DRAFT: BROCADE CONFIDENTIAL 53-1001772-01 30 March 2010 Web Tools Administrator’s Guide Supporting Fabric OS v6.4.
DRAFT: BROCADE CONFIDENTIAL Copyright © 2006-2009 Brocade Communications Systems, Inc. All Rights Reserved. Brocade, the B-wing symbol, BigIron, DCX, Fabric OS, FastIron, IronPoint, IronShield, IronView, IronWare, JetCore, NetIron, SecureIron, ServerIron, StorageX, and TurboIron are registered trademarks, and DCFM, Extraordinary Networks, and SAN Health are trademarks of Brocade Communications Systems, Inc., in the United States and/or in other countries.
DRAFT: BROCADE CONFIDENTIAL Document History Document Title Publication Number Summary of Changes Publication Date Web Tools User’s Guide v2.0 53-0001536-01 N/A September 1999 Web Tools User’s Guide v2.2 53-0001558-02 N/A May 2000 Web Tools User’s Guide v2.3 53-0000067-02 N/A December 2000 Web Tools User’s Guide v3.0 53-0000130-03 N/A July 2001 Web Tools User’s Guide v2.6 53-0000197-02 N/A December 2001 Advanced Web Tools User’s Guide v3.0 / v4.
DRAFT: BROCADE CONFIDENTIAL Document Title Publication Number Summary of Changes Publication Date Web Tools Administrator’s Guide 53-1000606-01 Updates to reflect updates to enhanced October 2007 Access Gateway support, changes to FCIP tunneling wizard, and other enhancements. Web Tools Administrator’s Guide 53-1000606-02 March 2008 Updates for support for new switches, traffic isolation zoning, F_Port trunking, removal of enhanced Access Gateway support, and other enhancements.
DRAFT: BROCADE CONFIDENTIAL Contents About This Document In this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi How this document is organized . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi Supported hardware and software . . . . . . . . . . . . . . . . . . . . . . . . . .xxii What’s new in this document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiii Document conventions . . . . . . . . . . . . . . . . . . . . . . . . . . .
DRAFT: BROCADE CONFIDENTIAL Role-Based Access Control. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Session management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Ending a Web Tools session . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Web Tools system logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Requirements for IPv6 support . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
DRAFT: BROCADE CONFIDENTIAL Switch configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Enabling and disabling a switch . . . . . . . . . . . . . . . . . . . . . . . . . 40 Changing the switch name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 Changing the switch domain ID . . . . . . . . . . . . . . . . . . . . . . . . . 41 Viewing and printing a switch report . . . . . . . . . . . . . . . . . . . . . 41 Switch restart . . . . . . . . . . . . . . . .
DRAFT: BROCADE CONFIDENTIAL Admin Domain configuration maintenance. . . . . . . . . . . . . . . . . . . . 64 Uploading and downloading from USB storage. . . . . . . . . . . . . . . . . 65 Performing a firmware download . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 SAS and SA firmware download . . . . . . . . . . . . . . . . . . . . . . . . . 67 Switch configurations for mixed fabrics. . . . . . . . . . . . . . . . . . . . . . . 67 Enabling interoperability . . . . . . . . . . . . . . . . . . .
DRAFT: BROCADE CONFIDENTIAL Persistent enabling and disabling ports . . . . . . . . . . . . . . . . . . . . . . 91 Enabling and disabling NPIV ports. . . . . . . . . . . . . . . . . . . . . . . . . . . 92 Port activation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 Enabling Ports on Demand . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 Enabling Dynamic Ports on Demand . . . . . . . . . . . . . . . . . . . . . 94 Disabling Dynamic Ports on Demand. .
DRAFT: BROCADE CONFIDENTIAL Printing graphs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .116 Modifying graphs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 Chapter 9 Administering Zoning In this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .119 Zoning overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .119 Basic zones . . . . . . . . . . . . . . . . .
DRAFT: BROCADE CONFIDENTIAL Chapter 10 Working with Diagnostic Features In this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .139 Trace dumps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .139 How a trace dump is used. . . . . . . . . . . . . . . . . . . . . . . . . . . . .140 Setting up automatic trace dump transfers . . . . . . . . . . . . . . .140 Specifying a remote server . . . . . . . . . . . . . . . . . . . . . . . .
DRAFT: BROCADE CONFIDENTIAL Disabling Access Gateway mode . . . . . . . . . . . . . . . . . . . . . . . . . . .163 Viewing the Access Gateway settings . . . . . . . . . . . . . . . . . . . . . . .163 Port configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .163 Creating port groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .164 Editing or viewing port groups. . . . . . . . . . . . . . . . . . . . . . . . . .164 Deleting port groups . . . . . . . .
DRAFT: BROCADE CONFIDENTIAL iSCSI service overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .185 Supported platforms for iSCSI . . . . . . . . . . . . . . . . . . . . . . . . .186 Common iSCSI Target Gateway Admin functions. . . . . . . . . . .186 Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .186 Saving changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .187 Setting up iSCSI Target Gateway services . . . .
DRAFT: BROCADE CONFIDENTIAL Configuring the link cost for a port . . . . . . . . . . . . . . . . . . . . . . . . .204 Chapter 17 Configuring Standard Security Features In this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .207 User-defined accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .207 Virtual Fabrics considerations. . . . . . . . . . . . . . . . . . . . . . . . . .208 Admin Domain considerations . . . . . . . . . . . . . . .
DRAFT: BROCADE CONFIDENTIAL IPsec concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .228 Transport mode and tunnel mode . . . . . . . . . . . . . . . . . . . . . .229 IPsec header options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .230 Basic IPsec configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . .231 Internet Key Exchange concepts. . . . . . . . . . . . . . . . . . . . . . . .232 IPsec over FCIP . . . . . . . . . . . . . . . .
DRAFT: BROCADE CONFIDENTIAL Chapter 19 Configuring FCoE with Web Tools In this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .255 Web Tools and FCoE overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . .256 Web Tools, the EGM license, and DCFM . . . . . . . . . . . . . . . . . . . . .256 Port information that is unique to FCoE . . . . . . . . . . . . . . . . . .256 Switch administration and FC0E . . . . . . . . . . . . . . . . . . . . . . . . . . .
DRAFT: BROCADE CONFIDENTIAL Figures Figure 1 Configuring Internet Explorer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Figure 2 Default Java for browsers option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Figure 3 Web Tools interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Figure 4 Virtual Fabric login option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
DRAFT: BROCADE CONFIDENTIAL xviii Figure 37 Zone Administration window. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 Figure 38 Sample zoning database. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 Figure 39 Temperature Sensor States window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142 Figure 40 Fan States window. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
DRAFT: BROCADE CONFIDENTIAL Tables Table 1 Basic Web Tools features and EGM licensed features . . . . . . . . . . . . . . . . . . . . . 2 Table 2 Web Tools functionality moved to DCFM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Table 3 Certified and tested platforms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Table 4 Predefined Web Tools roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
DRAFT: BROCADE CONFIDENTIAL xx Web Tools Administrator’s Guide 53-1001772-01
DRAFT: BROCADE CONFIDENTIAL About This Document In this chapter • How this document is organized . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi • Supported hardware and software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxii • What’s new in this document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiii • Document conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
DRAFT: BROCADE CONFIDENTIAL • Chapter 10, “Working with Diagnostic Features” provides information about trace dumps, viewing switch health, and interpreting the LEDs. • Chapter 11, “Using the FC-FC Routing Service” provides information on using the FC-FC Routing Service to share devices between fabrics without merging those fabrics. • Chapter 12, “Using the Access Gateway” provides information on how to configure and manage the Brocade Access Gateway.
DRAFT: BROCADE CONFIDENTIAL • • • • • • • • Brocade 7500 Brocade 7500E Brocade 7600 Brocade 7800 Extension Switch Brocade 8000 FCoE Switch Brocade VA-40FC Brocade Encryption Switch Brocade DCX Backbone and Brocade DCX-4S Backbone - FA4-18 Fibre Channel application blade FCOE10-24 DCX Blade FS8-18 Encryption Blade FC8-16 port blade FC8-32 port blade FC8-48 port blade FC8-64 port blade FC10-6 port blade FR4-18i router blade FX8-24 DCX Extension blade • Brocade 48000 director - FA4-18 Fibre Channel applic
DRAFT: BROCADE CONFIDENTIAL • Fabric Watch—Low Above alarms and System Monitor For further information, refer to the release notes. Document conventions This section describes text formatting conventions and important notice formats used in this document.
DRAFT: BROCADE CONFIDENTIAL CAUTION A Caution statement alerts you to situations that can be potentially hazardous to you or cause damage to hardware, firmware, software, or data. DANGER A Danger statement indicates conditions or situations that can be potentially lethal or extremely hazardous to you. Safety labels are also attached directly to products to warn of these conditions or situations. KEY TERMS For definitions specific to Brocade and Fibre Channel, see the Brocade Glossary.
DRAFT: BROCADE CONFIDENTIAL White papers, online demonstrations, and data sheets are available through the Brocade website at: http://www.brocade.com/products-solutions/products/index.page For additional Brocade documentation, visit the Brocade website: http://www.brocade.com Release notes are available on the MyBrocade website and are also bundled with the Fabric OS firmware. OTHER INDUSTRY RESOURCES For additional resource information, visit the Technical Committee T11 website.
DRAFT: BROCADE CONFIDENTIAL • Brocade 300, 4100, 4900, 5100, 5300, 7500, 7800, 8000, VA-40FC, and Brocade Encryption Switch—On the switch ID pull-out tab located inside the chassis on the port side on the left • Brocade 5000—On the switch ID pull-out tab located on the bottom of the port side of the switch • • • • Brocade 7600—On the bottom of the chassis Brocade 48000—Inside the chassis next to the power supply bays Brocade DCX—On the bottom right on the port side of the chassis Brocade DCX-4S—On the b
DRAFT: BROCADE CONFIDENTIAL xxviii Web Tools Administrator’s Guide 53-1001772-01
DRAFT: BROCADE CONFIDENTIAL Chapter Introducing Web Tools 1 In this chapter • Web Tools overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 • Web Tools, the EGM license, and DCFM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 • System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 • Java installation on the workstation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
DRAFT: BROCADE CONFIDENTIAL 1 Web Tools, the EGM license, and DCFM Beginning with Fabric OS version 6.1.1, some Web Tools capabilities are moved from Web Tools to DCFM. Table 2 summarizes these changes. Web Tools features enabled by the EGM license Table 1 describes those Web Tools features that require the EGM license.
DRAFT: BROCADE CONFIDENTIAL Web Tools, the EGM license, and DCFM TABLE 1 1 Basic Web Tools features and EGM licensed features (Continued) Feature Basic Web Tools Web Tools with EGM License PDCM Matrix no yes Performance Monitoring Dialog no yes Port Administration yes yes Print zone database summary no no RBAC yes yes Routing and DLS Configuration no yes Security Policies Tab (like ACL) yes yes Switch Info tab yes yes Switch Status yes yes Switch View right-click options y
DRAFT: BROCADE CONFIDENTIAL 1 System requirements TABLE 2 Web Tools functionality moved to DCFM (Continued) Function Web Tools 6.1.0 DCFM Comments Device Accessibility Matrix Zone Admin Configure > Zoning the Compare dialog box provides the Storage-Host and Host-Storage view in a tree representation that is comparable to the Device Accessibility Matrix when all devices are selected.
DRAFT: BROCADE CONFIDENTIAL System requirements 1 Brocade has certified and tested Web Tools on the platforms shown in Table 3. TABLE 3 Certified and tested platforms Operating System Browser Windows 7 Internet Explorer 7.0/8.0 Windows Server 2008 Standard Internet Explorer 7.0/8.0 Windows Vista Business Internet Explorer 7.0/8.0 Windows XP, SP3 Firefox 2.0/3.0 and Internet Explorer 7.0/8.0 RedHat Enterprise Server 5 Advanced Platform Firefox 2.0 SUSE Linux Enterprise Server 10 Firefox 2.
DRAFT: BROCADE CONFIDENTIAL 1 Java installation on the workstation 3. Choose Every visit to the page under “Check for newer versions of stored pages:” as shown in Figure 1 on page 6. FIGURE 1 Configuring Internet Explorer Deleting temporary internet files used by Java applications For Web Tools to operate correctly, you must delete the temporary internet files used by Java applications. Use the following procedure to delete these files. 1. From the Control Panel, open Java. 2.
DRAFT: BROCADE CONFIDENTIAL Java installation on the workstation 1 If you attempt to open Web Tools with a later version of Java Plug-in installed: • Internet Explorer might prompt for an upgrade, depending on the existing Java Plug-in version. • Firefox uses the existing Java Plug-in. Installing the JRE on your Solaris or Linux client workstation Use the following procedure to do the JRE installation. 1. Locate the JRE on the Internet, at the following URL: http://java.sun.com/products/archive/j2se/5.
DRAFT: BROCADE CONFIDENTIAL 1 Java plug-in configuration • If no Java Plug-in is installed, point the browser to a switch running Fabric OS 5.2.0 or later to install JRE 1.6.0. For Fabric OS 6.3.0 install JRE 1.6.0 update 13. Web Tools guides you through the steps to download the proper Java Plug-in. • If an outdated version is currently installed, uninstall it, restart your computer, reopen the browser, and enter the address of a switch running Fabric OS 5.2.0 or later to install JRE 1.6.0.
DRAFT: BROCADE CONFIDENTIAL Value line licenses 1 1. From the Start menu, select Settings > Control Panel. 2. Click the Advanced tab and expand the Default Java for browsers option, as shown in Figure 2 on page 9. FIGURE 2 Default Java for browsers option 3. Select Mozilla family and click OK. 4. Click OK to apply your settings and close the Java Control Panel.
DRAFT: BROCADE CONFIDENTIAL 1 Opening Web Tools Use the following procedure to open Web Tools. 1. Open the Web browser and enter the IP address of the device in the Address field: http://10.77.77.77 or https://10.77.77.77 2. Press Enter. The Web Tools login dialog box displays. Refer to “Logging in” on page 11 for more information. NOTE If you are using Firefox, the browser window is left open. You can close it anytime after the login dialog box displays.
DRAFT: BROCADE CONFIDENTIAL Opening Web Tools 1 Logging in When you use Web Tools, you must log in before you can view or modify any switch information. This section describes the login process. Prior to displaying the login window, Web Tools displays a security banner (if one is configured for your switch), that you must accept before logging in. The security banner displays every time you access the switch. When you are presented with the login screen you must provide a user name and a password.
DRAFT: BROCADE CONFIDENTIAL 1 Opening Web Tools 1. Select Options to display the Virtual Fabric options. You are given a choice between Home Logical Fabric and User Specified Virtual Fabric (Figure 4). Home Logical Fabric is the default. FIGURE 4 Virtual Fabric login option 2. Log in to a logical fabric. • To log in to the home logical fabric, select Home Logical Fabric and click OK.
DRAFT: BROCADE CONFIDENTIAL 1 Opening Web Tools • To log in to the home domain, select Home Domain and click OK. • To log in to an Admin Domain other than the home domain, select User Specified Domain, enter the Admin Domain name or number, and click OK (Figure 5). FIGURE 5 Login dialog box with Admin Domain options If the user name or password is incorrect, a dialog box displays indicating an authentication failure.
DRAFT: BROCADE CONFIDENTIAL 1 Role-Based Access Control • Your session times out. Role-Based Access Control Role-Based Access Control (RBAC) defines the capabilities that a user account has based on the assigned role. For each role, there is a set of predefined permissions on the jobs and tasks that can be performed on a fabric and its associated fabric elements. When you log in to a switch, your user account is associated with a predefined role.
DRAFT: BROCADE CONFIDENTIAL Web Tools system logs 1 Web Tools does not display a warning when the session is about to time out. If your session ends due to inactivity, all Web Tools windows become invalid and you must restart Web Tools and log in again. Web Tools enables sessions to both secure and nonsecure switches. Access rights for your session are determined by your role-based access rights and by the contents of your selected Admin Domain.
DRAFT: BROCADE CONFIDENTIAL 1 Requirements for IPv6 support The SwitchInfo.txt file contains the following basic switch information: • • • • • • Switch Name Fabric OS version Switch Type Ethernet Ipv4 Ethernet IPv4 subnet mask Ethernet IPv4 gateway The maximum size of the webtools.log file is 2MB. It is rolled into new file when the 5mb file size limit is exceeded. A backup file named webtools1.log is automatically created. Web Tools maintains only one webtools.log backup file at a time.
DRAFT: BROCADE CONFIDENTIAL Chapter 2 Using the Web Tools Interface In this chapter • Viewing Switch Explorer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Displaying tool tips. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Right-click options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Refresh rates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
DRAFT: BROCADE CONFIDENTIAL 2 Viewing Switch Explorer NOTE To perform monitoring tasks such as performance monitoring the EGM license must be installed on the switch; otherwise, access to this feature is denied and an error message displays. - Tools tasks, such as opening the Telnet window. • The Switch View buttons above the Switch View provides access to switch information: status, temperature, power, and fan data, beaconing, and the legend for the Switch View.
DRAFT: BROCADE CONFIDENTIAL Viewing Switch Explorer 2 For non-8 Gbps platforms, all functionalities are available without EGM license.
DRAFT: BROCADE CONFIDENTIAL 2 Viewing Switch Explorer Changes for consistency with DCFM Beginning with Fabric OS version 6.2.0, Web Tools icons are changed to be consistent with DCFM. Table 5 summarizes these changes.
DRAFT: BROCADE CONFIDENTIAL Viewing Switch Explorer TABLE 5 2 Icon image changes (Continued) Image name Old image New image Switch event - Warning Refresh Enable Disable Prohibit The Search, Copy, and Export buttons are removed from the Web Tools tree and table headers, and are replaced by right-click operations, as shown in Figure 8.
DRAFT: BROCADE CONFIDENTIAL 2 Viewing Switch Explorer Persisting GUI preferences Web Tools persists your GUI preferences across sessions for the Port Admin, Switch Admin, and Name Server dialog boxes on all web-browser platforms. Persistence is performed on a per host basis.
DRAFT: BROCADE CONFIDENTIAL Viewing Switch Explorer 2 The Other section of the Tasks menu provides access to Telnet tools. NOTE There are certain Fabric OS features that are available only on particular switch types, and the system displays only the icons that are appropriate for the switch type. Fabric Tree Fabric Tree displays all switches in the fabric, even those that do not have a Web Tools license and that are not owned by your selected Admin Domain.
DRAFT: BROCADE CONFIDENTIAL 2 Viewing Switch Explorer Figure 10 displays the login dialog box. After you log in, all Admin Domains assigned to you are available in the drop-down menu (Figure 11). For most administrative tasks, you must be in either AD0 or the physical fabric. FIGURE 10 Login dialog box with Admin Domain Figure 11 displays the Admin Domain context drop-down menu highlighted for changing the Admin Domain context.
DRAFT: BROCADE CONFIDENTIAL Viewing Switch Explorer 2 Switch View buttons The Switch View buttons let you access the following switch information: • • • • • Status—Click the button to view the status of the switch. Temperature—Click the button to view temperature monitors. Power—Click the button to view power supply information. Fan—Click the button to view the status of the switch fans.
DRAFT: BROCADE CONFIDENTIAL 2 Viewing Switch Explorer The port LEDs in the Switch View match the LEDs on the physical switch. However, the blink rate of the LEDs in the Switch View does not necessarily match the blink rate of the LEDs on the physical switch. Refer to “Port LED interpretation” on page 146 for more information. Right-click a port in Switch View to get a menu that opens the Port Administration window, allowing you to view detailed information about the port.
DRAFT: BROCADE CONFIDENTIAL 2 Viewing Switch Explorer NOTE Click the USB port on the switch to launch the USB Storage Management window. Switch Events and Switch Information Switch Events and Switch Information display as tab forms under Switch View. The information in the Switch Information View is polled every 60 seconds. The Switch Information tab displays information about the following items: • Switch - Name Status Fabric OS Version Domain ID WWN Type Role Name of the switch.
DRAFT: BROCADE CONFIDENTIAL 2 Displaying tool tips • RNID - Type Model Tag Sequence number Insistent Domain ID Mode Manufacturer Manufacturer Plant • Name Server - Capability - Device Type - Unit Type - Model - Tag - Sequence number - Manufacturer - Manufacturer Plant Type of the switch. Model of the switch. Tag of the switch. Sequence number of the switch. Current status of the Insistent Domain ID mode of the switch. Manufacturer of the switch. Plant where the switch was manufactured.
DRAFT: BROCADE CONFIDENTIAL Right-click options 2 Right-click options You can right-click a port to quickly perform some basic port administration tasks, as shown in Figure 13. FIGURE 13 Right-click menu for ports (from Switch Explorer) The tasks are: • The Port Admin option displays the Port Administration window. • The Port Details option displays read-only information about a port, without opening the Port Administration window.
DRAFT: BROCADE CONFIDENTIAL 2 Refresh rates Refresh rates Different panels of Web Tools refresh at different rates. The refresh, or polling, rates listed in this section and throughout the book indicate the time between the end of one polling period and the start of the next, and not how often the screen is refreshed. A refresh rate of 15 seconds does not ensure that a refresh occurs every 15 seconds. It ensures that the time between each refresh activity is no more than 15 seconds.
DRAFT: BROCADE CONFIDENTIAL 2 Working with Web Tools: recommendations Use the following procedure to display switches in the fabric. 1. Open Web Tools as described in “Opening Web Tools” on page 9 and log in to the switch. Switch Explorer for your current switch. 2. If the Fabric Tree is not expanded, click the plus sign (+) in the Fabric Tree to view all the switches in the fabric. 3. Click a switch in the Fabric Tree. A separate browser dialog box displays the selected switch.
DRAFT: BROCADE CONFIDENTIAL 2 Collecting logs for troubleshooting NOTE Internet Explorer 7.0 default settings disable Telnet functionality. If you are using Internet Explorer 7.0, you must make the appropriate changes in the registry to open the Telnet window. Use the following procedure to open a Telnet or SSH client window. 1. Select a switch in Fabric Tree. You are prompted to log in if the OS is version 5.3.0 or later; otherwise, the selected switch displays in the Switch View. 2.
DRAFT: BROCADE CONFIDENTIAL Chapter 3 Managing Fabrics and Switches In this chapter • Fabric and switch management overview . . . . . . . . . . . . . . . . . . . . . . . . . . . • Configuring IP and subnet mask information . . . . . . . . . . . . . . . . . . . . . . . . • Configuring Auto Refresh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Configuring a syslog IP address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
DRAFT: BROCADE CONFIDENTIAL 3 Fabric and switch management overview If the switch is not a member of the selected Admin Domain, most tabs in the Switch Administration window display in read-only mode, regardless of your permission level. The User tab is editable because most of its information does not require switch membership in the current Admin Domain.
DRAFT: BROCADE CONFIDENTIAL Fabric and switch management overview 3 Opening the Switch Administration window Most of the management procedures in this chapter are performed from the Switch Administration window.
DRAFT: BROCADE CONFIDENTIAL 3 Configuring IP and subnet mask information To open the Switch Administration window, perform the following steps. 1. Select Tasks > Manage > Switch Admin. The Switch Administration dialog box displays in basic mode, as shown in Figure 14 on page 34. The basic mode displays the “basic” tabs and options. 2. Click Show Advanced Mode to see all the available tabs and options.
DRAFT: BROCADE CONFIDENTIAL 3 Configuring a syslog IP address 3. Click Netstat Performance. 4. Select the Auto Refresh check box to automatically refresh the statistics details. Clear the check box to disable auto refresh. 5. When enabled, enter the interval time in seconds in the Auto-Refresh Interval field. The statistics details are automatically refreshed, based on the configured time interval.
DRAFT: BROCADE CONFIDENTIAL 3 Configuring IP Filtering Configuring IP Filtering Web Tools provides the ability to control what client IP addresses may connect to a switch or fabric. Use the following procedure to set up IP Filtering. 1. Open the Switch Administration window as described in “Opening the Switch Administration window” on page 35. 2. Select the Security Policies tab. 3. Select IPFilter on the Security Policies menu. 4. Click Create Policy. The Create IP Filter Policy dialog box displays. 5.
DRAFT: BROCADE CONFIDENTIAL Blade management 3 The Firmware Version columns display the firmware loaded onto each blade. A blade can have more than one firmware image loaded onto it. The Enable Blade column in the Blade tab pane indicates whether the blade is enabled. FIGURE 15 Blade tab 3. Select the Enable Blade check box for each blade you want to enable. Clear the check box to disable the blade. You cannot enable or disable the CP blades. 4. Click Apply.
DRAFT: BROCADE CONFIDENTIAL 3 Switch configuration 7. Click Add to add the new entry to the table. When you click Add, the values remain in the fields. The Clear Gateway and Clear IP buttons are available for clearing fields in the table. NOTE To remove a configuration, select a row in the table and click Delete. 8. Click Apply to save the values currently shown in the table or click Cancel to close the dialog box without saving any of your changes. 9.
DRAFT: BROCADE CONFIDENTIAL Switch configuration 3 Changing the switch name Switches can be identified by IP address, domain ID, World Wide Name (WWN), or switch names. Names must begin with an alphabetic character, but otherwise can consist of alphanumeric, hyphen, and underscore characters. The maximum number of characters is 30, unless FICON mode is enabled. When FICON mode is enabled, the maximum number of characters is 24. NOTE Some system messages identify a switch service by the chassis name.
DRAFT: BROCADE CONFIDENTIAL 3 Switch restart 1. Open the Switch Administration window as described in “Opening the Switch Administration window” on page 35. 2. Select the Switch tab. 3. Click View Report. 4. In the new window that displays the report, view or print the report using your browser. Switch restart When you restart the switch, the restart takes effect immediately.
DRAFT: BROCADE CONFIDENTIAL 3 System configuration parameters • Signed firmware WWN-based Persistent PID assignment WWN-based PID assignment allows you to configure a PID persistently using a device’s WWN. When the device logs into the switch, the PID is bound to the device WWN. If the device is moved to another port in the same switch, or a new blade is hot plugged, the device receives the same PID (area) at its next login.
DRAFT: BROCADE CONFIDENTIAL 3 System configuration parameters 5. Click Apply. 6. Enable the switch as described in “Enabling and disabling a switch” on page 40. Fabric settings Configure the following fabric settings on the Fabric subtab of the Configure tab: BB Credit The buffer-to-buffer credit is the number of buffers available to attached devices for frame receipt. The default BB Credit is 16. The range is 1–27. R_A_TOV Resource allocation timeout value (in milliseconds).
DRAFT: BROCADE CONFIDENTIAL System configuration parameters 3 Configuring virtual channel settings You can configure parameters for eight virtual channels (VC) to enable fine-tuning for a specific application. You cannot modify the first two virtual channels because these are reserved for switch internal functions. ATTENTION The default virtual channel settings are already optimized for switch performance. Changing the default values can improve switch performance, but can also degrade performance.
DRAFT: BROCADE CONFIDENTIAL 3 System configuration parameters Arbitrated loop parameters Configure the following arbitrated loop parameters on the Arbitrated Loop subtab of the Configure tab: Send Fan Frames Select this check box to specify that fabric address notification (FAN) frames are sent to public loop devices to notify them of their node ID and address.
DRAFT: BROCADE CONFIDENTIAL Licensed feature management 3 4. Select the Enable Signed Firmware Download check box. 5. Click Apply. Licensed feature management The licensed features currently installed on the switch are listed in the License tab of the Switch Administration window, as shown in Figure 16. If the feature is listed, such as the EGM license, it is installed and immediately available.
DRAFT: BROCADE CONFIDENTIAL 3 Licensed feature management 1. Open the Switch Administration window as described in “Opening the Switch Administration window” on page 35. 2. Select the License tab and click Add. The Add License dialog box displays. 3. Paste or enter a license key in the field. 4. Click Add License. 5. Click Refresh to display the new licenses in the License tab. Some licenses, such as the Trunking or the 7500E and 7800 upgrade license, do not take effect until the switch is restarted.
DRAFT: BROCADE CONFIDENTIAL High Availability overview 3 Universal time-based licensing After v6.3.0, Web Tools supports universal time-based licensing. Each universal key is for a single feature, and can be used on any product that supports the feature, for a defined trial period. At the end of the trial period, the feature gets disabled. You can extend the universal key license. For time-based licenses, the Expiry Date displays in the License Administration table (refer to Figure 16 on page 47).
DRAFT: BROCADE CONFIDENTIAL 3 High Availability overview 2. Click the HA button in the Switch View.
DRAFT: BROCADE CONFIDENTIAL High Availability overview 3 The High Availability dialog box displays.
DRAFT: BROCADE CONFIDENTIAL 3 High Availability overview FIGURE 18 High Availability window, CP tab The High Availability window contains the following two tabs: • The Service tab displays information about the switch. When the hardware is configured as a dual switch, the Service tab displays information about both switches. • The CP tab displays information about slots.
DRAFT: BROCADE CONFIDENTIAL 3 Event monitoring 1. Open the High Availability window as described in “Launching the High Availability window” on page 49. 2. Verify that the HA Status field displays HA enabled, Heartbeat Up, HA State synchronized. If the HA Status field displays HA enabled, Heartbeat Up, HA State synchronized you are finished. If the HA Status field displays HA enabled, Heartbeat Up, HA State not in sync, continue with step 3. 3. Click Synchronize Services. The Warning dialog box displays.
DRAFT: BROCADE CONFIDENTIAL 3 Event monitoring • Severity level • Unique message identifier (in the form moduleID-messageType) • Detailed error message for root cause analysis There are four message severity levels: Critical, Error, Warning, and Info. Table 8 lists the event message severity levels displayed on the Switch Events tab and explains what qualifies event messages to be certain levels. On the Switch Events tab, you can click the Filter button to launch the Filter Events dialog box.
DRAFT: BROCADE CONFIDENTIAL Event monitoring 3 Filtering Switch Events You can filter the fabric and switch events by time, severity, message ID, and service. You can apply either one type of filter at a time or multiple types of filters at the same time. When a filter is applied, the filter information displays at the bottom of the filtered information and the Show All link is available to allow you to view the information unfiltered. Use the following the procedure to filter Switch Events. 1.
DRAFT: BROCADE CONFIDENTIAL 3 Displaying the Name Server entries NOTE You can enter multiple message IDs as long as you separate them by commas. You can enter either the full message ID (moduleID-messageType) or a partial ID (moduleID only). The message ID filtering is case-sensitive. 5. Click OK. The filter is enabled and the window is refreshed to show the filtered information. Filtering events by service component Use the following procedure to filter events by service component. 1.
DRAFT: BROCADE CONFIDENTIAL 3 Physically locating a switch using beaconing Printing the Name Server entries Use the following procedure to set up printing preferences. 1. Select Tasks > Monitor > Name Server. The Name Server window displays. 2. Click Print. 3. On the Page Setup dialog box, set up your printing preferences and click OK. The Print dialog box displays. 4. Select a printer and click OK.
DRAFT: BROCADE CONFIDENTIAL 3 Locating logical switches using chassis beaconing 1. Select a logical switch using the drop-down list under Fabric Tree section in the Switch Explorer window. The selected switch displays in the Switch View. 2. Select Beacon for a switch, or Chassis Beacon for a chassis-based switch. The LED lights on the actual switch light up on the physical switch in a pattern running back and forth across the switch itself. In chassis-based switches, the LEDs glow across all the blades.
DRAFT: BROCADE CONFIDENTIAL 3 Virtual Fabrics overview Under the Switch Information tab, Base Switch, Default Switch, and Allow XISL Use are specific to VIrtual Fabrics. These options perform these functions: • Base Switch indicates whether or not the logical switch can act as a base switch. A base switch is a special logical switch that can be used for chassis interconnection. Each chassis may only designate only one logical switch as a base switch.
DRAFT: BROCADE CONFIDENTIAL 3 60 Virtual Fabrics overview Web Tools Administrator’s Guide 53-1001772-01
DRAFT: BROCADE CONFIDENTIAL Chapter 4 Maintaining Configurations and Firmware In this chapter • Creating a configuration backup file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Restoring a configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Admin Domain configuration maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . • Uploading and downloading from USB storage . . . . . . . . . . . . . . . . . . . . . . .
DRAFT: BROCADE CONFIDENTIAL 4 Creating a configuration backup file An info link is enabled when USB is chosen as the source of the configuration file. If you click on info, the following information message displays (Figure 21). FIGURE 21 Information dialog box To create a configuration backup file, perform the following task. 1. Open the Switch Administration window. 2. Select Show Advanced Mode. 3. Select the Configure tab. The Configure screen displays. 4. Select the Upload/Download tab.
DRAFT: BROCADE CONFIDENTIAL 4 Restoring a configuration Restoring a configuration Restoring a configuration involves overwriting the configuration on the switch by downloading a previously saved backup configuration file. Perform this procedure during a planned down time. Make sure that the configuration file you are downloading is compatible with your switch model. Configuration files from other model switches might cause your switch to fail.
DRAFT: BROCADE CONFIDENTIAL 4 Admin Domain configuration maintenance 7. Enter the configuration file with a fully-qualified path, or select the configuration file in the Configuration File Name field. 8. Use the Fabric ID selector to select the fabric ID of the logical switch to which the configuration file is to downloaded. The selector displays all the virtual fabric IDs that have been defined, the default of 128 for the physical switch, chassis level configuration, and all chassis and switches. 9.
DRAFT: BROCADE CONFIDENTIAL 4 Uploading and downloading from USB storage The filtering depends on the Admin Domain switch ownership, with additional access if you are in AD255. Access to the command itself is limited by Role-Based Access (RBAC), and not by whether the current user is a Physical Fabric Administrator or an admin user with enumerated access to the relevant domains. NOTE The ability to change Admin Domain context requires installing the EGM license.
DRAFT: BROCADE CONFIDENTIAL 4 Performing a firmware download When you request a firmware download, the system first checks the file size being downloaded. If the compact flash does not have enough space, Web Tools displays a message and the download does not occur. If this happens, contact your switch support supplier. NOTE You can perform a firmware download only when the current Admin Domain owns the switch. Perform the following procedure to download a new firmware version. 1.
DRAFT: BROCADE CONFIDENTIAL Switch configurations for mixed fabrics 7. 4 Close all Web Tools windows and log in again. If the firmware download is in progress when you log in, you can continue to monitor its progress. SAS and SA firmware download If you are downloading SAS and DMM firmware directly to the blade, you have more options on the Firmware Download tab. Also, for the Brocade 7600 a collapsible area displays on the Firmware Download tab to show application firmware information.
DRAFT: BROCADE CONFIDENTIAL 4 Switch configurations for mixed fabrics Enabling interoperability When you configure interoperability, Web Tools verifies that the domain ID of the switch falls within the range for the interoperability mode you select. The domain ranges are: • The normal domain ID range is 1 through 239. • The McDATA Fabric mode and McDATA Open Fabric mode are calculated based on the offset selected.
DRAFT: BROCADE CONFIDENTIAL Chapter 5 Managing Administrative Domains In this chapter • Administrative Domain overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Enabling Admin Domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Admin Domain window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Creating and populating domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
DRAFT: BROCADE CONFIDENTIAL 5 Administrative Domain overview User-defined Admin Domains AD1 through AD254 are user-defined Admin Domains. These user-defined Admin Domains can be created only by a physical fabric administrator in AD255. System-defined Admin Domains AD0 and AD255 are special Admin Domains and are present in every AD-capable fabric.
DRAFT: BROCADE CONFIDENTIAL 5 Enabling Admin Domains You can use AD255 to do the following: • Manage other Admin Domains. • Get an unfiltered view of the fabric. • Manage ACL and distribution (this can be managed in AD0 if no other Admin Domains are present). • Manage Advanced Performance Monitoring (this can be managed in AD0 if no other Admin Domains are present, but only if you are using Web Tools with the EGM license).
DRAFT: BROCADE CONFIDENTIAL 5 Admin Domain window Perform the following steps to enable Admin Domains. 1. Change the Admin Domain context to AD0. Refer to “Changing the Admin Domain context” on page 23. NOTE Changing the Admin Domain context requires using Web Tools with the EGM license; otherwise, access to this feature is denied and an error message displays. Change the Default Zone mode to No Access. Refer to “Setting the default zoning mode” on page 121 for more information. 2.
DRAFT: BROCADE CONFIDENTIAL Admin Domain window 5 For non-8 Gbps platforms, all functionalities are available without EGM license. FIGURE 26 Admin Domain window, summary view The Admin Domain window displays information about the Admin Domains that are defined in the fabric. If you launch the Admin Domain window from AD255 (physical fabric), the window contains information about the current content of all Admin Domains.
DRAFT: BROCADE CONFIDENTIAL 5 Admin Domain window When you launch the Admin Domain window and select the parent Admin Domains node in the tree on the left pane, the Admin Domain window displays summary information about all of the Admin Domains, as shown in Figure 26. You can also select a specific Admin Domain from the tree to display detailed information about that Admin Domain, as shown in Figure 27.
DRAFT: BROCADE CONFIDENTIAL Admin Domain window 5 NOTE You must accept the Brocade Certificate at the beginning of the log in to Web Tools to enable the functionality of Export and Copy. • Click Export Row or Export Table to save the contents to a tab-delimited file. • Click Copy Row or Copy Table to copy the contents in tab-delimited text format to a file. • Click Search to search for a specific text string in the table. The Switch Members dialog box displays, as shown in Figure 28.
DRAFT: BROCADE CONFIDENTIAL 5 Admin Domain window Refreshing fabric information When you refresh, the system updates the display of fabric elements only (switches, ports, and devices). It does not update Admin Domain changes in the Admin Domain window. This option allows you to refresh the fabric element information displayed at any time. To refresh the fabric information open the Admin Domain window and click Refresh. The status for the fabric, including switches, ports, and devices is refreshed.
DRAFT: BROCADE CONFIDENTIAL 5 Creating and populating domains Closing the Admin Domain window It is important to remember that any changes you make in the Admin Domain window are not saved automatically. Use the following procedure to close the Admin Domain window. 1. In the Admin Domain window, select File > Close. If there are changes in the buffer that were not saved, a warning message displays. Confirm that you want to close the Admin Domain session without saving the changes. 2.
DRAFT: BROCADE CONFIDENTIAL 5 Creating and populating domains 7. In the Membership area, assign members to the Admin Domain by selecting them in the Available Members section and clicking Add, Add Ports, or Add Devices as described below: • Select a switch, port, or device in the Available Members tree and click Add to add the selected element. Alternatively, you can press the Insert key to add your selections.
DRAFT: BROCADE CONFIDENTIAL 5 Modifying Admin Domain members Activating or deactivating an Admin Domain Use the following procedure to activate or deactivate an Admin Domain. 1. Open the Admin Domain window. 2. From the tree on the left, select the Admin Domain you want to activate or deactivate. 3. Click Activate to activate the Admin Domain, or click Deactivate to deactivate the Admin Domain. 4. Select Actions > Save AD Configuration to save the new Admin Domain configuration to persistent storage. 5.
DRAFT: BROCADE CONFIDENTIAL 5 Modifying Admin Domain members 9. Select Actions > Save AD Configuration to save the new Admin Domain configuration to persistent storage. 10. Select Actions > Apply AD Configuration to enforce the new Admin Domain configuration as the effective configuration. Renaming Admin Domains You can change the name of an Admin Domain, including an auto-assigned ID name. The Admin Domain name cannot exceed 63 characters and can contain alphabetic and numeric characters.
DRAFT: BROCADE CONFIDENTIAL Modifying Admin Domain members 5 Clearing the Admin Domain configuration When you clear the Admin Domain configuration, all user-defined Admin Domains are deleted and all fabric resources (switches, ports, and devices) are returned to AD0. You cannot clear the Admin Domain configuration if zone configurations exist in any of the user-defined Admin Domains. Use the following procedure to clear the Admin Domain configuration. 1. Open the Admin Domain window. 2.
DRAFT: BROCADE CONFIDENTIAL 5 82 Modifying Admin Domain members Web Tools Administrator’s Guide 53-1001772-01
DRAFT: BROCADE CONFIDENTIAL Chapter 6 Managing Ports In this chapter • Port management overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Configuring FC ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Assigning a name to a port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Port beaconing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
DRAFT: BROCADE CONFIDENTIAL 6 Port management overview • Indirect members are: - Non-owned ports on a member switch - Non-owned ports to which member devices are attached • All active ports, as well as any inactive EX_Ports are shown.
DRAFT: BROCADE CONFIDENTIAL 6 Port management overview • The Ports Explorer tree on the left side. Items in the tree are displayed as follows: - Switches—Switch ID, with switch name in parentheses; for example, 3(MapsSW_202) - Blades—Slot number of the blade, with blade ID in parentheses; for example, Slot 7(24) - Ports—Port number; for example, Port 2 • Button area. The button area contains buttons for all the tasks you can perform on the selected port.
DRAFT: BROCADE CONFIDENTIAL 6 Port management overview • When viewing detailed information about a port, the Advanced Mode provides these additional subtabs: - General—All ports - SFP—Physical ports only (FC, CEE, and GbE) - Enable/Disable Trunking Enable/Disable NPIV Port Swap F_Port Trunking Re-Authenticate Bind/Un-Bind PID F-Port BB Credit QoS Enable/Disable (These options require Adaptive Networking License) Advanced information about the port equipment Port Statistics
DRAFT: BROCADE CONFIDENTIAL 6 Configuring FC ports Ports on a non-owned switch that are not E_Ports and are neither direct nor indirect members of the current Admin Domain are inaccessible and are not displayed in the Port Administration window. FIGURE 29 Port Administration window, Table view Configuring FC ports With the FC Port Configuration wizard, you can configure allowed port types, port speed, and long distance mode for physical ports.
DRAFT: BROCADE CONFIDENTIAL 6 Configuring FC ports 1. Click a port in the Switch View to open the Port Administration window. 2. Click the FC Ports tab. 3. Select the port you want to configure from the tree on the left. 4. Click the General subtab. NOTE Long distance does not display from the General or Table subtabs if the EGM license is not enabled on the switch. 5. Click Edit Configuration. The FC Port Configuration wizard displays. The fields are populated with the current configuration values.
DRAFT: BROCADE CONFIDENTIAL Assigning a name to a port 6 NOTE To configure a port as an EX_Port, the switch must be capable of supporting FCR or FCIP features. The EX_Port option is disabled in the wizard if the switch does not meet these requirements. Long distance mode Port long distance configurations can be performed in the Switch Admin Extended Fabric tab if the link is used over long distances. To configure the long-distance settings, the EGM license must be enabled on the switch.
DRAFT: BROCADE CONFIDENTIAL 6 Port beaconing NOTE Although it is not required, it is recommended that port names be unique. Perform the following procedure to assign a name to a port. 1. Click a port in the Switch View to open the Port Administration window. 2. Select the FC Ports tab. 3. From the tree on the left, select the switch or slot that contains the port you want to rename. 4. From the table, select the port you want to rename. 5. Click Rename. 6. Enter a name for the port and click Rename.
DRAFT: BROCADE CONFIDENTIAL 6 Persistent enabling and disabling ports 1. Click a port in the Switch View to open the Port Administration window. 2. Select the FC Ports or GigE Ports tab. 3. From the tree on the left, select the switch or slot that contains the port you want to enable or disable. 4. From the table, select one or more ports. NOTE Use Shift+click and Ctrl+click to select multiple ports. You can select multiple ports from the table. You cannot select multiple ports from the tree. 5.
DRAFT: BROCADE CONFIDENTIAL 6 Enabling and disabling NPIV ports NOTE Ports cannot be persistently enabled or disabled when FMS is enabled. 1. Select a port in the Switch View to open the Port Administration window. 2. Select the FC Ports or GigE Ports tab. 3. From the tree on the left, select the switch or slot that contains the port. 4. From the table, select one or more ports. NOTE Use Shift-click and Ctrl-click to select multiple ports. You can select multiple ports from the table.
DRAFT: BROCADE CONFIDENTIAL Port activation 6 4. Click Enable NPIV or Disable NPIV. Port activation Brocade switches come with a preset number of ports enabled. Additional ports can be enabled using the Ports on Demand (POD) licenses and the Dynamic Ports on Demand (DPOD) feature (for supported switches only). Ports on Demand is ready to be unlocked in the switch firmware.
DRAFT: BROCADE CONFIDENTIAL 6 Port activation In the Port Administration window, the Licensed attribute indicates whether a port is licensed (yes), whether it can be license (possible) because there are free licenses available (only applicable with the Dynamic POD feature), or whether it is not licensed and cannot be licensed because there is no available license. After the license keys are installed, you must enable the ports.
DRAFT: BROCADE CONFIDENTIAL Port activation 6 • Available Licenses indicate the number of free licenses. These can be allocated for any port. • Total Licenses indicate the total number of licenses. Disabling Dynamic Ports on Demand NOTE Disabling DPODs causes traffic disruption. Any prior port associations and assignments are lost the next time the switch is restarted. Log in as Admin and perform the following procedure to disable the Dynamic POD feature. 1.
DRAFT: BROCADE CONFIDENTIAL 6 Port swapping index Port swapping index If a port malfunctions, or if you want to connect to different devices without having to rewire your infrastructure, you can move traffic from one port to another (swap ports) without changing the I/O Configuration Data Set (IOCDS) on the mainframe computer. You must disable the ports before you do a port swap. NOTE Port swapping is not applicable to GE ports because there are no areas assigned to these ports.
DRAFT: BROCADE CONFIDENTIAL Configuring BB credits on an F_Port 6 Determining if a port index was swapped with another switch port Use the following procedure to determine whether a port was swapped. 1. Select a port in the Switch View to open the Port Administration window. 2. Select the FC Ports tab. 3. Click Show Advanced Mode. 4. From the tree on the left, select the port you want to swap. 5. Click the General tab.
DRAFT: BROCADE CONFIDENTIAL 6 Configuring BB credits on an F_Port 3. Click Show Advanced Mode. i FIGURE 32 F-Port BB Credit button 4. Click F-Port BB Credit as shown in Figure 32. 5. Enter the BB credit value in the Enter BB Credit field (the default value is 8). NOTE You cannot modify the default BB credit value for VE and ICL ports. 6. Click Ok. The value displays in the table of the Port Administration window. If no value is configured, the F-Port BB Credit column displays the default value.
DRAFT: BROCADE CONFIDENTIAL Chapter Enabling ISL Trunking 7 In this chapter • ISL Trunking overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 • Disabling or enabling ISL Trunking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 • Viewing trunk group information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 • F_Port trunk groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
DRAFT: BROCADE CONFIDENTIAL 7 Viewing trunk group information 3. From the tree on the left, select the switch name or slot name. 4. From the table, select the port that you want to trunk. You can select multiple ports from the table. You cannot select multiple ports from the tree. 5. Click the Show Advanced Mode button on Ports Admin. Click either the Trunking Enable or Trunking Disable button. If the button is unavailable, then the selected port is already in that state. 6. 6.
DRAFT: BROCADE CONFIDENTIAL F_Port trunk groups 7 Additionally, the following trunking attributes can also be displayed from the Port Admin view by clicking the Show Advanced Mode button: • • • • Trunk port state, either master or slave. Master Port Trunk Index (applies only to F_Port trunking). Trunking Enabled F_Port trunk groups F_Port trunking provides extra bandwidth and robust connectivity for hosts and targets connected by switches in Access Gateway mode.
DRAFT: BROCADE CONFIDENTIAL 7 F_Port trunk groups The F_Port Trunking dialog box displays. 5. Select one or more ports in the Ports for trunking pane. A dialog box displays, asking you to select a trunk index. 6. Select the trunk index from the drop-down list populated with the index for all the ports. A trunk group is created, identified by the trunk index, and containing the port you selected. 7. Select the trunk group you just created. Add Members becomes active. 8.
DRAFT: BROCADE CONFIDENTIAL Chapter 8 Monitoring Performance In this chapter • Performance Monitor overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Opening the Performance Monitoring window . . . . . . . . . . . . . . . . . . . . . . • Creating basic performance monitor graphs. . . . . . . . . . . . . . . . . . . . . . . . • Customizing basic monitoring graphs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Advanced performance monitoring graphs . . . . . . . .
DRAFT: BROCADE CONFIDENTIAL 8 Performance Monitor overview The Advanced Monitoring option in the Performance Graphs window displays predefined reports and filter-based performance monitoring. You can use this feature to track the following: • The number of words received and transmitted in Fibre Channel frames with a defined SID/DID pair. • The number of times a particular filter pattern in a frame is transmitted by a port.
DRAFT: BROCADE CONFIDENTIAL 8 Performance Monitor overview Predefined performance graphs Web Tools predefines basic graph types to simplify performance monitoring. A wide range of end-to-end fabric, LUN, device, and port metrics graphs are included. Table 10 lists the basic monitoring graphs available. Table 11 lists the advanced monitoring graphs. The advanced monitoring graphs give more detailed performance information to help you manage your fabric.
DRAFT: BROCADE CONFIDENTIAL 8 Performance Monitor overview The Brocade Encryption Switch, FS8-18 blade, FR4-18i blade, FX8-24 DCX Extension blade, and the Brocade 7500, 7500E, and 7800 Extension switches include physical FC ports, logical FC ports, and GbE ports. The Brocade FC4-16IP blade includes physical FC ports and GbE ports. Not all of the performance monitoring graphs support the logical FC ports and GbE ports. Table 12 lists each graph and indicates the supported port types for each graph.
DRAFT: BROCADE CONFIDENTIAL Performance Monitor overview 8 Figure 34 shows how to access the list of Advanced Performance Monitoring graphs using Web Tools with the EGM license. This example displays the graphs available in the Performance Monitoring window for a Brocade 48000 director with the Advanced Performance Monitoring license installed. Note that the slot number is identified.
DRAFT: BROCADE CONFIDENTIAL 8 Opening the Performance Monitoring window Canvas configurations A canvas is a saved configuration of graphs. The graphs can be either the Web Tools predefined graphs or user-defined graphs. Each canvas can hold up to eight graphs per window, with six shown in Figure 35. Up to 20 canvases can be set up for different users or different scenarios. Each canvas is saved with a name and an optional brief description.
DRAFT: BROCADE CONFIDENTIAL 8 Creating basic performance monitor graphs Creating basic performance monitor graphs Use the following procedure to create the basic performance monitor graphs listed in Table 10 on page 105. 1. Open the Performance Monitoring window. 2. Select Performance Graphs > Basic Monitoring > Graph Type. Depending on the type of graph you select, you might be prompted to select a slot or port for which to create a graph. 3.
DRAFT: BROCADE CONFIDENTIAL 8 Customizing basic monitoring graphs The title of the dialog box varies, depending on the type of graph you are customizing, but the layout of the dialog box is the same. Figure 36 displays an example of the setup dialog box for the Edit Switch Throughput Utilization graph. FIGURE 36 Select Ports for customizing the Switch Throughput Utilization graph You can perform the following in the dialog box: a. Double-click the domain to expand the slot or port list.
DRAFT: BROCADE CONFIDENTIAL 8 Advanced performance monitoring graphs f. Click Apply. Only the selected ports are displayed in the graph. Advanced performance monitoring graphs This section describes how to create the advanced performance monitor graphs listed in Table 11 on page 105. Because the procedure for creating these graphs differs depending on the type of graph, each type is described separately in the sections that follow. The advanced monitoring graphs are not supported for GbE ports.
DRAFT: BROCADE CONFIDENTIAL 8 Advanced performance monitoring graphs You can also enter a destination ID in the Enter/drag DID number field. 6. Click OK. If you selected multiple EE monitors, SIDs, or PIDs, a confirmation dialog box displays, reminding you that one graph is opened for each selection. 7. Click Yes to display the graphs. 8. When you close a graph, a dialog box asks if you want to save the monitor. If you click OK, the monitor is saved, and persists if the switch is restarted.
DRAFT: BROCADE CONFIDENTIAL 8 Tunnel and TCP performance monitoring graphs 1. Open the Performance Monitoring window. 2. Select Performance Graphs > Advanced Monitoring > SCSI Commands > Graph Type. The applicable setup dialog box displays. 3. Navigate to a switch > slot > port in the Port Selection List. 4. Click the port from the Port Selection List and drag it into the Enter/drag port field. 5. Optional: For the LUN per port graphs, enter a LUN number, in hexadecimal notation.
DRAFT: BROCADE CONFIDENTIAL 8 Saving graphs to a canvas The Tunnel and TCP Graph dialog box displays. 3. Select the tunnel from the Tunnels drop-down list for which you want to generate the graphs. For Brocade 7800 extension switch, you can have maximum four circuit connections in a tunnel and for FX8-24 DCX extension blade, you can have maximum 10 circuit connections in a tunnel. 4.
DRAFT: BROCADE CONFIDENTIAL Saving graphs to a canvas 8 1. Open the Performance Monitoring window. 2. Create basic or advanced Performance Monitor graphs, as described in “Creating basic performance monitor graphs” on page 109 and “Advanced performance monitoring graphs” on page 111. The graphs display in the Performance Monitor window.
DRAFT: BROCADE CONFIDENTIAL 8 Adding graphs to an existing canvas 3. Select File > Save Current Canvas Configuration. The Save Canvas Configuration dialog box displays. 4. Enter a name and description for the configuration and click Save Canvas. A message displays, confirming that the configuration was successfully saved to the switch. Adding graphs to an existing canvas The following procedure assumes that a canvas is already created.
DRAFT: BROCADE CONFIDENTIAL 8 Modifying graphs Modifying graphs Use the following procedure to modify an existing graph that is saved in a canvas. 1. Open the Performance Monitoring window. 2. Select File > Display Canvas Configurations. The Canvas Configuration List displays. A message “No Canvas configuration to display” displays if there are no saved canvas configurations. 3. Select a canvas from the list and click Edit. The Performance Monitor Canvas: Canvas Name dialog box displays. 4.
DRAFT: BROCADE CONFIDENTIAL 8 118 Modifying graphs Web Tools Administrator’s Guide 53-1001772-01
DRAFT: BROCADE CONFIDENTIAL Chapter 9 Administering Zoning In this chapter • Zoning overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Zoning configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Zoning management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Zone configuration and zoning database management. . . . . . . . . . . . . . .
DRAFT: BROCADE CONFIDENTIAL 9 Zoning overview Zones can be configured dynamically. They can vary in size, depending on the number of fabric-connected devices, and devices can belong to more than one zone. Because zone members can access only other members of the same zone, a device not included in a zone is not available to members of that zone. Traffic Isolation zones A traffic isolation zone (TI zone) is a special zone that creates a dedicated path for a specific traffic flow.
DRAFT: BROCADE CONFIDENTIAL Zoning configurations 9 Zoning configurations The Zone Administration window is where all of the zoning tasks are performed. When performing zoning tasks for switches in a mixed fabric—that is, a fabric containing two or more switches running different fabric operating systems—you should use the switch with the highest Fabric OS level. Refer to “Best practices for zoning” on page 138 for more recommendations about zoning.
DRAFT: BROCADE CONFIDENTIAL 9 Zoning management If the FCS policy is activated in the fabric, zoning can be administered only from the primary FCS switch. If the selected switch has an Advanced Zoning license installed, but is not the primary FCS switch, the Zone Admin option is displayed, but not activated. You must be logged into the switch using a user name with one of the following roles associated with it to make changes to the zoning: zoneAdmin, admin, or fabricAdmin.
DRAFT: BROCADE CONFIDENTIAL 9 Zoning management Note the following: • “Saving” means updating the zoning database on the switch with the local changes from the Web Tools buffer. • “Refreshing” means copying the current state of the zoning database on the switch to the Web Tools buffer, overwriting its current contents. In the Zone Administration window, all WWNs also display vendor names.
DRAFT: BROCADE CONFIDENTIAL 9 Zoning management 1. Open the Zone Administration window. 2. Select View > Refresh From Live Fabric. This refreshes the status for the fabric, including switches, ports, and devices. NOTE Depending on the role associated with your user name or if the switch is owned by the current Admin Domain you are logged in to, you may not be able to modify zones or ports in other Admin Domains.
DRAFT: BROCADE CONFIDENTIAL 9 Zoning management Saving the changes propagates any changes made in the Zone Administration window (buffered changes) to the zoning database on the switch. If another user has a zoning operation in progress at the time that you attempt to save changes, a warning displays that indicates that another zoning transaction is in progress on the fabric. You can select to abort the other transaction and override it with yours.
DRAFT: BROCADE CONFIDENTIAL 9 Zoning management Creating and populating zone aliases An alias is a logical group of port index numbers and WWNs. Specifying groups of ports or devices as an alias makes zone configuration easier, by enabling you to configure zones using an alias rather than inputting a long string of individual members. You can specify members of an alias using the following methods: • Identifying members by switch domain and port index number pair, for example, 2, 20.
DRAFT: BROCADE CONFIDENTIAL 9 Zoning management 5. Click Add Member to add the selected alias member, or click Remove Member to remove the selected alias member. The alias is modified in the Zone Admin buffer. 6. Select Zoning Actions > Save Config to save your configuration changes. Renaming zone aliases The new alias name cannot exceed 64 characters and can contain alphabetic, numeric, and underscore characters.
DRAFT: BROCADE CONFIDENTIAL 9 Zoning management Creating and populating zones A zone is a region within the fabric where specified switches and devices can communicate. A device can communicate only with other devices connected to the fabric within its specified zone. Use the following procedure to create a zone. 1. Open the Zone Administration window as described in “Opening the Zone Administration window” on page 121. 2.
DRAFT: BROCADE CONFIDENTIAL 9 Zoning management 4. Highlight an element in the Member Selection List that you want to include in your zone, or highlight an element in the Zone Members list that you want to delete. 5. Click Add Member to add a zone member, or click Remove Member to remove a zone member. The zone is modified in the Zone Admin buffer. 6. Select Zoning Actions > Save Config to save the configuration changes.
DRAFT: BROCADE CONFIDENTIAL 9 Zoning management Deleting zones For information on enabling the configuration, refer to “Enabling zone configurations” on page 134. Use the following procedure to delete a zone. 1. Open the Zone Administration window as described in “Opening the Zone Administration window” on page 121. 2. Click the Zone tab. 3. Select the zone you want to delete from the Name menu and click Delete. 4. On the confirmation dialog box, click Yes.
DRAFT: BROCADE CONFIDENTIAL 9 Zone configuration and zoning database management 7. Optional: Repeat steps 5 and 6 to add more elements to your TI zone. 8. When you are finished, click OK. The Traffic Isolations Zones window displays. 9. Click Apply to save the TI zone configuration. Zone configuration and zoning database management A zone configuration is a group of zones; zoning is enabled on a fabric by enabling a specific configuration. You can specify members of a configuration using zone names.
DRAFT: BROCADE CONFIDENTIAL 9 Zone configuration and zoning database management NOTE Any changes made to the currently enabled configuration does not display until you re-enable the configuration. Use the following procedure to create zone configurations. 1. Open the Zone Administration window as described in “Opening the Zone Administration window” on page 121. 2. Select a format to display zoning members in the Member Selection List as described in “Selecting a zoning view” on page 125. 3.
DRAFT: BROCADE CONFIDENTIAL 9 Zone configuration and zoning database management Renaming zone configurations The new name cannot exceed 64 characters and can contain alphabetic, numeric, and underscore characters. Use the following procedure to change the name of a zone configuration. NOTE You cannot rename the currently enabled configuration. Use the following procedure to rename the zone configuration. 1.
DRAFT: BROCADE CONFIDENTIAL 9 Zone configuration and zoning database management 3. Select the configuration you want to delete from the Name list and click Delete. 4. On the confirmation dialog box, click Yes. The selected configuration is deleted from the configuration database. 5. Select Zoning Actions > Save Config to save the configuration changes. Enabling zone configurations Several zone configurations can reside on a switch at the same time, and you can quickly alternate between them.
DRAFT: BROCADE CONFIDENTIAL 9 Zone configuration and zoning database management Displaying enabled zone configurations The enabled zone configuration screen displays the actual content of the single zone configuration that is currently enabled on the fabric, whether it matches the configuration that was enabled when the current Zone Administration session was launched or last refreshed. The zones are displayed, and their contents (ports, WWNs) are displayed next to them.
DRAFT: BROCADE CONFIDENTIAL 9 Zone configuration and zoning database management NOTE If no zone is enabled, a message displays, indicating that there is no active zoning configuration on the switch. 3. Optional: Click Print located in the Print Effective Zone Configuration dialog box to print the enabled zone configuration details.
DRAFT: BROCADE CONFIDENTIAL 9 Zone configuration and zoning database management Replacing a WWN in multiple aliases and zones This procedure enables you to replace a WWN throughout the Zone Admin buffer. This is helpful when exchanging devices in your fabric and helps you to maintain your current configuration. Use the following procedure to replace a WWN in multiple aliases and zones. 1. Launch the Zone Administration window as described in “Opening the Zone Administration window” on page 121. 2.
DRAFT: BROCADE CONFIDENTIAL 9 Best practices for zoning Clearing the zoning database Use the following procedure to disable the active zoning configuration, if one exists, and delete the entire zoning database. You must disable any active configuration before you can delete the zoning database. ATTENTION This action not only disables zoning on the fabric, but also deletes the entire zoning database. This results in all devices being able to communicate with each other.
DRAFT: BROCADE CONFIDENTIAL Chapter 10 Working with Diagnostic Features In this chapter • Trace dumps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Displaying switch information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Defining Switch Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Port LED interpretation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
DRAFT: BROCADE CONFIDENTIAL 10 Trace dumps How a trace dump is used The generation of a trace dump causes a CRITICAL message to be logged to the system error log. When a trace dump is detected, issue the supportSave command on the affected switch. This command packages all error logs, the supportShow output, and trace dump, and moves these to your FTP server. You can also configure your switch to automatically copy trace dumps to your FTP server (refer to “Setting up automatic trace dump transfers”).
DRAFT: BROCADE CONFIDENTIAL Displaying switch information 10 Enabling automatic transfer of trace dumps The switch must belong to your current Admin Domain before you can perform this task. Use the following procedure to enable the automatic transfer of trace dumps. 1. Open the Switch Administration window. 2. Click Show Advanced Mode, if it is not selected. 3. Select the Trace tab. 4. Select Enable in the Auto FTP Upload section to enable automatic uploading of the trace dump to the FTP host. 5.
DRAFT: BROCADE CONFIDENTIAL 10 Displaying switch information Enter the text string in the box that displays on the table, as shown in Figure 39, and press Enter. This is an incremental search and allows 24 maximum characters including wildcards question mark (?) and asterisk (*). The first row containing the text string is highlighted. To find the next match, click the down arrow. To find the previous match, click the up arrow. If the text is not found in the table, the text turns red.
DRAFT: BROCADE CONFIDENTIAL 10 Displaying switch information Use the following steps to view the detailed fan status of a switch. 1. Select a logical switch using the drop-down list under Fabric Tree section in the Switch Explorer window. The selected switch displays in the Switch View. The icon on the Fan button indicates the overall status of the fan. 2. Click Fan. The detailed fan status for the switch displays, as shown in Figure 40.
DRAFT: BROCADE CONFIDENTIAL 10 Displaying switch information Checking the physical health of a switch The Status button displays the operational state of the switch. The icon on the button displays the real-time status of the switch. If no data is available from a switch, the most recent background color remains displayed. Any error-based status messages that is based on a per time interval cause the status to show faulty until the entire sample interval has passed.
DRAFT: BROCADE CONFIDENTIAL Defining Switch Policy 10 NOTE The Port Detail Report and Switch Availability Monitor (SAM) reports display the details of only those ports which are members of the current Admin Domain context and the E_Ports of the switch. 4.
DRAFT: BROCADE CONFIDENTIAL 10 Port LED interpretation NOTE The options available in the dialog box may differ, depending on the options available on your switch, including CP, core blades, blades, and WWN. FIGURE 43 Switch Status Policy dialog box 3. Configure the numerical values to conform to your definition of a healthy switch. Numerical values that are above “Marginal” are considered to be “Healthy.” 4.
DRAFT: BROCADE CONFIDENTIAL Port LED interpretation 10 • Blue (buffer-limited) • Dimmed (unlicensed) LED representations The port icons are different for different switch models. Figure 44 displays E_Port port icons and associated LEDs from a Brocade 4100 switch. For the Brocade 4100, the top row of LEDs corresponds to the upper port, and the bottom row of LEDs corresponds to the lower port.
DRAFT: BROCADE CONFIDENTIAL 10 Port LED interpretation Brocade 48000 Director LEDs For the Brocade 48000 director, the representation of the port LEDs on the FC4-32 port blade is not the same as the LEDs on the physical blade. Figure 45 on page 148 compares the LEDs on the physical port card and the Web Tools display. Web Tools Representation Physical Port Card 3 1 ! 2 1 ! 2 4 3 4 FC4 32 1. Port Speed LED for the right port 2. Port Status LED for the right port 3.
DRAFT: BROCADE CONFIDENTIAL Chapter 11 Using the FC-FC Routing Service In this chapter • Fibre Channel Routing overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Supported switches for Fibre Channel Routing . . . . . . . . . . . . . . . . . . . . . . • Setting up FC-FC routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • FC-FC routing management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Viewing EX_Ports .
DRAFT: BROCADE CONFIDENTIAL 11 Supported switches for Fibre Channel Routing VEX_Port A virtual port that enables routing functionality through an FCIP tunnel. A VEX_Port is similar to an EX_Port.
DRAFT: BROCADE CONFIDENTIAL 11 FC-FC routing management The FC Routing module provides a dynamic display. Any changes in the FCR configuration on the switch are automatically updated in the FC Routing module within 30 to 90 seconds, depending on the network traffic. The switch must be FC Router-capable, as described in “Fibre Channel Routing overview” on page 149. The only things you need to configure on the FC Router are the EX_Ports and the backbone fabric ID.
DRAFT: BROCADE CONFIDENTIAL 11 FC-FC routing management The FC Routing module displays (as shown in Figure 46). If FC-FC Routing is disabled, a message to that effect displays on all the tabs in the module. FIGURE 46 FC Routing module in Disabled mode with General tab selected Viewing and managing LSAN fabrics The LSAN Fabric tab (Figure 47 on page 153) displays all the LSAN fabrics visible to your switch, in both a tabular and tree form.
DRAFT: BROCADE CONFIDENTIAL Viewing EX_Ports 11 To manage an LSAN fabric, select the fabric to manage and click Manage LSAN Fabric in the task bar. A browser window is launched with the following URL: http://ip-address-of-lsan-fabric-switch For Brocade switches, this launches Web Tools. For non-Brocade fabrics, this launches the Element Manager for that switch.
DRAFT: BROCADE CONFIDENTIAL 11 Viewing EX_Ports From the EX_Ports tab, you can perform the following port management tasks by selecting a port in the table, and then clicking a task in the task bar: • • • • • • • • Configure EX_Ports Edit an EX_Ports configuration Rename an EX_Port Swap the Port Index of an EX_Port (described in “Port swapping index” on page 96) Enable or disable an EX_Port Persistently enable or disable an EX_Port Enable or disable trunking Configure router port cost ATTENTION During
DRAFT: BROCADE CONFIDENTIAL Configuring an EX_Port 11 Configuring an EX_Port Use the following procedure to configure an EX_Port. 1. Select Tasks > Manage > FCR. 2. Select the EX_Ports tab. 3. Click New in the task bar to configure one or more EX_Ports. This launches the port configuration wizard, which guides you through the port configuration process. NOTE The Brocade 7500, Brocade 7500E Extension , and Brocade FR4-18i switches do not require Integrated Routing License for configuring EX_Port.
DRAFT: BROCADE CONFIDENTIAL 11 Viewing LSAN zones Use the following procedure to configure the FCR router port cost. 1. Open the Switch View window. 2. Click FCR in the Manage section of the Tasks menu. 3. Click the Ex_Ports tab. 4. Click the Router Port Cost button. Viewing LSAN zones The LSAN Zones tab displays all the LSAN zones, in both a tabular and tree form. If FC-FC Routing is disabled, the table and the tree node in this tab display only the LSAN zones present in the backbone fabric.
DRAFT: BROCADE CONFIDENTIAL Configuring the backbone fabric ID 11 5. Select the General tab. 6. Click Set Fabric ID in the task bar. The Configure Backbone Fabric ID window displays. 7. Select a fabric ID from the drop-down menu. NOTE The fabric ID is a number from 1 through 128. Web Tools warns you if you select a fabric ID that is already in use. 8. Click OK. 9. After Web Tools automatically re-enables the FC-FC Routing Service, select all the EX_Ports in the table, and click Enable..
DRAFT: BROCADE CONFIDENTIAL 11 158 Configuring the backbone fabric ID Web Tools Administrator’s Guide 53-1001772-01
DRAFT: BROCADE CONFIDENTIAL Chapter 12 Using the Access Gateway In this chapter • Access Gateway overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Viewing Switch Explorer for Access Gateway mode. . . . . . . . . . . . . . . . . . . • Access Gateway mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Enabling Access Gateway mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Disabling Access Gateway mode .
DRAFT: BROCADE CONFIDENTIAL 12 Viewing Switch Explorer for Access Gateway mode NOTE When Access Gateway mode is enabled on switches managed through Web Tools, only a limited subset of menus and options related to device management are available. A switch in Access Gateway mode is considered a device management tool and not a fabric switch, therefore fabric related options are disabled, fabric management menus are unavailable, and fabric-related service requests are forwarded to the fabric switches.
DRAFT: BROCADE CONFIDENTIAL Access Gateway mode 12 • Switch View Access Gateway mode The Access Gateway feature on the Brocade Encryption switch and the Brocade 8000 enables interoperability with the Cisco fabrics. The Access Gateway mode of the switch presents standard F_Ports to the hosts, but it connects to the Enterprise fabric as N_Port (rather than as E_Port in case of a regular switch).
DRAFT: BROCADE CONFIDENTIAL 12 Enabling Access Gateway mode • Configure N-Port Groups — You can only view the port group details from the Port Group Configuration window. The following options are disabled as shown in Figure 51: - Disable N-port Grouping Add Edit/View Delete FIGURE 51 Port Group Configuration—view only • Configure F-N Port Mappings — Add and Remove buttons are disabled for primary mappings and secondary failover mapping.
DRAFT: BROCADE CONFIDENTIAL 12 Disabling Access Gateway mode Use the following procedure to enable Access Gateway mode. 1. Select a switch. 2. Click Switch Admin in the Manage section under Tasks. The Switch Administration dialog box displays. 3. Click Disable in the Switch Status section. You can enable Access Gateway mode only after the switch is disabled. 4. Click Enable in the Access Gateway Mode section. 5. Click Apply. 6. Click Yes to restart the switch in Access Gateway mode.
DRAFT: BROCADE CONFIDENTIAL 12 Port configuration 3. Configure F_Port-to-N_Port mappings. You can set up primary and secondary mappings. The secondary mapping is the N_Port to which an F_Port is mapped when the primary N_Port mapping goes offline. 4. Configure WWN-N_Port mappings Creating port groups You can group a number of N_Ports (and its mapped F_Ports) together to connect to multiple independent fabrics or to create performance optimized ports.
DRAFT: BROCADE CONFIDENTIAL Port configuration 12 The Edit/View Port Group window displays. 4. Edit the name of the port group in the Port Group Name field. 5. Select the Login Balancing check box and the Fabric Name Monitoring check box if you want to enable these features. Clear the check boxes to disable these features. Upon selecting the Login Balancing check box, the F Port Auto Rebalancing and N-Port Auto Rebalancing check boxes and Manual Balancing button become enabled. 6. Click Failover Enable.
DRAFT: BROCADE CONFIDENTIAL 12 Port configuration Defining custom F-N port mapping Use the following procedure to manually change F-N port mappings. 1. Click a port in the Switch View to open the Port Administration window. 2. Click the FC Ports tab. 3. Click Configure F_N Port Mappings. 4. In the Primary Mappings area, select ports and use the Add (right arrow) button to map F_Ports or U_Ports to N_Ports. 5. Optional: Use the Remove (left arrow) button to delete an F_Port mapping from an N_Port. 6.
DRAFT: BROCADE CONFIDENTIAL Access Gateway policy modification 12 Access Gateway policy modification Although you can control a number of policies on switches in Access Gateway mode, Web Tools only provides the ability to enable and disable the policies. For more information on these policies please refer to Access Gateway Administrator’s Guide.
DRAFT: BROCADE CONFIDENTIAL 12 Access Gateway limitations on the Brocade 8000 4. In the Switch Explorer window, select Switch Admin. The Switch Administration window displays (Figure 52). FIGURE 52 Access Gateway Auto Rebalancing 5. Click Refresh. 6. Under the Access Gateway Mode section, do the following: • Select the N Port Auto Rebalancing check box to enable N_Port rebalancing. • Select F Port Auto Rebalancing check box to enable F_Port rebalancing.
DRAFT: BROCADE CONFIDENTIAL 12 Access Gateway limitations on the Brocade 8000 • When the Brocade 8000 runs in Access Gateway mode, all the FCoE ports are F-Ports and all the FC port are N-Ports. • When Access Gateway is enabled, F Ports mapping to N Ports is allowed and all 4 FCOE ports in the trunk group are mapped to the same N Port. • • • • • • • F Ports mapping to the Port Group level is not allowed. You cannot map individual FCoE Ports within the same trunk group to different FC ports.
DRAFT: BROCADE CONFIDENTIAL 12 170 Access Gateway limitations on the Brocade 8000 Web Tools Administrator’s Guide 53-1001772-01
DRAFT: BROCADE CONFIDENTIAL Chapter 13 Administering Fabric Watch In this chapter • Fabric Watch overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Using Fabric Watch with Web Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • System Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Fabric Watch threshold configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
DRAFT: BROCADE CONFIDENTIAL 13 Using Fabric Watch with Web Tools Using Fabric Watch with Web Tools You do not need the EGM license to perform Fabric Watch operations using Web Tools. NOTE Unless the switch is a member of the current Admin Domain context, Fabric Watch is view-only. FIGURE 53 Fabric Watch window Fabric Watch Explorer, on the left side of the window, displays the available classes. Not all classes are available for all switches.
DRAFT: BROCADE CONFIDENTIAL System Monitor 13 Opening the Fabric Watch window Use the following procedure to open the Fabric Watch window. 1. Select a switch from the Fabric Tree and log in if necessary. 2. Select Tasks > Manage > Fabric Watch. The Fabric Watch window displays, as shown in Figure 53. System Monitor The Fabric Watch license must be installed to view and modify the System Monitor details. Select Monitor > System Monitor to display the System Monitor.
DRAFT: BROCADE CONFIDENTIAL 13 Fabric Watch threshold configuration Configuring threshold traits Configure threshold traits to define a threshold for a particular class and area.
DRAFT: BROCADE CONFIDENTIAL Fabric Watch threshold configuration • • • • • • • • • • 13 State change Trunk utilization C3 discards RX performance TX performance Loss of signal Link failures Link resets Packet loss Utilization Use the following procedure to configure threshold alarms. 1. Open the Fabric Watch window. 2. Select the Threshold Configuration tab. 3. Select the Alarm Configuration subtab. 4. In Fabric Watch Explorer, select a class. 5.
DRAFT: BROCADE CONFIDENTIAL 13 Configuring alarms for FRUs Enabling or disabling threshold alarms for individual elements Use the following procedure to configure element-specific alarm settings. 1. Open the Fabric Watch window. 2. In Fabric Watch Explorer, select a class. You can set alarms for information on a switch only if that information is monitored by Fabric Watch for that switch; not all alarm options are available for all switches.
DRAFT: BROCADE CONFIDENTIAL 13 Fabric Watch alarm information 5. Select the alarm states for which you want an event to register. If a FRU of the selected type is determined that it is one of the selected states, an event will occur. 6. Select the methods by which you want to be notified about the FRU alarms. For FRUs, the only options are error log and e-mail alert. 7. Click Apply to apply the changes to the switch.
DRAFT: BROCADE CONFIDENTIAL 13 E-mail notification NOTE Note that for the FRU class, only the Name, State, and Time columns are displayed. In addition, if the FRU area is Fan, the Name column refers to either a fan or a fan FRU, depending on the switch model. Refer to “Viewing detailed fan hardware status” on page 142 for more information.
DRAFT: BROCADE CONFIDENTIAL E-mail notification 13 6. Click Apply. Configuring the e-mail alert You can set a different e-mail alert configuration for each class. For example, you can set one e-mail notification for SFPs and another for E_Ports. Before configuring e-mail alert recipients, you must set up the e-mail notification recipient’s DNS server and domain name. NOTE You must execute the fwalfilterset 1 command in CLI to enable e-mail notification.
DRAFT: BROCADE CONFIDENTIAL 13 180 E-mail notification Web Tools Administrator’s Guide 53-1001772-01
DRAFT: BROCADE CONFIDENTIAL Chapter Administering Extended Fabrics 14 In this chapter • Extended link buffer allocation overview . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 • Configuring a port for long distance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 Extended link buffer allocation overview If the link is used over long distances, use the Extended Fabric tab of the Switch Administration window to configure the long-distance setting of a port.
DRAFT: BROCADE CONFIDENTIAL 14 Extended link buffer allocation overview For an LD-mode link, the desired distance is used as the upper limit of the link distance to calculate buffer availability for other ports in the same port group. If the measured distance is more than the desired distance, the desired distance is used to allocate the buffers. In this case, the port operates in degraded mode instead being disabled due to insufficient buffers.
DRAFT: BROCADE CONFIDENTIAL Configuring a port for long distance 14 The Brocade Encryption Switch and the FS8-18 Encryption blade support auto-negotiated link speeds of 1, 2, 4, and 8 Gbps. The GE ports are always locked at 1 Gbps. TABLE 16 Long-distance settings and license requirements Value Description Extended Fabrics License Required? L0 No long-distance setting is enabled. The maximum supported link distance is 10 km, 5 km, or 2.
DRAFT: BROCADE CONFIDENTIAL 14 Configuring a port for long distance a. Double-click the Desired Distance field for the port, as shown in Figure 54. b. Enter a number in the field to indicate the distance in kilometers. The allowed values depend on the port capability: • • • • If the port capability is 8 GB, type a number between 10 and 63 inclusive. If the port capability is 4 GB, type a number between 10 and 125, inclusive.
DRAFT: BROCADE CONFIDENTIAL Chapter 15 Administering the iSCSI Target Gateway In this chapter • iSCSI service overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Setting up iSCSI Target Gateway services . . . . . . . . . . . . . . . . . . . . . . . . . . • Discovery Domain management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Discovery domain sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
DRAFT: BROCADE CONFIDENTIAL 15 iSCSI service overview Supported platforms for iSCSI The iSCSI target gateway service is supported on the Brocade 48000 director with CP blades running Fabric OS v5.2.0 and later releases, and configured with an FC4-16IP blade.
DRAFT: BROCADE CONFIDENTIAL 15 iSCSI service overview TABLE 17 iSCSI target gateway services terminology (Continued) Term Definition LUN mapping Logical Unit Number mapping. The mapping of the virtual iSCSI target and the physical Fibre Channel target One frontend LUN (VT LUN) maps to a backend LUN (Fibre Channel LUN). The frontend LUN numbers can be different from the backend LUN numbers. Fibre Channel LUN The LUN identifier of the Fibre Channel target. VT LUN Virtual target LUN.
DRAFT: BROCADE CONFIDENTIAL 15 Setting up iSCSI Target Gateway services Setting up iSCSI Target Gateway services The following procedure provides an overview of the basic steps for setting up iSCSI target gateway services. The iSCSI Setup wizard guides you through the steps to set up iSCSI connectivity between IP networks and your Fibre Channel SAN. Click the Launch Usability wizard button on the iSCSI Administration window to use the iSCSI Setup wizard to perform all setup tasks.
DRAFT: BROCADE CONFIDENTIAL Setting up iSCSI Target Gateway services 15 Launching the iSCSI setup wizard Use the following procedure to launch the iSCSI setup wizard. 1. Select a logical switch using the drop-down list under Fabric Tree section in the Switch Explorer window. The selected switch displays in the Switch View. Make sure that your Admin Domain Context is either AD0 or AD255. Generally, the default user Admin Domain is AD0.
DRAFT: BROCADE CONFIDENTIAL 15 Setting up iSCSI Target Gateway services • Configure the IP route for the iSCSI port. The iSCSI Port Group tab allows you to configure iSCSI ports, display session details on a port, and show the port statistics. It also allows you to view and configure the IP interface and routes that are located on the IP Interface tab. You can edit or delete the IP address, but you cannot add any additional IP addresses to this interface.
DRAFT: BROCADE CONFIDENTIAL Setting up iSCSI Target Gateway services 15 Configuring the IP route (optional) Use the following procedure to configure the IP route. NOTE You can create maximum of 32 static IP routes. 1. Launch the iSCSI Target Gateway Admin module as described on page 188. 2. Select the iSCSI Port tab. 3. From the left pane, select the GbE port to use. 4. Select the IP Routes tab. 5. Click Add. 6. Enter the IP address, subnet mask, and gateway IP address, and the metric. 7. Click Add.
DRAFT: BROCADE CONFIDENTIAL 15 Setting up iSCSI Target Gateway services The VT Configuration Wizard displays. 4. Enter an IQN. The text field displays the value “iqn” and you must enter the remaining data. 5. Click Add LUNs. 6. On the LUN Addition dialog box, select the LUNs to add. You must expand each unit until you get to the actual LUN. 7. Click Add LUN(s). This adds the selected LUNs to your virtual target. 8. Click Next and click Finish.
DRAFT: BROCADE CONFIDENTIAL Discovery Domain management 15 Searching for a specific Fibre Channel target The creation wizard has a search function to find specific Fibre Channel targets. Use the following procedure to search for a specific FC target. 1. Click the Search link. 2. Input the , partial WWN, or vendor name, or a combination of these values. 3. Click Next. The search results are shown as selected nodes in the Fibre Channel target tree.
DRAFT: BROCADE CONFIDENTIAL 15 Discovery Domain management Discovery domains can be created with virtual targets, iSCSI initiators, or both. In the wizard, you can do the following tasks: • You can configure the DD. You must specify the DD name, and then you can add or remove initiators and targets. You can also add any offline devices by entering the IQN name in the IQN name field and clicking Add Offline Devices under the list on the right. The offline device name is added to the Selected List.
DRAFT: BROCADE CONFIDENTIAL Discovery domain sets 15 Discovery domain sets The iSCSI Target Gateway Admin module provides the flexibility to create discovery domain sets (DDSet) that define the host target access. (This functionality is similar to Fibre Channel zoning.) Use the Discovery Domains tab to view and manage access from iSCSI initiators to iSCSI virtual targets. The DD view displays all DDSets created and allows you to create, edit, enable, or disable a discovery domain set.
DRAFT: BROCADE CONFIDENTIAL 15 CHAP configuration The CHAP module pane lists CHAP secrets in a table with the user name and chap secret in encrypted format (*). You can add, delete, or modify CHAP entries. Each CHAP secret has: • User name maximum length of 64 characters • CHAP secret of maximum length of 32 characters Creating a CHAP user Use the following procedure to create a CHAP user. 1. Launch the iSCSI Target Gateway Admin module as described on page 188. 2. Select the CHAP tab. 3. Click Create.
DRAFT: BROCADE CONFIDENTIAL 15 Connection redirection Connection redirection Connection redirection allows iSCSI sessions to be evenly distributed across ports on the same blade. Before the maximum number of connections is reached for any given port, logins are redirected to the next available port, resulting in an even distribution of sessions. This distribution occurs only during the first login phase.
DRAFT: BROCADE CONFIDENTIAL 15 iSCSI Fibre Channel zone configuration • If default zoning is set to All Access and there is no effective zone configuration, then you can create an iSCSI Fibre Channel zone and add it to a defined configuration, but you do not need to enable the defined configuration. Because your default zoning is All Access with no effective zone configuration, all devices can already talk to each other.
DRAFT: BROCADE CONFIDENTIAL Managing and troubleshooting accessibility 15 ATTENTION Schedule your changes during a maintenance cycle if you decide to add the iSCSI Fibre Channel zoning members to an effective configuration. Re-enabling the effective configuration affects the entire fabric. 5. Click OK. The effective configuration is modified and re-enabled.
DRAFT: BROCADE CONFIDENTIAL 15 200 Managing and troubleshooting accessibility Web Tools Administrator’s Guide 53-1001772-01
DRAFT: BROCADE CONFIDENTIAL Chapter 16 Routing Traffic In this chapter • Routing overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Viewing fabric shortest path first routing. . . . . . . . . . . . . . . . . . . . . . . . . . . • Configuring dynamic load sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Specifying frame order delivery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
DRAFT: BROCADE CONFIDENTIAL 16 Viewing fabric shortest path first routing Use the Routing tab of the Switch Administration window to view and modify routing information. Figure 55 on page 202 displays the Routing tab. FIGURE 55 Routing tab Viewing fabric shortest path first routing The Routing tab of the Switch Administration window displays information about routing paths. Use the following procedure to view the fabric shortest path first routing. 1.
DRAFT: BROCADE CONFIDENTIAL Configuring dynamic load sharing 16 Configuring dynamic load sharing The exchange-based routing policy depends on the Fabric OS dynamic load sharing feature (DLS) for dynamic routing path selection. When this policy is in force, DLS is always enabled and cannot be disabled. When the port-based policy is in force, you can enable DLS to optimize routing. When DLS is enabled, it shares traffic among multiple equivalent paths between switches.
DRAFT: BROCADE CONFIDENTIAL 16 Specifying frame order delivery 3. Select On in the Loss Less (DLS) area to enable the mode, or select Off to disable dynamic load sharing. When the exchange-based routing policy is in effect, the Loss Less DLS radio buttons display on the Routing tab 4. Click Apply. 5. Click OK. Specifying frame order delivery In a stable fabric, frames are always delivered in order, even when the traffic between switches is shared among multiple paths.
DRAFT: BROCADE CONFIDENTIAL 16 Configuring the link cost for a port Use this procedure to set a non-default, “static” cost for any port. 1. Open the Switch Administration window as described in “Opening the Switch Administration window” on page 35. 2. Select the Routing tab. 3. This step is switch-specific: - For the Brocade 48000 and Brocade DCX, enterprise-class platforms, click the slot number of the logical switch under Link Cost in the navigation tree.
DRAFT: BROCADE CONFIDENTIAL 16 206 Configuring the link cost for a port Web Tools Administrator’s Guide 53-1001772-01
DRAFT: BROCADE CONFIDENTIAL Chapter 17 Configuring Standard Security Features In this chapter • User-defined accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Access control list policy configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Fabric-Wide Consistency Policy configuration . . . . . . . . . . . . . . . . . . . . . . . • Authentication policy configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
DRAFT: BROCADE CONFIDENTIAL 17 User-defined accounts Access rights for any user session are determined by the user’s role-based access rights. Refer to Chapter 1, “Introducing Web Tools” for additional information about Role-Based Access Control (RBAC). The User tab of the Switch Administration window (Figure 56 on page 209) displays account information. You can create and manage accounts depending on your role. The roles and permissiosn are listed in Table 18.
DRAFT: BROCADE CONFIDENTIAL User-defined accounts 17 NOTE The User tab displays and changes information in the switch database. If you have RADIUS configured, note that this tab displays the logged-in RADIUS account information but does not allow the user to modify the RADIUS host server database. FIGURE 56 User tab Viewing user account information Use the following procedure to view user account information. 1.
DRAFT: BROCADE CONFIDENTIAL 17 User-defined accounts 3. Click Add. The Add User Account dialog box displays. For switches that support Virtual Fabrics, refer to Figure 57. For switches that support Administrative Domains (AD), refer to Figure 58.
DRAFT: BROCADE CONFIDENTIAL 17 User-defined accounts 4. Enter the user name. The user name must begin with an alphabetic character. The name can be up to 40 characters long. It is case-sensitive and can contain alphabetic and numeric characters, the dot (.) and the underscore (_). It must be different from all other account names on the logical switch. 5. Select a role from the drop-down menu. For VF-enabled switches, the selection is done per logical fabric ID.
DRAFT: BROCADE CONFIDENTIAL 17 User-defined accounts Deleting user-defined accounts Use the following procedure to delete user-defined accounts. 1. Open the Switch Administration window as described in “Opening the Switch Administration window” on page 35. 2. Select the User tab. 3. Select the account to remove and click Remove. 4. Click Apply to save your changes. You cannot delete the default accounts. An account cannot delete itself.
DRAFT: BROCADE CONFIDENTIAL User-defined accounts 17 8. Check the available Admin Domains that the user can access. Only Admin Domains that have already been created and are accessible to you display. If all the Admin Domains in the list are inactive then you cannot log in to the switch. NOTE The All option does not mean all of the listed Admin Domains; it means all Admin Domains from AD0 through AD255, regardless of whether they were already created.
DRAFT: BROCADE CONFIDENTIAL 17 User-defined accounts 3. Select the account to modify. If you are logged in as a switchadmin, you can only change the password of your own account. 4. Click Change Password. The Set User Account Password dialog box displays. 5. Enter the current password of the account. This step is required only if you are changing the password of your own or a peer admin account. 6. Enter the new password of the account.
DRAFT: BROCADE CONFIDENTIAL Access control list policy configuration 17 Setting a password as expired Use the following procedure to set a password as expired. 1. Open the Switch Administration window as described in “Opening the Switch Administration window” on page 35. 2. Select the User tab. 3. Select the account. 4. Click Expire Password. If the button is unavailable, the password is already expired. 5. Click Apply to save your changes.
DRAFT: BROCADE CONFIDENTIAL 17 Access control list policy configuration Virtual Fabrics considerations ACL policies can be implemented at the logical switch/logical fabric level. Admin Domain considerations ACL management can be done on AD255 and in AD0 only if there are no other user-defined Admin Domains. Both AD0 (when no other user-defined Admin Domains exist) and AD255 provide an unfiltered view of the fabric. If there are user defined Admin Domains, then ACL management can be done on AD255 only.
DRAFT: BROCADE CONFIDENTIAL Access control list policy configuration 17 3. Select the Security Policies tab. 4. Select a policy by clicking on the appropriate tab. 5. Click Edit. This launches the ACL Policy Configuration wizard. 6. Select the policy type you want to edit. 7. Click Next and click Modify. 8. Select a switch or highlight multiple switches to add to the policy by clicking Add or Add All. 9. Select a switch or highlight multiple switches to remove a policy by clicking Remove. 10.
DRAFT: BROCADE CONFIDENTIAL 17 Fabric-Wide Consistency Policy configuration Distributing an SCC, DCC, or FCS policy Perform this procedure to distribute an SCC, DCC, or FCS policy. NOTE SCC and DCC policy can be distributed only for a primary switch. Use the following procedure to distribute an SCC, DCC, or FCS policy. 1. Open the Switch Administration window as described in “Opening the Switch Administration window” on page 35. 2. Select the Security Policies tab. 3.
DRAFT: BROCADE CONFIDENTIAL 17 Authentication policy configuration 3. Under Security Policies, click FWCP. 4. Select one of the following consistency behavior for the required policy type (SCC, DCC, FCS). • Absent • Tolerant • Strict NOTE You can change the consistency behaviors of SCC, DCC, or FCS policy only for a primary switch. 5. Click Apply. 6. Click Yes to accept the changes. NOTE If the switch is not a primary switch, an error message dialog box displays. 7.
DRAFT: BROCADE CONFIDENTIAL 17 Authentication policy configuration Passive The switch does not initiate authentication but participates if the connecting switch initiates authentication. Hash A hash function (like SHA or MD5) is used for authentication. Off The switch does not support authentication. Any authentication negotiation is rejected. 6. Select a DH-Group type. 7. Optional: Set the device authentication policy mode to either off or passive and click Apply.
DRAFT: BROCADE CONFIDENTIAL 17 Authentication policy configuration Re-authenticating policies A user who has changed authentication policy parameters or a shared secret key pair can re-initialize the authentication. Use the following procedure to re-authenticate policies. 1. Click a port in the Switch View to open the Port Administration window. The Port Administration window displays with the port selected. 2. Click Re-Authenticate (active only for F_Ports and E_Ports). 3. Close the window.
DRAFT: BROCADE CONFIDENTIAL 17 SNMP configuration 6. Make the appropriate changes and click OK. Setting the Switch Policy Authentication mode This setting determines whether or not authentication is required when a switch logs in to a fabric. Use the following procedure to set the Switch Policy Authentication mode. 1. Open the Switch Administration window as described in “Opening the Switch Administration window” on page 35. 2. Select the Security Policies tab. 3.
DRAFT: BROCADE CONFIDENTIAL SNMP configuration 17 3. Enter a contact name, description, and location in the SNMP Information section. 4. Optional: Select the Enable Authentication Trap check box to allow authentication traps to be sent to the reception IP address. 5. Click Apply. Setting SNMPv1 configuration parameters Use the following procedure to set SNMPv1 configuration parameters. 1. Open the Switch Administration window as described in “Opening the Switch Administration window” on page 35. 2.
DRAFT: BROCADE CONFIDENTIAL 17 RADIUS management Changing the access control configuration NOTE The port number is not included. Use the following procedure to change the access control configuration. 1. Open the Switch Administration window as described in “Opening the Switch Administration window” on page 35. 2. Select the SNMP tab. 3. Double-click an access host IP address in the Access Control List section and enter a new host IP address. You can enter an IP address in either IPv4 or IPv6 format.
DRAFT: BROCADE CONFIDENTIAL RADIUS management 17 If the switch database is selected as primary, there is no secondary option. The RADIUS server cannot be configured as a backup for the switch user login database.
DRAFT: BROCADE CONFIDENTIAL 17 RADIUS management The RADIUS Configuration dialog box displays. You can configure up to five RADIUS servers. If five RADIUS servers are already configured, the Add button is disabled. 4. Enter the RADIUS server name, as a valid IP address (in either IPv4 or IPv6 format) or Dynamic Name Server (DNS) string. Each RADIUS server must have a unique IP address or DNS name for the RADIUS server. 5. Enter the port number. 6. Enter the secret string. 7.
DRAFT: BROCADE CONFIDENTIAL 17 Active Directory service management 4. Click the up and down arrows to rearrange the order of the RADIUS servers. 5. Click Apply. Removing a RADIUS server Use the following procedure to remove a RADIUS server. 1. Open the Switch Administration window as described in “Opening the Switch Administration window” on page 35. 2. Select the AAA Service tab. 3. Select a RADIUS server from the RADIUS Configuration list. 4. Click Remove.
DRAFT: BROCADE CONFIDENTIAL 17 IPsec concepts NOTE To disable Active Directory service, select Switch Database from the Primary AAA Service drop-down menu and select None from the Secondary AAA Service drop-down menu. 5. Click Apply. Modifying Active Directory service Use the following procedure to change the parameters of a Active Directory service that is already configured. 1. Open the Switch Administration window as described in “Opening the Switch Administration window” on page 35. 2.
DRAFT: BROCADE CONFIDENTIAL IPsec concepts 17 From Web Tools, you can establish IPsec policies for FCIP implementations on 7800 extension switches with the upgrade license, the 7500 extension switches and FR4-18i blades, and you can establish IPsec policies for IP interfaces that provide management access to switches and control processors. There are several protocols and algorithms that can be applied.
DRAFT: BROCADE CONFIDENTIAL 17 IPsec concepts Figure 60 provides a basic visual comparison of how transport mode and tunnel mode modify an IP datagram. FIGURE 60 Transport mode and tunnel mode comparison IPsec header options IPsec adds headers to an IP datagram to enable authentication and privacy.
DRAFT: BROCADE CONFIDENTIAL IPsec concepts 17 Encapsulating Security Payload ESP provides authentication, and also provides privacy by encrypting the IP datagram. The use of an ESP header is similar to the use of the AH header. A hash algorithm is used to calculate an authentication value, the authentication value is sent in an IP datagram, and the same hash algorithm is used by the receiver to verify the authentication value. ESP can be used in either transport mode or tunnel mode, as shown in Figure 62.
DRAFT: BROCADE CONFIDENTIAL 17 IPsec concepts Endpoint to Gateway In an endpoint to gateway configuration, a protected endpoint connects through an IPsec protected tunnel. This can be used as a virtual private network (VPN) for connecting a roaming computer, like a service laptop, to a protected network. Internet Key Exchange concepts Internet Key Exchange (IKE) is used to authenticate the end points of an IP connection, and to determine security policies for IP traffic over the connection.
DRAFT: BROCADE CONFIDENTIAL IPsec concepts 17 Hash algorithms Hash message authentication codes (HMAC) check data integrity through a mathematical calculation on a message using a hash algorithm combined with a shared, secret key. Table 21 lists the available encryption algorithms. The sending computer uses the hash function and shared key to compute a checksum or code for the message, and sends it to the receiving computer.
DRAFT: BROCADE CONFIDENTIAL 17 IPsec over FCIP DH group choices are 1(modp768), 2(modp1024), 14(modp2048), and 18(modp8192). Each group provides an incrementally more secure key exchange by providing more bits (768, 1024, 2048, 8192).
DRAFT: BROCADE CONFIDENTIAL 17 IPsec over FCIP 3. Select the Security Policies tab. 4. Under Security Policies, select IPsec Policies. The IPsec Policies window displays. The default view shows the IKE tab. Establishing an IKE policy for an FCIP tunnel Use the following procedure to establish an IKE policy for an FCIP tunnel. 1. From the IKE tab of the IPsec Policies screen, select Create. The Add Policy dialog box displays. 2.
DRAFT: BROCADE CONFIDENTIAL 17 IPsec over management ports 4. Assign a policy number. The Policy Number selector allows you to select a number between 1 and 32. 5. Select the Encryption Algorithm used in this policy. The choices are 3DES, AES-128, and AES_256. 6. Select an Authentication Algorithm for this policy. The choices are SHA-1, MD5, and AES-XCBC. The remaining three fields are grayed out. They apply only to IKE policies. 7. Click OK.
DRAFT: BROCADE CONFIDENTIAL 17 IPsec over management ports Use the following procedure to establish an IKE policy. 1. Select the IKE tab on the IPsec Policies window for Ethernet IPsec. The Add IKE Policy dialog box displays. 2. Enter an IKE Policy Name. 3. Enter the IP address of the authentication partner in the Peer IP Address field. 4. Enter the switch’s local identifier in the Local Identifier field. This is normally the IP address in IPv4 or IPv6 format, but it may also be a DNS name. 5.
DRAFT: BROCADE CONFIDENTIAL 17 IPsec over management ports 8. Optionally, enter a value in the SPI number field. A Security Parameter Index (SPI) number is automatically assigned, but may be manually overridden. 9. Click OK. Creating an SA proposal An SA proposal is sent from one endpoint to another to negotiate IKE and IPsec policies. An SA proposal contains one or more security associations (SA).
DRAFT: BROCADE CONFIDENTIAL IPsec over management ports 17 • Process indicates a data packet is processed using IPsec encryption, IKE authentication, or both, using encapsulation security protocol (ESP) processing, or authentication header (AH) protocol processing. Use the following procedure to add an IPsec transform policy. 1. Select the Transforms tab. The Transforms screen displays. 2. Select Add. The Add Transform dialog box displays. 3. Enter a name in the Transform Name field. 4.
DRAFT: BROCADE CONFIDENTIAL 17 IPsec over management ports Manually creating an SA Part of manually creating an SA is to select an IPsec Protection Type. The choices are discard, bypass, and protect: • Discard causes data packets to be rejected if there is an invalid pair of source and destination addresses or invalid port addresses. • Bypass allows a data packet to be transmitted or received without IPsec protection.
DRAFT: BROCADE CONFIDENTIAL Establishing authentication policies for HBAs 17 Editing an IKE or IPsec policy An existing IKE or IPsec policy can be edited. Use the following procedure to edit an IKE or IPsec policy. 1. Open the Switch Administration window. 2. Click Show Advanced Mode. 3. Select the Security Policies tab. 4. Under Security Policies, select Ethernet IPsec or Ethernet IPsec. 5. Select the policy you want to edit. 6. Select Edit. An Edit Policy dialog box displays. 7.
DRAFT: BROCADE CONFIDENTIAL 17 Establishing authentication policies for HBAs • • • • Select the Authentication Type. The choices are FCAP, DHCHAP, or both. Select the Switch Authentication Policy Mode. The choices are Passive, Active, On, or Off. Select the Hash Type used. The choices are SHA1, MD5, or both. Select the DH-Group Type. The choices are 0 (no DH authentication), 1 (1024 bit), 2 (1280 bit), 3 (1536 bit), or 4 (2048 bit).
DRAFT: BROCADE CONFIDENTIAL Chapter 18 Administering FICON CUP Fabrics In this chapter • FICON CUP fabrics overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Enabling port-based routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Enabling or disabling FICON Management Server mode . . . . . . . . . . . . . . • FMS parameter configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
DRAFT: BROCADE CONFIDENTIAL 18 Enabling port-based routing You do not need to install the FICON CUP license to perform FICON CUP management; you must install the FICON CUP license, however, if your switch is to enforce traffic between the FICON director and the host-based management program. Enabling port-based routing Port-based path selection is a routing policy in which paths are chosen based on ingress port and destination only. This also includes user-configured paths.
DRAFT: BROCADE CONFIDENTIAL FMS parameter configuration 18 5. Click Enable in the FICON Management Server Mode section to enable FMS mode or click Disable to disable FMS mode. 6. Click Apply to save your changes. FMS parameter configuration FMS parameters control the behavior of the switch with respect to CUP itself, as well as the behavior of other management interfaces (director console, Alternate Managers). You can configure FMS parameters for a switch only after FMS mode is enabled on the switch.
DRAFT: BROCADE CONFIDENTIAL 18 Displaying code page information TABLE 22 FMS mode parameter descriptions (Continued) Parameter Description Director Clock Alert Mode Controls behavior for attempts to set the switch timestamp clock through the director console. When it is enabled, the director console (Web Tools, in this case) displays warning indications when the switch timestamp is changed by a user application.
DRAFT: BROCADE CONFIDENTIAL Viewing the control device state 18 Viewing the control device state The control device is in either a neutral or a switched state. When it is neutral, the control device accepts commands from any channel that has established a logic path with it and accepts commands from alternate managers. When the control device is switched, it establishes a logical path and accepts commands only from that logical path (“device allegiance”).
DRAFT: BROCADE CONFIDENTIAL 18 CUP port connectivity configuration CUP port connectivity configuration In the Port Connectivity subpanel, you can manage the configuration files and active configuration. All CUP configuration files and the active configuration are listed in a table. The active configuration is listed as “Active Configuration*” and the description in the table is “Current active configuration on switch.” The other special configuration file is the IPL.
DRAFT: BROCADE CONFIDENTIAL 18 CUP port connectivity configuration Modifying CUP port connectivity configurations In the Edit Port CUP Connectivity Configuration dialog box, swapped ports are indicated with the “(Swapped)” label (Figure 63). FIGURE 63 Edit Port CUP Connectivity dialog box swapped label Use the following procedure to create a new CUP port connectivity configuration or to edit an existing configuration. 1. Display the CUP port connectivity configuration list. 2.
DRAFT: BROCADE CONFIDENTIAL 18 CUP port connectivity configuration • Click Activate to save the changes and make the configuration active immediately, as described in “Activating a CUP port connectivity configuration” on page 250. • Click Save to save the changes but not make the configuration active. • Click Save As to save the configuration to a new configuration file. When you click Save As, a dialog box displays in which you should enter a file name and description for the configuration file.
DRAFT: BROCADE CONFIDENTIAL CUP logical path configuration 18 4. Optional: Click Active=Saved Mode to enable (selected) or disable (not selected) the Active=Saved FMS parameter after the configuration is activated. 5. Click Yes to activate the configuration or click No to cancel the activation. Copying a CUP port connectivity configuration Use the following procedure to copy a CUP port connectivity configuration to a new configuration. 1. Display the CUP port connectivity configuration list. 2.
DRAFT: BROCADE CONFIDENTIAL 18 Link Incident Registered Recipient configuration Configuring CUP logical paths Use the following procedure to configure a CUP logical path. 1. Select a FICON-enabled switch from the Fabric Tree. 2. Select Tasks > Manage > Switch Admin. 3. Click Show Advanced Mode to see all the available tabs and options. 4. Select the FICON CUP tab. The FICON CUP page displays the FICON Management Server page in front. All attributes on this page are read-only until FMS mode is enabled. 5.
DRAFT: BROCADE CONFIDENTIAL Displaying Request Node Identification Data 18 6. Click Set LIRR Port. The Set LIRR Port dialog box displays. 7. Enter a port number and click OK. 8. Click Close. Displaying Request Node Identification Data Web Tools displays Request Node Identification Data (RNID) information for the local switch, and for attached FICON devices and FICON channel paths. RNID information for the switch displays in the Switch Information tab (Figure 65).
DRAFT: BROCADE CONFIDENTIAL 18 Displaying Request Node Identification Data RNID information for attached FICON devices and channel paths displays on the Name Server view. To view this information, Click Name Server to display the Name Server view. Ports that completed an RNID exchange display FICON in the Capability column.
DRAFT: BROCADE CONFIDENTIAL Chapter 19 Configuring FCoE with Web Tools In this chapter • Web Tools and FCoE overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Web Tools, the EGM license, and DCFM . . . . . . . . . . . . . . . . . . . . . . . . . . . • Switch administration and FC0E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • FC0E configuration tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
DRAFT: BROCADE CONFIDENTIAL 19 Web Tools and FCoE overview Web Tools and FCoE overview Brocade Web Tools is an embedded graphical user interface (GUI) that enables administrators to monitor and manage single or small fabrics, switches, and ports. Web Tools is launched directly from a web browser, or from the DCFM client. NOTE For complete information on Web Tools, refer to the Web Tools Administrator’s Guide. This chapter only discusses Web Tools and FCoE configuration.
DRAFT: BROCADE CONFIDENTIAL 19 Switch administration and FC0E • FCoE Priority Bits—Each bit represents a user priority that is associated with FCoE traffic. • Default CoS—The default Class of Service. Switch administration and FC0E The CEE tab on the Switch Administration panel is specific to DCE and CEE configuration and management. The CEE tab has five subtabs (Figure 66) that are used for FCoE switch administration: • • • • • Link Aggregation VLAN FCoE Login Group QoS LLDP-DCBX .
DRAFT: BROCADE CONFIDENTIAL 19 Quality of Service configuration Quality of Service configuration As a general concept, Quality of Service (QoS) is a mechanism for classifying and scheduling data traffic based on priority settings. QoS can be used to control traffic congestion, allocate bandwidth, and carry data traffic with different characteristics over a common interface. The following two configuration options are available: • You can create a CEE map.
DRAFT: BROCADE CONFIDENTIAL 19 LLDP-DCBX configuration 8. Edit the Bandwidth entry to indicate the desired percentage of total bandwidth. 9. Change the Priority Flow Control Status to Enabled to enable PFC for the entry. 10. Click OK. The new priority group displays in the Priority Group Map. Adding a traffic class map CoS priorities can be mapped to traffic classes using a traffic class map. 1. Select the CEE tab on the Switch Administration panel. 2. Select the QoS tab. 3.
DRAFT: BROCADE CONFIDENTIAL 19 LLDP-DCBX configuration You can clear the check box to disable LLDP. 5. Enter a name for the configuration in the System Name field. 6. Optionally, add a description in the System Description field. 7. Select the Mode. For Mode, the choices are Tx (transmit), Rx, (receive) or Both. The default is Both. 8. In the Hello field, enter a time value in seconds.
DRAFT: BROCADE CONFIDENTIAL 19 LLDP-DCBX configuration Adding an LLDP profile The LLDP profile determines LLDP settings per port. Use the following procedure to add an LLDP profile. 1. Select the CEE tab on the Switch Administration panel. 2. Select the LLDP-DCBX tab. 3. Select the LLDP Profile tab. 4. Click Add. The LLDP Configuration dialog box displays. 5. Enter a name for the configuration in the Name field. 6. Optionally, add a description in the Description field. 7. Select the Mode.
DRAFT: BROCADE CONFIDENTIAL 19 Configuring CEE interfaces - Advertise dcbx-fcoe-app—Advertises application type, length, and values to ensure interoperability of traffic over DCBX protocol running over LLDP. 11. Click Save Configuration. Configuring CEE interfaces The CEE Interfaces tab on the Port Administration panel is used for configuring the CEE interfaces on a switch. Use the following procedure to configure the CEE interfaces. 1. Select the CEE Interfaces tab on the Port Administration panel.
DRAFT: BROCADE CONFIDENTIAL Configuring a link aggregation group 19 Configuring a link aggregation group FCoE ports can be grouped to create a link aggregation group (LAG). The LAG is treated as a single interface. Use the following procedure to configure a LAG. 1. Select the CEE Interfaces tab on the Switch Administration panel. 2. Select the Link Aggregation tab. 3. Click Add. The Add LAG Configuration dialog box displays.
DRAFT: BROCADE CONFIDENTIAL 19 Configuring FCoE login groups Use the following procedure to configure a VLAN. 1. Select the CEE tab on the Switch Administration panel. 2. Select the VLAN tab. 3. Click Add. The VLAN Configuration dialog box displays. 4. Specify a VLAN ID. The format is VLAN. In this Fabric OS release, no bridge instances are supported, so the bridge number is always 0, and the value under Bridge is statically defined as VLAN0.
DRAFT: BROCADE CONFIDENTIAL 19 Displaying FCoE port information • Self — WWN of your current switch • Other Switch WWN If you choose Other Switch WWN, you must enter the WWN of that switch in the provided field. 6. Under Login Member Configuration, select either Allow All Members or Allow Specific Member. • If you select Allow All Members, all devices attached to FCoE ports are allowed to log in to the switch.
DRAFT: BROCADE CONFIDENTIAL 19 Displaying LAG information • Connected Peer Type displays the port type on the connected device. • Is Directly Connected indicates whether or not the device is directly connected to the trunk. • FCoE Port MAC displays the FCoE port MAC address. • Switch Port displays the switch port WWN. Displaying LAG information Use the following procedure to display LAG information. 1. Select the CEE tab on the Switch Administration panel. 2. Select the Link Aggregation tab.
DRAFT: BROCADE CONFIDENTIAL Displaying LLDP-DCBX information 19 Displaying LLDP-DCBX information Use the following procedure to display LLDP-DCBX information. 1. Select the CEE tab on the Switch Administration panel. 2. Select the LLDP-DCBX tab. • To display global settings, select the Global tab. • To display LLDP profile information, select the LLDP Profile tab.
DRAFT: BROCADE CONFIDENTIAL 19 Enabling and disabling a LAG 1. Select the CEE Interfaces tab on the Port Administration panel. 2. Under the CEE Interface Explorer, select the port you want to enable or disable. 3. Select the General tab. This tab is normally pre-selected. You can follow either of the following options to enable or disable the interface: • Click Enable Interface or Disable Interface to enable or disable the interface, as desired.
DRAFT: BROCADE CONFIDENTIAL Enabling and disabling FCoE ports 19 3. Select the CEE Maps tab. 4. Under the Priority Group area, enable or disable Priority Flow Control Status option for each Priority Group ID. Enabling and disabling FCoE ports You can enable and disable FCoE Ports individually from the Port Administration panel. 1. Select the FCoE Ports tab on the Port Administration panel. 2. Select the port you want to enable or disable under the FC0E Ports Explorer, or from the list. 3.
DRAFT: BROCADE CONFIDENTIAL 19 270 Enabling and disabling FCoE ports Web Tools Administrator’s Guide 53-1001772-01
DRAFT: BROCADE CONFIDENTIAL Chapter 20 Limitations In this chapter • General Web Tools limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271 General Web Tools limitations Table 23 lists general Web Tools limitations that apply to all browsers and switch platforms. TABLE 23 Web Tools limitations Area Details Blade Failure If a blade fails on the switch, the Web Tools interface can still display slot and ports as healthy.
DRAFT: BROCADE CONFIDENTIAL 20 General Web Tools limitations TABLE 23 272 Web Tools limitations (Continued) Area Details Firmware download There are multiple phases to firmware download and activation. When Web Tools reports that firmware download completed successfully, this indicates that a basic sanity check, package retrieval, package unloading, and verification was successful. Web Tools forces a full package install. A restart is required to activate the newly downloaded firmware.
DRAFT: BROCADE CONFIDENTIAL General Web Tools limitations TABLE 23 20 Web Tools limitations (Continued) Area Details Loss of Connection Occasionally, you might see the following message when you try to retrieve data from the switch or send a request to the switch: Switch Status Checking The switch is not currently accessible. The dialog box title may vary, because it indicates which module is having the problem.
DRAFT: BROCADE CONFIDENTIAL 20 General Web Tools limitations TABLE 23 274 Web Tools limitations (Continued) Area Details Refresh option in browsers Web Tools must be restarted when the Ethernet IP address is changed using the NetworkConfig View command. Web Tools appears to hang if it is not restarted after this operation is executed. Workaround: Restart the browser.
DRAFT: BROCADE CONFIDENTIAL Index Numerics 2 domain/4 domain fabric licenses, 9 7800 switch, 91, 92 aliases, zone. Refer to zone aliases all access zoning, 121 arbitrated loop parameters, configuring, 45 automatic trace dump transfers, 140 A B About Discovery Domains (DD), 193 Access Control List. Refer to ACL access control. Refer to RBAC.
DRAFT: BROCADE CONFIDENTIAL configuration Access Gateway mode, 159 upload, 162 configuration file Admin Domain considerations, 64 backing up, 61 restoring, 63 configuring arbitrated loop parameters, 45 backbone fabric ID, 156 CUP port connectivity, 248 default heap size, 8 email notifications, 178 EX_Ports, 153 fabric parameters, 43 Fabric Watch thresholds, 173 FAN frame notification parameters, 45 FC ports, 87 FCR router cost, 155 FICON Management Server parameters, 245 FRU alarms, 176 IOD frames delivery
DRAFT: BROCADE CONFIDENTIAL Discovery Domains iSCSI Target Gateway discovery domains (DD), 193 displaying alarms, Fabric Watch, 177 Control Device state, 247 CUP port connectivity configuration, 248, 251, 252 enabled zone configuration, 135 fan status, 142 FICON code page, 246 name server entries, 56 power supply status, 143 switch events, 54 temperature status, 143 user account information, 209 DLS, 203 domain ID, changing, 41 downloading configuration file, 63 firmware, 65 Dynamic Load Sharing.
DRAFT: BROCADE CONFIDENTIAL FC-FC routing about, 149 setting up, 150 supported switches, 150 FCR router cost, 155 FCS policy activate, 217 create, 216 deactivate, 217 delete, 217 distribute, 218 moving switch position, 218 feature licenses, 47 FICON Management Server mode, enabling and disabling, 244 parameters, 245 filtering events, 55 Filtering IP Addresses, 38 firmware download, 65 FRU alarms, configuring, 176 FSPF routing, 202 fwdl. Refer to firmware download.
DRAFT: BROCADE CONFIDENTIAL zone configuration, 198 iSCSI initiator, 186 iSCSI initiators, 193 iSCSI Port, 186 iSCSI session, 186 iSCSI virtual target, 186 launching module, 188 LUN mapping, 187 managing/troubleshooting accessibility, 199 PDU, 187 search for FC target, 193 supported switches, 186 VT LUN, 187 iSCSI target, editing for iSCSI Target Gateway, 192 ISL trunking, 99 J Java Plug-ins configuring, 8 installing, 6, 7 supported, 5 JRE, installing, 7 L launching FC Routing module, 151 iSCSI Target Ga
DRAFT: BROCADE CONFIDENTIAL PDU, 187 performance graphs adding to a canvas, 116 modifying, 117 printing, 116 types of, 105 Performance Monitoring window, 108 per-frame routing priority, 44 persistently disable a port, 91 platforms, supported, 5 polling rates, 30 port membership in Admin Domains, 83 port menu, 29 port names, assigning, 89 port speed, configuring, 87 port swapping, 97 port type, configuring, 87 port-based routing, 201 ports buffer-limited, 181 configuring, 83 disabling, 90, 91 enabling, 90 L
DRAFT: BROCADE CONFIDENTIAL severity levels, 54 SID-DID performance graph, 111 SNMP trap levels, 222 Solaris patches, installing, 7 SSLv3, 273 starting Web Tools, 9 swapping port index IDs, 97 switch 7800, 91, 92 changing the name of, 41 enabling and disabling, 40 mouse over information, 28 rebooting, 42 Switch Administration window, 33 opening, 35 Switch Events and Switch Information, 27 switch events, displaying, 54 Switch Explorer, Admin Domains, 23 switch name, changing, 41 switch report, 41 switch sta
DRAFT: BROCADE CONFIDENTIAL zone configurations creating, 131 deleting, 133 disabling, 134 enabling, 134 example, 131 modifying, 132 renaming, 133 zone member selection lists, searching, 137 zones about, 119 adding WWNs, 136 best practices, 138 creating, 128 deleting, 130 description, 128 LSAN, 156 modifying, 128 removing WWNs, 136 renaming, 129 replacing WWNs, 137 selecting a view, 125 zoning all access, 121 default zoning, 121 no access, 121 zoning database clearing, 138 maximum size, 125, 134 zoning vie