Brocade, the B-wing symbol, BigIron, DCX, Fabric OS, FastIron, NetIron, SAN Health, ServerIron, and TurboIron are registered
trademarks, and AnyIO, Brocade Assurance, Brocade NET Health, Brocade One, CloudPlex, MLX, VCS, VDX, and When the Mission
Is Critical, the Network Is Brocade are trademarks of Brocade Communications Systems, Inc., in the United States and/or in other
countries. Other brands, products, or service names mentioned are or may be trademarks or service marks of their respective
owners.
Notice: This document is for informational purposes only and does not set forth any warranty, expressed or implied, concerning
any equipment, equipment feature, or service offered or to be offered by Brocade. Brocade reserves the right to make changes to
this document at any time, without notice, and assumes no responsibility for its use. This informational document describes
features that may not be currently available. Contact a Brocade sales office for information on feature and product availability.
Export of technical data contained in this document may require an export license from the United States government.
The authors and Brocade Communications Systems, Inc. shall have no liability or responsibility to any person or entity with
respect to any loss, cost, liability, or damages arising from the information contained in this book or the computer programs that
accompany it.
The product described by this document may contain “open source” software covered by the GNU General Public License or other
open source license agreements. To find out which open source software is included in Brocade products, view the licensing
terms applicable to the open source software, and obtain a copy of the programming source code, please visit
http://www.brocade.com/support/oscd.
Brocade Communications Systems, Incorporated
Corporate and Latin American Headquarters
Brocade Communications Systems, Inc.
130 Holger Way
San Jose, CA 95134
Tel: 1-408-333-8000
Fax: 1-408-333-8101
E-mail: info@brocade.com
European Headquarters
Brocade Communications Switzerland Sàrl
Centre Swissair
Tour B - 4ème étage
29, Route de l'Aéroport
Case Postale 105
CH-1215 Genève 15
Switzerland
Tel: +41 22 799 5640
Fax: +41 22 799 5641
E-mail: emea-info@brocade.com
Asia-Pacific Headquarters
Brocade Communications Systems China HK, Ltd.
No. 1 Guanghua Road
Chao Yang District
Units 2718 and 2818
Beijing 100020, China
Tel: +8610 6588 8888
Fax: +8610 6588 9999
E-mail: china-info@brocade.com
Asia-Pacific Headquarters
Brocade Communications Systems Co., Ltd. (Shenzhen WFOE)
Citic Plaza
No. 233 Tian He Road North
Unit 1308 – 13th Floor
Guangzhou, China
Tel: +8620 3891 2000
Fax: +8620 3891 2111
E-mail: china-info@brocade.com
Document History
Document titlePublication numberSummary of changesPublication date
This document is a procedural guide to help SAN administrators configure and manage Brocade
Access Gateway (AG).
This preface contains the following components:
• Chapter 1, “Access Gateway Basic Concepts” describes the Brocade Access Gateway and
provides an overview of its key features.
• Chapter 2, “Configuring Ports in Access Gateway Mode” describes how to configure ports in
Access Gateway mode.
• Chapter 3, “Managing Policies and Features in Access Gateway Mode” describes how to
enable policies on a switch in Access Gateway mode. It also provides information on how to set
up failover and failback, and discusses how trunking and Adaptive Networking work in AG.
• Chapter 4, “SAN Configuration with Access Gateway” describes how to connect multiple
devices using Access Gateway.
• Appendix A, “Troubleshooting” provides symptoms and troubleshooting tips to resolve issues.
In those instances in which procedures or parts of procedures documented here apply to some
switches but not to others, this guide identifies which switches are supported and which are not.
Although many different software and hardware configurations are tested and supported by
Brocade Communications Systems, Inc., for Fabric OS v7.1.0, documenting all possible
configurations and scenarios is beyond the scope of this document.
All Fabric OS switches must be running Fabric OS v6.1.0 or later; all M-EOS switches must be
running M-EOSc 9.1 or later, M-EOSn must be running 9.6.2 or later, and Cisco switches with SAN
OS must be running 3.0 (1) and 3.1 (1) or later.
Fabric OS v7.1.0 supports the following Brocade hardware platforms for Access Gateway:
• Brocade 300
• Brocade 5100
• Brocade M5424
• Brocade 5430
• Brocade 5450
• Brocade 5460
• Brocade 5470
• Brocade 5480
• Brocade 6505
• Brocade 6510
• Brocade 8000
• NC-4380
• Brocade VA-40FC
What’s new in this document
The following information has been added since this document was last released:
• Preface
-Brocade 5430 added to list of “Supported hardware and software” on page xiv for Access
Gateway.
• Chapter 1
-Described support for buffer credit recovery, diagnostic port, fabric assigned PWWN
(FA-PWWN), Forward Error Correction (FEC), and device authentication policy features
under “Fabric OS features in Access Gateway mode” on page 3.
-Added information about diagnostic port (D_Port) under “Access Gateway port types” on
page 9“.
xivAccess Gateway Administrator’s Guide
53-1002743-01
• Chapter 2
-Added port mapping details for the Brocade 5430 switch to “Access Gateway default port
mapping” on page 17. Table 5,
-Added “D_Port support” on page 32.
• Chapter 3
-Added notes to “Failover policy” on page 50 and “Failback policy” on page 55 that If
failover and failback policy are disabled, an F_Port mapped to an N_Port will go offline
when the N_Port goes offline and it will go online when the N_Port comes online.
-Under“Considerations for the Brocade 6505 and 6510” on page 72, added that all ports
on demand (POD) licenses must be present to support Access Gateway.
For further information, refer to the release notes.
Document conventions
This section describes text formatting conventions and important notices formats.
Text formatting
The narrative-text formatting conventions that are used in this document are as follows:
bold textIdentifies command names
Identifies the names of user-manipulated GUI elements
Identifies keywords and operands
Identifies text to enter at the GUI or CLI
italic textProvides emphasis
Identifies variables
Identifies paths and Internet addresses
Identifies document titles
code textIdentifies CLI output
Identifies syntax examples
For readability, command names in the narrative portions of this guide are presented in mixed
lettercase: for example, switchShow. In actual examples, command lettercase is often all
lowercase.
Command syntax conventions
Command syntax in this manual follows these conventions:
commandCommands are printed in bold.
--option, optionCommand options are printed in bold.
variableVariables are printed in italics. In the help pages, values are underlined
enclosed in angled brackets < >.
...Repeat the previous element, for example “member[;member...]”
valueFixed values following arguments are printed in plain font. For example,
--show WWN
or
|Boolean. Elements are exclusive. Example:
--show -mode egress | ingress
Notes, cautions, and warnings
The following notices appear in this document.
A note provides a tip, guidance, or advice, emphasizes important information, or provides a
reference to related information.
An Attention statement indicates potential damage to hardware or data.
A Caution statement alerts you to situations that can be potentially hazardous to you or cause
damage to hardware, firmware, software, or data.
A Danger statement indicates conditions or situations that can be potentially lethal or extremely
hazardous to you. Safety labels are also attached directly to products to warn of these conditions
or situations.
Notice to the reader
This document may contain references to the trademarks of the following corporations. These
trademarks are the properties of their respective companies and corporations.
These references are made for informational purposes only.
CorporationReferenced trademarks and products
Cisco Systems, Inc.Cisco
Oracle Corporation.Sun, Solaris
Netscape Communications CorporationNetscape
Red Hat, Inc.Red Hat, Red Hat Network, Maximum RPM, Linux Undercover
xviAccess Gateway Administrator’s Guide
53-1002743-01
CorporationReferenced trademarks and products
Emulex CorporationEmulex
QLogic CorporationQLogic
Key terms for Access Gateway
For definitions of SAN-specific terms, visit the Storage Networking Industry Association online
dictionary at:
http://www.snia.org/education/dictionary
For definitions specific to Brocade and Fibre Channel, see the Brocade Glossary.
The following terms are used in this manual to describe Access Gateway mode and its components.
Access Gateway (AG) Fabric OS mode for switches that reduces storage area network (SAN)
deployment complexity by leveraging N_Port ID Virtualization (NPIV).
DeviceAny host or target device with a distinct WWN. Devices may be physical or
virtual.
D_PortA port configured as a diagnostic port on an AG switch, connected fabric
switch, or connected cascaded AG switch to run diagnostic tests between the
ports and test the link.
E_PortAn interswitch link (ISL) port. A switch port that connects switches together to
form a fabric.
Edge switchA fabric switch that connects host, storage, or other devices, such as Brocade
Access Gateway, to the fabric.
F_PortA fabric port. A switch port that connects a host, host bus adapter (HBA), or
storage device to the SAN. On Brocade Access Gateway, the F_Port connects
to a host or a target.
MappingIn Access Gateway, mapping defines the routes between devices or F_Ports to
the fabric facing ports (N_Ports).
N_PortA node port. A Fibre Channel host or storage port in a fabric or point-to-point
connection. On Brocade Access Gateway, the N_Port connects to the Edge
switch.
NPIVN_Port ID Virtualization. This is a Fibre Channel facility allowing multiple
N_Port IDs to share a single physical N_Port. This allows multiple Fibre
Channel initiators to occupy a single physical port, easing hardware
requirements in storage area network design, especially for virtual SANs.
• Best practice guides, white papers, data sheets, and other documentation are available
through the Brocade Partner website.
For additional resource information, visit the Technical Committee T11 website. This website
provides interface standards for high-performance and mass storage applications for Fibre
Channel, storage management, and other applications:
http://www.t11.org
For information about the Fibre Channel industry, visit the Fibre Channel Industry Association
website:
http://www.fibrechannel.org
Optional Brocade features
For a list of optional Brocade features and descriptions, see the Fabric OS Administrator’s Guide.
Getting technical help
Contact your switch support supplier for hardware, firmware, and software support, including
product repairs and part ordering. To expedite your call, have the following information available:
1. General Information
• Technical Support contract number, if applicable
xviiiAccess Gateway Administrator’s Guide
53-1002743-01
• Switch model
• Switch operating system version
• Error numbers and messages received
• supportSave command output
• Detailed description of the problem, including the switch or fabric behavior immediately
following the problem, and specific questions
• Description of any troubleshooting steps already performed and the results
• Serial console and Telnet session logs
• Syslog message logs
2. Switch Serial Number
The switch serial number and corresponding bar code are provided on the serial number label,
as shown here:
:
*FT00X0054E9*
FT00X0054E9
The serial number label is located as follows:
• Brocade 300, 5100, 8000, VA-40FC, 6505, and 6510—On the switch ID pull-out tab
located inside the chassis on the port side on the left
• Brocade M5424, 5450, 5460, 5470, 5480—Serial number label attached to the module
3. World Wide Name (WWN)
Use the licenseIdShow command to display the WWN of the chassis.
If you cannot use the licenseIdShow command because the switch is inoperable, you can get
the WWN from the same place as the serial number.
Document feedback
Quality is our first concern at Brocade and we have made every effort to ensure the accuracy and
completeness of this document. However, if you find an error or an omission, or you think that a
topic needs further development, we want to hear from you. Forward your feedback to:
documentation@brocade.com
Provide the title and version number of the document and as much detail as possible about your
comment, including the topic heading and page number and your suggestions for improvement.
Brocade Access Gateway (AG) is a Fabric OS feature that you can use to configure your Enterprise
fabric to handle additional devices instead of domains. You do this by configuring F_Ports to
connect to the fabric as N_Ports, which increases the number of device ports you can connect to a
single fabric. Multiple AGs can connect to the DCX enterprise-class platform, directors, and
switches.
Access Gateway is compatible with M-EOS v9.1 or v9.6 or later, and Cisco-based fabrics v3.0 (1) or
later and v3.1 (1) or later. You can use the command line interface (CLI), Web Tools, or Brocade
Network Advisor (BNA) to enable and disable AG mode and configure AG features on a switch. This
document describes configurations using the CLI commands. Refer to the Fabric OS Command
Reference Manual, the Web Tools Administrator’s Guide, or the Brocade Network Advisor User
Guide for more information about AG support in those tools.
1
After you set a Fabric OS switch to AG mode, the F_Ports connect to the Enterprise fabric as
N_Ports rather than as E_Ports. Figure 1 shows a comparison of a configuration that connects
eight hosts to a fabric using AG to the same configuration with Fabric OS switches in Native mode.
Switches in AG mode are logically transparent to the host and the fabric. Therefore, you can
increase the number of hosts that have access to the fabric without increasing the number of
switch domains. This simplifies configuration and management in a large fabric by reducing the
number of domain IDs and ports.
Comparing Native Fabric and Access Gateway modes
The following points summarize the differences between a Fabric OS switch functioning in Native
operating mode and a Fabric OS switch functioning in AG operating mode:
• The Fabric OS switch in Native mode is a part of the fabric; it requires two to four times as
many physical ports, consumes fabric resources, and can connect to a Fabric OS fabric only.
• A switch in AG mode is outside of the fabric; it reduces the number of switches in the fabric
and the number of required physical ports. You can connect an AG switch to a Fabric OS,
M-EOS, or Cisco-based fabric.
For comparison, Figure 1 illustrates switch function in Native mode and Figure 2 illustrates switch
function in AG mode.
Tab le 1 lists Fabric OS components that are supported on a switch when AG mode is enabled.
“Yes” indicates that the feature is supported in Access Gateway mode. “No” indicates that the
feature is not provided in AG mode. “NA” indicates the feature is not applicable in Access Gateway
mode. A single asterisk (*) indicates the feature is transparent to AG; that is, AG forwards the
request to the Enterprise fabric. Two asterisks (**) indicates that the feature may not be available if
the Enterprise fabric is not a Brocade fabric. For more information on these features, refer to the
Fabric OS Administrator's Guide and Fabric OS Command Reference.
TABLE 1Fabric OS components supported on Access Gateway
TABLE 1Fabric OS components supported on Access Gateway (Continued)
Feature Support
Buffer Credit Recovery (CR)Yes -
Config Download/UploadYes
Device AuthenticationYes
DHCPYes
Diagnostic Port (D_Port)Yes
Encryption Configuration
and Management
Environmental MonitorYes
Error Event ManagementYes
Extended FabricsNo
Fabric Assigned PWWN
(FA-PWWN)
Fabric Device Management
Interface (FDMI)
Fabric ManagerYes**
Fabric Provisioning No
Fabric ServicesNo
Fabric WatchYes
Fibre Channel Routing (FCR)
services
FICON (includes CUP)No
Forward Error Correction
(FEC)
High AvailabilityYes
Hot Code LoadYes
LicenseYes**
Lightweight Directory Access
Protocol (LDAP)
Log TrackingYes
Management ServerNA
Manufacturing DiagnosticsYes
N_Port ID Virtualization
(NPIV)
Refer to “Buffer credit recovery support” on
page 5.
Refer to “Device authentication support” on
page 6.
Refer to “D_Port support” on page 32.
No
Yes
Yes *
Refer to the Fabric Watch Administrator's Guide
for applicable support details.
No
Yes
Refer to “Forward error correction support” on
page 6.
Yes
Yes
4Access Gateway Administrator’s Guide
53-1002743-01
Fabric OS features in Access Gateway mode
TABLE 1Fabric OS components supported on Access Gateway (Continued)
Feature Support
Name ServerNA
Native Interoperability Mode NA
Network Time Protocol (NTP) No (no relevance from fabric perspective)
Open E_PortNA
Performance MonitorYes
Persistent ALPAYes
Port DecommissionNo
Port MirroringNo
QuickLoop, QuickLoop Fabric
Assist
Remote Authentication
Dial-In User Service
(RADIUS)
Resource MonitorYes
SecurityYes (ADS/DCC Policy)
SNMPYes
Speed NegotiationYes
Syslog DaemonYes
Track ChangesYes
Tru nkin gYes **
User-Defined RolesYes
ValueLineOptions (Static
POD, DPOD)
Virtual FabricsNo
Web ToolsYes
ZoningNA
No
Yes
Yes
Refer to “Virtual Fabrics support” on page 6.
2
1
1.When a switch is behaving as an AG, RBAC features in Fabric OS are
available, but there are some limitations. For more information on the
limitations, refer to “Access Gateway hardware considerations” on page 11.
2.In embedded switches, time should be updated by the server management
utility.
Buffer credit recovery support
This Fabric OS feature is supported on 8 Gbps and 16 Gbps platforms in following configurations:
• Between AG switch F_Port and Brocade HBA port using Adapter v3.2 or greater firmware or any
device supporting credit recovery, This feature only works at the maximum supported speed of
the HBA port (8 Gbps or 16 Gbps).
• Between AG switch N_Port and Brocade fabric switch or cascaded AG switch F_Port.
It is highly recommended that you disable this feature on the AG switch before connecting to a
switch running Fabric OS less than 7.1. Enable and disable CR using the portcfgcreditrecovery
command. Refer to the Fabric OS Command Reference for more information on this command.
Specific switch platforms support this feature either in R_RDY or VC_RDY mode. In VC_RDY mode,
the buffer credit recovery is supported with fabric assigned PWWN (FA-PWWN), FEC, QoS, and
trunking Fabric OS features. In R_RDY mode, this feature is supported without FA-PWWN and QoS
Fabric OS features.
Forward error correction support
Forward error correction (FEC) is a Fabric OS feature supported in the following configurations:
• Between the AG switch F_Port and a Brocade 16 Gbps HBA port running version 3.2 or greater
firmware.
• Between the AG switch N_Port and F_Port on Brocade 16 Gbps fabric switch or cascaded AG
switch.
Following are limitations and considerations for FEC:
• Supported on Brocade 16 Gbps platforms only.
• Supported by Fabric OS 7.1.0 and later.
• Enabled by default.
• A Fabric OS downgrade requires FEC to be disabled.
• Specific switch platforms support this feature either in R_RDY or VC_RDY mode.
Virtual Fabrics support
Although you cannot enable AG mode on a switch enabled for Virtual Fabrics or enable Virtual
Fabrics on an AG switch, you can connect ports on an AG switch to Virtual Fabrics.
Device authentication support
Devices use authentication as a mechanism to log in into switches only after exchanging DH_CHAP
authorization keys. This prevents any unauthorized device from logging into switch and fabric by
default.
Authentication policy is supported in the following configurations for Access Gateway switches.
Regardless of the enabled policy, the AG port disables if the DH-CHAP or FCAP fails to authenticate
each other.
• Access Gateway switch N_Port connected to Brocade fabric switch F_Port. The N-port should
enable authentication when authentication is enabled on the connected switch. This can be
done by enabling switch policy on the AG switch and device policy on the fabric switch.
• Access Gateway switch F_Port connected to an HBA. The F-port also should enable
authentication when the connected device is sending login request with authentication
enabled. This is done by enabling device policy on the AG switch.
By default, Brocade switches use DH-CHAP or FCAP authentication protocols. For authentication
between fabric switches and AG switches, FCAP and DH-CHAP are used. If an FCAP certificate is
present on the AG switch and fabric switch, FCAP has precedence over DHCAP. For authentication
between AG switches and HBAs, DH-CHAP is used since the HBA only supports DH-CHAP.
6Access Gateway Administrator’s Guide
53-1002743-01
Fabric OS features in Access Gateway mode
For details on installing FCAP certificates and creating DHCAP secrets on the switch in AG or native
mode, refer to the Fabric OS Administrator’s Guide or Fabric OS Command Reference.
For general information on authentication, refer to the section on authentication policy for fabric
elements in the Configuring Security Policies chapter of the Fabric OS Administrator’s Guide.
1
Supported policy modes
The following switch and device policy modes are supported by Access Gateway:
• On - Strict authentication will be enforced on all ports. The ports on the AG connected to the
switch or device will disable if the connecting switch or device does not support authentication
or the policy mode is set to off. During AG initialization, authentication initiates on all ports
automatically.
• Off - The AG switch does not support authentication and rejects any authentication negotiation
request from the connected fabric switch or HBA. A fabric switch with the policy mode set to off
should not be connected to an AG switch with policy mode set to on since the on policy is strict.
This will disable the port if any switch rejects the authentication. You must configure DH-CHAP
shared secrets or install FCAP certificates on the AG and connected fabric switch before
switching from a policy off mode to policy on mode. Off is the default mode for both switch and
device policy.
• Passive - The AG does not initiate authentication when connected to a device, but participates
in authentication if the connecting device initiates authentication. The AG will not initiate
authentication on ports, but accepts incoming authentication requests. Authentication will not
disable AG F_Ports if the connecting device does not support authentication or the policy mode
is set to off. Passive mode is the safest mode to use for devices connected to an AG switch if
the devices do not support authentication.
To perform authentication with switch policy, the on and off policy modes are supported on the AG
switch. To perform authentication with device policy, the on, off, and passive modes are supported
on the AG switch.
Tab le 2 on page 8 describes the authentication behavior between a sending AG switch and
TABLE 2Behavior of sending AG switch and receiving fabric switch with different policies configured
AG switch with switch
policy mode on
Fabric switch with device
policy mode ON
Authorization negotiation accept
Fabric switch with device
policy mode PASSIVE
Authorization negotiation accept
Fabric switch with device
policy mode OFF
Authorization
negotiation - reject
N_Port without
authentication
No negotiation
N_Port without
authentication
AG switch with switch
policy off
DH-CHAP/FCAP:
Success - N_Port
Failure - disable
No negotiation
No light
DH-CHAP/FCAP:
Success - N_Port
Failure - disable
No Negotiation
N_Port without
authenctication.
Tab le 3 describes the authentication behavior between a sending HBA and receiving AG switch.
TABLE 3Behavior of sending device (HBA) and receiving AG switch with different policies configured
HBA authentication
enabled
HBA authentication
disabled
AG switch with device
policy mode ON
Authorization negotiation accept
DH-CHAP
Success - F_Port
Failure - disable
No negotiation
No light
AG switch with device policy
mode PASSIVE
Authorization negotiation accept
DH-CHAP
Success - F_Port
Failure - disable
No negotiation
F_Port without
authentication
AG switch with device
policy mode OFF
Authorization
negotiation - reject
F_Port without
authentication
No negotiation
F_Port without
authentication
Supported Fabric OS commands
All Fabric OS commands for authentication policy apply to AG switches, including the following:
• authutil -- policy
• authutil --show
• authutil --set
• secauthsecret --set
• secauthsecret --show
Although authutil --authinit is not supported in AG mode, it is supported in native mode.
For more information, refer to the Fabric OS Command Reference.
Limitations and considerations
• Authentication policy is not supported on cascaded AG switch configurations.
8Access Gateway Administrator’s Guide
53-1002743-01
• Authentication is not supported between an AG switch running Fabric OS v7.1.0 or later and a
NOTE
fabric running Fabric OS earlier than v7.1.0. If the AG switch is connected to fabric switch
running Fabric OS earlier than v7.1.0, the AG switch N_Ports will disable if authentication is
enabled on both switches. Devices mapped to N_Ports connected to fabrics operating with
Fabric OS before v7.1.0 will also disable.
• If authentication is disabled on the Fabric Switch, the AG switch N_Port will come online
without authentication policy.
• Device and switch policies must be disabled on the AG before converting the switch to Native
mode.
• Device and switch policies must be disabled on the switch in Native mode before converting it
to AG mode.
• Authentication policy is disabled by default on all ports in AG mode.
• High availability (HA) reboots are supported.
Access Gateway port types
Access Gateway differs from a typical fabric switch because it is not a switch; instead, it is a mode
that you enable on a switch using the ag command. After a switch is set in Access Gateway mode, it
can connect to the fabric using node ports (N_Ports). Typically, fabric switches connect to the
Enterprise fabric using interswitch link (ISL) ports, such as E_Ports.
Access Gateway port types
1
AG uses the following Fibre Channel (FC) ports:
• F_Port - Fabric port that connects a host, HBA, or storage device to a switch in AG mode.
• N_Port - Node port that connects a switch in AG mode to the F_Port of the fabric switch.
• D_Port - Port configured in diagnostic mode so that various tests can run between it and
connected D_Port on another switch across a link.
Initiate the portcfgpersisentenable command on all external or outward facing ports to ensure that
these ports come back online after a switch reboot or power failure. For an embedded switch,
execute this command through the chassis management console and not the switch CLI or the
command may not persist. Refer to “Persisting port online state” on page 31 for more information.
Comparison of Access Gateway ports to standard switch ports
Access Gateway multiplexes host connections to the fabric. It presents an F_Port to the host and an
N_Port to an Edge fabric switch. Using N_Port ID Virtualization (NPIV), AG allows multiple FC
initiators to access the SAN on the same physical port. This reduces the hardware requirements
and management overhead of hosts to the SAN connections.
A fabric switch presents F_Ports (or FL_Ports) and storage devices to the host and presents
E_Ports, VE_Ports, or EX_Ports to other switches in the fabric. A fabric switch consumes SAN
resources, such as domain IDs, and participates in fabric management and zoning distribution. A
fabric switch requires more physical ports than AG to connect the same number of hosts.
Figure 3 shows a comparison of the types of ports a switch in AG mode uses to the type of ports
You can convert a Fibre Channel port into a D_Port on AG switch and a connected fabric switch or
another AG switch (cascaded configuration) to test the link between the ports. When you configure
the ports on each end of the link as D_Ports, diagnostic tests automatically initiate on the link
when the D_Ports go online. Results can be viewed using Fabric OS commands during or after
testing. Once in D_Port mode, the port does not participate in fabric operations, login to a remote
device, or run data traffic. Figure 4 on page 10 illustrates the supported D_Port configurations.
FIGURE 4Diagnostic port configurations
Tab le 4 shows a comparison of port configurations between AG and a standard fabric switch.
10Access Gateway Administrator’s Guide
53-1002743-01
Loading...
+ 78 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.