Brocade Network Advisor SAN User Manual v11.1x (53-1002167-01, May 2011)
xxxvi Brocade Network Advisor SAN User Manual
53-1002167-01
• Chapter 13, “Host management,” provides information on how to configure an HBA.
• Chapter 14, “Fibre Channel over Ethernet,”provides information on how to configure an FCoE.
• Chapter 15, “Security Management,” provides security configuration instructions.
• Chapter 16, “FC-FC Routing Service Management,” provides information on how to manage
Fibre Channel Routing.
• Chapter 17, “Virtual Fabrics,” provides information on configuring and managing logical
switches.
• Chapter 18, “SAN Encryption configuration,” provides information on configuring encryption.
• Chapter 19, “Zoning,” provides zoning configuration instructions.
• Chapter 20, “Fibre Channel over IP,” provides information on how to configure an FCIP.
• Chapter 21, “Fabric Binding,” provides fabric binding instructions.
• Chapter 22, “Port Fencing,” provides information on how to configure port fencing.
• Chapter 23, “FICON Environments,” provides information on how to manage FICON.
• Chapter 24, “VLAN Management,” provides information on how to manage Virtual Local Area
Networks (VLANs).
• Chapter 25, “Deployment Manager,” provides information about how to view, deploy, and
manage deployment configurations.
• Chapter 26, “Troubleshooting,” provides troubleshooting details.
• Chapter 27, “Performance Data,”provides information on how to manage performance.
• Chapter 28, “Frame Monitor,”provides information on how to monitor frames.
• Chapter 29, “Policy Monitor,”provides information on how to configure best practice guidelines.
• Chapter 30, “Fault Management,”provides event management instructions.
• Chapter 31, “Technical Support,”provides server, client, and device support save instructions.
• Chapter 32, “Reports,” provides instructions for generating reports.
• Appendix A, “Application menus,”provides information about the main and shortcut menus.
• Appendix B, “Call Home Event Tables,”provides supplemental information about call home
event tables.
• Appendix C, “User Privileges,”provides supplemental information about user privileges and
access levels.
• Appendix D, “Regular Expressions,” provides a summary of Unicode regular expression
constructs that you can use in the Management application.
• Appendix E, “Database Fields,”provides reference information related to databases.