Hewlett-Packard Company makes no warranty of any kind with regard to this material, including, but not limited to, the implied warranties of
merchantability and fitness for a particular purpose. Hewlett-Packard shall not be liable for errors contained herein or for incidental or
consequential damages in connection with the furnishing, performance, or use of this material.
This document contains proprietary information, which is protected by copyright. No part of this document may be photocopied, reproduced, or
translated into another language without the prior written consent of Hewlett-Packard. The information is provided “as is” without warranty of any
kind and is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements
accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for
technical or editorial errors or omissions contained herein.
Microsoft, and Windows are U.S. registered trademarks of Microsoft Corporation.
UNIX is a registered trademark of The Open Group.
Linux is a U.S. registered trademark of Linus Torvalds.
Java is a U.S. trademark of Sun Microsystems, Inc.
IMPORTANT: For late breaking, supplemental information, access the latest version of the HP
StorageWorks Fabric OS 5.x release notes using the following steps.
To access current Fabric OS related documents:
1. Locate the IT storage products section of the web page.
2. Under Networked storage, click SAN infrastructure.
3. From the SAN Infrastructure web page, locate the SAN Infrastructure products section.
4. Click Fibre Channel Switches.
5. Locate the B-Series Fabric-Enterprise Class section. Click 4/256 SAN Director and 4/256 SAN Director
power pack, to access Fabric OS 5.x documents (such as this document).
The switch overview page displays.
6. Go to the Product Information section, located on the right side of the web page.
7. Click Technical documents.
8. Follow the onscreen instructions to download the applicable documents.
.
HP StorageWorks Fabric OS 5.x master glossary
This guide uses industry standard SAN terminology. However, some terms are intrinsic to Fabric OS 5.x.
See the HP StorageWorks Fabric OS 5.x master glossary for a complete list of terms and definitions.
Access the master glossary from the HP StorageWorks SAN Switch Documentation CD that shipped with
your switch. Also, access from the HP web site using the procedure outlined in ”Related documentation”.
Fabric OS 5.x administrator guide13
Document conventions and symbols
Table 1 Document conventions
ConventionElement
Medium blue text: Figure 1Cross-reference links and e-mail addresses
Medium blue, underlined text
(http://www.hp.com)
Bold font• Key names
Italics fontText emphasis
Monospace font• File and directory names
Monospace, italic font• Code variables
Monospace, bold fontEmphasis of file and directory names, system output, code, and text
Web site addresses
• Text typed into a GUI element, such as into a box
• GUI elements that are clicked or selected, such as menu and list
items, buttons, and check boxes
• System output
• Code
• Text typed at the command-line
• Command line variables
typed at the command line
WARNING!Indicates that failure to follow directions could result in bodily harm or death.
CAUTION: Indicates that failure to follow directions could result in damage to equipment or data.
IMPORTANT: Provides clarifying information or specific instructions.
NOTE: Provides additional information.
TIP:Provides helpful hints and shortcuts.
HP technical support
Telephone numbers for worldwide technical support are listed on the HP support web site:
http://www.hp.com/support/
Collect the following information before calling:
• Technical support registration number (if applicable)
• Product serial numbers
• Product model names and numbers
• Applicable error messages
.
14
• Operating system type and revision level
• Detailed, specific questions
For continuous quality improvement, calls may be recorded or monitored.
HP strongly recommends that customers sign up online using the Subscriber's choice web site:
http://www.hp.com/go/e-updates
• Subscribing to this service provides you with e-mail updates on the latest product enhancements,
newest versions of drivers, and firmware documentation updates as well as instant access to numerous
other product resources.
• After signing up, you can quickly locate your products by selecting Business support and then Storage
under Product Category.
HP-authorized reseller
For the name of your nearest HP-authorized reseller:
• In the United States, call 1-800-282-6672.
• Elsewhere, visit the HP web site: http://www.hp.com
telephone numbers.
Helpful web sites
For other product information, see the following HP web sites:
.
. Click Contact HP to find locations and
• http://www.hp.com
• http://www.hp.com/go/storage
• http://www.hp.com/support/
• http://www.docs.hp.com
Fabric OS 5.x administrator guide15
16
1Introducing Fabric OS CLI procedures
This chapter contains procedures for configuring and managing an HP StorageWorks Storage Area
Network (SAN) using the Fabric OS Command Line Interface (CLI).
The guide applies to the following HP StorageWorks product models:
• HP StorageWorks switches: 4/8 SAN Switch, 4/16 SAN Switch, SAN Switch 2/8V, SAN Switch
2/16V, SAN Switch 2/32, Brocade 4Gb SAN Switch for HP p-Class BladeSystem, and SAN Switch
4/32
These HP StorageWorks models contain a fixed number of ports (they are fixed-port switches). The
SAN Switch 4/32, 4/8 SAN Switch, and 4/16 SAN Switch allow you to license and activate extra
fixed ports with the Ports on Demand feature.
• HP StorageWorks directors: Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director
These HP StorageWorks models can contain a variable number of ports, which you install by plugging
port blades into the director chassis. The 4/256 SAN Director can have up to 256 ports; the Core
Switch 2/64 and SAN Director 2/128 can have up to 128 ports.
About procedural differences
As a result of the differences between fixed-port and variable-port devices, procedures sometimes differ
among HP StorageWorks models. Also, because the domain architecture of the Core Switch 2/64 differs
from that of the SAN Director 2/128 and 4/256 SAN Director, there are sometimes procedural
differences among these models. As new HP StorageWorks models are introduced, new features
sometimes apply only to those models.
When procedures or parts of procedures apply to some models but not others, this guide identifies the
specifics for each model. For example, a number of procedures that apply only to variable-port devices
are found in ”Configuring Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director” on
page 87. Procedures that apply only to the SAN Switch 4/32 are labeled as such.
NOTE: When command examples in this guide show user input enclosed in quotation marks, the
quotation marks are required for versions of Fabric OS earlier than 4.0.0. They are optional in later
versions, unless specifically called for in the procedures.
Scope and references
Although many different software and hardware configurations are tested and supported by HP,
documenting all possible configurations and scenarios is beyond the scope of this guide. In some cases,
earlier releases of Fabric OS are documented to present considerations for interoperating with them.
The installation guides for HP StorageWorks products describe how to power up devices and set their IP
addresses. After the IP address is set, you can use the CLI procedures contained in this guide.
This guide provides only the level of detail required to perform the procedures. If you need more
information about the commands used in the procedures, see online help or the HP StorageWorks Fabric OS 5.x command reference guide.
You can use several access methods to configure a switch:
• CLI
• A telnet session into logical switches
• A telnet session into active and standby CPs for director class switches
• A serial console, including active and standby CPs for director class switches
• An optional modem, which behaves like a serial console port
For CLI details, see the HP StorageWorks Fabric OS 5.x command reference guide.
Fabric OS 5.x administrator guide17
• Advanced Web Tools: For Advanced Web Tools procedures, see the HP StorageWorks Fabric OS
5.x Advanced Web Tools administrator guide.
• Fabric Manager: For Fabric Manager procedures, see the HP StorageWorks Fabric Manager 5.x
administrator guide.
• A third-party application using the API: For third-party application procedures, see the third-party API
documentation.
About the CLI
The Fabric OS CLI is the complete fabric management tool for HP StorageWorks SANs that enables you
to:
• Access the full range of Fabric OS features, based on license keys
• Configure, monitor, dynamically provision, and manage every aspect of the SAN
• Configure and manage the HP StorageWorks fabric on multiple, efficient levels
• Identify, isolate, and manage SAN events across every switch in the fabric
• Manage switch licenses
• Perform fabric stamping
To manage a switch using telnet, Simple Network Management Protocol (SNMP), and Advanced Web
Tools, the switch must be connected to a network through the switch Ethernet port (out of band) or from the
Fibre Channel (in band). The switch must be configured with an IP address to allow for the network
connection. See the installation guide for your switch model for information on physically connecting to
the switch.
You can access switches from different connections, such as Advanced Web Tools, CLI, and API. When
these connections are simultaneous, changes from one connection might not be updated to the other, and
some modifications might be lost. When simultaneous connections are used, make sure that you do not
overwrite the work of another connection.
In a mixed fabric containing switches running various Fabric OS versions, you should use the latest-model
switches running the most recent release for the primary management tasks. The principal management
access should be set to the core switches in the fabric. For example, to run Secure Fabric OS, use the
latest-model switch as the primary Fabric Configuration Server (FCS), the location to perform zoning tasks,
and the time server.
A number of management tasks are designed to make fabric-level changes; for example, zoning
commands make changes that affect the entire fabric. When executing fabric-level configuration tasks,
allow time for the changes to propagate across the fabric before executing any subsequent tasks. For a
large fabric, it might be take a few minutes.
Help information
Each Fabric OS command provides Help information that explains the command function, its possible
operands, its level in the command hierarchy, and additional pertinent information.
Displaying command help
To display help information:
1. Connect to the switch and log in as admin.
2. To display a list of all command help topics for a given login level, issue the help command with no
arguments.
For example, if you are logged in as user and issue the help command, a list of all user-level
commands that can be executed is displayed. The same rule applies to the admin role. In addition,
any user-configured command that uses a switchAdmin role also displays commands available to
users with the switchAdmin role.
3. To display help for a specific command for a given login level, issue help command, where
command is the name of the command for which you need information.
18Introducing Fabric OS CLI procedures
For example:
switch:admin> help configure
Administrative Commands configure(1m)
NAME
configure - change system configuration settings
SYNOPSIS
configure
AVAILABILITY
admin
DESCRIPTION
This command changes some system configuration settings,
including:
o Arbitrated loop settings
o Switch fabric settings
o System services settings
o Virtual channel settings
(output truncated)
Additional help topics
The following commands provide help files for specific topics:
• diagHelp provides diagnostic information
• ficonHelp provides Fibre Connection (FICON) information
• fwHelp provides Fabric Watch information
• licenseHelp provides license information
• perfHelp provides Performance Monitoring information
• routeHelp provides routing information
• trackChangesHelp provides Track Changes (TC) information
• zoneHelp provides zoning information
Fabric OS 5.x administrator guide19
20Introducing Fabric OS CLI procedures
2Performing basic configuration tasks
This chapter contains procedures for performing basic switch configuration tasks using the Fabric OS CLI.
Connecting to the Command Line Interface
You can connect to the CLI either through a telnet connection or through the serial port.
Connecting with telnet
1. Verify that the switch is connected to the IP network through the RJ-45 Ethernet port.
Switches in the fabric that are not connected through Ethernet can be managed through switches that
use IP over Fibre Channel. The embedded port must have an assigned IP address.
2. Open a telnet connection using the IP address of the logical switch to which you want to connect.
If you telnet to the active Control Processor (CP) or log in to the active CP console, you are prompted
for the switch number when the platform is set up in dual (or multiple) switch mode. For example, the
SAN Director 2/128 does not prompt you if you are using configuration option 1, but does prompt
you if you have used configuration options 2–4. See ”Configuring Core Switch 2/64, SAN Director
2/128, and 4/256 SAN Director” on page 87 for details about director configuration options.
The Core Switch 2/64 and SAN Director 2/128 (configured with two domains) have two logical
switches (sw0 and sw1).
The login prompt is displayed when the telnet connection finds the switch in the network.
3. Enter the account ID (defaults are user or admin) at the login prompt.
4. Enter the password.
The default password is password.
If you have not changed the system passwords from the default, you are prompted to change them.
Enter the new system passwords, or press Ctrl-c to skip the password prompts.
5. Verify that the login was successful.
The prompt displays the switch name and user ID to which you are connected.
login: admin
password: xxxxxxx
switch:admin>
6. Observe the following considerations for telnet connections:
• Never change the IP address of the switch while two telnet sessions are active; if you do, your next
attempt to log in fails. To recover, gain access to the switch by one of these methods:
• Perform a fast boot using Advanced Web Tools. When the switch comes up, the telnet quota is
cleared. (For instructions on performing a fast boot with Advanced Web Tools, see the HP StorageWorks Fabric OS 5.x Advanced Web Tools administrator guide.)
• If you have the required privileges, connect through the serial port, log in as root, and use
operating system commands to identify and kill the telnet processes without disrupting
the fabric.
• For admin level accounts, Fabric OS limits the number of simultaneous telnet sessions per switch to
two. For details on session limits, see ”Configuring the telnet interface” on page 41 and ”Creating
and maintaining user-defined accounts” on page 43.
Connecting through the serial port
1. Connect the serial cable to the serial port on the switch and to an RS-232 serial port on
the workstation.
If the serial port on the workstation is RJ-45 instead of RS-232, remove the adapter on the end of the
serial cable and insert the exposed RJ-45 connector into the RJ-45 serial port on the workstation.
Fabric OS 5.x administrator guide21
2. Open a terminal emulator application (such as HyperTerminal on a PC, or TERM, TIP, or Kermit in a
UNIX® environment), and configure the application as follows:
• In a Windows® environment:
Parameter
Bits per second9600
Databits8
ParityNone
Stop bits1
Flow controlNone
• In a UNIX environment, enter the following string at the prompt:
tip /dev/ttyb -9600
If ttyb is already in use, you can use ttya (enter tip /dev/ttya -9600).
3. Observe the following considerations for serial connections:
• Some procedures require that you connect through the serial port, for example, setting the IP
address or setting the boot PROM password.
• If secure mode is enabled, connect through the serial port of the primary FCS switch.
• For the Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director, you can connect to
CP0 or CP1 using either of the two serial ports.
Setting the IP address
Value
You must connect through the serial port to set the IP address (see ”Connecting through the serial port” on
page 21). After connecting, issue the ipAddrSet command to set the IP address.
CAUTION: The use of IP address 0.0.0.0 is not supported. Do not use this address.
Fabric OS versions beginning with 2.6.0, 3.1.0, and 4.0.0 support Classless Inter-Domain
Routing (CIDR).
Setting the default account passwords
For each logical switch (domain), there are admin and user default access accounts. These accounts
designate the following levels of authorization—called roles—for using the system:
• Admin level for administrative use
• User level for non-administrative use, such as monitoring system activity
• SwitchAdmin level for administrative use, except for security, user management, and zoning
Two accounts—factory and root—are reserved for development and manufacturing. You can change their
passwords, which is optional, but do not use these accounts under normal circumstances.
Table 2 shows the number of simultaneous login sessions allowed for each role.
Table 2 Maximum number of simultaneous sessions
User nameMaximum sessions
admin2
user4
For the 4/8 SAN Switch, 4/16 SAN Switch, SAN Switch 2/8V, SAN Switch 2/16V, SAN Switch 2/32,
Brocade 4Gb SAN Switch for HP p-Class BladeSystem, SAN Switch 4/32, SAN Director 2/128, and the
4/256 SAN Director (default configuration with one domain), there is one set of default access accounts.
22Performing basic configuration tasks
For the Core Switch 2/64 and SAN Director 2/128 (configured with two domains), each logical switch
has its own set of default access accounts. The default account names and passwords are the same for
both of the logical switches.
You can also create up to 15 additional accounts per logical switch and designate their roles as either
admin, switchAdmin, or user. See the procedures for doing so in ”Creating and maintaining user-defined
accounts” on page 43.
For large enterprises, Fabric OS supports RADIUS services, as described in ”Setting up RADIUS AAA
service” on page 45.
In addition to the account access passwords, each switch can set a boot PROM password. For greater
security, HP recommends that you set this password to protect system boot parameters from unauthorized
access. See ”Setting the boot PROM password” on page 67.
Each of the default access accounts has an associated password. The first time you connect to a
Fabric OS switch, you are prompted to change these default account passwords.
If you do not change the default passwords, you are prompted to do so at each subsequent login until all
system passwords have been changed from their default values. Thereafter, use the passwd command to
change passwords.
For more background information on passwords, see ”Changing an account password” on page 45.
Changing the default passwords at login
1. Connect to the switch and log in as admin.
The default password for all default accounts is password.
2. At each of the Enter new password prompts, either enter a new password or skip the prompt.
You can skip a prompt by pressing Enter. You can bypass all further prompts by pressing Ctrl-c.
Although the root and factory accounts are not meant for general use, change their passwords if
prompted to do so, and save the passwords in case they are needed for recovery purposes.
You cannot reuse the default passwords.
Fabric OS 5.x administrator guide23
NOTE: Record the passwords exactly as entered and store them in a secure place; recovering
passwords requires significant effort and fabric downtime. The initial login prompt accepts a maximum
password length of eight characters. Characters beyond the eighth are ignored. Only the default
password is subject to the eight-character limit. Any password set by the user can have a length of 8 to 40
characters.
login: admin
Password:
Please change your passwords now.
Use Control-C to exit or press 'Enter' key to proceed.
for user - root
Changing password for root
Enter new password: *****
Password changed.
Saving password to stable storage.
Password saved to stable storage successfully.
Please change your passwords now.
for user - factory
Changing password for factory
Enter new password: *****
Password changed.
Saving password to stable storage.
Password saved to stable storage successfully.
Please change your passwords now.
for user - admin
Changing password for admin
Enter new password: *****
Password changed.
Saving password to stable storage.
Password saved to stable storage successfully.
Please change your passwords now.
for user - user
Changing password for user
Enter new password: *****
Password changed.
Saving password to stable storage.
Password saved to stable storage successfully.
switch:admin>
Setting the date and time
Switches maintain the current date and time in flash memory. Date and time are used for logging events.
Switch operation does not depend on the date and time; a switch with an incorrect date and time value
still functions properly. Because the date and time are used for logging, set them correctly.
NOTE: If secure mode is not enabled, a change in date or time to one switch is forwarded to the
principal switch and distributed to the fabric. If secure mode is enabled, you can make date or time
changes only on the primary FCS switch and then distribute the changes to the fabric.
24Performing basic configuration tasks
Setting the date and time
1. Connect to the switch and log in as admin.
2. Issue the date command using the following syntax:
date “mmddHHMMyy”
where:
• mm is the month; valid values are 01 through 12.
• dd is the date; valid values are 01 through 31.
• HH is the hour; valid values are 00 through 23.
• MM is minutes; valid values are 00 through 59.
• yy is the year; valid values are 00 through 99 (values greater than 69 are interpreted as
1970–1999, and values less than 70 are interpreted as 2000–2069). For example:
switch:admin> date
Fri Jan 29 17:01:48 UTC 2000
switch:admin> date "0227123003"
Thu Feb 27 12:30:00 UTC 2003
switch:admin>
For details about changing time zones, see the tsTimeZone command in the HP StorageWorks Fabric
OS 5.x command reference guide.
Synchronizing local time with an external source
To synchronize the local time of the principal or primary FCS switch to an external NTP server:
1. Connect to the switch and log in as admin.
2. Issue the following command:
tsclockserver “ipadd”
where ipaddr is the IP address of the NTP server, which the switch must be able to access. This
operand is optional; by default its value is LOCL, which uses the local clock of the principal or primary
switch as the clock server. For example:
HP recommends that you synchronize time with an external NTP server, as described on ”Synchronizing
local time with an external source”. If you cannot do so, use the next procedure.
Setting the time zone
1. Connect to the switch and log in as admin.
2. Issue the tsTimeZone command as follows:
tsTimeZone [houroffset [, minuteoffset]]
•For Pacific Standard Time enter tsTimeZone -8,0.
• For Central Standard Time enter tsTimeZone -6,0.
• For Eastern Standard Time enter tsTimeZone -5,0.
The default time zone for switches is Universal Time Conversion (UTC), which is 8 hours ahead of
Pacific Standard Time. Table 3 shows additional time zone conversion values.
The parameters do not apply if the time zone of the switch has already been changed from the default
(8 hours ahead of Pacific Standard Time).
See the tsTimeZone command in the HP StorageWorks Fabric OS 5.x command reference guide for
detailed information about the command parameters.
Fabric OS 5.x administrator guide25
Repeat the procedure on all switches for which the Time Zone needs to be set. This needs to be done only
once; the value is written to nonvolatile memory. For U.S. time zones, use Table 3 to determine the correct
parameter for the tsTimeZone command.
Table 3 Conversion from UTC to local time
Local timeDifference from UTC for
tstimezone
Atlantic Standard –4, 0
Atlantic Daylight –3, 0
Eastern Standard –5, 0
Eastern Daylight –4, 0
Central Standard –6, 0
Central Daylight –5, 0
Mountain Standard –7, 0
Mountain Daylight –6, 0
Pacific Standard –8, 0
Pacific Daylight –7, 0
Alaskan Standard –9, 0
Alaskan Daylight –8, 0
Hawaiian Standard –10, 0
Maintaining licensed features
Feature licenses might be part of the licensed Power Pack supplied with switch software, or you can
purchase licenses separately from your switch vendor, who will provide you with keys to unlock the
features. License keys are provided on a per-chassis basis, so for products that support multiple logical
switches (domains), a license key applies to all domains within the chassis.
To unlock a licensed feature, you can either use the license key provided in the Power Pack or execute the
following procedure to generate a license key at the HP web site:
http://webkey.external.hp.com/welcome.asp
NOTE: For each chassis to be licensed, you need a transaction key and a license ID. The transaction key
is in the Power Pack supplied with the switch software; or, when you purchase a license, your switch
vendor gives you a transaction key to be used to obtain a license key. To see a switch license ID, issue the
licenseIdShow command.
Unlocking a licensed feature
1. If you already have a license key, go to step 10.
If you do not have a key, launch an Internet browser and visit the HP web site:
http://webkey.external.hp.com/welcome.asp
2. Click products.
3. Click Software Products.
4. In the Related Links panel on the right side of the page, select Software License Keys.
The Software License Keys instruction page appears.
.
.
26Performing basic configuration tasks
5. If you want to generate a single license key, select Generate 1 license key.
If you want to generate multiple license keys, select Batch Generation of Licenses.
The Software License Key instruction page opens.
6. Enter the requested information in the required fields.
When generating multiple license keys, enter the worldwide names and transaction keys in the table
at the bottom of the screen. If you need additional rows in the table, select Add More Rows.
7. Click Next.
A verification screen appears.
8. Verify that the information is correct.
Click Submit if the information displayed is correct. If the information is incorrect, click Previous and
change the information.
9. After the information is corrected, click Submit.
An information screen displays the license keys. You also receive an e-mail from the HP licensing
company.
10.Activate and verify the license as follows:
a. Connect to the switch and log in as admin.
b. Activate the license using the licenseAdd command:
switch:admin> licenseadd “key”
The license key is case-sensitive and must be entered exactly as given. The quotation marks
are optional.
For the Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director, licenses are effective
on both CP blades and on all logical switches, but are valid only when the CP blade is inserted
into a chassis that has an appropriate license ID stored in the World Wide Name (WWN) card. If
a CP is moved from one chassis to another, the license works in the new chassis only if the WWN
card is the same in the new chassis. Otherwise, a new license key is generated.
For example, if you swap one CP blade at a time, or replace a single CP blade, the existing CP
blade (the active CP blade) propagates the licenses to the new CP blade.
If you move a standby CP from one chassis to another, the active CP propagates its configuration
(including license keys).
c. Verify that the license was added by issuing the licenseShow command.
The licensed features currently installed on the switch are listed. If the feature is not listed, reissue
the licenseAdd command.
d. Some features may require additional configuration, or you might need to disable and reenable
the switch to make them operational; see the feature documentation for details. For example:
switch:admin> licenseshow
SbeSdQdQySyriTeJ:
Web license
Zoning license
Fabric license
Remote Switch license
Extended Fabric license
Fabric Watch license
Performance Monitor license
Trunking license
Security license
SbbebdQS9QTscfcB:
Ports on Demand license - additional 8 port upgrade
SbbebdQS9QTcgfcz:
Ports on Demand license - additional 8 port upgrade
Fabric OS 5.x administrator guide27
Removing a licensed feature
1. Connect to the switch and log in as admin.
2. Issue the licenseShow command to display the active licenses.
3. Remove the license key using the licenseRemove command:
switch:admin> licenseremove “key”
The license key is case-sensitive and must be entered exactly as given. The quotation marks
are optional. After removing a license key, the optionally licensed feature is disabled when the switch
is rebooted or when a switch disable or enable is performed.
4. Issue the licenseShow command to verify that the license is disabled. For example:
If there are no license keys, licenseShow displays the message No licenses.
Customizing the switch name
Switches can be identified by IP address, Domain ID, WWN, or by customized switch names that are
unique and meaningful.
Version 4.0.0 (and later) switch names can be from 1 to 15 characters long, must begin with a letter, and
can contain letters, numbers, or the underscore character. It is not necessary to use quotation marks.
The default names are the following:
• For the 4/8 SAN Switch, 4/16 SAN Switch, SAN Switch 2/8V, SAN Switch 2/16V, SAN Switch
2/32, Brocade 4Gb SAN Switch for HP p-Class BladeSystem, and SAN Switch 4/32: the name is
swd77.
• For the Core Switch 2/64: the name varies depending on the number of logical switches. The two
logical switches have different default names. The name swd77 is used for the logical switch
containing the port blades in slots 1 through 4; swd76 is used for the logical switch containing the
port blades in slots 7 through 10.
• For the SAN Director 2/128 and the 4/256 SAN Director: the name is swd77.
NOTE: Changing the switch name causes a domain address format Registered State Change
Notification (RSCN) to be issued.
Customizing the switch name
1. For the 4/8 SAN Switch, 4/16 SAN Switch, SAN Switch 2/8V, SAN Switch 2/16V, SAN Switch
2/32, Brocade 4Gb SAN Switch for HP p-Class BladeSystem, and SAN Switch 4/32: Proceed to the
next step.
For the Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director: Open a telnet window
for each logical switch and issue the switchName command.
28Performing basic configuration tasks
2. Connect to the switch and log in as admin.
3. For the 4/8 SAN Switch, 4/16 SAN Switch, SAN Switch 2/8V, SAN Switch 2/16V, SAN Switch
2/32, and SAN Switch 4/32: Proceed to the next step.
For the SAN Director 2/128 and 4/256 SAN Director: If configured for one domain (the default)
proceed to the next step. If configured with two domains, proceed as for the Core Switch 2/64.
For the Core Switch 2/64: Choose the logical switch that you want to change. Enter the value that
corresponds to that logical region:
• Enter 0 to configure logical switch 0 (slot 1 through 4).
• Enter 1 to configure logical switch 1 (slot 7 through 10).
4. Issue the switchName command with the following syntax:
switchname “newname”
where newname is the new name for the switch.
5. Record the new switch name for future reference.
6. For the Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director configured with two
domains: Disconnect from the session and repeat the procedure for the second logical switch. For
example:
Beginning with Fabric OS 4.4.0, HP recommends that you customize the chassis name for each switch.
Some system logs identify switches by chassis names, so if you assign meaningful chassis names in
addition to meaningful switch names, logs are more useful.
Changing the chassis name
1. Connect to the switch and log in as admin.
2. Issue the chassisName command, with the following syntax:
chassisname “newname”
where newname is the new name for the chassis.
Chassis names can contain 1 to 15 characters, must begin with a letter, and can consist of letters,
numerals, and the underscore character. The quotation marks are optional.
3. Record the new chassis name for future reference.
Disabling and enabling a switch
By default, the switch is enabled after power is applied and diagnostics and switch initialization routines
have finished. You can disable and reenable it as necessary.
Disabling a switch
1. Connect to the switch and log in as admin.
2. Issue the switchDisable command.
All Fibre Channel ports on the switch are taken offline. If the switch was part of a fabric, the fabric
reconfigures.
Enabling a switch
1. Connect to the switch and log in as admin.
2. Issue the switchEnable command.
All Fibre Channel ports that pass the Power-on Self Test (POST) are enabled. If the switch has
interswitch links (ISLs) to a fabric, it joins the fabric.
Fabric OS 5.x administrator guide29
Disabling and enabling a port
All licensed ports are enabled by default. You can disable and reenable them as necessary. Ports that you
activate with Ports on Demand must be enabled explicitly, as described in ”Activating Ports on Demand”
on page 30.
Disabling a port
1. Connect to the switch and log in as admin.
2. For the 4/8 SAN Switch, 4/16 SAN Switch, SAN Switch 2/8V, SAN Switch 2/16V, SAN Switch
2/32, Brocade 4Gb SAN Switch for HP p-Class BladeSystem, and SAN Switch 4/32: Issue the
following command:
portdisable portnumber
where portnumber is the port number of the port you want to disable.
For the Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director: Issue the following
command:
portdisable slotnumber/portnumber
where slotnumber and portnumber are the slot and port numbers of the port you want to disable.
NOTE: If the port is connected to another switch, the fabric might reconfigure.
Enabling a port
1. Connect to the switch and log in as admin.
2. For the 4/8 SAN Switch, 4/16 SAN Switch, SAN Switch 2/8V, SAN Switch 2/16V, SAN Switch
2/32, Brocade 4Gb SAN Switch for HP p-Class BladeSystem, and SAN Switch 4/32: Issue the
following command:
portenable portnumber
where portnumber is the port number of the port you want to enable.
For the Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director: Issue the following
command:
portenable slotnumber/portnumber
where slotnumber and portnumber are the slot and port numbers of the port you want to enable.
(Slots are numbered 1 through 4 and 7 through 10, counting from left to right.)
NOTE: If the port is connected to another switch, the fabric might reconfigure. If the port is connected to
one or more devices, these devices become available to the fabric.
If you change port configurations during a switch failover, the ports might become disabled. To bring the
ports online, reissue the portEnable command after the failover is complete.
Activating Ports on Demand
The SAN Switch 4/32 can be purchased with 16, 24, or 32 licensed ports. As your needs increase, you
can activate unlicensed ports (up to the maximum of 32 ports) by purchasing and installing the HP Ports
on Demand optional, licensed product.
The 4/8 SAN Switch and 4/16 SAN Switch can be purchased with 8 ports and no E_Port, 8 ports with
full-fabric access (4/8 SAN Switch), and 16 ports with full-fabric access (4/16 SAN Switch). If you
purchase the 4/8 SAN Switch with 8 ports enabled, you can activate unlicensed ports in 4-port
increments up to 16 ports by purchasing and installing the HP StorageWorks 4/8 SAN 4-Port Upgrade
License. You can also purchase a full-fabric upgrade license if your switch does not support full-fabric
access.
Ports on Demand is ready to be unlocked in the switch firmware. Its license key might be part of the
licensed software supplied with your switch, or you can purchase the license key separately from your
30Performing basic configuration tasks
switch vendor. You might need to generate a license key from a transaction key supplied with your
purchase. If so, launch an Internet browser and visit the HP web site:
http://webkey.external.hp.com/welcome.asp
to generate the key.
By default, ports 0 through 15 are activated on the SAN Switch 4/32. Each Port upgrade license
activates the next group of eight ports in numerical order. Before installing a license key, you must insert
transceivers in the ports to be activated. Remember to insert the transceivers in the lowest group of
inactive port numbers first. For example, if only 16 ports are currently active and you are installing one
8-Port Upgrade License key, make sure to insert the transceivers in ports 16 through 23. If you later install
a second license key, insert the transceivers in ports 24 through 31. For details on inserting transceivers,
see the HP StorageWorks SAN Switch 4/32 installation guide.
After you install a license key, you must enable the ports to complete their activation. You can do so
without disrupting switch operation by issuing the portEnable command on each port. You can also
disable and reenable the switch to activate ports.
. Select Generate a license key and follow the instructions
Activating Ports on Demand
1. Connect to the switch and log in as admin.
2. Optional: To verify the current states of the ports, issue the portShow command.
In the portShow output, the Licensed field indicates whether or not the port is licensed.
3. Install the HP Port Upgrade License.
For instructions, see ”Maintaining licensed features” on page 26.
4. Issue the portEnable command to enable the ports.
5. Optional: issue the portShow command to check the newly activated ports.
If you remove a Port Upgrade License, the licensed ports become disabled after the next platform reboot
or the next port deactivation.
Making basic connections
You can make basic connections to devices and to other switches.
Before connecting a version 4.0.0 (or later) switch to a fabric that contains switches running earlier
firmware versions, you must first set the same port identifier (PID) format on all the switches. The presence
of different PID formats in a fabric causes fabric segmentation.
For information on PID formats and related procedures, see ”Selecting a PID format” on page 215.
For information on configuring the routing of connections, see ”Routing traffic” on page 97.
For information on configuring extended interswitch connections, see ”Administering extended fabrics” on
page 163.
Connecting to devices
To minimize port logins, power off all devices before connecting them to the switch. For devices that
cannot be powered off, first use the portDisable command to disable the port on the switch, and then
connect the device. When powering the devices back on, wait for each device to complete the fabric
login before powering on the next one.
Connecting to other switches
See the SAN Switch installation guide for your switch model for ISL connection and cable management
information. The standard (default) ISL mode is L0, which you can configure with the portCfgLongDistance
command. ISL Mode L0 is a static mode, with the following maximum ISL distances:
• 10 km at 1 Gbit/second
• 5 km at 2 Gbit/second
• 2.5 km at 4 Gbit/second
ISL mode L0 is available on all Fabric OS releases. When you upgrade from Fabric OS 4.0.0 to Fabric
4.1.0 or later, all extended ISL ports are set to L0 mode.
Fabric OS 5.x administrator guide31
For information on extended ISL modes, which enable longer-distance ISLs, see ”Administering extended
fabrics” on page 163.
Working with domain IDs
Although domain IDs are assigned dynamically when a switch is enabled, you can reset them manually to
control the ID number or to resolve a domain ID conflict when you merge fabrics.
If a switch already has a domain ID when it is enabled, and that domain ID conflicts with a switch already
in the fabric, the conflict is resolved. The process can take several seconds, during which traffic is
delayed.
The default domain ID for HP StorageWorks switches is 1. The default domain ID applies to the logical
switches in the Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director that are configured
for two domains. To prevent domain conflict, you can either disable one of the switches until the other is
connected to the fabric, and then reenable the switches so that unique domain IDs are assigned, or you
can use the procedure ”Setting the domain ID” on page 33 to make the domain IDs unique before
connecting the logical switches to the fabric.
CAUTION: On switches running Fabric OS 4.0.0 and later, do not use domain ID 0, which is reserved
for another purpose. The use of this domain ID can cause the switch to reboot continuously.
Avoid changing the domain ID on the FCS in secure mode. To minimize down time, change the domain
IDs on the other switches in the secure fabric.
Displaying domain IDs
1. Connect to a switch and log in as admin.
2. Issue the fabricShow command.
Fabric information is displayed, including the domain ID (D_ID), for example:
ras045:admin> fabricshow
Switch ID Worldwide Name Enet IP Addr FC IP Addr Name
• Switch ID: The switch Domain_ID and embedded port D_Id.
• Worldwide Name: The switch WWN.
• Enet IP Addr: The switch Ethernet IP address.
• FC IP Addr: The switch FC IP address.
• Name: The switch symbolic name. An arrow (>) indicates the principal switch.
Setting the domain ID
1. Connect to the switch and log in as admin.
2. Issue the switchDisable command to disable the switch.
3. Issue the configure command.
4. Enter y after the Fabric Parameters prompt:
Fabric parameters (yes, y, no, n): [no] y
5. Enter a unique domain ID at the Domain prompt. Use a domain ID value from 1 through 239 for
normal operating mode (FCSW compatible):
Domain: (1..239) [1] 3
6. Respond to the remaining prompts (or press Ctrl-d to accept the other settings and exit).
7. Issue the switchEnable command to reenable the switch.
Linking through a gateway
A gateway merges SANs into a single fabric by establishing point-to-point E_Port connectivity between
two Fibre Channel switches that are separated by a network with a protocol such as IP or SONET.
Except for link initialization, gateways are transparent to switches; the gateway simply provides E_Port
connectivity from one switch to another.
By default, switch ports initialize links using the Exchange Link Parameters (ELP) mode 1. However,
gateways expect initialization with ELP mode 2 (also called ISL R_RDY mode). Therefore, to enable two
switches to link through a gateway, the ports on both switches must be set for ELP mode 2.
Any number of E_Ports in a fabric can be configured for gateway links, provided the following rules
are followed:
• All switches in the fabric must be upgraded to Fabric OS 3.1.0 or later, or to 4.1.0 or later.
• To prevent fabric segmentation, make sure that all switches in the fabric are using the core PID format,
as described in section ”Configuring a link through a gateway” next.
• When determining switch count maxima, include the switches connected to both sides of the gateway.
• Extended links (those created using the Extended Fabrics licensed feature) and the security features in
Secure Fabric OS are not supported through gateway links.
Configuring a link through a gateway
1. If you are not sure that the PID format is consistent across the entire fabric, issue the configShow
command on all switches to check the PID settings. If necessary, change the PID format on any
non-conforming switches, as described in ”Configuring the PID format” on page 213.
2. Connect to the switch on one end of the gateway and log in as admin.
Fabric OS 5.x administrator guide33
3. Issue the portCfgIslMode command:
For the 4/8 SAN Switch, 4/16 SAN Switch,
SAN Switch 2/8V, SAN Switch 2/16, SAN
Switch 2/32, Brocade 4Gb SAN Switch for HP
p-Class BladeSystem, and SAN Switch 4/32:
For the Core Switch 2/64, SAN Director
2/128, and 4/256 SAN Director:
In the following example, slot 2, port 3 is enabled for a gateway link:
switch:admin> portcfgislmode 2/3, 1
Committing configuration...done.
ISL R_RDY Mode is enabled for port 3. Please make sure the PID
formats are consistent across the entire fabric.
switch:admin>
4. Repeat the steps for any additional ports to be connected to the gateway.
5. Repeat the procedure on the switch at the other end of the gateway.
portCfgIslMode portmode
Specify a port number. Valid values for port number
depend on the switch type. The mode operand is
required: Specify 1 to enable ISL R_RDY mode
(gateway link) or specify 0 to disable it.
portCfgIslMode slot/port, mode
Specify a slot/port number pair. Valid values for
slot and port number depend on the switch type.
The mode operand is required: Specify 1 to enable
ISL R_RDY mode (gateway link) or specify 0 to
disable it.
See the HP StorageWorks Fabric OS 5.x command reference guide for more information about the portCfgIslMode command.
Checking status
You can check the status of switch operation, high availability (HA) features, and fabric connectivity.
Checking switch operation
1. Connect to the switch and log in as admin.
2. Issue the switchShow command.
A switch summary and a port summary are displayed.
3. Verify that the switch and ports are online.
4. Issue the switchStatusShow command to further check the status of the switch.
Verifying HA features
HA features provide maximum reliability and non-disruptive replacement of key hardware and software
modules. To verify these features, connect to the switch as admin and use any of the following commands:
• The chassisshow verifies the field replaceable units (FRUs).
• For the Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director:
•The haShow command verifies that HA is enabled, that the heartbeat is up, and that the HA state
is synchronized between the active and standby CP blades.
•The slotShow command inventories and displays the current status of each slot in the system.
Verifying fabric connectivity
1. Connect to the switch and log in as admin.
2. Issue the fabricShow command.
A summary of all the switches in the fabric is displayed. For example:
34Performing basic configuration tasks
switch:admin> fabricshow
Switch ID Worldwide Name Enet IP Addr FC IP Addr Name
The number of devices listed should agree with the number of devices that are connected.
Tracking and controlling switch changes
The TC feature allows you to keep a record of specific changes that might not be considered switch
events, but might provide useful information. The output from the TC feature is dumped to the system
messages log for the switch. Use the errDump or errShow command to view the log.
Items in the log created from the TC feature are labeled TRCK.
Trackable changes are:
• Successful login
• Unsuccessful login
• Logout
Fabric OS 5.x administrator guide35
• Configuration file change from task
• TC feature on
• TC feature off
An SNMP-TRAP mode can also be enabled; see the trackChangesHelp command in the HP
StorageWorks Fabric OS 5.x command reference guide.
For troubleshooting information on the TC feature, see ”Inaccurate information in the system message log”
on page 161.
Enabling the TC feature
1. Connect to the switch and log in as admin.
2. Issue the trackChangesSet 1 command to enable the TC feature:
A message is displayed, verifying that the TC feature is on:
The output from the TC feature is dumped to the system message log for the switch. Use the errDump or
errShow command to view the log.
Items in the system message log created from the TC feature are labeled TRCK:
2004/08/24-08:45:43, [TRCK-1001], 212,, INFO, ras007, Successful login by user
admin.
Displaying the status of the TC feature
1. Connect to the switch and log in as admin.
2. Issue the trackChangesShow command.
The status of the TC feature is displayed as either on or off. The display tells whether the TC feature is
configured to send SNMP traps:
switch:admin> trackchangesshow
Track changes status: ON
Track changes generate SNMP-TRAP: NO
switch:admin>
Viewing the switch status policy threshold values
1. Connect to the switch and log in as admin.
2. Issue the switchStatusPolicyShow command.
Whenever there is a switch change, an error message is logged and an SNMP connUnitStatusChange
trap is sent.
For the 4/8 SAN Switch, 4/16 SAN Switch, SAN Switch 2/8V, SAN Switch 2/16V, SAN Switch 2/32,
Brocade 4Gb SAN Switch for HP p-Class BladeSystem, and SAN Switch 4/32: The output is similar to
the following:
switch:admin> switchstatuspolicyshow
The current overall switch status policy parameters:
Down Marginal
The policy parameter determines the number of failed or inoperable units for each contributor that triggers
a status change in the switch.
Each parameter can be adjusted so that a specific threshold must be reached before that parameter
changes the overall status of a switch to MARGINAL or DOWN. For example, if the FaultyPorts DOWN parameter is set to 3, the status of the switch changes if 3 ports fail. Only one policy parameter
needs to pass the MARGINAL or DOWN threshold to change the overall status of the switch.
For more information about setting policy parameters, see the HP StorageWorks Fabric OS 5.x administrator guide.
Setting the switch status policy threshold values
1. Connect to the switch and log in as admin.
2. Issue the switchStatusPolicySet command.
The current switch status policy parameter values are displayed first. You are then prompted to enter
values for each DOWN and MARGINAL threshold parameter:
3. Verify the threshold settings you have configured for each parameter by issuing the
switchStatusPolicyShow command to view your current switch status policy configuration.
NOTE: By setting the DOWN and MARGINAL values for a parameter to 0,0 that parameter is no
longer used in setting the overall status for the switch.
Fabric OS 5.x administrator guide37
For the SAN Switch 2/8V, SAN Switch 2/16V, SAN Switch 2/32, Brocade 4Gb SAN Switch for HP
p-Class BladeSystem, and SAN Switch 4/32: The following example shows the command as executed on
a SAN Switch 2/32. The output is similar on SAN Switch 2/8V, SAN Switch 2/16V, Brocade 4Gb SAN
Switch for HP p-Class BladeSystem, and SAN Switch 4/32:
:
switch:admin> switchstatuspolicyset
To change the overall switch status policy parameters
The current overall switch status policy parameters:
Down Marginal
--------------------------------- FaultyPorts 2 1
MissingSFPs 0 0
PowerSupplies 2 1
Temperatures 2 1
Fans 2 1
PortStatus 0 0
ISLStatus 0 0
Note that the value, 0, for a parameter, means that it is
NOT used in the calculation.
** In addition, if the range of settable values in the prompt is (0..0),
** the policy parameter is NOT applicable to the switch.
** Simply hit the Return key.
The minimum number of
FaultyPorts contributing to
DOWN status: (0..32) [2] 3
FaultyPorts contributing to
MARGINAL status: (0..32) [1] 2
MissingSFPs contributing to
DOWN status: (0..32) [0]
MissingSFPs contributing to
MARGINAL status: (0..32) [0]
Bad PowerSupplies contributing to
DOWN status: (0..2) [2]
Bad PowerSupplies contributing to
MARGINAL status: (0..2) [1]
Bad Temperatures contributing to
DOWN status: (0..5) [2]
Bad Temperatures contributing to
MARGINAL status: (0..5) [1]
Bad Fans contributing to
DOWN status: (0..6) [2]
Bad Fans contributing to
MARGINAL status: (0..6) [1]
Down PortStatus contributing to
DOWN status: (0..32) [0]
Down PortStatus contributing to
MARGINAL status: (0..32) [0]
down ISLStatus contributing to
DOWN status: (0..32) [0]
down ISLStatus contributing to
MARGINAL status: (0..32) [0]
Policy parameter set has been changed
For the Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director: Command output includes
parameters related to CP blades.
38Performing basic configuration tasks
3Configuring standard security features
This chapter provides information and procedures for configuring standard Fabric OS security features
such as account and password management.
Additional security features are available when secure mode is enabled. For information about licensed
security features available in Secure Fabric OS, see the HP StorageWorks Secure Fabric OS administrator guide.
Secure protocols
Fabric OS supports the secure protocols shown in Table 4.
,
Table 4 Secure protocol support
ProtocolDescription
Secure Sockets Layer (SSL)Supports SSLv3, 128-bit encryption by default. Fabric OS uses SSL to support
HTTPS. A certificate must be generated and installed on each switch to enable
SSL.
HTTPSAdvanced Web Tools supports the use of HTTPS.
Secure File Copy (scp)Configuration upload and download support the use of scp.
SNMPv3SNMPv1 is also supported.
SNMP is a standard method for monitoring and managing network devices. Using SNMP components,
you can program tools to view, browse, and manipulate HP StorageWorks switch variables and set up
enterprise-level management processes.
Every HP StorageWorks switch carries an SNMP agent and Management Information Base (MIB). The
agent accesses MIB information about a device and makes it available to a network manager station. You
can manipulate information of your choice by trapping MIB elements using the Fabric OS CLI, Advanced
Web Tools, or Fabric Manager.
The SNMP Access Control List (ACL) provides a way for you to restrict SNMP get and set operations to
certain hosts and IP addresses. This is used for enhanced management security in the SAN.
For details on HP StorageWorks MIB files, naming conventions, loading instructions, and information
about using the HP SNMP agent, see the HP StorageWorks Fabric OS 5.x MIB reference guide.
Table 5 describes additional software or certificates that you must obtain to deploy secure protocols.
Table 5 Items needed to deploy secure protocols
ProtocolHost sideSwitch side
Secure telnet (sectelnet)Sectelnet clientLicense not required, but a switch certificate
issued by HP is required
Secure Shell (SSH)SSH clientNone
HTTPSNo requirement on host
side except a browser that
supports HTTPS
Secure File Copy (scp)SSH daemon, scp serverNone
Switch IP certificate for SSL
SNMPv3, SNMPv1NoneNone
The security protocols are designed with the four main usage cases described in Table 6.
Fabric OS 5.x administrator guide39
Table 6 Main security scenarios
FabricManagement
interfaces
NonsecureNonsecureNo special setup is need to use telnet or HTTP. An
NonsecureSecure Secure protocols may be used. An SSL switch
SecureSecureSecure protocols are supported on Fabric OS
SecureNonsecure You must use sectelnet because telnet is not
Comments
HP switch certificate must be installed if sectelnet
is used.
certificate must be installed if SSH/HTTPS is used.
4.4.0 (and later) switches. Switches running
earlier Fabric OS versions can be part of the
secure fabric, but they do not support secure
management.
Secure management protocols must be
configured for each participating switch.
Nonsecure protocols may be disabled on
nonparticipating switches.
If SSL is used, certificates must be installed.
allowed in secure mode.
Nonsecure management protocols are necessary
under these circumstances:
Ensuring network security
To ensure security, Fabric OS supports SSH encrypted sessions. SSH encrypts all messages, including the
client’s transmission of password during login. The SSH package contains a daemon (sshd), which runs
on the switch. The daemon supports a wide variety of encryption algorithms, such as Blowfish-CBC
and AES.
NOTE: To maintain a secure network, avoid using telnet or any other unprotected application when you
are working on the switch. For example, if you use telnet to connect to a machine, and then start an SSH
or secure telnet session from that machine to the switch, the communication to the switch is in clear text
and, therefore, is not secure.
Nor is the FTP protocol secure. When you use FTP to copy files to or from the switch, the contents are in
clear text. When you use FTP to copy files to or from
login and password, are in clear text
configUpload, configDownload, and firmwareDownload.
• The fabric contains switches running
Fabric OS 3.2.0.
• The presence of software tools that do not
support Secure protocols: for example, Fabric
Manager 4.0.0.
• The fabric contains switches running Fabric
OS versions earlier than 4.4.0. Nonsecure
management is enabled by default.
the switch, the contents, including the remote FTP server’s
. This limitation affects the following commands: saveCore,
40Configuring standard security features
Commands that require a secure login channel must be issued from an original SSH session. If you start
an SSH session, and then use the login command to start a nested SSH session, commands that require
a secure channel are rejected.
Fabric OS 4.4.0 and later supports SSH protocol 2.0 (ssh2). For more information on SSH, see the SSH
IETF web site: http://www.ietf.org/ids.by.wg/secsh.htmlShell: The Definitive Guide by Daniel J. Barrett, Richard Silverman.
Fabric OS 4.4.0 comes with the SSH server preinstalled; however, you must select and install the SSH
client. For information on installing and configuring the F-Secure SSH client, visit the following web site:
http://www.f-secure.com
.
Configuring the telnet interface
Telnet is enabled by default. To prevent users from passing clear text passwords over the network when
they connect to the switch, you can disable the telnet interface.
NOTE: Before disabling the telnet interface, make sure you have an alternate method of establishing a
connection with the switch.
Disabling telnet
1. Connect to the switch and log in as admin.
Connect through some other means than telnet, for example, through SSH.
2. Issue the following command:
configure telnetd
3. In response to the System Services prompt, enter y.
4. In response to the telnetd prompt, enter off .
The telnet interface is disabled. If you entered the command during a standard telnet session, the
session terminates. For example:
. Another informative source is SSH, The Secure
switch:admin> configure telnetd
Not all options will be available on an enabled switch.
To disable the switch, use the “switchDisable” command.
Configure...
ssl attributes (yes, y, no, n): [no]
http attributes (yes, y, no, n): [no]
snmp attributes (yes, y, no, n): [no]
rpcd attributes (yes, y, no, n): [no]
cfgload attributes (yes, y, no, n): [no]
[31454]: Read 1 license entries for generation 1.
[31454]: Read 1 license records.
System services (yes, y, no, n): [no] y
1. Connect to the switch through a means other than telnet (for example, SSH) and log in as admin.
2. Issue the following command:
configure telnetd
3. In response to the System Services prompt, enter y.
Fabric OS 5.x administrator guide41
4. In response to the telnetd prompt, enter on.
The telnet interface is enabled.
Blocking listeners
HP StorageWorks switches block Linux® subsystem listener applications that are not used to implement
supported features and capabilities. Table 7 lists the listener applications that HP StorageWorks switches
either block or do not start.
Table 7 Blocked listener applications
Listener applicationCore Switch 2/64, SAN
Director 2/128, and 4/256
SAN Director
chargenDo not startDo not start
echoDo not startDo not start
daytimeDo not startDo not start
discardDo not startDo not start
ftpDo not startDo not start
rexecBlock with packet filterDo not start
rshBlock with packet filterDo not start
rloginBlock with packet filterDo not start
timeBlock with packet filterDo not start
rstatsDo not startDo not start
rusersDo not startDo not start
Accessing switches and fabrics
4/8 SAN Switch, 4/16 SAN Switch, SAN
Switch 2/8V, SAN Switch 2/8-EL, SAN
Switch 2/32, Brocade 4Gb SAN Switch
for HP p-Class BladeSystem, and SAN
Switch 4/32
Table 8 lists the defaults for accessing hosts, devices, switches, and zones.
Table 8 Access defaults
CategoryDefault
HostsAny host can access the fabric by SNMP.
Any host can telnet to any switch in the fabric.
Any host can establish an HTTP connection to any switch in the fabric.
Any host can establish an API connection to any switch in the fabric.
DevicesAll device ports can access SES.
All devices can access the management server.
Any device can connect to any FC port in the fabric.
Switch accessAny switch can join the fabric.
All switches in the fabric can be accessed through serial port.
ZoningNode WWNs can be used for WWN-based zoning.
42Configuring standard security features
Creating and maintaining user-defined accounts
In addition to the default administrative and user accounts, Fabric OS supports up to 15 user-defined
accounts in each logical switch (domain). These accounts expand your ability to track account access and
audit administrative activities.
User-defined accounts can be assigned either admin-, switchAdmin-, or user-level roles. Admin-level
accounts allow up to two simultaneous login sessions. User-level accounts allow up to four simultaneous
login sessions. The total number of simultaneous login sessions allowed per logical switch is 15.
You can change passwords on user-defined accounts as described in ”Changing an account password” on
page 45.
If the TC feature is enabled, the system keeps track of account names and login attempts. (See ”Tracking
and controlling switch changes” on page 35 for details on enabling the TC feature.)
For large enterprises, Fabric OS also supports RADIUS services, as described in ”Setting up RADIUS AAA
service” on page 45.
The following procedures are for operations you can perform on user-defined accounts.
NOTE: If you are operating in secure mode, you can perform these operations only on the primary FCS
switch.
Displaying account information
1. Connect to the switch and log in as admin.
2. Issue one of the following commands:
• userConfig --show -a to show all account information for a logical switch
• userConfig --show -b to show all backup account information for a logical switch
• userConfig --show username to show account information for the specified account name
Accounts with the admin role can display information about all accounts on the logical switch. Accounts
with the switchAdmin role can display information about all accounts on the logical switch; however, they
cannot display information about security, user management, or zoning. Accounts with the user role can
display information only about themselves.
Creating a user-defined account
Accounts with the admin role can create accounts. Accounts with the user role cannot.
where:
usernameSpecifies the account name, which must begin with an alphabetic
character. The name can consist of 8 to 40 characters. It is case-sensitive
and can contain alphabetic and numeric characters, the dot, and the
underscore. It must be different from all other account names on the
logical switch.
-rrolenameSpecifies the role: either admin, switchAdmin, or user in nonsecure
mode; admin, user, or nonfcsadmin in secure mode.
-ddescription Is an optional argument that adds a description to the account. The
description field can be up to 40 printable ASCII characters. The
following characters are not allowed: asterisk (*), quotation mark (“),
exclamation point (!), semicolon (;), and colon (:).
Fabric OS 5.x administrator guide43
3. In response to the prompt, enter a password for the account.
The password is not displayed when you enter it on the command line.
Deleting a user-defined account
Only accounts with the admin role can delete user-defined accounts on the logical switch.
1. Connect to the switch and log in as admin.
2. Issue the following command:
userConfig --delete username
where username specifies the account name. You cannot delete the default accounts. An account
cannot delete itself. All active CLI sessions for the deleted account are logged out.
3. Enter y at the prompt for confirmation.
Changing account parameters
Accounts with the admin role can change information for accounts that have lesser permissions. Accounts
with the user role cannot.
where:
usernameChanges the account attribute for username. The account must already
exist.
-r rolenameIs an optional argument that changes the role: either admin,
switchAdmin, or user in nonsecure mode; admin, user, or
nonfcsadmin in secure mode.
An account cannot change its own role.
You can change the role name of a user-defined account only with a
lower level of authorization.
-ddescriptionIs an optional argument; the account description. The description field
can be up to 40 printable ASCII characters. The following characters are
not allowed: asterisk (*), quotation mark (“), exclamation point (!),
semicolon (;), and colon (:).
You can change the description of a user-defined account only with a
lower level of authorization.
-eIs an optional argument; enter yes to enable the account or enter no to
disable it. If you disable an account, all active CLI sessions for that
account are logged out. You can enable or disable user-defined or
default accounts.
Recovering user-defined accounts
If a backup account exists (in secure mode), you can recover it with the following command:
userConfig --recover
The following conditions apply to recovering user accounts:
• Only accounts with admin or higher roles can recover accounts.
• The attributes in the backup database replace the attributes in the current account database.
• An event is stored in the system message log, indicating that accounts have been recovered.
44Configuring standard security features
Changing an account password
At each level of account access, you can change passwords for that account and accounts that have
lesser privileges.
If you log in to a user account, you can change only that account’s password.
If you log in to an admin account, you can change admin and user passwords. You must provide the old
password when the account being changed has the same or higher privileges than the current login
account. For example, if you are logged in as admin, you need admin passwords to change passwords
for admin accounts (except when you change the default user account password at login), but you do not
need user passwords to change passwords for user accounts.
A new password must have at least one character different from the old password. The following rules
also apply to passwords:
• You cannot change passwords using SNMP.
• Password prompting is disabled when security mode is enabled.
• With Fabric OS 4.4.0 and later, you can use Advanced Web Tools to change admin-level account
passwords.
• With Fabric OS 3.2.0 and later, you cannot change default account names.
For information on password behavior when you upgrade (or downgrade) firmware, see ”Effects of
firmware changes on accounts and passwords” on page 79.
Changing the password for the current login account
1. Connect to the switch and log in as either admin or user.
2. Issue the password command:
passwd
3. Enter the requested information at the prompts.
Changing the password for a different account
1. Connect to the switch and log in as admin.
2. Issue the following password command:
passwd name
where name is the name of the account.
3. Enter the requested information at the prompts.
If the named account has lesser privileges than the current login account, the old password of the named
account is not required. If the named account has equal or higher privileges than the current login
account, you are prompted to enter the old password of the named account.
Setting up RADIUS AAA service
Fabric OS 3.2, 4.4.0 and later support RADIUS authentication, authorization, and accounting service
(AAA). When configured for RADIUS, a switch becomes a RADIUS client. In this configuration,
authentication records are stored in the RADIUS host server database. Login and logout account name,
assigned role, and time-accounting records are also stored on the RADIUS server for each user.
By default, RADIUS service is disabled, so AAA services default to the switch local database.
To enable RADIUS service, HP recommends that you access the CLI through an SSH connection so that the
shared secret is protected. Multiple login sessions can configure simultaneously; the last session to apply a
change leaves its configuration in effect. After a configuration is applied, it persists after a reboot or an
HA failover.
The configuration is chassis-based, so it applies to all logical switches (domains) on the switch and
replicates itself on a standby CP blade, if one is present. It is saved in a configuration upload and applied
in a configuration download.
Fabric OS 5.x administrator guide45
Configure at least two RADIUS servers so that if one fails, the other assumes service. You can set the
configuration with both RADIUS service and local authentication enabled so that if all RADIUS servers do
not respond (because of power failure or network problems), the switch uses local authentication.
Consider the following effects of the use of RADIUS service on other Fabric OS features:
• When RADIUS service is enabled, all account passwords must be managed on the RADIUS server. The
Fabric OS mechanisms for changing switch passwords remain functional; however, such changes
affect only the involved switches locally. They do not propagate to the RADIUS server, nor do they
affect any account on the RADIUS server.
When RADIUS is set up for a fabric that contains a mix of switches with and without RADIUS support,
the way a switch authenticates users depends on whether a RADIUS server is set up for that switch. For
a switch with RADIUS support and configuration, authentication bypasses the local password
database. For a switch without RADIUS support or configuration, authentication uses the switch’s local
account names and passwords.
• When Secure Fabric OS secure mode is enabled, the following behaviors apply:
• Account passwords stored in the switch-local password database are distributed among all
switches in the same fabric. RADIUS configuration is not affected.
• There are separate admin and nonfcsadmin roles in secure mode. A nonfcsadmin account on a
RADIUS server cannot access FCS switches, even if the account is properly authenticated.
• If a nonfcsadmin account on a RADIUS server logs in to a switch in nonsecure mode, the switch
grants the user admin role privileges.
• The following behaviors apply to Advanced Web Tools:
• Advanced Web Tools client and server keep a session open after a user is authenticated. A
password change on a switch invalidates an open session and requires the user to log in again.
When integrated with RADIUS, a switch password change on the RADIUS server does not
invalidate an existing open session, although a password change on the local switch does.
• If you cannot log in because of a RADIUS server connection problem, Advanced Web Tools
displays a message indicating server outage.
Configuring the RADIUS server
You must know the switch IP address or name to connect to switches. Use the ipAddrShow command to
display a switch IP address.
For HP StorageWorks SAN Directors (chassis-based systems), the switch IP addresses are aliases of the
physical Ethernet interfaces on the CP blades. When specifying client IP addresses for the logical switches
in such systems, use the CP blade IP addresses. For accessing both the active and standby CP blade, and
for the purpose of HA failover, both of the CP blade IP addresses should be included in the RADIUS server
configuration.
User accounts should be set up by their true network-wide identity, rather than by the account names
created on a Fabric OS switch. Along with each account name, assign appropriate switch access roles.
To manage a nonsecure fabric, these roles can be user or admin. To manage a secure fabric, these roles
can be user, admin, or nonfcsadmin.
When they log in to a switch configured with RADIUS, users enter their assigned RADIUS account names
and passwords at the prompt. After RADIUS server authenticates a user, it responds with the assigned
switch role in an HP Vendor-Specific Attribute (VSA), as defined in the RFC. An Authentication-Accept
response without such VSA role assignment, assigns the user role.
The following sections describe how to configure a RADIUS server to support HP clients under different
operating systems.
46Configuring standard security features
Linux
The following procedures work for FreeRADIUS on Solaris and Red Hat Linux. FreeRADIUS is a freeware
RADIUS server that you can find at the following web site: www.freeradius.org
.
Follow the installation instructions at the web site. FreeRADIUS runs on Linux (all versions), FreeBSD,
NetBSD, and Solaris. If you make a change to any of the files used in this configuration, you must stop the
server and restart it for the changes to take effect.
FreeRADIUS installation places the configuration files in $PREFIX/etc/raddb. By default, the PREFIX
is /usr/local.
Configuring RADIUS service on Linux consists of the following tasks:
• Adding the HP attribute to the server
• Creating the user
• Enabling clients
Adding the attribute to the server
1. Create and save the file $PREFIX/etc/raddb/dictionary.brocade with the following
information:
#
# Brocade FabricOS v5.0.1 dictionary
#
VENDOR Brocade 1588
#
# attribute 1 defined to be Brocade-Auth-Role
# string defined in user configuration
#
ATTRIBUTE Brocade-Auth-Role 1 string Brocade
This defines the vendor ID as 1588, the vendor attribute 1 as Brocade-Auth-Role, and it is a string
value.
2. Open the file $PREFIX/etc/raddb/dictionary in a text editor and add the following line:
$INCLUDE dictionary.brocade
As a result, the file dictionary.brocade is located in the RADIUS configuration directory and
loaded for use by the RADIUS server.
Creating the user
Open the $PREFIX/etc/raddb/user file in a text editor and add user names and roles for users who
will be accessing the switch and authenticating RADIUS. The user logs in using the role specified with
Brocade-Auth-Role. The valid roles include root, factory, admin, switchAdmin, and user. You must
use quotation marks around “password” and “role”.
For example, to set up an account called JohnDoe with the admin role:
The next example uses the local system password file to authenticate users. (This does not work when
using NIS for authentication. The only way to enable authentication with the password file is to force the
HP StorageWorks switch to authenticate using PAP; this requires the -a pap option with the aaaConfig
command.) For example:
Clients are the switches that use the RADIUS server; each client must be defined. By default, all IP
addresses are blocked.
On dual-CP switches (Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director), the switch
sends its RADIUS request using the IP address of the active CP. When adding clients, add both the active
and standby CP IP addresses so that users can still log in, in case of a failover.
1. Open the $PREFIX/etc/raddb/client.config file in a text editor and add the switches that are
to be configured as RADIUS clients.
For example, to configure the switch at IP address 10.32.170.59 as a client:
client 10.32.170.59
In this example, shortname is an alias used to easily identify the client and Secret is the shared
secret between the client and server. Make sure that the shared secret matches that configured on the
switch (see ”Adding a RADIUS server to the switch configuration” on page 51).
2. Save the file $PREFIX/etc/raddb/client.config and then start the RADIUS server as follows:
$PREFIX/sbin/radiusd
Windows 2000
secret= Secret
shortname= Testing Switch
nastype= other
Configuring RADIUS service on Windows 2000 consists of the following tasks:
• Installing Internet Authentication Service (IAS). For more information and instructions on installing IAS,
see the Microsoft® web site.
• Enabling the Challenge Handshake Authentication Protocol (CHAP). If CHAP authentication is
required, Windows must be configured to store passwords with reversible encryption. Reverse
password encryption is not the default behavior; it must be enabled.
NOTE: If a user is configured prior to enabling reverse password encryption, the user’s password is
stored and cannot use CHAP. To use CHAP, the password must be reentered after encryption is enabled.
If the password is not reentered, CHAP authentication does not work and the user is then unable to
authenticate from the switch.
• Configuring a user: IAS is the Microsoft implementation of a RADIUS server and proxy. IAS uses the
Windows native user database to verify user login credentials; it does not list specific users, but
instead lists user groups. Each user group should be associated with a specific switch login role. For
example, configure a user group for root, admin, factory, switchAdmin, and user, and then add any
users whose logins you want to associate to the appropriate group.
Enabling CHAP
1. From the Windows Start menu, select Programs > Administrative Tools > Local Security Policy to open
the Local Security Settings window.
2. In the Local Security Settings window, expand the Account Policies folder and select the Password
Policy folder.
3. From the list of policies in the Password Policy folder, right-click Store password using reversible
encryption for all users in the domain, and select Security from the pop-up menu.
An additional Local Security Settings window opens.
4. Select the Enabled radio button and then click OK.
48Configuring standard security features
Configuring users
1. From the Windows Start menu, select Programs > Administrative Tools > Computer Management to
open the Computer Management window.
2. In the Computer Management window, expand the Local Users and Groups folder and select the
Groups folder.
3. Right-click the Groups folder and select New Group from the pop-up menu.
4. In the New Group window, provide a Name and Description for the group and click Add.
5. In the Select Users or Groups window, select the user—who should already have been
configured—you want to add to the group and click Add.
6. Repeat this for every user you want to add.
7. When you have completed adding all users, click OK.
8. In the New Group window, verify that the users you added in step 4 appear in the Members field and
then click Create to create this group.
The new groups are created for each login type (admin, switchAdmin, user).
Configuring the RADIUS server
1. From the Windows Start menu, select Programs > Administrative Tools > Internet Authentication
Service to open the Internet Authentication Service window.
2. In the Internet Authentication Service window, right-click the Clients folder and select New Client from
the pop-up menu.
NOTE: A client is the device that uses the RADIUS server; in this case, it is the switch.
3. In the Add Client window, provide the following:
• Friendly name: The friendly name should be an alias that is easily recognizable as the switch to
which you are connecting.
• Protocol: Select RADIUS as the protocol.
4. In the Add RADIUS Client window, provide the following:
• Client address (IP or DNS): Enter the IP address of the switch.
• Client-Vendor: Select RADIUS Standard.
• Shared secret: Provide a password. Shared secret is a password used between the client device
and server to prevent IP address spoofing by unwanted clients. Keep your shared secret password
in a safe place. You must enter this password in the switch configuration.
5. Click Finish and repeat step 2 through step 4 for all switches on which RADIUS authentication is to be
used.
6. In the Internet Authentication Service window, right-click the Remote Access Policies folder, and then
select New Remote Access Policy from the pop-up window.
7. A remote access policy must be created for each login role (root, admin, factory, switchAdmin, and
user) for which you want to use RADIUS, so apply this policy to the user groups that you already
created.
8. In the Add Remote Access Policy window, enter an easily identifiable Policy friendly name that
enables you to see the switch login for which the policy is being created, and then click Next.
9. After the Add Remote Access Policy window refreshes, click Add.
10.In the Select Attribute window, select Windows Groups and click Add.
11.In the Groups window, click Add.
12.In the Select Groups window, select the user-defined group for which you are creating a policy and
click Add.
13.After adding all appropriate groups, click OK.
14.In the Groups window, click OK.
Fabric OS 5.x administrator guide49
15.In the Add Remote Access Policy window, confirm that the Conditions section displays the groups that
you selected and click Next.
16.After the Add Remote Access Policy window refreshes, select the Grant remote access permission
radio button and click Next.
17. After the Add Remote Access Policy window refreshes again, click Edit Profile.
18.In the Edit Dial-in Profile window, select the Authentication tab and then select only the Encrypted
Authentication (CHAP) and Unencrypted Authentication (PAP, SPAP) check boxes.
19. Select the Advanced tab and click Add.
20.In the Add Attributes window, select Vendor-Specific and click Add.
21.In the Multivalued Attribute Information window, click Add.
22.In the VSA Information window, select the Enter Vendor Code radio button and enter the value 1588.
23.Select the Yes. It conforms radio button, and then click Configure Attribute.
24.In the Configure VSA (RFC compliant) window, enter the following:
a. For the vendor-assigned attribute number, enter the value 1.
b. For the attribute format, enter String.
c. For the attribute value, enter the login role (root, admin, factory, switchAdmin, or user) the
user group must use to log in to the switch.
d. Click OK.
25.In the Multivalued Attribute Information window, click OK.
26. In the Edit Dial-in Profile window, remove all additional parameters (except the one you just added,
Vendor-Specific) and click OK.
27. In the Add Remote Access Policy window, click Finish.
28.After returning to the Internet Authentication Service window, repeat step 6 through step 27 to add
additional policies for all login types you want to use the RADIUS server. After this is done, you can
configure the switch.
Configuring the switch
RADIUS configuration of the switch is controlled by the aaaConfig command.
NOTE: On dual-CP switches (Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director), the
switch sends its RADIUS request using the IP address of the active CP. When adding clients, add both the
active and standby CP IP addresses so that users can still log in to the event of a failover.
The following procedures show how to use the aaaConfig command to set up a switch for
RADIUS service.
Displaying the current RADIUS configuration
1. Connect to the switch and log in as admin.
2. Issue the following command:
switch:admin> aaaConfig --show
If a configuration exists, its parameters are displayed. If RADIUS service is not configured, only the
parameter heading line is displayed. Parameters include:
• Position: The order in which servers are contacted to provide service
• Server: The server names or IP addresses
• Port: The server ports
• Secret: The shared secrets
• Timeouts: The length of time servers have to respond before the next server is contacted
• Authentication: The type of authentication being used on servers
50Configuring standard security features
Adding a RADIUS server to the switch configuration
1. Connect to the switch and log in as admin.
2. Issue the following command:
switch:admin> aaaConfig --add server [-p port] [-s secret] [-t timeout]
[-a pap | chap]
where:
serverIs either a server name or an IP address. Avoid duplicating server listings
(that is, listing the same server once by name and again by IP address).
Up to five servers can be added to the configuration.
-p portIs an optional argument; enter a server port. The default is port 1812.
-s secretIs an optional argument; enter a shared secret. The default is
sharedsecret. Secrets can be 8 to 40 alphanumeric characters. Make
sure that the secret matches that configured on the server.
-t timeoutIs an optional argument; enter the length of time (in seconds) that the
server has to respond before the next server is contacted. The default is 3
seconds. Timeout values can range from 1 to 30 seconds.
-a[pap|chap]Specifies PAP or CHAP as the authentication protocol.
Enabling or disabling RADIUS service
1. Connect to the switch and log in as admin.
2. Issue the following command:
switch:admin> aaaConfig --radius on | off
Specifying on enables the service; specifying off disables it.
At least one RADIUS server must be configured before you can enable RADIUS service.
If no RADIUS configuration exists, turning it on triggers an error message. When the command succeeds,
the event log indicates that the configuration is enabled or disabled.
Deleting a RADIUS server from the configuration
1. Connect to the switch and log in as admin.
2. Issue the following command:
switch:admin> aaaConfig --remove server | all
where server is a list of servers by either name or IP address. Enter either the name or IP address of
the server to be removed.
3. At the prompt, enter y to complete the command.
When the command succeeds, the event log indicates that the server is removed.
Changing a RADIUS server configuration
1. Connect to the switch and log in as admin.
2. Issue the following command:
switch:admin> aaaConfig --change server [-p port] [-s secret] [-t timeout]
[-a pap | chap]
where:
serverIs a list of servers by either name or IP address. Enter either the name or IP
address of the server to be changed.
Fabric OS 5.x administrator guide51
-p portIs an optional argument; enter a server port.
-s secretIs an optional argument; enter a shared secret.
-t timeoutIs an optional argument; enter the length of time (in seconds) the server
has to respond before the next server is contacted.
-a[pap|chap] Specifies PAP or CHAP as authentication protocol.
Changing the order in which RADIUS servers are contacted for service
1. Connect to the switch and log in as admin.
2. Issue the following command:
switch:admin> aaaConfig --move server to_position
where:
serverIs a list of servers by either name or IP address. Enter either the name or IP
address of the server whose position is to be changed.
to_position Is the position number to which the server is to be moved.
When the command succeeds, the event log indicates that a server configuration is changed.
Enabling and disabling local authentication
It is useful to enable local authentication so that the switch can take over authentication locally if the
RADIUS servers fail to respond because of power outage or network problems. To enable or disable local
authentication, issue the following command:
switch:admin> aaaConfig --switchdb on | off
Specifying on enables local authentication; specifying off disables it.
When local authentication is enabled and RADIUS servers fail to respond, you can log in to the default
switch accounts (admin and user) or any user-defined account. You must know the passwords of these
accounts.
RADIUS authentication must be enabled when local database authentication is turned off from the on
state; otherwise, an error is returned.
Because local database authentication might be disabled or enabled when enabling or disabling RADIUS
authentication, set the local database authentication explicitly to enabled or disabled after setting the
desired RADIUS authentication configuration.
When the command succeeds, the event log indicates that local database authentication is disabled
or enabled.
Configuring for the SSL protocol
Fabric OS 4.4.0 and later support SSL protocol, which provides secure access to a fabric through
Web-based management tools like Advanced Web Tools. SSL support is a standard Fabric OS feature; it
is independent of Secure Fabric OS, which requires a license and separate certification.
Switches configured for SSL grant access to management tools through hypertext transfer protocol-secure
links (which begin with https://) instead of standard links (which begin with http://).
SSL uses public key infrastructure (PKI) encryption to protect data transferred over SSL connections. PKI is
based on digital certificates obtained from an Internet Certificate Authority (CA), which acts as the trusted
key agent.
Certificates are based on the switch IP address or fully-qualified domain name (FQDN), depending on the
issuing CA. If you change a switch IP address or FQDN after activating an associated certificate, you
might have to obtain and install a new certificate. Check with the CA to verify this possibility, and plan
these types of changes accordingly.
52Configuring standard security features
Browser and Java support
Fabric OS supports the following web browsers for SSL connections:
• Internet Explorer (Microsoft Windows)
• Mozilla (Solaris and Red Hat Linux)
In countries that allow the use of 128-bit encryption, use the latest version of your browser. For example,
Internet Explorer 6.0 and later supports 128-bit encryption by default. You can display the encryption
support (called cipher strength) using the Internet Explorer Help:About menu option. If you are running an
earlier version of Internet Explorer, you might be able to download an encryption patch from the
Microsoft web site: http://www.microsoft.com
HP recommends that you upgrade to the Java
find the Java version that is currently running, open the Java console and look at the first line of the
window.
For details on levels of browser and Java support, see the HP StorageWorks Fabric OS 5.x Advanced Web Tools administrator guide.
Summary of SSL procedures
Configure for SSL by obtaining, installing, and activating digital certificates for SSL support. Certificates
are required on all switches that are to be accessed through SSL.
You also need to install a certificate to the Java Plug-in on the management workstation, and you might
need to add a certificate to your web browser.
Configuring for SSL involves these major steps, which are shown in detail in the next sections:
.
TM
1.4.2_03 Plug-in on your management workstation. To
1. Choose a CA.
2. On each switch:
a. Generate a public/private key (secCertUtil genkey command).
b. Generate a certificate signing request (CSR) (secCertUtil gencsr command) and store the
CSR on an FTP server (secCertUtil export command).
3. Obtain the certificates from the CA.
You can request a certificate from a CA through a web browser. After you request a certificate, the
CA either sends certificate files by e-mail (public) or provides access to them on a remote host
(private). Typically, the CA provides the certificate files listed in Table 9.
Table 9 SSL certificate files
Certificate fileDescription
name.crtThe switch certificate.
nameRoot.crtThe root certificate. Typically, this certificate is already installed in the
browser, but if not, you must install it.
nameCA.crtThe CA certificate. It is not necessary to install this, but you can if you want
the CA name to be displayed in the browser window.
4. On each switch install and activate the certificate.
5. If necessary, install the root certificate to the browser on the management workstation.
6. Add the root certificate to the Java Plug-in keystore on the management workstation.
Fabric OS 5.x administrator guide53
Choosing a CA
To ease maintenance and allow secure out-of-band communication between switches, consider using one
CA to sign all management certificates for a fabric. If you use different CAs, management services
operate correctly, but the Advanced Web Tools Fabric Events button is unable to retrieve events for the
entire fabric.
Each CA (for example, Verisign or GeoTrust) has slightly different requirements; for example, some
generate certificates based on IP address, while others require an FQDN, and most require a 1024-bit
public/private key while some might accept a 2048-bit key. Consider your fabric configuration, check
CA web sites for requirements, and gather all the information that the CA requires.
Generating a public/private key
Perform the following procedure on each switch:
1. Connect to the switch and log in as admin.
2. Issue the following command to generate a public/private key pair:
switch:admin> seccertutil genkey
The system reports that this process disables secure protocols, deletes any existing CSR, and deletes
any existing certificates.
3. Respond to the prompts to continue and select the key size. For example:
Continue (yes, y, no, n): [no] y
Select key size [1024 or 2048]:
Generating new rsa public/private key pair
Done.
1024
Because CA support for the 2048-bit key size is limited, select 1024 in most cases.
Generating and storing a CSR
After generating a public/private key (see ”Generating a public/private key” on page 54), perform this
procedure on each switch:
1. Connect to the switch and log in as admin.
2. Issue the following command:
switch:admin> seccertutil gencsr
3. Enter the requested information. For example:
Country Name (2 letter code, eg, US):US
State or Province Name (full name, eg, California):California
Locality Name (eg, city name):San Jose
Organization Name (eg, company name):Brocade
Organizational Unit Name (eg, department name):Eng
Common Name (Fully qualified Domain Name, or IP address): 192.1.2.3
Generating CSR, file name is: 192.1.2.3.csr
Done.
Your CA might require specific codes for Country, State or Province, Locality, Organization, and
Organizational Unit names. Make sure that your spelling is correct and matches the CA requirements.
If the CA requires that the Common Name be specified as an FQDN, make sure that the FQDN is set
on the domain name server.
4. Issue the following command to store the CSR:
switch:admin> seccertutil export
54Configuring standard security features
5. Enter the requested information. For example:
Select protocol [ftp or scp]: ftp
Enter IP address:
Enter remote directory: path_to_remote_directory
Enter Login Name: your account
Enter Password: your password
Success: exported CSR.
6. If you are set up for secure file copy protocol, you can select it; otherwise, select ftp.
7. Enter the IP address of the switch on which you generated the CSR.
8. Enter the remote directory name of the FTP server to which the CSR is to be sent.
9. Enter your account name and password on the server.
Obtaining certificates
Check the instructions on the CA web site and then perform this procedure for each switch:
1. Generate and store the CSR as described in ”Generating and storing a CSR” on page 54.
2. Open a web browser window on the management workstation and go to the CA web site. Follow the
instructions to request a certificate. Locate the area in the request form into which you are to paste
the CSR.
3. Through a telnet window, connect to the switch and log in as admin.
4. Issue the following command:
switch:admin> seccertutil showcsr
The contents of the CSR is displayed.
5. Locate the section that begins with BEGIN CERTIFICATE REQUEST and ends with END
CERTIFICATE REQUEST.
6. Copy and paste this section (including the BEGIN and END lines) into the area provided in the request
form, and then follow the instructions to complete and send the request.
192.1.2.3
It might take several days to receive the certificates. If the certificates arrive by e-mail, save them to an FTP
server. If the CA provides access to the certificates on an FTP server, make note of the path name and
make sure you have a login name and password on the server.
Installing a switch certificate
Perform this procedure on each switch:
1. Connect to the switch and log in as admin.
2. Issue the following command:
switch:admin> seccertutil import
3. Select a protocol, enter the IP address of the host on which the switch certificate is saved, and enter
your login name and password. For example:
Select protocol [ftp or scp]: ftp
Enter IP address:
Enter remote directory: path_to_remote_directory
Enter certificate name (must have “.crt” suffix):
Enter Login Name: your_account
Enter Password: *****
Success: imported certificate [192.1.2.3.crt].
To use this certificate, run the configure command to activate it
The certificate is downloaded to the switch.
192.10.11.12
192.1.2.3.crt
Fabric OS 5.x administrator guide55
Activating a switch certificate
Issue the configure command and respond to the prompts that apply to SSL certificates:
SSL attributesEnter yes.
Certificate FileEnter the name of the switch certificate file, for example,
CA Certificate FileIf you want the CA name to be displayed in the browser
192.1.2.3.crt.
window, enter the name of the CA certificate file; otherwise, skip
this prompt.
Configure...
System services (yes, y, no, n): [no]
ssl attributes (yes, y, no, n): [no]
Certificate File. (filename or none): [10.33.13.182.crt]
CA Certificate File. (filename or none): [none]
Select length of crypto key.
(Valid values are 40, 56, and 128.): (40..128) [128]
http attributes (yes, y, no, n): [no]
HTTP Enabled (yes, y, no, n): [yes]
Secure HTTP Enabled (yes, y, no, n): [no]
After you exit the configure command, the HTTP daemon restarts to handle HTTPS requests.
Configuring the browser
The root certificate might already be installed on your browser, but if not, you must install it. To determine
whether it is already installed, check the certificate store on your browser.
Enter the encryption key length (40, 56, or 128).
yes
192.1.2.3.crt
yes
no
yes
The following procedures are guides for installing root certificates to Internet Explorer and Mozilla
browsers. For detailed instructions, see the documentation that came with the certificate.
Checking and installing root certificates on Internet Explorer
1. From the browser Tools menu, select Internet Options.
2. Click the Content tab.
3. Click Certificates.
4. Select the various tabs and scroll the lists to see whether the root certificate is listed. If it is listed, you
do not need to install it, and you can omit the remainder of this procedure.
5. If the certificate is not listed, click Import.
6. Follow the instructions in the Certificate Import wizard to import the certificate.
Checking and installing root certificates on Mozilla
1. From the browser Edit menu, select Preferences.
2. In the left pane of the Preferences window, expand the Privacy & Security list and select Certificates.
3. In the right pane, click Manage Certificates.
4. In the next window, select the Authorities tab.
5. Scroll the authorities list to determine whether the root certificate is listed. (For example, its name might
have the form nameRoot.crt.) If it is listed, you do not need to install it; omit the remainder of
this procedure.
6. If the certificate is not listed, click Import.
56Configuring standard security features
7. Browse to the certificate location and select the certificate.
For example, select nameRoot.crt.
8. Click Open and follow the instructions to import the certificate.
Installing a root certificate to the Java Plug-in
For information on Java requirements, see ”Browser and Java support” on page 53.
This procedure is a guide for installing a root certificate to the Java Plug-in on the management
workstation. Install the root certificate, if it is not already installed to the plug-in. For detailed instructions,
see the documentation that came with the certificate and to the Sun Microsystems web site:
www.sun.com
1. Copy the root certificate file from its location on the FTP server to the Java Plug-in bin.
For example, the bin location might be:
C: \program files\java\j2re1.4.2_03\bin
2. Open a Command Prompt window and change to the Java Plug-in bin directory.
3. Issue the keytool command and respond to the prompts. For example:
ST=California, C=US
Serial number: 0
Valid from: Thu Jan 15 16:27:03 PST 2004 until: Sat Feb 14 16:27:03 PST 2004
Certificate fingerprints:
MD5: 71:E9:27:44:01:30:48:CC:09:4D:11:80:9D:DE:A5:E3
SHA1: 06:46:C5:A5:C8:6C:93:9C:FE:6A:C0:EC:66:E9:51:C2:DB:E6:4F:A1
Trust this certificate? [no]:
Certificate was added to keystore
.
changeit
yes
In the example, changeit is the default password and RootCert is an example of a root certificate
name.
Displaying and deleting certificates
Table 10 summarizes the commands that display and delete certificates. For details on these commands,
see the HP StorageWorks Fabric OS 5.x command reference guide.
Table 10 Commands to display and delete SSL certificates
CommandDescription
secCertUtil show Displays the state of the SSL key and a list of installed certificates
secCertUtil show filename Displays the contents of a specific certificate
secCertUtil showcsr Displays the contents of a CSR
secCertUtil delete filenameDeletes a specified certificate
secCertUtil delcsr Deletes a CSR
Fabric OS 5.x administrator guide57
Troubleshooting certificates
If you receive messages in the browser or in a pop-up window when logging in to the target switch using
HTTPS, see Table 11.
Table 11 SSL messages and actions
MessageAction
The page cannot be displayedThe SSL certificate is not installed correctly or HTTPS is not
enabled correctly. Make sure that the certificate has not
expired, that HTTPS is enabled, and that certificate file names
are configured correctly.
The security certificate was
issued by a company you have
not chosen to trust.
The security certificate has
expired or is not yet valid
The name on the security
certificate is invalid or does
not match the name of the site
file
This page contains both secure
and nonsecure items. Do you
want to display the nonsecure
items?
The certificate is not installed in the browser. Install it as
described in ”Configuring the browser” on page 56.
Either the certificate file is corrupted or it needs to be
updated. Click View Certificate to verify the certificate
content. If it is corrupted or out of date, obtain and install a
new certificate.
The certificate is not installed correctly in the Java Plug-in.
Install it as described in ”Installing a root certificate to the
Java Plug-in” on page 57.
Click No in this pop-up window. The session opens with a
closed lock icon on the lower-right corner of the browser,
indicating an encrypted connection.
Configuring SNMP agent and traps
You can perform a configuration for the transmission of SNMP information to management stations.
SNMPv3 and SNMPv1 are supported.
The configuration process involves configuring the SNMP agent and configuring SNMP traps. The
following commands are used in the process:
• The configure command sets the security level. You can specify no security, authentication only, or
authentication and privacy.
• The snmpConfig command configures the SNMP agent and traps for SNMPv3 or
SNMPv1 configurations.
• If necessary for backward compatibility, you can use these legacy commands for the configuration of
SNMP v1:
•The agtCfgShow, agtCfgset, and agtCfgDefault commands configure the SNMPv1 agent.
•The snmpMibCapSet command filters at the trap level and the snmpMibCapShow command
displays the trap filter values.
The SNMP trap configuration specifies the MIB trap elements to be used to send information to the SNMP
management station. There are two main MIB trap choices:
• HP-specific MIB trap is associated with the HP-specific StorageWorks MIB (SW-MIB); it monitors HP
StorageWorks switches specifically.
• FibreAlliance MIB trap is associated with the FibreAlliance MIB (FA-MIB); it manages SAN switches
and devices from any company that complies with FibreAlliance specifications.
If you use both SW-MIB and FA-MIB, you might receive duplicate information. You can disable the
FA-MIB, but not the SW-MIB.
58Configuring standard security features
You can also use the following MIBs and their associated traps:
• FICON-MIB (for FICON environments)
• HA-MIB (for the Core Switch 2/64 and SAN Director 2/128)
• SW-EXTTRAP, whcih includes the Software Serial Number (swSsn) as a part of HP StorageWorks SW
traps. It is also used with the legacy Integrated/64 SAN Switch fabrics product to provide detailed
group information for a particular trap.
For information on HP StorageWorks MIBs, see the HP StorageWorks Fabric OS 5.x MIB reference
guide. For information on the specific commands used in these procedures, see online help or the HP
StorageWorks Fabric OS 5.x command reference guide.
Setting the security level
Use the configure command to set the security level (called SNMP attributes). You can specify no
security, authentication only, or authentication and privacy. For example, to configure for authentication
and privacy:
switch:admin> configure
Not all options will be available on an enabled switch.
To disable the switch, use the “switchDisable” command.
Configure...
System services (yes, y, no, n): [no]
ssl attributes (yes, y, no, n): [no]
http attributes (yes, y, no, n): [no]
snmp attributes (yes, y, no, n): [no]
y
Select SNMP Security Level:
(0 = No security, 1 = Authentication only, 2 = Authentication and
Privacy): (0..2) [0] 2
Using the snmpConfig command
Use the snmpConfig --set command to change either the SNMPv3 or SNMPv1 configuration. You
can also change access control, MIB capability, and system group.
SNMPv3 trap recipient configuration:
Trap Recipient's IP address in dot notation: [0.0.0.0] 192.168.45.90
UserIndex: (1..6) [1]
Trap recipient Severity level : (0..5) [0] 4
Trap Recipient's IP address in dot notation: [0.0.0.0] 192.168.45.92
UserIndex: (1..6) [2]
Trap recipient Severity level : (0..5) [0] 2
Trap Recipient's IP address in dot notation: [0.0.0.0]
Trap Recipient's IP address in dot notation: [0.0.0.0]
Trap Recipient's IP address in dot notation: [0.0.0.0]
Trap Recipient's IP address in dot notation: [0.0.0.0]
Committing configuration...done.
60Configuring standard security features
Sample SNMPv1 configuration:
switch:admin> snmpconfig --set snmpv1
SNMP community and trap recipient configuration:
Community (rw): [Secret C0de] admin
Trap Recipient's IP address in dot notation: [0.0.0.0] 10.32.225.1
Trap recipient Severity level : (0..5) [0] 1
Community (rw): [OrigEquipMfr]
Trap Recipient's IP address in dot notation: [10.32.225.2]
Trap recipient Severity level : (0..5) [1]
Community (rw): [private]
Trap Recipient's IP address in dot notation: [10.32.225.3]
Trap recipient Severity level : (0..5) [2]
Community (ro): [public]
Trap Recipient's IP address in dot notation: [10.32.225.4]
Trap recipient Severity level : (0..5) [3]
Community (ro): [common]
Trap Recipient's IP address in dot notation: [10.32.225.5]
Trap recipient Severity level : (0..5) [4]
Community (ro): [FibreChannel]
Trap Recipient's IP address in dot notation: [10.32.225.6]
Trap recipient Severity level : (0..5) [5]
Committing configuration...done.
Sample accessControl configuration:
switch:admin> snmpconfig --set accessControl
SNMP access list configuration:
Access host subnet area in dot notation: [0.0.0.0] 192.168.0.0
Read/Write? (true, t, false, f): [true]
Access host subnet area in dot notation: [0.0.0.0] 10.32.148.0
Read/Write? (true, t, false, f): [true] f
Access host subnet area in dot notation: [0.0.0.0]
Read/Write? (true, t, false, f): [true]
Access host subnet area in dot notation: [0.0.0.0] 10.33.0.0
Read/Write? (true, t, false, f): [true] f
Access host subnet area in dot notation: [0.0.0.0]
Read/Write? (true, t, false, f): [true]
Access host subnet area in dot notation: [0.0.0.0]
Read/Write? (true, t, false, f): [true]
Committing configuration...done.
Fabric OS 5.x administrator guide61
Sample mibCapability configuration:
switch:admin> snmpconfig --show mibCapability
FA-MIB: YES
FICON-MIB: YES
HA-MIB: YES
SW-TRAP: YES
swFCPortScn: YES
swEventTrap: YES
swFabricWatchTrap: YES
swTrackChangesTrap: NO
FA-TRAP: YES
connUnitStatusChange: YES
connUnitEventTrap: NO
connUnitSensorStatusChange: YES
connUnitPortStatusChange: YES
SW-EXTTRAP: NO
FICON-TRAP: NO
HA-TRAP: YES
fruStatusChanged: YES
cpStatusChanged: YES
fruHistoryTrap: NO
Sample systemGroup configuration (default):
switch:admin> snmpconfig --default systemGroup
*****
This command will reset the agent's system group configuration back to
factory default
*****
sysDescr = Fibre Channel Switch
sysLocation = End User Premise
sysContact = Field Support
authTraps = 0 (OFF)
*****
Are you sure? (yes, y, no, n): [no] y
Using legacy commands for SNMPv1
Use the snmpConfig command to configure the SNMPv1 agent and traps (see ”Using the snmpConfig
command” on page 59). However, if necessary for backward compatibility, you can choose to use legacy
commands.
62Configuring standard security features
Sample SNMP agent configuration information:
switch:admin> agtcfgshow
Current SNMP Agent Configuration
Customizable MIB-II system variables:
sysDescr = FC Switch
sysLocation = End User Premise
sysContact = Field Support.
authTraps = 1 (ON)
SNMPv1 community and trap recipient configuration:
Community 1: Secret C0de (rw)
Trap recipient: 192.168.1.51
Trap recipient Severity level: 4
Community 2: OrigEquipMfr (rw)
Trap recipient: 192.168.1.26
Trap recipient Severity level: 0
Community 3: private (rw)
No trap recipient configured yet
Community 4: public (ro)
No trap recipient configured yet
Community 5: common (ro)
No trap recipient configured yet
Community 6: FibreChannel (ro)
No trap recipient configured yet
SNMP access list configuration:
Entry 0: Access host subnet area 192.168.64.0 (rw)]
Entry 1: No access host configured yet
Entry 2: No access host configured yet
Entry 3: No access host configured yet
Entry 4: No access host configured yet
Entry 5: No access host configured yet
Fabric OS 5.x administrator guide63
Sample modification of the SNMP configuration values:
switch:admin> agtcfgset
Customizing MIB-II system variables ...
At each prompt, do one of the followings:
o <Return> to accept current value,
o enter the appropriate new value,
o <Control-D> to skip the rest of configuration, or
o <Control-C> to cancel any change.
To correct any input mistake:
<Backspace> erases the previous character,
<Control-U> erases the whole line,
sysDescr: [FC Switch]
sysLocation: [End User Premise]
sysContact: [Field Support.]
authTrapsEnabled (true, t, false, f): [true]
SNMP community and trap recipient configuration:
Community (rw): [Secret C0de]
Trap Recipient's IP address in dot notation: [192.168.1.51]
Trap recipient Severity level : (0..5) [0] 3
Community (rw): [OrigEquipMfr]
Trap Recipient's IP address in dot notation: [192.168.1.26]
Trap recipient Severity level : (0..5) [0]
Community (rw): [private]
Trap Recipient's IP address in dot notation: [0.0.0.0] 192.168.64.88
Trap recipient Severity level : (0..5) [0] 1
Community (ro): [public]
Trap Recipient's IP address in dot notation: [0.0.0.0]
Community (ro): [common]
Trap Recipient's IP address in dot notation: [0.0.0.0]
Community (ro): [FibreChannel]
Trap Recipient's IP address in dot notation: [0.0.0.0]
SNMP access list configuration:
Access host subnet area in dot notation: [0.0.0.0] 192.168.64.0
Read/Write? (true, t, false, f): [true]
Access host subnet area in dot notation: [0.0.0.0]
Read/Write? (true, t, false, f): [true]
Access host subnet area in dot notation: [0.0.0.0]
Read/Write? (true, t, false, f): [true]
Access host subnet area in dot notation: [0.0.0.0]
Read/Write? (true, t, false, f): [true]
Access host subnet area in dot notation: [0.0.0.0]
Read/Write? (true, t, false, f): [true]
Access host subnet area in dot notation: [0.0.0.0]
Read/Write? (true, t, false, f): [true]
Committing configuration...done.
value = 1 = 0x1
64Configuring standard security features
Sample reset of the SNMP agent configuration to default values:
switch:admin> agtcfgdefault
*****
This command will reset the agent's configuration back to factory default
*****
Current SNMP Agent Configuration
Customizable MIB-II system variables:
sysDescr = Fibre Channel Switch.
sysLocation = End User Premise
sysContact = sweng
authTraps = 0 (OFF)
SNMPv1 community and trap recipient configuration:
Community 1: Secret C0de (rw)
Trap recipient: 192.168.15.41
Trap recipient Severity level: 4
Community 2: OrigEquipMfr (rw)
No trap recipient configured yet
Community 3: private (rw)
No trap recipient configured yet
Community 4: public (ro)
No trap recipient configured yet
Community 5: common (ro)
No trap recipient configured yet
Community 6: FibreChannel (ro)
No trap recipient configured yet
SNMP access list configuration:
Entry 0: Access host subnet area 192.168.64.0 (rw)]
Entry 1: No access host configured yet
Entry 2: No access host configured yet
Entry 3: No access host configured yet
Entry 4: No access host configured yet
Entry 5: No access host configured yet
*****
Are you sure? (yes, y, no, n): [no] y
Committing configuration...done.
agent configuration reset to factory default
Current SNMP Agent Configuration
Customizable MIB-II system variables:
sysDescr = Fibre Channel Switch.
sysLocation = End User Premise
sysContact = Field Support.
authTraps = 0 (OFF)
SNMPv1 community and trap recipient configuration:
Community 1: Secret C0de (rw)
No trap recipient configured yet
Community 2: OrigEquipMfr (rw)
No trap recipient configured yet
Community 3: private (rw)
No trap recipient configured yet
Community 4: public (ro)
No trap recipient configured yet
Community 5: common (ro)
No trap recipient configured yet
Community 6: FibreChannel (ro)
No trap recipient configured yet
(output truncated)
Fabric OS 5.x administrator guide65
Sample modification of the options for configuring SNMP MIB traps:
switch:admin> snmpmibcapset
The SNMP Mib/Trap Capability has been set to support
FE-MIB
SW-MIB
FA-MIB
FA-TRAP
FA-MIB (yes, y, no, n): [yes]
FICON-MIB (yes, y, no, n): [no]
HA-MIB (yes, y, no, n): [no] y
SW-TRAP (yes, y, no, n): [no]
swFCPortScn (yes, y, no, n): [no]
swEventTrap (yes, y, no, n): [no]
swFabricWatchTrap (yes, y, no, n): [no]
swTrackChangesTrap (yes, y, no, n): [no]
FA-TRAP (yes, y, no, n): [yes]
connUnitStatusChange (yes, y, no, n): [no]
connUnitEventTrap (yes, y, no, n): [no]
connUnitSensorStatusChange (yes, y, no, n): [no]
connUnitPortStatusChange (yes, y, no, n): [no]
SW-EXTTRAP (yes, y, no, n): [no]
FICON-TRAP (yes, y, no, n): [no]
linkRNIDDeviceRegistration (yes, y, no, n): [no]
linkRNIDDeviceDeRegistration (yes, y, no, n): [no]
linkLIRRListenerAdded (yes, y, no, n): [no]
linkLIRRListenerRemoved (yes, y, no, n): [no]
linkRLIRFailureIncident (yes, y, no, n): [no]
HA-TRAP (yes, y, no, n): [no]
fruStatusChanged (yes, y, no, n): [no]
cpStatusChanged (yes, y, no, n): [no]
fruHistoryTrap (yes, y, no, n): [no]
Avoid-Duplicate-TRAP (yes, y, no, n): [no]
switch:admin>
y
y
y
y
y
y
The following snmpMibCapSet parameters for FA-TRAP appear in the preceding example:
• connUnitStatusChange: Indicates that the overall status of the connectivity unit has changed. Its
variables are:
• connUnitStatus: The status of the connection unit
• connUnitState: The state of the connection unit
• connUnitEventTrap: Indicates that the connectivity unit has generated an event. Its variables are:
• connUnitEventId: The internal event ID
• connUnitEventType: The type of this event
• connUnitEventObject: Used with the connUnitEventType to identify the object to which the
event refers.
• connUnitEventDescr: The description of the event.
• connUnitSensorStatusChange: Indicates that the status of the sensor associated with the
connectivity unit has changed.
• connUnitSensorStatus: The status indicated by the sensor.
• connUnitPortStatusChange: Indicates that the status of the sensor associated with the
connectivity unit has changed.
• connUnitPortStatus: Shows overall protocol status for the port.
• connUnitPortState: Shows the user-specified state of the port hardware.
Use the configure command to specify that secure file copy (scp) be used for configuration uploads
and downloads. For example:
switch:admin> configure
Not all options will be available on an enabled switch.
To disable the switch, use the “switchDisable” command.
Configure...
System services (yes, y, no, n): [no] n
ssl attributes (yes, y, no, n): [no] n
http attributes (yes, y, no, n): [no] n
snmp attributes (yes, y, no, n): [no] n
rpcd attributes (yes, y, no, n): [no] n
cfgload attributes (yes, y, no, n): [no] y
Enforce secure config Upload/Download (yes, y, no, n): [no] y
switch:admin>
Setting the boot PROM password
The boot PROM password provides an additional layer of security by protecting the boot PROM from
unauthorized use. Setting a recovery string for the boot PROM password enables you to recover a lost
boot PROM password by contacting your switch service provider. Without the recovery string, a lost boot
PROM password cannot be recovered.
Set the boot PROM password and the recovery string on all switches. If your site procedures dictate that
you set the boot PROM password without the recovery string, see ”Without a recovery string” on page 69.
To set the boot PROM password with a recovery string, see the section that applies to your switch model.
NOTE: Setting the boot PROM password requires accessing the boot prompt, which stops traffic flow
through the switch until the switch is rebooted. Perform this procedure during planned down time.
Fabric OS 5.x administrator guide67
4/8 SAN Switch, 4/16 SAN Switch, SAN Switch 2/8V, SAN Switch 2/16V, SAN Switch
2/32, Brocade 4Gb SAN Switch for HP p-Class BladeSystem, and SAN Switch 4/32
Follow this procedure to set the boot PROM password with a recovery string:
1. Connect to the serial port interface as described in ”Connecting through the serial port” on page 21.
2. Reboot the switch.
3. Press ESC within four seconds after the message Press escape within 4 seconds... is
displayed.
The following options are available:
OptionDescription
1 Start systemContinues the system boot process.
2 Recovery passwordLets you set the recovery string and the boot PROM
password.
3 Enter command shellProvides access to boot parameters.
4. Enter 2.
If no password was previously set, the following message is displayed:
Recovery password is NOT set. Please set it now.
If a password was previously set, the following messages are displayed:
Send the following string to Customer Support for password recovery:
afHTpyLsDo1Pz0Pk5GzhIw==
Enter the supplied recovery password.
Recovery Password:
5. Enter the recovery password (string).
The recovery string must be between 8 and 40 alphanumeric characters. HP recommends a random
string that is 15 characters or longer for higher security. The firmware prompts for this password only
once. It is not necessary to remember the recovery string because it is displayed the next time you enter
the command shell.
The New password prompt is displayed.
6. Enter the boot PROM password, and reenter it when prompted. The password must be eight
alphanumeric characters (any additional characters are not recorded). Record this password for
future use.
The new password is saved (the saveEnv command is not required).
7. Reboot the switch.
Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director
The boot PROM and recovery passwords must be set for each CP blade on the Core Switch 2/64, SAN
Director 2/128, and 4/256 SAN Director as follows:
1. Connect to the serial port interface on the standby CP blade, as described in ”Connecting through the
serial port” on page 21.
2. Connect to the active CP blade by serial or telnet and issue the haDisable command to prevent
failover during the remaining steps.
3. For the Core Switch 2/64: Reboot the standby CP blade by pressing the yellow ejector buttons at the
top and bottom of the CP blade, and then press both ejector handles back towards the switch to lock
the blade back into the slot.
For the SAN Director 2/128 and 4/256 SAN Director: Reboot the standby CP blade by sliding the
On/Off switch on the ejector handle of the standby CP blade to Off, and then back to On.
4. Press ESC within four seconds after the message Press escape within 4 seconds... is
displayed.
68Configuring standard security features
The following options are available:
OptionDescription
1 Start systemContinues the system boot process.
2 Recovery passwordLets you set the recovery string and the boot PROM
password.
3 Enter command shellProvides access to boot parameters.
5. Enter 2.
If no password was previously set, the following message is displayed:
Recovery password is NOT set. Please set it now.
If a password was previously set, the following messages are displayed:
Send the following string to Customer Support for password recovery:
afHTpyLsDo1Pz0Pk5GzhIw==
Enter the supplied recovery password.
Recovery Password:
6. Enter the recovery password (string).
The recovery string must be between 8 and 40 alphanumeric characters. HP recommends a random
string that is 15 characters or longer for higher security. The firmware prompts for this password only
once. It is not necessary to remember the recovery string because it is displayed the next time you
enter the command shell.
The New password prompt is displayed.
7. Enter the boot PROM password, and then reenter it when prompted. The password must be eight
alphanumeric characters (any additional characters are not recorded). Record this password for
future use.
The new password is saved (the saveEnv command is not required).
8. Connect to the active CP blade serially or by telnet and issue the haEnable command to restore HA,
and then fail over the active CP blade by issuing the haFailover command.
Traffic flow through the active CP blade resumes when the failover is complete.
9. Connect the serial cable to the serial port on the new standby CP blade (previously the active
CP blade).
10.Repeat step 2 through step 7 for the new standby CP blade (each CP blade has a separate boot
PROM password).
11.Connect to the active CP blade serially or by telnet and issue the haEnable command to restore
high availability.
Without a recovery string
Although you can set the boot PROM password without also setting the recovery string, HP strongly
recommends that you set both the password and the string. If your site procedures dictate that you must
set the boot PROM password without the string, follow the procedure that applies to your switch model.
NOTE: Setting the boot PROM password requires accessing the boot prompt, which stops traffic flow
through the switch until the switch is rebooted. Perform this procedure during planned down time.
Fabric OS 5.x administrator guide69
4/8 SAN Switch, 4/16 SAN Switch, SAN Switch 2/8V, SAN Switch 2/16V, SAN Switch
2/32, Brocade 4Gb SAN Switch for HP p-Class BladeSystem, and SAN Switch 4/32
Follow this procedure to set the boot PROM password without a recovery string:
1. Create a serial connection to the switch as described in ”Connecting through the serial port” on
page 21.
2. Reboot the switch by issuing the reboot command.
3. Press ESC within four seconds after the message Press escape within 4 seconds... is
displayed.
The following options are available:
OptionDescription
1 Start system. Continues the system boot process.
2 Recovery password.Lets you set the recovery string and the boot PROM
password.
3 Enter command shell. Provides access to boot parameters.
4. Enter 3.
5. At the shell prompt, issue the passwd command.
NOTE: The passwd command applies only to the boot PROM password when it is entered from the
boot interface.
6. Enter the boot PROM password at the prompt, and then reenter it when prompted. The password must
be eight alphanumeric characters (any additional characters are not recorded). Record this password
for future use.
7. Issue the saveEnv command to save the new password.
8. Reboot the switch by issuing the reset command.
Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director
On the Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director, set the password on the
standby CP blade, fail over, and then set the password on the previously active (now standby) CP blade
to minimize disruption to the fabric:
1. Determine the active CP blade by opening a telnet session to either CP blade, connecting as admin,
and entering the haShow command.
2. Connect to the active CP blade serially and by telnet and issue the haDisable command to prevent
failover during the remaining steps.
3. Create a serial connection to the standby CP blade as described in ”Connecting through the serial
port” on page 21.
4. For the Core Switch 2/64: Reboot the standby CP blade by pressing the yellow ejector buttons at top
and bottom of the CP blade, and then press both ejector handles back towards the switch to lock the
blade back into the slot.
SAN Director 2/128 and 4/256 SAN Director: Reboot the standby CP blade by sliding the On/Off
switch on the ejector handle of the standby CP blade to Off, and then back to On.
This causes the blade to reset.
5. Press ESC within four seconds after the message Press escape within 4 seconds... is
displayed.
70Configuring standard security features
The following options are available:
OptionDescription
1 Start system. Continues the system boot process.
2 Recovery password.Lets you set the recovery string and the boot PROM
password.
3 Enter command shell. Provides access to boot parameters.
6. Enter 3.
7. Issue the passwd command at the shell prompt.
NOTE: The passwd command applies only to the boot PROM password when it is entered from the boot
interface.
8. Enter the boot PROM password at the prompt, and then reenter it when prompted. The password must
be eight alphanumeric characters (any additional characters are not recorded). Record this password
for future use.
9. Issue the saveEnv command to save the new password.
10.Reboot the standby CP blade by issuing the reset command.
11.Connect to the active CP blade serially and by telnet and issue the haEnable command to restore
HA, and then fail over the active CP blade by issuing the haFailover command.
Traffic resumes flowing through the newly active CP blade after it has completed rebooting.
12.Connect the serial cable to the serial port on the new standby CP blade (previously the active
CP blade).
13.Repeat step 3 through step 10 for the new standby CP blade.
14.Connect to the active CP blade serially and by telnet and issue the haEnable command to restore
HA.
Recovering forgotten passwords
If you know the root password, you can use this procedure to recover the user, admin, and
factory passwords:
1. Open a CLI connection (serial or telnet) to the switch. If secure mode is enabled, connect to the
primary FCS switch.
2. Log in as root.
3. Issue the command for the type of password that was lost:
•
passwd user
• passwd admin
•
passwd factory
4. Enter the requested information at the prompts.
To recover a lost root password, contact your switch service provider.
To recover a lost boot PROM password, contact your switch service provider. You must have previously
set a recovery string to recover the boot PROM password.
Fabric OS 5.x administrator guide71
72Configuring standard security features
4Maintaining configurations and firmware
This chapter contains procedures for maintaining switch configurations and maintaining firmware.
Maintaining configurations
It is important to maintain consistent configuration settings on all switches in the same fabric, because
inconsistent parameters (such as inconsistent PID formats) can cause fabric segmentation. As part of
standard configuration maintenance procedures, HP recommends that you back up all important
configuration data for every switch on a host computer server for emergency reference.
The following sections contain procedures for basic switch configuration maintenance.
Displaying configuration settings
The switch configuration file contains four sections:
• The Boot Parameters section contains variables, such as the switch's name and IP address.
• The Licenses section lists the licenses that are active on the switch.
• The Chassis Configuration section contains configuration variables, such as diagnostic settings, fabric
configuration settings, and SNMP settings.
• The Configuration section contains licensed option configuration parameters.
To display configuration settings, connect to the switch, log in as admin, and issue the configShow
command. The configuration settings vary depending on switch model and configuration.
Backing up a configuration
If the configuration is lost or unintentional changes are made, keep a backup copy of the configuration
file (or a backup copy of both configuration files, one for each logical switch—if you are using a Core
Switch 2/64 or SAN Director 2/128 with two domains). The configuration file is what gets saved when
you issue the configUpload command. Keep individual backup files for all switches in the fabric. Do
not copy configurations from one switch to another.
The following information is not saved in a backup file:
• dnsconfig information
• Passwords
You must have a valid account on the FTP server where the backup file is stored.
You can specify the use of secure file copy (scp) during the procedure. For instructions on configuring the
use of scp by default, see ”Configuring secure file copy” on page 67.
Before beginning, verify that you can reach the FTP server from the switch. Using a telnet connection, save
a backup copy of the configuration file from a logical switch to a host computer as follows:
1. Verify that the FTP service is running on the host computer.
2. Connect to the switch and log in as admin.
3. Issue the configUpload command.
The command becomes interactive and you are prompted for the required information.
Fabric OS 5.x administrator guide73
4. Respond to the prompts as follows:
Protocol If your site requires the use of Secure Copy, specify scp. Otherwise,
specify ftp.
Server
Name or IP
Address
Enter the name or IP address of the server where the file is to be stored;
for example, 192.1.2.3. You can enter a server name if DNS is
enabled. For details about the dnsConfig command, see the HP StorageWorks Fabric OS 5.x command reference guide.
User nameEnter the user name of your account on the server, for example,
JohnDoe.
File nameSpecify a file name for the backup file, for example, config.txt.
Absolute path names can be specified using forward slash (/). Relative
path names create the file in the user’s home directory on UNIX servers,
and in the directory where the FTP server is running on Windows servers.
PasswordEnter your account password for the server.
For example:
switch:admin> configupload
Protocol (scp or ftp) [ftp]: ftp
Server Name or IP Address [host]: 192.1.2.3
User Name [user]: JohnDoe
File Name [config.txt]: /pub/configurations/config.txt
Password: xxxxx
Upload complete
switch:admin>
Restoring a configuration
Restoring a configuration involves overwriting the configuration on the switch by downloading a
previously saved backup configuration file. Perform this procedure during a planned down time.
Make sure that the configuration file you are downloading is compatible with your switch model;
configuration files from other model switches might cause your switch to fail.
You must have a user ID on the FTP server where the backup file is stored.
Use the following procedure:
1. Verify that the FTP service is running on the server where the backup configuration file is located.
2. Connect to the switch and log in as admin.
3. Disable the switch by issuing the switchDisable command.
4. Issue the configDownload command.
The command becomes interactive and you are prompted for the required information.
5. Respond to the prompts as follows:
ProtocolIf your site requires the use of Secure Copy, specify scp. Otherwise, specify
ftp.
Server
Name or IP
Address
User nameEnter the user name of your account on the server, for example, JohnDoe.
Enter the name or IP address of the server where the file is stored; for
example, 192.1.2.3. You can enter a server name if DNS is enabled.
File nameSpecify the full path name of the backup file, for example,
/pub/configurations/config.txt.
PasswordEnter your account password for the server.
74Maintaining configurations and firmware
6. At the Do you want to continue [y/n] prompt, enter y.
7. Wait for the configuration to be restored.
8. When the process is finished, issue the switchEnable command.
For example:
switch:admin> configdownload
Protocol (scp or ftp) [ftp]: ftp
Server Name or IP Address [host]: 192.1.2.3
User Name [user]: JohnDoe
File Name [config.txt]: /pub/configurations/config.txt
Password: xxxxx
*** CAUTION ***
This command is used to download a backed-up configuration
for a specific switch. If using a file from a different
switch, this file's configuration settings will override
any current switch settings. Downloading a configuration
file, which was uploaded from a different type of switch,
may cause this switch to fail.
Do you want to continue [y/n]: y
download complete..
switch:admin> switchenable
NOTE: After you download a configuration file, you must reboot to be sure the parameters are enabled.
Before the reboot, this type of parameter is listed in the configuration file, but it is not effective until after
the reboot.
Restoring configurations in a FICON environment
If the switch is operating in a FICON Control Unit Port (CUP) environment, and the ASM (active=saved)
bit is set on, the switch ignores the initial program load (IPL) file that is downloaded when you restore a
configuration. Table 12 describes this behavior in detail.
Table 12 Backup and restore in a FICON CUP environment
ASM bitCommandDescription
on or offconfiguploadAll the files saved in the file access facility are uploaded to
the management workstation. A section in the uploaded
configuration file labeled FICON_CUP is in an
encoded format.
onconfigdownloadFiles saved on the switch that are also present in the
FICON_CUP section of the configuration file
are overwritten.
Files in the FICON section of configuration file that are not
currently present on the switch are saved.
The IPL file is not replaced, because active=saved mode is
on. A message is displayed in the syslog to warn that the
IPL file is not being overwritten.
offconfigdownloadFiles saved on the switch that are also present in the
FICON_CUP section of the configuration file
are overwritten.
Files in the FICON section of configuration file that are not
currently present on the switch are saved.
The IPL file is replaced, because active=saved mode is off.
Fabric OS 5.x administrator guide75
If fmsmode is enabled in a configuration file, but is disabled on the switch, the configdownload
command fails and displays an error message. This prevents undesirable conditions that could result from
enabling fmsmode on a switch that does not require it.
Downloading configurations across a fabric
To save time when configuring fabric parameters and software features, you can save a configuration file
from one switch and download it to other switches of the same model type, as shown in the following
procedure. Avoid downloading configuration files to different model switches, because that can cause the
switches to fail.
1. Configure one switch first.
2. Use the configUpload command to save the configuration information.
See ”Backing up a configuration” on page 73.
3. Use the configDownload command to download the file onto each of the remaining switches.
See ”Restoring a configuration” on page 74.
Printing hard copies of switch information
HP recommends that you print a hard copy of all key configuration data, including license key information
for every switch, and store it in a secure place for emergency reference. Print out the information from the
following commands, and store the printouts in a secure location:
• The configShow command displays configuration parameters and setup information, including
license information.
• The ipAddrShow command displays the IP address.
• The licenseShow command displays the license keys you have installed and provides better detail
than the license information from the configShow command.
Depending on the security procedures of your company, you might also want to keep a record of the user
levels and passwords (including any boot ROM passwords) for all switches in the fabric. Access to this
sensitive information should be limited.
Maintaining firmware
This section explains how to obtain and install firmware. Fabric OS 5.0.1x provides nondisruptive
firmware installation.
In most cases, you will be upgrading firmware; that is, installing a later firmware version than the one you
are currently running. However, some circumstances might require installing an earlier version; that is,
downgrading the firmware. The procedures in this section assume that you are upgrading firmware, but
they work for downgrading as well, provided the old and new firmware versions are compatible. Always
reference the latest release notes for updates that may exist regarding downgrades under particular
circumstances.
Using the CLI (or HP Advanced Web Tools), you can upgrade the firmware on one switch at a time. You
can also use the optionally licensed HP Fabric Manager software tool to upgrade firmware simultaneously
on multiple switches. For details on Fabric Manager and other licensed software tools, visit the HP web
site: http://
Obtaining and unzipping firmware
Firmware upgrades are available for customers with support service contracts and partners on the HP
Storage web site: http://welcome.hp.com/country/us/eng/prodserv/storage.html
switches:
1. Locate the Networked storage section under IT storage products and click Storage area networks.
The SAN Infrastructure page is displayed.
2. Click Fibre Channel Switches.
The Fibre Channel switches page is displayed.
3. Go to the B-Series Fabric-Enterprise Class section and select the appropriate switch.
The switch overview page is displayed.
76Maintaining configurations and firmware
4. In the Product information section on the right side, select Software & drivers.
The download drivers & software page is displayed.
5. Click the appropriate switch in the select your product section.
The specify operating system page is displayed.
6. Click Cross operating system (BIOS, Firmware, Diagnostics, etc.).
The download drivers and software page is displayed.
7. In the Firmware section, click the blue download button to the right of the applicable firmware.
To locate all available switch firmware, start at the HP web site: http://www.hp.comDownloads.
The Software & Driver Downloads page is displayed. You may search for your product using either of the
following methods:
1. Select the Download drivers and software radio button, enter your product name in the space
provided, and press Enter.
The Product search results page is displayed.
a. Select the appropriate product.
The specify operating system page is displayed.
b. Click Cross operating system (BIOS, Firmware, Diagnostics, etc.).
The download drivers and software page is displayed.
c. In the Firmware section, click the blue download button to the right of the applicable firmware.
2. Click Storage in the Or Select a product category section.
The Storage page is displayed.
a. Click SAN Infrastructure.
The SAN Infrastructure page is displayed.
b. Select the appropriate product family.
The product family page is displayed.
c. Select the appropriate switch.
The specify operating system page is displayed.
d. Click Cross operating system (BIOS, Firmware, Diagnostics, etc.).
The download drivers and software page is displayed.
e. In the Firmware section, click the blue download button to the right of the applicable firmware.
and select Driver
Before you can use the firmwareDownload command to update the firmware on your equipment, you
must unzip the firmware (using the UNIX tar or gzip command or a Windows unzip program).
When you unpack the downloaded firmware it expands into a directory that is named according to the
version of Fabric OS it contains. For example, if you download and unpack Fabric OS 5.0.1.zip, it
expands into a directory called 5.0.1. When you use the firmwaredownload command, you specify
the path to the version 5.0.1 directory and append the keyword release.plist to the path.
Checking connected switches
If the switch to be upgraded is running version 4.1.0 firmware or later, HP recommends that all switches
directly connected to it be running versions no earlier than 2.6.1, 3.1.0, or 4.1.0. If some connected
switches are running earlier firmware versions, upgrade them to at least the earliest recommended version
(shown in Table 13) before upgrading firmware on your switch. HP recommends that you download the
latest firmware; to download firmware, see ”Obtaining and unzipping firmware” on page 76.
Fabric OS 5.x administrator guide77
Table 13 Recommended firmware
Switch model
1
Earliest recommended Fabric OS version
4/8 SAN Switch and 4/16 SAN
5.0.1
Switch
1 GB Switches2.6.1
SAN Switch 2/8-EL, SAN Switch
3.1.0
2/16-EL, and SAN Switch 2/16
SAN Switch 2/8V and SAN
4.2.0
Switch 2/16V
SAN Switch 2/32 4.1.0
Brocade 4Gb SAN Switch for HP
5.0.1
p-Class BladeSystem
SAN Switch 4/324.4.0
Core Switch 2/64 4.1.0
SAN Director 2/1284.2.0
4/256 SAN Director5.0.1
1. During code activation on the SAN Switch 2/8V, SAN Switch 2/16V, or SAN Switch 2/32 running Fabric OS 4.1.0
or later, data continues to flow between hosts and storage devices; however, fabric services are unavailable for a
period of approximately 50–55 seconds. Possible disruption of the fabric can be minimized by ensuring that
switches logically adjacent to these models (directly connected via an ISL) are running at the minimum Fabric OS
2.6.1 or later, 3.1.0 or later, or 4.1.0 or later.
If the SAN Switch 2/8V, SAN Switch 2/16V, SAN Switch 2/32, Brocade 4Gb SAN Switch for HP p-Class
BladeSystem, or SAN Switch 4/32 are adjacent and you start firmware downloads on them at same time, there
might be I/O disruption.
To determine whether you need to upgrade connected switches before upgrading your switch, use the
following procedure on each connected switch to display firmware information and build dates.
1. Connect to the switch and log in as admin.
2. Issue the version command.
The following information is displayed:
• Kernel displays the version of switch kernel operating system.
• Fabric OS displays the version of switch Fabric OS.
• Made on displays the build date of firmware running in switch.
• Flash displays the installation date of firmware stored in nonvolatile memory.
• BootProm displays the version of the firmware stored in the boot PROM.
About the download process
The firmwareDownload command downloads unzipped switch firmware from an FTP server to the
switch’s nonvolatile storage area.
In the Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director, this command (when not using
any options flags) by default downloads the firmware image to a standby CP, if there is one, to prevent
disruption to application services. This operation depends on HA support. If HA is not available,
experienced technicians can upgrade the CPs one at a time, using the -s option.
78Maintaining configurations and firmware
CAUTION: To ensure a nondisruptive download, for each nondirector class switch in your fabric,
complete all firmware download changes before issuing the firmwareDownload command on the next
switch.
HP StorageWorks fixed-port models and each CP blade of the Core Switch 2/64, SAN Director 2/128,
and 4/256 SAN Director have two partitions of nonvolatile storage areas (a primary and a secondary) to
store two firmware images. The firmwareDownload command always loads the new image into the
secondary partition and swaps the secondary partition to be the primary. It then reboots the partition and
activates the new image. Finally, it performs the firmwareCommit procedure, to copy the new image to
the other partition.
Effects of firmware changes on accounts and passwords
Table 14 describes what happens to accounts and passwords when you replace the switch firmware with
a different version. Upgrading means installing a later version of firmware. Downgrading means installing
an earlier version.
Table 14 Effects of firmware changes on accounts and passwords
ChangeFirst timeSubsequent times (after upgrade, then
downgrade, and then upgrade)
Upgrading Default accounts and their passwords
are preserved.
Downgrading User-defined accounts are no longer
valid. Default accounts and their
passwords are preserved. If a default
account was disabled, it is reenabled
after the downgrade.
Upgrading to
version 3.2.0
(You might upgrade a switch in the fabric as part of ”Checking connected switches”
on page 77.) Earlier versions allowed you to change the default account names. You
cannot add user-defined accounts until you change the names back to default with the
passwdDefault command.
Considerations for downgrading firmware
The following items must be considered before attempting to downgrade to an earlier version of
Fabric OS:
• If your fabric is set to the extended edge PID format and you want to downgrade to an earlier Fabric
OS version that does not support extended edge, you must change the PID to a supported format. For
more information, see ”Configuring the PID format” on page 213.
• Downgrading a SAN Director 2/128 that is configured for two domains from Fabric OS 4.4.0 to
Fabric OS 4.2.0 is not supported.
• If you are running Fabric OS 4.0.2 firmware on a SAN Switch 2/32, you cannot downgrade to an
earlier version.
User-defined and default accounts and
their passwords are preserved.
User-defined and default accounts and
their passwords are preserved, including
accounts added after the first upgrade.
Considerations for FICON CUP environments
To prevent channel errors during nondisruptive firmware installation, the switch CUP port must be taken
offline from all host systems.
Upgrading HP StorageWorks switches
The 4/8 SAN Switch, 4/16 SAN Switch, SAN Switch 2/8V, SAN Switch 2/16V, SAN Switch 2/32,
Brocade 4Gb SAN Switch for HP p-Class BladeSystem, and SAN Switch 4/32 maintain primary and
secondary partitions for firmware. The firmwareDownload command defaults to an autocommit option
that copies the firmware from one partition to the other.
Fabric OS 5.x administrator guide79
Do not override an autocommit under normal circumstances; use the default. See ”Upgrading firmware in
single-CP mode” on page 239 for details about overriding the autocommit option.
As an alternative, before starting a firmware download, you can connect the switch with a serial console
cable to a computer that is running a session capture. The information collected might be useful for
troubleshooting.
Summary of the upgrade process
The following summary describes the default behavior of the firmwareDownload command (without
options) on the 4/8 SAN Switch, 4/16 SAN Switch, SAN Switch 2/8V, SAN Switch 2/16V, SAN
Switch 2/32, Brocade 4Gb SAN Switch for HP p-Class BladeSystem, and SAN Switch 4/32:
1. Issue the firmwareDownload command.
2. Fabric OS downloads firmware to the secondary partition.
3. The system performs an HA reboot (haReboot). After the haReboot, the former secondary partition
is the primary partition.
4. The system replicates the firmware from the primary to the secondary partition.
You can issue the firmwareDownloadStatus command to view the firmware process.
Upgrading 4/8 SAN Switch, 4/16 SAN Switch, SAN Switch 2/8V, SAN Switch 2/16V, SAN
Switch 2/32, Brocade 4Gb SAN Switch for HP p-Class BladeSystem, and SAN Switch 4/32
The upgrade process first downloads and then commits the firmware to the switch. While the upgrade is
proceeding, you can start another telnet session on the switch and observe the upgrade progress.
NOTE: After you start the process, do not enter any disruptive commands (such as reboot) that interrupt
the process. The entire firmware download and commit process takes approximately 17 minutes. If there
is a problem, wait for the timeout (30 minutes for network problems; 10 minutes for incorrect IP address).
Disrupting the process can render the switch inoperable and require you to seek help from Customer
Support.
Do not disconnect the switch from power during the process; the switch could become inoperable upon
reboot.
Use this procedure to upgrade firmware for the 4/8 SAN Switch, 4/16 SAN Switch, SAN Switch 2/8V,
SAN Switch 2/16V, SAN Switch 2/32, Brocade 4Gb SAN Switch for HP p-Class BladeSystem, and
SAN Switch 4/32:
1. Verify that the FTP service is running on the host server and that you have a user ID on that server.
Verify that the FTP service is running and unpack the compressed files preserving directory structures.
3. Use the firmwareShow command to check the current firmware version on connected switches.
Upgrade their firmware, if necessary, before upgrading this switch.
See ”Checking connected switches” on page 77.
4. Connect to the switch and log in as admin.
5. Use the firmwareShow command to check the current firmware version of the switch to verify
compatibility with the version of firmware you are going to download.
and store the file on the FTP server.
NOTE: For the SAN Switch 2/8V and SAN Switch 2/16V: If you are running Fabric OS 4.2.0
firmware, you cannot downgrade to earlier versions.
For the SAN Switch 2/32: If you are running Fabric OS 4.0.2 firmware, you cannot downgrade to
earlier versions.
80Maintaining configurations and firmware
6. Issue the firmwareDownload command.
7. At the Do you want to continue [y/n] prompt, enter y.
8. Respond to the prompts as follows:
Server
Name or IP
Address
Enter the name or IP address of the server where the firmware file is
stored, for example, 192.1.2.3. You can enter a server name if DNS is
enabled.
User nameEnter the user name of your account on the server, for example,
JohnDoe.
File nameSpecify the full path name of the firmware directory, appended by
release.plist, for example, /pub/v5.0.1/release.plist.
For version 4.x and 5.x switches only, do not attempt to locate the
release.plist file in the top level directory; there is a
release.plist file for each platform, and the correct one is selected.
PasswordEnter your account password for the server.
After the firmware is downloaded, the switch reboots and starts the firmware commit.
9. After the reboot, connect to the switch and log in again as admin.
10.If you want to watch the upgrade progress, issue the firmwareDownloadStatus command.
11.After the firmware commit finishes, issue the firmwareShow command to display the firmware level
for both partitions.
For example:
switch:admin> firmwaredownload
You can run firmwareDownloadStatus to get the status of this command.
This command will cause the switch to reset and will require that existing
telnet, secure telnet or SSH sessions be restarted.
Do you want to continue [Y]: y
Server Name or IP Address: 192.1.2.3
User Name: JohnDoe
File Name: /pub/v5.0.1/release.plist
Password: xxxxx
Firmwaredownload has started.
CAUTION: To successfully download firmware to a director you must have an active Ethernet connection
on both CPs.
Upgrading HP StorageWorks directors
You can download firmware to the Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director
without disrupting the overall fabric if the two CP blades are installed and fully synchronized. Use the
haShow command to confirm synchronization. If only one CP blade is powered on, the switch must
reboot to activate firmware, which is disruptive to the overall fabric.
If there is an error during the firmware download, the system ensures that the two partitions of a CP blade
contain the same version of firmware. However, the two CP blades might contain different versions of
firmware; in that event, repeat the firmware download process.
During the upgrade process, the director fails over to its standby CP blade and the IP addresses for the
two logical switches move to that CP blade's Ethernet port. This might cause informational ARP address
reassignment messages to appear on other switches in the fabric. This is normal behavior, because the
association between the IP addresses and MAC addresses has changed.
Summary of the upgrade process
The following summary describes the default behavior of the firmwareDownload command (without
options) on Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director:
1. Issue the firmwareDownload command on the active CP blade.
2. The standby CP blade downloads firmware.
3. The standby CP blade reboots and comes up with the new Fabric OS.
4. The active CP blade synchronizes its state with the standby CP blade.
5. The active CP blade forces a failover and reboots to become the standby CP blade.
6. The new standby CP blade (the active CP blade before the failover) downloads firmware.
7. The new standby CP blade reboots and comes up with the new Fabric OS.
8. The new active CP blade synchronizes its state with the new standby CP blade.
9. The firmwareCommit command runs on both CP blades.
82Maintaining configurations and firmware
NOTE: After you start the process, do not issue any disruptive commands (such as reboot) that will
interrupt the process. The entire firmware download and commit process takes approximately 15 minutes.
If there is a problem, wait for the timeout (30 minutes for network problems; 10 minutes for incorrect IP
address). Disrupting the process can render the switch inoperable and require you to seek help from
Customer Support.
Do not disconnect the switch from power during the process, because the switch could become inoperable
upon reboot.
Upgrading the Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director
Core Switch 2/64 directors have four IP addresses: one for each of the two logical switches (switch 0 and
switch 1) and one for each of the two CP blades (CP0 in slot 5 and CP1 in slot 6). The SAN Director
2/128 in its default configuration has three IP addresses, but can be configured for four. The 4/256 SAN
Director does not support two domains; hence, you can use only three IP addresses.
NOTE: By default, the firmwareDownload command upgrades both the active CP blade and the
standby CP blade. When upgrading a Core Switch 2/64 that is running 4.0.0c or earlier, you must
upgrade each CP blade separately, as described in ”Upgrading a single Core Switch 2/64 or SAN
Director 2/128 blade” on page 240. (Do not use the following procedure under normal circumstances.)
Follow this procedure to upgrade the firmware on Core Switch 2/64, SAN Director 2/128, and 4/256
SAN Director:
1. Verify that the FTP service is running on the host server and that you have a user ID on that server.
Verify that the FTP service is running and unpack the compressed files preserving directory structures.
3. Use the firmwareShow command to check the current firmware version on connected switches.
Upgrade the firmware, if necessary, before proceeding with upgrading this switch.
See ”Checking connected switches” on page 77.
4. Using a telnet session, connect to the switch and log in as admin.
5. For the Core Switch 2/64, use the firmwareShow command to check the current firmware version of
the switch.
6. Issue the haShow command to confirm that the two CP blades are synchronized.
CP blades must be synchronized and running Fabric OS 4.2.0 or later to provide a nondisruptive
download. If the two CP blades are not synchronized, and the current firmware version is 4.2.0 or later,
issue the haSyncStart command to synchronize the two CP blades. In the following example, the
active CP blade is CP1 and the standby is CP0:
switch:admin> hashow
Local CP (Slot 6, CP1): Active
Remote CP (Slot 5, CP0): Standby
HA Enabled, Heartbeat up, HA State is in Sync
switch:admin>
7. Log in to either of the logical switches (sw0 for the 4/256 SAN Director and SAN Director 2/128
configured with a single domain).
8. Issue the firmwareDownload command.
9. At the Do you want to continue [y/n] prompt, enter y.
Fabric OS 5.x administrator guide83
10.Respond to the prompts as follows:
Server
Name or IP
Address
Enter the name or IP address of the server where the firmware file is
stored, for example, 192.1.2.3. You can enter a server name if DNS is
enabled.
User nameEnter the user name of your account on the server, for example,
JohnDoe.
File nameSpecify the full path name of the firmware directory, appended by
release.plist, for example, /pub/v5.0.1/release.plist.
PasswordEnter your account password for the server.
The firmware is downloaded to one CP blade at a time, beginning with the standby CP blade. During
the process, the active CP blade is failed over. After the firmware is downloaded, a firmware commit
starts on both CP blades. The entire firmware download and commit process takes approximately 35
minutes.
11.Optional: After the failover, connect to the switch and log in again as admin.
12.Using a separate telnet session, issue the firmwareDownloadStatus command to monitor the
firmware download status.
13.Issue the firmwareShow command to display the new firmware versions.
For example:
switch:admin> firmwaredownload
This command will upgrade both CPs in the switch. If you
what to upgrade a single CP only, please use -s option.
You can run firmwareDownloadStatus to get the status
of this command.
This command will cause the active CP to reset and will
require that existing telnet, secure telnet, or SSH sessions
be restarted.
Do you want to continue [Y]: y
Server Name or IP Address: 192.1.2.3
User Name: JohnDoe
File Name: /pub/v5.0.1/release.plist
Password:*****
FirmwareDownload has started on Standby CP. It may take up to 30 minutes.
Firmwaredownload has completed successfully on Standby CP.
.
.
.
Standby CP reboots.
Standby CP booted up.
Standby CP booted up with new firmware.
cp1: Firmwarecommit has started on both Active and Standby CPs.
cp1: Firmwarecommit has completed successfully on Active CP.
cp1: Firmwaredownload command has completed successfully.
switch:admin>
84Maintaining configurations and firmware
Start a new session to view the upgrade progress:
switch:admin> firmwaredownloadstatus
[0]: Tue Apr 20 15:18:56 2003
cp0: Firmwaredownload has started on Standby CP. It may take up to 10 minutes.
[1]: Tue Apr 20 15:24:17 2003
cp0: Firmwaredownload has completed successfully on Standby CP.
[2]: Tue Apr 20 15:24:19 2003
cp0: Standby CP reboots.
[3]: Tue Apr 20 15:27:06 2003
cp0: Standby CP booted up.
[4]: Tue Apr 20 15:29:01 2003
cp1: Active CP forced failover succeeded. Now this CP becomes Active.
[5]: Tue Apr 20 15:29:05 2003
cp1: Firmwaredownload has started on Standby CP. It may take up to 30 minutes.
[6]: Tue Apr 20 15:34:16 2003
cp1: Firmwaredownload has completed successfully on Standby CP.
[7]: Tue Apr 20 15:34:19 2003
cp1: Standby CP reboots.
[8]: Tue Apr 20 15:36:59 2003
cp1: Standby CP booted up with new firmware.
[9]: Tue Apr 20 15:37:04 2003
cp1: Firmwarecommit has started on both Active and Standby CPs.
[10]: Tue Apr 20 15:42:48 2003
cp1: Firmwarecommit has completed successfully on Active CP.
[11]: Tue Apr 20 15:42:49 2003
cp1: Firmwaredownload command has completed successfully.
Troubleshooting firmware downloads
A firmware download can fail for many reasons, such as a power failure, a failed network connection, a
failed FTP server, or an incorrect path to unpacked firmware files. In most cases, the firmware is not
affected. You can make necessary corrections (for example, check the Ethernet cables and check the file
path names) and then rerun the firmwareDownload command.
NOTE: Under firmware versions earlier than 4.1.0, do not perform a firmware download while the
switch is running POST. If a firmware download is attempted on a Core Switch 2/64 while POST is
running, the download might fail because the CP blades cannot synchronize with each other.
Issue the firmwareShow command to see whether both CP blades have the same firmware. In the
following example, the active and standby CP blades have the same version:
Note: If Local CP and Remote CP have different versions
of firmware, please retry firmwaredownload command.
switch: admin>
Fabric OS 5.x administrator guide85
Decide which firmware version you want to be applied to each CP blade. If you want the version on the
standby CP, issue the haFailover command on the active CP. If you want the version from the active CP,
issue the firmwareDownload -s command on the standby CP. After entering the haFailover
command, you must issue the firmwareDownload -s command on the new standby CP.
86Maintaining configurations and firmware
5Configuring Core Switch 2/64, SAN Director
2/128, and 4/256 SAN Director
This chapter contains procedures that are specific to the Core Switch 2/64, SAN Director 2/128, and
4/256 SAN Director.
Because directors contain interchangeable 16-port blades (32-port blades in the 4/256 SAN Director),
their procedures differ from those for the 4/8 SAN Switch, 4/16 SAN Switch, SAN Switch 2/8V, SAN
Switch 2/16V, SAN Switch 2/32, Brocade 4Gb SAN Switch for HP p-Class BladeSystem, and SAN
Switch 4/32 fixed-port switches. For example, fixed-port models identify ports by domain,port number,
while director models identify ports by slot/port number.
Also, because the Core Switch 2/64 director comprises two logical switches (domains), and the SAN
Director 2/128 and 4/256 SAN Director in their default configurations have only one domain (the
4/256 SAN Director supports only one domain), procedures for the directors sometimes differ from one
another.
For detailed information about the Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director,
see the installation guide for the switch.
Identifying ports
The Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director have slots and can have a
variable number of ports within a given domain. Ports are identified by their combined slot number and
port number.
There are 10 slots that contain port blades:
• Slot 5 and 6 contain CP blades.
• Slot 1 through 4 and 7 through 10 contain port blades.
On each port blade, there are 16 or 32 ports (counted from the bottom, 0 to 15, or 0 to 31). A particular
port must be represented by both slot number (1 through 4 and 7 through 10) and port number (0 through
15).
When you have port blades with different port counts in the same director (for example, 16-port blade
and 32-port blades), the area IDs no longer match the port numbers. Following are the port numbering
schemes for the 4/256 SAN Director:
• For the FC4-16 port blade, ports are numbered from 0 through 15 from bottom to top.
• For the FC-32 port blade, ports are numbered from 0 through 15 from bottom to top on the left set of
ports and 16 through 31 from bottom to top on the right set of ports.
The Core Switch 2/64 is divided into two logical switches, where slots 1 through 4 constitute logical
switch 0 (sw0) and slots 7 through 10 constitute logical switch 1 (sw1). You must be connected to the
logical switch that represents the slot where you want to execute a command.
In the SAN Director 2/128 and 4/256 SAN Director default configuration, all the ports are part of a
single logical switch. With Fabric OS 4.4.0 and later, you can configure the SAN Director 2/128 as two
logical switches (domains).
The following sections tell how to identify ports on the Core Switch 2/64, SAN Director 2/128, and
4/256 SAN Director, and how to identify ports for zoning commands.
By slot and port number
The port number is assigned to an external port to give it a unique identifier in a switch.
To select a specific port in the Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director, you
must identify both the slot number and the port number using the format slot number/port number. No
spaces are allowed between the slot number, the slash (/), and the port number.
Fabric OS 5.x administrator guide87
The following example shows how to enable port 4 on a blade in slot 2:
switch:admin> portenable 2/4
By port area ID
Zoning commands require that you specify ports using the area ID method. In Fabric OS 4.0.0 and later,
each port on a particular domain is given a unique area ID. The relationship between the port number
and area ID depends upon the PID format used in the fabric:
• When Core PID format is in effect, the area ID for port 0 is 0, for port 1, it is 1, and so forth.
When using Core PID mode on the Core Switch 2/64 (two logical 64-port switches), 4/256 SAN
Director (one domain only), and the SAN Director 2/128 configured with two domains, the area IDs
for both logical switches (domains) range from 0 to 63. This means that both logical switch 0 and
logical switch 1 have a port that is referenced with area ID 0.
For 32-port blades in the 4/256 SAN Director (using FC4-32), the numbering is contiguous up to port
15; from port 16, the numbering is still contiguous, but you must add 128 to each port number. For
example, port 16 in slot 1 has a port number and area ID of 128; port number 15 has a port number
and area ID of 15.
• When Extended Edge PID format is in effect, the area ID is the port number plus 16 for ports 0 to 111.
For port numbers greater than 111, the area ID wraps around so that port 112 has an area ID of 0,
and so on. Each 64-port logical switch (domain) has area IDs ranging from 16 to 79. Port numbers
greater than 128 are mapped directly to the core PID.
For details about port area IDs in Extended Edge PID mode, see ”Changing to Extended Edge PID
format” on page 220.
• If you perform a port swap operation, the port number and area ID no longer match.
To determine the area ID of a particular port, issue the switchShow command. This command displays
all ports on the current (logical) switch and their corresponding area IDs.
Basic blade management
This section provides procedures for powering a port blade off and on and for disabling and enabling a
port blade.
Powering port blades off and on
Port blades are powered on by default.
Powering off a port blade
1. Connect to the switch and log in as admin.
2. Issue the slotPowerOff command with the slot number of the port blade you want to power off.
The slot must exist in the logical switch where you are logged in. For example:
switch:admin> slotpoweroff 3
Slot 3 is being powered off
switch:admin>
Providing power to a port blade
1. Connect to the switch and log in as admin.
2. Issue the slotPowerOn command with the slot number of the port blade you want to power on.
The slot must exist in the logical switch where you are logged in. For example:
switch:admin> slotpoweron 3
Powering on slot 3
switch:admin>
88Configuring Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director
Disabling and enabling port blades
Port blades are enabled by default.
You might need to disable a port blade to perform diagnostics. When diagnostics are executed manually
(from the Fabric OS command line), many commands require the port blade to be disabled. This ensures
that diagnostic activity does not interfere with normal fabric traffic.
Disabling a port blade
1. Connect to the switch and log in as admin.
2. Issue the slotOff command with the slot number of the port blade you want to disable.
For example:
switch:admin> slotoff 3
Slot 3 is being disabled
switch:admin>
Enabling a port blade
1. Connect to the switch and log in as admin.
2. Issue the slotOn command with the slot number of the port blade you want to enable.
For example:
switch:admin> sloton 3
Slot 3 is being enabled
switch:admin>
Conserving power
To conserve power and ensure that more critical components are the least affected by a power
fluctuation, you can power off components in a specified order, using the powerOffListSet command.
The available power is compared to the power demand to determine whether there is enough power to
operate. If there is less power available than the demand, the power-off list is processed until there is
enough power for operation. By default, the processing proceeds from slot 1 to the last slot in the chassis.
As power becomes available, slots are powered up in the reverse order.
NOTE: Some FRUs in the chassis may use significant power, yet they cannot be powered off through
software. For example, a missing blower FRU may change the power computation enough to affect how
many slots can be powered up.
The powerOffListShow command displays the power-off order.
Blade terminology and compatibility
Before configuring a chassis, familiarize yourself with the director CP blade and port blade nomenclature,
as well as the port blade compatibilities. Often in procedures, only the abbreviated names for CP and
port blades are used (for example, the FC4-16 blade). Table 15 provides CP and port blade abbreviations
and descriptions.
Fabric OS 5.x administrator guide89
Table 15 HP StorageWorks director terminology and abbreviations
TermAbbreviationBlade IDDefinition
Core Switch 2/64 CP blade CP11The first-generation CP blade provided with the Core
Switch 2/64. This CP supports 1- and 2-Gbit/sec port
speeds. It supports only the dual domain configuration
within the chassis.
SAN Director 2/128 CP bladeCP25The second-generation CP blade provided with the SAN
Director 2/128. This CP supports 1- and 2-Gbit/sec
port speeds. It supports both the dual domain and a
single domain configuration within the chassis.
4/256 SAN Director CP bladeCP416The second-generation CP blade provided with the
4/256 SAN Director. This CP supports 1-, 2-, and
4-Gbit/sec port speeds, as well as 16 and 32-port
blades.
16-port 2-Gbit/sec port blade FC-162The first-generation HP StorageWorks director 16-port
blade supporting 2-Gbit/sec port speeds. This port
blade is compatible only with the Core Switch 2/64 or
SAN Director 2/128 CP blades.
16-port 2-Gbit/sec port bladeFC2-164The second-generation HP StorageWorks director 16
port blade supporting 1- and 2-Gbit/sec port speeds.
This port blade is compatible only with the SAN Director
2/128 or 4/256 SAN Director CP blades.
16-port 4-Gbit/sec port bladeFC4-1617The third-generation HP StorageWorks director 16 port
blade supporting 1-, 2-, and 4-Gbit/sec port speeds.
This port blade is compatible only with the SAN Director
2/128 and 4/256 SAN Director CP blades. FC4-16
blades do not support private devices.
32-port 4-Gbit/sec port bladeFC4-3218A 32-port HP StorageWorks director port blade
supporting 1-, 2-, and 4-Gbit/sec port speeds.This port
blade is compatible only with the 4/256 SAN Director
CP blades. FC4-32 blades do not support private
devices.
CP blades
CP blades determine the director type:
• If CP1 blades are installed, the director is a Core Switch 2/64.
• If CP2 blades are installed, the director is a SAN Director 2/128.
• If CP4 blades are installed, the director is a 4/256 SAN Director.
HP recommends that each HP StorageWorks director have only one type of CP blade installed and that
each CP (primary and secondary partition) maintains the same firmware version.
90Configuring Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director
Port blade compatibility
Table 16 indicates which blades are supported for each HP StorageWorks director.
Table 16 Blades supported by each HP StorageWorks director
DirectorPort Blades
FC-16FC2-16FC4-16FC4-32
Core Switch 2/64
(CP1)
SAN Director
2/128 (CP2)
4/256 SAN
Director (CP4)
SupportedN/AN/AN/A
SupportedSupportedSupportedN/A
N/ASupportedSupportedSupported
Setting chassis configurations
The chassisConfig command allows you to set the chassis configuration for products that support both
single-switch (one domain) and dual-switch (two domains) operation.
Table 17 lists the supported configurations options for Fabric OS 5.x.
Table 17 Supported configuration options
OptionNumber of
domains
11128FC2-16, FC4-16CP2 or CP4CP4 fits all chassis
Maximum number
of ports per switch
Supported port
blades
Supported
CP blades
NotesResults
except the D2
chassis. Option 1
is the default
configuration for
the SAN Director
2/128.
One 128-port
switch (Blade
IDs 4, 17 on
slots 1–4, 7–10.
Blade ID 5 and
16 on slots 5, 6)
2264/64FC2-16CP2N/ATwo 64-port
switches (Blade
ID 4 on slots
1–4, 7–10.
Blade ID 5 on
slots 5, 6)
3264/64Left side: FC2-16
Right side: FC-16
CP2N/ATwo 64-port
switches (Blade
ID 4 on slots
1–4; ID 2 on
slots 7–10.
Blade ID 5 on
slots 5, 6)
except the D2
chassis. Option 5
is the default
configuration
option for 4/256
SAN Director.
The following sections contain procedures for obtaining chassis information and for configuring director
domains using the chassisConfig command.
Obtaining slot information
For a Core Switch 2/64 or SAN Director 2/128 configured as two logical switches, the chassis-wide
commands display or control both logical switches. In the default configuration, the SAN Director 2/128
and 4/256 SAN Director are configured as one logical switch, so the chassis-wide commands display
and control the single logical switch.
switches (Blade
ID 2 on slots
1–4; ID 4 on
slots 7–10.
Blade ID 5 on
slots 5, 6)
One 256-port
switch (Blade
IDs 4, 17, and
18 on slots 1–4,
7–10. Blade ID
16 on slots 5, 6)
Displaying the status of all slots in the chassis
1. Connect to the switch and log in as user or admin.
2. Issue the slotShow command to display the current status of each slot in the system.
The format of the display includes a header and four fields for each slot. The fields and their possible
values are:
FieldValue
SlotDisplays the physical slot number.
Blade TypeDisplays the blade type:
• SW BLADE: The blade is a switch.
• CP BLADE: The blade is a CP.
• UNKNOWN: The blade is not present or its type is not recognized.
IDDisplays the hardware ID of the blade type.
92Configuring Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director
FieldValue
StatusDisplays the status of the blade:
• VACANT: The slot is empty.
• INSERTED, NOT POWERED ON: The blade is present in the slot
but is turned off.
• DIAG RUNNING POST1: The blade is present, powered on, and
running the post-initialization POST.
• DIAG RUNNING POST2: The blade is present, powered on, and
running the POST.
• ENABLED: The blade is on and enabled.
• ENABLED (User Ports Disabled): The blade is on, but external ports
have been disabled with the bladeDisable command.
• DISABLED: The blade is powered on but disabled.
• FAULTY: The blade is faulty because an error was detected. The
reason code numbers displayed are for debugging purposes.
• UNKNOWN: The blade is inserted but its state cannot be determined.
Configuring a new SAN Director 2/128 with two domains
By factory default, the SAN Director 2/128 is configured as one 128-port switch (one domain). The
following procedure assumes that the new director:
• Has been installed and connected to power, but is not yet attached to the fabric.
• Has been given an IP address, but is otherwise running factory defaults. If this is not the case, back up
the current configuration before starting, so that you can restore it later if necessary.
• Is running Fabric OS 4.4.0 or later.
• Is running in configuration option one (one switch, FC2-16 cards installed).
Use the following procedure to add a factory-new SAN Director 2/128 to a fabric and configure it as
two 64-port switches (two domains).
1. Connect to the switch and log in as admin.
2. Issue the chassisconfig command without options to verify that the switch is configured with one
domain.
For example:
chassisconfig
Current Option: 1
3. Issue the chassisconfig command to configure two domains. Use the -f option to suppress
prompting for uploading the configuration.
This command reboots the system. For example:
chassisconfig -f 2
Current Option changed to 2
Restoring switch 0 configuration to factory defaults...
All account passwords have been successfully set to factory default.
Restoring switch 1 configuration to factory defaults...
All account passwords have been successfully set to factory default.
4. After the system reboots, log in again to the first logical switch (sw0) as admin.
Fabric OS 5.x administrator guide93
5. Use the configure command to configure the sw0 to match your fabric specifications.
If the director is to be merged into an existing fabric, do not configure zoning parameters; these are
propagated when you merge the director into the fabric.
6. Log in to the second logical switch (sw1) as admin.
7. Use the configure command to configure the sw1 to match your fabric specifications.
If the director is to be merged into an existing fabric, do not configure zoning parameters; these are
propagated when you merge the director into the fabric.
8. If the fabric is in secure mode, perform the following steps; otherwise, proceed to step 9.
(See the HP StorageWorks Secure Fabric OS administrator guide for specific instructions.)a. Optional: To configure sw0 and sw1 in one operation, connect them with an ISL link to form a
temporary fabric.
b. If you want sw0 and sw1 to be FCSs, update the overall fabric’s FCS policy to include them. If not,
skip this step.
c. On sw0, enable security mode and use the secModeEnable command to create an FCS list that
matches your overall fabric’s FCS policy.
d. Reset the version stamp on sw0.
e. If you connected sw0 and sw1 in step 8a and you do not want them connected, disconnect the ISL
link between them. If you did not connect them, repeat step 8b through step 8d on sw1.
9. Optional: Connect the new two-domain SAN Director 2/128 to the fabric.
10.Issue the fabricShow command to verify that sw0 and sw1 have been merged with the fabric.
11.Issue the cfgShow command to verify that zoning parameters were propagated.
Converting an installed SAN Director 2/128 to support two domains
Fabric OS versions earlier than 4.4.0 supported only one domain for SAN Director 2/128s (one
128-port logical switch). When you upgrade a SAN Director 2/128 to Fabric OS 4.4.0 or later, you can
use the chassisConfig command to specify two domains for the director (two 64-port logical switches,
sw0 and sw1). This conversion is for SAN Director 2/128s using configuration option one (one switch,
FC2-16 cards installed).
NOTE: This procedure restores most configuration parameters to factory defaults. After performing this
procedure, you must check the new configuration and reconfigure those parameters that you customized
in the old configuration.
During this procedure, power is reset and the CP blades are rebooted, so traffic on the fabric is disrupted.
If the fabric is in secure mode, enabling security on the new domains is a complicated task. Do not
convert existing core switches.
1. Connect to the switch and log in as admin.
2. If the director is already in a fabric, minimize disruption by removing the director from the fabric using
one of the following methods:
• Physically disconnect the director.
•Use the portCfgPersistentDisable command on all connected remote switches to
persistently disable their ports that are connected to the director, or remove ISLs that connect the
SAN Director 2/128 to the current fabric.
3. Issue the chassisConfig command to change the configuration from the default (one domain) to
two domains. The following command reboots the system:
chassisconfig 2
During the conversion, you are prompted to save the configuration of sw0. Follow the prompts to save
the configuration file.
94Configuring Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director
4. Issue the ipAddrSet command to set and confirm the IP address of sw1 (sw1 takes on a default that
must be corrected).
The IP address of sw0 is already set.
5. After the system reboots, log in again as admin to each logical switch and issue the switchName
command to assign a name to the new switch.
6. Using the configuration file saved in step 3 as a guide, manually reconfigure sw0 and sw1.
Do not configure zoning parameters; these are propagated when you merge the director into the
fabric.
7. If the fabric is in secure mode, perform the following steps; otherwise, proceed to step 8.
a. Optional: to configure sw0 and sw1 in one operation, connect them with an ISL link to form a
temporary fabric.
b. If you want sw0 and sw1 to be FCSs, update the overall fabric’s FCS policy to include them. If not,
skip this step.
c. On sw0, enable security mode and use the secModeEnable command to create an FCS list that
matches your overall fabric’s FCS policy.
d. Reset the version stamp on sw0.
e. If you connected sw0 and sw1 in step 7a and you do not want them connected, disconnect the ISL
link between them. If you did not connect them, repeat step 7b through step 7d on sw1.
8. If you physically disconnected the switch in step 2, reconnect it to the fabric.
If you used the portCfgPersistentDisable command in step 2, use the
portCfgPersistentEnable command to persistently enable all ports that connect the switch to
other switches in the fabric.
9. Issue the fabricShow command to verify that sw0 and sw1 have been merged with the fabric.
10.Issue the configShow command to verify that zoning parameters were propagated.
Setting the blade beacon mode
When beaconing mode is enabled, the port LEDs flash amber in a running pattern from port 0 through
port 15 and back again. The pattern continues until you turn beaconing mode off. Use the flashing LEDs
to locate a particular blade.
Setting the blade beacon mode on:
1. Connect to the switch and log in as admin.
2. Issue the bladeBeacon command:
bladebeacon slotnumber, mode
The slotnumber is the blade on which you want to enable beacon mode; this slot number must exist
on the logical switch. A mode value or 1 turns beaconing on, and 0 turns beaconing off. For example:
switch:admin> bladebeacon 3, 1
switch:admin>
Fabric OS 5.x administrator guide95
96Configuring Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director
6Routing traffic
This chapter describes HP StorageWorks switch routing features and procedures.
About data routing and routing policies
Data moves through a fabric from switch to switch and from storage to server along one or more paths
that make up a route. Routing policies determine the correct path for each frame of data.
CAUTION: For most configurations, the default routing policy is optimal, and provides the best
performance. Change the policy only if there is a performance issue that is of concern, or a particular
fabric configuration requires it.
The following routing policies are available to tune routing performance:
• Exchange-based routing: The choice of routing path is based on the source ID (SID), destination ID
(DID), and Fibre Channel originator exchange ID (OXID), optimizing path utilization for the best
performance. Thus, every exchange can take a different path through the fabric
• Device-based routing: The choice of routing path is based on the Fibre Channel addresses of the SID
and the DID, improving path utilization for better performance. Thus, the same route is always used
and the sequence of exchanges is guaranteed.
• Port-based routing: The choice of routing path is based only on the incoming port and the destination
domain. To optimize port-based routing, the Dynamic Load Sharing feature (DLS) can be enabled to
balance the load across the available output ports within a domain.
Device-based and exchange-based routing require the use of DLS; when these policies are in effect, you
cannot disable the DLS feature.
Using port-based routing, you can assign a static route, in which the path chosen for traffic never
changes. In contrast, device-based and exchange-based routing policies always employ dynamic path selection. Port-based routing is supported by all HP StorageWorks models (except the 4/256 SAN
Director using configuration option 5; see Table 17 on page 91).
Specifying the routing policy
The following routing policies are supported:
• Port-based path selection: The default on SAN Switch 2/8V, SAN Switch 2/16V, and SAN Switch
2/32, Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director (using configuration
options 1 through 4). These switches support the port-based policy only; you cannot change the
routing policy for these switches. The 4/8 SAN Switch, 4/16 SAN Switch, 4Gb SAN Switch for HP
p-Class BladeSystem, and SAN Switch 4/32 can also use port-based routing.
• Device-based path selection: Available on 4/8 SAN Switch, 4/16 SAN Switch, Brocade 4Gb SAN
Switch for HP p-Class BladeSystem, and SAN Switch 4/32, and 4/256 SAN Director (using
configuration option 5). If there are devices in your fabric that cannot accommodate out-of-order
exchanges, use the device-based policy. In FICON environments device-based routing is
recommended.
• Exchange-based path selection: The default on the 4/8 SAN Switch, 4/16 SAN Switch, Brocade 4Gb
SAN Switch for HP p-Class BladeSystem, and SAN Switch 4/32, and 4/256 SAN Director (using
configuration option 5).
See ”Configuring Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director” on page 87 for
details about 4/256 SAN Director configuration options.
You can use the aptPolicy command to display and specify a different routing policy. Note that if you
attempt to set the policy when the 4/256 SAN Director uses configuration options 1–4, an error message
is returned. See the HP StorageWorks Fabric OS 5.x command reference guide for details on the aptPolicy command.
Fabric OS 5.x administrator guide97
You must disable the switch before changing the routing policy, and reenable it afterward.
In the following example, the routing policy for a SAN Switch 4/32 is changed from exchange-based to
device-based:
switch:admin> aptpolicy
Current Policy: 3
3: Default Policy
1: Port Based Routing Policy
2: Device Based Routing Policy
3: Exchange Based Routing Policy
switch:admin> switchdisable
switch:admin> aptpolicy 2
Policy updated successfully.
switch:admin> switchenable
switch:admin> aptpolicy
Current Policy: 2
Assigning a static route
A static route can be assigned only when the active routing policy is port-based. When device-based or
exchange-based routing is active, you cannot assign static routes. Thus, the 4/256 SAN Director using
configuration option 5 does not support static routing.
To assign a static route, use the uRouteConfig command. To remove a static route, use the
uRouteRemove command.
NOTE: For the SAN Switch 2/32, Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director
(using configuration options 1 through 4):
When you issue the uRouteConfig command, two similar warning messages might be displayed if a
platform conflict occurs. The first message is displayed when the static routing feature detects the conflict.
The second message is displayed when the DLS feature detects the condition as it tries to rebalance the
route.
A platform conflict occurs if a static route was configured with a destination port that is currently down.
The static route is ignored in this case, in favor of a normal dynamic route. When the configured
destination port comes back up, the system attempts to reestablish the static route, potentially causing a
conflict.
Specifying frame order delivery
The order of delivery of frames is maintained within a switch and determined by the routing policy in
effect. Following are the frame delivery behaviors for each routing policy.
• Port-based routing: All frames received on an ingress port destined for a destination domain are
guaranteed to exit the switch in the same order in which they were received.
• Device-based routing: All frames received on an ingress port between the same two fabric devices are
guaranteed to exit the switch in the same order in which they were received. This policy maintains the
order of frames across exchanges between the fabric devices as well.
• Exchange-based routing: All frames received on an ingress port for a given exchange are guaranteed
to exit the switch in the same order in which they were received. Because different paths are chosen
for different exchanges, this policy does not maintain the order of frames across exchanges.
If even one switch in the fabric delivers out-of-order exchanges, exchanges are then delivered to the target
out-of-order, regardless of the policy configured on other switches in the fabric.
98Routing traffic
In a stable fabric, frames are always delivered in order, even when the traffic between switches is shared
among multiple paths. However, when topology changes occur in the fabric (for example, if a link goes
down), traffic is rerouted around the failure, and some frames could be delivered out of order. Most
destination devices tolerate out-of-order delivery, but some do not.
By default, out-of-order frame-based delivery is allowed to minimize the number of frames dropped. Force
in-order frame delivery only across topology changes if the fabric contains destination devices that cannot
tolerate occasional out-of-order frame delivery.
Forcing in-order frame delivery across topology changes
1. Connect to the switch and log in as admin.
2. Issue the iodSet command.
NOTE: This command can cause a delay in the establishment of a new path when a topology change
occurs; use it with care.
Restoring out-of-order frame delivery across topology changes
1. Connect to the switch and log in as admin.
2. Issue the iodReset command.
Using DLS
The device-based and exchange-based routing policies depend on the Fabric OS DLS feature for dynamic
routing path selection. When these policies are in force, DLS is by default enabled and cannot be
disabled.
When the port-based policy is in force, you can enable DLS to optimize routing. When DLS is enabled, it
shares traffic among multiple equivalent paths between switches. DLS recomputes load sharing when a
switch boots up, each time an E_Port goes offline and online, or when an Fx_Port goes offline.
Checking and setting DLS
1. Connect to the switch and log in as admin.
2. Issue the dlsShow command to view the current DLS setting.
One of the following messages appears:
• DLS is set, which indicates that DLS is turned on.
• DLS is not set, which indicates that DLS is turned off.
3. Issue the dlsSet command to enable DLS or issue the dlsReset command to disable it.
You cannot disable DLS when device-based or exchange-based routing policies are in effect.
For example:
switch:admin> dlsshow
DLS is not set
switch:admin> dlsset
switch:admin> dlsshow
DLS is set
switch:admin> dlsreset
switch:admin> dlsshow
DLS is not set
Fabric OS 5.x administrator guide99
Viewing routing path information
The topologyShow and uRouteShow commands provide information about the routing path.
1. Connect to the switch and log in as admin.
2. Issue the topologyShow command to display the fabric topology, as it appears to the local switch.
The following entries appear:
Local Domain IDDomain number of the local switch
DomainDomain number of the destination switch
MetricCost of reaching the destination domain
NameThe name of the destination switch
Path CountThe number of currently active paths to the destination domain
HopsThe maximum number of hops to reach the destination domain.
Out PortThe Port to which the incoming frame will be forwarded in order
to reach the destination domain
In PortsInput ports that use the corresponding Out Port to reach the
destination domain
Total BandwidthThe maximum bandwidth of the out port
Bandwidth Demand The maximum bandwidth demand of the in ports
FlagsAlways D, indicating a dynamic path
For example:
switch:admin> topologyshow
2 domains in the fabric; Local Domain ID: 1
Domain: 6
Metric: 500
Name: switch
Path Count: 4
Hops: 1
Out Port: 60
In Ports: None
Total Bandwidth: 2 Gbps
Bandwidth Demand: 0%
Flags: D
Hops: 1
Out Port: 61
In Ports: None
Total Bandwidth: 2 Gbps
Bandwidth Demand: 0%
Flags: D
Hops: 1
Out Port: 62
In Ports: None
Total Bandwidth: 2 Gbps
Bandwidth Demand: 0%
Flags: D
Hops: 1
Out Port: 58
In Ports: None
Total Bandwidth: 2 Gbps
Bandwidth Demand: 0%
Flags: D
100 Routing traffic
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.