Professional Documents
Culture Documents
15 August 2014
Fabric OS
Documentation Updates
Supporting Fabric OS v6.4.x
Asia-Pacific Headquarters
Brocade Communications Systems China HK, Ltd.
No. 1 Guanghua Road
Chao Yang District
Units 2718 and 2818
Beijing 100020, China
Tel: +8610 6588 8888
Fax: +8610 6588 9999
E-mail: china-info@brocade.com
European Headquarters
Brocade Communications Switzerland Srl
Centre Swissair
Tour B - 4me tage
29, Route de l'Aroport
Case Postale 105
CH-1215 Genve 15
Switzerland
Tel: +41 22 799 5640
Fax: +41 22 799 5641
E-mail: emea-info@brocade.com
Asia-Pacific Headquarters
Brocade Communications Systems Co., Ltd. (Shenzhen WFOE)
Citic Plaza
No. 233 Tian He Road North
Unit 1308 13th Floor
Guangzhou, China
Tel: +8620 3891 2000
Fax: +8620 3891 2111
E-mail: china-info@brocade.com
Document History
Title
Date
53-1002063-01
New document
October 2010
53-1002063-02
November 2010
53-1002063-03
February 2011
53-1002063-04
March 2011
53-1002063-05
April 2011
Title
Date
53-1002063-06
September 2011
53-1002063-07
December 2011
53-1002063-08
May 2012
53-1002063-09
August 2012
53-1002063-10
December 2012
53-1002063-11
August 2013
53-1002063-12
March 2014
iii
iv
Contents
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
vi
Chapter 9
Chapter 10
Chapter 11
vii
viii
In this chapter
How this document is organized . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Whats new in this document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Brocade resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Document feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ix
x
x
x
TABLE 1
Publication Title
Fabric OS Release
Page Number
Publication Date
Updates on page 1
March 2010
Updated on page 3
October 2010
v6.4.0 only
Updated on page 3
March 2010
Updates on page 7
September 2010
v6.4.0 only
Updates on page 7
March 2010
Updates on page 9
September 2010
Updated on page 15
April 2012
No Updates
March 2010
No Updates
November 2010
No Updates
March 2010
No Updates
March 2010
No Updates
October 2010
Updates on page 27
March 2010
Updates on page 17
March 2010
No updates
March 2010
Updates on page 23
March 2010
No updates
March 2010
No updates
March 2010
ix
TABLE 1
Publication Title
Fabric OS Release
Page Number
Publication Date
Updates on page 37
March 2010
Updates on page 33
October 2011
Updates on page 35
October 2011
Updates on page 25
August 2014
Brocade resources
To get up-to-the-minute information, go to http://my.brocade.com and register at no cost for a user
ID and password.
For practical discussions about SAN design, implementation, and maintenance, you can obtain
Building SANs with Brocade Fabric Switches through:
http://www.amazon.com
For additional Brocade documentation, visit the Brocade SAN Info Center and click the Resource
Library location:
http://www.brocade.com
Release notes are available on the MyBrocade web site and are also bundled with the Fabric OS
firmware.
Document feedback
Quality is our first concern at Brocade and we have made every effort to ensure the accuracy and
completeness of this document. However, if you find an error or an omission, or you think that a
topic needs further development, we want to hear from you. Forward your feedback to:
documentation@brocade.com
Provide the title and version number of the document and as much detail as possible about your
comment, including the topic heading and page number and your suggestions for improvement.
Chapter
In this chapter
The updates in this chapter are for the Access Gateway Administrators Guide, published March
2010.
NOTE
N_Port Trunking is not supported for HBAs connected to switches running in Access Gateway mode.
This feature is only be supported for HBAs connected to switches running in Native mode.
Chapter
In this chapter
The updates in this chapter are for the CEE Administrators Guide, published March 2010 and
October 2010.
NOTE
The name used in the cee-map command must begin with a letter, and can consist of letters,
digits, hyphens, and underscore characters. Spaces are prohibited. Special characters are not
supported, and cause the name to truncate.
Under the heading of "Minimum CEE configuration to allow FCoE traffic flow" on page 29, add the
following note:
NOTE
The name used in the cee-map command must begin with a letter, and can consist of letters,
digits, hyphens, and underscore characters. Spaces are prohibited. Special characters are not
supported, and cause the name to truncate.
NOTE
The name used in the cee-map command must begin with a letter, and can consist of letters,
digits, hyphens, and underscore characters. Spaces are prohibited. Special characters are not
supported, and cause the name to truncate.
Under the heading of "Creating a CEE map" on page 107, delete the example under step 2.
Under the heading of "Defining a priority group table" on page 107, add the following note:
NOTE
The name used in the cee-map command must begin with a letter, and can consist of letters,
digits, hyphens, and underscore characters. Spaces are prohibited. Special characters are not
supported, and cause the name to truncate.
Under the heading of "Defining a priority group table" on page 107, delete the example under step
4.
Under the heading of "Defining a priority-table map" on page 108, add the following note:
NOTE
The name used in the cee-map command must begin with a letter, and can consist of letters,
digits, hyphens, and underscore characters. Spaces are prohibited. Special characters are not
supported, and cause the name to truncate.
Under the heading of "Defining a priority-table map" on page 108, delete the example under step 3.
Under the heading of "Applying a CEE provisioning map to an interface on page 110, delete the
example under step 3.
NOTE
The name used in the cee-map command must begin with a letter, and can consist of letters,
digits, hyphens, and underscore characters. Spaces are prohibited. Special characters are not
supported, and cause the name to truncate.
Under the heading of "Minimum CEE configuration to allow FCoE traffic flow" on page 29, add the
following note:
NOTE
The name used in the cee-map command must begin with a letter, and can consist of letters,
digits, hyphens, and underscore characters. Spaces are prohibited. Special characters are not
supported, and cause the name to truncate.
NOTE
The name used in the cee-map command must begin with a letter, and can consist of letters,
digits, hyphens, and underscore characters. Spaces are prohibited. Special characters are not
supported, and cause the name to truncate.
NOTE
The name used in the cee-map command must begin with a letter, and can consist of letters,
digits, hyphens, and underscore characters. Spaces are prohibited. Special characters are not
supported, and cause the name to truncate.
Under the heading of "Creating a CEE map" on page 109, delete the example under step 2.
Under the heading of "Defining a priority group table" on page 109, add the following note:
NOTE
The name used in the cee-map command must begin with a letter, and can consist of letters,
digits, hyphens, and underscore characters. Spaces are prohibited. Special characters are not
supported, and cause the name to truncate.
Under the heading of "Defining a priority group table" on page 109, delete the example under step
4.
Under the heading of "Defining a priority-table map" on page 110, add the following note:
NOTE
The name used in the cee-map command must begin with a letter, and can consist of letters,
digits, hyphens, and underscore characters. Spaces are prohibited. Special characters are not
supported, and cause the name to truncate.
Under the heading of "Defining a priority-table map" on page 110, delete the example under step 3.
Under the heading of "Applying a CEE provisioning map to an interface on page 112, delete the
example under step 3.
Chapter
In this chapter
The updates in this chapter are for the CEE Command Reference, published March 2010 and
October 2010.
USAGE
GUIDELINES
The map name must begin with a letter, and can consist of letters, digits, hyphens, and underscore
characters. Spaces are prohibited. Special characters are not supported, and cause the name to
truncate.
configure
configure
The description for the Enable 256 Area limit parameter option 1 incorrectly stated that mode 1 was
incompatible with domain index zoning. The sentence has been removed. The description of Enable 256
Area limit option 1 now reads:
1
The unique area assignments begin at zero regardless of where the port is
physically located. This allows FICON users to make use of high port count port
blades with port indexes greater than 256.
USAGE
GUIDELINES
The map name must begin with a letter, and can consist of letters, digits, hyphens, and underscore
characters. Spaces are prohibited. Special characters are not supported, and cause the name to
truncate.
Chapter
In this chapter
The updates in this chapter are for the Fabric OS Administrators Guide, published September
2010.
NOTE
IP fragmentation is not supported on the Brocade 7500 switch or the FR4-18i blade.
ChassisRole is the account access permission at the chassis level. The chassis role allows
the user to execute chassis-related commands in a Virtual Fabrics-enabled environment.
Valid chassis roles include the default roles and any of the user-defined roles.
.cer (binary)
.crt (binary)
.pem (text)
RPC supports .pem file types. For RPC, the .cer and .crt file types are automatically converted
to .pem.
In the section Installing a switch certificate on page 125, the example is missing the command.
Add the following command line to the beginning of the example:
switch:admin> seccertutil import -config swcert -enable https
10
Zoning enforcement
Zoning enforcement describes a set of predefined rules that the switch uses to determine where to
send incoming data. Fabric OS uses hardware-enforced zoning. Hardware-enforced zoning means
that each frame is checked by hardware (the ASIC) before it is delivered to a zone member and is
discarded if there is a zone mismatch. When hardware-enforced zoning is active, the Fabric OS
switch monitors the communications and blocks any frames that do not comply with the effective
zone configuration. The switch performs this blocking at the transmit side of the port on which the
destination device is located.
There are two methods of hardware enforcement:
TI over FCR is supported on an edge switch only in Brocade Native Mode (interopmode 0).
In the section Limitations and restrictions of Traffic Isolation Zoning on page 278, change the
fourth bullet item (which is on page 279) to the following:
Two N_Ports that have the same shared area must be configured in the same TI zone. This
limitation does not apply to E_Ports that use the same shared area on the FC4-48 and
FC8-48 port blades.
The maximum zone database size is 1 MB and is a combination of the active configuration
size and the defined configuration size. For example, if the active configuration size is
200 KB, then the size of the defined configuration cannot exceed 800 KB.
11
License
Description
Add the following sub-section within the Ports on Demand section on page 378:
12
Feature
License
Trunking on an HBA
Local switch
Fabric mode Top Talker monitors and FC-FC routing are not concurrently supported.
Traffic prioritization is not supported over LSAN zones. The traffic is always medium priority
in the ingress edge fabric, the backbone fabric, and the egress edge fabric.
In Fabric OS 6.3.0 and later, QoS is supported with FC-FC routing.
N_Port Trunking configurations are between a switch and a Brocade Host Bus Adapter (HBA).
See Configuring N_Port trunking for Brocade adapters and the Brocade Adapters
Administrators Guide for more information about configuring this type of trunking.
Add the following section at the end of the chapter:
13
b.
Disable the ports to be used for trunking using the portDisable command.
switch:admin> portdisable 3/40
switch:admin> portdisable 3/41
c.
2. On the host side, enable trunking as described in the Brocade Adapters Administrators Guide.
3. On the switch side, enable the ports using the portEnable command.
switch:admin> portenable 3/40
switch:admin> portenable 3/41
14
Chapter
In this chapter
The updates in this chapter are for the Fabric OS Command Reference.
tsClockServer
A note added to indicate the limitations in the usage of IP address and DNS names:
If a DNS name is used instead of an ip address, the DNS name must be less than 32 characters. If the
DNS name is longer than 32 characters, use the associated ip address.
15
16
tsClockServer
Chapter
In this chapter
Replace and update the chapters as described in the following sections:
17
18
19
21
NOTE
The updates are arranged by the chapter names as they appear in the original document.
CDR-1007
Message
Probable Cause
Indicates some errors found in hardware that may or may not impact data traffic.
Recommended
Action
No action is required.
Severity
WARNING
CDR-1008
Message
17
CDR-1009
Probable Cause
Indicates an internal error in the ASIC hardware that may or may not degrade data traffic.
Recommended
Action
Whenever this error occurs, restart the system at the next maintenance window.
Severity
WARNING
CDR-1009
Message
Probable Cause
Indicates an internal error in the ASIC hardware that may or may not degrade data traffic.
Recommended
Action
Whenever this error occurs, restart the system at the next maintenance window.
Severity
WARNING
CDR-1010
Message
Probable Cause
Indicates above normal errors observed in hardware that may or may not impact data traffic.
Recommended
Action
Whenever this error is observed persistently, power cycle the faulted blade. If the problem persists,
replace the blade.
Severity
CRITICAL
FCOE-1020
Message
Probable Cause
Indicates a FLOGI was sent to the FC stack by the FCoE driver but login was rejected by FC stack.
Recommended
Action
No action is required.
Severity
18
INFO
KAC-1010
Message
Probable Cause
Recommended
Action
No action is required.
Severity
ERROR
KAC-1011
Message
Probable Cause
Recommended
Action
No action is required.
Severity
ERROR
KAC-1012
Message
Probable Cause
Recommended
Action
No action is required.
Severity
ERROR
KAC-1013
Message
19
KAC-1014
Probable Cause
Recommended
Action
No action is required.
Severity
ERROR
KAC-1014
Message
Probable Cause
Recommended
Action
No action is required.
Severity
ERROR
KAC-1015
Message
Probable Cause
Indicates that key archival client is unable to communicate with the primary or backup key vault.
Recommended
Action
Change the switch key vault settings and/or ensure that the configured key vault is operational.
Severity
ERROR
KAC-1016
Message
Probable Cause
Indicates the mismatch of requested key id and key got in response from the Key vault.
Recommended
Action
No action is required.
Severity
20
ERROR
Modified messages
Modified messages
The probable cause has been modified for the following message in the chapter, FSS System
Messages on page 283.
FSS-1009
Message
Probable Cause
Indicates that a Fabric OS state synchronization (FSS) error has occurred for the specified
component. The error code is displayed in the message.
Recommended
Action
Run the supportSave command and contact your switch service provider.
Severity
ERROR
The recommended action has been modified for the following message in the chapter, FW System
Messages on page 290.
FW-1035
Message
Probable Cause
Indicates that the temperature of the small form-factor pluggable (SFP) has risen above the high
boundary. Frequent fluctuations in temperature might indicate a deteriorating SFP.
Recommended
Action
When other errors such as cyclic redundancy check (CRC) and invalid transmission word (ITW)
occur on the port, replace the SFP.
Severity
WARNING
The probable cause and recommended action has been modified for the following message in the
chapter, HSL System Messages on page 387.
HSL-1000
Message
Probable Cause
Indicates a hardware subsystem layer (HSL) initialization failure. This error is caused by other
system errors.
21
HSL-1000
Recommended
Action
Severity
22
Execute the supportFtp command (as needed) to set up automatic FTP transfers; then execute the
supportSave command and contact your switch service provider.
CRITICAL
Chapter
In this chapter
The updates in this chapter are for the Fabric Watch Administrators Guide, published March 2010.
When a counter is in the in-between state, Fabric Watch sends an informational SNMP trap.
(See In-between buffer values on page 24 for an explanation of the concepts of in-between
boundaries and high and low thresholds.)
When a counter is above the high threshold or below the low threshold, Fabric Watch sends a
warning SNMP trap except for the power supply area of the environment class, CPU, and
memory:
The severity of a Fabric Watch SNMP trap for the power supply area of the environment
class will always be informational except when the counter value is below the low
threshold. When the counter value of the power supply is below threshold, Fabric Watch
sends a warning SNMP trap.
The severity of a Fabric Watch SNMP trap for CPU and memory will always be
informational.
23
NOTE
The above low threshold action applies only to the portThConfig command. It does not apply to the
thConfig and sysMonitor commands.
24
The PERFPT area provides threshold values to the user-defined frame type. When a new
user-defined frame type is created using the fmMonitor command, the threshold value is
automatically based on the PERFPT configuration at the time the frame type is created. In the
above example, the high threshold value is 10. Therefore, all frame monitors configured hereafter
will have a high threshold value of 10.
25
26
Chapter
In this chapter
The updates in this chapter are for the Fibre Channel over IP Administrators Guide, published
March 2010.
IP interface considerations
There may be an issue a tunnel not initiating after creating new IP interfaces (IPIFs) for a 7500 or
FR4-18i GbE interface when multiple IPIFs exist for the tunnel on the same GbE interface. This
occurs when the received destination IP address falsely appears to be a broadcast address when
compared to the first IPIF subnet mask. To avoid this problem, always define IPIFs in order, with the
most available host addresses defined first.
As an example, if IP subnet 1 has a mask of 255.255.255.0 and subnet 2 has a mask of
255.255.0.0, then the first IPIF defined on a GbE port should be the subnet 2 IPIF (as it is the least
restrictive address). This will avoid a false positive check for a broadcast address for any IP address
in subnet 1.
In this appendix
FC Fast Write (FCFW) concepts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring and enabling FCFW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Disabling FCFW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Disabling FCFW flows without removing FCFW . . . . . . . . . . . . . . . . . . . . . . .
28
30
31
32
NOTE
Fibre Channel Fast Write is currently only supported by the 7500 switch and FR4-18i blade.
27
FIGURE 1
NOTE
FCFW and FCIP tunnels cannot be used together on the same 7500 or FR4-18i blade.
FCFW disables the local Ethernet ports (ge0 and ge1), making it impossible to configure FCFW
and FCIP tunnels on the same 7500 or FR4-18i blade.
FCFW does not support loop device configurations for more than one device.
28
FIGURE 2
FCFW can improve Write performance. Read performance is unaffected. The gains seen from
enabling FCFW depend on several factors, including the following:
The size of I/O vs. Transfer Ready. In general, the more times a target device sends a Transfer
Ready, the greater the performance gain.
The number of outstanding I/Os (both Write and Read), link speed, and link congestion. FCFW
may not result in significant improvement if these factors suggest that the write data is delayed
because it is sharing bandwidth.
Target response latency - If the target is slow in responding to the write command, the data
must be held by the remote switch.
29
FC ports on both the 7500 switch and the FR4-18i blade are organized into two groups. Ports
0-7 form one group, and ports 8-15 form the other. A maximum of four ports in each group may
be configured as FCFW.
The maximum bandwidth available for FCFW is 4 Gbps per group. This bandwidth is shared by
all write flows.
Host initiators and target devices must be directly connected to the 7500 switch or FR4-18i
blade on their respective ends of the ISL. FCFW must be configured and enabled for the ports
on both the ends of the flow. Mismatch of the configuration results in I/O failure.
2. Ensure that FCFW is enabled on the switch or blade using the fastwritecfg - -show command. If
Fastwrite is not enabled, enable FCFW using the fastwritecfg command. The following example
enables FCFW for a blade in slot 3.
switch:admin> fastwritecfg --enable 3
!!!! WARNING !!!!
Enabling FC Fastwrite will require powering off and back on the and it may
take upto 5 minutes. For non bladed system, the switch will be rebooted.
Data traffic will be disrupted.
Continue
(Y,y,N,n): [ n]
3. Disable the FC ports that you intend to use for FCFW using the portdisable command.
4. Enable FCFW using the portcfg fastwrite command on the ports you just disabled. The
following example enables FCFW on FC port 3 on a blade in slot 3.
portcfg fastwrite 3/3 --enable
30
Repeat the steps for the blade or switch on the other end of the FCFW path.
18
0
12
13
0
0
0
0
0
0
0
0
0
Link_failure:
Loss_of_sync:
Loss_of_sig:
Protocol_err:
Invalid_word:
Invalid_crc:
Delim_err:
Address_err:
Lr_in:
Lr_out:
Ols_in:
Ols_out:
0
2
4
0
0
0
0
0
2
0
0
2
Frjt:
Fbsy:
0
0
Disabling FCFW
To disable FCFW, do the following.
1. Disable the ports that are currently being used for FCFW using the portdisable command.
2. Disable FCFW on the ports you just disabled using the portcfg fastwrite command.
portcfg fastwrite <slot/port> --disable
3. Enable a non-FCFW zoning configuration to remove and replace the fcacc zone that includes
the WWNs of the devices that were plugged into the ports you disabled in step 1.
31
4. Enable the ports you disabled in step 1, using the portenable command.
5. Allow the hosts and devices to fully log in to the fabric before starting normal I/O.
32
Chapter
In this chapter
The updates in this chapter are for the Brocade DCX Backbone Hardware Reference Manual,
publication number 53-1000685-13, published October 2011
Type of message
Before the subheading Removing the WWN card and WWN bezel (logo plate) on page 74, add the
following section:
ATTENTION
Follow ESD precautions (see ESD Precautions in your chassis manual).
1. Open a Telnet session to the chassis and log in to the active CP as admin. The default
password is password.
2. Verify that you are logged into the active CP. Run the haShow command to determine the active
CP.
33
ATTENTION
Follow ESD precautions (see ESD Precautions in your chassis manual).
1. Open a Telnet session to the chassis and log in to the active CP as admin. The default
password is password.
2. Verify that you are logged into the active CP. Run the haShow command to determine the active
CP.
3. Run the supportsave command on the active CP to capture all settings. If any problems occur
during the replacement, the information will be important for solving the problem.
4. Remove the screws from the WWN bezel. Pull the bezel away from chassis and set it aside. The
WWN cards are visible.
5. Use a Phillips screwdriver to unscrew the two screws that secure the WWN card to the chassis.
Hold the card by the edges and remove it.
6. Disconnect the WWN cable by depressing the cable connector latch and pulling the connector
from the WWN module.
7.
Under the subheading Replacing the WWN bezel (logo plate) and WWN card on page 83, delete
step 4.
34
Chapter
10
In this chapter
The updates in this chapter are for the Brocade DCX-4S Backbone Hardware Reference Manual,
publication number 53-1001191-09, published October 2011.
Type of message
Before the subheading Removing the WWN card and WWN bezel (logo plate) on page 69, add the
following section:
ATTENTION
Follow ESD precautions (see ESD Precautions in your chassis manual).
1. Open a Telnet session to the chassis and log in to the active CP as admin. The default
password is password.
2. Verify that you are logged into the active CP. Run the haShow command to determine the active
CP.
35
10
ATTENTION
Follow ESD precautions (see ESD Precautions in your chassis manual).
1. Open a Telnet session to the chassis and log in to the active CP as admin. The default
password is password.
2. Verify that you are logged into the active CP. Run the haShow command to determine the active
CP.
3. Run the supportsave command on the active CP to capture all settings. If any problems occur
during the replacement, the information will be important for solving the problem.
4. Remove the screws from the WWN bezel. Pull the bezel away from chassis and set it aside. The
WWN cards are visible.
5. Use a Phillips screwdriver to unscrew the two screws that secure the WWN card to the chassis.
Hold the card by the edges and remove it.
6. Disconnect the WWN cable by depressing the cable connector latch and pulling the connector
from the WWN module.
7.
Under the subheading Replacing the WWN bezel (logo plate) and WWN card on page 70, delete
steps 3 and 4.
36
Chapter
11
In this chapter
The updates in this chapter are for the Web Tools Administrators Guide, published September
2010.
NOTE
If there are multiple JRE versions installed, go to the Java Control Panel and uncheck the lower JRE
versions for Web Tools to launch using the latest JRE version.
37
11
38