagged if a VLAN tag is used. Untagged if a VLAN tag is not used. Outer VLAN ID — Present if the Tag Mode for the endpoint is Tagged.
29 VPLS Manager 4. If you want to copy the VPLS configurations for one or more products or ports under Discovered Endpoints, select the product or port and then select the Use Discovered Settings check box. 5. Under Available Endpoints, expand the Devices folder to display the available devices. Then expand the device folder, and slot folder to select a port for an endpoint. 6. Use the right arrow button to move the port to the Selected Endpoints box.
VPLS Manager 29 a. From the drop down list, select the Class of Service (COS) you want to assign to this instance. b. Enter a Maximum Transmission Unit (MTU) for a VPLS instance. MTU is the size of the largest data packet that can pass along a device. Determine the range of values you can enter by checking the configuration guide for your device. The Peers table shows the peer of the selected device. c. You can select the IP address of the peer by clicking the drop down arrow for Peer IP address.
29 VPLS Manager a. Click the empty Outer VLAN ID field and enter the VLAN ID you want to use. b. Click the empty Inner VLAN ID field and enter the VLAN ID you want to use. Skip this step if you are using single tagging. 4. Click Next. The Deploy Target Actions dialog box displays (Figure 433). FIGURE 433 VPLS Configuration wizard Deploy Target Action dialog box The VPLS instance name and VCID are shown in the Name and VCID fields. Deploying target actions using VPLS Manager 1.
VPLS Manager 29 FIGURE 434 VPLS Configuration wizard Deployment Properties dialog box Deploying VPLS properties using VPLS Manager 1. From the Deployment Properties pane, choose one of the following persistence properties: - Do not Save to Flash or Reload - Use this option if you want to update the running configuration. The payload configuration is not saved to the device flash memory, nor is the device rebooted when the payload configuration is deployed.
29 VPLS Manager FIGURE 435 VPLS Configuration wizard Deployment Schedule dialog box Scheduling deployment using VPLS Manager 1. If the Deployment Schedule dialog box displays, select from the following deployment options: - Save without scheduling deployment - saves the payload configuration without a deployment schedule. - Schedule Deployment - enables you to schedule a time for deployment using the Frequency, Time (hh:mm), and Date selectors. 2. Click Disable Schedule to disable a schedule.
VPLS Manager 29 FIGURE 436 VPLS Configuration wizard Deployment Summary dialog box Reviewing the VPLS Manager summary 1. On the Deployment and Targets Summary pane, review the summary information. The Deployment and Targets tab displays the information you entered on the previous pages. The Configuration tab displays the configuration in CLI format. 2. Click the Previous to return to pages that you want to modify. Click Cancel to cancel the configuration. When you have finished, click Next.
29 VPLS Manager 4. The next available VCID in the VCID pool is automatically placed in the VCID field. You can change the VCID if desired as long as it is not used in a current VLL instance. 5. Modify any of the remaining values in the instance by following the procedure presented in “Adding or editing a VPLS instance” on page 1019. NOTE The device folder under Available Endpoints lists all MPLS capable devices, whether or not they are in the All MPLS Licensed and Configured Devices group.
VPLS Manager 29 Filtering for VPLS traffic monitoring The VPLS Manager Monitor allows you to filter and monitor VPLS traffic. 1. Select Monitor > MPLS > VPLS. The VPLS Monitor dialog box displays (Figure 437). FIGURE 437 VPLS Monitor dialog box 2. You can filter output by name or by VCID by using the selector next to the VPLS field. - You can use an Asterisk (*), as a wildcard character if you select By Name. You can enter individual VCIDs or a range of VCIDs if you select By VCID. 3.
29 VCID pools VCID pools VCID pools contain VCID that can be used in a VLL or VPLS instance. You may create a combined VCID pool containing VCIDs that are shared by VLL and VPLS, or you may create a segmented VCID pool that provides separate VCID pools for VLL and VPLS configurations. Viewing, creating, and deleting VCID pools To view a VCID Pool and to create or delete VCID pools, do the following: 1. Select Configure > MPLS > VCID Pool. The VCID Pool dialog box displays (Figure 438).
802.1ag Connectivity Fault Management 29 5. Edit the Start and End fields to specify the desired range of VCIDs. You can use any numbers between 1 to 4294967294. If you are creating a segmented pool, be sure the VLL and VPLS VCIDs do not overlap. 6. Click OK. 802.1ag Connectivity Fault Management 802.1ag Connectivity Fault Management (CFM) is an IEEE standard used to define protocols and practices for Ethernet Operations, Administration, and Maintenance (OAM). 802.
29 802.1ag Connectivity Fault Management 1. Choose one of the following options: • From the VPLS Manager dialog box, Views tab, choose one of the following options: Select a device from the VPLS Peer Status/VPLS Name/VCID list and click 802.1ag CFM. Select the Peer Topology tab and right-click a device in the topology and select 802.1ag CFM. From the VLL Manager dialog box, Views tab, select an instance from the VLL Instances table and click 802.1ag CFM.
802.1ag Connectivity Fault Management 29 12. Select the MEP direction from the Direction list. Options include: • Up — Select to set the MEP direction away from the monitored VLAN. • Down — Select to set the MEP direction towards the monitored VLAN. 13. Click the right arrow button to move the defined MEP to the Selected Maintenance End Points table.
29 802.1ag Connectivity Fault Management 18. Click Close on the Configure 802.1ag CFM dialog box. Editing a maintenance association You can access 802.1ag CFM from the following features: • VPLS Manager (requires the IP - MPLS – VLL prvilege with read-write or read-only permission) • VLL Manager (requires the IP - MPLS – VPLS prvilege with read-write or read-only permission) • VLAN Manager (requires the VLAN Manager prvilege with read-write or read-only permission) NOTE 802.
802.1ag Connectivity Fault Management 29 9. To add a MEP, complete the following steps. a. Select a product from the Product list. The list contains all products that are part of the VPLS. b. Select a VLAN ID from the VLAN ID list. The list contains all VLAN IDs in the VPLS. c. Select a port from the Port list. The list contains all VPLS end-points for the selected VLAN ID. d. Enter a unique identifier for the end-point in the End Point ID field. Valid values include 1 through 8191. e.
29 802.1ag Connectivity Fault Management 11. Click OK on the Edit Maintenance Association dialog box. The Deploy to Products dialog box displays. 12. Select one of the following options: • Save to running — Select to update the running configuration; however, the deployment is not saved to the product’s flash memory. • Save to running and startup — Select to update the running configuration as well as save the deployment configuration to the product’s flash memory.
802.1ag Connectivity Fault Management 29 Adding a MEP to a maintenance association You can access 802.1ag CFM from the following features: • VPLS Manager (requires the IP - MPLS – VLL prvilege with read-write or read-only permission) • VLL Manager (requires the IP - MPLS – VPLS prvilege with read-write or read-only permission) • VLAN Manager (requires the VLAN Manager prvilege with read-write or read-only permission) NOTE 802.
29 802.1ag Connectivity Fault Management 10. Click OK on the Edit Maintenance Association dialog box. The Deploy to Products dialog box displays. 11. Select one of the following options: • Save to running — Select to update the running configuration; however, the deployment is not saved to the product’s flash memory. • Save to running and startup — Select to update the running configuration as well as save the deployment configuration to the product’s flash memory.
802.1ag Connectivity Fault Management 29 Editing a MEP You can access 802.1ag CFM from the following features: • VPLS Manager (requires the IP - MPLS – VLL prvilege with read-write or read-only permission) • VLL Manager (requires the IP - MPLS – VPLS prvilege with read-write or read-only permission) • VLAN Manager (requires the VLAN Manager prvilege with read-write or read-only permission) NOTE 802.1ag CFM is only supported on IronWare Ethernet Routers devices running firmware release 5.2 or later.
29 802.1ag Connectivity Fault Management 11. Click OK on the Edit Maintenance Association dialog box. The Deploy to Products dialog box displays. 12. Select one of the following options: • Save to running — Select to update the running configuration; however, the deployment is not saved to the product’s flash memory. • Save to running and startup — Select to update the running configuration as well as save the deployment configuration to the product’s flash memory.
802.1ag Connectivity Fault Management 29 Viewing the MEPs in a maintenance association You can access 802.1ag CFM from the following features: • VPLS Manager (requires the IP - MPLS – VLL prvilege with read-write or read-only permission) • VLL Manager (requires the IP - MPLS – VPLS prvilege with read-write or read-only permission) • VLAN Manager (requires the VLAN Manager prvilege with read-write or read-only permission) NOTE 802.
29 802.1ag Connectivity Fault Management • To send a loopback message to a specific MEP or MIP in the domain, refer to “Sending a loopback message” on page 1042. • To send a linktrace message to a specific MEP or MIP in the domain, refer to “Sending a linktrace message” on page 1043.. 4. Click Close on the Configure 802.1ag CFM dialog box. Deleting a maintenance association You can access 802.
802.1ag Connectivity Fault Management 29 Checking the connectivity status of remote MEPs Use the 802.1ag CFM Connectivity dialog box to check the status of all remote maintenance end points (MEP) for the selected MEP. You can access 802.
29 802.1ag Connectivity Fault Management • • • • 7. Product - The product containing the remote MEP. Port - The port of the remote MEP. MAC Address - The MAC address of the remote MEP. Operational State - The state of the port attached to the MEP. Valid values include: Unknown, Idle, Start, Failed, and OK. Click Close on the 802.1ag CFM Connectivity dialog box. 8. Click Close on the Configure 802.1ag CFM dialog box.
802.1ag Connectivity Fault Management 29 3. Click Loopback. The 802.1ag CFM Loopback dialog box displays the product that contains the selected MEP, the domain, the maintenance association, and the port number of the selected MEP. 4. Select the MEP for which you want to send a loopback message to a specific maintenance end point (MEP) or maintenance intermediate point (MIP) in the domain in the Maintenance End Points (MEP) table. 5. Click Loopback. The 802.1ag CFM Loopback dialog box displays. 6.
29 802.1ag Connectivity Fault Management To send a link trace message to a specific MEP or MIP in the domain, complete the following steps. 1. Choose one of the following options: • From the VPLS Manager dialog box, Views tab, choose one of the following options: Select a device from the VPLS Peer Status/VPLS Name/VCID list and click 802.1ag CFM. Select the Peer Topology tab and right-click a device in the topology and select 802.1ag CFM.
802.1ag Connectivity Fault Management 29 10. Review the hop details: - The Hop Details table lists the connectivity status for each remote MEP and MIP. The hop number. The MAC address of the remote MEP/MIP. Whether the MEP or MIP forwarded the message. The ingress or egress MEP and MIP. • For a linktrace on a VLAN service, displays the associated port name in the format of Slot_Number/Port_Number. • For a linktrace on a VLL or VPLS, displays the IPv4 address of the peer product.
29 802.1ag Connectivity Fault Management • From the VLL Manager dialog box, Views tab, select an instance from the VLL Instances table and click 802.1ag CFM. • From the VLAN Manager dialog box - VLAN View or Product View, select a VLAN from list and click 802.1ag CFM. The Configure 802.1ag CFM dialog box displays the product that contains the selected MEP, the domain, the maintenance association, and the port number of the selected MEP. 2.
Chapter 30 VIP Servers In this chapter • VIP Servers overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Viewing the VIP Servers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Viewing VIP Server information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Enabling or disabling servers or server ports . . . . . . . . . . . . . . . . . . . . . . • Server port statistics . . . . . . . . . . . . . . . . . . . . . .
30 Viewing the VIP Servers FIGURE 439 VIP Servers dialog box The View list allows you to select which real server, real server port, virtual server, or virtual server ports you want to view. For detailed information, refer to “Viewing VIP Server information” on page 1049. The VIP Servers list displays the ServerIron devices that have been discovered by the Management application ports, and information about the real server or virtual server.
Viewing VIP Server information 30 Viewing VIP Server information 1. From the View list on the VIP Servers dialog box, select which ports you want to view from the following options: • Real server ports view of the virtual server, shown in Figure 440 • Virtual server ports view of the real server, shown in Figure 441 • Real server view of the virtual server, shown in Figure 442 on page 1050 2.
30 Viewing VIP Server information FIGURE 442 Real server view of the virtual server The following fields describe the components in the VIP Servers list on the VIP Servers dialog box. VIP Servers list • The name and IP addresses of the real server or virtual server. • The name or port numbers of the real server port or virtual server port. • Only the servers in a Management application user’s AOR are listed in the list.
Enabling or disabling servers or server ports 30 Enabling or disabling servers or server ports If you have the VIP Server Manager privilege with read-write permission, you can enable and disable real servers, virtual servers, real server ports, and virtual server ports. If you have the VIP Server Manager Leaf Node privilege with read-write permission, you can enable and disable only the server leaf nodes.
30 Server port statistics • • • • • RX Packets — The number of packets received by the port. TX Packets — The number of packets transmitted by the port. RX Bytes — The number of bytes received by the port. TX Bytes — The number of bytes transmitted by the port. Last Update — The date and time when information for the server was updated.
Chapter 31 Global Server Load Balancing In this chapter • GSLB Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • GSLB policy management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • GSLB site management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • GSLB zone configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Controller configuration . . . . . . . . . .
31 GSLB Manager Viewing the GSLB Manager To view the GSLB Manager, perform the following steps. Select Configure > Application Delivery > GSLB. The Policy Configuration tab in the GSLB dialog box, shown in Figure 443, displays. FIGURE 443 GSLB dialog box - Policy Configuration tab The GSLB dialog box displays the following buttons: • • • • Add — Creates a new GSLB policy, site, or zone definition and a new controller configuration. Edit — Modifies existing GSLB Manager definitions and configurations.
GSLB policy management 31 GSLB policy management A GSLB policy allows a GSLB ServerIron ADX product to evaluate each IP address in a DNS reply, based on defined criteria called metrics. The GSLB ServerIron ADX product can reorder the list of addresses and place the IP address for the best site at the top of the list. Creating a GSLB policy To create a GSLB policy, perform the following steps. 1. Select Configure > Application Delivery > GSLB. 2. Click the Policy Configuration tab.
31 GSLB policy management FIGURE 444 Policy Configuration dialog box - Metrics tab 4. Provide the following information on the Policy Configuration dialog box. a. Enter a policy name for the GSLB policy in the Policy Name field. The combination of a GSLB policy name and the Management application user who created it must be unique. b. Select the policy type from the Policy Type list. Options include the Global or Host policy types. c.
GSLB policy management e. 31 Select the tie breaker method from the Tie Breaker list. This value is used in case multiple addresses pass the policy criteria without one address emerging as the best choice: • Least Response: Selects the address of the site that has been selected least often in previous DNS responses. Note: ADX-type products do not support the Least Response tie-breaker method.
31 GSLB policy management To apply policy metrics, perform the following steps. 1. Click the Metrics tab on the Policy Configuration dial box. 2. Select the order from the Metric Order list. Metric order is the order in which the GSLB ServerIron ADX product applies the policy metrics: • Default Order: Metrics are applied in a fixed order as defined in the GSLB ServerIron ADX product. • Select Order: Metrics are applied in the order specified in this parameter. 3.
GSLB policy management 31 FIGURE 445 Policy Configuration dialog box - Prefix tab 3. Enter the IP address and select a location from the Location list. If you select NONE for the location, the prefix is considered static. If you select any other location, the prefix is considered geographical (Geo). Static prefixes never age out, but geographical prefixes are dynamic and can age out. Deleting a prefix from the Prefix list 1. Click the Prefix tab on the Policy Configuration dialog box. 2.
31 GSLB policy management 5. Enter a list of prefix networks and locations in the text box. Each entry should be on a separate line, and separate the prefix network and location with a comma. The location must be one of the following: • • • • • Asia Europe North America South America None If the location is None, it is added as a static prefix. 6. Select one of the following options: • Overwrite: Deletes and replaces any prefix in the list. • Append: Adds to the prefixes in the list.
GSLB site management 31 GSLB site management The Site Configuration dialog box allows you to configure a GSLB ServerIron ADX product with site parameters. A GSLB site contains GSLB ServerIron ADX products that belong to that site. Click the Site Configuration tab on the GSLB dialog box to view the GSLB sites that have been defined for the system, and perform one of the following tasks: • Click Add to create a new GSLB site. • Select an existing GSLB site, and click Edit if you want to modify it.
31 GSLB site management NOTE The weight of the ServerIron ADX product displays in the IP Weights list of the Add Hosts dialog box. Adding ServerIron ADX products to the site You must add at least one site ADC/ADX product to create a site configuration. 1. Click the Add button. When you click Add, a row is added to the Site ADCs list. The ServerIron ADX products that the Management application has discovered appear in the Site ADC column.
GSLB zone configuration 31 GSLB zone configuration When you manage GSLB zones, you specify the DNS zone name and the host information (applications) within each zone for which you want the GSLB ServerIron ADX product to provide GSLB. There are no defaults for zone parameters.
31 GSLB zone configuration 2. Enter a name for the zone in the Zone Name field. The combination of a GSLB zone name and the Management application user who created it must be unique. 3. Perform one of the following tasks: • Click the Add button to open the Add Hosts dialog box, where you can add hosts to a zone. • Select the host from the Hosts list, and click Edit to modify information for a host. • Select the host from the Hosts list, and click Delete to delete a host.
GSLB zone configuration 31 Adding a host to a zone The Add Hosts dialog box allows you to specify host information within each zone. NOTE When you specify the hosts and applications, the GSLB ServerIron queries the DNS server (the one for which the GSLB ServerIron is a proxy) for the IP addresses associated with the hosts and begins sending health checks to the hosts. 1. Enter the name of the host in the Host Name field.
31 GSLB zone configuration The IP Weights list is used if IP Weights is specified in the selected policy (during site configuration using the Site Configuration dialog box). You assign a weight to an IP address so that the ServerIron ADX product distributes GSLB traffic among IP addresses in a DNS reply. 8. Enter the IP address to which you want to assign a weight in the IP Address column. 9. Enter a value from 0 through 100 in the Weight column. The default is 0.
Controller configuration 31 Controller configuration Once policies, sites, and zones are configured, you can assign and deploy a policy to a ServerIron ADX product that is the GSLB controller. The Controller Configuration tab on the GSLB dialog box allows you to assign and deploy a policy to a ServerIron product that is the GSLB controller, after policies, sites, and zones are configured. NOTE All configuration options on the Controller Configuration tab are deployed to the selected GSLB controller.
31 Controller configuration FIGURE 450 Controller Configuration dialog box 1. Enter a name for the configuration in the Configuration Name field. The combination of a GSLB controller name and the Management application user who created the definition must be unique. 2. Select the ServerIron ADX product from the Controller list that will be the GSLB controller. 3. Select the controller policy from the Controller Policy list that will be deployed to the controller.
Controller configuration 31 NOTE The ServerIron ADX product sends the log messages only to the external syslog servers you have configured on the ServerIron ADX product. The messages do not appear in the ServerIron ADX product syslog buffer. 7. Select the Save to Flash check box if you want this configuration to be saved to the ServerIron ADX product memory when it is deployed to the product. 8.
31 Controller configuration 1. Select Configure > Application Delivery > GSLB. 2. Click the Controller Configuration tab. 3. Select the configuration you want to deploy from the Controller list. 4. Click Deploy. NOTE When you deploy a controller configuration, the Management application deletes all GSLB configurations from the ServerIron ADX product to which the configuration is deployed, and then adds the configuration to the ServerIron ADX product.
Controller configuration 31 4. Provide the following information. a. Click the Save Without Scheduling Deployment option if you want to save the deployment definition without scheduling it. b. Click the Schedule Deployment option if you want to schedule and save the deployment definition.
31 Controller configuration c. Select a schedule type from the Frequency list: • • • • • • One Time Hourly Daily Weekly Monthly Yearly The Time (hh:mm) list appears if you select any schedule type except Hourly. d. Select the time when the payload configuration will be deployed. Indicate the hour, minute, and whether it is AM or PM. The Minutes past the hour list appears if you selected Hourly as the schedule type. e. Select the minutes after the hour when the definition will be deployed.
Chapter 32 SSL Certificates for ServerIron Products In this chapter • SSL certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • SSL certificate configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Generating a certificate signing request . . . . . . . . . . . . . . . . . . . . . . . . . . • Adding an SSL certificate and key file . . . . . . . . . . . . . . . . . . . . . . . . . . .
32 SSL certificate configuration You must have the appropriate user privileges to access SSL Certificates. NOTE SSL Certificates does not generate signed certificates and keys. You can generate a certificate signing request (CSR), but the signed certificates and keys managed by SSL Certificates must be signed by a certificate authority (CA) and must be stored in an accessible location.
SSL certificate configuration 32 The SSL certificates and keys can only be deployed from SSL Certificate Manager to the following SSL-capable IronWare OS devices: • • • • ServerIron with WSM6-SSL module, running software release 10.2.01c or later ServerIron with WSM6-SSL-Slave module, running software release 10.2.01c or later ServerIron 4G-SSL (Stackable), running software release 10.2.01c or later ADX running software release 12.1.00 or later NOTE If the ADX is running software release 12.3.
32 SSL certificate configuration - Export button — Use to export a certificate. Deploy button — Use to deploy certificates. Signing Request button — Use to generate certificate signing request. Key Passwords button — Use to add or edit a key password. Accessing SSL certificates on the Product View tab The SSL Certificates dialog box Certificate View tab allows you to view, add, edit, duplicate, append, delete, chain, import, export, and deploy SSL certificates.
Generating a certificate signing request 32 The Product View tab contains the following fields and components. - Products — A product tree structure. When you select a product, certificates are displayed under Certificates. If the ADX is running software release 12.3.00 or later, you can only view and manage SSL certificates to Virtual IP servers that are in your Area of Responsibility (AOR).
32 Generating a certificate signing request FIGURE 454 Certificate Signing Request dialog box If the selected certificate key entry has a key, the Use the key selected in certificate view option is automatically selected. If a key is not available for the selected entry, the Generate a new key option is automatically selected. 3.
Generating a certificate signing request 32 FIGURE 455 Generate CSR Key dialog box 7. Enter your organization’s user data: • • • • Common Name - A common name for the CSR (1 through 32 alphanumeric characters). Unit Name - A unit name for the CSR (1 through 32 alphanumeric characters). Organization - The name of your organization (1 through 64 alphanumeric characters). E-mail Address - The e-mail address for the CSR. This is the From: address when the CSR is submitted for signing.
32 Adding an SSL certificate and key file 10. Enter the key password in the Password field, if necessary. By default, the Password field displays the password (entered in the Certificate Signing Request dialog box) as asterisks (*). 11. Click OK. The generated CSR displays in the CSR field. 12. The CSR needs to be copied and pasted into a file. Obtain instructions from the CA for submitting the CSR for signing.
Editing an SSL certificate and key file 32 The certificate request must be in .PEM format, and must not be expired. No size limit is enforced. 5. If you want a key to accompany the certificate, select the With Private Key check box. This enables the Key Name, Key, and Password fields. If you select With Private Key, continue with step 6. If you do not select With Private Key, continue with step 9. 6. Enter a name in the Key Name field. Any alphanumeric character can be used except a space.
32 Duplicating an SSL certificate and key file Related topic “SSL certificate configuration” Duplicating an SSL certificate and key file You can only edit the certificate name, the key name, and the certificate key decription from the Duplicate Certificate dialog box. 1. Select Configure > Application Delivery > SSL Certificates. The SSL Certificates dialog box displays. 2. From the Certificate View tab, use the Certificates arrow to select Duplicate . The Duplicate Certificate dialog box displays. 3.
Importing certificates and keys from file locations 32 3. Click Close. Importing certificates and keys from file locations NOTE If the ADX is running software release 12.3.00 or later, you can only view and manage SSL certificates that are bound to Virtual IP servers that are in your Area of Responsibility (AOR).
32 Importing certificates and keys from products 8. Enter the password associated with the key in the Password field. 9. (Optional) Enter a description of the certificate in the Description field. 10. Click OK to import the certificate and key files. Related topic “SSL certificate configuration” Importing certificates and keys from products NOTE If the ADX is running software release 12.3.
Exporting certificates and keys 32 FIGURE 458 Import from Product - SSL Certificates/Keys dialog box 3. Select a product from the Available Sources list. 4. Use the right arrow button to move the selected product to the Selected Sources list. 5. Click OK to import certificates and keys for the selected products. Related topic “SSL certificate configuration” Exporting certificates and keys NOTE If the ADX is running software release 12.3.
32 Deploying certificates and keys If you export the certificate file only (no key file), the PKCS option is not enabled. 4. Enter the location of the file in the File Location field or click Browse to browse to the location. 5. Enter the certificate name in the Certificate Name field. 6. Enter the key name in the Key Name field. If you export the certificate file only (no key file), the Key Name field is not enabled. If you select PKCS as the export format, the Key Name field is not enabled. 7.
Creating key passwords 32 FIGURE 459 Deploy Certificates/Keys dialog box 4. Select a product from the Available Targets list. 5. Use the right arrow button to move the selected product to the Selected Targets list. 6. Click OK. The certificate and key selected from the Certificate View tab are deployed to the selected products.
32 Creating key passwords FIGURE 460 Key Passwords dialog box 3. Under Add/Edit Key Password, enter an ASCII character string (from 1 through 16 characters) in the Display Label field that identifies the password you enter in the Password field. Use the key name or a character string that is easy to identify with a specific key. The label provides a means for identifying the password. The password itself is not exposed. 4.
Appending SSL certificates 32 Appending SSL certificates NOTE If the ADX is running software release 12.3.00 or later, you can only view and manage SSL certificates that are bound to Virtual IP servers that are in your Area of Responsibility (AOR). To add a Virtual IP server to your AOR, refer to “Assigning products to an AOR” on page 205 You can append an SSL certificate with another certificate. 1. Select Configure > Application Delivery > SSL Certificates. The SSL Certificates dialog box displays. 2.
32 Chaining SSL certificates 3. Click Chain. The Chain Certificates dialog box displays (Figure 461). FIGURE 461 Chain Certificates dialog box The Certificates table includes the following details: • ID — A unique system-assigned ID for each certificate entry. • Status — Possible values are Valid, About to Expire, or Expired. • Certificate — The user-assigned certificate name. The same name may be used on different products. • Key — The user-assigned key name.
Deleting SSL certificates 32 4. Select the certificate you want to chain to the certificate you selected in step 2. The Chain status for the selected certificate must be Yes. Make sure the Status for the second certificate is Yes. The description of the certificate displays in the Description field, if a description was entered when the certificate was created. 5. Click OK.
32 1092 Deleting SSL certificates Brocade Network Advisor IP User Manual 53-1003153-01
Chapter 33 Deployment Manager In this chapter • Introduction to the Deployment Manager . . . . . . . . . . . . . . . . . . . . . . . . • Editing a deployment configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Duplicating a deployment configuration . . . . . . . . . . . . . . . . . . . . . . . . . • Deleting a deployment configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Deploying a configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
33 Duplicating a deployment configuration FIGURE 462 Task Scheduler dialog box 2. Select a deployment configuration in the Saved or Scheduled tab. Policy-based routing configurations cannot be edited. 3. Click Edit. A dialog box specific to the type of deployment displays. This is the same dialog box that was used when the deployment was created. 4. Update the dialog box with the information you want to change. Duplicating a deployment configuration 1. Select Configure > Task Scheduler.
Deleting a deployment configuration 33 A copy of the deployment configuration is created with the name “originalName copyn”. For example, if the original name is “test”, the new name is “test copy1”. If you duplicate “test” again, the name of the second duplicate is “test copy2”. Deleting a deployment configuration 1. Select Configure > Task Scheduler. The Task Scheduler dialog box displays. 2. Select a deployment configuration in the Saved or Scheduled tab. 3. Click Delete. 4.
33 Generating a deployment configuration snapshot report 3. Click Report. An HTML report displays. You can click the Configuration Name or Deployment Time to see additional details. Generating a deployment configuration snapshot report 1. Select Configure > Task Scheduler. The Task Scheduler dialog box displays. 2. Select a deployment in the Saved or Scheduled tab. 3. Click Deploy. The Deployment Status dialog box displays. 4. Click Snapshot Report. The Configuration Snapshot Report dialog box displays.
Searching the configuration snapshots 33 6. Click Find. The Management application displays the list of snapshots that match the search criteria you specified.
33 1098 Searching the configuration snapshots Brocade Network Advisor IP User Manual 53-1003153-01
Chapter 34 Performance Data In this chapter • SAN performance overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • SAN real-time performance data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • IP performance monitoring and traffic analysis . . . . . . . . . . . . . . . . . . . • IP configuration requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • IP real-time performance monitoring . . . . . . . . . . . . . . . . . . . . . . . . .
34 SAN performance overview SAN performance measures Performance measures enable you to select one or more measures to define the graph or report. The measures available to you depend on the object type from which you want to gather performance data. NOTE Devices with 10GE ports must be running Fabric OS 6.4.1 or later to obtain the correct TE_Port statistics (TX/RX). NOTE Devices with 10GE ports must have the RMON MIB enabled on the switch.
SAN performance overview • • • • • • • • • • • • • • • • • • • • • • • • • • • BB Credit Zero — Available for FC ports. • • • • Dropped Frames — Available for managed HBA ports and managed CNA ports. 34 Truncated Frames — Available for FC ports. FEC Corrected Blocks — Available for FC ports. FEC Uncorrected Blocks — Available for FC ports. Dropped Packets — Available for FCIP tunnels only. Cumulative Compression Ratio — Available for FCIP tunnels only.
34 SAN performance overview SAN performance management requirements To collect performance data, make sure the following requirements have been met: • Make sure the SNMP access control list for the device is empty or the Management application server IP is in the access control list.
SAN performance overview 34 Trap recipient: 10.32.150.116 Trap port: 162 Trap recipient Severity level: 4 Community 6: FibreChannel (ro) Trap recipient: 1001:0:0:0:0:0:0:172 Trap port: 162 Trap recipient Severity level: 4 - To set the SNMP v1 credentials on the device, use the snmpconfig --set snmpv1 command. Example of setting SNMP v1 HCLSwitch:admin> snmpconfig --set snmpv1 SNMP community and trap recipient configuration: Community (rw): [test] Trap Recipient's IP address : [172.26.1.
34 SAN performance overview Priv Protocol: noPriv - To set the SNMP v3 credentials on the device, use the snmpconfig --set snmpv3 command. FM_4100_21:admin> snmpconfig --set snmpv3 SNMPv3 user configuration(SNMP users not configured in Fabric OS user database will have physical AD and admin role as the default): User (rw): [snmpadmin1] admin Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..
SAN performance overview 34 4. Select the Manual option to view SNMP credentials. 5. Click the SNMP tab. 6. Select v1 or v3 from the SNMP Version list. 7. Make sure SNMP credentials match those on the device. 8. Click OK on the AddFabric Discovery dialog box. 9. Click Close on the Discover Fabrics dialog box. - To set SNMP credentials in the Management application, refer to “Discovery” on page 35. • Make sure that the SNMP security level is set to the appropriate level for the switch.
34 SAN real-time performance data Enabled: Yes Password Last Change Date: Unknown Password Expiration Date: Not Applicable Locked: No Home LF Role: admin Role-LF List: admin: 1-128 Chassis Role: admin Home LF: 128 - Make sure I/O is running on the switch to obtain real statistics. To view switch statistics, use the portperfshow (FC ports) or portshow fciptunnel (FCIP tunnels) command.
SAN real-time performance data 34 1. Select the fabric, device, or port for which you want to generate a performance graph. Right-click and select Performance > Real-Time Graph/Table or select Monitor > Performance > Real-Time Graph. The Real Time Graphs/Tables dialog box displays. If you selected a port, the Real Time Performance Graphs dialog box for the selected port displays.
34 SAN real-time performance data NOTE Devices with 10 GbE ports must be running Fabric OS 6.4.1 or later to obtain the correct TE_Port statistics (TX/RX). NOTE Devices with 10 GbE ports must have the RMON MIB enabled on the switch. For more information about the rmon collection command, refer to the Fabric OS Converged Enhanced Ethernet Command Reference.
SAN real-time performance data 34 6. Select Plot Events to display advanced monitoring service (AMS) violation events received during the chart time range and Master Log events logged on the same product as the measure being plotted. 7. Move the Row Height slider to the left to make the row height smaller or to the right to make it larger. 8. Select the Display tabular data only check box to show only text with no graphs or icons. The Source and Destination icons and the Graph column do not display. 9.
34 SAN real-time performance data 4. Enter a name for the file and click Save. Performance statistics counters Table 94 details the formulas used to calculate performance statistics based on counter type and protocol. To calculate FC, GE, FCIP and TE port statistics, the Management application uses SNMP to query the respective object identifiers (OID) (listed in Table 94). To calculate HBA and CNA statistics, the Management application uses APIs provided by HCM.
SAN real-time performance data TABLE 94 34 Performance statistic counters Counter name Type Protocol Source OID value Formula TX% / RX% FCIP N/A N/A TX% or RX% = ((bytes transferred) / (maximum bytes transmitted))*100 where maximum bytes transmitted = tunnel speed * 134217728 (maximum bytes transmitted 1 Gbps). If utilization is less than 1, the value is 0.0. TX% / RX% (Pre-Fabric OS 6.4.
34 IP performance monitoring and traffic analysis TABLE 95 Performance counters Counter name Type Protocol Source OID value Current FC SNMP .1.3.6.1.4.1.1588.2.1.1.1.28.1.1.3 Rx Power FC SNMP .1.3.6.1.4.1.1588.2.1.1.1.28.1.1.4 Tx Power FC SNMP .1.3.6.1.4.1.1588.2.1.1.1.28.1.1.5 Invalid Oredered Set FC SNMP .1.3.6.1.3.94.4.5.1.45 BB Credit Zero FC SNMP 1.3.6.1.3.94.4.5.1.8 Truncated Frames FC SNMP 1.3.6.1.3.94.4.5.1.47 FEC Corrected Blocks FC SNMP 1.3.6.1.4.1.1588.2.1.1.1.
IP configuration requirements 34 IP configuration requirements To be able to use SNMP Monitor for performance monitoring, make sure the following requirements are met: • Ensure that SNMP is enabled on the devices you want to monitor and that SNMP community strings have been defined for set and get operations. • Make sure discovery has been run and the devices appear on the Network Object Manager tree. If a device is not on the tree, add the device using Network Object Manager.
34 IP real-time performance monitoring FIGURE 465 Select Sources - Real Time Graphs / Tables dialog box 2. Select the products you want in the Available Products list and click the right arrow button to move them to the Selected Products list. NOTE You cannot select more than 100 products and ports. 3. Select the ports you want in the Available Ports list and click the right arrow button to move them to the Selected Ports list. 4. Click OK. The Real Time Graphs/Tables dialog box displays. 5.
IP real-time performance monitoring 7. 34 Remove collectors from the monitor by selecting the collector beneath the graph and clicking the left arrow button. 8. To configure the look and feel of the performance graph from the Real Time Graphs/Tables dialog box, refer to “Configuring the performance graph” on page 1119. 9. Click the Collection Status Summary tab to view the following information. The Collection Status Summary tab provides a high-level overview of all defined collectors.
34 IP real-time performance monitoring 4. Click OK. The Real Time Graphs/Tables dialog box displays. Removing products and ports from real-time performance To remove products and ports from real-time performance monitoring, complete the following steps. 1. Click Sources from the Real Time Graphs/Tables dialog box. 2. Select the products you want to remove in the Selected Products list and click the left arrow button to move them to the Available Products list. 3.
IP real-time performance monitoring c. 7. 34 Click the right arrow button to move them to the Selected Measures list. If you want to launch the Expressions dialog box, click the Expressions button. 8. Click OK. The Real Time Graphs/Tables dialog box displays. Removing measures from products To remove measures from products, complete the following steps. 1. Right-click a device and select Performance > Real Time Graph/Table. The Real Time Graphs/Tables dialog box displays. 2.
34 IP real-time performance monitoring Select multiple measures by holding down the CTRL key and clicking more than one measure. You can also search (refer to “Search” on page 407) for a MIB in the list. c. Click the right arrow button to move them to the Selected Measures list. 6. To add an expression to the port, complete the following steps. a. Click the Expressions tab in the Available Measures area. b. Select the expression you want to add to the port.
IP real-time performance monitoring 34 Adding collectibles to monitoring NOTE You cannot select more than 20 collectors at a time. To add collectibles to performance monitoring, complete the following steps. 1. Add all collectibles defined for a device by completing the following steps. a. Select Show > Products to show devices on the network that are being polled for collectible data. b. Select the product you want to include in performance in the tree.
34 IP real-time performance monitoring Configuring the performance graph display Use the procedure procedure to configure the graph display for the Real Time Graphs/Tables dialog box and Historical Graphs/Tables dialog box as well as time series monitors on the Dashboard ta. 1. Right-click the graph and select one of the following options: • Select the Show Controls check box to show or hide additional display options on the graph (refer to step 3 through step 9 for more information).
IP real-time performance monitoring - 34 Unit / Sec - Displays the error rate that occurred during a polling cycle. Applicable only for error measures. FIGURE 466 Show data points graph NOTE Although these settings will apply to all performance graphics in the Management application, the change will not reflect instantly on the performance monitor that displays the graph. Rather, the change will be updated the next time those monitors are launched. 3.
34 IP real-time performance monitoring 9. (Real Time Graphs/Tables and Historical Graphs/Tables dialog boxes only) Click Save as Widget to create a performance monitor published widget on the active dashboard. For instructions, refer to “Configuring a monitor from a performance graph” on page 385. Configuring graph options Use the following steps to configure graph options for real time performance graph display as well as time series monitors on the Dashboard tab. 1. Click Options on the graph.
IP real-time performance monitoring 34 • Use logarithmic axis check box — Data can be presented on a logarithmic or non-logarithmic axis. Each unit in a non-logarithmic axis presents the data in equal segments. However, logarithmic axis units are not equal and can increase exponentially by 10. Therefore, use a logarithmic axis if you have a large amount of data to view. • Show values check box — Annotates data point values in the graph.
34 IP real-time performance monitoring FIGURE 469 Show events graph 5. In the Time Range area, select one of the following options: • Select Relative time to set a time range relative to the present for the display of historical data. a. (Historical graphs and monitors only) Select the granularity of the data points to display on the graph from the Granularity list. Options are 5 minutes, 30 minutes, 2 hours, or 1 day.
IP historical performance monitoring 34 • Spreadsheet (.csv) • Image (.png) The Save dialog box displays. 3. Browse to the location where you want to save the export file. 4. Enter a name for the export file. 5. Click Save. Printing a graph To print a graph, complete the following steps. 1. Right-click the graph and select Print. The Page Setup dialog box displays. 2. Edit the paper, orientation, and margins, as needed. 3. Click Printer to select a printer. 4. Click OK.
34 IP historical performance monitoring • Create a custom graph or table display for data by defining options such as the following: - Selecting a product for displaying data. - Selecting measures to collect. - Modifying collectors. - Plotting minimum and maximum values. - Displaying data points or polling intervals. - Displaying events. - Selecting a graph or table format.
IP historical performance monitoring • • • • • • • 34 Name - Collector Basics page Device or port level - Collector Basics page Polling interval - Collector Basics page Schedule setting - Collector Basics page MIB selection - MIB Object page Expression selection - Expression page MIB index - MIB Index page NOTE The MIB Index page for system collectors will not show because you cannot configure the MIB index for system collectors.
34 IP historical performance monitoring • Collectibles Type - At what level the data will be collected and the types of MIB objects used: - Product Level - SNMP data is collected at the product (device) level. - Port Level - SNMP data is collected at the port level. • Source Defined - Whether or not the information source (product or port) is defined (Yes) or not configured (No). • System Collectors - Whether or not this is a system data collector.
IP historical performance monitoring 34 The Data Collector wizard Collector Basics dialog box displays where you can add values for a new collector. FIGURE 471 Data Collector wizard Collector Basics dialog box 3. Enter a descriptive name for the data collector in the Name field. 4. Use the Polling Interval list to set the polling interval. The choices are 1 minute, 5 minutes, 10 minutes, 15 minutes, and 30 minutes. 5. Select the Target Type.
34 IP historical performance monitoring • If you select Weekly, the Time (hh:mm) and Day of the Week selectors display. • If you select Daily, the Time (hh:mm) selector displays. • Duration - Enter a value in the Duration field, and then select the unit of measure. The options are Minutes, Hours, and Days. 7. Click Next on the Collector Basics dialog box. The MIB Objects dialog box displays.
IP historical performance monitoring 34 FIGURE 473 Data Collector wizard Expressions dialog box The Available Expressions list shows all expressions that are available by default and any that have been defined by the user. 12. Select an expression from the Available Expressions list. A description of the expression displays under Details of . 13. To include the expression in your data collector, click the right arrow button to move the expression to the Selected Expressions list.
34 IP historical performance monitoring FIGURE 474 Data Collector wizard Select Sources dialog box The Available Products/Ports tree structure includes all products and ports that can be monitored. You can expand folders to display all available products and ports. If you have selected Port Level on the Collector Basics dialog box, trunk objects will be included as available targets in the form of LAG, vLAG, or TRILL objects. Only ifindex-based MIBs or expressions are supported. 15.
IP historical performance monitoring 34 FIGURE 475 Data Collector wizard MIB Index dialog box You can define index values for each MIB object that requires an index. 17. From the MIB Instances list, select the required MIB variable. The Complete SNMP OID, the Index Name, and the Index Value display beneath the MIB Instances list. 18. You have several options for entering index information: • Select the Dynamic walk check box to dynamically select index values for a particular index.
34 IP historical performance monitoring 19. Click Next on the MIB Index dialog box. The Threshold & Rearm dialog box displays. FIGURE 476 Data Collector wizard Threshold & Rearm dialog box This Threshold & Rearm dialog box allows you to establish a a threshold value that triggers a trap message when the threshold is met, and to establish conditions for repeating threshold check and trap messages. 20. Select the Enable threshold and rearm events check box to enable the Threshold and Rearm selectors. 21.
IP historical performance monitoring 34 Adding third-party device MIB objects manually To add a third-party device MIB object manually, complete the following steps. 1. Copy the third-party device MIB objects to the Install_Home\conf\mibs\ip directory. 2. Go to Install_Home\conf\mibs and open the mibs_to_compile.txt file in a text editor. 3. Add the MIB file names to the mibs_to_compile.txt file. 4. Save and close the mibs_to_compile.txt file. 5.
34 IP historical performance monitoring 1. Select Monitor > Performance > Historical Data Collectors. 2. Select the data collector you want to duplicate. 3. Click Duplicate. The Data Collector wizard is launched. The wizard is pre-populated with the data for the selected data collector. The Name field shows the name of the collector followed by the word copy. Go to any step to edit any of the values. 4. Click Finish on any of the wizard dialog boxes when you are done.
IP historical performance monitoring 34 2. Perform either of the following steps: • Click Add. The Add Expressions dialog box displays. FIGURE 478 Add Expressions dialog box • Select the expression you want to edit or duplicate from the Expressions list and click Edit or Duplicate. The Edit Expression or Duplicate Expression dialog box displays with the details for the selected expression. If you are duplicating an expression, the Management application appends _copy to the name of the expression. 3.
34 IP historical performance monitoring • MIB Object.Delta — Assuming the MIB value polled in the current polling period is M(T1) and the value polled in the previous polling period is M(T0), the MIB value to be used in the expression is calculated using M(T1)- M(T0). • MIB Object.
IP historical performance monitoring 34 FIGURE 479 Historical Graphs/Tables Data Monitoring tab 3. Use the Show selector to toggle the tree structure display in the left panel between Products and Collectibles. • Select Products and the left panel displays the tree structure of devices and device interfaces on the network being polled for collectible data. The right panel displays measures currently being collected for the selected product or port in the left panel.
34 IP historical performance monitoring FIGURE 482 Wireless access point devices and controllers display • Select Collectibles and the left panel displays measures (MIB objects and expressions) currently being collected. Select a measure, and the targets (products or ports) from which the measure was collected display in the right panel. If SAN historical data collection is enabled, corresponding SAN products and ports display.
IP historical performance monitoring 34 If a table is displayed, the first column displays the time of the collection. The remaining columns display the value of each collectible at the specified time. There is one column for every collectible you select to display. 7. Optional: To add the performance monitor published widget to the active dashboard, click Save As Widget. The Performance Dashboard Monitor Title dialog box displays.
34 IP historical performance monitoring • Status - The status field uses the following icons:. Failed. No value was ever collected for this collectible. Warning: Data collection failed in the last polling cycle. Successful: Last collection successful. Scheduled but not currently active. • Last Value - The last (most current) value collected. • Last Time Polled - The time that the collector was last polled.
MIB data collectors 34 MIB data collectors The Management application enables you to define a data collector by mapping a MIB object to a unit name in the mib_unit.properties file. This property file is located in the Install_Home/conf/mibs directory. The default mib_unit.properties file contains commonly used MIB unit definitions. Once mapped, the unit name displays on the line chart of the performance graphs when you select that MIB object as a data collector.
34 IP Custom performance reports IP Custom performance reports You can create customized reports and run or schedule them in the same manner as a standard report. You can modify, copy, or delete customized reports. Select the report from the Report Definitions tab, then click the Edit, Duplicate, or Delete button.
IP Custom performance reports 34 • Select an existing report from the Performance Custom Reports dialog box and click Edit to edit the report. • Select an existing report from the Performance Custom Reports dialog box and click Duplicate to duplicate the report. • Select an existing report from the Performance Custom Reports dialog box and click Delete to delete the report.
34 IP Custom performance reports 5. To schedule the report to run at a specific time, click the Time Settings tab. FIGURE 486 Add/Edit Report Definition dialog box - Time Settings tab You can choose from the following settings: • Relative Time - Enables you to select a time range relative to the present for the display of historical data. The choices are incremental from the last 30 minutes to the last 24 hours.
IP Custom performance reports 34 6. To arrange the order of the columns in the generated report, click the Result Settings tab. FIGURE 487 Add/Edit Report Definition dialog box - Result Settings tab • Data types that will be collected are listed in the Available Columns list. Select the data type you want to include in the report and click the right arrow button to move it to the Selected Columns box. • Select a data type to be used to sort the report.
34 IP Custom performance reports 7. Click the Identification tab. FIGURE 488 Add/Edit Report Definition dialog box - Identification tab 8. Enter a name for the report in the Name field. You can use up to 64 alphanumeric characters. This name appears under the Name column on the SNMP Monitor reports tree. This name must be unique for each SNMP Monitor report. 9. Enter a title for the report, which will be used as the title of a generated report, in the Title field.
IP sFlow configuration 34 12. Select the user accounts that will be able to view and run this definition in the Available Users list and click the right arrow button to move those user accounts into the Selected Roles box. Click the left arrow button to move the user accounts back to the Available Users list. You can share this definition with specific Management application users.
34 IP sFlow configuration FIGURE 489 Interface Payload - sFlow Configuration dialog box Under SFlow Configuration Selection, there are two check boxes: • sFlow Settings - Allows you to enable or disable sFlow, and allows you to configure traffic sampling rates. • sFlow Destination - Allows you to add or delete sFlow collector entries in the device. Select both if you are adding an sFlow data collector.
IP sFlow configuration 34 2. Click Next. The Interface Payload - sFlow Settings dialog box displays. FIGURE 490 Interface Payload - sFlow Settings dialog box 3. Under Global Settings, select Enable to have the sFlow report enabled when it is deployed. Select Disable to deploy the sFlow report as initially disabled. 4. Use the Rate Sampling selector to choose either Adaptive or Custom sampling. If you choose Adaptive, the management server selects the sampling interval and traffic sampling rate.
34 IP sFlow configuration If you choose Custom, you may set your own sampling interval and traffic sampling rate. - Global Settings • Counter sampling interval - defines the interval in seconds between samples. For Ironware devices, the range is 0 to 86400. For Network OS devices, the range is 1 to 65535. • Traffic sampling rate - the ratio between the total number of incoming packets and the number of flow samples taken at the product level.
IP sFlow configuration 34 A new row appears under Collector Details for the collector you just added. NOTE A limit of four collectors is enforced in the Collector Details table. If you add more than four collectors, an error message displays. An error message also displays if you try to add a collector with the same IP address and UDP port combination as an existing collector. NOTE For VCS devices running Network OS v4.0 and above, you can deploy up to five collectors.
34 IP sFlow configuration Creating custom sFlow reports You may create custom sFlow reports if you want to capture traffic analysis information that is not available in the standard reports. 1. Select Monitor > Traffic Analysis > Custom Reports. The Traffic Analyzer Custom Reports dialog box displays. FIGURE 491 Traffic Analyzer Custom Reports dialog box, Definition tab 2. Select the Report Definitions tab. 3. Click the Add button. The Add Report Definitions dialog box displays. 4.
IP sFlow configuration 34 FIGURE 492 Add Report Definitions dialog box, Product & Port tab The Product & Port tab contains tables of available products and ports that may be selected for sFlow data collection. 5. Determine if you want a report on only one product or port or on two or more products or ports, and select either Single or Multiple as appropriate. Options are displayed differently depending on your choice of Single or Multiple. If you chose Single, complete the following steps.
34 IP sFlow configuration For VCS fabrics, if you select Single mode, the following report definition behavior may occur: - Displays all ports from all members of the selected VCS fabric in the available ports tables on the Product & Port tab. - Automatically includes fabric changes (adding or deleting members) when you run the report.
IP sFlow configuration 34 8. If you do not chose the Prompt check box, complete the following for each field. - Source VM — Enter the name, IP address, or MAC address of the source VMs in comma separated value (CSV) format or click the ellipsis button to the right of the field to select the VMs from the Select VMs dialog box.
34 IP sFlow configuration 12. Select the Layer 3 & 4 tab. FIGURE 495 Add Report Definitions dialog box, Layer 3 & 4 tab 13. Examine each listed item and decide the following: - Do you want to enter values in the field, or be prompted to enter the value when running the report? If you want to be prompted, select the Prompt check box.
IP sFlow configuration 34 - Layer 4 Protocols — The layer 4 protocols you can use as a filter depends on which layer 3 protocols you selected. Enter the L4 protocols in comma separated value (CSV) format or click the ellipsis button to the right of the field to select the protocols from the Layer 4 Protocols dialog box. - Source Ports — Enter the ports in comma separated value (CSV) format or click the ellipsis button to the right of the field to select the ports from the L4 Source Port dialog box.
34 IP sFlow configuration 18. Examine each listed item and decide the following: Do you want to enter values in the field, or be prompted to enter the value when running the report? If you want to be prompted, select the Prompt check box. If you do not chose the Prompt check box, you may enter any of the following in the fields provided: - Source Subnet Bits - Enter the source subnet of the route. Destination Subnet Bits - Enter the destination subnet of the route. Local AS - Enter the local AS number.
IP sFlow configuration 34 21. Select the Result Settings tab. FIGURE 499 Add Report Definitions dialog box, Result Settings tab 22. Select one of the following options for displaying report data from Result Type list: - Detailed Table - Displays data in table format. - Bottom N Chart and Table - Displays a pie chart of the bottom N talkers above the tabular data. Top N Chart and Table - Displays a pie chart of the top N talkers for your selected sorting options above tabular data.
34 IP sFlow configuration FIGURE 500 Add Report Definitions dialog box, Result Settings tab 23. If you selected Bottom N Chart and Table or Top N Chart and Table, select the top or bottom number (N) of talkers that you want in the report by clicking the arrows on the selector to the right of the Result Type list. Select a minimum of 5, with increments of 5 to a maximum of 25.
IP sFlow configuration 34 26. Select the Identification tab. Add Report Definitions dialog box displays, as shown in Figure 501 on page 1163. FIGURE 501 Add Report Definitions dialog box, Identification tab 27. Enter a name for the report in the Name field. The name must be unique among all sFlow reports, and can be a maximum of 64 alphanumeric characters. 28. Enter the report title in the Title field. The Title field supports a maximum of 128 alphanumeric characters. 29.
34 IP sFlow configuration FIGURE 502 Example report for top 5 MAC Talkers Scheduling custom sFlow reports You can schedule a custom sFlow report from the Schedules tab of the Custom Reports dialog box. 1. Select Monitor > Traffic Analysis > Custom Reports. 2. Select the Schedules tab. Custom sFlow Reports dialog box displays, as shown in Figure 503 on page 1165.
IP sFlow configuration 34 FIGURE 503 Custom sFlow Reports dialog box, Schedules tab 3. Click Add. The Add Schedule dialog box displays, as shown in Figure 504 on page 1166.
34 IP sFlow configuration FIGURE 504 Add Schedule dialog box 4. Enter a name for the schedule in the Name field. 5. Use the Report Definition selector to select the report definition you want to schedule. NOTE Report definitions that included a prompt are not listed. 6. Use the Format selector to choose either HTML or CSV format. 7. Use the Frequency selector to choose to run the data collector on a Yearly, Monthly, Weekly, Daily, Hourly, or One Time basis.
IP Traffic analyzer monitoring and sFlow reports 34 12. You may include text that you want to add before the auto-generated report content in the Body Prologue field. 13. You may include text that you want to add after the auto-generated report content in the Body Epilogue field. 14. Click OK. Suspending a custom sFlow report schedule To suspend the schedule of a custom sFlow report, complete the following steps. 1. Select Monitor > Traffic Analysis > Custom Reports. 2. Select the Schedules tab. 3.
34 IP Traffic analyzer monitoring and sFlow reports 802.1X configuration requirements 802.1X user information can be displayed on sFlow reports. To ensure that this information is displayed, do the following: • Make sure the device and software release it is running supports 802.1X. • 802.1X must be enabled on the device ports. • Clients must be running software platforms that support 802.1X (for example, Windows XP operating system). • RADIUS authentication servers must have the 802.
IP Traffic analyzer monitoring and sFlow reports 34 4. To launch the sFlow Configuration wizard and configure an sFlow data collector, select Configure sFlow. Selecting a report Use the report header to configure the report display. This section explains the available fields and selection options. Report list Select the type of traffic that you want to view from the list. • • • • For Layer 2 reports, select MAC, VM, or VLAN. For L3/L4 reports, select IPv4, IPv6, IPX, AppleTalk (AT), VM, or Others.
34 IP Traffic analyzer monitoring and sFlow reports Also, if you select 1, 2, 4, or 6 hours for span, top talkers are shown as stacked bar graphs; each bar represents two minutes of data. For example, each bar below represents 2 minutes of data. Each bar is divided into the top talkers for that 2-minute period. Measure list Select how data is to be sorted: Bytes or Frames. Frames is the default.
IP Traffic analyzer monitoring and sFlow reports 34 Show DNS Name Select this check box if you want domain name server (DNS) names of IP addresses to be displayed on the report. Include Remaining Talkers The sFlow monitoring reports display the top five talkers and remaining talkers. To exclude any remaining talkers in the chart area, select this check box.
34 IP Traffic analyzer monitoring and sFlow reports There are differences in the graphs for periods up to six hours and for the 12 and 24 hour graphs: • For periods up to 6 hours, the graph shows stacked bars. Each bar represents a flow aggregated for a 2-minute period. Each stack represents all the flows in the system aggregated for a 2-minute period. • The 12 and 24 hour graphs show bars (not stacked bars). Each bar represents a flow aggregated for a 1-hour period.
IP Traffic analyzer monitoring and sFlow reports 34 Viewing top MAC talkers The Top MAC Talkers report shows the top pairs of source and destination MAC addresses being used on the network. Follow the steps below to display the report. 1. Select Monitor > Traffic Analysis > Monitor sFlow. 2. On the Monitor sFlow dialog box, choose one of the following options: • To view a report for a product group, click the report icon for the product group you want.
34 IP Traffic analyzer monitoring and sFlow reports 4. In the Reports list, select VLAN. The report presents the following information: • • • • • VLAN - The ID of the source and destination VLANs used by the users. Ethernet QOS - The 802.1p priority tag configured on the incoming and outgoing traffic. Port - The ID of the port on which the traffic is being received and being sent. For VCS fabrics, the send and receive ports are from different devices.
IP Traffic analyzer monitoring and sFlow reports 34 5. In the next list, select All. The report provides the following information: • L3 columns - Source - The source IP addresses of the IPv4 traffic and VM hosts (Top VM Talkers reports). If enabled, host names of the IP address are shown in parentheses. - Destination - The destination IP addresses of the IPv4 traffic and VM hosts (Top VM Talkers reports). If enabled, host names of the IP address are shown in parentheses.
34 IP Traffic analyzer monitoring and sFlow reports 4. In the Reports list, select IPV4. 5. In the next list, select TCP. The report shows the following information: • IPV4 - Source - The source IP addresses of the IPv4 traffic. If enabled, host names of the IP address are shown in parentheses. - Destination - The destination IP addresses of the IPv4 traffic. If enabled, host names of the IP address are shown in parentheses.
IP Traffic analyzer monitoring and sFlow reports 34 Viewing IPv4 – top UDP talkers The Top IPV4–UDP Talkers report shows the top users of IPv4 UDP services. Complete the following steps to display the report. 1. Select Monitor > Traffic Analysis > Monitor sFlow. 2. On the Monitor sFlow dialog box, choose one of the following options: • To view a report for a device group, click the report icon for the device group you want.
34 IP Traffic analyzer monitoring and sFlow reports A subtotal is displayed for each of the top users. This subtotal is displayed by source and destination IP addresses. If the report is for a device group, the name and IP address of the device that the traffic accessed appear in parentheses. If the report is for an individual device, only the source and destination IP addresses appear. At the end of the report, a subtotal for the remaining network users and a total for the entire network are displayed.
IP Traffic analyzer monitoring and sFlow reports 34 • Mbytes - Size of the traffic in megabytes for the time duration shown on the report. A subtotal is displayed for each of the top users. This subtotal is displayed by source and destination IP addresses. If the report is for a device group, the name and IP address of the device that the traffic accessed appear in parentheses. If the report is for an individual device, only the source and destination IP addresses appear.
34 IP Traffic analyzer monitoring and sFlow reports Viewing other Layer 3 or Layer 4 Top Talkers The Others report under the Layer3/Layer 4 report category provides information on Layer 3 protocols excluding IPV4, IPV6, IPX, and AppleTalk services. Complete the following steps to display the report. 1. Select Monitor > Traffic Analysis > Monitor sFlow. 2.
IP Traffic analyzer monitoring and sFlow reports 34 Enabling and viewing TCP reports You can monitor TCP traffic to determine if there is any unusual activity on the network, such as TCP attacks. Identifying unusual activity will aid in understanding the nature of the traffic and the ports that are affected, so that you can take corrective actions. For example, you may decide to disable a port on which TCP attacks are being received.
34 IP Traffic analyzer monitoring and sFlow reports 2. Select IP Preferences from the Software Configurations list in the Category pane. 3. Go to the SFlowDataMonitoring preferences section. 4. Click in the TCPFlags_InvalidCombos parameter field to edit the invalid bit combinations. 5. Click Apply or OK to save your work. Displaying the invalid TCP Flags report Complete the following steps to display the invalid TCP flags report. 1.
IP Traffic analyzer monitoring and sFlow reports 34 • Frames - Size of the traffic in frames. • MBytes - Size of the traffic in megabytes for the time duration shown on the report. Viewing BGP paths report The BGP Paths report shows source and destination traffic based on BGP autonomous systems paths. Complete the following steps to display the report. 1. Select Monitor > Traffic Analysis > Monitor sFlow. 2.
34 IP traffic accounting Troubleshooting sFlow reports If the sFlow Monitoring report launches with an error on RedHat Linux, use the following steps to resolve. 1. Stop the server. 2. Run the command unset DISPLAY on the terminal. 3. Restart the server. NOTE You can only restart the server using the Server Management Console (Start > Programs > Management_Application_Name 11.X.X > Server Management Console).
IP traffic accounting 34 4. You have three options for displaying traffic accounting information: • Click Summary to view the entire accounting summary report for the selected group. • Click In Traffic to view inbound traffic on the ports in the selected group. • Click Out Traffic to view outbound traffic on the ports in the selected group. The number of records gathered for each device is limited to 10,000 by default.
34 1186 IP traffic accounting Brocade Network Advisor IP User Manual 53-1003153-01
Chapter 35 Frame Monitor In this chapter • Frame Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Creating a custom frame monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Editing a frame monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Assigning a frame monitor to a port. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Finding frame monitor assignments . . . . . . . . . . . . . . .
35 Frame Monitor Frame types The frame type can be a standard type (for example, a SCSI read command filter that counts the number of SCSI read commands that have been transmitted by the port) or a user-defined frame type customized for your particular use.
Creating a custom frame monitor 35 Frame Monitoring requirements To configure Frame Monitoring, the following requirements must be met: • The switch must be running Fabric OS 7.0.0 or later. • Frame Monitoring requires the Advanced Performance Monitoring license and the Fabric Watch license. NOTE The Advanced Performance Monitoring license is required to configure frame monitors. The monitoring functionality requires the Fabric Watch license.
35 Creating a custom frame monitor 2. Select the Switch option. The Products / Monitors list displays the switches that support Frame Monitoring. 3. Enter the monitor data in the Configure Monitor area. 4. Select one or more switches in the Products / Monitors list, and click the right arrow button to assign the frame monitor to those switches. 5. Select the Port option. 6. Expand the switch in the Products / Ports list. The Monitors list displays all of the frame monitors defined for that switch. 7.
Editing a frame monitor 35 11. Click Start. The frame monitor configuration is applied to the switches. 12. Click Close after configuration is complete (indicated by “Completed” in the Progress column). Editing a frame monitor 1. Select Monitor > Fabric Watch > Frame Monitor. The Frame Monitor dialog box displays. 2. Select the Switch option. 3. Expand the Products / Monitors list to display the frame monitors for each switch. 4. Select a frame monitor and click the left arrow button.
35 Finding frame monitor assignments 6. Click the right arrow button to move the frame monitor to the selected ports. The Monitor Details list displays the monitors that are assigned to a selected port. If no monitors are assigned, or if more than one port is selected, the Monitor Details list does not display. 7. Click OK. The Frame Monitor Configuration Status dialog box displays. 8. Click Start. The frame monitor configuration is applied to the ports. 9.
Removing a frame monitor from a switch 35 8. Click Start. The frame monitor configuration is applied to the ports. 9. Click Close after configuration is complete (indicated by “Completed” in the Progress column). Removing a frame monitor from a switch When you remove a frame monitor from a switch, the frame monitor is automatically removed from all assigned ports in the switch. You can remove only custom frame types; you cannot remove the pre-defined frame types. 1.
35 1194 Removing a frame monitor from a switch Brocade Network Advisor IP User Manual 53-1003153-01
Chapter 36 Power Center In this chapter • Power center overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Data monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • PoE power on demand . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Schedule PoE power deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • PoE thresholds. . . . . . . . . . . . . . . . . . . . . . . .
36 Data monitoring Data monitoring Power Center enables you to view PoE data for ports and products in both table and chart formats. Viewing PoE data for products To view PoE data for a product, complete the following steps. 1. Select Monitor > Power Center. The Power Center dialog box displays. 2. Select PoE Products from the View list. FIGURE 509 Power Center dialog box 3.
Data monitoring 36 • Allocation % — The percentage of allocated capacity. For example, if the Capacity (W) is 480 W and Allocation (W) is 120 W, then the Allocation percentage is 25. Only displays when the product running agent version 7.2.2 or later. If the product is running a agent version 7.2.1 or earlier, “-“ displays. • Consumption (W) — The power consumed by all powered devices connected to the product in Watts. • Consumption % — The current power consumed as a percentage of allocated power.
36 Data monitoring 4. Review the details in the Port Data list: • • • • • • Product filter — The name of the Product. Port filter — The port identifier. Name filter — The port name. Status filter — The Ethernet status of the port. Values include: Up and Down. State filter — The Ethernet state of the port. Values include: Enabled and Disabled. Admin State filter — The PoE administrative state of the port. Values include: On (enabled) and Off (disabled). • Oper.
Data monitoring 36 4. Use the following filters to sort the Port Data list: • • • • • • • Product filter Port filter Name filter Status filter State filter Admin State filter Oper. State filter NOTE The administrative state must be On for operational state to be On. • • • • • • • • • Allocation (W) filter Consumption (W) filter Consumption % filter Type filter Class filter Priority filter Mfr. filter. Model filter Software filter 5. Click Close to close the Power Center dialog box.
36 Data monitoring FIGURE 511 Attached Devices tab of the Properties dialog box 4. Review the details in the Attached Devices tab: • POE Port Count — The number of PoE ports, that have power devices which support LLDP, connected to the selected device. • • • • • • System name — The system name of the connected device. System capabilities — The system capabilities enabled on the remote system. Enabled capabilties — The system capabilities enabled on the connected device.
Data monitoring 36 • Med Serial number — The serial number on the connected device. • Med Manufacturer — The manufacturer name on the connected device. • Med Model name — The model name on the connected device. 5. Click OK to close the Properties dialog box. 6. Click Close to close the Power Center dialog box. Viewing PoE charts To view a PoE chart, complete the following steps. 1. Select Monitor > Power Center. The Power Center dialog box displays. 2. Select Charts from the View list. 3.
36 Data monitoring FIGURE 513 Product Power Consumption Percentage bar graph Displays the power consumption percentages for all products in a bar graph using the following colors: • • • • • 0 – 20 % = Green 20 – 40 % = Blue 40 – 60 % = Yellow 60 – 80 % = Orange 80 – 100 % = Red Click a bar in the chart to display the products panel and highlight the corresponding products.
Data monitoring 36 FIGURE 515 Product Power Top Allocations stacked bar graph Displays the top five products with the highest power allocation values in Watts in a stacked bar graph. Click a bar in the chart to display the products panel and highlight the corresponding product. FIGURE 516 Product Power Top Consumers stacked bar graph Displays the top five products with the highest power consumption values in Watts in a stacked bar graph.
36 Data monitoring FIGURE 517 PoE Port Utilization pie chart Displays how many ports with PoE turned on and how many with connected devices in a pie chart using the following colors: • PoE Off = Red • PoE On - Unconnected = Blue • PoE On - Connected = Green Click the pie chart to display the products panel and highlight the All Products row. 4. Click Close to close the Power Center dialog box.
PoE power on demand 36 Configuring automatic data refresh To configure automatic refresh the PoE data, complete the following steps. 1. Select Monitor > Power Center. The Power Center dialog box displays. 2. Select the Auto refresh check box to refresh the data automatically at a specified interval. 3. Select the auto refresh interval from the Interval (min) list. Options include: 15, 30, or 60. 4. Click Close to close the Power Center dialog box.
36 PoE power on demand 3. Select a product in the PoE Product list. The selected Product’s PoE ports display in the Port Data list. The PoE operational state (On or Off) for each port displays in the Admin State column. 4. Select one or more ports and click PoE On. 5. Click Yes on the confirmation message. The Deployment Status dialog box displays, which allows you to view the progress and status of the deployment. Click Abort to stop the deployment.
Schedule PoE power deployment 36 6. Click Close to close the Deployment Status dialog box. NOTE Closing the Deployment Status dialog box does not stop deployment. The updated PoE operational state of the selected port displays in the Admin State column. 7. Click Close to close the Power Center dialog box. Schedule PoE power deployment You can define a deployment schedule on a port, product, port group, or product group.
36 Schedule PoE power deployment FIGURE 519 Schedule PoE On/Off dialog box 4. (Ports only) Select a port from the Port list. 5. Enter a name for the schedule in the Schedule Name field. 6. Enter a description for the schedule in the Description field. 7. Select the Enable check box to enable the schedule. 8. Select the PoE On option to enable PoE. 9.
Schedule PoE power deployment 36 Configuring a one-time deployment schedule To configure a one-time schedule, complete the following steps. 1. Select One Time from the Frequency list. 2. Select the time of day you want deployment to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. 3. Click the Date list to select a date from the calendar.
36 Schedule PoE power deployment Configuring a daily deployment schedule To configure a daily deployment schedule, complete the following steps. 1. Select Daily from the Frequency list. 2. Select the time of day you want deployment to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM.
Schedule PoE power deployment 36 Configuring a monthly deployment schedule To configure a monthly schedule, complete the following steps. 1. Select Monthly from the Frequency list. 2. Select the time of day you want deployment to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. 3. Select the day you want deployment to run from the Day of the Month list (1 through 31).
36 Schedule PoE power deployment Scheduling a power down deployment To schedule a power down deployment on one or more PoE-capable ports, complete the following steps. 1. Select Monitor > Power Center. The Power Center dialog box displays. 2. Select PoE Products from the View list. 3. Select a port, product, port group, or product group in the PoE Product list and click Schedule PoE On/Off. The Schedule PoE On/Off dialog box displays. 4. (Ports only) Select a port from the Port list. 5.
Schedule PoE power deployment 36 Updating a power deployment schedule To update a power deployment on one or more PoE-capable ports, complete the following steps. 1. Select Monitor > Power Center. The Power Center dialog box displays. 2. Select PoE Products from the View list. 3. Select a port, product, port group, or product group in the PoE Product list and click Schedule PoE On/Off. The Schedule PoE On/Off dialog box displays. 4. Select the schedule you want to update from the All Schedules list.
36 Schedule PoE power deployment Viewing the configured ports for a power deployment schedule To view all ports to which a power deployment schedule is configured, complete the following steps. 1. Select Monitor > Power Center. The Power Center dialog box displays. 2. Select PoE Products from the View list. 3. Select a port, product, port group, or product group in the PoE Product list and click Schedule PoE On/Off. The Schedule PoE On/Off dialog box displays. 4.
Schedule PoE power deployment • • • • 36 Consumption (W) — The power consumed by the device connected to the port in Watts. Consumption % — The power consumed as a percentage of allocated power. Type — The type of the device connected to the port. Values include: 802.3af and 802.3at. Class — The class of the device connected to the port. Values include: Class 0 through Class 4. • Priority — The priority of the device connected to the port. Values include: invalid, critical, high, low, medium, and other.
36 PoE thresholds PoE thresholds Power Center enables you to define a threshold on a product or port. You cannot define a threshold on a product group or port group. You can define Product thresholds using the following measures: • PoE Capacity — The total PoE capacity of the product in Watts. NOTE PoE capacity requires the product to be running agent version 7.2.2 or later. • PoE Allocation — The amount of allocated power to the product in Watts. • Allocation % — The percentage of available capacity.
PoE thresholds 36 FIGURE 521 Thresholds dialog box 3. Choose one of the following measures: • • • • • • PoE Capacity (The product must be running agent version 7.2.2 or later.) PoE Allocation Allocation % (The product must be running agent version 7.2.2 or later.) PoE Consumption Consumption % Allocations Count (The product must be running agent version 7.2.2 or later.) 4. Select one of the following from the Conditions list: • > • < • == 5.
36 PoE thresholds 7. Select the time period to be monitored for the number of threshold events in the Interval (min) list. The time period starts with the first event and runs its full duration if the event limit is not reached. Interval values, in minutes, include: • 15 • 30 • 60 Click Refresh on the Power Center dialog box to determine if any thresholds are triggered. 8. Click Add. The new threshold displays in the All Thresholds list. 9.
PoE thresholds 36 FIGURE 522 Thresholds dialog box 3. Choose one of the following measures: • Port allocation • Port consumption • Port consumption % 4. Select one of the following from the Conditions list: • > • < • == 5. Enter the number of events that must be generated to trigger the threshold event in the Value field. The value should not exceed the capacity of the product. If you select a percentage measure, the value should be less than or equal to 100. 6.
36 PoE thresholds 7. Select the time period to be monitored for the number of threshold events in the Interval (min) list. The time period starts with the first event and runs its full duration if the event limit is not reached. Interval values, in minutes, include: • 15 • 30 • 60 8. Click Add. The new threshold displays in the All Thresholds list. 9. Select the Enabled check box of the new threshold in the All Thresholds list to enable the threshold on the product. 10.
PoE thresholds 36 Updating a PoE threshold To update a PoE threshold, complete the following steps. 1. Select Monitor > Power Center. The Power Center dialog box displays. 2. Select a product in the PoE Product list and click Thresholds. The Thresholds dialog box displays with the thresholds defined for that product. 3. Select the threshold you want to edit in the All Thresholds list. The selected threshold displays in the Thresholds Editor area. 4.
36 PoE thresholds 12. Click Refresh on the Power Center dialog box to determine if any thresholds are triggered. 13. Click Close to close the Power Center dialog box. Enabling PoE thresholds To enable PoE thresholds, complete the following steps. 1. Select Monitor > Power Center. The Power Center dialog box displays. 2. Select a product in the PoE Product list and click Thresholds. The Thresholds dialog box displays with the thresholds defined for that product. 3.
Viewing PoE performance 36 Deleting PoE thresholds 1. Select Monitor > Power Center. The Power Center dialog box displays. 2. Select a product in the PoE Product list and click Thresholds. The Thresholds dialog box displays with the thresholds defined for that product. 3. Select the threshold you want to delete and click Delete. Select more than one threshold to delete by pressing Ctrl and clicking each threshold you want to delete. 4. Click Close to close the Thresholds dialog box. 5.
36 Viewing PoE performance FIGURE 523 Real Time Power Graphs/Tables dialog box 4. Select the measures you want to include and click the right arrow button to display it on the Data Monitoring tab. Product power measures include the following: • Allocation (W) • Allocation % 5. Click the Data Monitoring tab to view a performance monitoring graph or table. • Click the Graph option to view a performance graph. The legend under the graph shows what data each color represents.
Viewing PoE performance 36 6. Click the Collection Status Summary tab to view the following information: The Collection Status Summary tab provides a high level overview of all defined collectors. The information is displayed in the following columns: • Product - Shows the product name and IP address. There maybe multiple instances of the product name for each collectible assigned to the product. • Port - The port name when a port is selected.
36 Viewing PoE performance Monitoring real time power performance on ports To view real time power performance graphs or tables, complete the following steps. 1. Select Monitor > Power Center. The Power Center dialog box displays. 2. Select a a port from the Port Data list. 3. Select Real Time Power Graphs/Tables from the Graphs/Tables list. The Real Time Power Graphs/Tables dialog box displays. FIGURE 524 Real Time Power Graphs/Tables dialog box 4.
Viewing PoE performance 36 5. Click the Data Monitoring tab to view a performance monitoring graph or table. • Click the Graph option to view a performance graph. The legend under the graph shows what data each color represents. To configure graph options, refer to “Configuring the performance graph” on page 1119. • Click the Table option to view a performance table. The first column displays the time of the collection. The remaining columns display the value of each collectible at the specified time.
36 1228 Viewing PoE performance Brocade Network Advisor IP User Manual 53-1003153-01
Chapter 37 Policy Monitor In this chapter • Policy monitor overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Preconfigured configuration policy managers. . . . . . . . . . . . . . . . . . . . . • Viewing configuration policy manager status . . . . . . . . . . . . . . . . . . . . . • Viewing existing configuration policy managers . . . . . . . . . . . . . . . . . . . • Adding a configuration policy manager . . . . . . . . . . . . . . . . . . . . . . . . . .
37 Policy monitor overview Fabric policy monitors Fabric policy monitors enable you to set the following policy monitors on Ethernet fabrics (refer to “Adding a configuration policy manager” on page 1238): • Check zoning status — This fabric policy monitor enables you to determine if zoning is enabled or disabled on the fabric. Zoning plays a key role in the management of device communication. When you enforce zoning, devices not in the same zone cannot communicate.
Policy monitor overview 37 Some devices can function as both initiator and target. If the application finds this type of device as one of the active zone members, this device port is treated as both initiator and target: - Target (storage port) — The application counts the number of initiator ports zoned to this storage port. - Initiator — The application counts this device as an initiator port for other storage ports in the same zone.
37 Policy monitor overview • Check for HTTPS (secure HTTP) configuration — This switch and router configuration policy manager enables you to check each target to see if HTTPS is active for device data transmission. NOTE Not supported on Network OS products and the following IronWare products: Ethernet Core routers, Ethernet Carrier Routers, Ethernet Edge router, and Data Center switch, as well as the 6650 Ethernet switch, router, and L3 router.
Policy monitor overview 37 Rule Violation Fix — If the configuration policy manager report shows a violation, enable SSH on the device. Disable Telnet settings on the device, if enabled. • Check for SNMPv3 (secure SNMP) configuration — This switch and router configuration policy manager enables you to check each target to see if SNMPv3 is active for device data transmission and SNMPv1 and SNMPv2 are not configured. NOTE For this check to pass, you must discover the products using SNMPv3 credentials.
37 Policy monitor overview Make sure to configure the host port mapping. (refer to “Host port mapping overview” on page 703) - Host adapter discovery with 2.1 or later driver for host to unmanaged fabric connections (refer to “Host discovery” on page 97) Make sure there are Brocade HBAs on the host. - Fabric plus Host adapter discovery with 2.1 or earlier driver (refer to “Host discovery” on page 97) Make sure there are Brocade HBAs on the host.
Preconfigured configuration policy managers 37 Rule Violation Fix — If the configuration policy manager report shows a violation, the Administrator can add redundant connections (either a host to attached fabrics or attached fabrics to a target LUN or more inter-fabric routes) to establish a complete path from host to target LUN. Management configuration policy manager The management configuration policy manager enables you to set a configuration policy manager on the Management application.
37 Viewing configuration policy manager status Viewing configuration policy manager status You can view configuration policy manager status from the main Management application window or from the Configuration Policy Manager dialog box. The Management application enables you to view the configuration policy manager status at a glance by providing a configuration policy manager status icon on the status bar.
Viewing existing configuration policy managers 37 FIGURE 525 Configuration Policy Manager dialog box 2. Review the configuration policy manager details: • Name — The user-defined name of the policy. • Description — A description of the policy. • Alert — Select to receive e-mail alerts and have the configuration policy manager status icon display in the status bar when the monitor fails or partially fails.
37 Adding a configuration policy manager 8. To view the report history for all configuration policy managers, click History (refer to “Viewing historical reports for a configuration policy manager” on page 1271). 9. To view the report history for a selected configuration policy manager, select a configuration policy manager and click History (refer to “Viewing historical reports for a configuration policy manager” on page 1271). 10. Click Close on the Configuration Policy Manager dialog box.
Adding a configuration policy manager a. 37 Select the Check zoning status check box to determine if zoning is enabled or disabled on the fabric. • Select the Enabled option to determine if zoning is enabled. • Select the Disabled option to determine if zoning is disabled. For more information about this check and a fix for rule violations, refer to “Fabric policy monitors” on page 1230. b.
37 Adding a configuration policy manager FIGURE 527 Add Configuration Policy Manager dialog box, Switch/Router Checks tab 1240 Brocade Network Advisor IP User Manual 53-1003153-01
Adding a configuration policy manager a. 37 Select one or more of the following checks in the Available Checks list to include them in the configuration policy manager: For more information about these checks and fixes for rule violations, refer to “Switch and router configuration policy managers” on page 1231.
37 Adding a configuration policy manager FIGURE 528 Add Configuration Policy Manager dialog box, Hosts Checks tab a. Select the Check for redundant connections to attached fabrics check box to determine if there are at least the minimum number of configured physical connections between the host and the attached fabric. The default is 2. For more information about this check and a fix for rule violations, refer to “Host configuration policy managers” on page 1233. b.
Configuration policy manager scheduling 37 FIGURE 529 Add Configuration Policy Manager dialog box, Management Checks tab a. Select the Management Checks tab. b. Select the Check to see if the server backup is enabled and working check box to determine the following configurations: • Backup enabled for the Management application server. • Backup output directory is accessible and writable. This policy only applies to scheduled backup, not manual (on demand) backup.
37 Configuration policy manager scheduling Configuring an hourly configuration policy manager schedule To configure an hourly schedule, complete the following steps. 1. Select Hourly from the Frequency list. 2. Select the minute past the hour you want deployment to run from the Minutes past the hour list. Where the minute value is from 00 through 59. 3. Click OK on the Schedule Properties dialog box.
Editing a configuration policy manager 37 Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. 3. Select the day you want deployment to run from the Day of the Month list (1 through 31). 4. Click OK on the Schedule Properties dialog box. To finish configuring the configuration policy manager, return to step 6 of “Adding a configuration policy manager” on page 1238.
37 Configuration rules Configuration rules A configuration rule is a logical expression built with configuration conditions and blocks. You can use configuration rules to perform a configuration compliance check against a baseline (such as a product’s backup configuration file). Viewing a predefined configuration rule You can view detailed information about predefined configuration rules on the Add Monitor or Edit Monitor dialog box. 1. Select the predefined configuration rule you want to view.
Configuration rules TABLE 102 37 Port Profile Interface Rule expressions AND/OR ( Block/Condition Name ) Details - Description/Condition/Configuration Start: Network OS Ten Gigabit Ethernet Interfaces Processes all 10 Gigabit Ethernet interface on a Network OS device. interface TenGigabitEthernet .* Network OS Interface Port Profiled Checks whether the interface port profiled. This condition should be used with in an interface block.
37 Configuration rules FIGURE 530 Add Configuration Rule dialog box This Add Configuration Rule dialog box contains the following fields and components: • Name — A unique name for the rule. The name cannot be over 128 characters. The only special characters allowed are an underscore (_) or space. • Description — A description for the rule. The description cannot be over 1024 ASCII characters. • Library list — Contains a list of predefined and user-defined conditions or blocks.
Configuration rules 37 • Find > (right arrow) button — To find a condition or block in the Selected Conditions/Blocks list, select a condition or block in the Library list and click. The condition or block is highlighted in the Selected Conditions/Blocks list. • Find < (left arrow) button — To find a condition or block in the Library list, select a condition or block in the Selected Conditions/Blocks list and click. The condition or block is highlighted in the Library list.
37 Configuration rules displays with an AND connector (except the first item) in the list of conditions or blocks. If you add one or more conditions to a block, each condition displays with an OR connector (except the first condition) in the block. Fields containing a green triangle ( ) in the lower right corner are editable. ( — Enter an open parenthesis to start a group (a set of conditions and blocks). You can create up to three groups. You can nest groups.
Configuration rules 7. 37 Select one or more conditions and blocks in the Library list and click the right arrow button to add the conditions and blocks to the rule. The Library list contains a list of predefined and user-defined conditions or blocks. You cannot modify or delete predefined conditions or blocks. For more information, about predefined conditions and blocks, refer to “Predefined conditions” on page 1258 and “Predefined blocks” on page 1264.
37 Configuration rules 15. To remove a condition or block from a rule, select one or more conditions and blocks in the Selected Conditions/Blocks list and click the left arrow button. 16. Click OK on the Add Configuration Rule dialog box. 17. Click OK on the Add Monitor dialog box. The updated configuration policy manager displays in the Monitors table of the Configuration Policy Manager dialog box. 18. Click Close on the Configuration Policy Manager dialog box.
Configuration rules 37 The Edit Monitor dialog box displays. 3. Click the Switch/Router Checks tab. 4. Select the configuration rule you want to edit in the Available Checks list and click Edit. The Edit Configuration Rule dialog box displays. 5. Change the name for the rule in the Name field. The name cannot be over 128 characters. The only special characters allowed are an underscore (_) or space. 6. Change the description for the rule in the Description field.
37 Configuration rules Deleting a configuration rule You can only delete user-defined configuration rules. 1. From the Add Monitor or Edit Monitor dialog box, select one or more user-defined configuration rules you want to delete. 2. Click Delete. 3. Click Yes on the confirmation message. 4. Click OK on the Add Monitor or Edit Monitor dialog box. Viewing predefined configuration conditions 1. Select Monitor > Configuration Policy Manager. The Configuration Policy Manager dialog box displays. 2.
Configuration rules 37 Adding a configuration condition 1. Select Monitor > Configuration Policy Manager. The Configuration Policy Manager dialog box displays. 2. Click Add. The Add Monitor dialog box displays. 3. Click the Switch/Router Checks tab. 4. Select Add > Configuration Rule. The Add Configuration Rule dialog box displays. 5. Select Add > Condition. The Add Condition dialog box displays (Figure 531). FIGURE 531 Add Condition dialog box 6. Enter a user-defined name for the rule in the Name field.
37 Configuration rules The contents of the backup configuration file display in the CLI Configuration File text box. Select the lines you want to use in the CLI Configuration File text box and click the right arrow to move the lines to the Configuration text box. 9. Check the Use regular expressions check box to enter a regular expression in the Configuration text box. 10.
Configuration rules 37 Duplicating a configuration condition Enables you to create a new condition based on a predefined or user-defined condition. 1. Select Monitor > Configuration Policy Manager. The Configuration Policy Manager dialog box displays. 2. Click Edit. The Edit Monitor dialog box displays. 3. Click the Switch/Router Checks tab. 4. Select the configuration rule you want to edit in the Available Checks list and click Edit. The Edit Configuration Rule dialog box displays. 5.
37 Configuration rules 5. Select the user-defined condition you want to edit and click Edit. The Edit Condition dialog box displays. 6. Change the user-defined name for the rule in the Name field, if necessary. The name must be unique. The name cannot be over 128 characters. The only special character allowed is an underscore (_). 7. Change the description of the rule in the Description field, if necessary. The description cannot be over 1, 024 ASCII characters. 8.
Configuration rules TABLE 103 37 Predefined conditions (Continued) Name Description Use Matches/ regular Not Matches expression Configuration Lines in exact order Network OS Interface Switchport mode check Checks whether the Network OS interface is configured to be a switchport or not. If not configured, the test will fail. No Matches switchport No Network OS Interface Access mode check Checks whether the interface is configured to be in access mode.
37 Configuration rules TABLE 103 Predefined conditions (Continued) Name Description Use Matches/ regular Not Matches expression Configuration Lines in exact order IronWare OS SSH Client Allowed check Checks to see if the SSH client is allowed or not. Yes Matches ip ssh +client.* No RFS with Configuration Auto Install Disabled Checks whether auto-installation of the configuration is disabled in a user-specified profile. This condition should be used inside the profile block.
Configuration rules 37 Viewing a predefined configuration block A configuration block is a continuous group of lines within a configuration file within which conditions will be checked. The block is defined by the line that starts the block and the line that ends the block. 1. Select Monitor > Configuration Policy Manager. The Configuration Policy Manager dialog box displays. 2. Click Add. The Add Monitor dialog box displays. 3. Click the Switch/Router Checks tab. 4. Select Add > Configuration Rule.
37 Configuration rules FIGURE 532 Add Block dialog box 6. Enter a user-defined name for the block in the Name field. The name must be unique. The name cannot be over 128 characters. The only special character allowed is an underscore (_). 7. Enter a description of the block in the Description field. The description cannot be over 1024 ASCII characters. 8. Select the Use regular expression check box to use a regular expression in the Block Start field.
Configuration rules 37 The Edit Monitor dialog box displays. 3. Select the Switch/Router Checks tab. 4. Select the configuration rule you want to edit in the Available Checks list and click Edit. The Edit Configuration Rule dialog box displays. 5. Select the predefined or user-defined block you want to duplicate and click Add > Block. The Add Block dialog box displays. 6. Change the user-defined name for the rule in the Name field, if necessary. The name must be unique.
37 Configuration rules The description cannot be over 1, 024 ASCII characters. 8. To edit a configuration block, repeat step 8 through step 10 of “Adding a configuration block” on page 1261. 9. Click OK on the Edit Block dialog box. 10. Click OK on the Edit Configuration Rule dialog box. 11. Click OK on the Edit Monitor dialog box. The updated configuration policy manager displays in the Monitors table of the Configuration Policy Manager dialog box. 12.
37 Configuration rules TABLE 104 Predefined blocks (Continued) Name Description Use Block Start regular expression Block End RFS AAA Policies Processes all the AAA policies available for the RFS device. Yes aaa-policy.* ! RFS Profile Processes all the profiles available for RFS device. Yes profile.
37 Running a configuration policy manager Running a configuration policy manager Before you run a configuration policy manager, make sure your configuration policy managers are valid. Valid configuration policy managers must have at least one policy selected with one or more targets. Management checks do not require a target. To run an existing configuration policy manager, complete the following steps. 1. Select Monitor > Configuration Policy Manager. The Configuration Policy Manager dialog box displays.
Viewing a configuration policy manager report 37 Viewing a configuration policy manager report NOTE You must run the configuration policy manager at least once before you can view a report. To view an existing configuration policy manager report, complete the following steps. 1. Select Monitor > Configuration Policy Manager. The Configuration Policy Manager dialog box displays. 2. Select the policy for which you want to view a report in the Monitors list. 3. Click Report.
37 Viewing a configuration policy manager report • Run Time — Date and time the report was triggered. • Individual_Policy_Checks — Name of the policy check and a table displaying the results of the check. The following information is included in the report data for each policy check: Management Check — Displays the status of the management check. The management check provides the following information: Name — Name of the management check. Status — Result of the check and reason for failure if known.
Viewing a configuration policy manager report Switch — Check if the product is configured to send events to this server. Switch - Check for SSH (secure Telnet) configuration. This check provides the following additional detail for this check: Telnet Status — Whether Telnet is enabled or disabled on the product. SNMPv3 Status — Whether SNMPv3 is enabled or disabled on the product. SNMP Status — Whether SNMP is enabled or disabled on the product.
37 Viewing historical reports for all configuration policy managers 6. Click Close on the Configuration Policy Manager dialog box. Exporting a configuration policy manager report 1. Click Export. The File Download dialog box displays. 2. Click Save. The Save dialog box displays. 3. Browse to the file location where you want to save the report and click Save. 4. Click the close button (X) on the Policy_Name - Configuration Policy Manager Report browser window.
Viewing historical reports for a configuration policy manager 37 Viewing historical reports for a configuration policy manager 1. Select Monitor > Configuration Policy Manager. The Configuration Policy Manager dialog box displays. 2. Select the policy for which you want to view the report history and click History. The Report History dialog box displays. The Report History dialog box displays up to 10 reports for the selected configuration policy manager.
37 1272 Viewing historical reports for a configuration policy manager Brocade Network Advisor IP User Manual 53-1003153-01
Chapter 38 Fault Management In this chapter • Fault management overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Event notification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Defining filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • SNMP traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • SNMP informs . . . . . . . . . . .
38 Event notification Restrictions The following items affect Fault Management operation. Supported IP address types The Management application receives traps and syslog messages for physical IP addresses only. Event Purging The default maximum number of days that historical events are stored is 365. You can select a different default (from 1 to 365 ) in the Options dialog box under Event Storage. Event Archiving The default number of days that purged events are archived is 30.
Event notification 38 2. Select the Enable E-mail Event Notification check box to enable the application to send e-mail messages in case of event notifications. 3. Enter the IP address or the name of the SMTP mail server that the server can use to send the e-mail notifications in the E-mail Server field. The Management application accepts IP addresses in IPv4 and IPv6 formats. The IPv4 format is valid when the operating system has IPv4 mode only or dual stack mode.
38 Defining filters Defining filters The Define Filter dialog box, shown in Figure 535, allows you to define event filters by product, event category, and severity. You can define event filters on SAN products, IP products, or hosts. Setting up basic event filtering To set up basic event filtering on the selected events for a user, complete the following steps. 1. Select Server > Users. The Users dialog box displays. 2. Select a user in the Users list and click Edit. The Edit User dialog box displays. 3.
Defining filters 38 • When selected (the default), all products, even newly-added products, are added to the Selected Products to be displayed list. • If the check box is cleared, only the products listed in the Selected Products to be displayed list are shown in the Master Log and all newly-added products are added to the Available Products list. You can include or exclude individual VCS cluster and the node members while defining Master Log filter. 7.
38 Defining filters FIGURE 536 Define Filter dialog box - Advanced tab 5. Select the Start Date check box to display only the events that were logged after the specified start date. The default start date and time is the current date and time. 6. To include events in the event filter, complete the following steps. a. Select the event type you want to include from the Event Category list. All event types are listed in alphabetical order. b.
SNMP traps a. 38 Select the event type you want to remove from the Event Category list. All event types are listed in alphabetical order. b. Select the event column for the event from the Event Column list. All event columns are listed in alphabetical order. c. Enter all or part of the event type value in the Value Contains field. d. Click the right arrow button to move the event type to the Additional Filters - Exclude these Events list. e.
38 SNMP traps Adding a trap recipient to one or more switches The SNMP Trap Recipients dialog box allows you to register any recipient as a trap recipient on selected products. You can register different recipients for different products. NOTE You can register and unregister other recipient servers on the Fabric OS switches on a per-switch basis. For IP products, you can perform registration only at the switch level. To add a trap recipient to one or more switches, complete the following steps. 1.
SNMP traps 7. 38 Click the View Recipients button to list the recipients that correspond to a selected fabric or product from the Available list. The Trap Recipients - Fabric dialog box or the Trap Recipients - IP address dialog box (depending on which product you selected) displays a list of configured recipients. 8. Click OK. The Management application registers the recipient IP address as an SNMP trap recipient.
38 SNMP traps FIGURE 538 SNMP Trap Forwarding dialog box Adding a trap destination The Add Trap Destination dialog box allows you to configure destinations for forwarding SNMP traps. To add a trap destination, complete the following steps. 1. Select Monitor > SNMP Setup > Trap Forwarding. The SNMP Trap Forwarding dialog box, shown in Figure 538, displays. 2. Select the Enable trap forwarding check box.
SNMP traps 38 3. Click Add in the Destinations area of the SNMP Trap Forwarding dialog box. The Add Trap Destination dialog box, shown in Figure 539, displays. FIGURE 539 Add Trap Destination dialog box 4. Enter a general description of the trap destination in the Description field. 5. Enter the IP address of the trap destination in the IP Address field. This is a mandatory field. IPv4 and IPv6 addresses are accepted, but a DNS name is not accepted. 6.
38 SNMP traps 2. Click Add in the Trap Filters area of the SNMP Trap Forwarding dialog box. The Add Trap Filter dialog box, shown in Figure 540, displays. FIGURE 540 Add Trap Filter dialog box 3. Enter a unique name for the trap filter in the Filter Name field. 4. Enter a general description of the trap filter in the Description field. 5. Select the Forward Application Messages check box to forward application events. 6. Select the Forward pseudo events check box to forward pseudo events. 7.
SNMP traps 38 • Debug Traps with the selected severity and those with higher severity levels are forwarded. For example, by default, Critical severity is selected. Therefore, traps with Critical, Alert, and Emergency severity levels are forwarded. To have all traps forwarded, select Debug, the lowest severity level. 8. Select the SAN, IP, or Hosts tab. Depending on the tab selected, the products available to which you can add a trap filter display in the Available Products list. 9.
38 SNMP traps To access the Event Reception dialog box, select Monitor > SNMP > Event Reception. The Event Reception dialog box, shown in Figure 541, displays. FIGURE 541 Event Reception dialog box - Trap Credentials tab By default, the Management application receives SNMP v1 and v2c traps from IronWare OS and Network OS IP products that have any SNMP community strings.
SNMP traps TABLE 105 38 SNMP security and authentication SNMP credential type Privacy protocol Authentication Result v1 No authentication No privacy protocol Community string Uses a community string to match for authentication. v2c No authentication No privacy protocol Community string Uses a community string to match for authentication. v3 No authentication No privacy protocol User name Uses a user name to match for authentication.
38 SNMP traps 5. Select an authentication protocol from the Auth Protocol list. You can select -None-, HMAC-MD5, or HMAC_SHA. HMAC_MD5 is the default. If you select no authentication, the Management application uses the user name to match for authentication. 6. Type a password in the Auth Password field and re-type the password in the Auth Confirm Password field. 7. Select a privacy protocol from the Priv Protocol list. You can select -None-, CBC_DES, or CFB_AES_128.
SNMP traps 38 To add the MIB file that contains the trap you want to register to mibs_to_compile.txt, complete the following steps. 1. Go to \conf\mibs\ (Windows) or /conf/mibs/ (UNIX) directory and copy the MIB file into that directory. You may want to copy the MIB into a subdirectory of that directory. 2. In the \conf\mibs\ (Windows) or /conf/mibs/ (UNIX) directory, search for the mibs_to_compile.txt file. 3.
38 SNMP traps Registering traps Traps must be registered in the Event Reception dialog box to make them available. To register traps, complete the following steps. 1. Select Monitor > SNMP Setup > Event Reception. 2. Click the Trap Configuration tab. The Trap Configuration tab of the Event Reception dialog box, shown in Figure 544, displays. The Registered and Not Registered buttons at the top of the Traps tree serves as a filter for the traps.
SNMP traps 38 Trap details supply the following information: • The name of the MIB to which the trap belongs • Information about the trap • Any variable bindings (varbinds) that the trap uses. Information about the varbind, its name, OID, and type, is displayed • Recommended action specified by the user 5. Enter the following information: a. Select the severity level you want to assign to the trap from the Severity list. If you do not select a severity, it defaults to Emergency. b.
38 SNMP informs The Trap tree displays the MIBs that contain the registered traps. 3. Expand a MIB folder to display the traps that have been registered for that MIB. 4. Select a trap to display its current definition. You can change the severity, message, or alias of the trap. 5. When you have finished, click OK or Apply to accept your entries. If you modified a default trap, its status changes from Registered - Default to Registered Customized.
Syslogs 38 The products display in the SNMP Informs Capable Products list, where you can determine if the product’s status is enabled or disabled. 3. Select a product in the SNMP Informs Capable Products list and click the appropriate Action button, depending on whether you want to enable or disable SNMP informs for that product. 4. Click OK. Syslogs Use the Options dialog box to automatically register the Management application server as the syslog recipient on all managed SAN and IP products.
38 Syslogs FIGURE 545 Syslog Recipients dialog box 2. Select Add from the Action list. 3. Enter the IP address of the syslog port (the recipient server) in the Recipient IP Address field. This is a mandatory field. IPv4 addresses are accepted, but a DNS name is not accepted. 4. Enter the syslog port of the recipient in the Recipient Port field. Valid numeric values range from 1 through 65535. The default value is 514. NOTE For IronWare products, a non-default port can be registered.
Syslogs 38 The Management application removes the recipient from the managed switches. Syslog forwarding The Syslog Forwarding dialog box enables the Management application to forward syslog events to a destination on another host. You can use the Syslog Forwarding feature to set up filters to determine which syslog events will be forwarded. Adding a syslog forwarding destination The Add Syslog Destination dialog box allows you to configure destinations for forwarding syslog events.
38 Syslogs FIGURE 547 Add Syslog Destination dialog box 4. Enter a general description of the syslog destination in the Description field. 5. Enter the IP address of the syslog destination in the IP Address field. This is a mandatory field. IPv4 and IPv6 addresses are accepted, but a DNS name is not accepted. 6. Enter the syslog listening port of the recipient in the Port # field. This is a mandatory field. Valid numeric values range from 1 through 65535. The default is 514. 7.
Syslogs 38 FIGURE 548 Add Syslog Filter dialog box 4. Enter a unique name for the syslog filter in the Filter Name field. 5. Enter a general description of the syslog filter in the Description field. 6. (Optional) For additional filtering, enter a text string using from 1 through 512 characters or wild card symbols in the Regular Expression field. The regular expression is used to describe a pattern in text.
38 Event action definitions 10. Select the product from the Available Products list and click the right arrow button to move it to the Selected Products list. 11. Click OK. Snort message forwarding Snort is a third-party tool that monitors network traffic in real time. When Snort detects dangerous payloads or other abnormal behavior, it sends an alert to the syslog in real time.
Event action definitions 38 FIGURE 549 Event Actions dialog box 2. Click Add to display the Identification pane of the Add Event Action dialog box. 3. Enter a name and description for the event action and select the Enabled check box. 4. Click Next to advance to the Events pane. Selecting an event for an event action To select an event for an event action, complete the following steps. 1. Select Monitor > Event Processing > Event Actions. The Event Actions dialog box displays. 2.
38 Event action definitions FIGURE 550 Add Event Action dialog box - Events pane 4. Select one of the following event types from the Show list: • • • • • Traps (default) Application Events Pseudo Events Custom Events Snort® Message Depending on what the event type you select, a box listing the available events or pseudo events displays. 5.
Event action definitions 38 9. If you selected Custom Events in step 4, click Next to accept the defaults; otherwise, select the Event Category, Severity, Message ID, and Description Contains, as required. 10. If you selected Snort® Message in step 4, select the Snort® messages in the left table and use the arrow button to move them to the right. To import Snort® rules, click the Import Snort® Rules button. 11.
38 Event action definitions • • • • • • • < – Less than > – Greater than >= – Greater than or equal to <= – Less than or equal to In – Matches collection Not_in – Does not match collection ~ – Arbitrary Unicode regular expression 5. Enter the value of the varbind. The value you enter must conform to the data type required by the varbind. For example, if the varbind expects an integer and you enter a text string, your entry will be rejected.
Event action definitions 38 2. Click Next to advance to the Sources pane. 3. Click the Provide the IP Address / Node WWN / Name of the source button if you want to manually enter the IP address, the world wide name (WWN), or the name of the source in the IP Address field. 4. Click the Select from the available list of sources button as an alternative to manually entering the IP address, WWN, or name of the source.
38 Event action definitions Configuring event action policies The Policy pane of the Add Event Action dialog box, shown in Figure 553, allows you to define the frequency of the event, enter a message for an event that will be displayed in the event log, and specify the event severity. FIGURE 553 Policy pane of the Add Event Action dialog box To configure the event action policies, complete the following steps. 1.
Event action definitions 38 4. Indicate how often the policy is to be reset. You can choose one of the following options: • Reset immediately - Repeats the policy as soon as the specified action has been applied. • Wait until ____ seconds or minutes - If this parameter is selected, the policy will not be applied to the product for the specified duration of time. Enter the duration in minutes or hours.
38 Event action definitions Editing event actions The Action Group - Actions pane of the Edit Event Action dialog box, shown in Figure 554, defines what action the Management application takes when the criteria are met. FIGURE 554 Action Group - Actions pane of the Edit Event Action dialog box To configure the policies for the event action, complete the following steps. 1.
Event action definitions 38 NOTE Auto Acknowledge is enabled only when Take actions for the selected events when they occur is selected in the Policy step of the Event Actions Wizard. If you edit an Event Action that has Auto Acknowledge selected and change this option in the Policy step to Time-bound or Frequency-bound, you will be required to confirm your choice. 3. Select the Enable Troubleshooting check box to suppress events based on user-entered criteria.
38 Event action definitions • Has Parameters - Displays Yes if the CLI configuration has parameters that require values to be entered before it can be deployed, and displays No if no parameter needs to be defined. • The Parameters list lists the parameters that need to be defined in the configuration. • The Parameter column displays the parameter and its variables in the CLI configuration. • The Source column lists the appropriate SNMP attributes for the parameters.
Event action definitions 38 • None — Event Processor only reports the occurrence of the product. • Find Device — Find the product with the IP address in the attribute and deploy the payload to that product. • Find Intruder MAC — Find the product with the IP address in the attribute that matches the intruder MAC address and deploy the CLI configuration to that product. • Find Port — Find the port on a product with the IP address in the attribute and deploy the CLI configuration to that port.
38 Event action definitions FIGURE 556 Special Events dialog box 2. Select the Acknowledged check box that corresponds to the special event you want to acknowledge. If an event is marked as acknowledged either in the Special Events dialog box or the Master Log, the event is acknowledged in both places. 3. To view all acknowledged special events, select the Show Acknowledged check box in the upper right corner of the dialog box. This check box is unselected by default.
Event action definitions 38 Configuring event action e-mail settings The Action Group - E-Mail Settings pane of the Add Event Action dialog box, shown in Figure 557, allows you to select e-mail recipients from a list, add new e-mail recipients, and compose e-mail messages. FIGURE 557 Action Group - E-Mail Settings pane of the Add Event Action dialog box To configure the e-mail settings for the event action, complete the following steps. 1.
38 Event action definitions 4. If you want a prologue to be inserted at the beginning of the e-mail message, enter up to 255 characters in the Body Prologue field. The event action message follows the prologue. 5. If you want to customize and include dynamic content in the body of the e-mail message, click Configure.
Event action definitions 38 4. Enter a new name for the definition. 5. Change the description of the definition, if needed. You can perform this action in any of the panes of the Add Event Action dialog box. 6. Click Finish to save the new definition. Modifying an event action definition CAUTION Use caution when you modify an event action. Saving changes to an event action definition resets the runtime information for the events in the definition.
38 Event action definitions FIGURE 558 Events pane of the Add Event Action dialog box 2. Click the Import Snort® Rule button. The Import Snort® Rule File dialog box displays, shown in Figure 559. FIGURE 559 Import Snort® Rule File dialog box 3. Enter the complete path of the Snort rule file located on the Syslog server. 4. Click OK to import the Snort rules. 5. While still in the Add Event Action dialog box, continue to click Next until you advance to the Action Group - Actions pane. 6.
Pseudo events 38 8. Continue to advance through the Add Event Action dialog box. The Summary pane of the Edit Event Action dialog box displays an overview of the e-mail configuration you are creating. 9. Review your entries and take one of the following actions: - Click Finish to approve the configuration. Click Previous to return to the Action Group - E-Mail Settings pane of the dialog box. Click Cancel to cancel the operation.
38 Pseudo events 2. Click Add. 3. The Identification pane of the Add Pseudo Event dialog box displays. 4. Type a unique name for the pseudo event. Duplicate names are not allowed. 5. Select the Enabled check box to enable the pseudo event or clear the check box to disable the pseudo event. 6. Click Next. The Policy pane of the Add Pseudo Event dialog box, shown in Figure 561, displays.
Pseudo events 38 2. Click the Resolve button to create a resolve policy, and then enter the duration of time the Event Processor waits before generating the pseudo event. Specify the resolve time in minutes or seconds. When a down event occurs, a resolving policy waits for a specified duration to see if the event remains in that state by checking if an up event occurs. If an up event occurs, a resolving pseudo event is generated by the Event Processor.
38 Pseudo events FIGURE 562 Events pane of the Add Pseudo Event dialog box 3. From the Available Traps list, select the trap for the down state of a product or interface. By default, all the traps known to the Management application are grouped under the , Network OS, FastIron/NetIron, and Wireless root nodes and are included in the Available Traps list, which is a list of all traps that are available based on the MIB and filter criteria. 4.
Pseudo events 38 3. Click the Duplicate button. The Pseudo Events dialog box, shown in Figure 560, displays. The name of the event action is the name of the selected action with the word “copy” appended. For example, “Event1” becomes “Event1 copy”. 4. Enter a new name for the pseudo event definition. 5. Make the changes you want to make to the definition. Refer to “Creating pseudo event definitions” on page 1315 for details. 6. Click Finish to save your definition.
38 Pseudo events 1. Select Monitor > Event Processing > Pseudo Events. The Pseudo Events dialog box displays. 2. Select one or more pseudo events and click Actions. The Source pane of the Add Event Action dialog box displays. The field values of the Identification pane and the Events pane will be automatically populated based on the selected pseudo events. For more information about adding an event action, refer to “Creating an event action definition” on page 1298.
Pseudo events • • • • • 38 “Creating an event action definition” on page 1298 “Creating a new event action definition by copying an existing definition” on page 1312 “Creating an event action with a pseudo event on the escalation policy” on page 1321 “Creating an event action with a pseudo event on the resolving policy” on page 1323 “Creating an event action with a pseudo event on the flapping policy” on page 1324 Creating an event action with a pseudo event on the escalation policy To create an event a
38 Pseudo events NOTE Make sure the user you select has an e-mail address defined in a user account. 14. Add additional e-mail recipient addresses in the Other Recipients field. Separate multiple e-mail addresses with a semicolon. 15. If you want the e-mail message for the alert to display a description on the subject line, enter the text in the Subject Line field. 16. If you want a prologue to be inserted at the beginning of the e-mail message, enter up to 255 characters in the Body Prologue field.
Pseudo events 7. 38 Select a critical event, such as LinkDown, and click the right arrow button to move it to the Selected Down Trap list. 8. Select a remediation event, such as LinkUp, and click the right arrow button to move it to the Selected Up Trap list. 9. Click Finish to complete the pseudo event configuration. Now, you must create a new event action definition using the Add Event Actions dialog box.
38 Pseudo events For more information about adding an event action, refer to “Event action definitions” on page 1298. Adding a pseudo event on the flapping policy The flapping policy checks to see if the event consistently transitions between two opposite states during a specified length of time. If it does, then the specified action in the definition is performed.
Pseudo events 38 4. Click Next to display the Events pane. By default, the Events pane of the Add Event Action dialog box displays. 5. Select the Pseudo Events event type from the Show list. The available pseudo events display. 6. Select the pseudo event you created and click Next. The Sources pane of the Add Event Action dialog box displays. 7. Select the source that you will use to monitor this event from the Selected Sources list. 8.
38 Event custom reports - Find Intruder MAC: Find the product with the IP address in the attribute that matches the intruder MAC address and deploy the CLI configuration to that product. - None: The Event Processor only reports occurrence of the products. 13. Select the Deploy Product Configuration check box if you want to deploy a payload to the products if the policy criteria have been met. 14.
Event custom reports 38 • The Report Definitions tab lists all the previously created report definition objects. This tab enables you to add a new definition or modify, delete, or duplicate existing report definitions. • The Schedules tab lists all the previously created schedules on the report definition. This tab enables you to add a new schedule or modify, delete, or duplicate existing schedules. Users cannot view, edit, or share a schedule that was created by another user.
38 Event custom reports FIGURE 564 Add/Edit Report Definition dialog box - Result Settings tab NOTE The Available Column list lists the attributes you can include in the report. Each attribute represents a column on the report. 5. Select the attribute you want, then click the right arrow to move your selection to the Selected Columns list. To remove an attribute from the Selected Columns list, select the attribute that you want to remove, then click the left arrow button.
Event custom reports 38 Defining the report identity The Identification tab in the Event Custom Reports dialog box allows you to enter the identity information of the report information. To define the report identity, complete the following steps. 1. Select Reports > Event Custom Reports. The Event Custom Reports dialog box displays. 2. Click the Add button. 3. The Add/Edit Report Definition dialog box - Product tab displays. 4. Click the Identification tab.
38 Event custom reports If you select this button, no Management application users will see this definition on the Report Definitions tab of the Event Custom Reports dialog box when they log in. 8. Click the Share this definition (Read only) button if you want other Management application users to have Read Only permission for this definition. If you selected the Share this definition (Read only) button, a list of Management application roles appears in the Available Roles list. 9.
Event custom reports 38 FIGURE 566 Add/Edit Report Definition dialog box - Product tab 4. Click the Filter tab. The Add/Edit Report Definition dialog box - Filter tab, shown in Figure 567, displays.
38 Event custom reports 5. To limit the search results to traps, syslog, and pseudo event messages with a specific text string, enter the text string in the Description field. You can use an asterisk (*) to indicate a wildcard, as in the following examples: • *cdef: Matches a message ending with cdef • abc*: Matches a message beginning with abc • *abc*: Matches a message that contains abc For example, if you want to find the events that have the text “Auth” in the message, enter “*Auth*”.
Event custom reports 38 3. Click the Time Settings tab. The Add/Edit Report Definition dialog box - Time Settings tab, shown in Figure 568, displays. FIGURE 568 Add/Edit Report Definition dialog box - Time Settings tab 4. Choose between relative time (the default) and absolute time. • Click Relative Time if you want to filter traffic based on when the report is generated, and then select a relative time from the Range list. Relative time is calculated based on the date and time the report is generated.
38 Event custom reports Creating a new report definition by copying an existing definition The simplest way to create a new report definition is by copying an existing definition. To create a new report definition is by copying an existing definition, complete the following steps. 1. Select the definition you want to copy from the Report Definitions tab of the Event Custom Reports dialog box. 2. Click Duplicate.
Event custom report schedules 38 Deleting a report definition You can delete a report definition, but only if it belongs to you. To delete a report definition, complete the following steps. 1. To access the dialog box, select Reports > Event Custom Reports. The Event Custom Reports dialog box displays. 2. Click the Report Definitions tab of the Event Custom Reports dialog box and select the definition you want to delete. 3. Click the Delete button.
38 Event custom report schedules • • • • Duplicate — Creates a copy of the selected report schedule. Delete — Deletes the selected schedule from the Schedules list. Enable — Enables the selected schedule. Disable — Disables the selected schedule.
Event custom report schedules 7. 38 Select one of the following periods from the Frequency list: • One Time • Hourly — If you selected Hourly as the schedule type, Minutes past the hour appears. Select the minutes after the hour when the report will be generated. • Daily — If you selected Daily as the schedule type, Time (hh:mm) appears. • Weekly — If you selected Weekly as the schedule type, Day of the week appears. Select the day of the week when the report will be generated.
38 Event logs Event logs You can view all events that take place through the Master Log at the bottom of the main window. You can also view a specific log by selecting an option from the Logs submenu of the Monitor menu. The logs are described in the following list: • Audit Log — Displays all Application Events raised by the application modules and all Audit Syslog messages from the switches and Brocade HBAs.
Event logs 38 3. Right-click one of the selected rows and select Copy Rows. 4. Open the application to which you want to paste the data. 5. Click where you want to paste the data. 6. Press CTRL+V (or select Edit > Paste from the other application). All data and column headings are pasted. 7. Click Close to close the dialog box. Copying an entire log entry You can copy data from logs to other applications. Use this method to analyze or store the data using another tool.
38 Event logs E-mailing all event details from the Master Log NOTE You must configure e-mail notification before you can e-mail event details from the Master Log. To configure e-mail notification, refer to “Configuring e-mail notification” on page 1274. To e-mail all event details from the Master Log, complete the following steps. 1. Right-click an entry in the Master Log. 2. Select E-mail > All. The E-mail dialog box displays. 3.
Event logs TABLE 106 38 Event Properties Event Field Description Probable Cause The most likely reason the event occurred. Description A description of the event. Count Number of times this event occurred on the host. Origin The event’s origin, for example, SNMP trap. Message ID The message associated with the event. Port Name The port name associated with the event. First Event Server Time The time the event occurred. Fabric Name The VCS fabric name.
38 Event logs Finding the device associated with an event You can locate a device on which an event was triggered by right-clicking the event and selecting Locate. The device displays highlighted in the Product List and Topology Map. NOTE Locate does not locate devices in automatically collapsed fabrics. You must expand the fabric (right-click and select Expand) and repeat the locate command. Copying part of the Master Log You can copy data from logs to other applications.
Event logs 38 To export the Master Log, complete the following steps. 1. Right-click an entry in the Master Log. 2. Select Table > Export Table. The Save table to a tab delimited file dialog box displays. 3. Browse to the location where you want to export the data. 4. Enter a name for the file in the File Name field. 5. Click Save. All data and column headings are exported to the text file. 6. Click Close to close the dialog box.
38 Event logs The Define Filters dialog box displays. FIGURE 572 Define Filter dialog box - Basic tab, IP tab selected 3. Use the following to include or exclude products. • To include an event type in the filter, select the event from the Available Products list and click the right arrow. • To exclude an event type from the filter, select the event from the Selected Products to be displayed list and click the left arrow. • To include all products, select the Allow All Products check box. 4.
Event logs 38 • Debug • Unknown Clear the severity level check boxes to turn off the filter for the selected events. 6. (Optional) To filter events based on a string (such as telnet or login) that appears in the event description, select the Events Description check box and enter the string that the filter is to use in the associated text box. 7. Enter a name for the filter in the Name field. The Filter name length is limited to 128 alphanumeric characters.
38 Event logs Notes on filters • Changing the filter in one client session does not alter the filter selection on other clients. However, if the currently selected filter is updated, once the filter is saved, the Master Log is reloaded to reflect the changes to that filter. This affects all your client sessions. • If the currently selected filter is deleted, the Master Log is reloaded, and changes the selected filter to none for all your client sessions.
Chapter Packet Capture (Pcap) 39 In this chapter • Configuring packet captures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1347 Configuring packet captures Organizations can configure switches as sensors to capture packets through the embedded sFlow capability and send them back to the Management application, which acts as an sFlow collector. The Management application then converts the sFlow data to Pcap format, which is understood by a variety of open source products.
39 Configuring packet captures For example, if SNORT is installed under the C:\\SNORT\ directory, enter the following commands to launch SNORT: C:\\SNORT\bin\SNORT.exe -c C:\\SNORT\etc\SNORT.conf -Xeds -K none 6. Specify the working directory for the PCAP-aware tool in the Working Directory text box. If this field is blank, the default directory is set to the Install_Home\bin directory. 7. Type the name of the PCAP-aware tool in the Name text box.
Chapter Technical Support 40 In this chapter • Server and client support save. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1349 • Device technical support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1353 Server and client support save You can use Technical Support to collect SupportSave data for the Management server and clients.
40 Server and client support save 4. Select the Include Database check box to include the database in the support save and choose one of the following options. • Select the Partial (Excludes historical performance data and events) option to exclude historical performance data and events from the database capture. • Select the Full option to capture the entire database. Clear the Include Database check box to exclude the database in the support save. 5.
Server and client support save 40 4. Enter a file name for the server support save file in the File Name field. The default file name is DCM-SS-Time_Stamp. 5. Select the Include Database check box to include the database in the support save and choose one of the following options. • Select the Partial (Excludes historical performance data and events) option to exclude historical performance data and events from the database capture. • Select the Full option to capture the entire database.
40 Server and client support save Client support save using a command line interface Use the following procedures to capture client support save files through the command line interface (CLI). Capturing client support save using the CLI (Windows) To capture client support save files through the CLI, complete the following steps. 1. Go to the following location: • (Local client) User_Home/Management_Application_Name/localhost • (Remote client) User_Home/Management_Application_Name/Server IP 2.
Device technical support 40 Device technical support You can use Technical Support to collect SupportSave data (such as RASLOG, TRACE, and so on) and switch events from Fabric OS, IronWare, and Network OS devices. To gather technical support information for the Management application server, refer to “Capturing technical support information” on page 509. Scheduling technical support information collection You can capture technical support and event information for up to 50 devices.
40 Device technical support FIGURE 574 Technical SupportSave dialog box, Schedule tab 3. Select the Enable scheduled Technical Support Data check box. 4. Select how often you want the scheduled collection to occur from the Frequency list. 5. Select the start date for the scheduled collection from the Start Date list. This list is only available when you select Weekly or Monthly from the Frequency list. 6. Select the time you want the scheduled collection to begin from the Start Time Hour and Minute lists.
Device technical support 40 • Contact — The primary contact at the customer site. • Description — A description of the customer site. • Role — A description of the customer site. a. Right-click in the Available IP Products table and select Expand All. b. Select the products you want to collect data for in the Available IP Products table and click the right arrow to move them to the Selected Products and Hosts table.
40 Device technical support • Fabrics — The fabric of the host. a. Right-click in the Available Hosts table and select Expand All. b. Select the products you want to collect data for in the Available Hosts table and click the right arrow to move them to the Selected Products and Hosts table. The Selected Products and Hosts table displays the following information: IP Address — The IP address of the selected product or host. For VCS-enabled product’s, the IP address of the selected node.
Device technical support 40 NOTE You must have the SupportSave privilege to perform this task. For more information about privileges, refer to “User Privileges” on page 1423. To capture technical support and event information for specified devices, complete the following steps. 1. Select Monitor > Technical Support > Product/Host SupportSave. The Technical SupportSave dialog box displays. 2. Click the Generate Now tab, if necessary. FIGURE 575 Technical SupportSave dialog box, Generate Now tab 3.
40 Device technical support If you select more than one IronWare device for collection, the IronWare device support save files are saved as individual zip files. However, if you select more than one Fabric OS DCB device for collection, the DCB device support save files are bundled together in a zip file.
Device technical support 40 Field Description Progress The status of the supportsave. On products running Fabric OS 7.0 or later, this field shows the percentage complete and is updated every minute. For IronWareand Host products, as well as Fabric OS products running 6.4 or earlier, this field cannot display the percentatge (only displays whether it is ‘in Progress’ or’ Completed’). Status The status of the support save, for example, Ceases or Failure. 6.
40 Device technical support 2. Review the techncial support repository details: Field/Component Description Available SupportSave table Select the support data file you want to view. Displays the following information: File Name — The name of the SupportSave file. Size (MB) — The name of the SupportSave file. Last Modified — The date the SupportSave file was generated. Firmware Type — The type of file (Client, Server, FOS (Fabric OS), IOS (IronWare), NOS (Network OS), ).
Device technical support 40 E-mailing technical support information NOTE You cannot e-mail technical support information collected from the remote client. To e-mail technical support information, complete the following steps. 1. Select Monitor > Technical Support > View Repository. The Technical Support Repository dialog box displays. 2. Select the file you want to e-mail in the table. 3. Click E-mail to e-mail the event and supportsave files (zip).
40 Device technical support 6. Enter the destination directory where you want to copy the data on the external FTP server in the Destination Directory field. The destination directory should be the sub directory of the external FTP server’s root directory. For example, if you enter “repository” as the destination directory, then the support save file is copied to the “/repository” directory of the external FTP server. 7. Click OK.
Chapter 41 Reports In this chapter • Reports overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • IP report types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Viewing IP reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Exporting and saving IP reports to a file . . . . . . . . . . . . . . . . . . . . . . . . . • Exporting IP reports to e-mail recipients . . . . . .
41 Viewing IP reports • VLANs — A list of port VLANs configured on IronWare or third-party products is available in the Port VLANs report. For detailed information about this report, refer to “Port VLAN report” on page 1376. • IP Subnets — The IP Subnet report displays the list of IP subnets discovered on the network. To appear on this list, the subnet must contain at least one discovered product. For detailed information about this report, refer to “IP Subnet List report” on page 1377.
Exporting and saving IP reports to a file 41 • Sort the report by a single column by clicking any column header. Reverse the sort order by clicking the column header again. • Access additional data or applications (such as, a device element manager) by clicking a link in the table. 4. Click the close (X) button to close the report. Exporting and saving IP reports to a file You can save a report to a CSV (comma separated values) or HTML file.
41 Exporting IP reports to e-mail recipients 3. Select the preconfigured e-mail user account from the list and click OK. 4. Enter additional e-mail addresses in the Other Recipients field. 5. Enter text in the Subject field to change the subject of the e-mail. 6. Enter text in the Body field to send a message with the report. 7. Click Send to send the report. NOTE Mozilla Firefox Browser does not support the window close script. Click the browser close button (X) to cancel.
Exporting IP reports to e-mail recipients TABLE 108 41 Wired Products report fields and components (Continued) Field/Component Description Name The name of the product. Click the name of a product to launch the Detailed Product Report. VCS Name The name of the VCS product. Click the name of a product to launch the Detailed Cluster Report. RBridge ID The RBridge ID of the VCS product. IP Address The IP address of the product. Click the IP address of a product to launch the Web Element Manager.
41 Exporting IP reports to e-mail recipients FIGURE 578 Detailed Product Report The Detailed Product Report report contains the fields and components detailed in Table 109. TABLE 109 Detailed Product Report fields and components Field/Component Description Product The IP address of the product. System Information 1368 System information includes the following: Alias Name — An optional name that is entered using the Properties dialog box.
Exporting IP reports to e-mail recipients TABLE 109 41 Detailed Product Report fields and components (Continued) Stacking Units This section only displays if the product is configured as a stacked device. It includes the following: • Unit — The ID of the unit on the stack. • Present — Whether the stacked device is physically present. • Role — The role of the unit. • Model — The model number of the stacked device. • Firmware — The firmware level of the stacked device.
41 Exporting IP reports to e-mail recipients TABLE 109 Detailed Product Report fields and components (Continued) Cluster (MCT switches only) Cluster Peer (MCT switches only) 1370 Cluster information for a Multi-Chassis Trunk (MCT) switch. Information includes: Cluster ID — The MCT cluster ID. Cluster Name — The MCT cluster name. Cluster State — Whether the MCT cluster is deployed or undeployed. Client Isolation Mode — Whether isolation mode is loose or strict.
Exporting IP reports to e-mail recipients TABLE 109 41 Detailed Product Report fields and components (Continued) Software Licenses The name of the software licenses assigned to the product. For IronWare devices, displays the following information: • Package Name — The name of the license. • License Id — The license on the product. • License Type — The type of license (trial or normal). • Expiry Date — Whether the license is expired or unlimited. • Precedence — The precedence of the license.
41 Exporting IP reports to e-mail recipients FIGURE 579 Detailed Cluster Report The Detailed Cluster Report report contains the fields and components detailed in Table 110. TABLE 110 Detailed Cluster Report fields and components Field/Component Description Cluster The name of the cluster. System Information 1372 System information includes the following: Alias Name — An optional name that is entered using the Properties dialog box.
Exporting IP reports to e-mail recipients TABLE 110 41 Detailed Cluster Report fields and components (Continued) Nodes Admin Status Modules IP Addresses Ethernet Ports Brocade Network Advisor IP User Manual 53-1003153-01 Node information includes the following: Name — The name of the node. Click the name to launch the Detailed Product Report. • IP Address — The IP address of the product. • Product Type — The type of product. • Serial Number — The serial number of the product.
41 Exporting IP reports to e-mail recipients TABLE 110 Detailed Cluster Report fields and components (Continued) FC Ports This table contains the following information for each FC interface on the product: Identifier — The port identifier. Port Name — The port name. Port WWN — The world wide name of the port. Area ID/Port Index — The area identifier and port index of the port. Type — The type of port. Port Speed (Gb/s) — The speed of the port. Trunked — Whether the port is trunked.
Exporting IP reports to e-mail recipients TABLE 111 41 AP Products report fields and components (Continued) Profile Name The AP profile name. RF Domain Name The RF domain name set for the AP. Serial Number The serial number of the AP. Firmware The firmware level of the AP. Client Count The number of wireless clients or stations connected or associated to the AP. Last Scanned The last time the APs were scanned.
41 Exporting IP reports to e-mail recipients Port VLAN report A list of port VLANs configured on IronWare or third-party products is available in the Port VLAN report. Lists of protocol VLANs are available in the port VLAN structure. For IronWare and Network OS products, these reports reflect the VLAN information available in VLAN Manager. To access the Port VLAN report, select Reports > VLANs. To display information about a VLAN, click its ID.
Exporting IP reports to e-mail recipients 41 IP Subnet List report The IP Subnet List report displays the list of IP subnets discovered on the network. To appear on this list, the subnet must contain at least one discovered product. To view the IP Subnet List report, select Reports > IP Subnet Reports. The IP Subnet List report has the parameters described in Table 115.
41 Exporting IP reports to e-mail recipients TABLE 117 IP Address report fields and components (Continued) Product The host name of the product on which the IP address is configured. Click the name of the product to launch the Detailed Product Report. VCS Name The name of the VCS fabric. Click to display the Detailed Cluster Report. Identifier The port number or slot number and port number on which the IP address is configured. Port Name The port name.
Exporting IP reports to e-mail recipients TABLE 119 41 Physical Ports - Realtime report fields and components Field/Component Description Identifier A unique identifier for each port on the device. The identifier includes the module, slot, and interface. Administrative Status The administrative status of the port. Operational Status The operational status of the port. PoE Control Displays the PoE status of the port. You can sort the report by clicking on a column header.
41 Exporting IP reports to e-mail recipients TABLE 121 Physical Media - Realtime report fields and components (Continued) Vendor The vendor of the SFP. Vendor OUI The vendor’s Organizationally Unique Identifier from a MAC address. Vendor PN The vendor’s part number. Vendor REV The vendor’s REV. Serial # The serial number of the SFP. Date Code The date code of the SFP. Media Form Factor The media form factor of the SFP. Connector The connector type.
Reports Template Manager overview 41 3. Click the link in the Deployment Time column to display the details of the deployment. The Detailed Configuration Deployment Report displays in the web browser with the following details: • • • • Configuration — Name of the deployment. Product — Product on which the deployment occurred. Status — Status of the deployment. Error — Any error messages. 4. To export a report to a file, refer to “Exporting and saving IP reports to a file” on page 1365. 5.
41 Reports Template Manager overview Accessing the Report Template Manager 1. Select Reports > Report Manager. The Report Template Manager dialog box displays (Figure 580). FIGURE 580 Report Template Manager dialog box The Report Template Manager dialog box includes the following fields and components: • Report Templates table — Lists all reports. Title — The title of the report, which must be unique. File — The file name of the report, which must be unique.
Reports Template Manager overview 41 Viewing a report 1. Select Reports > Report Manager. The Report Template Manager dialog box displays. 2. Select the report you want to run in the Report Templates table. 3. Click Run. If one or more parameters are required for the report, the Parameter dialog box displays (Figure 581). FIGURE 581 Parameter dialog box 4. Enter the parameters (such as IP address, source port name, or destination port name). NOTE The parameter fields cannot be empty.
41 Reports Template Manager overview Importing a report template You can use the BIRT report designer to create user-defined report templates that you can then import into Report Template Manager. 1. Select Reports > Report Manager. The Report Template Manager dialog box displays. 2. Click Import. The Open dialog box displays. 3. Browse to the location from which you want to import the report and click Open.
Reports Template Manager overview 41 Report content and functions Each report contains the following information: • The name of the report displayed at the top of the report. • The date and time the report was generated. • The report data, presented in a tabular format. Depending on the report type, you can perform the following functions: • Sort a table by clicking a column head. Click a column head again to reverse the sort order. • Launch a more detailed report by clicking a link within the report.
41 Reports Template Manager overview Products List report The Products List report displays general and detailed configuration information about all discovered products (Figure 582). The information on the report comes from the software image version that is in the Management application for that product. To ensure that the latest configuration information is in the Management application, run the discovery process or resynchronize the product.
Reports Template Manager overview TABLE 122 41 Products List report fields and components (Continued) Field/Component Description IP Address The IP address of the product. Product Type The type of product. Serial Number The serial number of the product. Admin Status The administrative status of the product. Possible status includes: Normal — The product is in normal operating mode. Troubleshooting — The product is in troubleshooting mode. • • Model The model of the product.
41 Reports Template Manager overview Table 123 describes the fields and components of the Detailed Product Report. TABLE 123 Detailed Product Report fields and components Field/Component Description Product The IP address of the product. System Information Admin Status Modules Ethernet Ports 1388 System information includes the following: Alias Name — An optional name that is entered using the Properties dialog box.
Reports Template Manager overview TABLE 123 41 Detailed Product Report fields and components (Continued) Physical Ports Physical port information for each port on the product. Identifier — The port identifier of the physical interfaces on the product. Port Name — The port name of the physical interfaces on the product. Type — The type of port of the physical interfaces on the product. Speed (Mbps) — The speed of the physical interfaces on the product.
41 Reports Template Manager overview Table 124 describes the fields and components of the Detailed Cluster Report. TABLE 124 Detailed Cluster Report fields and components Field/Component Description Cluster The name of the cluster. System Information Nodes Admin Status 1390 System information includes the following: Alias Name — An optional name that is entered using the Properties dialog box.
Reports Template Manager overview TABLE 124 41 Detailed Cluster Report fields and components (Continued) Modules Ethernet Ports Module information shows what modules are installed on the product. Slot Number — For products that do not support stacking, you can view the slot number. • Type — The type of module installed in the slot. • Serial Number — The serial number of the module. For wired products, the serial number cell may be blank. • Ports — The number of ports on the product.
41 Reports Template Manager overview Table 125 describes the fields and components of the Ports Tx/Rx Ratio report. TABLE 125 Ports Tx/Rx Ratio report fields and components Field/Component Description Summary table Location The location of the device. Device Name The name of the device. Click the device name link to launch the Detailed Product Report. IP Address The IP address of the device. Total Received (MB) The total data received (the sum of Rx in Rx Details table) in megabytes.
Reports Template Manager overview 41 Low Traffic Ports report The Low Traffic Ports report details the port utilization that is less than or equal to the percentage and number of days you specify (Figure 586). FIGURE 586 Low Traffic Ports report Table 126 describes the fields and components of the Low Traffic Ports report. TABLE 126 Low Traffic Ports report fields and components Field/Component Description Location The location of the device. Device Name The name of the device.
41 Host adapter reports Exporting data from the report You can export data from a report to CSV, PDF, or Word. 1. Run a report (refer to “Viewing a report” on page 1383). 2. From the report, click the Export Report icon on the Report toolbar. The Export Report dialog box displays. 3. Select an export format (PDF or Word) from the Export Format list. 4. Configure what content to export by selecting one of the following options: • Select All pages to export the entire report.
Host adapter reports 41 The selected report displays. This report includes data for all Hosts discovered through Host Adapter discovery. Adapters Inventory report The Adapters Inventory report only displays adapters and ports discovered through Host Adapter discovery. This report is only available for Brocade adapters. Table 127 describes the fields and components of the Adapters Inventory Report.
41 Host adapter reports TABLE 127 Adapters Inventory report fields and components (Continued) Field/Component Description Media The type of media; for example, 8G-sw (8 Gbps software). FC Address The port’s Fibre Channel address. Fabric Name The name of the Fabric. Zone Alias The alternate name of the zone. Fabric Assigned Address The state (enabled, disabled, or N/A) of the fabric assigned address for the adapter. WWN Source The source of the world wide name.
Host adapter reports TABLE 128 41 Adapters Faulty SFP report fields and components (Continued) Field/Component Description Length 50u The length of the 50u fiber-optic cable (for distances greater than 10 meters). Length 62.5u The length of the 62.5u fiber-optic cable (for distances greater than 10 meters). Length Cu The length of the copper cable (for distances greater than 1 meter, where optimum performance is required). Vendor Name The vendor of the extended link.
41 1398 Host adapter reports Brocade Network Advisor IP User Manual 53-1003153-01
Appendix A Application menus In this appendix • Dashboard main menus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1399 • IP main menus. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1400 • IP shortcut menus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1406 Dashboard main menus The menu bar is located at the top of the main window.
A IP main menus Menu Command Command Options License — Select to view or change your License information. About Management_Application_Name — Select to view the application information, such as the company information and release number. IP main menus The menu bar is located at the top of the main window. The following table outlines the many functions available on each menu. Menu Command Command Options Server Menu Users. Select to configure users and user groups. User Profile.
IP main menus Menu Command A Command Options Show Panels. Select to choose which panels to display. All Panels. Select to show all panels. Topology Map. Select to only show the topology map. Product List. Select to only show the Product List. Master Log. Select to only show the Master Log. Main Display. Select to choose which topology to display Network Objects. Select to display Network Objects. L2 Topology. Select to display the L2 topology map. Ethernet Fabrics.
A IP main menus Menu Command Command Options Static. Select to create a product group based on device. Dynamic. Select to create a product group based on device attributes. Add Port Group. Select to create a port management group. Edit Group. Select to edit a management group. Duplicate Group. Select to duplicate a management group. Delete Group. Select to delete a management group. Configure Menu Element Manager. Select to configure a selected device. Front Panel.
IP main menus Menu Command A Command Options Application Delivery. Select to choose an application delivery method. VIP Servers. Select to monitor and configure real and virtual servers. GSLB. Select to create global server load balancing (GSLB) policies. SSL Certificates. Select to manage SSL certificates. MPLS. Select to configure the multiprotocol label switches service (MPLS). VLL. Select to configure virtual leased line (VLL) services. VPLS. Select to configure virtual private LAN services (VPLS).
A IP main menus Menu Command Command Options Set Change Limits. Select to set zone limits for zone activation. List Zone Members. (Trial and Licensed version Only) Select to display all members in a zone. Monitor Menu Performance. Select to monitor IP devices. Historical Data Collectors. Select to monitor historical data. Real-Time Graph/Tables. Select to monitor performance through a graph or table, which displays real-time data for transmit and receive data. Historical Graph/Tables.
IP main menus Menu Command A Command Options Pseudo Events. Select to configure pseudo events. Event Actions. Select to configure events actions. Logs. Select to display logs. Audit. Select to display a history of user actions performed through the application (except login/logout). Product Event. Select to display errors related to SNMP traps and Client-Server communications. Product Status. Select to display operational status changes of managed products. Security.
A IP shortcut menus Menu Command Command Options IP Addresses. Select to run a report on IP addresses on the network. MAC Addresses. Select to run a report of MAC addresses on the network. Product CLI. Select to run a product CLI report. Deployment. Select to run a deployment report. Host Adapters — Select to run a Host product report. Inventory Report — Select to run a Host inventory report. Faulty SFP Report — Select to run a faulty SFP report. Tools Menu Address Finder.
IP shortcut menus A The table below details the command options available for each component. Component Menu/Submenu Commands Comments Element Manager > Front Panel Web Displays the IronWare device’s front panel. Launches the device’s Web Management Interface. Configuration > Save Restore Configuration Repository Schedule Backup Launches the Configuration dialog box with selected device highlighted. Launches the Configuration dialog box with selected device highlighted.
A IP shortcut menus Component Menu/Submenu Commands Comments Table > Copy “Cell_Value” Copy Row Copy Table Export Row Export Table Print Search Select All Size All Columns To Fit Expand All Collapse All Customize Only available from Product List. Copies the information in the selected cell. Copies all information in the selected row. Copies all information in the table. Copies all information in the selected row. Copies all information in the table. Launches the Print dialog box.
IP shortcut menus Component Menu/Submenu Commands A Comments Fabric Watch > Configure Port Fencing Frame Monitor Performance Thresholds Technical Support > Product / Host SupportSave View Repository Events Port Connectivity Port Optics (SFP) Telnet Telnet through Server Network Objects Displays the Network Objects view with the selected device highlighted. L2 Topology Displays the L2 Topology view with the selected device highlighted.
A IP shortcut menus Component Menu/Submenu Commands Comments Fabric Watch > Configure Port Fencing Frame Monitor Performance Thresholds Technical Support > Product / Host SupportSave View Repository Events CLI through Server Setup Tools Network Objects Displays the Network Objects view with the selected device highlighted. L2 Topology Displays the L2 Topology view with the selected device highlighted.
IP shortcut menus Component Menu/Submenu Commands Comments Physical Ports Report Generates and displays a Physical Ports Report for the selected device Properties Displays the Properties dialog box for the selected device. Table > Copy “Cell_Value” Copy Row Copy Table Export Row Export Table Print Search Select All Size All Columns To Fit Expand All Collapse All Customize Only available from Product List. Copies the information in the selected cell. Copies all information in the selected row.
A 1412 IP shortcut menus Brocade Network Advisor IP User Manual 53-1003153-01
Appendix B Call Home Event Tables In this appendix This appendix provides information about the specific events that display when using Call Home. This information is shown in the following Event Table. • IP Call Home Event . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1413 • Network OS Call Home Event . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
B Call Home Event Tables TABLE 130 Network OS Call Home Event (Continued) Event reason code FRU code/Event type Description Severity 1431 FW-1431 Faulty fans. 3 1432 FW-1432 Faulty WWN cards. 3 1433 FW-1433 Faulty CPs. 3 1434 FW-1434 Faulty blades. 3 1435 FW-1435 Flash usage is out of range.
Appendix C Event Categories In this appendix This section provides information about the events that display in each of the following categories: • Link incident events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Product status events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Product audit events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Security events . . . . . . . . . . . .
C Product audit events If the event is a RASLOG and if the RASLOG ID matches any of the RASLOGS listed below, then the event is categorized as a product status event. • • • • • • • • • • • • • • • • • • • • • FW-1424 FW-1425 FW-1426 FW-1427 FW-1428 FW-1429 FW-1430 FW-1431 FW-1432 FW-1433 FW-1434 FW-1435 FW-1436 FW-1437 FW-1438 FW-1439 FW-1440 FW-1441 FW-1442 FW-1443 FW-1444 Product audit events Events that are used to track audit information are categorized as product audit events.
Security events C Security events Security events are those that indicate authentication success or failure, a security violation, or user login and logout. Security events for FC devices For FOS switches, if the event is a RASLOG event and the RASLOG ID contains 'SEC', then the event is categorized as a security event. Security events for IP devices For IOS devices, if the event OID starts with any of the following OIDs, then the event is categorized as a security event.
C User action events • • • • • • • • • • • • • • • • • 1.3.6.1.4.1.1991.1.6.1.7.4.2.13 [localMacAddrAuthFail] 1.3.6.1.4.1.1991.1.6.1.7.4.2.14 [pppLogonFail] 1.3.6.1.4.1.1991.1.6.1.7.4.2.18 [dot1xSupplicantAuthenticated] 1.3.6.1.4.1.1991.1.7.2.2.2.9 [apAuthFailureTooMany] 1.3.6.1.4.1.1991.1.8.2.1.4.0.2 [userLoginNotification] 1.3.6.1.4.1.1991.1.8.2.1.4.0.3 [userLogOffNotification] 1.3.6.1.4.1.1991.1.8.2.1.4.0.4 [userLoginFailNotification] 1.3.6.1.4.1.1991.1.11.1.1.2.2.2.32 [mwlAuthFailure] 1.3.6.1.4.1.
Product events C Product events All other events originating from the product are categorized as product events. IP Performance monitoring events IP performance monitoring events, listed in Table 131, occur when users select the option to forward events to the vCenter during VM Manager discovery. TABLE 131 Performance monitoring IP threshold events Trap name OID Description bnaRisingThresholdCrossed 1.3.6.1.4.1.1991.1.13.2.0.
C RASLog Events TABLE 132 1420 Configuration change events (Continued) Event ID Type Description CONF-1031 LOG configDefault completed successfully. CONF-1032 LOG configRemove completed successfully. CONF-1042 LOG | AUDIT Indicates that the fabric configuration parameter value has been changed. CONF-1043 LOG | AUDIT Indicates that the fabric configuration parameter value has been changed.
RASLog Events TABLE 132 C Configuration change events (Continued) Event ID Type Description FCR-1102 LOG ICL EX_Port need to be present in base switch to make a recommended topology. FICU-1008 LOG FMS mode enabled. FICU-1012 LOG FMS mode disabled. FV-3000 AUDIT Flow definition created. FV-3001 AUDIT Flow definition deleted. FV-3002 AUDIT Flow definition activated. FV-3003 AUDIT Flow definition de-activated. FV-3004 AUDIT Flow definition modified.
C RASLog Events TABLE 132 1422 Configuration change events (Continued) Event ID Type Description PMGR-1001 LOG | AUDIT Attempt to create switch ID succeded. PMGR-1003 LOG Attempt to delete switch ID succeded. PMGR-1005 LOG Attempt to move port on slot succeded. PMGR-1007 LOG Attempt to change switch succeded. PMGR-1009 LOG Attempt to change the base switch to software succeded. PMGR-1011 LOG Attempt to move port to switch succeeded. SEC-1319 LOG FCS Policy changed.
Appendix User Privileges D In this appendix • About user privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1423 • About Roles and Access Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1439 About user privileges The Management application provides the User Administrator with a high level of control over what functions individual users can see and use.
D About user privileges TABLE 133 Application privileges and behavior Privilege Description No Privilege Read-Only Read/Write Active Session Management Allows you view active client sessions and disconnect an unwanted user. Disables the Active Sessions command from the Server menu. Enables the Active Sessions command from the Server menu. Disables all commands and functions on the dialog box except the Close and Help. Enables the Active Sessions command from the Server menu.
About user privileges TABLE 133 D Application privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Dashboard Management Allows you to access the Dashboard Management. • Allows you to perform the following operations on the dashboard: • Show or hide the default status and performance widgets to the dashboard. • Customize Network Scope and Time Scope. • Dashboard Playback operation. • Sharing the dashboard. • Dashboard creation and deletion.
D About user privileges TABLE 133 Application privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write E-mail Event Notification Setup Allows you to define the e-mail server used to send e-mail. Disables Event Notification E-mail command on the Monitor menu and the E-mail Event Notification Setup button in the Users dialog box. Disables the E-mail option in the Master Log shortcut menu.
About user privileges TABLE 133 D Application privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Fault Management Allows you to control access to the SNMP Trap Registration and Forwarding dialog box, the Event Storage option of the Options dialog box, the Syslog Registration and Forwarding dialog box, as well as the Export and Clear functions in the Event Log dialog box and the Show and Hide functions in the Customize Columns dialog box.
D About user privileges TABLE 133 Application privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Firmware Management Allows you to download firmware to selected switches and manage the firmware repository. Disables the Firmware Management command from the Configure menu and right-click menu. Enables the Firmware Management command from the Configure menu and right-click menu. Disables all commands and functions on the dialog box except the Close and Help.
About user privileges TABLE 133 D Application privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Policy Monitor Allows you to configure policy monitors. Disables Policy Monitor command on the Monitor menu. Enables Policy Monitor command on the Monitor menu. Allows you to open the Policy Monitor dialog box; however, disables the Add, Delete, and Run buttons. No changes can be made. Enables you to use the Edit, Report, and History buttons to view content.
D About user privileges TABLE 133 Application privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Security Allows you to enable and configure SANtegrity features. Disables the Security command from the Configure > Switch > Replicate menu. Disables the Security Log command on the Monitor > Logs menu. Disables the Security Misc command from the Server > Options menu. Disables the Security command from the Configure > Switch > Replicate menu.
About user privileges TABLE 133 D Application privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Technical Support Data Collection Allows you to capture support data from Fabric OS switches. Disables the SupportSave, Upload Failure Data Capture, and View Repository commands from the Monitor > Technical Support menu and right-click menu. Enables the View Repository command from the Monitor > Technical Support menu and right-click menu.
D About user privileges TABLE 133 Application privileges and behavior (Continued) Privilege Description Web Services Allows you to use Web Services API. Zoning Activation (Fabric and offline zone database) Allows you to activate a zone configuration selected in the Zoning dialog box. NOTE You must also have the Zoning Offline and Zoning Online privileges to launch the Zoning dialog box.
About user privileges TABLE 133 D Application privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Zoning Online Allows you to edit any of the fabric zone databases in the available fabrics within the Zoning dialog box from the client side and then save to the switch. In Zoning dialog box, the Zone DB list includes online and offline zones; however, if an online zone is selected, the contents are not loaded into the Zoning dialog box.
D About user privileges TABLE 133 Application privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Zoning Offline Allows you to edit the zone database in offline mode and save the zone database to the repository or to the switch. In Zoning dialog box, the Zone DB list includes offline zones; however, if an offline zone is selected, the contents are not loaded into the Zoning dialog box.
About user privileges TABLE 133 D Application privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Zoning - LSAN Allows you to edit and activate LSAN zones for the LSAN fabrics that are available within the Zoning dialog box. Prerequisite: Both the backbone fabrics as well as all directly connected edge fabrics must be added to a resource group and a user with LSAN Zoning privilege must be assigned to this specific resource group.
D About user privileges TABLE 134 IP privileges and behavior Privilege Description No Privilege Read-Only Read/Write IP - Address Finder Allows you to use Address Finder. Address Finder finds MAC addresses that are in the forwarding tables at the moment when the search is performed. Disables the Address Finder command. Enables the Address Finder command; however, disables functions on the dialog box. Enables the Address Finder command and all functions on the dialog box.
About user privileges TABLE 134 D IP privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write IP - Element Manager Port Config Allows you to access the device from Element Manager. For read-write access to a device Web Management Interface to manage specific ports, but not for global configuration of a device. Disables the Element Manager - Port Config command. Enables the Element Manager - Port Config command; however, disables functions on the dialog box.
D About user privileges TABLE 134 IP privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write IP - MPLS - VLL Allows you to manage VLL configurations. Disables the MPLS command. Enables the MPLS command; however, disables functions on the dialog box. Enables the MPLS command and all VLL functions on the dialog box. IP - MPLS - VPLS Allows you to manage VPLS configurations Disables the MPLS command.
About Roles and Access Levels TABLE 134 D IP privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write IP - VIP-Server Mgr Leaf Node (Real Server Port View) Allows you to manage VIP Server using the Real Server Port View. When assigned to user as Read-Write privilege, only leaf node can be disabled/enable Disables the VIP Server command. Enables the VIP Server command; however, disables functions on the dialog box.
D About Roles and Access Levels TABLE 135 Application Features and Role Access Levels (Continued) Feature Roles with Read/Write Access Element Manager - Product Administration IP System Administrator, Event Management IP System Administrator, Network Administrator Fabric Watch IP System Administrator, Fault Management IP System Administrator, Network Administrator Operator FCoE Management SAN System Administrator, Network Administrator Security Administrator, Zone Administrator, Security Of
About Roles and Access Levels TABLE 136 D IP Features and Role Access Levels Feature Roles with Read/Write Access IP - Address Finder IP System Administrator, Network Administrator IP - CLI IP System Administrator IP - CLI Configuration IP System Administrator, Network Administrator IP - CLI - Port Config IP System Administrator IP - Deployment Reports IP System Administrator, Report User Group, Network Administrator IP - Discover Setup IP System Administrator IP - Element Manager - Port C
D 1442 About Roles and Access Levels Brocade Network Advisor IP User Manual 53-1003153-01
Appendix E Device Properties In this appendix • Viewing SAN device properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • IP device properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Host properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Properties customization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
E Viewing SAN device properties TABLE 137 Fabric properties Field/Component Description Active Zone Configuration Whether active zone configuration is activated on the fabric. Last Discovery The date and time of last discovery. Tracked Whether the fabric is tracked. Location The customer site location. Contact The primary contact at the customer site. Add button Click to add a user-defined property. For more information, refer to “Adding a property field” on page 1473.
Viewing SAN device properties E Viewing SAN device properties To view the properties for a device, complete the following steps. 1. Right-click any product icon and select Properties. The Properties dialog box displays, with information related to the selected device (such as switches, directors, HBAs, trunks, tunnels, and nodes). To add user-defined property labels, refer to “Adding a property field” on page 1473. Fields containing a green triangle ( ) in the lower-right corner are editable.
E Viewing SAN device properties TABLE 138 Device properties (Continued) Field/Component Description GigE Port The GigE port of the FCIP tunnel. Host Name The Host name. IKE Policy # IP Address IPSec Policy # 1446 The IKE policy number. Also includes the following information: Authentication Algorithm Encryption Algorithm Diffie-Hellman SA Life • • • • The device’s IP address. The IPSec policy number.
Viewing SAN device properties TABLE 138 E Device properties (Continued) Field/Component Description Sequence number The sequence number of the switch. Serial # The hardware serial number. Slot # The slot number of the trunk. Source IP Address The IP address of the of the FCIP tunnel source device. Speed (Gb/s) The speed of the port in gigabits per second. State The device’s state, for example, online or offline. Status The operational status. Switch Name The switch name.
E Viewing SAN device properties • Virtual FCoE Ports • Virtual Machine Ports 3. If you selected the FC Ports tab, select the port type: • FC • ICL • GigE For a description of the port properties, refer to “Port properties” on page 1453. 4. Click OK on the Properties dialog box to close the dialog box. Viewing storage properties NOTE Viewing storage properties is available for Fabric OS products. The Storage Properties dialog box displays information related to a selected storage device.
Viewing SAN device properties TABLE 139 E Storage Properties (Continued) Field Description Device Adapter (IBM ESS products only) Displays one of eight ESS product adapters deployed in pairs, one for each cluster that provides communication between the cluster and storage products. Disks The number of disks across which this LUN is striped. Free LUNs (Count) All LUNs not assigned (masked) to any host ports (available) that currently exist on this storage device.
E Viewing SAN device properties TABLE 139 Storage Properties (Continued) Field Description Type The level or type of RAID storage. Possible values are as follows: 0 — Striped disk array without fault tolerance. 1 — Mirroring and duplexing. 2 — Hamming code ECC. 3 — Parallel transfer with parity. 4 — Independent data disks with shared parity disk. 5 — Independent data disks with distributed parity blocks. 6 — Independent data disks with two independent distributed parity schemes.
Viewing SAN device properties TABLE 140 E iSCSI Properties Field Description Agent The Caffeine agent version number. Applications The applications. Assigned LUNs The number of unique LUNs (not LUN paths) masked to this host. Assigned LUNs Size (GB) The total size of the unique LUNs (not LUN paths) in gigabytes. Command Descriptor Block Count The number of command descriptor blocks on the product. Comments Comments regarding the product. Contact A contact for the product.
E Viewing SAN device properties TABLE 140 iSCSI Properties (Continued) Field Description Sessions button Select to display the Filer Sessions dialog box for the product. Statistics button Select to display the Filer iSCSI Statistics dialog box for the product. Storage Arrays The number of arrays containing LUNs masked to the server. Storage Logins The number of unique filers to which hosts on this server are logged in. Target Portals table Target portals of the product.
Viewing SAN device properties E FIGURE 587 Port Properties dialog box NOTE Depending on the port type, some of the following properties may not be available for all products. TABLE 141 Port properties Field Description Additional Port Info Additional error information relating to the selected port. Address The address of the port. Addressing Mode The addressing mode of the switch. Active FC4 Types The active FC4 types. Active Tunnels The number of active tunnels.
E Viewing SAN device properties TABLE 141 Port properties (Continued) Field Description Compression Whether compression is enabled or disabled. Connected Devices The number of connected devices. Click the icon in the right side of the field to open the Virtual FCoE Port Connected Devices dialog box. Connected Switch The name of the connected switch. Delete button Click to delete the ports. Description A description of the customer site.
Viewing SAN device properties TABLE 141 E Port properties (Continued) Field Description IP Address The device’s IP address. IPSec Policy # The IPSec policy number. Also includes the following information: Authentication Algorithm Encryption Algorithm SA Life • • • iSCSI button Click to launch the Element Manager. iSCSI Capable Whether the port is iSCSI capable or not. L2 Capable Whether the device is Layer 2 capable. L3 Capable Whether the device is Layer 3 capable.
E Viewing SAN device properties TABLE 141 1456 Port properties (Continued) Field Description Port Speed (Gb/s) The port speed, in gigabits per second. Port State The port state (online or offline). Port Status The port’s operational status (online or offline). Port Type The port type. Port WWN The port’s world wide name. Preshared key configured Whether the preshared key is configured for the FCIP tunnel. Prohibited Whether the port is prohibited.
E IP device properties TABLE 141 Port properties (Continued) Field Description Unit Type The unit type of the node. User Port # The number of the user port. Vendor The product vendor. # Virtual FCoE port count The number of virtual FCoE ports on the device. There is a one-to-one mapping of TE ports to virtual FCoE ports. Therefore, the number of virtual session ports is one for directly connected devices. # Virtual Session Ports The number of virtual session ports associated with the GE port.
E IP device properties 2. Right-click the device in the Product List and select Properties. The Device_Name Properties dialog box displays. 3. Review the device and port properties. To add user-defined property labels, refer to “Adding a property field” on page 1473. Fields containing a green triangle ( ) in the lower right corner are editable. NOTE Some fields are not available for all products.
IP device properties TABLE 142 E IP device and port properties (Continued) Field/Component Description FDMI Driver version The FDMI driver version. FDMI Manufacturer The manufacturer of the FDMI. Location The physical location of the product. Contact The name of the person or group you should contact about the product. Description The description of the product. Connected AP count Number of APs connected to the controller or switch.
E IP device properties TABLE 142 IP device and port properties (Continued) Field/Component Delete button Click to delete a user-defined property. For more information, refer to “Deleting a property field” on page 1474. Nodes tab Select to display information about nodes in the fabric. For detailed information about this tab, refer to “Viewing VCS fabric properties” on page 1462. Port Profiles tab Select to display information about port profiles for the fabric members.
IP device properties TABLE 142 E IP device and port properties (Continued) Field/Component MCT Client Name Access Points tab Description The MCT client name. Select to display information about access ports (APs) connected to the device. Connected AP count Number of APs connected to the controller or switch. Managed AP count Only applicable to the selected controller. Number of APs that the selected controller manages. Name The device name used to identify the AP.
E IP device properties TABLE 142 IP device and port properties (Continued) Field/Component Description vNetwork Connectivity tab Select to display information about vNetwork connectivity for the fabric members. For detailed information about this tab, refer to “VM Connectivity tab” on page 2752. Flex Port Displays the ports which support Ethernet or Fibre Channel. 4. Click OK to close the dialog box. Viewing VCS fabric properties To view properties for a VCS fabric, complete the following steps.
IP device properties TABLE 143 E VCS fabric properties (Continued) Field/Component Description Contact The name of the person or group you should contact about the product, for example, Technical Support. This is an editable field. Description The description of the product. Connected AP Count The number of AP devices connected to the device. Add button Click to add a user-defined property. For more information, refer to “Adding a property field” on page 1473.
E IP device properties TABLE 143 VCS fabric properties (Continued) Field/Component Description The description of the product. Connected AP Count The number of AP devices connected to the device. Add button Click to add a user-defined property. For more information, refer to “Adding a property field” on page 1473. Edit button Click to edit a user-defined property. For more information, refer to “Editing a property field” on page 1473. Delete button Click to delete a user-defined property.
IP device properties TABLE 143 E VCS fabric properties (Continued) Field/Component Description Add button Click to launch the Assign MACs dialog box, which you can use to select discovered MAC addresses and add offline MAC addresses for the selected port profile. Delete button Click to delete the selected MAC address from the port profile list. Compare button Click to launch the Profile Comparison Summary dialog box, where you can compare selected products to profiles using filtered criteria.
E IP device properties TABLE 143 VCS fabric properties (Continued) Field/Component Description Flow Control The Ethernet priority flow control mode of the port. Possible modes are as follows: • Off (the default) • 802.3x pause • Tx On or Off • Rx On or Off • Priority Flow Control. For this mode, the Tx and Rx values for each CoS display in the table. Maps Displays details about the following DCB maps: • CoS to CoS — Displays the details of the CoS to CoS map assigned to the port.
IP device properties TABLE 143 E VCS fabric properties (Continued) Field/Component Port Actions list Description Select one of the following options: Enable Disable Display Attached Port Properties • • • Performance list Select to launch the Performance dialog box. Fabric and Edge Ports properties • • • • • • • • • • • • • • • • • Brocade Network Advisor IP User Manual 53-1003153-01 Identifier — The identifier of the port. Name — The name of the port. This is an editable field.
E IP device properties TABLE 143 VCS fabric properties (Continued) Field/Component FC Ports properties Description • • • • • • • • • • • • • • • • • • • • • • • 1468 Identifier — The identifier of the port. Name — The name of the port. This is an editable field. Enter a name (up to 64 characters) for the port. WWN — The world wide name of the device. FC Address — The Fibre Channel address. Each FC port has both an address identifier and a world wide name. Status — The operational status.
Host properties TABLE 143 E VCS fabric properties (Continued) Field/Component Description SFP/Port Optics Click to view the SFP/Port Optic information: • TX Power — The power transmitted to the SFP in dBm and uWatts. • RX Power — The power received from the port in dBm and uWatts. • Transceiver Temp (C) — The temperature of the SFP transceiver. • Voltage (mVolts) — The voltage across the port in mVolts. • Transceiver Current (mAmps) — The laser bias current value in mAmps.
E Host properties Viewing adapter port properties To view adapter port properties, complete the following steps. 1. Right-click an HBA icon and select Show Ports. 2. Right-click the port and select Properties, or double-click the port. Fields containing a green triangle ( ) in the lower right corner are editable. The HBA_Port Properties dialog box displays. Table 31 details the properties of the selected port.
Host properties TABLE 31 E Adapter port properties (Continued) Field Description WWN Source The source of the world wide name. Options include: Fabric — The WWN is assigned from the fabric. The fabric assigned address must be enabled. Factory — The WWN is assigned at the factory. Hyper-V Virtual FC Indicates if the port is a Hyper-V virtual FC port. For non-virtual ports, the field displays as N/A. NOTE: This property is applicable only to Windows server’s version 2012 and later.
E Host properties TABLE 31 Adapter port properties (Continued) Field Description FCSP Status Whether FC-SP authentication is being used. Algorithm The configured authentication algorithm. Group The DH group, which is DH-null (group 0), which is the only option. Error Status The health status of the Fibre Channel Security Protocol parameters. QoS Configured QoS State Indicates whether QoS is enabled or disabled. Operating QoS State Indicates whether QoS is on or off.
Properties customization E Properties customization NOTE Properties customization requires read and write permissions to the Properties - Add / Delete Columns privilege. You can customize the product Properties dialog boxes by creating user-defined product and port properties. You can also edit or delete user-defined properties, as needed. You can create up to three user-defined property labels from the Properties dialog box for each of the following object types: product and port properties.
E Properties customization Fields containing a green triangle ( ) in the lower right corner are editable. To edit a field with a green triangle ( ), click in the field and make your changes. To edit a user-defined property, complete the following steps. 1. Right-click any product icon and select Properties. The Properties dialog box displays. 2. Select the tab on which you want to edit a property, if necessary. 3. Click Edit > Property_Label. The Edit Property dialog box displays. 4.
Properties customization E 4. Click OK.
E 1476 Properties customization Brocade Network Advisor IP User Manual 53-1003153-01
Appendix F Regular Expressions In this appendix This appendix presents a summary of Unicode regular expression constructs that you can use in the Management application. • Characters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Character classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Predefined character classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
F Regular Expressions TABLE 1 Matches \e The escape character ('\u001B') \cx The control character corresponding to x TABLE 2 Character classes Construct Matches [abc] a, b, or c (simple class) [^abc] Any character except a, b, or c (negation) [a-zA-Z] a through z or A through Z, inclusive (range) [a-d[m-p]] a through d, or m through p: [a-dm-p] (union) [a-z&&[def]] d, e, or f (intersection) [a-z&&[^bc]] a through z, except for b and c: [ad-z] (subtraction) [a-z&&[^m-p]] a through z
Regular Expressions TABLE 4 POSIX character classes (US-ASCII only) Construct Matches \p{Blank} A space or a tab: [ \t] \p{Cntrl} A control character: [\x00-\x1F\x7F] \p{XDigit} A hexadecimal digit: [0-9a-fA-F] \p{Space} A whitespace character: [ \t\n\x0B\f\r] TABLE 5 java.lang.Character classes (simple java character type) Construct Matches \p{javaLowerCase} Equivalent to java.lang.Character.isLowerCase() \p{javaUpperCase} Equivalent to java.lang.Character.
F Regular Expressions TABLE 8 Construct Matches X? X, once or not at all X* X, zero or more times X+ X, one or more times X{n} X, exactly n times X{n,} X, at least n times X{n,m} X, at least n but not more than m times TABLE 9 Reluctant quantifiers Construct Matches X?? X, once or not at all X*? X, zero or more times X+? X, one or more times X{n}? X, exactly n times X{n,}? X, at least n times X{n,m}? X, at least n but not more than m times TABLE 10 Possessive quantifiers Co
Regular Expressions TABLE 12 F Back references Construct Matches \n Whatever the nth capturing group matched Quotation \ Nothing, but quotes the following character \Q Nothing, but quotes all characters until \E \E Nothing, but ends quoting started by \Q TABLE 13 Special constructs (non-capturing) Construct Matches (?:X) X, as a non-capturing group (?idmsux-idmsux) Nothing, but turns match flags on–off (?idmsux-idmsux:X) X, as a non-capturing group with the given flags on–off (?=X)
F 1482 Regular Expressions Brocade Network Advisor IP User Manual 53-1003153-01
Appendix G CLI Templates In this appendix The Management application provides preconfigured Configuration templates for IronWare and Network OS devices. By default, all preconfigured templates are configure to prompt for additional targets during manual deployment. The preconfigured templates include the following: • HyperEdge – Stack Enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • HyperEdge – Stack Disable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
G CLI Templates • Network OS – Configure RX Symbol Errors Monitor . . . . . . . . . . . . . . . . . • Network OS – Configure Standard L2 Access List . . . . . . . . . . . . . . . . . . • Network OS – Create CoS Mutation Map. . . . . . . . . . . . . . . . . . . . . . . . . . • Network OS – Create LLDP Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Network OS – Create Port Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Network OS – Create Traffic Class Map . .
CLI Templates G • IronWare OS VLAN – Configure virtual routing interface . . . . . . . . . . . . . 1497 • IronWare OS VLAN – Enable Spanning Tree Protocol on IOS VLAN . . . . . 1497 • IronWare OS VLAN – Disable Spanning Tree Protocol on IOS VLAN. . . . 1498 • Network OS VLAN – VLAN Interface Creation . . . . . . . . . . . . . . . . . . . . . 1498 • Network OS VLAN – VLAN Interface Deletion . . . . . . . . . . . . . . . . . . . . . 1498 • Network OS VLAN – Layer2 Switch Port Configuration . . . . . . . . .
G CLI Templates TABLE 19 Feature HyperEdge – Stack Trunk Deletion Description HyperEdge To delete stacking trunks.
CLI Templates TABLE 27 IronWare OS – Configure L2-Access-List Feature Description CLI Commands ACL access-list $ deny $ $ any access-list $ deny any $ $ access-list $ permit $ $ any access-list $ permit any any no access-list $ permit any any no access-list $ permit $ $ any
G CLI Templates TABLE 31 Feature Description CLI Commands MCT Delete cluster. no cluster $ $ no vlan $ no vlan $ TABLE 32 MCT Client Creation Feature Description CLI Commands MCT Create a cluster client.
CLI Templates TABLE 36 G MPLS – Endpoint Configuration Feature Description CLI Commands MPLS Used to configure MPLS endpoints. Disable FDP, CDP as they are not supported in MPLS endpoints.
G CLI Templates TABLE 39 Network OS – Configure Extended L2 Access List Feature Description CLI Commands ACL This template is used to configure an extended L2 ACL on Network OS products running 3.0 or later.
CLI Templates TABLE 42 G Network OS – Configure RX Missing Terminations Characters Monitor Feature Description CLI Commands Network OS This template is used to configure threshold and alert values for RX Missing Termination Characters monitoring. Possible values for timebase are day, hour, minute and none. Buffer value cannot be more than average of high plus low threshold. Supported Values for High and Low Threshold Action Parameters are email, raslog, all, and none.
G CLI Templates TABLE 46 Feature Description CLI Commands QoS This template is used to create LLDP profile and configure LLDP profile parameters protocol lldp profile $ description $ hello $ multiplier $ advertise dcbx-fcoe-logical-link-tlv advertise dcbx-fcoe-app-tlv TABLE 47 Network OS – Create Port Profile Feature Description CLI Commands AMPP Creates the port profile and its sub profile.
CLI Templates TABLE 50 G Network OS – Create VLAN Classifier Rule Feature Description CLI Commands QoS This template is used to create a protocol-based or MAC address-based VLAN classifier rule vlan classifier rule $ $ TABLE 51 Network OS – Delete Port Profiles Feature Description CLI Commands AMPP Removes the port profile.
G CLI Templates TABLE 55 Feature Description CLI Commands VLAN To configure PVLAN type (Isolated, community or primary) to a VLAN. interface vlan $
CLI Templates TABLE 62 G Private VLAN – Map primary and secondary VLAN to promiscuous port Feature Description CLI Commands VLAN To assign Primary Vlan to Promiscuous port. This command also maps a Promiscuous port to selected secondary VLANs.
G CLI Templates TABLE 68 Feature Description CLI Commands VLAN To display the private vlan status. show vlan private-vlan TABLE 69 VRF – VRF Creation Feature Description CLI Commands VRF To create VRF in specific RBridge. rbridge-id $ vrf $ TABLE 70 VRF – VRF Deletion Feature Description CLI Commands VRF To delete VRF from specific RBridge.
CLI Templates TABLE 75 VRF – Display VRF Information Feature Description CLI Commands VLAN To display the VRF details. show vrf detail show vrf rbridge-id $ show vrf $ TABLE 76 IronWare OS VLAN – Remove interfaces from VLAN as untagged Feature Description CLI Commands VLAN To remove interfaces from the VLAN as untagged.
G CLI Templates TABLE 84 Feature Description CLI Commands VLAN To disable spanning tree protocol on VLAN. vlan $ no spanning-tree TABLE 85 Network OS VLAN – VLAN Interface Creation Feature Description CLI Commands VLAN To create a VLAN Interface. interface vlan $ TABLE 86 Network OS VLAN – VLAN Interface Deletion Feature Description CLI Commands VLAN To delete a VLAN Interface.
CLI Templates TABLE 91 G Network OS VLAN – Disable Native VLAN Configuration Feature Description CLI Commands VLAN To disable native VLAN from a trunk interface. interface tengigabitethernet $ no switchport trunk native-vlan $ TABLE 92 Network OS VLAN – Access Interface Configuration Feature Description CLI Commands VLAN To configure the interface as an access interface.
G 1500 CLI Templates Brocade Network Advisor IP User Manual 53-1003153-01
Appendix H Troubleshooting In this appendix • Application Configuration Wizard troubleshooting . . . . . . . . . . . . . . . . . • Browser troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Client browser troubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Configuration backup and restore troubleshooting . . . . . . . . . . . . . . . . • Element Manager troubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
H Application Configuration Wizard troubleshooting Application Configuration Wizard troubleshooting The following section states a possible issue and the recommended solution for Management application Configuration Wizard errors. Problem Resolution Unable to launch the Management application Configuration Wizard on a Windows Vista, Windows 7,or Windows 2008 R2 system The Windows Vista, Windows 7,or Windows 2008 R2 system enables the User Access Control (UAC) option by default.
Client browser troubleshooting H Client browser troubleshooting The following section states a possible issue and the recommended solution for client browser errors. Problem Resolution Downloading Client from a Internet Explorer Browser over HTTPS • If the JNLP file does not launch automatically, use one of the following options: Complete the following steps. 1 Save the JNLP file to the local host. 2 Launch the JNLP file manually. • In Internet Explorer 7, complete the following steps.
H Firmware download troubleshooting Problem Resolution Unable to launch Element Manager from the Management application. To launch Element Manager from the Management application, your local system's browser must run the Java Web Start application. To turn on Java content in the browser, complete the following steps. 1 Launch Java Control Panel. For Windows: Refer to http://java.com/en/download/help/win_controlpanel.xml. For Linux: Follow the steps listed. a Open the Terminal window.
Launch Client troubleshooting H Launch Client troubleshooting The following section states a possible issue and the recommended solution if you are unable to launch the remote client. Problem Resolution Remote client does not upgrade from versions prior to 11.0. The remote client does not automatically upgrade when you select the remote client shortcut of client versions earlier than 11.0. To clear the old client and launch the new remote client version, complete the following steps.
H Launch Client troubleshooting Problem Resolution Unable to log into the Client (the application does not launch when you use a valid user name and password and exceptions are thrown in the client side). Use one the following procedures to configure the IP address in the host file. Windows operating systems 1 Log in using the 'Administrator' privilege. 2 Select Start > Run. 3 Type drivers in the Open field and press Enter. 4 Go to the ‘etc’ folder and open the ‘hosts’ file using a text editor.
Master Log and Switch Console troubleshooting H Master Log and Switch Console troubleshooting The following section states a possible issue and the recommended solution for switch console errors. Problem Resolution Too many login and log messages received on switch console and and Master Log due to lazy polling. NOTE: This setting cannot be disabled for DCB switches. To disable lazy polling, complete the following steps. 1 Select Discover > IP Products. The Discover Setup - IP dialog box displays.
H Professional edition login troubleshooting Professional edition login troubleshooting The following section states a possible issue and the recommended solution for Professional edition login errors. TABLE 96 Professional edition login troubleshooting Problem Resolution Login Failed. Only one client allowed. One client session is active or has not yet timed out.
Server Management Console troubleshooting H Server Management Console troubleshooting The following section states a possible issue and the recommended solution for server management console errors. Problem Resolution Unable to launch the SMC on a Windows Vista,Windows 7 , or Windows 2008 R2 system The Windows Vista,Windows 7,or Windows 2008 R2 system enables the User Access Control (UAC) option by default. When the UAC option is enabled, the SMC cannot launch.
H Supportsave troubleshooting Problem Resolution Unable to launch the SMC on a Windows Vista or Windows 7 system continued Disable using the Group Policy by completing the following steps. You can perform this procedure on you local machine using Local Group Policy editor or for many computers at the same time using the Active Directory-based Group Policy Object (GPO) editor. To disable using the Local Group Policy editor, complete the following steps.
Technical support data collection troubleshooting H Technical support data collection troubleshooting The following section states a possible issue and the recommended solution for technical support data collection errors.
H TABLE 97 Zoning troubleshooting Wireless troubleshooting Problem Master log warning message The Management application successfully registers itself as syslog recipient on the wireless controller as the secondary or ternary recipient (primary slot is already occupied). The wireless controller sends syslog messages to secondary or ternary recipients only if primary recipient is not reachable.
Appendix I Database Fields In this appendix • Database tables and fields. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1513 • Views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1751 Database tables and fields NOTE The primary keys are marked by an asterisk (*) TABLE 16 ACH_CALL_CENTER Field Definition Format ID * Unique generated database identifier. int NAME Name of the Call Center.
I Database tables and fields TABLE 18 Definition Format Size TYPE Type of the event. varchar 256 CONTRIBUTOR_PATTERN Indicates the Contributor pattern to be used for searching the event contributor in event description. In some cases, FOS uses same message id for different events (e.g MAPS events). To increase the filtering capability of Call Home events, this contributor pattern string is used along with message id.
I Database tables and fields TABLE 23 ADAPTER_DRIVER_FILE_DETAILS Field Definition Format ID Unique generated database identifier.
I Database tables and fields TABLE 27 AOR_DEVICE_MAP Field Definition Format AOR_ID ID of AOR int DEVICE_ID The DEVICE ID can be IP Product or ServerIron ID which is in the AOR int TABLE 28 AOR_FABRIC_MAP Field Definition Format AOR_ID ID of AOR int FABRIC_ID FABRIC ID which is in the AOR int TABLE 29 Definition Format AOR_ID ID of AOR int HOST_ID HOST ID which is in the AOR int Definition Format AOR_ID ID of AOR int PORT_GROUP_ID IP of port group int Definition For
I Database tables and fields TABLE 33 AVAILABLE_FLYOVER_PROPERTY Field Definition Format ID* Unique generated database identifier. int NAME Name of the available property to be included in the flyover display. varchar TYPE Indicates the flyover property type. Product property is 0, Connection property is 1, User Defined property is 2, Cee Product property is 3, Cee Connection property is 4, Host property is 5.
I Database tables and fields TABLE 35 BIRTREPORT_RUN_TEMPLATE (Continued) Field Definition Format Size REPORT_TEMPLATE_TITLE Report Template title. This name is the same as the title name in the REPORT_TEMPLATE table. There is no foreign key relation here as the user may delete and add a template but the schedule should still hold good if looked up by title. Also title is unique in the REPORT_TEMPLATE table. varchar 256 NAME Name of the generated report file.
I Database tables and fields TABLE 37 BIRTREPORT_SCHEDULE_PARAMETER Field Definition Format ID The primary key of the table. int BIRTREPORT_SCHEDULE_T EMPLATE_ID Id of birtreport_schedule_template table. int BIRTTEMPLATE_PARAMETE R_ID Id of birttemplate_parameter table. int PARAM_VALUE Value of the parameter. varchar 256 PARAM_DISPLAY_VALUE Displays value of the parameter.
I Database tables and fields TABLE 41 BOOT_IMAGE_FILE_DETAILS_ Field Format ID int DRIVER_MAPPING_ID int BOOT_IMAGE_NAME Name of Boot Image file varchar MAJOR_VERSION Major Version bit from Boot Image file smallint MINOR_VERSION Minor Version bit from Boot Image file smallint MAINTENANCE Maintenance Version bit from Boot Image file smallint PATCH Patch Version bit from Boot Image file varchar IMPORTED_DATE Imported date of Boot Image file timestamp RELEASE_DATE Release date of B
I Database tables and fields TABLE 45 CARD (Continued) Field Definition Format SLOT_NUMBER The number of the physical slot in the chassis where the blade is plugged in. For fixed blades, SlotNumber is zero. smallint TYPE ID of the blade to identify the type. smallint EQUIPMENT_TYPE The type of the blade. It is either SW BLADE or CP BLADE. varchar 32 STATE State of the blade, such as ENABLED or DISABLED. varchar 32 POWER_STATE State of power supply to the blade.
I Database tables and fields TABLE 45 CARD (Continued) Field Definition Format Size CP_HA_STATE CP’s HA state information like Active/Stand by. varchar 128 ETHERNET_IPV6_ADDRESS IPV6 address of Ethernet management port for the blade. varchar 64 ETHERNET_IPV6_GATEWAY IPV6 Gateway address of Ethernet management port for the blade. varchar 64 NUMBER_OF_PORTS HEADER_VERSION The OEM or vendor-assigned version number. int GIGE_MODE Determines the port operating mode for GE ports.
I Database tables and fields TABLE 50 CEE_PORT Field Definition Format ID Unique generated database identifier.
I Database tables and fields TABLE 51 CFG_BACKUP_ARCHIVE (Continued) Field Definition Format Size DATE_TIME The date and time at which the configuration has been backedup. The date and time will be saved in the following format "Mon May 10 17:59:13 PDT 2010". varchar 64 varchar 64 FILE_NAME IS_BASELINE Indicates if the configuration file is selected by user as baselined configuration or not. num (1,0) DESCRIPTION Brief comments and description about this configuration.
I Database tables and fields TABLE 53 CLI_TEMPLATE (Continued) Field Definition Format Size DEVICE_PASSWORD varchar 256 DATE_TIME varchar 64 DEVICE_ENABLE_USERNA ME varchar 256 DEVICE_ENABLE_PASSWOR D varchar 256 CLI_FILTER varchar HAS_PARAMETERS num (1,0) PROMPT_ADDITIONAL_TAR GET The flag to indicate whether or not to prompt for additional targets during deployment. 1 = Prompt for additional targets. 0 =Do not prompt for additional target.
I Database tables and fields TABLE 55 Field Definition Format ID * Unique generated database identifier. int NAME Name of the column. It is used as column header in product list and property name in property sheet(SAN and IP) varchar 255 ENTITY_CATEGORY Holds the type of the entity to whom the column name belongs to like Port, Fabric, IPProduct, VCSInterface, etc' varchar 128 COLUMN_INDEX Used to differentiate user defined columns and static columns.
I Database tables and fields TABLE 60 CNA_ETH_PORT Field Definition Format ID ID of the Eth port int ETH_DEV Ethernet device varchar ETH_LOG_LEVEL Log level for the Ethernet device. Possible values are 0 - Log Invalid 1 - Log Critical 2 - Log Error 3 - Log Warning 4 - Log Info int NAME Name of the port varchar 256 MAC_ADDRESS MAC Address varchar 64 IOC_ID IO controller ID. The default value is 0.
I Database tables and fields TABLE 62 Definition Format Size MAX_BANDWIDTH Maximum guaranteed bandwidth. Value will be in Gbps (1 to 10). varchar 64 MIN_BANDWIDTH Minimum guaranteed bandwidth. Value will be in Gbps (0 to 10). int PORT_NUMBER Physical port number of adapter. int PORT_TYPE Type of this port. For example, ETH. varchar CREATION_TIME Creation time of this DB record. timestamp CONFIGURATION_STATUS Indicates current configuration status of the port.
I Database tables and fields TABLE 65 COLLECTOR_MIB_OBJECT_ENTRY Field Definition Format COLLECTOR_MIB_OBJECT_ ENTRY_ID Primary key autogenerated ID. int COLLECTOR_ID ID of the PERF_COLLECTOR. int MIB_OBJECT_ID MIB_OBJECT table DB ID. int TABLE 66 COLLECTOR_SNMP_EXPRESSION_ENTRY Field Definition Format COLLECTOR_SNMP_EXPRE SSION_ENTRY_ID Primary key autogenerated ID. int COLLECTOR_ID ID of the PERF_COLLECTOR. int EXPRESSION_ID Id of the SNMP_EXPRESSION.
I Database tables and fields TABLE 69 Field Definition Format ID Condition ID. int NAME Name of the condition. varchar 255 DESCRIPTION Description of the condition. varchar 1024 REMEDIATION Remediation details for failed conditions. text USE_REGEX Indicates whether the condition lines are built with regular expression or not. 0 = Does not contain Regular expression 1 = Contains regular expression smallint MATCH The device config should Match or Not match with condition.
I Database tables and fields TABLE 70 CORE_SWITCH (Continued) Field Definition Format UNREACHABLE_TIME Time when the switch becomes unreachable. timestamp OPERATIONAL_STATUS Chassis operational status like FRU, Power Supply etc.. varchar CREATION_TIME Core switch record creation time. This tells us when the intial discovery has happened. timestamp LAST_SCAN_TIME Last scan time tells the time when the last time the switch was polled.
I Database tables and fields TABLE 70 Definition Format Size NAT_PRIVATE_IP_ADDRESS NAT private IP Address. Feature available from NMS DC Eureka release onwards. During a successful NAT translation the Private IP that gets translated will be stored in this field. The new translated IP Address will be stored in the existing IP_ADDRESS field. All the NAT look up will be done using the NAT Private IP Address. varchar 128 ALTERNATE_IP_ADDRESS Alternate IP address of the switch.
I Database tables and fields TABLE 74 CORE_SWITCH_DETAILS (Continued) Field Definition Format Size FC_MASK FC IP Address ethernet mask. char 64 FC_IP Fibre Channel IP address. char 64 FC_CERTIFICATE FC IP Address. smallint SW_LICENSE_ID License ID of the chassis. char 23 SUPPLIER_SERIAL_ NUMBER Supplier serial number for the switch. varchar 32 PART_NUMBER Partnumber of the switch varchar 32 CHECK_BEACON Denotes if Switch Beacon is enabled or not on the switch.
I Database tables and fields TABLE 74 Definition Format Size VENDOR_VERSION Required by integrated SMI agent to populate Brocade_Product.Version property. varchar 32 VENDOR_PART_NUMBER Required by integrated SMI agent to populate Brocade_Product.SKUNumber property. varchar 32 SNMP_INFORMS_ENABLED Flag to denote whether SNMP informs option in the switch is enabled or disabled. Default value is 0. smallint RNID_SEQUENCE_NUMBER RNID sequence number for the switch.
I Database tables and fields TABLE 76 CRYPTO_LUN Field Definition Format ID Unique generated database identifier. int CRYPTO_TARGET_CONTAI NER_ID Foreign key reference to the CRYPTO_TARGET_CONTAINER that contains the host for which these LUNs are configured. int SERIAL_NUMBER The LUN serial number, used to identify the physical LUN. varchar ENCRYPTION_STATE Boolean. • True (1) if LUN is being encrypted. • False (0) if cleartext. The default value is 0.
I Database tables and fields TABLE 76 1536 CRYPTO_LUN (Continued) Field Definition Format DECRYPT_EXISTING_DATA Not used. When configuring disk LUN that was previously encrypted and is to become cleartext, this property tells the switch whether or not to start a re-keying operation to decrypt the existing LUN data. This property does not need to be persisted. This feature is no longer supported in FOS.
I Database tables and fields TABLE 76 CRYPTO_LUN (Continued) Field Definition Format Size NEW_LUN_TYPE This field indicates the role of the LUN configured in the SRDF mode. The values could be R1, R2 or UNKNOWN. Feature available only from 6.4 release onwards and for RSA key vaults. CryptoLuncollector fills in this value. varchar 64 DISABLE_WRITE_EARLY_A CK This variable indicates whether write early acknowledgement is enabled (if value is 0) or disabled (if value is 1).
I Database tables and fields TABLE 77 Definition Format PRIMARY_VAULT_LINK_ STATUS The status of the link key for the primary key vault. Link keys are used only for NetApp LKM key vaults. For possible values, see the enum definition in the DTO class. Default value is 0. smallint BACKUP_VAULT_LINK_ STATUS The status of the link key for the backup key vault. Link keys are used only for NetApp LKM key vaults. For possible values, see the enum definition in the DTO class. Default value is 0.
I Database tables and fields TABLE 78 CRYPTO_TARGET_CONTAINER (Continued) Field Definition Format FAILOVER_STATUS Indicates whether this container''s target is being encrypted by the encryption engine on which the container is configured (value 0) or by another encryption engine in the HA Cluster (value 1). Default value is 0.. smallint FAILOVER_STATUS_2 Failover status from the HA Cluster peer.
I Database tables and fields TABLE 80 Definition Format LAST_OPENED_TIME Time when dashboard was last opened. timestamp SHARED Indicates whether the dashboard is shared. 0 Not Shared 1 - Shared. int TABLE 81 Size DASHBOARD_CANVAS Field Definition Format ID Dashboard Canvas ID. int NAME Name of the Dashboard canvas. varchar 128 DESCRIPTION Description of the dashboard canvas.
I Database tables and fields TABLE 83 DASHBOARD_PROVIDER Field Definition PROVIDER_GROUP The Group to which the Provider belong to. varchar Similar providers will have same group name. PROVIDER_ORDER The order of execution passed to the Job Executor framework. Provider belong to same group will have different order number. Default: 0 TABLE 84 Format Size 128 int DASHBOARD_WIDGET Field Definition Format ID ID of the dashboard widget. Auto incremented.
I Database tables and fields TABLE 84 Definition Format installation_type Indicates the widgets is SAN Only (0) / IP Only (1) / SAN_IP (2)' int shared_provider Can the provider be shared? 0 - Not Shared 1 - Shared. int TABLE 85 Size DASHBOARD_WIDGET_PREFERENCE Field Definition Format ID Auto incremented widget preference ID. int WIDGET_ID Foreign Key to DASHBOARD_WIDGET(ID). int USER_ID Foreign Key to USER_ (ID). int DASHBOARD_ID Foreign Key to DASHBOARD(ID).
I Database tables and fields TABLE 86 DEFAULT_FAVORITES (Continued) Field Definition Format Size MAIN_MEASURE The Additional measures based on the FAVORITE.MAIN_MEASURE varchar 40 ADDITIONAL_MEASURE The Additional measures based on the FAVORITE.MAIN_MEASURE int TABLE 87 DEFAULT_WIDGET_PREFERENCE Field Definition Format ID Auto incremented Dashboard Widget Preference ID. int dashboard_id Foreign Key to DASHBOARD(ID). int widget_id Foreign Key to DASHBOARD_WIDGET(ID).
I Database tables and fields TABLE 88 DEPLOYMENT_CONFIGURATION (Continued) Field Definition Format SNAPSHOT_ENABLED 1 indicates that snapshot is applied to the configuration smallint CLI_TEMPLATE_ID Identifies the CLI template details.
I Database tables and fields TABLE 90 DEPLOYMENT_PRODUCT_STATUS (Continued) Field Definition Format PRODUCT_ID This record will be per product. Hence this will have the id of the product. int PRODUCT_TYPE_ID Foreign Key references TARGET_TYPE(id). This identifies the PRODUCT_ID. (Whether it is switch, device, etc). int STATUS Indicated the product deployment status 1-Aborted 2-Succesful 3-Partial Failure 4-Failed smallint MESSAGE Message to be displayed in the report.
I Database tables and fields TABLE 93 Field Definition Format ID Unique generated database identifier. serial DEPLOYMENT_CONFIGU RATION_ID Foreign Key References DEPLOYMENT_CONFIGURATION (id) Identifies the deployment configuration this row is applied int TARGET_ID Identifies the target.
I Database tables and fields TABLE 94 DEVICE (Continued) Field Definition Format Size TAC_USER_NAME User name for TACACS access. varchar 512 TAC_PASSWORD Password for TACACS access. varchar 512 TACPLUS_USER_NAME User name for TACACS+ access. varchar 512 TACPLUS_PASSWORD Password for TACACS+ access. varchar 512 IS_ROUTER Flag to identify whether the device is router or not. num (1,0) IS_SLB Flag to identify whether the device supports server load balancing or not.
I Database tables and fields TABLE 94 1548 DEVICE (Continued) Field Definition Format Size TAC_USERNAME_PORT_CFG TACACS username for port configuration. varchar 512 TAC_PASSWORD_PORT_CFG TACACS password for port configuration. varchar 512 TAC_USERNAME_READ_ONLY TACACS username for read only access. varchar 512 TAC_PASSWORD_READ_ONLY TACACS password for read only access. varchar 512 TACPLUS_USERNAME_PORT_CFG TACACS+ username for port configuration.
I Database tables and fields TABLE 94 DEVICE (Continued) Field Definition Format Size SYSLOG_REGISTERED This flag is to indicate whether the device is registered DCM as its syslog destination server. • 0 indicates not registered. • 1 indicates registered. num 1 TRAP_REGISTERED This flag is to indicate whether the device is registered DCM as its SNMP trap destination server. • 0 indicates not registered. • 1 indicates registered.
I Database tables and fields TABLE 94 1550 DEVICE (Continued) Field Definition Format IS_DCB_SWITCH This column is used to flag whether the device is num a DCB Switch or not. Value 0 indicates that this is not a DCB switch device and hence that is the default value and value 1 indicates that this is a DCB device. The values will be populated by the DCB collector during the discovery of the DCB switch. PRODUCT_FAMILY Record the product family as "BI", "EI", "FGS/FLS/STK".
I Database tables and fields TABLE 94 DEVICE (Continued) Field Definition Format VCS_ID This column is used to store the VCS ID of the device. The value will be populated by the NosSwitchAssetCollector during the discovery of the VCS Cluster. The non zero value will be stored as VCS ID. Default value is -1. smallint VCS_LICENSED Indicates whether the cluster device has VCS license or not. Possible values are 0 for not applicable, 1 for licensed, 2 for not licensed. 0 is default.
I Database tables and fields TABLE 94 Definition Format Size USER_DEFINED_VALUE_1 User defined value used for product. varchar 256 USER_DEFINED_VALUE_2 User defined value used for product. varchar 256 USER_DEFINED_VALUE_3 User defined value used for product. varchar 256 CLUSTER_MEMBER_STATE Indicates the state of the member in Fabric Cluster and logical chassis. States can be Online, Offline, Rejoining etc.. For all other devices this column will be empty.
I Database tables and fields TABLE 95 DEVICE_CONNECTION (Continued) Field Definition Format MISSING_TIME Time from which the device connection has been missing. timestamp TRUSTED Indicates if the device connection is trusted or not. int TABLE 96 Size DEVICE_ENCLOSURE Field Definition Format ID* Unique generated database identifier. int NAME Name of the Device enclosure. varchar 256 TYPE Type of Device enclosure - Storage Array/Server. varchar 32 ICON Type of Icon.
I Database tables and fields TABLE 96 Definition Format CREATION_TIME Time when enclosure was created. Default is ’now()’. timestamp MISSING Flag to indicate missing enclosure. Default value is 0. smallint MISSING_TIME Time when the enclosure is found to be missing. timestamp HOST_NAME Host Name corresponding to the Device Enclsoure. varchar SYSLOG_REGISTERED SysLog flag that indicates if syslog has been enabled or not.
I Database tables and fields TABLE 98 DEVICE_FDMI_DETAILS Field Definition Format DEVICE_NODE_ID Device node id for the FDMI device node. This column refers to the device_node tables primary key int SERIAL_NUMBER Holds the serial number of the device available via FDMI varchar 128 FIRMWARE_VERSION Holds the firmware version of the device available via FDMI ex: 2.1.0.2 varchar 64 DRIVER_VERSION Holds the driver version of the device available via FDMI, ex: 2.1.0.
I Database tables and fields TABLE 100 DEVICE_GROUP_ENTRY Field Definition Format DEVICE_GROUP_ID Database ID of the DEVICE_GROUP instance which the device is member of. int DEVICE_GROUP_ENTRY_ID Unique database auto generated identifier. int DEVICE_ID Database ID of the member DEVICE. int TABLE 101 DEVICE_GROUP Field Definition Format DEVICE_GROUP_ID Primary key for this table. int NAME Name of this device group.
I Database tables and fields TABLE 103 DEVICE_NODE (Continued) Field Definition Format Size TYPE Initiator or target or both or unknown. The possible values are Initiator, Target, Initiator+Target, Unknown(Initiator or Target) varchar 32 DEVICE_TYPE 0 = physical 1 = virtual 2 = NPV 3 = iSCSI 4 = both physical & virtual smallint SYMBOLIC_NAME Device node symbolic name. varchar 256 FDMI_HOST_NAME Device node FDMI host name. varchar 128 VENDOR Device node vendor.
I Database tables and fields TABLE 104 DEVICE_PORT Field Definition Format Size PORT_ID Stores the FDMI host name. varchar 6 TYPE Stores the Vendor of this device. varchar 32 SYMBOLIC NAME Stores the Symbolic Name. varchar 256 varchar 64 varchar 16 varchar 63 32 FC4_TYPE COS Stores the Class of Service. IP_PORT HARDWARE_ADDRESS Stores the Hardware Address. varchar TRUSTED Denotes if the device port is trusted or not. smallint CREATION_TIME The creation time of this record.
I Database tables and fields TABLE 105 DEVICE_PORT_GIGE_PORT_LINK (Continued) Field Definition Format VIRTUAL_FCOE_PORT_ID The value of virtual_fcoe_port_id in the Device_Port_Gige_Port_Link table is applicable only for NOS devices. For FOS devices, the virtual_fcoe_port_id value, will be null, as currently in the Management application that mapping data is not collected. Hence the default value is null. int LAG_ID LAG interface ID which associates port channel with end device.
I Database tables and fields TABLE 108 1560 ENCRYPTION_ENGINE (Continued) Field Definition Format STATUS Not used. Previously used to indicate the engine''s operational status. Replaced by EE_STATE. The default value is 0. smallint HA_CLUSTER_ID Foreign key reference to an HA_CLUSTER record. Identifies the HA Cluster that this engine belongs to. Null if this engine does not belong to an HA Cluster.
I Database tables and fields TABLE 108 ENCRYPTION_ENGINE (Continued) Field Definition Format Size LINK_STATE Local EE State says whether link is down or up varchar 256 REBALANCE_REQUIRED This field indicates whether a rebalance operation is required on the Encryption Engine. It can take two values, One(1) indicating that rebalance is required on the Encryption Engine and zero(0) indicating that no rebalance is required on the Encryption Engine.
I Database tables and fields TABLE 109 1562 ENCRYPTION_GROUP (Continued) Field Definition Format ACTIVE_MASTER_KEY_ STATUS The operational status of the "master key" or "Key Encryption Key (KEK)" used to encrypt Data Encryption Keys in a key vault. Not used for Decru LKM key vaults. 0 = not used, 1 = required but not present, 2 = present but not backed up, 3 = okay. The default value is 0.
I Database tables and fields TABLE 110 ENCRYPTION_GROUP_MEMBER Field Definition Format ID Unique generated database identifier.
I Database tables and fields TABLE 112 Definition Format TAPE_POOL_OPERATION_MODE Specifies which type of encryption should be used by tape volumes in this tape pool. 0 = Native, 1 = DF-compatible smallint TAPE_POOL_POLICY Specifies whether tape volumes in this tape pool should be encrypted. 0 = encrypted, 1 = cleartext smallint KEY_EXPIRATION Number of days each data encryption key for this tape pool should be used.
I Database tables and fields TABLE 115 EVENT (Continued) Field Definition Format Size ACKNOWLEDGED Indicates whether the user has acknowledged the event or not. Possible values: Unacknowledged-0 , Acknowledged-1. smallint SOURCE_NAME This field indicates the name of the source that triggered the event. This could be the name of the source switch or name of the Management application server in the case of application events.
I Database tables and fields TABLE 116 EVENT_CALL_HOME Field Definition Format ID Unique generated database identifier. int EVENT_ID Database ID of the EVENT instance. int EVENT_NUMBER Indicates the Event Number for the event from the Events.html of the associated product . int FRU_CODE Indicates the Field Replaceable Unit code of the Call Home event. int REASON_CODE Indicates the reason code of the Call Home event. int FRU_POSITION Indicates the FRU position of the Call Home event.
I Database tables and fields TABLE 119 EVENT_DETAILS (Continued) Field Definition Format UNIT Indicates the Unit number of the Chassis from which the event was triggered. smallint SLOT Indicates the blade or the slot number in which the port is present. int PORT indicates the switch port number for which the event was generated. int PRODUCT_ADDRESS Indicates the IP Address of the Product from which the event is originated. varchar RAS_LOG_ID Indicates the RASLOG Id of the RASLOG event.
I Database tables and fields TABLE 121 EVENT_INSTANCE (Continued) Field Definition Format Size STRING_PATTERN A Regular expression pattern string which can be used to match an Event instance. varchar 1024 CATEGORY A small integer which identifies the Category of an Event instance. 0 - Unknown 1 - Product Event 2- Link Incident Event 3 - Product Audit Event 4- Product Status Event 5 Security Event 6- User Action Event 7- Management Server Event. The default value is 0.
I Database tables and fields TABLE 123 EVENT_NOTIFICATION (Continued) Field Definition Format NOTIFICATION_UNIT Time interval Unit: 0 = Seconds 1 = Minutes 2 = Hours Default value is 0. smallint TEST_OPTION Time interval Unit: 0 = Send test to configured e-mail address. 1 = Send test to all enabled users. Default value is 0. smallint SSL_ENABLED Default value is 0.
I Database tables and fields TABLE 125 Definition Format EVENT_ORIGIN 0- SNMP Trap 1- Application Event 2- Pseudo Event 3Snort 4- Pseudo Event 5- Custom Event smallint PROPERTIES The property string which is used to define various parameters that are associated with an Event Policy such as flapping time and durations etc varchar TABLE 126 Size 2048 EVENT_POLICY_SOURCE_ENTRY Field Definition Format ID Unique generated database identifier.
I Database tables and fields TABLE 128 EVENT_RULE Field Definition Format ID* Unique generated database identifier. int NAME Name of the Event Rule. varchar Event Rule Type: 0 = Port Offline 1 = PM Threshold crossed 2 = Security Violation 4 = Event int DESCRIPTION Description about the Event Rule. varchar 512 OPERATOR1 AND operator used to append the rule. varchar 12 EVENT_TYPE_ID The Selected Event type ID from the Event type combo box.
I Database tables and fields TABLE 129 Definition Format Size NAME Name of the Event Rule Action: • Launch Script = for launch script • Send E-mail = for send e-mail • Raise Event = for broadcast message varchar 255 TYPE Name of the action: • script = for Launch Script • e-mail = for E-mail • message = for Broadcast message varchar 30 FIELD1 Data for the selected action. varchar 512 FIELD2 Data for the selected action. varchar 512 FIELD3 Data for the selected action.
I Database tables and fields TABLE 130 FABRIC (Continued) Field Definition Format TRACK_CHANGES 1 = changes (member switches, ISL and devices) in the fabric are tracked. Default value is 0. smallint STATS_COLLECTION 1 = statistics collection is enabled on the fabric. Default value is 0. smallint CREATION_TIME When the fabric record is inserted, i.e., created. Default value is ’now()’. timestamp LAST_FABRIC_CHANGED Time when fabric last changed.
I Database tables and fields TABLE 130 Definition Format VCS_LICENSED Indicates whether the fabric has VCS license or not. Possible values are 0 for not applicable, 1 for licensed, 2 for not licensed. 0 is default. Fabrics representing clusters with 2 or less nodes will have value of 0 as all those are automatically licensed. Fabrics representing clusters with 3 or more nodes will have values 1 or 2 depending on whether the license was acquired or not.
I Database tables and fields TABLE 134 FABRIC_DISCOVERY_POLICY_RULE Field Definition ID Format serial FABRIC_ID The database ID of the fabric that the policy belongs to. int FILTER Filter to be applied for this fabric. This could be IP Address or WWN or SwitchType. The Type of the filter comes from the FilterType column. This can be either in included list or excluded list depending on the EXCLUDED column value. varchar FILTER_TYPE This column indicates type of the filter.
I Database tables and fields TABLE 137 Field Definition Format FABRIC_ID Foreign key to ID in fabric table. int VCS_CLUSTER_ME_ID Foreign key to ID in ManagedElement table. This is the VCS cluster entry managed_element_id reference. int TABLE 138 Size FABRIC_ZONING_EDIT_RESTRICTION Field Definition Format ID Unique generated database identifier. int FABRIC_ID PK of the owning fabric int CHANGE_COUNT Count of the maximum changes allowed in active zone config in the fabric.
I Database tables and fields TABLE 139 FAVORITES (Continued) Field Definition Format CUSTOM_SELECTION_OBJE CT_TYPE Represents the selected filter type. • 0 - Default favorite • 1 - FC Ports • 2 - Device Ports • 3 - ISL Ports • 4 - 10GE Ports • 5 - FCIP Tunnels • 6 - EE Monitors Selected member identifiers are stored in CUSTOM_FAVORITES_OBJECT_LIST table if this favorite is not default. int PLOT_EVENTS Indicates whether the PM historical chart should overlay the events on the graph.
I Database tables and fields TABLE 142 1578 FCIP_TUNNEL (Continued) Field Definition Format KEEP_ALIVE_TIMEOUT FCIP Tunnel Parameter. int MAX_RETRANSMISSION FCIP Tunnel Parameter. int WAN_TOV_ENABLED Is WAN TOV enabled. Default value is 0. smallint TUNNEL_STATUS Tunnel Status (Active/Inactive). int DESCRIPTION Description for the created tunnel. varchar FICON_TRB_ID_ENABLED Whether Ficon_Tape_Read_Block is enabled on that tunnel. Default value is 0.
I Database tables and fields TABLE 142 FCIP_TUNNEL (Continued) Field Definition Format FICON_DEBUG_FLAGS FICON_DEBUG_FLAGS for that particular tunnel. Default value is -1. double precision REMOTE_WWN Configured WWN of the Remote Node. char CDC CDC Flag. Default value is 0. smallint ADMIN_STATUS Admin Status of the Tunnel. Default value is 0. smallint CONTROL_L2_COS Class of service as defined by IEEE 802.1p for tunnel. int Default value is -1.
I Database tables and fields TABLE 142 FCIP_TUNNEL (Continued) Field Definition Format TAPE_ACCELERATION_ENA BLED Whether turbo write (fast write) is enabled or not (0,1). Default value is 0. smallint IPSEC_ENABLED Default value is 0. smallint PRESHARED_KEY The preshared key on tunnel. char QOS_HIGH QoS high value. smallint QOS_MEDIUM QoS medium value. smallint QOS_LOW QoS low value.
Database tables and fields TABLE 143 I FCIP_TUNNEL_CIRCUIT (Continued) Field Definition Format SELECTIVE_ACK Select acknowledgement flag.The default value is 0. smallint QOS_MAPPING QOS Mapping. The default value is 0. smallint PATH_MTU_DISCOVERY MTU Discovery Path. The default value is 0. smallint MIN_COMM_RATE Minimum communication int Speed. The default value is 0. MAX_COMM_RATE Maximum communication int Speed. The default value is 0. MIN_RETRANSMIT_TIME Minimum Retransmission Time.
I Database tables and fields TABLE 143 1582 FCIP_TUNNEL_CIRCUIT (Continued) Field Definition Format Size MISMATCHED_CONFIGURATIONS If a tunnel is down due to mismatched configurations on local and remote end, this property specifies the list of such mismatched configurations. varchar 1024 CIRCUIT_STATUS_STRING Circuit Status string value from switch for the tunnel varchar 256 L2COS_F_CLASS The default value is 0. smallint L2_COS_HIGH The default value is 0.
I Database tables and fields TABLE 144 FCIP_TUNNEL_PERFORMANCE Field Definition Format TUNNEL_ID Primary key of the Switch Port int SWITCH_ID The number of octets or bytes that have been transmitted by this port. One second periodic polling of the port. This value is saved and compared with the next polled value to compute net throughput. Note, for Fibre Channel, ordered sets are not included in the count int TX 'The number of octets or bytes that have been transmitted by this port.
I Database tables and fields TABLE 145 Field Definition Format DEVICE_NODE_ID The primary key of the DeviceNode. int DIRECT_ATTACH Indicates whether the fcoe device is directly attached to the switch''s TE port or to a cloud. smallint ATTACH_ID The primary key of the port (if direct attached) or cloud (if not direct attached). int MAC_ADDRESS Mac address of device. varchar 64 Size TABLE 146 Size FCR_ROUTE Field Definition Format ID* Unique generated database identifier.
I Database tables and fields TABLE 149 FEATURES_USAGE (Continued) Field Definition Format USAGE_COUNT Count shows how many times the feature is accessed. int FIRST_UPDATED_TIME Identifies the first updated time stamp. timestamp TABLE 150 Size FICON_DEVICE_PORT Field Definition Format DEVICE_PORT_ID* Value for the device port to which these FICON properties are applied. int TYPE_NUMBER Size varchar 16 MODEL_NUMBER Ficon device model number, such as S18.
I Database tables and fields TABLE 152 Field Definition Format FIRMWARE_ID* ID for the firmware file. int SWITCH_TYPE* Switch type that supports this firmware file. smallint REBOOT_REQUIRED Reboot required flag for the switch type. smallint NUMFILES Number of files in the firmware. int TABLE 153 Size FOUNDRY_DEVICE Field Definition Format DEVICE_ID Database ID of the DEVICE instance. int IMAGE_VERSION Firmware image version currently running in the device.
I Database tables and fields TABLE 154 FOUNDRY_MODULE (Continued) Field Definition Format Size EXPANSION_MODULE_TYPE Expansion board type. Refer snAgentBrdExpBrdId in foundry.mib for more details and possible values. num (4,0) EXPANSION_MODULE_DESCRIPTION The expansion board description string. Expansion board are those boards attaching on the main board. varchar 128 TABLE 155 FOUNDRY_PHYSICAL_DEVICE Field Definition Format PHYSICAL_DEVICE_ID Unique generated identifier.
I Database tables and fields TABLE 159 FRU Field Definition Format ID Unique generated database identifier. int CORE_SWITCH_ID int TAG provides the TAG number of FRU element, requested by SMIA and values filled in by Switch Asset Collector. Field probably contains information such as asset tag or serial number data.
I Database tables and fields TABLE 159 FRU (Continued) Field Definition Format TOTAL_OUTPUT_POWER provides the total power output of the power supply FRU element, requested by SMIA and values filled in by Switch Asset Collector will be available only from FOS 6.4 switches and above. this field is applicable only for the power supply FRU element. The default value is -1.
I Database tables and fields TABLE 161 Definition Format Size EFCM_USER Management application user who has generated this report. varchar 128 REPORT_OBJECT Report object BLOB. bytea TIMESTAMP_ Timestamp when the report is generated. timestamp FABRIC_NAME Fabric Name. varchar 256 Field Definition Format Size ID* Unique generated database identifier. int SWITCH_PORT_ID ID for the GigE Port in SWITCH_PORT. int PORT_NUMBER GigE Port Number(0 for ge0 and 1 for ge1).
I Database tables and fields TABLE 163 GIGE_PORT_ETHERNET_CLOUD_LINK Field Definition Format ID Unique generated database identifier. int CLOUD_ID int SWITCH_PORT_ID The unique id of the switch TE port that this member connects to. int TRUSTED smallint CREATION_TIME timestamp MISSING smallint MISSING_TIME timestamp TABLE 164 GIGE_PORT_STATS Field Definition Format ID* Unique generated database identifier. int SWITCH_ID References the ID in CORE_SWITCH table.
I Database tables and fields TABLE 167 Field Definition Format ID Unique generated database identifier. serial NAME User-supplied name for the HA Cluster. varchar ENCRYPTION_GROUP_ID Foreign key reference to the ENCRYPTION_GROUP that contains this HA Cluster. int MEMBER_LIST A comma-separated list of Encryption Engines in the HA Cluster. Each engine is identified by a switch node WWN, followed by "/", followed by the slot number.
Database tables and fields TABLE 168 I HBA (Continued) Field Definition Format Size BIOS_VERSION The version level of the BIOS varchar 256 PCI_REG_VENDOR_ID The identifier of the PCI Register''s vendor varchar 32 PCI_REG_DEVICE_ID The device ID of the PCI Register varchar 32 PCI_REG_SUBSYSTEM_ID The ID of the PCI subsystem varchar 32 PCI_REG_SUBSYS_VENDOR_ID The ID of the PCI subsystem vendor.
I Database tables and fields TABLE 168 Definition Format Size VPD_PW PW details of the device varchar 32 VPD_EDC EDC details of the device varchar 32 VPD_MDC MDC details of the device varchar 32 VPD_FABRIC_GEOGRAPHY FABRIC_GEOGRAPHY of the device varchar 256 VPD_LOCATION LOCATION of the device varchar 256 VPD_MANUFACTURER_ID MANUFACTURER_ID of the device varchar 256 VPD_PCI_GEOGRAPHY PCI_GEOGRAPHY of the device varchar 256 VPD_VENDOR_DATA VENDOR_DATA of the device varchar
I Database tables and fields TABLE 170 HBA_PORT (Continued) Field Definition Format CONFIGURED_TOPOLOGY The topology setting. The default value is 1. int MAX_SPEED_SUPPORTED The maximum port speed that is supported on the port, in Gb/s. The default value is 0. int OPERATING_STATE Indicates whether the link is online or offline. The default value is 0. smallint OPERATING_TOPOLOGY The topology setting at which the port is operating. The default value is 1.
I Database tables and fields TABLE 171 HBA_PORT_DETAIL Field Definition Format DEVICE_PORT_ID Device port id acts as the primary key int PERSISTENT_BINDING Persistent binding value of the port. With persistent binding (on the host), one can bind a LUN to a specific device file, thus making sure devices reappear on the same device files after reboots. 0 – disable 1 – enabled smallint FABRIC_NAME Principal switch WWN of the Fabric to which the port is associated with.
I Database tables and fields TABLE 171 HBA_PORT_DETAIL (Continued) Field Definition Format MPIO_MODE_STATE Indicates whether multipathing mode is on or off.. The default value is 0. smallint PATH_TIME_OUT The value between 0 to 60 that specifies the time out session. Note you can only enable or edit the path time out when MPIO is disabled. int Size The default value is 0. LOGGING_LEVEL The port logging level. Values include Log Critical, Log Error, Log Warning, and Log Info.
I Database tables and fields TABLE 171 HBA_PORT_DETAIL (Continued) Field Definition Format Size MEDIA media of port varchar 64 IOC_ID IO controller ID int PREBOOT_DISABLED Boolean value indicating if port was disabled during preboot.. The default value is 0. smallint ALARM_WARNING A bit mask indicating degrading SFP if the bit mask has any 1s in it. It bit mask is all 0s then SFP is in good state. varchar IO_EXEC_THROTTLE_MAX Maximum value is 2000.
I Database tables and fields TABLE 173 HBA_PORT_FCOE_DETAILS (Continued) Field Definition Format Size FCF_FCMAP FC Map value of port. Currently not used. varchar 256 FCF_FPMA_MAC FPMA (fabric-provided MAC address) MAC address of port. Currently not used. varchar 64 FCF_MAC FCF (FCoE Forwarder) MAC value of port. varchar 64 FCF_MODE FCF (FCoE Forwarder) Mode of the port. Currently not used. varchar 256 FCF_NAMEID FCF (FCoE Forwarder) Name of the port currently Not used.
I Database tables and fields TABLE 174 1600 HBA_REMOTE_PORT Field Definition Format Size ID Autogenerate primary column. int SYMBOLIC_NAME The symbolic name associated with the remote port. varchar 256 PORT_WWN The world wide name of the remote device''s port.
I Database tables and fields TABLE 174 HBA_REMOTE_PORT (Continued) Field Definition Format Field to indicate whether the remote port supports data retransmission.0 would mean unsupported and nonzero value implies supported. The default value is 0. smallint DATA_RETRANSMISSION_S UPPORT Field to indicate whether the remote port supports the REC ELS command Channel number in the PCI Bus.Zero would mean unsupported and nonzero value implies supported. The default value is 0.
I Database tables and fields TABLE 176 HBA_TARGET Field Definition Format DEVICE_PORT_ID Primary key from the Device port table int HBA_REMOTE_PORT_LUN_ ID Primary key from the HBA Remote port lun table int BOOT_LUN Flag to indicate of the LUN is bootable. The default value is -1. smallint TRUSTED Denotes whether target is trusted or not. 0 denotes untrusted and 1 is for trusted.
I Database tables and fields TABLE 179 HOST_DISCOVERY_OPTION (Continued) Field Definition Format Size JSON_USERNAME Username for the JSON agent varchar 128 JSON_PASSWD Password for the JSON agent varchar 512 DISCOVER_CIM Flag to indicate CIM based discovery. on/off. The default value is 0. smallint CIM_IMPL CIM implemenation used. 1: SMI, 2: WMI. The default value is 0.
I Database tables and fields TABLE 181 HOST_DISCOVERY_REQ_GROUP Field Definition Format ID Auto generated primary key int NAME Unique name for the host request. The default value is ‘ New Host Group'. varchar( Primary key from the host discovery options table. Points to the associated discovery options int Reflects the status of the request E.g. 0-> Completed, 1->Delete Pending. The default value is 0.
I Database tables and fields TABLE 183 HOST_DISCOVERY_REQUESTS Field Definition Format Size ID Auto generated primary key. HOST_NAME Hostname: IP address or host name. varchar 256 DEVICE_ENCLOSURE_ID Identifier of the Host which this request is associated. int HOST_DISCOVERY_REQ_ GROUP_ID Identifier of the Host discovery request group which this request is associated. int HOST_DISCOVERY_OPTI ONS_ID Reference to the Host discovery options associated with this request.
I Database tables and fields TABLE 184 Definition Format PROCESSOR_COUNT Number of virtual CPUs of the VM. int STATUS Status of the VM. varchar 64 STATE Operational State of the VM. varchar 64 NOTES Notes describing the VM. varchar 2048 UPTIME The time since the VM was last powered up. varchar 512 Size TABLE 185 Definition Format ID Primary Key int HYPER_V_VM_ID ID of the HYPER_VIRTUAL_MACHINE instance.
I Database tables and fields TABLE 187 IFL_CONNECTION Field Definition Format BB_PORT_ID Backbone switch port ID. int BB_PORT_WWN Backbone switch port WWN. varchar 23 Definition Format Size TABLE 188 Size INTERFACE Field INTERFACE_ID int SWITCH_SERVICE_ID int DEVICE_ID int NAME varchar 255 IDENTIFIER varchar 255 TABLE_SUBTYPE varchar 255 TAG_MODE smallint VLAN_TAG_TYPE int UNTAGGED_VLAN_ID The existing Data type short has been modified to integer.
I Database tables and fields TABLE 188 Definition Format Size USER_DEFINED_VALUE_3 User defined value used for IP Port. varchar 256 FEATURES_SUPPORTED Contains the features supported as a bit mask at port level. Possible values are: 1 - Flex port (can be converted to fiber channel or Ethernet port) int TABLE 189 INTERFACE_DEPLOYMENT_CONFIG Field Definition Format ID Unique generated database identifier. serial DEPLOYMENT_ID Deployment configuration ID. Foreign Key for DEPLOYMENT table.
I Database tables and fields TABLE 190 IP_DEVICE_LICENSE (Continued) Field Definition Format PRECEDENCE Defines the priority of a particular trial license among those having the same package and License ID. This is primarily used for determining which license to use, when there are many trial and normal licenses with same package name and LID. The value range is (0..65535) int LICENSE_STATE This indicates the state of the license.
I Database tables and fields TABLE 193 IP_ROUTE (Continued) Field Definition Format SLOT_NUMBER Slot Number related to the GigE Port. int NET_MASK Subnet Mask for the Route. varchar 64 GATEWAY Gateway for the Route. varchar 64 IP_ADDRESS IP Address created after ''”&”'' operation of gateway. varchar 64 METRIC Metric. int FLAG Flag. int CHECKSUM Check Sum. varchar GIGE_PORT_TYPE Whether the IP interface is created on a 10G cross port or not.
I Database tables and fields TABLE 196 ISL (Continued) Field Definition Format TRUSTED Denotes whether ISL link is trusted or not. • 0 denotes untrusted • 1 denotes trusted. smallint CREATION_TIME Creation time of the ISL record in the Management application database. timestamp MISSING Denotes whether ISL link is missing or not. • 0 denotes present • 1 states that ISL is missing smallint MISSING_TIME States the missing time of the this ISL.
I Database tables and fields TABLE 197 Definition Format TRUNKED This column is used to determine whether the isl is part of a trunk or not. The value of 0 means not trunked, 1 means this isl is part of a trunk and -1 means not applicable status. Default value is -1. int MASTER_CONNECTION_ID This will hold the id of the master ISL connection for a ISL between trunk members. The ISL Connection between masters will have its own ID in this column. Non trunk ISLs will have the default value of -1.
I Database tables and fields TABLE 198 ISL_TRUNK_GROUP (Continued) Field Definition Format MISSING_TIME States the missing time of the this ISL trunk group. If the trunk is not missing then it will be null timestamp MEMBER_TRACKING_STAT US Member added/removed status of this trunk. This is represented as bitmap value. Each bit is set based on membership state change. Currently only 2 bits from LSB are used.
I Database tables and fields TABLE 201 L2_ACCESS_CONTROL_ENTRY Field Definition Format ID serial ACCESS_CONTROL_LIST_ID L2 access control list ID, to which the ACL entry is associated. SEQUENCE_NUMBER int int ACTION Specifies the action: 0 = Permit 1 = Deny smallint SOURCE_MAC Source MAC address. varchar 24 SOURCE__MASK Source MAC address mask. varchar 24 DEST_MAC Destination MAC address. varchar 24 DEST_MASK Destination MAC address mask.
I Database tables and fields TABLE 203 L2_ACL_DEVICE_DEPLOY_MAP Field Definition Format DEPLOYMENT_ID Deployment configuration ID. Foreign Key for DEPLOYMENT table. int L2_ACCESS_CONTROL_LIST_ID L2 Access control List ID for reference to the L2_ACCESS_CONTROL_LIST. Foreign Key for L2_ACCESS_CONTROL_LIST table. int TABLE 204 L2_ACL_INTERFACE_DEPLOY_MAP Field Definition Format ID Unique generated database identifier. serial DEPLOYMENT_ID Deployment configuration ID.
I Database tables and fields TABLE 206 L3_ACL_DEVICE_DEPLOYMENT_MAP Field Definition Format DEPLOYMENT_ID Deployment configuration ID. int L3_ACCESS_CONTROL_LIST_ID TABLE 207 int L3_ACL_INT_DEPLOYMENT_MAP Field Definition Format ID 1616 Size serial DEPLOYMENT_ID Deployment configuration ID. int INBOUND_L3_ACL_ID L3 Access control List ID of the L3 ACL selected for inbound. int INBOUND_WRITE_TO_DEVICE 1/0 corresponding to Write to device/not write to device for inbound traffic.
I Database tables and fields TABLE 208 LAG (Continued) Field Definition Format MTU Maximum transmission unit in bytes. range 1522..9208. int LOAD_BALANCE Load balancing details. varchar VLAG Specifies whether the lag is a vlag or not. smallint Field Definition Format ID DB ID of LAG member(port). int LAG_ID FK to owning LAG int NAME Member name varcha TYPE currently not used. The default value is 0. smallint MEMBER_MODE Dynamic Mode Active/passive. The default value is 0.
I Database tables and fields TABLE 211 Definition Format EMPTY_DIALOG_ALLOWED This field indicates whether the dialog can be launched even when there are no fabrics discovered. • 0 = Yes • 1= No int INTERNAL_MODE_DIALOG The DCFM main client is not visible when the dialog is launched in internal mode. This mode is used when launching from SMIA config tool.
I Database tables and fields TABLE 213 LICENSE_DOWNGRADE_DETAILS Field Definition Format Size ID Primary key ID. PREVIOUS_LICENSE_INFO Previous License information during downgrade. The details will have license type, license count like fabric, device, port etc. varchar 512 NEW_LICENSE_INFO New License information during downgrade. The details will have license type, license count like fabric, device, port etc. varchar 512 DOWNGRADE_TIME Time when License is downgraded.
I Database tables and fields TABLE 217 Field Definition Format LINK_ID Unique database generated identifier. int TYPE Type of the link. Currently it is always U. varchar 1 NAME Name of the link which is combination of device display name and ifName of the interface which this link associated. varchar 255 TABLE 218 Size LOCK Field Definition Format Size NAME The name of this transaction synchronization lock.
I Database tables and fields TABLE 221 LSAN_PROXY_DEVICE Field Definition Format FCR_FABRIC_ID* FID assigned to edge fabric int PROXY_PID* Proxy device PID char 6 STATE State of the device varchar 128 LSAN_DEVICE_ID* LSAN_DEVICE record reference int Field Definition Format ID* Unique generated database identifier. int BB_FABRIC_ID Backbone fabric DB ID. int EDGE_FABRIC_ID FID assigned to edge fabric. int NAME LSAN zone name.
I Database tables and fields TABLE 225 MCT_CLIENT Field Definition Format DEPLOY_STATE MCT Client deployment state: • Deployed(0) • Undeployed(1) smallint VCN_MEMBER_ID Virtual Cluster Node member Cluster id foreign key. int TABLE 226 MAC_FILTER Field Definition Format ID Size serial MAC_FILTER_NUMBER MAC Filter number. int FILTER_ACTION Defined Permit - 0 or Deny -1 smallint DESCRIPTION Description associated with each MAC Filter entry.
I Database tables and fields TABLE 228 MAC_FILTER_INT_DEPLOYMENT_MAP (Continued) Field Definition Format INBOUND_MAC_FILTER_ID MAC FILTER Id of the MAC Filter selected for inbound. Foreign Key for MAC_FILTER table. int INBOUND_WRITE_TO_DEVICE 1/0 corresponding to Write to device/not write to device for inbound traffic. smallint Field Definition Format ID Sequence number of the records int NAME Name of the mac group, for internal representation of the group.
I Database tables and fields TABLE 232 Field Definition Format ID The primary key of the table. int HOST_TIME The time at which the server processed the event. timestamp CATEGORY The violations category. i.e. Port Health, Fabric Health, etc. int VIOLATION_TYPE The type of the violation. i.e. CRC, ITW. int MANAGED_ELEMENT_ID The managed element corresponding to this event. int ORIGIN_FABRIC_ID The fabric from which the event originated. Retaining this id as historical data.
I Database tables and fields TABLE 233 MAPS_EVENT_DETAILS (Continued) Field Definition Format Size CURRENT_VALUE The current value of the measure that triggered the violation. varchar 32 SWITCH_ENABLED_ACTI ONS MAPS actions enabled on the switch at the time the violation occurred. int TABLE 234 MAPS_EVENT_CAUSE_ACTION Field Definition Format VIOLATION_TYPE The type of the violation. i.e. CRC, ITW, as defined in MapsConstants.
I Database tables and fields TABLE 237 Definition Format INDEX_TYPE Identifies the index type for a given SNMP MIB or Expression measure. Various index type supported are 0 - UNKNOWN, 1 - SCALAR, 2 - IF_INDEX, 3 - ETHER_STATS_INDEX, 4 - CONN_UNIT_INDEX, 5 FCIP_LINK_TABLE_INDEX, 6 - CUSTOM, 7 SW_TEMP_SENSOR_INDEX, 8 SW_FAN_SENSOR_INDEX, 9 SW_POWER_SENSOR_INDEX. For non-SNMP measures like EE Monitors, Ping statistics etc. index type is not applicable.
I Database tables and fields TABLE 239 MIGRATION_HISTORY Field Definition Format Size TARGET_RELEASE Target release name and version. Example Network Advisor 12.1.0. varchar 128 TARGET_RELEASE_BUILD_NUMB ER Target release build number. int MIGRATION_TIME Date and Time at which this migration completed. timestamp Field Definition Format MODULE_TYPE_ID Primary key for this table. int MODULE_TYPE Type of the module. NAME Name of the module configured in this device.
I Database tables and fields TABLE 240 Definition Format REDUNDANT_STATUS Specifies the redundant status of the module. Possible values are 1, 2, 3, 4, 5. 1 - other, 2 - active, 3 - standby, 4 - crashed, 5 - comingUp. Non management modules always return value as other. Management module returns the rest of the states. int OPERATIONAL_STATUS Specifies the operational status of the module.
I Database tables and fields TABLE 243 MPLS_ADMIN_GROUP_INTERFACE_RELATION Field Definition Format MPLS_ADMIN_GROUP_INTERFAC E_RELATION_DB_ID Unique database generated identifier. int MPLS_ADMIN_GROUP_DB_ID Database ID of the MPLS_ADMIN_GROUP instance. int INTERFACE_ID Database ID of the INTERFACE instance. int TABLE 244 Size MPLS_LSP Field Definition Format MPLS_LSP_DB_ID Unique database generated identifier.
I Database tables and fields TABLE 247 Field Definition Format MPLS_LSP_DB_ID Unique database generated identifier. int IS_ENABLED Represents whether the LSP is enabled. Enabled-1, Disabled-0. num (1,0) IS_BYPASS Represents if the LSP is a Bypass LSP or not. Not a Bypass-0, Bypass LSP-1. Currently ByPass LSPs are not supported. So the value will be always 0. num (1,0) FROM_IP_ADDRESS Represents the Source IP Address of the LSP.
Database tables and fields TABLE 248 MPLS_RSVP_LSP_ACTUALLY_ROUTED_HOP (Continued) Field Definition Format HOP_IP_ADDRESS The Tunnel Hop Address for this tunnel hop. int MPLS_LSP_DB_ID Database ID of the MPLS_RSVP_LSP instance which this hop is part of. int TABLE 249 Definition Format MPLS_RSVP_LSP_ADMIN_GROUP Unique database generated identifier. _DB_ID int AFFINITY_TYPE Represents the affinity type of the MPLS Admin Group.
I Database tables and fields TABLE 252 Field Definition Format MPLS_RSVP_LSP_PARAMETERS_D B_ID Unique database generated identifier. int IS_ADAPTIVE Indicates if the LSP supports adaptive mechanism or not. Non Adaptive-0, Adaptive-1. num BFD_TRANSMIT This object specifies the minimum interval, in milliseconds, that the local system would like to use when transmitting The Bidirectional Forwarding Detection(BFD) Control packets. Accepts a range of 50-30000.
I Database tables and fields TABLE 253 MPLS_RSVP_LSP_PATH (Continued) Field Definition Format Size IS_STANDBY Specifies whether the path is standby or not. Currently it is unused and value is always 0 (Not standby) num (1,0) MPLS_LSP_DB_ID Database ID of the MPLS_RSVP_LSP instance. int MPLS_PATH_DB_ID Database ID of the MPLS_PATH instance. int TABLE 254 MPLS_RSVP_LSP_TUNNEL_RESOURCE Field Definition Format MPLS_RSVP_LSP_TUNNEL_ Unique database generated identifier.
I Database tables and fields TABLE 256 Definition Format DEVICE_ID Database ID of the DEVICE instance. int TABLE_SUBTYPE Specifies the type of MPLS Service Relation with Device. Possible values are VLL_DEVICE_RELATION and VPLS_DEVICE_RELATION. varchar 32 NAME Name of the MPLS Service. varchar 255 COS This value indicates the Class Of Service for this endpoint (VLL/VPLS). Allowed range is 0-7 and 255. 255 means COS is not explicitly configured.
I Database tables and fields TABLE 258 MPLS_SERVICE_PEER_RELATION (Continued) Field Definition Format Size PEER_IP The IP of the Peer Device of the PW/PE maintenance protocol entity. varchar 255 OPER_STATUS Operational Status of the peer with the MPLS Service. Refer PwOperStatus MIB of foundry.mib for more details and possible values. smallint Field Definition Format MRP_RING_ID Auto generated database ID for MRP ring.
I Database tables and fields TABLE 260 Definition Format PRI_PORT_STATE State of device’s primary port. Other-1, Pre-Forwarding- 2, Forwarding-3, Blocking-4, Disabled-5. smallint PRI_PORT_TYPE Type of device’s primary port. Other-1, Regular port-2, Tunnel port-3. smallint PRI_PORT_ACTIVE_INTERFA CE_ID Interface database ID of an primary active port, which is sending RHPs. int SEC_PORT_INTERFACE_ID Interface database ID for the Secondary port of the device.
I Database tables and fields TABLE 263 NETWORK_SCOPE_TYPE Field Definition Format ID The primary key of the table. int NAME Name of the Scope. varchar 128 DESCRIPTION Description of the Scope. varchar 512 HANDLER_CLASS_NAME Fully defined Handler Class for the predefined SCOPE. varchar 128 Definition Format Size TABLE 264 Size NIC_PROFILE Field ID* int NAME The name of the network interface in the format network interface name / host address.
I Database tables and fields TABLE 266 Definition Format SRCDOMAIN Source domain ID int DSTDOMAIN Destination domain ID int LUNID Comma separate list of LUN IDs varchar 1024 OXID FC Originator Exchange ID for the frame. varchar 1024 QOS Quality of Service, can be comma separated values of: 1 - low, 2 - medium, 3 - high.
I Database tables and fields TABLE 267 NP_SUB_FLOW Field Definition Format DSTPORT Switch Destination port. smallint BIDIR This specifies if traffic in both direction has to be monitored, where, 0 - false, 1 - true SFID Source fabric ID. In case of FCR flow creation it will have FCR fabric Id in this field. In XISL it will have virtual fabric Id. For learning flow it will have *. varchar 12 DFID Destination fabric ID. In case of FCR flow creation it will have FCR fabric Id in this field.
I Database tables and fields TABLE 269 OUI_VENDOR (Continued) Field Definition Format Size VENDOR_CATEGORY Default is ‘none’. varchar 32 USER_MODIFIED TABLE 270 int PASSWORD_HISTORY Field Definition USER_NAME Size varchar 128 PASSWORD_UPDATED_ DATETIME The date and time the user updated password recently. timestamp PREVIOUS_PASSWORD User''s Previous password varchar 512 Size TABLE 271 PBR_INTERFACE_CONFIG Field Definition Format ID Primary key.
I Database tables and fields TABLE 273 PBR_NEXT_HOP Field Definition Format ID Primary key. int RULE_ID PBR rule id. int NEXT_HOP_SEQUENCE The sequence of the next hop entry that corresponds to a rule within a route map. The sequence of 1 indicates it is the first next hop to be tried for that rule. This is a running integer. int HOP_TYPE The Next hop type. 1 indicates INTERFACE, 2 indicates IP_ADDRESS, 3 indicates FLOOD VLAN.
I Database tables and fields TABLE 276 Definition Format ACL_MATCH_SEQUENCE The sequence of the matching acl entry that corresponds to a rule within a route map. The sequence of 1 indicates it is the first matching acl for that rule. This is a running integer. int ACL_NAME Name of the ACL for the rule. varchar ACL_TYPE Indicates the ACL type. Value of 4 denotes IPV4, Value of 6 denotes IPV6.
I Database tables and fields TABLE 278 PHYSICAL_DEVICE (Continued) Field Definition Format Size UNIT_NEIGHBOR1 Stacking neighbor's unit(left) number for the stackable devices. If there is no neighbor unit/non stackable devices, then set to 0. num (2,0) UNIT_NEIGHBOR2 Stacking neighbor's unit(left) number for the stackable devices . If there is no neighbor unit/non stackable devices, then set to 0. num (2,0) UNIT_PRESENT Used to identify the stack unit is present in the chassis or not.
I Database tables and fields TABLE 279 Definition Format IMAGE_VERSION Image version of the unit in the stack. For non-stacking device it will be always empty. varchar UNIT_ROLE Indicates unit role in the stack. Possible values: 1 other, 2 - active, 3 - standby, 4 - member, 5 standalone. For non-stacking device it will be always -1' int UNIT_PRIORITY Indicates unit priority. Possible values 0 to 255.
I Database tables and fields TABLE 282 PM_COLLECTOR_TARGET_SETTING (Continued) Field Definition Format ME_ID ME_ID of the target. int INDEX_MAP Stores the index_map value in case of an expression. varchar TABLE 283 Size 8192 PM_COLLECTOR_TIME_SERIES_MAPPING Field Definition Format COLLECTOR_ID DB ID of the pm_data_collector. int TARGET_NAME Time series data master table name. It could be either TIME_SERIES_DATA_1 or TIME_SERIES_DATA_2.
I Database tables and fields TABLE 284 Definition Format LEVEL3_ENABLED Enable / disable the third threshold check. This value is applicable only for Top N, Top Flow widgets. Default is 0. smallint LEVEL3_VALUE Limit value for the third percentage band. Default is 0. double precision LEVEL3_COLOR Limit value for the third percentage band. int LEVEL4_ENABLED Enable / disable the fourth threshold check. This value is applicable only for Top N, Top Flow widgets. Default is 0.
I Database tables and fields TABLE 285 PM_DATA_COLLECTOR (Continued) Field Definition Format STATUS Status of the collector. 0 - disabled and 1 - enabled. Default - 0. smallint TYPE Target type of the snmp collector data. for device smallint level collector the target type is 0, for port level it is 1. POLLING_INTERVAL Time interval in seconds; indicates the frequency with which the collector will poll the device to get the data. int CREATED_TIME Collector created time.
I Database tables and fields TABLE 287 Definition Format TWO_HOUR_SAMPLE_AGE The maximum time in seconds for retaining records in the PM stats 2hour sample tables (TIME_SERIES_DATA_1_2HOUR and TIME_SERIES_DATA_2_2HOUR) in database. int ONE_DAY_SAMPLE_AGE The maximum time in seconds for retaining records in the PM stats 1day sample tables (TIME_SERIES_DATA_1_1DAY, TIME_SERIES_DATA_2_1DAY) in database. int POLICY_TYPE Type of the aging policy. 100 is Default aging; 101 is Raw samples to 1 day.
I Database tables and fields TABLE 292 PM_WIDGET_TIME_SERIES_ENTRY (Continued) Field Definition Format TARGET_TYPE 0 - Device 1 - Port smallint TARGET_ID Stores device ID if taret_TYPE is Device, or interface DB ID if target TYPE is port. int MEASURE_ID Measure table DB ID. int MEASURE_INDEX Index value for a MIB variable. For scalar value it will be empty. varchar 256 Size TABLE 293 PM_WIDGET_TOP_N_COLLECTOR_ENTRY Field Definition Format WIDGET_ID The ID of the widget definition.
I Database tables and fields TABLE 295 Definition Format CONDITION Condition like ><= to the defined threshold value at which threshold is triggered • 0 > (Greater Than) • 1 >= (Greater Than or Equal) • 2 < (Less Than) • 3 < = (Less Than or Equal) • 4 = (Equal to) • 5 != (Not Equal To) smallint SEVERITY Severity level of defined threshold on port and product Poe measures. int TABLE 296 Size POE_THRESHOLD_EVENT Field Definition Format ID Unique generated database identifier.
I Database tables and fields TABLE 299 PORT_BOTTLENECK_CONFIG Field Definition Format SWITCH_PORT_ID The database ID of the switch port that the configuration belongs to. int BOTTLENECK_DETECT _ENABLED Flag indicates if bottleneck detection is enabled or not. The default value is 0. smallint ALERTS_ENABLED Flag indicates if bottleneck detection alerts is enabled or not.The default value is -1. smallint CONGESTION_ THRESHOLD Value of bottleneck detection congestion threshold in percent.
I Database tables and fields TABLE 301 Definition Format Size PASSWORD Password to be used for authenticating. Stored in encrypted format. varchar 512 STATUS Status before and after contacting the CIMOM Server. Possible values are 0 - OK, 1- Not Contacted Yet , 2 - Credentials Updated, 3 - Credentials Failed, 4 - Not Reachable. int LAST_CONTACTED_TIME Last time CIMOM server contacted.
I Database tables and fields TABLE 303 PORT_FENCING_POLICY_MAP (Continued) Field Definition Format Size SUB_LEVEL • • • char 23 NODE WWN of Node which policy assigned. char 23 Directly assigned or inherited from root level.
I Database tables and fields TABLE 305 Definition Format Size NAME Name of the port profile domain. varchar 255 DEFAULT_DOMAIN This flag determines if this domain is a default domain. 0 - NO 1 - YES smallint TABLE 306 PORT_PROFILE_DOMAIN_MAP Field Definition Format PROFILE_DOMAIN_ID Foreign Key Reference to ID field of PORT_PROFILE_DOMAIN table. int PROFILE_ID Foreign Key Reference to ID field of PORT_PROFILE table.
I Database tables and fields TABLE 309 PORT_PROFILE_QOS_MAP Field Definition Format Size TRAFFIC_CLASS Name of the traffic class map set in the NON DCB mode varchar 256 CEE_MAP Name of the cee map set in the DCB mode varchar 256 COS Default COS value for QoS Profile can range from 0-7 if set int TRUST_COS Is trust cos enabled 0=NO 1=YES smallint TABLE 310 PORT_PROFILE_QOS_PFC_MAP Field Definition Format ID Auto generated id for the created profile int PROFILE_ID DB id of the p
I Database tables and fields TABLE 311 Definition Format MAC_GROUP_DB_ID Nullable Foreign Key Reference to ID field of MAC_GROUP table. In case of VLAN_TYPE 3, MAC_GROUP table entry created with empty GROUP_ID with TYPE 3 and MAC_GROUP_MEMBER have the mac address details. In case of VLAN_TYPE 4, MAC_GROUP table entry created with valid GROUP_ID and TYPE(3). int CTAG_ID This will be populated only if VLAN_TYPE is 6 and 7.
I Database tables and fields TABLE 312 PORT_VLAN (Continued) Field Definition Format PRIMARY_VLAN_ID Private VLAN domain is built with one primary VLAN and one or more secondary VLANs. This column represents primary VLAN ID associated with this secondary Isolated/Community VLAN (if PVLAN_TYPE column value is 2 or 3) in private VLAN domain. For primary VLAN (if PVLAN_TYPE column value is 1) in private VLAN domain and normal VLAN (if PVLAN_TYPE column value is 0) , then default value (i.
I Database tables and fields TABLE 315 Field Definition Format VLAN_DB_ID Database ID of the VLAN instance which is associated with the protocol. int PROTOCOL Protocol for VLAN. Possible values are 1-IP, 2-IPX, 3-AppleTalk, 4-DECnet, 5-NetBIOS, 6-Other and 7-IPv6. num (4,0) TABLE 316 Size QRTZ_BLOB_TRIGGERS Field Definition Format Size TRIGGER_NAME* Name of the trigger. varchar 200 TRIGGER_GROUP* Name of the trigger group. varchar 200 BLOB_DATA The Scheduler info.
I Database tables and fields TABLE 319 QRTZ_FIRED_TRIGGERS (Continued) Field Definition Format size JOB_NAME Name of the job. varchar 200 JOB_GROUP Name of the job group. varchar 200 IS_STATEFUL Whether the job implements the interface StatefulJob. boolean REQUESTS_RECOVERY True or false. boolean SCHED_NAME DCMScheduler. bigint TABLE 320 QRTZ_JOB_DETAILS Field Definition Format Size JOB_NAME* Name of the job. varchar 200 JOB_GROUP* Name of the job group.
I Database tables and fields TABLE 323 QRTZ_PAUSED_TRIGGER_GRPS Field Definition Format Size TRIGGER_GROUP* Name of the trigger group. varchar 200 SCHED_NAME DCMScheduler. varchar 120 TABLE 324 QRTZ_SCHEDULER_STATE Field Definition Format Size INSTANCE_NAME* Instance of the scheduler. varchar 200 LAST_CHECKIN_TIME Last fired time in milliseconds. bigint CHECKIN_INTERVAL Repeat interval. bigint RECOVERER Misfire instruction. varchar 80 SCHED_NAME DCMScheduler.
I Database tables and fields TABLE 327 QRTZ_JTRIGGER_LISTENERS Field Definition Format Size TRIGGER_NAME* Name of the trigger. varchar 80 TRIGGER_GROUP* Name of the trigger group. varchar 80 TRIGGER_LISTENER* The listener action. varchar 80 TABLE 328 QRTZ_TRIGGERS Field Definition Format Size TRIGGER_NAME* Name of the trigger. varchar 200 TRIGGER_GROUP* Name of the trigger group. varchar 200 JOB_NAME Name of the job. varchar 200 JOB_GROUP Name of the job group.
I Database tables and fields TABLE 330 Definition Format ENCRYPTION_GROUP_ID Foreign key reference to the ENCRYPTION_GROUP for which an authorization card is registered. int SMART_CARD_ID Foreign key reference to the SMART_CARD that is registered as an authorization card for the encryption group. int TABLE 331 Size RAS_LOG Field Definition Format Size MSG_ID* Message ID of the event. varchar 15 MODULE_ID Module ID of the event. varchar 10 SEVERITY Severity of the event.
I Database tables and fields TABLE 335 REPORT_TEMPLATE Field Definition Format ID The primary key of the table. int NAME Name of the report and the report names must be descriptive. For example, Wired Device Report. varchar 256 TITLE The title of the report that briefly describes the report contents. This title will also be used for the report header and menu item. Title should be unique. For example, Wired Products List. varchar 256 CREATED_TIME Timestamp of when the report was created.
I Database tables and fields TABLE 338 Field Definition Format RESOURCE_GROUP_ID* Resource group ID. int FABRIC_ID* Fabric ID, which is in the resource group. int TABLE 339 Size RESOURCE_GROUP Field Definition Format ID* Unique generated database identifier. int NAME Resource group name. varchar 128 DESCRIPTION Resource group description.
I Database tables and fields TABLE 344 RULE_CONDITION_MAP Field Definition Format POLICY_RULE_ID Foreign key reference to POLICY_RULE.ID. int CONFIG_CONDITION_ID Foreign key reference to CONFIG_CONDITION.ID. int TABLE 345 RULE_LOGICAL_EXPRESSION_MAP Field Definition Format POLICY_RULE_ID Policy rule ID. int LOGICAL_EXPRESSION_XM L Configuration Rule Logical Expression XML. text TABLE 346 Size Size SAN Field Definition Format ID* Unique generated database identifier.
I Database tables and fields TABLE 347 SAN_CONNECTION (Continued) Field Format Size DESTINATION_USER_PORT_ User port number of F-port NUMBER smallint FABRIC_ID Foreign key to FABRIC table int TRUSTED Indicates if the connection is trusted smallint MISSING Indicates if the connection is missing smallint MISSING_TIME Timestamp when the connection went missing timestamp LAST_UPDATE_TIME Last update time for this record timestamp CREATION_TIME Creation timestamp timestamp Field Defin
I Database tables and fields TABLE 349 SECURITY_POLICY (Continued) Field Definition Format DIFFIE_HELLMAN_GROUP Diffie-Hellman Group used in PFS negotiation. smallint SECURITY_ASSOC_LIFE Association lifetime in seconds. double precision SECURITY_ASSOC_LIFE_ IN_MB Security association lifetime in megabytes. double precision TABLE 350 SELECTED_FLYOVER_PROPERTY Field Definition Format PROPERTY_ID* Refers to Flyover_Property ID from AVAILABLE_FLYOVER_PROPERTY table.
I Database tables and fields TABLE 351 Definition Format Size SERIAL_NUMBER provides the serial number of the sensor, requested by SMIA and values filled in by Switch Asset Collector will be available only from FOS 6.4 switches and above varchar 64 VERSION provides the version of the sensor, requested by SMIA and values filled in by Switch Asset Collector will be available only from FOS 6.
I Database tables and fields TABLE 353 SFLOW_HOUR_SUMMARY Field Definition Format OUT_UNIT Unit number of the outgoing traffic interface. Default value is 0. smallint OUT_SLOT Slot number of the outgoing traffic interface. smallint OUT_PORT Port number of the outgoing traffic interface. smallint IN_VLAN Vlan ID of the incoming traffic interface. smallint OUT_VLAN Vlan ID of the outgoing traffic interface. smallint IN_PRIORITY Priority ID of the incoming traffic interface.
I Database tables and fields TABLE 353 Definition Format BYTES Number of bytes transmitted through the sFlow sample collected. bigint TCP_FLAGS TCP flag value of the received sFlow packet. smallint IN_PORT_TYPE smallint This column is used to store the port type of the incoming traffic interface. For VCS switch the value of • 0 means its edge port. • 1 means its trill port. For other devices Default value is 0.
I Database tables and fields TABLE 355 SFLOW_MINUTE_BGP (Continued) Field Definition Format IN_PORT_TYPE Port type of the incoming traffic interface. For VCS member the value of, • 0 means its edge port. • 1 means its fabric port. For other devices Default value is 0. smallint OUT_PORT_TYPE Port type of the outgoing traffic interface. For VCS member the value of, • 0 means its edge port • 1 means its fabric port. For other devices Default value is 0.
I Database tables and fields TABLE 358 Definition Format OUT_PORT_TYPE Port type of the outgoing traffic interface. For VCS member the value of, • 0 means its edge port • 1 means its fabric port. For other devices Default value is 0 smallint L3_SRC_ADDR This column is used to store the L3 address of the source in the received sFlow packet. bytea L3_DEST_ADDR This column is used to store the L3 address of the destination in the received sFlow packet.
I Database tables and fields TABLE 361 SFLOW_MINUTE_VLAN (Continued) Field Definition Format BYTES Number of bytes transmitted through the sFlow sample collected. bigint IN_VLAN Vlan ID of the incoming traffic interface. smallint OUT_VLAN Vlan ID of the outgoing traffic interface. smallint IN_PORT_TYPE Port type of the incoming traffic interface. For VCS member the value of, • 0 means its edge port. • 1 means its fabric port. For other devices Default value is 0.
I Database tables and fields TABLE 365 1674 SFLOW_STAGING (Continued) Field Definition Format IN_UNIT Unit number of the incoming traffic interface. Default value is 0. smallint IN_SLOT Slot number of the incoming traffic interface. smallint IN_PORT Port number of the incoming traffic interface. smallint OUT_UNIT Unit number of the outgoing traffic interface. Default value is 0. smallint OUT_SLOT Slot number of the outgoing traffic interface.
I Database tables and fields TABLE 365 SFLOW_STAGING (Continued) Field Definition Format DEST_USER Name of the destination user in the received sFlow packet. int FRAMES Number of frames transmitted through the sflow sample collected. bigint BYTES Number of bytes transmitted through the sflow sample collected. bigint TCP_FLAGS Tcp flag value of the received sFlow packet. smallint IN_PORT_TYPE This column is used to store the port type of the incoming traffic interface.
I Database tables and fields TABLE 367 SMART_CARD (Continued) Field Definition Format Size GROUP_NAME The name of the Encryption Group used to initialize the card. For recovery set cards, this identifies which group''s master key is backed up on the card. varchar 64 CREATION_TIME The date and time that the card was initialized. For recovery set cards, this is the date and time the master key was written to the card. The default value is 'now()'.
I Database tables and fields TABLE 370 SNMP_CREDENTIALS (Continued) Field Definition Format TIMEOUT Timeout value in seconds for a get/set request to the SNMP agent. Default value is 5. smallint VERSION SNMP agent version running on the switch, as in SNMPv1 or SNMPv3. varchar 6 READ_COMMUNITY_ STRING The SNMP Read-Only Community String is like a password. It is sent along with each SNMP Get-Request and allows (or denies) access to a device. The default value is "public".
I Database tables and fields TABLE 371 SNMP_DATA (Continued) Field Definition Format Size TARGET_TYPE Target type of the SNMP collector data. The target type for, • device level collector is 0 • port level collector it is 1. num (2,0) TARGET_ID Target id of the SNMP collector data. for device level collector it will use deviceId, and for port level it will use interfaceId. int VALUE Value of the OID retrieved from the corresponding target.
I Database tables and fields TABLE 374 SNMP_DATA_30MIN Field Definition Format ID Primary key autogenerated ID int MIB_OBJECT_ID MIB OID used for collection int Target or source type can be, device - 0 or interface or ports - 1 num TARGET_ID DB Id of the target which can be device or interface int VALUE Value collected by the engine double precision TIME_IN_SECONDS Time at which collection occured in seconds int COLLECTOR_ID DB Id of the collector object used for collection int MI
I Database tables and fields TABLE 376 Definition Format TIME_IN_SECONDS Time, in seconds, at which the record was inserted in seconds. int COLLECTOR_ID DB ID of the collector object used for collection.
I Database tables and fields TABLE 379 SNMP_PROFILE (Continued) Field Definition Format Size VERSION SNMP agent version running on the switch as in SNMPv1 and SNMPv3 varchar 6 READ_COMMUNITY_STRING The SNMP Read-Only Community String is like a password. It is sent along with each SNMP Get-Request and allows (or denies) access to device. The default value is "public". This is applicable if the agent is configured to operate in SNMPv1.
I Database tables and fields TABLE 380 SNMP_TRAP_CREDENTIAL Field Definition Format ID PK for the table to uniquely identify the record int VERSION to identify the version of Credentials: v1v2c and v3 are the values varchar 6 COMMUNITY_STRING to decode the v1/v2c traps varchar 64 USER_NAME user access name for v3 trap varchar 64 AUTH_PROTOCOL authentication protocol used for v3 traps varchar 16 AUTH_PASSWORD authentication password for v3 traps varchar 64 PRIV_PROTOCOL privacy
I Database tables and fields TABLE 383 SSL_CERTIFICATE (Continued) Field Definition Format Size EXPIRATION_TIME num (20,0) FORMAT num (2,0) DESCRIPTION varchar 1024 NOTIFICATION_TIME The time stamp (long format) of the last expiration notification sent num (20,0) NOTIFICATION_SENT The status of last notification sent.
I Database tables and fields TABLE 385 Definition Format private_key Content of the private key. txt USER_ID This field will be populated when the Management application user creates certificate or import certificates from file. User can view this certificate not bound to any vip in SSL certificate dialog. int TABLE 386 Size SSL_KEY_PASSWORD Field Definition Format ID Unique generated database identifier.
I Database tables and fields TABLE 388 STP_PORT Field Definition Format INTERFACE_ID Foreign Key Reference to INTERFACE table int PATH_COST Port Path Cost. bigint PRIORITY Port Priority. bigint LINK_TYPE Link Type. 1- Shared 2 - P2P. numeric (1,0) PORT_FAST Port Fast. 0 - Disabled 1 - Enabled numeric (1,0) BPDU_FILTER BPDU Filter. 0 - Disabled 1 - Enabled numeric (1,0) BPDU_GUARD BPDU guard. 0 - Disabled 1 - Enabled numeric (1,0) EDGE_PORT Edge port.
I Database tables and fields TABLE 389 STP_INSTANCE (Continued) Field Definition Format RE_ENABLE_PORT_INTERV AL FOS/NOS Field. Re enable port interval. int RE_ENABLE_PORT_STATE FOS/NOS Field. Re enable port state. smallint PATH_COST 1686 bigint STP Possible values: • 0 - Disabled • 1 - Enabled smallint CISCO_INTER_OP Cisco Interoperability Enabled/Disabled. num TX_HOLD_COUNT Transmit HoldCount of the Bridge smallint MAX_HOPS MST max hop count (1-40) smallint REGION MST Region.
I Database tables and fields TABLE 391 SWITCH_CONFIG Field Definition ID* Format Size int NAME Name of the switch configurations uploaded from the switch either on demand or through scheduler varchar SWITCH_ID ID of the switch from which the configuration has been uploaded. int CORE_SWITCH_ID 64 int BACKUP_DATE_TIME The date/time stamp at which the configuration has been uploaded. timestamp CONFIG_DATA The actual switch configuration data.
I Database tables and fields TABLE 392 Definition Format BACKUP_TYPE The operation based on which this configuration was retrieved -1 - NOT AVAILABLE 0 - IMPORTED 1 - DISCOVERY 2 - RESYNC 3 - MANUAL 4 - SCHEDULE int DRIFT_STATUS Indicates if the current switch configuration has deviated from the baseline configuration. -1 - NO_BASELINE 0 - NO_DEVIATION 1 - DEVIATED int TABLE 393 Size SWITCH_LICENSE Field Definition Format ID* Unique generated database identifier.
I Database tables and fields TABLE 395 SWITCH_PORT Field Definition Format ID* Unique generated database identifier. int VIRTUAL_SWITCH_ID DB ID of virtual_switch to which this port belongs. int WWN WWN of the port. char 23 NAME User friendly name of the port. char 32 SLOT_NUMBER Slot number. Default value is 0. int PORT_NUMBER The logical port number of the user port. There is no assumption of any relation to the physical location of a port within a chassis.
I Database tables and fields TABLE 395 1690 SWITCH_PORT (Continued) Field Definition Format Size ESTIMATED_DISTANCE The estimated physical distance of the connection between ports. int ACTUAL_DISTANCE The physical distance of the connection on the port in relation to the other port. int LONG_DISTANCE_SETTING Whether long distance enabled. int DEGRADED_PORT Denotes if the port is in a degraded state. Has value as N/A for ports that are not online.
I Database tables and fields TABLE 395 SWITCH_PORT (Continued) Field Definition Format Size USER_DEFINED_VALUE2 User defined value used for annotation. varchar 256 USER_DEFINED_VALUE3 User defined value used for annotation. varchar 256 KIND Stores the port kind from the NVP portKind. varchar 32 STATE The state of the port whether it is online or offline varchar 64 PREVIOUS_STATUS This table can hold the same values as STATUS column.
I Database tables and fields TABLE 395 1692 SWITCH_PORT (Continued) Field Definition Format MAX_FRAME_MONITOR Maximum frame monitor supported for switch port. int MAX_FRAME_MONITOR_OF FSET Maximum offset supported in fame monitor for switch port. int Contains the features supported as a bit mask at port level. int IDENTIFIER Switch port identifier extracted from interface name char PORT_CAPABILITIES 'List of capabilities of this port specified as bit mask.
I Database tables and fields TABLE 395 SWITCH_PORT (Continued) Field Definition Format SPEED_TYPE Stores the speed type of the port. It contains one of the following values: • 1 - Indicates speed is in Mbps. • 2 - Indicates speed is in Gbps. int EXT_TYPE Refers to the extended type of the port . Eg Mirror-Port. varchar 128 Size TABLE 396 Size SWITCH_PORT_PERFORMANCE Field Definition Format PORT_ID Primary key of the Switch Port.
I Database tables and fields TABLE 396 Definition Format INVALID_TRANSMISSIONS Count of invalid transmission words received at this port. This count is part of the Link Error Status Block (LESB). FC-PH 29.8). Note, this is a Fibre Channel only stat double precision CRC_ERRORS Count of frames received with invalid CRC. This count is part of the Link Error Status Block (LESB). (FC-PH 29.8). Loop ports should not count CRC errors passing through when monitoring.
I Database tables and fields TABLE 400 TARGET_TYPE Field Definition Format ID Unique generated database identifier. serial TYPE Type of the target device. Some possible values are • Switch • Device • Port • Host • Port Group • Product Group • VLAN • Fabric varchar 64 Size TABLE 401 Size THIRD_PARTY_DEVICE Field Definition Format DEVICE_ID Primary key for this table. int DEVICE_TYPE Type of the third party device.
I Database tables and fields TABLE 404 Definition Format MEASURE_ID ID of the measure. int TARGET_ID Target ID of the PM collector data. For device level collector it will use deviceId, for port level it will use interfaceId. int COLLECTOR_ID ID of the data_collector. int MEASURE_INDEX 'Stores the index_map value in case of anexpression. varchar ME_ID ME_ID of the target. int VALUE 30 mins aggregated data.
I Database tables and fields TABLE 407 \ TIME_SERIES_DATA_30MIN Field Definition Format TIME_IN_SECONDS Time when the record is inserted. int TARGET_TYPE Target type of the PM collector data. For device level collector the target type is 0, for port level it is 1. smallint MEASURE_ID ID of the measure. int TARGET_ID Target ID of the PM collector data. For device level collector it will use deviceId, for port level it will use interfaceId. int COLLECTOR_ID ID of the data_collector.
I Database tables and fields TABLE 409 Field Definition Format TIME_IN_SECONDS Time when value of the measure retrieved from the corresponding target. int TARGET_TYPE Target type of the PM collector data. For IP_DEVICE(0), IP_PORT(1), IP_TRUNK(2), FOS_DEVICE(3), FC_PORT(4), GE_PORT(5), TE_PORT(6), HBA_PORT(7), CNA_PORT(8), VIRTUAL_FCOE_PORT(9), FCIP_TUNNEL(10), EE_MONITOR(11), IP_DEVICE_GROUP(12), IP_PORT_GROUP(13), VIRTUAL_GROUP(14), TRILL_TRUNK(15), ALL_SAN_PRODUCTS(16).
I Database tables and fields TABLE 410 TIME_SERIES_DATA_1_2HOUR (Continued) Field Definition Format VALUE Stores the 2 hours aggregated data. double precision MIN_VALUE Minimum value in 30 min table while aggregating 2 hours of data. double precision MAX_VALUE Maximum value in 30 min table while aggregating 2 hours of data. double precision TABLE 411 TIME_SERIES_DATA_1_30MIN Field Definition Format TIME_IN_SECONDS Time when value of the measure retrieved from the corresponding target.
I Database tables and fields TABLE 412 Definition Format MEASURE_ID ID of the measure (MIB/Expression). int TARGET_ID Target ID of the PM collector data. For device level collector it will use deviceId/virtualSwitchId, for port level it will use interfaceId/switchPortId/ fcipTunnelId/devicePortId. int COLLECTOR_ID DB ID of the pm_data_collector. int MEASURE_INDEX Stores the index_map value in case of an expression. varchar ME_ID ME_ID of the target.
I Database tables and fields TABLE 414 TIME_SERIES_DATA_2_2HOUR Field Definition Format TIME_IN_SECONDS Time when value of the measure retrieved from the corresponding target. int TARGET_TYPE Target type of the PM collector data.
I Database tables and fields TABLE 415 Definition Format VALUE Stores the 30 minutes aggregated data. double precision MIN_VALUE Minimum value in raw performance statistics table while aggregating 30 minutes of data. double precision MAX_VALUE Maximum value in raw performance statistics table while aggregating 30 minutes of data.
I Database tables and fields TABLE 417 TIME_SERIES_DATA_3_1DAY (Continued) Field Definition Format MIN_VALUE Minimum value in 2 hour table while aggregating 1 day data. double precision MAX_VALUE Maximum value in 2 hour table while aggregating 1 day data. double precision SUM_VALUE Named after SUM_VALUE to be consistent with column names in aggregated data tables.Stores the delta changes for counter values between two samples, only used for counter values, 0 for all other types of measures.
I Database tables and fields TABLE 419 Definition Format TARGET_ID Target ID of the PM collector data. For device level collector it will use deviceId/virtualSwitchId, for port level it will use interfaceId/switchPortId/ fcipTunnelId/devicePortId. int COLLECTOR_ID DB ID of the pm_data_collector. int MEASURE_INDEX Stores the index_map value in case of an expression. varchar ME_ID ME_ID of the target. int VALUE Stores the 30 minutes aggregated data.
I Database tables and fields TABLE 421 TIME_SERIES_DATA_4_1DAY Field Definition Format TIME_IN_SECONDS Time when value of the measure retrieved from the corresponding target. int TARGET_TYPE Target type of the PM collector data. smallint MEASURE_ID ID of the measure (MIB/Expression). int TARGET_ID Target ID of the PM collector data. For device level collector it will use deviceId/virtualSwitchId, for port level it will use interfaceId/switchPortId/ fcipTunnelId/devicePortId.
I Database tables and fields TABLE 422 Definition Format MAX_VALUE Maximum value in 30 min table while aggregating 2 hours of data. double precision SUM_VALUE Named after SUM_VALUE to be consistent with column names in aggregated data tables.Stores the delta changes for counter values between two samples, only used for counter values, 0 for all other types of measures.
I Database tables and fields TABLE 424 TIME_SERIES_DATA_5 (Continued) Field Definition Format MEASURE_ID ID of the measure (MIB/Expression). int TARGET_ID Target ID of the PM collector data. For device level collector it will use deviceId/virtualSwitchId, for port level it will use interfaceId/switchPortId/ fcipTunnelId/devicePortId. int COLLECTOR_ID DB ID of the pm_data_collector. int MEASURE_INDEX Stores the index_map value in case of an expression. varchar ME_ID ME_ID of the target.
I Database tables and fields TABLE 426 Field Definition Format Size TOOL_MENU_TEXT* Text to be displayed for the Tool Menu. varchar 256 TOOL_ID A Tool in the TOOL_PATH table where the tools are defined. int PARAMETERS Default path for launching the tool. varchar 256 KEY_STROKE Short cut key stroke to the application. varchar 30 Field Definition Format Size ID* Unique generated database identifier. int TOOL_NAME Name of the tool.
I Database tables and fields TABLE 429 TRILL Field Definition Format TRUNKED Is this trill link part of a trunk smallint CREATION_TIME Time when the TRILL link record is created between source and destination. timestamp MISSING Is this trill link was discovered and is now missing smallint MISSING_TIME Time when the TRILL link is missing from the switch.
I Database tables and fields TABLE 434 USER_ Field Definition Format Size ID * Unique generated database identifier. int NAME User name. varchar 128 DESCRIPTION User description. varchar 512 PASSWORD User password. varchar 512 EMAIL User e-mail ID. varchar 1024 NOTIFICATION_ENABLED Flag for e-mail notification. Default value is 0. smallint FULL_NAME User’'s Full Name. varchar 512 PHONE_NUMBER User’'s Phone number.
I Database tables and fields TABLE 436 USER_DEFINED_DEVICE_DETAIL Field Definition Format Size WWN WWN of the device. char 23 NAME 'Name of the device which is updated by the user. varchar 256 TYPE Type of the device (Initiator or Target. varchar 32 IP_ADDRESS IP address of the device which is updated by the user. varchar 63 CONTACT Contact detail of the device which is updated by the user. varchar 256 LOCATION Location of the device which is updated by the user.
I Database tables and fields TABLE 439 Field Definition Format Size USER_NAME * User name whose preferences are saved. It corresponds to user_name in USER_table. varchar 128 CATEGORY * The name for a set of related preferences. varchar 128 CONTENT The set of preferences saved as name-value pairs. text TABLE 440 USER_REALTIME_MEASURE_MAPPING Field Definition Format ID Primary Key. int USER_ID Foreign key reference to the user_ Table.
I Database tables and fields TABLE 444 USER_STATE_MAP Field Definition USER_NAME STATE Current user state.
I Database tables and fields TABLE 447 VCN_MEMBER Field Definition Format Cluster deployment state: Deployed(0) Undeployed(1). smallint Device id foreign key. int Field Definition Format VCN_PEER_ID Virtual Cluster Node Peer db id. int IP_ADDRESS Peer ip address. varchar RBRIDGE_ID Peer rbridge id. int ICL_NAME Cluster ICL name used for this peer. varchar Cluster Peer fast failover state: Disabled(0) Enabled(1).
I Database tables and fields TABLE 449 VCS_CLUSTER_MEMBER (Continued) Field Definition Format Size STATE Indicates the state of the member with respect to cluster. States can be Online, Offline, Rejoining etc. varchar 64 FABRIC_STATUS Stores the fabric level status of the node like Unknown and Online. Status is unknown when: • A node is going through a reboot or ISLs have not formed yet. • A node is not part of a cluster yet. Status is Online when: • A node is waiting to rejoin a cluster.
I Database tables and fields TABLE 451 VIP_SERVER (Continued) Field Definition Format Size IP_ADDRESS The IP Address for the Virtual Server or Real Server varchar 128 NAME The Name of Virtual Server or Real Server varchar 256 TABLE 452 VIP_SERVER_BINDING Field Definition Format ID Primary Key field for the VIP_SERVER_BINDING int DEVICE_ID This is the foreign key reference key to the Device Table int The IP Address for the Virtual Server varchar The Port number of the Virtual Ser
I Database tables and fields TABLE 454 VIRTUAL_FCOE_PORT (Continued) Field Definition Format DEVICE_COUNT The number of devices associated with this Virtual FCoE Port. The default value is 0. smallint PEER_MAC The Peer FCF MAC if this Virtual FCoE Port is a FCoE VE-port varchar TABLE 455 Size VIRTUAL_FCOE_PORT_MAC_MEMBER Field Definition Format VIRTUAL_FCOE_PORT_ID The unique id of virtual fcoe port the member belongs to int MAC_ADDRESS Mac address of member.
I Database tables and fields TABLE 456 Definition Format INVALID_TX Invalid transmissions double precision CRC_ERRORS Cyclic Redundancy check error double precision TABLE 457 Size VIRTUAL_PORT_WWN_DETAILS Field Definition ID Unique generated database identifier. SWITCH_ID If the VPWWN is constructed based on AG Node WWN and AG_Port_Index then this is id of connected switch. int SWITCH_PORT_NUMBER If the VPWWN is configured for AG , this value will have the default value(-1).
I Database tables and fields TABLE 458 VIRTUAL_SWITCH (Continued) Field Definition Format Stores the switch mode. 0 is switch mode 2 is ag mode. smallint ROLE Stores the role of the switch like Primary, Subordinate, Cluster etc. varchar 32 FCS_ROLE FCS role for the Switch . This is used only when FCS policy is turned on. varchar 16 Stores the switch capability for Admin domain. 1 is capable 0 is not capable. smallint FABRIC_IDID_MODE Denotes if Insistent Domain ID mode is enabled.
I Database tables and fields TABLE 458 VIRTUAL_SWITCH (Continued) Field Definition Format Stores the switch capability for FCR support . 1 is capable 0 is not capable. smallint Stores the switch capability for FCIP support . 1 is capable 0 is not capable. smallint FCOE_CAPABLE If the switch supports FCoE. Default value is 0. smallint L2_CAPABLE If the switch supports L2. smallint L3_CAPABLE If the switch supports L3.
I Database tables and fields TABLE 458 VIRTUAL_SWITCH (Continued) Field Definition Format FCIP_CIRCUIT_CAPABLE Whether the switch can create FCIP Circuits. 1 means true and 0 means false. Default value is 0. smallint DISCOVERED_PORT_COUN T Reflects the number of managed ports in the discovered switch. Default value is 0. smallint LAST_PORT_MEMBERSHIP _CHANGE Stores the timestamp of the last port member ship update.
I Database tables and fields TABLE 458 1722 VIRTUAL_SWITCH (Continued) Field Definition Format CLUSTER_TYPE This column is used to determine whether VCS is in Fabric Cluster or Logical Chassis. The values are populated by the VCS collector during the discovery of the VCS switch. The default value -1 means that its a non-VCS device.
I Database tables and fields TABLE 459 VIRTUAL_SWITCH_CAPABILITY Field Definition Format VIRTUAL-SWITCH_ID * DB ID of virtual switch. int CAPABILITY_ * Name of capability detected on virtual switch. varchar ENABLED 1 = the capability is enabled on the virtual switch. int TABLE 460 Size 256 VIRTUAL_SWITCH_CHECKSUM Field Definition Format VIRTUAL_SWITCH_ID * DB ID of virtual switch. int CHECKSUM_KEY * Checksum key. varchar 32 CHECKSUM Checksum value.
I Database tables and fields TABLE 465 Field Definition Format VLAN_INTERFACE_RELATION_ID Database ID of the VLAN_INTERFACE_RELATION instance which is associated with the interface member. int TABLE 466 Definition Format VLAN_INTERFACE_RELATION_ID Unique database generated identifier. int VLAN_DB_ID Database ID of the VLAN instance which is associated with the interface. int INTERFACE_ID Database ID of the INTERFACE instance which is associated with the vlan.
I Database tables and fields TABLE 471 VLL_ENDPOINT_RELATION Field Definition Format MPLS_SERVICE_ENDPOINT_REL ATION_DB_ID Database ID inherited from MPLS_SERVICE_ENDPOINT_RELATION. int PW_ENET_PW_INSTANCE Represents the Index of Ethernet tables associated with this endpoint Instance. int COS This value indicates the Class Of Service for this smallint endpoint. For VLL, this value is used to select the appropriate tunnel whose COS value is either same, or almost approaching this value.
I Database tables and fields TABLE 472 Definition Format STATUS VMotion event status. 0 = info, 1 = warning, 2 = failed. smallint DRS_TRIGGERED Identifies whether the events was due to DRS. 0 = No, 1 = Yes. smallint USER_NAME Identifies that user who initiated the vmotion. varchar 80 DESCRIPTION Event message that is received.
I Database tables and fields TABLE 475 VM_DATASTORE_DETAILS Field Definition Format Size NAME Name of the datastore. varchar 256 ACCESSIBLE The connectivity status of this datastore. If this is set to false, meaning the datastore is not accessible, this datastores capacity and freespace properties cannot be validated. 0 = no 1 = yes. smallint STATUS Status of the datastore could be normal, enteringMaintenance, inMaintenance.
I Database tables and fields TABLE 476 Definition Format CONFLICT Whether the port is a conflict port. A port could be marked as conflict if an entity is discovered connecting to a port that is already occupied, or if the port is created by the host without conferring with Virtual Center Server. A conflict port will not have its runtime state persisted and the port can''t move away from the host, i.
I Database tables and fields TABLE 477 VM_DV_PORT_GROUP (Continued) Field Definition Format Size DESCRIPTION A description string of the portgroup varchar 256 UPLINK_PORT_GROUP Whether this portgroup is an uplink portgroup smallint KEY The key for the port group varchar MOR_ID The managed object reference number assigned by the hypervisor int TABLE 478 64 VM_DV_SWITCH Field Definition Format ID Unique generated database identifier. serial UUID The generated UUID of the switch.
I Database tables and fields TABLE 478 Definition Format DVS_OPER_SUPPORTED Whether this switch allow Virtual Center users to modify DVS configuration at switch level, except for host memeber, policy and scope operations smallint CREATION_TIME The create time of the switch timestamp UPLINK_PORT_NAME The uniform name of uplink ports on each host varchar VM_DATA_CENTER_ID A foreign key referencing VM_DATACENTER table instance to which this host is associated with int MOR_ID The managed objec
I Database tables and fields TABLE 480 VM_FC_HBA (Continued) Field Definition Format The type of the fiber channel port. One of : Fabric Loop Point to point Unknown smallint SPEED The current operating speed of the adapter in bits per second.
I Database tables and fields TABLE 482 VM_HOST (Continued) Field Definition Format Size CPU_TYPE Text summary of CPU hardware, such as: Intel(R) Xeon(TM) CPU 2.6 GHz varchar 64 CPU_RESOURCES Text summary of CPU resources, such as "20 GHz total, 15 GHz reserved". May be a different format for different VM vendors varchar 64 MEM_RESOURCES Text summary of memory resources, such as "7 GB total, 5 GB reserved".
I Database tables and fields TABLE 484 VM_HOST_PROXY_SWITCH (Continued) Field Definition Format Size DVS_NAME The name of the DistributedVirtualSwitch that the HostProxySwitch is part of varchar 256 DVS_UUID The uuid of the DistributedVirtualSwitch that the HostProxySwitch is a part of varchar 256 KEY_ The proxy switch key varchar 256 NUM_PORTS The number of ports that this switch currently has int NUM_PORTS_AVAILABLE The number of ports that are available on this virtual switch int
I Database tables and fields TABLE 486 Definition Format VM_DV_PORT_ID Foreign key to the vm_dv_port table. DV Port with which this vmknic is associated int MTU The MTU of the port int VM_HOST_ID FOREIGN KEY to the vm_host table int MOR_ID The managed object reference number assigned by the hypervisor int PORT_GROUP_KEY The key for the port group varchar BINARY_MAC MAC address in binary format. bytea BINARY_IP IP address in binary format.
I Database tables and fields TABLE 488 VM_NIC_TEAMING_POLICY (Continued) Field Definition Format REVERSE_POLICY The flag to indicate whether or not the teaming policy is applied to inbound frames as well. For example, if the policy is explicit failover, a broadcast request goes through uplink1 and comes back through uplink2. Then if the reverse policy is set, the frame is dropped when it is received from uplink2. This reverse policy is useful to prevent the virtual machine from getting reflections.
I Database tables and fields TABLE 489 Definition Format FABRIC_ID Identifies the fabric that contains this path. Not a foreign key reference. Copied here for convenience. Determined by locating the HBA port WWN or target port WWN in the DEVICE_PORT table. Zero if the fabric is not managed. The default value is 0. int HBA_PORT The HBAs physical port WWN for this path char 23 VM_PORT_WWN The initiator port WWN used by the VM.
I Database tables and fields TABLE 490 VM_PHYSICAL_NIC (Continued) Field Definition Format DUPLEX The flag to indicate whether or not the link is capable of full-duplex ("true") or only half-duplex ("false"). smallint MAC_ADDRESS The media access control (MAC) address of the physical network adapter. varchar 17 PCI Device hash of the PCI device corresponding to this physical network adapter. varchar 256 WAKE_ON_LAN_SUPPO RTED Flag indicating whether the NIC is wake-on-LAN capable.
I Database tables and fields TABLE 492 Field Definition Format ID Unique generated database identifier. serial NAME The name of the virtual switch. varchar PORTS_COUNT The number of ports that this virtual switch currently has. int PORTS_AVAILABLE The number of ports that are available on this virtual switch. int MTU The maximum transmission unit (MTU) associated with this virtual switch in bytes.
I Database tables and fields TABLE 494 VM_STD_VSWITCH_PORT_GROUP (Continued) Field Definition Format VM_STANDARD_VIRTUA L__SWITCH_ID Foreign Key to the vm_standard_virtual_switch table. The standard virtual swtich on which this port group exists. int MOR_ID The managed object reference number assigned by the hypervisor. int TABLE 495 Size VM_STORAGE Field Definition Format ID Uniquely identifies this LUN. serial HOST_ID Identifies the server that accesses this LUN.
I Database tables and fields TABLE 496 Field Definition Format VM_STORAGE_ID A foreign key referencing VM_STORAGE (ID). int HBA_REMOTE_PORT_ID A foreign key referencing HBA_REMOTE_PORT (ID). int TABLE 497 Size VM_TRAFFIC_SHAPING_POLICY Field Definition Format ID Unique generated database identifier. serial ENABLED 'The flag to indicate whether or not traffic shaper is enabled on the port.
I Database tables and fields TABLE 498 VM_VCENTER (Continued) Field Definition Format Size MANAGED_ELEMENT_ID A foreign key referencing MANAGED_ELEMENT(ID). int FAULT_MONITORING_ST ATE Flag to indicate whether fault monitoring is registered or not for a VM Host. Possible values are: 1.Not registered 2.Registered (Default) smallint NAME The name of the VCenter. varchar 64 UUID Unique identifier for vCenter server instance.
I Database tables and fields TABLE 500 1742 VM_VIRTUAL_ETHERNET_ADAPTER (Continued) Field Definition Format ADDRESS_TYPE MAC address type. Valid values for address type are: • Manual • Statically assigned MAC address. • Generated • Automatically generated MAC address. • Assigned • MAC address assigned by VirtualCenter. smallint MAC_ADDRESS MAC address assigned to the virtual network adapter. Clients can set this property to any of the allowed address types.
I Database tables and fields TABLE 501 VM_VIRTUAL_MACHINE Field Definition Format ID Uniquely identifies the virtual machine serial HOST_ID Identifies the server that contains this VM int HYPERVISOR_VM_ID The VM number assigned by the hypervisor. Some hypervisors identify VMs by number as well as by name int NAME User-assigned name for the VM varchar 80 DESCRIPTION Optional user-entered notes describing the VM. (Annotation in VMware terminology.
I Database tables and fields TABLE 501 Definition Format Size UNCOMMITTED_STORA GE Additional Provisioned storage for a particular virtual machine. varchar 64 UNSHARED_STORAGE Exclusive storage for a particular virtual machine. varchar 64 Size TABLE 502 VM_VIRTUAL_MACHINE_DATASTORE_MAP Field Definition Format VM_DATASTORE_DETAIL S_ID A foreign key referencing VM_DATASTORE_DETAILS(ID). int VIRTUAL_MACHINE_ID A foreign key referencing VM_VIRTUAL_MACHINE(ID).
Database tables and fields TABLE 505 I VR_CONN_DOMAIN Field Definition Format ID Unique generated database identifier. serial VCEM_PROFILE_ID Foreign key references the ID of the VCEM server that the domain belongs to. int VR_CONN_DOMAIN_GROUP_I D Nullable foreign key references the ID of the domain group that the domain may belong to. int VCEM_ASSIGNED_ID The ID assigned by the VCEM server.
I Database tables and fields TABLE 508 VR_CONN_MODULE Field Definition Format ID Unique generated database identifier. serial VR_CONN_DOMAIN_ID Foreign key references the domain ID that the module belongs to. int VCEM_ASSIGNED_ID The ID assigned by VCEM. varchar 256 WWN The WWN of the module. char 23 PRODUCT_NAME The product name of the module. varchar 256 SERIAL_NUMBER The serial number of the module. varchar 32 STATUS The current status of the module.
I Database tables and fields TABLE 510 VR_CONN_SERVER_PROFILE Field Definition Format ID Unique generated database identifier. serial VCEM_PROFILE_ID Foreign key references the ID of the VCEM server that the server profile belongs to. int VR_CONN_DOMAIN_GROUP_I D Nullable foreign key references the ID of the domain group that the server profile may belong to. int VCEM_ASSIGNED_ID The ID assigned by the VCEM server.
I Database tables and fields TABLE 512 Definition Format Size RF_DOMAIN_NAME RF domain name set for the AP. varchar 64 TIME_ZONE Time zone set for the AP. varchar 80 COUNTRY Country set for the AP. varchar 32 VLAN_FOR_CONTROL_TRAFFI C VLAN for control traffic set for the AP. varchar 512 CLIENT_COUNT Number of wireless clients or stations that connected or associated to the AP. int TABLE 513 WIRELESS_PRODUCT_RELATION Field Definition Format ID The primary key of the table.
I Database tables and fields TABLE 516 ZONE_ALIAS Field Definition Format ID* Unique generated database identifier. int ZONE_DB_ID PK of the owning ZONE_DB. int NAME The zone alias name. varchar 64 Size TABLE 517 Size ZONE_ALIAS_IN_ZONE Field Definition Format ZONE_ALIAS_ID* PK of the zone alias. int ZONE_ID* PK of the zone. int 23 Size TABLE 518 ZONE_ALIAS_MEMBER Field Definition Format ID* Unique generated database identifier.
I Database tables and fields TABLE 520 ZONE_DB_CONFIG Field Definition Format ID Unique generated database identifier. int ZONE_DB_ID PK of the owning zone DB int DEFINED_CONTENT Defined zone raw config string, wrapped with $ to prevent special char trimming text ACTIVE_CONTENT Active zone raw config string text TI_ZONE_CONTENT TI zone raw config string text TABLE 521 ZONE_DB_CONTENT Field Definition Format ID* PK of the owning offline zone DB.
I Views TABLE 525 ZONE_SET Field Definition Format ID* Unique generated database identifier. int ZONE_DB_ID PK of owning zone DB. int NAME Zone set name. varchar ACTIVE 1 = active zone set 0 = otherwise. smallint Size 64 Views ADAPTER_PORT_CONFIG_INFO create or replace view ADAPTER_PORT_CONFIG_INFO as select ADAPTER_PORT_CONFIG.ID, ADAPTER_PORT_CONFIG.NAME as CONFIG_NAME, ADAPTER_PORT_CONFIG.TYPE as TYPE, ADAPTER_PORT_CONFIG_PROPERTY.NAME as PROPERTY_NAME, ADAPTER_PORT_CONFIG_DETAILS.
I Views BIRTREPORT_SCHEDULE_INFO CREATE OR REPLACE VIEW birtreport_schedule_info AS SELECT birtreport_schedule_config.id AS schedule_id, birtreport_schedule_config.name AS schedule_name, birtreport_schedule_config.report_store_location, birtreport_schedule_config.overwrite, birtreport_schedule_config.format_type, birtreport_schedule_config.created_by AS birtreport_schedule_config_created_by, birtreport_schedule_config.email_delivery, birtreport_schedule_config.folder_delivery, birtreport_schedule_config.
Views I deployment_status.deployment_configuration_id AND deployment_status.deployment_time = (SELECT max(deployment_status.deployment_time) FROM deployment_status WHERE deployment_status.deployment_configuration_id = deployment_configuration.id) LEFT JOIN schedule_entry ON schedule_entry.identity::text = deployment_configuration.id::character varying(16)::text AND schedule_entry.
I Views left outer join CNA_ETH_PORT_CONFIG on CNA_PORT.ID = CNA_ETH_PORT_CONFIG.CNA_PORT_ID; CNA_PORT_DETAILS_INFO create or replace view CNA_PORT_DETAILS_INFO as select CNA_PORT.ID, CNA_PORT.PORT_NUMBER, CNA_PORT.PORT_WWN, CNA_PORT.NODE_WWN, CNA_PORT.PHYSICAL_PORT_TYPE, CNA_PORT.NAME, CNA_PORT.MAC_ADDRESS, CNA_PORT.MEDIA, CNA_PORT.CEE_STATE, CNA_PORT.HBA_ID, CNA_PORT.CREATION_TIME as CNA_PORT_CREATION_TIME, CNA_ETH_PORT.ID as ETH_PORT_ID, CNA_ETH_PORT.ETH_DEV, CNA_ETH_PORT.ETH_LOG_LEVEL, CNA_ETH_PORT.
Views I CNA_ETH_PORT.IOC_ID, CNA_ETH_PORT.HARDWARE_PATH, CNA_ETH_PORT.STATUS, CNA_ETH_PORT.CREATION_TIME as ETH_PORT_CREATION_TIME, HBA_PORT.DEVICE_PORT_ID, CNA_ETH_PORT.MTU, CNA_PORT.ALARM_WARNING from CNA_PORT left outer join HBA_PORT on CNA_PORT.ID = HBA_PORT.CNA_PORT_ID left outer join CNA_ETH_PORT on CNA_PORT.ID = CNA_ETH_PORT.CNA_PORT_ID; CORE_SWITCH_DETAILS_INFO create or replace view CORE_SWITCH_DETAILS_INFO as select CORE_SWITCH.ID, CORE_SWITCH.IP_ADDRESS, CORE_SWITCH.WWN, CORE_SWITCH.
I Views CORE_SWITCH_DETAILS.ACT_CP_SEC_FW_VERSION, CORE_SWITCH_DETAILS.STBY_CP_PRI_FW_VERSION, CORE_SWITCH_DETAILS.STBY_CP_SEC_FW_VERSION, CORE_SWITCH_DETAILS.EGM_CAPABLE, CORE_SWITCH_DETAILS.SUB_TYPE, CORE_SWITCH_DETAILS.PARTITION, CORE_SWITCH_DETAILS.MAX_NUM_OF_BLADES, CORE_SWITCH_DETAILS.VENDOR_VERSION, CORE_SWITCH_DETAILS.VENDOR_PART_NUMBER, CORE_SWITCH_DETAILS.RNID_SEQUENCE_NUMBER, CORE_SWITCH_DETAILS.CONTACT, CORE_SWITCH_DETAILS.LOCATION, CORE_SWITCH_DETAILS.DESCRIPTION, CORE_SWITCH_DETAILS.
Views I LUN.TIME_LEFT_FOR_AUTO_REKEY, CRYPTO_HOST.HOST_PORT_WWN, CRYPTO_HOST.HOST_NODE_WWN LUN.THIN_PROVISION_LUN from CRYPTO_LUN LUN, CRYPTO_HOST where LUN.CRYPTO_HOST_ID = CRYPTO_HOST.ID; CRYPTO_TARGET_ENGINE_INFO create or replace view CRYPTO_TARGET_ENGINE_INFO as select CRYPTO_TARGET_CONTAINER.ID TARGET_CONTAINER_ID, CRYPTO_TARGET_CONTAINER.NAME, CRYPTO_TARGET_CONTAINER.VT_NODE_WWN, CRYPTO_TARGET_CONTAINER.VT_PORT_WWN, CRYPTO_TARGET_CONTAINER.FAILOVER_STATUS, CRYPTO_TARGET_CONTAINER.
I Views DASHBOARD_CANVAS_PREFERENCE.DASHBOARD_CANVAS_ID, DASHBOARD_CANVAS_PREFERENCE.VISIBLE, DASHBOARD_CANVAS_PREFERENCE.TIME_SCOPE, DASHBOARD_CANVAS_PREFERENCE.USER_ID from DASHBOARD, DASHBOARD_CANVAS, DASHBOARD_CANVAS_PREFERENCE where DASHBOARD.ID = DASHBOARD_CANVAS_PREFERENCE.DASHBOARD_ID and DASHBOARD_CANVAS.ID = DASHBOARD_CANVAS_PREFERENCE.DASHBOARD_CANVAS_ID; DEPLOYMENT_INFO create or replace view DEPLOYMENT_INFO as select DEPLOYMENT_CONFIGURATION.ID as ID, DEPLOYMENT_CONFIGURATION.
I Views DEPLOYMENT_LOG create or replace view DEPLOYMENT_LOG as select DEPLOYMENT_CONFIGURATION.ID, DEPLOYMENT_CONFIGURATION.NAME, DEPLOYMENT_CONFIGURATION.DESCRIPTION, DEPLOYMENT_HANDLER.MODULE, DEPLOYMENT_HANDLER.SUB_MODULE, DEPLOYMENT_STATUS.DEPLOYMENT_TIME, DEPLOYMENT_CONFIGURATION.DEPLOY_OPTION as DEPLOYMENT_OPTION, DEPLOYMENT_STATUS.STATUS, DEPLOYMENT_STATUS.DEPLOYED_BY, DEPLOYMENT_CONFIGURATION.CREATED_BY as CREATOR, DEPLOYMENT_CONFIGURATION.SCHEDULE_ENABLED, DEPLOYMENT_CONFIGURATION.
I Views left join SWITCH_PORT SWPORT on DEVICE_CONNECTION.SWITCH_PORT_ID = SWPORT.ID left join SWITCH_PORT AGPORT on DEVICE_CONNECTION.AG_PORT_ID = AGPORT.ID left join HBA_PORT_DEVICE_PORT_MAP on DEVICE_PORT.ID = HBA_PORT_DEVICE_PORT_MAP.DEVICE_PORT_ID left join HBA_PORT on HBA_PORT_DEVICE_PORT_MAP.HBA_PORT_ID = HBA_PORT.DEVICE_PORT_ID left join HBA on HBA_PORT.HBA_ID = HBA.ID left join VM_FC_HBA_DEVICE_PORT_MAP ON VM_FC_HBA_DEVICE_PORT_MAP.DEVICE_PORT_ID = DEVICE_PORT.ID left join VM_FC_HBA ON VM_FC_HBA.
Views I timestamp with time zone 'epoch' + TIME_IN_SECONDS * interval '1 second' as CREATION_TIME, sum(case when MEASURE_ID = 208 then value else 0 end) as TX_UTILIZATION, sum(case when MEASURE_ID = 209 then value else 0 end) as RX_UTILIZATION, sum(case when MEASURE_ID = 210 then value else 0 end) as CRC_ERRORS from TIME_SERIES_DATA_1_2HOUR, VIRTUAL_SWITCH where ME_ID = MANAGED_ELEMENT_ID and COLLECTOR_ID = 16 group by ME_ID, TARGET_TYPE, TARGET_ID, TIME_IN_SECONDS,VIRTUAL_SWITCH_ID order by TIME_IN_SECON
I Views TE_PORT_STATS_30MIN_INFO create or replace view TE_PORT_STATS_30MIN_INFO as select VIRTUAL_SWITCH.
Views I ME_ID, TARGET_ID as PORT_ID, timestamp with time zone 'epoch' + TIME_IN_SECONDS * interval '1 second' as CREATION_TIME, sum(case when MEASURE_ID = 193 then value else 0 end) as RECEIVE_OK_PERCENT_UTIL, sum(case when MEASURE_ID = 194 then value else 0 end) as TRANSMIT_OK_PERCENT_UTIL, sum(case when MEASURE_ID = 196 then value else 0 end) as RECEIVE_OK, sum(case when MEASURE_ID = 195 then value else 0 end) as TRANSMIT_OK, sum(case when MEASURE_ID = 36 then value else 0 end) as RECEIVE_EOF, sum(case
I Views VIRTUAL_SWITCH.FCS_ROLE, VIRTUAL_SWITCH.DOMAIN_ID, VIRTUAL_SWITCH.VIRTUAL_FABRIC_ID, VIRTUAL_SWITCH.BASE_SWITCH, VIRTUAL_SWITCH.MAX_ZONE_CONFIG_SIZE, VIRTUAL_SWITCH.CREATION_TIME, VIRTUAL_SWITCH.LAST_UPDATE_TIME, VIRTUAL_SWITCH.USER_NAME, VIRTUAL_SWITCH.PASSWORD, VIRTUAL_SWITCH.MANAGEMENT_STATE, VIRTUAL_SWITCH.STATE, VIRTUAL_SWITCH.STATUS, VIRTUAL_SWITCH.STATUS_REASON, VIRTUAL_SWITCH.FABRIC_IDID_MODE, VIRTUAL_SWITCH.LOGICAL_ID, VIRTUAL_SWITCH.USER_DEFINED_VALUE_1, VIRTUAL_SWITCH.
I Views VIRTUAL_SWITCH.PROTOCOL, FABRIC_MEMBER.FABRIC_ID, FABRIC_MEMBER.TRUSTED, FABRIC_MEMBER.MISSING, FABRIC_MEMBER.MISSING_TIME, FABRIC.MANAGED as FABRIC_MANAGED, FABRIC.PRINCIPAL_SWITCH_WWN, FABRIC.SEED_SWITCH_WWN, FABRIC.TYPE as FABRIC_TYPE from CORE_SWITCH, VIRTUAL_SWITCH, FABRIC_MEMBER, FABRIC where VIRTUAL_SWITCH.CORE_SWITCH_ID = CORE_SWITCH.ID and FABRIC_MEMBER.VIRTUAL_SWITCH_ID = VIRTUAL_SWITCH.ID and FABRIC_MEMBER.FABRIC_ID = FABRIC.
I Views virtual_switch.fcip_circuit_capable, virtual_switch.max_fcip_tunnels, virtual_switch.max_fcip_circuits, virtual_switch.fcip_licensed, virtual_switch.addressing_mode, virtual_switch.previous_state, virtual_switch.managed_element_id, virtual_switch.hif_enabled, virtual_switch.auto_snmp, virtual_switch.rnid_sequence_number, virtual_switch.vcs_id, virtual_switch.cluster_type, virtual_switch.cluster_mode, virtual_switch.rnid_tag, virtual_switch.switch_id, virtual_switch.monitored, virtual_switch.
Views I varying, 'EX-Port'::character varying, 'FL-Port'::character varying, 'SIM-Port'::character varying, 'N-Port'::character varying]::text[]))OR switch_port.type like'LB-Port%') AND switch_port.occupied = 1 ) AS occupied_switch_port_count, ( SELECT count(switch_port.id) AS count FROM switch_port WHERE switch_port.virtual_switch_id = virtual_switch.id AND switch_port.licensed = 1 AND ((switch_port.
I Views DEVICE_PORT.COS, DEVICE_PORT.NPV_PHYSICAL, SWITCH_PORT.ID as SWITCH_PORT_ID, SWITCH_PORT.WWN as SWITCH_PORT_WWN, SWITCH_PORT.NAME as SWITCH_PORT_NAME, SWITCH_PORT.SLOT_NUMBER, SWITCH_PORT.PORT_NUMBER, SWITCH_PORT.PORT_INDEX, SWITCH_PORT.TYPE as SWITCH_PORT_TYPE, SWITCH_PORT.FULL_TYPE as SWITCH_PORTFULL_TYPE, SWITCH_PORT.EXT_TYPE as SWITCH_PORT_EXT_TYPE, SWITCH_PORT.STATUS as SWITCH_PORT_STATUS, SWITCH_PORT.HEALTH as SWITCH_PORT_HEALTH, SWITCH_PORT.SPEED, SWITCH_PORT.MAX_PORT_SPEED, SWITCH_PORT.
Views I AG_N_PORT.REMOTE_PORT_WWN as EDGE_SWITCH_PORT_WWN, AG_N_PORT.WWN as AG_N_PORT_WWN, AG_F_PORT.WWN as AG_F_PORT_WWN, AG_F_PORT.REMOTE_NODE_WWN, AG_F_PORT.REMOTE_PORT_WWN as DEVICE_PORT_WWN from N2F_PORT_MAP, SWITCH_PORT AG_N_PORT, SWITCH_PORT AG_F_PORT, VIRTUAL_SWITCH AG_SWITCH where N2F_PORT_MAP.VIRTUAL_SWITCH_ID = AG_N_PORT.VIRTUAL_SWITCH_ID and N2F_PORT_MAP.N_PORT = AG_N_PORT.USER_PORT_NUMBER and N2F_PORT_MAP.VIRTUAL_SWITCH_ID = AG_F_PORT.VIRTUAL_SWITCH_ID and N2F_PORT_MAP.F_PORT = AG_F_PORT.
I Views on DEVICE_NODE.WWN = USER_DEFINED_DEVICE_DETAIL.WWN left outer join FABRIC on DEVICE_NODE.FABRIC_ID = FABRIC.ID left outer join DEVICE_FDMI_DETAILS on DEVICE_NODE.ID = DEVICE_FDMI_DETAILS.DEVICE_NODE_ID; DEVICE_PORT_INFO CREATE VIEW device_port_info AS select DEVICE_PORT.ID, DEVICE_PORT.NODE_ID, DEVICE_PORT.DOMAIN_ID, DEVICE_PORT.WWN, DEVICE_PORT.SWITCH_PORT_WWN, DEVICE_PORT.NUMBER, DEVICE_PORT.PORT_ID, DEVICE_PORT.TYPE, DEVICE_PORT.SYMBOLIC_NAME, DEVICE_PORT.FC4_TYPE, DEVICE_PORT.
Views I coalesce(VS1.MONITORED, VS2.MONITORED) as MONITORED, FABRIC.PRINCIPAL_SWITCH_WWN as PRINCIPAL_WWN, FABRIC.ID as FABRIC_ID from DEVICE_PORT left outer join USER_DEFINED_DEVICE_DETAIL on DEVICE_PORT.WWN = USER_DEFINED_DEVICE_DETAIL.WWN left outer join FICON_DEVICE_PORT on DEVICE_PORT.ID = FICON_DEVICE_PORT.DEVICE_PORT_ID left outer join DEVICE_NODE on DEVICE_PORT.NODE_ID = DEVICE_NODE.ID left outer join SWITCH_PORT on DEVICE_PORT.SWITCH_PORT_WWN = SWITCH_PORT.
I Views SP.NAME as SWITCH_PORT_NAME, SP.LOGICAL_PORT_WWN, SP.VIRTUAL_SWITCH_ID, CS.IP_ADDRESS as SWITCH_IP_ADDRESS, coalesce(USER_DEFINED_DEVICE_DETAIL.TYPE, DN.TYPE, ''::character varying) as USER_DEFINED_DEVICE_TYPE, USER_DEFINED_DEVICE_DETAIL.NAME as USER_DEFINED_NAME, USER_DEFINED_DEVICE_DETAIL.IP_ADDRESS as USER_DEFINED_IP_ADDRESS, USER_DEFINED_DEVICE_DETAIL.CONTACT, USER_DEFINED_DEVICE_DETAIL.LOCATION, USER_DEFINED_DEVICE_DETAIL.DESCRIPTION from DEVICE_PORT DP join DEVICE_NODE DN on DP.NODE_ID = DN.
Views I and DEVICE_PORT.NODE_ID = DEVICE_NODE.ID; ISL_CONNECTION_INFO create or replace view ISL_CONNECTION_INFO as select distinct ISL_CONNECTION.ID, ISL_CONNECTION.FABRIC_ID, ISL_CONNECTION.SOURCE_SWITCH_PORT_ID, ISL_CONNECTION.TARGET_SWITCH_PORT_ID, ISL_CONNECTION.COST, ISL_CONNECTION.TYPE, ISL_CONNECTION.TRUSTED, ISL_CONNECTION.MISSING, ISL_CONNECTION.MISSING_TIME, ISL_CONNECTION.CREATION_TIME, ISL_CONNECTION.TRUNKED, ISL_CONNECTION.MISSING_REASON, ISL_CONNECTION.MASTER_CONNECTION_ID, ISL_CONNECTION.
I Views SOURCE_VIRTUAL_SWITCH.ID as SOURCE_SWITCH_ID, SOURCE_VIRTUAL_SWITCH.NAME as SOURCE_SWITCH_NAME, SOURCE_VIRTUAL_SWITCH.WWN as SOURCE_SWITCH_WWN, SOURCE_VIRTUAL_SWITCH.CORE_SWITCH_ID as SOURCE_CORE_SWITCH_ID, SOURCE_VIRTUAL_SWITCH.BASE_SWITCH as SOURCE_BASE_SWITCH, SOURCE_VIRTUAL_SWITCH.MANAGEMENT_STATE as SOURCE_VIRTUAL_SWITCH_MANAGEMENT_STATE, SOURCE_VIRTUAL_SWITCH.MONITORED as SOURCE_VIRTUAL_SWITCH_MONITORED, SOURCE_SWITCH_PORT.ID as SOURCE_SWITCH_PORT_ID, SOURCE_SWITCH_PORT.
Views I ETHERNET_ISL.ID as ETHERNET_ISL_ID, ETHERNET_ISL.SOURCE_PORT_ID, ETHERNET_ISL.DEST_PORT_ID, ETHERNET_ISL.TRUSTED, ETHERNET_ISL.CREATION_TIME, ETHERNET_ISL.MISSING, ETHERNET_ISL.MISSING_TIME, SOURCE_SWITCH_PORT.VIRTUAL_SWITCH_ID as SOURCE_SWITCH_ID, SOURCE_SWITCH_PORT.USER_PORT_NUMBER as SOURCE_PORT_NUMBER, SOURCE_SWITCH_PORT.TYPE as SOURCE_PORT_TYPE, SOURCE_VIRTUAL_SWITCH.VIRTUAL_FABRIC_ID as SOURCE_VIRTUAL_FABRIC_ID, DEST_SWITCH_PORT.VIRTUAL_SWITCH_ID as DEST_SWITCH_ID, DEST_SWITCH_PORT.
I Views EVENT.PORT_GROUP_ID as PORT_GROUP_ID, EVENT.SPECIAL_EVENT, EVENT_ORIGIN.ID as ORIGIN, EVENT_CATEGORY.ID as EVENT_CATEGORY, EVENT_DESCRIPTION.DESCRIPTION as DESCRIPTION, EVENT_MODULE.ID as MODULE, EVENT_DETAILS.RAS_LOG_ID as RAS_LOG_ID, EVENT_DETAILS.PRODUCT_ADDRESS as PRODUCT_ADDRESS, EVENT_DETAILS.CONTRIBUTORS as CONTRIBUTORS, EVENT_DETAILS.NODE_WWN as NODE_WWN, EVENT_DETAILS.PORT_WWN as PORT_WWN, EVENT_DETAILS.OPERATIONAL_STATUS as OPERATIONAL_STATUS, EVENT_DETAILS.
Views I EVENT_DETAILS.RAS_LOG_ID as RAS_LOG_ID, EVENT_DETAILS.PRODUCT_ADDRESS as PRODUCT_ADDRESS, EVENT_DETAILS.CONTRIBUTORS as CONTRIBUTORS, EVENT_DETAILS.NODE_WWN as NODE_WWN, EVENT_DETAILS.OPERATIONAL_STATUS as OPERATIONAL_STATUS, EVENT_DETAILS.FIRST_OCCURRENCE_SWITCH_TIME as FIRST_OCCURRENCE_SWITCH_TIME, EVENT_DETAILS.LAST_OCCURRENCE_SWITCH_TIME as LAST_OCCURRENCE_SWITCH_TIME, EVENT_DETAILS.VIRTUAL_FABRIC_ID as VIRTUAL_FABRIC_ID, EVENT_DETAILS.USER_NAME as USER_NAME, EVENT_DETAILS.
I Views FABRIC.SEED_SWITCH_WWN = VIRTUAL_SWITCH.WWN and VIRTUAL_SWITCH.CORE_SWITCH_ID = CORE_SWITCH.ID; FCIP_TUNNEL_CIRCUIT_INFO CREATE VIEW fcip_tunnel_circuit_info AS select FCIP_TUNNEL_CIRCUIT.ID, FCIP_TUNNEL_CIRCUIT.TUNNEL_ID, FCIP_TUNNEL_CIRCUIT.CIRCUIT_NUMBER, FCIP_TUNNEL_CIRCUIT.COMPRESSION_ENABLED, FCIP_TUNNEL_CIRCUIT.TURBO_WRITE_ENABLED, FCIP_TUNNEL_CIRCUIT.TAPE_ACCELERATION_ENABLED, FCIP_TUNNEL_CIRCUIT.IKE_POLICY_NUM, FCIP_TUNNEL_CIRCUIT.IPSEC_POLICY_NUM, FCIP_TUNNEL_CIRCUIT.
Views I left outer join GIGE_PORT on FCIP_CIRCUIT_PORT_MAP.SWITCH_PORT_ID = GIGE_PORT.ID left outer join SWITCH_PORT on GIGE_PORT.SWITCH_PORT_ID = SWITCH_PORT.ID; FCIP_TUNNEL_INFO create or replace view FCIP_TUNNEL_INFO as select FCIP_TUNNEL.ID, FCIP_TUNNEL.TUNNEL_ID, FCIP_TUNNEL.VLAN_TAG, FCIP_TUNNEL.SOURCE_IP, FCIP_TUNNEL.DEST_IP, FCIP_TUNNEL.LOCAL_WWN, FCIP_TUNNEL.REMOTE_WWN_RESTRICT, FCIP_TUNNEL.COMMUNICATION_RATE, FCIP_TUNNEL.MIN_RETRANSMIT_TIME, FCIP_TUNNEL.SELECTIVE_ACK_ENABLED, FCIP_TUNNEL.
I Views FCIP_TUNNEL.PRESHARED_KEY, FCIP_TUNNEL.QOS_HIGH, FCIP_TUNNEL.QOS_MEDIUM, FCIP_TUNNEL.QOS_LOW, FCIP_TUNNEL.BACKWARD_COMPATIBLE, FCIP_TUNNEL.FICON_TERADATA_READ_ENABLED, FCIP_TUNNEL.FICON_TERADATA_WRITE_ENABLED, PORT.WWN as VIRTUAL_PORT_WWN, PORT.REMOTE_PORT_WWN as REMOTE_PORT_WWN, PORT.REMOTE_NODE_WWN as REMOTE_NODE_WWN, PORT.ID as SWITCH_PORT_ID, PORT.PORT_NUMBER as SWITCH_PORT_NUMBER, PORT.USER_PORT_NUMBER as USER_PORT_NUMBER, PORT.PORT_INDEX, PORT.
Views I FRU.VENDOR_EQUIPMENT_TYPE, FRU.OPERATIONAL_STATUS, FRU.TOTAL_OUTPUT_POWER, FRU.SPEED, FRU.CREATION_TIME, FRU.LAST_UPDATE_TIME, FRU.PREVIOUS_OP_STATUS, FRU.VENDOR, CORE_SWITCH.WWN as PHYSICAL_SWITCH_WWN, VIRTUAL_SWITCH.SWITCH_MODE as VIRTUAL_SWITCH_MODE, VIRTUAL_SWITCH.MANAGEMENT_STATE, VIRTUAL_SWITCH.MONITORED from FRU, CORE_SWITCH, VIRTUAL_SWITCH where FRU.CORE_SWITCH_ID = CORE_SWITCH.ID and FRU.CORE_SWITCH_ID = VIRTUAL_SWITCH.
I Views GIGE_PORT.PORT_NAME, GIGE_PORT.OPERATIONAL_STATUS, GIGE_PORT.LED_STATE, GIGE_PORT.SPEED_LED_STATE, GIGE_PORT.PORT_TYPE, GIGE_PORT.PERSISTENTLY_DISABLED, GIGE_PORT.INTERFACE_TYPE, GIGE_PORT.CHECKSUM, GIGE_PORT.FCIP_CAPABLE, coalesce(CARD.FCIP_CIRCUIT_CAPABLE, VIRTUAL_SWITCH.FCIP_CIRCUIT_CAPABLE) as FCIP_CIRCUIT_CAPABLE, GIGE_PORT.ISCSI_CAPABLE, GIGE_PORT.REMOTE_MAC_ADDRESS, GIGE_PORT.INBAND_MANAGEMENT_STATUS, GIGE_PORT.LAST_UPDATE, SWITCH_PORT.VIRTUAL_SWITCH_ID, SWITCH_PORT.
Views I birtreport_schedule_config.deployment_id, birtreport_schedule_config.email_delivery, birtreport_schedule_config.folder_delivery, CREATE OR REPLACE VIEW generated_birtreport_info AS SELECT generated_birtreport.id AS generated_report_id, generated_birtreport.file_name, generated_birtreport.rptdoc_store_location, generated_birtreport.generate_time, generated_birtreport.format, generated_birtreport.flagged, generated_birtreport.shared, generated_birtreport.report_template_id, generated_birtreport.
I Views HBA_PORT.CREATION_TIME as HBA_PORT_CREATION_TIME, HBA_PORT.MISSING as HBA_PORT_MISSING, HBA_PORT.MISSING_TIME as HBA_PORT_MISSING_TIME, HBA_PORT.OPERATING_SPEED, HBA_PORT.CNA_PORT_ID, HBA_PORT.PORT_NWWN, HBA_PORT.PHYSICAL_PORT_WWN, HBA_PORT.SWITCH_IP, HBA_PORT.PRINCIPAL_SWITCH_WWN, HBA_PORT.HBA_ID, HBA_PORT.PORT_NUMBER, HBA_PORT.NAME, HBA_PORT.FACTORY_PORT_WWN, HBA_PORT.FACTORY_NODE_WWN, HBA_PORT.PREBOOT_CREATED, HBA_PORT.MAX_BANDWIDTH, HBA_PORT.PCIF_INDEX, HBA_PORT.MAX_PCIF, HBA_PORT_DETAIL.
I Views HBA_PORT_FCOE_DETAILS.FCF_FCMAP, HBA_PORT_FCOE_DETAILS.FCF_FPMA_MAC, HBA_PORT_FCOE_DETAILS.FCF_MAC, HBA_PORT_FCOE_DETAILS.FCF_MODE, HBA_PORT_FCOE_DETAILS.FCF_NAMEID, HBA_PORT_FCOE_DETAILS.FCPIM_MPIO_MODE, HBA_PORT_FCOE_DETAILS.PORT_LOG_ENABLED, HBA_PORT_FCOE_DETAILS.MAX_FRAME_SIZE as FCOE_MAX_FRAME_SIZE, HBA_PORT_FCOE_DETAILS.MTU as FCOE_MTU, HBA_PORT_FCOE_DETAILS.PATH_TOV as FCOE_PATH_TOV, HBA_PORT_FCOE_DETAILS.SCSI_QUEUE_DEPTH as FCOE_SCSI_QUEUE_DEPTH, HBA_PORT_FCOE_DETAILS.
I Views HBA_REMOTE_PORT.TARGET_ID, HBA_REMOTE_PORT.ROLE, HBA_REMOTE_PORT.VENDOR, HBA_REMOTE_PORT.PRODUCT_ID, HBA_REMOTE_PORT.PRODUCT_VERSION, HBA_REMOTE_PORT.QOS_PRIORITY, HBA_REMOTE_PORT.QOS_FLOW_ID, HBA_REMOTE_PORT.CURRENT_SPEED, HBA_REMOTE_PORT.TRL_ENFORCED, HBA_REMOTE_PORT.BUS_NO, HBA_REMOTE_PORT_LUN.FCP_LUN, HBA_REMOTE_PORT_LUN.CAPACITY, HBA_REMOTE_PORT_LUN.BLOCK_SIZE, HBA_REMOTE_PORT_LUN.VENDOR as LUN_VENDOR, HBA_REMOTE_PORT_LUN.PRODUCT_ID as LUN_PRODUCT_ID, HBA_REMOTE_PORT_LUN.
I Views HOST_INVENTORY_REPORT_INFO CREATE OR REPLACE VIEW host_inventory_report_info AS select DEVICE_ENCLOSURE.ID as DEVICE_ENCLOSURE_ID, DEVICE_ENCLOSURE.NAME as HOST_NAME, DEVICE_ENCLOSURE.IP_ADDRESS as HOST_IP, case when (DEVICE_ENCLOSURE.VENDOR is null or DEVICE_ENCLOSURE.VENDOR = '') then 'NA' else DEVICE_ENCLOSURE.VENDOR end as HOST_VENDOR, DEVICE_ENCLOSURE.MODEL as HOST_MODEL, DEVICE_ENCLOSURE.OS as HOST_OS, DEVICE_ENCLOSURE.LOCATION as HOST_LOCATION, DEVICE_ENCLOSURE.
I Views ADAPTER_PORT_FAA_STATUS, case when (HBA_PORT_DETAIL.WWN_SOURCE is null or HBA_PORT_DETAIL.WWN_SOURCE = '') then 'NA' else HBA_PORT_DETAIL.WWN_SOURCE end as ADAPTER_PORT_WWN_SOURCE, HBA_PORT_DETAIL.BOOT_OVER_SAN as ADAPTER_PORT_BOOT_OVER_SAN, ADAPTER_PORT.MAX_SPEED_SUPPORTED as ADAPTER_PORT_MAX_SPEED_SUPPORTED, ADAPTER_PORT.OPERATING_STATE as PORT_OPERATING_STATE, ADAPTER_PORT_COUNT.PORT_COUNT as HBA_PORT_COUNT, HBA.ID as HBA_PORT_ID, ADAPTER_PORT_FABRIC_MAP.FABRIC_NAME, ADAPTER_PORT_FABRIC_MAP.
I Views vs.domain_id As edge_virtual_switch_domain_id, sp.category AS sp_category, sp.licensed AS sp_licensed, sp.name AS sp_name, sp.slot_number AS sp_slot_number, sp.port_number AS sp_port_number, sp.port_id AS sp_port_id, sp.port_index AS sp_port_index, sp.area_id AS sp_area_id, sp.mac_address AS sp_mac_address, sp.status AS sp_status, sp.state AS sp_state, cs.model AS edge_core_switch_smodel, cs.ip_address AS edge_core_switch_ip_address, cs.wwn AS edge_core_switch_physical_switch_wwn, cs.
I Views CNA_ETH_PORT.CNA_PORT_ID and CNA_PORT.ID = CNA_ETH_PORT.CNA_PORT_ID and DEVICE_PORT.NPV_PHYSICAL=0 ) as ADAPTER_PORT, (select HBA_PORT.HBA_ID, count(HBA_PORT.DEVICE_PORT_ID) as PORT_COUNT from HBA_PORT, DEVICE_PORT_INFO where HBA_PORT.DEVICE_PORT_ID = DEVICE_PORT_INFO.ID and DEVICE_PORT_INFO.NPV_PHYSICAL = 0 group by (HBA_PORT.HBA_ID)) as ADAPTER_PORT_COUNT where DEVICE_ENCLOSURE.MANAGED_BY in (2,4) and DEVICE_ENCLOSURE.ID = HBA.HOST_ID and ADAPTER_PORT.HBA_ID = HBA.ID and ADAPTER_PORT.
Views I DEVICE_ENCLOSURE.LOCATION, DEVICE_ENCLOSURE.DESCRIPTION, DEVICE_ENCLOSURE.COMMENT_, DEVICE_ENCLOSURE.IP_ADDRESS, DEVICE_ENCLOSURE.VENDOR, DEVICE_ENCLOSURE.MODEL, DEVICE_ENCLOSURE.SERIAL_NUMBER, DEVICE_ENCLOSURE.FIRMWARE, DEVICE_ENCLOSURE.USER_DEFINED_VALUE1, DEVICE_ENCLOSURE.USER_DEFINED_VALUE2, DEVICE_ENCLOSURE.USER_DEFINED_VALUE3, DEVICE_ENCLOSURE.HCM_AGENT_VERSION, DEVICE_ENCLOSURE.OS_VERSION, DEVICE_ENCLOSURE.CREATED_BY, DEVICE_ENCLOSURE.TRACK_CHANGES, DEVICE_ENCLOSURE.
I Views DEVICE_ENCLOSURE.COMMENT_, DEVICE_ENCLOSURE.IP_ADDRESS, DEVICE_ENCLOSURE.VENDOR, DEVICE_ENCLOSURE.MODEL, DEVICE_ENCLOSURE.SERIAL_NUMBER, DEVICE_ENCLOSURE.FIRMWARE, DEVICE_ENCLOSURE.USER_DEFINED_VALUE1, DEVICE_ENCLOSURE.USER_DEFINED_VALUE2, DEVICE_ENCLOSURE.USER_DEFINED_VALUE3, DEVICE_ENCLOSURE.HCM_AGENT_VERSION, DEVICE_ENCLOSURE.OS_VERSION, DEVICE_ENCLOSURE.CREATED_BY, DEVICE_ENCLOSURE.TRACK_CHANGES, DEVICE_ENCLOSURE.LAST_UPDATE_TIME, DEVICE_ENCLOSURE.LAST_UPDATE_MODULE, DEVICE_ENCLOSURE.
Views I FCIP_TUNNEL.VIRTUAL_SWITCH_ID, DP0_SWITCH_PORT.USER_PORT_NUMBER, DP1_GIGE_PORT.PORT_NUMBER as DP1_GIGE_PORT_NUMBER, DP1_GIGE_PORT.SLOT_NUMBER as DP1_GIGE_PORT_SLOT_NUMBER, FCIP_CIRCUIT_PORT_MAP.DP1_SWITCH_PORT_ID as DP1_GIGE_PORT_ID, DP1_SWITCH_PORT.USER_PORT_NUMBER as DP1_USER_PORT_NUMBER from FCIP_TUNNEL, FCIP_TUNNEL_CIRCUIT left join FCIP_CIRCUIT_PORT_MAP on FCIP_CIRCUIT_PORT_MAP.CIRCUIT_ID = FCIP_TUNNEL_CIRCUIT.ID left join GIGE_PORT as DP0_GIGE_PORT on FCIP_CIRCUIT_PORT_MAP.
I Views bb_switch_port.wwn AS bb_switch_port_wwn, bb_switch_port.name AS bb_switch_port_name, bb_switch_port.slot_number AS bb_switch_port_slot_number, bb_switch_port.port_number AS bb_switch_port_port_number, bb_switch_port.port_id AS bb_switch_port_port_id, bb_switch_port.port_index AS bb_switch_port_port_index, bb_switch_port.area_id AS bb_switch_port_area_id, bb_switch_port.mac_address AS bb_switch_port_mac_address, bb_switch_port.status AS bb_switch_port_status, bb_switch_port.
Views I edge_switch_port.health AS edge_switch_port_health, edge_switch_port.status_message AS edge_switch_port_status_message, edge_switch_port.category AS edge_switch_port_category, edge_switch_port.licensed AS edge_switch_port_licensed, edge_switch_port.type AS edge_switch_port_type, edge_switch_port.kind AS edge_switch_port_kind, edge_switch_port.physical_port AS edge_switch_port_physical_port, edge_switch_port.trunked AS edge_switch_port_trunked, edge_switch_port.
I Views WHERE bb_fabric.managed = 1 AND bb_vs.monitored = 1 AND (edge_fabric.managed IS NULL OR edge_fabric.managed = 1) AND (edge_vs.monitored IS NULL OR edge_vs.monitored = 1); ISL_INFO create or replace view ISL_INFO as select distinct ISL.ID, ISL.FABRIC_ID, ISL.COST, ISL.TYPE, ISL.SOURCE_DOMAIN_ID, ISL.SOURCE_PORT_NUMBER, ISL.MISSING, ISL.MISSING_TIME, ISL.TRUSTED, ISL.CREATION_TIME, ISL.TRUNKED, ISL.MISSING_REASON, SOURCE_VIRTUAL_SWITCH.ID as SOURCE_SWITCH_ID, SOURCE_VIRTUAL_SWITCH.
I Views FABRIC_MEMBER VIRTUAL_SWITCH SWITCH_PORT FABRIC where DEST_FABRIC_MEMBER, DEST_VIRTUAL_SWITCH, DEST_SWITCH_PORT, SOURCE_FABRIC_MEMBER.FABRIC_ID = ISL.FABRIC_ID and SOURCE_VIRTUAL_SWITCH.ID = SOURCE_FABRIC_MEMBER.VIRTUAL_SWITCH_ID and SOURCE_VIRTUAL_SWITCH.DOMAIN_ID = ISL.SOURCE_DOMAIN_ID and SOURCE_SWITCH_PORT.VIRTUAL_SWITCH_ID = SOURCE_VIRTUAL_SWITCH.ID and SOURCE_SWITCH_PORT.CATEGORY = 1 and SOURCE_SWITCH_PORT.USER_PORT_NUMBER = ISL.SOURCE_PORT_NUMBER and DEST_FABRIC_MEMBER.FABRIC_ID = ISL.
I Views SOURCE_SWITCH_PORT.STATE AS SOURCE_SWITCH_PORT_STATE, SOURCE_SWITCH_PORT.HEALTH AS SOURCE_SWITCH_PORT_HEALTH, SOURCE_SWITCH_PORT.STATUS_MESSAGE AS SOURCE_SWITCH_PORT_STATUS_MESSAGE, SOURCE_SWITCH_PORT.CATEGORY AS SOURCE_SWITCH_PORT_CATEGORY, SOURCE_SWITCH_PORT.LICENSED AS SOURCE_SWITCH_PORT_LICENSED, SOURCE_SWITCH_PORT.TYPE AS SOURCE_SWITCH_PORT_TYPE, SOURCE_SWITCH_PORT.KIND AS SOURCE_SWITCH_PORT_KIND, SOURCE_SWITCH_PORT.PHYSICAL_PORT AS SOURCE_PHYSICAL_PORT, SOURCE_SWITCH_PORT.
Views I FABRIC.PRINCIPAL_SWITCH_WWN AS FABRIC_PRINCIPAL_SWITCH_WWN, FABRIC.MANAGEMENT_STATE AS FABRIC_MANAGEMENT_STATE, FABRIC.TYPE AS FABRIC_TYPE, FABRIC.MANAGED AS FABRIC_MANAGED FROM ISL LEFT JOIN FABRIC_MEMBER SOURCE_FABRIC_MEMBER ON SOURCE_FABRIC_MEMBER.FABRIC_ID = ISL.FABRIC_ID JOIN VIRTUAL_SWITCH SOURCE_VIRTUAL_SWITCH ON SOURCE_VIRTUAL_SWITCH.ID = SOURCE_FABRIC_MEMBER.VIRTUAL_SWITCH_ID AND SOURCE_VIRTUAL_SWITCH.DOMAIN_ID = ISL.
I Views DEST_SWITCH_PORT.IDENTIFIER as DEST_SWITCH_PORT_IDENTIFIER, DEST_SWITCH_PORT.KIND as DEST_SWITCH_PORT_KIND, DEST_SWITCH_PORT.PHYSICAL_PORT as DEST_PHYSICAL_PORT, DEST_SWITCH_PORT.
Views I SWITCH_PORT where ISL_TRUNK_GROUP.id = ISL_TRUNK_MEMBER.GROUP_ID and ISL_TRUNK_GROUP.VIRTUAL_SWITCH_ID = SWITCH_PORT.VIRTUAL_SWITCH_ID and ISL_TRUNK_MEMBER.PORT_NUMBER= SWITCH_PORT.USER_PORT_NUMBER; ISL_TRUNK_INFO create or replace view ISL_TRUNK_INFO as select ISL_TRUNK_GROUP.ID, ISL_TRUNK_GROUP.TRUSTED, ISL_TRUNK_GROUP.MISSING, ISL_TRUNK_GROUP.MISSING_TIME, ISL_TRUNK_GROUP.MEMBER_TRACKING_STATUS, ISL_INFO.COST, ISL_INFO.TYPE, ISL_INFO.SOURCE_PORT_NUMBER, ISL_INFO.SOURCE_SWITCH_ID, ISL_INFO.
I Views L2_NEIGHBOR.INTERFACE_ID, L2_NEIGHBOR.RMT_IP_ADDRESS, L2_NEIGHBOR.RMT_IF_NAME, LLDP_DATA.DEVICE_ID as RMT_DEVICE_ID, LLDP_DATA.INTERFACE_ID as RMT_INTERFACE_ID, PHY_INTF.PHYSICAL_ADDRESS as RMT_INTERFACE_MAC, RMT_DEVICE.IS_ROUTER from device RMT_DEVICE, LLDP_DATA, L2_NEIGHBOR, physical_interface PHY_INTF where LLDP_DATA.CHASSIS_ID = L2_NEIGHBOR.LLDP_REM_CHASSIS_ID and LLDP_DATA.CHASSIS_ID_SUBTYPE = L2_NEIGHBOR.LLDP_REM_CHASSIS_ID_SUBTYPE and LLDP_DATA.PORT_ID = L2_NEIGHBOR.
Views I MAPS_EVENT on MAPS_EVENT.ID = MAPS_EVENT_DETAILS.MAPS_EVENT_ID left outer join MAPS_EVENT_CAUSE_ACTION on MAPS_EVENT.VIOLATION_TYPE = MAPS_EVENT_CAUSE_ACTION.VIOLATION_TYPE left outer join VIRTUAL_SWITCH on MAPS_EVENT.MANAGED_ELEMENT_ID = VIRTUAL_SWITCH.MANAGED_ELEMENT_ID left outer join SWITCH_PORT on MAPS_EVENT.SWITCH_PORT_ID = SWITCH_PORT.ID LEFT JOIN INTERFACE ON MAPS_EVENT.INTERFACE_ID = INTERFACE.INTERFACE_ID left outer join FCIP_TUNNEL_CIRCUIT on MAPS_EVENT.
I Views EDGE_SWITCH_PORT.KIND as EDGE_SWITCH_PORT_KIND, EDGE_SWITCH_PORT.LAST_UPDATE as EDGE_SWITCH_PORT_LAST_UPDATE, EDGE_SWITCH.WWN as EDGE_VIRTUAL_SWITCH_WWN, EDGE_SWITCH.NAME as EDGE_SWITCH_NAME, EDGE_SWITCH.DOMAIN_ID as EDGE_SWITCH_DOMAIN_ID, EDGE_SWITCH.SWITCH_MODE as EDGE_SWITCH_MODE, EDGE_SWITCH.OPERATIONAL_STATUS as EDGE_SWITCH_OPERATIONAL_STATUS, EDGE_SWITCH.MANAGEMENT_STATE as EDGE_SWITCH_MANAGEMENT_STATE, EDGE_SWITCH.STATE as EDGE_SWITCH_STATE, EDGE_SWITCH.
Views I AG_F_PORT.QOS_ENABLED as AG_F_PORT_QOS_ENABLED, AG_F_PORT.TUNNEL_CONFIGURED as AG_F_PORT_TUNNEL_CONFIGURED, AG_F_PORT.FCR_FABRIC_ID as AG_F_PORT_FCR_FABRIC_ID, AG_F_PORT.FCR_INTEROP_MODE as AG_F_PORT_FCR_INTEROP_MODE, AG_F_PORT.USER_DEFINED_VALUE1 as AG_F_PORT_USER_DEFINED_VALUE1, AG_F_PORT.USER_DEFINED_VALUE2 as AG_F_PORT_USER_DEFINED_VALUE2, AG_F_PORT.USER_DEFINED_VALUE3 as AG_F_PORT_USER_DEFINED_VALUE3, AG_F_PORT.KIND as AG_F_PORT_KIND, AG_F_PORT.LAST_UPDATE as AG_F_PORT_LAST_UPDATE, AG_SWITCH.
I Views END_DEVICE_PORT.HARDWARE_ADDRESS, END_DEVICE_PORT.TRUSTED as DEVICE_PORT_TRUSTED, END_DEVICE_PORT.CREATION_TIME as DEVICE_PORT_CREATION_TIME, END_DEVICE_PORT.MISSING as DEVICE_PORT_MISSING, END_DEVICE_PORT.MISSING_TIME as DEVICE_PORT_MISSING_TIME, END_DEVICE_PORT.LOGGED_TO_AG, END_DEVICE_PORT.AG_NODE_WWN, END_DEVICE_PORT.AG_N_PORT_WWN As AG_SWITCH_N_PORT_WWN, END_DEVICE_PORT.MISSING_REASON from N2F_PORT_MAP left join SWITCH_PORT AG_F_PORT on AG_F_PORT.USER_PORT_NUMBER = N2F_PORT_MAP.
Views I TEMP_MODULE.NUM_CPUS, TEMP_MODULE.HW_REVISION, TEMP_MODULE.SW_REVISION, TEMP_MODULE.SLOT_NUM, TEMP_MODULE.DEVICE_ID, TEMP_MODULE.PHYSICAL_DEVICE_ID, TEMP_MODULE.UNIT_NUMBER, TEMP_MODULE.UNIT_PRESENT, case when TEMP_MODULE.UNIT_PRESENT = 1 then 'YES' else 'NO' end as UNIT_PRESENT_TXT, TEMP_MODULE.MANAGED_ELEMENT_ID, TEMP_MODULE.IP_ADDRESS, TEMP_FOUNDRY_MODULE.SERIAL_NUM, TEMP_FOUNDRY_MODULE.DRAM_SIZE, TEMP_FOUNDRY_MODULE.BOOT_FLASH_SIZE, TEMP_FOUNDRY_MODULE.CODE_FLASH_SIZE, TEMP_FOUNDRY_MODULE.
I Views ) TEMP_FOUNDRY_MODULE ON TEMP_MODULE.MODULE_ID = TEMP_FOUNDRY_MODULE.MODULE_ID; NPORT_WWN_MAP_INFO This view provides a consolidation between Nport WWN map and AG''s N and F ports. It considers only those N-Ports that are currently occupied that is having non-empty remote port wwn.
Views I PHANTOM_PORT.VIRTUAL_SWITCH_ID = VIRTUAL_SWITCH.ID; PRODUCT_INFO CREATE VIEW product_info AS select distinct TEMP_DEVICE.DEVICE_ID, TEMP_DEVICE.MANAGED_ELEMENT_ID, TEMP_DEVICE.ALIAS_NAME, TEMP_DEVICE.HOST_NAME, TEMP_DEVICE.OPER_STATUS, case when TEMP_DEVICE.OPER_STATUS = 1 then (case when TEMP_DEVICE.FABRIC_WATCH_STATUS = 2 then 'DEGRADED' when TEMP_DEVICE.FABRIC_WATCH_STATUS = 3 then 'DOWN' else 'REACHABLE' end) when TEMP_DEVICE.OPER_STATUS = 2 then 'NOT REACHABLE' when TEMP_DEVICE.
I Views case when TEMP_DEVICE.SUB_CATEGORY > 0 then (select distinct VCSD.IP_ADDRESS from DEVICE as VCSD where VCSD.MANAGED_ELEMENT_ID in (select distinct VM.CLUSTER_ME_ID from VCS_CLUSTER_MEMBER as VM where TEMP_DEVICE.MANAGED_ELEMENT_ID = VM.MEMBER_ME_ID)) else null end as VCS_IP_ADDRESS, TEMP_DEVICE.SYS_CONTACT, TEMP_DEVICE.SYS_LOCATION, TEMP_DEVICE.DESCRIPTION, TEMP_DEVICE.LAST_SEEN_TIME, TO_TIMESTAMP(TEMP_DEVICE.LAST_SEEN_TIME,'YYYYMMDDHH24MISS') as LAST_SEEN_TIMESTAMP, TEMP_DEVICE.
I Views from DEVICE as TEMP_DEVICE left join ( select FOUNDRY_DEVICE.DEVICE_ID, FOUNDRY_DEVICE.PRODUCT_TYPE, FOUNDRY_DEVICE.IMAGE_VERSION from FOUNDRY_DEVICE ) TEMP_FOUNDRY_DEVICE on TEMP_DEVICE.DEVICE_ID = TEMP_FOUNDRY_DEVICE.DEVICE_ID left join ( select PHYSICAL_DEVICE.DEVICE_ID, PHYSICAL_DEVICE.PHYSICAL_DEVICE_ID, PHYSICAL_DEVICE.NUM_SLOTS, PHYSICAL_DEVICE.UNIT_NUMBER from PHYSICAL_DEVICE ) TEMP_PHYSICAL_DEVICE on TEMP_DEVICE.DEVICE_ID = TEMP_PHYSICAL_DEVICE.
I Views PORT_BOTTLENECK_STATUS.STATUS, SWITCH_PORT.VIRTUAL_SWITCH_ID, SWITCH_PORT.USER_PORT_NUMBER, SWITCH_PORT.TYPE from PORT_BOTTLENECK_STATUS left outer join SWITCH_PORT on PORT_BOTTLENECK_STATUS.SWITCH_PORT_ID = SWITCH_PORT.ID; PORT_GROUP_INFO create or replace view PORT_GROUP_INFO as select SWITCH_PORT.ID as PORT_ID, SWITCH_PORT.NAME as SWITCH_PORT_NAME, SWITCH_PORT.WWN, SWITCH_PORT.HEALTH, SWITCH_PORT.STATUS, SWITCH_PORT.PORT_NUMBER, SWITCH_PORT.SLOT_NUMBER, SWITCH_PORT.
Views I PORT_PROFILE_INFO create or replace view PORT_PROFILE_INFO as select PORT_PROFILE.ID, PORT_PROFILE.SWITCH_ME_ID, PORT_PROFILE.NAME, PORT_PROFILE.STATE, PORT_PROFILE.SWITCH_PORT_MODE, PORT_PROFILE.ACL_PROFILE, PORT_PROFILE.QOS_PROFILE, PORT_PROFILE.FCOE_PROFILE, PORT_PROFILE.VLAN_PROFILE, PORT_PROFILE.VLAN_DETAILS, PORT_PROFILE.DEFAULT_PROFILE, PORT_PROFILE.ACL_NAME, PORT_PROFILE.FCOE_MAP_NAME, PORT_PROFILE.ACTIVATED, PORT_PROFILE_QOS_MAP.DCB_MODE, PORT_PROFILE_QOS_MAP.
I Views PORT_PROFILE.FCOE_PROFILE, PORT_PROFILE.VLAN_PROFILE, PORT_PROFILE.VLAN_DETAILS, PORT_PROFILE.DEFAULT_PROFILE, PORT_PROFILE.ACL_NAME, PORT_PROFILE.FCOE_MAP_NAME, PORT_PROFILE_INTERFACE_MAP.INTERFACE_ID, PORT_PROFILE_INTERFACE_MAP.SWITCH_PORT_ID from PORT_PROFILE, PORT_PROFILE_INTERFACE_MAP where PORT_PROFILE.ID= PORT_PROFILE_INTERFACE_MAP.PROFILE_ID; PORT_PROFILE_MAC_INFO create or replace view PORT_PROFILE_MAC_INFO as select PORT_PROFILE_MAC_MAP.PROFILE_ID, PORT_PROFILE_MAC_MAP.
Views I PROTOCOL_VLAN_INFO create or replace view PROTOCOL_VLAN_INFO as select V.*, port_vlan_db_id, is_dynamic, protocol from vlan V, sub_port_vlan SPV, protocol_vlan PV where V.vlan_db_id = SPV.vlan_db_id AND SPV.vlan_db_id = PV.
I Views where SLNUM <= (select MAX_SLNUM from SFLOW_MINUTE_MAC_SLNUM fetch first 1 rows only) union all select DEVICE_ID, TIME_IN_SECONDS, SRC_MAC, DEST_MAC, IN_VLAN, OUT_VLAN, FRAMES, BYTES from SFLOW_STAGING where SLNUM >= (select MIN_SLNUM from SFLOW_STAGING_SLNUM fetch first 1 rows only); SCOM_EE_MONITOR_INFO This view provides combined ee_monitor, ee_monitor_stats, device_port and device_node tables to get the EE Monitor information for SCOM plug-in.
Views I SENSOR.CORE_SWITCH_ID, SENSOR.SENSOR_ID, SENSOR.CURRENT_READING, SENSOR.TYPE, SENSOR.SUB_TYPE, SENSOR.DESCRIPTION, SENSOR.STATUS, SENSOR.OPERATIONAL_STATUS, SENSOR.PART_NUMBER, SENSOR.SERIAL_NUMBER, SENSOR.VERSION, SENSOR.CREATION_TIME, SENSOR.LAST_UPDATE_TIME, SENSOR.FRU_TYPE, SENSOR.UNIT_NUMBER, SENSOR.STATE, CORE_SWITCH.WWN as PHYSICAL_SWITCH_WWN, VIRTUAL_SWITCH.SWITCH_MODE as VIRTUAL_SWITCH_MODE, VIRTUAL_SWITCH.MANAGEMENT_STATE, VIRTUAL_SWITCH.
I Views SC.CARDCN_ID, SC.FIRST_NAME, SC.LAST_NAME, SC.NOTES, SC.CREATION_TIME, -1 ENGINE_ID, EG.ID ENCRYPTION_GROUP_ID, EG.NAME GROUP_NAME, RCGM.POSITION_ CARD_POSITION, -1 CRYPTO_SWITCH_ID, -1 SLOT_NUMBER from SMART_CARD SC, ENCRYPTION_GROUP EG, RECOVERY_CARD_GROUP_MAPPING RCGM where SC.ID = RCGM.SMART_CARD_ID and EG.ID = RCGM.ENCRYPTION_GROUP_ID and SC.CARD_TYPE = 1 union select SC.ID SMART_CARD_ID, SC.CARD_TYPE, SC.CARD_INFO, SC.CARDCN_ID, SC.FIRST_NAME, SC.LAST_NAME, SC.NOTES, SC.CREATION_TIME, EE.
Views I SWITCH_CONFIG. IS_BASELINE, SWITCH_CONFIG. BACKUP_TYPE, SWITCH_CONFIG. DRIFT_STATUS, SWITCH_CONFIG_DETAIL.IP_ADDRESS, SWITCH_CONFIG_DETAIL.WWN, SWITCH_CONFIG_DETAIL.PHYSICAL_SWITCH_WWN, SWITCH_CONFIG_DETAIL.MODEL_NUMBER as SWITCH_MODEL_NUMBER from SWITCH_CONFIG, SWITCH_CONFIG_DETAIL where SWITCH_CONFIG.ID= SWITCH_CONFIG_DETAIL.SWITCH_CONFIG_ID; SWITCH_PORT_DETAILS_INFO create or replace view SWITCH_PORT_DETAILS_REPORT_INFO as with SWPRT_VSW_CSW_CSWDET_SWMDL_VIEW as ( select SWITCH_PORT.
I Views VIRTUAL_SWITCH.NAME as REMOTE_SWITCH_NAME, VIRTUAL_SWITCH.SWITCH_MODE as REMOTE_SWITCH_MODE, VIRTUAL_SWITCH.DOMAIN_ID as REMOTE_SWITCH_DOMAIN_ID, VIRTUAL_SWITCH.WWN as REMOTE_VIRTUAL_SWITCH_WWN, VIRTUAL_SWITCH.OPERATIONAL_STATUS as REMOTE_SWITCH_OPERATIONAL_STATUS, VIRTUAL_SWITCH.MANAGEMENT_STATE as REMOTE_SWITCH_MANAGEMENT_STATE, VIRTUAL_SWITCH.STATE as REMOTE_SWITCH_STATE, VIRTUAL_SWITCH.STATUS as REMOTE_SWITCH_STATUS, VIRTUAL_SWITCH.STATUS_REASON as REMOTE_SWITCH_STATUS_REASON, CORE_SWITCH.
Views I DEVICE_NODE.AG as DEVICE_NODE_IS_AG, DEVICE_NODE.SIMULATED as DEVICE_NODE_SIMULATED, DEVICE_NODE.FABRIC_ID as DEVICE_NODE_FABRIC_ID from DEVICE_PORT join DEVICE_NODE on DEVICE_PORT.NODE_ID = DEVICE_NODE.ID ) select FABRIC_MEMBER.FABRIC_ID, FABRIC.SEED_SWITCH_WWN as FABRIC_SEED_SWITCH_WWN, FABRIC.NAME as FABRIC_NAME, FABRIC.MANAGEMENT_STATE as FABRIC_MANAGEMENT_STATE, FABRIC.PRINCIPAL_SWITCH_WWN as FABRIC_PRINCIPAL_SWITCH_WWN, FABRIC.FABRIC_NAME as FABRIC_SWITCH_PERSIST_FABRIC_NAME, FABRIC.
I Views DEVPORT_DEVNODE_VIEW.DEVICE_NODE_ID, DEVPORT_DEVNODE_VIEW.DEVICE_PORT_COS, DEVPORT_DEVNODE_VIEW.DEVICE_NODE_WWN, DEVPORT_DEVNODE_VIEW.DEVICE_NODE_DEVICE_TYPE, DEVPORT_DEVNODE_VIEW.DEVICE_NODE_NAME, DEVPORT_DEVNODE_VIEW.DEVICE_FDMI_HOST_NAME, DEVPORT_DEVNODE_VIEW.DEVICE_NODE_CAPABILITY, DEVPORT_DEVNODE_VIEW.DEVICE_NODE_TYPE, DEVPORT_DEVNODE_VIEW.DEVICE_NODE_VENDOR, DEVPORT_DEVNODE_VIEW.DEVICE_NODE_PROXY_DEVICE, DEVPORT_DEVNODE_VIEW.DEVICE_NODE_IS_AG, DEVPORT_DEVNODE_VIEW.
Views I SWPRT_VSW_CSW_CSWDET_SWMDL_VIEW.REMOTE_SWITCH_STATE, SWPRT_VSW_CSW_CSWDET_SWMDL_VIEW.REMOTE_SWITCH_STATUS, SWPRT_VSW_CSW_CSWDET_SWMDL_VIEW.REMOTE_SWITCH_STATUS_REASON, SWPRT_VSW_CSW_CSWDET_SWMDL_VIEW.REMOTE_CORE_SWITCH_ID, SWPRT_VSW_CSW_CSWDET_SWMDL_VIEW.REMOTE_CORE_SWITCH_IP_ADDRESS, SWPRT_VSW_CSW_CSWDET_SWMDL_VIEW.REMOTE_CORE_SWITCH_WWN, SWPRT_VSW_CSW_CSWDET_SWMDL_VIEW.REMOTE_CORE_SWITCH_NAME, SWPRT_VSW_CSW_CSWDET_SWMDL_VIEW.REMOTE_CORE_SWITCH_TYPE, SWPRT_VSW_CSW_CSWDET_SWMDL_VIEW.
I Views varying]::text[])) or SWITCH_PORT.TYPE::text~~ 'LB-Port%'::text) and VIRTUAL_SWITCH.MONITORED = 1 and (VIRTUAL_SWITCH.SWITCH_MODE = any (array[0, 2])) and ((CORE_SWITCH.TYPE <> all (array[62, 63])) or (SWITCH_PORT.SLOT_NUMBER <> all (array[5, 8]))) and (FABRIC.MANAGED is null or FABRIC.MANAGED = 1) and (FABRIC.TYPE is null or (FABRIC.TYPE <> all (array[65, 66, 4]))); SWITCH_DETAILS_INFO create or replace view SWITCH_DETAILS_INFO as select CORE_SWITCH.ID as PHYSICAL_SWITCH_ID, CORE_SWITCH.
Views I VIRTUAL_SWITCH.USER_DEFINED_VALUE_1, VIRTUAL_SWITCH.USER_DEFINED_VALUE_2, VIRTUAL_SWITCH.USER_DEFINED_VALUE_3, VIRTUAL_SWITCH.FMS_MODE, VIRTUAL_SWITCH.DYNAMIC_LOAD_SHARING, VIRTUAL_SWITCH.PORT_BASED_ROUTING, VIRTUAL_SWITCH.IN_ORDER_DELIVERY, VIRTUAL_SWITCH.INSISTENT_DID_MODE, VIRTUAL_SWITCH.FCR_CAPABLE, VIRTUAL_SWITCH.LAST_PORT_MEMBERSHIP_CHANGE, VIRTUAL_SWITCH.FCIP_CIRCUIT_CAPABLE, VIRTUAL_SWITCH.MAX_FCIP_TUNNELS, VIRTUAL_SWITCH.MAX_FCIP_CIRCUITS, VIRTUAL_SWITCH.FCIP_LICENSED, VIRTUAL_SWITCH.
I Views CORE_SWITCH_DETAILS.CONTACT, CORE_SWITCH_DETAILS.LOCATION, CORE_SWITCH_DETAILS.DESCRIPTION, CORE_SWITCH_DETAILS.RNID_SEQUENCE_NUMBER, CORE_SWITCH_DETAILS.FIRMWARE_VERSION as CSD_FIRMWARE_VERSION, CORE_SWITCH_DETAILS.CHASSIS_PACKAGE_TYPE, CORE_SWITCH_DETAILS.IP_ADDRESS_PREFIX, CORE_SWITCH_DETAILS.DOMAIN_NAME, CORE_SWITCH_DETAILS.FRAME_LOG_SIZE, CORE_SWITCH_DETAILS.FRAME_LOG_ENABLED, CORE_SWITCH_DETAILS.
Views I SWITCH_PORT.STATUS, SWITCH_PORT.HEALTH, SWITCH_PORT.STATUS_MESSAGE, SWITCH_PORT.PHYSICAL_PORT, SWITCH_PORT.LOCKED_PORT_TYPE, SWITCH_PORT.CATEGORY, SWITCH_PORT.PROTOCOL, SWITCH_PORT.SPEED, SWITCH_PORT.SPEEDS_SUPPORTED, SWITCH_PORT.MAX_PORT_SPEED, SWITCH_PORT.DESIRED_CREDITS, SWITCH_PORT.BUFFER_ALLOCATED, SWITCH_PORT.ESTIMATED_DISTANCE, SWITCH_PORT.ACTUAL_DISTANCE, SWITCH_PORT.LONG_DISTANCE_SETTING, SWITCH_PORT.DEGRADED_PORT, SWITCH_PORT.REMOTE_NODE_WWN, SWITCH_PORT.REMOTE_PORT_WWN, SWITCH_PORT.
I Views SWITCH_PORT.PORT_COMMISSION_STATE, SWITCH_PORT.FEATURES_SUPPORTED, SWITCH_PORT.FEATURES_ENABLED, SWITCH_PORT.FEATURES_ACTIVE, SWITCH_PORT.DISABLED_REASON_CODE, SWITCH_PORT.DISABLED_REASON, SWITCH_PORT.FENCED, SWITCH_PORT.MASTER_PORT_NUMBER, SWITCH_PORT.SPEED_TYPE, VIRTUAL_SWITCH.WWN as VIRTUAL_SWITCH_WWN, VIRTUAL_SWITCH.ROLE as SWITCH_ROLE, VIRTUAL_SWITCH.VIRTUAL_FABRIC_ID as VIRTUAL_FABRIC_ID, VIRTUAL_SWITCH.DOMAIN_ID as DOMAIN_ID, VIRTUAL_SWITCH.INTEROP_MODE as INTEROP_MODE, VIRTUAL_SWITCH.
Views I VIRTUAL_SWITCH.VIRTUAL_FABRIC_ID, VIRTUAL_SWITCH.BASE_SWITCH, VIRTUAL_SWITCH.MAX_ZONE_CONFIG_SIZE, VIRTUAL_SWITCH.CREATION_TIME, VIRTUAL_SWITCH.LAST_UPDATE_TIME, VIRTUAL_SWITCH.USER_NAME, VIRTUAL_SWITCH.PASSWORD, VIRTUAL_SWITCH.MANAGEMENT_STATE, VIRTUAL_SWITCH.STATE, VIRTUAL_SWITCH.STATUS, VIRTUAL_SWITCH.STATUS_REASON, VIRTUAL_SWITCH.MONITORED, VIRTUAL_SWITCH.USER_DEFINED_VALUE_1, VIRTUAL_SWITCH.USER_DEFINED_VALUE_2, VIRTUAL_SWITCH.USER_DEFINED_VALUE_3, FABRIC_MEMBER.FABRIC_ID, FABRIC_MEMBER.
I Views TIME_SERIES_DATA_INFO CREATE VIEW time_series_data_info AS ( ( ( ( ( ( select * from TIME_SERIES_DATA_1 union all select TIME_SERIES_DATA_1_30MIN.TIME_IN_SECONDS, TIME_SERIES_DATA_1_30MIN.TARGET_TYPE, TIME_SERIES_DATA_1_30MIN.MEASURE_ID, TIME_SERIES_DATA_1_30MIN.TARGET_ID, TIME_SERIES_DATA_1_30MIN.COLLECTOR_ID, TIME_SERIES_DATA_1_30MIN.MEASURE_INDEX, TIME_SERIES_DATA_1_30MIN.ME_ID, TIME_SERIES_DATA_1_30MIN.VALUE, TIME_SERIES_DATA_1_30MIN.
Views I TIME_SERIES_DATA_2_2HOUR.VALUE, TIME_SERIES_DATA_2_2HOUR.SUM_VALUE from TIME_SERIES_DATA_2_2HOUR) union all select TIME_SERIES_DATA_2_1DAY.TIME_IN_SECONDS, TIME_SERIES_DATA_2_1DAY.TARGET_TYPE, TIME_SERIES_DATA_2_1DAY.MEASURE_ID, TIME_SERIES_DATA_2_1DAY.TARGET_ID, TIME_SERIES_DATA_2_1DAY.COLLECTOR_ID, TIME_SERIES_DATA_2_1DAY.MEASURE_INDEX, TIME_SERIES_DATA_2_1DAY.ME_ID, TIME_SERIES_DATA_2_1DAY.VALUE, TIME_SERIES_DATA_2_1DAY.
I Views (measure.name::text || '.'::text) || tsd.measure_index::text AS collectible_name, measure.detail AS collectible_detail, tsd.value, tsd.time_in_seconds, tsd.measure_index FROM time_series_data_info tsd JOIN switch_port sp ON tsd.target_type = 4 AND tsd.target_id = sp.id JOIN virtual_switch vs ON sp.virtual_switch_id = vs.id JOIN device de ON vs.managed_element_id = de.managed_element_id JOIN pm_data_collector ON pm_data_collector.id = tsd.collector_id JOIN measure ON measure.id = tsd.
Views I SOURCE_DEVICE.DEVICE_ID AS SOURCE_DEVICE_ID, TRILL.DEST_DOMAIN_ID, TRILL.DEST_PORT_NUMBER, TRILL.DEST_PORT_NAME as DEST_SWITCH_PORT_NAME, TRILL.DEST_ME_ID, DEST_DEVICE.DEVICE_ID AS DEST_DEVICE_ID from TRILL, device VCS_DEVICE, device SOURCE_DEVICE, VIRTUAL_SWITCH SOURCE_VIRTUAL_SWITCH, device DEST_DEVICE, VIRTUAL_SWITCH DEST_VIRTUAL_SWITCH where SOURCE_DEVICE.MANAGED_ELEMENT_ID = TRILL.SOURCE_ME_ID and DEST_DEVICE.MANAGED_ELEMENT_ID = TRILL.DEST_ME_ID and VCS_DEVICE.MANAGED_ELEMENT_ID = TRILL.
I Views ROLE.ID ROLE_ID, ROLE.NAME ROLE_NAME, USER_.NAME USER_NAME from USER_, RESOURCE_GROUP, ROLE, USER_RESOURCE_MAP, USER_ROLE_MAP where USER_ROLE_MAP.USER_NAME = USER_.NAME and USER_ROLE_MAP.ROLE_ID = ROLE.ID and USER_RESOURCE_MAP.RESOURCE_GROUP_ID = RESOURCE_GROUP.ID and USER_RESOURCE_MAP.USER_NAME = USER_.NAME; VIRTUAL_FCOE_PORT_INFO create or replace view VIRTUAL_FCOE_PORT_INFO as select VIRTUAL_FCOE_PORT.ID, VIRTUAL_FCOE_PORT.VIRTUAL_SWITCH_ID, VIRTUAL_FCOE_PORT.PORT_WWN, VIRTUAL_FCOE_PORT.
Views I VIRTUAL_PORT_WWN_DETAILS.SWITCH_PORT_NUMBER, VIRTUAL_PORT_WWN_DETAILS.SLOT_NUMBER, coalesce(CS1.IP_ADDRESS, CS2.IP_ADDRESS, UDDD.IP_ADDRESS) as IP_ADDRESS, coalesce(VS1.NAME, VS2.NAME, UDDD.NAME) as SWITCH_NAME, coalesce(VS1.WWN, VS2.WWN) as SWITCH_WWN, VIRTUAL_PORT_WWN_DETAILS.AG_NODE_WWN, VIRTUAL_PORT_WWN_DETAILS.AG_PORT_NUMBER, VIRTUAL_PORT_WWN_DETAILS.STATUS, VIRTUAL_PORT_WWN_DETAILS.TYPE, VIRTUAL_PORT_WWN_DETAILS.USER_VPWWN, VIRTUAL_PORT_WWN_DETAILS.AUTO_VPWWN, VIRTUAL_PORT_WWN_DETAILS.
I Views AND VM_VIRTUAL_MACHINE.HOST_ID = VM_VCENTER_MEMBER.VM_HOST_ID; VLAN_INT_CLASSIFIER_INFO CREATE VIEW vlan_int_classifier_info AS select VLAN_INTERFACE_RELATION.VLAN_INTERFACE_RELATION_ID, VLAN_INTERFACE_RELATION.VLAN_DB_ID, VLAN_INTERFACE_RELATION.INTERFACE_ID, VLAN_INT_C_TAG_RELATION.C_TAG_ID, MAC_GROUP.NAME, MAC_GROUP.MAC_GROUP_ID, MAC_GROUP.TYPE, MAC_GROUP_MEMBER.MAC_ADDRESS, MAC_GROUP_MEMBER.MASK, MAC_GROUP.ID AS MAC_GROUP_DB_ID, DEVICE.
Views I VM_PATH.TARGET_PORT AS TARGET_PORT_WWN, VM_STORAGE.NAME AS LUN_CAN_NAME, VM_PATH.FS_TYPE, VM_VIRTUAL_MACHINE.HYPERVISOR_VM_ID, DEVICE_ENCLOSURE.MANAGED_ELEMENT_ID AS HOST_ME_ID, DEVICE_ENCLOSURE.IP_ADDRESS AS HOST_IP_ADDRESS, DEVICE_ENCLOSURE.HOST_NAME AS HYPERVISOR_HOST_NAME, FABRIC.NAME AS FABRIC_NAME, VIRTUAL_SWITCH.NAME AS VIRTUAL_NAME, SWITCH_PORT.STATUS AS SWITCH_PORT_STATUS, SWITCH_PORT.ID as SWITCH_PORT_ID, SWITCH_PORT.PORT_ID, SWITCH_PORT.PORT_NUMBER, SWITCH_PORT.
I Views VM_VCENTER.ID as VCENTER_ID, DEVICE_ENCLOSURE.ID AS HOST_DB_ID, DEVICE_ENCLOSURE.IP_ADDRESS as HYPERVISOR_HOST, VM_VIRTUAL_MACHINE.ID as VM_ID, VM_VIRTUAL_MACHINE.IP_ADDRESS AS VM_IP_ADDRESS, VM_VIRTUAL_MACHINE.HOSTNAME AS VM_HOST_NAME, VM_VIRTUAL_MACHINE.UUID as VM_UUID, VM_VIRTUAL_MACHINE.NAME as VM_NAME, VM_PATH.NAME as PATH_NAME, VM_PATH.HBA_PORT as ADAPTER_PORT_WWN, VM_PATH.TARGET_PORT as TARGET_PORT_WWN, VM_STORAGE.NAME as LUN_CAN_NAME, VM_PATH.FS_TYPE, VM_VIRTUAL_MACHINE.
Views and and and and I SWITCH_PORT.VIRTUAL_SWITCH_ID = VIRTUAL_SWITCH.ID VIRTUAL_SWITCH.CORE_SWITCH_ID = CORE_SWITCH.ID DEVICE_PORT.NODE_ID = DEVICE_NODE.ID DEVICE_NODE.FABRIC_ID = FABRIC.ID; comment on view VM_CONNECTIVITY_INFO is 'Combine fabric and VM info to derive end to end connectivity information for the VM'; VM_NETWORK_CONNECTIVITY_INFO CREATE VIEW vm_network_connectivity_info AS select VM_VIRTUAL_ETHERNET_ADAPTER.ID as VNIC_ID, VM_VIRTUAL_ETHERNET_ADAPTER.
I Views left join (select PROFILE_ID, array_agg(VLANID)::varchar as VLAN from PORT_PROFILE_VLAN_MAP group by PROFILE_ID) PROFILE_VLAN_MAP on PROFILE_VLAN_MAP.PROFILE_ID = PORT_PROFILE.ID left join VM_NETWORK_SETTINGS on VM_NETWORK_SETTINGS.VM_STD_VSWITCH_PORT_GROUP_ID = VM_VIRTUAL_ETHERNET_ADAPTER.VM_STD_VSWITCH_PORT_GROUP_ID where VM_VIRTUAL_ETHERNET_ADAPTER.VIRTUAL_MACHINE_ID = VM_VIRTUAL_MACHINE.ID and VM_VIRTUAL_MACHINE.HOST_ID = VM_VCENTER_MEMBER.VM_HOST_ID and VM_VIRTUAL_MACHINE.HOST_ID = VM_HOST.
Views I left join VCS_CLUSTER_MEMBER on VCS_CLUSTER_MEMBER.MEMBER_ME_ID = DEVICE.MANAGED_ELEMENT_ID left join DEVICE as CLUSTER_DEVICE on CLUSTER_DEVICE.MANAGED_ELEMENT_ID = VCS_CLUSTER_MEMBER.CLUSTER_ME_ID left join PORT_PROFILE_INTERFACE_MAP on PORT_PROFILE_INTERFACE_MAP.INTERFACE_ID = INTERFACE.INTERFACE_ID left join PORT_PROFILE on PORT_PROFILE.ID = PORT_PROFILE_INTERFACE_MAP.PROFILE_ID left join (select PORT_PROFILE_DOMAIN_MAP.PROFILE_ID, array_to_string(array_agg(PORT_PROFILE_DOMAIN.
I Views DEST_NODE.WWN as DEST_DEVICE_WWN, DEST_PORT.WWN as DEST_PORT_WWN, SOURCE_NODE.FABRIC_ID as SOURCE_FABRIC_ID, DEST_NODE.FABRIC_ID as DEST_FABRIC_ID, SOURCE_PORT.DOMAIN_ID as SOURCE_SWITCH_DOMAIN_ID, DEST_PORT.DOMAIN_ID as DEST_SWITCH_DOMAIN_ID, VM_VIRTUAL_MACHINE.HYPERVISOR_VM_ID, VM_VIRTUAL_MACHINE.NAME as VM_NAME from VM_PATH, VM_VIRTUAL_MACHINE, DEVICE_PORT as SOURCE_PORT, DEVICE_PORT as DEST_PORT, DEVICE_NODE as DEST_NODE, DEVICE_NODE as SOURCE_NODE, EE_MONITOR, EE_MONITOR_STATS where VM_PATH.
Views I VM_VIRTUAL_MACHINE.HOSTNAME as VM_HOSTNAME, VM_VIRTUAL_MACHINE.BOOT_TIME as VM_BOOT_TIME, VM_VIRTUAL_MACHINE.DATASTORE_NAME, VM_VIRTUAL_MACHINE.DATASTORE_LOCATION, VM_VIRTUAL_MACHINE.NODE_WWN as VM_NODE_WWN from VM_DATA_CENTER, VM_HOST left join VM_VIRTUAL_MACHINE on VM_HOST.DEVICE_ENCLOSURE_ID = VM_VIRTUAL_MACHINE.HOST_ID where VM_DATA_CENTER.ID = VM_HOST.VM_DATACENTER_ID; VM_LUN_INFO create or replace view VM_LUN_INFO as select VM_STORAGE.HOST_ID, VM_STORAGE.ID as LUN_ID, VM_STORAGE.
I Views DEVICE_PORT.DOMAIN_ID, DEVICE_ENCLOSURE.IP_ADDRESS as HYPERVISOR_HOST, VM_PATH.HBA_PORT as ADAPTER_PORT_WWN, VM_VIRTUAL_MACHINE.HYPERVISOR_VM_ID, VM_VIRTUAL_MACHINE.NAME as VM_NAME, CORE_SWITCH.IP_ADDRESS, CORE_SWITCH.NAME as CORE_NAME, FC_PORT_STATS.TX, FC_PORT_STATS.RX, FC_PORT_STATS.TX_UTILIZATION, FC_PORT_STATS.RX_UTILIZATION, FC_PORT_STATS.SYNCLOSSES, FC_PORT_STATS.SIGNALLOSSES, FC_PORT_STATS.SEQUENCEERRORS, FC_PORT_STATS.INVALIDTRANSMISSIONS, FC_PORT_STATS.CRCERRORS, FC_PORT_STATS.
I Views SWITCH_TE_PORT_STATS.RECEIVE_OK_PERCENT_UTIL, (-1) AS SYNCLOSSES, (-1) AS SIGNALLOSSES, (-1) AS SEQUENCEERRORS, (-1) AS INVALIDTRANSMISSIONS, (-1) AS CRCERRORS, SWITCH_TE_PORT_STATS.CREATION_TIME, VIRTUAL_SWITCH.NAME as VIRTUAL_NAME, SWITCH_PORT.STATUS as SWITCH_PORT_STATUS, SWITCH_PORT.PORT_ID, SWITCH_PORT.
I Views VR_CONN_DOMAIN_GROUP.NAME as DOMAIN_GROUP_NAME, VCEM_PROFILE.ID as VCEM_PROFILE_ID, VCEM_PROFILE.DISCOVERY_STATUS, VCEM_PROFILE.LAST_FAILURE_TIMESTAMP as VCEM_LAST_FAILED_TIME, VCEM_PROFILE.LAST_SUCCESSFUL_TIMESTAMP as VCEM_LAST_SUCCESSFUL_TIME, VIRTUAL_SWITCH.ID as VIRTUAL_SWITCH_ID, VIRTUAL_SWITCH.MANAGED_ELEMENT_ID as VIRTUAL_SWITCH_ME_ID, VIRTUAL_SWITCH.NAME, CORE_SWITCH.IP_ADDRESS, FABRIC_MEMBER.FABRIC_ID, FABRIC.
Views I FABRIC.MANAGED as FABRIC_MANAGED from VR_CONN_MODULE inner join VR_CONN_DOMAIN on VR_CONN_DOMAIN.ID = VR_CONN_MODULE.VR_CONN_DOMAIN_ID inner join VCEM_PROFILE on VCEM_PROFILE.ID = VR_CONN_DOMAIN.VCEM_PROFILE_ID left outer join VR_CONN_DOMAIN_GROUP on VR_CONN_DOMAIN_GROUP.ID = VR_CONN_DOMAIN.VR_CONN_DOMAIN_GROUP_ID left outer join VIRTUAL_SWITCH on VIRTUAL_SWITCH.WWN = VR_CONN_MODULE.WWN left outer join CORE_SWITCH on CORE_SWITCH.ID = VIRTUAL_SWITCH.
I Views left outer join VIRTUAL_SWITCH on VIRTUAL_SWITCH.WWN = VR_CONN_MODULE.WWN; VR_CONN_NPIV_INFO create or replace view VR_CONN_NPIV_INFO as select VR_CONN_WWN.ID, VR_CONN_WWN.VR_CONN_FC_CONNECTION_ID, VR_CONN_WWN.PORT_ADDRESS as PORT_WWN, VR_CONN_WWN.NODE_ADDRESS as NODE_WWN, VR_CONN_SERVER_PROFILE.NAME as SERVER_PROFILE_NAME, VR_CONN_SERVER_PROFILE.BAY_NAME, coalesce(VR_CONN_SERVER_PROFILE.BAY_NUMBER, VR_CONN_FC_CONNECTION.CONNECTION_BAY) as BAY_NUMBER, VR_CONN_SERVER_PROFILE.
Views I SWITCH_PORT.WWN = VR_CONN_MODULE_PORT.WWN left outer join DEVICE_PORT on DEVICE_PORT.WWN = VR_CONN_WWN.PORT_ADDRESS left outer join DEVICE_NODE on DEVICE_NODE.WWN = VR_CONN_WWN.NODE_ADDRESS left outer join USER_DEFINED_DEVICE_DETAIL on USER_DEFINED_DEVICE_DETAIL.WWN = VR_CONN_WWN.PORT_ADDRESS; VMM_DISCOVERED_MAC_INFO create or replace view VMM_DISCOVERED_MAC_INFO AS select VM_VIRTUAL_ETHERNET_ADAPTER.MAC_ADDRESS, VM_VIRTUAL_ETHERNET_ADAPTER.DISPLAY_LABEL, VM_VIRTUAL_ETHERNET_ADAPTER.
I Views where VM_PHYSICAL_NIC.VM_HOST_ID = VM_VCENTER_MEMBER.VM_HOST_ID AND VM_VCENTER_MEMBER.VM_VCENTER_ID = VM_VCENTER.ID; VM_VIRTUAL_ETHERNET_ADAPTER_INFO create or replace view VM_VIRTUAL_ETHERNET_ADAPTER_INFO as select VM_VIRTUAL_ETHERNET_ADAPTER.ID, VM_VIRTUAL_ETHERNET_ADAPTER.MAC_ADDRESS, VM_VIRTUAL_ETHERNET_ADAPTER.DISPLAY_LABEL, VM_VIRTUAL_ETHERNET_ADAPTER.PORT_GROUP_NAME, VM_VIRTUAL_MACHINE.NAME as VIRTUAL_MACHINE_NAME, VM_VCENTER_MEMBER.HOST_NAME, VM_VCENTER.
I Views ZONE_DB_REPORT_INFO CREATE OR REPLACE VIEW zone_db_report_info AS SELECT zone_db.id, zone_db.fabric_id, zone_db.offline, zone_db.name, zone_db.created, zone_db.created_by, zone_db.last_modified, zone_db.last_modified_by, zone_db.last_applied, zone_db.last_applied_by, zone_db.default_zone_status, zone_db.mcdata_default_zone, zone_db.mcdata_safe_zone, zone_db.zone_txn_supported, zone_db.zone_config_size, zone_db.txn_status, zone_db.zone_available_size, zone_db_config.id AS config_id, zone_db_config.
I Views SFLOW_MINUTE_VLAN_VIEW create or replace view SFLOW_MINUTE_VLAN_VIEW as select DEVICE_ID, TIME_IN_SECONDS, IN_VLAN, OUT_VLAN, FRAMES, BYTES from SFLOW_MINUTE_VLAN where SLNUM <= (select MAX_SLNUM from SFLOW_MINUTE_VLAN_SLNUM fetch first 1 rows only) union all select DEVICE_ID, TIME_IN_SECONDS, IN_VLAN, OUT_VLAN, FRAMES, BYTES from SFLOW_STAGING where SLNUM >= (select MIN_SLNUM from SFLOW_STAGING_SLNUM fetch first 1 rows only); PHYSICAL_DEVICE_INFO create or replace view PHYSICAL_DEVICE_INFO as se
Views I MANAGED_ELEMENT_INFO Common managed element data used by custom DTO methods to identify the managed element type, and provide a link to the details table for the managed element. Some common managed element fields are included in this view so Fault Management can use this view to identify the managed element ID for an event source. create or replace view MANAGED_ELEMENT_INFO as select MANAGED_ELEMENT.ID as MANAGED_ELEMENT_ID, DEVICE.DEVICE_ID as IP_DEVICE_ID, coalesce(CS_ME.ID, CS_VS.
I Views ( ( ( ( SELECT de.device_id, de.ip_address AS device_ip, se.target_type, de.device_id AS target_id, de.sys_name AS target_name, 1 AS collectible_type, se.expression_id AS collectible_id, se.collector_id, ( SELECT perf_collector.name AS collector_name FROM perf_collector WHERE perf_collector.collector_id = se.collector_id) AS collector_name, ( SELECT snmp_expression.name AS collectible_name FROM snmp_expression WHERE snmp_expression.expression_id = se.
Views I UNION ALL SELECT de.device_id, de.ip_address AS device_ip, se.target_type, ifs.interface_id AS target_id, ifs.if_name AS target_name, 1 AS collectible_type, se.expression_id AS collectible_id, se.collector_id, ( SELECT perf_collector.name AS collector_name FROM perf_collector WHERE perf_collector.collector_id = se.collector_id) AS collector_name, ( SELECT snmp_expression.name AS collectible_name FROM snmp_expression WHERE snmp_expression.expression_id = se.
I Views VM_VNETWORK_INFO This view provideds combine VM and device information to derive VM to the ingress switch port information. create or replace view VM_VNETWORK_INFO as select VM_HOST.HYPERVISOR_NAME as VHOST_NAME, VM_VIRTUAL_MACHINE.NAME as VM_NAME, VM_VIRTUAL_MACHINE.HYPERVISOR_VM_ID as VM_ID, VM_VIRTUAL_ETHERNET_ADAPTER.MAC_ADDRESS as VNIC_MAC, VM_DV_PORT_GROUP.NAME as PGRP_NAME, VM_DV_SWITCH.NAME as VSWITCH_NAME, VNIC_DV_PORT.NAME as DVPORT_NAME, VM_PHYSICAL_NIC.
Views I VM_PHYSICAL_NIC.DEVICE_NAME as PNIC_NAME, VM_PHYSICAL_NIC.MAC_ADDRESS as PNIC_MAC, DEVICE.SYS_NAME as SWITCH_NAME, DEVICE.IP_ADDRESS as SWITCH_IP, PHYSICAL_PORT.PORT_NUM as SWITCH_PORT, INTERFACE.PORT_STATUS as SWITCH_PORT_STATUS from VM_HOST left join VM_VIRTUAL_MACHINE on VM_HOST.DEVICE_ENCLOSURE_ID = VM_VIRTUAL_MACHINE.
I Views RESET_VCS_LICENSED CREATE OR REPLACE FUNCTION reset_vcs_licensed(no_of_licenses integer) RETURNS void AS $BODY$ begin UPDATE fabric set vcs_licensed = 0; UPDATE device set vcs_licensed = 0; UPDATE fabric set vcs_licensed = 1 WHERE fabric.id in (SELECT id FROM fabric ORDER BY creation_time LIMIT no_of_licenses); UPDATE device set vcs_licensed = 1 WHERE device.
Views I SELECT l2.device_id, l2.device_ip_address, l2.physical_device_id, l2.unit_number, l2.slot_id, l2.slot_num, l2.module_id, l2.physical_port_id, l2.port_num, l2.interface_id, l2.name, l2.if_name, l2.identifier, l2.speed_in_mb, l2.physical_address, l2.interface_id AS radioif_id, wireless.radio_type, wireless.is_enabled, wireless.is_auto_channel, wireless.tx_power, wireless.channel_number, wireless.max_data_rate, wireless.beacon_rate, wireless.dtim, wireless.rts_threshold, wireless.
I Views select L2.DEVICE_ID, L2.MANAGED_ELEMENT_ID, L2.DEVICE_IP_ADDRESS, L2.PHYSICAL_DEVICE_ID, L2.UNIT_NUMBER, L2.SLOT_ID, L2.SLOT_NUM, L2.MODULE_ID, L2.PHYSICAL_PORT_ID, L2.PORT_NUM, L2.INTERFACE_ID, L2.NAME, L2.IF_NAME, L2.IDENTIFIER, L2.TABLE_SUBTYPE, case when L2.TABLE_SUBTYPE like 'GBIT_ETHERNET_INTERFACE' then 'GIGABIT ETHERNET' when L2.TABLE_SUBTYPE like 'POS_INTERFACE' then 'POS' else L2.TABLE_SUBTYPE end as TABLE_SUBTYPE_TXT, L2.TAG_MODE, case when L2.TAG_MODE = 1 then 'TAGGED' when L2.
Views I INM_IP_INTERFACE.SUBNET_MASK from INM_IP_INTERFACE) L3 on L2.INTERFACE_ID = L3.IP_ID; CEE_PORT_INFO create or replace view CEE_PORT_INFO as CREATE VIEW cee_port_info AS select GIGE_PORT.ID, GIGE_PORT.SWITCH_PORT_ID, GIGE_PORT.PORT_NUMBER, CEE_PORT.ID AS CEE_PORT_ID, CEE_PORT.VIRTUAL_SWITCH_ID, CEE_PORT.IF_INDEX, CEE_PORT.IF_NAME, CEE_PORT.IF_MODE, CEE_PORT.L2_MODE, CEE_PORT.VLAN_ID, CEE_PORT.LAG_ID, CEE_PORT.IP_ADDRESS, CEE_PORT.MAC_ADDRESS, CEE_PORT.PORT_SPEED, CEE_PORT.ENABLED, CEE_PORT.
I 1862 Views Brocade Network Advisor IP User Manual 53-1003153-01
Index A access levels defined, 1439 features, 1439–1440, 1441–?? roles, 1439 accessing FTP server folder, 180 activating Allow/Prohibit Matrix configuration, 824 zone configuration, 770 active session management, roles and access levels, 1439 active sessions, viewing, 10 adapter software using to manage driver files, 575 adapters types of, 568 types of fabric adapters, 569 Adding C3 discard frames threshold, 795 state change threshold, 802, 807 adding invalid CRCs thresholds, 797 invalid words thresholds,
C C3 Discard Frames threshold, 793 call home, 451 centers assigning a device, 467 assigning event filters, 469 disabling, 465 editing, 457 Brocade International, 457 e-mail, 458 EMC, 462 HP LAN, 463 IBM, 457 enabling, 464 enabling support save, 464 hiding, 456 removing a device, 467 removing all devices and filters, 467 removing event filters, 470 test connection, 465 viewing, 456 configuring, 451 roles and access levels, 1439 status, determining, 398 system requirements, 453 viewing status, 466 call home
Allow/Prohibit Matrix configuration, 822, 823 log entries, 1339 log entry parts, 1338 master log, 1342 master log parts, 1342 zones, 763 creating zone, 759 zone alias, 765 zone configuration, 768 zone databases, 773 zone members, 761 zone sets, 768 CUP, FICON, 811 customizing the dashboard, 221 D dashboard customization, 221 set network scope, 221 data real time performance, 1106 data backup, 134 data backup and restore, 594 data restore, 140 database fields Sybase and Derby, 1513 database, restoring, 508
Edit menu, 1400 editing property fields, 1474 property labels, 406, 1473 thresholds, 804 zone alias, 765 editing system collectors, 1126 Element Manager, launching launching Element Manager, 474 e-mail event notification setup roles and access levels, 1439 e-mail filter override, 594 e-mail notification configuring, 1274 emailing technical support information, 1361 enabling call home centers, 464 default zone for fabrics, 764 support save for call home centers, 464 enabling backup, 137 ESXi adding host adap
fabric properties, 1443 fabric properties dialog boxes, customizing, 1443 Fabric Watch notification types, 558 fabrics deleting from discovery, 105 status, determining, 398 zone database, clearing, 782 fault management roles and access levels, 1440 FC Address for inactive iSCSI devices, 1452 FCoE management, roles and access levels, 1440 feature active session management, 1439 backup, 1440 call home, 451, 1439 CEE management, 1439 configuration management, 1439 e-mail event notification setup, 1439 event ma
Help menu, 1399, 1406 high integrity fabric configuration setttings, 827 high integrity fabrics (HIF), requirements, 811 host adapter discovery, 572 host adapters adding a port configuration, 581 and boot image repository, 577 and driver repository, 576 and fault management, 593 and performance management, 590 and role-based access control, 589 and security authentication, 591 and supportSave, 593 and syslog forwarding, 594 bulk port configuration, 580 configuring FAWWNs, 584 configuring ports, 580 deleting
license MPLS devices, 976, 1011, 1015, 1026, 1027 license update roles and access levels, 1440 link reset threshold, 794 link reset thresholds adding, 799 listing un-zoned members, 785 zone members, 785 log entries copying, 1339 copying parts, 1338 exporting, 1339 logging in remote client, 4 remote SMIA configuration tool, 513 server, 3 logical chassis cluster mode, 46, 47, 543, 544, 545 login banner configuring, 157 disabling, 158 login security configuring, 157 logon conflicts, 770 logs event, 1338 LSAN z
viewing, 150 names, overview, 149 naming conventions, 757 network scope setting, 221 network size status, determining, 397 new device, adding name, 153 NOS firmware activate, 546, 948 firmware update, 546, 948 notification type e-mail alert, 558 O objects removing thresholds, 809 offline zone database deleting, 774 overwriting, event filter, 470 P PAP, 488 passwords database, changing, 22, 26 patch install, 31 uninstall, 32 performance roles and access levels, 1440 performance data real time, 1106 perform
launch, 4 logging in, 4 remote host management, 570 remote SMIA configuration tool logging in, 513 removing members from zone, 761 objects from zone alias, 766 thresholds, 809 thresholds from individual objects, 809 thresholds from table, 810 zone from zone configuration, 769 zones from zone configuration, 769 removing event filters call home centers, 470 call home event filters table, 471 devices, 471 renaming zone alias, 767 zone configuration, 772 zones, 762 replacing zone members, 786 report roles and a
adding and editing SNMP v3, 1287 SNMP Monitor export report, 1149 report, 1144 requirements, 1113 SNMP trap forwarding adding a trap filter, 1283 SNMP trap recipients adding to switches, 1280 removing from switches, 1281 SNMP traps description of, 1279 importing a new MIB, 1288 modifying the definitions of registered traps, 1291 registering, 1290 reverting a trap to its default, 1292 unregistering, 1291 SNMP v3, adding and editing credentials, 1287 software configuration, 161 software configuration properti
adding to device shortcut menu, 479 changing menu options, 478 changing option on device shortcut menu, 480 changing server address, 476 removing menu options, 478 removing option from device shortcut menu, 481 starting, 473 threshold adding, 795 adding C3 discard frames, 795 adding state change, 802, 807 C3 Discard Frames, 793 Invalid CRCs, 794 Invalid words, 794 ISL protocol, 794 link reset, 794 state change, 794 threshold prioities, 792 thresholds, 792 assigning, 803 editing, 804 finding specific, 808 re
VLAN adding or modifying dual-mode port, 960 adding properties, 961 adding tagged or untagged ports, 958 assigning DCB ports, 961 deleting port VLAN from devices, 964 deploying configurations, 964 displaying, 952 displaying by products, 955 displaying in the global view, 953 modifying port, 963 VLAN management in a VCS environment, 952 VLAN Manager configuration requirements, 951 default VLAN, 949 definition of, 949 super-aggregated VLAN, 950 using to display by products, 955 views, 953 VLAN routing, 970 ma
zone set creating, 768 naming conventions, 757 zone set.
1876 Brocade Network Advisor IP User Manual 53-1003153-01