Many
Manuals
search
Kategorie
Marki
Strona główna
Dell
Oprogramowanie
Brocade 300
Podręcznik Użytkownika
Dell Brocade 300 Podręcznik Użytkownika Strona 374
Pobierz
Podziel się
Dzielenie się
Dodaj do moich podręczników
Drukuj
Strona
/
666
Spis treści
BOOKMARKI
Oceniono
.
/ 5. Na podstawie
oceny klientów
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
374
Fabric OS A
dministr
ator’s Guide
53-1002745-02
Setting up TI over FCR (sample
procedure)
12
1
2
...
369
370
371
372
373
374
375
376
377
378
379
...
665
666
Fabric OS
1
Document History
2
Contents (High Level)
3
Contents
5
Chapter 4 Routing Traffic
8
53-1002745-02
10
Chapter 15 NPIV
16
Section II Licensed Features
18
Appendix A Port Indexing
23
Appendix B FIPS Support
23
About This Document
33
What’s new in this document
35
Document conventions
36
Notice to the reader
37
Additional information
38
Getting technical help
38
FT00X0054E9
39
Document feedback
40
Standard Features
41
Management server
44
Platform services
44
Management server database
45
Adding a member to the ACL
46
Topology discovery
49
Disabling topology discovery
50
Device login
51
Fabric login process
52
Port login process
52
Device recovery
53
Daemon Description
54
Fabric OS overview
55
Telnet or SSH sessions
57
Getting help on a command
58
• Timestamp
59
• Username
59
• Options
59
• Arguments
59
Password modification
61
Brocade Backbones
62
Brocade switches
62
Static Ethernet addresses
64
DHCP activation
66
Disabling DHCP for IPv4
67
IPv6 autoconfiguration
68
Date and time settings
69
Setting the time zone
70
Network time protocol
71
Domain IDs
72
Displaying the domain IDs
73
Switch names
74
Chassis names
75
Fabric name
75
Switch and Backbone shutdown
76
Powering off a Brocade switch
77
Basic connections
78
Core PID addressing mode
80
256-area addressing mode
81
WWN-based PID assignment
82
Assigning a static PID
83
Clearing PID binding
83
Showing PID assignments
83
Port Types
84
Backbone port blades
84
Setting port names
86
Port identification by index
87
Swapping port area IDs
88
Enabling a port
89
Port decommissioning
90
Setting port modes
90
Setting port speeds
92
Supported on:
93
Blade Blade ID
93
(slotshow)
93
CP blades
95
Core blades
95
Enabling and disabling blades
96
Blade swapping
97
How blades are swapped
98
Swapping blades
100
Power management
101
Equipment status
102
Verifying fabric connectivity
103
Verifying device connectivity
104
Example output from a switch
106
Audit log configuration
107
Audit filter is configured
108
Audit filter is enabled
108
Routing Traffic
111
Paths and route selection
112
Fibre Channel NAT
113
Inter-switch links
114
Buffer credits
115
Virtual channels
115
Gateway links
117
Routing policies
118
Port-based
119
Exchange-based routing
119
Device-based routing
120
AP route policies
120
Setting the routing policy
121
Route selection
122
Frame order delivery
123
ATTENTION
125
Lossless core
126
ICL limitations
127
Traffic flow limitations
127
Limitations
128
Viewing current FEC settings
129
Frame Redirection
130
Viewing frame redirect zones
131
Managing User Accounts
133
Role-Based Access Control
134
Admin Domain considerations
135
Role permissions
135
The management channel
136
Managing user-defined roles
136
Local database user accounts
137
Default accounts
138
Local account passwords
139
--localaccept PWD command
140
Password policies
141
Password history policy
142
Password expiration policy
143
Account lockout policy
143
Unlocking an account
144
The boot PROM password
145
Option Description
146
Recovery Password:
147
New password:
147
Remote authentication
149
Authentication server data
150
Switch configuration
150
Supported LDAP options
151
Command options
151
Fabric OS user accounts
152
Item Value Description
153
Windows 2000 IAS
154
Linux FreeRADIUS server
154
Setting up a RADIUS server
156
• Creating the user
157
• Enabling clients
157
. IAS uses the Windows
159
RSA RADIUS server
160
• vid (Vendor-ID): 1588
161
• type1 (Vendor-Type): 1
161
Creating a user
164
Creating a group
164
Enabling group membership
166
Assigning a user to a group
168
Modifying an entry
168
Example to add a group member
169
TACACS+ service
171
The tac_plus.cfg file
172
Example enabling RADIUS
175
Example enabling LDAP
175
Example enabling TACACS+
175
Example for LDAP
176
Example for TACACS+
176
Configuring Protocols
177
Secure Copy
178
Secure Shell protocol
179
SSH public key authentication
180
Browser and Java support
182
SSL configuration overview
183
Example of generating a key
184
Example of generating a CSR
184
Example of exporting a CSR
184
Obtaining certificates
185
The browser
186
• Brocade-specific MIB trap
188
• FibreAlliance MIB trap
188
SNMP and Virtual Fabrics
189
Telnet protocol
190
Unblocking Telnet
191
Listener applications
192
Port configuration
193
Configuring Security Policies
195
ACL policy management
196
Displaying ACL policies
197
Activating ACL policy changes
197
Deleting an ACL policy
197
Example of removing a member
198
FCS policies
199
Creating an FCS policy
201
FCS policy distribution
202
DCC policy restrictions
203
Creating a DCC policy
204
Deleting a DCC policy
205
SCC Policies
206
Creating an SCC policy
207
E_Port authentication
208
Device authentication policy
210
AUTH policy restrictions
211
Authentication protocols
212
Secret key pairs for DH-CHAP
213
Setting a secret key pair
214
FCAP configuration overview
215
Exporting the CSR for FCAP
216
Importing CA for FCAP
216
IP Filter policy
217
Creating an IP Filter policy
218
Cloning an IP Filter policy
218
Saving an IP Filter policy
218
Deleting an IP Filter policy
219
IP Filter policy rules
219
Source address
220
Destination port
220
Protocol
221
Implicit filter rules
222
Default policy rules
222
IP Filter policy enforcement
223
Policy database distribution
224
Distribution
225
Fabric-wide enforcement
227
Management interface security
231
Gateway-to-gateway tunnel
232
Endpoint-to-gateway tunnel
232
IP sec protocols
233
Security associations
233
IP sec policies
234
IKE policies
235
Creating the tunnel
236
In this chapter
241
Configuration settings
241
Configuration file format
242
Chassis section
243
Configuration file backup
244
Restrictions
246
Command Displays
247
Restoring a configuration
248
Security considerations
250
Brocade configuration form
253
HA sync state
257
Active CP Fabric OS
258
Standby CP Fabric OS
258
HA sync state Remedy
258
Connected switches
259
Firmware download on switches
260
Enabling the USB device
265
Viewing the USB file system
265
FIPS support
266
The firmwareDownload command
267
Managing Virtual Fabrics
275
Logical switch overview
276
Physical chassis
278
Logical fabric overview
281
Logical fabric and ISLs
282
Base switch and extended ISLs
283
Base fabric
285
Logical ports
285
Logical fabric formation
285
Restrictions on XISLs
289
Restrictions on moving ports
289
Enabling Virtual Fabrics mode
290
Example
291
Deleting a logical switch
294
Administering Advanced Zoning
303
Zoning overview
304
Approaches to zoning
305
Zone objects
306
Zone aliases
307
Zone configurations
307
Zoning enforcement
308
Item Description
309
Broadcast zones
310
Creating an alias
313
Adding members to an alias
313
Deleting an alias
314
Zone creation and maintenance
316
Replacing zone members
319
Deleting a zone
320
Validating a zone
323
Example warning message
324
Default zoning mode
326
Zone database size
327
Enabling a zone configuration
330
Deleting a zone configuration
331
Zone object maintenance
333
Deleting a zone object
334
Renaming a zone object
335
Zone configuration management
336
Security and zoning
336
Zone merging
336
, even though members of the
338
Zone merging scenarios
339
Concurrent zone transactions
342
Sample output:
343
Traffic Isolation Zoning
345
TI zone failover
346
Enhanced TI zones
350
General rules for TI zones
356
Trunking with TI zones
359
Creating a TI zone
364
Example TI zone creation
365
Modifying TI zones
367
Deleting a TI zone
369
Displaying TI zones
369
FIGURE 47 TI over FCR example
371
Bottleneck Detection
375
Types of bottlenecks
376
How bottlenecks are reported
376
Credit Loss
379
Setting a latency alert only
384
Encryption
394
Example output
396
Availability considerations
398
Limitations and restrictions
402
Configuring encryption
404
Configuring compression
404
Disabling encryption
405
Disabling compression
405
Enabling compression
409
Working with EX_Ports
411
Example Setting a secret key
412
EX_Port commands
418
NPIV overview
419
Upgrade considerations
420
Fixed addressing mode
420
10-bit addressing mode
420
Configuring NPIV
421
Enabling and disabling NPIV
422
Configuring FA-PWWNs
426
Restrictions of FA-PWWN
431
Admin Domain features
435
Admin Domain access levels
435
User-defined Admin Domains
436
System-defined Admin Domains
436
Home Admin Domains and login
438
Admin Domain member types
439
Admin Domains and switch WWNs
440
Fabric Visible to AD3 User
441
Fabric Visible to AD4 User
441
Creating an Admin Domain
443
Activating an Admin Domain
446
Deactivating an Admin Domain
447
Renaming an Admin Domain
448
Deleting an Admin Domain
449
AD0 with three zones
452
CLI commands in an AD context
455
• Root zone database
458
• AD zone databases
458
Admin Domains and LSAN zones
459
Configuration file sections
460
Licensed Features
461
Administering Licensing
463
Licensing overview
464
Available Brocade licenses
464
Brocade 7800 Upgrade license
470
ICL licensing
471
ICL 8-link license
472
ICL 16-link license
472
Enterprise ICL license
472
8G licensing
473
Slot-based licensing
474
10G licensing
475
Temporary licenses
478
Date change restriction
479
Expired licenses
480
Universal temporary licenses
480
Viewing installed licenses
481
Activating a license
481
Adding a licensed feature
481
Removing a licensed feature
482
Ports on Demand
483
Displaying installed licenses
484
Activating Ports on Demand
485
Dynamic Ports on Demand
485
Reserving a port license
488
Inter-chassis Links
491
Domain 1
492
DCX 8510-8
492
Domain 2
492
Mesh topology
495
Core-edge topology
496
Monitoring Fabric Performance
499
Maximum number of EE monitors
501
Adding EE monitors
502
Deleting EE monitors
504
Frame monitoring
505
Maximum number of offsets
506
Creating a frame monitor
507
Deleting frame types
507
Displaying frame monitors
508
Top Talker monitors
510
Trunk monitoring
515
Performance data collection
516
Optimizing Fabric Behavior
517
Ingress Rate Limiting
518
• Enable QoS on F/FL_Ports
520
• Enable QoS on E_Ports
520
Supported configurations
521
• Are 8-Gbps or 16-Gbps ports
524
• Have trunking enabled
524
• Have QoS disabled
524
QoS zones
525
QoS on E_Ports
526
QoS over FC routers
527
Managing Trunking Connections
533
Types of trunking
534
Masterless trunking
534
Port groups for trunking
535
Requirements for trunk groups
536
Configuring trunk groups
538
Trunk Area and Admin Domains
540
EX_Port trunking
541
Masterless EX_Port trunking
542
Configuring EX_Port trunking
542
F_Port trunking
543
Category Description
546
Disabling F_Port trunking
549
Long -distance link modes
552
Configuring an extended ISL
553
Buffer credit management
555
Fibre Channel data frames
557
• If QoS is enabled:
558
Downgrade considerations
565
Buffer credit recovery
566
FC-FC routing overview
569
• EX_Port and VEX_Port
572
• Edge fabric
572
• Backbone fabric
572
• Inter-fabric link (IFL)
572
• Logical SANs (LSANs)
573
• Proxy device
573
• Proxy PID
573
• Fabric ID (FID)
574
• MetaSAN
574
Proxy devices
575
FC-FC routing topologies
576
Phantom domains
577
Setting up FC-FC routing
579
Backbone fabric IDs
581
FCIP tunnel configuration
582
• 1000 for an EX_Port IFL
587
• 10,000 for a VEX_Port IFL
587
Port cost considerations
588
LSAN zone configuration
590
LSAN Zone Limit 3000
594
LSAN Zone Limit 5000
594
Enforce tag
595
Speed tag
595
Rules for LSAN tagging
596
Configuring a Speed LSAN tag
597
Removing an LSAN tag
597
LSAN zone binding
598
FIGURE 81 LSAN zone binding
599
How LSAN zone binding works
600
FC router matrix definition
601
LSAN fabric matrix definition
601
Setting up LSAN zone binding
602
Proxy PID configuration
603
Inter-fabric broadcast frames
604
Resource monitoring
604
Port Indexing
611
FIPS Support
615
Zeroization functions
616
FIPS mode configuration
617
LDAP in FIPS mode
618
Setting up LDAP for FIPS mode
619
Key Sub-key
620
Preparing a switch for FIPS
621
Overview of steps
622
Enabling FIPS mode
622
Zeroizing for FIPS
624
Displaying FIPS configuration
625
Hexadecimal Conversion
627
Numerics
631
Komentarze do niniejszej Instrukcji
Brak uwag
Publish
Powiązane produkty i podręczniki dla Oprogramowanie Dell Brocade 300
Oprogramowanie Dell Data Protection | Encryption Podręcznik Użytkownika
(188 strony)
Oprogramowanie Dell Chassis Management Controller Version 1.0 for PowerEdge VRTX Podręcznik Użytkownika
(155 strony)
Oprogramowanie Dell Compellent Series 40 Instrukcja Użytkownika
(448 strony)
Oprogramowanie Dell PowerConnect W-Airwave 7.7 Instrukcja Instalacji
(19 strony)
Oprogramowanie Dell v1.1 Instrukcja Użytkownika
(175 strony)
Oprogramowanie Dell Force10 S4810P Podręcznik Użytkownika
(175 strony)
Oprogramowanie Dell Force10 S25N-S50N Instrukcja Konfiguracji
(8 strony)
Oprogramowanie Dell PowerConnect W-AirWave 7.4 Instrukcja Użytkownika
(310 strony)
Oprogramowanie Dell PowerConnect W-AirWave 7.6 Instrukcja Instalacji
(18 strony)
Oprogramowanie Dell PowerConnect W-AirWave 7.4 Instrukcja Użytkownika
(172 strony)
Oprogramowanie Dell Brocade 6520 Podręcznik Użytkownika
(146 strony)
Oprogramowanie Dell OpenManage Essentials Version 1.0 Instrukcja Użytkownika
(196 strony)
Oprogramowanie Dell OpenManage Network Manager Podręcznik Użytkownika
(384 strony)
Oprogramowanie Dell Networking Z9500 Instrukcja Użytkownika
(920 strony)
Oprogramowanie Dell OpenManage Server Administrator Version 2.3 Instrukcja Użytkownika
(216 strony)
Oprogramowanie Dell Force10 Z9000 Podręcznik Użytkownika
(165 strony)
Oprogramowanie Dell Networking Z9500 Podręcznik Użytkownika
(172 strony)
Oprogramowanie Dell PowerVault 3660i Instrukcja Właściciela
(237 strony)
Oprogramowanie Dell M6500 Instrukcja Użytkownika
(42 strony)
Oprogramowanie Dell PowerEdge M1000e Podręcznik Użytkownika
(283 strony)
Drukuj dokument
Drukuj stronę 374
Komentarze do niniejszej Instrukcji