background image

Brocade Network Advisor SAN User Manual

321

53-1002696-01 

SMI Agent Configuration Tool

11

Configuring the CIMOM Bind Network Address

NOTE

You must have SAN - SMI Operation Read and Write privileges to view or make changes on the 
CIMOM tab. For more information about privileges, refer to 

“User Privileges”

 on page 1097.

To configure the network bind address, complete the following steps.

1. Click the CIMOM tab.

2. Select a network address from the IP Configuration Bind Network Address list to which you 

want to bind the CIMOM server.

The default network address is the host system name. 

3. Click Apply.

NOTE

Changes on this tab take effect after the next CIMOM server restart.

NOTE

You can only restart the server using the Server Management Console (Start > Programs > 

Management_Application_Name

 12.X.X > Server Management Console).

4. Click Close to close the SMIA Configuration Tool dialog box.

Configuring the CIMOM log

NOTE

You must have SAN - SMI Operation Read and Write privileges to view or make changes on the 
CIMOM tab. For more information about privileges, refer to 

“User Privileges”

 on page 1097.

To configure the CIMOM log, complete the following steps.

1. Click the CIMOM tab.

2. Select a log category from the Log Level list to start logging support data for the server.

Options include the following:

Off—select to turn off logging support data.

Severe—select to only log support data that indicates serious failures which prevent 
normal program operation.

Warning—select to only log support data that indicates a potential problem.

Info (default)—select to only log support data for informational messages.

Config—select to only log support data for static configuration messages used to assist in 
debugging problems associated with particular configurations.

Fine—select to only log message data used to provide trace information.

Finer—select to only log message data used to provide detailed trace information.

Finest—select to only log message data used to provide highly detailed trace information.

All—select to log support data for all messages.

Summary of Contents for Network Advisor 12.0.0

Page 1: ...53 1002696 01 17 December 2012 Brocade Network Advisor SAN User Manual Supporting Network Advisor 12 0 0...

Page 2: ...ource software is included in Brocade products view the licensing terms applicable to the open source software and obtain a copy of the programming source code please visit http www brocade com suppor...

Page 3: ...hnical help xlv Document feedback xlvi Chapter 1 Getting Started User interface components 1 Management server and client 3 Logging into a server 3 Launching a remote client 4 Clearing previous versio...

Page 4: ...ches 40 Backbone Chassis discovery requirements 40 Discovering fabrics 41 Editing the password for multiple devices 45 Configuring SNMP credentials 46 Reverting to a default SNMP community string 47 R...

Page 5: ...ring a previously discovered VM manager 71 Deleting a VM manager from discovery 72 Viewing the VM manager discovery state 72 Troubleshooting VM manager discovery 73 Chapter 5 Application Configuration...

Page 6: ...ty 102 Configuring the login banner display 102 Disabling the login banner 103 Syslog Registration settings 103 Registering a server as a Syslog recipient automatically 103 Configuring the Syslog list...

Page 7: ...unt 146 Deleting a user account 146 Unlocking a user account 146 Roles 147 Creating a new role 147 Editing a role 148 Copying a role 148 Deleting a role 149 Adding privileges to a role 149 Removing pr...

Page 8: ...178 Editing the HP LAN Call Home center 179 Enabling a Call Home center 180 Enabling supportSave 180 Testing the Call Home center connection 181 Disabling a Call Home center 181 Viewing Call Home stat...

Page 9: ...monitor 207 Top Port CRC Errors monitor 208 Top Port Encode Error Out monitor 209 Top Port Errors monitor 210 Top Port Link Failures monitor 211 Top Port Link Resets monitor 212 Top Port Sync Losses...

Page 10: ...he Connectivity Map 253 Exporting the topology 253 Customizing application tables 253 SAN Product List customization 257 Adding a property label 257 Editing a property label 257 Deleting a property la...

Page 11: ...279 Entering the server IP address of a tool 280 Adding an option to the Tools menu 280 Changing an option on the Tools menu 282 Removing an option from the Tools menu 282 Adding an option to a devic...

Page 12: ...data aging interval 309 SMI Agent Configuration Tool 310 Launching the SMIA configuration tool on Windows 310 Launching the SMIA configuration tool on Unix 312 Launching a remote SMIA configuration t...

Page 13: ...g inactive iSCSI devices 365 Determining port status 365 Viewing port optics 365 Port commissioning overview 367 Viewing existing CIMOM servers 368 Registering a CIMOM server 369 Editing CIMOM server...

Page 14: ...HBA from a Host 392 Exporting Host port mapping 392 Chapter 14 Storage Port Mapping In this chapter 395 Storage port mapping overview 395 Creating a storage array 396 Adding storage ports to a storage...

Page 15: ...WNs on attached AG ports 425 Role based access control 427 Host adapter management privileges 427 Host adapter administrator privileges 427 Host performance management 428 Host security authentication...

Page 16: ...5 Creating a DCB map 455 Editing a DCB map 457 Deleting a DCB map 458 Assigning a DCB map to a port or link aggregation group 458 Creating a Traffic Class map 459 Editing a Traffic Class map 459 Delet...

Page 17: ...the FCoE login management feature on a switch 484 Virtual FCoE port configuration 485 Viewing virtual FCoE ports 485 Clearing a stale entry 486 Chapter 17 Security Management Layer 2 access control li...

Page 18: ...Center features 526 Encryption user privileges 527 Smart card usage 528 Using authentication cards with a card reader 528 Registering authentication cards from a card reader 529 Registering authentica...

Page 19: ...KM557 Downloading the local CA certificate from ESKM SKM 558 Creating and installing the ESKM SKM server certificate 559 Enabling SSL on the Key Management System KMS Server560 Creating an ESKM SKM Hi...

Page 20: ...rity TEKA 613 Configuring key vault settings for IBM Tivoli Key Lifetime Manager TKLM 619 Configuring key vault settings for Key Management Interoperability Protocol KMIP 623 Understanding configurati...

Page 21: ...g a new master key 678 Security Settings 679 Zeroizing an encryption engine 679 Setting zeroization 680 Using the Encryption Targets dialog box 681 Redirection zones 682 Disk device decommissioning 68...

Page 22: ...bling or disabling the default zone for fabrics 723 Creating a zone alias 724 Editing a zone alias 725 Removing an object from a zone alias 725 Exporting zone aliases 726 Renaming a zone alias 726 Del...

Page 23: ...isabling failover on a Traffic Isolation zone 747 Boot LUN zones 748 Creating a Boot LUN zone 748 Modifying a Boot LUN zone 749 Deleting a Boot LUN zone 749 Zoning administration 749 Comparing zone da...

Page 24: ...used 771 Open systems tape pipelining 772 FCIP Fastwrite and Tape Acceleration 772 FICON emulation features 773 IBM z OS Global Mirror z Gm emulation 773 Tape write pipelining 774 Tape read pipelinin...

Page 25: ...fabric binding 801 Disabling fabric binding 802 Adding switches to the fabric binding membership list 803 Adding detached devices to the fabric binding membership list 803 Removing switches from fabri...

Page 26: ...figurations 831 Configuring FICON display 832 Configuring an Allow Prohibit Matrix 832 Configuring an Allow Prohibit Matrix manually 834 Saving or Copying Allow Prohibit Matrix configurations to anoth...

Page 27: ...roperties 864 Deleting port VLANs from products 864 Deploying VLAN configurations 865 Spanning Tree Protocol configuration 865 Configuring STP or RSTP on a port VLAN 866 Deploying an STP configuration...

Page 28: ...rmance collection SAN wide 908 Enabling historical performance collection for selected fabrics 908 Disabling historical performance collection 909 Generating and saving a historical performance graph...

Page 29: ...ization 935 Changing connection utilization 936 Chapter 30 Frame Monitor Frame Monitor 943 Frame types 943 Frame Monitoring requirements 945 Creating a custom frame monitor 945 Editing a frame monitor...

Page 30: ...he Management application 987 Trap customization 988 SNMP informs 991 Enabling or disabling SNMP informs 991 Syslogs 991 Adding a syslog recipient 992 Removing a syslog recipient 993 Syslog forwarding...

Page 31: ...an existing definition 1027 Editing a report definition 1028 Deleting a report definition 1028 Event custom report schedules 1029 Adding or editing an event report schedule 1029 Event logs 1032 Viewi...

Page 32: ...1051 Saving the upload failure data capture repository 1052 Chapter 34 Reports In this chapter 1053 SAN report types 1053 Generating SAN reports 1054 Viewing SAN reports 1054 Exporting SAN reports 105...

Page 33: ...xpressions Chapter G Troubleshooting Application Configuration Wizard troubleshooting 1140 Browser troubleshooting 1140 Client troubleshooting 1141 Fabric tracking troubleshooting 1141 FICON troublesh...

Page 34: ...EV_PORT_GIGE_PORT_LINK_INFO 1373 DEV_PORT_MAC_ADDR_MAP_INFO 1373 ETHERNET_ISL_INFO 1373 EVENT_DETAILS_INFO 1374 EVENT_INFO 1375 FABRIC_INFO 1376 FCIP_TUNNEL_CIRCUIT_INFO 1376 FCIP_TUNNEL_INFO 1377 FCO...

Page 35: ...OE_PORT_INFO 1411 VIRTUAL_PORT_WWN_DETAILS_INFO 1412 VM_ADDRESS_INFO 1413 VM_CONNECTIVITY_INFO 1413 VM_DATASTORE_DETAILS_INFO 1416 VM_EE_MONITOR_INFO 1416 VM_HOST_INFO 1417 VM_LUN_INFO 1417 VM_STATIST...

Page 36: ...xxxvi Brocade Network Advisor SAN User Manual 53 1002696 01...

Page 37: ...atches Chapter 4 Discovery describes how to discover SANs and hosts Chapter 5 Application Configuration provides Management application configuration instructions Chapter 6 User Account Management pro...

Page 38: ...s Chapter 27 Deployment Manager provides information about how to view deploy and manage deployment configurations Chapter 28 Fibre Channel Troubleshooting provides troubleshooting details for Fibre C...

Page 39: ...supported by Brocade Communications Systems Inc for Network Advisor 12 0 X documenting all possible configurations and scenarios is beyond the scope of this document Fabric OS hardware and software su...

Page 40: ...Embedded 16 port 8 Gbps Switch Brocade 5460 embedded switch Embedded 24 port 8 Gbps Switch Brocade 5470 embedded switch Embedded 24 port 8 Gbps Switch Brocade 5480 embedded switch Embedded 24 port 8 G...

Page 41: ...FC10 6 Blades 8 slot Backbone Chassis with FC 10 6 ISL Blade Fabric OS v6 2 0 Brocade DCX 1 2 with FS8 18 Blades 8 slot Backbone Chassis with Encryption Blade Fabric OS v6 1 1_enc or later Brocade DC...

Page 42: ...FC 8 GB 48 port Blade FC8 64 Blade FC 8 GB 64 port Blade FC10 6 Blade FC 10 6 ISL Blade FC8 32E blade3 8 Gbps 32 port blade Fabric OS v7 0 1 or later FC8 48E blade3 8 Gbps 48 port blade Fabric OS v7...

Page 43: ...DATA TIME_SERIES_DATA_1DAY TIME_SERIES_DATA_2HOUR TIME_SERIES_DATA_30MIN POLICY_RULE POLICY_RULE_MAP RULE_LOGICAL_EXPRESSION_MAP CONFIG_BLOCK CONFIG_CONDITION RULE_BLOCK_MAP RULE_CONDITION_MAP USER_RE...

Page 44: ...anged Dashboard Firmware Management Client and server ports Status bar Login Performance Dashboard vCenter Enhancements Host Management vNetwork Connectivity Host Management Event Action Wizard enhanc...

Page 45: ...syntax examples For readability command names in the narrative portions of this guide are presented in mixed lettercase for example switchShow In actual examples command lettercase is all lowercase No...

Page 46: ...r at no cost for a user ID and password White papers online demonstrations and data sheets are available through the Brocade website at http www brocade com products solutions products index page For...

Page 47: ...n the Management application serial number select Help License The License dialog box displays 2 General Information Switch model Switch operating system version Error numbers and messages received su...

Page 48: ...e WWN from the same place as the serial number except for the Brocade DCX For the Brocade DCX access the numbers on the WWN cards by removing the Brocade logo plate at the top of the nonport side of t...

Page 49: ...The Management application provides easy centralized management of the network as well as quick access to all product configuration applications Using this application you can configure manage and mon...

Page 50: ...on which tab SAN or Dashboard you select For a list of available commands refer to SAN main toolbar on page 239 or Dashboard toolbar on page 191 3 Tabs Provides quick access to the following views Das...

Page 51: ...log into a server complete the following steps 1 Double click the desktop icon or open the application from the Start menu The Log In dialog box displays Figure 2 FIGURE 2 Log In dialog box 2 Log int...

Page 52: ...on web start link The Log In dialog box displays 3 Log into another server by entering the IP address to the other server in the Network Address field NOTE The server must be the exact same version ed...

Page 53: ...5 Click OK on the Java Control Panel dialog box To create a remote client link in the Start menu refer to Launching a remote client on page 4 Launching the Configuration Wizard You can re launch the C...

Page 54: ...FTP SCP or SFTP server on page 127 b Click Next If port 21 or 22 is busy a message displays Click OK to close the message and continue Once the Management application is configured make sure port 21 o...

Page 55: ...er If you select a specific IP address from the Server IP Configuration screen and the selected IP address changes you will not be able to connect to the server To change the IP address refer to Confi...

Page 56: ...ation screen and edit the syslog port number return to step 6a Click Yes to close the message and continue with step 7 If you enter a port number already in use a Warning displays next to the associat...

Page 57: ...logy Map while data is loading Viewing active sessions To view the Management application active sessions complete the following steps 1 Select Server Active Sessions The Active Sessions dialog box di...

Page 58: ...ess at Disconnected_Date_and_Time 5 Click Close When you disconnect a client from using the Active Sessions dialog box the following event displays in the Master Log Disconnect Client User_Name IP_Add...

Page 59: ...k the port status icon The Port Status dialog box displays Java VM Vendor The Java Virtual Machine vendor Java VM Version The Java Virtual Machine version running on the server Server Name The server...

Page 60: ...ement applciation server If multiple processes occupy the same port the process names display in a comma separated list Recommended Actions Suggested action to take to resolve the issues 3 Click Close...

Page 61: ...er client to product Server Product Client Product Yes 252 SMTP Server port TCP SMTP Server port for e mail communication if you use e mail notifications without SSL Server SMTP Server Yes 492 TACACS...

Page 62: ...anaged Host Server Yes 6362 LDAP Authentication SSL port TCP LDAP server port for authentication if you use LDAP as an external authentication and SSL is enabled Server LDAP Server Yes 18122 RADIUS Au...

Page 63: ...Used for HBA management Managed Host Server Yes 246071 2 HCM Proxy CIM Indication Listener port TCP Used for HBA management Managed Host Server Yes 246082 Reserved for future use TCP Not used Client S...

Page 64: ...port TCP Used for HBA management via JSON Server Managed Host Yes 555561 Launch in Context LIC client hand shaking port TCP Client port used to check if a Management application client opened using LI...

Page 65: ...on components that change when you set the look and feel as well as those components that do not change 1 Select Server Options The Options dialog box displays Internet Explorer SHIFT F2 Master Log F5...

Page 66: ...il after you restart the client Changing the font size The Options dialog box enables you to change the font size for all components including the Connectivity map of the Management application interf...

Page 67: ...IP_address or localhost in the Host field 4 Enter the port number default is 5432 on which the PostgreSQL server is running in the Port field 5 Enter your username default is dcmuser in the Username f...

Page 68: ...ns 32 bit OS Select Start Settings Control Panel Administrative Tools Data Sources ODBC 62 bit OS Windows only Select Start Run type windir SysWOW64 odbcad32 exe and press Enter The ODBC Data Source A...

Page 69: ...on the Linux version Installing the ODBC driver on Linux systems To install the ODBC driver and complete the following steps 1 Execute the following command in the terminal su chmod 777 edb_psqlodbc...

Page 70: ...sure that the driver path information is correct After you install the PostgreSQL ODBC driver the odbcinst ini should automatically update the driver path If the direver path is not updated add the f...

Page 71: ...dbsql script in the Install_Home bin directory 2 Execute your query from the command window 3 Close the command window Changing the database user password To change the read write or read only databas...

Page 72: ...e open source software third party software products used in this release TABLE 7 Open source software third party software products Open Source Software License Type 7 ZipLZMASDK 4 65 public domain A...

Page 73: ...ry DNSJava 2 0 7 BeanShell Software License dom4j 1 6 1 dom4j License EnterpriseDTFTP 1 5 6 LGPL GlazedLists 1 8 0 LGPL or MPL GoogleGuice 1 0 Apache HPInsightSoftwareVCEMWebClientSDK 6 2 HP SOFTWARE...

Page 74: ...nse v2 0 OpenSAML 2 3 0 Apache License v2 0 OpenSSLforLinux 1 0 0a OpenSSL License PostgreSQL 9 2 1 PostgreSQL License QualityFirstLibrary 0 99 0 Mozilla License V1 1 and qflib License Quartz Enterpri...

Page 75: ...S 5 1 or later to modify Requires Fabric OS 5 3 or later for FCIP tunnels Requires FCIP license Requires Fabric OS 6 0 or later to enable the FICON Emulation tab on the FCIP Tunnel Advanced Settings d...

Page 76: ...bric OS 6 0 and later for AD LDAP Server Configuration Requires Fabric OS 5 0 and later for RADIUS Server Configuration Technical Support Data Collection Requires Fabric OS 5 2 or later Troubleshootin...

Page 77: ...tional features that you receive as part of the license Managed count The Management application audits and verifies the managed count against the maximum limit for your license under the following co...

Page 78: ...switches are not counted Entering the license key A license key is required to run the Management application The license key specifies the expiration date of a trial license as well as the number of...

Page 79: ...orts a maximum of 2 560 ports and 36 fabrics Only fabrics and devices discovered from the SAN tab are counted Maximum Limit The number of licensed ports or products allowed 4 Click OK to set the new l...

Page 80: ...next time you log in 7 Click Login 8 Click OK on the Login Banner NOTE When you launch the Management application or navigate to a new view the SAN tab displays with a gray screen over the Product Lis...

Page 81: ...uirements for all downgrade options To downgrade the edition complete the following steps 1 Select Help License The License dialog box displays 2 Browse to the license key file xml in the License Key...

Page 82: ...34 Brocade Network Advisor SAN User Manual 53 1002696 01 License downgrade 2...

Page 83: ...e Server Console b Click the Services tab c Click Stop to stop all services NOTE If you perform patch upgrade while services are running an error message displays 2 Go to the bin directory Install_Hom...

Page 84: ...About in the main window 6 Start all services by completing the following steps a Launch the Server Console b Click the Services tab c Click Start to start all services Uninstalling a patch Note that...

Page 85: ...ted patch for example if you are reverting from patch F to patch C then patch version c If the previous version is the initial version no patches change the patch version value to none for example pat...

Page 86: ...38 Brocade Network Advisor SAN User Manual 53 1002696 01 Uninstalling a patch 3...

Page 87: ...s not supported For a Fabric OS fabric the seed switch must be the primary Fabric Configuration Server FCS If you use a non primary FCS to discover the fabric the Management application displays an er...

Page 88: ...e primary FCS Switch NOTE Switches running in Access Gateway mode cannot be used as the seed switch NOTE The Backbone Chassis cannot be used as seed switch to discover and manage edge fabrics You must...

Page 89: ...Fabrics The Discover Fabrics dialog box displays FIGURE 7 Discover Fabrics dialog box 2 Click Add to specify the IP addresses of the devices you want to discover The Add Fabric Discovery dialog box d...

Page 90: ...the Management server uses the preferred address If a product does not have the preferred address type the Management server uses the other IP type For seed switch requirements refer to Seed switch re...

Page 91: ...about configuring permissions on a Fabric OS device refer to the Fabric OS Administrator s Guide 5 Fabric OS devices only Enter the user ID and password for the switch in the User ID and Password fiel...

Page 92: ...e or Custom h If you selected Custom enter the community string in the Custom and Confirm Custom fields Go to step 7 i If you are configuring a 256 port director select the Configure for 256 Port_Dire...

Page 93: ...assword for the switch in the Password field 6 Click OK on the Fabric_Name Edit Switches dialog box The Credential Update Status dialog box displays This dialog box displays the status of the change o...

Page 94: ...step 12 To discover a Virtual Fabric device you must configure SNMPv3 and your SNMP v3 user account must be defined as a Fabric OS switch user 8 Specify the Read option by selecting Default public or...

Page 95: ...cs dialog box Reverting to a default SNMP community string To revert to the default SNMP parameters complete the following steps 1 Select Discover Fabrics The Discover Fabrics dialog box displays 2 Se...

Page 96: ...ted fabric displays in the Previously Discovered Addresses table 5 Click Close on the Discover Fabrics dialog box Rediscovering a previously discovered fabric To return a fabric to active discovery co...

Page 97: ...samples of actual status messages Discovered Seed Switch Not registered for SNMP Traps Discovered Seed Switch Not Manageable Not registered for SNMP Traps Discovered Current seed switch is not recomme...

Page 98: ...network size If you are at the maximum network size for your license contact your preferred network provider To change the size of your network complete the following steps 1 Select Server Options The...

Page 99: ...background Managed counts that are within the grace count limit display with a pale yellow background 2 Click OK on the message The Discover Fabrics dialog box displays 3 Select one or more switches t...

Page 100: ...account has the Chassis Admin role on the Fabric OS device At the time of discovery or refresh the SNMP v3 user account does not have access to all possible logical switches access to all possible Fa...

Page 101: ...nt from the fabric and all associated devices Does not perform any scheduled or on demand operations other than monitor on the fabric and all associated devices Removes the fabric and all associated d...

Page 102: ...an unmonitored switch you cannot discover it separately until you accept changes in the original fabric If you unmonitor a switch in Access Gateway mode that switch is unmonitored from all fabrics in...

Page 103: ...ccess 4 Click Close on the Unmonitor Status dialog box 5 Click Close on the Discover Fabrics dialog box Resume monitoring of discovered fabrics NOTE Monitoring is not supported on Hosts To monitor a f...

Page 104: ...re switches join the fabric or if the switch firmware is changed on any of the switches in the fabric the Management application checks to make sure that the seed switch is still running a supported v...

Page 105: ...c then you lose connection to the seed switch Seed switch requirements The seed switch must be running Fabric OS 5 0 or later For a complete list of all supported Fabric OS hardware refer to Supported...

Page 106: ...ns or merges with a fabric and fabric tracking is active you must accept changes to the fabric before the new devices display in the Seed Switch dialog box For more information about fabric tracking r...

Page 107: ...om discovered fabrics or VM managers NOTE Host discovery requires HCM Agent 2 0 or later NOTE SMI and WMI discovery are not supported Discovering Hosts by Network address or host name To discover a Ho...

Page 108: ...ls select the CIM server ESXi only option Continue with step 8 If you do not need to configure Host credentials skip to step 13 8 Configure discovery authentication by choosing one of the following op...

Page 109: ...eopen the Discover Host Adapters dialog box 14 Click Close on the Discover Host Adapters dialog box Importing Hosts from a CSV file To discover Hosts by importing a CSV file complete the following ste...

Page 110: ...llowing options To configure discovery with authentication select the HTTPS from the Protocol list To configure discovery without authentication select the HTTP from the Protocol list 10 Enter the por...

Page 111: ...entials select the HCM agent option Go to step 9 To configure CIM server credentials select the CIM server ESXi only option Continue with step 8 If you do not need to configure Host credentials skip t...

Page 112: ...steps 1 Select Discover Host Adapters The Discover Host Adapters dialog box displays 2 Click Add The Add Host Adapters dialog box displays FIGURE 16 Add Host Adapters dialog box 3 Enter a discovery re...

Page 113: ...ld blank for the CIM server 12 Click OK on the Add Host Adapters dialog box If an error occurs a message displays Click OK to close the error message and fix the problem A Host Group displays in Disco...

Page 114: ...r want the Management application to discover and monitor a specific host you can delete it from active discovery Deleting a host also deletes the host data on the server both system collected and use...

Page 115: ...ry status of a device complete the following steps 1 Select Discover Host Adapters The Discover Host Adapters dialog box displays 2 Right click the Hosts node select Expand All to show all devices The...

Page 116: ...y that firewall port 34568 is open There are firewall issues with the HCM Agent on Windows 2008 and VMware systems When installing the driver package on these systems open TCP IP port 34568 to allow a...

Page 117: ...og box 3 Enter the IP address or host name in the Network Address field 4 Enter the VM manager port number in the Port field 5 Enter the VM manager username in the User ID field 6 Enter the VM manager...

Page 118: ...ver VM Managers The Discover VM Managers dialog box displays 2 Select the Host in the Discovered VM Managers list and click Edit The Edit VM Manager dialog box displays FIGURE 20 Edit VM Manager dialo...

Page 119: ...on to discover and monitor a specific VM manager you can delete it from active discovery Deleting a VM manager also deletes the data on the server both system collected and user defined data except fo...

Page 120: ...irmation message 5 Click Close on the Discover VM Managers dialog box Viewing the VM manager discovery state The Management application enables you to view device discovery status through the Discover...

Page 121: ...covery problems complete the following checklist to ensure that discovery was set up correctly 1 Verify IP connectivity by issuing a ping command to the switch a Open the command prompt b From the Ser...

Page 122: ...74 Brocade Network Advisor SAN User Manual 53 1002696 01 VM Manager discovery 4...

Page 123: ...ure the maximum number of historical events saved to the repository as well as the retention period for the events For more information refer to Event storage settings on page 88 Flyovers Use to custo...

Page 124: ...istration Use to automatically register the server as the trap recipient on products If SAN products have Informs enabled the registration is for the Informs For more information refer to SNMP Trap Re...

Page 125: ...on progress files Director Switch firmware files FAF files Switch technical supportSave and Switch backup files and miscellaneous files Backup conf contains the Management application configuration fi...

Page 126: ...Configuring backup To configure backup complete the following steps 1 Select Server Options The Options dialog box displays 2 Select Server Backup in the Category list The Server Backup pane displays...

Page 127: ...y files for the network drive NOTE The Management application should not directly access local or network resources through mapped drive letters When the Management application must access a remote re...

Page 128: ...e or writable CD if the device does not exist or is not writable an error message displays that says you have entered an invalid device For back up to a network drive if the device does not exist or y...

Page 129: ...Do NOT modify the backup properties file To change the backup interval complete the following steps 1 Select Server Options The Options dialog box displays 2 Select Server Backup in the Category list...

Page 130: ...list 3 Click Backup Now Click Yes on the confirmation message The backup process begins immediately 4 Click Apply or OK Reviewing backup events The Master Log which displays in the lower left area of...

Page 131: ...ng Dump files Data collection progress files Director Switch firmware files FAF files Switch technical supportSave and Switch backup files and miscellaneous files Backup conf contains the Management a...

Page 132: ...ack up directory structure overview on page 78 If your Management application server fails and you must recover information to a new server restore the data Refer to Restoring data on page 83 for comp...

Page 133: ...abric or group setting individually The following table Table 19 details the settings that change with reset and the associated default state To reset the Management application to the default display...

Page 134: ...not display end nodes This option enables you to set the end node display for all newly discovered fabrics Note that disabling end node display limits the connectivity map to emphasize switch members...

Page 135: ...period of time To enable Ethernet loss events complete the following steps 1 Select Server Options The Options dialog box displays FIGURE 24 Options dialog box SAN Ethernet Loss Event pane 2 Select SA...

Page 136: ...the repository in the Maximum Events field Depending on your installation the maximum number of events stored are as follows Professional 1 through 100 000 Professional Plus 1 through 1 000 000 Enter...

Page 137: ...zip file contains multiple archive text files that use the format event_MMDDYYY_N txt for example event_04052011_1 txt Flyover settings You can configure your system to display information for product...

Page 138: ...ed properties to the Selected Properties table d Use the Move Up and Move Down buttons to reorder the properties in the Selected Properties table if necessary The properties displayed in the Selected...

Page 139: ...ble for all protocols b Select each property you want to display in the connection flyover from the Available Properties table Depending on which protocol you select some of the following properties m...

Page 140: ...e View menu Viewing flyovers On the Topology Map rest the pointer over a product icon port or connection The pop up window containing the product port or connection information displays For the produc...

Page 141: ...ptions dialog box displays 2 Select SAN Names in the Category list The SAN Names pane displays Figure 28 FIGURE 28 Options dialog box SAN Names pane 3 Select Set names to be unique to require that nam...

Page 142: ...g box displays 2 Click Fix Duplicates FIGURE 29 Duplicated Names dialog box The Duplicated Names dialog box displays Figure 29 with the following information Description A description of the device Du...

Page 143: ...ions If you select Append Incremental numbers for all repetitive names the names are edited automatically using incremental numbering If you select I will fix them myself edit the name in the Name fie...

Page 144: ...o export the name data Depending on your operating system the default export location are as follows Desktop My documents Windows root Linux For more information refer to Exporting names on page 98 Fi...

Page 145: ...nter the WWN of the device in the Detached WWN field 3 Enter a name for the device in the Name field 4 Click Add The new device displays in the table If you set names to be unique on the Options dialo...

Page 146: ...figure Names dialog box displays 2 Select All Names from the Display list Only devices with a name display The table displays the Name WWN Operational Status Type and a Description of the device 3 Cli...

Page 147: ...Select the file and click Import 5 Click OK to close the Configure Names dialog box 6 Click OK on the confirmation message Searching for a device by name You can search for objects switch fabric produ...

Page 148: ...ts switch fabric product ports or N Ports by WWN world wide name To search for a WWN in the Connectivity Map refer to Searching for a device on page 258 To search by WWN complete the following steps 1...

Page 149: ...nt s users must acknowledge the login banner to proceed otherwise they are logged out NOTE M EOS device support is no longer available in the Management application therefore the CHAP Secret and Retyp...

Page 150: ...rmware file 1 Select Server Options The Options dialog box displays 2 Select Security Misc in the Category list 3 Select the Enforce Fabric OS MD5 Checksum File Import check box 4 Click Apply or OK to...

Page 151: ...lient login check box NOTE Users logging into the client will not see the banner when logging in to this Server 4 Click Yes on the confirmation message 5 Click Apply or OK to save your work Syslog Reg...

Page 152: ...settings You can automatically register the server as the trap recipient on products If SAN products have Informs enabled the registration is for the Informs Registering a server as a SNMP trap recip...

Page 153: ...s for the traps forwarded by the server Configuring SNMP v1 and v2c credentials To configure a SNMP v1 or v2c credentials complete the following steps 1 Select Server Options The Options dialog box di...

Page 154: ...ASCII characters 6 Select one of the following privacy protocol types from the Priv Protocol list CBC DES continue with step 7 CFB_AES 128 continue with step 7 NONE go to step 8 7 Enter the privacy p...

Page 155: ...th which the Management application server communicates The truststore file is used when making decisions on what to trust The server truststore truststore jks is stored in the Install_Home conf secur...

Page 156: ...uststore Certificates table Contains the following fields and components Alias Name Unique alias of the certificate Issued To To whom the certificate was issued Issued By Author of the certificate Imp...

Page 157: ...y is of type RSA the default signature algorithm is SHA256withRSA Issuer Entity that signed the certificate Validity Dates that the certificate is valid Subject Name of the entity whose public key the...

Page 158: ...ed from the server truststore Changing the password for the truststore repository To change the keystore password refer to Changing the keystore password on page 112 1 Select Server Options The Option...

Page 159: ...he default signature algorithm is SHA256withRSA Issuer Entity that signed the certificate Validity Dates that the certificate is valid Subject Name of the entity whose public key the certificate ident...

Page 160: ...e following steps a Browse to the location of the new certificate b Enter the password for the new certificate in the Password field The new certificate is cached locally in the client 6 Click Apply o...

Page 161: ...Clear the check box to disable certificate validation 4 Click Apply or OK to save your work Client export port settings You can configure a port for communication between the client and server Config...

Page 162: ...ards and if any of these interfaces are not plugged in you must disable them otherwise the following features do not work properly Server impact Configuration wizard does not display all IP addresses...

Page 163: ...4 Select the return IP address in the Client Server IP Configuration Return Address list 5 Select the preferred IP address in the Switch Server IP Configuration Preferred Address list If DNS is not co...

Page 164: ...ssage 4 Click Next on the FTP Server screen 5 Complete the following steps on the Server IP Configuration screen Figure 39 FIGURE 39 Server IP Configuration screen a Select an address from the Server...

Page 165: ...ning the Server is behind a firewall that performs network address translation To make sure that Clients can connect to the Server you may need to edit the IP configuration setting in the Options dial...

Page 166: ...ntervals when no state change occurs NOTE SAN size is a consideration in selection of polling periods Configuring memory allocation settings To configure memory allocation settings complete the follow...

Page 167: ...a value higher than 1024 MB impacts the client launch Client Heap Size for both 32 and 64 bit servers Small 512 MB Medium 512 MB Large 768 MB 5 Enter the memory allocation MB for the server in the Se...

Page 168: ...n take effect after an application restart NOTE You can only restart the server using the Server Management Console Start Programs Management_Application_Name 12 X X Server Management Console 7 Click...

Page 169: ...econds 4 Enter how often you want to check for state changes in the If no state change Poll switch every field Valid values are from 1 through 3 600 seconds Default values are as follows Small Profess...

Page 170: ...mmended count The following table illustrates and describes the icons that indicate the current network size status Product communication settings You can configure HTTP or HTTPS connections between t...

Page 171: ...ic OS and Network OS products only Select IPv4 or IPv6 to set the preferred IP format 6 Click Apply or OK to save your work Changes to this option take effect after an application restart 7 Click OK o...

Page 172: ...features NOTE FTP is supported on all Fabric OS devices Secure Copy SCP is a means of securely transferring computer files between a local and a remote host or between two remote hosts using the Secu...

Page 173: ...P server All active fields are mandatory The default user name is admin The full path to the built in FTP directory displays in the Root Directory field 4 Select the Built in FTP Server check box 5 Ch...

Page 174: ...o use the default built in SCP or SFTP server All active fields are mandatory The default user name is admin The full path to the built in SCP or SFTP directory displays in the Root Directory field 4...

Page 175: ...ver Options The Options dialog box displays 2 Select FTP SCP SFTP in the Category list The FTP SCP SFTP pane displays Figure 43 FIGURE 43 Options dialog box FTP SCP SFTP pane 3 Select the Use External...

Page 176: ...User Name field d Enter the path to the remote host in the SFTP Directory Path field Use a slash or period to denote the root directory Do not give an absolute path e Enter the password in the Passwo...

Page 177: ...essage 6 Click OK to close the Options dialog Server port settings You can configure the server port settings so that you can assign a web server port number and set the server port to be SSL enabled...

Page 178: ...upport settings to allow enhanced diagnostics Configuring support mode settings To configure support mode settings complete the following steps 1 Select Server Options The Options dialog box displays...

Page 179: ...work_address client log 1 through network_address client log 5 are created in the User_Home Product_Name Server_IP_Address directory server log file properties There is only one server log file each d...

Page 180: ...d in the Master Log and a call home alert is sent to the corresponding call center for this event To avoid call home events for missing switches create a call home event filter and clear the Switch is...

Page 181: ...r accept changes for a switch or fabric Fabric Name Displays the name of the selected fabric Switches This table shows a brief summary of the switches including status whether the device port will be...

Page 182: ...s Click in the white space on the Connectivity Map and select Monitor Accept All Changes Right click in the white space on the Connectivity Map and select Accept All Changes A message displays listing...

Page 183: ...n you enable or disable fabric tracking or accept changes for a switch or fabric Fabric Name Displays the name of the selected fabric Switches This table shows a brief summary of the switches includin...

Page 184: ...136 Brocade Network Advisor SAN User Manual 53 1002696 01 Fabric tracking 5...

Page 185: ...rators within a role instead of in individual accounts You can group devices access points and their groups in areas of responsibilities AORs then assign one or more AORs to a user s privilege When yo...

Page 186: ...sers tab if necessary FIGURE 46 Users dialog box Users tab The Users dialog box contains the following fields and components Authentication Primary The primary authentication server type configured th...

Page 187: ...dialog box for the selected user refer to Editing a user account on page 143 Duplicate button Click to launch the Duplicate Users dialog box for the selected user refer to Copying a user account on pa...

Page 188: ...n page 149 AOR table Lists the default system AOR and any user defined AORs Name The unique name of the AOR Default system AORs include All Fabrics all discovered SAN devices All Hosts all discovered...

Page 189: ...ed to the user Privileges provide access to the features in Management application A role is a group of selected privileges A role can be assigned to one or more Management application users who need...

Page 190: ...e mail address separating each with a semi colon To send a text message or page via e mail use the following format number carrier com where number is your phone number and carrier com is the SMS serv...

Page 191: ...gged out and must log back in to see the changes 5 Click Close to close the Users dialog box Copying a user account You can create a user account by copying an existing one When you copy an account yo...

Page 192: ...w has the following user defined views Fabric1 Fabric2 Fabric_CO Host1 and Hosts NOTE You cannot copy user preferences to user accounts that are currently logged in to the Management application NOTE...

Page 193: ...able Roles AOR table Select multiple roles or AORs by holding down the CTRL key and clicking more than one role or AOR 4 Click OK to save the user account and close the Edit User dialog box If you mak...

Page 194: ...sers dialog box displays 2 Select the user you want to delete in the Users table and click Delete 3 Click Yes on the confirmation message If currently accessing the server the user will be logged out...

Page 195: ...mes available in the Users dialog box Creating a new role To create a new role complete the following steps 1 Select Server Users The Users dialog box displays 2 Click Add under the Roles table The Ad...

Page 196: ...e user s role or AOR while the user is logged in a confirmation message displays When you click OK on the confirmation message the user is logged out and must log back in to see the changes 5 Click Cl...

Page 197: ...te the following steps 1 Select Server Users The Users dialog box displays 2 Click Add Edit or Duplicate under the Roles table The Add Roles Edit Roles or Duplicate Roles dialog box displays 3 Add rea...

Page 198: ...in the Read Only Privileges list and click the right arrow button to move the features to the Available Privileges list Select multiple features by holding down the CTRL key and clicking more than one...

Page 199: ...dialog box To create an AOR complete the following steps 1 Select Server Users The Users dialog box displays 2 Click Add under the AOR table The Add AOR dialog box displays FIGURE 49 Users dialog box...

Page 200: ...es on the confirmation message the user is logged out and must log back in to see the changes 5 Click Close to close the Users dialog box Copying an AOR NOTE You cannot duplicate system AORs To create...

Page 201: ...abrics tab 4 Select the fabrics you want to assign to the AOR in the Available Fabrics table and click the right arrow button to move the products to the Selected Products table Select multiple fabric...

Page 202: ...log box displays 2 Click the Policy tab 3 Configure the password expiration by completing the following steps a Enter the maximum number of days that can elapse before a password must be changed by th...

Page 203: ...clear Valid values are 0 through 127 The default is 0 g Enter the maximum number that the same character can repeat without a different intervening character in the Maximum Repeat field Only enabled w...

Page 204: ...he user accounts violate the updated password policy an empty View Policy Violators dialog box displays 9 Click Apply 10 Click Yes on the confirmation message 11 Click Close to close the Users dialog...

Page 205: ...Using LDAP authentication you assign users to groups within the LDAP server and assign roles and AORs to the groups within the Management application To assign roles and AORs to an AD group complete...

Page 206: ...network address from the Network Address list 5 Enter the TCP port number in the TCP Port field if necessary Default is 389 if security is not enabled Default is 636 if security is enabled 6 Select t...

Page 207: ...tive Directory Users and Computers 2 Right click the Users folder and select New User 3 Enter a name in the First name field 4 Enter a name in the Full name field 5 Enter a logon name in the User logo...

Page 208: ...lick the Attributes folder Console Root Active Directory Schema Attributes and select New Attribute 8 Create the NmAors attribute by completing the following steps a Enter NmAors in the Common Name fi...

Page 209: ...or Report User Group SAN System Administrator Security Administrator Security Officer and Zone Administrator in the Value field and click OK 8 Close the ADSI Edit dialog box User profiles User profile...

Page 210: ...er Click to configure e mail notification refer to Configuring e mail notification on page 164 E mail Address Displays your e mail text message or page addresses if entered while adding a user otherwi...

Page 211: ...alog box displays 2 Change your password in the Password and Confirm Password fields Passwords display as dots 3 Click OK on the User Profile dialog box to save your changes If your password expires o...

Page 212: ...in the password 3 Click OK on the Password Policy dialog box 4 Click OK on the User Profile dialog box Resetting optional messages To reset all Management application optional messages to their defau...

Page 213: ...address separating each with a semi colon To send a text message or page via e mail use the following format number carrier com where number is your phone number and carrier com is the SMS server For...

Page 214: ...166 Brocade Network Advisor SAN User Manual 53 1002696 01 User profiles 6...

Page 215: ...center 181 Viewing Call Home status 182 Assigning a device to the Call Home center 183 Removing a device from a Call Home center 183 Removing all devices and filters from a Call Home center 183 Defin...

Page 216: ...UNIX Oracle E mail Windows and UNIX When configuring modem and HP LAN Call Home centers you must enter the customer contact information in the device s Element Manager You may also need to configure t...

Page 217: ...d phone number or e mail a specific recipient Enable and disable individual devices from contacting the assigned Call Home centers Show or hide Call Home centers on the display Enable and disable Call...

Page 218: ...ted product from the selected Call Home center refer to Removing a device from a Call Home center on page 183 Disabled when no product or Call Home center is selected in the Call Home Centers list Cal...

Page 219: ...The node WWN of the product Fabric Name The name of the fabric Vendor The vendor of the product Call Home Status One of the following Call Home statuses for the product Enabled The product is managea...

Page 220: ...ll Home center 4 Click OK on the Centers dialog box The Call Home dialog box displays with the selected Call Home centers listed in the Call Home Centers list Hiding a Call Home center NOTE Before you...

Page 221: ...e Call Home Centers list 3 Click Edit Centers beneath the Call Home Centers list The Configure Call Home Center dialog box displays Figure 52 FIGURE 52 Configure Call Home Center dialog box IBM option...

Page 222: ...cted Call Home center must be enabled to test the phone number A faked event is generated and sent to the selected Call Home center You must contact the Call Home center to verify that the event was r...

Page 223: ...ck box to enable secure communication between the SMTP server and the Management application 12 Enter the port number of the server in the SMTP Server Settings Port field The default is 465 if SMTP ov...

Page 224: ...the Call Home dialog box Call Home alert e mail messages When an event triggers a Call Home alert an e mail message is sent to the selected Call Home center The e mail message includes the following...

Page 225: ...Reason Event Details about the triggered event Includes the following data Event Time Event Severity Event Reason Code FRU Code Event Type Event Description Event Data Information about the triggered...

Page 226: ...all Home center 6 Set the time interval at which to check the Call Home center by selecting the Set heartbeat interval at ___ days 1 28 check box and entering the interval in the field 7 Enter the pat...

Page 227: ...ct the HP LAN Call Home center you want to edit in the Call Home Centers list 3 Click Edit Centers beneath the Call Home Centers list The Configure Call Home Center dialog box displays Figure 55 FIGUR...

Page 228: ...a Call Home center complete the following steps 1 Select Monitor Event Notification Call Home The Call Home dialog box displays 2 Select the Enable check box of the Call Home center you want to enabl...

Page 229: ...the correct format 6 Click OK to close the Test Event Sent message 7 Click OK to close the Configure Call Home Center dialog box 8 Click OK to close the Call Home dialog box Disabling a Call Home cent...

Page 230: ...the device The possible status options include Enabled The device is manageable Call Home is enabled and a filter is applied Disabled Call Home is disabled on at least one device or Call Home is disa...

Page 231: ...nter Devices assigned to a Call Home center do not display in the Products List 5 Click OK to close the Call Home dialog box Removing a device from a Call Home center To remove a device or multiple de...

Page 232: ...ll to select all event types in the list or select Unselect All to clear the selected event types in the list For more information about Call Home events refer to Appendix B Call Home Event Tables The...

Page 233: ...elect Monitor Event Notification Call Home The Call Home dialog box displays 2 Select the event filters you want to assign in the Call Home Event Filters list 3 Select the Call Home centers to which y...

Page 234: ...nt filter in the Call Home Centers list 4 Click the right arrow button For existing event filters a confirmation messages displays 5 Click Yes The selected event filter is applied to the selected devi...

Page 235: ...ilter you want to remove in the Call Home Event Filters list 3 Click Remove If the event filter is not assigned to any devices a confirmation message displays asking if you want to remove the event fi...

Page 236: ...188 Brocade Network Advisor SAN User Manual 53 1002696 01 Searching for an assigned event filter 7...

Page 237: ...regardless of the currently selected tab SANor Dashboard or the SAN size However data may become momentarily out of sync between the dashboards and other areas of the application For example if you re...

Page 238: ...shboard tab Provides a high level overview of the network managed by Management application server 4 SAN tab Displays the Master Log Minimap Connectivity Map topology and Product List For more informa...

Page 239: ...g format For more information refer to Exporting the dashboard display on page 193 5 Print list Prints the dashboard display all widgets or a selected widget For more information refer to Printing the...

Page 240: ...t from the Performance Dashboard Title The name of the performance monitor widget For more information refer to Performance Dashboard monitors on page 204 Type The type of monitor Measure The performa...

Page 241: ...ween widget columns to adjust the width of widgets in the adjacent columns Use the horizontal grab bars to adjust the height of adjacent widget rows Zoom in Only widgets with a bar graph enable you to...

Page 242: ...ed Note that if you open a dialog box from any window you must close it before you can return to the other windows Reattach the Dashboard to the main application by clicking the Attach button or by cl...

Page 243: ...4 or later Range The time range from last hour to last month Port The port identifier such as port name number address WWN user port number or zone alias Violation Count The number of bottleneck viola...

Page 244: ...Displays data for the previous 12 hours to when you launch the dashboard Day Displays data for the current day beginning at 12 00 AM Week Displays data for the last 7 days including the current day 1...

Page 245: ...the summary however because Syslog events occur at a much higher frequency than other events and therefore could skew the bars for the other events you can exclude Syslog events If they are excluded t...

Page 246: ...t Adapter Inventory widget Figure 61 displays the host adapter products inventory as stacked bar graphs FIGURE 61 Host Adapter Inventory widget The Host Adapter Inventory widget includes the following...

Page 247: ...e Host product inventory by physical location Driver Displays the Host product inventory by driver BIOS Displays the Host product inventory by BIOS boot code image version OS Type Displays the Host pr...

Page 248: ...number of products The bar chart displays each group as a separate bar on the graph Displays the current state of all products discovered for a group in various colors on each bar Tooltips showing th...

Page 249: ...dget prior to using zoom To return the widget to its original state reverse the selection drag from lower right corner to upper left corner Accessing additional data from the SAN Inventory widget Doub...

Page 250: ...Double click a section in the SAN Status widget The SAN Products Status dialog box where Status is the section of the widget you selected displays with the following fields and components Product The...

Page 251: ...s widget The VM Alarms widget displays the vCenter alarms for the specified fabric and time range in a table The VM Alarms widget includes the following data Severity icon widget title The worst sever...

Page 252: ...on page 1071 Double click a row in the widget to navigate to the VM Troubleshooting VM_Name Host_Name dialog box where VM_Name Host_Name is the name of the virtual machine and associated host For more...

Page 253: ...s collector Top Product Response Time Table view of the response time measure All SAN products collector Top Product Temperature Table view of the temperature measure All SAN products collectorSystem...

Page 254: ...of port for example U Port Identifier The port identifier Port Number The port number State The port state for example Enabled Status The port status for example Up Refreshed The refresh time and sel...

Page 255: ...y this monitor Type The type of port for example U Port Identifier The port identifier Port Number The port number State The port state for example Enabled Status The port status for example Up Refres...

Page 256: ...onitor CRC Errors sec The top ports with frames that contain cyclic redundancy check CRC errors in seconds Product The product affected by this monitor Type The type of port for example U Port Identif...

Page 257: ...ted by this monitor Encode Error Out sec The top ports with encoding errors outside of frames in seconds Product The product affected by this monitor Type The type of port for example U Port Identifie...

Page 258: ...with receive errors in seconds TX Errors sec The top ports with transmit errors in seconds Product The product affected by this monitor per second Type The type of port for example U Port Identifier...

Page 259: ...sec The top receive link failures in seconds TX Link Failures sec The top transmit link failures in seconds Product The product affected by this monitor Type The type of port for example U Port Identi...

Page 260: ...sec The top receive link resets in seconds TX Link Resets sec The top transmit link resets in seconds Product The product affected by this monitor Type The type of port for example U Port Identifier...

Page 261: ...this monitor Sync Losses sec The top ports with synchronization failures in seconds Product The product affected by this monitor Type The type of port for example U Port Identifier The port identifier...

Page 262: ...top receive traffic in megabits per second TX Traffic MB s The top transmit traffic in megabits per second Product The product affected by this monitor Type The type of port for example U Port Identi...

Page 263: ...centage The top transmit port utilization percentages Product The product affected by this monitor Type The type of port for example U Port Identifier The port identifier Port Number The port number S...

Page 264: ...The CPU utilization percentages Max The maximum value of the measure in the specified time range Fabric The fabric to which the device belongs Product Type The type of product for example switch State...

Page 265: ...able FIGURE 77 Top Product Memory Utilization monitor The Top Product Memory Utilization monitor includes the following data Severity icon monitor title The worst severity of the data shown next to th...

Page 266: ...ck a row to navigate to the IP Historical Graphs Tables dialog box For more information refer to Performance Data on page 895 Top Product Response Time monitor The Top Product Response Time monitor Fi...

Page 267: ...g additional data from the Top Product Response Time monitor Right click a row in the monitor to access the shortcut menu available for the associated device For more information about shortcut menus...

Page 268: ...in the monitor to access the shortcut menu available for the associated device For more information about shortcut menus refer to Application menus on page 1061 Double click a row to navigate to the I...

Page 269: ...ove displays red 75 and above displays orange 60 and above displays yellow and all others display blue a Select the check box b Enter a number in the field c Click the color square to launch the Color...

Page 270: ...llowing data Threshold icon object count monitor title The color associated with the threshold and number of objects within that threshold displays next to the monitor title Product The product affect...

Page 271: ...selected measures For more information refer to Performance Data on page 895 Right click a row in the monitor to access the shortcut menu available for the associated device For more information abou...

Page 272: ...configure a port performance monitor refer to Configuring a user defined port performance monitor on page 230 Accessing additional data from top or bottom port monitors In a Top N or Bottom N monitor...

Page 273: ...or on page 227 or Configuring a user defined port performance monitor on page 230 TABLE 27 Product measures types Memory Utilization Percentage CPU Utilization Percentage Temperature C Fan Speed rpm R...

Page 274: ...on page 233 Time series performance monitors The time series performance monitors Figure 83 display the selected measures in a chart FIGURE 83 Time series performance monitor example The time series...

Page 275: ...tor the selected measure for five defined distribution percentages Time Series Select to monitor a selected measure for a range of time and specified target 7 Select the product measure for the monito...

Page 276: ...32 767 for SFP power and 0 through 32 767 for all other measures Distribution monitors only The increasing order defaults are as follows 0 through 20 displays green 21 through 40 displays blue 41 thro...

Page 277: ...ate to the Historical Graphs Tables dialog box for the selected measures For more information refer to Performance Data on page 895 Right click a row in the monitor to access the shortcut menu availab...

Page 278: ...t 16 Click OK on the Customize Dashboard dialog box The Performance Dashboard dialog box displays with the new monitors at the bottom of the dashboard Configuring a user defined port performance monit...

Page 279: ...the dashboard Last 24 Hours Displays data for the previous 24 hours beginning when you launch the dashboard 8 Top N and Bottom N monitors only Select the number of ports to include in a selected meas...

Page 280: ...re information refer to Viewing product distribution data details on page 232 or Viewing port distribution data details on page 233 Right click a row in the monitor to access the shortcut menu availab...

Page 281: ...us for example Reachable Tag The product tag Serial The serial number of the product Model The product model Port Count The number of ports on the product Firmware The firmware level running on the pr...

Page 282: ...V SFP Current The SFP current in mA SFP Temperature The SFP temperature in Celsius FCIP Compression Ratio The compression ratio for the FCIP tunnel Latency The latency for the FCIP tunnel Dropped Pack...

Page 283: ...ck Packets Received The number of bad packets received Tx Errors The number of transmit errors Product The product affected by this monitor Type The type of port for example U Port Identifier The port...

Page 284: ...236 Brocade Network Advisor SAN User Manual 53 1002696 01 User defined performance monitors 8...

Page 285: ...Log Utilization Legend and Minimap NOTE When you launch the Management application or navigate to a new view the SAN tab displays with a gray screen over the Product List and Topology Map while data...

Page 286: ...w All list Enables you to create copy or edit a view select to how to view the Product list All Levels Products and Ports Products Only or Ports Only and to select which view you want to display in th...

Page 287: ...various functions FIGURE 85 SAN main toolbar The icons on your toolbar vary based on the licensed features on your system 1 Users Displays the Users dialog box Use to configure users user groups and p...

Page 288: ...Does not display until you discover a fabric To discover a fabric refer to Discovering fabrics on page 41 1 Create View Select to create a new view 2 Copy View Select to copy an existing view 3 Edit V...

Page 289: ...Show Hide Attached Port Displays or hides the attached ports of the target devices 3 Show Hide Unoccupied Port Displays or hides the ports of the devices shown in the connectivity map that are not co...

Page 290: ...dit of the port Class Displays the class value of the FICON device port Contact Displays the name of the person or group you should contact about the product This field is editable at the fabric level...

Page 291: ...Right click a column header in the Product List to view the menu For a list of right click menus refer to Customizing application tables on page 253 Connectivity Map The Connectivity Map which displa...

Page 292: ...nus refer to SAN shortcut menus on page 1071 Utilization Legend The Utilization Legend which displays in the lower right corner of the main window indicates the percentage ranges represented by the co...

Page 293: ...rred Source Address The IP address IPv4 or IPv6 format of the product on which the event occurred Origin The event source type for example trap pseudo event application or syslog Category The type of...

Page 294: ...hor or float the Minimap to customize your main window To float the Minimap and view it in a separate window click the Detach icon in the upper right corner of the Minimap To anchor the Minimap and re...

Page 295: ...e current network size status Double click the icon to launch the Memory Allocation pane of the Options dialog box Let the pointer pause on the backup status icon to display the following information...

Page 296: ...e dialog box For more information refer to User profiles on page 161 14 Trial license Not shown Displays the trial expiration information to the right of the User s ID Icon legend Various icons are us...

Page 297: ...icons shown only display when certain features are licensed SAN group icons The following table lists the manageable SAN product group icons that display on the topology TABLE 31 Icon Description Ico...

Page 298: ...llowing table lists the product status icons that display on the topology TABLE 33 Icon Description Icon Description Host Group TABLE 34 Icon Description Occupied FC Port Unoccupied FC Port Attached F...

Page 299: ...e event icons that display on the topology and Master Log For more information about events refer to Fault Management on page 973 Down Failed Routed In Routed Out Unknown Link Down Unreachable TABLE 3...

Page 300: ...Click the zoom in icon on the Connectivity Map toolbar Press CTRL and the plus sign on the number pad on the keyboard Use the Zoom dialog box a Select View Zoom The Zoom dialog box displays FIGURE 92...

Page 301: ...toolbar The Export Topology To PNG File dialog box displays 2 Browse to the directory where you want to export the image 3 Edit the name in the File Name field if necessary 4 Click Save If the file na...

Page 302: ...where in the table and select Customize or Table Customize The Customize Columns dialog box displays FIGURE 93 Customize Columns dialog box 2 Choose from the following options Select the check box to...

Page 303: ...to Fit or Table Size Column to Fit To resize all columns in the table right click anywhere in the table and select Size All Columns to Fit or Table Size All Columns to Fit Sorting table information To...

Page 304: ...or information in a table You can search for information in the table by any of the values found in the table 1 Right click anywhere in the table and select Table Search The focus moves to the Search...

Page 305: ...ast column of the Product List as well as the associated Properties dialog box based on the selected type Editing a property label You can only edit labels that you created on the Product List To edit...

Page 306: ...s and descriptions of them are listed below 1 Text field Enter the text or unicode regular expression for which you want to search 2 Search list Select one of the following options Text option Select...

Page 307: ...search for a device the device must be discovered and display in the topology To restrict the search only to specific nodes complete the following steps 1 Select the Product node or Product Group nod...

Page 308: ...e search list SAN view management overview You can customize the topology by creating views that include certain fabrics or devices and then switch between the views to see specific information about...

Page 309: ...me field 3 Click the Fabrics tab 4 In the Available Fabrics table select the fabrics you want to include in the view and click the right arrow button to move your selections to the Selected Fabrics an...

Page 310: ...ype host or fabric number of products in the selected host or fabric 8 Click OK to save the customized view and close the Create View dialog box The new view displays automatically in the main window...

Page 311: ...o select multiple sequential rows press SHIFT and click on a sequence of rows 6 To remove fabrics and hosts from a view select the fabrics and hosts you want to remove in the Selected Fabrics and Host...

Page 312: ...lank it may be because all fabrics have been selected and are displayed in the Selected Fabrics and Hosts table To select more than one row press CTRL and click individual rows To select multiple sequ...

Page 313: ...attached port numbers in decimal format Hex Select to display all domain IDs and user and attached port numbers in hex format Product Label Select to configure which product labels display NOTE Change...

Page 314: ...and manage its devices Group types include Fabric Host Storage Router and Switch groups 1 Right click a group or the Connectivity Map and select Map Display The Map Display Properties dialog box displ...

Page 315: ...ge the way inter device connections display on the topology 1 Right click a group or the Connectivity Map and select Map Display The Map Display Properties dialog box displays 2 Select one of the foll...

Page 316: ...k the RGB tab Specify the values for red 0 to 255 green 0 to 255 blue 0 to 255 and alpha 0 to 255 or enter a color code in the Color Code field To specify a color based on values of cyan magenta yello...

Page 317: ...label Port WWN Displays the port world wide name as the port label User Port Displays the user s port number as the port label Zone Alias Displays the zone alias as the port label All port labels with...

Page 318: ...apse from the shortcut menu To collapse all groups on the topology by one level click the Collapse button on the Connectivity Map toolbar Expanding groups To expand a group on the topology do one of t...

Page 319: ...tion list 4 Click the right arrow button to move the zones to the Selected Zones list 5 Click Save The Save Application dialog box displays 6 Enter a new name in the Application Name field 7 Click OK...

Page 320: ...272 Brocade Network Advisor SAN User Manual 53 1002696 01 Grouping on the topology 9...

Page 321: ...ption from the Tools menu 282 Changing an option on a device s shortcut menu 284 Removing an option from a device s shortcut menu 285 Microsoft System Center Operations Manager SCOM plug in 285 About...

Page 322: ...ter to be able to open the application For step by step instructions about entering the IP address of the server refer to Entering the server IP address of a tool on page 280 Launching a Telnet sessio...

Page 323: ...s Use Web Tools to enable and manage Fabric OS access gateway switches and directors You can open Web Tools directly from the application For more information about Web Tools refer to the Brocade Web...

Page 324: ...sion switch Fabric OS Directors configured with an extension blade Fabric OS 1U 8 Gbps 40 port FC Switch with Integrated Routing license Fabric OS 2U 8 Gbps 80 port FC Switch with Integrated Routing l...

Page 325: ...de Web Tools Administrator s Guide NOTE You must have Element Manager Product Administration privileges for the selected device to launch Web Tools If you do not have Element Manager Product Administr...

Page 326: ...CNA device you want to manage and select Element Manager HCM Agent displays OR 1 Select a Fabric OS HBA or CNA 2 Select Configure Element Manager HCM HCM Agent displays Launching Fabric Watch Use Fab...

Page 327: ...plays Figure 102 FIGURE 102 Define Tools dialog box 4 Type the tool s name in the Tool Name field as you want it to appear on the Tools menu 5 Type or browse to the path of the executable file in the...

Page 328: ...ol Menu Items table The settings for the selected tool display in the fields at the top of the dialog box 4 Edit the IP address of the server for example http IP_Address or http IP_Address Port_Number...

Page 329: ...ool To specify a new tool refer to Adding a tool on page 279 5 Optional Enter parameters such as a URL in the Parameters field 6 Optional Select a keyboard shortcut in the Keystroke list NOTE You cann...

Page 330: ...n as you want it to appear on the Tools menu in the Menu Text field 5 Select the application from the Tool list 6 Edit the parameters such as a URL in the Parameters field 7 Select a new keyboard shor...

Page 331: ...name list 6 Enter the appropriate value for the selected property in the Condition 1 Value field 7 Optional Select the Condition 2 Property type and enter the Value for that property type Condition 1...

Page 332: ...all devices select the All option If you select All skip to step 8 Otherwise continue to step 5 6 Change the type in the Condition 1 Property name list 7 Change the value for the selected property in...

Page 333: ...n Windows NOTE The SCOM plug in is only available on Professional Plus and Enterprise NOTE You must have SCOM Management privileges to access the Plug in for SCOM dialog box For more information about...

Page 334: ...tails Make sure to enable performance monitoring at the SAN or fabric level to collect end monitor statistics Refer to SAN End to end monitoring on page 915 Registering a SCOM server To register the S...

Page 335: ...eld 4 Enter your user ID and password 5 Click OK 6 Click Close Removing a SCOM server To configure the SCOM plug in complete the following steps 1 Select Tools Plug in for SCOM The Plug in for SCOM di...

Page 336: ...288 Brocade Network Advisor SAN User Manual 53 1002696 01 Microsoft System Center Operations Manager SCOM plug in 10...

Page 337: ...erver port number From the AAA Settings tab Enterprise Licensed version only you can configure an authentication server LDAP or Radius server and establish authentication policies From the Restore tab...

Page 338: ...he following at the command line smc OR sh smc Services tab You must be logged in at the administrator Windows systems or root UNIX systems level to stop start and restart the Management application s...

Page 339: ...ollowing steps 1 Launch the Server Management Console 2 Click the Services tab 3 Click Refresh to update the table with the latest status of the services in case the services were stopped or restarted...

Page 340: ...Server Management Console Restarting all services To stop and restart all services complete the following steps 1 Launch the Server Management Console 2 Click the Services tab 3 Click Restart to stop...

Page 341: ...server port numbers To view the Management application server or web server port number complete the following steps 1 Choose one of the following options For Windows systems open the Server Managemen...

Page 342: ...configured For example you must define roles and areas of responsibility AOR in the external server to match the Management application roles and AOR Select an Authentication Type you will be prompted...

Page 343: ...attempts to contact the Radius server by issuing a ping command 7 Set secondary authentication by selecting one of the following options from the Secondary Authentication list Local Database None 8 S...

Page 344: ...ecret in the Shared Secret and Confirm Secret fields 6 Enter the timeout timer value in seconds that specifies the amount of time to wait between retries when the server is busy in the Timeout Sec fie...

Page 345: ...port to specify Know how long you want to wait between attempts default is 3 seconds to reach the server if it is busy This is expressed as a timeout value in seconds Values are between 1 and 15 Dete...

Page 346: ...stem Administrator Security Administrator Security Officer and Zone Administrator NmAors defines the areas of responsibility such as All Fabrics All IP Products 3 Add or edit a LDAP server by referrin...

Page 347: ...need to match and must have the appropriate roles and AORs If the Management application user name and LDAP user name do not match create the user and assign the respective roles and AORs refer to Us...

Page 348: ...an IP address instead of the hostname 5 Enable security by selecting the Security Enabled check box When you enable security the TCP port number automatically changes to port 636 and you must enable...

Page 349: ...ct the AAA Settings tab 2 For Primary Authentication select TACACS Server FIGURE 109 AAA Settings tab TACACS server 3 Add or edit a TACACS server by referring to Configuring a TACACS server on page 30...

Page 350: ...Server Management Console Configuring a TACACS server To add or edit a TACACS server complete the following steps 1 Choose one of the following options from the AAA Settings tab Click Add Select an e...

Page 351: ...to three switches and specify the fall back order if one or more of the switches is not available NOTE Switch authentication is only supported on Fabric OS devices To configure switch authentication...

Page 352: ...by selecting one of the following options from the Secondary Authentication list Local Database None 5 Click Test The Test Authentication dialog box displays 1 In the User ID field choose one of the...

Page 353: ...nd password in the appropriate fields and click OK The defaults are Administrator and password respectively The Authentication Audit Trail log displays The audit trail shows user names that have attem...

Page 354: ...eps 1 Click the Services tab 2 Stop all services 3 Click the Restore tab Figure 111 FIGURE 111 Restore tab 4 Click Browse to select the path defined in the Output Directory field on the Options dialog...

Page 355: ...llowing options Select the Partial option to exclude historical data and events from the database capture Select the Full option to include historical data and events from the database capture NOTE It...

Page 356: ...when the capture is complete 5 Click OK HCM Upgrade tab The HCM Upgrade tab enables you to upgrade the Management application to include a new version of HCM Upgrading HCM on the Management server To...

Page 357: ...erver Management Console Defining the performance data aging interval To define the performance data collection interval complete the following steps 1 Click the Performance Data Aging tab FIGURE 114...

Page 358: ...the following tabs Home tab enables you to access Management application features such as fabric and host discovery role based access control application configuration and display options server prop...

Page 359: ...username and password in the appropriate fields The defaults are Administrator and password respectively If you migrated from a previous release your username and password do not change 4 Select or c...

Page 360: ...username and password do not change The SMIA Configuration Tool dialog box displays Launching a remote SMIA configuration tool To launch a remote SMIA configuration tool complete the following steps...

Page 361: ...upport includes the following components slpd script starts the slpd platform slpd program acts as a Service Agent SA A different slpd binary executable file exists for UNIX and Windows systems slptoo...

Page 362: ...ionsSupported true AuthenticationMechanismsSupported Basic Authentication MechanismDescriptions null Namespace root brocade1 interop Classinfo 0 0 RegisteredProfilesSupported SNIA SMI S DMTF Profile R...

Page 363: ...1 Open a command window 2 Type su root and press Enter to become the root user 3 Type Install_Home cimom bin slptool findsrvs service service agent and press Enter to verify the SLP service is runnin...

Page 364: ...Port is the IP address and port number that display when you use the slptool findsrvs service wbem command Home tab The Home tab of the SMIA Configuration Tool enables you to access the following Mana...

Page 365: ...e 1097 The Authentication tab enables you to configure mutual authentication for Client and Indication using a secure protocol Enabling or disabling CIM client and indication mutual authentication Whe...

Page 366: ...MOM server restart NOTE You can only restart the server using the Server Management Console Start Programs Management_Application_Name 12 X X Server Management Console 5 Click Close to close the SMIA...

Page 367: ...password in the Password field Select Management_Application Authentication to allow the CIM client to query the CIMOM server and the Management application server using the credentials configured on...

Page 368: ...ked default SSL is enabled If the check box is clear SSL is disabled 3 Enter the SMI Agent port number in the SMI Agent Port field This port number must be within the range of 1 through 65535 Defaults...

Page 369: ...st have SAN SMI Operation Read and Write privileges to view or make changes on the CIMOM tab For more information about privileges refer to User Privileges on page 1097 To configure the CIMOM log comp...

Page 370: ...tab NOTE You must have SMI Operation Read and Write privileges to view or make changes on the Certificate Management tab For more information about privileges refer to User Privileges on page 1097 The...

Page 371: ...n error message displays Click OK to close the message 6 Click Close to close the SMIA Configuration Tool dialog box Viewing a certificate NOTE You must have SMI Operation Read and Write privileges to...

Page 372: ...ent or Indication from the Authentication list The appropriate certificates display in the Certificates list 3 Select the certificate you want to delete in the Certificates list 4 Click Delete 5 Click...

Page 373: ...the indication mutual authentication is enabled or disabled for the Server Configuration and the Current Configuration CIMOM Server Authentication Displays whether or not the CIMOM server authenticat...

Page 374: ...Configuration and the Current Configuration Options include the following 10000 Off 1000 Severe 900 Warning 800 Info default 700 Config 500 Fine 400 Finer 300 Finest 0 All Managed Ports Displays the...

Page 375: ...stall_Home data databases Management_Application_Name db Professional only allows you to back up the configuration repository and save switch configuration For complete feature support you must upgrad...

Page 376: ...n demand Configure Configuration Save or by defining a schedule Configuration Schedule Backup Configuration files are uploaded from the selected switches and stored in individual files Files are named...

Page 377: ...o restore a switch configuration complete the following steps 1 Right click a device in the Product List or the Connectivity Map and select Configuration Restore The Restore Switch Configuration dialo...

Page 378: ...eduled for more than one fabric and some of the fabrics contain common members the backup will include the unique switch configuration values obtained from the fabrics NOTE The Management application...

Page 379: ...d deletes all back up configurations that exceed the maximum age allowed 4 Choose one of the following options to determine the scope of the backup Select the Backup all fabrics check box if necessary...

Page 380: ...The Switch Configuration Repository dialog box displays FIGURE 124 Switch Configuration Repository The Saved Switch Configurations table displays the following information Keep check box Select to kee...

Page 381: ...iguration sections You can also perform the following functions from this dialog box Keeping a copy past the defined age limit on page 336 Viewing configuration file content on page 333 Deleting a con...

Page 382: ...steps 1 Right click a device in the Product List or the Connectivity Map and select Configuration Configuration Repository The Switch Configuration Repository dialog box displays 2 Click View The conf...

Page 383: ...y The Switch Configuration Repository dialog box displays 2 Select the configuration you want to delete and click Delete Exporting a configuration NOTE This feature requires a Trial or Licensed versio...

Page 384: ...gure Configuration Configuration Repository The Switch Configuration Repository dialog box displays 2 Select the check box under Keep for the configuration you want to preserve The configuration will...

Page 385: ...All FC option Replicates the entire configuration including security settings Warning This is a disruptive operation and selected destination switches will be disabled prior to downloading the configu...

Page 386: ...the switch Available Switches table Configuration from the switch only Lists the information related to the available switches if you selected Configuration from the switch on the Source Location scr...

Page 387: ...ist of all switches Additional Port Info Additional information about the port Attached Port The number of the attached port BB Credit The BB Credit of the port Class The class value of the FICON devi...

Page 388: ...ated Zone Alias The zone alias Right and left arrow buttons Click to move the switches back and forth between the Available Switches table and the Selected Switches table Selected Switches table Lists...

Page 389: ...htweight Directory Access Protocol AD LDAP Server security policy If both the source and destination devices are running Fabric OS 7 1 or later also replicates the LDAP Role mapping configuration DCC...

Page 390: ...he switch port s top level addressing hierarchy of the domain Vendor The hardware vendor s name Model The name and model number of the hardware Port Count The total number of ports Firmware The firmwa...

Page 391: ...ry management on page 327 Configuration Management enables you to perform Group Configuration Upload and Replication For specific instructions for configuration management refer to Replicating configu...

Page 392: ...agement application software NOTE Non disruptive firmware download HCL is not supported when downgrading from Fabric OS version 7 0 to 6 4 You must remove all non default logical switches and disable...

Page 393: ...If you have your FTP SCP or SFTP server configured to use the built in FTP SCP or SFTP server select a specific version from the Firmware to Download column or use Select Latest to automatically sele...

Page 394: ...field A confirmation message displays Click Yes on the confirmation message This field does not display if the external server is installed on the same machine as the Management application and occup...

Page 395: ...on the same platform as the Management application software 1 Select Configure Firmware Management The Firmware Management dialog box displays 2 Select the Repository tab Figure 128 Initially the repo...

Page 396: ...the firmware repository Refer to Deleting a firmware file on page 349 6 Click Close to close the Firmware Management dialog box Importing a firmware file You can import firmware files release notes a...

Page 397: ...firmware file twice first when the firmware is downloaded to the client and again when the file is copied from the client to the server s repository If you configure the Management application to enfo...

Page 398: ...rames dialog box displays FIGURE 130 Discarded Frames dialog box 2 Select one of the following options from the Show list Select Only Supported Products with Dropped Frames in the Log The top table di...

Page 399: ...Management application the host name displays Source Port Source port name Source Switch Port Source Switch_Name Port_Name Source FID Source fabric ID Source Fabric Source fabric name Destination ID...

Page 400: ...s as 1 or 1 1 on slot based systems this indicates an internal backplane port Source ID Source ID in hex PID format Source Source name If the device port is an HBA managed by the Management applicatio...

Page 401: ...select a device in the upper table and click Refresh to fetch new data from the switch If you are in port view click Refresh to fetch new data from the switch 3 Click Close Properties customization Yo...

Page 402: ...label You can delete any label that you created on any of the tabs from the Properties dialog box To delete a label complete the following steps 1 Right click any product icon and select Properties Th...

Page 403: ...Port Connectivity The Port Connectivity View dialog box displays Figure 131 FIGURE 131 Port Connectivity View dialog box Loop devices are displayed in multiple rows one row for each related device po...

Page 404: ...o the remote destination is disabled Marginal Operational status is marginal Unknown Operational status is unknown Connected Port State The connected port s state for example online or offline Connect...

Page 405: ...ort Number The port s number Port Type The type of port for example U_Port universal port or FL_Port Fabric loop port Port WWN The world wide name of the port Prohibited Whether the allow prohibit mat...

Page 406: ...orts on the switch Switch Port Type The port type for example E Port F Port U port and so on Switch Role The role of the switch for example subordinate Switch Routing Policy Whether a routing policy f...

Page 407: ...olumn to select the property from which to filter the results 3 Click a blank cell in the Relation column to select an action operation The following actions are available contains matches 4 Define a...

Page 408: ...e Filter check box Disabling the filter To disable the filter clear the Filter check box Viewing port details To view port details complete the following steps 1 Right click the port for which you wan...

Page 409: ...d products On bridges and CNT products only utilized Fibre Channel ports display IP ports do not display Showing connected ports You can jump from a port to its connected port 1 Right click the produc...

Page 410: ...products TABLE 51 Port connection properties Field Description Product Properties table The product information for the two connected switches Domain ID The domain ID of the selected switch and produ...

Page 411: ...onnected Switch The name of the connected switch Cost The cost of the ISL link Distance Actual km The actual distance in km for end port connectivity Distance Estimated km The estimated distance in km...

Page 412: ...ited Whether the port is prohibited Protocol The network protocol for example Fibre Channel RA TOV The resource allocation time out value in milliseconds of the connected switch This variable works wi...

Page 413: ...port status You can determine whether a port is online or offline by looking at the Connectivity Map or the Product List On the Connectivity Map right click on the product whose ports you want to view...

Page 414: ...er Unknown icon The port is not a 16 Gbps capable port or the device is running Fabric OS 6 4 X or earlier Error icon Unable to retrieve status of the supported port Slot Port The slot and port number...

Page 415: ...TE Port commissioning is only supported on Fabric OS devices running Fabric OS 7 1 or later Port commissioning provides an automated mechanism to remove an E Port or F Port from use decommission and t...

Page 416: ...onal Enter a description of the CIMOM server in the field The description cannot be over 1024 characters CIMOM Port Enter the CIMOM port number for the CIMOM server in the field The default port numbe...

Page 417: ...To register a CIMOM server refer to Registering a CIMOM server on page 369 3 To edit a CIMOM server refer to Editing CIMOM server credentials on page 370 4 To import CIMOM servers refer to Importing...

Page 418: ...MOM server details in the database Editing CIMOM server credentials 1 Select Configure Port Commissioning Setup The Port Commissioning Setup dialog box displays Figure 135 2 Select a CIMOM server from...

Page 419: ...d Password the Management application provides default values 3 Browse to the location of the file csv format and click Open The imported CIMOM servers display in the Systems List 4 Click OK or Apply...

Page 420: ...CIMOM server credentials on page 372 6 Click OK to close the Port Commissioning Setup dialog box Testing CIMOM server credentials You should validate the CIMOM server credentials before you decommissi...

Page 421: ...client 1 Select the F Port then select Configure Port Commissioning Decommission Port The Port Commission Confirmation dialog box displays 2 Choose one of the following options Apply Default Settings...

Page 422: ...32 to maintain the decommissioned port details such as port type device port wwn and so on Do not accept changes in the Management application client Select the E Port then select Configure Port Commi...

Page 423: ...perform one of the following actions The Management application contact all registered CIMOM servers within the fabric affected by the action and obtains the status from each CIMOM server If all CIMOM...

Page 424: ...r failure Port commissioning deployment report The Configuration Deployment report contains the following parameters Configuration Name Name of the deployment For example Decommission Recommission swi...

Page 425: ...nstructions for discovering AD enabled fabrics are detailed in Discovering fabrics on page 41 Management application behavior for AD enabled fabrics Note the following considerations and interactions...

Page 426: ...ontext ADO AD255 Not supported All AD User interface impact Allow Prohibit Matrix X Filters AD enabled fabric from the Fabrics list Cascaded FICON FICON Merge X Filters AD enabled fabric from the Fabr...

Page 427: ...able Disable Port Enable Disable X None Routing Configuration X Filters switches from an AD enabled fabric from the dialog box SMI Agent X None SNMP Informs X None Syslog Registration X None Technical...

Page 428: ...rimitive Sequence NOS Not Operational Primitive Sequence LIP Loop Initialization Primitive Sequence NOTE To enable or disable the port auto disable flag the device must be running Fabric OS 6 3 or lat...

Page 429: ...he port icon Port Auto Disable Displays whether Port Auto Disable is currently enabled or disabled Port Block Status Displays whether the port is currently blocked Loss of Sync Whether the Loss of Syn...

Page 430: ...e NOS Not Operational Primitive Sequence LIP Loop Initialization Primitive Sequence To configure the port auto disable events complete the following steps 1 Select Configure Port Auto Disable The Port...

Page 431: ...figure Port Auto Disable dialog box displays 6 Select one or more of the following event types Port Auto Disable Loss Of Sync Requires devices running Fabric OS 7 0 or later Loss Of Signal Requires de...

Page 432: ...e running Fabric OS 6 3 or later To disable port auto disable on individual ports complete the following steps 1 Select Configure Port Auto Disable The Port Auto Disable dialog box displays 2 Select t...

Page 433: ...f the following selected event types Port Auto Disable Loss Of Sync Requires devices running Fabric OS 7 0 or later Loss Of Signal Requires devices running Fabric OS 7 0 or later OLS Offline Primitive...

Page 434: ...386 Brocade Network Advisor SAN User Manual 53 1002696 01 Port Auto Disable 12...

Page 435: ...to them and import an externally created Host port mapping file CSV to the Management application NOTE The Management application now enables you to map HBAs from multiple fabrics previous versions li...

Page 436: ...le by clicking once on any of the column titles HBA The world wide name of the node Fabric Name The fabric name WWN The world wide name for the fabric Connected Switch The label of the connected devic...

Page 437: ...BA Host To delete a Host complete the following steps 1 Right click an HBA icon in the Fabric topology and select Host Port Mapping The Host Port Mapping dialog box displays 2 Select the Host you want...

Page 438: ...K to save your changes and close the Host Port Mapping dialog box If the HBA is part of more than one fabric a message displays The selected Host_Name Host_WWN is part of more than one fabric The port...

Page 439: ...lete a result summary displays with the information listed in Table 53 5 Click OK to close the Import Results dialog box 6 Click OK to close the Host Port Mapping dialog box TABLE 53 Import Results Va...

Page 440: ...d from the Host Click OK to close the message On the Connectivity Map the HBA displays on its own Exporting Host port mapping The Host Port Mapping dialog box enables you to export a Host port The exp...

Page 441: ...g 13 4 Browse to the location where you want to save the export file Depending on your operating system the default export location are as follows Desktop My documents Windows root Linux 5 Enter a nam...

Page 442: ...394 Brocade Network Advisor SAN User Manual 53 1002696 01 Exporting Host port mapping 13...

Page 443: ...the system is unable to make The Management application allows you to create and assign properties to a Storage Device during the mapping process using the Storage Port Mapping dialog box Once a Stora...

Page 444: ...rray displays in the Storage Array list in edit mode 3 Rename the new storage array and press Enter 4 Add storage ports to the new storage array NOTE You must add at least one storage ports to the new...

Page 445: ...e other fabrics will automatically be removed from the storage array 3 Click the left arrow button The selected storage port is removed from the Storage Array list and added to the Storage Ports table...

Page 446: ...le in the lower right corner of the field 4 Click OK on the Properties dialog box to save the storage array properties 5 Click OK to save your work and close the Storage Port Mapping dialog box Deleti...

Page 447: ...es dialog box 6 Click OK on the Storage Port Mapping dialog box Importing storage port mapping The Storage Port Mapping dialog box enables you to import externally created storage port mapping informa...

Page 448: ...ave all current mappings when conflict occurs Click Cancel to cancel the import When import is complete a result summary displays with the following information Import Results on page 400 5 Click OK t...

Page 449: ...ay 20000037E19CED New Storage Array To export a storage port array complete the following steps 1 Select a storage port icon in the topology view then select Discover Storage Port Mapping The Storage...

Page 450: ...402 Brocade Network Advisor SAN User Manual 53 1002696 01 Exporting storage port mapping 14...

Page 451: ...witches and fabrics of the SAN using the Management application Adapters and hosts are visible as part of the fabrics managed by the Management application The Management application integrates with a...

Page 452: ...cade Fabric or M Enterprise operating systems TABLE 55 Brocade Fibre Channel HBA models Model number Description Number of ports Brocade 825 Dual port stand up HBA with a per port maximum of 8 Gbps us...

Page 453: ...lity BCU TABLE 56 Brocade Fibre Channel CNA models Model number Port speed Number of ports Adapter type Brocade 1741M k1 10 Gbps maximum 2 Expansion Brocade 1020 10 Gbps maximum 2 Stand up Brocade 101...

Page 454: ...t ship from the factory with 10 GbE SFP transceivers installed or no SFP transceivers installed are configured for Ethernet mode by default Fabric Adapter ports set in NIC mode appear as Ethernet port...

Page 455: ...nly FCoE ports CNA only Ethernet ports CNA only Diagnostics which enables you to test the adapters and the devices to which they are connected Link status of each adapter and its attached devices Loop...

Page 456: ...ter server can be discovered by adding a VM Manager to the Management application Refer to Chapter 4 Discovery for information about discovering VM Managers Adding a VM Manager 1 Click Add on the Disc...

Page 457: ...mum number of supported characters is 64 5 Enable or disable the vSphere client plug in registration If you enable this plug in events are forwarded from the Management application to the vCenter serv...

Page 458: ...the Management application server configurable during installation from the Server Configuration wizard Refer to the Brocade Network Advisor Installation Guide or Brocade Network Advisor Migration Gu...

Page 459: ...abric level views If you discover or import a fabric with more than approximately 2 000 devices the devices display on the Product List but not on the Connectivity Map Instead the topology area shows...

Page 460: ...ersion 3 0 3 1 or later The ability to update drivers to the hosts is available for hosts that are disovered through the Host Connectivity Manager HCM agent with driver version 2 3 0 0 or later Driver...

Page 461: ...rchitecture The host s architecture for example 32 bit or 64 bit Current Driver Version The host s current driver version Message Additional information pertaining to the selected host 4 Select the ho...

Page 462: ...a driver file from the repository 1 Select one or more driver files from the Available Driver Files list on the Driver Repository dialog box 2 Click Delete The driver file is removed from the Driver R...

Page 463: ...t are shipped without a boot image or when it is necessary to overwrite images on adapters that contain older or corrupted boot image versions 1 From the Management application menu bar select Configu...

Page 464: ...t Image dialog box displays 6 Locate the boot image file using one of the following methods Search for the file you want from the Look In list Boot image files version 2 0 0 0 and 2 1 0 0 are zip file...

Page 465: ...t dialog box click the Update button to download a boot image to one or more selected hosts One of the following download status messages displays in the Status column of the Selected Hosts list Ready...

Page 466: ...ports You cannot edit the default configurations but you can delete them Default Port The port property The default value is Enabled Default FDFS The Frame Data Field Size property The default value i...

Page 467: ...ialog box 2 Enter a name for the port configuration in the Configuration Name field A maximum of 128 alphanumeric characters is supported 3 Configure at least one of the following port properties Port...

Page 468: ...es and the default value is 0 minutes The Bootup Delay feature allows you to configure the delay to device discovery offsetting the disk spinup delay time when servers and storage devices are powered...

Page 469: ...te indicated by Completed in the Progress list Editing a port configuration The Edit Port Configuration dialog box allows you to modify port configuration parameters that were configured using the Add...

Page 470: ...ent in the network Preconfigure boot LUN zoning You can configure Solaris ports or Linux ports on the switch enabling the server to boot automatically with the predefined boot LUNs NOTE Fabric Assigne...

Page 471: ...us dialog box Disabling the FAWWN feature on a switch or AG ports 1 Select Configure Fabric Assigned WWN or Right click the switch and select Fabric Assigned WWN The Configure Fabric Assigned WWNs dia...

Page 472: ...FAWWN on a switch or AG port 1 Select Configure Fabric Assigned WWN or Right click the switch and select Fabric Assigned WWN The Configure Fabric Assigned WWNs dialog box displays 2 Select a switch po...

Page 473: ...The Configure Fabric Assigned WWNs dialog box displays 2 Click the Attached AG Ports tab The Configure Fabric Assigned WWNs dialog box Attached AG Ports tab displays FIGURE 147 Configure Fabric Assign...

Page 474: ...ned WWN Configuration AG Ports list Deleting AG port FAWWNs 1 Select Configure Fabric Assigned WWN or Right click the switch and select Fabric Assigned WWN The Configure Fabric Assigned WWNs dialog bo...

Page 475: ...ons to the Host Adapter Management privilege Other HBA related operations are controlled by the following privileges The HBA technical support launch point is controlled by the Technical Support Data...

Page 476: ...t measures and CNA port measures The ports are properly filtered to display only the CNA or HBA port based on the selection Table 58 lists the counters that are supported for the FC ports and for the...

Page 477: ...r FC SP is not available for virtual ports or unmanaged HBA ports The user must have the Security privilege to use this feature FC SP is not supported for hosts connected to Access Gateway mode enable...

Page 478: ...hat verifies a message s integrity using Message Digest version 5 MD5 produces a 128 bit digest and is the required authentication mechanism for LDAP v3 servers SHA1 A secure hashing algorithm that co...

Page 479: ...and sends a notification or runs a script when the specified condition is met Creates event based policies which contain an event trigger and action Configures e mail event notifications Receives and...

Page 480: ...the HCM Agent CIM events are only logged in the master log and the forwarding of CIM events is not supported Syslog forwarding is the process by which you can configure the Management application to...

Page 481: ...eck box to back up boot image files from the boot image repository Select the Include FTP Root directory check box If you select the FTP Root directory the FTP Root sub directories Technical Support a...

Page 482: ...alog box displays 2 Select Server Backup in the Category list 3 Select the Enable Backup check box 4 Click Apply or OK Disabling backup Backup is enabled by default If you want to stop the backup proc...

Page 483: ...485 FCoE overview Fibre Channel over Ethernet FCoE leverages Ethernet enhancements called Data Center Bridging DCB to transport encapsulated Fibre Channel frames over Ethernet Ethernet is the physical...

Page 484: ...e bandwidth that is not being used by higher priority traffic classes and maximizes the use of available bandwidth ETS allows configuration of bandwidth per priority group Priority group ID usage is d...

Page 485: ...ic OS FCoE converged network adapter supports two layers of protocols Ethernet link layer and FCoE layer Ethernet link layer protocols supported The following protocols support the Ethernet link layer...

Page 486: ...ists discovered DCB switches with Fabric OS version 6 3x firmware or later You can select available switches and move them to the Selected Switches list Upon startup the DCB switch configuration is co...

Page 487: ...tch Configuration dialog box you are prompted to select one of two restoration methods As the running configuration and reboot Rebooting a switch connected to a fabric will stop all traffic to and fro...

Page 488: ...ts The default name in the device tree is ExT slot port Internal ports The default name for the 12 or 14 internal ports is InT slot port 802 1x LAG configuration and Spanning Tree Protocol STP are not...

Page 489: ...When you create a DCB map you specify the precedence priority and then you map the priority groups with the Class of Service CoS and apply bandwidth percentages Refer to QoS configuration on page 455...

Page 490: ...n Reason column shown in Figure 150 displays the values only for the external ports of embedded platforms but not for the internal ports FIGURE 150 DCB Configuration dialog box Minimum DCB configurati...

Page 491: ...onfiguration dialog box displays 2 Select the switch to edit from the Products Ports list and click Edit The Edit Switch dialog box displays 3 Click the QoS tab The Edit Switch dialog box QoS tab disp...

Page 492: ...through 15 7 must equal 0 If you set a CoS value to one or more of the PG IDs 0 7 you must also enter a non zero bandwidth percentage The total bandwidth percentage must equal 100 For PG IDs 0 7 that...

Page 493: ...to save the changes to the switch 9 Click Close to close the Deployment Status dialog box Configuring the DCB interface with the DCB map and global LLDP profile To configure the DCB interface complete...

Page 494: ...the Dell M8428 k switch You must use Web Tools to complete this procedure for the Brocade 8000 switch or the FCOE10 24 port blade To create the FCoE VLAN complete the following steps This procedure is...

Page 495: ...roup 1 vlan 1002 4 Save the running config file to the startup config file Example switch copy running config startup config Adding a LAG Link aggregation based on the IEEE 802 3ad protocol is a mecha...

Page 496: ...LAG You must enable the LAG to use the DCB functionality Interface Mode Select None or L2 Ports that are in L2 mode cannot be added to a LAG The L3 interface mode option is displayed in the Edit LAG d...

Page 497: ...nly the first port is considered as part of the LAG Mode Sets all ports added to the LAG members table in either Static or Dynamic mode The default is Dynamic Active but LAG members can be Active or P...

Page 498: ...nfiguration on page 467 802 1x authentication on page 470 5 When you have finished configuring the policies apply the settings to the switch NOTE Clicking Cancel when there are pending changes launche...

Page 499: ...u can then assign the primary and secondary IP addresses L2 mode The L2 mode is enabled if you select L2 as the interface mode If a DCB port is enabled on the 10 Gbps DCB FC switch module the L2 mode...

Page 500: ...deployment The Deployment Status dialog box launches 8 Click Start on the Deployment Status dialog box to save the changes to the selected port or ports 9 Click Close to close the Deployment Status di...

Page 501: ...IP address represents the network and which portion represents the host and can only be configured if the interface mode is L3 Primary and secondary IP address fields are applicable only to the extern...

Page 502: ...nable The Confirmation and Status dialog box launches with the selected ports or LAGs 4 Click Start on the Confirmation and Status dialog box to save the changes to the selected ports or LAGs The sele...

Page 503: ...ng the network to create a no drop Class of Service CoS for an individual virtual link Table 60 shows examples of how priority grouping might be allocated in a 15 priority group scenario Creating a DC...

Page 504: ...in the DCB Map table Name Enter a name to identify the DCB map Only one DCB map the default is supported on Fabric OS version 6 3 1_dcb and version 7 0 0 and later Precedence Enter a value from 1 thr...

Page 505: ...t Configure DCB The DCB Configuration dialog box displays showing the status of all DCB related hardware and functions 2 Select a switch and click Edit 3 Click the QoS tab on the Edit Switch dialog bo...

Page 506: ...is only one DCB map the default which you cannot delete 7 Click OK after changing the attributes of the current deployment The Deployment Status dialog box launches 8 Click Start on the Deployment Sta...

Page 507: ...Ds 0 7 7 When you have finished the configuration click OK to launch the Deploy to Ports LAGs dialog box Creating a Traffic Class map 1 Select Configure DCB from the menu bar The DCB Configuration dia...

Page 508: ...nd click Edit 3 Click the QoS tab on the Edit Switch dialog box The QoS dialog box displays 4 Select a Traffic Class map that you want to delete from the Traffic Class Maps list 5 Click the left arrow...

Page 509: ...ps required to configure a DCB port to carry the FCoE traffic The FCoE map contains the default DCB map and the VLAN ID You can change the default VLAN ID using the FCoE tab of the Edit Switch dialog...

Page 510: ...vices Enabling or disabling the FCoE map on the port You must first manually disable an FCoE map enabled port if you want to edit the VLAN ID of the FCoE map Refer to Changing the VLAN ID on the defau...

Page 511: ...es MAC address based classifier rules VLAN classifiers are created on a per switch basis NOTE The VLAN Classifiers tab on the Edit Switch dialog box displays only on switches with Fabric OS versions 7...

Page 512: ...is or change the number using a value from 1 through 256 6 Select a rule type Valid rule types are MAC MAC address based rule and Proto 802 1Q protocol based rule 7 If Ethernet Type is selected as th...

Page 513: ...ed rule 3 If Ethernet is selected as the protocol based rule type enter any valid four digit hexadecimal value within the allowed range of 0x0000 through 0xFFFF For the other Proto options the hex ID...

Page 514: ...yed in the VLAN Classifier list 6 Select the classifier from the VLAN Classifier list and then select the rules you want to add under this classifier from the VLAN Classifier Rules list If no rules ar...

Page 515: ...ed DCB enhancements You must enable the DCBX protocol and configure certain parameters in order to effectively utilize the benefits of a converged network Using the LLDP DCBX dialog box you can create...

Page 516: ...t Both Tx transmitted or Rx received Tx only or Rx only Enter a hello interval time in seconds for the bridge in the Hello secs field The value range is from 4 through 180 and the default value is 30...

Page 517: ...ters 8 When you have finished the configuration click OK to launch the Deploy to Products dialog box Deleting an LLDP profile 1 Select Configure DCB from the menu bar The DCB Configuration dialog box...

Page 518: ...he Assign an LLDP profile dialog box displays 4 Click Assign an LLDP profile to port name button to enable the feature NOTE Assign the Global Configuration is the default The Available Profiles list i...

Page 519: ...r The DCB Configuration dialog box displays showing the status of all DCB related hardware and functions 2 Select a switch and click Edit 3 Click the 802 1x tab on the Edit Switch dialog box 4 Clear t...

Page 520: ...hentication exchange with the client The value range is 1 to 65535 seconds The default value is 60 Re authentication State Enable or disable the periodic re authentication of the client The default is...

Page 521: ...onfigurations The switch port and LAG deployment dialog boxes provide common deployment options save configuration options and schedule options Depending on which product port or LAG you select the De...

Page 522: ...474 Brocade Network Advisor SAN User Manual 53 1002696 01 Switch port and LAG deployment 16 FIGURE 163 Deploy to Ports dialog box FIGURE 164 Deploy to LAGs dialog box...

Page 523: ...e only option The name of the origin product is a read only field The origin product receives the entire configuration unless it is removed from the Selected Targets list 8 Select one or more of the f...

Page 524: ...0 24 DCB blade with Fabric OS version 6 4 2 or earlier Excludes Brocade Converged 10 Gbe switch module for IBM BladeCenter with Fabric OS 6 3 1_cee Fabric OS 6 4 1_fcoe and Fabric OS 6 3 1_dcb You can...

Page 525: ...a FOS device complete the following steps 1 Click the SAN tab 2 Select a DCB port from the DCB Configuration dialog box and select Real Time Graph from the Performance list A message displays promptin...

Page 526: ...nerate a real time performance graph for a NOS DCB switch complete the following steps 1 Click the IP tab 2 Select a DCB port from the DCB Configuration dialog box and select Real Time Graph from the...

Page 527: ...en the Performance dialog box The Historical Performance Graph dialog box displays For complete information about Real Time Performance Graphs refer to SAN real time performance data on page 903 Histo...

Page 528: ...information The topology displays directly connected converged network adapters CNAs and the Properties dialog box for the virtual FCoE port details Without the FCoE license the virtual FCoE port disp...

Page 529: ...ialog box where you can edit the login group parameters See Editing an FCoE login group on page 483 Click Delete to remove the login group from the list See Deleting one or more FCoE login groups on p...

Page 530: ...g Available Member options Port WWN Click to enter the world wide name WWN of the port to associate with the selected switch The member port WWN text field allows a maximum of 16 digits Managed CNAs C...

Page 531: ...tasks Rename the login group by entering the new name into the Name field The Allow All option must be selected to rename the login group Select one of the following options to add or remove login mem...

Page 532: ...FCoE login management feature on a switch 1 Select Configure FCoE from the menu bar or Right click the DCB device and select FCoE The FCoE Configuration dialog box displays 2 Select an FCoE enabled s...

Page 533: ...tual FCoE port Viewing virtual FCoE ports Configuration of virtual FCoE ports requires installation of the FCoE license on the switch NOTE For NOS switches running the Network OS version 3 0 and later...

Page 534: ...because a port went down after an FLOGI was received the device failed to receive the message The entry in the FCoE Connected Devices table becomes stale and you must clear it manually NOTE Clearing a...

Page 535: ...FCoE port configuration 16 4 Click Start to apply the changes or click Close to abort the operation On closing the DCB Confirmation and Status dialog box the FCoE Configuration Dialog refreshes the d...

Page 536: ...488 Brocade Network Advisor SAN User Manual 53 1002696 01 Virtual FCoE port configuration 16...

Page 537: ...he frame sequentially against each rule in the assigned ACL If the frame matches the permit rule the traffic is forwarded otherwise the traffic is dropped You should configure the ACL on the device be...

Page 538: ...Enter a name for the ACL in the Name field 5 Enter a sequence number for the ACL in the Sequence field 6 Select Permit or Deny from the Action list 7 In the Source list select one of the following op...

Page 539: ...tional ACL entries repeat step 3 4 To add a new ACL rule complete step 4 through step 9 in Creating a standard Layer 2 ACL configuration Fabric OS on page 490 The new ACL entry displays in the ACL Ent...

Page 540: ...ries list and click the left arrow button 7 Click OK on the Duplicate Layer 2 ACL Configuration dialog box The new ACL configuration displays in the ACLs list To copy additional ACLs repeat step 2 thr...

Page 541: ...filtered allowed or denied for the ACL rule 10 Select the Ether Type check box to specify the Ethernet protocol 11 In the Ether Type list select one of the following to specify the Ethernet type bein...

Page 542: ...n existing ACL rule select the rule you want to edit in the ACL Entries list and click the left arrow button 6 Click OK on the Edit Layer 2 ACL Configuration dialog box The updated ACL displays in the...

Page 543: ...ick OK on the Device_Name Layer 2 ACL Configuration dialog box The Deploy to Products Layer 2 ACL dialog box displays To save the configuration refer to Saving a security configuration deployment on p...

Page 544: ...ment on page 498 Clearing Layer 2 ACL assignments Fabric OS To clear Layer 2 ACL configuration from interfaces complete the following steps 1 Select Configure Security Layer 2 ACL Port The Port Select...

Page 545: ...4 Click OK on the Device_Name Layer 2 ACL Configuration dialog box NOTE The Layer 2 ACL configuration is not deleted from the switch until you deploy the configuration to the switch The Deploy to Prod...

Page 546: ...Security Management enables you to configure persist and manage a security configuration as a deployment configuration object A deployment configuration object is comprised of the following parts Sec...

Page 547: ...t saved to the product s flash memory Save to running and startup Select to update the running configuration as well as save the deployment configuration to the product s flash memory Selecting this o...

Page 548: ...as well as save the deployment configuration to the product s flash memory Selecting this option is the equivalent to a write memory command on the product CLI Save to running and startup then reboot...

Page 549: ...e list and click Edit The Edit Layer 2 ACL Configuration dialog box displays 3 Configure the Layer 2 ACL and click OK on the Add Edit Layer 2 ACL Configuration dialog box 4 Click OK on the Device_Name...

Page 550: ...right arrow button to move them to the Selected Targets list 13 Click OK on the Deploy to Products Layer 2 ACL dialog box Configuring a one time deployment schedule To configure a one time schedule co...

Page 551: ...you want deployment to run from the Time hh mm lists Where the hour value is from 1 through 12 the minute value is from 00 through 59 and the day or night value is AM or PM 3 Select the day you want...

Page 552: ...504 Brocade Network Advisor SAN User Manual 53 1002696 01 Security configuration deployment 17...

Page 553: ...ng domain IDs 510 Devices that support Fibre Channel routing The FC FC Routing Service is supported only on the following devices 40 port 8 Gbps FC Switch 80 port 8 Gbps FC Switch 24 port 16 Gbps Edge...

Page 554: ...nes to cross physical SAN boundaries without merging the fabrics and while maintaining the access controls of zones Refer to the Fabric OS Administrator s Guide for detailed information about Fibre Ch...

Page 555: ...The following are some general guidelines for setting up Fibre Channel routing Ensure that the backbone fabric ID of the FC router is the same as that of other FC routers in the backbone fabric On the...

Page 556: ...f you are connecting Fibre Channel SANs through an IP based network see Configuring an FCIP tunnel on page 776 for instructions on setting up an FCIP tunnel between a VE_Port and a VEX_Port ATTENTION...

Page 557: ...ly and opens the FC Router dialog box and Port Configuration wizard For more information refer to the Web Tools Administrator s Guide 7 Follow the instructions in the Port Configuration wizard to conf...

Page 558: ...1 In the Product List or Connectivity Map right click the fabric for which you want to configure logical domains and select Routing Domain IDs The Configure Routing Domain IDs dialog box is displayed...

Page 559: ...ew your entire SAN both physical and virtual at a glance Enables you to manage a logical switch the same as a physical switch so that fewer physical chassis are required for Management application dep...

Page 560: ...e default logical switch always exists as long as Virtual Fabrics is enabled You cannot delete the default logical switch The default logical switch supports all E_Ports and F_Ports Base switch A spec...

Page 561: ...switch For the other switches any port can be assigned to any logical switch logical switch default logical switch or base switch Depending on the logical switch type the backbone chassis have the por...

Page 562: ...eate base switches in each physical chassis and assign ports to them Refer to Creating a logical switch or base switch on page 516 for instructions b Disable the base switches in each physical chassis...

Page 563: ...t has a lower cost d Enable all logical switches in each chassis Right click each logical switch in the Connectivity Map or Product List and select Enable Disable Enable The logical fabric is formed E...

Page 564: ...log box displays FIGURE 183 Logical Switches dialog box 2 Select the physical chassis from which you want to create a logical switch in the Chassis list 3 Select one of the following in the Existing L...

Page 565: ...he Base Fabric for Transport check box In the following cases make sure the Base Fabric for Transport check box is cleared because XISL use is not supported FICON logical fabrics for switches running...

Page 566: ...ted logical switch has no ports To assign ports to the logical switch refer to Assigning ports to a logical switch on page 519 If the newly created logical switch is not part of a discovered fabric th...

Page 567: ...the Existing Logical Switches list 7 Click OK on the Logical Switches dialog box The Logical Switch Change Confirmation and Status dialog box displays with a list of all changes you made in the Logic...

Page 568: ...boxes are selected by default NOTE Ports are disabled before moving from one logical switch to another 9 Optional Select the Unbind Port Addresses while moving them check box 10 Click Start to send t...

Page 569: ...cal fabric A logical fabric is created only when you assign logical switches to a fabric ID FID The logical fabric template exists only in the lifetime and scope of the Logical Switches dialog box Whe...

Page 570: ...abric parameters for the selected logical switch to all logical switches in the fabric 1 Select Configure Virtual Fabric Logical Switches The Logical Switches dialog box displays 2 Right click anywher...

Page 571: ...ports after moving them and QoS disable the ports while moving them check boxes are selected by default NOTE Ports are disabled before moving from one logical switch to another 8 Optional Select the...

Page 572: ...ow displays Yes for the logical switch 8 Click OK on the Logical Switches dialog box The Logical Switch Change Confirmation and Status dialog box displays with a list of all changes you made in the Lo...

Page 573: ...565 Steps for connecting to a TKLM appliance 570 Steps for connecting to a KMIP appliance SafeNet KeySecure 574 Encryption preparation 591 Creating a new encryption group 592 Adding a switch to an en...

Page 574: ...185 Encryption Center dialog box Beginning with Fabric OS 6 4 the Encryption Center is dynamically updated to reflect the latest changes based on any of the following events Encryption group creation...

Page 575: ...ption security Table 65 lists the associated roles and their read write access to specific operations The functions are enabled from the Encryption Center dialog box TABLE 65 Encryption privileges Pri...

Page 576: ...on switches are supported Using authentication cards with a card reader When authentication cards are used one or more authentication cards must be read by a card reader attached to a Management appli...

Page 577: ...85 on page 526 2 Select an encryption group from the Encryption Center Devices table then select Group Security from the menu task bar to display the Encryption Group Properties dialog box The Securit...

Page 578: ...FIGURE 187 Add Authentication Card dialog box The dialog box contains the following information Card Serial A serial number read from the smart card Card Assignment The first and last name of the pers...

Page 579: ...table then select Group Security from the menu task bar to display the Encryption Group Properties dialog box The Security tab is selected Figure 188 FIGURE 188 Encryption Group Properties dialog box...

Page 580: ...cards To authenticate using a quorum of authentication cards complete the following steps 1 When using the Authenticate dialog box gather the number of cards needed according to the instructions in t...

Page 581: ...it will function as an ordinary FC switch or blade when it is powered up but use of the encryption engine is denied To register a system card from a card reader the smart card must be physically avai...

Page 582: ...OK Registering systems card from a card reader To register a system card from a card reader a smart card must be physically available System cards can be registered during encryption group creation o...

Page 583: ...g dialog box displays two tables Smart Cards table and Card Details table Selecting an authentication in the Smart Cards table displays all group names for which the card is registered in the Card Det...

Page 584: ...information that is stored on the card Notes Miscellaneous notes up to 256 characters related to the smart card Editing these values in the Management application does not modify the information that...

Page 585: ...pplication database Deleting smart cards from the Management application database keeps the Smart Cards table at a manageable size but does not invalidate the smart card The smart card can still be us...

Page 586: ...E The Card Password field is activated after the card ID is read and the Login button is activated after the password is entered in the Card Password field 4 Edit the card as needed Note the following...

Page 587: ...lades Both ports of each encryption switch or blade must be connected to the same IP network and the same subnet Static IP addresses should be assigned Neither VLANs nor DHCP should be used These two...

Page 588: ...interface IP address and mask Eth1 IP Mask identifies the Ge1 interface IP address and mask The Gateway IP address is optional 4 Click OK Encryption node initialization and certificate generation When...

Page 589: ...losing older keys that were created with earlier versions of Fabric OS For other supported key vaults only new installations are allowed to use the KMIP key vault type KMIP will work for any key serv...

Page 590: ...ient device User Name and Password Both a user name and a password are required to identify the client device None No authentication is required The TLS certificates used between the Fabric OS encrypt...

Page 591: ...es e Security keyAuthority TEKA If an encryption group contains mixed firmware nodes the Encryption Group Properties Key Vault Type name is based on the firmware version of the group leader For exampl...

Page 592: ...expiry on page 545 4 Import the signed certificate into the Fabric OS encryption node Refer to Importing the signed KAC certificate on page 546 5 Upload the signed KAC and CA certificates onto the DPM...

Page 593: ...a signed CA certificate are returned 4 Download and store the signed certificates The following example submits a CSR to the demoCA from RSA cd opt CA demoCA openssl x509 req sha1 CAcreateserial in ce...

Page 594: ...d KAC certificate After a KAC CSR has been submitted and signed by a CA the signed certificate must be imported into the switch 1 Select a switch from the Encryption Center Devices table then select S...

Page 595: ...your encryption group or the number of encryption groups that will be sharing this DPM kcn 1998 01 com brocade DEK_AES_256_XTS kcn 1998 01 com brocade DEK_AES_256_CCM kcn 1998 01 com brocade DEK_AES_2...

Page 596: ...proceeding to Loading the CA certificate onto the encryption group leader on page 548 DPM key vault high availability deployment When dual DPM appliances are used for high availability the DPM applia...

Page 597: ...blade and the NetApp LKM SSKM appliance using a shared secret called a link key One link key per encryption switch is established with each LKM SSKM appliance only one link key is established with eac...

Page 598: ...he following steps 1 Open an SSH connection to the NetApp LKM SSKM appliance and log in host ssh admin 10 33 54 231 admin 10 33 54 231 s password Copyright c 2001 2009 NetApp Inc All rights reserved N...

Page 599: ...the key vault The signed switch certificate may be imported directly by a key vault FIGURE 196 Export switch certificate dialog box 3 Select Signed switch certificate X 509 which allows you to export...

Page 600: ...og box then click Approve to approve the TEP A list of recovery cards and recovery officers is displayed TEP approval is done by a quorum of recovery officers using assigned recovery cards Each recove...

Page 601: ...archival of the DEK to the primary LKM SSKM fails an error is logged and the operation is retried If the failure occurs after archival of the DEK to the primary LKM SSKM but before synchronization to...

Page 602: ...rent LKM SSKM you must first synchronize the DEKs from the primary LKM SSKM before reregistering the secondary LKM SSKM Steps for connecting to an ESKM SKM appliance The ESKM SKM management web consol...

Page 603: ...r all keys created by encryption switches and blades This needs to be done only once for each key vault 1 Log in to the ESKM SKM management web console using the admin password 2 Select the Security t...

Page 604: ...red so only one set of credentials is needed Secondary Key Vault Secondary Key Vault is active only if you are using a TEKA key vault User Name Enter a user name for the group leader User Group Name D...

Page 605: ...console using the admin password 2 Select the Security tab 3 Under Certificates CAs click Local CAs 4 Enter information required by the Create Local Certificate Authority section of the window to cre...

Page 606: ...st created Repeat these steps any time another local CA is needed Downloading the local CA certificate from ESKM SKM The local CA certificate you created using the procedure for Setting up the local C...

Page 607: ...ficate data from BEGIN CERTIFICATE REQUEST to END CERTIFICATE REQUEST lines Be careful to exclude extra carriage returns or spaces after the data 8 Under Certificates CAs select Local CAs The Certific...

Page 608: ...and 3600 respectively For Server Certificate select the name of the certificate you created in Creating and installing the ESKM SKM server certificate on page 559 5 Click Save Creating an ESKM SKM Hig...

Page 609: ...T Be careful not to include any extra characters Adding ESKM SKM appliances to the cluster If you are adding an appliance to an existing cluster select the Cluster Settings section of the window click...

Page 610: ...be imported back into the encryption node 1 Select Configure Encryption from the menu task bar to display the The Encryption Center dialog box Refer to Figure 185 on page 526 2 Select a switch from t...

Page 611: ...cate dialog box displays Figure 199 FIGURE 199 Import Signed Certificate dialog box 2 Browse to the location where the signed certificate is stored then click OK The signed certificate is stored on th...

Page 612: ...SKMs or SKMs in the cluster Upon successful archival of the DEK to the ESKM SKM cluster the DEK can be used for encryption of the tape LUN If archival of the DEK to the ESKM SKM cluster fails an error...

Page 613: ...ions to TEKA Refer to Setting up TEKA network connections on page 565 Create a TEKA client Refer to Creating a client on TEKA on page 567 Establish TEKA key vault credentials Refer to Establishing TEK...

Page 614: ...TEKA Network Settings 2 Enter the management IP address information under Management Interface 3 Enter the client IP address information under KM Server Interface 4 Enter a host name for the appliance...

Page 615: ...table select a switch that needs to have a TEKA Client then select Properties 2 Click Key Vault User Name The Key Vault User Information dialog box displays Figure 201 FIGURE 201 TEKA Key Vault User...

Page 616: ...y one set of credentials is needed Secondary Key Vault selector Active only if you are using a TEKA key vault User Name Used for creating the client account on the key vault User Group Name Used for c...

Page 617: ...4 In the user table under the Certificate column click the pen icon for the newly created user The Sign Certificate Request page displays 5 Enter the CSR file name exported from the switch in the Fro...

Page 618: ...LINUX host Refer to Exporting the Fabric OS node self signed KAC certificates on page 571 2 Obtain the necessary user credentials and log in to the TKLM server appliance from the TKLM management web c...

Page 619: ...ocess however if you need to manually convert the file before importing it to the TKLM server you can do so by completing the following steps 1 Go to openssl utility 2 Run openssl x509 outform der in...

Page 620: ...an external LINUX host must now be imported into the TKLM server file system You must import the KAC certificate in der format To do this refer to Converting the KAC certificate format on page 571 1 I...

Page 621: ...ory ibm tivoli tiptklmV2 products tklm 4 Transfer the TKLM certificate that was previously exported into the TKLM server file system to the Management application host using any binary file transfer m...

Page 622: ...ugh step 6 on the primary node then complete step 7 on the secondary node If only a single node is being configured step 7 is not needed The following is a suggested order of steps that must be comple...

Page 623: ...Management Console select the Security tab then select Advanced Security High Security The High Security Configuration page displays Figure 206 FIGURE 206 KeySecure High Security Configuration page 2...

Page 624: ...ays Figure 207 FIGURE 207 KeySecure Certificate and CA Configuration Create Local Certificate Authority 2 Under Create Local Certificate Authority enter the organization information in the fields prov...

Page 625: ...displays Figure 209 FIGURE 209 KeySecure Certificate and CA Configuration page 2 Under Create Certificate Request enter your organization information in the fields provided then click Create Certifica...

Page 626: ...GURE 210 KeySecure Certificate and CA Configuration Certificate List 4 Click on the server certificate name you just created Safenet75ServerCert which will display the certificate contents Figure 211...

Page 627: ...E 212 KeySecure Certificate and CA Configuration Local Certificate Authority List 7 Under Local Certificate Authority List select the local CA certificate you just created SafeNetCA then click Sign Re...

Page 628: ...and the certificate information is displayed under Certificate Request Information Figure 214 FIGURE 214 KeySecure Certificate and CA Configuration Certificate Request Information 10 Click Download af...

Page 629: ...rtificate Installation text box then click Save Figure 215 FIGURE 215 KeySecure Certificate and CA Configuration Certificate Installation After the page refreshes the new certificate information is di...

Page 630: ...then select Device Configuration Cluster The Cluster Configuration page displays Figure 217 FIGURE 217 KeySecure Cluster Configuration page 2 Under Create Cluster enter a user defined password in the...

Page 631: ...onnecting to a KMIP appliance SafeNet KeySecure 20 FIGURE 218 KeySecure Cluster Configuration page 4 Under Cluster Settings click Download Cluster Key Figure 219 You will be prompted to enter a local...

Page 632: ...Certificate dialog box displays 3 Select Public Key Certificate Request CSR then click OK You are prompted to save the CSR which can be saved to your SAN Management Program client PC or an external ho...

Page 633: ...est 14 Download the signed certificate to your local system as signed_kac_eskm_cert pem or signed_kac_skm_cert pem depending on your key vault type This file is ready to be imported to the encryption...

Page 634: ...ed on the switch Backing up the certificates 1 From the KeySecure Management Console select the Device tab then select Maintenance Backup Restore Create Backup The Backup and Restore page displays Fig...

Page 635: ...ce items 5 Select the items for backup then click Continue The Create Backup dialog box displays Figure 224 which is used for setting backup details FIGURE 224 Backup and Restore Backup details 6 Ente...

Page 636: ...ice Configuration Key Server Key Server The Cryptographic Key Server Configuration page displays Figure 225 FIGURE 225 KeySecure Cryptographic Key Server Configuration page 2 Under Cryptographic Key S...

Page 637: ...FIGURE 226 KeySecure Cluster Configuration page 2 Under Join Cluster enter the cluster information that you configured for the primary KeySecure node Refer to Creating a cluster on page 582 3 Enter t...

Page 638: ...227 KeySecure Cluster Configuration Cluster Members 7 From the Devices tab select Maintenance Backup and Restore Restore Backup The Backup and Restore page displays Figure 228 FIGURE 228 KeySecure Ba...

Page 639: ...e you should have a detailed configuration plan in place and available for reference The encryption setup wizard assumes the following You have a plan in place to organize encryption devices into encr...

Page 640: ...Center dialog box No group defined 2 Select a switch from the NO GROUP DEFINED encryption group The switch must not be assigned to an encryption group 3 Select Encryption Create Add to Group from the...

Page 641: ...e screen 4 From the Configure Switch Encryption welcome screen click Next to begin The Designate Switch Membership dialog box displays Figure 232 The dialog box contains the following options Create a...

Page 642: ...For this procedure verify that Create a new encryption group containing just this switch is selected then click Next NOTE If you are adding a switch to an encryption refer to Adding a switch to an en...

Page 643: ...lover When the first encryption engine comes back online the encryption group s failback setting auto or manual determines whether the first encryption engine automatically resumes encrypting and decr...

Page 644: ...ryption Group Properties Key Vault Type name is based on the firmware version of the group leader For example If a switch is running Fabric OS 7 1 0 or later the Key Vault Type is displayed as Thales...

Page 645: ...s for RSA Data Protection Manager DPM on page 597 For LKM SSKM key vault setting instructions see Configuring key vault settings for NetApp Link Key Manager LKM SSKM on page 604 For ESKM SKM key vault...

Page 646: ...oad balancers are used to direct traffic to the appliances Use the IP address of the load balancer 2 Enter the name of the file that holds the Primary Key Vault s CA Key Certificate or browse to the d...

Page 647: ...in which you want to store the certificate information or browse to the file location The certificate stored in this file is the switch s Switch Certificate Signing file You will need to know this pa...

Page 648: ...e file in which you want to store back up master key information or browse to the desired location 8 Enter the passphrase which is required for restoring the master key The passphrase can be between e...

Page 649: ...size is five cards The actual number of authentication cards registered is always more than the quorum size so if you set the quorum size to five for example you will need to register at least six ca...

Page 650: ...figuration Status dialog box displays Figure 240 FIGURE 240 Configuration Status dialog box 12 Review the post configuration instructions which you can copy to a clipboard or print for later then clic...

Page 651: ...r Manual 603 53 1002696 01 Creating a new encryption group 20 FIGURE 241 Next Steps dialog box 13 Review the post configuration instructions which you can copy to a clipboard or print for later then c...

Page 652: ...age 592 Figure 242 shows the key vault selection dialog box for LKM SSKM FIGURE 242 Select Key Vault dialog box for LKM SSKM 1 Enter the IP address or host name for the primary key vault 2 Enter the n...

Page 653: ...file in which you want to store the public key certificate that is used to authenticate connections to the key vault The certificate stored in this file is the switch s public key certificate You will...

Page 654: ...size is five cards The actual number of authentication cards registered is always more than the quorum size so if you set the quorum size to five for example you will need to register at least six ca...

Page 655: ...log box displays Figure 246 FIGURE 246 Configuration Status dialog box All configuration items have green check marks if the configuration is successful A red stop sign indicates a failed step A messa...

Page 656: ...n 8 Verify the information is correct then click Next The Next Steps dialog box displays Figure 247 Instructions for installing public key certificates for the encryption switch are displayed These in...

Page 657: ...ey Vault dialog box for ESKM SKM 1 Enter the IP address or host name for the primary key vault 2 Enter the name of the file that holds the primary key vault s CA key certificate or browse to the desir...

Page 658: ...f the file in which you want to store the certificate information or browse to the desired location then click Next The Specify Master Key File Name dialog box displays Figure 250 FIGURE 250 Specify M...

Page 659: ...curity sensitive operations listed above The maximum quorum size is five cards The actual number of authentication cards registered is always more than the quorum size so if you set the quorum size to...

Page 660: ...log box displays Figure 253 FIGURE 253 Configuration Status dialog box All configuration items have green check marks if the configuration is successful A red stop sign indicates a failed step A messa...

Page 661: ...rtificates for the encryption switch are displayed FIGURE 254 Next Steps dialog box 12 Review post configuration instructions which you can copy to a clipboard or print for later 13 Click Finish to ex...

Page 662: ...primary key vault s public key certificate or browse to the desired location 3 Enter the password you created for the Brocade group TEKA client 4 If you are using a backup key vault enter the IP addre...

Page 663: ...r backing up the master key or browse to the desired location 7 Enter the passphrase which is required for restoring the master key The passphrase can be between eight and 40 characters and any charac...

Page 664: ...s always more than the quorum size so if you set the quorum size to five for example you will need to register at least six cards in the subsequent steps Setting quorum size to a value greater than ze...

Page 665: ...ing the encryption switch was added to the group you named and the public key certificate is stored in the location you specified After configuration of the encryption group is completed the Managemen...

Page 666: ...yption group 20 FIGURE 260 Next Steps dialog box 12 Review the post configuration instructions which you can copy to a clipboard or print for later 13 Click Finish to exit the Configure Switch Encrypt...

Page 667: ...e 592 Figure 261 shows the key vault selection dialog box for TKLM FIGURE 261 Select Key Vault dialog box for TKLM 1 Enter the IP address or host name for the primary key vault 2 Enter the name of the...

Page 668: ...og box 5 Enter the name of the file in which the switch s public key certificate is stored or browse to the desired location then click Next The Specify Master Key File Name dialog box displays Figure...

Page 669: ...inimum number of cards necessary to enable the card holders to perform the security sensitive operations listed above The maximum quorum size is five cards The actual number of authentication cards re...

Page 670: ...log box displays Figure 266 FIGURE 266 Configuration Status dialog box All configuration items have green check marks if the configuration is successful A red stop sign indicates a failed step A messa...

Page 671: ...ps dialog box 12 Review the post configuration instructions which you can copy to a clipboard or print for later 13 Click Finish to exit the Configure Switch Encryption wizard 14 Refer to Understandin...

Page 672: ...d retrieval is done to the KMIP without any additional hardening checks No HA Both the primary and secondary key vaults are registered on the Fabric OS encryption switch The client archives keys to bo...

Page 673: ...igned The self signed certificates are exchanged and registered on both ends The key vault certificate is registered on the Fabric OS encryption switch and the Fabric OS encryption switch KAC certific...

Page 674: ...me of the file used for backing up the master key or browse to the desired location 10 Enter the passphrase which is required for restoring the master key The passphrase can be between eight and 40 ch...

Page 675: ...ecurity sensitive operations listed above The maximum quorum size is five cards The actual number of authentication cards registered is always more than the quorum size so if you set the quorum size t...

Page 676: ...tion group 20 FIGURE 272 Confirm Configuration dialog box 14 Confirm the encryption group name and switch public key certificate file name you specified are correct then click Next The Configuration S...

Page 677: ...RE 274 Next Steps dialog box 16 Review the post configuration instructions which you can copy to a clipboard or print for later then click Finish to exit the Configure Switch Encryption wizard 17 Refe...

Page 678: ...SKM appliance uses its own master key to encrypt DEKs 6 Save the switch s public key certificate to a file The Management application saves the KAC certificate in the specified file 7 Back up the mast...

Page 679: ...Encryption wizard welcome screen 3 Click Next The Designate Switch Membership dialog box displays Figure 276 FIGURE 276 Designate Switch Membership dialog box 4 For this procedure select Add this swi...

Page 680: ...group in which to add a switch Member Switches table Lists the switches in the selected encryption group NOTE If you are creating a new encryption group refer to Creating a new encryption group on pag...

Page 681: ...the public key certificate that is used to authenticate connections to the key vault or browse to the desired location then click Next The Confirm Configuration dialog box displays Figure 279 Confirm...

Page 682: ...indicates a failed step A message displays below the table indicating the encryption switch was added to the group you named and the public key certificate is stored in the location you specified 7 R...

Page 683: ...2696 01 Adding a switch to an encryption group 20 FIGURE 281 Error Instructions dialog box 8 Review the post configuration instructions which you can copy to a clipboard or print for later 9 Click Fin...

Page 684: ...e Encryption Center Devices table then select Engine Replace from the menu task bar The Encryption Group Properties dialog box displays with the Engine Operations tab selected Figure 282 You can also...

Page 685: ...he same fabric as well as the same encryption group NOTE An IP address is required for the management port for any cluster related operations Creating High availability HA clusters 1 Select Configure...

Page 686: ...oved from a two engine cluster you must either add another engine to the cluster or remove the other engine 1 Select Configure Encryption from the menu task bar to display the Encryption Center dialog...

Page 687: ...engine comes back online the encryption group s failback setting auto or manual determines how the encryption engine resumes encrypting and decrypting traffic to its encryption targets In auto mode wh...

Page 688: ...an commit the changes If you attempt to close the Encryption Targets dialog box without committing the changes you are reminded of uncommitted changes in the Management application The wizard steps ar...

Page 689: ...yption storage targets 20 FIGURE 284 Encryption Targets dialog box 3 Click Add The Configure Storage Encryption welcome screen displays Figure 285 FIGURE 285 Configure Storage Encryption welcome scree...

Page 690: ...l encryption engines for the switch If a single encryption engine was selected the list contains only that engine Fabric Name The name of the fabric to which the selected encryption engine blade or sw...

Page 691: ...evice Targets list Options are Tape and Disk NOTE The Targets list does not show targets that are already configured in the encryption group 6 Select a target from the list The Target Port WWN and Tar...

Page 692: ...otherwise the symbolic port name from the device Port ID The 24 bit Port ID of the host port VI Port WWN The world wide name of the virtual initiator port VI Node WWN The world wide name of the virtu...

Page 693: ...ble You must fill in both the Port WWN and the Node WWN Click Add to move the host to the Selected Hosts table 9 Click Next The Name Container dialog box displays Figure 289 You can specify a name for...

Page 694: ...f the target device port Host Node WWN The world wide name of the host node Host Port WWN The world wide name of the host port Host Name The name of the host 12 Verify the information is correct then...

Page 695: ...irtual initiator VI representing the host VI VT Port WWN The port world wide name of the virtual target or virtual initiator VI VT Node WWN The node world wide name of the virtual target or virtual in...

Page 696: ...ation instructions which you can copy to a clipboard or print for later then click Finish to exit the Configure Switch Encryption wizard Configuring hosts for encryption targets Use the Encryption Tar...

Page 697: ...Hosts dialog box displays Figure 294 The Hosts in Fabric table lists the configured hosts in a fabric The table displays the following information Port WWN The world wide name of the host ports that a...

Page 698: ...Port Name The name of the host selected to access the encryption target Port WWN text box Type a world wide name for a host port and click the Add to Selected Hosts button to add to the Selected Host...

Page 699: ...lector Determines which LUN paths are displayed in the table Enables you to select a storage array from the LUN view prior to launching the Add New Path wizard Only ports that belong to at least one t...

Page 700: ...mation Storage Array The Storage Array selected from the LUN view prior to launching the Add New Path wizard Host The host selected from the LUN view prior to launching the Add New Path wizard Target...

Page 701: ...bar displays There are four possible outcomes A message displays indicating no LUNs were discovered Click OK to dismiss the message and exit the wizard A message displays indicating LUNs have been dis...

Page 702: ...paired with another LUN for SRDF data replication the New LUN option must be enabled Refer to Metadata requirements and remote replication for information about how this option works If REPL support...

Page 703: ...se Storage ports that are not assigned to any storage array but are within the fabrics of the encryption group will be listed as a single target port on the LUN centric view Storage Arrays are configu...

Page 704: ...on the target system the copy cycle is committed If the SRDF links are lost during data transfer any partial chunk is discarded preserving consistency on the target system This method provides a consi...

Page 705: ...pair for example R1 and R2 in Figure 300 Note the following when using the New LUN option Both LUNs that form an SRDF pair must be added to their containers using the New LUN option For any site all...

Page 706: ...you add the LUNs you must specify the encryption settings When configuring a LUN with multiple paths the same LUN policies must be configured on all paths to the LUN If there are multiple paths to the...

Page 707: ...yed LUNs are identified by the Host world wide name LUN number Volume Label Prefix number and Enable Write Early ACK and Enable Read Ahead status The LUN numbers may be different for different hosts F...

Page 708: ...tapes Enable Write Early Ack When selected enables tape write pipelining on this tape LUN Use this option to speed long serial writes to tape especially for remote backup operations Enable Read Ahead...

Page 709: ...Port A to Target Port A using Encryption Engine A for encryption The second path is from Host Port B to Target Port B using Encryption Engine B for encryption Encryption Engines A and B are in switch...

Page 710: ...ration changes When adding more than eight LUNs in a multi path environment repeat step 8 and step 9 above adding only eight LUNs to each target container at a time Each commit operation will commit 1...

Page 711: ...ite early for a specific tape LUN select Enable Write Early Ack for that LUN To enable read ahead for a specific LUN select Enable Read Ahead for that LUN To disable write early for a specific tape LU...

Page 712: ...container through the Encryption Targets dialog box or from the Target Tape LUNs dialog box Viewing and clearing tape container statistics You can view LUN statistics for an entire crypto tape contai...

Page 713: ...tics on the display since the last reset A Clear button resets all statistics in the display 4 To clear the tape LUN statistics for all member LUNs for the container click Clear then click Yes to conf...

Page 714: ...LUNs you selected is displayed Tape LUN statistics are cumulative FIGURE 309 Tape LUN Statistics dialog box The dialog box contains the following information LUN The number of the logical unit for wh...

Page 715: ...re Encryption from the menu task bar to display the Encryption Center dialog box Refer to Figure 185 on page 526 2 Select a group switch or engine from the Encryption Center Devices table that contain...

Page 716: ...statistics on the display Encryption engine rebalancing If you are currently using encryption and running Fabric OS 6 3 x or earlier you are hosting tape and disk target containers on different encryp...

Page 717: ...Engine Re Balance from the menu task bar A warning message displays noting the potential disruption of disk and tape I O and that the operation may take several minutes 3 Click Yes to begin rebalancin...

Page 718: ...he following conditions The active master key has been lost which happens if all encryption engines in the group have been zeroized or replaced with new hardware at the same time You want multiple enc...

Page 719: ...set on page 677 Create new master key Enabled when no master key exists or the previous master key has been backed up Refer to Creating a new master key on page 678 You must create a new master key w...

Page 720: ...passphrase This passphrase is required if you ever need to restore the master key from the file Saving a master key to a key vault Use the following procedure to save the master key to a key vault 1...

Page 721: ...in the key vault 7 Store both the Key ID and the passphrase in a secure place Both will be required to restore the master key in the future 8 Click OK after you have copied the Key ID Saving a master...

Page 722: ...you read each card the card ID displays in the Card Serial field Be sure to wait for the ID to appear 8 Enter the mandatory last name and first name of the person to whom the card is assigned 9 Enter...

Page 723: ...up to a set of three cards a quorum of any two cards can be used together to restore the master key When the master key is backed up to a set of 10 cards a quorum size of up to five cards can be conf...

Page 724: ...d to restore the master key 8 Click OK Restoring a master key from a key vault Use the following procedure to restore the master key from a key vault 1 Select Configure Encryption from the menu task b...

Page 725: ...estoring a master key from a smart card set A card reader must be attached to the SAN Management application PC to complete this procedure Use the following procedure to restore the master key from a...

Page 726: ...After five unsuccessful attempts to enter the correct password the card becomes locked and unusable 8 Click Restore You are prompted to insert the next card if needed 9 Repeat step 6 through step 8 u...

Page 727: ...other sensitive encryption information in an encryption engine You can zeroize an encryption engine manually to protect encryption keys No data is lost because the data encryption keys for the encryp...

Page 728: ...ates that all previously generated DEKs will not be decryptable unless the original master key used to encrypt them is restored Setting zeroization Use the Restore Master key wizard from the Encryptio...

Page 729: ...alog box complete the following steps 1 Select Configure Encryption from the menu task bar to display the Encryption Center dialog box Refer to Figure 185 on page 526 2 Select a group switch or engine...

Page 730: ...data on the disk media must be rendered inaccessible Device decommissioning deletes all information that could be used to recover the data for example information related to master key IDs and cache f...

Page 731: ...Select Configure Encryption from the menu task bar to display the Encryption Center dialog box Refer to Figure 185 on page 526 2 Select a group switch or engine from the Encryption Center Devices tab...

Page 732: ...the switch In order to delete keys from the key vault you need to know the Universal ID UUID To display vendor specific UUIDs of decommissioned key IDs complete the following procedure 1 Select Confi...

Page 733: ...ox displays Refer to Figure 319 3 Select the desired decommissioned key IDs from the Decommissioned Key IDs table then click Universal ID The Universal IDs dialog box displays the universal ID for eac...

Page 734: ...abled on the encryption group a confirmation dialog box displays asking whether to rekey mirror LUNs 3 Click Yes to includes mirror LUNs or click No to exclude mirror LUNs A warning message displays r...

Page 735: ...dialog box Refer to Figure 185 on page 526 2 Select a group switch or engine from the Encryption Center Devices table then select Group Switch Engine Targets or right click the group switch or engine...

Page 736: ...The LUN key identifier Key ID State The state of the LUN rekeying operation Encryption Algorithm The algorithm of the LUN rekeying operation Re key Session Number The session number of the LUN rekeyi...

Page 737: ...ich enables you to check on the status of each LUN that is being rekeyed within an encryption group Figure 324 FIGURE 324 Re Key Sessions Status dialog box The dialog box contains the following inform...

Page 738: ...LUN status will be displayed as Yes for supported storage arrays only Thin provision LUNs rely on on demand allocation of blocks of data instead of the traditional method of allocating all blocks up...

Page 739: ...key follow these steps 1 Select Configure Encryption from the menu task bar to display the Encryption Center dialog box Refer to Figure 185 on page 526 2 Select a group switch or engine from the Encry...

Page 740: ...ncryption Center Devices table then select Switch Engine Properties from the menu task bar or right click a switch or encryption engine and select Properties NOTE You can also select a group switch or...

Page 741: ...iguration changes for storage targets hosts and LUNs Unknown The group leader is in an unmanaged fabric Fabric The name of the fabric to which the switch belongs Domain ID The domain ID of the selecte...

Page 742: ...nt to LKM SSKM and is waiting for the LKM SSKM administrator s approval Created not validated An interim state until first used Link Key valid online LKM SSKM only a shared link key exists and has bee...

Page 743: ...ard Status The current status of system card information for the encryption engine Options are Enabled and Disabled Exporting the public key certificate signing request CSR from Properties To export t...

Page 744: ...icon 3 In the Encryption Engine Properties table locate Set State To 4 Click the adjacent Engine field and select Enabled or Disabled accordingly then click OK Viewing and editing encryption group pro...

Page 745: ...Group Properties dialog box The dialog box contains the following information General tab For a description of the dialog box refer to General tab on page 698 Members tab For a description of the dia...

Page 746: ...ption group Options are OK Converged The group leader can communicate with all members Degraded The group leader cannot contact one or more of the configured group members When the group is in a degra...

Page 747: ...r SKM for both SKM and Enterprise Secure Key Management ESKM Key Vault Types Thales e Security keyAuthority TEKA If an encryption group contains mixed firmware nodes the Encryption Group Properties Ke...

Page 748: ...Primary and Backup Key Vault User Names for completion None Deactivates Primary and Backup Key Vault User Names and password fields Not Applicable Displays if your selected key vault type is not KMIP...

Page 749: ...switch has responded and the group leader is exchanging information This is a transient condition that exists for a short time after a switch is added or restored to a group OK The member switch is r...

Page 750: ...plication also removes the HA cluster and target container associated with the switch NOTE If the encryption group is in a degraded state the Management application does not remove the HA clusters or...

Page 751: ...rties dialog box displays with the Security tab selected NOTE You can also select a group from the Encryption Center Devices table then click the Properties icon TABLE 67 Switch removal impact Switch...

Page 752: ...when no master key exists or the previous master key has been backed up Back up a master key Enabled any time a master key exists Restore a master key Enabled when either no master key exists or the...

Page 753: ...o and remove encryption engines from HA clusters and failback an engine Changes are not applied to the encryption group until you click OK Each HA Cluster must have exactly two encryption engines The...

Page 754: ...ters table clicking the Dual arrow button swaps the cluster members NOTE Swapping engines using the Dual arrow button is not the same as removing one engine and adding another When swapping engines al...

Page 755: ...n the encryption group Key Vault The type of key vault either Primary or Secondary Link Key Status The link key status can be one of the following No Link Key No access request was sent to LKM SSKM ye...

Page 756: ...encryption switch or engine from a tape pool select one or more tape pools listed in the table then click Remove To modify a tape pool you must remove the entry then add a new tape pool The Tape Pool...

Page 757: ...ape drive policies the LUN pool policies are used only if no tape pools exist or if the tape media volume does not belong to any configured tape pools All encryption engines in the encryption group sh...

Page 758: ...l label or tape ID that is configured on the tape backup restore application If you selected Number as the Tape Pool Label Type enter a hex number for the tape pool This number must match the tape poo...

Page 759: ...is a set of encryption engines that encrypt the same target storage device DEK Clusters do not display in the Management application they are an internal implementation feature and have no user config...

Page 760: ...if it is part of an HA Cluster Encryption related acronyms in log messages Fabric OS log messages related to encryption components and features may have acronyms embedded that require interpretation T...

Page 761: ...storage do not interact with your UNIX servers and storage You can use zones to logically consolidate equipment for efficiency or to facilitate time sensitive functions for example you can create a t...

Page 762: ...standard zones Unless otherwise specified all references to zones refer to these standard zones Frame redirection zones Reroute frames between an initiator and target through a Virtual Initiator and...

Page 763: ...only for Enterprise and Professional Plus editions Offline zoning enables you to copy a fabric zone database and edit it offline The benefits to offline zoning include the following You want to make c...

Page 764: ...ng to zone Zoning and FICON Session based hardware enforcement is in effect if the zone has a mix of WWN and Domain Port members Session based hardware enforcement is also in effect if a port is in mu...

Page 765: ...elect a fabric from the Zoning Scope list This identifies the target entity for all subsequent zoning actions and displays the zoning database for the selected entity 4 If you want to show all the dis...

Page 766: ...one_Name where X is the priority level H High M Medium or L Low and Zone_Name is the name you entered for the zone The new empty zone is created You cannot save an empty zone Refer to Adding members t...

Page 767: ...otential Members list displays valid members using the following rules If you select the WWN type the valid members display by the Attached Ports If you select the WWN Fabric Assigned type the valid m...

Page 768: ...CTRL and click each zone name to select more than one zone 5 Click New Member The Add Zone Member dialog box displays 6 Select an option from the Member Type list and Alias are supportedThe fields in...

Page 769: ...embers select the members to be removed from the zone and click the left arrow between the Potential Members list and the Zones list When successful the zone member is removed from the Zones list 6 Cl...

Page 770: ...dialog box to exit without saving changes When you reopen the dialog box the zone is restored 6 Click OK or Apply to save your changes Any zones or zone configurations you have changed are saved in t...

Page 771: ...rget entity for all subsequent zoning actions and displays the zoning database for the selected entity 4 Click the plus sign by the appropriate zone in the Zones list to expand the listing and show th...

Page 772: ...box displays 2 Click the Zone DB tab if that tab is not automatically displayed 3 Select a fabric from the Zoning Scope list 4 Select Alias from the Type list 5 Click New Alias The New Alias dialog b...

Page 773: ...ber to select more than one member You can also add WWNs not listed in the Potential Members list by entering the WWN in the Detached WWN field and clicking Add d Click the right arrow between the Pot...

Page 774: ...Type list 5 Click Export The Export Alias dialog box displays 6 Browse to the location to which you want to export the zone alias data 7 Enter a name for the export file in the File Name field 8 Click...

Page 775: ...efer to Renaming a zone alias on page 726 7 Click OK or Apply on the Zoning dialog box to save your changes Creating a zone configuration 1 Select Configure Zoning Fabric The Zoning dialog box display...

Page 776: ...ne Configuration Properties dialog box Adding zones to a zone configuration 1 Select Configure Zoning Fabric The Zoning dialog box displays 2 Click the Zone DB tab if that tab is not automatically dis...

Page 777: ...onfigurations list When successful the zone is removed from the Zone Configurations list 6 Click OK or Apply to save your changes Any zones or zone configurations you have changed are saved in the zon...

Page 778: ...nfiguration and any TI zones in the offline zone database are saved to the switch and are added to the existing online zone database 8 Click OK to activate the zone configuration A message displays in...

Page 779: ...y zones or zone configurations you have changed are saved in the zone database Renaming a zone configuration 1 Select Configure Zoning Fabric The Zoning dialog box displays 2 Click the Zone DB tab if...

Page 780: ...ation When you duplicate a zone configuration you make a copy of it in the same zone database The first time a zone configuration is duplicated the duplicate is automatically given the name zonesetlab...

Page 781: ...ent zoning actions and displays the zoning database for the selected entity If you want to show all discovered fabrics in the Potential Members list right click in the Potential Members list and selec...

Page 782: ...ct a zone database from the Zone DB list 4 Select Refresh from the Zone DB Operation list A message displays informing you that refresh will overwrite the selected database Click Yes to continue 5 Cli...

Page 783: ...oval as well as all members not otherwise marked 1 Select Configure Zoning Fabric The Zoning dialog box displays 2 Select Compare from the Zone DB Operation list The Compare Merge Zone DBs dialog box...

Page 784: ...elect an element in the Editable Zone DB area You can add zone aliases and zone members to a zone You can add zones to a zone configuration And you can add zone configurations to the zone database c C...

Page 785: ...database in the offline repository for the first fabric 8 Click Close to close the Compare Merge Zone DBs dialog box and return to the Zoning dialog box 9 In both fabrics load the offline repository a...

Page 786: ...ic The Zoning dialog box displays 2 Select the zone database you want to roll back from the Zone DB list You must select an offline zone database that has a value in the Last Saved to Fabric column Yo...

Page 787: ...on page 740 6 Add members to each zone For specific instructions refer to Adding members to the LSAN zone on page 740 NOTE You cannot add an LSAN zone to a zone configuration LSAN zones are automatic...

Page 788: ...confirm the activation or click No to cancel the activation 10 Click OK to continue All LSAN zones are activated on the selected fabrics and saved to the zone database 11 Click OK to close the Zoning...

Page 789: ...want to proceed Click Yes to confirm the activation or click No to cancel the activation 11 Click OK to continue All LSAN zones are activated on the selected fabrics and saved to the zone database 12...

Page 790: ...SAN Zones dialog box You can click the right arrow button to assign available LSAN zones in the Zones list to fabrics in the Destination Fabrics list 5 Click OK to commit the LSAN zones and activate t...

Page 791: ...ailover is always enabled and you cannot change it Enhanced TI zones In Fabric OS 6 4 0 or later ports can be in multiple TI zones Zones with overlapping port members are called enhanced TI zones ETIZ...

Page 792: ...elect a fabric from the Zoning Scope list This identifies the target entity for all subsequent zoning actions and displays the zoning database for the selected entity 4 Select Domain Port Index from t...

Page 793: ...ot add a device as a member to a Traffic Isolation zone 1 Select Configure Zoning Fabric The Zoning dialog box displays 2 Click the Zone DB tab if that tab is not automatically displayed 3 Select a fa...

Page 794: ...bsequent zoning actions and displays the zoning database for the selected entity 4 Right click the Traffic Isolation zone you want to enable in the Zones list and select Configured Enabled 5 Click OK...

Page 795: ...configurable only on a Fabric OS device If failover is disabled be aware of the following considerations Ensure that there are non dedicated paths through the fabric for all devices that are not in a...

Page 796: ...ric from the Zoning Scope list This identifies the target entity for all subsequent zoning actions and displays the zoning database for the selected entity Boot LUN zones are not supported for Network...

Page 797: ...Zones list and select New Boot LUN Zone The New Boot LUN Zone dialog box displays You can modify the storage port WWN and LUN number 5 Select a storage port WWN from the list or enter an offline WWN Y...

Page 798: ...n Table 69 To compare two zone databases complete the following steps 1 Select Configure Zoning Fabric The Zoning dialog box displays 2 Select Compare from the Zone DB Operation list The Compare Merge...

Page 799: ...onfigurations Zones Displays only zones 7 Select the Differences only check box to display only the differences between the selected databases 8 Select the Sync Scroll Enable check box to synchronize...

Page 800: ...nt to set limits The field changes to an editable field 3 Enter the maximum number of zone database changes that can be made for that fabric before a zone configuration is activated To set a limit ent...

Page 801: ...e is in the Current User column in the Zone DB list 4 Select Undo CheckOut from the Zone DB Operation list 5 Click Yes in the confirmation message This removes the user names of users currently logged...

Page 802: ...ers list and the Zones list If the member is found it is highlighted in the Potential Members list Finding zones in a zone configuration Use this procedure to locate all instances of a zone in the Zon...

Page 803: ...ab if that tab is not automatically displayed 3 Select a fabric from the Zoning Scope list This identifies the target entity for all subsequent zoning actions and displays the zoning database for the...

Page 804: ...e replaced from all zones and aliases in the selected zone DB 6 Click OK on the message 7 Click OK or Apply on the Zoning dialog box to save your changes Any zones or zone configurations you have chan...

Page 805: ...ine Utility from the Zone DB Operation list The Offline Device Management dialog box displays 4 Clear the Remove column check box for the offline device you want to replace 5 Select WWN default in the...

Page 806: ...of the offline device in the corresponding Replace Value list If the selected name has multiple device or device port WWNs assigned names are set to non unique in the Management application the Device...

Page 807: ...FCIP tunnel advanced settings 781 Viewing FCIP connection properties 787 Viewing General FCIP properties 788 Viewing FCIP FC port properties 789 Viewing FCIP Ethernet port properties 790 Editing FCIP...

Page 808: ...ed the Fibre Channel frames are reconstructed FCIP uses a TCP transport that guarantees in order delivery The Fibre Channel fabric and all Fibre Channel targets and initiators are unaware of the prese...

Page 809: ...unction with IPsec on all platforms in Fabric OS version v7 0 but will be supported in a later version Table 70 summarizes FCIP capabilities per platform TABLE 70 FCIP capabilities Capabilities 8 Gbps...

Page 810: ...transmission loss This feature is available only on the 8 Gbps extension switches and 8 Gbps extension Blades Trunking is enabled by creating logical circuits within an FCIP tunnel A tunnel may have m...

Page 811: ...ining IBM z OS Global Mirror z Gm or FICON Tape Pipelining will fail when a command is routed via tunnel 1 and the responses are returned via tunnel 2 Therefore multiple equal cost tunnels are not sup...

Page 812: ...etric circuit In Figure 342 circuit 1 and circuit 2 are both lowest metric circuits Circuit 1 has failed and transmission fails over to circuit 2 which has the same metric Traffic that was pending at...

Page 813: ...miting ARL is performed on FCIP tunnel connections to change the rate in which the FCIP tunnel transmits data through the TCP connections This feature is available only on the 8 Gbps extension switche...

Page 814: ...e highest priority and is assigned bandwidth as needed at the expense of lower priorities if necessary QoS high The QoS high priority gets at least 50 of the available bandwidth QoS medium The QoS med...

Page 815: ...with extension switches are listed under devices and all existing FCIP tunnels are displayed 2 Select the switch you want to configure under Products 3 Click the Add button or right click on the switc...

Page 816: ...ementation over FCIP Internet Protocol security IPsec uses cryptographic security to ensure private secure communications over Internet Protocol networks IPsec supports network level data integrity da...

Page 817: ...es data integrity data source authentication and protection against replay attacks but does not provide confidentiality DES Data Encryption Standard is the older encryption algorithm that uses a 56 bi...

Page 818: ...the length of time expired or the length of the data being transferred parts of a message maybe protected by different keys generated as the SA lifetime expires For the 8 Gbps Extension Switch and Bl...

Page 819: ...boundaries can reside in the same VLAN Also a large physical network can be broken down into smaller VLANs VLAN traffic is routed using 802 1Q compliant tags within an Ethernet frame The tag includes...

Page 820: ...h sides of an FCIP tunnel must have matching configurations for these features to work FCIP Fastwrite and Tape Acceleration are enabled by turning them on during the tunnel configuration process They...

Page 821: ...troduced by greater distance creates delays in anticipated responses to certain commands The FICON pacing mechanism may interpret delays as an indication of a large data transfer that could monopolize...

Page 822: ...equired to enable FICON Tape Read Pipelining Teradata pipelining Teradata emulation reduces latency on links to Teradata warehouse systems caused by WAN propagation delays and bandwidth restrictions I...

Page 823: ...d IP layer 3 protocols Persistently disable the VE_ports before you configure them Ports on a new extension switch or extension blade are persistently disabled by default Determine which features you...

Page 824: ...he Products tree b Click the Add button or right click on the switch and select Add Tunnel The Add FCIP Tunnel dialog is displayed Figure 347 The name of the switch you selected is displayed in the Sw...

Page 825: ...cannot assign a Tunnel ID until after at least one circuit is configured The Add Circuit dialog returns you to the Add FCIP Tunnel dialog to allow you to select the Tunnel ID f Skip to step step 4 an...

Page 826: ...right of the Circuits properties table at the bottom of the dialog box The Add FCIP Circuit dialog is displayed Continue with Adding an FCIP circuit Adding an FCIP circuit When adding a new FCIP tunne...

Page 827: ...t under Switch One Settings To determine a suggested size packets are sent across the FCIP tunnel starting at the largest possible size packet that can be sent over IP If a valid connection response i...

Page 828: ...nection is tested with the ping utility 11 Select Advanced Settings from the Add FCIP Circuit dialog box and continue if you want to do any of the following Disable selective acknowledgement if your s...

Page 829: ...ring additional circuits at this point Stop configuring additional circuits Configuring FCIP tunnel advanced settings Compression FCIP fast write and tape pipelining IPSec and IKE policies and FICON e...

Page 830: ...e compression and is available on all platforms The 8 Gbps Extension Switch and the 8 Gbps Extension Blade provide three additional options for compression The Moderate option enables a combination of...

Page 831: ...ape Acceleration check box 4 Click OK Enabling Tperf test mode To enable Tperf test mode do the following 1 Select Advanced Settings on the Add FCIP Tunnel or Edit FCIP Tunnel dialog box to display th...

Page 832: ...own WWNs This provides an added measure of security 4 Enter the WWN for the remote switch 5 Assign IKE and IPsec policies For the 4 Gbps Extension Switch and Blade you must choose from a drop down lis...

Page 833: ...1 Gbps circuits to be created using 10 Gbps ports even if the switch at one end of the tunnel is using Fabric OS 7 0 and the switch at the other end is using Fabric OS earlier than v7 0 Note that thi...

Page 834: ...e is 1 100 FICON Tape Read Max Pipe defines a maximum number of channel commands that may be outstanding at a given time during read pipelining Too small of a value will result in poor performance The...

Page 835: ...22 Viewing FCIP connection properties The FCIP connection properties show properties of the blades or switches on both sides of a connection To view FCIP connection properties right click the connecti...

Page 836: ...he Fabric Tree structure or on the Connectivity Map and select Properties 2 Select the Properties tab FIGURE 354 General FCIP properties tab Extension switch or blade Use the following steps to view t...

Page 837: ...roperties tab blade chassis Viewing FCIP FC port properties Take the following steps to view FCIP FC port properties 1 Right click an extension blade or switch from the Fabric Tree structure or on the...

Page 838: ...orts properties Viewing FCIP Ethernet port properties Take the following steps to view Ethernet port properties 1 Right click an extension blade or switch from the Fabric Tree structure or on the Conn...

Page 839: ...following differences for these platforms The 4 Gbps Extension Switch and Blade have only one circuit per tunnel and the circuit is edited as part of the tunnel For 4 Gbps platforms the Delete Enable...

Page 840: ...t you want to edit from the Circuits properties table at the bottom of the dialog box and select Edit The Edit FCIP Circuit dialog box displays Figure 358 FIGURE 358 Edit FCIP Circuit dialog box 3 Fie...

Page 841: ...Edit FCIP Tunnel dialog box displays 3 Select the circuit that you want to disable from the Circuit properties table at the bottom of the dialog box 4 Select Disable 5 For tunnels with multiple circui...

Page 842: ...mance graphs You can display performance graphs by clicking the Performance button on the FCIP Tunnels dialog box You can also display performance graphs from Properties as described in the following...

Page 843: ...ialog box 22 Displaying tunnel properties from the FCIP tunnels dialog box Tunnel properties can be displayed from the FCIP Tunnels dialog box 1 Select a tunnel from the FCIP tunnels dialog box 2 Sele...

Page 844: ...g FCIP circuit properties from the FCIP tunnels dialog box Tunnel properties can be displayed from the FCIP Tunnels dialog box using the following procedure 1 Select a tunnel from the FCIP tunnels dia...

Page 845: ...tch properties from the FCIP Tunnels dialog box 22 Displaying switch properties from the FCIP Tunnels dialog box Switch properties are displayed on the FCIP Tunnels dialog box when you select a switch...

Page 846: ...Tunnels dialog box Troubleshooting FCIP Ethernet connections 1 Right click a blade an extension blade or switch from the Fabric Tree structure or Connectivity Map and select Properties 2 Select the Po...

Page 847: ...ovides security from accidental fabric merges and potential fabric disruption when fabrics become segmented because they cannot merge Enabling Fabric Binding activates Switch Connection Control SCC po...

Page 848: ...on page 801 and Disabling fabric binding on page 802 Action Displays any actions on the fabric Available Switches table Lists the switches available to add to the fabric binding membership list For s...

Page 849: ...use world wide names to uniquely identify nodes and ports within nodes For many devices the 64 bit WWNs are fixed and their assignment follows conventions established by the IEEE For other devices the...

Page 850: ...inistrator s Guide for detailed information Disabling fabric binding Fabric Binding cannot be disabled while High Integrity Fabric is active if the switch is offline This disables fabric binding and H...

Page 851: ...ic Binding dialog box Adding detached devices to the fabric binding membership list To add a switch that does not have a physical connection and is not discovered to the fabric complete the following...

Page 852: ...y related features including Fabric Binding Switch Binding Insistent Domain IDs and Domain Register for State Change Notifications RSCNs HIF activates the Switch Connection Control SCC policy sets Ins...

Page 853: ...ine again This process may result in dropped frames NOTE Port binding is a security method for restricting devices that connect to particular switch ports Port binding should never be used in FICON en...

Page 854: ...lect Configure High Integrity Fabric The High Integrity Fabric dialog box displays Figure 364 2 Select the fabric on which you want to deactivate HIF from the Fabric Name list The HIF status displays...

Page 855: ...S devices refer to Chapter 7 of the Fabric Watch Administrator s Guide Port Fencing objects include the SAN Fabrics Directors Switches physical Virtual Switches Ports as well as Port Types E_port F_po...

Page 856: ...devices refer to Chapter 7 of the Fabric Watch Administrator s Guide 1 Select Monitor Fabric Watch Port Fencing The Port Fencing dialog box displays Figure 366 FIGURE 365 Port Fencing dialog box The...

Page 857: ...an ISL protocol threshold refer to Editing thresholds on page 823 Delete button Click to delete an ISL protocol threshold refer to Removing thresholds from the thresholds table on page 829 Ports tabl...

Page 858: ...create thresholds which you can then assign to available objects in the tree Port Fencing threshold types include the following C3 Discard Frames Fabric OS only Invalid CRCs Fabric OS only Invalid Wor...

Page 859: ...tch 4 Gbps Router Extension Switch 4 Gbps Extension Switch 4 Gbps 32 port Switch 8 Gbps 32 port Switch 8 Gbps 40 port Switch 8 Gbps 24 port Embedded Switch 8 Gbps 16 port Embedded Switch 8 Gbps 8 FC p...

Page 860: ...ld to block a port when the link timeout errors meet the threshold Protocol error threshold Use Protocol Error thresholds to block a port when one of the following protocol errors meet the threshold I...

Page 861: ...ic OS devices running 6 3 or later Use to block a port when a C3 Discard Frames violation type meets the Fabric OS switch threshold For default threshold values for Fabric OS devices refer to Chapter...

Page 862: ...mber of C3 discarded frames allowed is met Second the port is blocked as soon as the specified number of C3 discarded frames allowed is reached within a second Minute the port is blocked as soon as th...

Page 863: ...id CRCs Threshold dialog box 4 Enter a name for the threshold in the Name field 5 Select one of the following options Default Uses device defaults Go to step 8 Custom Uses your selections Continue wit...

Page 864: ...d an Invalid Words threshold complete the following steps 1 Select Monitor Fabric Watch Port Fencing The Port Fencing dialog box displays 2 Select Invalid Words Fabric OS only from the Violation Type...

Page 865: ...This threshold is only available for Fabric OS devices NOTE This feature requires a Trial or Licensed version Use to block a port when the Link Reset violation type meets the Fabric OS switch threshol...

Page 866: ...k Resets threshold to the table and close the Add Link Reset Threshold dialog box To assign this threshold to fabrics switches or switch ports refer to Assigning thresholds on page 821 9 Click OK on t...

Page 867: ...as soon as the specified number of protocol errors allowed is met Second the port is blocked as soon as the specified number of protocol errors allowed is reached within a second Minute the port is bl...

Page 868: ...Port Fencing dialog box displays 2 Select State Change Fabric OS only from the Violation Type list 3 Click Add The Add State Change Threshold dialog box displays FIGURE 372 Add State Change Threshold...

Page 869: ...er object above it in the hierarchy you cannot remove that inherited threshold directly from the subordinate object You must either remove the threshold from the higher object to which it was directly...

Page 870: ...igned thresholds You cannot remove an inherited threshold from a subordinate object However the Management application allows you to effectively avoid inheritance for individual subordinate objects wh...

Page 871: ...Edit C3 Discard Frames dialog box displays 4 Complete step 4 through step 7 in Adding a C3 Discard Frames threshold on page 813 5 Click OK on the Edit C3 Discard Frames Threshold dialog box If the thr...

Page 872: ...NOTE This feature requires a Trial or Licensed version Use to block a port when the Invalid Word Threshold violation type meets the Fabric OS switch threshold To edit an Invalid Words threshold compl...

Page 873: ...shold has already been assigned to ports an Are you sure you want to make the requested changes to this threshold on X ports message displays Click OK to close To assign this threshold to fabrics swit...

Page 874: ...TE This feature requires a Trial or Licensed version Use to block a port when a state change violation type meets the Fabric OS switch threshold For 4 Gbps Router Extension Switches and Blades only wh...

Page 875: ...table 6 Click OK on the Port Fencing dialog box Viewing thresholds 1 Select Monitor Fabric Watch Port Fencing The Port Fencing dialog box displays 2 Select a threshold type from the Violation Type li...

Page 876: ...itch or Switch Port from all Fabrics Switches and Switch Ports at once as well as from the Threshold table Removing thresholds from individual objects To remove thresholds from the All Fabrics object...

Page 877: ...the procedure for the Chassis group 5 Click OK on the Port Fencing dialog box Removing thresholds from the thresholds table To remove thresholds from all Fabrics Switches and Switch Ports as well as...

Page 878: ...830 Brocade Network Advisor SAN User Manual 53 1002696 01 Removing thresholds 24...

Page 879: ...pes based on complexity Point to point configurations that do not use a switch Switched point to point configurations also called single switch configurations connect a host channel to a storage contr...

Page 880: ...trix can be manipulated by host based management programs using FICON CUP or from a Management program to create policies and determine paths for data and command flows Up to 8 Allow Prohibit matrices...

Page 881: ...he exact port intersection point use the procedure Configuring an Allow Prohibit Matrix manually on page 834 5 Repeat step 4 as needed to create the matrix you want to apply If you want to change a se...

Page 882: ...following options Double click a configuration file Select a configuration file and click the right arrow A matrix displays The switch ports are displayed on both the vertical axis and horizontal axi...

Page 883: ...analyzed against the switch for port zoning only The table cells display in the red background if the two ports are not in the same zone in an active zone configuration 13 Click Close on the Configur...

Page 884: ...electing a configuration or you may select the matrix under Allow Prohibit Matrix 3 Click Duplicate The Save As Duplicate dialog box displays FIGURE 377 Save As Duplicate dialog box 4 Enter a name for...

Page 885: ...le Switches and selecting a configuration or you may select the matrix under Allow Prohibit Matrix 3 Click Save As The Save As Duplicate dialog box displays FIGURE 378 Save As Duplicate dialog box 4 E...

Page 886: ...electing a configuration or you may select the matrix under Allow Prohibit Matrix 3 Click Activate A confirmation message displays FIGURE 379 Activate Matrix Confirmation message 4 Select the Active S...

Page 887: ...ation message displays 4 Click Yes to confirm Changing the Allow Prohibit Matrix display You can modify the display using the Window Arrangement list above the matrix display or the Clear all port nam...

Page 888: ...domain ID flag IDID on all switches Sets High Integrity Fabric Configuration HIFC on the seed switch Fabric wide consistency policy FWCP is configured to include SCC in strict mode SCC policy is crea...

Page 889: ...he Fabric drop down selector to select the fabric you want to configure NOTE Fabric OS switches only All switches in a fabric must be running Fabric OS version 5 3 or later If a Fabric OS version earl...

Page 890: ...activated on the fabric Click Yes to continue If configuration is successful a confirmation message displays If FMS Mode was selected each switch is checked for a CUP license Any switches that do not...

Page 891: ...itches in the secondary fabric if all switches in the primary fabric are enabled for EBR Note that EBR requires that switches operate at 8 Gbps or greater with Fabric OS 6 4 or later If all the EBR en...

Page 892: ...d secondary fabrics requires Extended Fabric license NOTE If the distance between the merged fabrics is 10 km or greater you must configure the connection as a long distance connection The cascaded FI...

Page 893: ...ailable for Fabric OS products 2 Click Next The Select fabrics screen displays 3 Select the two fabrics you want to merge under Available Fabrics and click the right arrow to move them to Selected Fab...

Page 894: ...d practice to specify a distance that is longer than the actual distance to be sure enough BB credits are allocated 12 Perform the appropriate following action based on whether the connection is a lon...

Page 895: ...figuration changes are applied Please confirm to proceed warning message displays 3 Click OK on the warning message The values of the Fabric chosen on the Set up merge options screen are applied to al...

Page 896: ...Prohibit Matrix is at the switch level Therefore when you view the Allow Prohibit Matrix for a port group with ports from multiple switches the matrix only shows the ports for the selected switch To...

Page 897: ...the Description field 5 Select one or more ports to add to the group in the Group Type FC Ports table A port group must have at least one port in the Membership List All ports must be from switches i...

Page 898: ...vice then the port group is removed permanently from the Port Groups dialog box If a fabric or device is added to the topology while the Port Groups dialog box is open it does not display in the Group...

Page 899: ...for other application blades including the 8 Gbps 24 port blade You can swap all of the ports from one blade to another blade During this operation all ports in the selected blades are swapped This op...

Page 900: ...utomatically filters out the selected blade and any blade types that do not match the selected blade 4 Select the blade with which you want to replace the first blade from the second Swap Blades list...

Page 901: ...N while a tagged port can be a member of more than one VLAN Interfaces defined as converged allow tagged and untagged traffic to pass through an interface at the same time Default VLAN When you enable...

Page 902: ...of VLANs To view the list of VLANs that were discovered on the network select Configure VLANs The VLAN View tab of the VLAN Manager dialog box displays The VLAN Manager toolbar contains the following...

Page 903: ...ctivity on the Layer 2 broadcast domains If there are super aggregated VLANs that have been configured on the network VLANs are grouped by their super aggregated VLAN memberships If the VLANs are in d...

Page 904: ...k the VLAN View tab in the VLAN Manager dialog box 2 Expand the folder under the VLAN View tab then double click a super aggregated VLAN to display its port VLANs or Products VLANs are listed by their...

Page 905: ...A description of the type of interface on the product for example ETHERNET_INTERFACE or VIRTUAL_INTERFACE Port Name The name of the interface if one was configured Port Mode Indicates the tag mode of...

Page 906: ...can be configured on four products If the VLAN definition for VLAN 3 is modified the new definition can be deployed to all four products at one time The Configure Port VLAN function in VLAN Manager a...

Page 907: ...t that can be added to the VLAN The Selected Ports list displays the list of configured VLANs Initially these VLANs contain no ports If no ports or trunk groups are selected an empty VLAN is created o...

Page 908: ...other VLAN Dual mode ports can be added to any VLAN except for the default VLAN 1 NOTE Check the release notes for your product to determine the VLAN support available on that product 11 Click the Sel...

Page 909: ...tag button to assign the port as an untagged port to the selected VLAN The Selected Ports list shows the interface listed under the VLAN to which it was assigned 8 Select the same interface from the A...

Page 910: ...the fields displayed for DCB products are read only Network OS products do not display To add VLAN properties complete the following steps 1 On the Add VLAN dialog box click the Properties tab The Add...

Page 911: ...e one virtual routing interface per VLAN for each product From the VLAN View tab you can edit virtual routing interfaces on multiple products for a specific VLAN The Router Interface field is editable...

Page 912: ...aces on a product from that VLAN A port VLAN can be deleted in both the VLAN and Product views Deleting a port VLAN in VLAN view 1 On the VLAN Manager dialog box select VLAN View 2 Select the VLAN to...

Page 913: ...ch is available if you selected Schedule as a deployment option to select a frequency 6 Click the Snapshots check box if you want the Management application to run and save a report after this configu...

Page 914: ...ot supported on the Brocade 6910 switch 1 Perform one of the following tasks to select the VLAN on which STP or RSTP will be configured On the VLAN View tab expand the list of VLANs and select one or...

Page 915: ...for a Fabric OS device the default is 32768 The values range from 0 through 65535 for an IronWare device the default is 32768 7 Enter the number of seconds a bridge waits the listen and learn period b...

Page 916: ...on on a port VLAN The Deploy STP dialog box allows you to view the STP configuration summary and configure deployment parameters for a selected VLAN The Deploy STP dialog box allows you to deploy an S...

Page 917: ...ts VLAN and select the VLAN where MSTP will be configured You can select more than one VLAN from this tab Either of these methods enables the STP button on the VLAN Manager dialog box For either view...

Page 918: ...region before the Bridge Protocol Data Units BPDUs are discarded and the information held for a port is aged in the Max Hops field The hop count determines when to trigger a reconfiguration The value...

Page 919: ...Available MSTP Instances list 3 Select an MSTP instance from the Available MSTP Instances list or enter the MSTP instance number 4 Click the right arrow button to move the MSTP instance to the Select...

Page 920: ...SVI The list of interfaces appears in the interface list Click the SVI in the list of interfaces to select it NOTE For DCB products you must select the port VLAN itself to enable the IP button 2 Click...

Page 921: ...them to the SVI You can assign a maximum of 255 IP addresses on DCB products and a maximum of 24 IP addresses on IOS products 6 Click OK to begin the deployment of the address to the product The Deplo...

Page 922: ...874 Brocade Network Advisor SAN User Manual 53 1002696 01 VLAN routing 26...

Page 923: ...you to view edit duplicate delete deploy and generate reports for the following types of deployment configurations DCB VLAN STP Security You cannot create configurations using the Deployment Manager T...

Page 924: ...splays as shown in Figure 391 FIGURE 391 Deployment dialog box 2 Select a deployment configuration in the Saved or Scheduled tab Policy based routing configurations cannot be edited 3 Click Edit A dia...

Page 925: ...copyn For example if the original name is test the new name is test copy1 If you duplicate test again the name of the second duplicate is test copy2 Deleting a deployment configuration 1 Select Config...

Page 926: ...nfigure Deployment The Deployment dialog box displays 2 Select a deployment in the Saved or Scheduled tab 3 Click Deploy The Deployment Status dialog box displays 4 Click Snapshot Report The Configura...

Page 927: ...the most recent configurations or only those configurations that fall within a specific date range 6 Click Find The Management application displays the list of snapshots that match the search criteria...

Page 928: ...er of changes label Indicates the number of changes If there are no differences displays No change Differences legend Displays the color legend for differences Changed status displays in blue Inserted...

Page 929: ...ifferent fabrics shared through FC Routers Device Connectivity Troubleshooting Use to identify any problems that might be preventing communication between the two selected device ports The device port...

Page 930: ...dialog box displays 2 Choose from one of the following options Select a fabric from the Fabric list Select a router from the Routing list Requires Fabric OS 6 2 or later 3 Select the source and desti...

Page 931: ...rd Route tab The reverse route may sometimes be different from the forward route Fabric OS only FC Ping This tab shows the minimum maximum and average round trip times between the selected device port...

Page 932: ...edge fabrics Edge fabric FC router physical connection status Active ACL DCC policy check Fabric OS only The Device Connectivity Troubleshooting Results dialog box displays If no problems are found th...

Page 933: ...f the fabrics selected for diagnosis the details of the tests performed the results of the test as well as short description of the test results 5 Click Close on the Fabric Device Sharing Diagnosis Re...

Page 934: ...ring link traffic test parameters on page 889 5 Click Start The Management application performs the following operations to enable diagnostic mode on the selected ports 1 Disable the source port 2 Dis...

Page 935: ...d Row table displays with the details of the port selected for diagnosis the details of the tests performed the results of the test as well as short description of the test results The following table...

Page 936: ...P_address Reason CAL_error_message Electrical Loopback Test skipped on port slot_number port_number of the switch switch_IP_address Reason CAL_error_message Optical Loopback Test Successfully complete...

Page 937: ...ad patteren from the list Options include BYTE_NOT WORD_NOT QUAD_NOT BYTE_RAMP WORD_RAMP QUAD_RAMP BYTE_LFSR RANDOM CRPAT CSPAT CHALF_SQ CQTR_SQ RDRAM_PAT jCRPAT jCJTPAT jCSPAT PRED_RAND SMI_TEST CJPA...

Page 938: ...es Configuring IP ping NOTE IP Ping only supported on Fabric OS devices running Fabric OS 5 2 or later NOTE IP Perf is not supported on the Fabric OS 8 Gbps Extension Switch or Blade You can also veri...

Page 939: ...ound trip times is 0 Average Round Trip Time The average time in milliseconds of all responses If no response the round trip times is 0 TABLE 81 IP Ping Details Field or Component Description Reply Fr...

Page 940: ...ceroute then repeats the operation with a TTL of two hops to get the IP address of the second hop This process repeats for up to ten hops or until a successful PING response is received The IP Trace D...

Page 941: ...e network link to see how much bandwidth is available It will display the media link bandwidth only if no other traffic is flowing The remote IP address must belong to a managed switch so that IP Perf...

Page 942: ...t of data and receive the acknowledgement PMTU Path Maximum Transmission Unit The largest packet size that can be transmitted over the end path without fragmentation This value is measured in bytes an...

Page 943: ...ce Data In this chapter SAN performance overview 896 SAN real time performance data 903 SAN Historical performance data 907 SAN End to end monitoring 915 SAN Top Talker monitoring 918 Bottleneck detec...

Page 944: ...ts Managed HBA Ports and Managed CNA Ports Persist and display historical performance data Switch Ports FC ports ISL ports Device ports FCIP tunnels SFP and Switch Ports 10 GE ports for selected fabri...

Page 945: ...P tunnels Rx Utilization available for FC GE Managed HBA ports Managed CNA ports 10GE ports E port trunks and FCIP tunnels Tx MB Sec available for FC GE Managed HBA ports Managed CNA ports 10GE ports...

Page 946: ...Managed HBA ports and Managed CNA ports Under Sized Frames available for Managed HBA ports and Managed CNA ports Over Sized Frames available for Managed HBA ports and Managed CNA ports Primitive Seque...

Page 947: ...g show snmpv1 command Example of SNMP v1 HCLSwitch admin snmpconfig show snmpv1 SNMPv1 community and trap recipient configuration Community 1 Secret C0de rw Trap recipient 10 103 4 63 Trap port 162 Tr...

Page 948: ...Protocol noAuth Priv Protocol noPriv User 2 rw snmpadmin2 Auth Protocol noAuth Priv Protocol noPriv User 3 rw snmpadmin3 Auth Protocol noAuth Priv Protocol noPriv User 4 ro snmpuser1 Auth Protocol no...

Page 949: ...t Severity level 0 5 4 Trap recipient Port 0 65535 162 Trap Recipient s IP address 0 0 0 0 Trap Recipient s IP address 0 0 0 0 Trap Recipient s IP address 0 0 0 0 To check SNMP credentials in the Mana...

Page 950: ...yes FICON MIB yes y no n yes HA MIB yes y no n yes FCIP MIB yes y no n yes ISCSI MIB yes y no n yes To collect performance on a Virtual Fabric enabled device use the userconfig show command to make s...

Page 951: ...ay the same Y axis range for both the Tx MB Sec and Rx MB Sec measure types for easier comparison of graphs Generating a real time performance graph You can monitor a device s performance through a pe...

Page 952: ...Managed CNA Ports by which you want to graph performance NOTE Devices with 10GE ports must be running Fabric OS 6 4 1ltd or later to obtain the correct TE port statistics TX RX NOTE Devices with 10GE...

Page 953: ...ilization or Rx Utilization from the Measures list 5 Select how detailed the data will display from the Granularity list Options are in increments of 10 seconds 15 seconds 20 seconds 25 seconds 30 sec...

Page 954: ...ime performance data To export real time performance data complete the following steps 1 Generate a performance graph To generate a performance graph refer to Generating a real time performance graph...

Page 955: ...Use the RRD Round Robin Database style aging scheme Enable granularity The granularity varies depending on the configuration on the Server Management Console Performance Data Aging tab Option 1 2 year...

Page 956: ...ical performance collection for selected fabrics To enable historical performance collection for selected fabrics complete the following steps 1 Select Monitor Performance Historical Data Collection T...

Page 957: ...orm the following steps to disable historical performance collection on all fabrics 1 Select Monitor Performance Historical Data Collection The Fabric Selector dialog box displays 2 Select Disable All...

Page 958: ...ve the rmon MIB enabled on the switch For more information about the rmon collection command refer to the Fabric OS Converged Enhanced Ethernet Command Reference If you select Custom the Custom Port S...

Page 959: ...ved during the chart time range and master log events logged on the same product as the measure being plotted h Move the Row Height slider to the left to make the row height smaller or to the right to...

Page 960: ...ained within the view area when you drag the chart into a different time range on the SNMP monitoring graph Select Plot Min Max to plot minimum and maximum values along with the average data point Thi...

Page 961: ...the rmon collection command refer to the Fabric OS Converged Enhanced Ethernet Command Reference The selected ports move to the Select Ports table 5 Click OK Filtering data by time To filter data for...

Page 962: ...ion where you want to save the performance data 4 Enter a name for the file and click Save Deleting a favorite graph configuration To delete a favorite historical performance graph configuration compl...

Page 963: ...ors are persisted in the database and are enabled on one of the F_ports on the connected device the Management application server determines the port You can use these monitors to view both real time...

Page 964: ...isplays them in the Monitored Pairs table 6 Click Apply Before you apply end to end monitoring to ports moved to the Monitored Pairs table the Status column displays Not Configured When you Apply the...

Page 965: ...nitor Performance End to End Monitors The Set End to End Monitor dialog box displays 2 Select one or more end to end monitor pairs you want to view from the Monitored Pairs table You can select up to...

Page 966: ...ported on the 8 Gbps FC Ports Advanced Performance Monitoring enables you to create Top Talker monitors on selected devices Use Top Talkers to display the connections which are using the most bandwidt...

Page 967: ...the fabric on which you want to monitor Top Talker data NOTE On the 8 Gbps 8 FC port 10 GbE 24 DCB port Switch Top Talkers is only supported on the 8 Gbps FC Ports 2 Select Monitor Performance Top Tal...

Page 968: ...TE An F_Port mode Top Talker and a fabric mode Top Talker cannot be configured on the same fabric You must delete the fabric mode Top Talker before you configure the F_Port mode Top Talker NOTE A Top...

Page 969: ...following details 9 Click the minimize button to hide this dialog box when it is not needed Deleting a Top Talker monitor To delete a Top Talker monitor complete the following steps 1 Select the dial...

Page 970: ...frames at the offered rate because the offered rate is greater than the physical data rate of the line For example this condition can be caused by trying to transfer data at 8 Gbps over a 4 Gbps ISL Y...

Page 971: ...oduct List Select Monitor Performance View Bottlenecks If a port is experiencing a bottleneck a bottleneck icon is displayed in the Connectivity Map for the switch and fabric and in the Product List f...

Page 972: ...re to enable bottleneck detection on those switches as well NOTE It is recommended that you enable bottleneck detection on every switch in the fabric When you enable bottleneck detection you also dete...

Page 973: ...affected by latency bottleneck and trigger a latency alert Values are in tenths of a second from 0 to 10 tenths or 1 second You can only configured Time Threshold for switches running Fabric OS v7 1...

Page 974: ...meters as the switch You can then change the parameters for specific ports or exclude specific ports from bottleneck detection Use the following procedure if you want to restore the switch bottleneck...

Page 975: ...list You can select up to 32 ports You can select a port on the Available list or Selected list to find and highlight the port on the alternate list 4 Click OK The Bottleneck Graph dialog box display...

Page 976: ...able then click the Show affected VM button to display a property dialog box which displays virtual machines with the same target port s the device port attached to the bottlenecked F_Port or FL_Port...

Page 977: ...ted and displayed in the master log Creating and editing a threshold policy NOTE If you set the threshold for a particular critical event to 100 by the time you are notified it may be too late to prev...

Page 978: ...Threshold Policies dialog box 2 To edit a current policy select a policy form the available threshold policies The Edit Threshold Policy dialog box displays FIGURE 404 Edit Threshold Policy dialog bo...

Page 979: ...er a percentage for the buffer in the Buffer Size field Counters may fluctuate around the upper or lower boundary of a range threshold and as a result cause numerous events in a short period of time T...

Page 980: ...The threshold policy displays in the Available Threshold Policies table with an added icon using the following naming format copy of Threshold_Name To edit the threshold refer to Creating and editing...

Page 981: ...ected devices You will need to upgrade the Fabric Watch license and then assign threshold policies to these devices Click OK to close the message 5 Click OK on the Set Threshold Policies dialog box Th...

Page 982: ...E_ports and FCIP tunnels Performance connection utilization for device ports provides the following features Turns the utilization display on and off from the menu and tool bar Displays moving dotted...

Page 983: ...ire SAN Select Enable Selected Fabrics to enable data collection for specific fabrics The Historical Data Collection dialog box displays To select the fabrics on which you want to enable data collecti...

Page 984: ...for the yellow line 4 Click the apply link The new values appear in the utilization legend Configuring the performance graph display Use the procedure to configure the graph display for the Real Time...

Page 985: ...variation during the time period Select Show Events to display advanced monitoring service AMS violation events received during the chart time range and master log events logged on the same product as...

Page 986: ...options from the Granularity list to set the granularity of the data point to display on the graph Minimum interval 30 minutes 2 hours 1 day The granularity varies depending on the configuration on th...

Page 987: ...mic or non logarithmic axis Each unit in a non logarithmic axis presents the data in equal segments However logarithmic axis units are not equal and can increase exponentially by 10 Therefore use a lo...

Page 988: ...onitoring service AMS violation events received during the chart time range and master log events logged on the same product as the measure being plotted Each event will be represented by the same sev...

Page 989: ...0 minutes to the last 6 hours Historical options are incremental from the last 30 minutes to the last 24 hours Historical graphs and monitors only Select Absolute time to get a snapshot of data from a...

Page 990: ...942 Brocade Network Advisor SAN User Manual 53 1002696 01 SAN Connection utilization 29...

Page 991: ...d through a port Each frame monitor keeps a timestamp of its last refresh It also keeps a generation count which is incremented each time the monitor is cleared Frame monitors generate alerts whenever...

Page 992: ...y up to four values to compare against each offset If more than one offset is required to properly define a filter the bytes found at each offset must match one of the given values for the filter to i...

Page 993: ...oring license is required to configure frame monitors The monitoring functionality requires the Fabric Watch license The maximum number of frame monitors and offsets per port is platform specific Refe...

Page 994: ...Products Ports list The Monitors list displays all of the frame monitors defined for that switch 7 Select one or more ports You must select only ports belonging to the same switch 8 Select one or more...

Page 995: ...one or more switches in the Products Monitors list and click the right arrow button to assign the frame monitor to those switches If the frame monitor already exists on the switches the frame monitor...

Page 996: ...assigned 1 Select Monitor Fabric Watch Frame Monitor The Frame Monitor dialog box displays 2 Select the Port option 3 Select a switch in the Products Ports list The Monitors list displays all of the f...

Page 997: ...types 1 Select Monitor Fabric Watch Frame Monitor The Frame Monitor dialog box displays 2 Select the Switch option The Products Monitors list displays the switches that support Frame Monitoring 3 Exp...

Page 998: ...950 Brocade Network Advisor SAN User Manual 53 1002696 01 Removing a frame monitor from a switch 30...

Page 999: ...g historical reports for all policy monitors 972 Viewing historical reports for a policy monitor 972 Policy monitor overview Use the Policy Monitor feature to provide best practice guidelines for netw...

Page 1000: ...abase and complicate other ongoing administrative tasks Rule Violation Fix If the policy monitor report shows a violation the Administrator can use the Zoning dialog box Configure Zoning Fabric to fix...

Page 1001: ...at least two ISLs between each switch pair The redundant link refers to both the physical connection and the logical ISL No matter how many physical connections exist between the two base switches th...

Page 1002: ...ator can register the Management server as an Syslog recipient through the Syslog Recipients dialog box Monitor Syslog Configuration Product Syslog Recipients Refer to Fault Management on page 973 Che...

Page 1003: ...t fabrics based on discovery type and connection knowledge that the Management application collects however there is no guarantee that redundant paths exist to the same storage target Depending on how...

Page 1004: ...bric plus VM Manager discovery refer to Discovering fabrics on page 41 Make sure there are Brocade HBAs with a 2 1 or later driver on the host connected to the fabric VM Manager plus Host discovery re...

Page 1005: ...Checks All Fabrics Switch Router Checks All SAN Switches product group Viewing policy monitor status You can view policy monitor status from the main Management application window or from the Policy M...

Page 1006: ...ly daily weekly or monthly at which the policy is scheduled Next Run The time the policy will run again Last Run The time the policy ran last Result The result of last policy monitor run There are fou...

Page 1007: ...al reports for a policy monitor on page 972 9 To view the report history for a selected policy monitor select a policy monitor and click History refer to Viewing historical reports for a policy monito...

Page 1008: ...hly deployment refer to Configuring a monthly policy monitor schedule on page 966 6 To set policy monitors for fabrics select the Fabric Checks tab and complete the following steps a Select the Check...

Page 1009: ...right arrow button NOTE You can use the All Fabrics target in the Available Fabrics table for future provisioning Select All Fabrics and click the right arrow button to apply this policy to all discov...

Page 1010: ...e minimum number of configured ISLs between each switch pair Select the Check for HTTPS secure HTTP configuration check to check each target to see if HTTPS is active for device data transmission Sele...

Page 1011: ...for future provisioning Select All SAN Switches and click the right arrow button to apply this policy to all discovered switches The selected switches display in the Selected Switches Routers list 8...

Page 1012: ...nt Checks tab a Select the Management Checks tab b Select the Check to see if the server backup is enabled and working check box to determine the following configurations Backup enabled for the Manage...

Page 1013: ...To configure an hourly schedule complete the following steps 1 Select Hourly from the Frequency list 2 Select the minute past the hour you want deployment to run from the Minutes past the hour list Wh...

Page 1014: ...2 the minute value is from 00 through 59 and the day or night value is AM or PM 3 Select the day you want deployment to run from the Day of the Month list 1 through 31 4 Click OK on the Schedule Prope...

Page 1015: ...ialog box displays 2 Select the policy you want to delete in the Monitors list 3 Click Delete 4 Click Yes on the confirmation message 5 Click Close on the Policy Monitor dialog box Running a policy mo...

Page 1016: ...URE 417 Policy_Name Policy Monitor Report 4 Review the report details refer to Viewing a policy monitor report on page 969 To export a report refer to Exporting a policy monitor report on page 971 To...

Page 1017: ...ort refer to Exporting a policy monitor report on page 971 E Mail button To e mail a report refer to Exporting reports to e mail recipients on page 1059 Status Summary Number of checks that passed par...

Page 1018: ...ame Product name Status Result of the check and reason for failure if known Valid results include Passed Partially Failed Failed Not Applicable and Unknown Switch Checks include the following options...

Page 1019: ...Switch checks provide the following information for each selected check Name Product name Status Result of the check and reason for failure if known Valid results include Passed Partially Failed Faile...

Page 1020: ...reports refer to Viewing a policy monitor report on page 969 4 Click the close button X on the Policy_Name Policy Monitor Report browser window 5 Click Close on the Report History dialog box Viewing...

Page 1021: ...naged SAN and IP networks using the following methods Listen forward and process SNMP traps for SAN and IP devices which eliminates the need to poll devices for events Receive and forward Syslog messa...

Page 1022: ...fication E mail The E mail Event Notification Setup dialog box displays Figure 418 FIGURE 418 E mail Event Notification Setup dialog box 2 Select the Enable E mail Event Notification check box to enab...

Page 1023: ...message to a specific user Select Send to all users enabled for notification to send a test e mail message to all users already set to receive notification 11 Click Send Test E mail to test the e mail...

Page 1024: ...listed in the Selected Products to be displayed list are shown in the Master Log and all newly added products are added to the Available Products list 7 Select one or more event categories from the Av...

Page 1025: ...own in Figure 420 displays FIGURE 420 Define Filter dialog box Advanced tab 5 Select the Start Date check box to display only the events that were logged after the specified start date The default sta...

Page 1026: ...d click the right arrow button to move it to the Selected Event Action to be displayed list 9 Click OK to close the Define Filter dialog box Viewing events The All Events dialog box enables you to vie...

Page 1027: ...t products NOTE You can register and unregister other recipient servers on the Fabric OS switches on a per switch basis For IP products you can perform registration only at the switch level 1 Select M...

Page 1028: ...ss as an SNMP trap recipient The SNMP version and credentials from the SNMP profile for example SNMP v3 are registered Removing a trap recipient from one or more switches 1 Select Monitor SNMP Setup P...

Page 1029: ...ation The Add Trap Destination dialog box allows you to configure destinations for forwarding SNMP traps 1 Select Monitor SNMP Setup Trap Forwarding The SNMP Trap Forwarding dialog box shown in Figure...

Page 1030: ...only traps from the selected products are forwarded When enabled the Open View Source Name is added to the variable binding varbind value to the trap before forwarding 7 Select a supported SNMP type...

Page 1031: ...e Forward Application Messages check box to forward application events 7 Click the Forward pseudo events check box to forward pseudo events 8 Select a severity level from the Severity list The severit...

Page 1032: ...ove it to the Selected Trap Type list 11 Click OK Event reception The Event Reception feature provides an interface to add the credentials and community strings required to decode traps You can use th...

Page 1033: ...informs from these SAN products The Table 85 explains the combinations of security and authentication which will help you when you make your SNMP credentials configuration decisions For information a...

Page 1034: ...For configurations that do not have authentication or privacy the Management application uses the user name to match for authentication 5 Select an authentication protocol from the Auth Protocol list...

Page 1035: ...traps to be available To register a trap you must first identify the MIB file that contains the trap information in the mibs_to_compile txt file Then you must register the traps using the Event Recept...

Page 1036: ...customization The Trap Configuration tab of the Event Reception dialog box enables you to configure the following settings Register and unregister various Management Information Bases MIBs Customize...

Page 1037: ...f the MIB to which the trap belongs Information about the trap Any variable bindings varbinds that the trap uses Information about the varbind its name OID and type is displayed Recommended action spe...

Page 1038: ...ed button 7 Click OK Once unregistered the status of the trap changes to Not Registered Customizing a registered trap definition Perform the following steps to modify the definitions of registered tra...

Page 1039: ...re enabled the sender sends initial informs request for engine ID discovery from any of its ephemeral ports ranging from 32768 to 65535 to port 161 on the Management server The sender receives the ack...

Page 1040: ...s The Syslog Recipients dialog box shown in Figure 429 displays FIGURE 429 Syslog Recipients dialog box 2 Select Add from the Action list 3 Enter the IP address of the syslog port the recipient server...

Page 1041: ...fabric or switches from the Available list 5 Click OK The Management application removes the recipient from the managed switches Syslog forwarding The Syslog Forwarding dialog box enables the Managem...

Page 1042: ...eld This is a mandatory field IPv4 and IPv6 addresses are accepted but a DNS name is not accepted 6 Enter the syslog listening port of the recipient in the Port field This is a mandatory field Valid n...

Page 1043: ...yslog filter display in the Available Products list 5 Enter a unique name for the syslog filter in the Filter Name field 6 Enter a general description of the syslog filter in the Description field 7 O...

Page 1044: ...application monitors on which products they are to be monitored how often they are to be monitored and what to do when the monitored events are generated This information can be defined by creating a...

Page 1045: ...name and description for the event action and select the Enabled check box 4 Click Next to advance to the Events pane Events pane of the Add Event Action Sources dialog box 1 Select Monitor Event Pro...

Page 1046: ...ses for the traps to be displayed Use the Trap Filter tool to limit the trap list to the trap severities you want To use this tool click the Filter button to display the Trap Filters dialog box 5 Clic...

Page 1047: ...arbind filters check box on the Events pane of the Add Event Action dialog box This enables you to configure filters on varbind values for this event action NOTE Varbind filter configuration is only a...

Page 1048: ...ion dialog box displays Proceed to Selecting source address products and ports Selecting source address products and ports The Sources pane of the Add Event Action dialog box shown in Figure 436 allow...

Page 1049: ...se the filter is applied globally on a product 6 If the Use IfIndex in source matching check box is selected select the varbind to be used from the Trap Varbind IfIndex list 7 Select the event senders...

Page 1050: ...example if you want the action to be applied when 10 link down traps occur during a one minute interval then the specified action will be applied as soon as 10 link down traps occur even though the o...

Page 1051: ...res the policy can be repeated 5 In the Message field enter the message that will be displayed in the Event Log for the generated event This entry replaces the default message that is displayed for a...

Page 1052: ...k box to execute a policy monitor as an action based on a selected event and then select the target for the policy monitor from the list Target options include Event Sender and Specified in Config 4 S...

Page 1053: ...special event for special events handling using the Actions pane of the Edit Event Action dialog box See step 6 of Editing event actions on page 1003 for information on enabling special events handli...

Page 1054: ...m the e mail message will be sent from the Available Recipients list and click the right arrow button to move the recipient to the Selected Recipients list NOTE Make sure the user you select has an e...

Page 1055: ...isting one You can create a new event action definition by copying one that is in the Event Actions list 1 Select Monitor Event Processing Event Actions The Event Actions dialog box displays 2 Select...

Page 1056: ...e definition that you want to delete from the Event Actions list 3 Click Delete A message displays asking you to confirm the deletion request 4 Click Yes to delete the definition or No to cancel the r...

Page 1057: ...ion for IP products NOTE If the CLI configuration you chose from CLI Configuration Manager contains a non Brocade product as a target the configuration will not be deployed to the non Brocade product...

Page 1058: ...FIGURE 443 Pseudo Events dialog box 2 To view additional information for a definition select a definition from the list Additional information displays in the Details of Selected Pseudo Event list at...

Page 1059: ...on time in minutes or seconds When an event occurs an escalation policy waits for a duration of time to see if the event remains in that state If it does then the specified action in the definition is...

Page 1060: ...ld describe the events in the event action policy 5 Select a severity from Severity list You must assign a severity to the pseudo event 6 Click Next The Events pane of the Add Pseudo Event dialog box...

Page 1061: ...with the selected trap by doing any of the following Click one of the following buttons MIB Information if you want the default SNMP name for the traps to be displayed MIB Alias if you want the aliase...

Page 1062: ...Use caution when you modify pseudo events Saving changes to a pseudo event definition resets the run time information for that pseudo event 1 Select Monitor Event Processing Pseudo Events The Pseudo E...

Page 1063: ...ting the pseudo event Specify the escalation time in minutes or seconds 6 Click Next The Events pane of the Add Pseudo Event dialog box displays 7 Select a critical event such as LinkDown and click th...

Page 1064: ...sages 13 Select the Management application user to whom the e mail message will be sent from the Available Recipients list and click the right arrow button to move the recipient to the Selected Recipi...

Page 1065: ...conds 6 Click Next The Events pane of the Add Pseudo Event Events dialog box displays 7 Select a critical event such as LinkDown and click the right arrow button to move it to the Selected Down Trap l...

Page 1066: ...formation about adding an event action refer to Event action definitions on page 996 Adding a pseudo event on the flapping policy The flapping policy checks to see if the event consistently transition...

Page 1067: ...t the pseudo event you created and click Next The Sources pane of the Add Event Action dialog box displays 7 Select the source that you will use to monitor this event from the Selected Sources list 8...

Page 1068: ...product or port will not be found From this column specify what you want Event Processor to do with the value in the attribute Find Device Find the product with the IP address in the attribute and dep...

Page 1069: ...finition or modify delete or duplicate existing report definitions The Schedules tab lists all the previously created schedules on the report definition This tab enables you to add a new schedule or m...

Page 1070: ...n shows the port 6 Data for all attributes is sorted in ascending order and is sorted in the sequence that the attributes appear in the Sort By Columns list In the Selected Columns list select which a...

Page 1071: ...erated report This is a required parameter 7 Click the Do not share this definition button if you do not want to share this definition with other Management application users If you select this button...

Page 1072: ...e definition or click Run to launch the report Filtering a report definition Complete the following steps to filter a report definition You must first enter a name and title on the Identification tab...

Page 1073: ...6 01 Event custom reports 32 FIGURE 449 Add Edit Report Definition dialog box Product tab 4 Click the Filter tab The Add Edit Report Definition dialog box Filter tab shown in Figure 450 displays FIGUR...

Page 1074: ...e each address with a comma 7 Select the Acknowledge check box if you want messages that have been acknowledged to be included in the report 8 Select the severity from the Available Severity list and...

Page 1075: ...te from the Start Date list b Select the specific hour time for the start time from the Start Time list and select AM or PM c Select the specific end date from the End Date list d Select the specific...

Page 1076: ...edit a definition 1 Click the Report Definitions tab of the Event Custom Reports dialog box and select the definition you want to modify 2 Click Edit 3 When the Add Edit Report Definition dialog box...

Page 1077: ...able Add Launches the Add Schedule dialog box Edit Launches the Edit Schedule dialog box with the selected schedule information pre populated Duplicate Creates a copy of the selected report schedule D...

Page 1078: ...the following periods from the Frequency list One Time Hourly If you selected Hourly as the schedule type Minutes past the hour appears Select the minutes after the hour when the report will be gener...

Page 1079: ...e the name from the Selected Recipients list and return it to the Available Recipients list NOTE Make sure an e mail address is configured in the user s account for the selected user 15 Enter other e...

Page 1080: ...te a change in Switch Status for all discovered switches and Brocade HBAs Security Log Displays all security events for the discovered switches Syslog Log Displays syslog messages from switches and HB...

Page 1081: ...Right click one of the selected rows and select Copy Rows 4 Open the application to which you want to paste the data 5 Click where you want to paste the data 6 Press CTRL V or select Edit Paste from t...

Page 1082: ...o configure e mail notification refer to Configuring e mail notification on page 974 To e mail all event details from the Master Log complete the following steps 1 Right click an entry in the Master L...

Page 1083: ...Name The port name associated with the event First Event Server Time The time the event occurred Fabric Name The VCS fabric name Product Address The IP address of the product on which the event occur...

Page 1084: ...tion to which you want to paste the data 4 Click where you want to paste the data 5 Press CTRL V or select Edit Paste from the other application All data and column headings are pasted Copying the ent...

Page 1085: ...filter When the firmware determines that certain events do not receive e mail notification an e mail message is not sent for those events even when the event type is added to the Selected Events list...

Page 1086: ...Network Advisor SAN User Manual 53 1002696 01 Event logs 32 Alert Critical Errors Warning Notice Info Debug Unknown Clear the severity level check boxes to turn off the filter for the selected events...

Page 1087: ...information Environment information Vital CPU memory network resources Agent and driver logs Install logs Core files Database partial or full Web Tools data Client Support save data includes Client Lo...

Page 1088: ...data from the products You cannot close the progress message and you cannot perform any other actions until the SupportSave is complete The application generates separate master logs to show the statu...

Page 1089: ...partial full database Capturing data from the products You cannot close the progress message and you cannot perform any other actions until the SupportSave is complete The application generates separa...

Page 1090: ...ortsave path in the CLI If the path has spaces enclose it in double quotes By default the capture location is one of the following Local client User_Home Management_Application_Name localhost Remote c...

Page 1091: ...t must be a managed Brocade HBA NOTE Scheduling technical support data collection is not supported on ESXi Servers NOTE You must have the SupportSave privilege to perform this task For more informatio...

Page 1092: ...hnicalsupport Technical SupportSave uses the following naming convention for the Fabric OS device support save files Supportinfo Day mm dd yyyy hh mm ss Switch_Type Switch_IP_Address Switch_WWN 8 Clic...

Page 1093: ...er to Configuring an external FTP SCP or SFTP server on page 127 NOTE Fabric OS switches must be running Fabric OS 5 2 X or later to collect technical support data NOTE The HBA must be a managed Broca...

Page 1094: ...rt save files To view the technical support repository complete the following steps 1 Select Monitor Technical Support View Repository The Technical Support Repository dialog box displays Field Descri...

Page 1095: ...ailure Data Capture Files table Select the support data file you want to view Displays the following information File Name The name of the SupportSave file Size MB The name of the SupportSave file Las...

Page 1096: ...ter the e mail address of the person to receive the e mail in the To field 5 Enter your e mail address in the From field 6 Click OK The e mail is sent and the Technical Support Repository dialog box c...

Page 1097: ...Technical Support View Repository The Technical Support Repository dialog box displays 2 Select the file you want to delete in the table 3 Click Delete 4 Click OK on the Technical Support Repository...

Page 1098: ...of ports Firmware The firmware version Location The customer site location Contact The primary contact at the customer site Description A description of the customer site State The switch state for ex...

Page 1099: ...ng upload failure data capture files NOTE Upload Failure Data Capture is only supported on Fabric OS devices 1 Select Monitor Technical Support Upload Failure Data Capture The Upload Failure Data Capt...

Page 1100: ...to where the trace dump data is saved in the Directory Path field 5 Click Test to test the server credentials 6 Click OK on the Change FTP Host dialog box 7 Click OK on the Upload Failure Data Capture...

Page 1101: ...rested in the SAN s architecture or archive them for future reference The following standard report types are available from the Generate Reports dialog box Fabric Ports Lists discovered ports includi...

Page 1102: ...view reports complete the following steps 1 Select Reports View or click the View Report icon The View Reports dialog box displays 2 Select the report you want to view in the All Reports list If you...

Page 1103: ...first by following the instructions in Generating SAN reports on page 1054 You can select reports by Time Report Type or User 3 Select the format PDF HTML or XML you want to export to from the list to...

Page 1104: ...Print dialog box displays 5 Select the printer to which you want to print and click Print 6 Close the Web browser 7 Click Close in the View Reports dialog box 8 Click Yes on the are you sure you want...

Page 1105: ...list b Select the ports from which you want to gather performance data from the From list Devices with 10GE ports must be running Fabric OS 6 4 1ltd or later to obtain the correct TE port statistics T...

Page 1106: ...ta from the Measures list To select more than one measure click the Additional Measures expand arrows and select the check box for each additional measure f Save this configuration by selecting Save T...

Page 1107: ...View Reports dialog box NOTE Hyperlinks in reports are active only as long as the source data is available To print the selected report refer to Printing SAN reports on page 1056 To export the select...

Page 1108: ...lays 3 Select the preconfigured e mail user account from the list and click OK 4 Enter additional e mail addresses in the Other Recipients text box 5 Enter text in the Subject text box to change the s...

Page 1109: ...Select to display the active Management application sessions Server Properties Select to display the Server properties Options Select to configure the Management application options Exit Select to clo...

Page 1110: ...s Menu Command Command Options Server Menu Users Select to configure users and user groups User Profile Select to configure user profiles Active Sessions Select to display the active Management applic...

Page 1111: ...Product Only or Ports Only Copy View Select to copy a view Delete View Select to delete a view Edit View Select to edit a view Zoom Select to configure the zoom percentage Show Select to determine wha...

Page 1112: ...Port Label Select to configure which port labels display Name Select to display the name as the port label Port Select to display the port number as the port label Port Address Select to display the p...

Page 1113: ...h Web Tools Name Server for the selected device HCM HBA or CNA only Select to launch the HCM Agent for the selected device Enable Disable Select to enable or disable Virtual Fabrics switches and ports...

Page 1114: ...oE port FICON Enterprise Licensed version Only Select to configure FICON Configure Fabric Select to configure cascaded FICON from the selected fabric Merge Fabrics Select to merge the selected fabrics...

Page 1115: ...and Licensed version Only Select to enable virtual fabrics for your SAN Disable Trial and Licensed version Only Select to disable virtual fabrics for your SAN Logical Switches Trial and Licensed versi...

Page 1116: ...top conversations for a switch or port along with related information Real Time Graph Select to monitor performance through a graph which displays transmit and receive data The graphs show real time d...

Page 1117: ...e port fencing to protect your SAN from repeated operational or security problems experienced by ports Frame Monitor Select to configure frame monitors Performance Thresholds Trial and Licensed versio...

Page 1118: ...orwarding Product Syslog Recipients Select to register a host as a syslog recipient Technical Support Select to configure technical support data SupportSave Select to capture server and client support...

Page 1119: ...rate custom event reports Generate Select to determine which reports to run View Select to view reports through the application or through an internet browser Tools Menu Setup Trial and Licensed versi...

Page 1120: ...elected fabric FICON Configure Fabric Merge Fabrics Trial and Licensed version Only High Integrity Fabric Trial and Licensed version Only Routing Configuration Domain IDs Trial and Licensed version On...

Page 1121: ...opy Row Copy Table Export Row Export Table Search Select All Size All Columns To Fit Expand All Collapse All Customize Only available from Product List Collapse or Expand Only available from Connectiv...

Page 1122: ...Enterprise Edition Only Only available for Fabric OS devices Only enabled when the Fabric OS device is FICON capable and has the Enhanced Group Management license Configuration Save Save Running to St...

Page 1123: ...nd Licensed version Only Historical Report Trial and Licensed version Only Bottleneck Graph Trial and Licensed version Only Events Accept Change Trial and Licensed version Only Only enabled in tracked...

Page 1124: ...le Copy Device_Name Group Copy Row Copy Table Export Row Export Table Search Select All Size All Columns To Fit Expand All Collapse All Customize Only available from Product List Properties Core Switc...

Page 1125: ..._Name Group Copy Row Copy Table Export Row Export Table Search Select All Size All Columns To Fit Expand All Collapse All Customize Only available from Product List Properties DCB Element Manager Hard...

Page 1126: ...Capture View Repository Events Port Connectivity Port Optics SFP Telnet Telnet through Server User defined menu item Setup Tools Product Only enabled when the fabric is tracked and the product is remo...

Page 1127: ...y for Node Origin and Routed instance in a routed fabric LightPulse Utility NT Only available for Emulex devices Launches with Origin in context for routed device Emulex Configuration Tool Only availa...

Page 1128: ...devices routed in Not available for enclosures Destination Only available for devices routed out Not available for enclosures Port Display Occupied Product Ports UnOccupied Product Ports Attached Port...

Page 1129: ...l Customize Only available from Product List Properties Switch Port FC Enable Disable Enable Disable Decommission Port Recommission Port Zoning List Zone Members Performance Real Time Graph Historical...

Page 1130: ...Disabled when all ports are offline FC Security Protocol Only available for Managed JSON HBA Ports Only available when you have the Security Privilege Zoning List Zone Members Trial and Licensed vers...

Page 1131: ...from Product List Collapse All Only available from Product List Properties Storage Node Storage Port Mapping Trial and Licensed version Only Show Ports Does not display for routed devices Show Connec...

Page 1132: ...s Attached Ports Switch to Switch Connections Only available from Product List Table Copy Device_Name Group Copy Row Copy Table Export Row Export Table Search Select All Size All Columns To Fit Expand...

Page 1133: ...oduct List Properties White Area of the Connectivity Map Accept All Changes Zoom Zoom In Zoom Out Map Display Expand Collapse Export White Area of the Product List Port Display Occupied Product Ports...

Page 1134: ...menus A Product List Table Copy Component Copy Table Export Table Search Select All Size All Columns To Fit Expand All Collapse All Customize Some form of this shortcut menu is available for all tabl...

Page 1135: ...code Event type Description Severity 504 DVP LIM HW Port module failure 3 506 DVP PORT Fibre Channel port failure 3 509 DVP PORT Fibre Channel path failure 0 511 LIM DVP LIM SPP failure 3 514 DVP LIM...

Page 1136: ...thermal violations 3 850 CTP HW System shutdown due to CTP thermal threshold violations 4 TABLE 90 Fabric OS Events Event reason code FRU code Event type Description Severity N A Ethernet Switch is n...

Page 1137: ...ual 1089 53 1002696 01 Call Home Event Tables B 1436 FW 1436 Marginal port 3 1437 FW 1437 Faulty port 3 1438 FW 1438 Faulty or missing SFPs 3 TABLE 90 Fabric OS Events Continued Event reason code FRU...

Page 1138: ...1090 Brocade Network Advisor SAN User Manual 53 1002696 01 Call Home Event Tables B...

Page 1139: ...k listener added RLIR Link listener removed Link RLIR failure Traps that begin with OID 1 3 6 1 4 1 1588 2 1 1 50 are categorized as link incident events Product status events Product status events in...

Page 1140: ...5 FW 1426 FW 1427 FW 1428 FW 1429 FW 1430 FW 1431 FW 1432 FW 1433 FW 1434 FW 1435 FW 1436 FW 1437 FW 1438 FW 1439 FW 1440 FW 1441 FW 1442 FW 1443 FW 1444 Product audit events Events that are used to t...

Page 1141: ...Violation 1 3 6 1 4 1 1991 0 78 snTrapPortSecurityShutdown 1 3 6 1 4 1 1991 0 85 snTrapMacAuthEnable 1 3 6 1 4 1 1991 0 86 snTrapMacAuthDisable 1 3 6 1 4 1 1991 0 87 snTrapMacAuthMACAccepted 1 3 6 1 4...

Page 1142: ...6 1 4 1 1991 1 11 1 1 2 2 2 37 mwlAcctRadiusServerSwitchoverFailure 1 3 6 1 4 1 1991 1 12 1 1 5 100 0 4 portSecurityViolation 1 3 6 1 4 1 1991 1 12 1 1 5 109 0 1 portSECViolation 1 3 6 1 4 1 1991 1 12...

Page 1143: ...he option to forward events to the vCenter during VM Manager discovery TABLE 91 Performance monitoring IP threshold events Trap name OID Description bnaRisingThresholdCrossed 1 3 6 1 4 1 1991 1 13 2 0...

Page 1144: ...1096 Brocade Network Advisor SAN User Manual 53 1002696 01 IP Performance monitoring events C...

Page 1145: ...lege is the Management application s method of providing role based access control RBAC to the software s user administrator In the Management application privileges are assigned to roles and devices...

Page 1146: ...log box and manage server truststores Disables Certificates on the Options dialog box Enables Certificates on the Options dialog box Only viewing of the certificates is supported Enables Certificates...

Page 1147: ...Notification Setup button in the Users dialog box Enables all functions in the E Mail Event Notification Setup dialog box Event Management Allows you to define rules with event triggers and actions D...

Page 1148: ...yslog configuration commands from the Monitor menu Enables the following functions from the dialog box boxes configure Management server registration configure TRAP or Syslog forwarding register other...

Page 1149: ...License dialog box from the Help menu Disables the License command on the Help menu Enables the License command on the Help menu however disables the Update and OK buttons Enables the License command...

Page 1150: ...m editable property fields Enables the Names command on the Configure menu however disables all edit functions in the dialog box Enables Properties command on Edit menu and right click menus Enables e...

Page 1151: ...s bar Enables all functions for Backup on the Options dialog box Server Software Configuration Allows you to configure some of the properties of the client and server of the management application Dis...

Page 1152: ...tool bar Enables the Users command on the Server menu and the Users button on the main tool bar however disables the Add Edit and Remove Users Add and Remove Groups and OK buttons on the Users dialog...

Page 1153: ...one Database DB tab of the Zoning dialog box Allows you to activate a zone configuration selected in the Zoning dialog box Disables the Activate Deactivate and Zoning Policies buttons in the Zoning di...

Page 1154: ...udes online and offline zones If you select an online zone the contents are loaded into the Zoning dialog box To launch offline zones you must have the Zoning Offline privilege Disables all online zon...

Page 1155: ...bles the Save To function on the Active Zone Config tab In Zoning dialog box the Zone DB list includes offline zones If you select an offline zone the contents are loaded into the Zoning dialog box Di...

Page 1156: ...ning dialog box Disables LSAN zone functions on all dialog box boxes Disables all online zone database editing activation and persisting functions In Zoning dialog box enables the Cancel and Help butt...

Page 1157: ...erfaces IP performance IP ping and IP trace route Disables the Configure FCIP Tunnel and Configure IP Troubleshooting commands Disables the FCIP Tunnel command on the Fabric right click menu Enables t...

Page 1158: ...ll of the port details and connected devices Disables the Port Connectivity command from the Monitor menu and right click menu Enables the Port Connectivity command from the Monitor menu and right cli...

Page 1159: ...Configure menu and right click menu Enables the Routing Configuration and Routing Domain IDs commands from the Configure menu and right click menu Enables all functions in the dialog box boxes SAN SC...

Page 1160: ...g box SAN Storage Encryption Key Operation Allows you to configure storage encryption key operation including selecting storage devices and LUNs viewing switch group or engine properties viewing stora...

Page 1161: ...a switch to an existing group zeroizing an encryption engine backing up or restoring a master key enabling encryption functions after a power cycle changing key vaults for an encryption group create...

Page 1162: ...in the View Manage View menu and the first tab header on the main desktop however disables the OK button in the Create View and Edit View dialog box boxes Disables the Copy View Delete View and Connec...

Page 1163: ...k Administrator Operator Security SAN System Administrator Security Administrator Security Officer Host Administrator Operator Server Backup SAN System Administrator Product Administrator Operator Ser...

Page 1164: ...witch Configuration SAN System Administrator SAN Port Connectivity SAN System Administrator SAN Port Mapping Host SAN System Administrator Security Officer Host Administrator Operator SAN Port Mapping...

Page 1165: ...Brocade Network Advisor SAN User Manual 1117 53 1002696 01 Appendix E Device Properties In this appendix SAN device properties 1118 Host properties 1130...

Page 1166: ...erties dialog box to close TABLE 96 Fabric properties Field Component Description Name The name specified through the switch Element Manager FID Fabric Name Enter a name for the fabric up to 128 chara...

Page 1167: ...cted Virtual FCoE Port The fabric name switch name and virtual FCoE port number of the connected virtual FCoE port Contact The primary contact at the customer site Contributors The device contributors...

Page 1168: ...adecimal number Managed By The management program used to manage the fabric Master Port The master port of the trunk Member Ports The member ports of the trunk Model The model number of the device Nam...

Page 1169: ...Switch Name The switch name Switch IP The switch IP address Switch WWN The switch world wide name Tape Pipelining Whether tape pipelining is On or Off for the FCIP tunnel Tunnel ID The tunnel identifi...

Page 1170: ...ine or faulted RAID type is 10 in this case Unknown Status is not available Array A group of disks designated by the user to be managed by the RAID 5 technique Assigned LUNs Count All LUNs assigned ma...

Page 1171: ...GB The total size of this LUN s storage in gigabytes State The state of the LUN Storage LUN ID The storage product s LUN ID number for this LUN Storage Ports The total number of storage ports assigne...

Page 1172: ...t A contact for the product Department The department Description A description of the product Device Type The product type Digest Error Count The number of digest errors on the product Driver The iSC...

Page 1173: ...on the product OS Release The operating system release running on the product Portal Addresses The list of IP addresses Port The port number Protocol Error Count The number of protocol errors Tag The...

Page 1174: ...uct connection Associated GE Port The port number of the associated GE port Attached Port The port number of the attached product Back to Edge Routing Support Whether back to edge routing is supported...

Page 1175: ...is FCIP capable FCoE Capable Whether the device is Fibre Channel over Ethernet capable FCS Role Whether FCS is supported Flag FICON related Whether a flag is on or off Firmware The firmware version F...

Page 1176: ...of the device Modify button Click to launch the Element Manager Name The name of the port up to 128 characters This field is editable Node Name The name of the node Node WWN The world wide name of the...

Page 1177: ...tus online or offline Switch Name The switch name Switch IP The switch IP address Switch WWN The switch world wide name Symbolic Name The symbolic name of the port Tag The tag number of the port Tape...

Page 1178: ...vice for the data connection of the FCIP tunnel VLAN ID The VLAN identification number WWN The world wide name of the device TABLE 98 Port properties Continued Field Description TABLE 31 Adapter port...

Page 1179: ...led Factory The WWN is assigned at the factory Configuration Configured State Indicates whether the port is enabled or disabled Max Bandwidth The maximum allowable bandwidth output for the selected po...

Page 1180: ...or disabled FCSP Status Whether FC SP authentication is being used Algorithm The configured authentication algorithm Group The DH group which is DH null group 0 which is the only option Error Status T...

Page 1181: ...matches 1135 Greedy quantifiers 1136 Reluctant quantifiers 1136 Possessive quantifiers 1136 Logical operators 1136 Back references 1137 Special constructs non capturing 1137 TABLE 1 Characters Constr...

Page 1182: ...3 Predefined character classes Construct Matches Any character may or may not match line terminators d A digit 0 9 D A non digit 0 9 s A whitespace character t n x0B f r S A non whitespace character s...

Page 1183: ...p javaMirrored Equivalent to java lang Character isMirrored TABLE 6 Classes for Unicode blocks and categories Construct Matches p InGreek A character in the Greek block simple block p Lu An uppercase...

Page 1184: ...quantifiers Construct Matches X X once or not at all X X zero or more times X X one or more times X n X exactly n times X n X at least n times X n m X at least n but not more than m times TABLE 10 Pos...

Page 1185: ...E Nothing but ends quoting started by Q TABLE 13 Special constructs non capturing Construct Matches X X as a non capturing group idmsux idmsux Nothing but turns match flags on off idmsux idmsux X X a...

Page 1186: ...1138 Brocade Network Advisor SAN User Manual 53 1002696 01 Regular Expressions F...

Page 1187: ...wnload troubleshooting 1142 Launch Client troubleshooting 1144 Names troubleshooting 1146 Patch troubleshooting 1146 Performance troubleshooting 1147 Port Fencing troubleshooting 1151 Professional edi...

Page 1188: ...nd runs the disable UAC command When the command is complete close the window 6 Close the System Configuration Utility 7 Restart the computer to apply changes NOTE You can re enable UAC using the abov...

Page 1189: ...caused by the video adapter driver installed on the machine Some video adapters such as NVIDIA Quadro NVS 135M can cause CPU issues and it is recommended that you upgrade the driver version to a later...

Page 1190: ...he maximum port number of the switch 48 port blades are not allowed in the Director Chassis for FICON FICON is not supported on 48 port blades in the 8 slot Backbone Chassis when Virtual Fabrics is di...

Page 1191: ...IP_address where SSH_server_IP_address is the IP address of the SSH server you want to delete For Network OS devices running firmware version 3 0 and later use the following command sw0 clear ssh key...

Page 1192: ...Panel dialog box 2 Launch the remote client a Open a web browser and enter the IP address of the Management application server in the Address bar If the web server port number does not use the defaul...

Page 1193: ...Select Start Settings Control Panel Java The Java Control Panel dialog box displays b Click View on the General tab The Java Cache Viewer dialog box displays c Right click the application and select...

Page 1194: ...can disable UAC in vista Disable using msconfig by completing the following steps 1 Select Start Run 2 Type msconfig on the Run dialog box and click OK 3 Click the Tools tab on the System Configuratio...

Page 1195: ...snmpconfig show accesscontrol SNMP access list configuration Entry 0 No access host configured yet Entry 1 No access host configured yet Entry 2 No access host configured yet Entry 3 No access host co...

Page 1196: ...witch admin snmpconfig show snmpv3 To set the switch SNMP value use one of the following commands from the switch CLI HCLSwitch admin snmpconfig set snmpv1 HCLSwitch admin snmpconfig set snmpv3 Exampl...

Page 1197: ...yes y no n yes FCIP MIB yes y no n yes ISCSI MIB yes y no n yes 4 To collect FCIP or GE statistics you must configure SNMPv3 credentials in the Address Properties dialog box SNMP tab Verify that the...

Page 1198: ...g in the switch To view the statistics in the switch use one of the following command FC Ports command from the switch CLI portperfshow interval Example Sprint 65 root portperfshow 5 FCIP tunnels comm...

Page 1199: ...bled Right click on the fabric that the segmented switch with red minus icon is part of and select Accept Changes TABLE 15 Professional edition login troubleshooting Problem Resolution Login Failed On...

Page 1200: ...Click Launch A command window displays and runs the disable UAC command When the command is complete close the window 6 Close the System Configuration Utility 7 Restart the computer to apply changes...

Page 1201: ...roperties 10 Select the Disabled option and click OK 11 Close the Group Policy editor 12 Restart the computer to apply changes To disable using the Active Directory based GPO editor complete the follo...

Page 1202: ...the following command sw0 clear ssh key SSH_server_IP_address where SSH_server_IP_address is the IP address of the SSH server you want to delete For Network OS devices running firmware version 2 1 1b...

Page 1203: ...ler sends syslog messages to secondary or ternary recipients only if primary recipient is not reachable Therefore even though the Management application is registered as a syslog recipient it may not...

Page 1204: ...improve speed open the Discover Setup dialog box Discover Setup and add the IP address for the device to the Selected Individual Addresses list Out of memory error caused by running a zoning report fo...

Page 1205: ...18 ACH_CALL_CENTER_CONFIG Field Definition Format Size KEY_ Key to identify the specific configuration of the Call Center varchar 256 CALL_CENTER_ID ID of the Call Center int VALUE Value of specific...

Page 1206: ...int SUPPORT_SAVE 1 Support save is enabled for the switch 0 Support save is disabled for the switch smallint MANAGED_ELEMENT_ID Managed element Id for the device Default value is 1 int TABLE 23 AD_GR...

Page 1207: ...value varchar 256 TABLE 26 AOR_DEVICE_GROUP_MAP Field Definition Format Size AOR_ID ID of the AOR int DEVICE_GROUP_ID The Product Group which is in the AOR int TABLE 27 AOR_DEVICE_MAP Field Definitio...

Page 1208: ...icates default selected product connection property and 0 indicates not included in the default list smallint TABLE 33 BOOT_IMAGE_DRIVER_MAP Field Definition Format Size ID Unique generated database i...

Page 1209: ...he blade varchar 16 ATTN_STATE varchar 32 SERIAL_NUMBER Factory serial number of the blade varchar 32 PART_NUMBER The part number assigned by the organization responsible for producing or manufacturin...

Page 1210: ...char 64 ETHERNET_IPV6_GATEWAY IPV6 Gateway address of Ethernet management port for the blade varchar 64 NUMBER_OF_PORTS int HEADER_VERSION The OEM or vendor assigned version number int GIGE_MODE Deter...

Page 1211: ...int VIRTUAL_SWITCH_ID FK to owning VIRTUAL_SWITCH int IF_INDEX Interface index int IF_NAME Interface name varchar 256 IF_MODE Gige port mode L2 L3 none varchar 8 L2_MODE L2 mode hybrid trunk access v...

Page 1212: ...ition Format Size ID Unique generated database identifier int NAME Column name varchar 255 ENTITY_CATEGORY Either fabric or product switch or device or port or combination of these 3 basic categories...

Page 1213: ...tifies the cluster containing a member int DEVICE_ENCLOSURE_ID Identifies a member of the cluster int 32 TABLE 49 CNA_ETH_PORT Field Definition Format Size ID ID of the Eth port int ETH_DEV Ethernet d...

Page 1214: ...1 adapter number physical port number port index varchar 64 CURRENT_MAC_ADDRESS Current MAC address of the port varchar 64 MAX_BANDWIDTH Maximum guaranteed bandwidth Value will be in Gbps 1 to 10 var...

Page 1215: ...Definition Format Size NAME Name of the collector registered with the collection framework varchar 256 CLASS_NAME Java class name which serves as the collector varchar 256 DESCRIPTION Collector descri...

Page 1216: ...Data smallint FIRMWARE_VERSION Firmware version of the switch varchar 128 VENDOR Vendor information for the switch varchar 256 MAX_VIRTUAL_SWITCHES Maximum number of virtual switches supported smallin...

Page 1217: ...d smallint MANAGED_ELEMENT_ID A unique managed element ID for this physical switch Also a foreign key reference to the MANAGED_ELEMENT table int NAT_PRIVATE_IP_ADDRESS NAT private IP Address Feature a...

Page 1218: ...timestamp TABLE 61 CORE_SWITCH_DETAILS Field Definition Format Size CORE_SWITCH_ID Primary key for the table int ETHERNET_MASK Ethernet mask of the core switch IP address char 64 FC_MASK FC IP Addres...

Page 1219: ...h smallint MAX_NUM_OF_BLADES Required by SMIA to populate Brocade_Chassis MaxNumOfBlades property It indicates the max no of blades that can be present in a chassis smallint VENDOR_VERSION Required by...

Page 1220: ...BLE 63 CRYPTO_LUN Field Definition Format Size ID Unique generated database identifier int CRYPTO_TARGET_CONTAI NER_ID Foreign key reference to the CRYPTO_TARGET_CONTAINER that contains the host for w...

Page 1221: ...YPT_EXISTING_DATA Not used When configuring a disk LUN that was previously cleartext and is to be encrypted this property tells the switch whether or not to start a re keying operation to encrypt the...

Page 1222: ...ss The default value is 0 int LUN_STATE_STRING Lun state string varchar 2048 NEW_LUN This field specifies that when a LUN is added to its container indicate that it s a new LUN to be used in SRDF Conf...

Page 1223: ...ger used Previously indicated whether this switch is the group leader Use GROUP_LEADER_ID in the ENCRYPTION_GROUP table instead smallint TAPE_ENCRYPTION No longer used Previously enabled or disabled t...

Page 1224: ...e Value 0 means LUN Erase is not enabled on the switch smallint TABLE 65 CRYPTO_TARGET_CONTAINER Field Definition Format Size ID Unique generated database identifier int ENCRYPTION_ENGINE_ID Foreign k...

Page 1225: ...n be port tunnel EE monitor ID int TABLE 67 DASHBOARD Field Definition Format Size ID Dashboard ID int NAME Name of the dashboard varchar 128 DESCRIPTION Description of the dashboard varchar 256 TABLE...

Page 1226: ...ate of the widget Possible values are 0 Normal 1 Maximized 2 Collapsed int WIDTH Width of the widget int HEIGHT Height of the widget int ROW_INDEX Row position of the widget 1 for an out of box widget...

Page 1227: ...2 Save Deploy 3 Save deployment only 4 Scheduled smallint DEPLOYMENT_HANDLER_ID Foreign Key references DEPLOYMENT_HANDLER ID Identifies the handler to use for the configuration int SCHEDULE_ENABLED 1...

Page 1228: ...ich implements DeploymentDelegateActionsHandler interface Framework will delegate edit duplicate delete actions to this class varchar 255 PRIVILEGE_ID Comma separated privilege IDs varchar 64 TABLE 73...

Page 1229: ...28 TABLE 75 DEPLOYMENT_TARGET_MAP Field Definition Format Size ID Unique generated database identifier serial DEPLOYMENT_CONFIGU RATION_ID Foreign Key References DEPLOYMENT_CONFIGURATION id Identifies...

Page 1230: ...ar 512 RADIUS_USER_NAME User name for RADIUS access varchar 512 RADIUS_PASSWORD Password for RADIUS access varchar 512 TAC_USER_NAME User name for TACACS access varchar 512 TAC_PASSWORD Password for T...

Page 1231: ...512 RADIUS_PASSWORD_READ_ONLY RADIUS password configured in device used for read only access varchar 512 TAC_USERNAME_PORT_CFG TACACS username for port configuration varchar 512 TAC_PASSWORD_PORT_CFG...

Page 1232: ...managed element ID for this IP switch Also a foreign key reference to the MANAGED_ELEMENT table int NODE_WWN The managed element node WWN if one exists or null empty otherwise varchar 23 SYSLOG_REGIS...

Page 1233: ...ice The values will be populated by the DCB collector during the discovery of the DCB switch int LICENSED_FEATURES This column is used to persist the feature based software licenses existing on the de...

Page 1234: ...is used to determine whether the device is a VCS device The default value 0 means that the device is not VCS capable and value 1 means that the device is VCS capable smallint TRACKING This column help...

Page 1235: ...is will be empty string for all other devices varchar 64 MANAGED_AP_COUNT Its the number of APs that the controller managed int CONTROLLER_CLUSTER_MODE Cluster mode of the controller Active Standby an...

Page 1236: ...lue is 0 smallint LAST_UPDATE_TIME Last time at which the host information was updated timestamp LAST_UPDATE_MODULE Module which updated the host information smallint TRUSTED Flag to mark the enclosur...

Page 1237: ...ilable via FDMI varchar 128 FIRMWARE_VERSION Holds the firmware version of the device available via FDMI ex 2 1 0 2 varchar 64 DRIVER_VERSION Holds the driver version of the device available via FDMI...

Page 1238: ...S System Device Group 3 is for User Defined Device Group int TABLE 81 DEVICE_GROUP_ENTRY Field Definition Format Size DEVICE_GROUP_ID Database ID of the DEVICE_GROUP instance which the device is membe...

Page 1239: ...the ID of the Device Node of which this device port is a part of int DOMAIN_ID Stores the Domain ID of the switch to which this device port is connected to int WWN Stores the Device Port WWN char 23 S...

Page 1240: ...null field and default value is empty char 23 AG_N_PORT_WWN If the device is connected with an AG N Port WWN of AG which is connected to switch will be populated from the N2F and N2WWN map char 23 TA...

Page 1241: ...e switch when enabling End End monitor is attempted on the switch int STATUS Status of creating the End End monitor on the switch It can be either failed or succeeded smallint TABLE 87 EE_MONITOR_STAT...

Page 1242: ...eign key reference to both the VIRTUAL_SWITCH table and the CRYPTO_SWITCH table both switch tables use the same primary key values Identifies the switch that contains this encryption engine int SLOT_N...

Page 1243: ...IP_ADDRESS Local EE BP Link IP Address If there are no links the IP Address could be 0 0 0 0 varchar 64 LINK_NET_MASK Local EE BP Link IP new mask varchar 64 LINK_GW_IP_ADDRESS Local EE BP Gateway Add...

Page 1244: ...k occurs when a previously unavailable Encryption Engine comes back online In Auto mode the restored Encryption Engine resumes encrypting all traffic for target containers configured on the Encryption...

Page 1245: ...ey vault for this Encryption Group Null if no backup key vault is configured int GROUP_LEADER_STATUS Stores the status of the Group leader node int SRDF_MODE This field denotes whether the SRDF suppor...

Page 1246: ...hes in an encryption group int ENCRYPTION_ENGINE_ID No longer used Tape pools used to belong to specific encryption engines but are now shared by all encryption engines in an encryption group int ENCR...

Page 1247: ...ated timestamp TABLE 99 EVENT Field Definition Format Size ID Unique generated database identifier for an event int ME_ID Unique managed element ID used to refer the product that is associated with th...

Page 1248: ...mp FIRST_OCCURRENCE_HOST _TIME Indicates the BNA server timestamp when the event occurred for the first time timestamp 10 EVENT_AUDIT Indicates whether this is an audit event or not varchar 255 EVENT_...

Page 1249: ...FIRST_OCCURRENCE_SWI TCH_TIME Indicates the first occurrence switch timestamp of the event timestamp LAST_OCCURRENCE_SWIT CH_TIME Indicates the last occurrence switch timestamp of the event timestamp...

Page 1250: ...EY A String Key string which identifies a specific instance of an Event varchar 64 STRING_PATTERN A Regular expression pattern string which can be used to match an Event instance varchar 1024 CATEGORY...

Page 1251: ...dress of source varchar 1024 WWN Node WWN of source varchar 1024 SOURCE_NAME Source Name varchar 1024 TABLE 106 EVENT_PROCESSOR_MAP Field Definition Format Size PROCESSOR_CLASS_NA ME The fully qualifi...

Page 1252: ...ON_CONTAINS Description pattern about the rule varchar 255 LAST_MODIFIED_TIME Rules last edited time timestamp SELECTED_TIME_UNIT Timestamp unit of the selected rule 0 second 1 Minutes 2 Hours Default...

Page 1253: ...tamp ACTIVE_ZONESET_NAME Name of the zone configuration which is effective active in that fabric varchar 256 USER_DEFINED_VALUE_1 User defined custom value varchar 256 USER_DEFINED_VALUE_2 User define...

Page 1254: ...hether the license was acquired or not int TABLE 109 FABRIC_CHECKSUM Field Definition Format Size FABRIC_ID Fabric ID foreign key to the FABRIC table int CHECKSUM_KEY Type of checksum e g device data...

Page 1255: ...n THRESHOLD_POLICY table int TABLE 113 FABRIC_VCS_CLUSTER_MAP Field Definition Format Size FABRIC_ID Foreign key to ID in fabric table int VCS_CLUSTER_ME_ID Foreign key to ID in ManagedElement table T...

Page 1256: ...asure of FC FCIP GE varchar 40 ADDITIONAL_MEASURE The additional measures int CUSTOM_SELECTION_OBJE CT_TYPE Represents the selected filter type 0 Default favorite 1 FC Ports 2 Device Ports 3 ISL Ports...

Page 1257: ...IDTRANSMISSIONS Number of invalid transmission errors double precision CRCERRORS Number of CRC errors double precision C3_DISCARD Count of Class 3 Frames that were discarded upon reception at this por...

Page 1258: ...that were discarded upon reception at this port There is no FBSY or FRJT generated for Class 3 Frames They are simply discarded if they cannot be delivered Note this is a Fibre Channel only stat doubl...

Page 1259: ...o FBSY or FRJT generated for Class 3 Frames They are simply discarded if they cannot be delivered Note this is a Fibre Channel only stat double precision TABLE 119 FC_PORT_STATS_30MIN Field Definition...

Page 1260: ...21 FCIP_PORT_TUNNEL_MAP Field Definition Format Size SWITCHPORT_ID Switch Port ID int TUNNEL_ID FCIP Tunnel ID int TABLE 122 FCIP_TUNNEL Field Definition Format Size ID Unique generated database ident...

Page 1261: ...tunnel Default value is 1 int FICON_TAPE_WRITE_MAX_ OPS The Value for FICON_TAPE_WRITE_MAX_OPS on the tunnel Default value is 1 int FICON_TAPE_READ_MAX_O PS The Value for FICON_TAPE_READ_MAX_OPS on th...

Page 1262: ...ns as to why the tunnel is down varchar 2048 LAST_UPDATE Last update time tells the time when the last update to the database record happened bigint SLOT_NUMBER SLOT_NUMBER on which the VE Port of the...

Page 1263: ...MBER Circuit Number of the Circuit from the switch smallint COMPRESSION_ ENABLED Whether Compression is enabled on that circuit smallint TURBO_WRITE_ ENABLED Whether TurboWrite is enabled on that circ...

Page 1264: ..._DATA DiffServe marking for Data Frame The default value is 1 int MAX_RETRANSMISSIONS Max number of Retransmission attempts on the circuit The default value is 0 int SLOT_NUMBER Slot number of the cir...

Page 1265: ...mpute net throughput Note for Fibre Channel ordered sets are not included in the count int TX The number of octets or bytes that have been transmitted by this port One second periodic polling of the p...

Page 1266: ..._TIME The polling time timestamp TX Transmit TX value in bytes double precision RX Receive RX value in bytes double precision TX_UTILIZATION Transmit utilization value in percentage double precision R...

Page 1267: ...transmit packet by duplicate Ack double precision DUP_ACK Counter of duplicate Ack double precision RTT Detected RTT for calculating window size double precision TCP_OOO Counter of TCP out of order do...

Page 1268: ...LATENCY double precision LINK_RETRANSMITS double precision ACTIVE_STATE smallint RTT_BY_TO Counter of retransmit packet by timeout double precision RTT_BY_DUP_ACK Counter of retransmit packet by dupli...

Page 1269: ...he feature int EDITION_MASK Used to associate a feature to the edition Reserved for future int TABLE 133 FEATURES_USAGE Field Definition Format Size CLIENT_IP Identifies client IP varchar 128 USER_NAM...

Page 1270: ...om the firmware version smallint PATCH Patch bit from the firmware version varchar 64 PHASE Phase bit from the firmware version varchar 64 RELEASE_DATE Release date of the firmware file timestamp IMPO...

Page 1271: ...rchitectureType MIB in foundry mib for possible values num 2 0 BUILD_LABEL The image label of the built software varchar 64 SSL_SLOT Slot number of the SSL module num 4 0 TABLE 138 FOUNDRY_MODULE Fiel...

Page 1272: ...e generated database identifier int VIRTUAL_SWITCH_ID Virtual switch ID where this F_Port Trunk Group is defined int MASTER_USER_PORT User port number for the master port of this trunk smallint WWN WW...

Page 1273: ...des the manufactured date of this FRU element requested by SMIA and values filled in by Switch Asset Collector timestamp UPDATE_DATE provides the updated date of this FRU element requested by SMIA and...

Page 1274: ...ternal SCP SFTP 3 External SFTP 4 and Technical support FTP 100 Technical Support FTP server configuration is created by user to transfer the technical support files from BNA repository to specified F...

Page 1275: ...nt REMOTE_MAC_ADDRESS MAC address of attached port of the 10G GigE Port varchar 64 INBAND_MANAGEMENT_ST ATUS 1 Inband Management status is enabled otherwise 0 Default value is 0 smallint OCCUPIED Defa...

Page 1276: ...ield Definition Format Size INTERFACE_ID This column is used to store the id of the interface The value will be populated by the discovery engine where the corresponding GRE Tunnel Interface details w...

Page 1277: ...etc The default value is 1 int MANAGEMENT_INTERFACE Management interface bit mask JSON WMI SMI etc The default value is 1 int DRIVER_VERSION The version level of the host adapter driver varchar 256 D...

Page 1278: ...HBA varchar 128 MAC_ADDRESS Adapter mac address varchar 64 MAX_SPEED_SUPPORTED The maximum port speed that is supported on the port in Gb s The default value is 0 int VPD_PRODUCT_DESCRIPTION Descripti...

Page 1279: ...port E g Auto negotiate varchar 64 CONFIGURED_TOPOLOGY The topology setting The default value is 1 int MAX_SPEED_SUPPORTED The maximum port speed that is supported on the port in Gb s The default valu...

Page 1280: ...varchar 64 PCIF_INDEX Pci function index varchar 64 MAX_PCIF Maximum number of Pci functions smallint SYNTHETIC_FC Synthetic FC is applicable for Windows only 0 Unknow 1 Yes 2 No int TABLE 155 HBA_POR...

Page 1281: ...ERRUPT_CONTROL_DEL AY Sets the interrupt control delay value The default value is 0 int BEACON_STATE Indicates whether beaconing is on or off The default value is 0 smallint LINK_BEACON_STATE Indicate...

Page 1282: ...e number of receive buffers The default value is 2 varchar 16 QOS_PRIORITY_LEVEL QoS priority levels Values include High Medium and Low varchar 32 QOS_HIGH_BW_ALLOCATIO N Percentage of bandwidth alloc...

Page 1283: ...RT_MAP Field Definition Format Size DEVICE_PORT_ID ID from the device_port table int HBA_PORT_ID DEVICE_PORT_ID from the hba_port table int TABLE 157 HBA_PORT_FCOE_DETAILS Field Definition Format Size...

Page 1284: ...e of the FCoE port online or offline varchar 64 SUPPORTED_CLASS The classes supported on the FCoE port For example Class2 and Class3 varchar 256 TRL_SPEED TRL Target Rate limit speed This will be less...

Page 1285: ...te port as enforced by TRL The default value is 0 varchar 64 TRL_ENFORCED True if TRL Target Rate limit is enforced varchar 16 BUS_NO Channel number in the PCI Bus The default value is 0 varchar 32 FC...

Page 1286: ...e block size of the logical unit in bytes for example 512 Bytes The default value is 0 int VENDOR The vendor of the device to which the logical unit is assigned varchar 256 PRODUCT_ID The product iden...

Page 1287: ...value is 0 smallint CIM_IMPL CIM implemenation used 1 SMI 2 WMI The default value is 0 smallint CIM_USERNAME Username for the CIM based agent varchar 128 CIM_PASSWORD Password for the CIM based agent...

Page 1288: ...ORT_ID ID of the HBA_PORT instance which is a Hyper V Virtual FC port int TABLE 164 IFL Field Definition Format Size ID Primary key for this table Serial number which is uniquely generated by DB int E...

Page 1289: ...num 1 0 PORT_STATUS smallint PORT_STATE smallint IF_INDEX This column is used to store the ifIndex of the interface The value will be populated by the DCB collector during the discovery of the DCB swi...

Page 1290: ...nterface varchar 64 NET_MASK Subnet mask for the interface varchar 64 MTU_SIZE MTU Size for that interface int CHECKSUM Check Sum varchar 64 GIGE_PORT_TYPE Whether the IP interface is created on a 10G...

Page 1291: ...e VLAN_DB_ID Database ID of the VLAN instance which is associated with the IPX network int NETWORK_NUMBER Number for IPX network varchar 32 FRAME_TYPE Frame type for IPX Possible values are 0 Not Appl...

Page 1292: ...SL_TRUNK_MEMBER Field Definition Format Size GROUP_ID Foreign key reference to the trunk group table for this member int PORT_NUMBER Member port number for this trunk smallint TABLE 176 KEY_VAULT Fiel...

Page 1293: ...Key for L2_ACCESS_CONTROL_LIST table int INBOUND_WRITE_TO_DEVICE 1 0 corresponding to Write to device not write to device for inbound traffic smallint OUTBOUND_L2_ACL_ID L2 Access control List ID of t...

Page 1294: ...AC_ACL_POLICY stores the MAC ACL policy information of the LAG varchar 64 VLAN_LIST Comma separated vlan ID list text MAC_ADDRESS MAC address of LAG Port Channel varchar 64 IP_ADDRESS Primary IPAddres...

Page 1295: ...if no privilege is required to launch this dialog varchar 64 READ_WRITE_ACCESS Specifies the read or write access privilege required to launch this dialog 0 no access is required to launch this dialo...

Page 1296: ...ID Is this license still considered 0 No 1 Yes The default value is 1 smallint TABLE 185 LICENSE_DOWNGRADE_DETAILS Field Definition Format Size ID Primary key ID PREVIOUS_LICENSE_INFO Previous License...

Page 1297: ...char 64 DESCRIPTION Optional detailed description about the license feature varchar 256 TABLE 189 LINK Field Definition Format Size LINK_ID Unique database generated identifier int TYPE Type of the li...

Page 1298: ...rence int TABLE 193 LSAN_ZONE Field Definition Format Size ID Unique generated database identifier int BB_FABRIC_ID Backbone fabric DB ID int EDGE_FABRIC_ID FID assigned to edge fabric int NAME LSAN z...

Page 1299: ...ique generated database identifier serial DEPLOYMENT_ID Deployment configuration ID Foreign Key for DEPLOYMENT table int INBOUND_MAC_FILTER_ID MAC FILTER Id of the MAC Filter selected for inbound Fore...

Page 1300: ...which the event occurred This will only be populated for vCenter events int TABLE 202 MAPS_EVENT_DETAILS Field Definition Format Size ID The primary key of the table int MAPS_EVENT_ID The correspondi...

Page 1301: ...Default value is 1 smallint REPEATER_ENABLED If filtering is disabled 1 for Syslog i e RECIPIENT_TYPE_ID 2 Default value is 1 smallint VERSION Snmp version v1 v2 v3 varchar 8 TABLE 206 MODULE Field De...

Page 1302: ...E Field Definition Format Size MODULE_TYPE_ID int MODULE_TYPE num 4 0 NAME varchar 32 DESCRIPTION varchar 128 NUM_PORTS num 4 0 TABLE 209 MPLS_ADMIN_GROUP Field Definition Format Size MPLS_ADMIN_GROUP...

Page 1303: ...ique database generated identifier int NAME Name of the MPLS Path as configured in the device Refer mplsTunnelHopPathOptionName of RFC3812 for more details varchar 255 DEVICE_ID Database ID of the DEV...

Page 1304: ...First CSPF equal cost paths Possible values are Random 1 LeastFill 2 and MostFill 3 smallint IS_USE_LSP_FOR_OSPF_SHOR TCUTS Indicates that this LSP allows shortcut between nodes in an AS OSPF includes...

Page 1305: ...int TABLE 218 MPLS_RSVP_LSP_FRR_PARAMETERS Field Definition Format Size MPLS_RSVP_LSP_FRR_PARAMETE RS_DB_ID Unique database generated identifier int BANDWIDTH Specifies the bandwidth constraint for t...

Page 1306: ...ackets without being fragmented Valid range is 0 65535 num 4 0 SETUP_PRIORITY The setup priority of the tunnel Valid range is 0 7 num 1 0 HOLD_PRIORITY The holding priority of the tunnel Valid range b...

Page 1307: ...Specifies the name of the MPLS Service varchar 255 VCID Virtual Circuit Identifier of the MPLS Service bigint MPLS_SERVICE_TYPE The type of the MPLS Service Local VLL 1 Remote VLL 2 VLL 3 VPLS 4 Admin...

Page 1308: ...e VLL_ENDPOINT_RELATION and VPLS_ENDPOINT_RELATION varchar 32 TAG_MODE This value indicates the vlan mode for this endpoint Possible values are Tagged 1 Untagged 2 smallint VLAN_ID Specifies the Outer...

Page 1309: ...ICE_DB_ID Auto generated database ID for device in MRP Ring int MRP_RING_ID Database ID of MRP ring int DEVICE_ID Database ID of member device int PORT_VLAN_DB_ID The database ID of the port VLAN The...

Page 1310: ..._RC The number of RHP packets received on the interface bigint STATE_CHANGED The number of MRP interface state changes that have occurred int TC_BPDU_RC The number of Topology Change RHPs received on...

Page 1311: ...its as zero char 6 VENDOR Vendor name varchar 64 VENDOR_CATEGORY Default is none varchar 32 TABLE 233 PHANTOM_PORT Field Definition Format Size ID Unique generated database identifier int WWN The Wwn...

Page 1312: ...HBOR2 Stacking neighbor s unit left number for the stackable devices If there is no neighbor unit non stackable devices then set to 0 num 2 0 UNIT_PRESENT Used to identify the stack unit is present in...

Page 1313: ...t MODULE_ID Database ID of the module which this port is present int IS_PORT_PRESENT This flag is to indicate whether the port is presented in the device Unknown 0 Present 1 and Not present 2 smallint...

Page 1314: ...o user int MEASURE_TYPE TYPE of the user selection measure int CREATE_USER_ID ID of the user who created the widget definition int CREATE_TIME Widget definition created server time timestamp MODIFY_US...

Page 1315: ...lue for the fifth percentage band In case of Top N Top Flow widgets only three percentage band s are available This value is not applicable Default is 0 double precision LEVEL5_COLOR RGB color for the...

Page 1316: ..._SYSTEM Indicates whether this is a system built in collector user cannot delete it Default 1 smallint TABLE 242 PM_MEASURE Field Definition Format Size ID Unique generated database identifier int DES...

Page 1317: ...e Type Primary key column int NAME Storing the NAME of the monitor type varchar 64 TABLE 246 PM_WIDGET_TARGET_ENTRY Field Definition Format Size WIDGET_ID The ID of the widget definition int TARGET_TY...

Page 1318: ...al TYPE This field indicates if the threshold is defined for product and port level measure 0 product level 1 port level smallint DEVICE_ID This is the foreign key reference key to the Device Table in...

Page 1319: ...eneck detection congestion threshold in percent The default value is 1 double precision LATENCY_THRESHOLD Value of bottleneck detection latency threshold in percent The default value is 1 double preci...

Page 1320: ...ed 3 Credentials Failed 4 Not Reachable int LAST_CONTACTED_TIME Last time CIMOM server contacted This will be updated when we test the reachablity of the CIMOM Server and when we perform port decommis...

Page 1321: ...the cluster meid Incase of VCS discovery in F C mode this is a member ID Incase of a VDX this is a member ID int NAME Name of the port profile varchar 255 SWITCH_PORT_MODE Mode for vlan configuration...

Page 1322: ...the created profile int PROFILE_ID DB ID of the port profile int DCB_MODE If the mode is dcb or non dcb 1 DCB 0 NON DCB smallint ETHERNET_MODE This integer indicates if pause of priority flow control...

Page 1323: ...MAP Field Definition Format Size ID Unique generated database identifier int PROFILE_ID DB id of the port profile int VLANID Configured vlan id on the switch int VLAN_TYPE Type of this vlan 0 access 1...

Page 1324: ...56 PROP1_VALUE First condition value to be satisfied by a selected product to launch a particular tool varchar 256 PROP2_KEY Second condition name to be satisfied by a selected product to launch a par...

Page 1325: ...expression resolved with respect to the TimeZone varchar 80 TABLE 270 QRTZ_FIRED_TRIGGERS Field Definition Format size ENTRY_ID Fired instance ID varchar 95 TRIGGER_NAME Name of the trigger varchar 8...

Page 1326: ...t Size JOB_NAME Name of the job varchar 80 JOB_GROUP Name of the job group varchar 80 JOB_LISTENER Job listener action class instance varchar 80 TABLE 273 QRTZ_LOCKS Field Definition Format Size LOCK_...

Page 1327: ...4096 ACTION Recommended action for the event varchar 4096 OLD_MSG_ID Old message ID varchar 45 TABLE 279 RECIPIENT_TYPE Field Definition Format Size ID Unique generated database identifier int TYPE T...

Page 1328: ...up description varchar 512 TABLE 284 RESOURCE_HOST_MAP Field Definition Format Size RESOURCE_GROUP_ID Resource Group ID int HOST_ID HOST_ID which is in the resource group int TABLE 285 ROLE Field Defi...

Page 1329: ...AN_CONNECTION Field Definition Format Size ID Unique generated database identifier serial SOURCE_SWITCH_ID Foreign key to VIRTUAL_SWITCH table This is the virtual switch ID of AG int SOURCE_PORT_ID Fo...

Page 1330: ...value is 6 1 7221 0 varchar 32 TOKEN_ID Unique ID for each SCOM host varchar 32 STATUS Status of Plug in registration to the SCOM server where 0 registered 1 unregistered 2 authentication failed 3 not...

Page 1331: ...T_READING Identifies the current temperature reading sensor requested by SMIA and values filled in by Switch Asset Collector Maps to value field in the html page The default value is 1 bigint TYPE The...

Page 1332: ...T_NUMBER provides the unit number of the sensor requested by SMIA and values filled in by Switch Asset Collector will be available only from FOS 6 4 switches and above This the gives the index of the...

Page 1333: ...COL L3 protocol value in the received sFlow packet For example ARP int IP_TOS Type of service id in the received sFlow packet smallint L4_PROTOCOL L4 protocol value in the received sFlow packet For ex...

Page 1334: ...CAL_PREF Local preference value of routing information in the received sFlow packet int LAST_USED_TIME Last used time of the routing information int DST_AS_PATH Routing path information in the receive...

Page 1335: ...LNUM Maximum row count bigint TABLE 298 SFLOW_MINUTE_L3 Field Definition Format Size SLNUM bigserial DEVICE_ID int TIME_IN_SECONDS int L3_PROTOCOL int L3_SRC_ADDR bytea L3_DEST_ADDR bytea L4_PROTOCOL...

Page 1336: ...coming traffic interface smallint OUT_VLAN Vlan ID of the outgoing traffic interface smallint SRC_MAC MAC address of the Source in the received sFlow packet bytea DEST_MAC MAC address of the destinati...

Page 1337: ...s its edge port 1 means its fabric port For other devices Default value is 0 smallint TABLE 303 SFLOW_MINUTE_VLAN Field Definition Format Size SLNUM This column is used to store a counter value to ide...

Page 1338: ...efinition Format Size SLNUM This column is used to store a counter value to identify the total row count bigserial TIME_IN_SECONDS Data collection time in seconds int DEVICE_ID ID of the product which...

Page 1339: ...raffic bigint SRC_PEER_AS Peer AS number of the received sFlow packet in case of BGP traffic bigint SFLOW_IP_ROUTE_INFO_ID route_info_id of the received sFlow packet in case of BGP traffic int IP_FLOW...

Page 1340: ...he card derived from the card s serial number and usage varchar 64 FIRST_NAME Optional first name of the person responsible for this card varchar 64 LAST_NAME Optional last name of the person responsi...

Page 1341: ...int SNAPSHOT_TYPE Indicates the type of snapshot 1 Pre snapshot 2 Post snapshot int SNAPSHOT_TIME Time when this pre post snapshot occurred MESSAGE Detailed message for snapshot report text TABLE 313...

Page 1342: ...ocalized secret key used by the authentication protocol for authenticating messages This is applicable if the agent is configured to operate in SNMPv3 varchar 64 PRIV_PROTOCOL An indication of whether...

Page 1343: ...ed for collection if applicable char 256 TABLE 316 SNMP_DATA_2HOUR Field Definition Format Size ID The DB ID of MIB_OBJECT int MIB_OBJECT_ID The DB ID of MIB_OBJECT int TARGET_TYPE Target or source ty...

Page 1344: ...UE Value of the OID retrieved from the corresponding target double TIME_IN_SECONDS Time when value of the OID was retrieved from the corresponding target int COLLECTOR_ID Correspoding collector table...

Page 1345: ...SSION Field Definition Format Size EXPRESSION_ID Primary key column serial NAME Name of the expression varchar 64 DESCRIPTION Description of the expression varchar 512 EQUATION Equation of the express...

Page 1346: ...used by SNMP agent to provide different views This is applicable if the agent is configured to operate in SNMPv3 varchar 128 AUTH_PROTOCOL An indication of whether or not messages sent or received on...

Page 1347: ...ifier int KEY_PASSWORD_ALIAS Key Password Alias is the alias name used for the encrypted key password This alias name is used to identify the password in client UI varchar 16 KEY_PASSWORD SSL keys are...

Page 1348: ...NECK_CONFIG Field Definition Format Size VIRTUAL_SWITCH_ID The database ID of the switch that the configuration belongs to int BOTTLENECK_DETECT_ENABLED Flag indicates if bottleneck detection is enabl...

Page 1349: ...BER Model Number of the switch for which the configuration was uploaded either on demand or schedule varchar 32 TABLE 332 SWITCH_LICENSE Field Definition Format Size ID Unique generated database ident...

Page 1350: ...a port within a chassis smallint USER_PORT_NUMBER User port number Unique port number in a chassis smallint PORT_ID Port ID of this port varchar 8 PORT_INDEX Number used for identifying port in zoning...

Page 1351: ...he port is in a degraded state Has value as N A for ports that are not online varchar 16 REMOTE_NODE_WWN Node WWN of the attached port varchar 255 REMOTE_PORT_WWN WWN of the attached port varchar 255...

Page 1352: ...or offline varchar 64 PREVIOUS_STATUS This table can hold the same values as STATUS column But this will be holding the previous status of the PORT These values to be populated by switch asset collec...

Page 1353: ...itch port int MAX_FRAME_MONITOR_OF FSET Maximum offset supported in fame monitor for switch port int v Contains the features supported as a bit mask at port level int IDENTIFIER Switch port identifier...

Page 1354: ...been transmitted by this port One second periodic polling of the port This value is saved and compared with the next polled value to compute net throughput Note for Fibre Channel ordered sets are not...

Page 1355: ...T_FCTRL_ERRORS The number of packets lost if flow control is diabled or number of packets retransmitted by the originator due to flow control if flow control is enabled double precision TOO_LONG_ERROR...

Page 1356: ...FCS check double precision RUNT_ERRORS The number of frames detected that are less than the minimum permitted frame size and have a good FCS double precision EXCESS_COLL_ERRORS Increments when the po...

Page 1357: ...SS_COLL_ERRORS double precision EXCESS_FCTRL_ERRORS double precision LOST_FCTRL_ERRORS double precision TOO_LONG_ERRORS double precision DATA_GAPS_IN_5MIN smallint DATA_GAPS_IN_30MIN smallint TABLE 33...

Page 1358: ...ze SWITCH_ID References the ID in CORE_SWITCH table int POLICY_ID References the ID in THRESHOLD_POLICY table int STATUS The status of applied to the switch smallint OVERRIDDEN Policy is overridden or...

Page 1359: ...e As of now we have two types Wireless Location Manager and LANcope device varchar 64 TABLE 344 THRESHOLD_MEASURE Field Definition Format Size MEASURE_ID References the ID In PM_MEASURE table where al...

Page 1360: ...level collector it will use deviceId for port level it will use interfaceId int COLLECTOR_ID ID of the data_collector int MEASURE_INDEX Stores the index_map value in case of an expression varchar 256...

Page 1361: ...349 TIME_SERIES_DATA_1 Field Definition Format Size TIME_IN_SECONDS Time when value of the measure retrieved from the corresponding target int TARGET_TYPE Target type of the PM collector data For IP_...

Page 1362: ...ME_ID ME_ID of the target int VALUE Stores One day aggregated data double precision MIN_VALUE Minimum value in 2 hour table while aggregating 1 day data double precision MAX_VALUE Maximum value in 2...

Page 1363: ...EE_MONITOR 11 IP_DEVICE_GROUP 12 IP_PORT_GROUP 13 VIRTUAL_GROUP 14 TRILL_TRUNK 15 ALL_SAN_PRODUCTS 16 smallint MEASURE_ID ID of the measure MIB Expression int TARGET_ID Target ID of the PM collector d...

Page 1364: ...dex_map value in case of an expression varchar 256 ME_ID ME_ID of the target int VALUE Stores the raw data received from the device double precision TABLE 354 TIME_SERIES_DATA_2_1DAY Field Definition...

Page 1365: ...R 11 IP_DEVICE_GROUP 12 IP_PORT_GROUP 13 VIRTUAL_GROUP 14 TRILL_TRUNK 15 ALL_SAN_PRODUCTS 16 smallint MEASURE_ID ID of the measure MIB Expression int TARGET_ID Target ID of the PM collector data For d...

Page 1366: ...ID of the pm_data_collector int MEASURE_INDEX Stores the index_map value in case of an expression varchar 256 ME_ID ME_ID of the target int VALUE Stores the 30 minutes aggregated data double precisio...

Page 1367: ...anagement Element ID of the destination VirtualSwitch int DEST_DOMAIN_ID The destination vcs member id int DEST_PORT_NUMBER The source port represented as a tuple of member slot port char 30 DEST_SWIT...

Page 1368: ..._MEMBER_I D Primary key for this table int INTERFACE_ID Foreign key which refers INTERACE table int TRUNK_INTERFACE_ID Foreign key which refers TRUNK_GROUP_INTERACE table int TABLE 365 USER_ Field Def...

Page 1369: ...assword varchar 768 IP_PRODUCT_ENABLE_USE R_NAME User CLI credential enable user name varchar 256 IP_PRODUCT_ENABLE_PAS SWORD User CLI credential enable password varchar 768 TABLE 366 USER_DEFINED_DEV...

Page 1370: ...p_expression Table int MIB_OBJECT_ID This is the foreign key reference key to the mib_object Table int TYPE This identifies the collectible type 0 for MIBs 1 for Expressions int TABLE 369 USER_RESOURC...

Page 1371: ...CLIENT_ISOLATION_MODE Cluster isolation state Loose 0 Strict 1 smallint IS_CLIENTS_SHUTDOWN Is MCT Client interfaces shutdown numeric 1 0 MEMBER_VLAN_RANGE Configured member VLAN range varchar 256 AC...

Page 1372: ...member is trusted Possible values are 1 and 0 1 means trusted and 0 means untrusted smallint MISSING Describes whether the member is missing or not Possible values are 1 and 0 1 means missing and 0 me...

Page 1373: ...The IP Address for the Virtual Server varchar 128 VIRUTAL_SERVER_PORT The Port number of the Virtual Server int REAL_SERVER_IP_ADDRES S The IP Address for the Real Server varchar 128 REAL_SERVER_PORT...

Page 1374: ...int TX The number of valid frames sent from the port double precision RX The number of valid frames received at this port double precision TX_UTILIZATION The computed value of TX based on speed of po...

Page 1375: ...nt SWITCH_ID int PORT_ID int TX double precision RX double precision TX_UTILIZATION double precision RX_UTILIZATION double precision CREATION_TIME double precision ACTIVE_STATE timestamp LINK_FAILURES...

Page 1376: ...cision RX double precision TX_UTILIZATION double precision RX_UTILIZATION double precision CREATION_TIME smallint ACTIVE_STATE double precision LINK_FAILURES double precision TX_LINK_RESETS double pre...

Page 1377: ...WN feature on switch port or AG port 1 Enabled 0 disabled smallint USER_VPWWN User created VPWWN char 23 AUTO_VPWWN VPWWN created by Switch char 23 DEVICE_PORT_WWN Physical port WWN of the device for...

Page 1378: ...icate manageability issues bigint STATE Stores the switch state like Online offline etc varchar 32 STATUS Stores the status value here UNKNOWN 0 MARGINAL 2 DOWN 3 HEALTHY 1 varchar 32 STATUS_REASON St...

Page 1379: ...enabled on the switch 1 is enabled 0 is disabled smallint LAST_SCAN_TIME Stores the timestamp of the last scan time the time which the switch was contacted for update timestamp DOMAIN_MODE_239 Stores...

Page 1380: ...during Fabric Refresh task SMIA requested this information but could be used by any module which needs to track the state change varchar 32 MANAGED_ELEMENT_ID A unique managed element ID for this virt...

Page 1381: ...eatures that are active enabled Each bit would represent features like Lossless etc int MAPS_ENABLED_ACTIONS Bitmask of Maps actions enabled on the switch 0 None 1 Raslog 2 SNMP 4 Email 8 Fence Port 1...

Page 1382: ...f the VLAN_INTERFACE_RELATION instance which is associated with the excluded interface member int TABLE 392 VLAN_INTERFACE_MEMBER Field Definition Format Size VLAN_INTERFACE_RELATION_ID Database ID of...

Page 1383: ...55 means COS is not explicitly configured smallint TABLE 397 VMOTION_EVENT Field Definition Format Size ID Uniquely identifies the vmotion event int SOURCE_HOST_NAME The name of the source host at the...

Page 1384: ...nnected switch details int VMOTION_EVENT_ID Foreign key to the vmotion_event table int PNIC_TYPE Pnic type 0 source 1 destination identifies if the pNIC is from the source or the destination host smal...

Page 1385: ...storeSummary were updated timestamp RDM_SUPPORTED Flag Indicates whether or not raw disk mappings can be created on this datastore 0 no 1 yes smallint PERFILE_THIN_PROVISIONING_S UPPORTED Flag indicat...

Page 1386: ...ortgroup or port level will raise exception int MAC_ADDRESS The mac address that is used at this port varchar 64 RUNTIME_LINK_UP_STA TE Whether the port is in linkUp status varchar 128 RUNTIME_LINK_PE...

Page 1387: ...in the switch Standalone ports are ports that don t belong to any portgroup int ADMIN_NAME The name of the person that is responsible for the switch varchar 256 ADMIN_CONTACT The contact information f...

Page 1388: ...discovery protocol 0 CDP else 1 which is LLDP smallint DISCOVERY_OPERATION Discovery operation default is 0 listen 1 advertise 2 both 3 none smallint CDP_ENABLED Whether CDP is enabled on the dvswitc...

Page 1389: ...s associated with int MOR_ID The managed object reference number assigned by the hypervisor int TABLE 406 VM_FC_HBA_DEVICE_PORT_MAP Field Definition Format Size DEVICE_PORT_ID A foreign key referencin...

Page 1390: ...in the host component is not the same as the configuration in VirtualCenter server 4 pending The host component is waiting to be initialized 5 up The host component is up and running 6 warning The hos...

Page 1391: ...T_GROUP_ KEY The key of the portgroup to be connected to the physical NIC varchar 256 UPLINK_PORT_KEY The key of the port to be connected to the physical NICs varchar 256 UPLINK_PORT_NAME The name of...

Page 1392: ..._GROUP_ID ID of standard vSwitch port group int VM_STANDARD_VIRTUA L_SWITCH_ID ID of standard vSwitch int VM_DV_SWITCH_ID ID of distributed vSwitch int VM_DV_PORT_GROUP_I D ID of distributed vSwitch p...

Page 1393: ...cy for this network adapter team The bridge must be BondBridge for this property to be valid The flag to indicate whether or not to enable this property to enable beacon probing as a method to validat...

Page 1394: ...h is used whenever available when the path pol icy is Fixed The default value is 0 smallint USAGE Identifies how a VMware VM uses this LUN 0 NA used for Hyper V 1 VMFS datastores 2 RDM Raw Device Mapp...

Page 1395: ...ied using the same notation varchar 64 SUBNET_MASK Subnet mask for the Physical NIC varchar 64 VM_HOST_ID A foreign key referencing VM_HOST ID int VM_STANDARD_VIRTUA L_SWITCH_ID A foreign key referenc...

Page 1396: ...le Bridge 2 smallint VM_HOST_ID References the ESX host in which this switch exists int MOR_ID The managed object reference number assigned by the hypervisor int TABLE 418 VM_STANDARD_VSWITCH_PORT Fie...

Page 1397: ...CITY For disks the disk capacity in GB double precision STATUS The status reported by the host 0 offline 1 online smallint PATH_POLICY Determines how multiple paths to this LUN are used 0 fixed 1 Most...

Page 1398: ...ype of traffic shaping policy whether ingress or egress 0 is ingress 1 is egress traffic shaping policy smallint TABLE 423 VM_VCENTER Field Definition Format Size ID Unique generated database identifi...

Page 1399: ...t 4 Disconnected 5 Not responding smallint REASON In case the status is 3 Conflict Existing host then this field will be used to persist the hostname for conflicting user defined host varchar 1024 VM_...

Page 1400: ...disable wake on LAN smallint VIRTUAL_MACHINE_ID Foreign Key to the vm_virtual_machine table References the VM to which this vnic is attached int ADAPTER_TYPE One of E1000 Vmxnet Pcnet32 smallint VM_ST...

Page 1401: ...archar 64 IP_ADDRESS The primary IPv4 or IPv6 IP address used by the VM on the management LAN if any Primary is defined by the VM vendor varchar 32 HOSTNAME The primary hostname assigned to this VM va...

Page 1402: ...ual machine bigint USED_STORAGE Storage space in bytes on this datastore that is actually being used by the virtual machine It includes space actually occupied by disks logs snapshots configuration fi...

Page 1403: ...VERSION varchar 128 CREATION_TIME timestamp LAST_UPDATE_TIME timestamp TABLE 431 VR_CONN_DOMAIN_GROUP Field Definition Format Size ID Unique generated database identifier serial VCEM_PROFILE_ID Foreig...

Page 1404: ...tus of the module varchar 256 IO_BAY The bay number of the module int VENDOR Subject to chnage May not be able to differentiate module maker Maker of the module 0 unknown 1 Brocade 2 QLogic int CREATI...

Page 1405: ...CLOSURE_UUID The UUID extracted from the enclosure object inside the bay object inside the server profile The value matches the domain GUID varchar 512 TABLE 436 VR_CONN_WWN Field Definition Format Si...

Page 1406: ...ME The zone alias name varchar 64 TABLE 440 ZONE_ALIAS_IN_ZONE Field Definition Format Size ZONE_ALIAS_ID PK of the zone alias int ZONE_ID PK of the zone int 23 TABLE 441 ZONE_ALIAS_MEMBER Field Defin...

Page 1407: ...LE 443 ZONE_DB_CONFIG Field Definition Format Size ID Unique generated database identifier int ZONE_DB_ID PK of the owning zone DB int DEFINED_CONTENT Defined zone raw config string wrapped with to pr...

Page 1408: ...FO as select AG_N_PORT VIRTUAL_SWITCH_ID as SOURCE_SWITCH_ID AG_N_PORT ID as SOURCE_PORT_ID AG_N_PORT WWN as SOURCE_PORT_WWN AG_N_PORT TYPE as SOURCE_PORT_TYPE AG_N_PORT USER_PORT_NUMBER as SOURCE_USE...

Page 1409: ...SUPPORTED_DRIVERS from BOOT_IMAGE_FILE_DETAILS BOOT_IMAGE_DRIVER_MAP where BOOT_IMAGE_FILE_DETAILS DRIVER_MAPPING_ID BOOT_IMAGE_DRIVER_MAP ID CNA_ETH_PORT_CONFIG_INFO create or replace view CNA_ETH_PO...

Page 1410: ...ME as ETH_PORT_CREATION_TIME CNA_ETH_PORT CURRENT_MAC_ADDRESS as CURRENT_MAC_ADDRESS CNA_ETH_PORT MAX_BANDWIDTH CNA_ETH_PORT PCIF_INDEX CNA_ETH_PORT MAX_PCIF CNA_ETH_PORT MIN_BANDWIDTH CNA_ETH_PORT MT...

Page 1411: ...G_REGISTERED CORE_SWITCH CALL_HOME_ENABLED CORE_SWITCH SNMP_REGISTERED CORE_SWITCH USER_IP_ADDRESS CORE_SWITCH NIC_PROFILE_ID CORE_SWITCH MANAGING_SERVER_IP_ADDRESS CORE_SWITCH VF_ENABLED CORE_SWITCH...

Page 1412: ...CORE_SWITCH_ID CORE_SWITCH ID CRYPTO_HOST_LUN_INFO create or replace view CRYPTO_HOST_LUN_INFO as select LUN CRYPTO_HOST_ID LUN ID CRYPTO_LUN_ID LUN LUN_NUMBER LUN CRYPTO_TARGET_CONTAINER_ID LUN SERI...

Page 1413: ...NGINE WWN_POOLS_AVAILABLE ENCRYPTION_ENGINE STATE ENCRYPTION_ENGINE_STATE ENCRYPTION_ENGINE ID ENCRYPTION_ENGINE_ID CRYPTO_SWITCH SWITCH_ID SWITCH_ID CRYPTO_SWITCH ENCRYPTION_GROUP_ID ENCRYPTION_GROUP...

Page 1414: ...HANDLER_ID DEPLOYMENT_HANDLER ID DEPLOYMENT_LOG create or replace view DEPLOYMENT_LOG as select DEPLOYMENT_CONFIGURATION ID DEPLOYMENT_CONFIGURATION NAME DEPLOYMENT_CONFIGURATION DESCRIPTION DEPLOYMEN...

Page 1415: ...N hba_port_device_port_map ON device_port id hba_port_device_port_map device_port_id LEFT JOIN hba_port ON hba_port_device_port_map hba_port_id hba_port device_port_id LEFT JOIN hba ON hba_port hba_id...

Page 1416: ...RTUAL_SWITCH FCOE_CAPABLE VIRTUAL_SWITCH L2_CAPABLE VIRTUAL_SWITCH L3_CAPABLE VIRTUAL_SWITCH DEFAULT_LOGICAL_SWITCH VIRTUAL_SWITCH FEATURES_SUPPORTED VIRTUAL_SWITCH FMS_MODE VIRTUAL_SWITCH DYNAMIC_LOA...

Page 1417: ...MBOLIC_NAME DEVICE_NODE DEVICE_TYPE DEVICE_NODE FDMI_HOST_NAME DEVICE_NODE VENDOR DEVICE_NODE CAPABILITY_ DEVICE_NODE AG DEVICE_PORT ID as DEVICE_PORT_ID DEVICE_PORT DOMAIN_ID as DEVICE_PORT_DOMAIN_ID...

Page 1418: ...STATUS SWITCH_INFO FABRIC_ID SWITCH_INFO MONITORED SWITCH_INFO CRYPTO_CAPABLE from DEVICE_NODE DEVICE_PORT SWITCH_PORT SWITCH_INFO where DEVICE_PORT NODE_ID DEVICE_NODE ID and DEVICE_PORT SWITCH_PORT_...

Page 1419: ...EFINED_DEVICE_DETAIL USER_DEFINED_VALUE2 USER_DEFINED_DEVICE_DETAIL USER_DEFINED_VALUE3 FABRIC PRINCIPAL_SWITCH_WWN as PRINCIPAL_WWN DEVICE_FDMI_DETAILS SERIAL_NUMBER AS FDMI_SERIAL_NUMBER DEVICE_FDMI...

Page 1420: ...SER_DEFINED_VALUE1 USER_DEFINED_DEVICE_DETAIL USER_DEFINED_VALUE2 USER_DEFINED_DEVICE_DETAIL USER_DEFINED_VALUE3 DEVICE_NODE WWN as DEVICE_NODE_WWN DEVICE_NODE FDMI_HOST_NAME DEVICE_NODE SYMBOLIC_NAME...

Page 1421: ...DEVICE_PORT_GIGE_PORT_LINK DEVICE_PORT_ID DEVICE_PORT ID DEV_PORT_MAC_ADDR_MAP_INFO create or replace view DEV_PORT_MAC_ADDR_MAP_INFO as select DEVICE_PORT_MAC_ADDRESS_MAP DEVICE_PORT_ID DEVICE_PORT_M...

Page 1422: ...OURCE_ADDR LAST_OCCURRENCE_HOST_TIME FIRST_OCCURRENCE_HOST_TIME EVENT_COUNT EVENT_KEY AUDIT RESOLVED ACKED_TIME EVENT_ACTION_ID DEVICE_GROUP_ID PORT_GROUP_ID SPECIAL_EVENT ORIGIN EVENT_CATEGORY DESCRI...

Page 1423: ...E_ID EVENT_MODULE ID left outer join EVENT_DESCRIPTION on EVENT EVENT_DESCRIPTION_ID EVENT_DESCRIPTION ID left outer join EVENT_DETAILS on EVENT ID EVENT_DETAILS EVENT_ID left outer join EVENT_CALL_HO...

Page 1424: ..._ENVIRONMENT FABRIC MANAGED FABRIC CONTACT FABRIC LOCATION FABRIC DESCRIPTION FABRIC CREATION_TIME FABRIC LAST_SCAN_TIME FABRIC LAST_UPDATE_TIME FABRIC TRACK_CHANGES FABRIC TYPE FABRIC USER_DEFINED_VA...

Page 1425: ...TRANSMISSIONS FCIP_TUNNEL_CIRCUIT SLOT_NUMBER FCIP_TUNNEL_CIRCUIT VE_PORT_NUMBER FCIP_TUNNEL_CIRCUIT SECURITY_FLAG FCIP_TUNNEL_CIRCUIT DSCP_CONTROL FCIP_TUNNEL_CIRCUIT CIRCUIT_STATUS FCIP_TUNNEL_CIRCU...

Page 1426: ...ID_BASE FCIP_TUNNEL FICON_XRC_EMULATION_ENABLED FCIP_TUNNEL FICON_TW_EMUL_ENABLED FCIP_TUNNEL FICON_TR_EMUL_ENABLED FCIP_TUNNEL FICON_DEBUG_FLAGS FCIP_TUNNEL REMOTE_WWN FCIP_TUNNEL CDC FCIP_TUNNEL ADM...

Page 1427: ...EVICE ATTACH_ID FCOE_DEVICE MAC_ADDRESS DEVICE_NODE TRUSTED DEVICE_NODE CREATION_TIME DEVICE_NODE MISSING DEVICE_NODE MISSING_TIME from FCOE_DEVICE DEVICE_NODE where FCOE_DEVICE DEVICE_NODE_ID DEVICE_...

Page 1428: ...NK MISSING_TIME GIGE_PORT SWITCH_PORT_ID GIGE_PORT PORT_TYPE SWITCH_PORT VIRTUAL_SWITCH_ID SWITCH_PORT USER_PORT_NUMBER VIRTUAL_SWITCH VIRTUAL_FABRIC_ID from GIGE_PORT_ETHERNET_CLOUD_LINK GIGE_PORT SW...

Page 1429: ...E_SWITCH ID and GIGE_PORT SLOT_NUMBER in 0 CARD SLOT_NUMBER HBA_PORT_DETAILS_INFO create or replace view HBA_PORT_DETAILS_INFO as select HBA_PORT DEVICE_PORT_ID HBA_PORT CONFIGURED_STATE HBA_PORT CONF...

Page 1430: ...QOS_TOTAL_BB_CREDIT HBA_PORT_DETAIL QOS_PRIORITY_LEVEL HBA_PORT_DETAIL QOS_HIGH_BW_ALLOCATION HBA_PORT_DETAIL QOS_MEDIUM_BW_ALLOCATION HBA_PORT_DETAIL QOS_LOW_BW_ALLOCATION HBA_PORT_DETAIL MEDIA as M...

Page 1431: ...HBA_TARGET TARGET_ID as HBA_PORT_TARGET_ID HBA_REMOTE_PORT ID as HBA_REMOTE_PORT_ID HBA_REMOTE_PORT SYMBOLIC_NAME HBA_REMOTE_PORT PORT_WWN HBA_REMOTE_PORT NODE_WWN HBA_REMOTE_PORT NAME HBA_REMOTE_POR...

Page 1432: ...ET_ID HEALTH_TARGET_STATUS TARGET_TYPE HEALTH_TARGET_STATUS STATUS HEALTH_TARGET_STATUS MESSAGE HEALTH_TARGET_STATUS LEGACY_NAME from DEPLOYMENT_CONFIGURATION DEPLOYMENT_STATUS HEALTH_STATUS HEALTH_TA...

Page 1433: ...RIAL_NUMBER DEVICE_ENCLOSURE FIRMWARE DEVICE_ENCLOSURE USER_DEFINED_VALUE1 DEVICE_ENCLOSURE USER_DEFINED_VALUE2 DEVICE_ENCLOSURE USER_DEFINED_VALUE3 DEVICE_ENCLOSURE HCM_AGENT_VERSION DEVICE_ENCLOSURE...

Page 1434: ...WITCH MONITORED as SOURCE_VIRTUAL_SWITCH_MONITORED SOURCE_SWITCH_PORT ID as SOURCE_SWITCH_PORT_ID SOURCE_SWITCH_PORT WWN as SOURCE_SWITCH_PORT_WWN SOURCE_SWITCH_PORT NAME as SOURCE_SWITCH_PORT_NAME SO...

Page 1435: ...replace view ISL_TRILL_INFO as select distinct VCS_DEVICE DEVICE_ID as VCS_DEVICE_ID SOURCE_CLUSTER_MEMBER CLUSTER_ME_ID ISL ID ISL FABRIC_ID ISL COST ISL MISSING ISL SOURCE_DOMAIN_ID ISL SOURCE_PORT...

Page 1436: ..._PORT VIRTUAL_SWITCH_ID DEST_VIRTUAL_SWITCH ID and DEST_SWITCH_PORT USER_PORT_NUMBER ISL DEST_PORT_NUMBER and FABRIC ID ISL FABRIC_ID and SOURCE_VIRTUAL_SWITCH MANAGED_ELEMENT_ID SOURCE_DEVICE MANAGED...

Page 1437: ...SWITCH SOURCE_CORE_SWITCH CORE_SWITCH DEST_CORE_SWITCH VIRTUAL_SWITCH SOURCE_VIRTUAL_SWITCH VIRTUAL_SWITCH DEST_VIRTUAL_SWITCH where ISL_INFO SOURCE_SWITCH_ID ISL_TRUNK_GROUP VIRTUAL_SWITCH_ID and ISL...

Page 1438: ...CIRCUIT SLOT_NUMBER as FCIP_SLOT_NUMBER FCIP_TUNNEL_CIRCUIT VE_PORT_NUMBER as FCIP_PORT_NUMBER MAPS_EVENT_CAUSE_ACTION CAUSE MAPS_EVENT_CAUSE_ACTION ACTION from MAPS_EVENT_DETAILS inner join MAPS_EVEN...

Page 1439: ...create or replace view PHANTOM_PORT_INFO as select PHANTOM_PORT ID PHANTOM_PORT WWN PHANTOM_PORT VIRTUAL_SWITCH_ID PHANTOM_PORT PORT_NUMBER PHANTOM_PORT PORT_ID PHANTOM_PORT SPEED PHANTOM_PORT MAX_SPE...

Page 1440: ...and enough information from the switch port for the client to identify the port create or replace view PORT_BOTTLENECK_STAT_INFO as select PORT_BOTTLENECK_STATUS SWITCH_PORT_ID PORT_BOTTLENECK_STATUS...

Page 1441: ...ERMISSION from ROLE ROLE_PRIVILEGE_MAP PRIVILEGE where ROLE ID ROLE_PRIVILEGE_MAP ROLE_ID and PRIVILEGE ID ROLE_PRIVILEGE_MAP PRIVILEGE_ID PORT_PROFILE_INFO create or replace view PORT_PROFILE_INFO as...

Page 1442: ...ACE_INFO create or replace view PORT_PROFILE_INTERFACE_INFO as select PORT_PROFILE ID PORT_PROFILE SWITCH_ME_ID PORT_PROFILE NAME PORT_PROFILE ACL_PROFILE PORT_PROFILE QOS_PROFILE PORT_PROFILE FCOE_PR...

Page 1443: ...hour_summary sflow_ip_route_info_id sflow_hour_summary ip_flow_label sflow_hour_summary src_user sflow_hour_summary dest_user sflow_hour_summary frames sflow_hour_summary bytes sflow_hour_summary in_u...

Page 1444: ...3 vm_host_id AS src_vm_host_id COALESCE vm2 vm_host_id vm4 vm_host_id AS dest_vm_host_id FROM sflow_staging LEFT JOIN vm_address_info vm1 ON sflow_staging src_mac vm1 mac_address LEFT JOIN vm_address_...

Page 1445: ...T_ID from SFLOW_STAGING LEFT JOIN VM_ADDRESS_INFO VM1 ON SFLOW_STAGING L3_SRC_ADDR VM1 VM_ADDRESS LEFT JOIN VM_ADDRESS_INFO VM2 ON SFLOW_STAGING L3_DEST_ADDR VM2 VM_ADDRESS where SFLOW_STAGING SLNUM S...

Page 1446: ..._HOST_ID AS DEST_VM_HOST_ID FROM SFLOW_STAGING LEFT JOIN VM_ADDRESS_INFO VM1 ON SFLOW_STAGING SRC_MAC VM1 MAC_ADDRESS LEFT JOIN VM_ADDRESS_INFO VM2 ON SFLOW_STAGING DEST_MAC VM2 MAC_ADDRESS WHERE SFLO...

Page 1447: ...R_ID SENSOR_INFO create or replace view SENSOR_INFO as select SENSOR ID SENSOR CORE_SWITCH_ID SENSOR SENSOR_ID SENSOR CURRENT_READING SENSOR TYPE SENSOR SUB_TYPE SENSOR DESCRIPTION SENSOR STATUS SENSO...

Page 1448: ...MART_CARD_ID SC CARD_TYPE SC CARD_INFO SC CARDCN_ID SC FIRST_NAME SC LAST_NAME SC NOTES SC CREATION_TIME 1 ENGINE_ID EG ID ENCRYPTION_GROUP_ID EG NAME GROUP_NAME RCGM POSITION_ CARD_POSITION 1 CRYPTO_...

Page 1449: ...H_CONFIG_DETAIL MODEL_NUMBER as SWITCH_MODEL_NUMBER from SWITCH_CONFIG SWITCH_CONFIG_DETAIL where SWITCH_CONFIG ID SWITCH_CONFIG_DETAIL SWITCH_CONFIG_ID SWITCH_DETAILS_INFO create or replace view SWIT...

Page 1450: ...IRTUAL_SWITCH LOGICAL_ID VIRTUAL_SWITCH USER_DEFINED_VALUE_1 VIRTUAL_SWITCH USER_DEFINED_VALUE_2 VIRTUAL_SWITCH USER_DEFINED_VALUE_3 VIRTUAL_SWITCH FMS_MODE VIRTUAL_SWITCH DYNAMIC_LOAD_SHARING VIRTUAL...

Page 1451: ...M_OF_BLADES CORE_SWITCH_DETAILS SNMP_INFORMS_ENABLED CORE_SWITCH_DETAILS VENDOR_VERSION CORE_SWITCH_DETAILS VENDOR_PART_NUMBER CORE_SWITCH_DETAILS CONTACT CORE_SWITCH_DETAILS LOCATION CORE_SWITCH_DETA...

Page 1452: ...HYSICAL_PORT SWITCH_PORT LOCKED_PORT_TYPE SWITCH_PORT CATEGORY SWITCH_PORT PROTOCOL SWITCH_PORT SPEED SWITCH_PORT SPEEDS_SUPPORTED SWITCH_PORT MAX_PORT_SPEED SWITCH_PORT DESIRED_CREDITS SWITCH_PORT BU...

Page 1453: ...OLE as SWITCH_ROLE VIRTUAL_SWITCH VIRTUAL_FABRIC_ID as VIRTUAL_FABRIC_ID VIRTUAL_SWITCH DOMAIN_ID as DOMAIN_ID VIRTUAL_SWITCH INTEROP_MODE as INTEROP_MODE VIRTUAL_SWITCH MANAGEMENT_STATE VIRTUAL_SWITC...

Page 1454: ...SNMP_PROFILE RETRY_COUNT from SNMP_PROFILE where SNMP_PROFILE NAME default as SNMP_RETRY_COUNT coalesce SNMP_CREDENTIALS TIMEOUT select SNMP_PROFILE TIMEOUT from SNMP_PROFILE where SNMP_PROFILE NAME d...

Page 1455: ...ES_DATA_1_30MIN MEASURE_ID TIME_SERIES_DATA_1_30MIN TARGET_ID TIME_SERIES_DATA_1_30MIN COLLECTOR_ID TIME_SERIES_DATA_1_30MIN MEASURE_INDEX TIME_SERIES_DATA_1_30MIN ME_ID TIME_SERIES_DATA_1_30MIN VALUE...

Page 1456: ...as varchar 255 AS device_ip tsd target_type de device_id AS target_id de sys_name AS target_name measure measure_type AS collectible_type tsd measure_id AS collectible_id tsd collector_id pdc name AS...

Page 1457: ..._name measure measure_type AS collectible_type tsd measure_id AS collectible_id tsd collector_id pm_data_collector name AS collector_name measure name text text tsd measure_index text AS collectible_n...

Page 1458: ...DEST_DEVICE SWITCH_PORT DEST_SWITCH_PORT VIRTUAL_SWITCH DEST_VIRTUAL_SWITCH where SOURCE_DEVICE MANAGED_ELEMENT_ID TRILL SOURCE_ME_ID and DEST_DEVICE MANAGED_ELEMENT_ID TRILL DEST_ME_ID and VCS_DEVICE...

Page 1459: ...ROUP_ID RESOURCE_GROUP NAME RESOURCE_GROUP_NAME ROLE ID ROLE_ID ROLE NAME ROLE_NAME USER_ NAME USER_NAME from USER_ RESOURCE_GROUP ROLE USER_RESOURCE_MAP USER_ROLE_MAP where USER_ROLE_MAP USER_NAME US...

Page 1460: ...S1 NAME VS2 NAME UDDD NAME as SWITCH_NAME coalesce VS1 WWN VS2 WWN as SWITCH_WWN VIRTUAL_PORT_WWN_DETAILS AG_NODE_WWN VIRTUAL_PORT_WWN_DETAILS AG_PORT_NUMBER VIRTUAL_PORT_WWN_DETAILS STATUS VIRTUAL_PO...

Page 1461: ...This view combines fabric and VM information to derive end to end connectivity information for the VM create or replace view VM_CONNECTIVITY_INFO as select VM_VCENTER HOST AS VCENTER_HOST DEVICE_PORT...

Page 1462: ...d DEVICE_ENCLOSURE ID VM_HOST DEVICE_ENCLOSURE_ID and DEVICE_ENCLOSURE ID VM_VIRTUAL_MACHINE HOST_ID and VM_HOST VM_DATACENTER_ID VM_DATA_CENTER ID and VM_DATA_CENTER VCENTER_ID VM_VCENTER ID and DEVI...

Page 1463: ...TCH SWITCH_PORT VIRTUAL_SWITCH DEVICE_NODE FABRIC DEVICE_PORT_MAC_ADDRESS_MAP GIGE_PORT VM_STORAGE VM_PATH DEVICE_ENCLOSURE VM_VIRTUAL_MACHINE VM_VCENTER VM_DATA_CENTER VM_HOST where VM_PATH HBA_PORT...

Page 1464: ...etails where vm_virtual_machine_datastore_map vm_datastore_details_id vm_datastore_details id VM_EE_MONITOR_INFO This view provides combined ee_monitor ee_monitor_stats device_port and device_node tab...

Page 1465: ...UNT VM_HOST CPU_TYPE VM_HOST CPU_RESOURCES as HOST_CPU_RESOURCES VM_HOST MEM_RESOURCES as HOST_MEM_RESOURCES VM_HOST LICENSE_SERVER VM_HOST BOOT_TIME as HOST_BOOT_TIME VM_HOST CLUSTER_NAME as CLUSTER_...

Page 1466: ..._PATH USAGE as PATH_USAGE VM_PATH ENABLED as PATH_ENABLED VM_PATH ACTIVE as PATH_ACTIVE VM_PATH PREFERRED as PATH_PREFERRED from VM_STORAGE join VM_PATH on VM_STORAGE ID VM_PATH STORAGE_ID VM_STATISTI...

Page 1467: ...VIRTUAL_SWITCH CORE_SWITCH_ID CORE_SWITCH ID and FC_PORT_STATS CREATION_TIME in select MAX CREATION_TIME from FC_PORT_STATS group by PORT_ID union select DEVICE_PORT SWITCH_PORT_WWN DEVICE_PORT DOMAIN...

Page 1468: ...WITCH_TE_PORT_STATS group by PORT_ID VR_CONN_MODULE_INFO create or replace view VR_CONN_MODULE_INFO as select distinct VR_CONN_MODULE ID VR_CONN_MODULE VR_CONN_DOMAIN_ID VR_CONN_MODULE VCEM_ASSIGNED_I...

Page 1469: ...DULE LAST_UPDATE_TIME VR_CONN_DOMAIN NAME as DOMAIN_NAME VR_CONN_DOMAIN GUID as DOMAIN_GUID VR_CONN_DOMAIN FIRMWARE_VERSION VR_CONN_DOMAIN_GROUP NAME as DOMAIN_GROUP_NAME VCEM_PROFILE ID as VCEM_PROFI...

Page 1470: ...ILE_ID SWITCH_PORT ID as SWITCH_PORT_ID VIRTUAL_SWITCH ID as VIRTUAL_SWITCH_ID from VR_CONN_MODULE_PORT inner join VR_CONN_MODULE on VR_CONN_MODULE ID VR_CONN_MODULE_PORT VR_CONN_MODULE_ID inner join...

Page 1471: ...ONN_SERVER_PROFILE_ID inner join VR_CONN_DOMAIN on VR_CONN_DOMAIN GUID VR_CONN_SERVER_PROFILE BAY_ENCLOSURE_UUID inner join VCEM_PROFILE on VCEM_PROFILE ID VR_CONN_SERVER_PROFILE VCEM_PROFILE_ID inner...

Page 1472: ...ME AS VCENTER_NAME from VM_HOST_VIRTUAL_NIC VM_VCENTER_MEMBER VM_VCENTER where VM_HOST_VIRTUAL_NIC VM_HOST_ID VM_VCENTER_MEMBER VM_HOST_ID AND VM_VCENTER_MEMBER VM_VCENTER_ID VM_VCENTER ID union all s...

Page 1473: ...B_CONFIG ID AS CONFIG_ID ZONE_DB_CONFIG DEFINED_CONTENT ZONE_DB_CONFIG ACTIVE_CONTENT ZONE_DB_CONFIG TI_ZONE_CONTENT from ZONE_DB ZONE_DB_CONFIG where ZONE_DB ID ZONE_DB_CONFIG ZONE_DB_ID Name ap_usag...

Page 1474: ...SFLOW_IP_ROUTE_INFO_ID IN_VLAN OUT_VLAN FRAMES BYTES from SFLOW_MINUTE_BGP where SLNUM select MAX_SLNUM from SFLOW_MINUTE_BGP_SLNUM fetch first 1 rows only union all select DEVICE_ID TIME_IN_SECONDS S...

Page 1475: ...hysical_device_id l2 unit_number l2 slot_id l2 slot_num l2 module_id l2 physical_port_id l2 port_num l2 interface_id l2 name l2 if_name l2 identifier l2 table_subtype l2 tag_mode l2 speed_in_mb l2 phy...

Page 1476: ...erface_id i interface_id AND i table_subtype text RADIO_INTERFACE text l2 LEFT JOIN SELECT radio_interface interface_id AS radioif_id radio_interface radio_type radio_interface is_enabled radio_interf...

Page 1477: ...ENCLOSURE ID as DEVICE_ENCLOSURE_ID DEVICE IP_ADDRESS as LAN_IP_ADDRESS coalesce CS_VS IP_ADDRESS CS_ME IP_ADDRESS DEVICE_ENCLOSURE IP_ADDRESS as SAN_IP_ADDRESS VIRTUAL_SWITCH VIRTUAL_FABRIC_ID coales...

Page 1478: ...type 0 UNION ALL SELECT de device_id de ip_address AS device_ip sd target_type de device_id AS target_id de sys_name AS target_name 0 AS collectible_type sd mib_object_id AS collectible_id sd collecto...

Page 1479: ...JOIN interface ifs ON se target_type 1 AND se target_id ifs interface_id JOIN device de ON ifs device_id de device_id UNION ALL SELECT de device_id de ip_address AS device_ip sd target_type sp id AS t...

Page 1480: ...E as VSWITCH_NAME VNIC_DV_PORT NAME as DVPORT_NAME VM_PHYSICAL_NIC DEVICE_NAME as PNIC_NAME VM_PHYSICAL_NIC MAC_ADDRESS as PNIC_MAC DEVICE SYS_NAME as SWITCH_NAME DEVICE IP_ADDRESS as SWITCH_IP PHYSIC...

Page 1481: ...CAL_NIC VM_HOST_END_DEV_CONNECTIVITY INTERFACE DEVICE PHYSICAL_INTERFACE PHYSICAL_PORT where VM_VIRTUAL_MACHINE ID VM_VIRTUAL_ETHERNET_ADAPTER VIRTUAL_MACHINE_ID and VM_VIRTUAL_ETHERNET_ADAPTER VM_STD...

Page 1482: ..._licensed integer OWNER TO dcmadmin TRILL_TRUNK_INFO create or replace view TRILL_TRUNK_INFO as select TRILL_TRUNK_GROUP ID TRILL_TRUNK_GROUP ME_ID TRILL_TRUNK_GROUP MASTER_PORT_NUMBER TRILL_TRUNK_MEM...

Page 1483: ...tx_power wireless channel_number wireless max_data_rate wireless beacon_rate wireless dtim wireless rts_threshold wireless is_turbo_mode wireless radio_g_mode wireless max_associated_clients FROM SEL...

Page 1484: ...e l2 speed_in_mb l2 physical_address l2 duplex_mode l3 ip_id l3 ip_interface_id l3 ip_address l3 subnet_mask FROM SELECT DISTINCT d device_id d ip_address AS device_ip_address pd physical_device_id pd...

Page 1485: ...RT DOT1X_ENABLED CEE_PORT PORT_ROLE CEE_PORT AMPP_PROFILE_MODE CORE_SWITCH IP_ADDRESS as PHYSICAL_SWITCH_IP CORE_SWITCH WWN as PHYSICAL_SWITCH_WWN GIGE_PORT OPERATIONAL_STATUS GIGE_PORT MAX_SPEED GIGE...

Page 1486: ...1438 Brocade Network Advisor SAN User Manual 53 1002696 01 Views H...

Page 1487: ...s 816 ISL protocol thresholds 818 link reset thresholds 817 members to LSAN zone LSAN zone adding members 740 property labels 257 353 storage ports to storage array 396 switches to fabric binding 803...

Page 1488: ...7 cascaded FICON fabric configuring 841 cascaded FICON fabrics 831 merging 845 CEE management roles and access levels 1114 certificates storing the public key 605 changing Allow Prohibit Matrix displa...

Page 1489: ...nfiguring zoning 717 connected ports showing 361 connecting edge fabrics to backbone fabrics 508 connection utilization changing 936 disabling 935 enabling 935 overview 934 supported on 934 connection...

Page 1490: ...vice adding names 96 assigning event filters 185 removing name 98 device icons 248 249 device properties 1119 device properties dialog boxes customizing 1119 device shortcut menu adding options 283 ch...

Page 1491: ...ox 526 configuring in a multi path environment 646 gathering information before using the setup wizard 539 591 launching the encryption targets dialog box 681 selecting mode for LUNs 660 viewing and e...

Page 1492: ...nt logs 1032 copying entries 1033 copying parts 1033 exporting entries 1034 viewing 1032 event management overview 973 roles and access levels 1115 event notification configuring e mail notification 9...

Page 1493: ...60 tunnels configuring 776 deleting 793 794 disabling 792 793 enabling 793 modifying 777 FCIP configuration advanced settings 781 IP interfaces 776 IP routes 776 FCIP configuration guidelines 774 FCIP...

Page 1494: ...uring 124 testing 128 G generating performance graph 903 performance reports 1057 reports 1054 zoning reports 1059 graphing end to end monitor pairs historical 917 end to end monitor pairs real time 9...

Page 1495: ...x html 528 I IBM z OS Global Mirror z Gm 773 icons device 248 249 products 248 249 IFL See interfabric links IKE policies configuring 784 immediate technical support information collection 1045 import...

Page 1496: ...33 exporting 1034 logging in remote client 4 remote SMIA configuration tool 312 server 3 logical switch assigning ports 519 changing to base switch 523 creating 516 deleting 520 moving 523 removing po...

Page 1497: ...s 777 Monitor menu 1068 monitoring connection utilization 934 end to end 915 end to end configuring 915 end to end displaying 917 monitoring fabrics 52 monitoring pairs deleting 917 refreshing 917 mon...

Page 1498: ...359 refreshing 358 resetting filter 360 viewing details 360 port connectivity viewing 355 port display changing 269 port fencing inheritance avoiding 822 port fencing description 807 port label changi...

Page 1499: ...o end monitoring pairs 917 port optics view 367 zone databases 734 refreshing the port connectivity view 358 registering SNMP traps 988 remote client launch 4 logging in 4 remote host management 406 r...

Page 1500: ...g 101 server name determining 248 server port configuring 129 server port numbers changing 293 server properties viewing 10 servers associating to HBAs 390 determining name 248 logging in 3 removing 3...

Page 1501: ...ation description 395 storage port properties viewing 398 storage ports adding to storage array 396 reassigning to storage array 397 unassigning from storage array 397 storage properties 1122 support...

Page 1502: ...adding 813 adding C3 discard frames 813 adding state change 820 826 C3 Discard Frames 811 Invalid CRCs 812 Invalid words 812 ISL protocol 812 link reset 812 state change 812 threshold policies assigni...

Page 1503: ...ns changing 252 View window product list 242 View window toolbox 241 viewing call home status 182 configuration file 333 disabling port connectivity filter 360 enabling port connectivity filter 360 ev...

Page 1504: ...lation adding members 745 traffic isolation creating 744 traffic isolation disabling 746 traffic isolation disabling failover 747 traffic isolation enabling 746 traffic isolation enabling failover 747...

Page 1505: ...716 LSAN 738 naming conventions 716 offline 715 online 715 overview 713 traffic isolation 742 traffic isolation configuring 744 zoning activation roles and access levels 1115 zoning administration 749...

Reviews: