Brocade, the B-wing symbol, BigIron, DCFM, DCX, Fabric OS, FastIron, IronView, NetIron, SAN Health, ServerIron, TurboIron, and
Wingspan are registered trademarks, and Brocade Assurance, Brocade NET Health, Brocade One, Extraordinary Networks,
MyBrocade, and VCS are trademarks of Brocade Communications Systems, Inc., in the United States and/or in other countries.
Other brands, products, or service names mentioned are or may be trademarks or service marks of their respective owners.
Notice: This document is for informational purposes only and does not set forth any warranty, expressed or implied, concerning
any equipment, equipment feature, or service offered or to be offered by Brocade. Brocade reserves the right to make changes to
this document at any time, without notice, and assumes no responsibility for its use. This informational document describes
features that may not be currently available. Contact a Brocade sales office for information on feature and product availability.
Export of technical data contained in this document may require an export license from the United States government.
The authors and Brocade Communications Systems, Inc. shall have no liability or responsibility to any person or entity with
respect to any loss, cost, liability, or damages arising from the information contained in this book or the computer programs that
accompany it.
The product described by this document may contain “open source” software covered by the GNU General Public License or other
open source license agreements. To find out which open source software is included in Brocade products, view the licensing
terms applicable to the open source software, and obtain a copy of the programming source code, please visit
http://www.brocade.com/support/oscd.
Brocade Communications Systems, Incorporated
Corporate and Latin American Headquarters
Brocade Communications Systems, Inc.
130 Holger Way
San Jose, CA 95134
Tel: 1-408-333-8000
Fax: 1-408-333-8101
E-mail: info@brocade.com
European Headquarters
Brocade Communications Switzerland Sàrl
Centre Swissair
Tour B - 4ème étage
29, Route de l'Aéroport
Case Postale 105
CH-1215 Genève 15
Switzerland
Tel: +41 22 799 5640
Fax: +41 22 799 5641
E-mail: emea-info@brocade.com
Asia-Pacific Headquarters
Brocade Communications Systems China HK, Ltd.
No. 1 Guanghua Road
Chao Yang District
Units 2718 and 2818
Beijing 100020, China
Tel: +8610 6588 8888
Fax: +8610 6588 9999
E-mail: china-info@brocade.com
Asia-Pacific Headquarters
Brocade Communications Systems Co., Ltd. (Shenzhen WFOE)
Citic Plaza
No. 233 Tian He Road North
Unit 1308 – 13th Floor
Guangzhou, China
Tel: +8620 3891 2000
Fax: +8620 3891 2111
E-mail: china-info@brocade.com
Document History
TitlePublication numberSummary of changesDate
Fabric OS Documentation Updates53-1003064-01New documentOctober 2013
Fabric OS Documentation Updates53-1003064-02Corrections for Fabric OS 7.2.0
This document contains updates to the Fabric OS v7.2.x product manuals: These updates include
document fixes and changes covering new features. Table 1 below list the most recently released
Fabric OS v7.2.x product manuals.
TABLE 1Documentation Supporting Fabric OS v7.2.x
Publication TitleFabric OS ReleasePage NumberPublication Date
Access Gateway Administrator’s Guidev7.2.0Updates on page 9July 2013
Converged Enhanced Ethernet Administrator’s Guidev7.0.0 and laterNo updatesApril 2011
Converged Enhanced Ethernet Command Referencev7.0.0 and laterNo updatesAugust 2011
Fabric OS Administrator’s Guidev7.2.0Updates on page 11September 2013
Fabric OS Command Referencev7.2.0Updates on page 13September 2013
Fabric OS Encryption Administrator’s Guide (DPM)v7.2.0Updates on page 19July 2013
Fabric OS Encryption Administrator’s Guide (SKM/ESKM)v7.2.0Updates on page 20July 2013
Fabric OS Encryption Administrator’s Guide (KMIP)v7.2.0Updates on page 19July 2013
Fabric OS Encryption Administrator’s Guide (LKM/SSKM)v7.2.0Updates on page 20July 2013
Fabric OS Encryption Administrator’s Guide (TEKA)v7.2.0Updates on page 20July 2013
Fabric OS Encryption Administrator’s Guide (TKLM)v7.2.0Updates on page 21July 2013
Fabric OS FCIP Administrator’s Guidev7.2.0Updates on page 23July 2013
Fabric OS Message Referencev7.2.0No updatesJuly 2013
Fabric OS Troubleshooting and Diagnostics Guidev7.2.0No updatesJuly 2013
• For the Web Tools Administrator’s Guide, added corrections to the following sections:
-“Chapter 16, Configuring Standard Security Features” on page 29
• For the FICON Administrator’s Guide, added corrections to the following section:
-“Chapter 5, Maintaining and Troubleshooting FICON” on page 25
• For the Fabric OS Administrator’s Guide, added corrections to the following sections:
-“Chapter 3, Performing Advanced Configuration Tasks” on page 11
-“Chapter 7, Configuring Protocols” on page 11
-“Chapter 14, Optimizing Fabric Behavior” on page 12
• For the Fabric OS Encryption Administrator’s Guides, added corrections to the section related
to “Displaying Universal IDs.” For KMIP, also added a correction to the section related to
“Displaying and deleting decommissioned key IDs.”
-“Fabric OS Encryption Administrator’s Guide Supporting Key Management Interoperability
Protocol (KMIP) Key-Compliant Environments” on page 19
-“Fabric OS Encryption Administrator’s Guide Supporting RSA Data Protection Manager
(DPM) Environments” on page 19
-“Fabric OS Encryption Administrator’s Guide Supporting NetApp Lifetime Key Manager
(LKM) and KeySecure Storage Secure Key Manager (SSKM) Environments” on page 20
-“Fabric OS Encryption Administrator’s Guide Supporting HP Secure Key Manager (SKM)
and HP Enterprise Secure Key Manager (ESKM) Environments” on page 20
-“Fabric OS Encryption Administrator’s Guide Supporting Thales e-Security keyAuthority
(TEKA) Environments” on page 20
-“Fabric OS Encryption Administrator’s Guide Supporting Tivoli Key Lifecycle Manager
(TKLM) Environments” on page 21
Brocade Resources
To get up-to-the-minute information, go to http://my.brocade.com and register at no cost for a user
ID and password.
For practical discussions about SAN design, implementation, and maintenance, you can obtain
Building SANs with Brocade Fabric Switches through:
http://www.amazon.com
6Fabric OS Documentation Updates
53-1003064-02
For additional Brocade documentation, visit the Brocade SAN Info Center and click the Resource
Library location:
http://www.brocade.com
Release notes are available on the MyBrocade web site and are also bundled with the Fabric OS
firmware.
Document feedback
Quality is our first concern at Brocade and we have made every effort to ensure the accuracy and
completeness of this document. However, if you find an error or an omission, or you think that a
topic needs further development, we want to hear from you. Forward your feedback to:
documentation@brocade.com
Provide the title and version number of the document and as much detail as possible about your
comment, including the topic heading and page number and your suggestions for improvement.
Fabric OS Documentation Updates7
53-1003064-02
8Fabric OS Documentation Updates
53-1003064-02
Chapter
Access Gateway Administrator’s Guide
In this chapter
•Documentation updates for Fabric OS v7.2.0 and later . . . . . . . . . . . . . . . . . 9
Documentation updates for Fabric OS v7.2.0 and later
The updates in this section are for the Fabric OS FCIP Administrator’s Guide, publication number
53-1002919-01, published July 2013.
About This Document
The following paragraph has been modified:
All Fabric OS switches must be running Fabric OS v6.1.0 or later; all M-EOS switches must be
running M-EOSc 9.1 or later, and M-EOSn must be running 9.6.2 or later. Cisco switches must
support standards-based NPIV.
1
Chapter 1, Access Gateway Basic Concepts
Under “Brocade Access Gateway overview”, the following paragraph has been modified: Access
Gateway is compatible with M-EOS v9.1 or v9.6 or later, and Cisco-based fabrics that support
standards-based NPIV. You can use the command line interface (CLI), Web Tools, or Brocade
Network Advisor (BNA) to enable and disable AG mode and configure AG features on a switch. This
document describes configurations using the CLI commands. Refer to the Fabric OS Command
Reference Manual, the Web Tools Administrator’s Guide, or the Brocade Network Advisor User
Guide for more information about AG support in those tools.
Chapter 3, Managing Policies and Features in Access Gateway Mode
Under “Considerations for the Brocade 6505 and 6510”:
The Brocade 6505 and 6510 switches are shipped in Fabric OS Native mode, but can function in
either Fabric OS Native mode or Brocade Access Gateway mode. They are also supported in Access
Gateway cascaded configurations. All ports on demand (POD) licenses must be present to support
Access Gateway.
Fabric OS Documentation Updates9
53-1003064-02
Documentation updates for Fabric OS v7.2.0 and later
1
Chapter 4, SAN Configuration with Access Gateway
Under “Connectivity of multiple devices overview”:
Switches in AG mode can connect to the following third-party fabrics:
• Fabrics operating with M-EOSc v9.6.2 or later and M-EOSn v9.6 or later
• Cisco fabrics that support standards-based NPIV.
10Fabric OS Documentation Updates
53-1003064-02
Chapter
ATTENTION
Fabric OS Administrator’s Guide
In this chapter
•Documentation updates for Fabric OS v7.2.0 and later . . . . . . . . . . . . . . . . 11
Documentation updates for Fabric OS v7.2.0 and later
The updates in this section are for the Fabric OS Administrator’s Guide, publication number
53-1002920-02, published September 2013.
In the section “256-area addressing mode” on page 85, change the ATTENTION statement to 48
port cards instead of 49 port cards. The correct statement is:
2
The Brocade DCX and DCX 8510-8 Backbones have safeguards that disable all 48 port cards if
FICON Management Server (FMS) is enabled.
Chapter 7, Configuring Protocols
In the section “Secure Shell protocol” on page 197, add the following:
If you set up a message of the day (MOTD), the MOTD displays either before or after the login
prompt, depending on the SSH client implementation. Fabric OS does not control when the
message displays.
Under the heading “Traps” on page 209, add the following section:
MAPS-TRAP
• mapsTrapAM
Traps to be sent for Monitoring and Alerting Policy Suite (MAPS) threshold events.
Under the heading ‘Brocade MIB files’, add the following bullet:
• BROCADE-MAPS-MIB.mib
Fabric OS Documentation Updates11
53-1003064-02
Documentation updates for Fabric OS v7.2.0 and later
2
Under the heading ‘MIB loading order’, add the following row to Table 30:
TABLE 30Brocade SNMP MIB dependencies
MIB NameDependencies
BROCADE-MAPS-MIBSNMPv2-SMI
Brocade-REG-MIB
SW-MIB
Chapter 14, Optimizing Fabric Behavior
In the section “Limitations and restrictions for QoS zone-based traffic prioritization” on page 424,
remove the following bullet:
• Traffic prioritization is not supported on 10-Gbps ISLs.
The updates in this section are for the Fabric OS Encryption Administrator’s Guide (KMIP),
publication number 53-1002924-01, published July 2013.
4
Chapter 2, Configuring Encryption Using the Management Application
• In the section “Displaying and deleting decommissioned key IDs” on page 117, the paragraph
notes:
When disk LUNs are decommissioned, the process includes the disabling of the key record in
the key vault and indication that the key has been decommissioned.”
This statement is true for all key vaults except TEKA KMIP. TEKA KMIP does not modify keys
that have been decommissioned.
• In the section, “Displaying Universal IDs” on page 112, after step 4, a NOTE states, "You will
need to export the decommissioned key ID to the key vault." This NOTE is inaccurate and
should be removed. The Key ID/UUID displayed in this dialog is informational, and can be used
to cross reference on the respective key vault where the decommissioned Key ID is manually
deleted.
Fabric OS Encryption Administrator’s Guide Supporting RSA Data
Protection Manager (DPM) Environments
The updates in this section are for the Fabric OS Encryption Administrator’s Guide (DPM),
publication number 53-1002922-01, published July 2013.
Fabric OS Documentation Updates19
53-1003064-02
Documentation updates for Fabric OS v7.2.0 and later
4
Chapter 2, Configuring Encryption Using the Management Application
In the section, “Displaying Universal IDs” on page 99, after step 4, a NOTE states, "You will need to
export the decommissioned key ID to the key vault." This NOTE is inaccurate and should be
removed. The Key ID/UUID displayed in this dialog is informational, and can be used to cross
reference on the respective key vault where the decommissioned Key ID is manually deleted.
Fabric OS Encryption Administrator’s Guide Supporting NetApp Lifetime
Key Manager (LKM) and KeySecure Storage Secure Key Manager
(SSKM) Environments
The updates in this section are for the Fabric OS Encryption Administrator’s Guide (LKM/SSKM),
publication number 53-1002925-01, published July 2013.
Chapter 2, Configuring Encryption Using the Management Application
In the section, “Displaying Universal IDs” on page 86, after step 4, a NOTE states, "You will need to
export the decommissioned key ID to the key vault." This NOTE is inaccurate and should be
removed. The Key ID/UUID displayed in this dialog is informational, and can be used to cross
reference on the respective key vault where the decommissioned Key ID is manually deleted.
Fabric OS Encryption Administrator’s Guide Supporting HP Secure Key
Manager (SKM) and HP Enterprise Secure Key Manager (ESKM)
Environments
The updates in this section are for the Fabric OS Encryption Administrator’s Guide (SKM/ESKM)),
publication number 53-1002923-01, published July 2013.
Chapter 2, Configuring Encryption Using the Management Application
In the section, “Displaying Universal IDs” on page 102, after step 4, a NOTE states, "You will need
to export the decommissioned key ID to the key vault." This NOTE is inaccurate and should be
removed. The Key ID/UUID displayed in this dialog is informational, and can be used to cross
reference on the respective key vault where the decommissioned Key ID is manually deleted.
The updates in this section are for the Fabric OS Encryption Administrator’s Guide (TEKA),
publication number 53-1002926-01, published July 2013.
Chapter 2, Configuring Encryption Using the Management Application
In the section, “Displaying Universal IDs” on page 98, after step 4, a NOTE states, "You will need to
export the decommissioned key ID to the key vault." This NOTE is inaccurate and should be
removed. The Key ID/UUID displayed in this dialog is informational, and can be used to cross
reference on the respective key vault where the decommissioned Key ID is manually deleted.
20Fabric OS Documentation Updates
53-1003064-02
Documentation updates for Fabric OS v7.2.0 and later
The updates in this section are for the Fabric OS Encryption Administrator’s Guide (TKLM),
publication number 53-1002927-01, published July 2013.
Chapter 2, Configuring Encryption Using the Management Application
In the section, “Displaying Universal IDs” on page 100, after step 4, a NOTE states, "You will need
to export the decommissioned key ID to the key vault." This NOTE is inaccurate and should be
removed. The Key ID/UUID displayed in this dialog is informational, and can be used to cross
reference on the respective key vault where the decommissioned Key ID is manually deleted.
Fabric OS Documentation Updates21
53-1003064-02
Documentation updates for Fabric OS v7.2.0 and later
4
22Fabric OS Documentation Updates
53-1003064-02
Chapter
Fabric OS FCIP Administrator’s Guide
In this chapter
•Documentation updates for Fabric OS v7.2.0 and later . . . . . . . . . . . . . . . . 23
Documentation updates for Fabric OS v7.2.0 and later
The updates in this section are for the Fabric OS FCIP Administrator’s Guide, publication number
53-1002928-01, published July 2013.
Chapter 1, FCIP Concepts and Features
Under “IP WAN network considerations,” the first bullet entry is modified as follows:
• Routers and firewalls that are in the data path must be configured to pass FCIP traffic (TCP
port 3225) and IPsec traffic, if IPsec is used (UDP port 500). The Brocade TCP implementation
selects a port between 49152 and 65535 as the ephemeral (or initiating) port to open up to
port 3225.
5
Chapter 3, Configuring FCIP
In Table 10, Circuit options:
• Under Adaptive rate limiting (ARL), the correct valid ranges for -min-comm-rate are 10,000
Kbps through 1,000,000 Kbps for GbE ports and 10,000 to 10,000,000 Kbps for 10 GbE
ports (XGE). Add to note that the rate does not need to be an integral value of 1,000,000 and
both sides of the tunnel must have matching configurations.
• Under Adaptive rate limiting (ARL), for -max-comm-rate add to note that the rate does not need
to be an integral value of 1,000,000, the maximum committed rate can be no larger than five
times the minimum committed rate, and both sides of the tunnel must have matching
configurations.
Fabric OS Documentation Updates23
53-1003064-02
Documentation updates for Fabric OS v7.2.0 and later
5
24Fabric OS Documentation Updates
53-1003064-02
Chapter
FICON Administrator’s Guide
In this chapter
•Documentation updates for Fabric OS v7.2.0 and later . . . . . . . . . . . . . . . . 25
Documentation updates for Fabric OS v7.2.0 and later
The updates in this section are for the FICON Administrator’s Guide, publication number
53-1002931-01, published July 2013.
Chapter 5, Maintaining and Troubleshooting FICON
In the section “Blade swapping” on page 73, add the following item to the list of restrictions:
• Faulty blades cannot be swapped.
6
Fabric OS Documentation Updates25
53-1003064-02
Documentation updates for Fabric OS v7.2.0 and later
6
26Fabric OS Documentation Updates
53-1003064-02
Chapter
Flow Vision Administrator’s Guide
In this chapter
•Documentation updates for Fabric OS v7.2.0 and later . . . . . . . . . . . . . . . . 27
Documentation updates for Fabric OS v7.2.0 and later
The updates in this section are for the Flow Vision Administrator’s Guide, publication number
53-1002999-01, published September 2013.
This change applies to the Flow Monitor feature.
The SCSI statistics SCSI Read/Write Frame Count and SCSI Read/Write Data are supported only for
F_Ports for any flow configuration where either srcdev or dstdev exists on the switch, and the flow is
defined using either srcdev, dstdev, ingrport or egrport (with or without bidir) OR srcdev, dstdev,
lun, ingrport or egrport.
7
Fabric OS Documentation Updates27
53-1003064-02
Documentation updates for Fabric OS v7.2.0 and later
7
28Fabric OS Documentation Updates
53-1003064-02
Chapter
Web Tools Administrator’s Guide
In this chapter
•Documentation updates for Fabric OS v7.2.0 and later . . . . . . . . . . . . . . . . 29
Documentation updates for Fabric OS v7.2.0 and later
The updates in this section are for the Web Tools Administrator’s Guide, publication number
53-1002934-01, published September 2013.
Chapter 16, Configuring Standard Security Features
Under the heading “Guidelines and restrictions”, add the following bullet after the “For some
functionality and operations. . .” paragraph:
In order for the user-defined role to have access to the System Monitor which displays CPU and
Memory Usage under the Monitor tab, you must assign read/write RBAC_FabricWatch
permissions to the Chassis Access Role.
8
Fabric OS Documentation Updates29
53-1003064-02
Documentation updates for Fabric OS v7.2.0 and later
8
30Fabric OS Documentation Updates
53-1003064-02
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.