53-1002745-02
25 March 2013
Fabric OS
Administrator’s Guide
Supporting Fabric OS 7.1.0
Copyright © 2013 Brocade Communications Systems, Inc. All Rights Reserved.
ADX, AnyIO, Brocade, Brocade Assurance, the B-wing symbol, DCX, Fabric OS, ICX, MLX, MyBrocade, OpenScript, VCS, VDX, and
Vyatta are registered trademarks, and HyperEdge, The Effortless Network, and The On-Demand Data Center are trademarks of
Brocade Communications Systems, Inc., in the United States and/or in other countries. Other brands, products, or service names
mentioned may be trademarks of their respective owners.
Notice: This document is for informational purposes only and does not set forth any warranty, expressed or implied, concerning
any equipment, equipment feature, or service offered or to be offered by Brocade. Brocade reserves the right to make changes to
this document at any time, without notice, and assumes no responsibility for its use. This informational document describes
features that may not be currently available. Contact a Brocade sales office for information on feature and product availability.
Export of technical data contained in this document may require an export license from the United States government.
The authors and Brocade Communications Systems, Inc. shall have no liability or responsibility to any person or entity with
respect to any loss, cost, liability, or damages arising from the information contained in this book or the computer programs that
accompany it.
The product described by this document may contain “open source” software covered by the GNU General Public License or other
open source license agreements. To find out which open source software is included in Brocade products, view the licensing
terms applicable to the open source software, and obtain a copy of the programming source code, please visit
http://www.brocade.com/support/oscd.
Brocade Communications Systems, Incorporated
Corporate and Latin American Headquarters
Brocade Communications Systems, Inc.
130 Holger Way
San Jose, CA 95134
Tel: 1-408-333-8000
Fax: 1-408-333-8101
E-mail: info@brocade.com
European Headquarters
Brocade Communications Switzerland Sàrl
Centre Swissair
Tour B - 4ème étage
29, Route de l'Aéroport
Case Postale 105
CH-1215 Genève 15
Switzerland
Tel: +41 22 799 5640
Fax: +41 22 799 5641
E-mail: emea-info@brocade.com
Asia-Pacific Headquarters
Brocade Communications Systems China HK, Ltd.
No. 1 Guanghua Road
Chao Yang District
Units 2718 and 2818
Beijing 100020, China
Tel: +8610 6588 8888
Fax: +8610 6588 9999
E-mail: china-info@brocade.com
Asia-Pacific Headquarters
Brocade Communications Systems Co., Ltd. (Shenzhen WFOE)
Citic Plaza
No. 233 Tian He Road North
Unit 1308 – 13th Floor
Guangzhou, China
Tel: +8620 3891 2000
Fax: +8620 3891 2111
E-mail: china-info@brocade.com
Document History
Title Publication number Summary of changes Date
Fabric OS Administrator’s Guide 53-1002745-01 Added Fabric OS v7.1.0 software features
and support for new hardware platforms:
Brocade 5430 and 6520.
Fabric OS Administrator’s Guide 53-1002745-02 Corrected errors and omissions in the guide. March 2013
December 2012
Contents (High Level)
Section I Standard Features
Chapter 1 Understanding Fibre Channel Services . . . . . . . . . . . . . . . . . . . . . . . . .43
Chapter 2 Performing Basic Configuration Tasks . . . . . . . . . . . . . . . . . . . . . . . . . .55
Chapter 3 Performing Advanced Configuration Tasks . . . . . . . . . . . . . . . . . . . . . .79
Chapter 4 Routing Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .111
Chapter 5 Managing User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .133
Chapter 6 Configuring Protocols. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .177
Chapter 7 Configuring Security Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .195
Chapter 8 Maintaining the Switch Configuration File . . . . . . . . . . . . . . . . . . . . . .241
Chapter 9 Installing and Maintaining Firmware . . . . . . . . . . . . . . . . . . . . . . . . . .255
Chapter 10 Managing Virtual Fabrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .275
Chapter 11 Administering Advanced Zoning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .303
Chapter 12 Traffic Isolation Zoning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .345
Chapter 13 Bottleneck Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .375
Chapter 14 In-flight Encryption and Compression . . . . . . . . . . . . . . . . . . . . . . . . .393
Chapter 15 NPIV . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .419
Chapter 16 Dynamic Fabric Provisioning: Fabric-Assigned PWWN. . . . . . . . . . . . .425
Chapter 17 Managing Administrative Domains . . . . . . . . . . . . . . . . . . . . . . . . . . .433
Section II Licensed Features
Chapter 18 Administering Licensing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .463
Chapter 19 Inter-chassis Links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .491
Chapter 20 Monitoring Fabric Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .499
Chapter 21 Optimizing Fabric Behavior . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .517
Chapter 22 Managing Trunking Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . .533
Chapter 23 Managing Long-Distance Fabrics . . . . . . . . . . . . . . . . . . . . . . . . . . . .551
Chapter 24 Using FC-FC Routing to Connect Fabrics . . . . . . . . . . . . . . . . . . . . . . .569
Fabric OS Administrator’s Guide 3
53-1002745-02
Appendix A Port Indexing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .611
Appendix B FIPS Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .615
Appendix C Hexadecimal Conversion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .627
4 Fabric OS Administrator’s Guide
53-1002745-02
Contents
About This Document
How this document is organized . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Supported hardware and software . . . . . . . . . . . . . . . . . . . . . . . . . . 34
What’s new in this document. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Document conventions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Notice to the reader . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Additional information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Getting technical help. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Document feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Section I Standard Features
Chapter 1 Understanding Fibre Channel Services
Fibre Channel services overview . . . . . . . . . . . . . . . . . . . . . . . . . . . .43
Management server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44
Platform services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44
Platform services and Virtual Fabrics. . . . . . . . . . . . . . . . . . . . .45
Enabling platform services . . . . . . . . . . . . . . . . . . . . . . . . . . . . .45
Disabling platform services. . . . . . . . . . . . . . . . . . . . . . . . . . . . .45
Management server database. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .45
Displaying the management server ACL. . . . . . . . . . . . . . . . . . .46
Adding a member to the ACL. . . . . . . . . . . . . . . . . . . . . . . . . . . .46
Deleting a member from the ACL . . . . . . . . . . . . . . . . . . . . . . . .47
Viewing the contents of the management server database . . . 48
Clearing the management server database . . . . . . . . . . . . . . .49
Topology discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .49
Displaying topology discovery status . . . . . . . . . . . . . . . . . . . . .49
Enabling topology discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . .49
Disabling topology discovery. . . . . . . . . . . . . . . . . . . . . . . . . . . .50
Device login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51
Principal switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
E_Port login process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Fabric login process. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52
Port login process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52
RSCNs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52
Duplicate Port World Wide Name . . . . . . . . . . . . . . . . . . . . . . . .53
High availability of daemon processes . . . . . . . . . . . . . . . . . . . . . . .53
Fabric OS Administrator’s Guide 5
53-1002745-02
Chapter 2 Performing Basic Configuration Tasks
Fabric OS overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55
Fabric OS command line interface. . . . . . . . . . . . . . . . . . . . . . . . . . .56
Console sessions using the serial port. . . . . . . . . . . . . . . . . . . .56
Telnet or SSH sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .57
Getting help on a command . . . . . . . . . . . . . . . . . . . . . . . . . . . .58
Viewing a history of command line entries . . . . . . . . . . . . . . . .59
Password modification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .61
Default account passwords. . . . . . . . . . . . . . . . . . . . . . . . . . . . .61
The switch Ethernet interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62
Virtual Fabrics and the Ethernet interface. . . . . . . . . . . . . . . . .63
Displaying the network interface settings . . . . . . . . . . . . . . . . .63
Static Ethernet addresses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .64
DHCP activation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .66
IPv6 autoconfiguration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .68
Date and time settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69
Setting the date and time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69
Time zone settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69
Network time protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Domain IDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .72
Displaying the domain IDs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73
Setting the domain ID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Switch names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Customizing the switch name . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Chassis names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .75
Customizing chassis names . . . . . . . . . . . . . . . . . . . . . . . . . . . .75
Fabric name. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .75
Configuring the fabric name . . . . . . . . . . . . . . . . . . . . . . . . . . . .75
High availability considerations for fabric names . . . . . . . . . . . 76
Upgrade and downgrade considerations for fabric names. . . . 76
Config file upload and download considerations for fabric
names. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Switch activation and deactivation . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Disabling a switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Enabling a switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .76
Switch and Backbone shutdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Powering off a Brocade switch . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Powering off a Brocade Backbone . . . . . . . . . . . . . . . . . . . . . . .77
Basic connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78
Device connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78
Switch connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78
6 Fabric OS Administrator’s Guide
53-1002745-02
Chapter 3 Performing Advanced Configuration Tasks
Port Identifiers (PIDs) and PID binding overview . . . . . . . . . . . . . . .79
Core PID addressing mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . .80
Fixed addressing mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .80
10-bit addressing mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .80
256-area addressing mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . .81
WWN-based PID assignment . . . . . . . . . . . . . . . . . . . . . . . . . . .82
Ports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84
Port Types. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84
Backbone port blades . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84
Configuring two Ethernet ports on one CP8 blade . . . . . . . . . .85
Setting port names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .86
Port identification by slot and port number . . . . . . . . . . . . . . . .87
Port identification by port area ID. . . . . . . . . . . . . . . . . . . . . . . .87
Port identification by index . . . . . . . . . . . . . . . . . . . . . . . . . . . . .87
Configuring a device-switch connection. . . . . . . . . . . . . . . . . . .88
Swapping port area IDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .88
Port activation and deactivation. . . . . . . . . . . . . . . . . . . . . . . . .89
Port decommissioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .90
Setting port modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .90
Setting port speeds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .92
Setting all ports on a switch to the same speed . . . . . . . . . . . .92
Setting port speed for a port octet . . . . . . . . . . . . . . . . . . . . . . .93
Blade terminology and compatibility . . . . . . . . . . . . . . . . . . . . . . . . .93
CP blades . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .95
Core blades . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .95
Port and application blade compatibility . . . . . . . . . . . . . . . . . .96
FX8-24 compatibility notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . .96
Enabling and disabling blades . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .96
Enabling blades . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Disabling blades. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Blade swapping. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
How blades are swapped . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .98
Swapping blades . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .100
Enabling and disabling switches . . . . . . . . . . . . . . . . . . . . . . . . . . .100
Power management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .101
Powering off a port blade . . . . . . . . . . . . . . . . . . . . . . . . . . . . .102
Powering on a port blade . . . . . . . . . . . . . . . . . . . . . . . . . . . . .102
Equipment status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .102
Checking switch operation . . . . . . . . . . . . . . . . . . . . . . . . . . . .102
Verifying High Availability features (Backbones only) . . . . . . .103
Verifying fabric connectivity. . . . . . . . . . . . . . . . . . . . . . . . . . . .103
Verifying device connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . .104
Track and control switch changes . . . . . . . . . . . . . . . . . . . . . . . . . .104
Enabling the track changes feature . . . . . . . . . . . . . . . . . . . . .104
Displaying the status of the track changes feature. . . . . . . . .105
Viewing the switch status policy threshold values. . . . . . . . . .105
Setting the switch status policy threshold values . . . . . . . . . .106
Fabric OS Administrator’s Guide 7
53-1002745-02
Audit log configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .107
Verifying host syslog prior to configuring the audit log . . . . . .108
Configuring an audit log for specific event classes . . . . . . . . .108
Duplicate PWWN handling during device login . . . . . . . . . . . . . . . .109
Setting the behavior for handling duplicate PWWNs. . . . . . . .110
Chapter 4 Routing Traffic
Routing overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .111
Paths and route selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . .112
FSPF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .112
Fibre Channel NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .113
Inter-switch links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .114
Buffer credits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .115
Congestions versus over-subscription . . . . . . . . . . . . . . . . . . .115
Virtual channels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .115
Gateway links. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .117
Configuring a link through a gateway . . . . . . . . . . . . . . . . . . . .118
Routing policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .118
Displaying the current routing policy . . . . . . . . . . . . . . . . . . . .119
Port-based routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .119
Exchange-based routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .119
Device-based routing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .120
AP route policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .120
Route selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .122
Dynamic Load Sharing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .122
Frame order delivery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .123
Forcing in-order frame delivery across topology changes. . . .123
Restoring out-of-order frame delivery across topology
changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .123
Using Frame Viewer to understand why frames are dropped.124
Chapter 5 Managing User Accounts
8 Fabric OS Administrator’s Guide
Lossless Dynamic Load Sharing on ports . . . . . . . . . . . . . . . . . . . .125
Lossless core . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .126
Configuring Lossless Dynamic Load Sharing. . . . . . . . . . . . . .127
Lossless Dynamic Load Sharing in Virtual Fabrics . . . . . . . . .127
Enabling forward error correction (FEC) . . . . . . . . . . . . . . . . . . . . .128
Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .128
Frame Redirection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .130
Creating a frame redirect zone . . . . . . . . . . . . . . . . . . . . . . . . .130
Deleting a frame redirect zone . . . . . . . . . . . . . . . . . . . . . . . . .131
Viewing frame redirect zones . . . . . . . . . . . . . . . . . . . . . . . . . .131
User accounts overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .133
Role-Based Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . .134
The management channel . . . . . . . . . . . . . . . . . . . . . . . . . . . .136
Managing user-defined roles . . . . . . . . . . . . . . . . . . . . . . . . . .136
53-1002745-02
Local database user accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . .137
Default accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .138
Local account passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . .139
Local user account database distribution. . . . . . . . . . . . . . . . . . . .140
Distributing the local user database . . . . . . . . . . . . . . . . . . . .140
Accepting distributed user databases on the local switch . . .140
Rejecting distributed user databases on the local switch . . . 141
Password policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .141
Password strength policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .141
Password history policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .142
Password expiration policy . . . . . . . . . . . . . . . . . . . . . . . . . . . .143
Account lockout policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .143
The boot PROM password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .145
Setting the boot PROM password for a switch with a
recovery string . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .145
Setting the boot PROM password for a Backbone with a
recovery string . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .146
Setting the boot PROM password for a switch without a
recovery string . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .147
Setting the boot PROM password for a Backbone without
a recovery string. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .148
Remote authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .149
Remote Authentication Configuration . . . . . . . . . . . . . . . . . . .149
Setting the switch authentication mode . . . . . . . . . . . . . . . . .152
Fabric OS user accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .152
Fabric OS users on the RADIUS server. . . . . . . . . . . . . . . . . . .154
Setting up a RADIUS server. . . . . . . . . . . . . . . . . . . . . . . . . . . .156
LDAP configuration and Microsoft Active Directory . . . . . . . . .162
LDAP configuration and OpenLDAP . . . . . . . . . . . . . . . . . . . . .165
TACACS+ service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
Remote authentication configuration on the switch . . . . . . . . 174
Configuring local authentication as backup. . . . . . . . . . . . . . .176
Chapter 6 Configuring Protocols
Fabric OS Administrator’s Guide 9
53-1002745-02
Security protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .177
Secure Copy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .178
Setting up SCP for configuration uploads and downloads . . .179
Secure Shell protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .179
SSH public key authentication . . . . . . . . . . . . . . . . . . . . . . . . .180
Secure Sockets Layer protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . .182
Browser and Java support . . . . . . . . . . . . . . . . . . . . . . . . . . . . .182
SSL configuration overview. . . . . . . . . . . . . . . . . . . . . . . . . . . .183
The browser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .186
Root certificates for the Java plugin . . . . . . . . . . . . . . . . . . . . .187
Simple Network Management Protocol . . . . . . . . . . . . . . . . . . . . . .188
SNMP and Virtual Fabrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . .189
SNMP security levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .190
SNMP configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .190
Telnet protocol. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .190
Blocking Telnet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .190
Unblocking Telnet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .191
Listener applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .192
Ports and applications used by switches . . . . . . . . . . . . . . . . . . . .192
Port configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .193
Chapter 7 Configuring Security Policies
ACL policies overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .195
How the ACL policies are stored . . . . . . . . . . . . . . . . . . . . . . . .195
Policy members . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .196
ACL policy management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .196
Displaying ACL policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .197
Saving changes without activating the policies . . . . . . . . . . . .197
Activating ACL policy changes . . . . . . . . . . . . . . . . . . . . . . . . . .197
Deleting an ACL policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .197
Adding a member to an existing ACL policy . . . . . . . . . . . . . . .198
Removing a member from an ACL policy . . . . . . . . . . . . . . . . .198
Abandoning unsaved ACL policy changes . . . . . . . . . . . . . . . .198
FCS policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .199
FCS policy restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .199
Ensuring fabric domains share policies . . . . . . . . . . . . . . . . . .200
Creating an FCS policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .201
Modifying the order of FCS switches . . . . . . . . . . . . . . . . . . . .201
FCS policy distribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .202
Device Connection Control policies . . . . . . . . . . . . . . . . . . . . . . . . .203
DCC policy restrictions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .203
Creating a DCC policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .204
Deleting a DCC policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .205
DCC policy behavior with Fabric-Assigned PWWNs . . . . . . . . .205
SCC Policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .206
Creating an SCC policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .207
10 Fabric OS Administrator’s Guide
Authentication policy for fabric elements . . . . . . . . . . . . . . . . . . . .207
E_Port authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .208
Device authentication policy . . . . . . . . . . . . . . . . . . . . . . . . . . .210
AUTH policy restrictions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .211
Authentication protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .212
Secret key pairs for DH-CHAP . . . . . . . . . . . . . . . . . . . . . . . . . .213
FCAP configuration overview. . . . . . . . . . . . . . . . . . . . . . . . . . .215
Fabric-wide distribution of the authorization policy. . . . . . . . .217
53-1002745-02
IP Filter policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .217
Creating an IP Filter policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . .218
Cloning an IP Filter policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . .218
Displaying an IP Filter policy . . . . . . . . . . . . . . . . . . . . . . . . . . .218
Saving an IP Filter policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .218
Activating an IP Filter policy. . . . . . . . . . . . . . . . . . . . . . . . . . . .219
Deleting an IP Filter policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . .219
IP Filter policy rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .219
IP Filter policy enforcement. . . . . . . . . . . . . . . . . . . . . . . . . . . .223
Adding a rule to an IP Filter policy. . . . . . . . . . . . . . . . . . . . . . .223
Deleting a rule from an IP Filter policy . . . . . . . . . . . . . . . . . . .223
Aborting an IP Filter transaction . . . . . . . . . . . . . . . . . . . . . . . .223
IP Filter policy distribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . .224
Managing filter thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . .224
Policy database distribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .224
Database distribution settings . . . . . . . . . . . . . . . . . . . . . . . . .225
ACL policy distribution to other switches . . . . . . . . . . . . . . . . .227
Fabric-wide enforcement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .227
Notes on joining a switch to the fabric . . . . . . . . . . . . . . . . . . .229
Management interface security . . . . . . . . . . . . . . . . . . . . . . . . . . . .231
Configuration examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .231
IP sec protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .233
Security associations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .233
Authentication and encryption algorithms . . . . . . . . . . . . . . . .234
IP sec policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .234
IKE policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .235
Creating the tunnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .236
Example of an end-to-end transport tunnel mode. . . . . . . . . .238
Chapter 8 Maintaining the Switch Configuration File
Configuration settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .241
Configuration file format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .242
Configuration file backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .244
Uploading a configuration file in interactive mode . . . . . . . . .245
Configuration file restoration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .246
Restrictions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .246
Configuration download without disabling a switch . . . . . . . .248
Configurations across a fabric . . . . . . . . . . . . . . . . . . . . . . . . . . . . .250
Downloading a configuration file from one switch to
another switch of the same model . . . . . . . . . . . . . . . . . . . . . .250
Security considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .250
Configuration management for Virtual Fabrics. . . . . . . . . . . . . . . .250
Uploading a configuration file from a switch with
Virtual Fabrics enabled . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .251
Restoring a logical switch configuration using
configDownload . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .251
Restrictions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .252
Brocade configuration form . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .253
Fabric OS Administrator’s Guide 11
53-1002745-02
Chapter 9 Installing and Maintaining Firmware
Firmware download process overview. . . . . . . . . . . . . . . . . . . . . . .255
Upgrading and downgrading firmware . . . . . . . . . . . . . . . . . . .257
Considerations for FICON CUP environments . . . . . . . . . . . . .257
HA sync state . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .257
Preparing for a firmware download . . . . . . . . . . . . . . . . . . . . . . . . .258
Obtaining and decompressing firmware . . . . . . . . . . . . . . . . .259
Connected switches. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .259
Finding the switch firmware version. . . . . . . . . . . . . . . . . . . . .259
Firmware download on switches . . . . . . . . . . . . . . . . . . . . . . . . . . .260
Switch firmware download process overview. . . . . . . . . . . . . .260
Firmware download on a Backbone. . . . . . . . . . . . . . . . . . . . . . . . .262
Backbone firmware download process overview. . . . . . . . . . .262
Firmware download from a USB device. . . . . . . . . . . . . . . . . . . . . .265
Enabling the USB device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .265
Viewing the USB file system . . . . . . . . . . . . . . . . . . . . . . . . . . .265
Downloading from the USB device using the relative path. . .266
Downloading from the USB device using the absolute path. .266
FIPS support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .266
Public and private key management . . . . . . . . . . . . . . . . . . . .266
The firmwareDownload command . . . . . . . . . . . . . . . . . . . . . .267
Power-on firmware checksum test . . . . . . . . . . . . . . . . . . . . . .268
Testing and restoring firmware on switches . . . . . . . . . . . . . . . . . .268
Testing a different firmware version on a switch. . . . . . . . . . .268
Testing and restoring firmware on Backbones . . . . . . . . . . . . . . . .270
Testing different firmware versions on Backbones . . . . . . . . .270
Validating a firmware download. . . . . . . . . . . . . . . . . . . . . . . . . . . .273
Chapter 10 Managing Virtual Fabrics
Virtual Fabrics overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .275
Logical switch overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .276
Default logical switch. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .276
Logical switches and fabric IDs. . . . . . . . . . . . . . . . . . . . . . . . .277
Port assignment in logical switches . . . . . . . . . . . . . . . . . . . . .278
Logical switches and connected devices . . . . . . . . . . . . . . . . .279
Management model for logical switches. . . . . . . . . . . . . . . . . . . . .281
Logical fabric overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .281
Logical fabric and ISLs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .282
Base switch and extended ISLs . . . . . . . . . . . . . . . . . . . . . . . .283
Account management and Virtual Fabrics . . . . . . . . . . . . . . . . . . .286
Supported platforms for Virtual Fabrics . . . . . . . . . . . . . . . . . . . . .286
Supported port configurations in the fixed-port switches. . . .286
Supported port configurations in Brocade Backbones . . . . . .287
Virtual Fabrics interaction with other Fabric OS features . . . .288
12 Fabric OS Administrator’s Guide
53-1002745-02
Limitations and restrictions of Virtual Fabrics . . . . . . . . . . . . . . . .288
Restrictions on XISLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .289
Restrictions on moving ports . . . . . . . . . . . . . . . . . . . . . . . . . .289
Enabling Virtual Fabrics mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . .290
Disabling Virtual Fabrics mode . . . . . . . . . . . . . . . . . . . . . . . . . . . .290
Configuring logical switches to use basic configuration values. . .291
Creating a logical switch or base switch . . . . . . . . . . . . . . . . . . . . .292
Executing a command in a different logical switch context . . . . . .293
Deleting a logical switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .294
Adding and moving ports on a logical switch . . . . . . . . . . . . . . . . .295
Displaying logical switch configuration . . . . . . . . . . . . . . . . . . . . . .296
Changing the fabric ID of a logical switch . . . . . . . . . . . . . . . . . . . .296
Changing a logical switch to a base switch. . . . . . . . . . . . . . . . . . .297
Setting up IP addresses for a Virtual Fabric . . . . . . . . . . . . . . . . . .298
Removing an IP address for a Virtual Fabric . . . . . . . . . . . . . . . . . .298
Configuring a logical switch to use XISLs . . . . . . . . . . . . . . . . . . . .299
Changing the context to a different logical fabric . . . . . . . . . . . . . .299
Creating a logical fabric using XISLs . . . . . . . . . . . . . . . . . . . . . . . .300
Chapter 11 Administering Advanced Zoning
Zone types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .303
Zoning overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .304
Approaches to zoning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .305
Zone objects. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .306
Zone aliases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .307
Zone configurations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .307
Zoning enforcement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .308
Considerations for zoning architecture . . . . . . . . . . . . . . . . . .309
Best practices for zoning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .310
Broadcast zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .310
Broadcast zones and Admin Domains . . . . . . . . . . . . . . . . . . .310
Broadcast zones and FC-FC routing . . . . . . . . . . . . . . . . . . . . .311
High availability considerations with broadcast zones . . . . . .312
Loop devices and broadcast zones . . . . . . . . . . . . . . . . . . . . .312
Broadcast zones and default zoning mode . . . . . . . . . . . . . . .312
Zone aliases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .312
Creating an alias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .313
Adding members to an alias . . . . . . . . . . . . . . . . . . . . . . . . . . .313
Removing members from an alias . . . . . . . . . . . . . . . . . . . . . .314
Deleting an alias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .314
Viewing an alias in the defined configuration . . . . . . . . . . . . .315
Fabric OS Administrator’s Guide 13
53-1002745-02
Zone creation and maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . .316
Displaying existing zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . .316
Creating a zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .316
Adding devices (members) to a zone . . . . . . . . . . . . . . . . . . . .317
Removing devices (members) from a zone . . . . . . . . . . . . . . .318
Replacing zone members . . . . . . . . . . . . . . . . . . . . . . . . . . . . .319
Deleting a zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .320
Viewing a zone in the defined configuration . . . . . . . . . . . . . .322
Validating a zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .323
Default zoning mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .326
Setting the default zoning mode. . . . . . . . . . . . . . . . . . . . . . . .326
Viewing the current default zone access mode. . . . . . . . . . . .327
Zone database size. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .327
Zone configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .328
Creating a zone configuration. . . . . . . . . . . . . . . . . . . . . . . . . .328
Adding zones (members) to a zone configuration . . . . . . . . . .329
Removing zones (members) from a zone configuration . . . . .329
Enabling a zone configuration . . . . . . . . . . . . . . . . . . . . . . . . .330
Disabling a zone configuration . . . . . . . . . . . . . . . . . . . . . . . . .330
Deleting a zone configuration . . . . . . . . . . . . . . . . . . . . . . . . . .331
Abandoning zone configuration changes. . . . . . . . . . . . . . . . .331
Viewing all zone configuration information . . . . . . . . . . . . . . .331
Viewing selected zone configuration information . . . . . . . . . .332
Viewing the configuration in the effective zone database . . .332
Clearing all zone configurations . . . . . . . . . . . . . . . . . . . . . . . .333
Zone object maintenance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .333
Copying a zone object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .333
Deleting a zone object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .334
Renaming a zone object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .335
Zone configuration management. . . . . . . . . . . . . . . . . . . . . . . . . . .336
Security and zoning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .336
Zone merging. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .336
Fabric segmentation and zoning. . . . . . . . . . . . . . . . . . . . . . . .338
Zone merging scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .339
Concurrent zone transactions . . . . . . . . . . . . . . . . . . . . . . . . . . . . .342
Chapter 12 Traffic Isolation Zoning
Traffic Isolation Zoning overview . . . . . . . . . . . . . . . . . . . . . . . . . . .345
TI zone failover. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .346
FSPF routing rules and traffic isolation . . . . . . . . . . . . . . . . . .349
Enhanced TI zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .350
Illegal configurations with enhanced TI zones. . . . . . . . . . . . .351
Traffic Isolation Zoning over FC routers . . . . . . . . . . . . . . . . . . . . . .352
TI zones within an edge fabric . . . . . . . . . . . . . . . . . . . . . . . . .354
TI zones within a backbone fabric . . . . . . . . . . . . . . . . . . . . . .355
Limitations of TI zones over FC routers . . . . . . . . . . . . . . . . . .356
14 Fabric OS Administrator’s Guide
53-1002745-02
General rules for TI zones. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .356
Traffic Isolation Zone violation handling for trunk ports . . . . .357
Supported configurations for Traffic Isolation Zoning . . . . . . . . . .358
Additional configuration rules for enhanced TI zones. . . . . . .358
Trunking with TI zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .359
Limitations and restrictions of Traffic Isolation Zoning . . . . . . . . .359
Admin Domain considerations for Traffic Isolation Zoning . . . . . .360
Virtual Fabrics considerations for Traffic Isolation Zoning . . . . . . .361
Traffic Isolation Zoning over FC routers with Virtual Fabrics . . . . .363
Creating a TI zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .364
Creating a TI zone in a base fabric . . . . . . . . . . . . . . . . . . . . . .366
Modifying TI zones. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .367
Changing the state of a TI zone . . . . . . . . . . . . . . . . . . . . . . . . . . . .368
Deleting a TI zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .369
Displaying TI zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .369
Troubleshooting TI zone routing problems . . . . . . . . . . . . . . . . . . .370
Setting up TI over FCR (sample procedure). . . . . . . . . . . . . . . . . . . 371
Chapter 13 Bottleneck Detection
Bottleneck detection overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . .375
Types of bottlenecks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .376
How bottlenecks are reported. . . . . . . . . . . . . . . . . . . . . . . . . .376
Supported configurations for bottleneck detection . . . . . . . . . . . .377
Limitations of bottleneck detection . . . . . . . . . . . . . . . . . . . . .377
High availability considerations for bottleneck detection . . . .378
Upgrade and downgrade considerations for bottleneck
detection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .378
Trunking considerations for bottleneck detection . . . . . . . . . . 378
Virtual Fabrics considerations for bottleneck detection . . . . .378
Access Gateway considerations for bottleneck detection. . . .378
Credit Loss. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .379
Back-end credit loss detection and recovery support on
Brocade 5300 switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .379
Back-end credit loss detection and recovery support on
Brocade 6520 switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .379
Enabling back-end credit loss detection and recovery . . . . . .380
Enabling bottleneck detection on a switch . . . . . . . . . . . . . . . . . . .380
Displaying bottleneck detection configuration details . . . . . . . . . .381
Setting bottleneck detection alerts . . . . . . . . . . . . . . . . . . . . . . . . .382
Setting both a congestion alert and a latency alert . . . . . . . .383
Setting a congestion alert only . . . . . . . . . . . . . . . . . . . . . . . . .384
Setting a latency alert only . . . . . . . . . . . . . . . . . . . . . . . . . . . .384
Fabric OS Administrator’s Guide 15
53-1002745-02
Changing bottleneck detection parameters . . . . . . . . . . . . . . . . . .384
Examples of applying and changing bottleneck detection
parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .385
Advanced bottleneck detection settings . . . . . . . . . . . . . . . . . . . . .388
Excluding a port from bottleneck detection . . . . . . . . . . . . . . . . . .389
Displaying bottleneck statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . .391
Disabling bottleneck detection on a switch . . . . . . . . . . . . . . . . . .392
Chapter 14 In-flight Encryption and Compression
In-flight encryption and compression overview. . . . . . . . . . . . . . . .393
Encryption and compression restrictions. . . . . . . . . . . . . . . . .394
How encryption and compression are enabled . . . . . . . . . . . .396
Authentication and key generation. . . . . . . . . . . . . . . . . . . . . .398
Availability considerations. . . . . . . . . . . . . . . . . . . . . . . . . . . . .398
Virtual Fabrics considerations. . . . . . . . . . . . . . . . . . . . . . . . . .399
Recommendation for compression. . . . . . . . . . . . . . . . . . . . . .399
Configuring encryption and compression . . . . . . . . . . . . . . . . . . . .399
Viewing the encryption and compression configuration . . . . .401
Port speed and encryption/compression enabled ports . . . .401
Changing port speed on encryption/compression enabled
ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .402
Compression ratios and encryption/compression enabled
ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .402
Configuring and enabling authentication. . . . . . . . . . . . . . . . .403
Configuring encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .404
Configuring compression. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .404
Disabling encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .405
Disabling compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .405
Encryption and compression examples. . . . . . . . . . . . . . . . . . . . . .406
Example of enabling encryption and compression on an
E_Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .407
Examples of disabling encryption and compression . . . . . . . .410
Chapter 15 NPIV
16 Fabric OS Administrator’s Guide
Working with EX_Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .411
In-flight encryption/compression on EX_Ports . . . . . . . . . . . .411
Example of enabling encryption and compression on an
EX_Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .412
NPIV overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .419
Upgrade considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .420
Fixed addressing mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .420
10-bit addressing mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .420
Configuring NPIV . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .421
Enabling and disabling NPIV . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .422
Viewing NPIV port configuration information . . . . . . . . . . . . . . . . .423
Viewing virtual PID login information . . . . . . . . . . . . . . . . . . . .424
53-1002745-02
Chapter 16 Dynamic Fabric Provisioning: Fabric-Assigned PWWN
Introduction to Dynamic Fabric Provisioning using FA-PWWN . . . .425
User- and auto-assigned FA-PWWN behavior . . . . . . . . . . . . . . . . .426
Checking for duplicate FA-PWWNs . . . . . . . . . . . . . . . . . . . . . .426
Configuring FA-PWWNs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .426
Configuring an FA-PWWN for an HBA connected to an
Access Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .427
Configuring an FA-PWWN for an HBA connected to an
edge switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .428
Supported switches and configurations for FA-PWWN. . . . . . . . . .429
Configuration upload and download considerations for FA-PWWN430
Firmware upgrade and downgrade considerations for FA-PWWN .430
Security considerations for FA-PWWN . . . . . . . . . . . . . . . . . . . . . . .430
Restrictions of FA-PWWN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .431
Access Gateway N_Port failover with FA-PWWN . . . . . . . . . . . . . . .431
Chapter 17 Managing Administrative Domains
Administrative Domains overview . . . . . . . . . . . . . . . . . . . . . . . . . .433
Admin Domain features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .435
Requirements for Admin Domains . . . . . . . . . . . . . . . . . . . . . .435
Admin Domain access levels. . . . . . . . . . . . . . . . . . . . . . . . . . .435
User-defined Admin Domains . . . . . . . . . . . . . . . . . . . . . . . . . .436
System-defined Admin Domains. . . . . . . . . . . . . . . . . . . . . . . .436
Home Admin Domains and login . . . . . . . . . . . . . . . . . . . . . . .438
Admin Domain member types. . . . . . . . . . . . . . . . . . . . . . . . . .439
Admin Domains and switch WWNs. . . . . . . . . . . . . . . . . . . . . .440
Admin Domain compatibility, availability, and merging. . . . . .442
Admin Domain management for physical fabric administrators . .442
Setting the default zoning mode for Admin Domains . . . . . . .443
Creating an Admin Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . .443
User assignments to Admin Domains . . . . . . . . . . . . . . . . . . .444
Removing an Admin Domain from a user account . . . . . . . . .446
Activating an Admin Domain. . . . . . . . . . . . . . . . . . . . . . . . . . .446
Deactivating an Admin Domain . . . . . . . . . . . . . . . . . . . . . . . .447
Adding members to an existing Admin Domain. . . . . . . . . . . .447
Removing members from an Admin Domain . . . . . . . . . . . . . .448
Renaming an Admin Domain . . . . . . . . . . . . . . . . . . . . . . . . . .448
Deleting an Admin Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . .449
Deleting all user-defined Admin Domains . . . . . . . . . . . . . . . .450
Deleting all user-defined Admin Domains non-disruptively . .450
Validating an Admin Domain member list . . . . . . . . . . . . . . . .454
Fabric OS Administrator’s Guide 17
53-1002745-02
SAN management with Admin Domains . . . . . . . . . . . . . . . . . . . . .454
CLI commands in an AD context. . . . . . . . . . . . . . . . . . . . . . . .455
Executing a command in a different AD context . . . . . . . . . . .455
Displaying an Admin Domain configuration . . . . . . . . . . . . . . .456
Switching to a different Admin Domain context. . . . . . . . . . . .456
Admin Domain interactions with other Fabric OS features. . .457
Admin Domains, zones, and zone databases . . . . . . . . . . . . .458
Admin Domains and LSAN zones . . . . . . . . . . . . . . . . . . . . . . .459
Configuration upload and download in an AD context . . . . . .460
Section II Licensed Features
Chapter 18 Administering Licensing
Licensing overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .463
Brocade 7800 Upgrade license . . . . . . . . . . . . . . . . . . . . . . . . . . . .470
ICL licensing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 471
ICL 1st POD license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 471
ICL 2nd POD license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 471
ICL 8-link license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .472
ICL 16-link license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .472
Enterprise ICL license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .472
8G licensing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .473
Slot-based licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474
Upgrade and downgrade considerations . . . . . . . . . . . . . . . . . 474
Assigning a license to a slot . . . . . . . . . . . . . . . . . . . . . . . . . . .475
Removing a license from a slot. . . . . . . . . . . . . . . . . . . . . . . . .475
10G licensing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .475
Enabling 10 Gbps operation on an FC port . . . . . . . . . . . . . . .476
Enabling the 10-GbE ports on an FX8-24 blade . . . . . . . . . . . 477
Temporary licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .478
Restrictions on upgrading temporary slot-based licenses . . . 479
Date change restriction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .479
Configupload and download considerations . . . . . . . . . . . . . .479
Expired licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .480
Universal temporary licenses . . . . . . . . . . . . . . . . . . . . . . . . . .480
Extending a universal temporary license . . . . . . . . . . . . . . . . .480
Universal temporary license shelf life. . . . . . . . . . . . . . . . . . . .480
Viewing installed licenses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .481
Activating a license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .481
Adding a licensed feature. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .481
Removing a licensed feature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .482
18 Fabric OS Administrator’s Guide
53-1002745-02
Ports on Demand . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .483
Displaying installed licenses . . . . . . . . . . . . . . . . . . . . . . . . . . .484
Activating Ports on Demand . . . . . . . . . . . . . . . . . . . . . . . . . . .485
Dynamic Ports on Demand . . . . . . . . . . . . . . . . . . . . . . . . . . . .485
Displaying the port license assignments . . . . . . . . . . . . . . . . .486
Enabling Dynamic Ports on Demand . . . . . . . . . . . . . . . . . . . .486
Disabling Dynamic Ports on Demand. . . . . . . . . . . . . . . . . . . .487
Reserving a port license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .488
Releasing a port from a POD set. . . . . . . . . . . . . . . . . . . . . . . .488
Chapter 19 Inter-chassis Links
Inter-chassis links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .491
ICLs for the Brocade DCX 8510 Backbone family. . . . . . . . . . . . . .492
ICL trunking on the Brocade DCX 8510-8 and DCX 8510-4 . .493
ICLs for the Brocade DCX Backbone family. . . . . . . . . . . . . . . . . . .493
ICL trunking on the Brocade DCX and DCX-4S. . . . . . . . . . . . .494
Virtual Fabrics considerations for ICLs . . . . . . . . . . . . . . . . . . . . . .494
Supported topologies for ICL connections . . . . . . . . . . . . . . . . . . .495
Mesh topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .495
Core-edge topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .496
Chapter 20 Monitoring Fabric Performance
Advanced Performance Monitoring overview . . . . . . . . . . . . . . . . .499
Types of monitors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .499
Restrictions for installing monitors. . . . . . . . . . . . . . . . . . . . . .500
Virtual Fabrics considerations for Advanced Performance
Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .500
Access Gateway considerations for Advanced Performance
Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .501
End-to-end performance monitoring . . . . . . . . . . . . . . . . . . . . . . . .501
Maximum number of EE monitors . . . . . . . . . . . . . . . . . . . . . .501
Supported port configurations for EE monitors . . . . . . . . . . . .502
Adding EE monitors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .502
Setting a mask for an EE monitor. . . . . . . . . . . . . . . . . . . . . . .503
Deleting EE monitors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .504
Displaying EE monitor counters . . . . . . . . . . . . . . . . . . . . . . . .504
Clearing EE monitor counters . . . . . . . . . . . . . . . . . . . . . . . . . .505
Frame monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .505
Creating frame types to be monitored . . . . . . . . . . . . . . . . . . .506
Creating a frame monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . .507
Deleting frame types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .507
Adding frame monitors to a port. . . . . . . . . . . . . . . . . . . . . . . .508
Removing frame monitors from a port . . . . . . . . . . . . . . . . . . .508
Saving a frame monitor configuration . . . . . . . . . . . . . . . . . . .508
Displaying frame monitors . . . . . . . . . . . . . . . . . . . . . . . . . . . .508
Clearing frame monitor counters . . . . . . . . . . . . . . . . . . . . . . .509
Fabric OS Administrator’s Guide 19
53-1002745-02
Top Talker monitors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .510
Top Talker monitors and FC-FC routing. . . . . . . . . . . . . . . . . . .511
Limitations of Top Talker monitors . . . . . . . . . . . . . . . . . . . . . .512
Adding a Top Talker monitor to a port (port mode) . . . . . . . . .513
Adding Top Talker monitors on all switches in the fabric
(fabric mode) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .513
Displaying the top n bandwidth-using flows on a port
(port mode). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .513
Displaying top talking flows for a given domain ID
(fabric mode) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .514
Deleting a Top Talker monitor on a port (port mode) . . . . . . .514
Deleting all fabric mode Top Talker monitors. . . . . . . . . . . . . .515
Trunk monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .515
Saving and restoring monitor configurations . . . . . . . . . . . . . . . . .515
Performance data collection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .516
Chapter 21 Optimizing Fabric Behavior
Adaptive Networking overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . .517
Ingress Rate Limiting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .518
Virtual Fabrics considerations. . . . . . . . . . . . . . . . . . . . . . . . . .519
Limiting traffic from a particular device . . . . . . . . . . . . . . . . . .519
Disabling Ingress Rate Limiting . . . . . . . . . . . . . . . . . . . . . . . .519
QoS: SID/DID traffic prioritization . . . . . . . . . . . . . . . . . . . . . . . . . .519
License requirements for SID/DID prioritization . . . . . . . . . . .520
CS_CTL-based frame prioritization. . . . . . . . . . . . . . . . . . . . . . . . . .521
QoS zone-based traffic prioritization . . . . . . . . . . . . . . . . . . . . . . . .523
Trunking considerations before you install the
Adaptive Networking license. . . . . . . . . . . . . . . . . . . . . . . . . . .523
Manually disabling QoS on trunked ports . . . . . . . . . . . . . . . .524
QoS zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .525
QoS on E_Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .526
QoS over FC routers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .527
Virtual Fabrics considerations for QoS zone-based traffic
prioritization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .528
High-availability considerations for QoS zone-based traffic
prioritization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .528
Supported configurations for QoS zone-based traffic
prioritization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .529
Limitations and restrictions for QoS zone-based traffic
prioritization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .529
Setting QoS zone-based traffic prioritization. . . . . . . . . . . . . . . . . .530
Setting QoS zone-based traffic prioritization over FC routers . . . .532
Disabling QoS zone-based traffic prioritization. . . . . . . . . . . . . . . .532
20 Fabric OS Administrator’s Guide
53-1002745-02
Chapter 22 Managing Trunking Connections
Trunking overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .533
Types of trunking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .534
Masterless trunking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .534
License requirements for trunking . . . . . . . . . . . . . . . . . . . . . .535
Port groups for trunking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .535
Supported configurations for trunking . . . . . . . . . . . . . . . . . . . . . .535
High Availability support for trunking . . . . . . . . . . . . . . . . . . . .536
Supported platforms for trunking. . . . . . . . . . . . . . . . . . . . . . . . . . .536
Requirements for trunk groups . . . . . . . . . . . . . . . . . . . . . . . . . . . .536
Recommendations for trunk groups . . . . . . . . . . . . . . . . . . . . . . . .537
Configuring trunk groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .538
Enabling trunking on a port or switch . . . . . . . . . . . . . . . . . . . . . . .538
Disabling trunking on a port or switch. . . . . . . . . . . . . . . . . . . . . . .538
Displaying trunking information . . . . . . . . . . . . . . . . . . . . . . . . . . . .539
Trunk Area and Admin Domains. . . . . . . . . . . . . . . . . . . . . . . . . . . .540
ISL trunking over long-distance fabrics . . . . . . . . . . . . . . . . . . . . . .540
EX_Port trunking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .541
Masterless EX_Port trunking. . . . . . . . . . . . . . . . . . . . . . . . . . .542
Supported configurations and platforms for EX_Port
trunking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .542
Configuring EX_Port trunking . . . . . . . . . . . . . . . . . . . . . . . . . .542
Displaying EX_Port trunking information . . . . . . . . . . . . . . . . .542
F_Port trunking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .543
F_Port trunking for Access Gateway . . . . . . . . . . . . . . . . . . . . .543
F_Port trunking for Brocade adapters . . . . . . . . . . . . . . . . . . .545
F_Port trunking considerations. . . . . . . . . . . . . . . . . . . . . . . . .546
F_Port trunking in Virtual Fabrics . . . . . . . . . . . . . . . . . . . . . . .548
Chapter 23 Managing Long-Distance Fabrics
Fabric OS Administrator’s Guide 21
53-1002745-02
Displaying F_Port trunking information . . . . . . . . . . . . . . . . . . . . . .549
Disabling F_Port trunking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .549
Enabling the DCC policy on a trunk area. . . . . . . . . . . . . . . . . . . . .550
Trunking with TI zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .550
Long-distance fabrics overview . . . . . . . . . . . . . . . . . . . . . . . . . . . .551
Extended Fabrics device limitations . . . . . . . . . . . . . . . . . . . . . . . .552
Long -distance link modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .552
Configuring an extended ISL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .553
Enabling long distance when connecting to TDM devices . . .554
Buffer credit management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .555
Buffer-to-buffer flow control . . . . . . . . . . . . . . . . . . . . . . . . . . .555
Optimal buffer credit allocation . . . . . . . . . . . . . . . . . . . . . . . .556
Fibre Channel gigabit values reference definition. . . . . . . . . .557
Buffer credit allocation based on full-size frames. . . . . . . . . .557
Allocating buffer credits based on average-size frames . . . . .560
Configuring buffers for a single port directly . . . . . . . . . . . . . .561
Configuring buffers using frame size . . . . . . . . . . . . . . . . . . . .561
Calculating the number of buffers required given the
distance, speed, and frame size. . . . . . . . . . . . . . . . . . . . . . . .561
Allocating buffer credits for F_Ports . . . . . . . . . . . . . . . . . . . . .562
Monitoring buffers in a port group . . . . . . . . . . . . . . . . . . . . . .562
Buffer credits switch or blade model . . . . . . . . . . . . . . . . . . . .563
Maximum configurable distances for Extended Fabrics . . . . .564
Downgrade considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . .565
Buffer credit recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .566
Buffer credit recovery over an E_Port. . . . . . . . . . . . . . . . . . . .566
Buffer credit recovery over an F_Port. . . . . . . . . . . . . . . . . . . .566
Buffer credit recovery over an EX_Port. . . . . . . . . . . . . . . . . . .567
Enabling and disabling buffer credit recovery . . . . . . . . . . . . .567
Forward error correction on long-distance links . . . . . . . . . . . . . . .568
Enabling FEC on a long-distance link . . . . . . . . . . . . . . . . . . . .568
Disabling FEC on a long-distance link . . . . . . . . . . . . . . . . . . .568
Chapter 24 Using FC-FC Routing to Connect Fabrics
FC-FC routing overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .569
License requirements for FC-FC routing. . . . . . . . . . . . . . . . . .570
Supported platforms for FC-FC routing. . . . . . . . . . . . . . . . . . .570
Supported configurations for FC-FC routing. . . . . . . . . . . . . . .571
Network OS connectivity limitations . . . . . . . . . . . . . . . . . . . . .571
Fibre Channel routing concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . .572
Proxy devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .575
FC-FC routing topologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .576
Phantom domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .577
FCR authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .579
Setting up FC-FC routing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .579
Verifying the setup for FC-FC routing . . . . . . . . . . . . . . . . . . . .580
Backbone fabric IDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .581
Assigning backbone fabric IDs . . . . . . . . . . . . . . . . . . . . . . . . .582
FCIP tunnel configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .582
Inter-fabric link configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .583
Configuring an IFL for both edge and backbone connections583
FC router port cost configuration. . . . . . . . . . . . . . . . . . . . . . . . . . .587
Port cost considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .588
Setting router port cost for an EX_Port. . . . . . . . . . . . . . . . . . .588
22 Fabric OS Administrator’s Guide
EX_Port frame trunking configuration . . . . . . . . . . . . . . . . . . . . . . .589
53-1002745-02
LSAN zone configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .590
Use of Admin Domains with LSAN zones and FC-FC routing .590
Zone definition and naming . . . . . . . . . . . . . . . . . . . . . . . . . . .590
LSAN zones and fabric-to-fabric communications. . . . . . . . . .591
Controlling device communication with the LSAN . . . . . . . . . .591
Configuring backbone fabrics for interconnectivity . . . . . . . . .593
Setting the maximum LSAN count . . . . . . . . . . . . . . . . . . . . . .594
HA and downgrade considerations for LSAN zones . . . . . . . .594
LSAN zone policies using LSAN tagging . . . . . . . . . . . . . . . . . .594
LSAN zone binding. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .598
Proxy PID configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .603
Fabric parameter considerations. . . . . . . . . . . . . . . . . . . . . . . . . . .603
Inter-fabric broadcast frames. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .604
Displaying the current broadcast configuration. . . . . . . . . . . .604
Enabling broadcast frame forwarding . . . . . . . . . . . . . . . . . . .604
Disabling broadcast frame forwarding . . . . . . . . . . . . . . . . . . .604
Resource monitoring. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .604
FC-FC routing and Virtual Fabrics. . . . . . . . . . . . . . . . . . . . . . . . . . .606
Logical switch configuration for FC routing . . . . . . . . . . . . . . .607
Backbone-to-edge routing with Virtual Fabrics . . . . . . . . . . . .608
Upgrade and downgrade considerations for FC-FC routing . . . . . .609
How replacing port blades affects EX_Port configuration. . . .609
Displaying the range of output ports connected to xlate domains609
Appendix A Port Indexing
Appendix B FIPS Support
FIPS overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .615
Zeroization functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .615
Power-on self tests. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .617
Conditional tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .617
FIPS mode configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .617
LDAP in FIPS mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .618
LDAP certificates for FIPS mode . . . . . . . . . . . . . . . . . . . . . . . .620
Preparing a switch for FIPS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .621
Overview of steps. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .622
Enabling FIPS mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .622
Zeroizing for FIPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .624
Displaying FIPS configuration . . . . . . . . . . . . . . . . . . . . . . . . . .625
Appendix C Hexadecimal Conversion
Example conversion of the hexadecimal triplet Ox616000 . .627
Decimal-to-hexadecimal conversion table . . . . . . . . . . . . . . . .628
Index
Fabric OS Administrator’s Guide 23
53-1002745-02
24 Fabric OS Administrator’s Guide
53-1002745-02
Figures
Figure 1 Well-known addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Figure 2 Identifying the blades . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Figure 3 Blade swap with Virtual Fabrics during the swap. . . . . . . . . . . . . . . . . . . . . . . . . 99
Figure 4 Blade swap with Virtual Fabrics after the swap . . . . . . . . . . . . . . . . . . . . . . . . . 100
Figure 5 Principal ISLs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Figure 6 New switch added to existing fabric . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Figure 7 Virtual channels on a QoS-enabled ISL. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Figure 8 Gateway link merging SANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Figure 9 Single host and target . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Figure 10 Windows 2000 VSA configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Figure 11 Example of a Brocade DCT file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Figure 12 Example of the dictiona.dcm file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Figure 13 DH-CHAP authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
Figure 14 Protected endpoints configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
Figure 15 Gateway tunnel configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
Figure 16 Endpoint-to-gateway tunnel configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
Figure 17 Switch before and after enabling Virtual Fabrics . . . . . . . . . . . . . . . . . . . . . . . . 276
Figure 18 Switch before and after creating logical switches . . . . . . . . . . . . . . . . . . . . . . . 277
Figure 19 Fabric IDs assigned to logical switches. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
Figure 20 Assigning ports to logical switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
Figure 21 Logical switches connected to devices and non-Virtual Fabrics switch . . . . . . 280
Figure 22 Logical switches in a single chassis belong to separate fabrics . . . . . . . . . . . . 280
Figure 23 Logical switches connected to other logical switches through physical ISLs. . 282
Figure 24 Logical switches connected to form logical fabrics . . . . . . . . . . . . . . . . . . . . . . 282
Figure 25 Base switches connected by an XISL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
Figure 26 Logical ISLs connecting logical switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284
Figure 27 Logical fabric using ISLs and XISLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284
Figure 28 Example of logical fabrics in multiple chassis and XISLs . . . . . . . . . . . . . . . . . 300
Figure 29 Zoning example. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
Figure 30 Broadcast zones and Admin Domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
Figure 31 Traffic Isolation zone creating a dedicated path through the fabric. . . . . . . . . 346
Figure 32 Fabric incorrectly configured for TI zone with failover disabled . . . . . . . . . . . . 348
Figure 33 Dedicated path is the only shortest path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349
Figure 34 Dedicated path is not the shortest path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350
Figure 35 Enhanced TI zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350
Fabric OS Administrator’s Guide 25
53-1002745-02
Figure 36 Illegal ETIZ configuration: two paths from one port to two devices on the same remote
domain 351
Figure 37 Illegal ETIZ configuration: two paths from one port . . . . . . . . . . . . . . . . . . . . . . 352
Figure 38 Traffic Isolation Zoning over FCR. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353
Figure 39 TI zone in an edge fabric . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354
Figure 40 TI zone in a backbone fabric . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355
Figure 41 TI zone misconfiguration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
Figure 42 Dedicated path with Virtual Fabrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361
Figure 43 Creating a TI zone in a logical fabric . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362
Figure 44 Creating a TI zone in a base fabric . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362
Figure 45 Example configuration for TI zones over FC routers in logical fabrics . . . . . . . 363
Figure 46 Logical representation of TI zones over FC routers in logical fabrics . . . . . . . . 363
Figure 47 TI over FCR example. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
Figure 48 Affected seconds for bottleneck detection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
Figure 49 Encryption and compression on 16 Gbps ISLs. . . . . . . . . . . . . . . . . . . . . . . . . . 394
Figure 50 EX_Ports, E_Ports, IFLs, and ISLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411
Figure 51 Fabric-assigned port world wide name provisioning scenarios . . . . . . . . . . . . . 427
Figure 52 Fabric with two Admin Domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434
Figure 53 Filtered fabric views when using Admin Domains . . . . . . . . . . . . . . . . . . . . . . . 434
Figure 54 Fabric with AD0 and AD255. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438
Figure 55 Fabric showing switch and device WWNs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441
Figure 56 Filtered fabric views showing converted switch WWNs . . . . . . . . . . . . . . . . . . . 441
Figure 57 AD0 and two user-defined Admin Domains, AD1 and AD2 . . . . . . . . . . . . . . . . 452
Figure 58 AD0 with three zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452
Figure 59 Minimum configuration for 64 Gbps ICLs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 492
Figure 60 DCX-4S allowed ICL connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 494
Figure 61 ICL triangular topology with Brocade DCX 8510-8 chassis . . . . . . . . . . . . . . . . 495
Figure 62 Full nine-mesh topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 496
Figure 63 64 Gbps ICL core-edge topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497
Figure 64 Setting end-to-end monitors on a port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502
Figure 65 Mask positions for end-to-end monitors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504
Figure 66 Fabric mode Top Talker monitors on FC router do not monitor any flows . . . . 512
Figure 67 Fabric mode Top Talker monitors on FC router monitor flows over the E_Port 512
Figure 68 QoS traffic prioritization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 526
Figure 69 QoS with E_Ports enabled . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527
Figure 70 Traffic prioritization in a logical fabric . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 529
Figure 71 Trunk group configuration for the Brocade 5100 . . . . . . . . . . . . . . . . . . . . . . . 535
Figure 72 Switch in Access Gateway mode without F_Port masterless trunking . . . . . . . 544
Figure 73 Switch in Access Gateway mode with F_Port masterless trunking. . . . . . . . . . 544
Figure 74 A metaSAN with inter-fabric links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 572
Figure 75 A metaSAN with edge-to-edge and backbone fabrics and LSAN zones . . . . . . 573
Figure 76 Edge SANs connected through a backbone fabric. . . . . . . . . . . . . . . . . . . . . . . 575
26 Fabric OS Administrator’s Guide
53-1002745-02
Figure 77 MetaSAN with imported devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 576
Figure 78 Sample topology (physical topology) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 577
Figure 79 EX_Port phantom switch topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 578
Figure 80 Example of setting up Speed LSAN tag. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 596
Figure 81 LSAN zone binding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 599
Figure 82 EX_Ports in a base switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607
Figure 83 Logical representation of EX_Ports in a base switch . . . . . . . . . . . . . . . . . . . . . 608
Figure 84 Backbone-to-edge routing across base switch using FC router in legacy mode 609
Fabric OS Administrator’s Guide 27
53-1002745-02
28 Fabric OS Administrator’s Guide
53-1002745-02
Tables
Tab le 1 Daemons that are automatically restarted. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Tab le 2 Terminal port parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Tab le 3 Help topic contents. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Tab le 4 fabricShow fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Tab le 5 Core and CP blade terminology and platform support. . . . . . . . . . . . . . . . . . . . . 93
Tab le 6 Port blade terminology, numbering, and platform support . . . . . . . . . . . . . . . . . 94
Tab le 7 Blade compatibility within Brocade Backbone families. . . . . . . . . . . . . . . . . . . . 96
Tab le 8 Duplicate PWWN behavior: First login takes precedence over second login. . 109
Tab le 9 Duplicate PWWN behavior: Second login overrides first login . . . . . . . . . . . . . 110
Tab le 10 Duplicate PWWN behavior: Port type determines which login takes precedence 110
Tab le 11 Combinations of routing policy and IOD with Lossless DLS enabled . . . . . . . . 126
Tab le 12 Default Fabric OS roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Tab le 13 Permission types. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Tab le 14 Maximum number of simultaneous sessions. . . . . . . . . . . . . . . . . . . . . . . . . . . 136
Tab le 15 Default local user accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
Tab le 16 LDAP options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Table 17 Authentication configuration options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Tab le 18 Syntax for VSA-based account roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Tab le 19 Entries in dictionary.brocade file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Tab le 20 Brocade custom TACACS+ attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Tab le 21 Secure protocol support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
Tab le 22 Items needed to deploy secure protocols. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
Tab le 23 Main security scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
Tab le 24 SSL certificate files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Tab le 25 Blocked listener applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
Tab le 26 Access defaults. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
Tab le 27 Port information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Tab le 28 Valid methods for specifying policy members . . . . . . . . . . . . . . . . . . . . . . . . . . 196
Tab le 29 FCS policy states. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
Tab le 30 FCS switch operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
Tab le 31 Distribution policy states . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
Tab le 32 DCC policy states . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
Tab le 33 DCC policy behavior with FA-PWWN when created using lockdown support . . 205
Tab le 34 DCC policy behavior when created manually with PWWN . . . . . . . . . . . . . . . . . 206
Tab le 35 SCC policy states . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
Tab le 36 FCAP certificate files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
Fabric OS Administrator’s Guide 29
53-1002745-02
Tab le 37 Supported services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
Tab le 38 Implicit IP Filter rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
Tab le 39 Default IP policy rules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
Tab le 40 Interaction between fabric-wide consistency policy and distribution settings . 225
Tab le 41 Supported policy databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Tab le 42 Fabric-wide consistency policy settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
Tab le 43 Merging fabrics with matching fabric-wide consistency policies. . . . . . . . . . . . 229
Tab le 4 4 Examples of strict fabric merges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
Tab le 45 Fabric merges with tolerant and absent combinations . . . . . . . . . . . . . . . . . . . 230
Tab le 46 Algorithms and associated authentication policies . . . . . . . . . . . . . . . . . . . . . . 234
Tab le 47 CLI commands to display or modify switch configuration information . . . . . . . 247
Tab le 48 Brocade configuration and connection form . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
Tab le 49 Backbone HA sync states. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
Tab le 50 Blade and port types supported on logical switches . . . . . . . . . . . . . . . . . . . . . 287
Tab le 51 Virtual Fabrics interaction with Fabric OS features . . . . . . . . . . . . . . . . . . . . . . 288
Tab le 52 Maximum number of logical switches per chassis. . . . . . . . . . . . . . . . . . . . . . . 288
Tab le 53 Approaches to fabric-based zoning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
Tab le 54 Considerations for zoning architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
Tab le 55 Zone merging scenarios: Defined and effective configurations . . . . . . . . . . . . 339
Tab le 56 Zone merging scenarios: Different content . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
Tab le 57 Zone merging scenarios: Different names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
Tab le 58 Zone merging scenarios: TI zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
Tab le 59 Zone merging scenarios: Default access mode . . . . . . . . . . . . . . . . . . . . . . . . . 341
Tab le 60 Zone merging scenarios: Mixed Fabric OS versions. . . . . . . . . . . . . . . . . . . . . . 342
Tab le 61 Traffic behavior when failover is enabled or disabled in TI zones . . . . . . . . . . 347
Tab le 62 Number of ports supported per chip or per trunk . . . . . . . . . . . . . . . . . . . . . . . 395
Tab le 63 Example ISL connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 406
Tab le 6 4 Number of supported NPIV devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420
Tab le 65 AD user types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436
Tab le 66 Ports and devices in CLI output. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455
Tab le 67 Admin Domain interaction with Fabric OS features . . . . . . . . . . . . . . . . . . . . . . 457
Tab le 68 Configuration upload and download scenarios in an AD context . . . . . . . . . . . 460
Tab le 69 Available Brocade licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 464
Tab le 70 License requirements and location name by feature . . . . . . . . . . . . . . . . . . . . 467
Tab le 71 Base to Upgrade license comparison . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 470
Tab le 72 List of available ports when implementing PODs . . . . . . . . . . . . . . . . . . . . . . . 484
Tab le 73 Number of logical switches that support performance monitors . . . . . . . . . . . 500
Tab le 74 Maximum number of frame monitors and offsets per port. . . . . . . . . . . . . . . . 506
Tab le 75 Predefined values at offset 0. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507
Table 76 Comparison between CS_CTL-based and QoS zone-based prioritization. . . . . 520
Tab le 77 Fabric resources assigned to QoS priority for frame prioritization in CS_CTL default
mode 521
30 Fabric OS Administrator’s Guide
53-1002745-02