2014, Brocade Communications Systems, Inc. All Rights Reserved.
Brocade, the B-wing symbol, Brocade Assurance, ADX, AnyIO, DCX, Fabric OS, FastIron, HyperEdge, ICX, MLX, MyBrocade, NetIron,
OpenScript, VCS, VDX, and Vyatta are registered trademarks, and The Effortless Network and the On-Demand Data Center are trademarks
of Brocade Communications Systems, Inc., in the United States and in other countries. Other brands and product names mentioned may be
trademarks of others.
Notice: This document is for informational purposes only and does not set forth any warranty, expressed or implied, concerning any
equipment, equipment feature, or service offered or to be offered by Brocade. Brocade reserves the right to make changes to this document
at any time, without notice, and assumes no responsibility for its use. This informational document describes features that may not be
currently available. Contact a Brocade sales office for information on feature and product availability. Export of technical data contained in
this document may require an export license from the United States government.
The authors and Brocade Communications Systems, Inc. assume no liability or responsibility to any person or entity with respect to the
accuracy of this document or any loss, cost, liability, or damages arising from the information contained herein or the computer programs that
accompany it.
The product described by this document may contain open source software covered by the GNU General Public License or other open
source license agreements. To find out which open source software is included in Brocade products, view the licensing terms applicable to
the open source software, and obtain a copy of the programming source code, please visit http://www.brocade.com/support/oscd.
The document conventions describe text formatting conventions, command syntax conventions, and
important notice formats used in Brocade technical documentation.
Text formatting conventions
Text formatting conventions such as boldface, italic, or Courier font may be used in the flow of the text
to highlight specific words or phrases.
Format
bold text
italic text
Courier font
Description
Identifies command names
Identifies keywords and operands
Identifies the names of user-manipulated GUI elements
Identifies text to enter at the GUI
Identifies emphasis
Identifies variables and modifiers
Identifies paths and Internet addresses
Identifies document titles
Identifies CLI output
Identifies command syntax examples
Command syntax conventions
Bold and italic text identify command syntax components. Delimiters and operators define groupings of
parameters and their logical relationships.
Convention
bold textIdentifies command names, keywords, and command options.
italic textIdentifies a variable.
Description
FICON Administrator's Guide5
53-1003144-01
Notes, cautions, and warnings
ConventionDescription
valueIn Fibre Channel products, a fixed value provided as input to a command
option is printed in plain text, for example, --show WWN.
[ ]
{x| y| z}
x | y
< >
...
\
Syntax components displayed within square brackets are optional.
Default responses to system prompts are enclosed in square brackets.
A choice of required parameters is enclosed in curly brackets separated by
vertical bars. You must select one of the options.
In Fibre Channel products, square brackets may be used instead for this
purpose.
A vertical bar separates mutually exclusive elements.
Nonprinting characters, for example, passwords, are enclosed in angle
brackets.
Repeat the previous element, for example, member[member...].
Indicates a “soft” line break in command examples. If a backslash separates
two lines of a command input, enter the entire command at the prompt without
the backslash.
Notes, cautions, and warnings
Notes, cautions, and warning statements may be used in this document. They are listed in the order of
increasing severity of potential hazards.
NOTE
A Note provides a tip, guidance, or advice, emphasizes important information, or provides a reference
to related information.
ATTENTION
An Attention statement indicates a stronger note, for example, to alert you when traffic might be
interrupted or the device might reboot.
CAUTION
A Caution statement alerts you to situations that can be potentially hazardous to you or cause
damage to hardware, firmware, software, or data.
DANGER
A Danger statement indicates conditions or situations that can be potentially lethal or
extremely hazardous to you. Safety labels are also attached directly to products to warn of
these conditions or situations.
6FICON Administrator's Guide
53-1003144-01
Brocade resources
Visit the Brocade website to locate related documentation for your product and additional Brocade
resources.
You can download additional publications supporting your product at www.brocade.com. Select the
Brocade Products tab to locate your product, then click the Brocade product name or image to open the
individual product page. The user manuals are available in the resources module at the bottom of the
page under the Documentation category.
To get up-to-the-minute information on Brocade products and resources, go to MyBrocade. You can
register at no cost to obtain a user ID and password.
Release notes are available on MyBrocade under Product Downloads.
White papers, online demonstrations, and data sheets are available through the Brocade website.
Contacting Brocade Technical Support
Brocade resources
As a Brocade customer, you can contact Brocade Technical Support 24x7 online, by telephone, or by email. Brocade OEM customers contact their OEM/Solutions provider.
Brocade customers
For product support information and the latest information on contacting the Technical Assistance
Center, go to http://www.brocade.com/services-support/index.html.
If you have purchased Brocade product support directly from Brocade, use one of the following methods
to contact the Brocade Technical Assistance Center 24x7.
OnlineTelephoneE-mail
Preferred method of contact for nonurgent issues:
•My Cases through MyBrocade
•Software downloads and
licensing tools
•Knowledge Base
Required for Sev 1-Critical and Sev
2-High issues:
•Continental US:
1-800-752-8061
•Europe, Middle East, Africa,
and Asia Pacific: +800-AT
FIBREE (+800 28 34 27 33)
•For areas unable to access toll
free number: +1-408-333-6061
•Toll-free numbers are available
in many countries.
support@brocade.com
Please include:
•Problem summary
•Serial number
•Installation details
•Environment description
Brocade OEM customers
If you have purchased Brocade product support from a Brocade OEM/Solution Provider, contact your
OEM/Solution Provider for all of your product support needs.
FICON Administrator's Guide7
53-1003144-01
Document feedback
•OEM/Solution Providers are trained and certified by Brocade to support Brocade® products.
•Brocade provides backline support for issues that cannot be resolved by the OEM/Solution
Provider.
•Brocade Supplemental Support augments your existing OEM support contract, providing direct
access to Brocade expertise. For more information, contact Brocade or your OEM.
•For questions regarding service levels and response times, contact your OEM/Solution Provider.
Document feedback
To send feedback and report errors in the documentation you can use the feedback form posted with
the document or you can e-mail the documentation team.
Quality is our first concern at Brocade and we have made every effort to ensure the accuracy and
completeness of this document. However, if you find an error or an omission, or you think that a topic
needs further development, we want to hear from you. You can provide feedback in two ways:
•Through the online feedback form in the HTML documents posted on www.brocade.com.
•By sending your feedback to documentation@brocade.com.
Provide the publication title, part number, and as much detail as possible, including the topic heading
and page number if applicable, as well as your suggestions for improvement.
8FICON Administrator's Guide
53-1003144-01
About This Document
● Supported hardware and software.................................................................................... 9
● What’s new in this document............................................................................................ 9
Supported hardware and software
Although many different software and hardware configurations are tested and supported by Brocade
Communications Systems, Inc. for Fabric OS v7.3.0 documenting all possible configurations and
scenarios is beyond the scope of this document.
For a complete list of platforms supported by FICON and Fabric OS v7.3.0, refer to Platforms
supporting FICON on page 99 Platforms supporting FICON.
In cases where procedures or parts of procedures do not apply to all Brocade hardware platforms, this
guide identifies which platforms are supported.
Additional FICON resources
In addition to Brocade product resources listed under "Brocade Resources" in this Preface, a dedicated
page for mainframe resources is located at Mainframe and FICON Solutions.
What’s new in this document
The following information was added or changed in this document:
•Added information on Brocade 7840 extension switch to various parts of Administering FICONExtension Services and information on the FC16-64 blade to Supported Brocade blades on page
101.
•Created FCR and FICON cascading on page 42 in Administering FICON Fabrics.
•Created Disabling and enabling ports - persistent states on page 46 in Administering FICONFabrics.
•Created Meeting high-integrity fabric requirements on page 33 in Administering FICON Fabrics.
•Created Extended fabric configurations on page 17 in Introducing FICON.
•Added step to configure High-Integrity Fabric Mode in Configuring cascaded FICON on page 41.
•Added Resetting FMS mode on page 58.
•Added notes in various locations, such as in Configuring FICON CUP on page 55 and FMS mode
and FICON CUP on page 56, that High-Integrity Fabric mode must be configured to enable FMS
mode.
•Added definition of IPL file in FICON concepts on page 13.
FICON Administrator's Guide
53-1003144-01
9
About This Document
•Added notes wherever configupload command mentioned that it backs up Fabric OS feature and
switch configuration, but not FMS and FICON-specific configuration.
•Added notes wherever enabling FMS mode is described that all high-integrity fabric attributes
must be configured and HIF mode enabled to enable FMS mode.
•Changed Moving ports to a logical switch section to Disabling and enabling ports - persistent
states on page 46 and added details comparing port persistent enable and disable states with
interactions of ASM Mode setting, IPL state, and use of portdisable and portenable commands.
•Added note in Upgrade considerations on page 59 that upgrading the Fabric OS v7.3.0 and
later from v7.2.1 and earlier requires high-integrity fabric attributes configured and HIF mode
enabled.
•Added note under "Routing policies" bullet in Fabric OS support for FICON on page 11 that
System z FICON does not support exchange-based routing.
•Added note under "Insistent Domain ID (IDID)" bullet that IDID is the recommended best practice
for single-byte addressing.
•Added Extended fabric configurations on page 17.
•Added sentence to Firmware download disruption on page 77 about FCIP Hot Code Load
feature on Brocade 7840 switch.
•Added Monitoring and Alerting Policy Suite on page 87.
•In Basic Switch Configuration, changed step to enable port-based routing policy to device-based
routing policy.
● Link and FC addressing.................................................................................................. 30
FICON overview
IBM Fibre Connection (FICON®) is an industry-standard, high-speed input/output (I/O) interface for
mainframe connections to storage devices. This guide discusses support offered by Fabric OS in
intermix mode operations, in which FICON and Fibre Channel technology work together.
For specific information about intermix mode and other aspects of FICON, refer to the IBM Redbook,
FICON® Implementation Guide (SG24-6497-01), and Implementing an IBM/Brocade SAN with 8 Gbps
Directors and Switches (SG24-6116-08).
NOTE
In this guide, the term switch is used to refer to a Brocade switch, Backbone, or backbone platform
unless otherwise noted.
Fabric OS support for FICON
The following Fabric OS standard features support FICON fabrics:
•Blade swapping
Allows you to swap a blade of the same type so that you can replace a field-replaceable unit (FRU)
with minimal traffic disruption. This feature is available for both FICON and open system
environments. Blade swapping resolves situations in which the hardware has failed and the
channel configurations cannot be changed quickly. In addition, a blade swap minimizes and
eliminates the need to make changes to the I/O sysgen in the hardware configuration definition
(HCD). Blade swapping has minimal or no impact on other switch features.
•Routing policies
System z FICON did not support exchange-based routing as of the publication date of this
document, but does support port-based and device- based routing. For details on these policies,
refer to the "Routing Traffic" chapter in the Fabric OS Administrator's Guide.
•FICON MIB module
Addresses link incident data for FICON hosts and devices connected to a switch. The FICON MIB
module supplements other Management Information Bases (MIBs) used to manage switches and
should be used in conjunction with those other MIBs.
•Insistent Domain ID (IDID)
FICON Administrator's Guide
53-1003144-01
11
Latency guideline
Disables the dynamic domain ID feature and only allows the switch to use a pre-set domain ID. All
switches in a fabric must have a unique domain ID. An insistent domain ID is required with 2-byte
addressing. IDID is the recommended best practice for single byte addressing.
•Link incident detection, registration, and reporting
Provides administrative and diagnostic information.
•Swap port area IDs (PIDs) of physical ports
Redirects resources from a failed port to a healthy port without changing the mainframe hardware
configuration definition (HCD) settings. This feature, also called "port swapping," is available for
both FICON and open system environments. Swapping PIDs on ports resolves situations in which
the hardware has failed and the channel configurations cannot be changed quickly. Port swpping
has minimal or no impact on other switch features.
•Switch connection control (SCC) policy
Includes fabric security methods that prevent unauthorized switches from joining a fabric. SCC
policy is required for cascaded FICON configurations and whenever 2-byte addressing is used.
•Traffic Isolation (TI) Zones and Enhanced TI Zones
TI Zones are used to direct traffic across links through a specified path. Enhanced TI Zones allow
you to have ports in more than one TI Zone and to program domain controller routes to
destination domains for F-class traffic, ensuring fabric stability.
NOTE
For more detail on these features and configuration procedures, refer to the Fabric OS Administrator's
Guide.
Brocade management tools provide further support:
•Brocade Network Advisor
Brocade Network Advisor is an optional software program that can be used to manage a fabric
that supports FICON and Fibre Channel Protocol (FCP) devices and traffic. This is the
recommended GUI management tool for FICON environments on B-series enterprise-class
switches. For more information on Brocade Network Advisor, refer to the manual appropriate for
your version requirements:
‐Brocade Network Advisor SAN + IP User Manual
‐Brocade Network Advisor SAN User Manual
•Web Tools
Web Tools is an embedded GUI-management tool that can be used to manage a Brocade switch
or backbone that supports FICON and Fibre Channel Protocol (FCP) devices and traffic. For more
information on Web Tools, refer to the Web Tools Administrator's Guide.
Latency guideline
The maximum supported distance for a FICON channel is 300 Km (1.5 msec of delay). Synchronous
mirroring applications are generally limited to 100 Km (0.5 msec of delay). Greater distances require
that the FICON Acceleration feature be used with FCIP. The FICON Acceleration feature emulates
control unit response to the channel to make the devices appear closer to the channel than they
actually are.
12FICON Administrator's Guide
53-1003144-01
FICON concepts
The following figure shows how the traffic in a switched point-to-point configuration flows in a FICON
environment. The logical path of the traffic is defined as frames moving from the channel to the switch
to the control unit. FICON traffic moves from a logical partition (LPAR) and through the channel, through
a Fibre Channel link to the switch through the control unit, and ends at the device. This is also called a
channel path , which is a single interface between a central processor and one or more control units
along which signals and data can be sent to perform I/O requests. The channel path uses the logical
path to traverse the Fibre Channel fabric. The channel path is defined using an ID, called the channel
path ID (CHPID). This information is stored in the Input/Output Definition File (IODF) and may be
dynamically configured using the mainframe feature, zDAC (Discover and Auto Configuration). The
IODF is typically built using the hardware configuration definition (HCD).
FIGURE 1 FICON traffic
FICON concepts
The traffic on the channel path communicates using channel command words (CCWs) that direct the
device to perform device-specific actions, such as seek, read, or rewind. In a FICON environment,
buffer credits are used at the Fibre Channel Protocol (FCP) level for flow control between optically
adjacent ports, while information unit (IU) pacing is the flow control mechanism used by the channel.
There are times when there are no more buffer credits to pass back to the other end of the link and a
frame pacing delay occurs. Frame pacing delay is the number of intervals of 2.5 microseconds that a
frame had to wait to be transmitted due to a lack of available buffer credits. Frame pacing delay
information is reported in the FICON Director Activity Report with the System z RMF feature.
FICON introduces the following concepts:
•FICON Control Unit Port (CUP)
The internal port in a switch that assumes an Fibre Channel (FC) address such that it is the FC
domain ID (DID) used to direct FICON traffic to the FICON Management Server (FMS).
•FICON Manager
Host communication includes control functions such as blocking and unblocking ports, as well as
monitoring and error-reporting functions.
•Hardware configuration definition (HCD)
HCD is an IBM interactive interface application that allows you to define the hardware configuration
for both the processor channel subsystem and the operating system running on the processor.
•Information unit
FICON Administrator's Guide13
53-1003144-01
FICON configurations
A unit of FICON data consisting of from one to four Fibre Channel frames.
•Link Incident Record Registration (LIRR)
The LIRR Extended Link Service (ELS) requests that the recipient add the requesting port to its
list of ports that are to receive a Registered Link Incident Report (RLIR).
•Node
A node is an endpoint that contains information. It can be a computer (host), a device controller,
or a peripheral device, such as a disk array or tape drive. A node has a unique 64-bit identifier
known as the Node_Name. The Node_Name is typically used for management purposes.
•Prohibit Dynamic Connectivity Mask (PDCM) and connectivity attributes
PDCM controls whether communication between a pair of ports in the switch is prohibited.
Connectivity attributes control whether all the communication is blocked for a port.
•Read Record Set (RRS)
RRS is an IBM Channel-initiated CCW command. The Brocade FCIP FICON Acceleration
License allows the emulation of command chains that include this CCW command. The command
is used in IBM z/OS Global Mirror configurations to read updates from a volume in an active
mirroring session.
•Registered Link Incident Report (RLIR)
RLIR ELS provides a way for a node port to send an incident record to another node port.
•Request Node Identification Data (RNID)
RNID ELS acquires the associated node’s identification data, which provides configuration
discovery and management purpose information.
•Resource Measurement Facility (RMF)
Performance monitoring software that gathers transaction data from the environment and
generates performance reports. All Level II reports, which include port statistics, require the
FICON Control Unit Port (CUP) and FICON Management Server (FMS).
•Systems Operations (SysOps)
SysOps provides the ability to monitor and control all subsystems in a sysplex from any system in
the sysplex. This includes controlled startup, controlled shutdown, and automated recovery of
software resources.
•Sysplex
In IBM mainframe computers, a Systems Complex, commonly called a sysplex, allows multiple
processors to be joined into a single unit, sharing the same sysplex name and Couple Data Sets.
•IPL file
The initial program load (IPL) File, located in nonvolatile storage, contains the current, active
configuration settings for the FICON director. If functions to initialize data on the Director during a
POR event. When the "Active=Saved" FICON CUP mode register bit setting is on, any active
configuration in switch memory is automatically saved to the IPL file.
FICON configurations
There are two types of FICON configurations that are supported using Brocade Fabric OS: switched
point-to-point and cascaded topologies.
14FICON Administrator's Guide
53-1003144-01
Switched point-to-point
Switched point-to-point
A single-switch configuration is called switched point-to-point allows the channel to use single-byte
addressing.
FIGURE 2 Switched point-to-point FICON
Cascaded FICON
Cascaded FICON refers to an implementation of FICON that uses one or more FICON channel paths in
which the domain ID of the entry switch is different than the domain ID of the switch where the control
unit is attached. Therefore, cascading requires a two-byte link address. Anytime a two-byte link address
is defined on a channel, all link addresses must be two-byte link addresses.
Switches may be interconnected using the following links:
•Traditional Inter-Switch Links (ISLs)
•Inter-Chassis Links (ICLs)
•Fibre Channel over Internet Protocol (FCIP)
The processor interface is connected to one switch (known as the entry switch), while the storage
interface is connected to the other. This configuration is supported for both disk and tape, with multiple
processors, disk subsystems, and tape subsystems sharing the ISLs or ICLs between the switches and
backbones. Multiple ISLs between the switches and backbones are also supported. Cascading between
FICON Administrator's Guide15
53-1003144-01
Qualified FICON cascaded configurations
switches and backbones is also supported. An example of this would be a Brocade DCX 8510-8
Backbone connected to a Brocade 6510.
A cascaded configuration (refer to the following figure) requires two-byte addressing. Two byteaddressing requires a list of authorized switches. This authorization feature, called fabric binding, is
available through the Secure Access Control List feature. The fabric binding policy allows a predefined
list of switches (domains) to exist in the fabric and prevents other switches from joining the fabric. This
type of configuration is described in User security considerations on page 33.
FIGURE 3 Cascaded FICON
There are hardware and software requirements specific to two-byte addressing:
•Both the FICON switches must be Brocade switches.
•The mainframes must be zSeries machines or System z processors: z196, z114, z800, 890, 900,
990, z9 BC, z9 EC, z10 BC, EC, and zEC12. Cascaded FICON requires 64-bit architecture to
support the two-byte addressing scheme. Cascaded FICON is not supported on 9672 G5/G6
mainframes.
•z/OS version 1.4 or later, or z/OS version 1.3 with required Program Temporary Fixes (PTFs) and
Microcode Loads (MCLs) to support two-byte link addressing (DRV3g and MCL (J11206) or later)
is required.
•Switch configuration requirements:
‐Make sure that E_D_TOV is the same on all switches in the fabric (typically, this is not
changed from the default)
‐Make sure that R_A_TOV is the same on all switches in the fabric (typically, this is not
Not all fibre channel fabrics are qualified for FICON. Cascaded FICON configurations are limited to
well-controlled paths. Only the channel paths illustrated in this section are supported for FICON. The
16FICON Administrator's Guide
53-1003144-01
Extended fabric configurations
resulting fabric scenario after ISL failures must not result in an unsupported configuration. When
physical cabling is not practical to enforce these configurations, zoning or Traffic Isolation zoning (TI
zoning) with failover disabled may be used to ensure unsupported fabrics cannot be formed. Note that
these restrictions apply to logical switches and not the chassis.
The following figures show two cascaded configurations. These configurations require Channel A to be
configured for two-byte addressing and require IDID and fabric binding. It is recommended that there be
only two domains in a path from a FICON Channel interface to a FICON Control Unit interface. There
are exceptions to the two-domain rule in extended fabric configurations. Refer to Extended fabric
configurations on page 17 for examples.
FIGURE 4 Cascaded configuration, two switches
The following figure illustrates multiple switches cascaded off of switch 21. As long as there is only one
hop from channel to control unit, the configuration is supported.
Switches in cascaded configurations may be connected through interchassis links (ICLs), interswitch
links (ICLs), and FCIP. Connection using FCIP is through Fibre Channel extension devices, such as
7800 switches and FX8-24 blades. Following are example configurations.
For more information on long distance and extended fabrics, refer to the Fabric OS Administrator's
Guide. For more information on FCIP and extension products, refer to the Fabric OS FCIP
Administrator's Guide.
FICON Administrator's Guide17
53-1003144-01
Introducing FICON
The following figure illustrates a multi-hop ICL triangle configuration that uses ICLs. Note that three
switches are connected through ICLs only.
FIGURE 6 Multi-hop ICL triangle
18FICON Administrator's Guide
53-1003144-01
Introducing FICON
The following figure illustrates a multi-hop configuration that uses ICLs and ISLs. This configuration is
supported with or without switches 4 or 1. All switches must be all generation (Gen) 4 or all Gen 5. You
cannot mix Gen 4 and Gen 4 on ICL connections.
FIGURE 7 Multi-hop configuration with ICLs
The following figure illustrates a multi-hop configuration that uses ICLs and FCIP. The two 7800
switches are for ISL extension only using FCIP. Channel or control unit connections are not permitted.
These switches may be replaced with an FX8-24 blade installed in directors. This configuration can be
FICON Administrator's Guide19
53-1003144-01
Introducing FICON
supported with or without switches 4 or 1. All switches must be Gen 4 or Gen 5. You cannot mix Gen 4
and Gen 5 switches with ICLs.
FIGURE 8 Multi-hop with ICLS and FCIP
20FICON Administrator's Guide
53-1003144-01
Introducing FICON
The following figure illustrates a configuration that uses FCIP between 7800 switches that are used as
routers only, for ISL extension. Channel or control unit connections are not permitted. The 7800
switches may be replaced with FX8-24 blades installed in directors.
FIGURE 9 FCIP with 7800 switches as routers only
The following figure illustrates a configuration that uses cascaded FCIP with four 7800 switches. The
7800 switches at site 1 are used for ISL extension only. Channel or control unit connections are not
FICON Administrator's Guide21
53-1003144-01
Introducing FICON
permitted. The 7800 switches at site 2 are only for network, channel, and control unit connections. The
7800 switches on either site may be replaced with the FX8-24 blades installed in directors.
FIGURE 10 Cascaded configuration using FCIP and 7800 switches
The following figure illustrates a cascaded configuration that uses FCIP and 7800 switches as edge
switches. At site 1, the 7800 switches are used for ISL extension only. Channel or control unit
connections are not permitted. At site 2, only channel, and control unit connections are permitted on
22FICON Administrator's Guide
53-1003144-01
Access control in FICON
the 7800 switches. The 7800 switches at either site may be replaced with the FX8-24 blades installed in
directors.
FIGURE 11 Cascaded configuration using FCIP and 7800 edge switches
Access control in FICON
Zoning is used to control access in a FICON environment. A zone consists of a group of ports or
WWNs. Connectivity is permitted only between connections to the switch that are in the same zone.
There are three types of zoning: WWN, port, and domain index zoning. A zone configuration includes at
least one zone. In open systems environments and in more complex FICON deployments, the zone
configuration contains multiple zones. Although domain index zoning is supported, WWN zoning for
Quality of Service (QoS) is recommended in environments where N_Port ID Virtualization (NPIV) is
deployed. For more information on how to implement QoS domain index zoning in your fabric, refer to
the "QoS zones" section of the Fabric OS Administrator's Guide for details.
When zoning changes occur, Registered State Change Notification (RSCN) messages are sent out
throughout the zone. RSCNs are part of the low-level Fibre Channel Protocol that alerts channels and
FICON Administrator's Guide23
53-1003144-01
Cascaded zoning
devices to changes in the fabric. Using multiple smaller zones instead of one large zone helps
alleviate the need for channels and device interfaces to process RSCNs that are not relevant.
NOTE
Session-based zoning enforcement is not recommended on a FICON switch. For more information on
session-based zoning enforcement, refer to the Fabric OS Administrator's Guide.
Cascaded zoning
The figure below illustrates multiple sites sharing the same disaster-recovery site. Each switch or
Backbone at a remote site, labeled Director 1 and Director 31, can pass traffic to Director 2, but no
traffic is permitted between Zone A and Zone B.
FIGURE 12 Simple cascaded zoning
The figure below illustrates the multiple zoning concepts that can be used to restrict traffic. Any host
channel at the Backup Site (connected to Director 11 or Director 12) can connect to the backup tape
contained within the same zone. Notice that no more than a single hop is ever allowed and only
Channel Path Identifiers (CHPIDs) 79 and 7A on the Primary Site can connect to the backup tape.
Furthermore, CHPIDs 79 and 7A can only connect to the backup tape at the Backup Site.
24FICON Administrator's Guide
53-1003144-01
Introducing FICON
NOTE
Zoning does not replace the need to set up the connectivity from the host to storage control units in the
HCD or Input/Output Configuration Program (IOCP). For more information on zoning, refer to the FabricOS Administrator's Guide.
FIGURE 13 Complex cascaded zoning
Zone A (Blue): Any CHPID connected to Director 1, except CHPID 79, can get to any control unit
connected to Director 1. The zone includes all ports in Director 1 except ports 4, 5, and 6.
Zone B (Orange): Any CHPID connected to Director 2, except CHPID 7A, can get to any control unit
connected to Director 2. The zone includes all ports in Director 2 except ports 4, 5, and 6.
Zone C (Green): Any CHPID connected to Director 11 can get to any control unit connected to Director
11. The zone includes all ports in Director 11 except ports 5 and 6. Adding ports 5 and 6 to the zone, so
that all ports in the switch or Backbone are in the same zone, would not affect permitted connectivity
and may be a more practical alternative.
Zone D (Yellow): Any CHPID connected to Director 12 can get to any control unit connected to Director
12. The zone includes all ports in Director 12 except ports 5 and 6, which are used for ISLs.
Red Zone E: CHPID 79 can talk only to the remote tape connected to ports 7 and 8 on Director 11. The
zone includes port 4 of Director 1 and ports 7 and 8 of Director 11. Either ISL can be used.
Purple Zone F: CHPID 7A can talk only to the remote tape connected to ports 7 and 8 on Director 12.
The zone includes port 4 of Director 2 and ports 7 and 8 of Director 12. Either ISL can be used.
FICON Administrator's Guide25
53-1003144-01
Error reporting
Error reporting
Non-implicit link incidents (such as Fabric OS recognized or bit error rate threshold exceeded) and
implicit link incidents (such as FRU failure) are reported to registered listeners on the local switch. The
RMF 74-7 record (FICON Director Activity Report, which is the same RMF record containing the
average frame pacing delay information) reports port errors, which in turn are also reported back to the
mainframe host management consoles.
Secure access control
Binding is a method used to prevent devices from attaching to the switch or backbone. Secure Access
Control Lists (ACLs) provides the following fabric, switch, and port binding features:
•Fabric binding is a security method for restricting switches within a multiple-switch fabric. Brocade
recommends using fabric binding for cascaded FICON. SCC ACLs with strict fabric-wide
consistency are required for FICON fabric binding.
•Switch binding is a security method for restricting devices that connect to a particular switch or
backbone. If the device is another switch, this is handled by the SCC policy. If the device is a host
or storage device, the device connection control (DCC) policy binds those devices to a particular
switch. Policies range from completely restrictive to reasonably flexible, based upon customer
needs. SCC ACLs with strict fabric-wide consistency are necessary for FICON switch binding.
•Port binding is a security method for restricting host or storage devices that connect to particular
switch ports. The DCC policy also binds device ports to switch ports. Policies range from
completely restrictive to reasonably flexible, based on customer needs.
26FICON Administrator's Guide
53-1003144-01
Introducing FICON
The figure below demonstrates the three types of binding you can use depending on the security
requirements of your fabric.
FIGURE 14 Types of binding for access control
FICON Administrator's Guide27
53-1003144-01
FICON commands
FICON commands
NOTE
The Fabric OS CLI supports only a subset of the Brocade management features for FICON fabrics.
The full set of FICON CUP administrative procedures is available using the Brocade Network Advisor
and Web Tools software features. You can also use an SNMP agent and the FICON Management
Information Base (MIB).
The table below summarizes the Fabric OS CLI commands that can be used for managing FICON
fabrics. For detailed information on these commands, refer to the Fabric OS Command Reference.
CommandDescription
Standard Fabric OS commands
Fabric OS commands related to FICON TABLE 1
bladeSwap
configure
configUpload
firmwareShow
licenseAdd
licenseRemove
licenseShow
licenseSlotCfg
Swaps the area numbers for matching port pairs of
two blades.
Changes a variety of switch configuration settings,
including setting the domain ID and the insistent
mode.
Backs up the current FOS feature and switch
configuration, but does not back up FMS or FICONspecific configuration such as IPL file, active
configuration, mode register, and host data.
Displays the current version of the firmware.
Adds a license to the switch. The license key is casesensitive and must be entered exactly.
Removes a license from the switch. Note that FMS
mode must be disabled before removing the FICON
license.
Displays current license keys, along with a list of
licensed products enabled by these keys.
Enables and displays slot-based licenses for a switch
chassis. Note that for a switch without blades, such as
the 7800 Extension Switch, slot 0 is used as the slotbased license target. For blades, slot numbers are
based on the switch chassis numbering scheme. A
license key with the specified capacity must be
installed with the licenseAdd command before you
can enable a feature on a specified slot with this
command.
portAddress
28FICON Administrator's Guide
Binds the 16-bit address to the lower two bytes of a
port 24-bit Fibre Channel address. Also unbinds the
currently bound address for the specified port.
53-1003144-01
Loading...
+ 96 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.