Technical data

70 Fabric OS FCIP Administrator’s Guide
53-1002474-01
Enabling persistently disabled ports on the Brocade 7500 FR4-18i
3
1. Connect to the switch and log in using an account assigned to the admin role.
2. Verify the FCIP tunnel using the portShow fciptunnel command. The command syntax is as
follows.
portShow fciptunnel [slot/][ge0|ge1 all|tunnel_id
NOTE
For details of command syntax and output examples, refer to the Fabric OS Command
Reference Manual.
If IPsec has been enabled and a policy added to the configuration, you will see the policy
information under the status section of the output. The policy information is visible only when
IPsec is configured, and can be displayed by entering the portShow fciptunnel <ge_port> all
command.
After FCIP tunnels are created, the configuration is saved in a persistent database. At this
point, all configured FCIP tunnels now appear in the fabric as VE_Ports.
3. Verify that the VE_Port or VEX_Port is online using the switchShow command.
Enabling persistently disabled ports on the Brocade 7500 FR4-18i
Before an FCIP tunnel can be used, the associated ports must be persistently enabled.
NOTE
VEX_Port Users: If the fabric is already connected, you must leave the ge0 and ge1 ports disabled
until after you have configured the VEX_Port; this will prevent unintentional merging of the two
fabrics.
1. Connect to the switch and log in using an account assigned to the admin role.
2. Enter the portCfgShow command to view ports that are persistently disabled.
3. After identifying the ports, enter the portCfgPersistentEnable command to enable the ports.
4. Enter the portCfgShow command to verify the port is persistently enabled.
Refer to the Fabric OS Command Reference Manual for command syntax and details on using this
command.
Managing FCIP tunnels
CAUTION
Using the modify option disrupts traffic on the specified FCIP tunnel for a brief period of time.
NOTE
IPsec-enabled tunnels cannot be modified, they can only be deleted and then recreated with new
options. This is because IPsec key negotiation uses many of the parameter values during secure
tunnel initialization.