Log:
Évaluations - , GPA: ( )

Instructions HP, Modèle HP SN6000 Stackable 8Gb 24-port Dual Power Fibre Channel Switch/S-Buy

Fabricant : HP
Taille : 6.23 mb
Nom Fichier :

Langue d'enseignement: itenesronn

Le document est chargé, s'il vous plaît patienter
Le document est chargé, s'il vous plaît patienter


Par ce dispositif a également d'autres instructions :

Facilité d'utilisation


Document Outline

  • Contents
  • Preface
    • Document conventions
      • Text formatting conventions
      • Command syntax conventions
      • Notes, cautions, and warnings
    • Brocade resources
    • Contacting Brocade Technical Support
    • Document feedback
  • About This Document
    • Supported hardware and software
    • What's new in this document
  • Understanding Fibre Channel Services
    • Fibre Channel services overview
    • Management server
    • Platform services
      • Platform services and Virtual Fabrics
      • Enabling platform services
      • Disabling platform services
    • Management server database
      • Displaying the management server ACL
      • Adding a member to the ACL
      • Deleting a member from the ACL
      • Viewing the contents of the management server database
      • Clearing the management server database
    • Topology discovery
      • Displaying topology discovery status
      • Enabling topology discovery
      • Disabling topology discovery
    • Device login
      • Principal switch
      • E_Port login process
      • Fabric login process
      • Port login process
      • RSCNs
      • Duplicate Port World Wide Name
        • Device recovery
    • High availability of daemon processes
    • FL_Port and arbitrated loop support
  • Performing Basic Configuration Tasks
    • Fabric OS overview
    • Fabric OS command line interface
      • Console sessions using the serial port
        • Connecting to Fabric OS through the serial port
      • Telnet or SSH sessions
        • Rules for Telnet connections
        • Connecting to Fabric OS using Telnet
      • Getting help on a command
      • Viewing a history of command line entries
        • cliHistory
        • cliHistory --show
        • cliHistory --showuser username
        • cliHistory --showall
        • cliHistory --help
        • Notes:
      • Using fosexec to run commands on remote switches or domains
    • Password modification
      • Default account passwords
        • Changing the default account passwords at login
    • The switch Ethernet interface
      • Brocade Backbones
      • Brocade switches
      • Virtual Fabrics and the Ethernet interface
      • Management Ethernet port bonding
        • Supported devices
        • Setting up the second Ethernet port on a CP8 blade
      • Displaying the network interface settings
      • Static Ethernet addresses
        • Setting the static addresses for the Ethernet network interface
        • Setting the static addresses for the chassis management IP interface
      • DHCP activation
        • Enabling DHCP for IPv4
        • Disabling DHCP for IPv4
      • IPv6 autoconfiguration
        • Setting IPv6 autoconfiguration
    • Date and time settings
      • Setting the date and time
      • Time zone settings
        • Setting the time zone
        • Setting the time zone interactively
      • Network time protocol
        • Synchronizing the local time with an external source
    • Domain IDs
      • Domain ID issues
      • Displaying the domain IDs
      • Setting the domain ID
    • Switch names
      • Customizing the switch name
    • Chassis names
      • Customizing chassis names
    • Fabric name
      • Configuring the fabric name
      • High availability considerations for fabric names
      • Upgrade and downgrade considerations for fabric names
    • Switch activation and deactivation
      • Disabling a switch
      • Enabling a switch
      • Disabling a chassis
      • Enabling a chassis
    • Switch and Backbone shutdown
      • Powering off a Brocade switch
      • Powering off a Brocade Backbone
    • Basic connections
      • Device connection
      • Switch connection
  • Performing Advanced Configuration Tasks
    • Port identifiers (PIDs) and PID binding overview
      • Core PID addressing mode
      • Fixed addressing mode
      • 10-bit addressing (mode 0)
      • 256-area addressing (mode 1 and mode 2)
        • Zero-based addressing (mode 1)
        • Port-based addressing (mode 2)
      • WWN-based PID assignment
        • Virtual Fabrics considerations for WWN-based PID assignment
        • NPIV
        • Enabling automatic PID assignment
        • Assigning a static PID
        • Clearing PID binding
        • Showing PID assignments
    • Ports
      • Port Types
      • Backbone port blades
      • Setting port names
      • Port identification by slot and port number
      • Port identification by port area ID
      • Port identification by index
      • Configuring a device-switch connection
      • Swapping port area IDs
      • Enabling a port
      • Disabling a port
      • Port decommissioning
      • Setting network interface modes
      • Setting port speeds
      • Setting all ports on a switch to the same speed
      • Setting port speed for a port octet
      • Setting maximum auto-negotiated port speed
    • Blade terminology and compatibility
      • CP blades
      • Core blades
      • Port and application blade compatibility
    • Enabling and disabling blades
      • Enabling blades
        • 48-port and 64-port blade enabling exceptions
      • Disabling blades
    • Blade swapping
      • How blades are swapped
      • Swapping blades
    • Disabling switches
    • Power management
      • Powering off a port blade or core blade
      • Powering on a port blade or core blade
    • Equipment status
      • Checking switch operation
      • Verifying High Availability features (Backbones only)
      • Verifying fabric connectivity
      • Verifying device connectivity
      • Viewing the switch status policy threshold values
      • Setting the switch status policy threshold values
    • Audit log configuration
      • Verifying host syslog prior to configuring the audit log
      • Configuring an audit log for specific event classes
    • Duplicate PWWN handling during device login
      • Setting the behavior for handling duplicate PWWNs
    • Forward error correction
      • FEC limitations
      • Enabling forward error correction
      • Disabling forward error correction
      • Enabling or disabling FEC for long-distance ports
  • Routing Traffic
    • Routing overview
      • Paths and route selection
      • FSPF
      • Fibre Channel NAT
    • Inter-switch links
      • Buffer credits
      • Congestion versus over-subscription
      • Virtual channels
    • Gateway links
      • Configuring a link through a gateway
    • Routing policies
      • Notes
      • Displaying the current routing policy
      • Port-based routing
      • Exchange-based routing
      • Device-based routing
      • Dynamic Path Selection
    • Route selection
      • Dynamic Load Sharing
        • Setting DLS
    • Frame order delivery
      • Forcing in-order frame delivery across topology changes
      • Restoring out-of-order frame delivery across topology changes
      • Enabling Frame Viewer
      • Using Frame Viewer to understand why frames are dropped
        • Displaying discarded frames by back-end port in Frame Viewer
    • Lossless Dynamic Load Sharing on ports
      • Lossless core
        • ICL limitations
        • Traffic flow limitations
      • Configuring Lossless Dynamic Load Sharing
      • Lossless Dynamic Load Sharing in Virtual Fabrics
        • How DLS affects other logical switches in the fabric
    • Frame Redirection
      • Creating a frame redirect zone
      • Deleting a frame redirect zone
      • Viewing frame redirect zones
  • Buffer-to-Buffer Credits and Credit Recovery
    • Buffer credit management
      • Buffer-to-buffer flow control
      • Optimal buffer credit allocation
        • Considerations for calculating buffer credits
      • Fibre Channel gigabit values reference definition
      • Buffer credit allocation based on full-size frames
        • Fibre Channel data frames
        • Allocating buffer credits based on full-sized frames
        • Calculating the number of buffers required based on full-size frames
      • Allocating buffer credits based on average-size frames
      • Configuring buffers for a single port directly
      • Configuring buffers using frame size
      • Calculating the number of buffers required given the distance, speed, and frame size
      • Allocating buffer credits for F_Ports
      • Monitoring buffers in a port group
      • Buffer credits per switch or blade model
      • Maximum configurable distances for Extended Fabrics
      • Downgrade considerations
        • When a port is configured with -framesize and -distance options
        • When a port is configured with the -buffers option
      • Configuring credits for a single VC
        • Increasing credits for normal distance E_Ports
    • Buffer credit recovery
      • Buffer credit recovery over an E_Port
      • Buffer credit recovery over an F_Port
      • Buffer credit recovery over an EX_Port
      • Enabling and disabling buffer credit recovery
    • Credit loss
      • Back-end credit loss detection and recovery support on Brocade 5300 switches
      • Back-end credit loss detection and recovery support on Brocade 6520 switches
      • Enabling back-end credit loss detection and recovery
  • Managing User Accounts
    • User accounts overview
      • Role-Based Access Control
        • Admin Domain considerations
        • Role permissions
      • Management channel
      • Managing user-defined roles
        • Creating a user-defined role
        • Assigning a user-defined role to a user
    • Local database user accounts
      • Default accounts
        • Displaying account information
        • Creating an account
        • Deleting an account
        • Changing account parameters
      • Local account passwords
        • Changing the password for the current login account
        • Changing the password for a different account
    • Local user account database distribution
      • Distributing the local user database
      • Accepting distributed user databases on the local switch
      • Rejecting distributed user databases on the local switch
    • Password policies
      • Password strength policy
      • Password history policy
      • Password expiration policy
      • Account lockout policy
        • Enabling the admin lockout policy
        • Unlocking an account
        • Disabling the admin lockout policy
        • Denial of service implications
    • The boot PROM password
      • Setting the boot PROM password for a switch with a recovery string
      • Setting the boot PROM password for a Backbone with a recovery string
      • Setting the boot PROM password for a switch without a recovery string
      • Setting the boot PROM password for a Backbone without a recovery string
    • Remote authentication
      • Remote authentication configuration
        • Client/server model
        • Authentication server data
        • Switch configuration
        • Supported LDAP options
        • Command options
      • Setting the switch authentication mode
      • Fabric OS user accounts
      • Fabric OS users on the RADIUS server
        • Windows 2000 IAS
        • Linux FreeRADIUS server
        • RADIUS configuration with Admin Domains or Virtual Fabrics
      • Setting up a RADIUS server
        • Configuring RADIUS server support with Linux
          • Adding the Brocade attributes to the server
          • Creating the user
          • Enabling clients
        • Configuring RADIUS server support with Windows 2000
        • RSA RADIUS server
          • Setting up the RSA RADIUS server
      • LDAP configuration and Microsoft Active Directory
        • Configuring Microsoft Active Directory LDAP service
        • Creating a user
        • Creating a group
        • Assigning the group (role) to the user
        • Adding an Admin Domain or Virtual Fabric list
        • Adding attributes to the Active Directory schema
      • LDAP configuration and OpenLDAP
        • OpenLDAP server configuration overview
        • Enabling group membership
        • Adding entries to the directory
        • Assigning a user to a group
        • Assigning the LDAP role to a switch role
        • Modifying an entry
        • Adding an Admin Domain or Virtual Fabric list
      • TACACS+ service
        • TACACS+ configuration overview
        • Configuring the TACACS+ server on Linux
        • The tac_plus.cfg file
          • Adding a user and assigning a role
          • Configuring Admin Domain lists
          • Configuring Virtual Fabric lists
          • Configuring the password expiration date
        • Configuring a Windows TACACS+ server
      • Remote authentication configuration on the switch
        • Adding an authentication server to the switch configuration
        • Enabling and disabling remote authentication
        • Deleting an authentication server from the configuration
        • Changing an authentication server configuration
        • Changing the order in which authentication servers are contacted for service
        • Displaying the current authentication configuration
      • Configuring local authentication as backup
  • Configuring Protocols
    • Security protocols
    • Secure Copy
      • Setting up SCP for configuration uploads and downloads
    • Secure Shell protocol
      • SSH public key authentication
        • Allowed-user
        • Configuring incoming SSH authentication
        • Configuring outgoing SSH authentication
        • Deleting public keys on the switch
        • Deleting private keys on the switch
    • Secure Sockets Layer protocol
      • Browser and Java support
      • SSL configuration overview
        • Certificate authorities
        • Generating a public-private key pair
        • Generating and storing a Certificate Signing Request
        • Obtaining certificates
        • Installing a switch certificate
      • The browser
        • Checking and installing root certificates on Internet Explorer
        • Checking and installing root certificates on Mozilla Firefox
      • Root certificates for the Java plugin
        • Installing a root certificate to the Java plugin
    • Simple Network Management Protocol
      • SNMP Manager
      • SNMP Agent
      • Management Information Base (MIB)
      • Basic SNMP operation
      • Understanding MIBs
      • Access to MIB variables
      • SNMP support
      • Traps
        • FA traps
        • HA traps
        • SW traps
        • FICON traps
        • IF traps
        • BD traps
        • MAPS-TRAP
      • Loading Brocade MIBs
        • Brocade MIB files
        • Standard MIBs
        • MIB loading order
      • Access Gateway and Brocade MIBs
      • Firmware upgrades and enabled traps
      • Support for Administrative Domains
      • Support for Role-Based Access Control
      • Support for IPv6 addressing
      • Support for Virtual Fabrics
        • Filtering ports
        • Switch and chassis context enforcement
      • Customized traps
      • Configuring SNMP using CLI
        • Configuring SNMP security level
        • Supported protocol configurations for SNMPv3 users
        • Configuring SNMPv3 user/traps
    • Telnet protocol
      • Blocking Telnet
      • Unblocking Telnet
    • Listener applications
    • Ports and applications used by switches
      • Port configuration
  • Configuring Security Policies
    • ACL policies overview
      • How the ACL policies are stored
        • Admin Domain considerations for ACL policies
        • Virtual Fabric considerations for ACL policies
      • Policy members
    • ACL policy management
      • Displaying ACL policies
      • Saving changes without activating the policies
      • Activating ACL policy changes
      • Deleting an ACL policy
      • Adding a member to an existing ACL policy
      • Removing a member from an ACL policy
      • Abandoning unsaved ACL policy changes
    • FCS policies
      • FCS policy restrictions
      • Ensuring fabric domains share policies
      • Creating an FCS policy
      • Modifying the order of FCS switches
      • FCS policy distribution
    • Device Connection Control policies
      • Virtual Fabrics considerations
      • DCC policy restrictions
      • Creating a DCC policy
      • Deleting a DCC policy
      • DCC policy behavior with Fabric-Assigned PWWNs
    • SCC Policies
      • Virtual Fabrics considerations for SCC policies
      • Creating an SCC policy
    • Authentication policy for fabric elements
      • Virtual Fabrics considerations
      • E_Port authentication
        • Virtual Fabrics considerations
        • Configuring E_Port authentication
        • Re-authenticating E_Ports
      • Device authentication policy
        • Virtual Fabrics considerations
        • Configuring device authentication
      • AUTH policy restrictions
      • Authentication protocols
        • Viewing the current authentication parameter settings for a switch
        • Setting the authentication protocol
      • Secret key pairs for DH-CHAP
        • Characteristics of a secret key pair
        • Viewing the list of secret key pairs in the current switch database
          • Note about Access Gateway switches
        • Setting a secret key pair
      • FCAP configuration overview
        • Generating the key and CSR for FCAP
        • Exporting the CSR for FCAP
        • Importing CA for FCAP
        • Importing the FCAP switch certificate
        • Starting FCAP authentication
      • Fabric-wide distribution of the authorization policy
    • IP Filter policy
      • Virtual Fabrics considerations for IP Filter policy
      • Creating an IP Filter policy
      • Cloning an IP Filter policy
      • Displaying an IP Filter policy
      • Saving an IP Filter policy
      • Activating an IP Filter policy
      • Deleting an IP Filter policy
      • IP Filter policy rules
        • Source address
        • Destination port
        • Protocol
        • Action
        • Traffic type and destination IP
        • Implicit filter rules
        • Default policy rules
      • IP Filter policy enforcement
      • Adding a rule to an IP Filter policy
      • Deleting a rule from an IP Filter policy
      • Aborting an IP Filter transaction
      • IP Filter policy distribution
    • Policy database distribution
      • Database distribution settings
        • Displaying the database distribution settings
        • Enabling local switch protection
        • Disabling local switch protection
      • ACL policy distribution to other switches
        • Distributing the local ACL policies
      • Fabric-wide enforcement
        • Displaying the fabric-wide consistency policy
        • Setting the fabric-wide consistency policy
      • Notes on joining a switch to the fabric
        • Matching fabric-wide consistency policies
        • Non-matching fabric-wide consistency policies
    • Management interface security
      • Configuration examples
        • Endpoint-to-endpoint transport or tunnel
        • Gateway-to-gateway tunnel
        • Endpoint-to-gateway tunnel
        • RoadWarrior configuration
      • IPsec protocols
      • Security associations
        • IPsec proposal
      • Authentication and encryption algorithms
      • IPsec policies
        • IPsec traffic selector
        • IPsec transform
      • IKE policies
        • Key management
        • Pre-shared keys
        • Security certificates
        • Static Security Associations
      • Creating the tunnel
      • Example of an end-to-end transport tunnel mode
        • Notes
  • Maintaining the Switch Configuration File
    • Configuration settings
      • Configuration file format
        • Chassis section
        • Switch section
    • Configuration file backup
      • Uploading a configuration file in interactive mode
    • Configuration file restoration
      • Restrictions
      • Configuration download without disabling a switch
        • Restoring a configuration
    • Configurations across a fabric
      • Downloading a configuration file from one switch to another switch of the same model
      • Security considerations
    • Configuration management for Virtual Fabrics
      • Uploading a configuration file from a switch with Virtual Fabrics enabled
      • Restoring a logical switch configuration using configDownload
      • Restrictions
    • Brocade configuration form
  • Managing Virtual Fabrics
    • Virtual Fabrics overview
    • Logical switch overview
      • Default logical switch
      • Logical switches and fabric IDs
      • Port assignment in logical switches
      • Logical switches and connected devices
    • Management model for logical switches
    • Logical fabric overview
      • Logical fabric and ISLs
      • Base switch and extended ISLs
        • Base fabric
        • Logical ports
        • Logical fabric formation
    • Account management and Virtual Fabrics
    • Setting up IP addresses for a logical switch
    • Supported platforms for Virtual Fabrics
      • Supported port configurations in the fixed-port switches
      • Supported port configurations in Brocade Backbones
        • Restrictions on Brocade Backbones
    • Virtual Fabrics interaction with other Fabric OS features
    • Limitations and restrictions of Virtual Fabrics
      • Restrictions on XISLs
      • Restrictions on moving ports
    • Enabling Virtual Fabrics mode
    • Disabling Virtual Fabrics mode
    • Configuring logical switches to use basic configuration values
    • Creating a logical switch or base switch
    • Executing a command in a different logical switch context
    • Deleting a logical switch
    • Adding and moving ports on a logical switch
    • Displaying logical switch configuration
    • Changing the fabric ID of a logical switch
    • Changing a logical switch to a base switch
    • Configuring a logical switch for XISL use
    • Changing the context to a different logical fabric
    • Creating a logical fabric using XISLs
  • Administering Advanced Zoning
    • Zone types
    • Zoning overview
      • Approaches to zoning
      • Zone objects
        • Zoning schemes
      • Zone configurations
      • Zoning enforcement
        • Identifying the enforced zone type
      • Considerations for zoning architecture
      • Best practices for zoning
    • Broadcast zones
      • Broadcast zones and Admin Domains
      • Broadcast zones and FC-FC routing
      • High availability considerations with broadcast zones
      • Loop devices and broadcast zones
      • Broadcast zones and default zoning mode
    • Zone aliases
      • Creating an alias
      • Adding members to an alias
      • Removing members from an alias
      • Deleting an alias
      • Viewing an alias in the defined configuration
    • Zone creation and maintenance
      • Displaying existing zones
      • Creating a zone
      • Adding devices (members) to a zone
      • Removing devices (members) from a zone
      • Replacing zone members
        • Notes and restrictions
      • Deleting a zone
      • Viewing a zone in the defined configuration
      • Viewing zone configuration names without case distinction
        • Examining changes in the zone database
      • Validating a zone
        • Inconsistencies between the defined and effective configurations
    • Default zoning mode
      • Setting the default zoning mode
      • Viewing the current default zone access mode
    • Zone database size
    • Zone configurations
      • Creating a zone configuration
      • Adding zones to a zone configuration
      • Removing members from a zone configuration
      • Enabling a zone configuration
      • Disabling a zone configuration
      • Deleting a zone configuration
        • Deleting invalid zones
      • Abandoning zone configuration changes
      • Viewing all zone configuration information
      • Viewing selected zone configuration information
      • Viewing the configuration in the effective zone database
      • Clearing all zone configurations
    • Zone object maintenance
      • Copying a zone object
      • Deleting a zone object
      • Renaming a zone object
    • Zone configuration management
    • Security and zoning
    • Zone merging
      • Fabric segmentation and zoning
      • Zone merging scenarios
    • Concurrent zone transactions
      • Viewing zone database transactions
        • Example:
  • Traffic Isolation Zoning
    • Traffic Isolation Zoning overview
    • TI zone failover
      • Additional considerations when disabling failover
      • FSPF routing rules and traffic isolation
    • Enhanced TI zones
      • Illegal configurations with enhanced TI zones
        • Illegal ETIZ configuration: separate paths from a port to devices on same domain
        • Illegal ETIZ configuration: separate paths from a single port to the same domain
    • Traffic Isolation Zoning over FC routers
      • TI zones within an edge fabric
      • TI zones within a backbone fabric
      • Limitations of TI zones over FC routers
    • Fabric-Level Traffic Isolation in a backbone fabric
      • Fabric-Level TI zones
      • Failover behavior for Fabric-Level TI zones
      • Creating a separate TI zone for each path
      • Creating a single TI zone for all paths
    • General rules for TI zones
      • Traffic Isolation Zone violation handling for trunk ports
    • Supported configurations for Traffic Isolation Zoning
      • Additional configuration rules for enhanced TI zones
      • Trunking with TI zones
    • Limitations and restrictions of Traffic Isolation Zoning
    • Admin Domain considerations for Traffic Isolation Zoning
    • Virtual Fabrics considerations for Traffic Isolation Zoning
    • Traffic Isolation Zoning over FC routers with Virtual Fabrics
    • Creating a TI zone
      • Creating a TI zone in a base fabric
    • Modifying TI zones
    • Changing the state of a TI zone
    • Deleting a TI zone
    • Displaying TI zones
    • Troubleshooting TI zone routing problems
    • Setting up TI zones over FCR (sample procedure)
  • Optimizing Fabric Behavior
    • Adaptive Networking overview
    • Ingress Rate Limiting
      • Virtual Fabrics considerations
      • Limiting traffic from a particular device
      • Disabling Ingress Rate Limiting
    • QoS
      • License requirements for QoS
    • CS_CTL-based frame prioritization
      • Supported configurations for CS_CTL-based frame prioritization
      • High availability considerations for CS_CTL-based frame prioritization
      • Enabling CS_CTL-based frame prioritization on ports
      • Disabling CS_CTL-based frame prioritization on ports
      • Using CS_CTL auto mode at the chassis level
      • Considerations for using CS_CTL-based frame prioritization
    • QoS zone-based traffic prioritization
    • QoS zones
      • QoS on E_Ports
      • QoS over FC routers
      • Virtual Fabrics considerations for QoS zone-based traffic prioritization
      • High-availability considerations for QoS zone-based traffic prioritization
      • Supported configurations for QoS zone-based traffic prioritization
      • Limitations and restrictions for QoS zone-based traffic prioritization
    • Setting QoS zone-based traffic prioritization
    • Setting QoS zone-based traffic prioritization over FC routers
    • Disabling QoS zone-based traffic prioritization
  • Bottleneck Detection
    • Bottleneck detection overview
      • Types of bottlenecks
      • How bottlenecks are reported
    • Supported configurations for bottleneck detection
      • Limitations of bottleneck detection
      • High availability considerations for bottleneck detection
      • Upgrade and downgrade considerations for bottleneck detection
      • Trunking considerations for bottleneck detection
      • Virtual Fabrics considerations for bottleneck detection
      • Access Gateway considerations for bottleneck detection
    • Enabling bottleneck detection on a switch
    • Displaying bottleneck detection configuration details
    • Setting bottleneck detection alerts
      • Setting both a congestion alert and a latency alert
      • Setting only a congestion alert
      • Setting only a latency alert
    • Changing bottleneck detection parameters
      • Examples of applying and changing bottleneck detection parameters
      • Adjusting the frequency of bottleneck alerts
    • Logging frame timeouts due to bottlenecking
    • Advanced bottleneck detection settings
    • Excluding a port from bottleneck detection
    • Displaying bottleneck statistics
    • MAPS and bottleneck detection
    • Disabling bottleneck detection on a switch
  • In-flight Encryption and Compression
    • In-flight encryption and compression overview
      • Supported ports for in-flight encryption and compression
      • In-flight encryption and compression restrictions
        • Bandwidth and port limits for in-flight encryption and compression
        • Port speed on encryption- or compression-enabled ports
      • How in-flight encryption and compression are enabled
      • Authentication and key generation for encryption and compression
      • Availability considerations for encryption and compression
      • Virtual Fabrics considerations for encryption and compression
      • In-flight compression on long-distance ports
      • Compression ratios for compression-enabled ports
    • Configuring in-flight encryption and compression on an EX_Port
    • Configuring in-flight encryption and compression on an E_Port
    • Viewing the encryption and compression configuration
    • Configuring and enabling authentication for in-flight encryption
    • Enabling in-flight encryption
    • Enabling in-flight compression
    • Disabling in-flight encryption
    • Disabling in-flight compression
  • Diagnostic Port
    • Diagnostic Port
    • Supported platforms for D_Port
    • Licensing requirements for D_Port
    • Understanding D_Port
      • Advantages of D_Port
      • D_Port configuration modes and testing
      • General limitations and considerations for D_Port tests
        • Access Gateway limitations and considerations for D_Ports
        • High Availability limitations and considerations for D_Ports
        • 8 Gbps LWL and ELWL SFP transceiver limitations for D_Ports
    • Supported topologies
      • Topology 1: ISLs
      • Topology 2: ICLs
      • Topology 3: Access Gateways
        • Saving port mappings on an Access Gateway
      • Topology 4: HBA to switch
    • Using D_Port in static-static mode between switches
      • Enabling D_Port in static mode
      • Disabling D_Port in static mode
      • Pre-provisioning D_Ports
    • Using D_Port between switches and HBAs
      • Enabling D_Port in static mode between a switch and an HBA
      • BCU D_Port commands
      • Host Bus Adapter limitations and considerations for D_Ports
    • Using D_Port in dynamic mode
    • Using D_Port in on-demand mode
    • Example test scenarios and output
      • Confirming SFP and link status with an HBA
      • Starting and stopping D_Port testing
  • NPIV
    • NPIV overview
      • Upgrade considerations
      • Fixed addressing mode
      • 10-bit addressing mode
    • Configuring NPIV
    • Enabling and disabling NPIV
    • Base device logout
      • Difference in the device logout behaviors
      • Enabling base device logout
      • Use cases and dependencies
      • Viewing base device logout setting
    • Viewing NPIV port configuration information
      • Viewing virtual PID login information
  • Fabric-Assigned PWWN
    • Fabric-Assigned PWWN overview
    • User- and auto-assigned FA-PWWN behavior
    • Configuring an FA-PWWN for an HBA connected to an Access Gateway
    • Configuring an FA-PWWN for an HBA connected to an edge switch
    • Supported switches and configurations for FA-PWWN
    • Configuration upload and download considerations for FA-PWWN
    • Security considerations for FA-PWWN
    • Restrictions of FA-PWWN
    • Access Gateway N_Port failover with FA-PWWN
  • Managing Administrative Domains
    • Administrative Domains overview
      • Admin Domain features
      • Requirements for Admin Domains
      • Admin Domain access levels
      • User-defined Admin Domains
      • System-defined Admin Domains
        • AD0
        • AD255
      • Home Admin Domains and login
      • Admin Domain member types
        • Device members
        • Switch port members
        • Switch members
      • Admin Domains and switch WWNs
      • Admin Domain compatibility, availability, and merging
    • SAN management with Admin Domains
      • CLI commands in an AD context
      • Executing a command in a different AD context
      • Displaying an Admin Domain configuration
      • Switching to a different Admin Domain context
      • Admin Domain interactions with other Fabric OS features
      • Admin Domains, zones, and zone databases
      • Admin Domains and LSAN zones
      • Configuration upload and download in an AD context
    • Admin Domain management for physical fabric administrators
      • Setting the default zoning mode for Admin Domains
      • Creating an Admin Domain
      • User assignments to Admin Domains
        • Creating a new user account for managing Admin Domains
        • Assigning Admin Domains to an existing user account
        • Creating a physical fabric administrator user account
      • Removing an Admin Domain from a user account
      • Activating an Admin Domain
      • Deactivating an Admin Domain
      • Adding members to an existing Admin Domain
      • Removing members from an Admin Domain
      • Renaming an Admin Domain
      • Deleting an Admin Domain
      • Deleting all user-defined Admin Domains
      • Deleting all user-defined Admin Domains non-disruptively
      • Validating an Admin Domain member list
  • Inter-chassis Links
    • Inter-chassis links
      • License requirements for ICLs
    • ICLs for the Brocade DCX 8510 Backbone family
      • ICL trunking on the Brocade DCX 8510-8 and DCX 8510-4
    • ICLs for the Brocade DCX Backbone family
      • ICL trunking on the Brocade DCX and DCX-4S
    • Virtual Fabrics considerations for ICLs
    • Supported topologies for ICL connections
      • Mesh topology
      • Core-edge topology
  • Monitoring Fabric Performance
    • Advanced Performance Monitoring overview
      • Types of monitors
      • Restrictions for installing monitors
      • Virtual Fabrics considerations for Advanced Performance Monitoring
      • Access Gateway considerations for Advanced Performance Monitoring
    • End-to-end performance monitoring
      • Maximum number of EE monitors
      • Supported port configurations for EE monitors
      • Adding EE monitors
      • Setting a mask for an EE monitor
      • Deleting EE monitors
      • Displaying EE monitor counters
      • Clearing EE monitor counters
    • Frame monitoring
      • License requirements for frame monitoring
      • Creating frame types to be monitored
      • Creating a frame monitor
      • Deleting frame types
      • Adding frame monitors to a port
      • Removing frame monitors from a port
      • Saving a frame monitor configuration
      • Displaying frame monitors
      • Clearing frame monitor counters
    • Top Talker monitors
      • Top Talker monitors and FC-FC routing
      • Limitations of Top Talker monitors
      • Adding a Top Talker monitor to a port (port mode)
      • Adding Top Talker monitors on all switches in the fabric (fabric mode)
      • Displaying the top bandwidth-using flows on a port (port mode)
      • Displaying top talking flows for a given domain ID (fabric mode)
      • Deleting a Top Talker monitor on a port (port mode)
      • Deleting all fabric mode Top Talker monitors
    • Trunk monitoring
      • Trunk monitoring considerations
    • Saving and restoring monitor configurations
    • Performance data collection
  • Managing Trunking Connections
    • Trunking overview
      • Types of trunking
      • Masterless trunking
      • License requirements for trunking
      • Port groups for trunking
    • Supported platforms for trunking
    • Supported configurations for trunking
      • High Availability support for trunking
    • Requirements for trunk groups
    • Recommendations for trunk groups
    • Configuring trunk groups
    • Enabling trunking
    • Disabling trunking
    • Displaying trunking information
    • Trunk Area and Admin Domains
      • Example of Trunk Area assignment on port domain,index
    • ISL trunking over long-distance fabrics
    • EX_Port trunking
      • Masterless EX_Port trunking
      • Supported configurations and platforms for EX_Port trunking
        • Backward compatibility support
      • Configuring EX_Port trunking
      • Displaying EX_Port trunking information
    • F_Port trunking
      • F_Port trunking for Access Gateway
        • Requirements for F_Port trunking on an Access Gateway
        • Configuring F_Port trunking for an Access Gateway
      • F_Port trunking for Brocade adapters
        • Configuring F_Port trunking for a Brocade adapter
      • F_Port trunking considerations
      • F_Port trunking in Virtual Fabrics
    • Displaying F_Port trunking information
    • Disabling F_Port trunking
    • Enabling the DCC policy on a trunk area
  • Managing Long-Distance Fabrics
    • Long-distance fabrics overview
    • Extended Fabrics device limitations
    • Long-distance link modes
    • Configuring an extended ISL
      • Enabling long distance when connecting to TDM devices
    • Forward error correction on long-distance links
      • Enabling FEC on a long-distance link
      • Disabling FEC on a long-distance link
  • Using FC-FC Routing to Connect Fabrics
    • FC-FC routing overview
      • License requirements for FC-FC routing
      • Supported platforms for FC-FC routing
      • Supported configurations for FC-FC routing
      • Network OS connectivity limitations
    • Fibre Channel routing concepts
      • Proxy devices
      • FC-FC routing topologies
      • Phantom domains
        • Identifying and deleting stale xlate domains
      • FC router authentication
    • Setting up FC-FC routing
      • Verifying the setup for FC-FC routing
    • Backbone fabric IDs
      • Assigning backbone fabric IDs
    • Assigning alias names to fabric IDs
    • FCIP tunnel configuration
    • Inter-fabric link configuration
      • Configuring an IFL for both edge and backbone connections
      • Configuring EX_Ports on an ICL
    • FC router port cost configuration
      • Port cost considerations
      • Setting router port cost for an EX_Port
    • Shortest IFL cost configuration
      • Configuring shortest IFL cost
    • EX_Port frame trunking configuration
    • LSAN zone configuration
      • Use of Admin Domains with LSAN zones and FC-FC routing
      • Zone definition and naming
      • LSAN zones and fabric-to-fabric communications
      • Controlling device communication with the LSAN
      • Configuring backbone fabrics for interconnectivity
      • Setting the maximum LSAN count
      • HA and downgrade considerations for LSAN zones
      • LSAN zone policies using LSAN tagging
        • Enforce tag
        • Speed tag
        • Rules for LSAN tagging
        • Configuring an Enforce LSAN tag
        • Configuring a Speed LSAN tag
        • Removing an LSAN tag
        • Displaying the LSAN tag configuration
      • LSAN zone binding
        • LSAN zone binding considerations
        • How LSAN zone binding works
        • FC router matrix definition
        • LSAN fabric matrix definition
        • Setting up LSAN zone binding
        • Viewing the LSAN zone binding matrixes
    • Proxy PID configuration
    • Fabric parameter considerations
    • Inter-fabric broadcast frames
      • Displaying the current broadcast configuration
      • Enabling broadcast frame forwarding
      • Disabling broadcast frame forwarding
    • Resource monitoring
    • FC-FC routing and Virtual Fabrics
      • Logical switch configuration for FC routing
      • Backbone-to-edge routing with Virtual Fabrics
    • Upgrade and downgrade considerations for FC-FC routing
      • How replacing port blades affects EX_Port configuration
    • Displaying the range of output ports connected to xlate domains
  • Port Indexing
  • Switch and blade sensors
    • Brocade switch sensors
    • Brocade blade temperature sensors
  • Hexadecimal Conversion
    • Hexadecimal overview
      • Example conversion of the hexadecimal triplet Ox616000
      • Decimal-to-hexadecimal conversion table
  • Index

...

Ce manuel est également adapté pour les modèles :
données dispositifs de traitement - HP SN6000 Stackable 8Gb 24-port Single Power Fibre Channel Switch (6.23 mb)

Écrivez votre propre critique du dispositif



Texte du message
Votre nom :
Entrez les deux chiffres :
capcha





catégories