Brocade Fabric Watch Administrator's Guide v6.1.0 (53-1000601-02, June 2008)

8 Fabric Watch Administrator’s Guide
53-1000601-02
Fabric Watch components
1
DRAFT: BROCADE CONFIDENTIAL
NOTE
Physical link error counters and statistics (such as link failure count, loss of signal count, and RX and
TX performance percentages) are not applicable to VE_Ports.
Resource class area
Table 7 describes the Fabric Watch resource class area.
Security class areas
Table 8 lists Fabric Watch areas in the security class and describes what each area indicates. For
details on each area, see the Secure Fabric OS Administrator’s Guide.
State Changes The state of the port has changed for one of the following reasons:
The port has gone offline.
The port has come online.
The port is testing.
The port is faulty.
The port has become an E_Port, EX_Port, VE_Port, or VEX_Port.
The port has become an F/FL_Port.
The port has segmented.
The port has become a trunk port.
Transmit (TX) Performance The percentage of maximum bandwidth consumed in packet transmissions.
Utilization Indicates the percent of utilization for the port at the time of the last poll.
TABLE 7 Resource class area
Area Description
Flash Monitor Monitors the compact flash space available by calculating the percentage of flash space
consumed and comparing it with the configured high threshold value.
TABLE 8 Security class areas
Area Indicates
API Violation An API access request reaches a secure switch from an unauthorized IP address.
DCC Violation An unauthorized device attempts to log in to a secure fabric.
Front Panel Violation A secure switch detects unauthorized front panel access.
HTTP Violation A browser access request reaches a secure switch from an unauthorized IP address.
Illegal Command Commands permitted only to the primary Fibre Channel Switch (FCS) are executed on
another switch.
Incompatible DB Secure switches with different version stamps have been detected.
Invalid Certificates The primary FCS sends a certificate to all switches in the secure fabric before it sends
configuration data. Receiving switches accept only packets with the correct certificate;
any other certificates are invalid and represent an attempted security breach.
Invalid Signatures If a switch cannot verify the signature of a packet, the switch rejects the packet and the
signature becomes invalid.
Invalid Timestamps If a time interval becomes too great from the time a packet is sent to the time it is
received, the timestamp of the packet becomes invalid and the switch rejects it.
TABLE 6 Port class areas (Continued)
Area Indicates