Hewlett-Packard Company makes no warranty of any kind with regard to this material, including, but not limited to, the implied warranties of
merchantability and fitness for a particular purpose. Hewlett-Packard shall not be liable for errors contained herein or for incidental or
consequential damages in connection with the furnishing, performance, or use of this material.
This document contains proprietary information, which is protected by copyright. No part of this document may be photocopied, reproduced, or
translated into another language without the prior written consent of Hewlett-Packard. The information is provided “as is” without warranty of any
kind and is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements
accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for
technical or editorial errors or omissions contained herein.
Windows is a U.S. registered trademarks of Microsoft Corporation.
UNIX® is a registered trademark of The Open Group.
Linux® is a U.S. registered trademark of Linus Torvalds.
This document provides information to assist fabric administrators in using the web-based graphical user
interface to monitor and modify their HP StorageWorks switch fabrics.
This preface discusses the following topics:
• Intended audience, page 9
• Related documentation, page 9
• Document conventions and symbols, page 10
• HP technical support, page 11
Intended audience
This book is intended for use by those responsible for monitoring and modifying their HP StorageWorks
switch fabric.
Related documentation
Documentation, including white papers and best practices documents, is available via the HP website.
Please go to:
1. Locate the Networked storage section of the web page.
2. Under Networked storage, go to the By type subsection.
3. Click SAN infrastructure. The SAN infrastructure page displays.
4. Locate the Fibre Channel Switches section.
Locate the B-Series Fabric subsection, and then go to the appropriate subsection, such as Enterprise
Class for the SAN Director 2/128.
To access 4.x documents (such as this document), select the appropriate product, for example SAN
Director 2/128 & 2/128 Power Pack or Core Switch 2/64 & Core Switch 2/64 Power Pack.
The switch overview page displays.
5. Go to the Product information section, located on the far right side of the web page.
6. Click Technical documents.
7. Follow the onscreen instructions to download the applicable documents.
Fabric OS 5.0.0 procedures user guide9
Document conventions and symbols
Table 1Document conventions
ConventionElement
Medium blue text: Figure 1Cross-reference links and e-mail addresses
Medium blue, underlined text
(http://www.hp.com)
Bold font• Key names
Italics
fontText emphasis
Monospace font• File and directory names
Monospace italicfont• Code variables
Monospace, bold fontEmphasis of file and directory names, system
Web site addresses
• Text typed into a GUI element, such as
into a box
• GUI elements that are clicked or
selected, such as menu and list items,
buttons, and check boxes
• System output
• Code
• Text typed at the command-line
• Command-line variables
output, code, and text typed at the
command-line
WARNING!Indicates that failure to follow directions could result in bodily harm or death.
CAUTION: Indicates that failure to follow directions could result in damage to equipment or data.
IMPORTANT: Provides clarifying information or specific instructions.
!
NOTE: Provides additional information.
TIP:Provides helpful hints and shortcuts.
10About this guide
HP technical support
Telephone numbers for worldwide technical support are listed on the following HP web site:
http://www.hp.com/support/
NOTE: For continuous quality improvement, calls may be recorded or monitored.
Obtain the following information before calling:
• Technical support registration number (if applicable)
• Product serial numbers
• Product model names and numbers
• Applicable error messages
• Operating system type and revision level
• Detailed, specific questions
HP Storage web site
The HP web site has the latest information on this product, as well as the latest drivers. Access storage at:
. From this web site, select the country of origin.
. From this web site, select the appropriate product
HP authorized reseller
For the name of your nearest HP authorized reseller:
• In the United States, call 1-800-345-1518.
• Elsewhere, visit http://www.hp.com
and click Contact HP to find locations and telephone numbers.
Fabric OS 5.0.0 procedures user guide11
12About this guide
1Introducing Fabric OS CLI procedures
This guide contains procedures for configuring and managing an HP StorageWorks Storage Area
Network (SAN) using the Fabric OS Command Line Interface (CLI). This chapter consists of the following
sections:
• Changes to this guide for OS v5.0.0, page 13
• About procedural differences, page 15
• Scope and references, page 16
• About the CLI, page 16
• Help information, page 17
The guide applies to the following HP products:
• HP StorageWorks Switches: 1-GB switches, SAN Switch 2/8V, SAN Switch 2/16V, SAN Switch
2/32, and SAN Switch 4/32.
These switches contain a fixed number of ports (they are called fixed-port switches). The SAN Switch
4/32 allows you to license and activate extra fixed ports with the Ports on Demand feature.
• Core Switch 2/64 and SAN Director 2/128.
These switches can contain a variable number of ports, which you install by plugging port cards into
the director chassis.
Changes to this guide for OS v5.0.0
The following changes are new to v5.0.0 and are not included elsewhere in this guide.
• Add “Brocade 4Gb SAN Switch for HP p-Class BladeSystem ” everywhere that the HP StorageWorks
SAN Switch 4/32 is mentioned, except as specified in the following sections.
• On page 43, in the section “Creating and maintaining a user-defined account,” change the
following definition item:
-rrolename Specifies the role: either admin or user in nonsecure mode; admin, user, or
nonfcsadmin in secure mode.
to:
-rrolename Specifies the role: either admin or user in nonsecure mode or admin, user,
switchAdmin, or nonfcsadmin in secure mode.
• On page 44, in the section “To change account parameters,” change the following definition
item:
-r rolename Specifies the role: either admin or user in nonsecure mode; admin, user, or
nonfcsadmin in secure mode.
to:
-rrolename Specifies the role: either admin or user in nonsecure mode; admin, user,
switchAdmin, or nonfcsadmin in secure mode.
Fabric OS 5.0.0 procedures user guide13
• On page 107, in the section “SAN Switch 4/32” add the following:
For the Brocade 4Gb SAN Switch for HP p-Class BladeSystem, each port group contains four
ports and buffer credits are shared among all ports on the switch.
14Introducing Fabric OS CLI procedures
• On page 108, in the section “Choosing an extended ISL mode,” add the following:
Brocade 4Gb SAN Switch for HP p-Class BladeSystem
The number of ports that can be configured at various distances is summarized in Table 2.
Table 2Brocade 4Gb SAN Switch for HP p-Class BladeSystem
Speed
(Gbit/sec)
128615411088
2143775544
471.538.527.522
• On page 146, in the section “Adding end-to-end monitors,” change the following paragraph:
The HP StorageWorks SAN Switch 2/8V, SAN Switch 2/16V, SAN Switch 2/32, Core Switch
2/64, SAN Director 2/128, allow up to eight end-to-end monitors allow up to eight end-to-end
monitors.
to:
The HP StorageWorks SAN Switch 2/8V, SAN Switch 2/16V, SAN Switch 2/32, Core Switch
2/64, SAN Director 2/128, and Brocade 4Gb SAN Switch for HP p-Class BladeSystem allow up
to eight end-to-end monitors.
Number of ports allowed at distance (km)
1 2 3 4
• On page 149, in the section “Monitoring filter-based performance,” change the following
paragraph:
For HP StorageWorks SAN Switch 2/8V, SAN Switch 2/16V, SAN Switch 2/32, Core Switch
2/64, and SAN Director 2/128, the maximum number of filters is eight per port, in any
combination of standard filters and user-defined filters.
to:
For HP StorageWorks SAN Switch 2/8V, SAN Switch 2/16V, SAN Switch 2/32, Core Switch
2/64, SAN Director 2/128, and Brocade 4Gb SAN Switch for HP p-Class BladeSystem, the
maximum number of filters is eight per port, in any combination of standard filters and
user-defined filters.
• On page 219, in the section “HP StorageWorks switch requirements,” add the following:
Brocade 4Gb SAN Switch for HP p-Class BladeSystem running Fabric OS 5.0.0 or later.
About procedural differences
As a result of the differences between fixed-port and variable-port devices, procedures sometimes differ
between HP StorageWorks switch models. Also, because the domain architecture of the Core Switch
2/64 differs from that of the SAN Director 2/128, there are sometimes procedural differences between
these two.
When procedures or parts of procedures apply to some models but not others, this guide identifies the
specifics for each model. For example, a number of procedures that apply only to variable-port devices
are found in ”Configuring the Core Switch 2/64 and the SAN Director 2/128” on page 89. Procedures
that apply only to the SAN Switch 4/32 are labeled as such.
Fabric OS 5.0.0 procedures user guide15
NOTE: When command examples in this guide show user input enclosed in quotation marks, the
quotation marks are required for versions earlier than v4.0.0. They are optional in later versions, unless
specifically called for in the procedures.
Scope and references
Although many different software and hardware configurations are tested and supported by HP,
documenting all possible configurations and scenarios is beyond the scope of this document. In some
cases, earlier releases are highlighted to present considerations for interoperating with them.
The hardware reference manuals for HP StorageWorks products describe how to power up devices and
set their IP addresses. After the IP address is set, you can use the CLI procedures contained in this guide.
This guide provides only the level of detail required to perform the procedures. If you need more
information about the commands used in the procedures, refer to online help or to the HP StorageWorks Fabric OS 4.x command reference guide.
There are several access methods that you can use to configure a switch. These are listed with their
respective documents:
• For Advanced Web Tools procedures, refer to the HP StorageWorks Fabric OS 4.x Advanced Web
Tools user guide.
• For Fabric Manager procedures, refer to the HP StorageWorks Fabric OS 4.4.x Fabric Manager user
guide.
• For third-party application procedures, refer to the third-party API documentation.
About the CLI
Fabric OS CLI is the complete fabric management tool for HP SANs that enables you to:
• Access the full range of Fabric OS features, based on license keys.
• Configure, monitor, dynamically provision, and manage every aspect of the SAN.
• Configure and manage the HP fabric on multiple efficient levels.
• Identify, isolate, and manage SAN events across every switch in the fabric.
• Manage switch licenses.
• Perform fabric stamping.
To manage a switch using telnet, SNMP, and HP Advanced Web Tools, the switch must be connected to a
network through the switch Ethernet port (out of band) or from the Fibre Channel (in band). The switch must
be configured with an IP address to allow for the network connection. Refer to the hardware manual for
your switch for information on physically connecting to the switch.
You can access switches from different connections, such as Advanced Web Tools, CLI, and API. When
these connections are simultaneous, changes from one connection may not be updated to the other, and
some modifications may be lost. When simultaneous connections are used, make sure that you do not
overwrite the work of another connection.
In a mixed fabric containing switches running various Fabric OS versions, you should use the latest-model
switches running the most recent release for the primary management tasks. The principal management
16Introducing Fabric OS CLI procedures
access should be set to the core switches in the fabric. For example, to run Secure Fabric OS, use the
latest-model switch as the primary FCS, the location to perform zoning tasks, and the time server.
A number of management tasks are designed to make fabric-level changes; for example, zoning
commands make changes that affect the entire fabric. When executing fabric-level configuration tasks,
allow time for the changes to propagate across the fabric before executing any subsequent tasks. For a
large fabric, it may be take a few minutes.
Help information
Each Fabric OS command provides Help information that explains the command function, its possible
operands, its level in the command hierarchy, and additional pertinent information.
Displaying command help
To display help information:
1. Connect to the switch and log in as admin.
2. To display a list of all command help topics, issue the help command with no arguments.
3. To display help for a specific command, enter help command, where command is the name of the
command for which you need information, as shown in the following example:
switch:admin> help configure
Administrative Commands configure(1m)
NAME
configure - change system configuration settings
SYNOPSIS
configure
AVAILABILITY
admin
DESCRIPTION
This command changes some system configuration settings,
including:
o Arbitrated loop settings
o Switch fabric settings
o System services settings
o Virtual channel settings
(output truncated)
Displaying additional help topics
The following commands provide help files for specific topics:
diagHelpDiagnostic help information
fwHelpFabric Watch help information
licenseHelpLicense help information
perfHelpPerformance Monitoring help information
routeHelpRouting help information
trackChangesHelpTrack Changes help information
zoneHelpZoning help information
Fabric OS 5.0.0 procedures user guide17
18Introducing Fabric OS CLI procedures
2Performing basic configuration tasks
This chapter contains procedures for performing basic switch configuration tasks using the Fabric OS CLI
and contains the following sections:
• Connecting to the CLI, page 19
• Setting the IP address, page 21
• Setting the default account passwords, page 21
• Setting the date and time, page 22
• Maintaining licensed features, page 25
• Customizing the switch name, page 27
• Customizing the chassis name, page 28
• Disabling and enabling a switch, page 28
• Disabling and enabling a port, page 29
• Activating Ports on Demand, page 30
• Making basic connections, page 30
• Working with domain IDs, page 31
• Linking through a gateway, page 32
• Checking status, page 33
• Tracking and controlling switch changes, page 35
Connecting to the CLI
You can connect to the CLI either through a telnet connection or through the serial port. To connect with
telnet:
1. Verify that the switch is connected to the IP network through the RJ-45 Ethernet port.
Switches in the fabric that are not connected via Ethernet can be managed through switches that are
using IP over Fibre Channel. The embedded port must have an assigned IP address.
2. Open a telnet connection to the switch.
The login prompt is displayed when the telnet connection finds the switch in the network.
For the Core Switch 2/64 and SAN Director 2/128, enter the logical switch name (sw0 or sw1).
3. Enter the account ID (defaults are user or admin) at the login prompt.
4. Enter the password. The default password is password.
If you have not changed the system passwords from the default, you are prompted to change them.
5. Enter the new system passwords, or press Ctrl+c to skip the password prompts.
Fabric OS 5.0.0 procedures user guide19
6. Verify that the login was successful. The prompt displays the switch name and user ID to which you
are connected:
login: admin
password: xxxxxxx
switch:admin>
Consider the following for telnet connections:
• Never change the IP address of the switch while two telnet sessions are active; if you do, your next
attempt to log in fails. To recover, gain access to the switch by one of these methods:
• Use Advanced Web Tools and perform a fast boot. When the switch comes up, the telnet quota is
cleared. For instructions on performing a fast boot with Advanced Web Tools, refer to the HP StorageWorks Fabric OS 4.x Advanced Web Tools user guide.
• If you have the required privileges, you can connect through the serial port, log in as root, and use
operating system commands to identify and kill the telnet processes without disrupting the fabric.
• For admin level accounts, Fabric OS limits the number of simultaneous telnet sessions per switch to
two. For more details on session limits, see ”Configuring the telnet interface” on page 40 and
”Creating and maintaining user-defined accounts” on page 43.
To connect through the serial port:
1. Connect the serial cable to the serial port on the switch and to an RS-232 serial port on
the workstation.
If the serial port on the workstation is RJ-45 instead of RS-232, remove the adapter on the end of the
serial cable and insert the exposed RJ-45 connector into the RJ-45 serial port on the workstation.
2. Open a terminal emulator application (such as HyperTerminal on a PC, or TERM, TIP, or Kermit in a
UNIX® environment), and configure the application as follows:
• In a Windows® environment:
ParameterValue
Bits per second9600
Databits8
ParityNone
Stop bits1
Flow controlNone
• In a UNIX environment, enter the following string at the prompt: tip /dev/ttyb -9600
If ttyb is already in use, you can use ttya (enter tip /dev/ttya -9600).
Consider the following for serial connections:
• Some procedures require that you connect through the serial port; for example, setting the IP address
or setting the boot PROM password.
• If secure mode is enabled, connect through the serial port of the primary FCS switch.
• For the Core Switch 2/64 and SAN Director 2/128, you can connect to CP0 or CP1 using either of
the two serial ports.
20Performing basic configuration tasks
Setting the IP address
You must connect through the serial port to set the IP address (see ”To connect through the serial port:” on
page 20). After connecting, use the ipaddrset command to set the IP address.
CAUTION: The use of IP address 0.0.0.0 is not supported. Do not use this address.
Fabric OS v2.6.0, v3.1.0, and v4.0.0 supports Classless Inter-Domain Routing (CIDR).
Setting the default account passwords
For each logical switch (domain), there are admin and user default access accounts. These accounts
designate different levels of authorization—called roles—for using the system:
• The admin level is for administrative use.
• The user level is for nonadministrative use, such as monitoring system activity.
Two accounts—factory and root—are reserved for development and manufacturing. You can change
their passwords, which is optional, but you should not use these accounts under normal circumstances.
For the SAN Switch 2/8V, SAN Switch 2/16V, SAN Switch 2/32, SAN Switch 4/32, and SAN
Director 2/128 (default configuration with one domain), there is one set of default access accounts.
For the Core Switch 2/64 and SAN Director 2/128, configured with two domains, each logical switch
has its own set of default access accounts. The default account names and passwords are the same for
both of the logical switches.
You can also create up to 15 additional accounts per logical switch and designate their roles as either
admin or user. See the procedures in ”Creating and maintaining user-defined accounts” on page 43.
For large enterprises, Fabric OS supports RADIUS services, as described in ”Setting up RADIUS AAA
service” on page 46.
In addition to the account access passwords, each switch can set a boot PROM password. For greater
security, HP recommends that you set this password to protect system boot parameters from unauthorized
access. See ”Setting the boot PROM password” on page 70.
Each of the default access accounts has an associated password. The first time you connect to a
Fabric OS switch you are prompted to change these default account passwords.
If you do not change the default passwords, you are prompted to do so at each subsequent login until all
system passwords have been changed from the default values. Thereafter, use the passwd command to
change passwords.
For more background information on passwords, see ”Changing an account password” on page 45.
To change the default passwords at login:
1. Connect to the switch and log in as admin.
2. At each of the Enter new password prompts, either enter a new password or skip the prompt.
Skip a prompt by pressing Enter. You can bypass all further prompts by pressing Ctrl+c.
Although the root and factory accounts are not meant for general use, you should change their
passwords if prompted to do so and save the passwords in case they are needed for recovery
purposes.
Fabric OS 5.0.0 procedures user guide21
Passwords can be from 8 to 40 characters long and must begin with an alphabetic character. They
can include numerals, the dot (.), and the underscore (_). They are case sensitive, and they are not
displayed when you enter them on the command line. You cannot reuse the default passwords.
NOTE: Record the passwords exactly as entered and store them in a secure place; recovering
passwords requires significant effort and fabric downtime.
Example:
login: admin
Password:
Please change your passwords now.
Use Control-C to exit or press 'Enter' key to proceed.
for user - root
Changing password for root
Enter new password: *****
Password changed.
Saving password to stable storage.
Password saved to stable storage successfully.
Please change your passwords now.
for user - factory
Changing password for factory
Enter new password: *****
Password changed.
Saving password to stable storage.
Password saved to stable storage successfully.
Please change your passwords now.
for user - admin
Changing password for admin
Enter new password: *****
Password changed.
Saving password to stable storage.
Password saved to stable storage successfully.
Please change your passwords now.
for user - user
Changing password for user
Enter new password: *****
Password changed.
Saving password to stable storage.
Password saved to stable storage successfully.
switch:admin>
Setting the date and time
Switches maintain the current date and time in nonvolatile memory. Date and time are used for logging
events. Switch operation does not depend on the date and time; a switch with an incorrect date and time
value still functions properly. However, because the date and time are used for logging, you should set
them correctly.
NOTE: The date and tsclockserver commands are disabled when the security feature is enabled.
With security enabled you can view the current date setting only on the primary FCS switch.
22Performing basic configuration tasks
To set the date and time:
1. Connect to the switch and log in as admin.
2. Enter the date command at the command line using the following syntax:
date “MMDDhhmmYY”
The values represent the following:
• MM is the month; valid values are 01 through 12.
• DD is the date; valid values are 01 through 31.
• hh is the hour; valid values are 00 through 23.
• mm is minutes; valid values are 00 through 59.
• YY is the year; valid values are 00 through 99 (values greater than 69 are interpreted as
1970 through 1999, and values less than 70 are interpreted as 2000 through 2069).
NOTE: The date function does not support daylight savings time or time zones, so such changes must be
reset manually.
Example:
switch:admin> date
Fri May 5 21:50:00 UTC 1989
switch:admin>
switch:admin> date “0624165203”
Tue Jun 24 16:52:30 UTC 2003
switch:admin>
You can synchronize the local time of the principal or primary Fabric Configuration Server (FCS) switch
to an external NTP server.
To synchronize local time with an external source:
1. Connect to the switch and log in as admin.
2. Issue the following command:
tsclockserver ipaddr
where ipaddr is the IP address of the NTP server, which the switch must be able to access. This
operand is optional; by default this value is LOCL, which uses the local clock of the principal or
primary switch as the clock server.
Example:
switch:admin> tsclockserver
LOCL
switch:admin> tsclockserver “132.163.135.131”
switch:admin> tsclockserver
132.163.135.131
switch:admin>
HP recommends that you synchronize time with an external NTP server, as described on page 23. If you
cannot do so, use the next procedure.
Fabric OS 5.0.0 procedures user guide23
To set the time zone:
1. Connect to the switch and log in as admin.
2. Issue the tstimezone command as follows:
tstimezone [houroffset [, minuteoffset]]
• For Pacific Standard Time enter tsTimeZone -8,0
• For Central Standard Time enter tsTimeZone -6,0
• For Eastern Standard Time enter tsTimeZone -5,0
The default time zone for switches is Universal Time Conversion (UTC), which is 8 hours ahead of
(later than) Pacific Standard Time (PST). For additional time zone conversions, see Table 3.
The parameters do not apply if the time zone of the switch has already been changed from the default
(8 hours ahead of PST).
Refer to the tstimezone command in the HP StorageWorks Fabric OS 4.x command reference guide for more detailed information about the command parameters.
3. Repeat the procedure on all switches for which the Time Zone needs to be set. This needs to be done
only once, because the value is written to nonvolatile memory.
For U.S. time zones, use Table 3 to determine the correct parameter for the tstimezone command.
Table 3Conversion from UTC to local time
Local timetstimezone conversion
parameter
Atlantic Standard -4,0
Atlantic Daylight -3,0
Eastern Standard -5,0
Eastern Daylight -4,0
Central Standard -6,0
Central Daylight -5,0
Mountain Standard -7,0
Mountain Daylight -6,0
Pacific Standard -8,0
Pacific Daylight -7,0
Alaskan Standard -9,0
Alaskan Daylight -8,0
Hawaiian Standard -10,0
24Performing basic configuration tasks
Maintaining licensed features
Feature licenses might be part the licensed Paper Pack supplied with switch software, or you can purchase
licenses separately from your switch vendor, who will provide you with keys to unlock the features. License
keys are provided on a per-chassis basis, so for products that support multiple logical switches (domains),
a license key applies to all domains within the chassis.
To unlock a licensed feature, you can either use the license key in the Paper Pack supplied with switch
software, or launch an internet browser and go to the HP licensing web site at
http://webkey.external.hp.com/welcome.asp
generate the key.
NOTE: You need the following items for each chassis to be licensed:
• Transaction key, which is in the Paper Pack supplied with switch software. Or, when you purchase a
license, your switch vendor gives you a transaction key to be used for obtaining a license key.
• License ID; to see a switch License ID, use the licenseIDShow command.
To unlock a licensed feature:
1. If you already have a license key, go to step 10.
If you do not have a key, launch an Internet browser and go to the HP web site:
. Click Generate a license key and follow the instructions to
.
2. Click products.
3. Click Software Products.
4. In the Related Links panel on the right side of the page, select Software License Keys.
The Software License Keys instruction page appears.
5. If you want to generate a single license key, select Generate 1 license key.
If you want to generate multiple license keys, select Batch Generation of Licenses.
The Software License Key instruction page appears.
6. Enter the requested information in the required fields.
When generating multiple license keys, enter the worldwide names and transaction keys in the table at
the bottom of the screen. If you need additional rows in the table, select Add More Rows.
7. Click Next.
A verification screen appears.
8. Verify that the information appears correctly.
Click Submit if the information displayed is correct. If the information is incorrect, Click Previous and
change the information.
9. After the information is corrected, click Submit.
An information screen displays the license keys.
You also receive an e-mail with the keys and installation instructions.
Fabric OS 5.0.0 procedures user guide25
10.Activate and verify the license as follows:
a. Connect to the switch and log in as admin.
b. Activate the license using the licenseadd command. For example:
switch:admin> licenseadd “key”
The license key is case sensitive and must be entered exactly as given. The quotation marks
are optional.
For the Core Switch 2/64 and SAN Director 2/128, the licenses are effective on both CPs and on
all logical switches.
c. Verify that the license was added by issuing the licenseshow command. The licensed features
currently installed on the switch are listed. If the feature is not listed, issue the licenseadd
command again.
d. Some features may require additional configuration , or you might need to disable and reenable
the switch to make them operational; see the feature documentation for details.
Example
switch:admin> licenseshow
SbeSdQdQySyriTeJ:
Web license
Zoning license
Fabric license
Remote Switch license
Extended Fabric license
Fabric Watch license
Performance Monitor license
Trunking license
Security license
SbbebdQS9QTscfcB:
Ports on Demand license - additional 8 port upgrade
SbbebdQS9QTcgfcz:
Ports on Demand license - additional 8 port upgrade
To remove a licensed feature:
1. Connect to the switch and log in as admin.
2. Issue the licenseshow command to display the active licenses.
3. Remove the license key using the licenseremove command. For example:
switch:admin> licenseremove “key”
The license key is case sensitive and must be entered exactly as given. The quotation marks
are optional.
After removing a license key, the optionally licensed feature is disabled when the switch is rebooted
or when a switch disable or enable is performed. For the Core Switch 2/64 and SAN Director
2/128, reboot both the primary and the secondary CP cards to ensure that HA features remain
synchronized.
4. Issue the licenseshow command to verify that the license is disabled.
If there are no license keys, licenseshow displays No licenses.
Customizing the switch name
Switches can be identified by IP address, Domain ID, World Wide Name (WWN), or by customized
switch names that are unique and meaningful.
Version 4.0.0 and later switch names can be from 1 to 15 characters; they must begin with a letter and
may can contain letters, numbers, and the underscore character. It is not necessary to use quotation
marks.
The default names are:
• swd77 for the SAN Switch 2/8V, SAN Switch 2/16V, SAN Switch 2/32, and SAN Switch 4/32.
• For the Core Switch 2/64, the two logical switches have different default names. The name swd77 is
used for the logical switch containing the port cards in slots 1 through 4; swd76 is used for the logical
switch containing the port cards in slots 7 through 10.
• swd77 for the SAN Director 2/128
NOTE: Changing the switch name causes a domain address format RSCN to be issued.
To customize the switch name:
1. For the SAN Switch 2/8V, SAN Switch 2/16V, SAN Switch 2/32, and SAN Switch 4/32, proceed
to the next step.
For the Core Switch 2/64 and the SAN Director 2/128, identify the serial console for the active CP.
You can do so by issuing the hashow command from any Core Switch 2/64 and SAN Director
2/128 serial console, or by looking for the blue Active LED on the SAN Director 2/128.
2. Connect to the switch and log in as admin.
Fabric OS 5.0.0 procedures user guide27
3. For the Core Switch 2/64 and the SAN Director 2/128, proceed to the next step.
For the SAN Director 2/128, if configured for one domain (the default) proceed to the next step. If
configured with two domains, proceed as for the Core Switch 2/64.
For the Core Switch 2/64, choose the logical switch that you want to change. Enter the value that
corresponds to that logical region:
•Enter 0 to configure logical switch 0 (slot 1 through 4).
•Enter 1 to configure logical switch 1 (slot 7 through 10).
4. Issue the switchname command at the command line with the following syntax:
switchname “newname”
where newname is the new name for the switch.
5. Record the new switch name for future reference.
6. For the Core Switch 2/64 and the SAN Director 2/128 configured with two domains, disconnect
from the session and repeat the procedure for the second logical switch.
Beginning with Fabric OS v4.4.0, HP recommends that you customize the chassis name for each switch.
Some system logs identify switches by chassis names, so if you assign meaningful chassis names in
addition to meaningful switch names, logs are more useful.
To change the chassis name:
1. Connect to the switch and log in as admin.
2. Issue the chassisname command at the command line with the following syntax:
chassisname “newname”
Where newname is the new name for the chassis.
Chassis names can be from 1 to 15 characters, must begin with a letter, and can contain letters,
numbers, and the underscore character. It is not necessary to use the quotation marks.
3. Record the new chassis name for future reference.
Disabling and enabling a switch
By default, the switch is enabled after power is applied and diagnostics and switch initialization routines
have finished. You can disable and reenable it as necessary.
To disable a switch:
1. Connect to the switch and log in as admin.
28Performing basic configuration tasks
2. Issue the switchdisable command at the command line.
All Fibre Channel ports on the switch are taken offline. If the switch was part of a fabric, the fabric
reconfigures.
To enable a switch:
1. Connect to the switch and log in as admin.
2. Issue the switchenable command at the command line.
All Fibre Channel ports that passed the POST test are enabled. If the switch has interswitch links to a
fabric, it joins the fabric.
Disabling and enabling a port
All licensed ports are enabled by default. You can disable and reenable them as necessary. Ports that
you activate with Ports on Demand must be enabled explicitly, as described in ”Activating Ports on
Demand” on page 30.
To disable a port:
1. Connect to the switch and log in as admin.
2. For the SAN Switch 2/8V, SAN Switch 2/16V, SAN Switch 2/32, and SAN Switch 4/32, issue the
following command:
portdisable portnumber
where portnumber is the port number of the port you want to disable.
For the Core Switch 2/64 and the SAN Director 2/128, issue the following command:
portdisable slotnumber/portnumber
where slotnumber and portnumber are the slot and port numbers of the port you want
to disable.
If the port is connected to another switch, the fabric might reconfigure.
To enable a port:
1. Connect to the switch and log in as admin.
2. For the SAN Switch 2/8V, SAN Switch 2/16V, SAN Switch 2/32, and SAN Switch 4/32, issue the
following command:
portenable portnumber
The portnumber is the port number of the port you want to enable.
For the Core Switch 2/64 and the SAN Director 2/128, issue the following command:
portenable slotnumber/portnumber
The slotnumber and portnumber are the slot and port numbers of the port you want
to enable. (Slots are numbered 1 through 4 and 7 through 10, counting from left to right.)
If the port is connected to another switch, the fabric might reconfigure. If the port is connected to one or
more devices, these devices become available to the fabric.
If you change port configurations during a switch failover, the ports might become disabled. Reissue the
portenable command after the failover is complete to bring the ports online.
Fabric OS 5.0.0 procedures user guide29
Activating Ports on Demand
The Core Switch 4/32 can be purchased with 16 or 32 licensed ports. As your needs increase, you can
activate the remaining ports by purchasing and installig the optional HP StorageWorks 8-port upgrade
license.
Ports on Demand is ready to be unlocked in the switch firmware. Its license might be part of the licensed
Paper Pack supplied with switch software, or you can purchase the license separately from your switch
vendor, who will provide you with a key to unlock it.
By default, ports 0 through 15 are enabled on the SAN Switch 4/32. To enable ports 16 through 23,
purchase and install an 8-port upgrade license. To enable ports 24 through 31, purchase and install
another 8-port upgrade license. The first license key must be already installed before you can use the
second license.
You must enable the ports after you have installed the license keys. You can do so without disrupting
switch operation using the portenable command on each port. Alternatively, you can disable and
reenable the switch to activate all ports.
To enable an 8-port upgrade license, you can either use the supplied license key or generate a license
key. If you need to generate a key, launch an Internet browser and go to the HP licensing web site at
http://webkey.external.hp.com/welcome.asp
generate the key.
To enable Ports on Demand:
. Click Generate a license key and follow the instructions to
1. Connect to the switch and log in as admin.
2. Optional: to verify the states of the ports, use the portshow command.
In the portshow output, the Licensed field shows whether the port is licensed.
3. Install the HP Ports on Demand licensed product.
For instructions, see ”Maintaining licensed features” on page 25.
4. Use the portenable command to enable the ports.
5. Optional: use the portshow command to check the newly activated ports.
If you remove an 8-port upgrade license, the licensed ports become disabled after the next platform
reboot or the next port deactivation.
Making basic connections
You can make basic connections to devices and to other switches.
Before connecting a v4.0.0 or later switch to a fabric that contains switches running earlier firmware
versions, you must first set the same PID format on all the switches. The presence of different PID formats
in a fabric causes fabric segmentation.
For information on PID formats and related procedures, see ”Selecting a PID format” on page 206.
For information on configuring the routing of connections, see ”Routing traffic” on page 99.
For information on configuring extended interswitch connections, see ”Administering extended fabrics”
on page 107.
30Performing basic configuration tasks
Connecting to devices
To minimize port logins, power off all devices before connecting them to the switch. For devices that
cannot be powered off, first use the portdisable command to disable the port on the switch, and then
connect the device. When powering the devices back on, wait for each device to complete the fabric login
before powering on the next one.
Connecting to other switches
Refer to the hardware user’s guide of your specific switch for interswitch link (ISL) connection and cable
management information. Table 4 summarizes the standard ISL modes, which you can configure with the
portcfglongdistance command. For information on extended ISL modes, which enable longer
distance interswitch links, see ”Administering extended fabrics” on page 107.
Table 4Standard ISL modes
ModeDescriptionMaximum ISL distance (km)Earliest fabric OS release
1
L0
LE Level E static mode,
1. When you upgrade from Fabric OS v4.0.0 to Fabric OS v4.1.0 or later, all extended ISL ports are set automatically to L0
mode.
Level 0 static mode, the
default.
supports links beyond 5
km.
• 10 km at 1 Gbps
• 5 km at 2 Gbps
• 2.5 km at 4 Gbps
10 km at 1, 2, or 4 Gbpsv3.0.0, v4.0.0
Working with domain IDs
Although domain IDs are assigned dynamically when a switch is enabled, you can reset them manually
so that you can control the ID number or to resolve a domain ID conflict when you merge fabrics.
If a switch already has a domain ID when it is enabled, and that domain ID conflicts with a switch
already in the fabric, the conflict is automatically resolved. The process can take several seconds, during
which time traffic is delayed.
The default domain ID for HP StorageWorks switches is 1.
All
The default domain ID applies to both of the logical switches in Core Switch 2/64 and SAN Director
2/128 switches that are configured for two domains. To prevent domain conflict, you can either disable
one of the switches until both are connected to the fabric, then reenable the switches so that unique
domain IDs are automatically assigned; or use the procedure ”To set the domain ID:” on page 32 to make
the domain IDs unique before connecting the logical switches to the fabric.
CAUTION: On switches running Fabric OS v4.0.0 and later, do not use domain ID 0, which is reserved
for another purpose. Using this domain ID can cause the switch to reboot continuously. Avoid changing
the domain ID on the FCS in secure mode. To minimize down time, change the domain IDs on the other
switches in the secure fabric.
To display domain IDs:
1. Connect to a switch and log in as admin.
Fabric OS 5.0.0 procedures user guide31
2. Issue the fabricshow command.
Fabric information is displayed, including the domain ID (D_ID).
Example:
switch:admin> fabricshow
Switch IDWorldwide NameEnet IP AddrFC IP AddrName
------------------------------------------------------------------------3: fffc4310:00:00:60:69:10:60:1f192.168.64.1870.0.0.0“sw187”
2: fffc4210:00:00:60:69:00:05:91192.168.64.60192.168.65.60“sw60”
1:fffc4110:00:00:60:69:00:02:0b192.168.64.180192.168.65.180> “sw180”
The Fabric has 3 switches
Group IDToken
Switch IDThe switch Domain_ID and embedded port D_ID.
Worldwide Name The switch WWN.
Enet IP AddrThe switch Ethernet IP address.
FC IP AddrThe switch FC IP address.
NameThe switch symbolic name. An arrow (>) indicates the principal switch.
To set the domain ID:
1. Connect to the switch and log in as admin.
2. Issue the switchdisable command to disable the switch.
3. Issue the configure command.
4. Enter y after the Fabric Parameters prompt:
Fabric parameters (yes, y, no, n): [no] y
5. Enter a unique domain ID at the Domain prompt. Use a domain ID value from 1 through 239 for
normal operating mode (FCSW compatible). For example:
Domain: (1..239) [1] 3
6. Respond to the remaining prompts (or press Ctrl+d to accept the other settings and exit).
7. Issue the switchenable command to reenable the switch.
Linking through a gateway
A gateway merges SANs into a single fabric—by establishing point-to-point E_Port connectivity between
two Fibre Channel switches that are separated by a network—with a protocol such as IP or SONET.
Except for link initialization, gateways are transparent to switches; the gateway simply provides E_Port
connectivity from one switch to another.
By default, switch ports initialize links using the Exchange Link Parameters (ELP) mode 1. However,
gateways expect initialization with ELP mode 2. Therefore, to enable two switches to link through a
gateway, the ports on both switches must be set for ELP mode 2.
Any number of E_Ports in a fabric can be configured for gateway links, if these rules are followed:
• All switches in the fabric must be upgraded to Fabric OS v3.1.0 (or later) or v4.1.0 (or later).
• To prevent fabric segmentation, make sure that all switches in the fabric use the core PID format, as
described in ”To configure a link through a gateway:” on page 33.
32Performing basic configuration tasks
• When determining switch count maximums, include the switches connected to both sides of
the gateway.
• Extended links (those created using the Extended Fabrics licensed feature) and the security features in
Secure Fabric OS are not supported through gateway links.
To configure a link through a gateway:
1. If you are not sure that the PID format is consistent across the entire fabric, issue the configshow
command on all switches to check the PID setting. If necessary, change the PID format on any
nonconforming switches as described in ”Configuring the PID format” on page 203.
2. Connect to the switch on one end of the gateway and log in as admin.
3. Issue the portcfgislmode command:
SAN Switch 2/8V, SAN Switch 2/16V,
SAN Switch 2/32, and SAN Switch
4/32
Core Switch 2/64 and
SAN Director 2/128
In the following example, slot 2, port 3 is enabled for a gateway link:
switch:admin> portcfgislmode 2/3, 1
Committing configuration...done.
ISL R_RDY Mode is enabled for port 3. Please make sure the PID
formats are consistent across the entire fabric.
switch:admin>
portcfgislmode port mode
Specify a port number. Valid values for port
number vary, depending on the switch type.
The mode operand is required: specify 1 to
enable ISL R_RDY mode (gateway link) or
specify 0 to disable it.
portcfgislmodeslot/port, mode
Specify a slot/port number pair. Valid
values for slot and port number vary depending
on the switch type. The mode operand is
required: specify 1 to enable ISL R_RDY mode
(gateway link) or specify 0 to disable it.
4. Repeat the previous steps for any additional ports to be connected to the gateway.
5. Repeat the procedure on the switch at the other end of the gateway.
Refer to the HP StorageWorks Fabric OS 4.x command reference guide for more information about the portcfgislmode command.
Checking status
You can check the status of switch operation, HA features, and fabric connectivity:
1. Connect to the switch and log in as admin.
2. Issue the switchshow command at the command line.
This command displays a switch summary and a port summary.
3. Verify that the switch and ports are online.
4. Issue the switchstatusshow command to further check the status of the switch.
Fabric OS 5.0.0 procedures user guide33
To verify HA features:
HA features provide maximum reliability and nondisruptive replacement of key hardware and software
modules. To verify these features, connect to the switch as admin and use any of the following
commands:
• chassisshow verifies the Field Replaceable Units (FRUs).
• For the Core Switch 2/64 and the SAN Director 2/128:
• hashow verifies that HA is enabled, that the heartbeat is up, and that the HA state is synchronized
between the active and standby CP cards.
• slotshow inventories and displays the current status of each slot in the system.
To verify fabric connectivity:
1. Connect to the switch and log in as admin.
2. Issue the fabricshow command, which displays a summary of all the switches in the fabric.
Example:
switch:admin> fabricshow
Switch ID Worldwide Name Enet IP Addr FC IP Addr Name
The number of devices listed should reflect the number of devices that are connected.
Tracking and controlling switch changes
The Track Changes feature allows you to keep a record of specific changes that may not be considered
switch events, but can provide useful information. The output from the Track Changes feature is dumped
to the system messages log for the switch. Use the errdump or errshow command to view the log.
Items in the log created from the Track Changes feature are labeled TRACK.
Trackable changes are:
• Successful login
• Unsuccessful login
• Logout
• Configuration file change from task
• Track Changes on
• Track Changes off
An SNMP-TRAP mode can also be enabled; refer to the trackchangeshelp command in the HP
StorageWorks Fabric OS 4.x command reference guide.
For troubleshooting information on the Track Changes feature, see ”Inaccurate information in the system
message log” on page 200.
To enable the Track Changes feature:
1. Connect to the switch and log in as admin.
2. Issue the following command to enable the Track Changes feature:
trackchangesset 1
Fabric OS 5.0.0 procedures user guide35
A message appears, verifying that the Track Changes feature is on:
switch:admin> trackchangesset 1
Committing configuration...done.
switch:admin>
The output from the Track Changes feature is dumped to the system message log for the switch. Use the
errdump or errshow command to view the log.
Items in the system message log created from the Track Changes feature are labeled TRCK; for example:
2004/08/24-08:45:43, [TRCK-1001], 212,, INFO, ras007, Successful login by user
admin.
To display the status of the Track Changes feature:
1. Connect to the switch and log in as admin.
2. Issue the trackchangesshow command.
The status of the Track Changes feature is displayed as either on or off. The display specifies
whether the Track Changes feature is configured to send SNMP traps:
switch:admin> trackchangesshow
Track Changes status: ON
Track Changes generate SNMP-TRAP: NO
switch:admin>
To view the switch status policy threshold values:
1. Connect to the switch and log in as admin.
2. Issue the switchstatuspolicyshow command at the command line.
Whenever there is a switch change, an error message is logged and an SNMP
connUnitStatusChange trap is sent.
For the SAN Switch 2/8V, SAN Switch 2/16V, SAN Switch 2/32, and SAN Switch 4/32, the output is
similar to the following:
switch:admin> switchstatuspolicyshow
The current overall switch status policy parameters:
Down Marginal
----------------------------------
PowerSupplies 2 1
Temperatures 2 1
Fans 2 1
Flash 0 1
MarginalPorts 5 2
FaultyPorts 2 1
MissingSFPs 2 1
switch:admin>
36Performing basic configuration tasks
For the Core Switch 2/64 and the SAN Director 2/128, the output is similar to the following:
switch:admin> switchstatuspolicyshow
The current overall switch status policy parameters:
Down Marginal
----------------------------------
PowerSupplies 3 0
Temperatures 2 1
Fans 2 1
WWN 0 1
CP 0 1
Blade 0 1
Flash 0 1
MarginalPorts 2 1
FaultyPorts 2 1
MissingSFPs 0 0
switch:admin>
The policy parameter determines the number of failed or inoperable units for each contributor that
triggers a status change in the switch.
Each parameter can be adjusted so that a specific threshold must be reached before that parameter
changes the overall status of a switch to MARGINAL or DOWN. For example, if the FaultyPorts DOWN
parameter is set to 3, the status of the switch changes if 3 ports fail. Only one policy parameter needs to
pass the MARGINAL or DOWN threshold to change the overall status of the switch.
These parameters determine the status of a switch:
• Number of faulty ports
• Missing GBICs
• Power supply status
• Temperature in enclosure
• Fan speed
• Port status
• ISL status
For detailed information about setting policy parameters, refer to the HP StorageWorks Fabric OS 4.x
Fabric Watch user guide.
To set the switch status policy threshold values:
1. Connect to the switch and log in as admin.
2. Issue the switchstatuspolicyset command.
First, the current switch status policy parameter values are displayed. Then, you are prompted to enter
values for each DOWN and MARGINAL threshold parameter:
3. Verify the threshold settings you have configured for each parameter.
4. Issue the switchstatuspolicyshow command to view your current switch status policy
configuration.
Fabric OS 5.0.0 procedures user guide37
NOTE: By setting the DOWN and MARGINAL value for a parameter to 0,0 that parameter is no longer
used in setting the overall status for the switch.
For the SAN Switch 2/8V, SAN Switch 2/16V, SAN Switch 2/32, and SAN Switch 4/32, the following
example shows the command as executed on a SAN Switch 2/32. The output is similar on the SAN
Switch 2/8V, SAN Switch 2/16V, and SAN Switch 4/32:
:
switch:admin> switchstatuspolicyset
To change the overall switch status policy parameters
The current overall switch status policy parameters:
Down Marginal
--------------------------------- FaultyPorts 2 1
MissingSFPs 0 0
PowerSupplies 2 1
Temperatures 2 1
Fans 2 1
PortStatus 0 0
ISLStatus 0 0
Note that the value, 0, for a parameter, means that it is
NOT used in the calculation.
** In addition, if the range of settable values in the prompt is (0..0),
** the policy parameter is NOT applicable to the switch.
** Simply hit the Return key.
The minimum number of
FaultyPorts contributing to
DOWN status: (0..32) [2] 3
FaultyPorts contributing to
MARGINAL status: (0..32) [1] 2
MissingSFPs contributing to
DOWN status: (0..32) [0]
MissingSFPs contributing to
MARGINAL status: (0..32) [0]
Bad PowerSupplies contributing to
DOWN status: (0..2) [2]
Bad PowerSupplies contributing to
MARGINAL status: (0..2) [1]
Bad Temperatures contributing to
DOWN status: (0..5) [2]
Bad Temperatures contributing to
MARGINAL status: (0..5) [1]
Bad Fans contributing to
DOWN status: (0..6) [2]
Bad Fans contributing to
MARGINAL status: (0..6) [1]
Down PortStatus contributing to
DOWN status: (0..32) [0]
Down PortStatus contributing to
MARGINAL status: (0..32) [0]
down ISLStatus contributing to
DOWN status: (0..32) [0]
down ISLStatus contributing to
MARGINAL status: (0..32) [0]
Policy parameter set has been changed
For the Core Switch 2/64 and the SAN Director 2/128, the command output includes parameters
related to CP cards.
38Performing basic configuration tasks
3Configuring standard security features
This chapter provides information and procedures for standard Fabric OS security features. Standard
Fabric OS features include account and password management. Additional security is available when
secure mode is enabled. For information about licensed security features available in Secure Fabric OS,
refer to the HP StorageWorks Secure Fabric OS user guide.
This chapter contains the following sections:
• Ensuring network security, page 39
• Configuring the telnet interface, page 40
• Blocking listeners, page 41
• Accessing switches and fabrics, page 42
• Creating and maintaining user-defined accounts, page 43
• Changing an account password, page 45
• Setting up RADIUS AAA service, page 46
• Configuring for the SSL protocol, page 54
• Configuring for SNMP, page 60
• Configuring secure file copy, page 69
• Setting the boot PROM password, page 70
• Recovering forgotten passwords, page 73
Ensuring network security
To ensure security, Fabric OS supports secure shell (SSH) encrypted sessions. SSH encrypts all messages,
including the client’s transmission of password during login. The SSH package contains a daemon (sshd),
which runs on the switch. The daemon supports a wide variety of encryption algorithms such as
Blowfish-CBC and AES.
NOTE: To maintain a secure network, you should avoid using telnet or any other unprotected
application when you are working on the switch. For example, if you use telnet to connect to a machine,
then start an SSH or secure telnet session from that machine to the switch, the communication to the
switch is in clear text, and therefore is not secure.
The FTP protocol is also not secure. When you use FTP to copy files to or from the switch, the contents are
in clear text. This includes the remote FTP server's login and password. This limitation affects the following
commands: savecore, configupload, configdownload, and firmwaredownload.
Commands that require a secure login channel must be issued from an original SSH session. If you start
an SSH session, use the login command to start a nested SSH session, commands that require a secure
channel are rejected.
Fabric OS 5.0.0 procedures user guide39
Fabric OS v4.4.0 and later supports SSH protocol v2.0 (ssh2). For more information on SSH, see the
SSH IETF web site: http://www.ietf.org/ids.by.wg/secsh.html
Refer to SSH, The Secure Shell; The Definitive Guide, By Daniel J. Barrett and Richard Silverman;
Published by O’Reilly.
Fabric OS v4.4.0 comes with the SSH server preinstalled; however, you must select and install the SSH
client. For information on installing and configuring the F-Secure SSH client, see the web site:
http://www.f-secure.co
m
Configuring the telnet interface
Telnet is enabled by default. To prevent users from passing clear text passwords over the network when
they connect to the switch, you can disable the telnet interface.
NOTE: Before disabling the telnet interface, make sure that you have installed SSH, or some other
secure means of establishing a connection with the switch.
To disable telnet:
1. Connect to the switch and log in as admin.
HP recommends that you connect through some other means than telnet; for example, through SSH.
2. Enter the following command:
configure telnetd
3. In response to the System Services prompt, enter y.
4. In response to the telnetd prompt, enter off.
The telnet interface is disabled. If you entered the command during a standard telnet session, the
session terminates.
Example:
switch:admin> configure telnetd
Not all options will be available on an enabled switch.
To disable the switch, use the “switchDisable” command.
Configure...
ssl attributes (yes, y, no, n): [no]
http attributes (yes, y, no, n): [no]
snmp attributes (yes, y, no, n): [no]
rpcd attributes (yes, y, no, n): [no]
cfgload attributes (yes, y, no, n): [no]
[31454]: Read 1 license entries for generation 1.
[31454]: Read 1 license records.
System services (yes, y, no, n): [no] y
1. Connect to the switch through a means other than telnet (for example, SSH) and log in as admin.
2. Issue the following command:
configure telnetd
3. In response to the System Services prompt, enter y.
4. In response to the telnetd prompt, enter on.
The telnet interface is enabled.
Blocking listeners
HP StorageWorks switches block Linux® subsystem listener applications that are not used to implement
supported features and capabilities. Table 5 lists the listener applications that HP StorageWorks switches
either block or do not start.
Fabric OS 5.0.0 procedures user guide41
Table 5Blocked listener applications
Listener
application
chargenDo not startDo not start
echoDo not startDo not start
daytimeDo not startDo not start
discardDo not startDo not start
ftpDo not startDo not start
rexecBlock with packet filterDo not start
rshBlock with packet filterDo not start
rloginBlock with packet filterDo not start
timeBlock with packet filterDo not start
rstatsDo not startDo not start
rusersDo not startDo not start
Core Switch 2/64 and
SAN Director 2/128
SAN switches 2/8V, 2/16V, 2/32,
4/32
Accessing switches and fabrics
Table 6 lists the defaults for accessing hosts, devices, switches, and zones.
Table 6Access details
AreaDescription
HostsAny host can access the fabric by SNMP.
Any host can telnet to any switch in the fabric.
Any host can establish an HTTP connection to any switch in the fabric.
Any host can establish an API connection to any switch in the fabric.
DevicesAll devices can access the management server.
Any device can connect to any FC port in the fabric.
Switch AccessAny switch can join the fabric.
All switches in the fabric can be accessed through serial port.
ZoningNode WWNs can be used for WWN-based zoning.
42Configuring standard security features
Creating and maintaining user-defined accounts
In addition to the default administrative and user accounts, Fabric OS supports up to 15 user-defined
accounts in each logical switch (domain). These accounts expand your ability to track account access and
audit administrative activities.
User-defined accounts can be specified as either admin or user level. Admin-level accounts allow up to
two simultaneous login sessions. User-level accounts allow up to four simultaneous login sessions. The total
number of simultaneous login sessions allowed per logical switch is 15.
You can change passwords on user-defined accounts as described in ”Changing an account password”
on page 45.
If the Track Changes feature is enabled, the system keeps track of account names and login attempts. (See
”Tracking and controlling switch changes” on page 35 for details on enabling the Track Changes feature.)
For large enterprises, Fabric OS also supports RADIUS services, as described in ”Setting up RADIUS AAA
service” on page 46.
The following procedures are for operations you can perform on user-defined accounts.
The default administrative account is called admin.
NOTE: If you are operating in secure mode, you can perform these operations only on the primary FCS
switch.
To display account information
1. Connect to the switch and log in as admin.
2. Issue one of the following commands:
• userConfig --show -a to show all account information for a logical switch.
• userConfig --show -b to show all backup account information for a logical switch.
• userConfig --showname to show account information for the specified account name.
Accounts with the admin role can display information about all accounts on the logical switch. Accounts
with the user role can display only information about themselves.
usernameSpecifies the account name, which must begin with an alphabetic
character. The name can be from 8 to 40 characters. It is case sensitive
and can contain alphabetic and numeric characters, the dot (.), and the
underscore ( _ ). It must be different from all other account names on the
logical switch.
-r rolenameSpecifies the role: either admin or user in nonsecure mode; admin, user,
or nonfcsadmin in secure mode.
-d description Optionally, adds a description to the account. The description field can
be up to 40 printable ASCII characters long. The following characters
are not allowed: asterisk (‘), quotation mark (“), exclamation point (!),
semi-colon (;), and colon (:).
3. In response to the prompt, enter a password for the account.
The password is not displayed when you enter it on the command line.
Accounts with the admin role can create accounts. Accounts with the user role cannot.
To delete a user-defined account
1. Connect to the switch and log in as admin.
2. Issue the following command:
userConfig --delete username
where:
usernameSpecifies the account name. You cannot delete the default accounts. An
account cannot delete itself. All active CLI sessions for the deleted
account are logged out.
3. At the prompt for confirmation, enter y.
Accounts with the admin role can delete user-defined accounts on the logical switch. Accounts with the
user role cannot.
usernameAn option that changes the account attribute for username. The account
must already exist.
-r rolenameAn option that changes the role: either admin or user in nonsecure mode;
admin, user, or nonfcsadmin in secure mode.
An account cannot change its own role.
You can only change the role name of a user-defined account with a
lower level of authorization.
-d description An option: the account description. The description field can be up to 40
printable ASCII characters long. The following characters are not allowed:
asterisk (‘), quotation mark (“), exclamation point (!), semi-colon (;), and
colon (:).
You can only change the description of a user-defined account with a
lower level of authorization.
-eOptionally, enter yes to enable the account or enter no to disable it. If
you disable an account, all active CLI sessions for that account are
logged out. You can enable or disable user-defined or default accounts.
Accounts with the admin role can change information for accounts that have lesser permissions. Accounts
with the user role cannot.
To recover user-defined accounts
If a backup account exists (in secure mode), you can recover it with the following command:
userConfig --recover
The following conditions apply to recovering user accounts:
• Only accounts with admin or higher roles can recover accounts.
• The attributes in the backup database replace the attributes in the current account database.
• An event is stored in the system message log indicating that accounts have been recovered.
Changing an account password
At each level of account access, you can change passwords for that account and accounts that have
lesser privileges.
If you log in to a user account, you can only change that account’s password.
If you log in to an admin account, you can change admin and user passwords. You must provide the old
password when the account being changed has the same or higher privileges than the current login
account. For example, when logged in as admin, you need admin passwords to change passwords for
admin accounts (except when you change the default user account password at login), but you do not
need user passwords to change passwords for user accounts.
A new password must have at least one character different than the old password. The following rules
also apply to passwords:
• You cannot change passwords using SNMP.
Fabric OS 5.0.0 procedures user guide45
• Password prompting is disabled when security mode is enabled.
• Starting with Fabric OS v4.4.0, admin level accounts can use Web Tools to change passwords.
• Starting with Fabric OS v3.2.0, you cannot change default account names.
• For information on password behavior when you upgrade (or downgrade) firmware, see ”Effects of
firmware changes on accounts and passwords” on page 80.
To change the password for the current login account:
1. Connect to the switch and log in as either admin or user.
2. Issue the following command:
passwd
3. Enter the requested information at the prompts.
To change the password for a different account:
1. Connect to the switch and log in as admin.
2. Issue the following command:
passwd name
where name is the name of the account.
3. Enter the requested information at the prompts.
If the named account has lesser privileges than the current account, the old password is not required. If
the named account has equal or higher privileges than the current account, you are prompted to enter
the old password.
Setting up RADIUS AAA service
Fabric OS v3.2 and v4.4 support Remote Authentication Dial-in User Service (RADIUS) authentication,
authorization, and accounting (AAA). When it is configured for RADIUS, the switch becomes a RADIUS
client. In this configuration, authentication records are stored in the RADIUS host server database.
The RADIUS service supports accounting request and response packets so that accounting records can be
centralized on the RADIUS server. The login account name, assigned role, password, and time accounting
records are stored on the RADIUS server for each user.
By default, RADIUS service is disabled, so AAA services default to the switch local database.
To enable RADIUS service, access the CLI through an SSH connection so that the shared secret is
protected. Multiple login sessions can configure simultaneously, and the last session to apply a change
leaves its configuration in effect. After a configuration is applied, it persists after a reboot or an
HA failover.
The configuration is chassis-based, so it applies to all logical switches (domains) on the switch and
replicates itself on a standby CP card, if one is present. It is saved in a configuration upload and applied
in a configuration download.
Configure at least two RADIUS servers so that if one fails, the other assumes service. You can set the
configuration with both RADIUS service and local authentication enabled so that if all RADIUS servers do
not respond (because of power failure or network problems), the switch uses local authentication.
46Configuring standard security features
Consider the following effects of the use of RADIUS service on other Fabric OS features:
• When RADIUS service is enabled, all account passwords must be managed on the RADIUS server. The
Fabric OS mechanisms for changing switch passwords remain functional; however, such changes
affect only the involved switches locally. They do not propagate to the RADIUS server, nor do they
affect any account on the RADIUS server.
When RADIUS is set up for a fabric that contains a mix of switches running v4.4.0 and v3.2.0 or
earlier, the way a switch authenticates users depends on whether a RADIUS server is set up for that
switch. For a switch with RADIUS support and configuration, authentication bypasses the local
password database. For a switch without RADIUS support or configuration, authentication uses the
switch’s local account names and passwords.
• When Secure Fabric OS secure mode is enabled, the following items apply:
• Account passwords are distributed among all switches in the same fabric. An account that resides
on several switches has the same password on all of them. This model applies with RADIUS
integration; however, such distribution affects only the switch’s local password database.
• There are separate admin and nonfcsadmin roles in secure mode. A nonfcsadmin account on a
RADIUS server cannot access FCS switches, even if the account is properly authenticated.
• If a nonfcsadmin account on a RADIUS server logs in to a switch in nonsecure mode, the switch
treats the role like the admin role, and grants the access.
• The following items apply to Advanced Web Tools:
• Advanced Web Tools client and server keep a session open after a user is authenticated. A
password change on a switch invalidates an open session and requires the user to log in again.
When integrated with RADIUS, a switch password change on the RADIUS server does not
invalidate an existing open session, although a password change on the local switch does.
• If you cannot log in because of a RADIUS server connection problem, Advanced Web Tools
displays a message indicating server outage.
• The following items apply to API:
• When an older version of the API host library authenticates against a switch with RADIUS support,
the host performs the login. However, the old host library does not recognize the role returned from
the switch, which can result in the host displaying an incorrect read or write attribute for an
account. The switch library performs the permission check again for individual API function calls.
• API provides functions for RADIUS configuration that share the behavior of the aaaConfig CLI
command.
• The following items apply to both Advanced Web Tools and API:
• Users can log in using account names and passwords configured on the RADIUS server and gain
access with the switch roles defined there.
• Users can log in through API using account names and passwords configured on the RADIUS
server and gain access with the switch roles defined there.
• When a proxy switch is used, the switch-side component performs authentication on the proxy
switch, rather than on the destination switch. Therefore, to use RADIUS in this environment, you must
configure on the proxy switch.
Fabric OS 5.0.0 procedures user guide47
Configuring the RADIUS server
You must know the switch IP address or name to connect to switches. Use the ipaddrshow command to
display a switch IP address.
For the Core Switch 2/64 and the SAN Director 2/128 (chassis-based systems), the switch IP addresses
are aliases of the physical Ethernet interfaces on the CP cards. When specifying client IP addresses for the
logical switches in such systems, make sure that the CP card IP addresses are used. For accessing both the
active and standby CP card, and for the purpose of HA failover, both of the CP card IP addresses should
be included in the RADIUS server configuration.
User accounts should be set up by their true network-wide identity, rather than by the account names
created on a Fabric OS switch. Along with each account name, the administrator should assign
appropriate switch access roles. To manage a nonsecure fabric, these roles can be user or admin. To
manage a secure fabric, these roles can be user, admin, or nonfcsadmin.
When they log in to a switch configured with RADIUS, users enter their assigned RADIUS account names
and passwords at the prompt. After RADIUS server authenticates a user, it responds with the assigned
switch role in HP Vendor-Specific Attribute (VSA) as defined in the RFC. An Authentication-Accept response
without such VSA role assignment automatically assigns the user role.
The following sections describe how to configure a RADIUS server to support HP clients under different
operating systems.
Windows 2000
Use these procedures to add a client to the RADIUS server and create remote access policies for Fabric OS
user and admin roles.
To add a RADIUS client:
1. From the Windows Start menu, select Programs > Administrative Tools >
Internet Authentication Service to bring up the Internet Authentication Service window.
2. In the Internet Authentication Service window, right-click the RADIUS Clients folder and select New
RADIUS Client.
3. In the New RADIUS Client window:
• In the Friendly name space, enter a name for the switch that allows you to identify it easily.
• In the Client Address (IP or DNS) space, enter the IP address of the switch.
4. Click Next.
5. In the next window, enter and confirm the shared secret, in the spaces provided. Make sure the shared
secret matches that configured on the switch (as described in ”To add a RADIUS server to the switch
configuration:” on page 52).
6. Click Finish.
The new client friendly name appears in the list of clients. Should you need to change the shared secret,
right-click the client, select Properties, and change the secret in the properties window.
To create user and admin remote access policies:
1. From the Windows Start menu, select Programs > Administrative Tools >
Internet Authentication Service to bring up the Internet Authentication Service window.
2. If you do not already have Windows groups set up, use standard Windows procedures to set up a
Windows group of login names assigned to the user role and another Windows group of login names
assigned to the admin role.
3. Right-click the Remote Access Policies icon folder and select New Remote Access Policy.
4. In the New Remote Access Policy Wizard window, click Next.
48Configuring standard security features
5. In the Set Up a Custom Policy window:
a. Select the Custom policy radio button.
b. Enter a policy name for the user role (for example, HP User) in the space provided.
c. Click Next.
6. In the Select Attribute window, select Windows-Groups and click Add.
7. In the Select Groups window:
a. Enter the name of the Windows group that contains login names assigned to the user role.
b. Click Check Names.
When the system finds the Windows group, it underlines the name.
8. Click OK.
9. In the Group window, check that the Windows group is listed, and click OK.
10.In the Policy Conditions window, check that the policy name is listed (for example, HP User) and click
Next.
11.In the Permissions window, select the Grant remote access permission radio button, and click Next.
12.In the Profile window, click E
DIT PROFILE.
13.In the Edit Dial-in Profile window, click the Authentication tab.
14.In the Authentication tab:
• Uncheck these check boxes:
• Microsoft Encryption (MSCHAPv2)
• Microsoft Encryption (MSCHAP)
• Check these check boxes:
• Encrypted Authentication (CHAP)
• Unencrypted Authentication (PAP, SPAP)
15.Select the Advanced tab.
16.In the Advanced tab, click Add.
17. In the Add Attributes window, select Vendor-specific and click Add.
18.In the Multivalued Attribute Information window, click A
DD.
19. In the Vendor-Specific Attribute Information window:
a. Select the Enter Vendor Code radio button and enter 1588 in the space provided.
b. Select the Yes. It conforms. radio button.
c. Click Configure Attribute.
20.In the Configure VSA (RFC Compliant) window, enter the following information in the spaces provided:
a. Vendor-Assigned Attribute Number: 1
b. Attribute Format: string
c. Attribute Value: user
21.Click OK.
22.Click OK or Close in each window until you reach the New Remote Access Policy Wizard.
23.Click Next.
24.Click Finish.
Fabric OS 5.0.0 procedures user guide49
Linux
25.Repeat the procedure to set the admin remote access policy, with these differences:
•In step 5, enter a policy name for the admin role (for example, HP Admin) in the space provided.
•In step 7, enter the name of the Windows group that contains login names assigned to the admin
role.
•In step 20, enter admin in the Attribute Value space.
Use the following procedure on a Linux FreeRADIUS server to:
• Set up a vendor dictionary file and include it in the system dictionary file.
• Identify a switch as a RADIUS client.
• Set up user accounts and roles.
• Test the configuration.
1. Log in to the server and change directory to the RADIUS configuration file directory. Typically, this
directory is located at /usr/local/etc/raddb.
2. Use a text editor to create a vendor dictionary file called dictionary.brocade and enter the
4. Open the system dictionary file in a text editor and add this line:
$INCLUDE dictionary.brocade
The dictionary file is located in the RADIUS configuration directory.
5. Save the dictionary file.
6. Open the client.config file in a text editor and add the switches that are to be configured as
RADIUS clients. For example, to configure the switch at IP address 10.32.170.59 as a client:
client 10.32.170.59
secret= Secret
shortname= Testing Switch
nastype= other
The client.config file is located in the RADIUS configuration directory.
In this example, the switch name is Testing Switch and its shared secret is Secret. Make sure that the
shared secret matches that configured on the switch (see ”To add a RADIUS server to the switch
configuration:” on page 52).
7. Save client.config.
50Configuring standard security features
8. Open the user file in a text editor and add user names and roles for users who will be accessing the
switch. For example, to set up an account called JohnDoe with the admin role:
The user file is located in the RADIUS configuration directory.
9. Save the user file.
10.Enter this command to start the RADIUS server:
/usr/local/sbin/radiusd
11.Log in to a client switch and use the aaaconfig command to configure it as a client and enable
RADIUS service, as described in ”To add a RADIUS server to the switch configuration:” on page 52
and ”To enable or disable RADIUS service:” on page 52.
12.Log out.
When you log in to the switch again, RADIUS service is in force.
Configuring the switch
The following procedures show how to use the aaaconfig command to set up a switch for RADIUS service.
To display the current RADIUS configuration
1. Connect to the switch and log in as admin.
2. Enter this command:
switch:admin> aaaConfig --show
If a configuration exists, its parameters are displayed. If RADIUS service is not configured, only the
parameter heading line is displayed. Parameters include:
PositionThe order in which servers are contacted to provide service
ServerThe server names or IP addresses
PortThe server ports
SecretThe shared secrets
TimeoutsThe length of time servers have to respond before the next server is contacted
AuthenticationThe type of authentication being used on servers
Fabric OS 5.0.0 procedures user guide51
To add a RADIUS server to the switch configuration:
1. Connect to the switch and log in as admin.
2. Enter this command:
switch:admin> aaaConfig --add server [-pport] [-ssecret] [-t timeout]
[-a pap | chap]
where:
serverEnter either a server name or IP address. Avoid duplicating server listings
(that is, listing the same server once by name and again by IP address).
Up to five servers can be added to the configuration.
-p portOptional: enter a server port. The default is port 1812.
-s secretOptional: enter a shared secret. The default is sharedsecret. Secrets
can be from 8 to 40 alphanumeric characters long. Make sure that the
secret matches that configured on the server.
-t timeout Optional: enter the time (in seconds) the server has to respond before the
next server is contacted. The default is three seconds. Timeout values can
range from 1 to 30 seconds.
-aOptional: specify that the PAP protocol be used instead of the CHAP
protocol for packets traveling between the switch and the server.
To enable or disable RADIUS service:
1. Connect to the switch and log in as admin.
2. Issue the following command:
switch:admin> aaaConfig --radius on | off
Specifying on enables the service; specifying off disables it.
At least one RADIUS server must be configured before you can enable RADIUS service.
If no RADIUS configuration exists, turning it on triggers an error message. When the command succeeds,
the event log indicates that the configuration is enabled or disabled.
To delete a RADIUS server from the configuration:
1. Connect to the switch and log in as admin.
2. Issue the following command:
switch:admin> aaaConfig --remove server | all
where:
serverServers are listed by either name or IP address. Enter either the name or IP
address of the server to be removed.
allEnter this keyword to remove all servers. If RADIUS service is enabled, this
removes all but the server in the first position. If RADIUS service is
disabled, all servers are removed.
3. At the prompt, enter y to complete the command.
When the command succeeds, the event log indicates that the server is removed.
52Configuring standard security features
To change a RADIUS server configuration:
1. Connect to the switch and log in as admin.
2. Issue the following command:
switch:admin> aaaConfig --change server [-p port] [-s secret] [-t
timeout] [-a pap | chap]
where:
serverServers are listed by either name or IP address. Enter either the name or IP
address of the server to be changed.
-p portOptional: enter a server port.
-s secretOptional: enter a shared secret.
-t timeoutOptional: enter the length of time (in seconds) the server has to respond
before the next server is contacted.
-a pap | chap Optional: specify that the PAP protocol be used instead of the CHAP
protocol for packets traveling between the switch and the server.
To change the order in which RADIUS servers are contacted for service:
1. Connect to the switch and log in as admin.
2. Issue the following command:
switch:admin> aaaConfig --moveserverto_position
where:
serverServers are listed by either name or IP address. Enter either the name or IP
address of the server whose position is to be changed.
to_positionEnter the position number to which the server is to be moved.
When the command succeeds, the event log indicates that a server configuration changed.
Enabling and disabling local authentication
It is useful to enable local authentication so that the switch can take over authentication locally if the
RADIUS servers fail to respond because of power outage or network problems. To enable or disable local
authentication, issue the following command:
switch:admin> aaaConfig --switchdb on | off
Specifying on enables local authentication; specifying off disables it.
When local authentication is enabled and RADIUS servers fail to respond, you can log in to the default
switch accounts (admin and user) or any user-defined account. You must know the passwords of these
accounts.
RADIUS authentication must be enabled when local database authentication is turned off from the on
state; otherwise, an error is returned.
Because local database authentication may be automatically disabled or enabled when enabling or
disabling RADIUS authentication, you should set the local database authentication explicitly to enabled or
disabled after setting the desired RADIUS authentication configuration.
When the command succeeds, the event log indicates that local database authentication is disabled
or enabled.
Fabric OS 5.0.0 procedures user guide53
Configuring for the SSL protocol
Fabric OS v4.4.0 and later supports secure sockets layer (SSL) protocol, which provides secure access to a
fabric through web-based management tools like Advanced Web Tools. SSL support is a standard Fabric
OS feature; it is independent of Secure Fabric OS, which requires a license and separate certification.
Switches configured for SSL grant access to management tools through hypertext transfer protocol-secure
links (which begin with https://) instead of standard links (which begin with http://).
SSL uses public key infrastructure (PKI) encryption to protect data transferred over SSL connections. PKI is
based on digital certificates obtained from an Internet Certificate Authority (CA), which acts as the trusted
key agent.
Certificates are based on the switch IP address or fully qualified domain name (FQDN), depending on the
issuing CA. If you change a switch IP address or FQDN after activating an associated certificate, you
might have to obtain and install a new certificate. Check with the CA to verify this possibility, and plan
these types of changes accordingly.
Browser and JavaTM support
Fabric OS supports the following Web browsers for SSL connections:
• Internet Explorer (Microsoft Windows)
• Mozilla (Solaris and Redhat Linux)
In countries that allow the use of 128-bit encryption, you should use the latest version of your browser. For
example, Internet Explorer 6.0 and later supports 128-bit encryption by default. You can display the
encryption support (called “cipher strength”) using the Internet Explorer Help:About menu option. If you
are running an earlier version of Internet Explorer, you might be able to download an encryption patch
from the Microsoft Web site at http://www.microsoft.com
.
You should upgrade to the Java 1.4.2_03 Plug-in on your management workstation. To find the Java
version that is currently running, open the Java console and look at the first line of the window.
For more details on levels of browser and Java support, refer to the HP StorageWorks Fabric OS 4.x Advanced Web Tools user guide.
Summary of SSL procedures
You configure for SSL by obtaining, installing, and activating digital certificates for SSL support.
Certificates are required on all switches that are to be accessed through SSL.
You also need to install a certificate to the Java Plug-in on the management workstation, and you might
need to add a certificate to your Web browser.
Configuring for SSL involves these major steps, which are shown in detail in the next sections:
1. Choose a CA.
2. On each switch:
a. Generate a public/private key (seccertutil genkey command).
b. Generate a certificate signing request (CSR) (seccertutil gencsr command) and store the CSR on an
FTP server (seccertutil export command).
3. Obtain the certificates from the CA.
54Configuring standard security features
You can request a certificate from a CA through a Web browser. After you request a certificate, the CA
either sends certificate files by e-mail (public) or gives access to them on a remote host (private).
Typically, the CA provides the certificate files listed in Table 7.
Table 7SSL certificate files
Certificate fileDescription
name.crtThe switch certificate.
nameRoot.crtThe root certificate. Typically, this certificate is already installed
nameCA.crtThe CA certificate. It is not necessary to install this, but you can if
4. On each switch:
a. Install the certificate.
b. Activate the certificate.
5. If necessary, install the root certificate to the browser on the management workstation.
6. Add the root certificate to the Java Plug-in keystore on the management workstation.
Choosing a CA
To ease maintenance and allow secure out-of-band communication between switches, consider using one
CA to sign all management certificates for a fabric. If you use different CAs, management services operate
correctly, but the Web Tools Fabric Events button is unable to retrieve events for the entire fabric.
in the browser, but if not, you must install it.
you want the CA name to be displayed in the browser window.
Table 8 lists recommended Certificate Authorities. Each CA has slightly different requirements; for
example, some generate certificates based on IP address, while others require an FQDN, and most
require a 1024-bit public/private key while some might accept a 2048-bit key. Consider your fabric
configuration, check CA Web sites for requirements, and gather all the information that the CA requires.
Table 8Recommended CAs
Certificate authorityWeb Site
Verisignwww.verisign.com
Entrustwww.entrust.com
InstantSSLwww.instantssl.com
GeoTrustwww.geotrust.com
Generating a public/private key
Perform this procedure on each switch:
1. Connect to the switch and log in as admin.
2. Issue the following command to generate a public/private key pair:
switch:admin> seccertutil genkey
The system reports that this process disables secure protocols, delete any existing CSR, and delete any
existing certificates.
Fabric OS 5.0.0 procedures user guide55
3. Respond to the prompts to continue and select the key size:
Continue (yes, y, no, n): [no] y
Select key size [1024 or 2048]: 1024
Generating new rsa public/private key pair
Done.
Because CA support for the 2048-bit key size is limited, you should select 1024 in most cases.
Generating and storing a CSR
After generating a public/private key (see ”Generating a public/private key” on page 55 earlier),
perform this procedure on each switch:
1. Connect to the switch and log in as admin.
2. Issue the following command:
switch:admin> seccertutil gencsr
3. Enter the requested information:
Country Name (2 letter code, eg, US):US
State or Province Name (full name, eg, California):California
Locality Name (eg, city name):San Jose
Organization Name (eg, company name):HP
Organizational Unit Name (eg, department name):Eng
Common Name (Fully qualified Domain Name, or IP address): 192.1.2.3
Generating CSR, file name is: 192.1.2.3.csr
Done.
Your CA might require specific codes for Country, State or Province, Locality, Organization, and
Organizational Unit names. Make sure that your spelling is correct and matches the CA requirements.
If the CA requires that the Common Name be specified as an FQDN, make sure that the fully qualified
domain name is set on the domain Name Server.
4. Issue the following command to store the CSR:
switch:admin> seccertutil export
5. Enter the requested information:
Select protocol [ftp or scp]: ftp
Enter IP address: 192.1.2.3
Enter remote directory: path_to_remote_directory
Enter Login Name: your account
Enter Password: your password
Success: exported CSR.
If you are set up for secure file copy protocol, you can select it; otherwise, select ftp. Enter the IP
address of the switch on which you generated the CSR. Enter the remote directory name of the FTP
server to which the CSR is to be sent. Enter your account name and password on the server.
56Configuring standard security features
Obtaining certificates
Check the instructions on the CA web site; then, perform this procedure for each switch:
1. Generate and store the CSR as described in ”Generating and storing a CSR” on page 56.
2. Open a Web browser window on the management workstation and go to the CA web site. Follow the
instructions to request a certificate. Locate the area in the request form that is provided for you to paste
the CSR.
3. Through a telnet window, connect to the switch and log in as admin.
4. Issue the following command:
switch:admin> seccertutil showcsr
The contents of the CSR is displayed.
5. Locate the section that begins with BEGIN CERTIFICATE REQUEST and ends with END CERTIFICATE
REQUEST.
6. Copy and paste this section (including the BEGIN and END lines) into the area provided in the request
form; then, follow the instructions to complete and send the request.
It may take several days to receive the certificates. If the certificates arrive by e-mail, save them to an FTP
server. If the CA provides access to the certificates on an FTP server, make note of the path name and
make sure you have a login name and password on the server.
Installing a switch certificate
Perform this procedure on each switch:
1. Connect to the switch and log in as admin.
2. Issue the following command:
switch:admin> seccertutil import
3. Select a protocol, enter the IP address of the host on which the switch certificate is saved, and enter
your login name and password:
Select protocol [ftp or scp]: ftp
Enter IP address: 192.10.11.12
Enter remote directory: path_to_remote_directory
Enter certificate name (must have “.crt” suffix):192.1.2.3.crt
Enter Login Name: your_account
Enter Password: *****
Success: imported certificate [192.1.2.3.crt].
To use this certificate, run the configure command to activate it
The certificate downloads to the switch.
Fabric OS 5.0.0 procedures user guide57
Activating a switch certificate
Enter the configure command and respond to the prompts that apply to SSL certificates:
SSL attributesEnter yes.
Certificate FileEnter the name of the switch certificate file: for example,
192.1.2.3.crt.
CA Certificate FileIf you want the CA name to be displayed in the browser
window, enter the name of the CA certificate file; otherwise, skip
this prompt.
Select length of crypto keyEnter the encryption key length (40, 56, or 128).
HTTP attributesEnter yes.
Secure HTTP enabledEnter yes.
Example
Configure...
System services (yes, y, no, n): [no]
ssl attributes (yes, y, no, n): [no] yes
Certificate File. (filename or none): [10.33.13.182.crt] 192.1.2.3.crt
CA Certificate File. (filename or none): [none]
Select length of crypto key.
(Valid values are 40, 56, and 128.): (40..128) [128]
http attributes (yes, y, no, n): [no] yes
HTTP Enabled (yes, y, no, n): [yes] no
Secure HTTP Enabled (yes, y, no, n): [no] yes
After you exit the configure command, the HTTP daemon restarts automatically to handle HTTPS requests.
Configuring the browser
The root certificate might already be installed on your browser, but if not, you must install it. To see
whether it is already installed, check the certificate store on your browser.
The next procedures are guides for installing root certificates to Internet Explorer and Mozilla browsers.
For more detailed instructions, refer to the documentation that came with the certificate.
To check and install root certificates on Internet Explorer:
1. From the browser Tools menu, select Internet Options.
2. Select the Content tab.
3. Click Certificates.
4. Click the various tabs and scroll the lists to see if the root certificate is listed. If it is listed, you do not
need to install it.
5. If the certificate is not listed, click Import.
6. Follow the instructions in the Certificate Import wizard to import the certificate.
To check and install root certificates on Mozilla:
1. From the browser Edit menu, select Preferences.
2. In the left pane of the Preferences window, expand the Privacy & Security list and select Certificates.
3. In the right pane, click Manage Certificates.
4. In the next window, click the Authorities tab.
58Configuring standard security features
5. Scroll the authorities list to see if the root certificate is listed. (For example, its name may have the form
nameRoot.crt.) If it is listed, you do not need to install it; forgo the remainder of this procedure.
6. If the certificate is not listed, click Import.
7. Browse to the certificate location and select the certificate. (For example, select nameRoot.crt.)
8. Click Open and follow the instructions to import the certificate.
Installing a root certificate to the Java Plug-in
For information on Java requirements, see ”Browser and Javatm support” on page 54.
This procedure is a guide for installing a root certificate to the Java Plug-in on the management
workstation. If the root certificate is not already installed to the plug-in, you should install it. For more
detailed instructions, refer to the documentation that came with the certificate and to the Sun Microsystems
Web site (www.sun.com
1. Copy the root certificate file from its location on the FTP server to the Java Plug-in bin. For example, the
bin location might be:
C: \program files\java\j2re1.4.2_03\bin
2. Open a Command Prompt window and change directory to the Java Plug-in bin.
3. Issue the keytool command and respond to the prompts:
Enter keystore password: changeit
Owner: CN=HP, OU=Software, O=HP Communications, L=San Jose, ST=California, C=US
Issuer: CN=HP, OU=Software, O=HP Communications, L=San Jose, ST=California, C=US
Serial number: 0
Valid from: Thu Jan 15 16:27:03 PST 2004 until: Sat Feb 14 16:27:03 PST 2004
Certificate fingerprints:
MD5: 71:E9:27:44:01:30:48:CC:09:4D:11:80:9D:DE:A5:E3
SHA1: 06:46:C5:A5:C8:6C:93:9C:FE:6A:C0:EC:66:E9:51:C2:DB:E6:4F:A1
Trust this certificate? [no]: yes
Certificate was added to keystore
In the example, changeit is the default password and RootCert is an example root certificate name.
Displaying and deleting certificates
Table 9 summarizes the commands for displaying and deleting certificates. For details on the commands,
refer to the HP StorageWorks Fabric OS 4.x command reference guide.
Table 9Commands for displaying and deleting SSL certificates
CommandDescription
seccertutil show Displays the state of the SSL key and a list of installed certificates.
seccertutil show filename Displays the contents of a specific certificate.
seccertutil showcsr Displays the contents of a CSR.
seccertutil delete filenameDeletes a specified certificate.
seccertutil delcsr Deletes a CSR.
Fabric OS 5.0.0 procedures user guide59
Troubleshooting certificates
If you receive messages in the browser or in a pop-up window when logging in to the target switch using
HTTPS, see Table 10.
Table 10 SSL messages and actions
MessageAction
The page cannot be displayedThe SSL certificate is not installed correctly or HTTPS
is not enabled correctly. Make sure that the certificate
has not expired, that HTTPS is enabled, and that
certificate file names are configured correctly.
The security certificate was issued by a
company you have not chosen to
trust….
The security certificate has expired or
is not yet valid
The name on the security certificate is
invalid or does not match the name of
the site file
This page contains both secure and
nonsecure items. Do you want to
display the nonsecure items?
Configuring for SNMP
You can configure for the automatic transmission of Simple Network Management Protocol (SNMP)
information to management stations. SNMPv3 and SNMPv1 are supported.
The configuration process involves configuring the SNMP agent and configuring SNMP traps. The
following commands are used in the process:
The certificate is not installed in the browser. Install it
as described in ”Configuring the browser” on
page 58.
Either the certificate file is corrupted or it needs to be
updated. Click View Certificate to verify the certificate
content. If it is corrupted or out of date, obtain and
install a new certificate.
The certificate is not installed correctly in the Java
Plug-in. Install it as described in ”Installing a root
certificate to the Java Plug-in” on page 59.
Click No in this pop-up window. The session opens
with a closed lock on the lower-right corner of the
browser, indicating an encrypted connection.
• Use the configure command to set the security level. You can specify no security, authentication
only, or authentication and privacy.
• Use the snmpconfig command to configure the SNMP agent and traps for SNMPv3 or
SNMPv1 configurations.
• If necessary for backward compatibility, you can use these legacy commands to configure for SNMP
v1:
•Use the agtcfgshow, agtcfgset, and agtcfgdefault commands to configure the SNMPv1
agent.
•Use the snmpmibcapset command to filter at the trap level and the snmpmibcapshow
command to display the trap filter values.
Associated with the HP-specific StorageWorks MIB (SW-MIB), this Management Information Base
(MIB) monitors HP StorageWorks switches specifically.
• Fibre Alliance MIB trap
Associated with the Fibre Alliance MIB (FA-MIB), this MIB manages SAN switches and devices from
any company that complies with Fibre Alliance specifications.
60Configuring standard security features
If you use both SW-MIB and FA-MIB, you may receive duplicate information. You can disable the FA-MIB,
but the SW-MIB cannot be disabled.
You can also use these additional MIBs and their associated traps:
• HA-MIB (for the Core Switch 2/64 and SAN Director 2/128)
• SW-EXTTRAP includes the swSsn (Software Serial Number) as a part of HP SW traps. It is also used
with the legacy SAN Switched Integrated/64 to provide detailed group information for a particular
trap.
For more information on HP support for SNMP, refer to the HP StorageWorks Fabric OS 4.x features overview guide.
For information on HP MIBs, refer to the HP StorageWorks Fabric OS 4.x Management Information Base reference guide.
For information on the specific commands used in these procedures, refer to online help or to the HP StorageWorksFabric OS 4,x command reference guide.
Setting the security level
Use the configure command to set the security level (called SNMP attributes). You can specify no
security, authentication only, or authentication and privacy. For example, to configure for authentication
and privacy:
switch:admin> configure
Not all options will be available on an enabled switch.
To disable the switch, use the “switchDisable” command.
Configure...
System services (yes, y, no, n): [no]
ssl attributes (yes, y, no, n): [no]
http attributes (yes, y, no, n): [no]
snmp attributes (yes, y, no, n): [no] y
Use the snmpconfig --set command to change either the SNMPv3 or SNMPv1 configuration. You
can also change access control, MIB capability, and system group.
Fabric OS 5.0.0 procedures user guide61
To change the SNMPv3 configuration, use the following as an example:
SNMPv3 trap recipient configuration:
Trap Recipient's IP address in dot notation: [0.0.0.0]
192.168.45.90
UserIndex: (1..6) [1]
Trap recipient Severity level : (0..5) [0] 4
Trap Recipient's IP address in dot notation: [0.0.0.0]
192.168.45.92
UserIndex: (1..6) [2]
Trap recipient Severity level : (0..5) [0] 2
Trap Recipient's IP address in dot notation: [0.0.0.0]
Trap Recipient's IP address in dot notation: [0.0.0.0]
Trap Recipient's IP address in dot notation: [0.0.0.0]
Trap Recipient's IP address in dot notation: [0.0.0.0]
Committing configuration...done.
62Configuring standard security features
To change the SNMPv1 configuration, use the following as an example:
switch:admin> snmpconfig --set snmpv1
SNMP community and trap recipient configuration:
Community (rw): [Secret C0de] admin
Trap Recipient's IP address in dot notation: [0.0.0.0] 10.32.225.1
Trap recipient Severity level : (0..5) [0] 1
Community (rw): [OrigEquipMfr]
Trap Recipient's IP address in dot notation: [10.32.225.2]
Trap recipient Severity level : (0..5) [1]
Community (rw): [private]
Trap Recipient's IP address in dot notation: [10.32.225.3]
Trap recipient Severity level : (0..5) [2]
Community (ro): [public]
Trap Recipient's IP address in dot notation: [10.32.225.4]
Trap recipient Severity level : (0..5) [3]
Community (ro): [common]
Trap Recipient's IP address in dot notation: [10.32.225.5]
Trap recipient Severity level : (0..5) [4]
Community (ro): [FibreChannel]
Trap Recipient's IP address in dot notation: [10.32.225.6]
Trap recipient Severity level : (0..5) [5]
Committing configuration...done.
To change the accessControl configuration, use the following as an example:
switch:admin> snmpconfig --set accessControl
SNMP access list configuration:
Access host subnet area in dot notation: [0.0.0.0] 192.168.0.0
Read/Write? (true, t, false, f): [true]
Access host subnet area in dot notation: [0.0.0.0] 10.32.148.0
Read/Write? (true, t, false, f): [true] f
Access host subnet area in dot notation: [0.0.0.0]
Read/Write? (true, t, false, f): [true]
Access host subnet area in dot notation: [0.0.0.0] 10.33.0.0
Read/Write? (true, t, false, f): [true] f
Access host subnet area in dot notation: [0.0.0.0]
Read/Write? (true, t, false, f): [true]
Access host subnet area in dot notation: [0.0.0.0]
Read/Write? (true, t, false, f): [true]
Committing configuration...done.
Fabric OS 5.0.0 procedures user guide63
To display the mibCapability configuration, use the following as an example:
switch:admin> snmpconfig --show mibCapability
FA-MIB: YES
FICON-MIB: YES
HA-MIB: YES
SW-TRAP: YES
swFCPortScn: YES
swEventTrap: YES
swFabricWatchTrap: YES
swTrackChangesTrap: NO
FA-TRAP: YES
connUnitStatusChange: YES
connUnitEventTrap: NO
connUnitSensorStatusChange: YES
connUnitPortStatusChange: YES
SW-EXTTRAP: NO
FICON-TRAP: NO
HA-TRAP: YES
fruStatusChanged: YES
cpStatusChanged: YES
fruHistoryTrap: NO
To change the systemGroup configuration to default, use the following as an example:
switch:admin> snmpconfig --default systemGroup
*****
This command will reset the agent's system group configuration back
to factory default
*****
sysDescr = Fibre Channel Switch
sysLocation = End User Premise
sysContact = Field Support
authTraps = 0 (OFF)
*****
Are you sure? (yes, y, no, n): [no] y
Using legacy commands for SNMPv1
Use the snmpconfig command to configure the SNMPv1 agent and traps (see ”Using the snmpconfig
command” on page 61). However, if necessary for backward compatibility, you can choose to use
legacy commands.
64Configuring standard security features
Use the agtcfgshow command to display SNMP agent configuration information. For example:
switch:admin> agtcfgshow
Current SNMP Agent Configuration
Customizable MIB-II system variables:
sysDescr = FC Switch
sysLocation = End User Premise
sysContact = Field Support.
authTraps = 1 (ON)
SNMPv1 community and trap recipient configuration:
Community 1: Secret C0de (rw)
Trap recipient: 192.168.1.51
Trap recipient Severity level: 4
Community 2: OrigEquipMfr (rw)
Trap recipient: 192.168.1.26
Trap recipient Severity level: 0
Community 3: private (rw)
No trap recipient configured yet
Community 4: public (ro)
No trap recipient configured yet
Community 5: common (ro)
No trap recipient configured yet
Community 6: FibreChannel (ro)
No trap recipient configured yet
SNMP access list configuration:
Entry 0: Access host subnet area 192.168.64.0 (rw)]
Entry 1: No access host configured yet
Entry 2: No access host configured yet
Entry 3: No access host configured yet
Entry 4: No access host configured yet
Entry 5: No access host configured yet
Fabric OS 5.0.0 procedures user guide65
Use the agtcfgset command to modify the SNMP configuration values. For example:
switch:admin> agtcfgset
Customizing MIB-II system variables ...
At each prompt, do one of the followings:
o <Return> to accept current value,
o enter the appropriate new value,
o <Control-D> to skip the rest of configuration, or
o <Control-C> to cancel any change.
To correct any input mistake:
<Backspace> erases the previous character,
<Control-U> erases the whole line,
sysDescr: [FC Switch]
sysLocation: [End User Premise]
sysContact: [Field Support.]
authTrapsEnabled (true, t, false, f): [true]
SNMP community and trap recipient configuration:
Community (rw): [Secret C0de]
Trap Recipient's IP address in dot notation: [192.168.1.51]
Trap recipient Severity level : (0..5) [0] 3
Community (rw): [OrigEquipMfr]
Trap Recipient's IP address in dot notation: [192.168.1.26]
Trap recipient Severity level : (0..5) [0]
Community (rw): [private]
Trap Recipient's IP address in dot notation: [0.0.0.0] 192.168.64.88
Trap recipient Severity level : (0..5) [0] 1
Community (ro): [public]
Trap Recipient's IP address in dot notation: [0.0.0.0]
Community (ro): [common]
Trap Recipient's IP address in dot notation: [0.0.0.0]
Community (ro): [FibreChannel]
Trap Recipient's IP address in dot notation: [0.0.0.0]
SNMP access list configuration:
Access host subnet area in dot notation: [0.0.0.0] 192.168.64.0
Read/Write? (true, t, false, f): [true]
Access host subnet area in dot notation: [0.0.0.0]
Read/Write? (true, t, false, f): [true]
Access host subnet area in dot notation: [0.0.0.0]
Read/Write? (true, t, false, f): [true]
Access host subnet area in dot notation: [0.0.0.0]
Read/Write? (true, t, false, f): [true]
Access host subnet area in dot notation: [0.0.0.0]
Read/Write? (true, t, false, f): [true]
Access host subnet area in dot notation: [0.0.0.0]
Read/Write? (true, t, false, f): [true]
Committing configuration...done.
value = 1 = 0x1
66Configuring standard security features
Use the agtcfgdefault command to reset the SNMP agent configuration to default values. For
example:
switch:admin> agtcfgdefault
*****
This command will reset the agent's configuration back to factory default
*****
Current SNMP Agent Configuration
Customizable MIB-II system variables:
sysDescr = Fibre Channel Switch.
sysLocation = End User Premise
sysContact = sweng
authTraps = 0 (OFF)
SNMPv1 community and trap recipient configuration:
Community 1: Secret C0de (rw)
Trap recipient: 192.168.15.41
Trap recipient Severity level: 4
Community 2: OrigEquipMfr (rw)
No trap recipient configured yet
Community 3: private (rw)
No trap recipient configured yet
Community 4: public (ro)
No trap recipient configured yet
Community 5: common (ro)
No trap recipient configured yet
Community 6: FibreChannel (ro)
No trap recipient configured yet
SNMP access list configuration:
Entry 0: Access host subnet area 192.168.64.0 (rw)]
Entry 1: No access host configured yet
Entry 2: No access host configured yet
Entry 3: No access host configured yet
Entry 4: No access host configured yet
Entry 5: No access host configured yet
*****
Are you sure? (yes, y, no, n): [no] y
Committing configuration...done.
agent configuration reset to factory default
Current SNMP Agent Configuration
Customizable MIB-II system variables:
sysDescr = Fibre Channel Switch.
sysLocation = End User Premise
sysContact = Field Support.
authTraps = 0 (OFF)
SNMPv1 community and trap recipient configuration:
Community 1: Secret C0de (rw)
No trap recipient configured yet
Community 2: OrigEquipMfr (rw)
No trap recipient configured yet
Community 3: private (rw)
No trap recipient configured yet
Community 4: public (ro)
No trap recipient configured yet
Community 5: common (ro)
No trap recipient configured yet
Community 6: FibreChannel (ro)
No trap recipient configured yet
(output truncated)
Fabric OS 5.0.0 procedures user guide67
Use the snmpmibcapset command to modify the options for configuring SNMP MIB traps. For
example:
switch:admin> snmpmibcapset
The SNMP Mib/Trap Capability has been set to support
FE-MIB
SW-MIB
FA-MIB
FA-TRAP
FA-MIB (yes, y, no, n): [yes]
FICON-MIB (yes, y, no, n): [no] y
HA-MIB (yes, y, no, n): [no] y
SW-TRAP (yes, y, no, n): [no] y
swFCPortScn (yes, y, no, n): [no]
swEventTrap (yes, y, no, n): [no]
swFabricWatchTrap (yes, y, no, n): [no]
swTrackChangesTrap (yes, y, no, n): [no]
FA-TRAP (yes, y, no, n): [yes]
connUnitStatusChange (yes, y, no, n): [no]
connUnitEventTrap (yes, y, no, n): [no]
connUnitSensorStatusChange (yes, y, no, n): [no]
connUnitPortStatusChange (yes, y, no, n): [no]
SW-EXTTRAP (yes, y, no, n): [no] y
FICON-TRAP (yes, y, no, n): [no] y
linkRNIDDeviceRegistration (yes, y, no, n): [no]
linkRNIDDeviceDeRegistration (yes, y, no, n): [no]
linkLIRRListenerAdded (yes, y, no, n): [no]
linkLIRRListenerRemoved (yes, y, no, n): [no]
linkRLIRFailureIncident (yes, y, no, n): [no]
HA-TRAP (yes, y, no, n): [no] y
fruStatusChanged (yes, y, no, n): [no]
cpStatusChanged (yes, y, no, n): [no]
fruHistoryTrap (yes, y, no, n): [no]
Avoid-Duplicate-TRAP (yes, y, no, n): [no] y
switch:admin>
These notes apply to snmpmibcapset parameters for the FA-TRAP:
• connUnitStatusChange indicates that the overall status of the connectivity unit has changed. Its
variables are:
• connUnitStatus is the status of the connection unit
• connUnitState is the state of the connection unit
• connUnitEventTrap indicates that the connectivity unit has generated an event. Its variables are:
• connUnitEventId is the internal event ID
• connUnitEventType is the type of this event
• connUnitEventObject is used with the connUnitEventType to identify the object to which the
event refers.
• connUnitEventDescr is the description of the event.
• connUnitSensorStatusChange indicates that the status of the sensor associated with the
connectivity unit has changed.
• connUnitSensorStatus is the status indicated by the sensor.
68Configuring standard security features
• connUnitPortStatusChange indicates that the status of the sensor associated with the
connectivity unit has changed.
• connUnitPortStatus shows overall protocol status for the port.
• connUnitPortState shows the user-specified state of the port hardware.
Use the snmpmibcapshow command to view the SNMP MIB trap setup. For example:
Use the configure command to specify that secure file copy (scp) be used for configuration uploads
and downloads. For example:
switch:admin> configure
Not all options will be available on an enabled switch.
To disable the switch, use the “switchDisable” command.
Configure...
System services (yes, y, no, n): [no] n
ssl attributes (yes, y, no, n): [no] n
http attributes (yes, y, no, n): [no] n
snmp attributes (yes, y, no, n): [no] n
rpcd attributes (yes, y, no, n): [no] n
cfgload attributes (yes, y, no, n): [no] y
Enforce secure config Upload/Download (yes, y, no, n): [no] y
switch:admin>
Fabric OS 5.0.0 procedures user guide69
Setting the boot PROM password
The boot PROM password provides an additional layer of security by protecting the boot PROM from
unauthorized use. Setting a recovery string for the boot PROM password enables you to recover a lost
boot PROM password by contacting your switch service provider. Without the recovery string, a lost boot
PROM password cannot be recovered.
You should set the boot PROM password and the recovery string on all switches, as described in ”With a
recovery string” on page 70. If your site procedures dictate that you set the boot PROM password without
the recovery string, refer to ”Without a recovery string” on page 72.
With a recovery string
To set the boot PROM password with a recovery string, refer to the section that applies to your
switch model.
NOTE: Setting the boot PROM password requires accessing the boot prompt, which stops traffic flow
through the switch until the switch is rebooted. You should perform this procedure during a planned down
time.
For the SAN Switch 2/8V, SAN Switch 2/16V, SAN Switch 2/32, and SAN Switch 4/32, follow this
procedure to set the boot PROM password with a recovery string:
1. Connect to the serial port interface as described in ”To connect through the serial port:” on page 20.
2. Reboot the switch.
3. Press ESC within four seconds after the message Press escape within 4 seconds appears.
The following options are available:
• 1 Start systemContinues the system boot process
• 2 Recovery passwordLets you set the recovery string and the boot PROM password.
• 3 Enter command shellProvides access to boot parameters
4. Enter 2.
If no password was previously set, the following message appears:
Recovery password is NOT set. Please set it now.
If a password was previously set, the following messages appear:
Send the following string to Customer Support for password recovery:
afHTpyLsDo1Pz0Pk5GzhIw==
Enter the supplied recovery password.
Recovery Password:
5. Enter the recovery password (string).
The recovery string must be between 8 and 40 alphanumeric characters. HP recommends a random
string that is 15 characters or longer for higher security. The firmware prompts for this password only
once. It is not necessary to remember the recovery string because it is displayed the next time you enter
the command shell.
The following prompt appears:
New password:
70Configuring standard security features
6. Enter the boot PROM password and then reenter it when prompted. The password must be 8
alphanumeric characters (any additional characters are not recorded). Record this password for
future use.
The new password is automatically saved (the saveenv command is not required).
7. Reboot the switch.
For the Core Switch 2/64 and the SAN Director 2/128, the boot PROM and recovery passwords must be
set for each CP card on those switches:
1. Connect to the serial port interface on the standby CP card, as described in ”To connect through the
serial port:” on page 20.
2. Connect to the active CP card by serial or telnet and enter the hadisable command to prevent
failover during the remaining steps.
3. For the Core Switch 2/64, reboot the standby CP card by pressing the yellow ejector buttons at top
and bottom of the CP card and then pressing both ejector handles back towards the switch to lock the
card back into the slot.
For the SAN Director 2/128, reboot the standby CP card by sliding the On/Off switch on the ejector
handle of the standby CP card to Off, and then back to On.
4. Press ESC within four seconds after the message Press escape within 4 seconds appears.
The following options are available:
• 1 Start systemContinues the system boot process
• 2 Recovery passwordLets you set the recovery string and the boot PROM password
• 3 Enter command shellProvides access to boot parameters
5. Enter 2.
If no password was previously set, the following message appears:
Recovery password is NOT set. Please set it now.
If a password was previously set, the following messages appear:
Send the following string to Customer Support for password recovery:
afHTpyLsDo1Pz0Pk5GzhIw==
Enter the supplied recovery password.
Recovery Password:
6. Enter the recovery password (string).
The recovery string must be between 8 and 40 alphanumeric characters. HP recommends a random
string that is 15 characters or longer for higher security. The firmware prompts for this password only
once. It is not necessary to remember the recovery string because it is displayed the next time you enter
the command shell.
The following prompt appears:
New password:
7. Enter the boot PROM password and then reenter it when prompted. The password must be 8
alphanumeric characters (any additional characters are not recorded). Record this password for
future use.
The new password is automatically saved (the saveenv command is not required).
8. Connect to the active CP card by serial or telnet and enter the haenable command to restore HA,
and then fail over the active CP card by entering the hafailover command.
Traffic flow through the active CP card resumes when the failover is complete.
Fabric OS 5.0.0 procedures user guide71
9. Connect the serial cable to the serial port on the new standby CP card (previously the active CP card).
10.Repeat step 2 through step 7 for the new standby CP card (each CP card has a separate boot
PROM password).
11.Connect to the active CP card by serial or telnet and enter the haenable command to restore
high availability.
Without a recovery string
Although you can set the boot PROM password without also setting the recovery string, HP recommends
that you set both the password and the string as described in ”With a recovery string” on page 70. If
your site procedures dictate that you must set the boot PROM password without the string, follow the
procedure that applies to your switch model.
NOTE: Setting the boot PROM password requires accessing the boot prompt, which stops traffic flow
through the switch until the switch is rebooted. You should perform this procedure during a planned down
time.
For the SAN Switch 2/8V, SAN Switch 2/16V, SAN Switch 2/32, and SAN Switch 4/32, follow this
procedure to set the boot PROM password without a recovery string.
1. Create a serial connection to the switch as described in ”To connect through the serial port:” on
page 20.
2. Reboot the switch by issuing the reboot command.
3. Press ESC within four seconds after the message Press escape within 4 seconds appears.
The following options are available:
• 1 Start systemContinues the system boot process
• 2 Recovery passwordLets you set the recovery string and the boot PROM password
• 3 Enter command shellProvides access to boot parameters
4. Enter 3.
5. Enter the passwd command at the shell prompt.
NOTE: The passwd command applies to the boot PROM password only when it is entered from the
boot interface.
6. Enter the boot PROM password at the prompt and then reenter it when prompted. The password must
be 8 alphanumeric characters (any additional characters are not recorded). Record this password for
future use.
7. Issue the saveenv command to save the new password.
8. Reboot the switch by issuing the reset command.
For the Core Switch 2/64 and the SAN Director 2/128, set the password on the standby CP card, fail
over, and then set the password on the previously active (now standby) CP card to minimize disruption to
the fabric:
1. Determine the active CP card by opening a telnet session to either CP card, connecting as admin, and
entering the hashow command.
2. Connect to the active CP card by serial or telnet and enter the hadisable command to prevent
failover during the remaining steps.
72Configuring standard security features
3. Create a serial connection to the standby CP card as described in ”To connect through the serial port:”
on page 20.
4. For the Core Switch 2/64, reboot the standby CP card by pressing the yellow ejector buttons at top
and bottom of the CP card and then pressing both ejector handles back towards the switch to lock the
card back into the slot.
For the SAN Director 2/128, reboot the standby CP card by sliding the On/Off switch on the ejector
handle of the standby CP card to Off, and then back to On.
This causes the card to reset.
5. Press ESC within four seconds after the message Press escape within 4 seconds appears.
The following options are available:
• 1 Start systemContinues the system boot process
• 2 Recovery passwordLets you set the recovery string and the boot PROM password
• 3 Enter command shellProvides access to boot parameters
6. Enter 3.
7. Issue the passwd command at the shell prompt.
NOTE: The passwd command only applies to the boot PROM password when it is entered from the boot
interface.
8. Enter the boot PROM password at the prompt and then reenter it when prompted. The password must
be 8 alphanumeric characters (any additional characters are not recorded). Record this password for
future use.
9. Enter the saveenv command to save the new password.
10.Reboot the standby CP card by entering the reset command.
11.Connect to the active CP card by serial or telnet, enter the haenable command to restore HA, and
then fail over the active CP card by entering the hafailover command.
Traffic resumes flowing through the newly active CP card after it has completed rebooting.
12.Connect the serial cable to the serial port on the new standby CP card (previously the active CP card).
13.Repeat step 3 through step 10 for the new standby CP card.
14.Connect to the active CP card by serial or telnet and enter the haenable command to restore HA.
Recovering forgotten passwords
If you know the root password, you can use this procedure to recover the user, admin, and
factory passwords:
1. Open a CLI connection (serial or telnet) to the switch. If secure mode is enabled, connect to the
primary FCS switch.
2. Log in as root.
3. Enter the command for the type of password that was lost:
passwd user
passwd admin
passwd factory
Fabric OS 5.0.0 procedures user guide73
4. Enter the requested information at the prompts.
To recover a lost root password, contact your switch service provider.
To recover a lost boot PROM password, contact your switch service provider. You must have previously set
a recovery string to recover the boot PROM password.
74Configuring standard security features
4Maintaining configurations and
firmware
This chapter contains procedures for maintaining switch configurations and installing firmware and
consists of the following sections:
• Maintaining configurations, page 75
• Maintaining firmware, page 78
• Troubleshooting firmware downloads, page 86
Maintaining configurations
It is important to maintain consistent configuration settings on all switches in the same fabric, because
inconsistent parameters (such as inconsistent PID formats) can cause fabric segmentation. As part of
standard configuration maintenance procedures, HP recommends that you back up all important
configuration data for every switch on a host computer server for emergency reference.
The following sections contain procedures for basic switch configuration maintenance.
Displaying configuration settings
The switch configuration file comprises four sections, and is organized as follows:
• The Boot Parameters section contains variables such as the switch's name and IP address.
• The Licenses section lists the licenses that are active on the switch.
• The Chassis Configuration section contains configuration variables such as diagnostic settings, fabric
configuration settings, and SNMP settings.
• The Configuration section contains licensed option configuration parameters.
To display configuration settings, connect to the switch, log in as admin, and enter the configshow
command at the command line. The configuration settings vary depending on switch model and
configuration.
Backing up a configuration
Keep a backup copy of the configuration file in case the configuration is lost or unintentional changes are
made. You should keep individual backup files for all switches in the fabric. You should avoid copying
configurations from one switch to another.
The following information is not saved in a backup:
• dnsconfig information
• passwords
You must have a valid account on the FTP server where the backup file is to be stored.
You can specify the use of secure file copy (scp) during the procedure. For instructions on configuring the
use of scp by default, see ”Configuring secure file copy” on page 69.
Fabric OS 5.0.0 procedures user guide75
Before beginning, verify that you can reach the FTP server from the switch. Using a telnet connection,
save a backup copy of the configuration file to a host computer as follows:
1. Verify that the FTP service is running on the host computer.
2. Connect to the switch and log in as admin.
3. Enter the configupload command.
The command becomes interactive and you are prompted for the required information.
4. Respond to the prompts as follows:
Protocol (scp
or ftp)
Server Name
or IP Address
If your site requires the use of Secure Copy, specify scp. Otherwise,
specify ftp.
Enter the name or IP address of the server where the file is to be stored;
for example, 192.1.2.3. You can enter a server name if DNS is
enabled.
User nameEnter the user name of your account on the server; for example,
JohnDoe.
File nameSpecify a file name for the backup file; for example, config.txt. Use
the forward slash (/) to specify absolute path names. Relative path names
create the file in the user’s home directory on UNIX servers, and in the
directory where the FTP server is running on Windows servers.
PasswordEnter your account password for the server.
Example:
switch:admin> configupload
Protocol (scp or ftp) [ftp]: ftp
Server Name or IP Address [host]: 192.1.2.3
User Name [user]: JohnDoe
File Name [config.txt]: /pub/configurations/config.txt
Password: xxxxx
Upload complete
switch:admin>
Restoring a configuration
Restoring a configuration involves overwriting the configuration on the switch by downloading a
previously saved backup configuration file. Perform this procedure during a planned down time.
Make sure that the configuration file you are downloading is compatible with your switch model,
because configuration files from other model switches might cause your switch to fail.
You must have a user ID on the FTP server where the backup file is stored.
Use the following procedure:
1. Verify that the FTP service is running on the server where the backup configuration file is located.
2. Connect to the switch and log in as admin.
3. Disable the switch by entering the switchdisable command.
4. Enter the configdownload command.
The command becomes interactive and you are prompted for the required information.
76Maintaining configurations and firmware
5. Respond to the prompts as follows:
Protocol (scp
or ftp)
Server Name
or IP Address
If your site requires the use of Secure Copy, specify scp. Otherwise, specify
ftp.
Enter the name or IP address of the server where the file is stored; for
example, 192.1.2.3. You can enter a server name if DNS is enabled.
User nameEnter the user name of your account on the server; for example, JohnDoe.
File nameSpecify the full path name of the backup file; for example,
/pub/configurations/config.txt.
PasswordEnter your account password for the server.
6. At the Do you want to continue [y/n] prompt, enter y.
7. Wait for the configuration to be restored.
8. When the process is finished, enter the switchenable command:
Example:
switch:admin> configdownload
Protocol (scp or ftp) [ftp]: ftp
Server Name or IP Address [host]: 192.1.2.3
User Name [user]: JohnDoe
File Name [config.txt]: /pub/configurations/config.txt
Password: xxxxx
*** CAUTION ***
This command is used to download a backed-up configuration
for a specific switch. If using a file from a different
switch, this file's configuration settings will override
any current switch settings. Downloading a configuration
file, which was uploaded from a different type of switch,
may cause this switch to fail.
Do you want to continue [y/n]: y
download complete..
switch:admin> switchenable
NOTE: Because some configuration parameters require a reboot to take effect, after you download a
configuration file you must reboot to be sure that the parameters are enabled. Before the reboot, this type
of parameter is listed in the configuration file, but it is not effective until after the reboot.
Downloading configurations across a fabric
To save time when configuring fabric parameters and software features, you can save a configuration file
from one switch and download it to other switches of the same model type, as described in the following
procedure. Avoid downloading configuration files to different model switches, because that can cause
the switches to fail.
1. Configure one switch first.
2. Use the configupload command to save the configuration information. See ”Backing up a
configuration” on page 75.
3. Use the configdownload command to download the configuration to each of the remaining
switches. See ”Restoring a configuration” on page 76.
Fabric OS 5.0.0 procedures user guide77
Editing configuration files
Beginning with Fabric OS v4.2.0, the portcfg line in the configuration file for a brand new switch
contains 256 entries, regardless of the number of ports on the switch. This line length exceeds the
capacity of the vi editor. If you must edit a new configuration file, you can do so with the vim editor. Or,
be sure to perform a portcfg operation before attempting to edit the configuration file (because after
the portcfg operation, the portcfg line in the configuration file contains only as many entries as the
maximum number of ports on the switch).
Printing hard copies of switch information
HP recommends that you print a hard copy of all key configuration data, including license key
information for every switch, and store it in a safe and secure place for emergency reference. Print out the
information from the following commands, and store the printouts in a secure location:
• configshow displays configuration parameters and setup information, including license information.
• ipaddrshow displays the IP address.
• licenseshow displays the license keys you have installed and provides better detail than the license
information from the configshow command.
Depending on the security procedures of your company, you might also want to keep a record of the user
levels and passwords for all switches in the fabric. Access to this sensitive information should be limited.
Maintaining firmware
This section explains how to obtain and install firmware. Fabric OS v4.4.0 provides nondisruptive
firmware installation.
In most cases, you are to upgrade firmware; that is, install a newer firmware version than the one you are
currently running. However, some circumstances may require installing an older version; that is,
downgrading the firmware. The procedures in this section assume that you are upgrading firmware, but
they work for downgrading as well, provided the old and new firmware versions are compatible.
Using the CLI (or HP Advanced Web Tools), you can upgrade the firmware on one switch at a time. You
can use the optionally licensed HP Fabric Manager software tool to upgrade firmware simultaneously on
multiple switches. For more details on Fabric Manager and other licensed software tools, go to the HP
StorageWorks web site: http://www.hp.com/country/us/eng/prodserv/storage.html
Obtaining and unzipping firmware
Firmware upgrades are available for customers with support service contracts and partners on the HP
StorageWorks web site: http://www.hp.com/country/us/eng/prodserv/storage.html
The firmware is delivered in a compressed file that contains RPM packages with names defined in a
pfile, a binary file that contains specific firmware information (timestamp, platform code, version, and
so forth) and the names of the packages of firmware to be downloaded. You must unzip the firmware
(using the UNIX tar or gzip command, or a Windows unzip program) before you can use the
firmwaredownload command to update the firmware on your equipment.
.
.
When you unpack the downloaded firmware it expands into a directory that is named according to the
version of Fabric OS it contains. For example, if you download and unpack Fabric OS v4.4.0.zip,
it expands into a directory called v4.4.0. When you use the firmwaredownload command, you specify
the path to the v4.4.0 directory and append the keyword release.plist to the path.
78Maintaining configurations and firmware
Checking connected switches
If the switch to be upgraded is running v4.1.0 firmware (or later), HP recommends that all switches
directly connected to it be running versions no earlier than v2.6.1, v3.1.0, or v4.1.0. If some connected
switches are running older firmware, upgrade them to at least the earliest recommended version (shown
in Table 11) before upgrading firmware on your switch.
If
Table 11 Recommended firmware
HP StorageWorks switch
1
Earliest recommended Fabric OS version
1 GB
SAN Switch 2/8-EL, SAN Switch 2/16-EL,
SAN Switch 2/16
SAN Switch 2/8V, SAN Switch 2/16V
SAN Switch 2/32
SAN Switch 4/32
Core Switch 2/64
SAN Director 2/128
1.During code activation on 2 GB switches, SAN Switch 2/8V, SAN Switch 2/16V, or SAN Switch 2/32
running Fabric OS v4.1.0 or later, data continues to flow between hosts and storage devices; however,
fabric services are unavailable for a period of approximately 50-55 seconds. Possible disruption of the
fabric can be minimized by ensuring that switches logically adjacent to these models (directly connected
via an ISL) are running at the minimum Fabric OS v2.6.1 or later, v3.1.0 or later, or v4.1.0 or later. If 2 GB
switches, SAN Switch 2/8V, SAN Switch 2/16V, or SAN Switch 2/32 are adjacent and you start firmware
downloads on them at the same time, I/O might be disrupted.
v2.6.1
v3.1.0
v4.2.0
v4.1.0
v4.4.0
v4.1.0
v4.2.0
To determine whether you need to upgrade connected switches before upgrading your switch, use the
following procedure on each connected switch to display firmware information and build dates.
1. Connect to the switch and log in as admin.
2. Issue the version command.
The following information is displayed:
• Kernel:Displays the version of switch kernel operating system
• Fabric OS:Displays the version of switch Fabric OS
• Made on:Displays the build date of firmware running in switch
• Flash:Displays the install date of firmware stored in nonvolatile memory
• BootProm:Displays the version of the firmware stored in the boot PROM
About the download process
The firmwaredownload command downloads unzipped switch firmware from an FTP server to the
switch’s nonvolatile storage area.
In the Core Switch 2/64 and SAN Director 2/128, this command by default downloads the firmware
image to the two CP cards in rollover mode, to prevent disruption to application services. This operation
depends on HAHA support. If HA is not available, experienced technicians can upgrade the CPs one at
a time, using the -s option.
Fabric OS 5.0.0 procedures user guide79
HP StorageWorks fixed-port switches and each CP card of the Core Switch 2/64 and SAN Director
2/128 have two partitions of nonvolatile storage areas (a primary and a secondary) to store two
firmware images. The firmwaredownload command always loads the new image into the secondary
partition and swaps the secondary partition to be the primary. It then reboots the partition and activates
the new image. Finally, it performs the firmwarecommit procedure automatically, to copy the new
image to the other partition.
Effects of firmware changes on accounts and passwords
Table 12 describes what happens to accounts and passwords when you replace the switch firmware with
a different version. Upgrading means installing a newer version of firmware. Downgrading means
installing an older version of firmware.
Table 12 Effect of firmware on accounts and passwords
ChangeFirst timeSubsequent times (after upgrade, then
downgrade, then upgrade)
Upgrading Default accounts and their
passwords are preserved.
Downgrading User-defined accounts are no
longer valid. Default accounts
and their passwords
are preserved. If a default
account was disabled, it is
reenabled after the downgrade.
Upgrading to
v3.2.0
For more details on older releases of Fabric OS, see ”Understanding legacy password behavior” on
page 229.
(You may upgrade a switch in the fabric as part of ”Checking connected switches”
on page 79.) Earlier versions allowed you to change the default account names.
You cannot add user-defined accounts until you change the names back to default
with the passwdDefault command.
Considerations for downgrading firmware
The following items must be considered before attempting to downgrade to an earlier version of
Fabric OS:
• If your fabric is set to the extended edge PID format and you want to downgrade to an older Fabric
OS version that does not support extended edge, you must change the PID to a supported format. For
more information, see ”Configuring the PID format” on page 203.
User-defined and default accounts and their
passwords are preserved.
User-defined and default accounts and their
passwords are preserved, including accounts
added after the first upgrade.
• Downgrading a SAN Director 2/128 that is configured for two domains from Fabric OS v4.4.0 to
Fabric OS v4.2.0 is not supported.
• If you are running v4.0.2 firmware on a SAN Switch 2/32, you cannot downgrade to earlier
versions.
Upgrading HP StorageWorks SAN switches
SAN StorageWorks Switch 2/8V, SAN Switch 2/16V, SAN Switch 2/32, and SAN Switch 4/32
maintain primary and secondary partitions for firmware. The firmwaredownload command defaults to
an Auto Commit option that automatically copies the firmware from one partition to the other.
Do not override Auto Commit under normal circumstances; use the default. If you override the Auto
Commit option (that is, use the single mode -s option with the firmwaredownload command and
then specify no to the Auto Commit prompt), and then reboot with the hareboot command, you must
execute the firmwarecommit command.
80Maintaining configurations and firmware
As an option, before starting a firmware download, HP suggests that you connect the switch with a
console cable to a computer that is running a session capture. The information collected may be useful if
needed for troubleshooting.
Summary of the upgrade process
The following summary describes the default behavior of the firmwaredownload command (without
options) on the SAN Switch 2/8V, SAN Switch 2/16V, SAN Switch 2/32, and SAN Switch 4/32.
• Issue the firmwaredownload command.
Fabric OS downloads firmware to the secondary partition.
The system performs an HA reboot (hareboot). After the hareboot, the former secondary partition
is now the primary partition. The system replicates the firmware from the primary to the secondary
partition.
• Issue the firmwaredownloadstatus command to view the firmware process.
SAN Switch upgrade procedure
For the SAN Switch 2/8V, SAN Switch 2/16V, SAN Switch 2/32, and SAN Switch 4/32, the upgrade
process first downloads and then commits the firmware to the switch. While the upgrade is proceeding,
you can start another telnet session on the switch and observe the upgrade progress if you wish.
NOTE: After you start the process, do not enter any disruptive commands (such as reboot) that
interrupt the process. The firmware download and commit process takes approximately 15 minutes. If
there is a problem, wait for the time-out (30 minutes for network problems; 10 minutes for incorrect IP
address). Disrupting the process can render the switch inoperable and require you to seek help from
Customer Support.
Do not disconnect the switch from power during the process; the switch could become inoperable upon
reboot.
Use the following procedure to upgrade firmware for the SAN Switch 2/8V, SAN Switch 2/16V, SAN
Switch 2/32, and SAN Switch 4/32:
1. Verify that the FTP service is running on the host server and that you have a user ID on that server.
2. Obtain the firmware file from the HP StorageWorks web site at
3. Issue the firmwareshow command to check the current firmware version on connected switches.
Upgrade their firmware if necessary before proceeding with upgrading this switch. See ”Checking
connected switches” on page 79.
4. Connect to the switch and log in as admin.
5. Issue the firmwareshow command to check the current firmware version of the switch to verify
compatibility with the version of firmware you are going to download.
NOTE: For the SAN Switch 2/32, if you are running Fabric OS v4.0.2, you cannot downgrade to
earlier versions.
For the SAN Switches 2/8V and 2/16V, if you are running Fabric OS v4.2.0, you cannot downgrade to
earlier version.
and store the file on the FTP server. Verify that
6. Issue the firmwaredownload command.
Fabric OS 5.0.0 procedures user guide81
7. At the Do you want to continue [y/n] prompt, enter y.
8. Respond to the prompts as follows:
Server Name
or IP Address:
Enter the name or IP address of the server where the firmware file is stored;
for example, 192.1.2.3. You can enter a server name if DNS is enabled.
User name:Enter the user name of your account on the server; for example, JohnDoe.
File name:Specify the full path name of the firmware directory, appended by
release.plist; for example, /pub/v4.4.0/release.plist.
Password:Enter your account password for the server.
After the firmware is downloaded, the switch reboots and starts the firmware commit.
9. After the reboot, connect to the switch and log in again as admin.
10.If you want to watch the upgrade progress, issue the firmwaredownloadstatus command to
monitor the status of the firmware download.
11.After the firmware commit finishes, issue the firmwareshow command to display the firmware level
for both partitions.
Example:
switch:admin> firmwaredownload
You can run firmwareDownloadStatus to get the status of this
command.
This command will cause the switch to reset and will require that
existing telnet, secure telnet or SSH sessions be restarted.
Do you want to continue [Y]: y
Server Name or IP Address: 192.1.2.3
User Name: JohnDoe
File Name: /pub/v4.4.0/release.plist
Password: xxxxx
Firmwaredownload has started.
Upgrading the Core Switch 2/64 and the SAN Director 2/128
You can download firmware to the Core Switch 2/64 and SAN Director 2/128 without disrupting the
overall fabric if the two CP cards are installed and fully synchronized. Use the hashow command to
confirm synchronization. If only one CP card is powered on, the switch must reboot to activate firmware,
which is disruptive to the overall fabric.
If there is an error during the firmware download, the system ensures that the two partitions of a CP card
contain the same version of firmware. However, the two CP cards might contain different versions of
firmware; in that event, repeat the firmware download process.
During the upgrade process the director fails over to its standby CP card and the IP addresses for the two
logical switches move to that CP card's Ethernet port. This might cause informational ARP address
reassignment messages to appear on other switches in the fabric. This is normal behavior, because the
association between the IP addresses and MAC addresses has changed.
Summary of the upgrade process
The following summary describes the default behavior of the firmwaredownload command (without
options) on the Core Switch 2/64 and SAN Director 2/128.
• Issue the firmwaredownload command on the active CP card.
• The standby CP card downloads firmware.
• The standby CP card reboots and comes up with the new Fabric OS.
• The active CP card synchronizes its state with the standby CP card.
• The active CP card forces a failover and reboots to become the standby CP card.
• The new standby CP card (the active CP card before the failover) downloads firmware.
• The new standby CP card reboots and comes up with the new Fabric OS.
• The new active CP card synchronizes its state with the new standby CP card.
• The firmwarecommit command runs automatically on both CP cards.
NOTE: After you start the process, do not enter any disruptive commands (such as reboot) that
interrupt the process. The entire firmware download and commit process takes approximately 15
minutes. If there is a problem, wait for the time-out (30 minutes for network problems; 10 minutes for
incorrect IP address). Disrupting the process can render the switch inoperable and require you to seek
help from Customer Support.
Do not disconnect the switch from power during the process, because the switch could become
inoperable upon reboot.
Fabric OS 5.0.0 procedures user guide83
Core Switch 2/64 and SAN Director 2/128 upgrade procedure
The Core Switch 2/64 has four IP addresses: one for each of the two logical switches (switch 0 and
switch 1) and one for each of the two CP cards (CP0 in slot 5 and CP1 in slot 6). The SAN Director
2/128 in its default configuration has three IP addresses, but it can be configured for four.
NOTE: By default, the firmwaredownload command automatically upgrades both the active CP card
and the standby CP card. When upgrading a Core Switch 2/64 that is running v4.0.0c or earlier, you
must upgrade each CP card separately, as described in ”To upgrade a single Core Switch 2/64 or SAN
Director 2/128 CP card:” on page 240. You should not use this procedure under normal circumstances.
Follow this procedure to upgrade the firmware on the Core Switch 2/64 and the SAN Director 2/128:
1. Verify that the FTP service is running on the host server and that you have a user ID on that server.
2. Obtain the firmware file from the HP StorageWorks web site at
3. Use the firmwareshow command to check the current firmware version on connected switches.
Upgrade their firmware if necessary before proceeding with upgrading this switch.
See ”Checking connected switches” on page 79.
4. Using a telnet session, connect to the switch and log in as admin.
and store the file on the FTP server. Verify that
5. For the Core Switch 2/64, issue the firmwareshow command to check the current firmware version
of the switch.
If the switch is running v4.0.0c or earlier, and you want to downgrade to an earlier version, you must
load firmware to each CP card separately using the procedure in ”To upgrade a single Core Switch
2/64 or SAN Director 2/128 CP card:” on page 240.
6. Issue the hashow command to confirm that the two CP cards are synchronized. CP cards must be
synchronized and running Fabric OS v4.1.0 or later to provide a nondisruptive download. If the two
CP cards are not synchronized, and the current firmware version is 4.1.0 or later, issue the
hasyncstart command to synchronize the two CP cards. In the following example, the active CP
card is CP1 and the standby CP card is CP0.
Example:
switch:admin> hashow
Local CP (Slot 6, CP1): Active
Remote CP (Slot 5, CP0): Standby
HA Enabled, Heartbeat up, HA State is in Sync
switch:admin>
7. Log in to either of the logical switches.
8. Issue the firmwaredownload command.
9. At the Do you want to continue [y/n] prompt enter: y
84Maintaining configurations and firmware
10.Respond to the prompts as follows:
Server Name
or IP Address
Enter the name or IP address of the server where the firmware file is stored;
for example, 192.1.2.3. You can enter a server name if DNS is enabled.
User nameEnter the user name of your account on the server; for example, JohnDoe.
File nameSpecify the full path name of the firmware directory, appended by
release.plist; for example, /pub/v4.4.0/release.plist.
PasswordEnter your account password for the server.
The firmware is downloaded to one CP card at a time, beginning with the standby CP card. During
the process, the active CP card is failed over. After the firmware is downloaded, a firmware commit
starts on both CP cards.
11.Optionally, after the failover, connect to the switch and log in again as admin.
12.Issue the firmwaredownloadstatus command to monitor the firmwaredownload status.
13.Issue the firmwareshow command to display the new firmware versions.
Example:
switch:admin> firmwaredownload
This command will upgrade both CPs in the switch. If you
what to upgrade a single CP only, please use -s option.
You can run firmwareDownloadStatus to get the status
of this command.
This command will cause the active CP to reset and will
require that existing telnet, secure telnet, or SSH sessions
be restarted.
Do you want to continue [Y]: y
Server Name or IP Address: 192.1.2.3
User Name: JohnDoe
File Name: /pub/v4.4.0/release.plist
Password:*****
FirmwareDownload has started on Standby CP. It may take up to 30
minutes.
Firmwaredownload has completed successfully on Standby CP.
.
.
.
Standby CP reboots.
Standby CP booted up.
Standby CP booted up with new firmware.
cp1: Firmwarecommit has started on both Active and Standby CPs.
cp1: Firmwarecommit has completed successfully on Active CP.
cp1: Firmwaredownload command has completed successfully.
switch:admin>
Fabric OS 5.0.0 procedures user guide85
Start a new session to view the upgrade progress:
switch:admin> firmwaredownloadstatus
[0]: Tue Apr 20 15:18:56 2003
cp0: Firmwaredownload has started on Standby CP. It may take up to 10
minutes.
[1]: Tue Apr 20 15:24:17 2003
cp0: Firmwaredownload has completed successfully on Standby CP.
[2]: Tue Apr 20 15:24:19 2003
cp0: Standby CP reboots.
[3]: Tue Apr 20 15:27:06 2003
cp0: Standby CP booted up.
[4]: Tue Apr 20 15:29:01 2003
cp1: Active CP forced failover succeeded. Now this CP becomes Active.
[5]: Tue Apr 20 15:29:05 2003
cp1: Firmwaredownload has started on Standby CP. It may take up to 30
minutes.
[6]: Tue Apr 20 15:34:16 2003
cp1: Firmwaredownload has completed successfully on Standby CP.
[7]: Tue Apr 20 15:34:19 2003
cp1: Standby CP reboots.
[8]: Tue Apr 20 15:36:59 2003
cp1: Standby CP booted up with new firmware.
[9]: Tue Apr 20 15:37:04 2003
cp1: Firmwarecommit has started on both Active and Standby CPs.
[10]: Tue Apr 20 15:42:48 2003
cp1: Firmwarecommit has completed successfully on Active CP.
[11]: Tue Apr 20 15:42:49 2003
cp1: Firmwaredownload command has completed successfully.
Troubleshooting firmware downloads
A firmware download can fail for many reasons, such as a power failure, a failed network connection, a
failed FTP server, or an incorrect path to unpacked firmware files. In most cases, the firmware is not
affected. You can make necessary corrections (for example, check the Ethernet cables and check the file
path names) and then run the firmwaredownload command again.
NOTE: Under firmware versions earlier than v4.1.0, do not perform a firmware download while the
switch is running POST. If a firmware download is attempted on a Core Switch 2/64 while POST is
running, it might fail because the CP cards cannot synchronize with each other.
Issue the firmwareshow command to see whether both CP cards have the same firmware. In this
example, the active CP card has the old version of firmware and the standby CP card has the
new version:
switch: admin> firmwareshow
Local CP (Slot 5, CP0): Active
Decide which firmware version you want to be applied to both CP cards. Then repeat the download
procedure.
Fabric OS 5.0.0 procedures user guide87
88Maintaining configurations and firmware
5Configuring the Core Switch 2/64 and
the SAN Director 2/128
This chapter contains procedures that are specific to the Core Switch 2/64 and the SAN Director 2/128
and consists of the following sections:
• Identifying ports, page 89
• Basic card management, page 90
• Setting chassis configurations, page 92
• Setting the card beacon mode, page 98
Because these switches contain interchangeable 16-port cards (the software calls them blades), their
procedures differ from those for the SAN Switch 2/8V, SAN Switch 2/16V, SAN Switch 2/32, and the
SAN Switch 4/32 fixed-port switches. For example, fixed-port models identify ports by domain, port number, while director models identify ports by slot/port number.
Also, because the Core Switch 2/64 comprises two logical switches (domains) and the SAN Director
2/128 in its default configuration has only one domain, procedures for the two directors sometimes differ
from one another.
For detailed information about the Core Switch 2/64 and the SAN Director 2/128, refer to their
hardware reference manuals.
Identifying ports
The Core Switch 2/64 and the SAN Director 2/128 have slots and can have a variable number of ports
within a given domain. Ports are identified by their combined slot number and port number.
There are a total of 10 slots that contain cards:
• Slot numbers 5 and 6 contain control processor cards (CPs).
• Slot numbers 1 through 4 and 7 through 10 contain port cards.
On each port card, there are 16 ports (counted from the bottom, 0 to 15). A particular port must be
represented by both slot number (1 through 4 and 7 through 10) and port number (0 through 15).
The Core Switch 2/64 is divided into two logical switches, where slots 1 through 4 are logical switch 0
(sw0) and slots 7 through 10 are logical switch 1 (sw1). You must be connected to the logical switch that
represents the slot where you want to execute a command.
In the SAN Director 2/128 default configuration, all the ports are part of a single logical switch. With
Fabric OS v4.4.0 and later, you can configure the SAN Director 2/128 as two logical switches
(domains).
The following sections tell how to identify ports on the Core Switch 2/64 and the SAN Director 2/128,
and how to identify ports for zoning commands.
Fabric OS 5.0.0 procedures user guide89
By slot and port number
To select a specific port in the Core Switch 2/64 and the SAN Director 2/128, you must identify both the
slot number and the port number using the format slot number/port number. No spaces are allowed
between the slot number, the slash (/), and the port number.
The following example shows how to enable port 4 on a card in slot 2:
switch:admin> portenable 2/4
By port area ID
Zoning commands require that you specify ports using the area ID method. In Fabric OS v4.0.0 and
later, each port on a particular domain is given a unique area ID. How the port number is related to the
area ID depends upon the PID format used in the fabric:
• When Core PID mode is in effect, the area ID for port 0 is 0, for port 1, it is 1, and so forth.
When using Core PID mode on the Core Switch 2/64 (two logical 64-port switches) and the SAN
Director 2/128 configured with two domains, the area IDs for both logical switches (domains) range
from 0 to 63. This means that both logical switch 0 and logical switch 1 have a port that is referenced
with area ID 0.
• When Extended Edge PID mode is in effect, the area ID is the port number plus 16 for ports 0 to 111.
For port numbers higher than 111, the area ID wraps around so that port 112 has an area ID of 0,
and so on. Each 64-port logical switch (domain) has area IDs ranging from 16 to 79.
To determine the area ID of a particular port, enter the switchshow command. This command displays
all ports on the current (logical) switch and their corresponding area IDs.
Basic card management
The following sections provide procedures for powering a card on and off and for disabling and
enabling a card.
Powering port cards on and off
Port cards are powered on by default.
To power off a port card:
1. Connect to the switch and log in as admin.
2. Issue the slotpoweroff command with the slot number of the card you want to power off.
The slot must exist in the logical switch where you are logged in.
Example:
switch:admin> slotpoweroff 3
Slot 3 is being powered off
switch:admin>
To provide power to a port card:
1. Connect to the switch and log in as admin.
2. Issue the slotpoweron command with the slot number of the card you want to power on.
The slot must exist in the logical switch where you are logged in.
90Configuring the Core Switch 2/64 and the SAN Director 2/128
Example:
switch:admin> slotpoweron 3
Powering on slot 3
switch:admin>
Disabling and enabling cards
Cards are enabled by default.
You might need to disable a card to perform diagnostics. When diagnostics are executed manually (from
the Fabric OS command line), many commands require the card to be disabled. This ensures that
diagnostic activity does not interfere or disturb normal fabric traffic.
To disable a card:
1. Connect to the switch and log in as admin.
2. Issue the slotoff command with the slot number of the card you want to disable.
Example:
switch:admin> slotoff 3
Slot 3 is being disabled
switch:admin>
To enable a card:
1. Connect to the switch and log in as admin.
2. Issue the sloton command with the slot number of the card you want to enable.
Example:
switch:admin> sloton 3
Slot 3 is being enabled
switch:admin>
Conserving power
To conserve power and ensure that more critical components are the least affected by a power
fluctuation, you can power off components in a specified order using the powerofflistset command.
The available power is compared to the power demand to determine if there is enough power to operate.
If there is less power available than the demand, the power-off list is processed until there is enough
power for operation. By default, the processing proceeds from slot 1 to the last slot in the chassis. As
power becomes available, slots are powered up in the reverse order.
NOTE: Some FRUs in the chassis may use significant power, yet cannot be powered off through
software. For example, a missing blower FRU may change the power computation enough to affect how
many slots can be powered up.
The powerofflistshow command displays the power-off order.
Fabric OS 5.0.0 procedures user guide91
Setting chassis configurations
The chassisconfig command allows you to set the chassis configuration for products that support both
single-switch (one domain) and dual-switch (two domains) operation.
Table 13 lists the supported options for Fabric OS v4.4.0 or later. In the table, Blade ID 4 indicates a
SAN Director 2/128 card, and Blade ID 2 indicates a Core Switch 2/64 card.
Table 13 Supported options
OptionResult
1One 128-port switch (Blade ID 4 on slots 1–4, 7–10)
2Two 64-port switches (Blade ID 4 on slots 1–4, 7–10)
3Two 64-port switches (Blade ID 4 on slots 1–4, ID 2 on slots 7–10)
4Two 64-port switches (Blade ID 2 on slots 1–4, ID 4 on slots 7–10)
The following sections contain procedures for obtaining chassis information, and for configuring director
domains using the chassisconfig command.
Obtaining slot information
For a Core Switch 2/64 or a SAN Director 2/128 configured as two logical switches, the chassis-wide
commands display or control both logical switches. In the default configuration, the SAN Director 2/128
is configured as one logical switch, so the chassis-wide commands display and control the single logical
switch.
To display the status of all slots in the chassis:
1. Connect to the switch and log in as user or admin.
2. Issue the slotshow command to display the current status of each slot in the system.
The format of the display includes a header and four fields for each slot. The fields and their possible
values are:
Table 14 Header fields
FieldValue
SlotDisplays the physical slot number.
Blade typeDisplays the card type:
• SW BLADE: The card is a switch.
• CP BLADE: The card is a control processor.
• UNKNOWN: The card is not present or its type is not recognized.
92Configuring the Core Switch 2/64 and the SAN Director 2/128
Table 14 Header fields (continued)
FieldValue
IDDisplays the hardware ID of the card type
StatusDisplays the status of the card:
• VACANT: the slot is empty.
• INSERTED, NOT POWERED ON: The card is present in the slot, but is
turned off.
• DIAG RUNNING POST1: The card is present, powered on, and running
the post initialization power on self tests.
• DIAG RUNNING POST2: The card is present, powered on, and running
the power-on self test.
• ENABLED: The card is on and enabled.
• ENABLED (User Ports Disabled): The card is on, but external ports have
been disabled with the bladedisable command.
• DISABLED: The card is powered on, but disabled.
• FAULTY: The card is faulty because an error has been detected. The
reason code numbers displayed are for use in debugging.
• UNKNOWN: The card is inserted but its state cannot be determined.
Configuring a new SAN Director 2/128 with two domains
By default, the SAN Director 2/128 is configured as one 128-port switch (one domain). Use the
following procedure to add a new SAN Director 2/128 to a fabric and configure it as two 64-port
switches (two domains). The procedure assumes that the new director:
• Has been installed and connected to power, but is not yet attached to the fabric.
• Has been given an IP address, but is otherwise running factory defaults.
If this is not the case, back up the current configuration before starting, so that you can restore it later
if necessary.
• Is running Fabric OS v4.4.0 or later.
1. Connect to the switch and log in as admin.
2. Issue the chassisconfig command without options to verify that the switch is configured with one
domain. For example:
chassisconfig
Current Option: 1
3. Issue the chassisconfig command to configure two domains. Use the -f option to suppress
prompting for uploading the configuration. This command reboots the system.
chassisconfig -f 2
Current Option changed to 2
Restoring switch 0 configuration to factory defaults...
All account passwords have been successfully set to factory default.
Restoring switch 1 configuration to factory defaults...
All account passwords have been successfully set to factory default.
Fabric OS 5.0.0 procedures user guide93
4. After the system reboots, log in again to the first logical switch (sw0) as admin.
5. Use the configure command to configure the sw0 to match your fabric specifications.
If the director is to be merged into an existing fabric, do not configure zoning parameters; these are
propagated automatically when you merge the director into the fabric.
6. Log in to the second logical switch (sw1) as admin.
7. Use the configure command to configure the sw1 to match your fabric specifications.
If the director is to be merged into an existing fabric, do not configure zoning parameters; these are
propagated automatically when you merge the director into the fabric.
8. If the fabric is in secure mode, perform the following steps; otherwise, proceed to step 9. (Refer to the
HP StorageWorks Secure Fabric OS user guide for specific instructions.)
a. Optionally, to configure sw0 and sw1 in one operation, connect them with an ISL link to form a
temporary fabric.
b. If you want sw0 and sw1 to be fabric configuration servers, update the overall fabric’s FCS policy
to include them. If not, skip this step.
c. On sw0, enable security mode and use the secmodeenable command to create an FCS list that
matches your overall fabric’s FCS policy.
d. Reset the version stamp on sw0.
e. If you connected sw0 and sw1 in step 8a and you do not want them connected, disconnect the ISL
link between them. If you did not connect them, repeat step 8b through step 8d on sw1.
9. Optional: Connect the new two-domain SAN Director 2/128 to the fabric.
10.Issue the fabricshow command to verify that sw0 and sw1 have been merged with the fabric.
11.Issue the cfgshow command to verify that zoning parameters were propagated.
Converting an installed SAN Director 2/128 to support
two domains
Fabric OS versions earlier than v4.4.0 supported only one domain for the SAN Director 2/128 (one
128-port logical switch). When you upgrade a SAN Director 2/128 to Fabric OS v4.4.0 or later, you
can use the chassisconfig command to specify two domains for the director (two 64-port logical
switches, sw0 and sw1).
NOTE: This procedure restores most configuration parameters to factory defaults. After performing this
procedure, you must check the new configuration and reconfigure those parameters that you customized
in the old configuration.
During this procedure, power is reset and the CP cards are rebooted, so traffic on the fabric is disrupted.
If the fabric is in secure mode, enabling security on the new domains is a complicated task. You should
avoid converting existing core switches.
1. Connect to the switch and log in as admin.
2. If the director is already in a fabric, minimize disruption by removing the director from the fabric using
one of the following methods:
• Physically disconnect the director.
•Use the portcfgpersistentdisable command on all connected remote switches to
persistently disable ports that are connected to the director.
94Configuring the Core Switch 2/64 and the SAN Director 2/128
3. Issue the chassisconfig command to change the configuration from the default (one domain) to
two domains. This command reboots the system.
chassisconfig 2
During the conversion, you are prompted to save the configuration of sw0. Follow the prompts to save
the configuration file.
4. After the system reboots, log in again as admin to each logical switch.
5. Using the configuration file saved in step 3 as a guide, manually reconfigure sw0 and sw1.
Do not configure zoning parameters; these are propagated automatically when you merge the
director into the fabric.
6. If the fabric is in secure mode, perform the following steps; otherwise, proceed to step 7.
a. Optionally, to configure sw0 and sw1 in one operation, connect them with an ISL link to form a
temporary fabric.
b. If you want sw0 and sw1 to be fabric configuration servers, update the overall fabric’s FCS policy
to include them. If not, skip this step.
c. On sw0, enable security mode and use the secmodeenable command to create an FCS list that
matches your overall fabric’s FCS policy.
d. Reset the version stamp on sw0.
e. If you connected sw0 and sw1 in step 6a and you do not want them connected, disconnect the ISL
link between them. If you did not connect them, repeat step 6b through step 6d on sw1.
7. If you physically disconnected the switch in step 2, reconnect it to the fabric.
If you used the portcfgpersistentdisable command in step 2, use the
portcfgpersistentenable command to persistently enable all ports that connect the switch to
other switches in the fabric.
8. Use the fabricshow command to verify that sw0 and sw1 have been merged with the fabric.
9. Use the configshow command to verify that zoning parameters were propagated.
Combining Core Switch 2/64 and SAN Director 2/128 cards
in one chassis
You can preserve your investment in legacy equipment by combining Core Switch 2/64 cards and SAN
Director 2/128 cards in one chassis.
The following procedure assumes that:
• The Core Switch 2/64 has one logical switch (sw0, slots 1 through 4) populated with port cards. (You
can perform the same procedure on sw1 slots 7–10.) The other side of the chassis is empty.
• Fabric OS firmware v4.4.0 or later is already installed on the new SAN Director 2/128 CP cards.
The result of the procedure is a system populated with four Core Switch 2/64 port cards in slots
1 through 4, two SAN Director 2/128 CP cards in slots 5 and 6, and four SAN Director 2/128 port
cards in slots 7 through 10 and configured with two domains.
Consider the following rules and guidelines:
• Because this procedure requires power reset and rebooting, traffic on the fabric is disrupted.
• You should be familiar with the standard procedures for shutting down the equipment. Refer to the HP
StorageWorks Core Switch 2/64 and SAN Director 2/128 installation guide, which contains more
details on disconnecting an HP StorageWorks model from the network and fabric.
Fabric OS 5.0.0 procedures user guide95
• The result of this procedure is two 64-port logical switches (domains) that communicate through
external ISLs.
• Only similar port cards can be inserted in the same logical switch (slots 1 through 4 or slots 7 through
10); you cannot install Core Switch 2/64 and SAN Director 2/128 port cards in the same logical
switch.
• Before installing Core Switch 2/64 cards in a SAN Director 2/128 chassis, review the power supply
requirements in the Core Switch 2/64 hardware reference manual and make sure you meet the
higher power requirements of the Core Switch 2/64 cards. You need enough power supplies in the
SAN Director 2/128 chassis to ensure uninterrupted performance if a power supply fails.
• You must replace both of the Core Switch 2/64 CP cards with SAN Director 2/128 CP cards running
Fabric OS v4.4.0 or later. Using dissimilar CP cards in the same chassis is not allowed.
To combine Core Switch 2/64 and SAN Director 2/128 cards in one chassis:
1. Connect to the switch and log in as admin.
2. Use the configupload command to back up the configuration of sw0 (slots 1 through 4).
3. Issue the switchshutdown command to ensure a graceful shutdown of sw0. Wait until the
command finishes and displays the message:
Cleaning up kernel modules . . . . .Done
The following is a sample output from the command:
SW0:admin> switchshutdown
Stopping all switch daemons...Done.
Powering off slot 1...Done.
Powering off slot 4...Done.
Checking all slots are powered off...Done.
Cleaning up kernel modules.....Done
SW0:admin>
4. Shut down the power to the switch.
For details on the switchshutdown command, refer to the HP StorageWorks Fabric OS 4.x
command reference guide or to the online help. For details on shutdown procedures, refer to the HP
StorageWorks Core Switch 2/64 and SAN Director 2/128 installation guide.
5. Remove the Core Switch 2/64 CP cards from slots 5 and 6 of the chassis.
6. Insert the SAN Director 2/128 CP cards into slots 5 and 6 of the chassis.
7. Insert the SAN Director 2/128 port cards into the empty side of the chassis (slots 7 through 10).
8. Restore power to the switch.
By default, the switch starts up in single domain mode (one 128-port switch) with slots 1 through 4 set
to faulty.
9. Connect to the switch and log in as admin.
96Configuring the Core Switch 2/64 and the SAN Director 2/128
10.Issue the slotshow command to view the status of the cards in each slot. The Core Switch 2/64
Issue the chassisconfig command to configure two domains. Use the -f option to suppress
prompting for uploading the configuration and the 4 option to specify two 64-port switches (Blade ID
2 on slots 1–4, ID 4 on slots 7–10).
11.This command reboots the system.
chassisconfig -f 4
Current Option changed to 4
Restoring switch 0 configuration to factory defaults...
All account passwords have been successfully set to factory default.
Restoring switch 1 configuration to factory defaults...
All account passwords have been successfully set to factory default.
12.After the system reboots, log in again as admin to each logical switch.
Passwords have been changed to the defaults. You can either change the account passwords or press
Ctrl+c to bypass prompts.
13.Issue the chassisconfig command without options to verify the change to two domains.
For example:
chassisconfig
Current Option: 4
14.Issue the slotshow command to verify that there are no faulty cards. If POST diagnostics are
running, allow them to finish, which takes several minutes.
16.Issue the switchshow command to verify that port initialization is complete (no ports are shown as
Testing and all E_Ports, F_Ports, and L_Ports are Online).
17. Use the configdownload command to restore the configuration of sw0 (saved in step 2).
18.Manually configure sw1 as desired.
Setting the card beacon mode
When beaconing mode is enabled, the port LEDs flash amber in a running pattern from port 0 through
port 15 and back again. The pattern continues until you turn it off. This can be used to locate a particular
card.
To set the card beacon mode on:
1. Connect to the switch and log in as admin.
2. Issue the bladebeacon command with the following syntax at the command line:
bladebeacon slotnumber, mode
where slotnumber is the card where you want to enable beacon mode; this slot number must exist
on the logical switch. 1 turns beaconing mode on, or 0 turns beaconing mode off.
Example:
switch:admin> bladebeacon 3, 1
switch:admin>
98Configuring the Core Switch 2/64 and the SAN Director 2/128
6Routing traffic
This chapter contains procedures for configuring HP StorageWorks switch routing features. For details on
the commands used in the procedures, refer to the HP StorageWorks Fabric OS 4.x command reference guide.
This chapter contains the following sections:
• About routing policies, page 99
• Specifying the routing policy, page 99
• Assigning a static route, page 100
• Specifying frame order delivery, page 100
• Using dynamic load sharing, page 101
• Viewing routing path information, page 102
• Viewing routing information along a path, page 104
About routing policies
All HP StorageWorks switches support port-based routing, in which the routing path chosen for an
incoming frame is based only on the incoming port and the destination domain. To optimize port-based
routing, enable the Dynamic Load Sharing feature (DLS) to balance the load across the available output
ports within a domain.
The SAN Switch 4/32 allows you to tune routing performance with these additional routing policies:
• Device-based routing, in which the choice of routing path is based on the Fibre Channel addresses of
the source device (SID) and the destination device (DID), improving path utilization for
better performance
• Exchange-based routing, in which the choice of routing path is based on the SID, DID, and Fibre
Channel originator exchange ID (OXID), optimizing path utilization for the best performance
Device-based and exchange-based routing require the use of DLS; when these policies are in effect, you
cannot disable the DLS feature.
Using port-based routing, you can assign a static route, in which the path chosen for traffic never
changes. In contrast, device-based and exchange-based routing policies always employ dynamic path selection.
Specifying the routing policy
In addition to port-based routing, which all HP StorageWorks switches support, the SAN Switch 4/32
supports additional routing policies and allows you to specify the active routing policy using the
aptpolicy command.
The following routing policies are supported:
• 1: Port-based path selection, which is the default on the SAN Switch 2/8V, SAN Switch 2/16V, SAN
Switch 2/32, Core Switch 2/64, and SAN Director 2/128
Fabric OS 5.0.0 procedures user guide99
• 2: Device-based path selection on the on the SAN Switch 4/32 only
• 3: Exchange-based path selection, which is the default on the SAN Switch 4/32 only
The default policy usually provides the best performance. You should change the policy only if there is a
performance problem that you cannot resolve in other ways.
You must disable the switch before changing the routing policy, and reenable it afterward.
In this example, the routing policy is changed from exchange-based to device-based:
switch:admin> aptpolicy
Current Policy: 3
3: Default Policy
1: Port Based Routing Policy
2: Device Based Routing Policy
3: Exchange Based Routing Policy
switch:admin> switchdisable
switch:admin> aptpolicy 2
Policy updated successfully.
switch:admin> switchenable
switch:admin> aptpolicy
Current Policy: 2
Assigning a static route
Assign a static route only when the active routing policy is port-based. When device-based or
exchange-based routing is active you cannot assign static routes.
To assign a static route, use the urouteconfig command. To remove a static route, use the
urouteremove command.
NOTE: For the SAN Switch 2/32, Core Switch 2/64, and SAN Director 2/128, when you issue the
urouteconfig command, two similar warning messages may be displayed if a platform conflict
condition occurs. The first message appears when the static routing feature detects the condition. The
second message appears when the dynamic load sharing feature detects the condition as it tries to
rebalance the route.
A platform conflict occurs if a static route was configured with a destination port that is currently down.
The static route is ignored in this case, in favor of a normal dynamic route. When the configured
destination port comes back up, the system attempts to reestablish the static route, and the conflict can
occur then.
Specifying frame order delivery
In a stable fabric, frames are always delivered in order, even when the traffic between switches is shared
among multiple paths. However, when topology changes occur in the fabric (for example, if a link goes
down), traffic is rerouted around the failure, and some frames could be delivered out of order. Most
destination devices tolerate out-of-order delivery, but some do not.
By default, out of order frame-based delivery is allowed to improve speed. You should force in-order
frame delivery across topology changes only if the fabric contains destination devices that cannot tolerate
occasional out-of-order frame delivery.
100 Routing traffic
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.