Votes - 0, Average rating: 0
(
)
|
Other manuals for this model:
manual abstract
Document Outline
- Contents
- Preface
- Document conventions
- Text formatting conventions
- Command syntax conventions
- Notes, cautions, and warnings
- Brocade resources
- Contacting Brocade Technical Support
- Document feedback
- Document conventions
- About This Document
- Supported hardware and software
- What's new in this document
- Understanding Fibre Channel Services
- Fibre Channel services overview
- Management server
- Platform services
- Platform services and Virtual Fabrics
- Enabling platform services
- Disabling platform services
- Management server database
- Displaying the management server ACL
- Adding a member to the ACL
- Deleting a member from the ACL
- Viewing the contents of the management server database
- Clearing the management server database
- Topology discovery
- Displaying topology discovery status
- Enabling topology discovery
- Disabling topology discovery
- Device login
- Principal switch
- E_Port login process
- Fabric login process
- Port login process
- RSCNs
- Duplicate Port World Wide Name
- Device recovery
- High availability of daemon processes
- FL_Port and arbitrated loop support
- Performing Basic Configuration Tasks
- Fabric OS overview
- Fabric OS command line interface
- Console sessions using the serial port
- Connecting to Fabric OS through the serial port
- Telnet or SSH sessions
- Rules for Telnet connections
- Connecting to Fabric OS using Telnet
- Getting help on a command
- Viewing a history of command line entries
- cliHistory
- cliHistory --show
- cliHistory --showuser username
- cliHistory --showall
- cliHistory --help
- Notes:
- Using fosexec to run commands on remote switches or domains
- Console sessions using the serial port
- Password modification
- Default account passwords
- Changing the default account passwords at login
- Default account passwords
- The switch Ethernet interface
- Brocade Backbones
- Brocade switches
- Virtual Fabrics and the Ethernet interface
- Management Ethernet port bonding
- Supported devices
- Setting up the second Ethernet port on a CP8 blade
- Displaying the network interface settings
- Static Ethernet addresses
- Setting the static addresses for the Ethernet network interface
- Setting the static addresses for the chassis management IP interface
- DHCP activation
- Enabling DHCP for IPv4
- Disabling DHCP for IPv4
- IPv6 autoconfiguration
- Setting IPv6 autoconfiguration
- Date and time settings
- Setting the date and time
- Time zone settings
- Setting the time zone
- Setting the time zone interactively
- Network time protocol
- Synchronizing the local time with an external source
- Domain IDs
- Domain ID issues
- Displaying the domain IDs
- Setting the domain ID
- Switch names
- Customizing the switch name
- Chassis names
- Customizing chassis names
- Fabric name
- Configuring the fabric name
- High availability considerations for fabric names
- Upgrade and downgrade considerations for fabric names
- Switch activation and deactivation
- Disabling a switch
- Enabling a switch
- Disabling a chassis
- Enabling a chassis
- Switch and Backbone shutdown
- Powering off a Brocade switch
- Powering off a Brocade Backbone
- Basic connections
- Device connection
- Switch connection
- Performing Advanced Configuration Tasks
- Port identifiers (PIDs) and PID binding overview
- Core PID addressing mode
- Fixed addressing mode
- 10-bit addressing (mode 0)
- 256-area addressing (mode 1 and mode 2)
- Zero-based addressing (mode 1)
- Port-based addressing (mode 2)
- WWN-based PID assignment
- Virtual Fabrics considerations for WWN-based PID assignment
- NPIV
- Enabling automatic PID assignment
- Assigning a static PID
- Clearing PID binding
- Showing PID assignments
- Ports
- Port Types
- Backbone port blades
- Setting port names
- Port identification by slot and port number
- Port identification by port area ID
- Port identification by index
- Configuring a device-switch connection
- Swapping port area IDs
- Enabling a port
- Disabling a port
- Port decommissioning
- Setting network interface modes
- Setting port speeds
- Setting all ports on a switch to the same speed
- Setting port speed for a port octet
- Setting maximum auto-negotiated port speed
- Blade terminology and compatibility
- CP blades
- Core blades
- Port and application blade compatibility
- Enabling and disabling blades
- Enabling blades
- 48-port and 64-port blade enabling exceptions
- Disabling blades
- Enabling blades
- Blade swapping
- How blades are swapped
- Swapping blades
- Disabling switches
- Power management
- Powering off a port blade or core blade
- Powering on a port blade or core blade
- Equipment status
- Checking switch operation
- Verifying High Availability features (Backbones only)
- Verifying fabric connectivity
- Verifying device connectivity
- Viewing the switch status policy threshold values
- Setting the switch status policy threshold values
- Audit log configuration
- Verifying host syslog prior to configuring the audit log
- Configuring an audit log for specific event classes
- Duplicate PWWN handling during device login
- Setting the behavior for handling duplicate PWWNs
- Forward error correction
- FEC limitations
- Enabling forward error correction
- Disabling forward error correction
- Enabling or disabling FEC for long-distance ports
- Port identifiers (PIDs) and PID binding overview
- Routing Traffic
- Routing overview
- Paths and route selection
- FSPF
- Fibre Channel NAT
- Inter-switch links
- Buffer credits
- Congestion versus over-subscription
- Virtual channels
- Gateway links
- Configuring a link through a gateway
- Routing policies
- Notes
- Displaying the current routing policy
- Port-based routing
- Exchange-based routing
- Device-based routing
- Dynamic Path Selection
- Route selection
- Dynamic Load Sharing
- Setting DLS
- Dynamic Load Sharing
- Frame order delivery
- Forcing in-order frame delivery across topology changes
- Restoring out-of-order frame delivery across topology changes
- Enabling Frame Viewer
- Using Frame Viewer to understand why frames are dropped
- Displaying discarded frames by back-end port in Frame Viewer
- Lossless Dynamic Load Sharing on ports
- Lossless core
- ICL limitations
- Traffic flow limitations
- Configuring Lossless Dynamic Load Sharing
- Lossless Dynamic Load Sharing in Virtual Fabrics
- How DLS affects other logical switches in the fabric
- Lossless core
- Frame Redirection
- Creating a frame redirect zone
- Deleting a frame redirect zone
- Viewing frame redirect zones
- Routing overview
- Buffer-to-Buffer Credits and Credit Recovery
- Buffer credit management
- Buffer-to-buffer flow control
- Optimal buffer credit allocation
- Considerations for calculating buffer credits
- Fibre Channel gigabit values reference definition
- Buffer credit allocation based on full-size frames
- Fibre Channel data frames
- Allocating buffer credits based on full-sized frames
- Calculating the number of buffers required based on full-size frames
- Allocating buffer credits based on average-size frames
- Configuring buffers for a single port directly
- Configuring buffers using frame size
- Calculating the number of buffers required given the distance, speed, and frame size
- Allocating buffer credits for F_Ports
- Monitoring buffers in a port group
- Buffer credits per switch or blade model
- Maximum configurable distances for Extended Fabrics
- Downgrade considerations
- When a port is configured with -framesize and -distance options
- When a port is configured with the -buffers option
- Configuring credits for a single VC
- Increasing credits for normal distance E_Ports
- Buffer credit recovery
- Buffer credit recovery over an E_Port
- Buffer credit recovery over an F_Port
- Buffer credit recovery over an EX_Port
- Enabling and disabling buffer credit recovery
- Credit loss
- Back-end credit loss detection and recovery support on Brocade 5300 switches
- Back-end credit loss detection and recovery support on Brocade 6520 switches
- Enabling back-end credit loss detection and recovery
- Buffer credit management
- Managing User Accounts
- User accounts overview
- Role-Based Access Control
- Admin Domain considerations
- Role permissions
- Management channel
- Managing user-defined roles
- Creating a user-defined role
- Assigning a user-defined role to a user
- Role-Based Access Control
- Local database user accounts
- Default accounts
- Displaying account information
- Creating an account
- Deleting an account
- Changing account parameters
- Local account passwords
- Changing the password for the current login account
- Changing the password for a different account
- Default accounts
- Local user account database distribution
- Distributing the local user database
- Accepting distributed user databases on the local switch
- Rejecting distributed user databases on the local switch
- Password policies
- Password strength policy
- Password history policy
- Password expiration policy
- Account lockout policy
- Enabling the admin lockout policy
- Unlocking an account
- Disabling the admin lockout policy
- Denial of service implications
- The boot PROM password
- Setting the boot PROM password for a switch with a recovery string
- Setting the boot PROM password for a Backbone with a recovery string
- Setting the boot PROM password for a switch without a recovery string
- Setting the boot PROM password for a Backbone without a recovery string
- Remote authentication
- Remote authentication configuration
- Client/server model
- Authentication server data
- Switch configuration
- Supported LDAP options
- Command options
- Setting the switch authentication mode
- Fabric OS user accounts
- Fabric OS users on the RADIUS server
- Windows 2000 IAS
- Linux FreeRADIUS server
- RADIUS configuration with Admin Domains or Virtual Fabrics
- Setting up a RADIUS server
- Configuring RADIUS server support with Linux
- Adding the Brocade attributes to the server
- Creating the user
- Enabling clients
- Configuring RADIUS server support with Windows 2000
- RSA RADIUS server
- Setting up the RSA RADIUS server
- Configuring RADIUS server support with Linux
- LDAP configuration and Microsoft Active Directory
- Configuring Microsoft Active Directory LDAP service
- Creating a user
- Creating a group
- Assigning the group (role) to the user
- Adding an Admin Domain or Virtual Fabric list
- Adding attributes to the Active Directory schema
- LDAP configuration and OpenLDAP
- OpenLDAP server configuration overview
- Enabling group membership
- Adding entries to the directory
- Assigning a user to a group
- Assigning the LDAP role to a switch role
- Modifying an entry
- Adding an Admin Domain or Virtual Fabric list
- TACACS+ service
- TACACS+ configuration overview
- Configuring the TACACS+ server on Linux
- The tac_plus.cfg file
- Adding a user and assigning a role
- Configuring Admin Domain lists
- Configuring Virtual Fabric lists
- Configuring the password expiration date
- Configuring a Windows TACACS+ server
- Remote authentication configuration on the switch
- Adding an authentication server to the switch configuration
- Enabling and disabling remote authentication
- Deleting an authentication server from the configuration
- Changing an authentication server configuration
- Changing the order in which authentication servers are contacted for service
- Displaying the current authentication configuration
- Configuring local authentication as backup
- Remote authentication configuration
- User accounts overview
- Configuring Protocols
- Security protocols
- Secure Copy
- Setting up SCP for configuration uploads and downloads
- Secure Shell protocol
- SSH public key authentication
- Allowed-user
- Configuring incoming SSH authentication
- Configuring outgoing SSH authentication
- Deleting public keys on the switch
- Deleting private keys on the switch
- SSH public key authentication
- Secure Sockets Layer protocol
- Browser and Java support
- SSL configuration overview
- Certificate authorities
- Generating a public-private key pair
- Generating and storing a Certificate Signing Request
- Obtaining certificates
- Installing a switch certificate
- The browser
- Checking and installing root certificates on Internet Explorer
- Checking and installing root certificates on Mozilla Firefox
- Root certificates for the Java plugin
- Installing a root certificate to the Java plugin
- Simple Network Management Protocol
- SNMP Manager
- SNMP Agent
- Management Information Base (MIB)
- Basic SNMP operation
- Understanding MIBs
- Access to MIB variables
- SNMP support
- Traps
- FA traps
- HA traps
- SW traps
- FICON traps
- IF traps
- BD traps
- MAPS-TRAP
- Loading Brocade MIBs
- Brocade MIB files
- Standard MIBs
- MIB loading order
- Access Gateway and Brocade MIBs
- Firmware upgrades and enabled traps
- Support for Administrative Domains
- Support for Role-Based Access Control
- Support for IPv6 addressing
- Support for Virtual Fabrics
- Filtering ports
- Switch and chassis context enforcement
- Customized traps
- Configuring SNMP using CLI
- Configuring SNMP security level
- Supported protocol configurations for SNMPv3 users
- Configuring SNMPv3 user/traps
- Telnet protocol
- Blocking Telnet
- Unblocking Telnet
- Listener applications
- Ports and applications used by switches
- Port configuration
- Configuring Security Policies
- ACL policies overview
- How the ACL policies are stored
- Admin Domain considerations for ACL policies
- Virtual Fabric considerations for ACL policies
- Policy members
- How the ACL policies are stored
- ACL policy management
- Displaying ACL policies
- Saving changes without activating the policies
- Activating ACL policy changes
- Deleting an ACL policy
- Adding a member to an existing ACL policy
- Removing a member from an ACL policy
- Abandoning unsaved ACL policy changes
- FCS policies
- FCS policy restrictions
- Ensuring fabric domains share policies
- Creating an FCS policy
- Modifying the order of FCS switches
- FCS policy distribution
- Device Connection Control policies
- Virtual Fabrics considerations
- DCC policy restrictions
- Creating a DCC policy
- Deleting a DCC policy
- DCC policy behavior with Fabric-Assigned PWWNs
- SCC Policies
- Virtual Fabrics considerations for SCC policies
- Creating an SCC policy
- Authentication policy for fabric elements
- Virtual Fabrics considerations
- E_Port authentication
- Virtual Fabrics considerations
- Configuring E_Port authentication
- Re-authenticating E_Ports
- Device authentication policy
- Virtual Fabrics considerations
- Configuring device authentication
- AUTH policy restrictions
- Authentication protocols
- Viewing the current authentication parameter settings for a switch
- Setting the authentication protocol
- Secret key pairs for DH-CHAP
- Characteristics of a secret key pair
- Viewing the list of secret key pairs in the current switch database
- Note about Access Gateway switches
- Setting a secret key pair
- FCAP configuration overview
- Generating the key and CSR for FCAP
- Exporting the CSR for FCAP
- Importing CA for FCAP
- Importing the FCAP switch certificate
- Starting FCAP authentication
- Fabric-wide distribution of the authorization policy
- IP Filter policy
- Virtual Fabrics considerations for IP Filter policy
- Creating an IP Filter policy
- Cloning an IP Filter policy
- Displaying an IP Filter policy
- Saving an IP Filter policy
- Activating an IP Filter policy
- Deleting an IP Filter policy
- IP Filter policy rules
- Source address
- Destination port
- Protocol
- Action
- Traffic type and destination IP
- Implicit filter rules
- Default policy rules
- IP Filter policy enforcement
- Adding a rule to an IP Filter policy
- Deleting a rule from an IP Filter policy
- Aborting an IP Filter transaction
- IP Filter policy distribution
- Policy database distribution
- Database distribution settings
- Displaying the database distribution settings
- Enabling local switch protection
- Disabling local switch protection
- ACL policy distribution to other switches
- Distributing the local ACL policies
- Fabric-wide enforcement
- Displaying the fabric-wide consistency policy
- Setting the fabric-wide consistency policy
- Notes on joining a switch to the fabric
- Matching fabric-wide consistency policies
- Non-matching fabric-wide consistency policies
- Database distribution settings
- Management interface security
- Configuration examples
- Endpoint-to-endpoint transport or tunnel
- Gateway-to-gateway tunnel
- Endpoint-to-gateway tunnel
- RoadWarrior configuration
- IPsec protocols
- Security associations
- IPsec proposal
- Authentication and encryption algorithms
- IPsec policies
- IPsec traffic selector
- IPsec transform
- IKE policies
- Key management
- Pre-shared keys
- Security certificates
- Static Security Associations
- Creating the tunnel
- Example of an end-to-end transport tunnel mode
- Notes
- Configuration examples
- ACL policies overview
- Maintaining the Switch Configuration File
- Configuration settings
- Configuration file format
- Chassis section
- Switch section
- Configuration file format
- Configuration file backup
- Uploading a configuration file in interactive mode
- Configuration file restoration
- Restrictions
- Configuration download without disabling a switch
- Restoring a configuration
- Configurations across a fabric
- Downloading a configuration file from one switch to another switch of the same model
- Security considerations
- Configuration management for Virtual Fabrics
- Uploading a configuration file from a switch with Virtual Fabrics enabled
- Restoring a logical switch configuration using configDownload
- Restrictions
- Brocade configuration form
- Configuration settings
- Managing Virtual Fabrics
- Virtual Fabrics overview
- Logical switch overview
- Default logical switch
- Logical switches and fabric IDs
- Port assignment in logical switches
- Logical switches and connected devices
- Management model for logical switches
- Logical fabric overview
- Logical fabric and ISLs
- Base switch and extended ISLs
- Base fabric
- Logical ports
- Logical fabric formation
- Account management and Virtual Fabrics
- Setting up IP addresses for a logical switch
- Supported platforms for Virtual Fabrics
- Supported port configurations in the fixed-port switches
- Supported port configurations in Brocade Backbones
- Restrictions on Brocade Backbones
- Virtual Fabrics interaction with other Fabric OS features
- Limitations and restrictions of Virtual Fabrics
- Restrictions on XISLs
- Restrictions on moving ports
- Enabling Virtual Fabrics mode
- Disabling Virtual Fabrics mode
- Configuring logical switches to use basic configuration values
- Creating a logical switch or base switch
- Executing a command in a different logical switch context
- Deleting a logical switch
- Adding and moving ports on a logical switch
- Displaying logical switch configuration
- Changing the fabric ID of a logical switch
- Changing a logical switch to a base switch
- Configuring a logical switch for XISL use
- Changing the context to a different logical fabric
- Creating a logical fabric using XISLs
- Administering Advanced Zoning
- Zone types
- Zoning overview
- Approaches to zoning
- Zone objects
- Zoning schemes
- Zone configurations
- Zoning enforcement
- Identifying the enforced zone type
- Considerations for zoning architecture
- Best practices for zoning
- Broadcast zones
- Broadcast zones and Admin Domains
- Broadcast zones and FC-FC routing
- High availability considerations with broadcast zones
- Loop devices and broadcast zones
- Broadcast zones and default zoning mode
- Zone aliases
- Creating an alias
- Adding members to an alias
- Removing members from an alias
- Deleting an alias
- Viewing an alias in the defined configuration
- Zone creation and maintenance
- Displaying existing zones
- Creating a zone
- Adding devices (members) to a zone
- Removing devices (members) from a zone
- Replacing zone members
- Notes and restrictions
- Deleting a zone
- Viewing a zone in the defined configuration
- Viewing zone configuration names without case distinction
- Examining changes in the zone database
- Validating a zone
- Inconsistencies between the defined and effective configurations
- Default zoning mode
- Setting the default zoning mode
- Viewing the current default zone access mode
- Zone database size
- Zone configurations
- Creating a zone configuration
- Adding zones to a zone configuration
- Removing members from a zone configuration
- Enabling a zone configuration
- Disabling a zone configuration
- Deleting a zone configuration
- Deleting invalid zones
- Abandoning zone configuration changes
- Viewing all zone configuration information
- Viewing selected zone configuration information
- Viewing the configuration in the effective zone database
- Clearing all zone configurations
- Zone object maintenance
- Copying a zone object
- Deleting a zone object
- Renaming a zone object
- Zone configuration management
- Security and zoning
- Zone merging
- Fabric segmentation and zoning
- Zone merging scenarios
- Concurrent zone transactions
- Viewing zone database transactions
- Example:
- Viewing zone database transactions
- Traffic Isolation Zoning
- Traffic Isolation Zoning overview
- TI zone failover
- Additional considerations when disabling failover
- FSPF routing rules and traffic isolation
- Enhanced TI zones
- Illegal configurations with enhanced TI zones
- Illegal ETIZ configuration: separate paths from a port to devices on same domain
- Illegal ETIZ configuration: separate paths from a single port to the same domain
- Illegal configurations with enhanced TI zones
- Traffic Isolation Zoning over FC routers
- TI zones within an edge fabric
- TI zones within a backbone fabric
- Limitations of TI zones over FC routers
- Fabric-Level Traffic Isolation in a backbone fabric
- Fabric-Level TI zones
- Failover behavior for Fabric-Level TI zones
- Creating a separate TI zone for each path
- Creating a single TI zone for all paths
- General rules for TI zones
- Traffic Isolation Zone violation handling for trunk ports
- Supported configurations for Traffic Isolation Zoning
- Additional configuration rules for enhanced TI zones
- Trunking with TI zones
- Limitations and restrictions of Traffic Isolation Zoning
- Admin Domain considerations for Traffic Isolation Zoning
- Virtual Fabrics considerations for Traffic Isolation Zoning
- Traffic Isolation Zoning over FC routers with Virtual Fabrics
- Creating a TI zone
- Creating a TI zone in a base fabric
- Modifying TI zones
- Changing the state of a TI zone
- Deleting a TI zone
- Displaying TI zones
- Troubleshooting TI zone routing problems
- Setting up TI zones over FCR (sample procedure)
- Optimizing Fabric Behavior
- Adaptive Networking overview
- Ingress Rate Limiting
- Virtual Fabrics considerations
- Limiting traffic from a particular device
- Disabling Ingress Rate Limiting
- QoS
- License requirements for QoS
- CS_CTL-based frame prioritization
- Supported configurations for CS_CTL-based frame prioritization
- High availability considerations for CS_CTL-based frame prioritization
- Enabling CS_CTL-based frame prioritization on ports
- Disabling CS_CTL-based frame prioritization on ports
- Using CS_CTL auto mode at the chassis level
- Considerations for using CS_CTL-based frame prioritization
- QoS zone-based traffic prioritization
- QoS zones
- QoS on E_Ports
- QoS over FC routers
- Virtual Fabrics considerations for QoS zone-based traffic prioritization
- High-availability considerations for QoS zone-based traffic prioritization
- Supported configurations for QoS zone-based traffic prioritization
- Limitations and restrictions for QoS zone-based traffic prioritization
- Setting QoS zone-based traffic prioritization
- Setting QoS zone-based traffic prioritization over FC routers
- Disabling QoS zone-based traffic prioritization
- Bottleneck Detection
- Bottleneck detection overview
- Types of bottlenecks
- How bottlenecks are reported
- Supported configurations for bottleneck detection
- Limitations of bottleneck detection
- High availability considerations for bottleneck detection
- Upgrade and downgrade considerations for bottleneck detection
- Trunking considerations for bottleneck detection
- Virtual Fabrics considerations for bottleneck detection
- Access Gateway considerations for bottleneck detection
- Enabling bottleneck detection on a switch
- Displaying bottleneck detection configuration details
- Setting bottleneck detection alerts
- Setting both a congestion alert and a latency alert
- Setting only a congestion alert
- Setting only a latency alert
- Changing bottleneck detection parameters
- Examples of applying and changing bottleneck detection parameters
- Adjusting the frequency of bottleneck alerts
- Logging frame timeouts due to bottlenecking
- Advanced bottleneck detection settings
- Excluding a port from bottleneck detection
- Displaying bottleneck statistics
- MAPS and bottleneck detection
- Disabling bottleneck detection on a switch
- Bottleneck detection overview
- In-flight Encryption and Compression
- In-flight encryption and compression overview
- Supported ports for in-flight encryption and compression
- In-flight encryption and compression restrictions
- Bandwidth and port limits for in-flight encryption and compression
- Port speed on encryption- or compression-enabled ports
- How in-flight encryption and compression are enabled
- Authentication and key generation for encryption and compression
- Availability considerations for encryption and compression
- Virtual Fabrics considerations for encryption and compression
- In-flight compression on long-distance ports
- Compression ratios for compression-enabled ports
- Configuring in-flight encryption and compression on an EX_Port
- Configuring in-flight encryption and compression on an E_Port
- Viewing the encryption and compression configuration
- Configuring and enabling authentication for in-flight encryption
- Enabling in-flight encryption
- Enabling in-flight compression
- Disabling in-flight encryption
- Disabling in-flight compression
- In-flight encryption and compression overview
- Diagnostic Port
- Diagnostic Port
- Supported platforms for D_Port
- Licensing requirements for D_Port
- Understanding D_Port
- Advantages of D_Port
- D_Port configuration modes and testing
- General limitations and considerations for D_Port tests
- Access Gateway limitations and considerations for D_Ports
- High Availability limitations and considerations for D_Ports
- 8 Gbps LWL and ELWL SFP transceiver limitations for D_Ports
- Supported topologies
- Topology 1: ISLs
- Topology 2: ICLs
- Topology 3: Access Gateways
- Saving port mappings on an Access Gateway
- Topology 4: HBA to switch
- Using D_Port in static-static mode between switches
- Enabling D_Port in static mode
- Disabling D_Port in static mode
- Pre-provisioning D_Ports
- Using D_Port between switches and HBAs
- Enabling D_Port in static mode between a switch and an HBA
- BCU D_Port commands
- Host Bus Adapter limitations and considerations for D_Ports
- Using D_Port in dynamic mode
- Using D_Port in on-demand mode
- Example test scenarios and output
- Confirming SFP and link status with an HBA
- Starting and stopping D_Port testing
- NPIV
- NPIV overview
- Upgrade considerations
- Fixed addressing mode
- 10-bit addressing mode
- Configuring NPIV
- Enabling and disabling NPIV
- Base device logout
- Difference in the device logout behaviors
- Enabling base device logout
- Use cases and dependencies
- Viewing base device logout setting
- Viewing NPIV port configuration information
- Viewing virtual PID login information
- NPIV overview
- Fabric-Assigned PWWN
- Fabric-Assigned PWWN overview
- User- and auto-assigned FA-PWWN behavior
- Configuring an FA-PWWN for an HBA connected to an Access Gateway
- Configuring an FA-PWWN for an HBA connected to an edge switch
- Supported switches and configurations for FA-PWWN
- Configuration upload and download considerations for FA-PWWN
- Security considerations for FA-PWWN
- Restrictions of FA-PWWN
- Access Gateway N_Port failover with FA-PWWN
- Managing Administrative Domains
- Administrative Domains overview
- Admin Domain features
- Requirements for Admin Domains
- Admin Domain access levels
- User-defined Admin Domains
- System-defined Admin Domains
- AD0
- AD255
- Home Admin Domains and login
- Admin Domain member types
- Device members
- Switch port members
- Switch members
- Admin Domains and switch WWNs
- Admin Domain compatibility, availability, and merging
- SAN management with Admin Domains
- CLI commands in an AD context
- Executing a command in a different AD context
- Displaying an Admin Domain configuration
- Switching to a different Admin Domain context
- Admin Domain interactions with other Fabric OS features
- Admin Domains, zones, and zone databases
- Admin Domains and LSAN zones
- Configuration upload and download in an AD context
- Admin Domain management for physical fabric administrators
- Setting the default zoning mode for Admin Domains
- Creating an Admin Domain
- User assignments to Admin Domains
- Creating a new user account for managing Admin Domains
- Assigning Admin Domains to an existing user account
- Creating a physical fabric administrator user account
- Removing an Admin Domain from a user account
- Activating an Admin Domain
- Deactivating an Admin Domain
- Adding members to an existing Admin Domain
- Removing members from an Admin Domain
- Renaming an Admin Domain
- Deleting an Admin Domain
- Deleting all user-defined Admin Domains
- Deleting all user-defined Admin Domains non-disruptively
- Validating an Admin Domain member list
- Administrative Domains overview
- Inter-chassis Links
- Inter-chassis links
- License requirements for ICLs
- ICLs for the Brocade DCX 8510 Backbone family
- ICL trunking on the Brocade DCX 8510-8 and DCX 8510-4
- ICLs for the Brocade DCX Backbone family
- ICL trunking on the Brocade DCX and DCX-4S
- Virtual Fabrics considerations for ICLs
- Supported topologies for ICL connections
- Mesh topology
- Core-edge topology
- Inter-chassis links
- Monitoring Fabric Performance
- Advanced Performance Monitoring overview
- Types of monitors
- Restrictions for installing monitors
- Virtual Fabrics considerations for Advanced Performance Monitoring
- Access Gateway considerations for Advanced Performance Monitoring
- End-to-end performance monitoring
- Maximum number of EE monitors
- Supported port configurations for EE monitors
- Adding EE monitors
- Setting a mask for an EE monitor
- Deleting EE monitors
- Displaying EE monitor counters
- Clearing EE monitor counters
- Frame monitoring
- License requirements for frame monitoring
- Creating frame types to be monitored
- Creating a frame monitor
- Deleting frame types
- Adding frame monitors to a port
- Removing frame monitors from a port
- Saving a frame monitor configuration
- Displaying frame monitors
- Clearing frame monitor counters
- Top Talker monitors
- Top Talker monitors and FC-FC routing
- Limitations of Top Talker monitors
- Adding a Top Talker monitor to a port (port mode)
- Adding Top Talker monitors on all switches in the fabric (fabric mode)
- Displaying the top bandwidth-using flows on a port (port mode)
- Displaying top talking flows for a given domain ID (fabric mode)
- Deleting a Top Talker monitor on a port (port mode)
- Deleting all fabric mode Top Talker monitors
- Trunk monitoring
- Trunk monitoring considerations
- Saving and restoring monitor configurations
- Performance data collection
- Advanced Performance Monitoring overview
- Managing Trunking Connections
- Trunking overview
- Types of trunking
- Masterless trunking
- License requirements for trunking
- Port groups for trunking
- Supported platforms for trunking
- Supported configurations for trunking
- High Availability support for trunking
- Requirements for trunk groups
- Recommendations for trunk groups
- Configuring trunk groups
- Enabling trunking
- Disabling trunking
- Displaying trunking information
- Trunk Area and Admin Domains
- Example of Trunk Area assignment on port domain,index
- ISL trunking over long-distance fabrics
- EX_Port trunking
- Masterless EX_Port trunking
- Supported configurations and platforms for EX_Port trunking
- Backward compatibility support
- Configuring EX_Port trunking
- Displaying EX_Port trunking information
- F_Port trunking
- F_Port trunking for Access Gateway
- Requirements for F_Port trunking on an Access Gateway
- Configuring F_Port trunking for an Access Gateway
- F_Port trunking for Brocade adapters
- Configuring F_Port trunking for a Brocade adapter
- F_Port trunking considerations
- F_Port trunking in Virtual Fabrics
- F_Port trunking for Access Gateway
- Displaying F_Port trunking information
- Disabling F_Port trunking
- Enabling the DCC policy on a trunk area
- Trunking overview
- Managing Long-Distance Fabrics
- Long-distance fabrics overview
- Extended Fabrics device limitations
- Long-distance link modes
- Configuring an extended ISL
- Enabling long distance when connecting to TDM devices
- Forward error correction on long-distance links
- Enabling FEC on a long-distance link
- Disabling FEC on a long-distance link
- Using FC-FC Routing to Connect Fabrics
- FC-FC routing overview
- License requirements for FC-FC routing
- Supported platforms for FC-FC routing
- Supported configurations for FC-FC routing
- Network OS connectivity limitations
- Fibre Channel routing concepts
- Proxy devices
- FC-FC routing topologies
- Phantom domains
- Identifying and deleting stale xlate domains
- FC router authentication
- Setting up FC-FC routing
- Verifying the setup for FC-FC routing
- Backbone fabric IDs
- Assigning backbone fabric IDs
- Assigning alias names to fabric IDs
- FCIP tunnel configuration
- Inter-fabric link configuration
- Configuring an IFL for both edge and backbone connections
- Configuring EX_Ports on an ICL
- FC router port cost configuration
- Port cost considerations
- Setting router port cost for an EX_Port
- Shortest IFL cost configuration
- Configuring shortest IFL cost
- EX_Port frame trunking configuration
- LSAN zone configuration
- Use of Admin Domains with LSAN zones and FC-FC routing
- Zone definition and naming
- LSAN zones and fabric-to-fabric communications
- Controlling device communication with the LSAN
- Configuring backbone fabrics for interconnectivity
- Setting the maximum LSAN count
- HA and downgrade considerations for LSAN zones
- LSAN zone policies using LSAN tagging
- Enforce tag
- Speed tag
- Rules for LSAN tagging
- Configuring an Enforce LSAN tag
- Configuring a Speed LSAN tag
- Removing an LSAN tag
- Displaying the LSAN tag configuration
- LSAN zone binding
- LSAN zone binding considerations
- How LSAN zone binding works
- FC router matrix definition
- LSAN fabric matrix definition
- Setting up LSAN zone binding
- Viewing the LSAN zone binding matrixes
- Proxy PID configuration
- Fabric parameter considerations
- Inter-fabric broadcast frames
- Displaying the current broadcast configuration
- Enabling broadcast frame forwarding
- Disabling broadcast frame forwarding
- Resource monitoring
- FC-FC routing and Virtual Fabrics
- Logical switch configuration for FC routing
- Backbone-to-edge routing with Virtual Fabrics
- Upgrade and downgrade considerations for FC-FC routing
- How replacing port blades affects EX_Port configuration
- Displaying the range of output ports connected to xlate domains
- FC-FC routing overview
- Port Indexing
- Switch and blade sensors
- Brocade switch sensors
- Brocade blade temperature sensors
- Hexadecimal Conversion
- Hexadecimal overview
- Example conversion of the hexadecimal triplet Ox616000
- Decimal-to-hexadecimal conversion table
- Hexadecimal overview
- Index