53-1003056-01 14 February 2014 Brocade Network Advisor IP User Manual Supporting Network Advisor 12.2.
© 2014, Brocade Communications Systems, Inc. All Rights Reserved. Brocade, the B-wing symbol, Brocade Assurance, ADX, AnyIO, DCX, Fabric OS, FastIron, HyperEdge, ICX, MLX, MyBrocade, NetIron, OpenScript, VCS, VDX, and Vyatta are registered trademarks, and The Effortless Network and the On-Demand Data Center are trademarks of Brocade Communications Systems, Inc., in the United States and in other countries. Other brands and product names mentioned may be trademarks of others.
Title Summary of changes Date Brocade Network Advisor IP User Manual 53-1002569-01 Updated for Network Advisor 11.3.0. August 2012 Brocade Network Advisor IP User Manual 53-1002695-01 Updated for Network Advisor 12.0.0. December 2012 Brocade Network Advisor IP User Manual 53-1002947-01 Updated for Network Advisor 12.1.0. August 2012 Brocade Network Advisor IP User Manual 53-1003056-01 Updated for Network Advisor 12.2.0.
iv Brocade Network Advisor IP User Manual 53-1003056-01
Contents Contents About This Document In this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xliii How this document is organized . . . . . . . . . . . . . . . . . . . . . . . . . . . .xliii Supported hardware and software . . . . . . . . . . . . . . . . . . . . . . . . . . xlv What’s new in this document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . li Document conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Connecting to the database using the ODBC client (Linux systems) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Changing the database user password . . . . . . . . . . . . . . . . . . . 22 Supported open source software products. . . . . . . . . . . . . . . . . . . . 22 Chapter 2 Patches Installing a patch. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Uninstalling a patch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Deleting product types from the list . . . . . . . . . . . . . . . . . . . . . . 60 Defining global setting preferences . . . . . . . . . . . . . . . . . . . . . . . . . . 60 Configuring event-based collection . . . . . . . . . . . . . . . . . . . . . . . . . . 62 IP discovery profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Configuring a discovery profile . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Duplicating a discovery profile . . . . . . . . . . . . . .
Rediscovering IP devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .108 Rediscovering IP devices from the Product List. . . . . . . . . . . .109 Rediscovering a group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .110 Enabling password validation on rediscovery . . . . . . . . . . . . .110 Chapter 4 Management Groups Management groups overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . .111 Displaying Network Object view . . . . . . . . . . . . . . . . . . . .
Adding a name to an existing device . . . . . . . . . . . . . . . . . . . .145 Adding a name to a new device . . . . . . . . . . . . . . . . . . . . . . . .146 Applying a name to a detached WWN . . . . . . . . . . . . . . . . . . .146 Removing a name from a device . . . . . . . . . . . . . . . . . . . . . . . 147 Editing names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147 Exporting names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Unlocking a user account . . . . . . . . . . . . . . . . . . . . . . . . . . . . .190 Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .191 Creating a new role . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .191 Editing a role . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .192 Copying a role. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .192 Deleting a role . . . . . . . . . . .
Printing the dashboard display . . . . . . . . . . . . . . . . . . . . . . . . .219 Attaching and detaching the Dashboard tab . . . . . . . . . . . . . .219 Setting the network scope. . . . . . . . . . . . . . . . . . . . . . . . . . . . .220 Creating a customized network scope . . . . . . . . . . . . . . . . . . .221 Editing a user-defined network scope . . . . . . . . . . . . . . . . . . .222 Deleting a user-defined network scope . . . . . . . . . . . . . . . . . .222 Setting the data display time frame .
Distribution performance monitors . . . . . . . . . . . . . . . . . . . . .267 Time series performance monitors. . . . . . . . . . . . . . . . . . . . . .269 Top sFlows performance monitors . . . . . . . . . . . . . . . . . . . . . .270 Configuring a user-defined product performance monitor . . .270 Adding targets to a user-defined performance monitor . . . . .272 Configuring a user-defined port performance monitor . . . . . .273 Configuring a user-defined sFlow performance monitor. . . . .
Network Objects view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .307 Network Object view functions . . . . . . . . . . . . . . . . . . . . . . . . .307 Filtering devices in the Network Objects Product List . . . . . . .308 Clearing the Network Objects Product List filter . . . . . . . . . . .308 IP Topology view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .309 L2 Topology view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Showing a Call Home center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .348 Hiding a Call Home center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .348 Editing a Call Home center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .349 Editing the IBM Call Home center. . . . . . . . . . . . . . . . . . . . . . .349 Editing an e-mail Call Home center . . . . . . . . . . . . . . . . . . . . .350 Editing the EMC Call Home center . . . . . . . . . . . . . . . . . . . . .
Chapter 12 Server Management Console Server Management Console overview . . . . . . . . . . . . . . . . . . . . . .375 Launching the SMC on Windows . . . . . . . . . . . . . . . . . . . . . . .375 Launching the SMC on Linux . . . . . . . . . . . . . . . . . . . . . . . . . .376 Services tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376 Monitoring and managing Management application services 376 Refreshing the server status. . . . . . . . . . . . . . . . . . . .
View management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416 Wireless device properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416 Element Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416 Browser and system requirements . . . . . . . . . . . . . . . . . . . . .417 Launching the Element Manager . . . . . . . . . . . . . . . . . . . . . . . 417 Launching a Telnet session. . . . . . . . . . . . . . . . . . . .
SFP parameter monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . .443 Security monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .443 Port statistics monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . .443 Interface error types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .444 Ethernet fabric traceroute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .445 Tracing Ethernet fabric routes . . . . . . . . . . . . . . . . .
Configuring backup to a hard drive . . . . . . . . . . . . . . . . . . . . .479 Enabling backup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .480 Disabling backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .480 Chapter 16 Fibre Channel over Ethernet In this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .481 FCoE overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Editing a VLAN classifier rule . . . . . . . . . . . . . . . . . . . . . . . . . .512 Deleting a VLAN classifier rule . . . . . . . . . . . . . . . . . . . . . . . . .512 Creating a VLAN classifier group. . . . . . . . . . . . . . . . . . . . . . . .513 Deleting a VLAN classifier group. . . . . . . . . . . . . . . . . . . . . . . .513 LLDP-DCBX configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514 Configuring LLDP for FCoE . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Saving a PBR policy deployment. . . . . . . . . . . . . . . . . . . . . . . .554 Scheduling a PBR policy deployment . . . . . . . . . . . . . . . . . . . .555 ACL Accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .558 Enabling or disabling ACL accounting . . . . . . . . . . . . . . . . . . .558 Resetting ACL counters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .558 Viewing ACL counters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Scheduling a security configuration deployment. . . . . . . . . . .632 Chapter 19 Zoning Zoning overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .637 Online zoning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .638 Offline zoning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .639 Zoning naming conventions . . . . . . . . . . . . . . . . . . . . . . . . . . .639 Zone database size. . . . . . . . . . . . . . . .
Clearing the fabric zone database . . . . . . . . . . . . . . . . . . . . . .664 Removing all user names from a zone database . . . . . . . . . .665 Finding a member in one or more zones . . . . . . . . . . . . . . . . .665 Finding a zone member in the potential member list . . . . . . .666 Finding zones in a zone configuration . . . . . . . . . . . . . . . . . . .666 Finding a zone configuration member in the zones list . . . . .666 Listing zone members . . . . . . . . . . . . . . . . . . . . . . . . . . .
FICON configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .695 Configuring a switch for FICON operation . . . . . . . . . . . . . . . . . . . .696 Planning the configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . .696 Configuring the switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .698 Configuring FICON display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .702 Configuring an Allow/Prohibit Matrix . . . . . . . . . . . . . .
Resetting port counters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .735 Enable or Disable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .736 Management Module switchover. . . . . . . . . . . . . . . . . . . . . . . . . . .736 Changing the standby Management Module to active . . . . .736 Switch Fabric Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .737 Port mirroring. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Modifying a payload configuration . . . . . . . . . . . . . . . . . . . . . . . . . . 774 Deploying a payload configuration. . . . . . . . . . . . . . . . . . . . . . . . . . 776 Deleting a payload configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . 776 Chapter 25 CLI Configuration Management In this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .777 CLI configuration overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Obtaining software files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .807 Products supporting the image import . . . . . . . . . . . . . . . . . . . . . .808 Boot image management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .808 Viewing the list of boot images . . . . . . . . . . . . . . . . . . . . . . . . .808 Manually importing boot images . . . . . . . . . . . . . . . . . . . . . . .809 Deploying boot images to products . . . . . . . . . . . . . . . . . . . . .
Chapter 28 MPLS Management In this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .843 MPLS pre-configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .843 MPLS licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .844 MPLS overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .845 Configuring LDP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring endpoint settings . . . . . . . . . . . . . . . . . . . . . . . . . .890 Deploying target actions using VPLS Manager . . . . . . . . . . . .891 Deploying VPLS properties using VPLS Manager . . . . . . . . . .892 Scheduling deployment using VPLS Manager . . . . . . . . . . . . .893 Reviewing the VPLS Manager summary. . . . . . . . . . . . . . . . . .894 Creating a new VPLS instance from a duplicate . . . . . . . . . . .894 Editing a VPLS instance. . . . . . . . . . . . . . . . . . . . . . . . . .
Adding a zone configuration . . . . . . . . . . . . . . . . . . . . . . . . . . .933 Adding a host to a zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .935 Editing the list of IP addresses and weights . . . . . . . . . . . . . .936 Controller configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .937 Creating a new GSLB controller configuration . . . . . . . . . . . . .938 Deploying a controller configuration. . . . . . . . . . . . . . . . . . . . .
SAN performance overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .969 SAN performance measures . . . . . . . . . . . . . . . . . . . . . . . . . .970 SAN performance management requirements . . . . . . . . . . . . 971 SAN real-time performance data . . . . . . . . . . . . . . . . . . . . . . . . . . . 976 Generating a real-time performance graph . . . . . . . . . . . . . .976 Filtering real-time performance data . . . . . . . . . . . . . . . . . . . .
Suspending a custom sFlow report schedule . . . . . . . . . . . .1037 IP Traffic analyzer monitoring and sFlow reports . . . . . . . . . . . . .1037 Device-level configuration requirements . . . . . . . . . . . . . . 1037 802.1X configuration requirements . . . . . . . . . . . . . . . . . . 1038 Displaying sFlow monitoring reports. . . . . . . . . . . . . . . . . . . 1038 Selecting a report. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Refreshing PoE data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1074 Configuring automatic data refresh . . . . . . . . . . . . . . . . . . . .1075 PoE power on demand . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1075 Powering up PoE-capable ports on demand . . . . . . . . . . . . 1075 Powering down PoE-capable ports on demand . . . . . . . . . . .1076 Schedule PoE power deployment. . . . . . . . . . . . . . . . . . . . . . . . . .
Selecting a product . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1126 Duplicating a configuration condition. . . . . . . . . . . . . . . . . . 1126 Editing a user-defined configuration condition . . . . . . . . . . 1127 Predefined conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1128 Viewing a predefined configuration block . . . . . . . . . . . . . . 1130 Adding a configuration block. . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring event actions for Snort messages . . . . . . . . . . 1180 Pseudo events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1181 Displaying pseudo event definitions . . . . . . . . . . . . . . . . . . 1182 Creating pseudo event definitions . . . . . . . . . . . . . . . . . . . . 1182 Setting pseudo event policies . . . . . . . . . . . . . . . . . . . . . . . . 1183 Filtering pseudo event traps . . . . . . . . . . . . . . . . . . . . . . . . .
In this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1215 Server and client support save . . . . . . . . . . . . . . . . . . . . . . . . . . 1215 Capturing Server and Client support save data . . . . . . . . . 1215 Capturing Server support save data. . . . . . . . . . . . . . . . . . . .1216 Capturing Client support save data . . . . . . . . . . . . . . . . . . . .1217 Client support save using a command line interface . . . . . 1218 Device technical support . . .
Importing a report template . . . . . . . . . . . . . . . . . . . . . . . . . Exporting a report template . . . . . . . . . . . . . . . . . . . . . . . . . Deleting reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Report content and functions . . . . . . . . . . . . . . . . . . . . . . . . Products List report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Detailed Product Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . Detailed Cluster Report . .
Host properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1326 Viewing adapter port properties . . . . . . . . . . . . . . . . . . . . . 1327 Properties customization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Adding a property field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Editing a property field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Deleting a property field . . . . . . . . . . . . . . . . . . . . . . . . . . . .
CRYPTO_HOST_LUN_INFO. . . . . . . . . . . . . . . . . . . . . . . . . . . 1605 CRYPTO_TARGET_ENGINE_INFO. . . . . . . . . . . . . . . . . . . . . . 1606 DASHBOARD_PREFERENCES_INFO . . . . . . . . . . . . . . . . . . . 1606 DEPLOYMENT_INFO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1607 DEPLOYMENT_LOG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1607 DEVICE_CONNECTION_INFO . . . . . . . . . . . . . . . . . . . . . . . . . 1608 EE_MONITOR_STATS_5MIN_INFO. . . . . . .
PORT_PROFILE_INFO. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1643 PORT_PROFILE_INTERFACE_INFO . . . . . . . . . . . . . . . . . . . . 1644 PORT_PROFILE_MAC_INFO . . . . . . . . . . . . . . . . . . . . . . . . . . 1644 PORT_VLAN_INFO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1645 PROTOCOL_VLAN_INFO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1645 SFLOW. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
WIRELESS_INTERFACE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1684 WIRED_INTERFACE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1685 CEE_PORT_INFO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
About This Document In this chapter • How this document is organized . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xliii • Supported hardware and software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xlv • What’s new in this document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . li • Document conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . lii • Additional information . . . . . . . . . .
• Chapter 15, “Host Management,” provides information on how to configure an HBA. This chapter is for Fabric OS devices only. • Chapter 16, “Fibre Channel over Ethernet,” provides information on how to configure FCoE. This chapter is for Fabric OS devices only. • Chapter 17, “Telemetry,” provides instructions for you to monitor, report, and analyze traffic information and data on your network. • Chapter 18, “Security Management,” provides security configuration instructions.
• Chapter 40, “Reports,” provides instructions for generating reports. • Appendix A, “Application menus,” provides information about the main and shortcut menus. • Appendix B, “Call Home Event Tables,” provides supplemental information about call home event tables. • Appendix C, “Event Categories,” provides information about events. • Appendix D, “User Privileges,” provides supplemental information about user privileges and access levels.
TABLE 1 Fabric OS-supported hardware (Continued) Device name Terminology used in documentation Brocade 415 Host Bus Adapter 4 Gbps 1-port HBA Brocade 425 Host Bus Adapter 4 Gbps 2-port HBA Brocade 815 Host Bus Adapter 8 Gbps 1-port HBA Brocade 825 Host Bus Adapter 8 Gbps 2-port HBA Brocade 1860 Fabric Adapter 16 Gbps FC HBA mode 10 Gbps CNA mode 10 Gbps NIC mode Adapter Software 3.0.0.0 or later Brocade 1867 HBA 16 Gbps Mezzanine HBA Adapter Software 3.0.3.
TABLE 2 IronWare-supported hardware (Continued) Device name Terminology used in documentation Firmware level required FastIron CX 624S-HPOE (FCX624S-HPOE) Ethernet L2/L3 Edge switch, 24 1GbE RJ45 ports, 24 POE+ ports FastIron 06.0.00 and later FastIron CX 648S-HPOE (FCX648S-HPOE) Ethernet L2/L3 Edge switch, 48 1GbE RJ45 ports, 48 POE+ ports FastIron 06.0.00 and later FastIron CX 624S-F (FCX624S-F) Ethernet L2/L3 Edge switch, 20 SFP ports FastIron 06.0.
TABLE 2 IronWare-supported hardware (Continued) Device name xlviii Terminology used in documentation Firmware level required ICX 6450-24-HPOE Base router 24-port Campus LAN HPOE Base router FastIron 07.4.00 and later ICX 6450-24-HPOE Premium router 24-port Campus LAN HPOE Premium router FastIron 07.4.00 and later ICX 6450-48 switch 48-port Campus LAN switch FastIron 07.4.00 and later ICX 6450-48 Base L3 router 48-port Campus LAN Base L3 router FastIron 07.4.
TABLE 2 IronWare-supported hardware (Continued) Device name Terminology used in documentation FastIron Edge X 624 Enterprise LAN Edge switch, 24 10/100/1000 Mbps ports FastIron Edge X 448 Enterprise LAN Edge switch, 48 10/100/1000 Mbps ports FastIron Edge X 648 Enterprise LAN Edge switch, 48 10/100/1000 Mbps ports FastIron Edge X 424HF Enterprise LAN Edge switch, 20 100/1000 Mbps SFP ports FastIron Edge X 624HF Enterprise LAN Edge switch, 20 100/1000 Mbps SFP ports FastIron WS devices Enterpr
TABLE 2 IronWare-supported hardware (Continued) Device name Terminology used in documentation Firmware level required TurboIron Family Data Center switch 4.1.00d or 4.2.00 or later TurboIron 24X (T1-24X-AC) Data Center switch 4.1.00d or 4.2.00 or later Brocade 6650 Switch Data Center switch FastIron 7.5 and later Brocade 6650 Base L3 Router Data Center base L3 router FastIron 7.5 and later Brocade 6650 Router Data Center router FastIron 7.
What’s new in this document The following changes have been made since this document was last released: • Information that was added: - Troubleshooting - IP Element Manager - Element Manager troubleshooting Configure dialog box Dashboard Management Top Port Traffic monitor • Information that was changed: - CLI Configuration Management - - IP Element Manager Element Manager interface overview Displaying port properties Element Manager toolbar Performance data Performance
Document conventions This section describes text formatting conventions and important notice formats used in this document.
These references are made for informational purposes only. Corporation Referenced trademarks and products Linus Torvalds Linux Microsoft Corporation Windows, Windows NT, Internet Explorer Netscape Communications Corporation Netscape Red Hat, Inc. Red Hat, Red Hat Network, Maximum RPM, Linux Undercover Oracle Solaris, Java Plug-in The Open Group UNIX VMware, Inc.
Getting technical help Contact your switch support supplier for hardware, firmware, and software support, including product repairs and part ordering. To expedite your call, have the following information available: 1. Management Application Serial Number To obtain the Management application serial number, select Help > License. The License dialog box displays. 2.
Chapter Getting Started 1 In this chapter • User interface components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 • Management server and client. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 • Accessibility features for the Management application . . . . . . . . . . . . . . . . 15 • PostgreSQL database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 • Supported open source software products . . . . .
1 Management server and client FIGURE 1 Main window 1. Menu bar — Lists commands you can perform on the Management application. The available commands vary depending on which tab (IP or Dashboard) you select. For a list of available commands, refer to Appendix A, “Application menus”. 2. Toolbar — Provides buttons that enable quick access to dialog boxes and functions. The available buttons vary depending on which tab (IP or Dashboard) you select.
Management server and client 1 Logging into a server You must log into a server to monitor your network. NOTE You must have an established user account on the server to log in. To log into a server, complete the following steps. 1. Double-click the desktop icon or open the application from the Start menu. The Log In dialog box displays (Figure 2). FIGURE 2 Log In dialog box 2. Log into another server by entering the IP address to the other server in the Network Address field.
1 Management server and client Launching a remote client NOTE For higher performance, use a 64-bit JRE. To launch a remote client, complete the following steps. 1. Open a web browser and enter the IP address of the Management application server in the Address bar. If the web server port number does not use the default (443 if is SSL Enabled; otherwise, the default is 80), you must enter the web server port number in addition to the IP address. For example, IP_Address:Port_Number.
Management server and client 1 1. Select Start > Settings > Control Panel > Java. The Java Control Panel dialog box displays. 2. Click View on the General tab. The Java Cache Viewer dialog box displays. 3. Right-click the application and select Delete. 4. Click Close on the Java Cache Viewer dialog box. 5. Click OK on the Java Control Panel dialog box. To create a remote client link in the Start menu, refer to “Launching a remote client” on page 4.
1 Management server and client • Select External FTP/SCP/SFTP Server to configure an external FTP server. You can configure the external FTP server settings from the Options dialog box. For instructions, refer to “Configuring an external FTP, SCP, or SFTP server” on page 175. b. Click Next. If port 21 or 22 is busy, a message displays. Click OK to close the message and continue.
Management server and client c. 1 Click Next. 6. Complete the following steps on the Server Configuration screen. NOTE Do not use port 2638 for any of these port numbers. Port 2638 is used internally by the server. FIGURE 3 Server Configuration screen a. Enter a port number in the Web Server Port # (HTTPS) field (default is 443). b. Enable HTTP redirection to HTTPS by selecting the Redirect HTTP Requests to HTTPS check box.
1 Management server and client If you enter a port number already in use, a Warning displays next to the associated port number field. Edit that port number and click Next. 7. Verify your configuration information on the Server Configuration Summary screen and click Next. 8. Complete the following steps on the Start Server screen: a. Select the Start Client check box, if necessary. b. Click Finish. After all of the services (Server and Client) are started, the Log In dialog box displays. 9.
Management server and client 1 • Client Type — Displays the type of Management application client. • Connected — Displays the date and time the user connected to the server. 3. Click Close. Disconnecting users To disconnect a user, complete the following steps. 1. Select Server > Active Sessions. The Active Sessions dialog box displays. 2. Select the user you want to disconnect and click Disconnect. 3. Click Yes on the confirmation message. 4.
1 Management server and client TABLE 4 Server Properties Field/Component Description Free Memory The amount of free memory on the server. IP Address The IP address in IPv4 or IPv6 format. Java VM Name The Java Virtual Machine name. Java VM Vendor The Java Virtual Machine vendor. Java VM Version The Java Virtual Machine version running on the server. Server Name The server’s name. OS Architecture The operating system architecture on the server.
Management server and client FIGURE 6 1 Port Status dialog box 2. Review the port status details: • Name — The Port name. Options include CIM Indication for Event Handling, CIM Indication for HCM Proxy, FTP, SCP/SFTP, sFlow, SNMP Trap, Syslog, TFTP, Web Server (HTTP), and Web Server (HTTPS). • Port # — The required port number. • Status — The status of the port. The status options are as follows: Success — The port is listening or bound to the server.
1 Management server and client • Transport — The transport type (TCP or UDP). • Description — A brief description of the port. • Communication Path — The “source” to “destination” vaules. Client and Server refer to the Management application client and server unless stated otherwise. Product refers to the Fabric OS, Network OS, or IronWare devices. • Open in Firewall — Whether the port needs to be open in the firewall.
Management server and client TABLE 5 1 Port usage and firewall requirements (Continued) Port Number Ports Transport Description Communication Path Open in Firewall 4431,2 HTTPS server TCP HTTPS (HTTP over SSL) server port if you use secure client server communication Client-Server Yes 4432 HTTPS (HTTP over SSL) server port if you use secure communication to the product Server–Product Yes 443 HTTPS (HTTP over SSL) server port if you use secure communication to the product and you do not u
1 Management server and client TABLE 5 Port usage and firewall requirements (Continued) Port Number Ports Transport Description Communication Path Open in Firewall 63432 sFlow UDP Receives sFlow data from products if you are monitoring with sFlow Product-Server Yes 246001,2 JNP (Java Naming Protocol) port TCP Use for service location. Uses SSL for privacy. Client–Server Yes 246011,2 EJB (Enterprise Java Bean) connection port TCP Client requests to server. Uses SSL for privacy.
Accessibility features for the Management application 1 2. The default port number. You must use the same port number for all products or hosts managed by the Management server. This port is configurable in the Management server; however, some products and firmware versions do not allow you to configure a port.
1 Accessibility features for the Management application TABLE 6 Keyboard shortcuts Menu Item or Function Keyboard Shortcut Zoom In CTRL + NumPad+ Zoom Out CTRL + NumPad- Look and feel customization You can configure the Management application to mimic your system settings as well as define the size of the font. ‘Look’ refers to the appearance of graphical user interface widgets and ‘feel’ refers to the way the widgets behave.
PostgreSQL database 1 5. Click OK on the message. NOTE Changes do not take affect until after you restart the client. Changing the font size The Options dialog box enables you to change the font size for all components including the Connectivity map of the Management application interface. Font size changes proportionately in relation to the system resolution. For example, if the system resolution is 1024 x 768, the default font size would be 8 and large font size would be 10. 1.
1 PostgreSQL database 2. Selecting File > Add Server. The New Server Registration dialog box displays. 3. Enter the DB_server_IP_address or “localhost” in the Host field. 4. Enter the port number (default is 5432) on which the PostgreSQL server is running in the Port field. 5. Enter your username (default is dcmuser) in the Username field. 6. Enter your password (password) in the Password field. 7. Click OK on the New Server Registration dialog box. The pgAdmin III application displays. 8.
PostgreSQL database 1 The ODBC Data Source Administrator dialog box displays. 6. Click the System DSN tab. 7. Click Add. The Create a New Data Source dialog box displays. 8. Select PostgreSQL Unicode. 9. Click Finish. The PostgreSQL Unicode ODBC Driver (psqlODBC) Setup dialog box displays. 10. Enter a name for the data source in the Datasource field. 11. Enter the description of the database in the Description field. 12. Enter the name of the database in the Database field. 13.
1 PostgreSQL database Installing the ODBC driver on Linux systems To install the ODBC driver and , complete the following steps. 1. Execute the following command in the terminal: > su >chmod 777 edb_psqlodbc.bin > ./edb_psqlodbc.bin 2. On the Setup psqlODBC screen click Next. 3. Install the file to the usual location for your system’s application files (for example, /opt/PostgreSQL/psqlODBC) on the Installation Directory screen and click Next.
PostgreSQL database 1 Testing the connection on Linux systems To test the connection, complete the following steps. 1. Download and install Open Office. 2. Select File > New > Database. The Database Wizard displays. 3. On the Select database screen, complete the following steps. a. Select the Connect to an existing database option. b. Select ODBC from the list. c. Click Next. 4. On the Set up ODBC connection screen, complete the following steps. a. Click Browse. The datasource saved in the odbc.
1 Supported open source software products Changing the database user password To change the read/write or read only database password, complete the following steps in the Install_Home/bin directory. 1. Open a command window. 2. Type dbpassword User_Name Password New_Password Confirm_Password and press Enter. Where User_Name is your user name, Password is your current password, and New_Password and Confirm_Password are your new password.
Supported open source software products TABLE 9 1 Open source software third-party software products Open Source Software License Type ApacheCommonsBeanUtils 1.8.1 Apache License v2.0 ApacheCommonsCodec 1.4 Apache License v2.0 ApacheCommonsCollections 3.2.1 Apache License v2.0 ApacheCommonsCompress 1.0 Apache License v2.0 ApacheCommonsConfiguration 1.6 Apache License v2.0 ApacheCommonsDBCP 1.2.2 Apache License v2.0 ApacheCommonsDigester 2.0 Apache License v2.0 ApacheCommonsDiscovery 0.
1 Supported open source software products TABLE 9 24 Open source software third-party software products Open Source Software License Type HornetQ 2.0.0 Apache License v2.0 iBATISDAOFramework 2.2.0 Apache iBatisforJava 2.3.4 Apache License v2.0 Infinispan 4.0.0 FINAL LGPL v2.1 InstallAnywhere 2010 Commercial Ireasoning SNMP API 4.0 IREASONING iTextJavaPDFLibrary 2.1.7 Affero General Public License JasperReports 3.6.1 GNU Lesser General Public License version 3 JavaCIFSClientLibrary 1.
Supported open source software products TABLE 9 1 Open source software third-party software products Open Source Software License Type RockSawRawSocketLibrary 1.0.0 Apache License v2.0 SafeNet Sentinel Caffe 1.6.1 SafeNet License SafeNet Sentinel RMS SDK 8.2.2 SafeNet License Sblim-cim-client 1.3.9.3 HCM Sblim CIM Client SimpleLoggingFacadeforJava 1.5.8 SLF4J License JavaRuntimeEnvironment 1.6.0_31 Commercial TableLayout 2009-06-10 Custom License VIJavaAPI 2.
1 26 Supported open source software products Brocade Network Advisor IP User Manual 53-1003056-01
Chapter 2 Patches In this chapter • Installing a patch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 • Uninstalling a patch. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Installing a patch The patch installer enables you to update the Management application between releases. Each patch installer includes the previous patches within a specific release. For example, patch F (11.X.
2 Uninstalling a patch • Extracts patch files to the Install_Home folder. • Creates a back up (zip) of the original files to be updated and copies the zip file to the Install_Home\patch-backup directory (for example, Install_Home\patch-backup\na_11-3-0a.zip). The first time you apply a patch, the back up patch zip file uses the following naming convention: _-- .zip (for example, Install_Home\patch-backup\na_11-3-0a.zip).
Uninstalling a patch 2 6. Copy the artifact from the extracted folder to the source folder in the Install_Home/patch-backup directory. 7. Repeat step 5 and 6 for all artifacts listed in the restore.xml folder. 8. Go to the Install_Home/conf directory. 9. Open the version.properties file in a text editor. 10. Change the patch version (patch.version) value to the reverted patch (for example, if you are reverting from patch F to patch C then patch.version = c).
2 30 Uninstalling a patch Brocade Network Advisor IP User Manual 53-1003056-01
Chapter 3 Discovery In this chapter • IP discovery overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 • VDX/VCS discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 • Logical chassis cluster mode discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 • Configuring IP profile discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 • Configuring IP simple discovery . .
3 IP discovery overview IP discovery overview NOTE Discovery only displays products that are assigned to your area of responsibility (AOR). For more information about user accounts, refer to “Areas of responsibility” on page 194. NOTE You must have the Discover Setup - IP privilege to configure and run discovery. For more information about privileges, refer to “User Privileges” on page 1283.
IP discovery overview 3 2. Discovery queries the database to retrieve the IP address for each previously discovered device and adds these IP addresses to the list of candidate IP addresses. 3. Discovery adds the IP addresses from the IP address file to the list of candidate addresses. 4. As the discovery cycle proceeds, discovery adds addresses from the ping sweep address ranges to the list of candidate addresses. 5.
3 IP discovery overview Configuration requirements Before configuring discovery, obtain the following information: • SNMPv1 and SNMPv2c read-write community strings or SNMPv3 read-write credentials for the devices to be included in discovery. Make sure that devices you want to manage have the SNMP credentials configured. For more information, refer to “IP SNMP credentials” on page 46. • Device IP addresses and subnets to probe during discovery.
IP discovery overview TABLE 10 3 Required MIB support for IronWare OS devices (Continued) IETF standard MIB name Required MIB object Data collected RFC 1213 MIB-II mib-2.system mib-2.interfaces.ifTable mib-2.ip.ipAddrTable From mib-2.interfaces.ifTable for interface level information: • ifName/ifDescr • ifAlias • ifType • ifMtu • ifSpeed • ifPhysAddress • ifAdminStatus • ifOperStatus • ifLastChange From mib-2.ip.ipAddrTable for IP subnet information: • ipAdEntAddr • ipAdEntNetMask From mib-2.ip.
3 IP discovery overview Table 11 provides a list of MIB support required for third-party devices. TABLE 11 Required MIB support for third-party devices IETF standard MIB name Required MIB object Data collected RFC 1213 MIB-II mib-2.system mib-2.interfaces.ifTable mib-2.ip.ipAddrTable From mib-2.interfaces.ifTable for interface level information: • ifName/ifDescr • ifAlias • ifType • ifMtu • ifSpeed • ifPhysAddress • ifAdminStatus • ifOperStatus • ifLastChange From mib-2.ip.
VDX/VCS discovery TABLE 11 3 Required MIB support for third-party devices (Continued) IETF standard MIB name Required MIB object Data collected RFC 4133 ENTITY-MIB entPhysicalTable entAliasMappingTable (if available) For module (line card) information: Entire entPhysicalTable Entire entAliasMappingTable, if available RFC 4293 IP-MIB mib2.ip.
3 VDX/VCS discovery VCS devices use the following to determine reachability: • Reachable — The VDX/VCS product is online and is accessible by ICMP, Netconf, and SNMP; therefore, it is reachable. • Degraded Link — The VDX/VCS product is not accessible by one of the following: ICMP, Netconf, or SNMP. • Not Reachable — The VDX/VCS product is offline and is not accessible by any of the following: ICMP, Netconf, and SNMP. The following sections detail the VDX/VCS discovery behavior.
VDX/VCS discovery 3 # # A sample entry: # 10:00:00:05:33:51:62:42 172.26.20.10 # # Changes to this file do not require restarting the management server. 3. Select File > Save. Standalone discovery • When you discover a VDX device that is not VCS-enabled, it displays as an individual L2 (DCB) device. • When you enable VCS mode on a discovered VDX device, after rediscovery the VDX displays as a VCS fabric. VCS fabric discovery NOTE Professional edition can only discover a VCS fabric with one member.
3 VDX/VCS discovery NOTE If you do not have the All IP Products AOR in your user account, you cannot rediscover missing fabric members. Seed switch failover The Management application uses the seed switch to discover other members in the VCS fabric. When you discover devices through individual discovery, the seed switch is the first member you discover in the VCS fabric. When you discover devices through profile discovery, the seed switch is the principal switch in the VCS fabric.
Logical chassis cluster mode discovery 3 • TRILL links between Network OS 2.1.0 devices and Network OS 2.0.0 devices do not display. Logical chassis cluster mode discovery Logical chassis cluster mode requires Network OS 4.0 or later and is one of two types of VCS modes. In logical chassis cluster mode, both the data and configuration paths are distributed. The entire cluster can be configured from the principal node.
3 Logical chassis cluster mode discovery • The State column in the Discover Setup - IP dialog shown in Figure 7 applies only to nodes that are in logical chassis mode. Possible states are: - Online—A node that is currently connected and operational. - Offline—A cluster member node that cannot be reached by the primary cluster node. - Rejoining—A node that is in the process of rejoining its cluster. - Replacing—A node that is being replaced.
Logical chassis cluster mode discovery 3 Figure 9 shows the Discover Setup - IP dialog box after the administrator has removed the node with the IP address of 172.26.5.130 from its logical chassis cluster. FIGURE 9 Discover Setup - IP dialog box after disabling the node from logical chassis cluster Figure 10 shows the Discover Setup - IP dialog box after The Management application has performed rediscovery. The node with the IP address of 172.26.5.130 is shown as a degraded link.
3 HyperEdge stack discovery HyperEdge stack discovery HyperEdge stacks must contain at least one ICX 6610 device and one ICX 6650 device and all stacking members must be running IronWare 8.0 or later (the exact same version). HyperEdge stacks support up to 8 units in stack. Note that you do not recieve an error or warning message when unit number exceeds 8. However, the HyperEdge stack may stop functioning. For stacking between ICX 6610 devices, use the 40 Gbps Ethernet ports as the stacking ports.
Configuring IP profile discovery FIGURE 11 3 Discover Setup - IP dialog box 2. Click the Global Settings tab. a. To set SNMP credentials, refer to “IP SNMP credentials” on page 46. b. To configure default user names and passwords, refer to “Default IP user credentials” on page 52. c. To configure global setting preferences, refer to “Defining global setting preferences” on page 60. 3. Click the Profiles tab. a. To create a discovery profile, refer to “IP discovery profiles” on page 64. b.
3 Configuring IP simple discovery Configuring IP simple discovery NOTE You must have the All IP Products AOR (area of responsibility) in your user account to discover new products. For more information about user accounts, refer to “User accounts” on page 185. To configure simple discovery, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. To add individual devices, refer to “Adding an IP device to discovery” on page 84. 3.
IP SNMP credentials 3 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Click the Global Settings tab. 3. Click the SNMP tab. FIGURE 12 SNMPv1 or SNMPv2c credentials 4. Enter a unique label to identify the community string in the Display Label field of the Add/Edit Read-Write Community Strings list. This label can be from 1 through 16 characters long, case sensitive, and allows all printable ASCII characters. 5.
3 IP SNMP credentials Adding SNMPv3 credentials To add SNMPv3 read-write credentials, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Click the Global Settings tab. 3. Click the SNMP tab. FIGURE 13 SNMPv3 credentials 4. Enter a unique label to identify the credentials in the Display Label field of the Add/Edit SNMPv3 Read-Write Credentials area.
IP SNMP credentials 3 The password can be from 1 through 16 characters long, case sensitive, and allows all printable ASCII characters. The password displays as asterisks. 10. Click the right arrow button to add the SNMPv3 read-write credentials to the Selected SNMPv3 Read-Write Credentials list.
3 IP SNMP credentials 8. Click Apply to save your work. 9. Click Close to close the Discover Setup - IP dialog box. 10. Click Yes on the confirmation message. Editing SNMPv3 credentials To edit SNMPv3 read-write credentials, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Click the Global Settings tab. 3. Click the SNMP tab. 4.
IP SNMP credentials 3 NOTE If the devices use multiple credentials, use the Up or Down buttons to place the most commonly used credentials at the top of the Selected SNMPv3 Read-Write Credentials list to make discovery run more efficiently. 12. Click Apply to save your work. 13. Click Close to close the Discover Setup - IP dialog box. 14. Click Yes on the confirmation message.
3 Default IP user credentials 6. Click Close to close the Discover Setup - IP dialog box. 7. Click Yes on the confirmation message. Default IP user credentials The Management application uses default user names and passwords to access devices when contacting these devices through the command line interface (CLI) on the network. You can enter a list of default names and passwords in the Management application before running discovery.
Default IP user credentials FIGURE 14 3 Default Passwords 4. Enter a login prompt user name and password by selecting Read/Write Login Prompt from the Credential Type list and completing the following steps. FIGURE 15 a. Read/Write Login Prompt Enter a unique label to identify the credentials in the Display Label field. This label can be from 1 through 200 characters long, case sensitive, and allows all printable ASCII characters. b. Enter the user name in the User ID field. c.
3 Default IP user credentials 5. Enter an enable prompt user name and password by selecting Read/Write Enable Prompt from the Credential Type list and completing the following steps. FIGURE 16 a. Read/Write Enable Prompt Enter a unique label to identify the credentials in the Display Label field. This label can be from 1 through 200 characters long, case sensitive, and allows all printable ASCII characters. b. Enter the user name in the User ID field. c.
Default IP user credentials 3 8. Click Close to close the Discover Setup - IP dialog box. 9. Click Yes on the confirmation message. Editing login prompt user credentials To edit a login prompt user name and password, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Click the Global Settings tab. 3. Click the Default Passwords tab. 4. Select Read/Write Login Prompt from the Credential Type list. 5.
3 Default IP user credentials 6. Edit the unique label to identify the credentials in the Display Label field. This label can be from 1 through 200 characters long, case sensitive, and allows all printable ASCII characters. 7. Edit the user name in the User ID field. 8. Edit the user password in the Password field. 9. Click the right arrow button. 10.
Default IP user credentials 3 Reordering user credentials in the list Discovery tries the user credentials in order until one set of credentials is found that works, so place the most common ones first. To rearrange the user credentials, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Click the Global Settings tab. 3. Click the Default Passwords tab. 4.
3 IP Object identifier filters IP Object identifier filters The object identifier (OID) filter allows you to select which product types to include or exclude from discovery. If you add a third-party product OID to the Included Product Types list during discovery and later move it to the Excluded Product Types list, note that you will not be able to discover a new device with that product OID.
IP Object identifier filters 3 5. In the top Add/Edit Product Types area, choose one of the following options: • Enter the device’s sysObjectID you want to include in the Product Type list. • Select an existing device sysObjectID from the Product Type list. Table 13 lists the default third party product types. TABLE 13 Default third-party product types Product sysObjectID Vendor .1.3.6.1.4.1.9. Cisco .1.3.6.1.4.1.4874. Juniper .1.3.6.1.4.1.2636.1. Juniper 6.
3 Defining global setting preferences Deleting product types from the list To delete an entry from the Included Product Types or Excluded Product Type list, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Click the Global Settings tab. 3. Click the OID Filter tab. 4. Select an entry from the Included Product Types or Excluded Product Type list and click the left arrow button. 5. Click Apply to save your work. 6.
Defining global setting preferences 3 5. Select one of the following Ping Type options: • ICMP Ping (default). Go to step 7. • TCP Ping. Continue with step 6. 6. Enter the TCP port number (from 1 through 65536) in the TCP Ping Port field. The default is 23. 7. Enter the number of times (from 0 through 10) to ping the device when ping is unsuccessful in the Ping Retries field. The default is 0. 8. Select the Enable lazy polling check box to periodically rediscover all devices in the database.
3 Configuring event-based collection Clear the check box to configure discovery to select the original IP address used to discover the device. 13. Select the Import SSL Certificate and Key check box to enable discovery to download and synchronize certificates from SSL capable Application products. 14. Choose one of the following options: • Select the Discard all old topology information for each product discovered option to delete all existing device topology data when running discovery.
Configuring event-based collection 3 NOTE This settings cannot be disabled for DCB switches. NOTE Network OS devices must be running version 4.0 or later to enable this setting. NOTE For Network OS devices, adaptive discovery is also performed for Syslog events. The lazy polling function sends login and log messages to the Master Log and the switch console. If you are receiving too many messages due to lazy polling, clear the check box to disable off lazy polling.
3 IP discovery profiles IP discovery profiles NOTE You cannot configure a discovery profile if you do not have the All IP Products AOR (area of responsibility) in your user account. A discovery profile contains the settings you configure when discovery is run. These settings include address range parameters, ping sweep parameters, SNMP settings, default passwords, and other settings. The Management application is shipped with a default discovery profile named “Default”.
IP discovery profiles 3 3. Click Add. A new row (named “new_profile”) displays in the Discovery Profiles table. 4. Click “new_profile” in the Profile Name field to enter a unique name for the profile. This name can be from 1 through 255 characters long, case sensitive, and allows all printable ASCII characters. 5. Click the Address Ranges tab to configure address ranges for the profile. For step-by-step instructions, refer to “Configuring address ranges” on page 66. 6.
3 IP discovery profiles For step-by-step instructions, refer to “Configuring address ranges” on page 66 or “Editing address ranges” on page 70. 6. Click the Scheduling tab to configure a discovery schedule for the profile. For step-by-step instructions, refer to “Scheduling discovery” on page 72. 7. Click the Preferences tab to configure preferences for the profile. For step-by-step instructions, refer to “Configuring advanced discovery profile preferences” on page 78. 8. Click the Global Settings tab.
IP discovery profiles 3 • To exclude an address range using the address range format, refer to “Excluding IP addresses” on page 70. NOTE To exclude a VCS fabric, you must add all members of the VCS fabric to the exclude list. 8. Click the right arrow button to add the address range to the Excluded IP Addresses list. 9. Click Apply to save your changes. 10. Click Close to close the Discover Setup - IP dialog box. 11. Click Yes on the confirmation message.
3 IP discovery profiles Adding subnet addresses To add subnet addresses (IPv4 only), complete the following steps. 1. Select Subnet from the Entry Type list. FIGURE 22 Include Subnet 2. Enter the IP address in the IP Address field. 3. Enter the subnet mask in the Subnet Mask field. 4. To exclude an address range using the Subnet format, refer to “Excluding subnet addresses” on page 69. 5. To finish configuring the address ranges, return to “Configuring address ranges” on page 66.
IP discovery profiles 3 Excluding CIDR subnet addresses To exclude CIDR subnet addresses (IPv4 and IPv6), complete the following steps. 1. Select CIDR Subnet from the Entry Type list. FIGURE 24 Exclude CIDR Subnet 2. Enter the IP address in the IP Address field. 3. Enter the subnet mask bits in the Subnet Mask Bits field. For IPv4, the subnet mask bits is between 0 and 32. For IPv6, the subnet mask bits is between 0 and 128. 4.
3 IP discovery profiles Excluding IP addresses NOTE To exclude a VCS fabric, you must add all members of the VCS fabric to the exclude list. To exclude an IP address range (IPv4 and IPv6), complete the following steps. 1. Select IP Address from the Entry Type list. FIGURE 26 Exclude Address Range 2. Enter the first IP address in the range in the first IP Address field. 3. Enter the last IP address in the range in the second IP Address field. 4.
IP discovery profiles 3 8. To edit an excluded address range, select the address range you want to edit in the Excluded IP Addresses list. 9. Click the left arrow button to display the address range details in the bottom Add/Edit IP Addresses area. 10. Edit the excluded address range by choosing one of the following options: • To edit the excluded addresses using the CIDR subnet format, refer to “Editing CIDR subnet addresses” on page 71.
3 IP discovery profiles Scheduling discovery You can create multiple schedules (to a maximum of 32) for each profile. When it is time for a schedule to run, discovery handles schedules in the following manner: • If discovery is already running for the profile, the scheduled discovery drops. • If discovery is already running for a different profile, the scheduled discovery is queued. Once all discovery jobs in the queue finish, the scheduled discovery runs.
IP discovery profiles 3 Configuring a one-time discovery schedule To configure a one-time discovery schedule, complete the following steps. 1. Select One Time from the Frequency list. FIGURE 28 Scheduling tab - One Time 2. Select the time of day you want discovery to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. 3. Click the Date list to select a date from the calendar. 4.
3 IP discovery profiles Configuring a daily discovery schedule To configure a daily discovery schedule, complete the following steps. 1. Select Daily from the Frequency list. FIGURE 30 Scheduling tab - Daily 2. Select the time of day you want discovery to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. 3. Click the right arrow button to add the schedule to the Scheduled Discovery Cycles list. 4.
IP discovery profiles 3 Configuring a monthly discovery schedule To configure a monthly discovery schedule, complete the following steps. 1. Select Monthly from the Frequency list. FIGURE 32 Scheduling tab - Monthly 2. Select the time of day you want discovery to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. 3.
3 IP discovery profiles Suspending a discovery schedule To suspend a discovery profile schedule, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Click the Profiles tab 3. Select the profile for which you want to suspend a discovery schedule in the Discovery Profiles table and click the Scheduling tab. 4. Select the schedule you want to suspend in the Scheduled Discovery Cycles list and click the left arrow button. 5.
IP discovery profiles 7. 3 Rearrange schedules in the Scheduled Discovery Cycles list by selecting an item in the list and clicking the Up or Down buttons to move it. 8. Click Apply to save your changes. 9. Click Close to close the Discover Setup - IP dialog box. 10. Click Yes on the confirmation message. Editing a one-time discovery schedule To edit a one-time discovery schedule, complete the following steps. 1. Select the time of day you want discovery to run from the Time (hh:mm) lists.
3 IP discovery profiles 4. To finish editing the discovery schedule, return to “Editing a discovery schedule” on page 76. Editing a monthly discovery schedule To edit a monthly discovery schedule, complete the following steps. 1. Select the time of day you want discovery to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. 2.
IP discovery profiles FIGURE 34 3 Preferences tab 4. Enter the maximum number (from 1 through 100) of simultaneous connections to devices allowed by discovery in the Maximum Threads field. 5. Enter the name of the file that contains specific IP addresses to probe in the Discovery Address File field. The file supports both IPv4 and IPv6 addresses. This file must be located in the Install_Home\conf\discovery\ip folder on the server. The default file is the discovery_addrs.
3 IP discovery profiles Deleting a discovery profile You can delete any of the discovery profiles except the “Default” profile. To delete a discovery profile, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Click the Profiles tab. 3. Select the profile you want to delete in the Discovery Profiles table and click Delete. 4. Click Apply to save your changes. 5. Click Close to close the Discover Setup - IP dialog box. 6.
IP discovery profiles 3 3. Select the discovery profile on which you want to start discovery in the Discovery Profiles table and click Start. 4. Click Close to close the Discover Setup - IP dialog box. 5. Click Yes on the confirmation message. Starting discovery automatically To run discovery for a profile at startup, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Click the Profiles tab. 3.
3 IP discovery profiles • • • • Waiting — Discovery will start for this profile once the current profile discovery completes. Scheduled — Discovery will be run for this profile at the scheduled time. Idle — Discovery is not running. Terminating — Discovery for the profile is either completing or has been terminated. 4. Click Close to close the Discover Setup - IP dialog box. 5. Click Yes on the confirmation message.
IP discovery profiles 3 Exporting discovery reports To export a report for a discovery profile, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Click the Profiles tab. 3. Select the discovery profile for which you want to export a report in the Discovery Profiles table and click Report. 4. Choose one of the following options: • To export the report to a .csv file, select Export > Export as CSV.
3 Individual IP device discovery Individual IP device discovery Simple discovery discovers the device with a specific IP address. It is triggered by device configuration changes on SNMP traps, certain configuration deployments to a device, and adding device or rediscovering a device. Adding an IP device to discovery NOTE You cannot discover new products if you do not have the All IP Products AOR (area of responsibility) in your user account.
Individual IP device discovery 3 NOTE You can configure both SNMPv3 and SNMPv1/SNMPv2c credentials at the same time; however, discovery tries the SNMPv3 credentials before trying the SNMPv1 and SNMPv2c credentials. 5. Configure the SNMPv3 read-write credentials by completing the following steps. NOTE These credentials are not applicable for DCB devices. a. Click the SNMPv3 Read/Write tab. FIGURE 36 b. SNMPv3 credentials Enter the SNMPv3 user name in the User ID field.
3 Individual IP device discovery a. Click the SNMPv3 Read Only tab. b. Enter the SNMPv3 user name in the User ID field. The user name can be from 1 through 16 characters long, case sensitive, and allows all printable ASCII characters. c. Select one of the following protocols from the Authentication Protocol list: • None • HMAC_MD5 • HMAC_SHA d. Enter the SNMPv3 authentication password in the Authentication Password field.
Individual IP device discovery 3 8. Configure the SNMPv1 and SNMPv2c read only credentials by completing the following steps. a. Click the SNMPv1/v2c Read Only tab. b. Enter the community string in the Community field. The community string can be from 1 through 16 characters long, case sensitive, and allows all printable ASCII characters. The string displays as asterisks.
3 Individual IP device discovery 2. Select one or more IP devices you want to edit in the Discovered Products table. Select multiple devices by holding down the CTRL key and clicking more than one device. NOTE You cannot edit IronWare and Network OS devices at the same time. NOTE You can only edit multiple Network OS devices that are running the same firmware level. 3. Click Edit. The Edit product dialog box displays. 4.
Individual IP device discovery 3 • HMAC_MD5 • HMAC_SHA d. Enter the SNMPv3 authentication password in the Authentication Password field. The password can be from 8 through 16 characters long, case sensitive, and allows all printable ASCII characters. The password display as asterisks. e. Select one of the following privacy protocol types from the Privacy Protocol list: • None • CBC-DES • CFB_AES-128 If you select a privacy protocol, the selected protocol encrypts the SNMP request and response packets.
3 Individual IP device discovery FIGURE 40 b. SNMPv1/v2c settings Enter the unique community string in the Community field. The community string can be from 1 through 16 characters long, case sensitive, and allows all printable ASCII characters. The string displays as asterisks. NOTE If you do not enter a community string in the field, discovery uses the "public" and "private" community strings to probe the devices. 8.
Individual IP device discovery c. 3 Change the unique user name in the Login Prompt User Name field. The user name can be from 1 through 200 characters long, case sensitive, and allows all printable ASCII characters. d. Change the password in the Login Prompt Password field. The password can be from 1 through 200 characters long, case sensitive, and allows all printable ASCII characters. The password display as asterisks. e. Change the unique user name in the Enable Prompt User Name field.
3 Individual IP device discovery 11. Change the Read Only credentials by completing the following steps. NOTE These credentials are not applicable for DCB, VDX, or VCS devices. a. Click the Read Only Credentials tab. FIGURE 43 a. Read Only credentials Change the unique user name in the Login Prompt User Name field. The user name can be from 1 through 16 characters long, case sensitive, and allows all printable ASCII characters. b. Change the password in the Login Prompt Password field.
Host discovery 3 Deleting IP devices from discovery To delete one or more IP devices from discovery, complete the following steps. 1. Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2. Select the IP devices you want to remove from discovery in the Discovered Products table. Select multiple devices by holding down the CTRL key and clicking more than one device. NOTE You cannot delete an active member from a VCS fabric. 3. Click Delete.
3 Host discovery FIGURE 44 Discover Host Adapters dialog box 2. Click Add. The Add Host Adapters dialog box displays. FIGURE 45 Add Host Adapters dialog box 3. (Optional) Enter a discovery request name (such as, Manual 06/12/2009) in the Discovery Request Name field. 4. Select Network Address from the list. 5. Enter the IP address (IPv4 or IPv6 formats) or host name in the Network Address field. 6. Click Add. The IP address or host name of the Host displays in the Host List.
Host discovery 7. 3 Configure Host credentials by choosing one of the following options: • To configure HCM agent credentials, select the HCM agent option. Go to step 9. • To configure CIM server credentials, select the CIM server (ESXi only) option. Continue with step 8. If you do not need to configure Host credentials, skip to step 13. 8. Configure discovery authentication by choosing one of the following options: • To configure discovery with authentication, select the HTTPS from the Protocol list.
3 Host discovery FIGURE 46 Add Host Adapters dialog box 3. Enter a discovery request name (such as, MyFabric) in the Discovery Request Name field. 4. Click Import. The Open dialog box displays. 5. Browse to the CSV file location. The CSV file must meet the following requirements: • Comma separated IP address or host names • No commas within the values • No escaping supported For example, XX.XX.XXX.XXX, XX.XX.X.XXX, computername.company.com 6. Click Open.
Host discovery 3 10. Enter the port number in the Port field. HCM agent default is 34568. CIM server HTTPS default is 5989. CIM server HTTP default is 5988. 11. Enter your username in the User ID field. HCM agent default is admin. Leave this field blank for the CIM server. 12. Enter your password Password field. HCM agent default is password. Leave this field blank for the CIM server. 13. Click OK on the Add Host Adapters dialog box. If an error occurs, a message displays.
3 Host discovery 6. Click Add. All hosts which are part of a managed fabric and have a registered host name display in the list. If no host with a registered host name exists, an error message displays. Click OK to close the error message. 7. Configure Host credentials by choosing one of the following options: • To configure HCM agent credentials, select the HCM agent option. Go to step 9. • To configure CIM server credentials, select the CIM server (ESXi only) option. Continue with step 8.
Host discovery FIGURE 48 3 Add Host Adapters dialog box 3. Enter a discovery request name (such as, MyVMManager) in the Discovery Request Name field. 4. Select Hosts from VM Manager from the import by list. 5. Select All VM or an individual VM from the list. 6. Click Add. All hosts which are part of a discovered VM manager and have a registered host name display in the list. If no host with a registered host name exists, an error message displays. Click OK to close the error message. 7.
3 Host discovery 12. Click OK on the Add Host Adapters dialog box. If an error occurs, a message displays. Click OK to close the error message and fix the problem. A Host Group displays in Discovered Hosts table with pending status. To update the status from pending you must close and reopen the Discover Host Adapters dialog box. 13. Click Close on the Discover Host Adapters dialog box. Editing Host adapter credentials To edit Host credentials, complete the following steps. 1.
Host discovery 3 Removing a host from active discovery If you decide you no longer want the Management application to discover and monitor a specific host, you can delete it from active discovery. Deleting a host also deletes the host data on the server (both system collected and user-defined data) except for user-assigned names for the device port, device node, and device enclosure information. To delete a host from active discovery, complete the following steps. 1. Select Discover > Host Adapters.
3 Host discovery Viewing the host discovery state The Management application enables you to view device discovery status through the Discover Host Adapters dialog box. To view the discovery status of a device, complete the following steps. 1. Select Discover > Host Adapters. The Discover Host Adapters dialog box displays. 2. Right-click the Hosts node select Expand All to show all devices. The Name field displays the discovery status icons in front of the device name.
VM Manager discovery 3 2. If the host is responding to ping, but discovery still fails, verify that HCM agent is up or not by browsing to the following URL: https://Host_IP_Address:34568/JSONRPCServiceApp/JSON-RPC If HCM agent is running and reachable, you should receive a prompt of credentials and then show an Error 500 (No Reason) result page. 3. Verify that firewall port 34568 is open. There are firewall issues with the HCM Agent on Windows 2008 and VMware systems.
3 VM Manager discovery FIGURE 50 Discover VM Managers dialog box 2. Click Add. The Add VM Manager dialog box displays. FIGURE 51 Add VM Manager dialog box 3. Enter the IP address or host name in the Network Address field. 4. Enter the VM manager port number in the Port field. 5. Enter the VM manager username in the User ID field. 6. Enter the VM manager password Password field. 7.
VM Manager discovery 3 8. Select the Forward event to vCenter check box to enable event forwarding from the Management application to vCenter. Clear to disable event forwarding. 9. Click OK on the Add VM Manager dialog box. If an error occurs, a message displays. Click OK to close the error message and fix the problem. A VM manager displays in Discovered VM Managers table with pending status. To update the status from pending you must close and reopen the Discover VM Managers dialog box. 10.
3 VM Manager discovery 10. Click Close on the Discover VM Managers dialog box. Excluding a host from VM manager discovery To exclude host from VM manager discovery complete the following steps. 1. Select Discover > VM Managers. The Discover VM Managers dialog box displays. 2. Select the Host you want to exclude in the Discovered VM Managers list and click Exclude. 3. Click Close on the Discover VM Managers dialog box.
VM Manager discovery 3 2. Select the VM manager you want to return to active discovery in the Previously Discovered Addresses table. 3. Click Discover. 4. Click OK on the confirmation message. The rediscovered VM manager displays in the Discovered VM Managers table. 5. Refresh the Discover VM Managers list by clicking Refresh. 6. Click Close on the Discover VM Managers dialog box. Deleting a VM manager from discovery To delete a host permanently from discovery, complete the following steps. 1.
3 IP Rediscovery 3. Refresh the Discover VM Managers list by clicking Refresh. 4. Click Close on the Discover VM Managers dialog box. Troubleshooting VM manager discovery If you encounter discovery problems, complete the following checklist to ensure that discovery was set up correctly. Verify IP connectivity by issuing a ping command to the switch. 1. Open the command prompt. 2. From the Server, type ping Device_IP_Address.
IP Rediscovery 3 3. Click Rediscover. The Rediscover product dialog box displays. If you selected more than 10 devices, the client only sends the first 10 devices to the server. When rediscovery is complete on the first device and the server returns the status to the client, the client sends the next device to the server. This process continues until rediscovery is complete. The Rediscover product dialog box displays the progress status for each product in the Progress Status column.
3 IP Rediscovery Rediscovering a group To rediscover all devices in a group, complete the following steps. 1. Select the IP tab. 2. Select the group you want to rediscover in the Product List. You can select one group at a time. 3. Click Rediscover on the Product List toolbar. The Rediscover product dialog box displays. If you selected more than 10 devices, the client only sends the first 10 devices to the server.
Chapter Management Groups 4 In this chapter • Management groups overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 • Product group overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 • Port Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4 Product group overview • To filter the Network Objects Product List, refer to “Filtering devices in the Network Objects Product List” on page 308. • To update device configuration information on the Network Object view, refer to “IP Rediscovery” on page 108. Product group overview Once devices display in the Network Object view, you can associate the devices with a group. Product groups allow you to monitor and manage multiple devices at one time.
Product group overview 4 • User-Defined Groups — Groups created by users. All users can see user-defined product groups; however, you can only see products in the group that belong to your AOR. You can create two type of groups - static and dynamic. NOTE You can add a standalone VDX product or a VCS fabric to a user-defined Product Group; however, the VCS fabric members are not included with the group. - Static — You can define a product group by selecting the product you want to include inthe group.
4 Product group overview FIGURE 53 Add Product Group dialog box 3. Enter a unique name (maximum 64 characters) for the product group in the Name field. 4. Enter a description (maximum 255 characters) for the product group in the Description field. 5. Select the Topology Display Enable check box to display the product group in theL2 Topology view. 6. Add products to the group by selecting the product in the Available Products list and clicking the right arrow button.
Product group overview 4 5. Select the Topology Display Enable check box to display the product group in the L2 Topology view. 6. Add products to the group by selecting the product in the Available Products list and clicking the right arrow button. NOTE You can add a standalone VDX product or a VCS fabric to a user-defined Product Group; however, the VCS fabric members are not included with the group. The selected products move from the Available Products list to the Selected Products list. 7.
4 Product group overview Dynamic product groups You can define a dynamic product group using the following product attributes: • • • • • • • • • • • • • Name — The name of the product. IP Address — The IP address (IPv4 or IPv6 format) of the product. Product Type — The type of product. Serial # — The serial number of the product. Status — The status for the product and the port. Vendor — The name of the product’s vendor Model — The model number of the product.
Product group overview 4 5. Select the Topology Display Enable check box to display the product group in the L2 Topology view. 6. Click Insert. A new row displays in the Group Criteria table. 7. Select one of the following from the Property list. • • • • • • • Name IP Address Product Type Serial # Status Vendor Model NOTE You can add a standalone VDX product or a VCS fabric to a user-defined Product Group; however, the VCS fabric members are not included with the group.
4 Product group overview 9. Enter a value or regular expression in the Value/Regular Expression cell. This field is case sensitive.
Product group overview 4 Editing a dynamic product group To edit a dynamic product group, complete the following steps. 1. Select Network Objects from the view list on the Product List toolbar. 2. Right-click the product group you want to edit in the Product List and select Edit Group. The Edit Product Group - Dynamic dialog box displays. 3. Change the name for the product group in the Name field. 4. Change the description for the product group in the Description field. 5.
4 Product group overview 9. To create a group, highlight the rows you want to group and click Group. An open paren and close paren display in the Group Criteria table to deliniate the new group. You can create up to three groups. To ungroup a group, select a row and click Ungroup. If the selected row is part of 2 groups, only the inner group ungroups. 10. Click OK. The new group displays in the User-Defined Groups folder of the Product list. Viewing test results To test the group criteria, click Test.
Product group overview 4 TABLE 15 Field/Component Description Properties tab Select to display information about the group. Name The unique name (maximum 64 characters) for the product group. Description The description (maximum 255 characters) for the product group. Creator The user name of the creator (for example, Administrator). Topology Display Whether or not topology display is enabled. Dynamic Group Whether or not this is a dynamic group.
4 Port Groups Deleting a product group You can delete more than one group at a time. NOTE You cannot delete a system group. To delete a product group, complete the following steps. 1. Select Network Objects from the view list on the Product List toolbar. 2. Right-click the product group you want to delete in the Product List and select Delete Group. Ctrl and click to select more than one group to delete. A confirmation message displays. 3. Click Yes.
Port Groups 4 6. Add ports to the group by selecting the port in the Available Ports list and clicking the right arrow button. NOTE The Management port, peri port, and stack ports are not included in the Available Ports list. The selected ports move from the Available Ports list to the Selected Ports list.
4 Port Groups 7. Remove ports from the group by selecting the port in the Selected Ports list and clicking the left arrow button. The selected ports move from the Selected Ports list to the Available Ports list. 8. Click OK. Duplicating a port group To duplicate a port group, complete the following steps. 1. Select Network Objects from the view list on the Product List toolbar. 2. Right-click the port group you want to duplicate in the Product List and select Duplicate Group.
Port Groups 4 Viewing port group properties To view port group properties, complete the following steps. 1. Select Network Objects from the view list on the Product List toolbar. 2. Right-click the port group you want to view properties for in the Product List and select Properties. The Port Group Properties dialog box displays. 3. Review the information: TABLE 16 Field/Component Description Properties tab Select to display information about the group.
4 Port Groups Deleting a port group You can delete more than one group at a time. To delete a port group, complete the following steps. 1. Select Network Objects from the view list on the Product List toolbar. 2. Right-click the port group you want to delete in the Product List and select Delete Group. Ctrl and click to select more than one group to delete. A confirmation message displays. 3. Click Yes. The group is deleted from the Ports Groups folder of the Product list.
Chapter 5 Application Configuration In this chapter • Server Data backup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Server Data restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • SAN data collection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Event storage settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Flyover settings .
5 Server Data backup • Server Backup — Use to configure backup settings. Backup is a service process that periodically copies and stores application files to an output directory. The output directory is relative to the server and must use a network share format to support backup to the network. If you use a network path as the output directory, you must add network credentials. For more information, refer to “Server Data backup” on page 128 and “Server Data restore” on page 134.
Server Data backup 5 What is backed up? The data is backed up to the following directories: • Backup\databases — contains database and log files. • Backup\data — contains IP product firmware and configurations. • Backup\conf – contains the Management application configuration files.
5 Server Data backup FIGURE 55 Options dialog box (Server Backup pane) 3. Select the Enable Backup check box, if necessary. 4. Enter the time (using a 24-hour clock) you want the backup process to begin in the Next Backup Start Time Hours and Minutes fields. 5. Select an interval from the Backup Interval drop-down list to set how often backup occurs. 6. Back up data to a hard drive by browsing to the hard drive and directory to which you want to back up your data. NOTE This requires a hard drive.
Server Data backup a. 5 Browse to the network share and directory to which you want to back up your data. NOTE You must specify the directory in a network share format (for example, \\network-name\share-name\directory). Do not use the drive letter format (C:\directory). b. (Windows only) Enter the name of the Windows domain or workgroup in which you are defined in the Domain Workgroup field. NOTE You must be authorized to write to the network device. c.
5 Server Data backup 3. Select the Enable Backup check box. 4. Click Apply or OK. Disabling backup Backup is enabled by default. If you want to stop the backup process, you need to disable backup. To disable the backup function, complete the following steps. 1. Select Server > Options. The Options dialog box displays. 2. Select Server Backup in the Category list. 3. Clear the Enable Backup check box. 4. Click Apply or OK.
Server Data backup 5 3. Select an interval from the Backup Interval drop-down list to set how often backup occurs. 4. Click Apply or OK. The minimum value is 6 hours and the maximum value is 24 hours. Starting immediate backup NOTE You must have backup privileges to use the Backup Now function. For more information about privileges, refer to “User Privileges” on page 1283.
5 Server Data restore • Network share access problem when backup starts or during backup (not when the backup configuration is changed) Server Data restore NOTE You cannot restore data from a previous version of the Management application. NOTE You cannot restore data from a higher or lower configuration (Trial or Licensed version) of the Management application. NOTE You cannot restore data from a different package of the Management application.
SAN data collection 5 Browse to the location specified in the Output Directory field on the Options dialog box Backup pane. 6. Click Restore. Upon completion, a message displays the status of the restore operation. Click OK to close the message and the Server Management Console. For the restored data to take effect, re-launch the Configuration Wizard using the instructions in “Launching the Configuration Wizard” on page 5.
5 SAN data collection The Management application uses the short tick interval to ping the switch for a periodic reachability check. If the reachability check succeeds, then the Management application runs pending collectors triggered by an event. When no SNMP traps or syslog events occur, the Management application uses the lazy polling interval to schedule collection of configuration and status changes. The lazy polling interval process schedules any pending collectors for the next short tick.
Product communication protocols 5 • SwitchAssetCollector – Collects data about the switch including, inventory details, port level data, any blades that may be present (on directors), AG-port mapping, and auto trace dump settings. This is the major collector for switch data. • • • • • FCIPCollector – Collects FCIP-related data on the older FCIP switches. XFCIPCollector – Collects extended FCIP-related data on the newer FCIP switches.
5 Product communication protocols TABLE 18 Product communication protocols Protocol Description Management application use Communicates with device type NETCONF The Network Configuration Protocol (NETCONF), is an IETF network management protocol. NETCONF provides mechanisms to install, manipulate, and delete the configuration of network devices. Its operations are realized on top of a simple Remote Procedure Call (RPC) layer.
Event storage settings TABLE 18 5 Product communication protocols Protocol Description Management application use Communicates with device type SCP Secure copy (SCP) is a means of securely transferring computer files between a local host and a remote host or between two remote hosts. It is based on the Secure Shell (SSH) protocol. Used for firmware download. For Fabric OS and Network OS devices, used to collect technical support information.
5 Flyover settings • Professional — 1 through 100,000 • Enterprise — 1 through 10,000,000 Default is 50,000. Older events are purged at midnight on the date the maximum event limit is reached regardless of the retention days. 4. Enter then number of days (1 through 365) you want to store events in the Maximum Days field. The events are purged at midnight on the last day of the retention period regardless of the number of maximum events. 5.
Flyover settings 5 3. Select the Enable flyover display check box to enable flyover display on your system. 4. Select the Include labels check box to include labels on flyover displays. 5. Add product properties you want to display on flyover by selecting the Product tab (Figure 57) and completing the following steps. FIGURE 57 Options dialog box (Flyovers pane, Product tab) a. Select the protocol type from the Type list, if necessary. b.
5 Name settings a. Select the protocol type from the Type list, if necessary. Depending on which protocol you select, some properties may not be available for all protocols. b. Select each property you want to display in the connection flyover from the Available Properties table. Depending on which protocol you select, some of the following properties may not be available for all protocols: IP • IP_Address:Port-IP_Address:Port c.
Name settings 5 Fixing duplicate names To fix duplicated names, complete the following steps. 1. Select Configure > Names. The Configure Names dialog box displays. 2. Click Fix Duplicates. The Duplicated Names dialog box displays (Figure 59). FIGURE 59 Duplicated Names dialog box The Duplicated Names dialog box contains the following information: • Description — A description of the device. • Duplicate Names table — Every instance of duplicate names. Fabric — The fabric name.
5 Name settings 3. Select one of the following options. • If you select Append Incremental numbers for all repetitive names, the names are edited automatically using incremental numbering. • If you select I will fix them myself, edit the name in the Name field. 4. Click OK on the Duplicated Names dialog box. 5. Click OK to close the Configure Names dialog box. 6. Click OK on the confirmation message. Viewing names To view names associated with devices, complete the following steps. 1.
Name settings 5 • Display table — This table displays the following information: Description–A description of the device. Name–The name of the device. Enter a name for the device. Operational Status–The operational status of the device (discovered, operational, and unknown). Type–The type of device (port, node, Fabric Assigned WWN, and unknown). WWN–The world wide node (WWN) of the device. Enter a WWN for the device. Click a column head to sort the list.
5 Name settings If you set names to be unique on the Options dialog box and the name you entered already exists, the entry is not accepted. To search for the device already using the name, refer to “Searching for a device by name” on page 148 or “Searching for a device by WWN” on page 149 in the Configure Names dialog box or “Searching for a device” on page 299 in the connectivity map. NOTE If you segment a fabric, the Fabric’s name follows the assigned principal switch. 5.
Name settings 5 Removing a name from a device 1. Select Configure > Names. The Configure Names dialog box displays. 2. In the Display table, select the name you want to remove. 3. Click Remove. An application message displays asking if you are sure you want clear the selected name. 4. Click Yes. 5. Click OK to close the Configure Names dialog box. 6. Click OK on the confirmation message. Editing names To edit the name associated with a device, complete the following steps. 1. Select Configure > Names.
5 Name settings Importing Names If the name length exceeds the limitations detailed in the following table, you must edit the name (in the CSV file) before import. Names that exceed these limits will not be imported. If you migrated from a previous version, the .properties file is located in the Install_Home\migration\data folder. TABLE 19 Device Character limit Fabric OS switch 6.2 or later 30 (24 character limit when in FICON mode) Fabric OS switch 6.1.X or earlier 15 Fabric OS switch port 7.
Miscellaneous security settings 5 5. Click Search. All devices with the specified name (or partial name) are highlighted in the Display table. You may need to scroll to see all highlighted names. If the search finds no devices, a ‘no item found’ message displays. 6. Click OK to close the Configure Names dialog box. Searching for a device by WWN You can search for objects (switch, fabric, product, ports, or N Ports) by WWN (world wide name).
5 Miscellaneous security settings Configuring the server name To configure the server name, complete the following steps. 1. Select Server > Options. The Options dialog box displays. 2. Select Security Misc in the Category list. The Security Misc pane displays (Figure 61). FIGURE 61 Options dialog box (Security Misc pane) 3. Enter the server name in the Server Name field. The Server Name field cannot be empty. 4. Click OK on the confirmation message. 5. Click Apply or OK to save your work.
Syslog Registration settings 5 • To allow users to save their password in the Login Security list, select Allow clients to save password on login. • To not allow users to save their password in the Login Security list, select Do NOT allow clients to save password on login. 4. Click Apply or OK to save your work. Configuring the login banner display To configure the login banner display, complete the following steps. 1. Select Server > Options. The Options dialog box displays. 2.
5 SNMP Trap Registration settings The Syslog Registration pane displays (Figure 62). FIGURE 62 Options dialog box (Syslog Registration pane) 3. Select the Auto register server as Syslog recipient check box, if necessary. This check box is selected by default. 4. Click Apply or OK to save your work. Configuring the Syslog listing port number 1. Select Server > Options. The Options dialog box displays. 2. Select Syslog Registration in the Category pane. The Syslog Registration pane displays (Figure 62).
SNMP Trap forwarding credential settings FIGURE 63 5 Options dialog box (Trap Registration pane) 3. Select the Auto register server as SNMP trap or informs recipient check box, if necessary. This check box is selected by default. 4. Click Apply or OK to save your work. Configuring the SNMP trap listing port number 1. Select Server > Options. The Options dialog box displays. 2. Select Trap Registration in the Category pane. 3.
5 SNMP Trap forwarding credential settings FIGURE 64 Options dialog box (Trap Forwarding Credentials pane) 3. Enter the unique community string (case sensitive, 1 to 16 characters). in the Community and Confirm Community fields. Displays as asterisks. Allows all printable ASCII characters. 4. Click Apply or OK to save your work. Configuring SNMP v3 credentials To configure a SNMP v1 or v2c credentials, complete the following steps. 1. Select Server > Options. The Options dialog box displays. 2.
Software Configuration 5 • NONE (go to step 8) 7. Enter the privacy password (case sensitive, 8 to 16 characters) in the Priv Password and Confirm Password fields. Displays as asterisks. Allows all printable ASCII characters. 8. Click Apply or OK to save your work. Software Configuration The Management application allows you to configure the following software settings: • • • • Client/Server IP — IP configuration settings. IP preferences — IP settings specific to IP product managemental.
5 Software Configuration • Firmware import for Fabric OS and Network OS products • FTP button in Technical Support Repository dialog box • Technical supportSave of Fabric OS, Network OS, and Host products through FTP To configure the IP address used by the server for client-server communications, complete the following steps. 1. Select Server > Options. The Options dialog box displays. 2. Select Client/Server IP in the Category list to set the IP address. The Client/Server IP pane displays (Figure 65).
Software Configuration 5 NOTE You can only restart the server using the Server Management Console (Start > Programs > Management_Application_Name 12.X.X > Server Management Console). 7. Click OK on the “changes take effect after application restart” message. Configuring an explicit server IP address If you selected a specific IP address from the Server IP Configuration screen during installation and the selected IP address changes, you will not be able to connect to the server.
5 Software Configuration If DNS is not configured for your network, do not select the ‘hostname’ option from either the Server IP Configuration or Switch - Server IP Configuration Preferred Address list. Selecting the ‘hostname’ option prevents clients and devices from communicating with the Server. c. Click Next. 6. Click Next on the Server Configuration screen. 7. Click Next on the SMI Agent Configuration screen. 8. Verify the IP address on the Server Configuration Summary screen and click Next. 9.
Software Configuration 5 1. Select Server > Options. The Options dialog box displays. 2. Select Client/Server IP in the Category list to set the IP address. 3. Choose one of the following options in the Server IP Configuration list. • Select All. Go to step 4. • Select a specific IP address. Continue with step 5. • Select localhost. Continue with step 5. 4. Select the return IP address in the Client - Server IP Configuration Return Address list.
5 Software Configuration Configuring change manager preferences 1. Select Server > Options. The Options dialog box displays. 2. Select IP Preferences from the Software Configurations list in the Category pane. The IP Preferences pane displays (Figure 67). FIGURE 67 Options dialog box (IP Preferences pane) 3. Select the ConfigReadFlash check box to obtain configuration back up from flash. Clear to obtain configuration back up from DRAM. Default is clear (disabled). 4.
Software Configuration 5 8. Select the DoPostdeploymentBackup check box to turn on product configuration backup after a payload is deployed using the Configuration Wizard. 9. Select the DoPredeploymentBackup check box to turn on product configuration backup before a payload is deployed using the Configuration Wizard. 10. Enter the number of days to keep product configuration backup files on the server in the KeepDataForDays field. Minimum duration is 7 days. Maximum duration is 365. Default is 30.
5 Software Configuration 4. Click Apply or OK to save your work. Configuring IP device manager preferences This configuration is only applicable to the Ethernet router series switch running firmware version 5.4 or later. 1. Select Server > Options. The Options dialog box displays. 2. Select IP Preferences from the Software Configurations list in the Category pane. 3. Enter the number of Element Managers that can be launched from the Management application in the LaunchLimitforElementManagerGUI field.
Software Configuration 5 4. Select the PollingState check box to enable MPLS polling. 5. Click Apply or OK to save your work. Configuring name service preferences 1. Select Server > Options. The Options dialog box displays. 2. Select IP Preferences from the Software Configurations list in the Category pane. 3. Enter the maximum cache size for the DNS Lookup Manager in the DnsCacheSize field. 4.
5 Software Configuration 3. Select the EnableReverseDNSLookup check box to enable reverse DNS Look up on the L3/L4 IP Address so that the host name is displayed together with the IP Address. 4. Enter the number of days to retain the SFlow hourly data in the KeepDataForDays field. Minimum duration is 7 days. Maximum duration is 65 days. Reducing this parameter may result in expiring a large number of records on server restart and lead to reduced performance.
Software Configuration 5 3. Enter a number of days to display a warning for an expiring certificate in the DaysUntilExpiryWarning field. When the certificate reaches this value, the certificate displays orange. Default is 31. Minimum is 0. 4. Enter a number of days to display the next warning for an expiring certificate in the DaysUntilNextExpiryWarning field. 5. Click Apply or OK to save your work. Configuring SNMP preferences 1. Select Server > Options. The Options dialog box displays. 2.
5 Software Configuration Memory allocation settings You can configure memory allocation for the client and server to improve performance. You can trigger switch polling when a state changes or you can poll at intervals when no state change occurs. NOTE SAN size is a consideration in selection of polling periods. Configuring memory allocation settings To configure memory allocation settings, complete the following steps. 1. Select Server > Options. The Options dialog box displays. 2.
Software Configuration 5 • Small — 20 products (recommended) • Medium — 200 products (recommended) • Large — 5,050 products (recommended) Memory and asset polling values change to the new default values when you change the IP Network size. You may increase these values. For default values, refer to step 4 and step 5. b. Click OK on the confirmation message. 4. Enter the memory allocation (MB) for the client in the Client Memory Allocation field.
5 Software Configuration • Large : 1024 MB For all 64-bit servers, the default minimum Server Heap Size for all network sizes is 2048 MB. NOTE There is no restriction on the maximum value for Server Heap Size in a 64-Bit Server. The correct server heap size value must be given according to the RAM present in the server. 6. Click Apply or OK to save your work. NOTE Changes to this option take effect after an application restart.
Software Configuration 5 • Large: 1800 seconds 5. Click Apply or OK to save your work. NOTE Changes to this option take effect after an application restart. NOTE You can only restart the server using the Server Management Console (Start > Programs > Management_Application_Name 12.X.X > Server Management Console). 6. Click OK on the “changes take effect after application restart” message.
5 Software Configuration 1. Select Server > Options. The Options dialog box displays. 2. Select Product Communication from the Software Configurations list in the Category pane. The Product Communication pane displays (Figure 69). FIGURE 69 Options dialog box (Product Communication pane) 3. To connect using HTTP, complete the following steps. a. Select the Connect using HTTP option. b. Enter the connection port number in the Port # field. Go to step 5. The default HTTP port number is 80.
Software Configuration 5 1. Select Server > Options. The Options dialog box displays. 2. Select Product Communication from the Software Configurations list in the Category pane. The Product Communication pane displays (Figure 69). 3. (Fabric OS and Network OS products only) Select IPv4 (default) or IPv6 to set the preferred IP format. 4. Click Apply or OK to save your work. Changes to this option take effect after an application restart. 5.
5 Software Configuration 6. Select one of the following options to determine configuration file transfer communication: • • • • 7. SCP only TFTP only SCP then TFTP TFTP then SCP Select one of the following options to configure the web element manager communication: • HTTP • HTTPS (HTTP over SSL) • HTTPS then HTTP 8. Click Apply or OK to save your work.
Software Configuration 5 To view the port status for the FTP and SCP/SFTP servers, refer to “Viewing port status” on page 10. Accessing the FTP server folder Choose from one of the following options to access the FTP server folder: • To access the internal FTP folder, select Monitor > Techsupport > View Repository. • To access the external FTP folder, type the following in a browser window: ftp://Username@External_FTP_Server_IP_Address (for example, ftp://admin@10.1.1.1) and press Enter.
5 Software Configuration Configuring an internal SCP or SFTP server NOTE SCP is supported on Fabric OS devices running 5.3 and later. NOTE SFTP is supported on Fabric OS devices running 7.0 and later. To configure the internal SCP or SFTP server settings, complete the following steps. 1. Select Server > Options. The Options dialog box displays. 2. Select FTP/SCP/SFTP in the Category list. The FTP/SCP/SFTP pane displays (Figure 71). FIGURE 72 Options dialog box (FTP/SCP/SFTP pane) 3.
Software Configuration 5 Configuring an external FTP, SCP, or SFTP server NOTE For FIPS-enabled Fabric OS switches, you must configure the FTP/SCP/SFTP server communication to an external SCP or SFTP server to download firmware and allow technical support. NOTE SCP is supported on Fabric OS devices running 5.3 and later. NOTE SFTP is supported on Fabric OS devices running 7.0 and later. To configure external FTP, SCP, or SFTP server settings, complete the following steps. 1. Select Server > Options.
5 Software Configuration a. Select the SCP Server check box to configure the external SCP server. All fields are mandatory. b. Enter the IP address for the remote host in the SCP Host IP field. c. Enter a user name in the SCP Host User Name field. d. Enter the path to the remote host in the SCP Directory Path field. Use a slash (/) or period (.) to denote the root directory. e. Enter the password in the Password Required for SCP field. f. Select SCP from the Preferred Protocol (Secured) list.
Software Configuration 5 For step-by-step instructions about configuring the built-in server, refer to “Configuring an external FTP, SCP, or SFTP server” on page 175. 4. Click Test. An “FTP, SCP, or SFTP Server running successfully” or an error message displays. If you receive an error message, make sure your credentials are correct, the server is running, the remote directory path exists, and you have the correct access permission; then try again. 5. Click OK on the message. 6.
5 Software Configuration For Professional, the server requires 15 consecutive free ports beginning with the starting port number. For Trial and Licensed versions, the server requires 18 consecutive free ports beginning with the starting port number. 6. Click Apply or OK to save your work. NOTE Changes to this option take effect after application restart. 7. Click OK on the “changes take effect after application restart” message.
Software Configuration 5 NOTE Changes to the server log levels reset to the default (INFO) after a server restart. NOTE Changes to the Log client support data log level is persisted on all clients launched from the same machine for the same server. client. log file properties • Client logs are collected separately for each server. After successful login, a log file is created and prefixed with the network address provided in the Login dialog box. For example, 172.26.1.1.client.log or localhost.client.
5 FIPS Support FIPS Support To manage FIPS-enabled Fabric OS fabrics and switches, make sure you complete the following configuration requirements: • Configure Product Communication to HTTPS (refer to “Configuring SAN communication” on page 169) to allow communication between the server and the Fabric OS switches. • Configure an external SCP server (refer to “Configuring an external FTP, SCP, or SFTP server” on page 175) to allow firmware download, product technical support, and supportSave.
Chapter 6 User Account Management In this chapter • Users overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • User accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Roles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Areas of responsibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6 Users overview Viewing configured users To view configured users, complete the following steps. 1. Select Server > Users. The Users dialog box displays. 2. Click the Users tab, if necessary. FIGURE 76 Users dialog box - Users tab The Users dialog box contains the following fields and components: • Authentication-Primary — The primary authentication server type configured through the Server Management Console.
Users overview 6 • Users table — The configured users. User ID — The unique name used to identity a user. Full Name — The user’s full name. Roles — List of Roles the user belongs to separated by comma. Area Of Responsibility — List of AORs the user belongs to separated by comma. E-mail Notification — Whether e-mail notification is enabled for user. Account Enabled — Whether the user account status is enabled. Policy Violations — Whether there is a current policy violation for the user.
6 Users overview Default system roles for IP only environments include: - IP System Administrator Network Administrator Report User Group Default system roles for SAN plus IP environments include: SAN System Administrator IP System Administrator Network Administrator Security Administrator Zone Administrator Operator Security Officer Host Administrator Report User Group Description — A description of the role. Add button — Click to add a new role (refer to “Creating a new role” on page 191).
User accounts 6 User accounts NOTE You must have User Management Read and Write privileges to add new accounts, set passwords for accounts, and apply roles to the accounts. For a list of privileges, refer to “User Privileges” on page 1283. Management application user accounts contain the identification of the Management application user, as well as privileges, roles, and AORs assigned to the user. Privileges provide access to the features in Management application.
6 User accounts 4. Enter a password for the user in the Password and Confirm Password fields. Passwords displays as dots (.). For password policy details, refer to “Viewing your password policy” on page 208. 5. Select the Account Status - Enable check box to enable the account of the user. Account Status is enabled by default. 6. (Optional) Enter the full name of the user in the Full Name field. 7. (Optional) Enter a description for the user in the Description field. 8.
User accounts 6 Editing a user account To make changes to an existing user account, complete the following steps. 1. Select Server > Users. The Users dialog box displays. 2. Select the user account you want to edit and click Edit under the Users table. The Edit User dialog box displays. 3. Complete step 3 through step 13 in “Creating a new user account” on page 185. 4. Click OK to save the user account and close the Edit User dialog box.
6 User accounts Copying and pasting user preferences Enables you to copy user preference settings, such as window and dialog box sizes, table column and sort order, as well as other customizations, and all the user-defined views (including fabrics and hosts) from the selected user account to one or more other user accounts. If the fabric and hosts from the original user account are not included in the other user's AOR, then the copied fabrics and hosts do not display in the other user's views.
User accounts 6 4. Click OK to save the user account and close the Edit User dialog box. If you make changes to the user’s role or AOR while the user is logged in, a confirmation message displays. When you click OK on the confirmation message, the user is logged out and must log back in to see the changes. 5. Click Close to close the Users dialog box. Removing roles and areas of responsibility from a user account To remove roles and AORs from an existing user account, complete the following steps. 1.
6 User accounts Enabling a user account To re-activate a user account, complete the following steps. 1. Select Server > Users. The Users dialog box displays. 2. Select the disabled user account you want to enable in the Users table and click Enable. 3. Click Yes on the confirmation message. 4. Click Close to close the Users dialog box. Deleting a user account NOTE You cannot delete the default "Administrator" user account.
Roles 6 Roles NOTE You must have User Management Read and Write privileges to view, add, modify, or delete roles. A role is a group of Management application tasks or privileges that can be assigned to several users who have similar functions. When you create a role, it immediately becomes available in the Users dialog box. Creating a new role To create a new role, complete the following steps. 1. Select Server > Users. The Users dialog box displays. 2. Click Add under the Roles table.
6 Roles 6. Click OK to save the new role and close the Add Role dialog box. The new role displays in the Roles list of the Users dialog box. To add users to this role, follow the instructions in “Assigning roles and areas of responsibility to a user account” on page 188. 7. Click Close to close the Users dialog box Editing a role To make changes to an existing role, complete the following steps. 1. Select Server > Users. The Users dialog box displays. 2.
Roles 6 Deleting a role To delete a role, complete the following steps. 1. Select Server > Users. The Users dialog box displays. 2. Select the role you want to delete in the Roles table and click Delete. 3. Click Yes on the confirmation message. 4. Click Close to close the Users dialog box. Adding privileges to a role Each option under the Management application main menu corresponds to a privilege.
6 Areas of responsibility Removing privileges from a role You remove privileges from the Edit or Duplicate Users dialog boxes. To remove privileges from role, complete the following steps. 1. Select Server > Users. The Users dialog box displays. 2. Select the role you want to edit in the Roles table and click Edit or Duplicate under the Roles table. The Edit Roles or Duplicate Roles dialog box displays. 3.
Areas of responsibility 6 Creating an AOR When creating an AOR, you assign devices or groups to that AOR. After you save the AOR, it can be assigned to one or more user account. Users of those accounts can then view the devices or groups in their assigned AOR. Users can deploy configurations and payloads only to devices in assigned AORs. When you create an AOR, it immediately becomes available in the Users dialog box. To create an AOR, complete the following steps. 1. Select Server > Users.
6 Areas of responsibility Editing an AOR NOTE You cannot edit system AORs. To make changes to an existing AOR, complete the following steps. 1. Select Server > Users. The Users dialog box displays. 2. Select the AOR you want to edit in the AOR table and click Edit. The Edit AOR dialog box displays. 3. Complete step 3 through step 5 in “Creating an AOR” on page 195. 4. Click OK to save the AOR and close the Edit AOR dialog box.
Areas of responsibility 6 Deleting an AOR NOTE You cannot delete system AORs. To delete an AOR, complete the following steps. 1. Select Server > Users. The Users dialog box displays. 2. Select the AOR you want to delete in the AOR table and click Delete. 3. Click Yes on the confirmation message. 4. Click Close to close the Users dialog box. Assigning products to an AOR You can assign hostsIP products to an AOR from the Add, Edit, or Duplicate AOR dialog box.
6 Password policies NOTE You must include the Application product to which the real or virtual servers in the AOR for the complete association to display in VIP manager. NOTE Virtual or real server IP addresses, configured for an Application product, display as a two FLAT list under the associated Application product tree node in the Available IP Products table. 7. Click OK to save your work 8. Click Close to close the Users dialog box.
Password policies 6 3. Configure the password expiration by completing the following steps. a. Enter the maximum number of days that can elapse before a password must be changed by the user in the Password Age field. Valid values are 0 through 999. The default is 0, which means the policy is disabled. b. Enter the number of days to warn the user prior to password expiration in the Warning Period field. Only enabled when the Password Age value is greater than zero. Valid values are 0 through 998.
6 Password policies For example, 'ab' is a sequence of 2 and '456' is a sequence of 3. Only enabled when the Empty Password - Allow check box is clear. Valid values are 0 through 127. The default is 1. 6. Configure the password lockout support by completing the following steps. a. Enter the number of failed login attempts allowed before the user account is locked out in the Lockout Threshold field. Valid values are 0 through 999. The default is 0 (disabled). b.
Authentication Server Groups on the Management server 6 3. Click View Policy Violators. The View Policy Violators dialog box displays. 4. Review the password policy violator details. The View Policy Violators dialog box includes the following details: • User ID — Displays the identifier of the user who violated the password policy. • Full Name — Displays the full name of the user who violated the password policy. • Reason — Displays the reason the user violated the password policy. 5.
6 Authentication Server Groups on the Management server 5. Click the right arrow button. The selected roles and AORs are moved to the Active Directory Groups table. 6. Click Apply to save your work When you assign roles and AORs to an AD group and save the configurations, when you reopen the Users dialog box and select the Authentication Server Groups tab, only the configured AD group is available.
Authentication Server Groups on the Management server 6 The Active Directory Groups table displays with all AD groups available in the specified LDAP server, as well as any AD groups already mapped in the Management server (Local database). To assign or remove roles and AORs, refer to “Assigning roles and AORs to an AD group” on page 201 or “Removing roles and AORs from an AD group” on page 202. 11. Click Close to close the Users dialog box.
6 Authentication Server Groups on the Management server Assigning an AD user to an AD group To assign a new group in Active Directory Users and Computers, complete the following steps. For more information, click F1 for help or refer to www.microsoft.com 1. Open the Active Directory Users and Computers console. For example, on Windows XP, select Start > Programs > Administrative Tools > Active Directory Users and Computers. 2. Right-click the new user in the Users pane and select Add to a Group. 3.
User profiles a. Enter NmRoles in the Common Name field. b. Enter NmRoles in the LDAP Display Name field. c. Enter a unique object identifier in the Unique x500 Object ID field. d. Enter a description of the attribute in the Description field. e. Select Case Insensitive String in the Syntax list. f. Click OK. 6 11. Close the Management console. Configuring authorization details on the external LDAP server Open the ADSI Edit dialog box on the Active Directory installed server. 1.
6 User profiles • Configure CLI credentials Viewing your user profile To view your user profile, complete the following steps. To edit your user profile, refer to “Editing your user profile” on page 207. 1. Select Server > User Profile. The User Profile dialog box displays the following information: • User ID — Displays your user identifier. • Full Name — Displays the name if entered while adding a user; otherwise, this field is blank. • Password — Displays your password as dots (.).
User profiles 6 Editing your user profile To edit your user profile, complete the following steps. 1. Select Server > User Profile. The User Profile dialog box displays. 2. Change your name in the Full Name field. 3. Change your password in the Password and Confirm Password fields. Passwords display as dots (.). 4. Change your user profile description in the Description field. 5. Change your phone number in the Phone Number field. 6.
6 User profiles If your password expires or your current password violates the password policy, you will be prompted to change your password from the Change Password dialog box. To view your password policy, click Password Policy - View. To change your password from the Change Password dialog box, complete the following steps. 1. Enter your current password in the Existing Password field. 2. Enter your new password in the New Password and Confirm Password fields. Passwords display as dots (.). 3.
User profiles 6 Resetting optional messages To reset all Management application optional messages to their default behaviors, complete the following steps. 1. Select Server > User Profile. The User Profile dialog box displays. 2. Click Optional Messages Reset. The Password Policy dialog box displays. 3. Click Yes on the confirmation message. A successful reset message displays. 4. Click OK on the User Profile dialog box.
6 User profiles 3. Enter the user name for the product in the Product Login Account - Username field. 4. Enter the password for the product in the Product Login Account - Password field. NOTE If Telnet is used to log in to the device and Telnet only requires a password, then enter the password in the Password field and leave the Username field blank. 5. (IronWare only) Enter the user name assigned to management privilege levels on the device in the Product Enable Account - Username field. 6.
Chapter 7 Dashboard Management In this chapter • Dashboard overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Default dashboards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Status widgets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Performance monitors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
7 Dashboard overview FIGURE 80 Dashboard tab 1. Menu bar — Lists commands you can perform on the dashboard. For a list of Dashboard tab menu commands, refer to “Dashboard main menus” on page 1261. The dashboard also provides a shortcut menu to reset the dashboard back to the defaults. Reset the dashboard back to the default settings by right-clicking in the white space and selected Reset to Default. 2. Toolbar — Provides buttons that enable quick access to dialog boxes and functions.
Dashboard overview 7 8. Status bar — Displays the connection, port, product, special event, Call Home, and backup status, as well as Server and User data. For more information about the status bar, refer to “Status bar” on page 289. Dashboard toolbar The toolbar (Figure 81) is located beneath the menu bar and provides icons and buttons to perform various functions. FIGURE 81 Toolbar The toolbar contains the following icons and buttons: 1.
7 Dashboard overview Dashboard messages The dashboard message bar (Figure 82) only displays when the Network Scope or Time Scope has changed. You can also view all dashboard messages and clear them. FIGURE 82 Dashboard message bar The toolbar contains the following fields and components: 1. Details button — Use to view dashboard messages. 2. Close button — Use to close the dashboard message bar.
Dashboard overview 7 General dashboard functions The Management application also provides the following general functions which are applicable to all widgets and monitors: • Preference persistence — Any customization you make to the dashboards are persisted in that dashboard.
7 Dashboard overview Filtering the dashboards list You can filter the list of dashboards to only display dashboard you need. 1. Click the Dashboards expand navigation bar. 2. Enter your filter criteria in the Filter text box. 3. To make the filter case sensitive or insensitive, choose one of the following options from the filter icon list: • Case sensitive — Select to make the filter case sensitive. • Case insensitive — Select to make the filter case insensitive. 4.
Dashboard overview 7 The new dashboard displays in the Dashboards expand navigation bar and becomes the active dashboard. Deleting a user-defined dashboard You can delete a user-defined dashboard. 1. Click the Dashboards expand navigation bar. 2. Select the dashboard you want to delete and click Delete. 3. Click Yes on the confirmation message.
7 Dashboard overview 4. Click the Performance tab (Figure 84). The preconfigured performance monitors display. You can create up to 100 performance monitors; however, you can only display up to 30 performance monitors. For more information about performance monitors, refer to “Performance monitors” on page 237. FIGURE 84 Customize Dashboard dialog box, Performance tab 5. Select the Display check box in the Performance Monitors list for each performance monitor you want to add to the dashboard.
Dashboard overview 7 Exporting the dashboard display You can export the current dashboard display (all widgets and monitors) or a selected widget or monitor in a .png format. 1. Select one of the following options from the Export list: • Dashboard — Exports the current dashboard. • Name — Exports the selected widget (where Name is the name of the widget or monitor on the dashboard). The Export Dashboard to PNG File or Export Name to PNG File dialog box displays. 2.
7 Dashboard overview Setting the network scope You can configure the dashboard to display all objects in your area of responsibility (AOR) or a subset of objects (fabrics, devices, or groups). NOTE Network scope does not affect the Events widget. The Events widget always includes all objects in your AOR. From the dashboard, select a network from the Network Scope list.
Dashboard overview 7 Creating a customized network scope You can create a network scope from any objects in your AOR. You can create network scopes based on Fabrics, Products, Product Groups, or Ports. 1. Click the Network Scope ellipsis button. The Edit Scope dialog box displays with a list of existing user-defined network scopes in the Network Scopes list. FIGURE 85 Edit Scopes dialog box 2. Click Add. A new network scope displays in the Network Scopes list. 3.
7 Dashboard overview Editing a user-defined network scope You can edit any user-defined network scope. 1. Click the Network Scope ellipsis button. The Edit Scope dialog box displays with a list of existing user-defined network scopes in the Network Scopes list. 2. Select the network scope you want to edit in the Network Scopes list. The network scope details display in the right side fields. 3. Change the name for the scope in the Name field, if needed. 4.
Default dashboards 7 From the dashboard, select on of the following duration options for which you want to display data from the Time Scope list. • • • • • • • • 30 Minutes — Displays data for the previous half hour. 1 Hour — Displays data for the previous hour. 6 Hours — Displays data for the previous 6 hours. 12 Hours — Displays data for the previous 12 hours. 1 Day — Displays data for the previous day. 3 Days — Displays data for the previous 3 days. 1 Week — Displays data for the previous week.
7 Status widgets • • • • • Top Port Underflow Errors monitor Top Port Overflow Errors monitor Top Port Runtime Errors monitor Top Port Too Long Errors monitor Top Port Alignment Errors monitor Status widgets The Management application provides the following preconfigured status widgets: • Access Point Status widget — Pie chart view of access point devices categorized by operational and reachability status • Events widget — Bar chart view of events grouped by severity and range • Host Adapter Inventory
Status widgets 7 • Severity icon/product count/widget title — The color of the worst status followed by the product count with that status displays before the widget title. • Show list — A list of available managed AP products. • Pie chart — The AP status as a percentage of the total number of devices. The pie chart displays the percentage in various colors on each slice. Tooltips showing the number of devices in that state are shown when you pause on the slice.
7 Status widgets Events widget The Events widget (Figure 87) displays the number of events by severity level for a specified time range as a stacked bar graph. FIGURE 87 Events widget The Events widget includes the following data: • Severity icon/widget title/event count — The color of the worst severity followed by the event count with that severity displays before the widget title. • Range list — Use to customize this widget to display a specific time range.
Status widgets 7 The x-axis represents the number of occurrences of a particular event severity during the selected time period. If you pause on a bar, a tooltip shows the number of events with that severity level during the selected time period. Also, for each severity, the cumulative number of traps, application events, and security events is reported next to the horizontal bar. If Syslog messages are included, then they are included in the count.
7 Status widgets Host Adapter Inventory widget The Host Adapter Inventory widget (Figure 88) displays the host adapter products inventory as stacked bar graphs. FIGURE 88 Host Adapter Inventory widget The Host Adapter Inventory widget includes the following data: • Severity icon/Host product count/widget title — The color of the worst severity and the Host product count with that severity displays before the widget title. • Group By list — Use to customize this widget to display a specific grouping.
Status widgets 7 • Zoom in on an area of the widget by dragging the mouse (upper left corner to lower right corner) to select one or more bars. NOTE If the ratio between the longest and shortest bar reaches 5000:1, you should maximize the widget prior to using zoom. To return the widget to its original state, reverse the selection (drag from lower right corner to upper left corner).
7 Status widgets • Color legend — Displays the color legend below the bar chart. - Green — Reachable: IP product is online and accessible by IP (ICMP/TCP) and SNMP. - Orange — Degraded Link: IP product is accessible by IP (ICMP/TCP); however, it is not accessible by SNMP. - Maroon — Not Reachable: IP product is not online and not accessible by IP (ICMP/TCP). • Time Scope — The time scope.
Status widgets 7 IP Status widget The IP Status widget (Figure 90) displays the device status as a pie chart. FIGURE 90 IP Status widget The IP Status widget includes the following data: • Severity icon/product count/widget title — The color of the worst status followed by the product count with that status displays before the widget title. • Pie chart — The device status as a percentage of the total number of devices. The pie chart displays the percentage in various colors on each slice.
7 Status widgets Accessing additional data from the IP Status widget Double-click a section in the IP Status widget to navigate to the IP Products - Status dialog box (where Status is the status of the section you selected). For more information, refer to “Viewing additional IP product data” on page 232 NOTE It takes a few moments to populate newly discovered products in the IP Products - Status dialog box (where Status is the section of the widget you selected). Viewing additional IP product data 1.
Fabric Watch widgets 7 Status widget The Status widget (Figure 91) displays the number of products managed and the number of events within the selected event time range, as well as various IP management processes and their current state. FIGURE 91 Status widget The Status widget displays the following items for each product license: • • • • • • • • SAN Physical Switches — The number of discovered physical SAN switches. Hosts — The number of managed hosts.
7 Fabric Watch widgets Out of Range Violations widget The Out of Range Violations widget (Figure 92) displays the number of violations for each Fabric Watch category, and the number of network objects (such as ports, trunks, and switches) for Network OS devices with the Fabric Watch violation based on the selected fabric and a specified time range. By default, this widget refreshes every minute.
Fabric Watch widgets 7 • Violation Count — The total number of Fabric Watch rule violations for each category. Always displays whether or not there is a violation. • Network Object Count — The number and network object type (such as switch, virtual machine, port, trunk, and so on) with a Fabric Watch violation for each category. Always displays whether or not there is a violation. • Refreshed — The time of the last update for the widget.
7 Fabric Watch widgets • Connected_Port_Link (where Connected_Port_Link is Connected Port, Initiator, or Target) — Displays one of the following: - Connected Port — The ISL or IFL port on the connected device. Click to launch the switch port properties dialog box. - Initiator — The initiator port on the connected device. Click to launch the device properties dialog box. - Target — The target port on the connected device. Click to launch the device properties dialog box.
Performance monitors 7 • To display data for a specific fabric or group, refer to “Setting the network scope” on page 220. • To display data for a specific duration, refer to “Setting the data display time frame” on page 222. • Sort the contents by clicking the column header. Click the same column header again to reverse the sort order. Accessing additional data from the widget • Right-click a row in the widget to access the shortcut menu available for the associated device.
7 Performance monitors TABLE 23 Preconfigure performance monitors Monitor title Description Data collectors Top Port Receive EOF Table view of the received end-of-frames measure All SAN TE port collector Top Port Runtime Errors Table view of the runtime errors measure All SAN TE port collector Top Port Sync Losses Table view of the top port synchronization losses. There are four versions of this monitor based on the type of port: All ports, initiator ports, ISL ports, and Target ports.
Performance monitors 7 4. Click OK. Top Port Alignment Errors monitor The Top Port Alignment Errors performance monitor displays the top ports with alignmenet errors in a table. The Top Port Alignment Errors performance monitor includes the following data: • Threshold icon/object count/monitor title — The color associated with the threshold and number of objects within that threshold displays next to the monitor title. • Port — The port affected by this monitor.
7 Performance monitors Top Port C3 Discards monitor The Top Port C3 Discards monitor (Figure 94) displays the top ports with Class 3 frames discarded in a table. There are four port widgets: All, ISL, Initiator, and Target. FIGURE 94 Top Port C3 Discards monitor The Top Port C3 Discards monitor includes the following data: • Severity icon/monitor title — The worst severity of the data based on the error count shown next to the monitor title. • Port — The port affected by this monitor.
Performance monitors 7 To customize the monitor to display data by a selected time frame as well as customize the display options, refer to “Editing a preconfigured performance monitor” on page 263. Accessing additional data from the Top Port C3 Discards monitor • Right-click a row in the monitor to access the shortcut menu available for the associated device. • Double-click a row to navigate to the Historical Graphs/Tables dialog box. For more information, refer to “Performance Data” on page 969.
7 Performance monitors • C3 Discards RX TO — The number (error count) of Class 3 frames received at this port and discarded at the transmission port due to timeout errors for the duration specified in the monitor. • • • • • • • Product — The product affected by this monitor. Type — The type of port (for example, U-Port). Identifier — The port identifier. Port Number — The port number. State — The port state (for example, Enabled). Status — The port status (for example, Up).
Performance monitors 7 • Severity icon/monitor title — The worst severity of the data based on the error count shown next to the monitor title. • Port — The port affected by this monitor. • Connected_Port_Link (where Connected_Port_Link is Connected Port, Initiator, or Target) — Displays one of the following: - Connected Port — The ISL or IFL port on the connected device. Click to launch the switch port properties dialog box. - Initiator — The initiator port on the connected device.
7 Performance monitors Top Port Discards monitor The Top Port Discards monitor (Figure 97) displays the top ports with receive and transmit discards in a table. FIGURE 97 Top Port Discards monitor The Top Port Discards monitor includes the following data: • Severity icon/monitor title — The worst severity of the data based on the error count shown next to the monitor title. • Port — The port affected by this monitor.
Performance monitors 7 • Status — The port status (for example, Up). • Refreshed — The time of the last update for the monitor. To customize the monitor to display data by a selected time frame as well as customize the display options, refer to “Editing a preconfigured performance monitor” on page 263. Accessing additional data from the Top Port Discards monitor • Right-click a row in the monitor to access the shortcut menu available for the associated device.
7 Performance monitors • Encode Error Out/sec — The number (error rate) of encoding errors outside of frames per second for the duration specified in the monitor. • Encode Error Out — The number (error count) of encoding errors outside of frames for the duration specified in the monitor. • • • • • • • Product — The product affected by this monitor. Type — The type of port (for example, U-Port). Identifier — The port identifier. Port Number — The port number.
Performance monitors 7 The Top Port Errors monitor includes the following data: • Severity icon/monitor title — The worst severity of the data based on the error count shown next to the monitor title. • Port — The port affected by this monitor. • Connected_Port_Link (where Connected_Port_Link is Connected Port, Initiator, or Target) — Displays one of the following: - Connected Port — The ISL or IFL port on the connected device. Click to launch the switch port properties dialog box.
7 Performance monitors Top Port Overflow Errors monitor The Top Port Overflow Errors performance monitor (Figure 100) displays the top ports with overflow erros in a table. FIGURE 100 Top Port Overflow Errors performance monitor The Top Port Overflow Errors performance monitor includes the following data: • Threshold icon/object count/monitor title — The color associated with the threshold and number of objects within that threshold displays next to the monitor title.
Performance monitors 7 To edit a port performance monitor, refer to “Editing a preconfigured performance monitor” on page 263. Top Port Receive EOF monitor The Top Port Receive EOF performance monitor displays the top ports with received end-of-frames in a table. The Top Port Receive EOF performance monitor includes the following data: • Threshold icon/object count/monitor title — The color associated with the threshold and number of objects within that threshold displays next to the monitor title.
7 Performance monitors • Connected_Port_Link (where Connected_Port_Link is Connected Port, Initiator, or Target) — Displays one of the following: - Connected Port — The ISL or IFL port on the connected device. Click to launch the switch port properties dialog box. - Initiator — The initiator port on the connected device. Click to launch the device properties dialog box. - Target — The target port on the connected device. Click to launch the device properties dialog box.
Performance monitors 7 • Severity icon/monitor title — The color of the worst severity of the data shown next to the monitor title. • Port — The port affected by this monitor. • Connected_Port_Link (where Connected_Port_Link is Connected Port, Initiator, or Target) — Displays one of the following: • • • • • • • • • - Connected Port — The ISL or IFL port on the connected device. Click to launch the switch port properties dialog box. - Initiator — The initiator port on the connected device.
7 Performance monitors • Connected_Port_Link (where Connected_Port_Link is Connected Port, Initiator, or Target) — Displays one of the following: - Connected Port — The ISL or IFL port on the connected device. Click to launch the switch port properties dialog box. - Initiator — The initiator port on the connected device. Click to launch the device properties dialog box. - Target — The target port on the connected device. Click to launch the device properties dialog box.
Performance monitors 7 • Severity icon/monitor title — Displays the worst severity of the data shown next to the monitor title. NOTE The Top Port Traffic widget displays the threshold colors based on the port speed. Click edit icon of the widget to customize the threshold values. • Port — The port affected by this monitor.
7 Performance monitors • Connected_Port_Link (where Connected_Port_Link is Connected Port, Initiator, or Target) — Displays one of the following: - Connected Port — The ISL or IFL port on the connected device. Click to launch the switch port properties dialog box. - Initiator — The initiator port on the connected device. Click to launch the device properties dialog box. - Target — The target port on the connected device. Click to launch the device properties dialog box.
Performance monitors 7 • Connected_Port_Link (where Connected_Port_Link is Connected Port, Initiator, or Target) — Displays one of the following: • • • • • • • • • - Connected Port — The ISL or IFL port on the connected device. Click to launch the switch port properties dialog box. - Initiator — The initiator port on the connected device. Click to launch the device properties dialog box. - Target — The target port on the connected device. Click to launch the device properties dialog box.
7 Performance monitors Bottom Port Utilization Percentage monitor The Bottom Port Utilization Percentage monitor (Figure 104) displays the bottom port utilization percentages in a table. FIGURE 104 Bottom Port Utilization Percentage monitor The Top Port Utilization Percentage monitor includes the following data: • Severity icon/monitor title — The worst severity of the data shown next to the monitor title. • Port — The port affected by this monitor.
Performance monitors 7 Accessing additional data from the Top Port Utilization monitor • Right-click a row in the monitor to access the shortcut menu available for the associated device. For more information about shortcut menus, refer to “Application menus” on page 1261. • Double-click a row to navigate to the Historical Graphs/Tables dialog box. For more information, refer to “Performance Data” on page 969.
7 Performance monitors • Contact — A contact name for the product. • Refreshed — The time of the last update for the monitor. To customize the monitor to display data by a selected time frame as well as customize the display options, refer to “Editing a preconfigured performance monitor” on page 263. Accessing additional data from the Top Product CPU Utilization monitor • Right-click a row in the monitor to access the shortcut menu available for the associated device.
Performance monitors • • • • • • • 7 Serial # — The serial number of the product. Model — The product model. Port Count — The number of ports on the product. Firmware — The firmware level running on the product. Location — The location of the product. Contact — A contact name for the product. Refreshed — The time of the last update for the monitor.
7 Performance monitors • • • • • • • • • • • • • Max — The maximum value of the measure in the specified time range. Fabric — The fabric to which the device belongs. Product Type — The type of product (for example, switch). State — The product state (for example, Offline). Status — The product status (for example, Reachable). Tag — The product tag. Serial # — The serial number of the product. Model — The product model. Port Count — The number of ports on the product.
Performance monitors 7 • Severity icon/temperature/monitor title — The worst severity of the data and the temperature displays next to the monitor title. • • • • • • • • • • • • • • • • Product — The product affected by this monitor. Min — The minimum value of the measure in the specified time range. Temperature — The top temperatures. Max — The maximum value of the measure in the specified time range. Fabric — The fabric to which the device belongs.
7 Performance monitors Top Products with Unused Ports monitor The Top Products with Unused Ports monitor (Figure 105) displays the top products with ports not in use in a table. FIGURE 109 Top Product CPU Utilization monitor The Top Products with Unused Ports monitor includes the following data: • • • • • • • • • • • • • • • • • Severity icon/monitor title — The worst severity of the data shown next to the monitor title. Product — The product affected by this monitor.
Performance monitors 7 Accessing additional data from the Top Product CPU Utilization monitor • Right-click a row in the monitor to access the shortcut menu available for the associated device. For more information about shortcut menus, refer to “Application menus” on page 1261. • Double-click a row to navigate to the Historical Graphs/Tables dialog box. For more information, refer to “Performance Data” on page 969.
7 User-defined performance monitors • To reset to the default color, click Reset. 5. Click OK to save your changes. User-defined performance monitors The Performance Dashboard makes it easy for you to customize performance monitors specific to your needs. You can define up to 100 performance monitors; however, you can only display up to 30 performance monitors at a time.
User-defined performance monitors 7 • Port - Common - IP - Port Utilization Percentage — The memory utilization percentage. Traffic — The traffic in mbps. CRC Errors — The number of CRC errors. Errors — The number of errors. Discards — The number of discarded frames. Wireless Dropped Events — The number of dropped events. MAC Errors — The number of MAC errors. Back Packets Received — The number of bad packets received. Tx Errors — The number of transmit errors.
7 User-defined performance monitors • • • • • • • • • • • • • Max — The maximum value of the measure in the specified time range. Fabric — The fabric to which the device belongs. Product Type — The type of product (for example, switch). State — The product state (for example, Offline). Status — The product status (for example, Reachable). Tag — The product tag. Serial # — The serial number of the product. Model — The product model. Port Count — The number of ports on the product.
User-defined performance monitors 7 • Threshold icon/object count/monitor title — The color associated with the threshold and number of objects within that threshold displays next to the monitor title. • Severity icon/monitor title — The worst severity of the data based on the error count or error rate shown next to the monitor title. • Port — The port affected by this monitor.
7 User-defined performance monitors FIGURE 112 Distribution performance monitor example The distribution performance monitor includes the following data: • Monitor title — The user-defined monitor title. • Number of Products/Ports (y-axis) — The y-axis always displays a numbered range (zero to the maximum number of objects) for the products or ports affected by the selected measure. • Measure_Type (x-axis) — The x-axis display depends on the Measure_Type you selected for this monitor.
User-defined performance monitors 7 Accessing additional data from the Distribution monitors • Place the cursor on a bar in the graph to display the number of products included in the count for the selected bar. For example, the tooltip “(Data Item 3, 22.6-33.8) = 6” means that there are six products within the third percentage range (displays the temperatures within the percentage range) for the selected measure (product temperature).
7 User-defined performance monitors To configure a time series performance monitor, refer to “Configuring a user-defined product performance monitor” on page 270 or “Configuring a user-defined port performance monitor” on page 273. Top sFlows performance monitors The top sFlows performance monitors display the top sFlow measures based on available flow data in a table.
User-defined performance monitors 7 • Time Series — Select to monitor a selected measure for a range of time and specified target. 7. Select the product measure for the monitor in the Measure area: • • • • • • • • • Memory Utilization Percentage CPU Utilization Percentage Temperature Fan Speed Response Time System Up Time Ports Not In Use Ping Packet Loss Percentage AP Client Count (not available for Time Series monitors) 8.
7 User-defined performance monitors • To specify a color based on values of red, green, and blue, click the RGB tab. Specify the values for red (0 through 255), green (0 through 255), blue (0 through 255), and alpha (0 through 255). • To specify a color based on values of cyan, magenta, yellow, and black, click the CMYK tab. Specify the values for cyan (0 through 255), magenta (0 through 255), yellow (0 through 255), black (0 through 255), and alpha (0 through 255).
User-defined performance monitors 7 8. Click Add beneath the Targets table. The Performance Dashboard Monitor Targets dialog box displays. Depending on the type of measure you select, you can add IP products/ports to the list of targets. If you selected a product measure, continue with step 9. If you selected an IP port measure, continue with step 9. 9. Click the IP tab. 10. Select IP targets from the Available IP Sources list. 11.
7 User-defined performance monitors Common • Port Utilization Percentage • Traffic • CRC Errors 7. • IP • • Errors Discards Wireless • Dropped Events • MAC Errors • Back Packets Received • Tx Errors (Top N and Bottom N monitors only) Select the number of ports to include in a selected measure by entering a number in the For Top N, Bottom N Monitors, N= text box. Valid values are from 1 through 25. The default is 10. 8.
User-defined performance monitors 7 • To specify a color based on values of cyan, magenta, yellow, and black, click the CMYK tab. Specify the values for cyan (0 through 255), magenta (0 through 255), yellow (0 through 255), black (0 through 255), and alpha (0 through 255). • To reset to the default color, click Reset. 10. (Time series monitors only) Add targets for the monitor by clicking Add and completing the steps in “Adding targets to a user-defined performance monitor” on page 272.
7 User-defined performance monitors Valid values are from 1 through 25. The default is 10. 7. Configure the monitor to show only values greater than or less than a specified value by completing the following steps. a. Select the Show values check box. b. Select greater than or less than from the list. c. Enter a value in the field. 8. Add targets for the monitor by clicking Add and completing the steps in “Adding targets to a user-defined performance monitor” on page 272. 9.
User-defined performance monitors • • • • • • • • • • • 7 Fabric — The fabric to which the device belongs. Product Type — The type of product (for example, switch). State — The product state (for example, Offline). Status — The product status (for example, Reachable). Tag — The product tag. Serial # — The serial number of the product. Model — The product model. Port Count — The number of ports on the product. Firmware — The firmware level running on the product. Location — The location of the product.
7 User-defined performance monitors • Port Number — The port number. • State — The port state (for example, Enabled). • Status — The port status (for example, Up). 3. Click Close. Configuring a monitor from a performance graph 1. Configure the performance graph. To configure a real-time performance graph, refer to “Monitoring real-time performance” on page 983. To configure a historical performance graph, refer to “Performance Data” on page 969. 2.
Chapter 8 View Management In this chapter • IP tab overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Icon legend. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Customizing the main window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Product List customization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Search . . . . . . . . . . . . .
8 IP tab overview IP tab overview The IP tab displays the Product List, Topology Map, Master Log, and Minimap. You can change the default size of the display by placing the cursor on the divider until a double arrow displays. Click and drag the adjoining divider to resize the window. You can also show or hide an area by clicking the left or right arrow on the divider. The following graphic illustrates the various areas, and descriptions of them are listed below. NOTE Some areas may be hidden by default.
IP tab overview 8 6. Topology Map toolbar — Provides tools for viewing the Topology Map as well as exporting the Topology Map as an image. Does not display until you discover a device or network. For more information, refer to “Topology Map toolbar” on page 283. 7. Product List — Lists the products discovered in the Management application. For more information, refer to “IP Product List” on page 284. 8. Topology Map — Displays the topology, including discovered and monitored devices and connections.
8 IP tab overview 11. Legend — Use to view the topology legend. For more information, refer to “Topology map elements” on page 315. 12. Product List Search — Use to search for a device in the product list. 13. Help — Displays the Online Help. Product List toolbar This toolbar is located at the top of the product list and provides lists, links, and buttons to perform various functions. The items on this toolbar vary based on what you select from the Type list.
IP tab overview 8 Host Product List toolbar The Port Display buttons are located at the top right of the Product List and enable you to configure how ports display. You have the option of viewing connected (or occupied) product ports, unoccupied product ports, or attached ports. Not enabled until you discover a fabric or host. NOTE Occupied/connected ports are those that originate from a device, such as a switch. Attached ports are ports of the target devices that are connected to the originating device.
8 IP tab overview 7. Reset zoom list — Use to reset the zoom (Actual Size, Fit Content, 25%, 50%, 75%, 100%, 125%, 150%, 200%, or 500%) of the Topology Map. 8. Zoom In icon — Use to zoom in on the Topology Map. Host topology map toolbar The Host Topology map toolbar is located at the top right side of the View window and provides tools to export the topology, to zoom in and out of the Topology Map, collapse and expand groups, and fit the topology to the window. Not enabled until you discover a host.
IP tab overview 8 • Status — Displays the status for the produc, such as Reachable, Marginal, Degraded Link, or Not Reachable. • • • • • • • • • • State (Ethernet Fabrics only) — Displays the Ethernet Fabric state, such as online or offline. Vendor — Displays the name of the product’s vendor. Model — Displays the model number of the product. Port Count — Displays the number of ports on the product. Firmware — Displays the firmware version of the product.
8 IP tab overview FIGURE 121 Topology Map Topology Map functions • Two-way selection — Select an icon on the topology map and that device is highlighted in the Product List and vice versa. For more information about icons, refer to “Icon legend” on page 290. • Node/Device double-click — Double-click a node (subnet) to display the devices beneath it. Double-click a device to display the Properties dialog box for the selected device.
IP tab overview TABLE 26 8 Topology keyboard shortcuts Keyboard Shortcut Description Control + , Launch the Topology Display dialog box. Right Arrow Move the selection to the node on the right (if available). Left Arrow Move the selection to the node on the left (if available). Up Arrow Move the selection to the node above the current selection (if available). Down Arrow Move the selection to the node that is below the current selection (if available).
8 IP tab overview • • • • • • First Event Product Time — The time and date the event first occurred on the product. Last Event Product Time — The time and date the event last occurred on the product. First Event Server Time — The time and date the event first occurred on the server. Audit — The audit of the event. Virtual Fabric ID — The VFID of the product on which the event occurred. Zone Alias — Displays the zone alias of the product or port.
IP tab overview 8 Resizing the Minimap On an anchored Minimap, place the cursor on the left border of the Minimap until a double-pointed arrow displays. Click and drag the adjoining divider. On a floating Minimap, place the cursor on a border of the Minimap until a double-pointed arrow displays. Click and drag to change the window size. Status bar The status bar displays at the bottom of the main window. The status bar provides a variety of information about the SAN and the application.
8 Icon legend 7. Fabric Status — Displays the state of the fabric that is least operational, based on ISL status. The possible states are: operational, unknown, degraded or failed. Select a product or fabric from the Connectivity Map or Product List and click this icon to open the related Fabric Log (only available for persisted fabrics). 8. Configuration Deviation Status (IronWare and Network OS products only) — Displays whether or not product’s have deviated from their baseline configuration.
Icon legend 8 TABLE 27 Icon Description Icon Description VLAN Wireless Access Point Wireless Controller VDX Switch (L2) VCS fabric Unlicensed VCS fabric VDX Router (L3-enabled) IP Subnet Layer 2 Cloud Unmanaged Product Third-Party Product Host product icons The following table lists the manageable Host product icons that display on the topology. Fabric OS manageable devices display with blue icons. Unmanageable devices display with gray icons.
8 Icon legend IP group icons The following table lists the manageable IP product group icons that display on the topology. TABLE 29 Icon Description Icon Description Switch Group, Product Group IP port icons The following table lists the port icons that display in the Product List. TABLE 30 Icon Description IP Port Virtual IP Port IP Port Group IP product status icons The following table lists the product status icons that display on the topology.
Customizing the main window 8 TABLE 32 Event Icon Description Emergency Alert Critical Error Warning Notice Informational Debug Customizing the main window You can customize the main window to display only the data you need by displaying different levels of detail on the Connectivity Map (topology) or Product List. Zooming in and out of the Connectivity Map You can zoom in or out of the Connectivity Map to see products and ports.
8 Customizing the main window Zooming out To zoom out of the Connectivity Map, use one of the following methods: • Click the zoom-out icon ( ) on the Connectivity Map toolbar. • Press CTRL and the minus sign on the number pad on the keyboard. Exporting the topology You can save the topology to an image (PNG format). 1. Click Export in the toolbar. The Export Topology To PNG File dialog box displays. 2. Browse to the directory where you want to export the image. 3.
Customizing the main window 8 FIGURE 125 Customize Columns dialog box 2. Choose from the following options: • Select the check box to display a column. OR Select the column name and click Show. • Clear the check box to hide a column. OR Select the column name and click Hide. • Click Select All to select all check boxes. • Click Deselect All to clear all check boxes. • Click Restore Defaults to restore the table to the original settings. 3. Click OK.
8 Customizing the main window Resizing the columns You can resize a single column or all columns in the table. To resize a single column, right-click the column header and select Size Column to Fit or Table > Size Column to Fit. To resize all columns in the table, right-click anywhere in the table and select Size All Columns to Fit or Table > Size All Columns to Fit. Sorting table information To sort the table by a single column, click the column header.
Product List customization 8 Searching for information in a table You can search for information in the table by any of the values found in the table. 1. Right-click anywhere in the table and select Table > Search. The focus moves to the Search field. FIGURE 126 Search field 2. Enter all or part of the search text in the Search field and press Enter. The first instance is highlighted in the table. 3. Press Enter to go to the next instance of the search text.
8 Product List customization 1. Right-click any column heading on the Product List and select Add Column. The Add Property dialog box displays. 2. Enter a label and description for the property. The label must be unique and can be up to 30 characters. The description can be up to 126 characters. 3. Select the property type from the Type list. Options include: Product or Port. 4. Click OK.
Search 8 The column you selected is deleted from the Product List as well as the Properties dialog box. Search You can search for a objects by text or regular expression. • Text — Enter a text string in the search text box. This search is case sensitive. For example, if you are searching for a device in the Product List, you can enter the first five characters in a device name. All products in the Product List that contain the search text display highlighted.
8 Search 1. Enter your search criteria in the search field. NOTE To search for a device, the device must be discovered and display in the topology. 2. Choose one of the following options: • Select Text from the search list and enter a text string in the search text box. This search is case sensitive. • Select Regular Expression from the search list and enter a Unicode regular expression in the search text box. This search is case insensitive 3. Press Enter or click the search icon.
Address Finder 8 Searching for an exact match To search for an exact match, complete the following steps. 1. Choose one of the following options: • Select Text from the search list. • Select Regular Expression from the search list. 2. Enter your search criteria in the search field. • Text — Enter a text string in the search text box. This search is case sensitive. For example, you can enter the first five characters in a device name.
8 Address Finder If a workstation is connected to a third-party device, and that device is connected to a IronWare or Network OS device, then Address Finder should be able to report the downstream port from which that traffic is coming (that is, the port to which the third-party device is connected), as long as the workstation is sending traffic that passes through the IronWare or Network OS device. This directional information indicates which device interface can be used to reach the target MAC address.
Address Finder 8 3. Select the IP Address option and enter the IP address (IPv4 or IPv6 format) that you want to find. NOTE IPv6 address search is only supported on Ethernet router products running IronWare OS 5.4 or later. NOTE IPv6 address search is not supported on Network OS products. 4. Select the Find only in the selected products check box to limit the search to selected products.
8 Address Finder 9. Click Attached Port Properties to launch the Port Properties dialog box for the device. NOTE The Attached Port Properties button is only supported for Network OS devices. The Ports tab of the VCS Properties dialog box displays with the attached ports highlighted. 10. Click Close to close the Address Finder dialog box. Finding MAC addresses NOTE MAC address search is supported on Network OS products running 2.1.0 or later.
Address Finder 8 NOTE Wildcard character search is not supported on Network OS products. 4. Select the Find only in the selected products check box to limit the search to selected products. When you access Address Finder from the Element Manager interface (refer to “Element Manager interface overview” on page 725), the Find only in the selected products check box is selected by default to limit the search to the selected Ethernet router device. 5.
8 IP topology view manager If errors occur during the search, the Errors button becomes enabled. Click Errors to display the error messages. Error messages are grouped by the error description (Reason). You may need to scroll down to read the entire error message. Click OK when you have finished reading the message. Make any necessary corrections in the network before repeating the search. 8. Click Port Properties to launch the Port Properties dialog box for the device. 9.
Network Objects view 8 • VLAN Topology — For more information, refer to “VLAN Topology view” on page 310. • Host Topology — For more information, refer to “Host Topology view” on page 313. Network Objects view The Network Objects view displays a list of discovered products in a table (Product List). This view allows you to manage user authentications and permissions on discovered devices.
8 Network Objects view Filtering devices in the Network Objects Product List To filter specific devices from the Network Objects Product List, complete the following steps. 1. Select Network Objects from the view list on the Product List toolbar. 2. Click Filter. The Product Filter dialog box displays. Only the categories or objects listed under the Selected Categories list display on the Network Objects Product List.
IP Topology view 8 IP Topology view The IP Topology view displays a map of the devices on your network. To display the topology map for IP, you must have the IP - Main Display - IP privilege. For more information about privileges, refer to “User Privileges” on page 1283. For more information about the components and customization of the topology map, refer to the following sections: • “IP topology map components” on page 315. • “Topology map elements” on page 315. • “Topology map layout” on page 317.
8 Ethernet Fabrics view Ethernet Fabrics view The Ethernet Fabrics view displays a map of the traffic for VCS devices on your network. To view the fabric members and TRILL (Transparent Interconnection of Lots of Links) connections for a fabric, double-click the fabric in the Product List. To display the topology map for Ethernet Fabrics, you must have the Main Display - Ethernet Fabric privilege. For more information about privileges, refer to “User Privileges” on page 1283.
VLAN Topology view 8 • The snIfStpTable MIB table (OID.1.3.6.1.4.1.1991.1.1.3.5.2) is enabled on the device and has either STP or RSTP configured. This MIB is not supported on third-party products. Viewing STP/RSTP topology To view this topology map, complete the following steps. 1. Select VLAN Topology from the view list on the Product List toolbar. Pause on the STP button. A tool tip appears, indicating whether STP is on or off. 2. If STP is off, click STP to turn it on. 3.
8 VLAN Topology view TABLE 33 STP/RSTP Topology map elements Element Description # (U) # (T) # (D) The port or interface number used to create the link and one of the following: • (U) — Untagged port • (T) — Tagged port • (D) — Dual-mode port tool tips Link tool tips — identifies the devices at each end of the link to help you locate the devices on the map. Node tool tips — identifies the device name, IP address, and bridge ID of the node.
Host Topology view 8 9. Click Save. E-mailing an STP/RSTP Report To export an STP/RSTP report, complete the following steps. 1. Select VLAN Topology from the view list on the Product List toolbar. Mouse over the STP button. A tool tip appears, indicating whether STP is on or off. 2. If STP is off, click STP to turn it on. 3. Select a VLAN or PVLAN from the VLAN Product List. 4. Right-click a device on the topology map and select STP Report from the list. The STP/RSTP Report displays. 5. Click E-mail. 6.
8 Host Topology view • • • • IP Address. Displays the IP address (IPv4 or IPv6 format) of the product. • • • • • • • • • • • • • • • Port #. Displays the number of the port. Location. Displays the physical location of the product. This field is editable at the fabric level. Model. Displays the model number of the product. Name. Displays the name of the product. This field is editable at the fabric, device, and port level. Port Count. Displays the number of ports on the product. Port Type.
IP topology map components 8 IP topology map components Topology maps are divided into three sections: • Product List — The top left pane displays a list of all devices (topology tree) in your AOR. Devices display in topology groups. The Management application has a Search tool that you can use to find a device quickly. (Refer to “Using the Search tool” on page 53 for more information.
8 IP topology map components Table 34 displays the elements included in the topology.
IP topology map components 8 • Layer 2 Clouds — This node displays as a blue cloud. When two or more devices with FDP or LLDP enabled connect to a device or network without FDP or LLDP capability, the L2 cloud icon is displayed to represent the connection between the device types. This icon means that IronWare OS or Network OS devices are not directly connected to each other and each IronWare OS or Network OS device does not have Layer 2 information from other devices.
8 IP topology map components The following examples show the differences between the layouts. They may or may not match the map drawn for your network. Also, some of the examples may look alike; however, the layouts may look different on networks with more devices. Organic The Organic layout distributes the nodes evenly, makes connection lengths uniform, minimizes crisscrossing of connections, and tries to prevent nodes from touching each other.
IP topology map components 8 Orthogonal (Merge Lines) The Orthogonal (Merge Lines) layout displays the nodes in a concise tree-like structure using vertical and horizontal line segments. Hierarchical The Hierarchical layout is best for a complex map. This layout might have a start point and end point, with some overall flow between those points.
8 IP topology map components Circular The Circular layout distributes all nodes in a circle, with equal spacing between each neighbor node. Free Form This layout is the one you customize by repositioning the nodes on the map. Selecting a topology map layout To change the topology layout, complete the following steps. 1. Select one of the following view types from the view list on the Product List toolbar. • • • • L2 Topology Ethernet Fabrics IP Topology VLAN Topology 2.
IP topology map components 8 FIGURE 130 Topology Display dialog box 3. Select one of the following topology layouts in the Layout area. • • • • • • Organic Orthogonal Orthogonal (Merge Lines) Hierarchical Circular Free Form 4. Click Recompute Layout Now. The Management application redraws the Topology Map. 5. Click OK on the Topology Display dialog box. Creating a customized layout You can create one customized layout for each group node in each topology view.
8 IP topology map components a. Use Ctrl + click to select one or more nodes or click in an empty part of the topology and drag a box around the nodes you want to move. b. Select one of the highlighted nodes and drag the selected nodes to a new position on the map. 3. Repeat step 2 until you have repositioned all nodes. Navigation to another view topology or tab or exiting the application automatically saves your changes.
IP topology map components 8 Device_One_IP_Address|Interface_Name Device_Two_IP_Address|Interface_Name where Device_One_IP_Address is the IP address for the device at one end of the link, Interface_Name the is the exact format returned by the ifName MIB variable for the device, and Device_Two_IP_Address is the IP address for the device at the other end of the link. 3. Save and close the topology_data.txt file. The customized topology links display during the next L2 neighbor collection for the devices.
8 IP topology map components • To specify a color based on values of cyan, magenta, yellow, and black, click the CMYK tab. Specify the values for cyan, magenta, yellow, black, and alpha (0 to 255). c. Click OK on the Choose a Color dialog box. 3. Add an image to the background by selecting an image from the Image list. To import an image, refer to “Adding a background image to a map” on page 324. 4.
IP topology map components 8 3. Browse to the map image. 4. Click Open. The imported image displays in the Image list. 5. Set the background image mode by selecting one of the following from the Mode list: • Dynamic — Select when the background image is considered to be part of the displayed contents and not a decoration. In this mode, an object on a specific point of the image, stays on that specific point during zooming or scrolling on the topology.
8 IP topology map components 2. Browse to the location where you want to save the map image. 3. Enter a name for the map in the File Name field. 4. Select the export file type in the File of Type list. Options include: PNG, GIF, JPG, BMP, PDF, and EMF. 5. Click Save. Printing a map To print a Topology Map, complete the following steps. 1. Click the Print icon on the Topology Map tool bar. The Print dialog box displays. 2. To configure the page setup, click Page on the Print dialog box.
Port actions 8 m. Enter a footer in the Text field. n. Select a color for the footer from the Footer Color list. o. Select a color for the title from the Text Color list. p. Enter a title in the Text area. q. Enter the font size in the Font size field. r. Click OK on the Print Options dialog box. 6. Click Print. The Print dialog box displays. 7. Select a printer from the Name list. 8. Click OK on the Print dialog box. 9. Click the close (X) button on the Print dialog box.
8 Port actions Disabling port actions To disable port actions, complete the following steps. 1. Select one of the following view types from the view list on the Product List toolbar. • • • • • Network Object IP Topology L2 Topology Ethernet Fabrics VLAN Topology 2. Right-click the device in the Product List and select Properties. The Device_Name Properties dialog box displays. 3. Click the Port tab. 4. Select Disable from the Port Actions list. 5. Click OK to close the dialog box.
Port actions 8 Accessing performance monitoring To access performance monitoring dialog boxes, complete the following steps. 1. Select one of the following view types from the view list on the Product List toolbar. • • • • • Network Object IP Topology L2 Topology Ethernet Fabrics VLAN Topology 2. Right-click the device in the Product List and select Properties. The Device_Name Properties dialog box displays. 3. Click the Port tab. 4. Select one of the following from the Performance list.
8 330 Port actions Brocade Network Advisor IP User Manual 53-1003056-01
Chapter 9 MRP Topology In this chapter • MRP Topology overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Viewing a MRP Topology map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Viewing a MRP ring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Configuring the application to show a dashed line . . . . . . . . . . . . . . . . . . . • Selecting a topology map layout. . . . . . . . . . . . . . . .
9 Viewing a MRP Topology map You can use the CLI Configuration Manager to deploy MRP configurations to devices. You can also configure MRP using the device CLI. You can use the Element Manager to access the device or go directly to the device CLI. You must enable the MRP trap on the devices so that the Management application can monitor MRP ring status. For more information about MRP rings and configuration instructions, refer to your hardware’s configuration guide.
Viewing a MRP ring 9 When you select a device on the Topology Map, the application highlights the device in the Product List. Viewing a MRP ring To view a MRP ring, click a ring in the Product List. The selected ring displays in the Topology Map. FIGURE 133 MRP Topology dialog box MRP Topology maps are comprised of nodes (rings) and connections (devices). Table 35 displays the basic elements included in a MRP topology map.
9 Viewing a MRP ring TABLE 35 MRP Topology map elements Element Description The port is in a blocking state or discarding. link with block MRP is disabled on the port. link with solid black circle # or # / # The forwarding or receiving port number of slot/port number. To make the forwarding and receiving port number data visible on the map, you must enable Link Information Visibility (default is disabled) on the MRP Topology Options dialog box.
Configuring the application to show a dashed line • • • • • • 9 Options button. Use to configure topology options. Fit Window icon. Use to scale the map to fit within the Topology Map area. Actual Size icon. Use to scale the map to fit within the Topology Map area. Zoom In icon. Use to zoom in on the Topology Map. Zoom Out icon. Use to zoom out on the Topology Map. Export icon. Use to export the topology to a PNG file. For export instructions, refer to “Exporting the topology” on page 325. • Print icon.
9 Selecting a topology map layout • Organic The Organic layout distributes the nodes evenly, makes connection lengths uniform, minimizes criss-crossing of connections, and tries to prevent nodes from touching each other. • Hierarchical The Hierarchical layout is best for a complex map. This layout might have a start point and end point, with some overall flow between those points.
Selecting a topology map layout 9 • Self Organizing The Self Organizing layout distributes nodes and connections evenly on the display area in a linear layout. • Circular The Circular layout distributes all nodes in a circle, with equal spacing between each neighbor node.
9 Creating a customized layout • Saved This layout is the one you customized by repositioning the nodes on the map. If you have not customized the layout, this Saved option is disabled. Also, if you select the Saved Layout Preferred check box on the Topology Options dialog box, this layout takes precedence over the default layout. The Management application redraws the MRP Topology map. For more information about layout types, refer to “Topology map layout” on page 317.
Customizing the MRP Topology map 9 3. Repeat step 2 until you have repositioned all nodes. 4. Click Save on the MRP Topology map toolbar to retain the changes you made. Customizing the MRP Topology map To customize the MRP Topology map, complete the following steps. 1. Click Options on the MRP Topology map tool bar. The MRP Topology Options dialog box displays. FIGURE 134 Topology Options dialog box 2. Change the background color by completing the following steps: a.
9 Refreshing MRP Topology data 7. Click the Layout row and select the layout you want from the list. 8. Select the Saved Layout Preferred check box to set the customized layout as the default for the topology group. This parameter supersedes the Layout parameter. If you select this parameter, the Saved layout displays even if a different layout is indicated in the Layout parameter. 9. Click Close on the MRP Topology Options dialog box.
Viewing MRP properties • • • • • Ring Name — The MRP ring name. • • • • Secondary Port Type — The secondary port type (Regular or Tunnel). 9 Role — The role (Master or Member) of the device. Secondary Port — The secondary port of the device. Secondary Port Active — The port number receiving RHPs. Secondary Port State — The state (Pre-forwarding, Forwarding, Blocking, or Disabled) of the secondary port. State — Whether MRP is enabled or disabled on the device.
9 342 Viewing MRP properties Brocade Network Advisor IP User Manual 53-1003056-01
Chapter 10 Call Home In this chapter • Call Home overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Viewing Call Home configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Showing a Call Home center. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Hiding a Call Home center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Editing a Call Home center . . . . . . . . . . . . . . .
10 Call Home overview Call Home overview NOTE Call Home is supported on Windows systems for all modem and e-mail Call Home centers and is supported on UNIX for the e-mail Call Home centers. Call Home notification allows you to configure the Management application server to automatically send an e-mail alert or dial in to a support center to report system problems on specified devices (Fabric OS, IronWare, and Network OS switches, routers, and directors).
Viewing Call Home configurations 10 Call Home allows you to perform the following tasks: • Assign devices to and remove devices from the Call Home centers. • Define filters from the list of events generated by Fabric OS, IronWare, and Network OS devices. • Edit and remove filters available in the Call Home Event Filters table. • Apply filters to and remove filters from the devices individually or in groups.
10 Viewing Call Home configurations The Call Home dialog box contains the following fields and components: • Products List — Displays all discovered products. The list allows for multiple selections and manual sorting of columns. This list displays the following information: Product Icon — The status of the products’ manageability. Name — The name of the product. IP Address — The IP address (IPv4 or IPv6 format) of the product. Node WWN — The node world wide name of the product.
Viewing Call Home configurations 10 • Left arrow button (bottom) — Click to remove the selected event filter (refer to “Removing all event filter from a Call Home center” on page 362 or “Removing an event filter from a device” on page 363) from the selected Call Home center or product. Disabled when no event filter, product, or Call Home center is selected in the Call Home Centers list.
10 Showing a Call Home center Showing a Call Home center To show a Call Home center, complete the following steps. 1. Select Monitor > Event Notification > Call Home. The Call Home dialog box displays. 2. Click Show/Hide Centers (beneath the Call Home Centers list). The Centers dialog box displays with a predefined list of Call Home centers (Figure 136). FIGURE 136 Centers dialog box 3. Select the check boxes of the Call Home centers you want to display. Clear the check box to hide the Call Home center.
Editing a Call Home center 10 Editing a Call Home center To edit a Call Home center, select from the following procedures: • Editing the IBM Call Home center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Editing an e-mail Call Home center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Editing the EMC Call Home center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Editing the HP LAN Call Home center. . . . . . . . . . . . . . . . . . . . . . . . . .
10 Editing a Call Home center 8. Enter how often you want to retry the heartbeat interval in the Retry Interval field. The default is 10 seconds. 9. Enter the maximum number of retries in the Maximum Retries field. The default is 3. 10. Enter the primary phone number or extension of the Call Home center in the Call Home Center - Primary Connection field. 11. Enter the backup phone number or extension of the Call Home center in the Call Home Center - Backup Connection field. 12.
Editing a Call Home center 10 FIGURE 138 Configure Call Home Center dialog box (Brocade, IBM, NetApp, or Oracle E-mail option) 4. Make sure the Call Home center type you selected displays in the Call Home Centers list. If the Call Home center type is incorrect, select the correct type from the list. 5. Select the Enable check box to enable this Call Home center. 6. Enter your contact name in the Customer Details - Name field. 7. Enter your company name in the Customer Details - Company field. 8.
10 Editing a Call Home center 16. Enter an e-mail address in the E-mail Notification Settings - Send To Address field. For Brocade E-mail Call Home centers, enter callhomeemail@brocade.com. 17. Click Send Test to test the mail server. The selected Call Home center must be enabled to test the mail server. A faked event is generated and sent to the selected Call Home center. You must contact the Call Home center to verify that the event was received and in the correct format.
Editing a Call Home center - Source — Details about the product. Includes the following data: - Event Time Event Severity Event Reason Code FRU Code/Event Type Event Description Event Data — Information about the triggered event.
10 Editing a Call Home center Editing the EMC Call Home center To edit an EMC Call Home center, complete the following steps. 1. Select Monitor > Event Notification > Call Home. The Call Home dialog box displays. 2. Select the EMC Call Home center you want to edit in the Call Home Centers list. 3. Click Edit Centers (beneath the Call Home Centers list). The Configure Call Home Center dialog box displays (Figure 139). FIGURE 139 Configure Call Home Center dialog box (EMC option) 4.
Editing a Call Home center 10 13. Click OK. The Call Home dialog box displays with the Call Home center you edited highlighted in the Call Home Centers list. 14. Click OK to close the Call Home dialog box. Editing the HP LAN Call Home center To edit an HP LAN Call Home center, complete the following steps. 1. Select Monitor > Event Notification > Call Home. The Call Home dialog box displays. 2. Select the HP LAN Call Home center you want to edit in the Call Home Centers list. 3.
10 Enabling a Call Home center 8. Click Send Test to test the address. The selected Call Home center must be enabled to test the IP address. A faked event is generated and sent to the selected Call Home center. You must contact the Call Home center to verify that the event was received and in the correct format. NOTE The HP LAN Call Home alert displays the directory separation characters with a double backslash (\\) instead of a single backslash (\). 9. Click OK to close the “Test Event Sent” message.
Testing the Call Home center connection 10 Testing the Call Home center connection Once you add and enable a Call Home center, you should verify that Call Home is functional. To verify Call Home center functionality, complete the following steps. 1. Select Monitor > Event Notification > Call Home. 2. Click Edit Centers (beneath the Call Home Centers list). The Configure Call Home Center dialog box displays. 3. Select the Call Home center you want to check in the Call Home Centers list. 4.
10 Viewing Call Home status Viewing Call Home status You can view Call Home status from the main Management application window or from the Call Home Notification dialog box. The Management application enables you to view the Call Home status at a glance by providing a Call Home status icon on the status bar. Table 37 illustrates and describes the icons that indicate the current status of the Call Home function.
Assigning a device to the Call Home center 10 Assigning a device to the Call Home center Discovered devices (switches, routers, and directors) are not assigned to a corresponding Call Home center automatically. You must manually assign each device to a Call Home center before you use Call Home. To assign a device or multiple devices to a Call Home center, complete the following steps. 1. Select Monitor > Event Notification > Call Home. The Call Home dialog box displays. 2.
10 Defining an event filter 3. Click the left arrow button. A confirmation message displays. 4. Click OK. All devices assigned to the selected Call Home center display in the Products List. Any assigned filters are also removed. 5. Click OK to close the Call Home dialog box. Defining an event filter To define an event filter, complete the following steps. 1. Select Monitor > Event Notification > Call Home. The Call Home dialog box displays. 2. Click Add beneath the Call Home Event Filter list.
Assigning an event filter to a Call Home center 10 Assigning an event filter to a Call Home center Event filters allow Call Home center users to log in to a Management server and assign specific event filters to the devices. This limits the number of unnecessary or “acknowledge” events and improves the performance and effectiveness of the Call Home center. You can only select one event filter at a time; however, you can assign the same event filter to multiple devices or Call Home centers.
10 Overwriting an assigned event filter Overwriting an assigned event filter A device can only have one event filter at a time; therefore, when a new filter is applied to a device that already has a filter, you must confirm the new filter assignment. To overwrite an event filter, complete the following steps. 1. Select Monitor > Event Notification > Call Home. The Call Home dialog box displays. 2. Select the event filter you want to apply in the Call Home Event Filters list.
Removing an event filter from a device 10 Removing an event filter from a device To remove an event filter from a device, complete the following steps. 1. Select Monitor > Event Notification > Call Home. The Call Home dialog box displays. 2. Choose one of the following options in the Call Home Centers list: • Right-click a device to which the event filter is assigned and select Remove Filter. • Select an event filter assigned to a device and click the left arrow button.
10 364 Searching for an assigned event filter Brocade Network Advisor IP User Manual 53-1003056-01
Chapter 11 Third-party tools In this chapter • About third-party tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Starting third-party tools from the application . . . . . . . . . . . . . . . . . . . . . . • Launching a Telnet session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Launching HCM Agent. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Adding a tool . . . . . . . . . . . . . . . . . .
11 Launching a Telnet session 1. Select the device. 2. Use one of the following techniques: • Select Tools > Product Menu > Tool_Name. • Select Tools > Tool_Name. • Right-click the device, and select the tool from the menu. If the third-party tool is a web-based application, you must enter the IP address of the applications server as a parameter to be able to open the application.
Launching HCM Agent 11 1. Select a device. 2. Click the Element Manager icon on the toolbar. The Element Manager displays. Launching HCM Agent Use Fabric OS HCM Agent to enable and manage Fabric OS HBAs. You can open HCM Agent directly from the application. For more information about HCM Agent, refer to the HCM Agent Administrator’s Guide. For more information about Fabric OS HBAs, refer to the documentation for the specific device.
11 Entering the server IP address of a tool FIGURE 141 Define Tools dialog box 4. Type the tool’s name in the Tool Name field as you want it to appear on the Tools menu. 5. Type or browse to the path of the executable file in the Path field. 6. Type or browse to the path of the folder that you want to set as your working folder in the Working Folder field. 7. Click Add to add the tool. The Setup Tools dialog box displays with the new tool added to the Tools Menu Item table.
Adding an option to the Tools menu 11 NOTE You must click Edit before clicking OK; otherwise, your changes will be lost. 6. Click OK to save your work and close the Setup Tools dialog box. Adding an option to the Tools menu You can add third-party tools to the Tools menu which enables you to launch tools directly from the application. To add a option to the tools menu, complete the following steps. 1. Select Tools > Setup. The Setup Tools dialog box displays. 2. Click the Tools Menu tab.
11 Changing an option on the Tools menu The new tool displays in the Tool Menu Items table. NOTE You must click Add before clicking OK; otherwise, the new menu option is not created. 8. Click OK to save your work and close the Setup Tools dialog box. The tool you configured now displays on the Tools menu. Changing an option on the Tools menu You can edit parameters for third-party tools that display on the Tools menu. To edit a option to the tools menu, complete the following steps. 1.
Adding an option to a device’s shortcut menu 11 If the tool is not being utilized, no confirmation message displays. 5. Click Update to remove the tool. 6. Click OK to save your work and close the Setup Tools dialog box. Adding an option to a device’s shortcut menu You can add an option to a device’s shortcut menu. To add an option to the device’s shortcut menu, complete the following steps. 1. Select Tools > Setup. The Setup Tools dialog box displays. 2. Click the Product Menu tab.
11 Changing an option on a device’s shortcut menu 11. Click OK to save your work and close the Setup Tools dialog box. Changing an option on a device’s shortcut menu You can change the parameters for a tool that displays on a device’s shortcut menu. To edit an option to the device’s shortcut menu, complete the following steps. 1. Select Tools > Setup. The Setup Tools dialog box displays. 2. Click the Product Menu tab. The Product Popup Menu Items table displays all configured shortcut menu options. 3.
Removing an option from a device’s shortcut menu 11 Removing an option from a device’s shortcut menu You can remove a tool that displays on a device’s shortcut menu. To remove an option to the device’s shortcut menu, complete the following steps. 1. Select Tools > Setup. The Setup Tools dialog box displays. 2. Click the Product Menu tab. The Product Popup Menu Items table displays all configured menu options. 3. Select the menu item you want to remove in the Product Popup Menu Items table. 4.
11 374 Removing an option from a device’s shortcut menu Brocade Network Advisor IP User Manual 53-1003056-01
Chapter 12 Server Management Console In this chapter • Server Management Console overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Services tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Ports tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • AAA Settings tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Restore tab. . . .
12 Services tab Launching the SMC on Linux NOTE The Server Management Console is a graphical user interface and should be launched from the XConsole on Linux systems. Perform the following steps to launch the Server Management Console on Linux systems. 1. On the Management application server, go to the following directory: Install_Directory/bin 2. Type the following at the command line: .
Services tab 12 3. Review the following information for each available service. • • • • Name — The name of the server; for example, FTP Server or Database Server. Process Name — The name of the process; for example, postgres.exe (Database Server). Status — The status of the service; for example, started or stopped. Start Time — The date and time the service started. The Start Time for Service Location Protocol displays as ‘Not Available’. 4. Click Close to close the Server Management Console.
12 Services tab Starting all services NOTE The Start button restarts running services in addition to starting stopped services which causes client-server disconnect. To start all services, complete the following steps. 1. Launch the Server Management Console. 2. Click the Services tab. 3. Click Start to start all services. NOTE If the server is configured to use an external FTP server, the Server Management Console does not attempt to start the built-in FTP service. 4.
Ports tab 12 6. Select the database user name for which you want to change the password in the User Name field. Options include dcmadmin and dcmuser. Changing the dcmadmin password requires all Management application services, except for the database server, to be stopped and then re-started. Changing the dcmuser password requires all ODBC remote client sessions to be restarted. 7. Enter your current password in the Old Password field. 8.
12 AAA Settings tab AAA Settings tab Authentication enables you to configure an authentication server and establish authentication policies. You can configure the Management application to authenticate users against the local database (Management application server), an external server (RADIUS, LDAP, CAC or TACACS+), or a switch. Authentication is configured to the local database by default.
AAA Settings tab 12 3. Add or edit a Radius server by referring to “Configuring a Radius server” on page 381. 4. Rearrange the Radius servers in the table by selecting a server and click the Up or Down button to move it. 5. Delete a Radius server by selecting the server and click Delete. 6. Test the established active connection with the Radius server by clicking Test. Test attempts to contact the Radius server by issuing a ping command. 7.
12 AAA Settings tab 2. Enter the radius server’s IP address in the IP Address field. 3. Enter the TCP port, if necessary, used by the Radius server in the TCP Port field. Default is 1812. 4. Select the authentication policy (PAP or CHAP) from the Authentication Type field. Default is CHAP. 5. Enter the shared secret in the Shared Secret and Confirm Secret fields. 6.
AAA Settings tab 12 NOTE If the LDAP server’s IP address is entered in the Management application, the LDAP server’s hostname (if any) must still be known to the Management application host OS. The Management application server must be using a DNS server that knows the LDAP server’s hostname, or you must manually add the LDAP server’s hostname to the local hosts file (for Linux the file is located in /etc/hosts and for Windows the file is located in C:\Windows\System32\drivers\etc\hosts for Windows).
12 AAA Settings tab • Verifies user privileges on the Local database 8. Set secondary authentication by selecting one of the following options from the Secondary Authentication list: • Local Database • None 9. Set the fall back condition to secondary authentication by selecting one of the following options from the Switch to secondary authentication when list: • LDAP Servers Not Reachable • LDAP Authentication Failed • User Not Found in LDAP 10.
AAA Settings tab 12 3. Choose one of the following options: • Click Add. • Select an existing LDAP server and click Edit. The Add or Edit LDAP Server dialog box displays (Figure 145). FIGURE 145 Add or Edit LDAP server 4. Enter the LDAP server’s hostname in the Network address field. If DNS is not configured in your network, provide an IP address instead of the hostname. 5. Enable security by selecting the Security Enabled check box.
12 AAA Settings tab 3. Add or edit a TACACS+ server by referring to “Configuring a TACACS+ server” on page 386. 4. Rearrange the TACACS+ servers in the table by selecting a server and click the Up or Down button to move it. 5. Delete a TACACS+ server by selecting the server and click Delete. 6. Test the established active connection with the TACACS+ server by clicking Test. The Test Authentication dialog box displays. 7. Enter your user ID and password and click Test.
AAA Settings tab 12 FIGURE 146 Add or Edit TACACS+ Server 2. Enter the TACACS+ server’s hostname in the Network Address field. If DNS is not configured in your network, provide an IP address instead of the hostname. 3. Enter the TCP port used by the TACACS+ server in the TCP Port field. Default is 49. 4. Enter the shared secret in the Shared Secret and Confirm Secret fields. 5.
12 AAA Settings tab • Make sure to obtain and install the active client library on the client workstation. The active client library is not shipped with the Management application. • Make sure to log in to the Management application client using a smartcard. • Make sure that the Active Directory (AD) server you want to use is on the network that the Management application manages.
AAA Settings tab 12 5. Enter the password for the Management application service account configured on the AD server in the Password and Confirm Password fields. 6. Enter the Kerberos SPN in the Kerberos Service Principal Name field. The SPN name uses the following syntax: /, where hostname is the Management application server’s host name with domain name. For example: NetworkManagementSPN/DCM-VNext-65.JCB.COM 7.
12 AAA Settings tab • Local Database • None 8. Click Test. The Test Authentication dialog box displays. 9. Enter your user ID and password and click Test. Test verifies your user ID and password on the switch and verifies user privileges on the Management application server. 10. Click Apply to save the configuration. To display the authentication audit trail, refer to “Displaying the client authentication audit trail” on page 391. 11. Click Close to close the Server Management Console.
AAA Settings tab 12 To display the authentication audit trail, refer to “Displaying the client authentication audit trail” on page 391. 4. Click Close to close the Server Management Console. Configuring local database authentication Local database authentication enables you to authenticate a user account against the local database and the Management application server. To configure local database authentication, complete the following steps. 1. Select the AAA Settings tab. 2.
12 Restore tab Restore tab The Restore tab enables you to restore the application data files used by the Management application server. Restoring the database To restore application data files, you must know the path to the backup files. This path is configured from the Server > Options dialog box. For more information about backup, refer to “Server Data backup” on page 128. NOTE You cannot restore data from a previous version of the Management application.
HCM Upgrade tab 12 • Select the Partial option to exclude historical data and events from the database capture. • Select the Full option to include historical data and events from the database capture. NOTE It is recommended that you only capture the partial database. NOTE You should only capture the full database when you need to debug Historical Performance Management or Historical Events issues. 3.
12 SMI Agent Configuration Tool 1. Select the HCM Upgrade tab. FIGURE 147 HCM Upgrade tab 2. Click Browse to select the HCM installation folder location (for example, C:\Program Files\BROCADE\Adapter on Windows systems and /opt/brocade/adapter on Linux systems). 3. Click Upgrade. 4. Click Close. SMI Agent Configuration Tool The SMIA Configuration Tool enables you to configure SMI Agent settings, such as security, CIMOM, and certificate management.
SMI Agent Configuration Tool 12 Launching the SMIA configuration tool on Windows NOTE All Management application services must be running before you can log into the SMIA Configuration Tool. To start the Management application services, click Start on the Server Management Console dialog box. 1. Launch the Server Management Console from the Start menu on the Management application server. You can also drag the SMC icon onto your desktop as a short cut. 2.
12 SMI Agent Configuration Tool FIGURE 149 SMIA Configuration Tool dialog box Launching the SMIA configuration tool on Unix NOTE All Management application services must be running before you can log into the SMIA Configuration Tool. To start the Management application services, click Start on the Server Management Console dialog box. Perform the following steps to launch the Server Management Console on Unix systems. 1.
SMI Agent Configuration Tool 12 Launching a remote SMIA configuration tool To launch a remote SMIA configuration tool, complete the following steps. 1. Open a web browser and enter the IP address of the Management application server in the Address bar. If the web server port number does not use the default (443 if is SSL Enabled; otherwise, the default is 80), you must enter the web server port number in addition to the IP address. For example, IP_Address:Web_Server_Port_Number.
12 SMI Agent Configuration Tool By default, the Management application SMI Agent is configured to advertise itself as a Service Agent (SA). The advertised SLP template shows its location (IP address) and the WBEM Services it supports.
SMI Agent Configuration Tool 12 ,(RegisteredProfilesSupported=SNIA:SMI-S,DMTF:Profile Registration,SNIA:FC HBA,DMTF:LaunchInContext,SNIA:Fan,SNIA:Fabric,SNIA:Switch,DMTF:Role Based Authorization,SNIA:Power Supply,SNIA:Sensors,SNIA:Server) • slptool findattrs service:wbem:http://IP_Address:Port NOTE Where IP_Address:Port is the IP address and port number that display when you use the slptool findsrvs service:wbem command.
12 SMI Agent Configuration Tool 4. Type # Install_Home/cimom/bin/slptool findsrvs service:wbem and press Enter to verify the SLP service is advertising its WBEM services. 5. Choose one of the following options to verify the SLP service is advertising the WBEM SLP template over its configured client protocol adapters. • Type # Install_Home/cimom /bin/slptool findattrs service:wbem:http://IP_Address:Port and press Enter.
SMI Agent Configuration Tool 12 Home tab The Home tab of the SMIA Configuration Tool enables you to access the following Management application features or information: • Fabric Discovery — enables you to view discovered fabrics, discover new fabrics, as well as edit the default SNMP configuration. • Host Discovery — enables you to view discovered hosts, discover new hosts, as well as edit the default SNMP configuration. For step-by-step instructions, refer to “Host discovery” on page 93.
12 SMI Agent Configuration Tool Enabling or disabling CIM client and indication mutual authentication When you enable client mutual authentication, all CIM client and indication requests to the SMI Agent must pass credentials (KeyStore and TrustStore) to validate the requests. The KeyStore file provides the credentials and the TrustStore file verifies the credentials. When you enable indication mutual authentication, both the CIM client and the CIMOM server maintain the TrustStore files.
SMI Agent Configuration Tool 12 5. Click Close to close the SMIA Configuration Tool dialog box. Configuring CIMOM server authentication CIMOM server authentication is the authentication mechanism between the CIM client and the CIMOM Server. You can configure the CIMOM server to allow the CIM client to query the CIMOM server without providing credentials; however, the CIMOM server requires the Management application credentials to connect to the Management application server to retrieve the required data.
12 SMI Agent Configuration Tool CIMOM tab NOTE You must have SAN - SMI Operation Read and Write privileges to view or make changes on the CIMOM tab. For more information about privileges, refer to “User Privileges” on page 1283. The CIMOM tab enables you to configure the CIMOM server port, the CIMOM Bind Network Address, and the CIMOM log. Configuring the SMI Agent port number To configure the SMI Agent port number, complete the following steps. 1. Click the CIMOM tab. FIGURE 151 CIMOM tab 2.
SMI Agent Configuration Tool 12 4. Click Apply. NOTE Changes on this tab take effect after the next CIMOM server restart. NOTE You can only restart the server using the Server Management Console (Start > Programs > Management_Application_Name 12.X.X > Server Management Console). If you disabled SSL, a confirmation message displays. Click Yes to continue. 5. Click Close to close the SMIA Configuration Tool dialog box.
12 SMI Agent Configuration Tool Configuring the CIMOM log NOTE You must have SAN - SMI Operation Read and Write privileges to view or make changes on the CIMOM tab. For more information about privileges, refer to “User Privileges” on page 1283. To configure the CIMOM log, complete the following steps. 1. Click the CIMOM tab. 2. Select a log category from the Log Level list to start logging support data for the server. Options include the following: • Off — select to turn off logging support data.
SMI Agent Configuration Tool 12 Certificate Management tab NOTE You must have SMI Operation Read and Write privileges to view or make changes on the Certificate Management tab. For more information about privileges, refer to “User Privileges” on page 1283. The Certificate Management tab enables you to manage your CIM client and Indication authentication certificates.
12 SMI Agent Configuration Tool 5. Click Import. The new certificate displays in the Certificates list and text box. If the certificate location is not valid, an error message displays. Click OK to close the message and reenter the full path to the certificate location. If you did not enter a certificate name, an error message displays. Click OK to close the message and enter a name for the certificate. If the certificate file is empty or corrupted, an error message displays.
SMI Agent Configuration Tool 12 Deleting a certificate NOTE You must have SMI Operation Read and Write privileges to view or make changes to the Certificate Management tab. For more information about privileges, refer to “User Privileges” on page 1283. To delete a certificate, complete the following steps. 1. Click the Certificate Management tab. 2. Select Client or Indication from the Authentication list. The appropriate certificates display in the Certificates list. 3.
12 SMI Agent Configuration Tool 1. Click the Summary tab. FIGURE 153 Summary tab 2. Review the summary. NOTE When the CIMOM server is stopped, the server configuration information does not display on the Summary tab. The following information is included in the summary. TABLE 38 410 Field/Component Description Client Mutual Authentication Displays whether or not the client mutual authentication is enabled or disabled for the Server Configuration and the Current Configuration.
SMI Agent Configuration Tool 12 TABLE 38 Field/Component Description Log Level Displays the log level for the Server Configuration and the Current Configuration. Options include the following: • 10000 — Off • 1000 — Severe • 900 — Warning • 800 — Info (default) • 700 — Config • 500 — Fine • 400 — Finer • 300 — Finest • 0 — All Managed Ports Displays the number of managed ports. For more information about managed port count rules, refer to “Managed count” on page 35.
12 412 SMI Agent Configuration Tool Brocade Network Advisor IP User Manual 53-1003056-01
Chapter 13 Wireless Management In this chapter • Wireless management overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Wireless devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Wireless device discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Wireless devices on the dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Port groups. . . . . . . . . . . . . . . . . .
13 Wireless devices Wireless devices The Management application supports three models of wireless controllers. TABLE 39 Wireless controller models Device Name Firmware required RFS 4000 Mobility 5.3 or later RFS 6000 Mobility 5.3 or later RFS 7000 Mobility 5.3 or later The Management application supports four models of wireless access points. TABLE 40 Wireless access points Device Name Firmware required AP 650 Mobility 4.1.1 (standalone mode) Mobility 5.
Wireless devices on the dashboard 13 Wireless devices on the dashboard Wireless controllers and standalone access points display in the following dashboard widgets: • • • • IP Inventory IP Status AP Status Status NOTE Wireless access points in adaptive mode do not display in the dashboard.
13 View management View management Wireless controllers and standalone access points display in the Network Objects, L2 Topology, IP Topology, and VLAN Topology views. NOTE Wireless access points in adaptive mode do not display in the topology.
Element Manager 13 Browser and system requirements The Element Manager requires a browser supporting Adobe Flash Player 10. The system accessing the Element Manager should have a minimum of 512Mb RAM for the Element Manager to display and function properly. The following browsers have been validated with the Element Manager: • Firefox 3.6 • Internet Explorer 7.x • Internet Explorer 8.x NOTE Leading and trailing spaces are not allowed in any text fields in the Element Manager.
13 Configuration repository and backup management 4. Enter your password in the Password field. The default password admin123. 5. Click Login. The Element Manager displays. OR 1. Select Reports > Wired Products from the main menu. The Wired Products report displays. 2. Click the IP address of a product in the IP Address column. The Element Manager displays. Launching a Telnet session NOTE Wireless access points in adaptive mode do not display in the Management application.
CLI configuration management • • • • • • 13 “Exporting a configuration to a text file” on page 752 “Comparing configuration snapshots” on page 756 “Generating a configuration snapshot report” on page 758 “Viewing the pre- and post-configuration snapshot” on page 759 “Saving a configuration snapshot” on page 760 “Scheduling a configuration backup” on page 762 CLI configuration management CLI configuration provides a text-based interface that allows you to enter command line interface (CLI) commands to cr
13 Cluster mode Cluster mode A cluster is a set of wireless controllers working collectively to provide redundancy and load sharing. You can discover wireless controllers in cluster mode. To verify that the wireless controller is in cluster mode, check the following: 1. Check the Properties dialog box. Right-click the wireless controller and select Properties. The Properties dialog box displays. • If the controller is the active controller, the Access Points tab is included.
Performance management 13 Performance management NOTE Wireless access points in adaptive mode do not display in the Management application. Historical performance enables you to collect data from managed wireless devices. You can use the provided data collectors or create your own data collectors. Instructions for collecting historical performance data are detailed in “IP historical performance monitoring” on page 995.
13 AP Products report AP Products report The AP Products report displays general and detailed configuration information about AP products that are under the management server. The information on the report comes from the software image version that is in the management application for that product. To ensure that the latest configuration information is in the management application, run the Discovery process or resynchronize the product.
AP Products report 13 The Detailed AP Products report contains the fields and components detailed in Table 42. TABLE 42 Detailed AP Products report Field/Component Description Status Whether the AP is online (green icon), offline (red icon), or pending adoption (gray icon). Name The device name used to identify AP. MAC Address The AP device MAC. Model The model of the AP. Serial Number The serial number of the AP. Firmware version The firmware level of the AP.
13 424 AP Products report Brocade Network Advisor IP User Manual 53-1003056-01
Chapter 14 VCS Management In this chapter • VCS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Logical chassis cluster operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Serial firmware update and activation for Network OS devices . . . . . . . . . • Support for Network OS VDX 2740 embedded switch . . . . . . . . . . . . . . . . • Network OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
14 VCS VCS mode types Beginning with Network OS 4.0, VCS mode encompasses two mode types: • Fabric cluster mode (shown in Figure 154)—The data path for nodes is distributed, but the configuration path is not distributed. Each node maintains its configuration database independently. • Logical chassis cluster mode (shown in Figure 155)—Both the data and configuration paths are distributed. The entire cluster can be configured from the principal node. Logical chassis mode requires Network OS 4.0 or later.
Logical chassis cluster operations 14 Ethernet Fabrics view management The Ethernet Fabrics view displays a map of the traffic for VCS devices on your network. To view the fabric members and Transparent Interconnection of Lots of Links (TRILL) connections for a fabric, double-click the fabric in the Product List. To display the topology map for Ethernet Fabrics, you must have the Main Display - Ethernet Fabric privilege. For more information about privileges, refer to “User Privileges” on page 1283.
14 Logical chassis cluster operations • If the cluster is configured with a virtual IP address after it is discovered by the Management application, the virtual IP address is collected and saved in the database for the next lazy polling or next adaptive collection. • If another switch becomes the principal switch, the Management application sets the cluster IP address to that of the new principal switch at the next lazy polling or next adaptive collection.
Logical chassis cluster operations 14 FIGURE 157 Discover Setup - IP dialog box before removal of node Figure 158 shows the Discover Setup - IP dialog box after the administrator has removed the node with the IP address of 172.26.5.130 from its logical chassis cluster. FIGURE 158 Discover Setup - IP dialog box after disabling the node from logical chassis cluster Figure 159 shows the Discover Setup - IP dialog box after The Management application has performed rediscovery.
14 Serial firmware update and activation for Network OS devices NOTE All cluster-specific configurations are lost during a cluster-mode change. On refresh collection, the Management application detects the mode change and retains all database entries related to the cluster. Serial firmware update and activation for Network OS devices With Network OS release 4.
Support for Network OS VDX 2740 embedded switch 14 Support for Network OS VDX 2740 embedded switch The Network OS VDX 2740 switch is a 10GB VDX, embedded Network OS switch module for IBM Pure System Chassis. The VDX 2740 switch gets discovered by the Management application in the same manner as any other device. Upon discovering this switch, the Management application registers as the Element Manager for the VDX 2740 switch.
14 VCS product groups VCS product groups The standalone Network OS switches and the VCS fabric are treated as a single Layer 2 (L2) switch for both static and dynamic product groups. The product group membership cannot contain fabric members. The standalone Network OS VDX switches are shown in Table 43. TABLE 43 Network OS-supported hardware Device name Firmware level required Network OS VDX 2730 10 Gbps connection blade v2.1.1_fuj Network OS VDX 2740 switch nos4.0.
Port profiles 14 Port profile VLAN profile QoS profile Security profile FIGURE 160 Port profile contents NOTE A port profile does not contain some of the interface-level configurations, such as LLDP, SPAN, LAG, and so on. AMPP characteristics Note the following points regarding the Automatic Migration of Port Profiles (AMPP) feature: • Port groups and port profiles are collections of network policies. The vNICs inherit these network policies. • Port profiles are associated with physical switches.
14 Port profiles • Associated — This state specifies that one or more MAC addresses have been associated with this port profile within the fabric. • Applied — This state indicates that the port profile is applied on the profiled port where the associated MAC address appears. Configuration of two different port profiles can coexist on a profiled port, but the application of the later port profile fails if there is a conflict.
Port profiles 14 Port profile configuration using the management application You can manage MAC addresses and port profiles from the Port Profiles tab of the Fabric_Name Properties dialog box, as shown in Figure 161. FIGURE 161 Fabric_Name Properties dialog box — Port Profile tab Assigning MAC addresses to a port profile Use the Assign MACs dialog box to select discovered Media Access Control (MAC) addresses and assign them to the selected port profiles.
14 Port profiles FIGURE 162 Assign MACs dialog box 6. From the Source list, select Virtual Machine Managers or Switch Port Connectivity as the source of the discovered MAC address. 7. Select a discovered MAC address to assign to the port profile and click the right arrow button to add it to the Selected MACs list. 8. Click OK.
Port profiles 14 FIGURE 163 Assign Offline MACs dialog box 7. To manage offline MAC addresses, perform one of the following tasks: • To assign an offline MAC address to the selected, activated profile, enter the MAC address in the MAC list and click Add. Alternatively, select an offline MAC address from the MAC List and click Add to assign it to the Port Profile list. • To remove a MAC address from the MAC List, select it from the list and click Remove. • To select and import a CSV file, click Import.
14 Port profiles 5. Click Compare. The Profile Comparison Summary dialog box displays, as shown in Figure 164. NOTE A green circle icon in the comparison summary indicates a complete match to the MAC address on the target switch; a yellow triangle icon indicates a partial match. FIGURE 164 Profile Comparison Summary dialog box 6. Select a product from the Available Products with Profiles list and click one of the following match options as the comparison criteria.
Port profiles 14 • Name Match — Compares the original profile with the profile with the same name on the target switch. • Network Match — Finds a profile on the target switch to provide the same networking settings on the target switch. NOTE Select a column or multiple columns in the Comparison Summary list, as shown in Table 45, and click Remove to remove it as matching criteria. The Reference Profile column cannot be removed.
14 Port profiles TABLE 45 Profile Comparison Summary list (Continued) Field/Component Description QoS Settings • • • • • • • • ACL Settings FCoE Settings NOTE: FCoE sub-profiles can be applied on default port profiles only and are supported on Network OS version 2.1 and later. You can view the FCoE profile association on Network Advisor version 11.3.0 and later. • • • • • • • • • • • • Mode — The mode of Quality of Service (QoS) assigned to the port Flow Control — Non-DCB mode.
System Monitor support on Network OS VDX platforms 14 FIGURE 165 Deploy Port Profiles to Products dialog box 5. Select an available target from the Available Targets list and click the right arrow button to move the target selected for configuration deployment to the Selected Targets list. NOTE If a fabric is selected and moved in a VCS fabric, all members are moved to the Selected Targets list. Individual members of a VCS fabric can be added and removed from the Selected Targets list. 6. Click OK.
14 System Monitor support on Network OS VDX platforms • • • • • • • • • Fan — Configures fan settings Power — Configures power settings Temp — Displays the threshold for the temperature sensor component CID-card — Displays the threshold for the CID card component SFP — Displays the threshold for the small form factor pluggable (SFP) device compact-flash — Displays the threshold for the compact flash device MM — Displays the threshold for the management module LineCard — Displays the threshold for the lin
System Monitor support on Network OS VDX platforms 14 • Limit — Specifies the default CPU limit. When the limit is exceeded, System Monitor sends out a RASlog WARNING message. When usage returns below the limit, System Monitor sends a RASlog INFO message. Valid values range from 0 to 80 percent, and the default value is different for different systems. • Low_limit — Specifies a lower usage limit for memory as a percentage of available memory.
14 System Monitor support on Network OS VDX platforms Interface error types Table 47 describes the interface counters that System Monitor monitors on external interfaces. TABLE 47 Interface errors monitored by System Monitor Interface error Description Port Fence support Threshold defaults CRC Align Errors The total number of frames received that had a length (excluding framing bits but including Frame Check Sequence (FCS) octets) of from 64 through 1518 octets.
Ethernet fabric traceroute 14 Ethernet fabric traceroute NOTE All nodes in the VCS cluster must have the NETCONF interface availability for L2TraceRoute and must be running Network OS 3.0.0 or later. Traceroute diagnostics enables you to determine the connectivity, path, and reachability of the Ethernet fabric between a source port and a destination port within an individual VCS fabric.
14 Ethernet fabric traceroute 2. Enter a MAC address, VM name, or IP address in the Source field or click the Source button to select or search for a source address from the Select Source - Traceroute dialog box (see Figure 167). FIGURE 167 Select Source - Traceroute dialog box In the Select Source - Traceroute dialog box, you can either search from the Available MAC Addresses list or select a row containing the required source MAC address, VM name, or IP address and click OK.
Ethernet fabric traceroute 14 4. Choose one of the following options: • Assign appropriate RBridge ID — Select this option to use Address Finder to identify the RBridge ID of the source. The Management application finds the RBridge ID on which the MAC address is learned. • Select RBridge ID — Select this option to select an RBridge ID from the list of the RBridge IDs currently present in the cluster.
14 Ethernet fabric traceroute TABLE 48 Trace Route example Request Source port number Destination port number 1 5 7 2 10 12 3 15 17 4 20 22 5 25 27 14. Click Start to initiate the traceroute request. Click Stop to cancel the traceroute request. NOTE The traceroute request is not automatically cancelled on the switch. The switch continues until the request is complete.
Ethernet fabric traceroute 14 • Status: Whether the traceroute succeeded or failed. NOTE A failed status indicates that the destination is not reachable from the outgoing port of this RBridge after the switch initiates the traceroute command. 16. To review the average round trip delay for the RBridge across the requests, click the Average Round Trip Delay tab.
14 450 Ethernet fabric traceroute Brocade Network Advisor IP User Manual 53-1003056-01
Chapter 15 Host Management In this chapter • Host management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Brocade adapters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • HCM software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Host adapter discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • VM Manager. . . . . . . . . .
15 Brocade adapters Brocade adapters The following sections describe the three Brocade adapter types: • “Host Bus Adapters” • “Converged Network Adapters” • “Fabric Adapters” Host Bus Adapters Brocade offers five models of Fibre Channel Host Bus Adapters (HBAs). These models provide reliable, high-performance host connectivity for mission-critical SAN environments. The Brocade HBAs are listed in Table 49.
Brocade adapters 15 Converged Network Adapters Table 50 describes available Brocade Converged Network Adapters (CNAs) for PCIe x 8 host bus interfaces, hereafter referred to as Brocade CNAs. These adapters provide reliable, high-performance host connectivity for mission-critical SAN environments.
15 HCM software AnyIOTM technology Although the Brocade 1860 Fabric Adapter can be shipped in a variety of small form-factor pluggable (SFP) transceiver configurations, you can change port function to the following modes using Brocade AnyIOTM technology, provided the correct SFP transceiver is installed for the port: • HBA or Fibre Channel mode — This mode utilizes the Brocade Fibre Channel storage driver. An 8 or 16 Gbps Fibre Channel SFP transceiver can be installed for the port.
HCM software 15 HCM features Common HBA and CNA management software features include the following: • Discovery using the agent software running on the servers attached to the SAN, which enables you to contact the devices in your SAN. • Configuration management, which enables you to configure local and remote systems.
15 Host adapter discovery Host adapter discovery The Management application enables you to discover individual hosts, import a group of hosts from a CSV file, or import host names from discovered fabrics. The maximum number of host discovery requests that can be accepted is 1000. Host discovery requires HCM Agent 2.0 or later. ESXi host adapter discovery requires the Brocade HBA CIM provider to be installed on the ESXi host.
HCM and Management application support on ESXi systems 15 The VMM discovery process begins. When complete, the vCenter server and all ESX and ESXi hosts managed by that vCenter display in the Host product tree. Editing a VM Manager The fields in the Edit VM Manager dialog box are identical to the fields in the Add VM Manager dialog box except for the Network Address field, which you cannot edit. 1. Click Edit on the Discover VM Managers dialog box. The Edit VM Manager dialog box displays. 2.
15 HCM and Management application support on ESXi systems The two ports described above are part of the range of ports reserved for use by the Management application server, configurable during installation from the Server Configuration wizard. Refer to the Installation and Migration Guide for server configuration instructions. Adding host adapter credentials for ESXi CIM-based discovery is available for ESXi versions 4.1 and later.
Adapter software 15 3. Select CIM server (ESXi only) as the Contact option. 4. (Optional) Select HTTP or HTTPS from the Protocol list. HTTPS is the default. 5. Click OK. Adapter software The Adapter Software dialog box allows you to perform the following tasks: • Select and import a driver file or delete existing drivers from the driver repository • Update the driver to the hosts NOTE For Linux and Solaris systems, you cannot upgrade to driver file version 3.0.3.0. You must upgrade to version 3.0.3.
15 Adapter software • Name — The name of the host. The first three digits indicate the host’s operating system; for example, WIN or LIN. • Operating System — The host operating system; for example, Microsoft Windows or Red Hat Linux. • Driver Version — The host’s current driver version. • Architecture — The host’s architecture; for example, 32-bit or 64-bit. 3. Select one or more hosts from the Selected Hosts list.
Adapter software 15 FIGURE 172 Driver Repository dialog box 2. Click Import on the Driver Repository dialog box. The Import Driver Repository dialog box displays. 3. Locate the driver file using one of the following methods: • Search for the file you want from the Look In list. • Enter the name of the image file you want to import in the File Name field. 4. Click Open. After the import completes, you see a message that the driver imported successfully. 5. Click OK.
15 Adapter software Importing a boot image into the repository Boot images are required for adapters that are shipped without a boot image or when it is necessary to overwrite images on adapters that contain older or corrupted boot image versions. 1. From the Management application menu bar, select Configure > Host > Adapter Software. 2. Click the Boot Image tab. The Boot Image Management dialog box, shown in Figure 173, displays.
Adapter software 15 3. From the Boot Image Management dialog box, click the Repository button. The Boot Image Repository dialog box, shown in Figure 174, displays. FIGURE 174 Boot Image Repository dialog box 4. Click Import on the Boot Image Repository dialog box. 5. The Import Boot Image dialog box displays. 6. Locate the boot image file using one of the following methods: • Search for the file you want from the Look In list. Boot image files version 2.0.0.0 and 2.1.0.0 are .
15 Bulk port configuration 3. From the Boot Image Management dialog box, click the Update button to download a boot image to one or more selected hosts. One of the following download status messages displays in the Status column of the Selected Hosts list: • • • • Ready Queued In progress Failed — If the download failed, the failure reason displays in the Message column of the Selected Hosts list; for example, failed to connect to HCM agent, a checksum error occurred, or the file is invalid.
Bulk port configuration 15 FIGURE 175 Configure Host Adapter Ports dialog box Adding a port configuration The Add Port Configuration dialog box allows you to create a maximum of 50 customized port configurations which you can then select and assign to ports. 1. Click Add on the Configure Host Adapter Ports dialog box. The Add Port Configuration dialog box, shown in Figure 176, displays.
15 Bulk port configuration FIGURE 176 Add Port Configuration dialog box 2. Enter a name for the port configuration in the Configuration Name field. A maximum of 128 alphanumeric characters is supported. 3. Configure at least one of the following port properties: - Port — Enable or disable the port. Enable is the default. - Target Rate Limiting — Enable the Target Rate Limiting feature to minimize congestion at the adapter port.
Bulk port configuration 15 Boot Speed — Set the port speed. Possible values are Auto Negotiate (to auto-negotiate the speed) and 1, 2, 4, 8, and 16 Gbps and unknown speeds. Boot Option — From the list, select one of the following: • Auto Discovered From Fabric — Enables Boot over SAN using boot LUN information stored in the fabric. This is the default setting. • First Visible LUN — Enables Boot over SAN from the first discovered LUN in the SAN. Bootup Delay — Enter a bootup delay value.
15 Adapter port WWN virtualization Editing a port configuration The Edit Port Configuration dialog box allows you to modify port configuration parameters that were configured using the Add Port Configuration dialog box. 1. Click Edit on the Configure Host Adapter Ports dialog box. The Edit Port Configuration dialog box displays. 2. Modify the parameters that are described in “Adding a port configuration” on page 465. 3. Click OK to save the changes. Duplicating a port configuration 1.
Adapter port WWN virtualization 15 • Set the type value to auto or user-defined. When the User button is clicked, the WWN is cleared from the table and editing is enabled. • Delete the Fabric Assigned WWN from the Fabric Assigned WWN - Configuration list. FIGURE 177 Configure Fabric Assigned WWNs dialog box Enabling the FAWWN feature on a switch or AG ports 1. Select Configure > Fabric Assigned WWN. or Right-click the switch and select Fabric Assigned WWN.
15 Adapter port WWN virtualization The Configure Fabric Assigned WWNs dialog box displays. 2. Select a switch port from the Fabric Assigned WWN - Configuration list. 3. Click the Disable button. The selected switch’s FAWWN feature status is disabled. 4. Click OK. Auto-assigning a FAWWN to a switch or AG port 1. Select Configure > Fabric Assigned WWN. or Right-click the switch and select Fabric Assigned WWN. The Configure Fabric Assigned WWNs dialog box displays. 2.
Adapter port WWN virtualization 15 Deleting a FAWWN from a switch or AG port 1. Select Configure > Fabric Assigned WWN. or Right-click the switch and select Fabric Assigned WWN. The Configure Fabric Assigned WWNs dialog box displays. 2. Select a switch port or AG port from the Fabric Assigned WWN - Configuration list. 3. Click the Delete button. The Fabric Assigned WWN row is deleted from the Fabric Assigned WWN - Configuration list for the selected switch port or AG port.
15 Adapter port WWN virtualization Adding AG port FAWWNs 1. Select Configure > Fabric Assigned WWN. or Right-click the switch and select Fabric Assigned WWN. The Configure Fabric Assigned WWNs dialog box displays. 2. Click the Attached AG Ports tab. 3. Select a row in the Fabric Assigned WWN Configuration - AG Ports list. 4. Click Add. The Add AG Fabric Assigned WWN Configuration dialog box displays. 5. Enter a valid world wide name (WWN), with or without colons, for the Access Gateway node.
Role-based access control 15 The Configure Fabric Assigned WWNs dialog box displays. 2. Click the Attached AG Ports tab. 3. Right-click the WWN row you want to move, select the Copy Row option, and paste the contents into a text editor. 4. Select an online AG FAWWN row and click the Delete button. 5. Select a switch from the Switch list and click Add to launch the Add AG Fabric Assigned WWN Configuration dialog box. 6.
15 Host performance management • Port Mapping • Virtual Network Management Instructions for managing resource groups and users using roles and privileges are detailed in “User accounts,”“Roles,” and “Areas of responsibility,” in Chapter 6, “User Account Management”. Host performance management Real-time performance enables you to collect data from managed HBA and CNA ports. You can use real-time performance to configure the following options: • Select the polling rate from 20 seconds up to 1 minute.
Host security authentication TABLE 52 15 Counters (Continued) FC port measures HBA port measures CNA port measures Invalid ordered sets Non-frame coding error Received paused frames Transmitted paused frames Received FCoE pause frames Transmitted FCoE pause frames Received FCS error frames Transmitted FCS error frames Received alignment error frames Received length error frames Received code error frames Instructions for generating real-time performance data are detailed in “Generating a real-time p
15 Host security authentication FIGURE 179 Fibre Channel Security Protocol Configuration dialog box 3. Configure the following parameters on the Fibre Channel Security Protocol Configuration dialog box: a. Select the Enable Authentication check box to enable the authentication policy. If authentication is enabled, the port attempts to negotiate with the switch. If the switch does not participate in the authentication process, the port skips the authentication process. b.
supportSave on adapters 15 supportSave on adapters Host management features support capturing support information for managed Brocade adapters, which are discovered in the Management application. You can trigger supportSave for multiple adapters at the same time. supportSave cannot be used to collect support information for ESXi hosts managed by a CIM Server. Refer to the Brocade Adapters Administrator’s Guide for information about supportSave on ESXi hosts.
15 Host fault management Filtering event notifications The Management application provides notification of many different types of SAN events. If a user wants to receive notification of certain events, you can filter the events specifically for that user. NOTE The e-mail filter in the Management application is overridden by the firmware e-mail filter.
Backup support 15 Backup support The Management application helps you to protect your data by backing it up automatically. The data can then be restored, as necessary. Configuring backup to a hard drive NOTE Configuring backup to a hard drive requires a hard drive. The drive should not be the same physical drive on which your operating system or the Management application is installed. To configure the backup function to a hard drive, complete the following steps. 1. Select Server > Options.
15 Backup support Enabling backup Backup is enabled by default. However, if it has been disabled, complete the following steps to enable the function. 1. Select Server > Options. The Options dialog box displays. 2. Select Server Backup in the Category list. 3. Select the Enable Backup check box. 4. Click Apply or OK. Disabling backup Backup is enabled by default. If you want to stop the backup process, you must disable backup. To disable the backup function, complete the following steps. 1.
Chapter 16 Fibre Channel over Ethernet In this chapter • FCoE overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Enhanced Ethernet features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • FCoE protocols supported. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • FCoE licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
16 Enhanced Ethernet features DCBX protocol Data Center Bridging Exchange (DCBX) protocol allows enhanced Ethernet devices to convey and configure their DCB capabilities and ensures a consistent configuration across the network. DCBX protocol is used between DCB devices, such as a converged network adapter (CNA) and an FCoE switch, to exchange configuration with directly connected peers.
FCoE protocols supported 16 Ethernet jumbo frames The basic assumption underlying FCoE is that TCP/IP is not required in a local data center network and the necessary functions can be provided with Enhanced Ethernet. The purpose of an “enhanced” Ethernet is to provide reliable, lossless transport for the encapsulated Fibre Channel traffic. Enhanced Ethernet provides support for jumbo Ethernet frames and in-order frame delivery.
16 FCoE licensing FCoE licensing The FCoE license enables Fibre Channel over Ethernet (FCoE) functionality on the following supported DCB switches: • • • • • Network OS 10 GbE 24-port 8 GbE 8 FC port switch Network OS VDX 6710, 6720, and 6730 switches Network OS VDX 6740 and 6740T switches Network OS VDX 8770-series switches Network OS VDX 2730 10 GbE connection blade for the Fujitsu PRIMERGY BX900 and BX400 Blade Servers Without the FCoE license, the DCB switches are pure Layer 2 Ethernet switches and
Saving running configurations 16 FIGURE 180 Save Running to Startup dialog box 2. Highlight a discovered DCB switch from the Available Switches list, and click the right arrow button to move the switch to the Selected Switches list. 3. Highlight the selected switch and click OK to start the configuration. The running configuration is saved to the selected switch, effective on the next system startup.
16 DCB configuration management DCB configuration management Depending on the platform, the DCB switch has one of the configurations shown in Table 53.
Switch policies 16 Switch policies You can configure and enable a number of DCB policies on a switch, port, or link aggregation group (LAG). The following switch policy configurations apply to all ports in a LAG: • DCB map and Traffic Class map • Link Layer Discovery Protocol (LLDP) The switch policies are described in the following sections.
16 DCB configuration DCB configuration To launch the DCB Configuration dialog box, select Configure > DCB from the menu bar. The DCB Configuration dialog box displays, showing the status of all DCB-related hardware and functions. NOTE For FOS DCB devices, the Protocol Down Reason column, shown in Figure 181, displays the values only for the external ports of embedded platforms but not for the internal ports.
DCB configuration 16 For more information about fabric cluster mode and logical chassis cluster mode, refer to the Network OS Administrator’s Guide and the Network OS Command Reference, versions 4.0 or later. The term VCS mode refers to both fabric cluster mode and logical chassis cluster mode unless otherwise indicated. NOTE In the Management application, a logical chassis cluster is shown without all its members; a fabric cluster is shown with all its members.
16 DCB configuration • Name - Enter a name to identify the DCB map. • Precedence - Enter a value from 1 through 100. This number determines the map’s priority. • Priority Flow Control check box - Check to enable priority-based flow control on individual priority groups. • CoS - Click the CoS cell to launch the Edit CoS dialog box, where you can select and assign one or more priorities (PG ID 15.0 through 15.7). All of the eight CoS values (0-7) must be used in a DCB map.
DCB configuration 16 FIGURE 183 Edit Switch dialog box - LLDP-DCBX tab 4. Select the Global Configuration LLDP profile in the LLDP Profiles list. 5. Click the left arrow button to edit. 6. Select the FCoE Application and FCoE Logical Link check boxes in the Advertise list to advertise them on the network. 7. Click OK after changing the attributes of the current deployment. The Deployment Status dialog box displays. 8. Click Start on the Deployment Status dialog box to save the changes to the switch. 9.
16 DCB configuration 8. Select the DCB map you created in “Creating a DCB map to carry the LAN and SAN traffic” on page 489 from the Available DCB Maps list. 9. Click the LLDP-DCBX tab and select the Enable LLDP-DCBX on Te Port Number check box. 10. Select Assign the Global Configuration. 11. Click OK. The Deploy to Ports dialog box displays. 12. Click OK after changing the attributes of the current deployment. The Deployment Status dialog box displays. 13.
DCB configuration 16 Creating and activating VLAN classifiers on the DCB interface NOTE You can complete this procedure using the Management application for Fabric OS versions 7.0 and later. For Fabric OS versions earlier than Fabric OS 7.0, you must use the CLI. To create and activate the VLAN classifiers on the DCB interface, complete the following steps. 1. Log in to the switch and enter global configuration mode. switch:>cmsh switch#configure terminal 2.
16 DCB configuration 2. Select the DCB switch or one or more DCB ports from the Products/Ports list to add to a link aggregation group (LAG). 3. Click Add LAG or Edit LAG. The Add LAG or Edit LAG dialog box displays, as shown in Figure 184. FIGURE 184 Add LAG dialog box 4. Configure the following LAG parameters: NOTE Ports with 802.1x authentication or ports that are enabled in L2 mode or L3 mode are not supported in a LAG. • LAG ID - Enter the LAG identifier, using a value from 1 through 63.
DCB configuration 16 5. Select at least one available DCB port from the Available Members list and click the right arrow button to move it to the LAG Members list. The DCB ports are now part of the link aggregation group. 6. Continue to configure the following LAG parameters. These parameters are always enabled. • Type - Sets the limit on the size of the LAG. The type values include Standard, where the LAG is limited to 16 ports, and Brocade LAG, where the LAG is limited to 4 ports.
16 DCB configuration FIGURE 185 Edit Switch dialog box 4. Configure the policies for the Edit Switch dialog box tabs, which are described in the following sections: • • • • • “QoS configuration” on page 501 “FCoE provisioning” on page 508 “VLAN classifier configuration” on page 510 “LLDP-DCBX configuration” on page 514 “802.1x authentication” on page 517 5. When you have finished configuring the policies, apply the settings to the switch.
DCB configuration 16 2. Select a DCB port from the Products/Ports list. 3. Click Edit. The Edit Port dialog box displays, as shown in Figure 186. FIGURE 186 Edit Port dialog box 4. Modify the following DCB port parameters as required: • Interface Mode - Select None or L2. For external ports, the L3 interface mode displays in addition to None or L2. If you select L3 as the interface mode, the IP/Netmask field is enabled and you can then assign the primary and secondary IP addresses.
16 DCB configuration 5. When you have finished configuring the policies, apply the settings to the DCB port. NOTE Clicking Cancel when there are pending changes launches a pop-up dialog box. 6. Click OK when you have finished modifying the DCB port parameters. The Deploy to Ports dialog box displays. 7. Click OK after changing the attributes of the current deployment. The Deployment Status dialog box launches. 8.
DCB configuration 16 FIGURE 187 Edit LAG dialog box 4. Configure the following LAG parameters, as required: NOTE Ports with 802.1x authentication or ports that are enabled in L2 mode or L3 mode are not supported in a LAG. • LAG ID - The LAG identifier, which is not an editable field. • Status - Click the Enable check box to enable the LAG. You must enable the LAG to use the DCB functionality. • Interface Mode - Select None or L2.
16 DCB configuration 5. Continue to configure the following LAG parameters. These parameters are disabled until you add a DCB port to the LAG Members list. • Mode - The ports that are LAG members are in either Static or Dynamic mode. You cannot change the mode on existing members of a LAG. If the mode is set as Dynamic, you can change the dynamic mode type (to Active or Passive) only for newly-added ports, not for existing port members of a LAG.
QoS configuration 16 4. Click Start on the Confirmation and Status dialog box to save the changes to the selected ports or LAGs. The selected DCB ports or LAGs are enabled in the DCB Configuration dialog box. 5. Click Close to close the Confirmation and Status dialog box. Deleting a LAG You can only delete a link aggregation group (LAG) that is selected from a single switch. If you select multiple switches or multiple ports from two or more switches, the Delete button is disabled.
16 QoS configuration TABLE 54 Priority grouping allocated in a 15-priority group example Priority group ID Bandwidth (%) Priority flow control 0 55 on 1 25 on 2 0 off 3 0 off 4 5 off 5 0 off 6 15 on 7 0 off 15.0-15.7 Strict priority on No bandwidth % configuration allowed Creating a DCB map The procedure in this section applies only for Fabric OS versions earlier than Fabric OS 7.0.
QoS configuration 16 FIGURE 188 QoS, Create DCB Map dialog box 4. Select DCB from the Map Type list. 5. Configure the following DCB map parameters in the DCB Map area: • Name - Enter a name to identify the DCB map. NOTE Only one DCB map (the default) is supported on Fabric OS version 6.3.1_dcb and version 7.0.0 and later. • Precedence - Enter a value from 1 through 100. This number determines the map’s priority.
16 QoS configuration • If you set a CoS value to one or more of the PG IDs 0-7, you must also enter a non-zero bandwidth percentage. The total bandwidth percentage must equal 100. • For PG IDs 0-7 that do not have an assigned CoS value or PFC enabled, the bandwidth percentage must be 0. 6. Click the right arrow button to add the map to the DCB Maps list. If a DCB map exists with the same name, a validation dialog box launches and you are asked if you want to overwrite the map. 7. Click OK. 8.
QoS configuration 16 1. Select Configure > DCB. The DCB Configuration dialog box displays, showing the status of all DCB-related hardware and functions. 2. Select a switch, and click Edit. 3. Click the QoS tab on the Edit Switch dialog box. The QoS dialog box displays. 4. Select one or more DCB maps. 5. Click the left arrow button. The selected DCB map row is removed from the list. 6. When you have finished the configuration, click OK to launch the Deploy to Products dialog box.
16 QoS configuration If no DCB maps were created on the switch, the Available DCB Maps list is empty. Otherwise, the following DCB map details display: • PG - ID — Lists the priority group ID (15.0 through 15.7 and 0 through 7). • % Bandwidth — Lists the bandwidth value for priority group IDs 0-7. The total of all priority groups must equal 100 percent. • Priority Flow checkbox — Check to enable priority-based flow control on individual priority groups.
QoS configuration 16 If the name of the Traffic Class map already exists, an overwrite warning message displays. Click Yes to overwrite the existing Traffic Class map. 5. Keep the same Traffic Class map name and modify the values, as required. 6. Click the right arrow button to re-add the map to the Traffic Class Maps list. 7. When you have finished the configuration, click OK to launch the Deploy to Products dialog box. Deleting a Traffic Class map 1. Select Configure > DCB.
16 FCoE provisioning 5. Select Traffic Class in the Map Type list. 6. Select a Traffic Class map in the Traffic Class Map list. 7. When you have finished the configuration, click OK to launch the Deploy to Ports/LAGs dialog box. Refer to “Switch, port, and LAG deployment” on page 520 for more information. FCoE provisioning The Management application supports FCoE provisioning only on Fabric OS version 6.3.1_dcb.
FCoE provisioning 16 • Name — The name of the FCoE map that will be available for assignment to ports on this switch. This is a read-only field. • VLAN ID — Enter an FCoE VLAN identifier to associate with the FCoE map. The values range from 2 through 3583, and 1002 is the default. • DCB Map — The DCB map that is associated with the FCoE map. This is a read-only field. 4. Accept the default VLAN ID of 1002, or change the value. The valid VLAN ID range is from 2 through 3583. 5.
16 VLAN classifier configuration 5. When you have finished the configuration, click OK to launch the Deploy to Ports dialog box. 6. Click OK after changing the attributes of the current deployment. The Deployment Status dialog box displays. 7. Click Start on the Deployment Status dialog box to save the changes to the selected devices. VLAN classifier configuration The Management application supports VLAN classifier management only on Fabric OS 6.3.1_dcb and Fabric OS 7.0.0.
VLAN classifier configuration 16 FIGURE 189 Edit Switch dialog box, VLAN Classifiers tab 4. Click the Add button under the Available Rules list. The Add Rules dialog box displays, as shown in Figure 190. FIGURE 190 Add Rules dialog box The Rule ID field is pre-populated with the next available rule ID number. 5. Keep the rule ID number as it is, or change the number using a value from 1 through 256. 6. Select a rule type. Valid rule types are MAC (MAC address-based rule) and Proto (802.
16 VLAN classifier configuration 9. Click OK to add the rule to the Available Rules list on the VLAN Classifiers tab of the Edit Switch dialog box and close the Add Rules dialog box. NOTE Clicking Apply also adds the rule to the Available Rules list on the VLAN Classifiers tab of the Edit Switch dialog box, and in addition, the Add Rules dialog box remains open and clears all entries for you to define the next rule. 10.
VLAN classifier configuration 16 Creating a VLAN classifier group You can assign existing rules to a selected VLAN classifier and form a VLAN classifier group. If no rules are available, you can add rules to a selected switch using the Add Rules dialog box. 1. Select Configure > DCB from the menu bar. The DCB Configuration dialog box displays, showing the status of all DCB-related hardware and functions. 2. Select a switch and click Edit. 3. Click the VLAN Classifiers tab on the Edit Switch dialog box.
16 LLDP-DCBX configuration LLDP-DCBX configuration Link Layer Discovery Protocol (LLDP) provides a solution for the configuration issues caused by increasing numbers and types of network devices in a LAN environment, because, with LLDP, you can statically monitor and configure each device on a network.
LLDP-DCBX configuration 16 Adding an LLDP profile NOTE When a TE port is selected to assign to an LLDP profile, a yellow banner displays with the following error message: “LLDP-DCBX is disabled on this switch. The configuration becomes functional when LLDP-DCBX is enabled on the switch.” 1. Select Configure > DCB. The DCB Configuration dialog box displays, showing the status of all DCB-related hardware and functions. 2. Select a switch, and click Edit. 3.
16 LLDP-DCBX configuration Editing an LLDP profile 1. Select Configure > DCB. The DCB Configuration dialog box displays, showing the status of all DCB-related hardware and functions. 2. Select a switch, and click Edit. 3. Click the LLDP-DCBX tab on the Edit Switch dialog box. The LLDP-DCBX Profile dialog box displays. 4. Select an LLDP profile in the LLDP Profile list. NOTE You can edit the profile. You cannot, however, delete or duplicate global configurations. 5.
802.1x authentication 16 Assigning an LLDP profile to a port or ports in a LAG You create LLDP profiles using the Edit Switch dialog box, which you access from the DCB Configuration dialog box. Global configuration parameters, which is the default selection, are displayed in the Assigned Profile table. NOTE A yellow banner displayed on the LLDP-DCBX dialog box indicates that LLDP-DCBX is disabled on the switch. The configuration options become functional when LLDP-DCBX is enabled on the switch. 1.
16 802.1x authentication Enabling 802.1x authentication 802.1x authentication is enabled or disabled globally on the switch using the Edit Switch dialog box. 1. Select Configure > DCB from the menu bar. The DCB Configuration dialog box displays, showing the status of all DCB-related hardware and functions. 2. Select a switch and click Edit. 3. Click the 802.1x tab on the Edit Switch dialog box. 4. Click the Enable 802.1x check box to enable 802.1x authentication, and click OK. 5. Configure the 802.
802.1x authentication 16 FIGURE 192 802.1x dialog box 5. Configure the following 802.1x parameters: • Wait Period - The number of seconds the switch waits before sending an EAP request. The value range is 15 to 65535 seconds. The default value is 30. • Retry Count - The maximum number of times that the switch restarts the authentication process before setting the switch to an unauthorized state. The value range is 1 to 10. The default value is 2.
16 Switch, port, and LAG deployment Switch, port, and LAG deployment The Deploy to Products, Deploy to Ports, and Deploy to LAGs dialog boxes provide the flexibility to commit DCB configurations either right away or at a scheduled time. These dialog boxes also allow you to commit the switch-level configuration changes to one or more target switches. NOTE Deployment from the Management application to a Network OS device is not supported.
Switch, port, and LAG deployment 16 FIGURE 194 Deploy to Ports dialog box FIGURE 195 Deploy to LAGs dialog box Brocade Network Advisor IP User Manual 53-1003056-01 521
16 Switch, port, and LAG deployment 4. Click one of the following deployment options: • • • • Deploy now Save and deploy now Save deployment only Schedule 5. Click one of the following save configuration options: • Save to running • Save to running and startup • Save to running and startup then reboot The name for the scheduled product deployment is pre-populated with a “DCB-MM-DD-YYYY-HR-MIN-SS” prefix. This is an editable field. 6. Provide a description for the product/port/LAG deployment. 7.
Switch, port, and LAG deployment 16 NOTE On the Deploy to Ports dialog box, you can write port configurations to the switch by enabling the check box at the bottom of the dialog box. For LAGs: • LAG attributes (Interface Mode, etc.) • QoS, DCB Map / Traffic Class Map • LLDP Profiles 9. Click to move the available targets selected for configuration deployment to the Selected Targets list. 10. Click OK. The Deployment Status dialog box launches. 11.
16 Network OS switches in VCS mode TABLE 55 Source to target switch Fabric OS version compatibility (Continued) Source Fabric OS version and device Target Fabric OS version supported Comments Fabric OS Converged 10 GbE switch module for IBM BladeCenter with Fabric OS 6.3.1_cee and 6.3.1_dcb Allows Fabric OS Converged 10 Gbe switch module for IBM BladeCenter with Fabric OS 6.3.1_cee, Fabric OS 6.3.1_dcb. Both source and target switches must support the FCoE map and VLAN classifiers.
Network OS switches in VCS mode 16 Supported VCS platforms The following switches are supported in a virtual fabric switching environment: • VDX 2730 10 GbE connection blade for the Fujitsu PRIMERGY BX900 and BX400 Blade Servers • • • • • • • • • VDX 6710 VDX 6720-24 VDX 6720-60 VDX 6730-32 VDX 6730-76 VDX 6740 VDX 6740T VDX 8770-4 VDX 8770-8 Viewing switches in VCS mode 1. Launch the DCB Configuration dialog box using one of the following methods: • Select Configure > DCB from the menu bar.
16 Network OS switches in VCS mode Viewing QoS parameters on the Network OS switch Table 56 describes the parameters that displays on the View Switch dialog box - QoS tab. NOTE Network OS switches in VCS mode support only the DCB map. Network OS switches in standalone mode supports both the DCB and Traffic Class maps. TABLE 56 QoS configuration parameters on VCS switch Map Type Displays the map type: DCB or Traffic Class for a Standalone Network OS switch or DCB for Network OS switches in VCS mode.
Network OS switches in VCS mode 16 Viewing VLAN classifiers and rules parameters on the Network OS switch Table 58 describes the parameters that display on the View Switch dialog box - VLAN Classifiers tab. TABLE 58 VLAN classifiers and rules configuration parameters on VCS switch Field/Component Available Rules VLAN Classifiers Description Displays the following Available Rules information: Rule ID — The rule identifier. Valid rule ID values are from 1 through 256.
16 Network OS switches in VCS mode Viewing the 802.1x parameter on the Network OS switch Table 60 describes the parameter that displays on the View Switch dialog box - QoS tab. TABLE 60 802.1x configuration parameter on VCS switch Field/Component Description 802.1x Displays the enabled or disabled status of the 802.1x configuration on the Network OS switch. Viewing ports in VCS mode 1.
Network OS switches in VCS mode TABLE 61 16 Port parameters on the Network OS switch port (Continued) Field/Component Description MTU The maximum transmission unit (MTU) in bytes. The value range is from 1522 through 9216 and the default value is 2500. iSCSI Priority The CoS priority value for iSCSI traffic. The value range is from COS 0 through COS 7 and the default value is COS 4.
16 Network OS switches in VCS mode QoS - Non-DCB TABLE 63 QoS (non-DCB) parameters on the Network OS switch port Field/Component Description Mode The mode of Quality of Service (QoS) assigned to the port (non-DCB). Trust Indicates whether the Ethernet trust of the port is enabled or disabled. NOTE: Applicable only for standalone Network OS devices. Flow Control The Ethernet priority flow control mode of the port. The default flow control mode is Off. Possible modes are as follows: • Off • 802.
Network OS switches in VCS mode 16 Viewing LLDP-DCBX parameters on the Network OS switch port Table 65 describes the LLDP profiles table (in global configuration) and the LLDP profiles. TABLE 65 LLDP-DCBX parameters on the Network OS switch port Field/Component Description LLDP-DCBX Indicates whether LLDP-DCBX feature is enabled or disabled. LLDP Profile Parameters Displays the following LLDP profile parameters: Name — The name of the LLDP profile. Description — A description of the LLDP profile.
16 Network OS switches in VCS mode TABLE 66 802.1x parameter on the Network OS switch port (Continued) Field/Component Description Re-authentication Interval (sec) The number of seconds between re-authentication attempts. The value range is 1 to 4294967295. The default value is 3600 seconds. This feature is not dependent on the re-authentication state being enabled. Port Control The authorization mode to configure the ports for authorization.
Network OS switches in VCS mode TABLE 67 16 LAG parameters on the Network OS switch LAG (Continued) Field/Component Description Status Indicates whether the LAG is enabled or disabled. You must enable the LAG to use the DCB functionality. Default CoS The Cost of Service (CoS) value for incoming untagged frames. Values are 0-7 or if the port is profiled. The default CoS is 0. Type Displays the limit on the size of the LAG.
16 Network OS switches in VCS mode TABLE 68 QoS (DCB) parameters on the Network OS switch LAG. (Continued) Field/Component Description Precedence This number determines the map’s priority. Valid values are from 1 through 100. DCB Map Parameters • • • • PG ID — Lists the priority group ID (15.0 to 15.7 and 0 to 7). % Bandwidth — Lists the bandwidth value for priority group IDs 0-7. The total of all priority groups must equal 100%.
Network OS switches in VCS mode TABLE 70 16 FCoE configuration parameters on VCS switch Field/Component FCoE Map Note: The default FCoE map contains both the default Fabric map and the default DCB map. Fabric Map Description Displays the following information about the FCoE map: Fabric Map — The name of the Fabric map. The default Fabric map consists of virtual fabric and FCoE VLAN-related information. • DCB Map — The name of the DCB map.
16 DCB performance DCB performance Performance monitoring provides details about the quantity of traffic and errors a specific port or device generates on the fabric over a specific time frame. You can also use Performance features to indicate the devices that create the most traffic and to identify the ports that are most congested. The Performance menu items launch either SAN or IP performance dialog boxes based on which tab you select.
DCB performance 16 Generating a real-time performance graph from the IP tab To generate a real-time performance graph for a Network OS or FOS DCB switch, complete the following steps. 1. Click the IP tab. 2. Select a DCB port from the DCB Configuration dialog box, and select Real Time Graph from the Performance list. A message displays, prompting you to close the DCB Configuration dialog box. 3. Click OK to close the DCB Configuration dialog and open the Performance dialog box.
16 FCoE login groups 1. Select a DCB port from the DCB Configuration dialog box, and select Historical Graph from the Performance list. A message displays, prompting you to close the DCB Configuration dialog. 2. Click OK to close the DCB Configuration dialog and open the Performance dialog box. The Historical Performance Graph dialog box displays. For complete information about Real Time Performance Graphs, refer to “SAN real-time performance data” on page 976.
FCoE login groups 16 Without the FCoE license, the virtual FCoE port displays in the device tree, but you cannot enable, disable, or view virtual FCoE port information. NOTE FCoE Login Group is not available for Network OS DCB devices. 1. Select Configure > FCoE from the menu bar. The FCoE Configuration dialog box displays all configured login groups and the following details associated with a selected device, shown in Figure 199. • FCoE login — Indicates whether the switch is FCoE enabled or disabled.
16 FCoE login groups Adding an FCoE login group Complete the following steps to add switches to a login group. You can manually add ports by entering the world wide name (WWN) or select available managed CNAs from all discovered hosts. Only directly-connected devices are supported. 1. Select Configure > FCoE from the menu bar. or Right-click the DCB device and select FCoE. 2. Click Add. The Add Login Group dialog box displays, as shown in Figure 200. FIGURE 200 Add Login Group dialog box 3.
FCoE login groups 7. 16 Click OK. The FCoE Login Group Confirmation and Status dialog displays. 8. Review the changes carefully before you accept them. 9. Click Start to apply the changes, or click Close to abort the operation. On closing the FCoE Login Group Confirmation and Status dialog box, the FCoE Configuration Dialog refreshes the data and the latest information is displayed. • “FCoE login groups” Editing an FCoE login group Complete the following steps to edit the name of a login group.
16 FCoE login groups • Managed CNAs — Click to show a list of products and ports which can be selected as login group members. 4. Select available members from the Products/Ports list and click the right arrow button to move the available members to the Selected Members list. 5. Click OK. The FCoE Login Group Confirmation and Status dialog displays. 6. Review the changes carefully before you accept them. 7. Click Start to apply the changes, or click Close to abort the operation.
Virtual FCoE port configuration 16 Enabling the FCoE login management feature on a switch 1. Select Configure > FCoE from the menu bar. or Right-click the DCB device and select FCoE. The FCoE Configuration dialog box displays. 2. Select an FCoE-disabled switch from the Login Groups list and click Enable. 3. The FCoE Login Group Configuration and Status dialog box displays. 4. Review the changes carefully before you accept them. 5. Click Start to apply the changes, or click Close to abort the operation.
16 Virtual FCoE port configuration Right-click the DCB device and select FCoE. The FCoE Configuration dialog box displays. 2. Select the Virtual FCoE Ports tab. The Virtual FCoE Ports tab displays, as shown in Figure 202. FIGURE 202 Virtual FCoE Ports dialog box 3. Select one or more virtual ports from the Ports list. 4. Perform one of the following tasks: • Click Enable to enable a selected virtual FCoE port from the Virtual FCoE Ports tab.
Virtual FCoE port configuration 16 The selected connected device should be cleared from the switch cache and from the table. Note, however, that the connected devices might still be active and this operation could potentially stop traffic between the connected devices and the switch. 3. Review the changes carefully before you accept them. 4. Click Start to apply the changes, or click Close to abort the operation.
16 546 Virtual FCoE port configuration Brocade Network Advisor IP User Manual 53-1003056-01
Chapter 17 Telemetry In this chapter • Telemetry overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547 • Policy-based routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547 • ACL Accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
17 Policy-based routing The Management application creates an IPv4 PBR or IPv6 PBR based on the ACLs defined in the policy. • If any rule in the policy contains an IPv4 ACL, the Management application creates an IPv4 PBR applies the PBR to the ports. • If any rule in the policy contains an IPv6 ACL, the Management application creates an IPv6 PBR applies the PBR to the ports.
Policy-based routing 17 Source — Port (one or more) to which this PBR policy is bound. For PBR policies bound to multiple ports, displays all ports separated by commas. For globally applied PBR policies, displays blank. Match — L3 ACL policy associated with the rule. You can define up to 10 ACL policies (5 IPv4 and 5 IPv6) per rule. Next Hop — Destination for the packets that pass ACL filter. You can define multiple next hops. PBR selects the first next hop from the next hop list that is up.
17 Policy-based routing Adding a new policy 1. Select an Ethernet router, Ethernet core router, or Ehternet Backbone router product and select Configure > Policy Based Routing. The Product_Name PBR Configuration dialog box displays. 2. Select Add > New Policy. The PBR Policy Configuration dialog box displays. 3. Enter a name for the new policy and click OK on the PBR Policy Configuration dialog box. 4. To add one or more rules to the policy, refer to “Adding rules to a policy” on page 550. 5.
Policy-based routing 17 The rule name can be up to 127 characters and must be unique within the policy. 4. Select one or more ACLs to use in the rule from the Available ACLs table. Each rule can match up to 10 ACLs (5 IPv4 and 5 IPv6) and can have multiple hops to a destination. The Available ACLs table displays the available IPv4 and IPv6 ACLs on this product. IPv4 and IPv6 have two separate policy lists. IPv4 PBR rules can only have IPv4 ACLs and IPv4 addresses in the next hop.
17 Policy-based routing Adding policies from saved configurations 1. Select an Ethernet router, Ethernet core router, or Ehternet Backbone router product and select Configure > Policy Based Routing. The Product_Name PBR Configuration dialog box displays. 2. Select Add > From Saved Configurations. The PBR Saved Configurations dialog box displays. 3. Select the configuration you want to add from the list and click OK. 4. Click OK on the Product_Name PBR Configuration dialog box.
Policy-based routing 17 The Deploy to Products - PBR dialog box displays. To deploy the PBR policy, refer to “Deploying a PBR policy on demand” on page 553, “Saving a PBR policy deployment” on page 554, or “Scheduling a PBR policy deployment” on page 555. Deleting a policy or rule 1. Select an Ethernet router, Ethernet core router, or Ehternet Backbone router product and select Configure > Policy Based Routing. The Product_Name PBR Configuration dialog box displays. 2.
17 Policy-based routing 6. Select the product monitoring template you want to use from the CLI Template list. 7. Select one or more of the following to capture snapshots: • Select the Pre-deployment check box to capture a snapshot of the product’s configuration prior to deployment of the security configuration. • Select the Post-deployment check box to capture a snapshot of the product’s configuration after deployment of the security configuration.
Policy-based routing 7. 17 Select one or more of the following to capture snapshots: • Select the Pre-deployment check box to capture a snapshot of the product’s configuration prior to deployment of the security configuration. • Select the Post-deployment check box to capture a snapshot of the product’s configuration after deployment of the security configuration.
17 Policy-based routing 7. Click OK on the Schedule Properties dialog box. 8. Click the Snapshot Use check box and click the ellipsis button to select the product monitoring template. NOTE The Snapshot Use check box is only available for IronWare products. The Pre-Post Snapshot Properties dialog box displays. 9. Select the product monitoring template you want to use from the CLI Template list. 10.
Policy-based routing 17 Configuring a daily deployment schedule To configure a daily deployment schedule, complete the following steps. 1. Select Daily from the Frequency list. 2. Select the time of day you want deployment to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. To finish configuring the deployment schedule, return to step 7 of “Scheduling a PBR policy deployment” on page 555.
17 ACL Accounting ACL Accounting NOTE ACL accounting is only supported on Ethernet router, Ethernet core router, or Ehternet Backbone router products running 5.4 or later. Ethernet router, Ethernet core router, or Ehternet Backbone router products monitor the number of times an ACL is used to filter incoming or outgoing traffic on an interface.
ACL Accounting 17 2. Select the Clear all counters on device check box. 3. Click OK on the ACL Accounting dialog box. Viewing ACL counters Before you can view ACL counters, you must enable ACL accounting on the product (refer to “Enabling or disabling ACL accounting” on page 558). To view ACL accounting on a product, select an Ethernet router, Ethernet core router, or Ehternet Backbone router product and select Configure > Security > Layer 2/3 ACL > Product.
17 560 ACL Accounting Brocade Network Advisor IP User Manual 53-1003056-01
Chapter 18 Security Management In this chapter • Security overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Layer 2 access control list management . . . . . . . . . . . . . . . . . . . . . . . . . . . • Layer 3 access control list policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Media Access Control (MAC) filter management. . . . . . . . . . . . . . . . . . . . . • Security configuration deployment. . . . . . . . . . . . . . .
18 Layer 2 access control list management You should configure the ACL on the device before you assign the ACL to an interface. You can create multiple ACLs and save them to the device configuration. However, the ACL does not filter traffic until you assign it to an interface. You can assign an ACL on a physical port, Virtual LAN (VLAN), or Link Aggregation Group (LAG). For IronWare OS products, you can create a standard ACL.
Layer 2 access control list management 18 FIGURE 206 Add - Layer 2 ACL Configuration dialog box 3. Enter a number for the ACL in the Number field. For IronWare 5.4 and later, ACL numbers range from 400 through 1399. For IronWare 5.3, ACL numbers range from 400 through 599. For IronWare less than 5.3, ACL numbers range from 400 through 499. 4. Select Permit or Deny from the Action list. 5.
18 Layer 2 access control list management • Any — Any of the protocols 9. (Deny actions only) Select the Log Enable check box to generate a log for this configuration. 10. Click the right arrow button. The new ACL rule displays in the ACL Entries list. 11. To create additional rules for the same ACL, repeat step 4 through step 10. 12. Click OK on the Add - Layer 2 ACL Configuration dialog box. The new ACL rule displays in the ACLs list. To create additional ACL, repeat step 2 through step 12. 13.
Layer 2 access control list management 18 Copying a Layer 2 ACL configuration (IronWare) To copy a Layer 2 ACL configuration, complete the following steps. 1. Select a device and select Configure > Security > Layer 2 ACL > Product. The Device_Name - Layer 2 ACL Configuration dialog box displays. 2. Select the ACL configuration you want to copy and click Duplicate. The Duplicate - Layer 2 ACL Configuration dialog box displays. 3. Enter a number for the ACL in the Number field. For IronWare 5.
18 Layer 2 access control list management Assigning a Layer 2 ACL configuration to an interface (IronWare) NOTE You cannot modify or delete a Layer 2 ACL that is bound to a port. To assign a Layer 2 ACL configuration to an interface, complete the following steps. 1. Select Configure > Security > Layer 2 ACL > Port. The Port Selection - Layer 2 ACL dialog box displays. FIGURE 207 Port Selection - Layer 2 ACL dialog box 2. Select a port in the Available Ports list and click the right arrow button. 3.
Layer 2 access control list management 18 FIGURE 208 Device_Name - Port_Number - Layer 2 ACL Configuration dialog box 4. (Ethernet routers only) Select a duration (1 Second, 1 Minute, 5 Minutes, or Cumulative) to track the number of times an ACL filter is used in the Hits Stats Duration list. Click Refresh to collect the hit statistics. The application updates the Hits column of the Details of Selected ACL list. 5.
18 Layer 2 access control list management 6. To assign an ACL configuration to outbound messages, select the Outbound check box and complete the following steps: NOTE You can only assign an ACL to an outbound message on an Application product. a. Select the Assign ACL option and choose one of the following options from the first Assign ACL list: • Select ACLs on this Product to assign ACLs deployed on the product to the port.
Layer 2 access control list management 18 Fabric OS Layer 2 ACL configuration NOTE Only available for Fabric OS DCB products. This section provides procedures for configuring a standard for extended Layer 2 ACL on a device, assigning the Layer 2 ACL to an interface, as well as clearing Layer 2 ACL assignments from a device. Creating a standard Layer 2 ACL configuration (Fabric OS) To create a standard Layer 2 ACL configuration, complete the following steps. 1.
18 Layer 2 access control list management The new ACL entry displays in the ACL Entries list. To create additional ACL entries, repeat step 3 through step 9. 10. Click OK on the Add - Layer 2 ACL Configuration dialog box. The new ACL configuration displays in the ACLs list. To create additional ACLs, repeat step 2 through step 10. 11. Click OK on the Device_Name - Layer 2 ACL Configuration dialog box. The Deploy to Products - Layer 2 ACL dialog box displays.
Layer 2 access control list management 18 The Duplicate - Layer 2 ACL Configuration dialog box displays with the default name ‘Copy of Original_Name’. 3. Enter a new name for the ACL in the Name field. 4. To edit an existing ACL rule, complete the following steps. a. Select the rule you want to edit in the ACL Entries list and click the left arrow button. b. Complete step 5 through step 9 in “Creating a standard Layer 2 ACL configuration (Fabric OS)” on page 569.
18 Layer 2 access control list management FIGURE 210 Device_Name - Layer 2 ACL Configuration (Extended) dialog box 4. Enter a name for the ACL in the Name field. 5. Enter a sequence number for the ACL in the Sequence field. 6. Select Permit or Deny from the Action list. 7. In the Source list, select one of the following options: • Any • Host • MAC Selecting MAC or Host enables the Source field. Enter the source address on which the configuration filters traffic in the Source field. 8.
Layer 2 access control list management 18 The new ACL entry displays in the ACL Entries list. To create additional ACL entries, repeat step 5 through step 12. 13. Click OK on the Add - Layer 2 ACL Configuration dialog box. The new ACL displays in the ACL Entries list. To create additional ACL entries, repeat step 2 through step 13. 14. Click OK on the Device_Name - Layer 2 ACL Configuration dialog box. The Deploy to Products - Layer 2 ACL dialog box displays.
18 Layer 2 access control list management The Duplicate - Layer 2 ACL Configuration dialog box displays with the default name ‘Copy of Original_Name’. 3. Enter a new name for the ACL in the Name field. 4. To edit an existing ACL rule, complete the following steps. a. Select the rule you want to edit in the ACL Entries list and click the left arrow button. b. Complete step 5 through step 12 in “Creating an extended Layer 2 ACL configuration (Fabric OS)” on page 571.
Layer 2 access control list management 18 The Device_Name - Port_Number/LAG LAG_Number- Layer 2 ACL Configuration dialog box displays. FIGURE 211 Device_Name - Port_Number - Layer 2 ACL Configuration dialog box 4. Select the Assign ACL option and choose one of the following options from the first Assign ACL list: • Select ACLs on this Product to assign ACLs deployed on the product to the port. The second list is populated with the ACLs deployed on the switch or associated with a save deployment object.
18 Layer 2 access control list management The Deploy to Ports - Layer 2 ACL dialog box displays. To deploy the configuration, refer to “Security configuration deployment” on page 629. Creating a Layer 2 ACL from a saved configuration To create a Layer 2 ACL from a saved configuration, complete the following steps. 1. Select the device and select Configure > Security > Layer 2 ACL > Product. The Device_Name - Layer 2 ACL Configuration dialog box displays. 2.
Layer 2 access control list management 18 4. Click OK on the Device_Name - Layer 2 ACL Configuration dialog box. NOTE The Layer 2 ACL configuration is not deleted from the switch until you deploy the configuration to the switch. The Deploy to Products - Layer 2 ACL dialog box displays. To save the configuration, refer to “Saving a security configuration deployment” on page 631. Network OS Layer 2 ACL configuration NOTE You cannot configure a Layer 2 ACL using the Management application.
18 Layer 2 access control list management • RBridge list — Only displays when you select a VCS fabric. Select a node from the fabric. • ACLs list — Displays the ACLs to be deployed for this configuration. The ACLs list includes the following details: Operation — Displays the ACL operation (no action) during deployment. Name — The name of the ACL. Type — The ACL type. Options include: Extended or Standard. Details of Selected ACLs list — Displays the details of the ACL selected in the ACLs list.
Layer 2 access control list management 18 FIGURE 213 Device_Name - Layer 2 ACL Configuration dialog box 2. Review the Layer 2 ACL configuration details. • ACLs list — Displays the ACLs to be deployed for this configuration. The ACLs list includes the following details: Operation — Displays the ACL operation (no action) during deployment. Name — The name of the ACL. Type — The ACL type. Options include: Extended or Standard.
18 Layer 3 access control list policy 1. Select the fabric, a node in the fabric, or a standalone device and select Configure > Security > Layer 2 ACL > Port. 2. Select a port in the Available Ports list and click the right arrow button to move it to the Selected Port list. 3. Click OK on the Port Selection - Layer 2 ACL dialog box. The Device/Fabric_Name - Port_Number - Layer 2 ACL Configuration dialog box displays.
Layer 3 access control list policy 18 An ACL is a unique collection of permit and deny statements (rules) that apply to frames. You can use ACLs to permit or deny incoming and outgoing frames from passing through an interface to which you assigned the ACLs. When the interface receives the frame, the device compares the fields in the frame against any ACLs assigned to the interface to verify that the frame has the required permissions to be forwarded.
18 Layer 3 access control list policy 1. Select the device and select Configure > Security > L3 ACL > Product. The Device_Name - L3 ACL Configuration dialog box displays. FIGURE 215 Device_Name - L3 ACL Configuration dialog box 2. Select New IPv4 from the Add list. The Add - L3 ACL Configuration dialog box displays. FIGURE 216 Add - L3 ACL Configuration (Standard) dialog box 3. Select Standard from the Type list. 4. Enter a name or number for the ACL in the ACL Name/Number field. 5.
Layer 3 access control list policy 18 • To enter an IP address, select IP Address and complete the following steps: a. Enter the source IP address on which the ACL filters traffic in the IP Address list and text field. b. Enter a portion of the source IP address on which the ACL filters traffic in the Wildcard Mask field. The wildcard mask is a four-part value in IP address format consisting of ones and zeros. Use zeros in the mask if the packet source address must match the IP address.
18 Layer 3 access control list policy 4. Click OK on the L3 ACL Saved Configurations dialog box. The new ACL displays in the ACLs list. 5. To set the configuration type and operations, refer to “Configuring the ACL configuration type and operations” on page 597. 6. (Ethernet routers only) To set the hit statistics duration, refer to “Configuring hit statistics” on page 597. 7. To deploy the configuration, click OK on the Device_Name - L3 ACL Configuration dialog box.
Layer 3 access control list policy 18 Copying a standard L3 ACL configuration To copy a standard L3 ACL configuration, complete the following steps. 1. Select the device and select Configure > Security > L3 ACL > Product. The Device_Name - L3 ACL Configuration dialog box displays. 2. Select the standard ACL configuration you want to copy in the ACLs list. 3. Click Duplicate. The Duplicate - L3 ACL Configuration dialog box displays with the default name ‘Copy of Original_Name’. 4.
18 Layer 3 access control list policy The Add - L3 ACL Configuration dialog box displays. 3. Select Extended from the Type list. FIGURE 217 Add - L3 ACL Configuration (Extended) dialog box 4. Enter a name or number for the ACL in the ACL Name/Number field. 5. Select Permit or Deny from the Action list. 6. Enter a description for the ACL in the Remarks field. 7. Choose one of the following options from the Source list: • To enter an IP address, select IP Address and complete the following steps: a.
Layer 3 access control list policy 18 • To enter an IP address, select IP Address and complete the following steps: a. Enter the destination IP address on which the ACL filters traffic in the IP Address list and text field. b. Enter a portion of the destination IP address on which the ACL filters traffic in the Wildcard Mask field. • To select a network, select IP Address and choose a network from the list.
18 Layer 3 access control list policy 1. Select the device and select Configure > Security > L3 ACL > Product. The Device_Name - L3 ACL Configuration dialog box displays. 2. Select the ACL configuration you want to edit in the ACLs list and click Edit. The Edit - L3 ACL Configuration dialog box displays. 3. To edit an existing rule, complete the following steps. a. Select the rule you want to edit in the ACL Entries list and click the left arrow button. The rule displays in the ACL Entry area. b.
Layer 3 access control list policy 18 The Duplicate - L3 ACL Configuration dialog box displays with the default name ‘Copy of Original_Name’. 3. Enter a new name or number for the ACL in the ACL Name/Number field. 4. To edit an existing rule, complete the following steps. a. Select the rule you want to edit in the ACL Entries list and click the left arrow button. The rule displays in the ACL Entry area. b. Complete step 5 through step 12 in “Creating an extended L3 ACL configuration” on page 585.
18 Layer 3 access control list policy Creating an IPv6 L3 ACL configuration To create an IPv6 L3 ACL configuration, complete the following steps. 1. Select an Ethernet router product and select Configure > Security > L3 ACL > Product. The Device_Name - L3 ACL Configuration dialog box displays. 2. Select New IPv6 from the Add list. The Add - L3 ACL (IPv6) Configuration dialog box displays. FIGURE 218 Add - L3 ACL (IPv6) Configuration dialog box 3.
Layer 3 access control list policy 18 • To enter an IP address, select IP Address and complete the following steps: a. Enter the destination IP address on which the ACL filters traffic in the IP Address list and text field. You can enter the IPv6 address in compressed (for example, you can compress 2001:db8:0:0:0:0:2:1 can be shortened to 2001:db8::2:1) or raw format. b. Enter the prefix length (1 through 128) in the Prefix Length field.
18 Layer 3 access control list policy The new ACL displays in the ACLs list. 17. To set the configuration type and operations, refer to “Configuring the ACL configuration type and operations” on page 597. 18. (Ethernet routers only) To set the hit statistics duration, refer to “Configuring hit statistics” on page 597. 19. To deploy the configuration, click OK on the Device_Name - L3 ACL Configuration dialog box. The Deploy to Products - L3 ACL dialog box displays.
Layer 3 access control list policy 18 Copying an IPv6 L3 ACL configuration To copy an IPv6 L3 ACL configuration, complete the following steps. 1. Select an Ethernet router product and select Configure > Security > L3 ACL > Product. The Device_Name - L3 ACL Configuration dialog box displays. 2. Select the ACL configuration you want to copy in the ACLs list and click Duplicate. The Duplicate - L3 ACL (IPv6 ) Configuration dialog box displays with the default name ‘Copy of Original_Name’.
18 Layer 3 access control list policy 11. Click OK on the Duplicate - L3 ACL (IPv 6) Configuration dialog box. The new ACL displays in the ACLs list. 12. To set the configuration type and operations, refer to “Configuring the ACL configuration type and operations” on page 597. 13. (Ethernet routers only) To set the hit statistics duration, refer to “Configuring hit statistics” on page 597. 14. To deploy the configuration, click OK on the Device_Name - L3 ACL Configuration dialog box.
Layer 3 access control list policy 18 FIGURE 221 Device_Name - Port_Number - ACL Port Configuration dialog box 4. (Ethernet routers only) Select a duration (1 Second, 1 Minute, 5 Minutes, or Cumulative) to track the number of times an ACL filter is used in the Hits Stats Duration list. Click Refresh to collect the hit statistics. The application updates the Hits column of the Details of Selected ACL list. 5.
18 Layer 3 access control list policy a. Select the Assign ACL option and choose one of the following options from the first Assign ACL list: • Select ACLs on this Product to assign ACLs deployed on the product to the port. The second list is populated with the ACLs deployed on the switch or associated with a save deployment object. • Select ACLs bound to this port to assign ACLs bound to the interface to the port. The second list is populated with the ACLs bound to the interface.
Layer 3 access control list policy 18 Configuring the ACL configuration type and operations To configure the ACL configuration type and operation, complete the following steps. 1. Select the configuration type by choosing one of the following options: • Incremental — Deploys add and delete operations. During deployment, the Management application checks all ACLs to determine if the ACL name or number matches any ACL number already deployed on a switch.
18 Layer 3 access control list policy Configuring L3 ACL advanced settings You configure L3 ACL advanced settings for extended L3 ACL device configurations.
Layer 3 access control list policy 18 • Max-throughput (4) — Select to have the ACL filters packets that match the maximum throughput TOS. The decimal value is 4. • Min-delay (8) — Select to have the ACL filter packets that match the minimum delay TOS. The decimal value is 8. 4. Select one of the following protocols from the Protocol list to filter the packet by protocol.
18 Layer 3 access control list policy b. Enter a port number or select a port application name from the Start list. If you selected range from the Operator list, enter the port number or name of the lower numbered port in the range. Click the ellipsis button to launch the Service dialog box to see a list of services and service groups. For more information about services and service groups, refer to “Service configuration” on page 611. c.
Layer 3 access control list policy b. 18 Choose one of the following code types: The available code types vary depending on the selected message type.
18 Layer 3 access control list policy 14. Click OK on the Advanced Settings dialog box.
Layer 3 access control list policy 18 1. Click the Networks tab. FIGURE 223 Network dialog box, Networks tab 2. Review the List of Networks table: • Name — The user-defined network name. • Subnet — The IP address of the subnet. • Mask — The IP address of the mask. 3. Click Close on the Network dialog box. To finish configuring the ACL, return to one of the above procedures. Creating a network You can access the Network dialog box when configuring a standard or extended L3 ACL device configuration.
18 Layer 3 access control list policy 3. Enter a name for the network in the Name field. 4. Enter a valid IP address (IPv4 format) in the Subnet field. 5. Enter a valid IP address in the Mask field. If you use the ACL Network as the source IP address, the Subnet mask from the ACL Network will be converted to Wildcard mask when deploying the ACL to the device. The Network dialog box only accepts subnet mask. 6. Click OK on the Add Network dialog box. 7. Click Close on the Network dialog box.
Layer 3 access control list policy 18 Copying a network You can access the Network dialog box when configuring a standard or extended L3 ACL device configuration.
18 Layer 3 access control list policy 3. Click Yes on the confirmation message. 4. Click Close on the Network dialog box. To finish configuring the ACL, return to one of the above procedures. Network group configuration The Management application allows you to filter traffic from a specific network group. A network group is made up of one or more devices, networks, or network groups.
Layer 3 access control list policy 18 2. Review the List of Network Groups table: • • • • • Name — The user-defined network group name. Host Names — The name of each host in the network group. Address Range — The range of IP addresses for the network group. Networks — The name of each network in the network group. Network Groups — The name of each network group in the network group. 3. Click Close on the Network dialog box. To finish configuring the ACL, return to one of the above procedures.
18 Layer 3 access control list policy 4. To add a host to the network group, complete the following steps. a. Enter a valid host name in the Host Name field. b. Click the right arrow button to move the host name to the Selected table. 5. To add an address range to the network group, complete the following steps. a. Enter an IP address for the start of the range in the Start field. b. Enter an IP address for the end of the range in the End field. c.
Layer 3 access control list policy 18 5. To edit an address range to the network group, complete the following steps. a. Select the range you want to edit in the Selected table and click the left arrow button. b. Change the IP address for the start of the range in the Start field. c. Change the IP address for the end of the range in the End field. d. Click the right arrow button to move the address range back to the Selected table. 6.
18 Layer 3 access control list policy 5. To add a host to the network group, complete the following steps. a. Enter a valid host name in the Host Name field. b. Click the right arrow button to move the host name to the Selected table. 6. To edit an address range to the network group, complete the following steps. 7. a. Select the range you want to edit in the Selected table and click the left arrow button. b. Change the IP address for the start of the range in the Start field. c.
Layer 3 access control list policy 18 Deleting a network group NOTE You cannot delete a network group that is in use. You can access the Network dialog box when configuring a standard or extended L3 ACL device configuration.
18 Layer 3 access control list policy Viewing existing services You can access the Service dialog box when configuring an extended L3 ACL device configuration.
Layer 3 access control list policy 18 Creating a service You can access the Service dialog box when configuring an extended L3 ACL device configuration.
18 Layer 3 access control list policy Editing a service You can access the Service dialog box when configuring an extended L3 ACL device configuration.
Layer 3 access control list policy 18 4. Select one of the following protocol options: • TCP • UDP 5. Enter a port number in the Port field. 6. Click OK on the Duplicate Service dialog box. 7. Click Close on the Service dialog box. To finish configuring the advanced settings for the ACL, refer to “Configuring L3 ACL advanced settings” on page 598. Deleting a service You can access the Service dialog box when configuring an extended L3 ACL device configuration.
18 Layer 3 access control list policy Service group configuration The Management application allows you to filter traffic from a specific service group. A service group is made up of one or more port ranges, services, or service groups.
Layer 3 access control list policy 18 3. Click Close on the Service dialog box. To finish configuring the advanced settings for the ACL, refer to “Configuring L3 ACL advanced settings” on page 598. Creating a service group You can access the Service dialog box when configuring an extended L3 ACL device configuration.
18 Layer 3 access control list policy 5. To add a service to the group, complete the following steps. a. Select one or more services to add to the group in the Services table. b. Click the right arrow button to move the selected services to the Selected table. 6. To add a service group to the group, complete the following steps. 7. a. Select one or more service groups to add to the group in the Services table. b.
Layer 3 access control list policy 18 6. Click OK on the Edit Service Group dialog box. The Service dialog box, Service Group tab displays with the new group in the List of Service Groups table. 7. Click Close on the Service dialog box. To finish configuring the advanced settings for the ACL, refer to “Configuring L3 ACL advanced settings” on page 598. Copying a service group You can access the Service dialog box when configuring an extended L3 ACL device configuration.
18 Media Access Control (MAC) filter management Deleting a service group You can access the Service dialog box when configuring an extended L3 ACL device configuration.
Media Access Control (MAC) filter management 18 You can configure and manage MAC filters at the device or interface (port/trunk) level. NOTE You can only apply MAC filters inbound traffic. When you configure MAC filters on a device, the MAC filter does not execute until you deploy it on an interface. Once deployed to an interface, the device performs the action associated with the first matching filter (of all filters deployed to the device) to the packet.
18 Media Access Control (MAC) filter management FIGURE 232 Add MAC Filter dialog box 3. Enter a MAC filter number in the MAC Filter # field. MAC filter numbers range from 1 through 1024. 4. (Optional) Enter a description of the MAC filter in the Description field. The description is saved to the Management application database only. It is not saved to the switch. 5. Select Permit or Deny from the Action list. 6.
Media Access Control (MAC) filter management 18 9. In the Operator list, select one of the following to specify a binary operator: • • • • = (equal to) != (not equal to) > (greater than) < (less than). This field is not available when the Ethernet Type is none. 10. Enter the type of frame in the Frame Type field. This ia 2 byte hexadecimal value. Valid values include 0600 to FFFF. This field is not available when the Ethernet Type is none. 11. Click OK on the Add MAC Filter dialog box.
18 Media Access Control (MAC) filter management 4. Click OK on the MAC Filter Saved Configurations dialog box. The Device_Name - MAC Filter Configuration dialog box displays with the selected MAC filters in the MAC Filters table. If you selected a saved deployment configuration, all MAC filters associated with the saved deployment configuration display in the MAC Filters table. 5. Click OK on the Device_Name - MAC Filter Configuration dialog box. The Deploy to Products - MAC Filter dialog box displays.
Media Access Control (MAC) filter management 18 6. In the Destination Address list, select one of the following options: • Any • MAC Selecting MAC enables the Destination Address and Destination Mask fields. 7. a. Enter the destination MAC address on which the configuration filters traffic in the Destination Address field. b. Enter the mask associated with the destination MAC address in the Destination Mask field.
18 Media Access Control (MAC) filter management 4. Enter a description of the MAC filter in the Description field. 5. Select Permit or Deny from the Action list. 6. In the Source Address list, select one of the following options: • Any • MAC Selecting MAC enables the Source Address and Source Mask fields. 7. a. Enter the source MAC address on which the configuration filters traffic in the Source Address field. b. Enter the mask associated with the source MAC address in the Source Mask field.
Media Access Control (MAC) filter management 18 Deleting a MAC filter 1. Select Configure > Security > MAC Filter > Product. The Device_Name - MAC Filter Configuration dialog box displays. 2. Select the MAC filter you want to delete in the MAC Filters table and click Delete. 3. Click Yes on the confirmation message. 4. Click OK on the Device_Name - MAC Filter Configuration dialog box. NOTE The MAC Filter is not deleted from the switch until you deploy the configuration to the switch.
18 Media Access Control (MAC) filter management Clearing MAC filter assignments To clear a MAC filter assignment from a port or product, complete the following steps. 1. Select Configure > Security > MAC Filter > Port. The Port Selection - MAC Filter dialog box displays. 2. Select the port you want to clear the MAC filter from in the Available Ports list and click the right arrow button. You can select more ports or products from the Deploy to Ports - MAC Filter dialog box. 3.
Security configuration deployment 18 Security configuration deployment Figure 235 shows the standard interface used to deploy security configurations. FIGURE 235 Deploy to Product/Ports dialog box Before you can deploy a security configuration, you must create the security configuration.
18 Security configuration deployment Deploying a security configuration on demand To deploy a security configuration immediately, complete the following steps. FIGURE 236 Deploy to Product/Ports dialog box 1. Choose one of the following options: • Deploy now — Select to deploy the configuration immediately on the product or port without saving the deployment definition.
Security configuration deployment 18 • Select the Pre-deployment check box to capture a snapshot of the product’s configuration prior to deployment of the security configuration. • Select the Post-deployment check box to capture a snapshot of the product’s configuration after deployment of the security configuration. If you select the Post-deployment check box, enter the amount of time (between 1 and 300 seconds) you want the application to wait before capturing the snapshot in the Delay field. 8.
18 Security configuration deployment 5. Click the Snapshot Use check box and click the ellipsis button to select the product monitoring template. NOTE The Snapshot Use check box is only available for IronWare products. The Pre-Post Snapshot Properties dialog box displays. 6. Select the product monitoring template you want to use from the CLI Template list. 7.
Security configuration deployment 18 2. Choose one of the following options: • Select New from the Add list. The Add - Layer 2 ACL Configuration dialog box displays. • Select an ACL in the list and click Edit. The Edit - Layer 2 ACL Configuration dialog box displays. 3. Configure the Layer 2 ACL and click OK on the Add/Edit - Layer 2 ACL Configuration dialog box. 4. Click OK on the Device_Name - Layer 2 ACL Configuration dialog box. The Deploy to Products - Layer 2 ACL dialog box displays. 5.
18 Security configuration deployment Configuring a one-time deployment schedule To configure a one-time schedule, complete the following steps. 1. Select One Time from the Frequency list. 2. Select the time of day you want deployment to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. 3. Click the Date list to select a date from the calendar.
Security configuration deployment 18 Configuring a monthly deployment schedule To configure a monthly schedule, complete the following steps. 1. Select Monthly from the Frequency list. 2. Select the time of day you want deployment to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. 3. Select the day you want deployment to run from the Day of the Month list (1 through 31).
18 636 Security configuration deployment Brocade Network Advisor IP User Manual 53-1003056-01
Chapter 19 Zoning In this chapter • Zoning overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Zone database size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Zoning configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Zoning administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
19 Zoning overview Blue Zone Server 2 Server 1 Storage 2 Red Zone Storage 1 RAID Green Zone Storage 3 Server 3 FIGURE 239 Zoning NOTE A Network OS fabric supports zoning only if all devices in the fabric are running Network OS v2.1.0 or later. NOTE Zone objects based on physical port number or port ID (D,I ports) are not supported in Network OS fabrics. Online zoning Online zoning allows you to do the following: • • • • • • 638 View both defined and active zone information in the fabric.
Zoning overview 19 Offline zoning Offline zoning is supported in Network OS fabrics. Offline zoning is supported in Network OS and Fabric OS fabrics. NOTE Offline zoning is available only for Enterprise and Professional Plus editions. Offline zoning enables you to copy a fabric zone database and edit it offline. The benefits to offline zoning include the following: • You want to make changes to the zone database now, but apply them later.
19 Zone database size Zone database size The supported maximum zone database size is 1 MB. If the fabric contains only Backbone Chassis platforms, the supported maximum zone database size is 2 MB. NOTE Network OS recommends a maximum zone database size of 150 KB. As the size of the zone database increases, performance decreases. The Professional Edition does not support large zone databases. In the Professional Edition, the maximum size of the zone database without zone aliases is 32 KB.
Zoning configuration 19 For specific instructions, refer to “Activating a zone configuration” on page 652. 9. Set zoning policies, if necessary. For specific instructions, refer to “Enabling or disabling the default zone for fabrics” on page 646. 10. Click OK or Apply to save your changes. Any zones or zone configurations you have changed are saved in the zone database. Creating a zone 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2.
19 Zoning configuration Adding members to a zone Use this procedure to add a member to a zone when the member is listed in the Potential Members list of the Zone DB tab. Enterprise and Professional Plus editions: For instructions to add a member to a zone when the member is not listed in the Potential Members list, refer to the procedure “Creating a member in a zone” on page 643. 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2.
Zoning configuration 19 Creating a member in a zone Use this procedure to add a member to a zone when the member is not listed in the Potential Members list of the Zone DB tab. For instructions to add a member to a zone when the member is listed in the Potential Members list, refer to the procedure “Adding members to a zone” on page 642. 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Click the Zone DB tab if that tab is not automatically displayed. 3.
19 Zoning configuration 2. Click the Zone DB tab if that tab is not automatically displayed. 3. Select a fabric from the Zoning Scope list. This identifies the target entity for all subsequent zoning actions and displays the zoning database for the selected entity. 4. Click the plus sign (+) by the appropriate zone in the Zones list to expand the listing and show the zone’s members. 5.
Zoning configuration 19 Deleting a zone 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Click the Zone DB tab if that tab is not automatically displayed. 3. Select a fabric from the Zoning Scope list. This identifies the target entity for all subsequent zoning actions and displays the zoning database for the selected entity. 4. Select one or more zones in the Zones list that you want to delete, then right-click and select Delete.
19 Zoning configuration 6. Click OK or Apply to save your changes. Any zones or zone configurations you have changed are saved in the zone database. Customizing the zone member display In the Zoning dialog box, you can customize which properties are displayed and in what order. 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays, based on the Configure > Zoning menu selection. 2. Click the Zone DB tab if that tab is not automatically displayed. 3.
Zoning configuration 19 The Zoning Policies dialog box closes and the Zone DB tab displays. 8. Click OK or Apply to save your changes. Any zones or zone configurations you have changed are saved in the zone database. Creating a zone alias An alias is a logical group of port index numbers and WWNs. Specifying groups of ports or devices as an alias makes zone configuration easier by enabling you to configure zones using an alias rather than inputting a long string of individual members.
19 Zoning configuration 3. Select a fabric from the Zoning Scope list. 4. Select Alias from the Type list. 5. Select the alias you want to edit in the Alias list and click Edit. The Edit Alias dialog box displays. 6. Add members to the alias by completing the following steps. a. Select an option from the Type list to choose how to display the objects in the Potential Members list. For Network OS fabrics, WWN is selected by default and cannot be changed. b.
Zoning configuration 19 Exporting zone aliases 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Click the Zone DB tab if that tab is not automatically displayed. 3. Select a fabric from the Zoning Scope list. 4. Select Alias from the Type list. 5. Click Export. The Export Alias dialog box displays. 6. Browse to the location to which you want to export the zone alias data. 7. Enter a name for the export file in the File Name field. 8. Click Export Alias. 9.
19 Zoning configuration Duplicating a zone alias 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Click the Zone DB tab if that tab is not automatically displayed. 3. Select a fabric from the Zoning Scope list. 4. Select Alias from the Type list. 5. Right-click the zone alias you want to duplicate and select Duplicate. The duplicated zone alias displays in the Alias list (for example, _Copy). 6. Edit the name.
Zoning configuration 19 Viewing zone configuration properties 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Click the Zone DB tab if that tab is not automatically displayed. 3. Select a fabric from the Potential Members list. 4. Right-click the zone configuration you want to review in the Zone Configurations list and select Properties. The Zone Configuration Properties dialog box displays. 5. Review the zone configuration properties. 6.
19 Zoning configuration 4. Click the plus sign (+) by the appropriate zone configuration in the Zone Configurations list to expand the listing and show the zone configuration members. 5. Perform one of the following actions: • Right-click the name of the zone you want to remove in the Zone Configurations list and select Remove. • To remove multiple zones, select the zones to be removed from the zone configuration, and click the left arrow between the Zones list and the Zone Configurations list.
Zoning configuration 19 a. Make sure the selected zone configuration is the one you want to activate. b. (Optional) Select the Generate a report with the activation of new zone configuration check box to generate the Zone Configuration Activation report. c. If you are activating a zone configuration from the offline zone database, select or clear the Save only the selected zone configuration to the existing zone database in the fabric check box.
19 Zoning configuration 5. Click Yes on the confirmation message. If the deactivation succeeded, the zone configuration no longer displays in the Active Zone Configuration tab. If the deactivation failed, the zone configuration still displays in the Active Zone Configuration tab. 6. Click OK or Apply to save your changes. Any zones or zone configurations you have changed are saved in the zone database. Renaming a zone configuration 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2.
Zoning configuration 19 NOTE If you select “Do not show me this again.” on the confirmation message, the next time you delete a zone configuration, it will be deleted without requesting confirmation from you. If you delete something in error, click Cancel on the Zoning dialog box to exit without saving changes since the last operation (Apply or Activate). When you reopen the dialog box, the zone configuration is restored. 6. Click OK or Apply to save your changes.
19 Zoning configuration 2. Click the Zone DB tab if that tab is not automatically displayed. 3. Select a zone database from the Zone DB list. 4. Select Save As from the Zone DB Operation list. The Save Zone DB As dialog box displays. 5. Enter a name for the database in the Zone DB Name field and click OK. 6. Select a fabric from the Zoning Scope list. This identifies the target entity for all subsequent zoning actions and displays the zoning database for the selected entity.
Zoning configuration 19 The message closes and the selected zone configurations are removed from the Zone Configurations list. 6. Click OK to save your work and close the Zoning dialog box. Any zones or zone configurations you have changed are saved in the zone database. Refreshing a zone database 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Click the Zone DB tab if that tab is not automatically displayed. 3. Select a zone database from the Zone DB list. 4.
19 Zoning configuration Merging two zone databases If a zone or zone configuration is merged, the resulting zone or zone configuration includes all members that were marked for addition or removal as well as all members not otherwise marked. NOTE: You cannot merge the following zones with a Network OS fabric: • • • • • Zones with aliases (can merge with Network OS 3.0.0 and later) Zones with D,I members TI zones QoS zones Redirection zones 1. Select Configure > Zoning > Fabric.
Zoning configuration 19 5. (Optional) Merge elements (zone configurations, zones, or aliases) by completing the following steps: a. Select one or more of the same element type from the Reference Zone DB area. You can select zone configurations, zones, or aliases, but do not mix element types. b. Select the same type of element in the Editable Zone DB area. If you selected a zone configuration in the Reference Zone DB area, you must select a zone configuration in the Editable Zone DB area. c.
19 Zoning configuration 2. Select Compare from the Zone DB Operation list. The Compare/Merge Zone DBs dialog box displays, as shown in Figure 240. 3. Select the database for the first fabric from the Reference Zone DB list. 4. Select the database for the second fabric from the Editable Zone DB list. 5. Set up a zone configuration that contains the active zones in both fabrics: a. Select the name of the active zone configuration from the Reference Zone DB area. b.
Zoning administration 19 5. Click Export Zone DB. 6. Click OK to save your work and close the Zoning dialog box. Importing an offline zone database NOTE You cannot import an online zone database. You cannot import a zone database that contains zones with duplicate members. 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Select an offline zone database from the Zone DB list. 3. Select Import from the Zone DB Operation list. The Import Zone DB dialog box displays. 4.
19 Zoning administration Comparing zone databases You can compare zone databases against one another to identify any and all differences between their memberships prior to sending them to the switch. Once the two databases have been compared, icons display to show the differences between the two databases. These icons are illustrated and described in Table 72. TABLE 72 Icon Compare icon indicators Description Added — Displays when an element is added to the editable database.
Zoning administration 19 The Reference Zone DB and Editable Zone DB areas display all available element types (zone configurations, zones, and aliases) for the two selected zone databases. In the Editable Zone DB area, each element type and element display with an icon indicator (Table 72) to show the differences between the two databases. 5.
19 Zoning administration Setting change limits on zoning activation Use this procedure to set a limit on the number of changes a user can make to the zone database before activating a zone configuration. If the user exceeds the limit, zone configuration activation is not allowed. By default, all fabrics allow unlimited changes. Changes include adding, removing, or modifying zones, aliases, and zone configurations. Use this procedure to set the following limits: • Set a different limit for each fabric.
Zoning administration 19 This identifies the target entity for all subsequent zoning actions and displays the zoning databases for the selected entity. 3. Select the Fabric Zone DB from the Zone DB list. 4. Select Clear All from the Zone DB Operation list. 5. Click Yes on the confirmation message. The message closes and the Fabric Zone DB is cleared of all zoning configurations. 6. Click OK to close the Zoning dialog box.
19 Zoning administration If the member is found, all instances of the zone member found are highlighted in the Zones list. Finding a zone member in the potential member list Use this procedure to locate a zone member in the Potential Members list on the Zone DB tab. 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Click the Zone DB tab if that tab is not automatically displayed. 3. Select a fabric from the Zoning Scope list.
Zoning administration 19 This identifies the target entity for all subsequent zoning actions and displays the zoning database for the selected entity. 4. Select the zone configuration member (for example, the zone) in the Zone Configurations list that you want to find in the Zones list. (Press SHIFT or CTRL and click each zone configuration member to select more than one zone configuration member.) 5. Click Find < between the Zones list and the Zone Configurations list.
19 Zoning administration Removing an offline device The Management application enables you to remove an offline device from all zones and zone aliases in the selected zone DB. 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Select a fabric from the Zoning Scope list. This identifies the target entity for all subsequent zoning actions and displays the zoning database for the selected entity. 3. Select Offline Utility from the Zone DB Operation list.
Zoning administration 19 6. Enter the WWN, name, domain and port index numbers, or alias — whichever is appropriate for the method you chose in step 5. When you choose the WWN method, you may define a name for the replacement zone member. 7. Click OK. The new zone member replaces the old zone member in the Zones list and the Replace Zone Member dialog box closes. 8. Click OK or Apply to save your changes. Any zones or zone configurations you have changed are saved in the zone database.
19 Zoning administration 1. Select Configure > Zoning > Fabric. The Zoning dialog box displays. 2. Select a fabric from the Zoning Scope list. This identifies the target entity for all subsequent zoning actions and displays the zoning database for the selected entity. 3. Select Offline Utility from the Zone DB Operation list. The Offline Device Management dialog box displays. 4. Clear the Remove column check box for the offline device you want to replace. 5.
Chapter 20 Port Fencing In this chapter • About port fencing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Adding thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Editing thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Removing thresholds.
20 About port fencing Viewing port fencing configurations NOTE This feature is only available for Fabric OS devices. NOTE This feature requires a Trial or Licensed version. Port Fencing allows you to protect your SAN from repeated operational problems experienced by ports. Use Port Fencing to set threshold limits for the number of specific port events permitted during a given time period on the selected object.
About port fencing 20 • Thresholds table — List of configured thresholds based on the threshold type selected in the Violation Type list. Limit (Fabric OS) — The number of events allowed for the assigned threshold. If the object has no fencing support or no fencing changes, this field displays two hyphens separated by a space (- -). When the object is only partially managed by the management application, this field displays as inactive (grayed-out).
20 Thresholds • Ports table — All managed fabric, director, switch, port type, and port objects (label and icon) in its hierarchical relationship to the other objects in the tree. Ports — Displays all discovered fabrics, devices, and ports as both text and icons. Port Type — The operational port type of the port. This field displays as inactive (grayed-out) when either the object’s firmware does not support Port Fencing or the object is only partially managed by the management application.
Thresholds • • • • 20 Invalid Words (Fabric OS only) Link Reset (Fabric OS only) Protocol Errors (Fabric OS) State Change (Fabric OS only) NOTE Fabric OS devices are allowed only 2 defined thresholds (one default and one custom) for each threshold type and only one of these thresholds can be active on the device. During the dynamic operation of a Fabric, any port could be any type.
20 Thresholds • • • • • • • • • • • • • 16 Gbps 8-slot Backbone Chassis 16 Gbps 4-slot Backbone Chassis 8 Gbps Encryption Switch Encryption Blade 10 Gbps FCoE Port Router Blade FC 8 GB 64-port Blade 8 Gbps Extension Blade FC 8 Gbps 16-port Blade FC 8 Gbps 32-port Blade FC 8 Gbps 48-port Blade FC 8 Gbps 64-port Blade FC 16 Gbps 32-port Blade FC 16 Gbps 48-port Blade Invalid CRCs threshold NOTE This threshold is only available for Fabric OS devices.
Adding thresholds 20 State Change threshold NOTE This threshold is only available for Fabric OS devices running 6.3 or later. Use this type of threshold to block a port when a state change violation type meets the Fabric OS switch threshold. For 4 Gbps Router, Extension Switches and Blades only, when you apply this threshold on an E Port, the threshold is also applied to the VE Ports (internally by Fabric OS). Adding thresholds NOTE Only available for Fabric OS products.
20 Adding thresholds FIGURE 243 Port Fencing dialog box 2. Select C3 Discard Frames (Fabric OS only) from the Violation Type list. 3. Click Add. The Add C3 Discard Frames Threshold dialog box displays. FIGURE 244 Add C3 Discard Frames Threshold dialog box 4. Enter a name for the threshold in the Name field. 5. Select one of the following options: • Default — Uses device defaults. Go to step 8. • Custom — Uses your selections. Continue with step 6. 6.
Adding thresholds 20 • Second — the port is blocked as soon as the specified number of C3 discarded frames allowed is reached within a second. • Minute — the port is blocked as soon as the specified number of C3 discarded frames allowed is reached within a minute. • Hour — the port is blocked as soon as the specified number of C3 discarded frames allowed is reached within a hour. • Day — the port is blocked as soon as the specified number of C3 discarded frames allowed is reached within a day. 8.
20 Adding thresholds • Custom — Uses your selections. Continue with step 6. 6. Enter the number of invalid CRCs allowed for the threshold in the Threshold errors field. 7. Select the time period for the threshold from the errors per list. The following choices are available: • None — the port is blocked as soon as the specified number of invalid CRCs allowed is met. • Second — the port is blocked as soon as the specified number of invalid CRCs allowed is reached within a second.
Adding thresholds 20 FIGURE 246 Add Invalid Words Threshold dialog box 4. Enter a name for the threshold in the Name field. 5. Select one of the following options: • Default — Uses device defaults. Go to step 8. • Custom — Uses your selections. Continue with step 6. 6. Enter the number of invalid words allowed for the threshold in the Threshold errors field. 7. Select the time period for the threshold from the errors per list.
20 Adding thresholds 1. Select Monitor > Fabric Watch > Port Fencing. The Port Fencing dialog box displays. 2. Select Link Reset (Fabric OS only) from the Violation Type list. 3. Click Add. The Add Link Reset Threshold dialog box displays. FIGURE 247 Add Link Reset Threshold dialog box 4. Enter a name for the threshold in the Name field. 5. Select one of the following options: • Default — Uses device defaults. Go to step 8. • Custom — Uses your selections. Continue with step 6. 6.
Adding thresholds 20 8. Click OK to add the Link Resets threshold to the table and close the Add Link Reset Threshold dialog box. To assign this threshold to fabrics, switches, or switch ports, refer to “Assigning thresholds” on page 685. 9. Click OK on the Port Fencing dialog box. Adding a Protocol Error threshold NOTE Only available for Fabric OS products. NOTE This feature requires a Trial or Licensed version.
20 Adding thresholds a. Select one of the following options: • Default — Uses device defaults. Go to step 6. • Custom — Uses your selections. Continue with step b. b. Enter the number of protocol errors allowed for the threshold from the Threshold errors field. c. Select the time period for the threshold from the errors per list. The following choices are available: • None — the port is blocked as soon as the specified number of protocol errors allowed is met.
Adding thresholds 20 FIGURE 249 Add State Change Threshold dialog box 4. Enter a name for the threshold in the Name field. 5. Select one of the following options from the Policy Type field: • Default — Uses device defaults. Go to step 8. • Custom — Uses your selections. Continue with step 6. 6. Enter the number of state changes allowed for the threshold in the Threshold errors field. 7. Select the time period for the threshold from the errors per list.
20 Adding thresholds 1. Select Monitor > Fabric Watch > Port Fencing. The Port Fencing dialog box displays. 2. Select a threshold type from the Violation Type list. 3. Select the threshold you want to assign from the Thresholds table. 4. Select the objects (All Fabrics, Fabric, Director, Switch, Port Type, and/or Port) to which you want to assign the threshold from the Ports table. 5. Click the right arrow.
Editing thresholds 20 2. Select a threshold type from the Violation Type list. 3. Click Add. The Add Type Threshold dialog box displays. 4. Type a name for the new threshold (for example, AvoidProtocolError) in the Name field. 5. Select or enter the maximum number of errors or violations allowed in the Threshold errors/violations field. 6. Select the minimum time period available from the Threshold minutes/seconds list. 7. Click OK on the Add Type Threshold dialog box. 8.
20 Editing thresholds Editing an Invalid CRCs threshold NOTE This threshold is only available for Fabric OS devices. NOTE This feature requires a Trial or Licensed version. Use to block a port when the Invalid CRCs Threshold violation type meets the Fabric OS switch threshold. To edit an Invalid CRCs threshold, complete the following steps. 1. Select Monitor > Fabric Watch > Port Fencing. The Port Fencing dialog box displays. 2. Select Invalid CRCs (Fabric OS only) from the Violation Type list. 3.
Editing thresholds 20 5. Click OK on the Edit Invalid Words Threshold dialog box. If the threshold has already been assigned to ports, an “Are you sure you want to make the requested changes to this threshold on “X” ports?” message displays. Click OK to close. To assign this threshold to fabrics, switches, or switch ports, refer to “Assigning thresholds” on page 685. 6. Click OK on the Port Fencing dialog box. Editing a Link Reset threshold NOTE This threshold is only available for Fabric OS devices.
20 Editing thresholds • ISL Protocol Mismatch–ISL has been repeatedly put into the Invalid Attachment state due to a protocol error. To edit a Protocol Error threshold, complete the following steps. 1. Select Monitor > Fabric Watch > Port Fencing. The Port Fencing dialog box displays. 2. Select Protocol Error from the Violation Type list. 3. Select the threshold you want to change and click Edit. The Edit Protocol Error Threshold dialog box displays. 4.
Editing thresholds 20 Finding assigned thresholds The Management application allows you to find all ports with a specific threshold applied. NOTE This search is performed on the threshold name. Since Fabric OS devices do not retain the threshold name, the ability to search for a threshold on a Fabric OS device is not available in most cases. To find assigned thresholds, complete the following steps. 1. Select Monitor > Fabric Watch > Port Fencing. The Port Fencing dialog box displays. 2.
20 Removing thresholds 4. Review the Thresholds table. • • • • • • • • • # (Number) — The line number for each threshold in the table. Status — The threshold status. Directly Assigned Indicator — Whether or not the threshold was directly assigned. Name — The threshold name. Limit — The number of events required to trigger the threshold. Period — The time limit required (for the number of events) to trigger a port blocking action. Area — The threshold type. Class — The port type.
Removing thresholds 20 A directly assigned icon ( ) displays next to each object with an assigned threshold which does not inherit a threshold from higher in the tree. NOTE If you remove a threshold from All Fabrics, it removes the threshold from individual Fabrics, switches, and switch ports in all Fabrics except for a Chassis group. You must remove repeat the procedure for the Chassis group. 5. Click OK on the Port Fencing dialog box.
20 694 Removing thresholds Brocade Network Advisor IP User Manual 53-1003056-01
Chapter 21 FICON Environments In this chapter • FICON configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Configuring a switch for FICON operation . . . . . . . . . . . . . . . . . . . . . . . . . . • Configuring an Allow/Prohibit Matrix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Configuring an Allow/Prohibit Matrix manually . . . . . . . . . . . . . . . . . . . . . .
21 Configuring a switch for FICON operation FIGURE 250 Cascaded configuration, two domains FIGURE 251 Cascaded configuration, three domains, but only two in a path Configuring a switch for FICON operation This section provides a basic guide for configuring a switch for FICON operation. Procedures assume that the switch is installed and IP addresses are assigned to the switch for discovery and access by the Management application.
Configuring a switch for FICON operation 21 Observe the following best practices: • Always check the version of firmware on a switch • Unless otherwise advised by a certified Fabric OS support professional, always load the most recently qualified firmware. • Before upgrading or downgrading firmware read the upgrade and downgrade considerations in the firmware release notes. 4. If incorporating more than one switch into a fabric, refer to planning steps in “Cascaded FICON fabric” on page 709. 5.
21 Configuring a switch for FICON operation • Required firmware for the switch. Refer to step 3. • Port addressing. The port address is important because it is implemented in HCD or IOCP. The easiest port addressing scheme is to start from 0x00 at the bottom left of the port card, increment on ports going up the card, then continue starting numbering from the bottom right of the next column of ports. Any port addressing scheme is possible however. 6.
Configuring a switch for FICON operation 21 • To manually configure SNMP for discovery, select Manual to activate the SNMP tab, then select the SNMP tab. Fill out the fields as required. . FIGURE 253 Add Fabric Discovery dialog box (SNMP tab) Refer to the “SAN discovery overview” section in Chapter 3, “Discovery” for more information on using these dialog boxes. 7. Add all required licenses to the switch using the following steps: a.
21 Configuring a switch for FICON operation FIGURE 254 Selecting Firmware Management from Configure menu The Firmware Management dialog box displays. 10. Select the Download tab (Figure 255). FIGURE 255 Firmware download 11. Select the switches in the Available Switches panel where you want to download firmware, and then click the right arrow to move them under Selected Switches. 12. Click Download.
Configuring a switch for FICON operation 21 13. Select the Repository tab to import new firmware files for downloads. Refer to the “Firmware management” section in Chapter 12, “SAN Device Configuration” for more information on importing firmware. 14. If you are not using virtual fabrics or you do not plan to enable virtual fabrics and only use the default switch, skip to step 15.
21 Configuring FICON display The recommended policy is to disable the default zone (No Access). Although enabling the default zone (All Access) can be used for FICON environments, prohibiting connection between ports using the Configure Allow/Prohibit Matrix dialog box requires activating at least one zone.
Configuring an Allow/Prohibit Matrix 21 The Allow/Prohibit Matrix can be manipulated by host-based management programs using FICON Control Unit Port (CUP), or from a Management application program to create policies and determine paths for data and command flows. Up to eight Allow/Prohibit matrices can be modified at the same time. Allow/Prohibit Matrix settings apply per switch rather than per fabric, and only work when an active zone configuration is present in the fabric.
21 Configuring an Allow/Prohibit Matrix manually 6. When you have completed the matrix, click Save if you started with a new matrix, or Save As to save a copy of an existing matrix. 7. Click Analyze Zone Conflicts. This operation can be done before or after a configuration is saved. This operation checks the current zoning settings for conflicts with settings in the Allow/Prohibit Matrix. Zone conflict is analyzed against the switch for port zoning only.
Saving or copying Allow/Prohibit Matrix configurations to another device 21 • Select Allow to allow communication between two specific ports. • Select Prohibit to prohibit communication between two specific ports. 6. Enter the port number of the first port for which you want to allow or prohibit communication in the Port Address 1 field. 7. Enter the port number of the second port for which you want to allow or prohibit communication in the Port Address 2 field. 8. Click Add.
21 Saving or copying Allow/Prohibit Matrix configurations to another device When copying or saving a configuration from or to logical switches, the only ports affected are the port addresses defined in the logical switch. The FICONd CUP Daemon retains the full compliment of records regardless of the size of the logical switch. Therefore, copying or saving a configuration from or to logical switches should work the same as copying or saving between standard switches.
Saving or copying Allow/Prohibit Matrix configurations to another device 21 Saving an Allow/Prohibit Matrix configuration to another device To save an existing Allow/Prohibit Matrix configuration to another device, complete the following steps. 1. Select Configure > Allow/Prohibit Matrix. The Configure Allow/Prohibit Matrix dialog box displays. 2. Select the Allow/Prohibit Matrix configuration you want to save.
21 Activating an Allow/Prohibit Matrix configuration Activating an Allow/Prohibit Matrix configuration You must have an active zone configuration before you can activate an Allow/Prohibit Matrix configuration. 1. Select Configure > Allow/Prohibit Matrix. The Configure Allow/Prohibit Matrix dialog box displays. 2. Select the Allow/Prohibit Matrix configuration you want to activate.
Changing the Allow/Prohibit Matrix display 21 2. Select the Allow/Prohibit Matrix configuration you want to delete. You can do this by expanding the view for the switch under Available Switches and selecting a configuration, or you can select the matrix under Allow/Prohibit Matrix. 3. Click Delete. A confirmation message displays. 4. Click Yes to confirm.
21 Cascaded FICON fabric FICON configuration performs the following operations on the selected fabric: • Turns on the insistent domain ID flag (IDID) on all switches. • Sets High Integrity Fabric Configuration (HIFC) on the seed switch. - Fabric-wide consistency policy (FWCP) is configured to include SCC in strict mode. - SCC policy is created or modified to limit connectivity to only the switches in the selected fabric. • Enables port-based routing on all switches.
Cascaded FICON fabric 21 FIGURE 261 Configure Cascaded FICON Fabric /Switch dialog box 2. Use the Fabric list to select the fabric you want to configure. NOTE (Fabric OS switches only) All switches in a fabric must be running Fabric OS version 5.3 or later. If a Fabric OS version earlier than version 5.3 is present in the topology, the fabric is not listed. 3. Select the FMS Mode check box to manage the fabric by a host-based management program using FICON CUP protocol.
21 Cascaded FICON fabric merge NOTE Either exchange based routing, port based routing, or device-based routing is enabled on all switches of the selected fabric. You cannot enable a mixed routing policy. 6. Click OK if you want to proceed. A warning message displays listing the switches of the selected fabric that are to be disabled and re-enabled in order to enable the desired routing policy and IDID. 7. Click Yes to continue. If configuration is successful, a confirmation message displays.
Cascaded FICON fabric merge 21 • Configures High Integrity Fabric Configuration (HIFC) on the seed switch of the primary and secondary fabric. - SCC policy will be created or modified to limit connectivity to switches from both fabrics. Configures Fabric-Wide Consistency Policy (FWCP) on both fabrics. FWCP is configured in tolerant mode for SCC for an Fibre Channel Routing (FCR) fabric.
21 Cascaded FICON fabric merge NOTE To enable DLS, all switches in the fabric must be 8 Gbps or faster and running Fabric OS 6.3 or later. • Primary fabric switches will not be disturbed for disruptive operations, such as IDID and APT. Instead, all primary fabric switches will be validated for current routing policies and the same policies will be enabled on all the secondary fabric switches.
Cascaded FICON fabric merge 21 NOTE All switches in a fabric must be running Fabric OS version 5.3 or later and must be reachable. If a Fabric OS version earlier than version 5.3 is present in the fabric, the fabric is not listed. NOTE Switches running Fabric OS 6.3 or earlier cannot be merged with switches running Fabric OS 6.4 or later. NOTE For 8 Gbps switches, all switches in the fabric must be 8 Gbps or faster.
21 Cascaded FICON fabric merge a. Select the E_Ports used for the connection on the local switch and on the remote switch, and click the right arrow. The selected E_Ports are moved to Selected Ports. If there is no E_Port in the selected fabrics, a warning message displays. b. Specify the Cable length between switch ports. The range is form 10 through 500 km. The default is 50 km. c. Select ARBs or IDLEs to configure the Fibre Channel Primitive Signal Fill Words. For Fabric OS version 6.1.
Port groups 21 A “The switches in fabric Name will be disabled prior to making the configuration change. The switches will be reenabled after the configuration changes are applied. Please confirm to proceed.” warning message displays. 3. Click OK on the warning message. The values of the fabric chosen on the Set up merge options screen are applied to all devices in the second fabric. Once the settings are applied, the test is run again and the merge results are updated. If the test passes, go to step 4.
21 Port groups Creating a port group NOTE At least one switch must be reachable to create a port group. To create a port group, complete the following steps. 1. Select Configure > Port Groups. The Port Groups dialog box displays, as shown in Figure 262 on page 718. FIGURE 262 Port Groups dialog box 2. Click New. 3. Enter a name for the port group in the Name field. 4. Enter a description for the port group in the Description field. 5.
Port groups 21 1. Select Configure > Port Groups. The Port Groups dialog box displays only port groups defined by you. If a fabric becomes un-monitored, any port groups associated with that fabric do not display in the Port Groups list. Once the fabric becomes monitored again, the associated port groups display in the Port Groups list. If a fabric is removed from discovery, any port groups associated with that fabric are removed permanently from the Port Groups dialog box.
21 Swapping blades 10. Click OK. Deleting a port group To delete a port group, complete the following steps. 1. Select Configure > Port Groups. The Port Groups dialog box displays. 2. Select the port group you want to delete in the Port Groups list. 3. Click Remove. The selected ports are removed from the Port Groups list. 4. Click OK. Swapping blades NOTE Blade-based port swap is mainly used for FICON and is only applicable for port blades.
Swapping blades 21 4. Select the blade with which you want to replace the first blade from the second Swap Blades list. 5. Select the Enable ports after swap is complete check box to enable ports on the destination blade after the swap is complete. 6. Click OK. NOTE This operation disrupts the traffic on all ports for the selected blades. 7. Click Yes on the confirmation message. Once the swap blade operation is complete, a “success” or “failure” message displays.
21 722 Swapping blades Brocade Network Advisor IP User Manual 53-1003056-01
Chapter 22 IP Element Manager In this chapter • Element Manager overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Element Manager CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Element Manager interface overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Web Management interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Web Management interface troubleshooting . . . . . . . . .
22 Element Manager CLI Accessing the IP Element Manager CLI The Element Manager CLI uses SNMP to query the login authentication type (for example, Telnet Login or Enable Password Login) that the device uses to create the Telnet session token. If SNMP fails, the Element Manager CLI will not work for that device. To display the Element Manager CLI, complete the following steps. 1. Right-click a device on the Network Objects list or the IP or L2 Topology views and select CLI through Server.
Element Manager interface overview 22 Element Manager interface overview The Element Manager interface provides management and monitoring functions to troubleshoot issues on the Ethernet router series switch running firmware version 5.4 or later. Element Manager is accessible from the Management application and provides the details of the switch and its ports.
22 Element Manager interface overview 4. Element Manager toolbar - Provides quick access to dialog boxes and functions. For more information, refer to “Element Manager toolbar” on page 728. 5. Port properties list - Displays the port properties for the selected view (Port, Table, or VLAN). For more information, refer to “Displaying port properties” on page 729. 6. Status bar - Displays the Auto Rediscover progress and last discovered details of the switch.
Element Manager interface overview 22 FIGURE 265 Properties dialog box You can enable and disable port actions as well as access performance monitoring from the Ports tab of the Properties dialog box (Figure 266). Refer to “Port actions” on page 327 for more information.
22 Element Manager interface overview FIGURE 266 Properties dialog box - Ports tab Element Manager toolbar The Element Manager toolbar (Figure 267) is located beneath the switch properties. FIGURE 267 Element Manager - toolbar The Element Manager toolbar provides the following icons and buttons: 1. View list — Select a view (Port, Table, or VLAN) from the list. For more information, refer to “Displaying port properties” on page 729. 2.
Element Manager interface overview 22 6. Rediscover button — Click to manually refresh the Element Manager and display the latest information from the switch. 7. Auto Rediscover check box — Select the check box to automatically refresh the Element Manager in five-minute intervals. Clear the check box to stop auto-rediscovery. 8. Product List Search — Use to search for a port in the port list. For detailed instructions, refer to “Search” on page 299. 9. Help — Click to display the online help.
22 Element Manager interface overview TABLE 74 Port View and Table View port properties (Continued) Field/Component SFP / Port Optics tab Description Select to display the details of all the SFP and port optics. NOTE: To export SFP details, click the link under the Physical Ports - SFP Details section of Detailed Report. Tx Power The power transmitted by the port in a device. Rx Power The power received by the port in a device. Transceiver Temperature The temperature of the port, in Celsius.
Element Manager interface overview 22 Comparing physical port properties You can compare multiple physical port properties, for example, a healthy port with an offline port. 1. From Port View or Table View, select two or more ports (press Ctrl and click each port). 2. Right-click one of the selected ports, and select Properties. FIGURE 268 Physical port properties For example, in Figure 268, ports 1/1, 1/3, and 1/5 are selected.
22 Element Manager interface overview 1. From VLAN View, select one or more virtual ports and physical ports. 2. Right-click one of the selected ports, and select Properties (Figure 270). FIGURE 270 Physical and virtual port properties The selected port properties are displayed in the Port Properties dialog box, where the selected physical port properties are displayed under the Ports tab and the selected virtual port properties are displayed under the Virtual Interfaces tab, as shown in Figure 271.
Element Manager interface overview 22 Status indicator icons Table 76 describes the icons that are used to indicate the status of a switch, slot, or port. TABLE 76 Status indicator icons Status icon Description Indicates the port is down. Indicates the switch is not reachable. Indicates a degraded link (the switch is reachable but cannot receive SNMP). Indicates an IP slot containing a line card. Indicates an IP slot containing no line card. Indicates a port in an IP slot containing no line card.
22 Element Manager interface overview • Collapse the table. Refer to “Customizing application tables” on page 294 for information on table functions. Performance data You can use the following options to monitor the performance data of a switch: • Real Time Graph/Table • Historical Graph/Table Real-time performance monitoring Real-time performance monitoring allows you to view a snapshot of the current performance data. To monitor the real-time performance of the switch, complete the following steps.
Configure dialog box 22 1. In the Element Manager, right-click a slot (or slots), trunk (or trunks), or port (or ports) and select Performance > Historical Graph/Table. Or Select a slot (or slots), trunk (or trunks), or port (or ports), and select Historical Graph/Table from the Performance button on the Element Manager toolbar, as shown in Figure 273.
22 Management Module switchover A warning message displays: You want to reset the selected interface statistics. Do you want to continue? Click Yes to clear all the statistics of the port. FIGURE 274 Resetting port counters Enable or Disable Enable or disable on a module will perform module power on or off. It is applicable only to the configuration module. To enable or disable a port, right-click a slot (or slots), trunk (or trunks), or port (or ports) and select Enable or Disable.
Switch Fabric Module 22 To access the MR switch over dialog box from Element Manager, right-click a module (or modules), trunk (or trunks), or port (or ports) and select MR Switch Over. FIGURE 275 MR Switch Over The MR Switch Over Status dialog box is displayed and confirms if the Management Module is active (as shown in Figure 276). NOTE MR Switch Over option will be disabled for single Management Module switch.
22 Port mirroring FIGURE 277 Switch Fabric Module Port mirroring Port mirroring analyzes the traffic flowing in a port by monitoring the particular port. Port mirroring helps to monitor the inbound traffic, outbound traffic, or both. Configuring port mirroring 1. Click the Configure icon in the Element Manager toolbar. 2. Select Port Mirroring (as shown in Figure 278). The Port Mirroring dialog box is displayed (as shown in Figure 279).
Port mirroring 22 FIGURE 279 Port Mirroring dialog box The Port Mirroring dialog box provides the following buttons to perform various functions. • Left pane (Mirror Ports) — Displays the mirror ports of a device. - Add — Adds mirror ports. - Delete — Deletes the mirror ports. • Right pane (Monitored Ports) — Displays the monitored ports of a device. - Identifier — Displays the ports where traffic must be monitored. - Mode — Displays if the traffic is inbound (TX), outbound (RX), or both.
22 sFlow 3. In the Monitored Ports pane, click Edit. Select a port from the list to edit the monitor port. NOTE An error message is displayed if the monitored port is being mirrored by some other mirror port. 4. Select Mode from the list based on whether to monitor inbound traffic, outbound traffic, or both. Deleting a port from port mirroring To delete mirror ports in a device, perform the following steps. 1. Select Configure > Port Mirroring. The Port Mirroring dialog box is displayed. 2.
Web Management interface 22 Web Management interface The Element Manager allows you to access a device by connecting to its Web Management interface. NOTE You must have the Element Manager Read/Write privilege to change the device configuration through the Web Management interface. NOTE Web Management interface access must be enabled on the device.
22 Web Management interface troubleshooting Accessing the IP device front panel To display the Element Manager front panel, choose one of the following options: • Select Configure > Element Manager > Front Panel. • Right-click a device on the Network Objects list or the IP or L2 Topology views and select Element Manager > Front Panel. The Web Management interface - Front Panel displays (Figure 282). You can use the Front Panel to manage port configuration.
Chapter 23 Configuration Repository and Backup In this chapter • Configuration repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Configuration deviation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Change tracking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Configuration snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
23 Configuration repository FIGURE 283 Configuration Repository dialog box — Product Configurations tab The Configuration Repository dialog box displays the following information: • Product Name — The name of the backed-up product • Date — The date when the configuration file was stored in the server and the time when the last backup attempt occurred. • Version — The version of the configuration file.
Configuration repository 23 Running Config Change Trap — When a running configuration is changed for a device, the running config change trap is triggered and the configuration backup is captured. For Startup Config Change Trap and Running Config Change Trap, make the following configurations: - Enable DoBackupOnStartupConfigChangeTrap and DoBackupOnRunningConfigChangeTrap on the OPtions dialog box (refer to “Configuring change manager preferences” on page 160).
23 Configuration repository • Relative Time (mins) — Relative time from the selected backup time to the event occurred time. • User — Name of the user responsible for triggering the event. 6. Click the following buttons to access the corresponding dialog boxes: • Restore button — Select one or more configuration files from the Configurations list and click to restore to that configuration. To restore a configuration, refer to “Restoring a configuration” on page 750.
Configuration repository 23 5. Select one of the following save options from the list: • Save Running Configuration — Select to retrieve the running configuration from the device. If there is no change in the running configuration since the latest running configuration (available in the repository), then the retrieval is skipped. • Save Startup Configuration — Select to retrieve the startup configuration from the device.
23 Configuration repository Viewing the configuration 1. Click the IP tab. 2. Select Configure > Configuration > Configuration Repository. 3. Click the Product Configurations tab. 4. Select a configuration and click View to display configuration information. The View Configuration dialog box displays details of the selected configuration. NOTE You can view only one configuration at a time. • Description — Displays a description of the device configuration.
Configuration repository 23 FIGURE 285 Compare dialog box The Compare dialog box displays the following information: • Product — The IP address of the device. • Date — The Displays the date the device configuration was taken. • Change Navigator buttons/legend — The Enabled when there is at least one change between to two compared files. Go to first change button ( ) — Click to move to the first change. Go to previous change button ( ) — Click to move to the previous change.
23 Configuration repository • Events Associated with Differences table — Only available when you select two configuration backup files for the same product. List of events (up to 100) associated with the configurations. Right-click an event and select properties to view the Event Properties dialog box (refer to “Displaying event properties from the Master Log” on page 1207).
Configuration repository 23 • Startup and Reload 6. Review the status details for accuracy. Searching the configuration repository The Search Configuration Repository dialog box allows searching for products that have a particular configuration in the management server’s repository. Use the search feature to refine the configuration repository based on the filter criteria described in this section. 1. Click the IP tab. 2. Select Configure > Configuration > Configuration Repository. 3.
23 Configuration repository • Regular expressions check box - Select the check box to use unicode regular expressions in your search. • Search options — Specify the following types of available searches: • Latest configurations — Searches the text in the most recent configurations of the selected products. • All configurations — Searches the text in all configurations of the selected products. • Date range — Searches the configuration files of the selected products within the specified date range. 8.
Configuration deviation 23 If you select configurations from multiple products, the default text file name is MultiProduct_config.txt. Configuration deviation The Management application backs up the product configuration after a change is detected in the product configuration. The initial copy of a product configuration backup becomes the baseline configuration.
23 Change tracking FIGURE 287 Configuration Repository dialog box - Change Tracking tab The Configuration Change Tracking list displays the following information: • Name — The product name and IP address • Baseline Time — The date and time when the baseline configuration for the device was copied into the repository of the management server • Backup Time — The time when the last backup attempt occurred for the selected device • Change Status — The change status of the latest device backup • Backup Type
Configuration snapshots 23 5. Click OK to save the configuration. 6. Click Close to exit the dialog box. Configuration snapshots The Configuration Repository dialog box - Configuration Snapshots tab, shown in Figure 288, allows you to compare two configuration snapshots; for example, the pre-configuration and post-configuration snapshots. 1. Click the IP tab. 2. Select Configure > Configuration > Configuration Repository. 3. Click the Configuration Snapshots tab.
23 Configuration snapshots 4. Click the following buttons to access the corresponding dialog boxes: • Search button — Click to launch the Search Pre/Post Snapshots dialog box, which allows you to search the contents of snapshots in the repository of the management server. Refer to “Searching the configuration repository” on page 751 for more information. • Compare button — Select two snapshots (same product or two different products) and click to launch the Comparison dialog box.
Configuration snapshots 23 FIGURE 289 Compare dialog box The Compare dialog box displays the following information: • Product — The IP address of the device. • Date — The Displays the date the device configuration was taken. • Change Navigator buttons/legend — The Enabled when there is at least one change between to two compared files. Go to first change button ( ) — Click to move to the first change. Go to previous change button ( ) — Click to move to the previous change.
23 Configuration snapshots • Match Case check box — Click to render the search case-sensitive. • Repeats check box — Click to continue the search at the top when the bottom is reached. 6. Click Close. Generating a configuration snapshot report If the configuration snapshot list is too long, you can condense the list by running a report. To generate a configuration snapshot report, perform the following steps. 1. Click the IP tab. 2. Select Configure > Configuration > Configuration Repository. 3.
Configuration snapshots 23 • No Change — The device configuration deployment included pre-configuration and post-configuration snapshots. There is no difference between the two snapshots. • Error — An error was encountered in one or more devices during the deployment of the snapshots. The devices where the error occurred are listed under the Error status. NOTE Click the Stop button to stop running the configuration snapshot report.
23 Configuration snapshots • Snapshot Type — The type of snapshot generated. There are three types: Manual: Generated manually by clicking the Save Snapshot button on the Backup Configuration Manager. Pre-Snapshot: Generated before the new configuration was deployed to the device. Post-Snapshot: Generated after the new configuration was deployed to the device. CLI Command — The name of the device-monitoring template from the CLI Configuration Manager used for the pre- or post-snapshot deployment.
Configuration snapshots 7. 23 Click OK to save the configuration snapshot. The Save Snapshot Status dialog box displays details of the backup status. • Backup Status list — Displays the product name and IP address, as well as the progress and status of the configuration save. • Status Details — Displays details of a pending configuration save. Click Abort to abort a pending configuration save.
23 Schedule backup Press Ctrl or Shift and then click each product to select more than one product. 6. Enter a search text string, with a limit of 255 characters, into the Containing Text field. This text string is used to search on snapshots of the selected products. Press Ctrl or Shift and then click each product to select more than one product. 7. Enable the following options, as required: • Match Case check box - Select the check box to make the search case-sensitive.
Schedule backup 23 NOTE The Management application enables you to save the same switch configuration to the repository using two methods: on demand (Configure > Configuration > Save) or by defining a schedule (Configuration > Schedule Backup). To schedule a configuration backup, complete the following steps. 1. Click the IP tab. 2. Select Configure > Configuration > Schedule Backup. The Schedule Backup dialog box displays. FIGURE 293 Schedule Backup dialog box 3.
23 Schedule backup • Day of the month - If you selected Monthly as the frequency type, select the day of the month from the list. 6. Click OK. The new schedule appears in the Backup Scheduler list of the Schedule Backup dialog box. When scheduled backups begin, the Management application polls each product to check its current configuration. NOTE Software image backup is not initiated on VDX or VCS devices. Disabling a backup schedule To disable a scheduled backup, complete the following steps. 1.
Chapter 24 IP Configuration Wizard In this chapter • Configuration requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Payloads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Creating a payload configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Duplicating a payload configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Modifying a payload configuration .
24 Payloads Payloads Payloads are defined as product payloads or interface payloads. Product payloads are deployed to the devices, whereas interface payloads are deployed to ports. The available payloads are listed in Table 79. TABLE 79 Payloads available for deployment Payload name Description Product Payloads: 766 802.1Q Tag Type Sets the tag type, or tag ID, that identifies the aggregate VLAN.
Creating a payload configuration TABLE 79 24 Payloads available for deployment (Continued) Payload name Description TACACS+ Servers Indicates which TACACS/TACACS+ servers are to be used for authentication. Telnet Sets Telnet password and idle timeout value, and enables Telnet authentication on devices for use with AAA authentication. Time Zone/SNTP Specifies the time zone and specifies whether the date and time are to be set by an SNTP server clock.
24 Creating a payload configuration FIGURE 295 Configuration dialog box - Select Payload pane 3. Select Product Payloads or Interface Payloads, and select the payloads you want to configure. You can include more than one payload in a configuration. See Table 79 on page 766 for a brief description of the payloads. 4. Click Next. The next pane that displays depends on the payloads you are configuring. For example, Figure 296 shows the next pane for the SNMP Identification payload.
Creating a payload configuration 24 FIGURE 296 Configuration dialog box - Product Payload - SNMP Identification pane 5. Enter the required information for the payload and click Next. Click Help for detailed information on each payload you can define. After all of the payloads you have selected are configured, the Deployment Targets pane displays, as shown in Figure 297 on page 770.
24 Creating a payload configuration FIGURE 297 Configuration dialog box - Deployment Targets pane 6. In the Available Targets list, select the products, product groups, and IP subnets to which the payload configuration is to be deployed. • To select a target, expand the entry to display the entries under it, click the target in the Available Targets list, and click the right-arrow button to move it to the Selected Targets list. If the target is not on the list, run the discovery process.
Creating a payload configuration 24 FIGURE 298 Configuration dialog box - Deployment Properties pane 8. Select one of the persistence properties. • Don’t Save to Flash or Reload Select this option if you just want to update the device running configuration. The payload configuration is not saved to the device flash memory, nor is the device rebooted when the payload configuration is deployed.
24 Creating a payload configuration 9. (Optional) Enter the following information if you want the Management application to run and save a report before or after this configuration is deployed to the device. a. Select the Pre-Deployment check box if you want the Management application to run and save a report before this configuration is deployed. b. Select the Post-Deployment check box if you want the Management application to run and save a report after this configuration is deployed. c.
Creating a payload configuration 24 12. Select Save Without Scheduling Deployment or Schedule Deployment. If you select Schedule Deployment, select the frequency, time, and date parameters for the deployment. 13. Click Next. The Summary Page pane displays, as shown in Figure 300. FIGURE 300 Configuration dialog box - Summary Page pane 14. Review the information on the Summary Page pane. • The Deployment and Targets tab shows the deployment definition and the targets in the configuration.
24 Duplicating a payload configuration Duplicating a payload configuration You can create a payload configuration by copying an existing configuration. 1. Select Configure > Configuration Wizard. 2. Select a configuration from the Product Configurations list. 3. Click Duplicate. The Copy Configuration dialog box displays. 4. Enter a name for the new payload configuration.
Modifying a payload configuration 24 FIGURE 301 Configuration dialog box - Select Payload pane for editing a configuration 4. Add or remove payloads in the configuration. • To add a payload to the configuration, select either Product Payloads or Interface Payloads, and then select the payload you want to add. • To remove a payload from the configuration, clear the check box of the payload. Note that a configuration must have at least one payload.
24 Deploying a payload configuration Deploying a payload configuration Payload configurations are deployed to targets in one of the following ways: • On a scheduled basis, if a deployment schedule has been set up for the configuration. • On demand, if Save Without Scheduling Deployment is selected in the Deployment Schedule pane of the Configuration Wizard. Configurations can be manually deployed when required.
Chapter 25 CLI Configuration Management In this chapter • CLI configuration overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Viewing existing templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Product configuration templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Changing product credentials. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
25 Viewing existing templates Configuration requirements Before you use the CLI Configuration, you should meet the following requirements: • Telnet or SSH (or both) must be selected on the Management application server to match the protocol(s) with the devices. For more information about configuring Telnet or SSH, refer to “Product communication settings” on page 169.
Product configuration templates 25 Product configuration templates You can create, modify, duplicate, delete, verify, and deploy a product configuration from the CLI Configuration dialog box. Product configurations allow you to create device configuration by entering a set of configuration CLI commands. To view a list of existing configurations, refer to “Viewing existing templates” on page 778. For information about the example templates, refer to “CLI Templates” on page 1339.
25 Product configuration templates 4. Click the Target tab and complete the following steps. FIGURE 303 CLI Configuration Template dialog box - Target tab a. Select the devices to which you want the configuration deployed from the Available Targets table. The Available Targets table displays an inventory of the available product targets and includes the same detail as the Product List (refer to “IP Product List” on page 284).
Product configuration templates 25 5. Click the CLI Commands tab and complete the following steps. FIGURE 304 CLI Template dialog box - CLI Commands tab a. (Configuration templates only) Select the Evaluate CLI responses check box to validate the CLI commands. You can add a dash (-) to the beginning of a CLI command to ignore command validation even when you select the Evaluate CLI responses check box.
25 Product configuration templates c. To enter a parameter for a CLI command, select the parameter type from the CLI Commands list - Parameters folder and click the right arrow to move the parameter type to the CLI Commands text area. Parameters use the following format: $, where name is the parameter and data_type is the type of parameter.
Product configuration templates c. 25 Enter a value for each parameter in the associated field. Note that the Target column remains visible at all times in the Parameters table. Fields containing a green triangle ( ) in the lower right corner are editable. The fields only accepts valid values base on the parameter data type. Parameters include the following options: • • • • String — Enter a string with a maximum of 64 ASCII characters. Integer — Enter an integer with a maximum of 12 numeric characters.
25 Changing product credentials 11. Click OK. The Deployment Status dialog box displays, which allows you to view the progress and status of the deployment. Click Abort to stop the deployment. NOTE The abort action does not stop the tasks that have already started. When deployment is complete, click Report to view the CLI Deployments Report. 12. Click Close to close the Deployment Status dialog box. NOTE Closing the Deployment Status dialog box does not stop deployment.
Importing parameter values into a configuration 25 2. Enter the user name for the product in the Product Login Account - Username field. NOTE If Telnet is used to log in to the device and Telnet only requires a password, then enter the password in the Password field and leave the Username field blank. 3. Enter the password for the product in the Product Login Account - Password field. 4.
25 Previewing CLI commands TABLE 80 Different values for each target #Description of the template. This template provides different values for each target.. Target, LOOPBACK_INTERFACE|INTEGER, OSPF_AREA|INTEGER LOOPBACK_INTERFACE_IP|STRING 10.20.30.100, 1, 4, loopback1, 10.20.30.200, 2, 5, loopback2, Layer 2 Switch Products, 3, 6, loopback3, TABLE 81 Same value for each target #Description of the template. This template provides different values for each target..
CLI command guidelines 25 CLI command guidelines When adding CLI commands to the configuration, use the following guidelines: • Only configuration templates can be added to a template defined in the CLI Template dialog box. • Templates can be nested and the same template can be included several times as long as it does not cause a circular dependency. • Targets for deployment are only retrieved from the template you create, not any included templates.
25 CLI command guidelines • Click Deploy to deploy the configuration to the selected targets. Click Yes on the confirmation message. If you selected the Prompt for additional targets during manual deployment check box, the Target tab of the Deployment of Configuration_Name dialog box displays. Continue with step 6. If the configuration contains parameters that must be defined, the Deployment of Configuration_Name dialog box displays with a list of all parameters in the deployment. Go to step 7. 6.
Testing a configuration 25 • Click Deploy to deploy the configuration to the selected targets. Click Yes on the confirmation message. If you selected the Prompt for additional targets during manual deployment check box, the Target tab of the Deployment of Configuration_Name dialog box displays. Continue with step 6. If the configuration contains parameters that must be defined, the Deployment of Configuration_Name dialog box displays with a list of all parameters in the deployment. Go to step 7. 6.
25 Valid and invalid responses from devices 5. Edit the mode and the parameter values (refer to step 6), as needed. The Deployment Status dialog box displays detailing whether the configuration will deploy successfully. 6. Click Close to close the Deployment Status dialog box. Valid and invalid responses from devices When you deploy a configuration to a device, some commands may send responses back to the Management application.
Valid and invalid responses from devices 25 The strings on the left and the right side of the equal sign are Unicode regular expressions used for pattern matching. The expression on the left is matched against the command string, while the expression on the right is matched against the messages returned by the command that matches the pattern on the left.
25 Valid and invalid responses from devices Editing the Motorola Controller CLI responses properties file The MotorolaControllerCliResponse.properties file is under the Install_Home\conf\cli directory. Edit the file using a text editor. You can add a success response between the SUCCESS_RESPONSE_START and SUCCESS_RESPONSE_END tags using the following Unicode regular expressions format. #Success Map SUCCESS_RESPONSE_START ^su[port]*\s+s[witchd]*\s+=.*First Failure Data Capture.*enabled.
Deleting a configuration 25 NOTE If the response message does not fall in any of the categories above, it is treated as a success response from the device and stops the validation process. Using a dash character in CLI Configuration manager You can override how the Management application treats messages without editing the CLI responses properties file. To do this, enter a dash (-) at the beginning of each configuration line.
25 CLI configuration deployment 2. Select one or more configurations to delete in the Templates table and click Delete. 3. Click Yes on the “Do you want to delete?” message to confirm. 4. Click Close to close the CLI Configuration dialog box. CLI configuration deployment Deploy the configuration using one of the following methods: • At a scheduled date and time Schedule a configuration deployment in the CLI Template dialog box.
Monitoring configurations 25 NOTE Closing the Deployment Status dialog box does not stop deployment. To check the results of the deployment in the Product CLI Report, refer to “CLI deployment reports” on page 802. For details about valid and invalid responses when you deploy a configuration, refer to “Valid and invalid responses from devices” on page 790. Monitoring configurations You can create, modify, duplicate, and delete a monitoring configuration from the CLI Configuration dialog box.
25 Monitoring configurations 4. Click the Targets tab and complete the following steps. FIGURE 309 CLI Template dialog box - Target tab a. Select the devices to which you want the configuration deployed from the Available Targets table. You can deploy the configuration to individual devices, devices in a device group, or devices in an IP subnet.
Monitoring configurations 25 5. Click the CLI Command tab and complete the following steps. FIGURE 310 CLI Template dialog box - CLI Commands tab d. Enter the show commands in the CLI Commands text area. NOTE Only commands listed in the cliShowCommands.properties file can be entered for a monitoring configuration. For more information, refer to “Configuration error checking” on page 793. For a list of guidelines to use when entering CLI commands, refer to “CLI command guidelines” on page 787.
25 Monitoring configurations f. Edit the parameter by entering the variable or character string you want to use for the parameter in place of the name variable. NOTE Each parameter must be unique. The Management application does not check for duplicate parameters. show interface ethernet $ In the example, show interface ethernet is the CLI command, port is the parameter variable, SLOT_PORT is the parameter type, and [Slot#]/Port# is the format for the port number. g.
Monitoring configurations c. 25 Enter a value for each parameter in the associated field. Fields containing a green triangle ( ) in the lower right corner are editable. The fields only accepts valid values base on the parameter data type. Parameters include the following options: • • • • String — Enter a string with a maximum of 64 ASCII characters. Integer — Enter an integer with a maximum of 12 numeric characters. Slot/Port — Enter the slot number and port number.
25 Monitoring configurations 11. Click OK. The Deployment Status dialog box displays, which allows you to view the progress and status of the deployment. Click Abort to stop the deployment. NOTE The abort action does not stop the tasks that have already started. When deployment is complete, click Report to view the CLI Deployments Report. 12. Click Close to close the Deployment Status dialog box. NOTE Closing the Deployment Status dialog box does not stop deployment.
Monitoring configurations 25 8. Click OK. The Deployment Status dialog box displays, which allows you to view the progress and status of the deployment. Click Abort to stop the deployment. NOTE The abort action does not stop the tasks that have already started. When deployment is complete, click Report to view the CLI Deployments Report. 9. Click Close to close the Deployment Status dialog box. NOTE Closing the Deployment Status dialog box does not stop deployment.
25 CLI deployment reports 8. Click OK. The Deployment Status dialog box displays, which allows you to view the progress and status of the deployment. Click Abort to stop the deployment. NOTE The abort action does not stop the tasks that have already started. When deployment is complete, click Report to view the CLI Deployments Report. 9. Click Close to close the Deployment Status dialog box. NOTE Closing the Deployment Status dialog box does not stop deployment.
CLI configuration scheduling 25 3. Choose one of the following options: • To display a report for one device, click the IP address of the device on the list. • To display a report that includes all devices for which the report was generated, click the name of the report in the Template Name column. The Product CLI Report displays. To export a report refer to “Exporting and saving IP reports to a file” on page 1232.
25 CLI configuration scheduling Configuring a daily deployment schedule To configure a daily deployment schedule, complete the following steps. 1. Select Daily from the Frequency list. 2. Select the time of day you want deployment to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. To finish configuring the deployment schedule, return to step 8 of “Creating a new product configuration” on page 779.
CLI configuration scheduling 25 Configuring a yearly deployment schedule To configure a yearly schedule, complete the following steps. 1. Select Yearly from the Frequency list. 2. Select the time of day you want deployment to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. 3. Click the Date list to select a date from the calendar.
25 806 CLI configuration scheduling Brocade Network Advisor IP User Manual 53-1003056-01
Chapter 26 Image Repository for IP Products In this chapter • Obtaining software files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Products supporting the image import . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Boot image management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Software image management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Unified image management . . . . . . . . . .
26 Products supporting the image import Products supporting the image import Table 82 lists the products that support the boot images, software images, and unified images.
Boot image management 26 • Import — Opens the Import Boot Image dialog box that allows you to browse and select the boot or monitor image file you want to import into the Management application. Newly imported images are saved to the Management application. They are displayed on the Boot Images tab. • Delete — Deletes the boot or monitor image from the Management application. • Help — Provides information about the feature.
26 Boot image management c. Enter the image version in the Image Version field. d. Enter the label for the image in the either the Image Label field or the User Defined Label field. These fields are from 1 through 32 alphanumeric characters and allow the following special characters: underscore (_), period (.), and hyphen (-). The image file name excludes the file extension. For example, if the file name is M2B07504.bin, the Image Label is M2B07504.
Software image management 26 Software image management Software images are program files other than boot, monitor, or unified images. You can manage software images using the following Management application modules: • Discovery — Copies software images from IronWare and Network OS products on the network into the Management application. • Backup Scheduler — Copies software images from IronWare and Network OS products on a regularly scheduled basis.
26 Software image management If the import fails because of missing or invalid information in the image header, one of the following displays: • If the AllowManualImports check box is not selected on the Options dialog box - IP Preferences pane (refer to “Configuring image repository preferences” on page 162), the following error message displays: “The specified file is not a valid image file.” Click Yes to close the message.
Software image management 26 You can change the default schedule from the Backup Scheduler by performing the following tasks. 1. Click the IP tab. 2. From the Management application menu bar, select Configure > Configuration > Schedule Backup. or Right-click Configuration > Schedule Backup. The Schedule Backup dialog box displays, as shown in Figure 312. FIGURE 312 Schedule Backup dialog box 3. Select the automatic software image backup task from the list, and click Edit.
26 Unified image management 1. Click the Software Images tab on the Firmware Management dialog box. 2. Select the software image that you want to delete. 3. Click the Delete button. A confirmation warning displays. 4. Click Yes to continue with the delete, or No to cancel it. Unified image management Unified images contain all images required to manage the product. Instead of upgrading each type of image separately, you can use a unified image to upgrade all image types.
Unified image management 26 FIGURE 314 Firmware Management dialog box - Unified Firmware Images tab The Unified Firmware Images tab contains the following buttons: • Import — Opens a dialog box that allows you to browse and select the unified image file you want to import into the Management application. Newly imported images are saved to the Management application. • Delete — Deletes the unified image from the Management application.
26 Unified image management NOTE You must install the Management application on an external FTP server or SCP server to activate the Import Firmware Image from File dialog box. 6. In the Import Firmware Image from File field, enter the location of the unified image, or click Browse to search for an existing image file. The image file can be in one of the following formats: .tar, .gz, .zip, or .bin. 7.
Unified image management 26 Updating unified images Use the Configuration Wizard to update firmware images. You can access the Configuration Wizard using one of the following methods: • Select Configure > Configuration Wizard. • Complete the following steps. a. Select Configure > Firmware > Management. b. Click the Unified Firmware Images tab on the Firmware Management dialog box. c. Click Update.
26 Serial firmware update and activation for NOS devices Serial firmware update and activation for NOS devices With Network OS release 4.0, you can update and activate firmware on an entire cluster (either logical chassis mode or fabric cluster mode), on selected nodes in the cluster, or on nodes in standalone mode, by performing the following steps. 1. Click the IP tab in the upper-left corner of the Management application. 2. Select Ethernet Fabrics from the view list on the Product List toolbar.
Chapter 27 VLAN Management In this chapter • VLAN Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Port VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Spanning Tree Protocol configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • VLAN routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
27 VLAN Manager Super-aggregated VLAN A super-aggregated VLAN allows multiple VLANs to be placed within another VLAN. This feature allows you to construct Layer 2 paths and channels. It is useful for Virtual Private Network (VPN) applications in which you need to provide a private, dedicated, Ethernet connection for an individual client that can transparently reach its subnet across multiple networks. Private VLAN NOTE PVLAN read-only support is provided.
VLAN Manager 27 FIGURE 316 Remote Switch Port Analyzer Transparent LAN Support Transparent LAN Support (TLS) supports the VLAN group rather than an individual VLAN. The TLS service provided is associated with a single transparent VLANs that represents all the VLAN in a group. When Transparent LAN Support (TLS) is assigned to a Virtual Fabric VLAN, the ports that are tagged to TLS allow you to configure multiple cTags.
27 VLAN Manager Displaying a list of VLANs To view the list of VLANs that were discovered on the network, select Configure > VLANs. The VLAN View tab of the VLAN Manager dialog box displays. The VLAN Manager toolbar contains the following buttons: • • • • Add — Launches the Add VLAN dialog box. Edit — Launches the Edit VLAN dialog box. Delete — Launches the Delete VLAN dialog box. STP — Allows you to configure STP, RSTP, MSTP, PVST, or RPVST information for a product, port, or VLAN.
VLAN Manager 27 If there are super-aggregated VLANs that have been configured on the network, VLANs are grouped by their super-aggregated VLAN memberships. If the VLANs are in different networks, they display as different nodes, even if FDP or LLDP is not enabled on the device. - For VCS fabric technology, a single VCS node displays in the VLAN view based on VLAN membership of the fabric nodes. This view is supported in Fabric mode.
27 VLAN Manager FIGURE 318 VLAN Manager dialog box - VLAN View tab To view the VLANs or products in the VLAN View tab, complete the following steps. 1. Click the VLAN View tab in the VLAN Manager dialog box. 2. Expand the folder under the VLAN View tab, then double-click a super-aggregated VLAN to display its port VLANs or products. VLANs are listed by their topologically distinct broadcast domains.
VLAN Manager 27 4. Click a product under a port VLAN to select it. The interfaces on that product that belong to the VLAN are listed in the interface list. The list shows the following information: • Port — The interface number. This can be a port number represented as a unit, slot number or port number, or a virtual routing interface ID. • Port Type — A description of the type of interface on the product, for example, ETHERNET_INTERFACE or VIRTUAL_INTERFACE.
27 VLAN Manager FIGURE 319 VLAN Manager dialog box - Product View tab 2. Expand a product to display the port VLANs that have been configured on that product. 3. Click a VLAN in the list to display the interfaces on that product that belong to the VLAN. 4. Click MAC Group IDs to display the MAC group address (Figure 320). The MAC group address dialog box is displayed.
Port VLANs 27 Port VLANs VLAN Manager facilitates the creation, modification, and deletion of port VLANs on products that are known to the Management application. It also aids in the bulk deployment of these VLANs. For example, VLAN 3 can be configured on four products. If the VLAN definition for VLAN 3 is modified, the new definition can be deployed to all four products at one time.
27 Port VLANs 4. Click the Load Products button. Products that already have the entered VLAN IDs configured on them are automatically moved to the Selected Products list. The Load Products button is disabled by default. 5. Under the Available Products list, select one or more products to which the VLAN will be assigned. You can also use the Search tool to find ports. 6. Click the right arrow button to move your selection to the Selected Products list. 7.
Port VLANs 27 The Select Classifiers button is disabled by default. To enable the button, select an untagged and classifier-configured port in the Selected Ports list.. FIGURE 322 Select Classifier Groups dialog box NOTE The cTag classifier list is disabled when Untagged is selected.
27 Port VLANs 7. Click the Untag button and click the left arrow to assign the port as an untagged port to the selected VLAN. The Selected Ports list shows the interface listed under the VLAN to which it was assigned. 8. Select the same interface from the Available Ports list. 9. Select another VLAN from the Select VLANs list. 10. Click the Tag button and click the right arrow to assign the port as a tagged port to the second VLAN.
Port VLANs 27 Adding VLAN properties The Add VLAN dialog box has two tabs: Ports and Properties. The VLAN properties vary for different products, for example: • When an IronWare OS VLAN is selected, the Name, QoS, Spanning Tree, and Router Interface fields, and the Transparent VLAN Flooding enable check box display. • When a DCB VLAN or product is selected and moved to the Products/VLAN list, the Name and Admin Status fields and the FCoE check box display.
27 Port VLANs • QoS — Select a QoS level from the list. - Select Low (None or 0) through High (7) for NetIron CES products. Select None for NetIron CER and NetIron CES products if the product does not have VLAN priority configured. (None applies only to NetIron CER and NetIron CES products.) - Select Low (0) through High (7) for all other IronWare OS IP products. • Spanning Tree — Select the type of Spanning Tree Protocol from the Spanning Tree list. The list options include STP, RSTP, and None.
Port VLANs 27 Modifying port VLAN properties Complete the following steps to modify port VLANs using the VLAN View tab or the Product View tab on the Edit VLAN dialog box. 1. On the VLAN Manager dialog box, click the VLAN View or Product View tab. 2. If in the VLAN view, select and expand a VLAN entry, or if in the Product view, select and expand a product and click the Edit button. NOTE When a Network OS VLAN is selected, the Name and Admin fields display.
27 Spanning Tree Protocol configuration Deploying VLAN configurations The Deploy VLANs dialog box allows you to deploy a VLAN configuration to target products. Duplicate action is not supported. 1. Select a deployment option: • Click the Deploy now option if you want to deploy the VLAN definition. • Click the Save deployment only option if you want to save the VLAN definition without scheduling its deployment. • Click the Schedule option if you want to schedule the deployment of the VLAN definition. 2.
Spanning Tree Protocol configuration 27 • RSTP — Rapid Spanning Tree Protocol (IEEE 802.1w Internet standard) is a refinement of STP, which provides for faster spanning tree convergence after a topology change. • MSTP — Multiple Spanning Tree Protocol (IEEE 802.1s Internet standard) allows several VLANs to be mapped to a reduced number of spanning tree instances. This is possible because most networks do not need more than a few logical topologies.
27 Spanning Tree Protocol configuration FIGURE 324 STP Configuration dialog box 3. Select the target switch, VLAN, or port from the Target Context list. Target contexts and spanning tree options at the product, VLAN, or port level are listed in Table 85.
Spanning Tree Protocol configuration 27 10. The Force Version list is available only if you selected RSTP. This parameter forces the bridge to send BPDUs in a specific format. You can enter one of the following values: • 0: The bridge has been forced to operate in STP default mode. • 1: The bridge has been forced to operate in RSTP default mode. 11. Specify an interval in the Re-enable Port Interval field, available only if you selected RSTP.
27 Spanning Tree Protocol configuration 8. After the deployment has successfully completed, click Close to close the Deployment Status dialog box. Configuring MSTP on a product You can configure MSTP attributes from the VLAN View tab or the Product View tab on the VLAN Manager dialog box. 1. Perform one of the following tasks to select the VLAN on which MSTP will be configured: • On the VLAN View tab, expand the list of VLANs and select one or multiple VLANs on which MSTP will be configured.
Spanning Tree Protocol configuration 27 8. Enter the number of seconds a root bridge waits before it sends the next BPDU in the Hello Time field. The values range from 1 through 10 seconds. The default is 2 seconds. 9. Enter the number of seconds a bridge waits for a hello packet from the root bridge before initiating a topology change in the Max Age field. The values range from 6 through 40 seconds. The default is 20 seconds. 10.
27 VLAN routing The STP Configuration dialog box displays the Available MSTP Instances list. 4. Select an MSTP instance from the list under the Available MSTP Instances list, or enter the MSTP instance number. 5. Click Add. A new row is added to the Available MSTP Instances list. You can change the bridge priority, which is set, by default, to 32768. VLAN routing A VLAN restricts the broadcast domain to only its interface members.
VLAN routing 27 FIGURE 326 Virtual Port - IP Configuration dialog box 3. Complete one of the following steps: • To add a new IP address to the SVI, enter the IP address in the IP Address field and click the right arrow button to move it to the Selected IP Addresses list. • To modify an IP address of an SVI, select the IP address from the list and click the left arrow button to move the IP address back to the IP Parameters list.
27 VLAN routing 7. Click the Deploy now option. 8. Select a Save Configurations option: • Click the Save to running option to save the configuration while the system is running. • Click the Save to running and startup option to save the configuration both while the system is running and when the system starts up. • Click the Save to running and startup then reboot option to save the configuration both while the system is running and when the system starts up, and then automatically reboot.
Chapter 28 MPLS Management In this chapter • MPLS pre-configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • MPLS licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • MPLS overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • LSP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
28 MPLS licensing 7. Create VLL instances using the Customer-facing ports using the Management application (refer to “VLL manager” on page 869). 8. Create VPLS instances using the Customer-facing ports using the Management application (refer to “VPLS Manager” on page 884). MPLS licensing The following are MPLS capable products: • Ethernet Backbone router, Ethernet Core router, and Ethernet router running version 5.0.
MPLS overview 28 The following conditions must be met for inclusion in the MPLS Licensed and Configured Products product group: • Your version of the Management application supports MPLS. • Adding the product does not exceed the MPLS product license limit. For more information about how the Management application counts MPLS products, refer to Brocade Network Advisor Software Licensing Guide.
28 LSP 1. Select the Set option to set the selected settings in the product configuration. This creates a new configuration newly or overwrites the existing configuration. Unset removes the settings. NOTE To enable MPLS on the target devices, select the Set option then click Add and complete the wizard. 2.
LSP 28 In addition to the topology information in the TED, the product considers attributes and requirements specified in configuration statements for the LSP. The LSP allows you to specify and adjust many of the parameters used when the product calculates a traffic-engineered path for a signalled LSP, including the following: • • • • • • An RSVP signalled LSP address for the egress LER. Explicit path to be used by the LSP. Bandwidth required by the LSP. Setup priority for the LSP. Metric for the LSP.
28 LSP 3. Use the View selector to choose between displaying by Product or Admin Group ID. - Product - The product view shows a tree structure under Products/Admin Groups with products at the top level. Click the product name to expand the tree and display any associated admin groups. - ID - The ID view groups admin group instances by admin group ID. An admin group instance may be configured in multiple products, so the same product may be displayed under different admin group IDs. 4.
LSP 28 4. Select a path to display the path name in the Name field, the Product name in the Product field, and the Hop Details. The Hop Details include the following: - Hop IP Address - The IP addresses for all the defined hops are listed. Hop Type - Either Strict or Loose. Strict means that the node must be directly connected to the previous node on the Hop Details list. Loose, means that there may be one or more hops between the previous node on the Hop Details list.
28 LSP 5. Click LDP Configuration to launch the LDP configuration wizard. Viewing saved LSP configurations Take the following steps to view all saved LSP configurations. 1. Select Configure > MPLS > LSP. 2. Select the Saved Configurations tab (Figure 332). FIGURE 332 LSP dialog box, Saved Configurations tab Saved LSP configurations are listed by name, description, payload, and deployment schedule.
LSP 28 Adding an LSP admin group MPLS interfaces can be organized into administrative groups (admin groups). Typically, an admin group is used to identify a network segment. You can use admin groups to manage CSPF path selection by including or excluding network segments identified as admin groups. If you include an admin group, only those segments in that admin group are selected. If you exclude an admin group, that admin group is excluded from CSPF path selection.
28 LSP FIGURE 334 Add Admin Groups Configuration dialog box, Deployment Properties pane 8. Select the desired properties. 9. Click Deploy. Editing an LSP admin group You can edit an LSP admin group by taking the following steps. 1. Select Configure > MPLS > LSP. 2. Select the Admin Groups tab. 3. Select the admin group you want to edit. 4. Click the Edit button. The Edit Admin Group Configuration dialog box of the Admin Group Configuration wizard displays (Figure 333).
LSP 28 Deleting an LSP admin group You can delete an LSP admin group by taking the following steps. 1. Select Configure > MPLS > LSP. 2. Select the Admin Groups tab. 3. Select the admin group to be deleted. 4. Click the Delete button. The Delete Admin Group Configuration dialog box of the Admin Group Configuration wizard displays. 5. Click on a series of Next buttons to deploy. Adding an LSP path An LSP path is a list of router hops across an MPLS domain. Paths are configured separately from LSPs.
28 LSP 5. Click the Add button. Use the Up and Down buttons to move the selected hop higher or lower in the table. An empty line is added under Hop Details. The first entry is always considered to be the local node and the Ingress LER. LER nodes should be then be added in order from Ingress to Egress. If you need to change the order, you can select an entry and use the Up and Down arrows to change its position. Actual routing depends on whether or not Type is set to Strict or Loose.
LSP 28 Duplicating an LSP path When you want to add a new LSP path, you can save work by duplicating an existing path and editing the name and any other parameters you may want to change. You can duplicate an LSP path by taking the following steps. 1. Select Configure > MPLS > LSP. 2. Select the Paths tab. 3. Select the path you want to duplicate. 4. Click the Duplicate button. The Path Configuration dialog box of the Path Configuration wizard displays (Figure 335).
28 LSP Configuring advanced RSVP LSP settings Resource Reservation Protocol (RSVP) can be used to send signalling messages to each LSR in the LSP to reserve resources and cause labels to be dynamically associated with interfaces. This enables you to engineer network traffic routing to avoid points of congestion and make efficient use of high bandwidth interfaces.
LSP 28 8. Click Advanced Settings to establish traffic engineering parameters. The RSVP LSP Advanced Settings dialog box has three tabs: Global, Paths, and Fast Reroute. The default view is the Global tab (Figure 338). FIGURE 338 RSVP LSP Advanced Settings Global tab From the Global tab you can set the following: - Adaptive checkbox - Select the Adaptive checkbox to allow you to change parameters while an LSP is in enabled state.
28 LSP You can place selected admin groups into any of the following categories: • Include All - An interface must be a member of all selected groups. • Include Any - An interface is included if it is a member of any of the selected groups. • Exclude All - Interfaces in the selected groups are excluded. - Bidirectional Forwarding Detection (BFD) check box - This check box allows you to enable or disable BFD.
LSP - 28 Path Select Mode - The choices are Manual and Unconditional. If Manual is chosen, traffic is shifted to an alternate path only if the selected path fails. If the path recovers, traffic is shifted back. If Unconditional is chosen, the traffic stays on the selected path even if the path fails. If you do not want to specify a path select mode or want to remove the configured path select mode, select None. • Primary - Selected by default.
28 LSP • Maximum Rate - Sets the maximum data rate supported for data bursts above the mean rate. • Maximum Burst - Sets the maximum number of bytes that can be handled at the maximum rate. - Use LSP for OSPF shortcuts - Enables the use of traffic engineering data carried in OSPF extensions that contain information about the interface’s metric, bandwidth reservations, and admin group memberships. - Use LSP for IS-IS shortcuts - Enables you to configure the IS-IS shortcut parameters.
LSP a. 28 Use the Primary Path Select button to display the Path Selector dialog box (Figure 341). FIGURE 341 Path Selector dialog box b. Select the path you want to use as the primary path from Available Paths, and use the right arrow to move the path to Selected Paths. c. Click OK. Secondary paths for the LSP are listed under Paths. Use the Add and Delete buttons to add or delete a secondary path. Use the up and down arrows to move entries up and down in the table. 10.
28 LSP From the Fast Reroute tab you can configure an LSP to request a facility backup provided by a bypass LSP in the event of a failure along the LSP path. Each LSR in an LSP except the egress router may act as a Point of Local Repair (PLR). If a failure occurs on an LSP, the PLR tries to initiate a bypass LSP to provide a backup route for the protected path. The PLR then becomes the ingress of a bypass LSP. The bypass LSP carries the traffic of the LSPs it protects around the break.
LSP 28 Editing an RSVP LSP You can edit an RSVP LSP by taking the following steps. 1. Select Configure > MPLS > LSP. 2. Select the RSVP LSP tab. 3. Select the RSVP LSP you want to edit. 4. Click the Edit button. The RSVP LSP Configuration dialog box of the RSVP LSP Configuration wizard displays (Figure 337). Refer to “Configuring advanced RSVP LSP settings” for a description of how to use the RSVP LSP Configuration wizard.
28 LSP FIGURE 344 Delete RSVP Configuration wizard 5. Click a series of Next buttons to deploy the payload. Editing a saved LSP configuration You can edit a saved LSP configuration by taking the following steps. 1. Select Configure > MPLS > LSP. 2. Select the Saved Configuration tab. 3. Select the saved configuration 4. Click the Edit button.
LSP 28 Deleting a saved LSP configuration You can delete a saved LSP configuration by taking the following steps. 1. Select Configure > MPLS > LSP. 2. Select the Saved Configuration tab. 3. Select the saved configuration 4. Click the Delete button. Displaying LSP Topologies Refer to the View Management chapter for descriptions for topology map layout options and navigation aids. You can display topology maps for configured LDP and RSVP LSPs by taking the following steps. 1.
28 LSP FIGURE 346 LSP Topology View Options 4. Use the LSP Type selector to limit the display to RSVP LSPs Only or LDP Tunnels Only. If you right-click on an LSP, three options are displayed (Figure 347).
MPLS Virtual Leased Line (VLL) overview 28 • Select Drill-down to LSP Hops Topology to display LSPs and hops as a line from the ingress router with an arrow to indicate direction. Operationally enabled LSPs are shown with a solid line. Operationally disabled LSPs are shown with a dotted line. • Select LSP Ping to launch the LSP Ping dialog box. • Select LSP Traceroute to launch the LSP Trace Route dialog box.
28 MPLS Virtual Leased Line (VLL) overview The PE router pushes two labels onto the packet: • The inner VC label is used for determining what happens to the packet once it reaches the VLL peer. This label is significant only to the VLL peer. • The outer tunnel label is used for forwarding the packet through the MPLS domain. This label corresponds to an RSVP-signalled tunnel LSP. After applying the two labels to the packet, the PE router forwards it to the next LSR in the tunnel LSP. 3.
VLL manager 28 VLL manager The VLL Manager allows you to manage VLL instances. You can perform the following tasks from the VLL manager: • View current VLL instances. • View VLL configurations. • Add, edit, duplicate, or delete VLL instances. NOTE When configuring a VLL, a check is made to determine if there are LSPs configured for the target products. You may proceed with configuration, but an LSP is needed for a working connection.
28 VLL manager 3. You can filter output by name or by VCID by using the selector next to the VLL field. - You can use an Asterisk (*), as a wildcard character if you select By Name. You can enter individual VCIDs or a range of VCIDs if you select By VCID. NOTE If you choose By VCID you can search only for remote VLLs (VLLs whose endpoints are on two different products), but not for local VLLs (VLLs whose endpoints are on the same product). 4.
VLL manager • • • • 28 All peers are up. All peers are down. Some peers are down. VCID - The VCID of the VLL. Endpoint Settings display the following information about the A Endpoint and Z Endpoint of the selected VLL in the fields below: • • • • Name - The endpoint device name and IP address. COS - Class of Service associated with the endpoint. VLL Mode Tagged: A VLAN ID tag is added to the packets on the ingress router.
28 VLL manager Viewing Saved VLL configurations To view current saved VLL configurations, do the following: 1. Select Configure > MPLS > VLL. 2. Select the Saved Configurations tab (Figure 350). FIGURE 350 VLL Manager Saved Configurations tab 3. You can use the Name field to filter output by configuration name. You can use an Asterisk (*) as a wild card character. 4. Click the Get button to begin the search.
VLL manager 28 Adding or editing a VLL instance To add a new VLL instance do the following: 1. Select Configure > MPLS > VLL. 2. Select either the Views tab or the Saved Configurations tab. 3. Click the Add button. The VLL Configuration wizard Target Selector dialog box displays (Figure 351). FIGURE 351 VLL Manager Target Selector dialog box 4. Enter a name for the endpoint in the Name field. The name must be unique on each product and cannot contain spaces, asterisks (*), or question marks (?). 5.
28 VLL manager 11. Click Next. The VLL Configuration wizard Product Configuration dialog box displays (Figure 352). FIGURE 352 VLL Configuration wizard Device Configuration dialog box NOTE If you are configuring a local VLL, you cannot make changes to this dialog box. If you are configuring a non-local VLL, select a device from the device list. Configuring devices using the VLL Manager 1. From the Product Configuration pane of the VLL Configuration Wizard, click each device entry.
VLL manager 28 3. Click Next. The VLL Configuration wizard Port Configuration dialog box displays (Figure 353). FIGURE 353 VLL Configuration wizard Port Configuration dialog box The last discovered port settings for VLLs are displayed in the Discovered Endpoint Settings table. You can make changes to the settings in the Configured Endpoint Settings table. 4.
28 VLL manager • You can only define one dual tagged endpoint per port. • You cannot define a dual tagged endpoint on a port if there is a 802.1ag configuration defined on the port. c. For tagged ports only, enter a VLAN ID for the customer end point in the Inner VLAN ID field. Packets with this VLAN ID are transmitted out the specified interface. d. From the COS list, select a COS for the port. This field applies only to local VLLs. 5. Click Apply. If any of the endpoints 6. Click Next.
VLL manager 28 FIGURE 355 VLL configuration wizard Deployment Properties Deploying VLL properties using the VLL Manager 1. From the Deployment Properties pane of the VLL Configuration Wizard, under Persistence Properties, chose one of the following: - Do not Save to Flash or Reload - Use this option if you want to update the running configuration. The payload configuration is not saved to the device flash memory, nor is the device rebooted when the VLL configuration is deployed.
28 VLL manager 3. Click Next. If you did not select Save configuration on the Deployment Properties dialog box, the Summary dialog box displays (Figure 357), and you may skip to step 1. If you selected Save configuration on the Deployment Properties dialog box, the Deployment Schedule dialog box displays (Figure 356). Refer to “Scheduling deployment using the VLL Manager” on page 878. FIGURE 356 VLL configuration wizard Deployment Schedule dialog box Scheduling deployment using the VLL Manager 1.
VLL manager 28 2. Click Next. The VLL configuration wizard Summary dialog box displays (Figure 357). FIGURE 357 VLL configuration wizard Summary dialog box Reviewing the VLL Manager summary 1. From the Summary pane of the VLL Configuration Wizard, review the VLL configuration wizard Summary information. The Deployment and Targets tab displays the information you entered on the previous pages. The Configuration tab displays the configuration in CLI format. Reviewing the VLL Manager configuration 1.
28 VLL manager Creating a new VLL instance using duplicate To create a new VLL instance using duplicate, do the following. 1. Select Configure > MPLS > VLL. 2. Select either the Views tab or the Saved Configurations tab. 3. Select the instance you want to duplicate from the list of VLL instances. 4. Click the Duplicate button. The Target Selection dialog box displays. 5. The text Source_Name_Copy is displayed for Name. Enter a unique name for the new instance.
VLL manager 28 Filtering VLL traffic monitoring The VLL Manager Monitor dialog box allows you to monitor traffic on VLLs. 1. Select Monitor > MPLS > VLL. The VLL Monitor Dialog box displays (Figure 358). FIGURE 358 VLL Monitor dialog box 2. You can filter output by name or by VCID by using the selector next to the VLL field. - You can use an Asterisk (*), as a wildcard character if you select By Name. You can enter individual VCIDs or a range of VCIDs if you select By VCID.
28 Virtual Private LAN Services (VPLS) overview 5. Click the Get button to begin the search. VLLs that match the filter criteria display under VLL Instances. NOTE If a VLL is from a device that is not covered by the MPLS license, the row is grayed out. You will not be able to edit that VLL, but you can delete it from the device. The VLL Instances table shows the following information: - VCID of the VLL - In Packets - Number of packets received by the A Endpoint.
Virtual Private LAN Services (VPLS) overview 28 CE Device Customer A R2 R3 R1 CE Device CE Devices Customer A MPLS Domain Customer A VLAN 200 VLAN 100 Customer B Customer B CE Devices VLAN 200 VLAN 100 R4 FIGURE 359 VPLS configuration with two customer VPNs Unlike a Virtual Leased Line (VLL), a VPLS instance can have multiple endpoints. The PE device performs local and remote VLAN tag translation, so that multiple VLANs can be specified under a single VPLS instance.
28 VPLS Manager VPLS Manager The VPLS Manager allows you to manage VPLS instances. You can perform the following tasks from the VLL manager: • View current VPLS instances and peer topologies. • View VPLS configurations. • Add, edit, duplicate, or delete VPLS instances. NOTE When configuring VPLS, a check is made to determine if there are LSPs configured for the target products. You may proceed with configuration, but an LSP is needed for a working connection.
VPLS Manager 28 3. To specify new filter criteria, select By Name or By VCID from the VPLS list. You can use the following to filter the VPLS instances: • Asterisk (*) as a wildcard character if you select By Name. • Individual VCIDs or a range of VCIDs, separating each entry with a comma if you selected By VCID. 4. Click Get to begin the search. Information about products that match the search criteria displays under VPLS Settings, PE Products, and Endpoints on the Details tab.
28 VPLS Manager FIGURE 361 VPLS Manager Peer Topology tab 886 Brocade Network Advisor IP User Manual 53-1003056-01
VPLS Manager 28 Viewing Saved VPLS configurations To view current VPLS configurations, do the following: 1. Select Configure > MPLS > VPLS. 2. Select the Saved Configurations tab (Figure 362). FIGURE 362 VPLS Manager Saved Configurations tab 3. You can use the Name field to filter output by configuration name. You can use an Asterisk (*) as a wild card character. 4. Click Get to begin the search.
28 VPLS Manager • PE Products table — Displays the following information: PE Devices — Names and IP addresses of the endpoint devices. Peers Up — The number of peers that are up. Endpoints Up — The number of endpoints that are up. Endpoints table — Displays the following information: • Endpoints — Names and IP addresses of the endpoint devices. Tag Mode — Tagged if a VLAN tag is used. Untagged if a VLAN tag is not used. Outer VLAN ID — Present if the Tag Mode for the endpoint is Tagged.
VPLS Manager 28 4. If you want to copy the VPLS configurations for one or more products or ports under Discovered Endpoints, select the product or port and then select the Use Discovered Settings check box. 5. Under Available Endpoints, expand the Devices folder to display the available devices. Then expand the device folder, and slot folder to select a port for an endpoint. 6. Use the right arrow button to move the port to the Selected Endpoints box.
28 VPLS Manager a. From the drop down list, select the Class of Service (COS) you want to assign to this instance. b. Enter a Maximum Transmission Unit (MTU) for a VPLS instance. MTU is the size of the largest data packet that can pass along a device. Determine the range of values you can enter by checking the configuration guide for your device. The Peers table shows the peer of the selected device. c. You can select the IP address of the peer by clicking the drop down arrow for Peer IP address.
VPLS Manager 28 a. Click the empty Outer VLAN ID field and enter the VLAN ID you want to use. b. Click the empty Inner VLAN ID field and enter the VLAN ID you want to use. Skip this step if you are using single tagging. 4. Click Next. The Deploy Target Actions dialog box displays (Figure 366). FIGURE 366 VPLS Configuration wizard Deploy Target Action dialog box The VPLS instance name and VCID are shown in the Name and VCID fields. Deploying target actions using VPLS Manager 1.
28 VPLS Manager FIGURE 367 VPLS Configuration wizard Deployment Properties dialog box Deploying VPLS properties using VPLS Manager 1. From the Deployment Properties pane, choose one of the following persistence properties: - Do not Save to Flash or Reload - Use this option if you want to update the running configuration. The payload configuration is not saved to the device flash memory, nor is the device rebooted when the payload configuration is deployed.
VPLS Manager 28 FIGURE 368 VPLS Configuration wizard Deployment Schedule dialog box Scheduling deployment using VPLS Manager 1. If the Deployment Schedule dialog box displays, select from the following deployment options: - Save without scheduling deployment - saves the payload configuration without a deployment schedule. - Schedule Deployment - enables you to schedule a time for deployment using the Frequency, Time (hh:mm), and Date selectors. 2. Click Disable Schedule to disable a schedule.
28 VPLS Manager FIGURE 369 VPLS Configuration wizard Deployment Summary dialog box Reviewing the VPLS Manager summary 1. On the Deployment and Targets Summary pane, review the summary information. The Deployment and Targets tab displays the information you entered on the previous pages. The Configuration tab displays the configuration in CLI format. 2. Click the Previous to return to pages that you want to modify. Click Cancel to cancel the configuration. When you have finished, click Next.
VPLS Manager 28 4. The next available VCID in the VCID pool is automatically placed in the VCID field. You can change the VCID if desired as long as it is not used in a current VLL instance. 5. Modify any of the remaining values in the instance by following the procedure presented in “Adding or editing a VPLS instance” on page 888. NOTE The device folder under Available Endpoints lists all MPLS capable devices, whether or not they are in the All MPLS Licensed and Configured Devices group.
28 VPLS Manager Filtering for VPLS traffic monitoring The VPLS Manager Monitor allows you to filter and monitor VPLS traffic. 1. Select Monitor > MPLS > VPLS. The VPLS Monitor dialog box displays (Figure 370). FIGURE 370 VPLS Monitor dialog box 2. You can filter output by name or by VCID by using the selector next to the VPLS field. - You can use an Asterisk (*), as a wildcard character if you select By Name. You can enter individual VCIDs or a range of VCIDs if you select By VCID. 3.
VCID pools 28 VCID pools VCID pools contain VCID that can be used in a VLL or VPLS instance. You may create a combined VCID pool containing VCIDs that are shared by VLL and VPLS, or you may create a segmented VCID pool that provides separate VCID pools for VLL and VPLS configurations. Viewing, creating, and deleting VCID pools To view a VCID Pool and to create or delete VCID pools, do the following: 1. Select Configure > MPLS > VCID Pool. The VCID Pool dialog box displays (Figure 371).
28 802.1ag Connectivity Fault Management 5. Edit the Start and End fields to specify the desired range of VCIDs. You can use any numbers between 1 to 4294967294. If you are creating a segmented pool, be sure the VLL and VPLS VCIDs do not overlap. 6. Click OK. 802.1ag Connectivity Fault Management 802.1ag Connectivity Fault Management (CFM) is an IEEE standard used to define protocols and practices for Ethernet Operations, Administration, and Maintenance (OAM). 802.
802.1ag Connectivity Fault Management 28 1. Choose one of the following options: • From the VPLS Manager dialog box, Views tab, choose one of the following options: Select a device from the VPLS Peer Status/VPLS Name/VCID list and click 802.1ag CFM. Select the Peer Topology tab and right-click a device in the topology and select 802.1ag CFM. From the VLL Manager dialog box, Views tab, select an instance from the VLL Instances table and click 802.1ag CFM.
28 802.1ag Connectivity Fault Management 12. Select the MEP direction from the Direction list. Options include: • Up — Select to set the MEP direction away from the monitored VLAN. • Down — Select to set the MEP direction towards the monitored VLAN. 13. Click the right arrow button to move the defined MEP to the Selected Maintenance End Points table.
802.1ag Connectivity Fault Management 28 18. Click Close on the Configure 802.1ag CFM dialog box. Editing a maintenance association You can access 802.1ag CFM from the following features: • VPLS Manager (requires the IP - MPLS – VLL prvilege with read-write or read-only permission) • VLL Manager (requires the IP - MPLS – VPLS prvilege with read-write or read-only permission) • VLAN Manager (requires the VLAN Manager prvilege with read-write or read-only permission) NOTE 802.
28 802.1ag Connectivity Fault Management 9. To add a MEP, complete the following steps. a. Select a product from the Product list. The list contains all products that are part of the VPLS. b. Select a VLAN ID from the VLAN ID list. The list contains all VLAN IDs in the VPLS. c. Select a port from the Port list. The list contains all VPLS end-points for the selected VLAN ID. d. Enter a unique identifier for the end-point in the End Point ID field. Valid values include 1 through 8191. e.
802.1ag Connectivity Fault Management 28 11. Click OK on the Edit Maintenance Association dialog box. The Deploy to Products dialog box displays. 12. Select one of the following options: • Save to running — Select to update the running configuration; however, the deployment is not saved to the product’s flash memory. • Save to running and startup — Select to update the running configuration as well as save the deployment configuration to the product’s flash memory.
28 802.1ag Connectivity Fault Management Adding a MEP to a maintenance association You can access 802.1ag CFM from the following features: • VPLS Manager (requires the IP - MPLS – VLL prvilege with read-write or read-only permission) • VLL Manager (requires the IP - MPLS – VPLS prvilege with read-write or read-only permission) • VLAN Manager (requires the VLAN Manager prvilege with read-write or read-only permission) NOTE 802.
802.1ag Connectivity Fault Management 28 10. Click OK on the Edit Maintenance Association dialog box. The Deploy to Products dialog box displays. 11. Select one of the following options: • Save to running — Select to update the running configuration; however, the deployment is not saved to the product’s flash memory. • Save to running and startup — Select to update the running configuration as well as save the deployment configuration to the product’s flash memory.
28 802.1ag Connectivity Fault Management Editing a MEP You can access 802.1ag CFM from the following features: • VPLS Manager (requires the IP - MPLS – VLL prvilege with read-write or read-only permission) • VLL Manager (requires the IP - MPLS – VPLS prvilege with read-write or read-only permission) • VLAN Manager (requires the VLAN Manager prvilege with read-write or read-only permission) NOTE 802.1ag CFM is only supported on IronWare Ethernet Routers devices running firmware release 5.2 or later.
802.1ag Connectivity Fault Management 28 11. Click OK on the Edit Maintenance Association dialog box. The Deploy to Products dialog box displays. 12. Select one of the following options: • Save to running — Select to update the running configuration; however, the deployment is not saved to the product’s flash memory. • Save to running and startup — Select to update the running configuration as well as save the deployment configuration to the product’s flash memory.
28 802.1ag Connectivity Fault Management Viewing the MEPs in a maintenance association You can access 802.1ag CFM from the following features: • VPLS Manager (requires the IP - MPLS – VLL prvilege with read-write or read-only permission) • VLL Manager (requires the IP - MPLS – VPLS prvilege with read-write or read-only permission) • VLAN Manager (requires the VLAN Manager prvilege with read-write or read-only permission) NOTE 802.
802.1ag Connectivity Fault Management 28 • To send a loopback message to a specific MEP or MIP in the domain, refer to “Sending a loopback message” on page 911. • To send a linktrace message to a specific MEP or MIP in the domain, refer to “Sending a linktrace message” on page 912.. 4. Click Close on the Configure 802.1ag CFM dialog box. Deleting a maintenance association You can access 802.
28 802.1ag Connectivity Fault Management Checking the connectivity status of remote MEPs Use the 802.1ag CFM Connectivity dialog box to check the status of all remote maintenance end points (MEP) for the selected MEP. You can access 802.
802.1ag Connectivity Fault Management • • • • 7. 28 Product - The product containing the remote MEP. Port - The port of the remote MEP. MAC Address - The MAC address of the remote MEP. Operational State - The state of the port attached to the MEP. Valid values include: Unknown, Idle, Start, Failed, and OK. Click Close on the 802.1ag CFM Connectivity dialog box. 8. Click Close on the Configure 802.1ag CFM dialog box.
28 802.1ag Connectivity Fault Management 3. Click Loopback. The 802.1ag CFM Loopback dialog box displays the product that contains the selected MEP, the domain, the maintenance association, and the port number of the selected MEP. 4. Select the MEP for which you want to send a loopback message to a specific maintenance end point (MEP) or maintenance intermediate point (MIP) in the domain in the Maintenance End Points (MEP) table. 5. Click Loopback. The 802.1ag CFM Loopback dialog box displays. 6.
802.1ag Connectivity Fault Management 28 1. Choose one of the following options: • From the VPLS Manager dialog box, Views tab, choose one of the following options: Select a device from the VPLS Peer Status/VPLS Name/VCID list and click 802.1ag CFM. Select the Peer Topology tab and right-click a device in the topology and select 802.1ag CFM. From the VLL Manager dialog box, Views tab, select an instance from the VLL Instances table and click 802.1ag CFM.
28 802.1ag Connectivity Fault Management 10. Review the hop details: - The Hop Details table lists the connectivity status for each remote MEP and MIP. The hop number. The MAC address of the remote MEP/MIP. Whether the MEP or MIP forwarded the message. The ingress or egress MEP and MIP. • For a linktrace on a VLAN service, displays the associated port name in the format of Slot_Number/Port_Number. • For a linktrace on a VLL or VPLS, displays the IPv4 address of the peer product.
802.1ag Connectivity Fault Management 28 • From the VLL Manager dialog box, Views tab, select an instance from the VLL Instances table and click 802.1ag CFM. • From the VLAN Manager dialog box - VLAN View or Product View, select a VLAN from list and click 802.1ag CFM. The Configure 802.1ag CFM dialog box displays the product that contains the selected MEP, the domain, the maintenance association, and the port number of the selected MEP. 2.
28 916 802.
Chapter 29 VIP Servers In this chapter • VIP Servers overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Viewing the VIP Servers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Viewing VIP Server information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Enabling or disabling servers or server ports . . . . . . . . . . . . . . . . . . . . . . . • Server port statistics . . . . . . . . . . . . . . . . .
29 Viewing the VIP Servers FIGURE 372 VIP Servers dialog box The View list allows you to select which real server, real server port, virtual server, or virtual server ports you want to view. For detailed information, refer to “Viewing VIP Server information” on page 919. The VIP Servers list displays the ServerIron devices that have been discovered by the Management application ports, and information about the real server or virtual server.
Viewing VIP Server information 29 Viewing VIP Server information 1. From the View list on the VIP Servers dialog box, select which ports you want to view from the following options: • Real server ports view of the virtual server, shown in Figure 373 • Virtual server ports view of the real server, shown in Figure 374 • Real server view of the virtual server, shown in Figure 375 on page 920 2.
29 Viewing VIP Server information FIGURE 375 Real server view of the virtual server The following fields describe the components in the VIP Servers list on the VIP Servers dialog box. VIP Servers list • The name and IP addresses of the real server or virtual server. • The name or port numbers of the real server port or virtual server port. • Only the servers in a Management application user’s AOR are listed in the list.
Enabling or disabling servers or server ports 29 Enabling or disabling servers or server ports If you have the VIP Server Manager privilege with read-write permission, you can enable and disable real servers, virtual servers, real server ports, and virtual server ports. If you have the VIP Server Manager Leaf Node privilege with read-write permission, you can enable and disable only the server leaf nodes.
29 Server port statistics • • • • • RX Packets — The number of packets received by the port. TX Packets — The number of packets transmitted by the port. RX Bytes — The number of bytes received by the port. TX Bytes — The number of bytes transmitted by the port. Last Update — The date and time when information for the server was updated.
Chapter 30 Global Server Load Balancing In this chapter • GSLB Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • GSLB policy management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • GSLB site management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • GSLB zone configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Controller configuration . . .
30 GSLB Manager Viewing the GSLB Manager To view the GSLB Manager, perform the following steps. Select Configure > Application Delivery > GSLB. The Policy Configuration tab in the GSLB dialog box, shown in Figure 376, displays. FIGURE 376 GSLB dialog box - Policy Configuration tab The GSLB dialog box displays the following buttons: • • • • Add — Creates a new GSLB policy, site, or zone definition and a new controller configuration. Edit — Modifies existing GSLB Manager definitions and configurations.
GSLB policy management 30 GSLB policy management A GSLB policy allows a GSLB ServerIron ADX product to evaluate each IP address in a DNS reply, based on defined criteria called metrics. The GSLB ServerIron ADX product can reorder the list of addresses and place the IP address for the best site at the top of the list. Creating a GSLB policy To create a GSLB policy, perform the following steps. 1. Select Configure > Application Delivery > GSLB. 2. Click the Policy Configuration tab.
30 GSLB policy management FIGURE 377 Policy Configuration dialog box - Metrics tab 4. Provide the following information on the Policy Configuration dialog box. a. Enter a policy name for the GSLB policy in the Policy Name field. The combination of a GSLB policy name and the Management application user who created it must be unique. b. Select the policy type from the Policy Type list. Options include the Global or Host policy types. c.
GSLB policy management e. 30 Select the tie breaker method from the Tie Breaker list. This value is used in case multiple addresses pass the policy criteria without one address emerging as the best choice: • Least Response: Selects the address of the site that has been selected least often in previous DNS responses. Note: ADX-type products do not support the Least Response tie-breaker method.
30 GSLB policy management To apply policy metrics, perform the following steps. 1. Click the Metrics tab on the Policy Configuration dial box. 2. Select the order from the Metric Order list. Metric order is the order in which the GSLB ServerIron ADX product applies the policy metrics: • Default Order: Metrics are applied in a fixed order as defined in the GSLB ServerIron ADX product. • Select Order: Metrics are applied in the order specified in this parameter. 3.
GSLB policy management 30 FIGURE 378 Policy Configuration dialog box - Prefix tab 3. Enter the IP address and select a location from the Location list. If you select NONE for the location, the prefix is considered static. If you select any other location, the prefix is considered geographical (Geo). Static prefixes never age out, but geographical prefixes are dynamic and can age out. Deleting a prefix from the Prefix list 1. Click the Prefix tab on the Policy Configuration dialog box. 2.
30 GSLB policy management 5. Enter a list of prefix networks and locations in the text box. Each entry should be on a separate line, and separate the prefix network and location with a comma. The location must be one of the following: • • • • • Asia Europe North America South America None If the location is None, it is added as a static prefix. 6. Select one of the following options: • Overwrite: Deletes and replaces any prefix in the list. • Append: Adds to the prefixes in the list.
GSLB site management 30 GSLB site management The Site Configuration dialog box allows you to configure a GSLB ServerIron ADX product with site parameters. A GSLB site contains GSLB ServerIron ADX products that belong to that site. Click the Site Configuration tab on the GSLB dialog box to view the GSLB sites that have been defined for the system, and perform one of the following tasks: • Click Add to create a new GSLB site. • Select an existing GSLB site, and click Edit if you want to modify it.
30 GSLB site management NOTE The weight of the ServerIron ADX product displays in the IP Weights list of the Add Hosts dialog box. Adding ServerIron ADX products to the site You must add at least one site ADC/ADX product to create a site configuration. 1. Click the Add button. When you click Add, a row is added to the Site ADCs list. The ServerIron ADX products that the Management application has discovered appear in the Site ADC column.
GSLB zone configuration 30 GSLB zone configuration When you manage GSLB zones, you specify the DNS zone name and the host information (applications) within each zone for which you want the GSLB ServerIron ADX product to provide GSLB. There are no defaults for zone parameters.
30 GSLB zone configuration 2. Enter a name for the zone in the Zone Name field. The combination of a GSLB zone name and the Management application user who created it must be unique. 3. Perform one of the following tasks: • Click the Add button to open the Add Hosts dialog box, where you can add hosts to a zone. • Select the host from the Hosts list, and click Edit to modify information for a host. • Select the host from the Hosts list, and click Delete to delete a host.
GSLB zone configuration 30 Adding a host to a zone The Add Hosts dialog box allows you to specify host information within each zone. NOTE When you specify the hosts and applications, the GSLB ServerIron queries the DNS server (the one for which the GSLB ServerIron is a proxy) for the IP addresses associated with the hosts and begins sending health checks to the hosts. 1. Enter the name of the host in the Host Name field.
30 GSLB zone configuration The IP Weights list is used if IP Weights is specified in the selected policy (during site configuration using the Site Configuration dialog box). You assign a weight to an IP address so that the ServerIron ADX product distributes GSLB traffic among IP addresses in a DNS reply. 8. Enter the IP address to which you want to assign a weight in the IP Address column. 9. Enter a value from 0 through 100 in the Weight column. The default is 0.
Controller configuration 30 Controller configuration Once policies, sites, and zones are configured, you can assign and deploy a policy to a ServerIron ADX product that is the GSLB controller. The Controller Configuration tab on the GSLB dialog box allows you to assign and deploy a policy to a ServerIron product that is the GSLB controller, after policies, sites, and zones are configured. NOTE All configuration options on the Controller Configuration tab are deployed to the selected GSLB controller.
30 Controller configuration Creating a new GSLB controller configuration 1. Select Configure > Application Delivery > GSLB. 1. Click the Controller Configuration tab of the GSLB dialog box to view the controller definitions that have been defined for the system. 2. Click Add to create a new GSLB controller configuration, or select an existing GSLB controller configuration and click Edit or Duplicate. The Controller Configuration dialog box displays, as shown in Figure 383.
Controller configuration • • • • • 30 Source IP address (the address of the client making the request) Best IP address (site address provided by the ServerIron ADX product) Host Zone Metric used This parameter setting is deployed to the controller and to the site ServerIron ADX products specified in this configuration. When you enable logging of this information, the ServerIron ADX product generates a syslog message for each DNS request assisted by the ServerIron ADX product.
30 Controller configuration Deploying a controller configuration Under GSLB Manager, only the entries under the Controller Configuration tab can be deployed to a ServerIron ADX product that will run the GSLB protocol. Controller configuration deployment can be scheduled or deployed on demand. To schedule a controller configuration, refer to “Scheduling a deployment” on page 941. To deploy a configuration on demand, complete the following steps. 1. Select Configure > Application Delivery > GSLB. 2.
Controller configuration 30 Scheduling a deployment To schedule the deployment of a controller configuration, complete the following steps. 1. Select Configure > Application Delivery > GSLB. 2. Click Add, Edit, or Duplicate on the Controller Configuration tab. The Controller Configuration dialog box has two tabs: Controller Configuration and Schedule. 3. Click the Schedule tab of the Controller Configuration dialog box.
30 Controller configuration c. Select a schedule type from the Frequency list: • • • • • • One Time Hourly Daily Weekly Monthly Yearly The Time (hh:mm) list appears if you select any schedule type except Hourly. d. Select the time when the payload configuration will be deployed. Indicate the hour, minute, and whether it is AM or PM. The Minutes past the hour list appears if you selected Hourly as the schedule type. e. Select the minutes after the hour when the definition will be deployed.
Chapter 31 SSL Certificates for ServerIron Products In this chapter • SSL certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • SSL certificate configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Generating a certificate signing request . . . . . . . . . . . . . . . . . . . . . . . . . . . • Adding an SSL certificate and key file . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
31 SSL certificate configuration You must have the appropriate user privileges to access SSL Certificates. NOTE SSL Certificates does not generate signed certificates and keys. You can generate a certificate signing request (CSR), but the signed certificates and keys managed by SSL Certificates must be signed by a certificate authority (CA) and must be stored in an accessible location.
SSL certificate configuration 31 The SSL certificates and keys can only be deployed from SSL Certificate Manager to the following SSL-capable IronWare OS devices: • • • • ServerIron with WSM6-SSL module, running software release 10.2.01c or later ServerIron with WSM6-SSL-Slave module, running software release 10.2.01c or later ServerIron 4G-SSL (Stackable), running software release 10.2.01c or later ADX running software release 12.1.00 or later NOTE If the ADX is running software release 12.3.
31 SSL certificate configuration - Export button — Use to export a certificate. Deploy button — Use to deploy certificates. Signing Request button — Use to generate certificate signing request. Key Passwords button — Use to add or edit a key password. Accessing SSL certificates on the Product View tab The SSL Certificates dialog box Certificate View tab allows you to view, add, edit, duplicate, append, delete, chain, import, export, and deploy SSL certificates.
Generating a certificate signing request 31 The Product View tab contains the following fields and components. - Products — A product tree structure. When you select a product, certificates are displayed under Certificates. If the ADX is running software release 12.3.00 or later, you can only view and manage SSL certificates to Virtual IP servers that are in your Area of Responsibility (AOR).
31 Generating a certificate signing request FIGURE 387 Certificate Signing Request dialog box If the selected certificate key entry has a key, the Use the key selected in certificate view option is automatically selected. If a key is not available for the selected entry, the Generate a new key option is automatically selected. 3.
Generating a certificate signing request 31 FIGURE 388 Generate CSR Key dialog box 7. Enter your organization’s user data: • • • • Common Name - A common name for the CSR (1 through 32 alphanumeric characters). Unit Name - A unit name for the CSR (1 through 32 alphanumeric characters). Organization - The name of your organization (1 through 64 alphanumeric characters). E-mail Address - The e-mail address for the CSR. This is the From: address when the CSR is submitted for signing.
31 Adding an SSL certificate and key file 10. Enter the key password in the Password field, if necessary. By default, the Password field displays the password (entered in the Certificate Signing Request dialog box) as asterisks (*). 11. Click OK. The generated CSR displays in the CSR field. 12. The CSR needs to be copied and pasted into a file. Obtain instructions from the CA for submitting the CSR for signing.
Editing an SSL certificate and key file 31 The certificate request must be in .PEM format, and must not be expired. No size limit is enforced. 5. If you want a key to accompany the certificate, select the With Private Key check box. This enables the Key Name, Key, and Password fields. If you select With Private Key, continue with step 6. If you do not select With Private Key, continue with step 9. 6. Enter a name in the Key Name field. Any alphanumeric character can be used except a space.
31 Duplicating an SSL certificate and key file Related topic “SSL certificate configuration” Duplicating an SSL certificate and key file You can only edit the certificate name, the key name, and the certificate key decription from the Duplicate Certificate dialog box. 1. Select Configure > Application Delivery > SSL Certificates. The SSL Certificates dialog box displays. 2. From the Certificate View tab, use the Certificates arrow to select Duplicate . The Duplicate Certificate dialog box displays. 3.
Importing certificates and keys from file locations 31 3. Click Close. Importing certificates and keys from file locations NOTE If the ADX is running software release 12.3.00 or later, you can only view and manage SSL certificates that are bound to Virtual IP servers that are in your Area of Responsibility (AOR).
31 Importing certificates and keys from products 8. Enter the password associated with the key in the Password field. 9. (Optional) Enter a description of the certificate in the Description field. 10. Click OK to import the certificate and key files. Related topic “SSL certificate configuration” Importing certificates and keys from products NOTE If the ADX is running software release 12.3.
Exporting certificates and keys 31 FIGURE 391 Import from Product - SSL Certificates/Keys dialog box 3. Select a product from the Available Sources list. 4. Use the right arrow button to move the selected product to the Selected Sources list. 5. Click OK to import certificates and keys for the selected products. Related topic “SSL certificate configuration” Exporting certificates and keys NOTE If the ADX is running software release 12.3.
31 Deploying certificates and keys If you export the certificate file only (no key file), the PKCS option is not enabled. 4. Enter the location of the file in the File Location field or click Browse to browse to the location. 5. Enter the certificate name in the Certificate Name field. 6. Enter the key name in the Key Name field. If you export the certificate file only (no key file), the Key Name field is not enabled. If you select PKCS as the export format, the Key Name field is not enabled. 7.
Creating key passwords 31 FIGURE 392 Deploy Certificates/Keys dialog box 4. Select a product from the Available Targets list. 5. Use the right arrow button to move the selected product to the Selected Targets list. 6. Click OK. The certificate and key selected from the Certificate View tab are deployed to the selected products.
31 Creating key passwords FIGURE 393 Key Passwords dialog box 3. Under Add/Edit Key Password, enter an ASCII character string (from 1 through 16 characters) in the Display Label field that identifies the password you enter in the Password field. Use the key name or a character string that is easy to identify with a specific key. The label provides a means for identifying the password. The password itself is not exposed. 4.
Appending SSL certificates 31 Appending SSL certificates NOTE If the ADX is running software release 12.3.00 or later, you can only view and manage SSL certificates that are bound to Virtual IP servers that are in your Area of Responsibility (AOR). To add a Virtual IP server to your AOR, refer to “Assigning products to an AOR” on page 197 You can append an SSL certificate with another certificate. 1. Select Configure > Application Delivery > SSL Certificates. The SSL Certificates dialog box displays. 2.
31 Chaining SSL certificates 3. Click Chain. The Chain Certificates dialog box displays (Figure 394). FIGURE 394 Chain Certificates dialog box The Certificates table includes the following details: • ID — A unique system-assigned ID for each certificate entry. • Status — Possible values are Valid, About to Expire, or Expired. • Certificate — The user-assigned certificate name. The same name may be used on different products. • Key — The user-assigned key name.
Deleting SSL certificates 31 4. Select the certificate you want to chain to the certificate you selected in step 2. The Chain status for the selected certificate must be Yes. Make sure the Status for the second certificate is Yes. The description of the certificate displays in the Description field, if a description was entered when the certificate was created. 5. Click OK.
31 962 Deleting SSL certificates Brocade Network Advisor IP User Manual 53-1003056-01
Chapter 32 Deployment Manager In this chapter • Introduction to the Deployment Manager . . . . . . . . . . . . . . . . . . . . . . . . . . • Editing a deployment configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Duplicating a deployment configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . • Deleting a deployment configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Deploying a configuration . . . . . . . . . . . . . . . . . . . . . . . . .
32 Duplicating a deployment configuration FIGURE 395 Task Scheduler dialog box 2. Select a deployment configuration in the Saved or Scheduled tab. Policy-based routing configurations cannot be edited. 3. Click Edit. A dialog box specific to the type of deployment displays. This is the same dialog box that was used when the deployment was created. 4. Update the dialog box with the information you want to change. Duplicating a deployment configuration 1. Select Configure > Task Scheduler.
Deleting a deployment configuration 32 A copy of the deployment configuration is created with the name “originalName copyn”. For example, if the original name is “test”, the new name is “test copy1”. If you duplicate “test” again, the name of the second duplicate is “test copy2”. Deleting a deployment configuration 1. Select Configure > Task Scheduler. The Task Scheduler dialog box displays. 2. Select a deployment configuration in the Saved or Scheduled tab. 3. Click Delete. 4.
32 Generating a deployment configuration snapshot report 3. Click Report. An HTML report displays. You can click the Configuration Name or Deployment Time to see additional details. Generating a deployment configuration snapshot report 1. Select Configure > Task Scheduler. The Task Scheduler dialog box displays. 2. Select a deployment in the Saved or Scheduled tab. 3. Click Deploy. The Deployment Status dialog box displays. 4. Click Snapshot Report. The Configuration Snapshot Report dialog box displays.
Searching the configuration snapshots 32 6. Click Find. The Management application displays the list of snapshots that match the search criteria you specified.
32 968 Searching the configuration snapshots Brocade Network Advisor IP User Manual 53-1003056-01
Chapter Performance Data 33 In this chapter • SAN performance overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 969 • SAN real-time performance data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 976 • IP performance monitoring and traffic analysis . . . . . . . . . . . . . . . . . . . . . 982 • IP configuration requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 982 • IP real-time performance monitoring . . . . . . . . .
33 SAN performance overview SAN performance measures Performance measures enable you to select one or more measures to define the graph or report. The measures available to you depend on the object type from which you want to gather performance data. NOTE Devices with 10GE ports must be running Fabric OS 6.4.1 or later to obtain the correct TE_Port statistics (TX/RX). NOTE Devices with 10GE ports must have the RMON MIB enabled on the switch.
SAN performance overview • • • • • • • • • • • • • • • • • • • • • • • • • • • BB Credit Zero — Available for FC ports. • • • • Dropped Frames — Available for managed HBA ports and managed CNA ports. 33 Truncated Frames — Available for FC ports. FEC Corrected Blocks — Available for FC ports. FEC Uncorrected Blocks — Available for FC ports. Dropped Packets — Available for FCIP tunnels only. Cumulative Compression Ratio — Available for FCIP tunnels only.
33 SAN performance overview Entry Entry Entry Entry Entry Entry 0: 1: 2: 3: 4: 5: No No No No No No access access access access access access host host host host host host configured configured configured configured configured configured yet yet yet yet yet yet Example of Management application Server IP address included in access control list FCRRouter:admin> snmpconfig --show accesscontrol SNMP access list configuration: Entry 0: Access host subnet area 172.26.1.
SAN performance overview 33 Example of setting SNMP v1 HCLSwitch:admin> snmpconfig --set snmpv1 SNMP community and trap recipient configuration: Community (rw): [test] Trap Recipient's IP address : [172.26.1.183] Trap recipient Severity level : (0..5) [4] Trap recipient Port : (0..65535) [162] Community (rw): [OrigEquipMfr] Trap Recipient's IP address : [172.26.24.26] Trap recipient Severity level : (0..5) [4] Trap recipient Port : (0..
33 SAN performance overview Verify Priv Passwd: User (rw): [snmpadmin2] Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3] Priv Protocol [DES(1)/noPriv(2)/3DES(3)/AES128(4)/AES2(5)/AES256(6)]): (2..2) [2] User (rw): [snmpadmin3] Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3] Priv Protocol [DES(1)/noPriv(2)/3DES(3)/AES128(4)/AES2(5)/AES256(6)]): (2..2) [2] User (ro): [snmpuser1] Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..
SAN performance overview 33 • Make sure that the SNMP security level is set to the appropriate level for the switch. - To check the SNMP security level, use the snmpconfig --show secLevel command. Example of checking SNMP security level snmpconfig --show secLevel GET security level = 0, SET level = 0 SNMP GET Security Level: No security SNMP SET Security Level: No security - To set the SNMP security level, use the snmpconfig --set secLevel command.
33 SAN real-time performance data Example for FC ports Sprint-65:root> portperfshow 5 Example for FCIP tunnels Sprint-65:root> portshow fciptunnel ge0 1 -perf SAN real-time performance data Real-time performance monitoring enables you to collect data from managed devices in your SAN. Real-time performance monitoring is only supported on the following managed objects: FC (E_Ports and F_Ports), GE_Ports, E_Port trunks, 10GE_Ports, managed HBA Ports, managed CNA Ports, and FCIP tunnels.
SAN real-time performance data 33 FIGURE 396 Realtime Port Selector dialog box NOTE You can set columns in right side of the dialog box for FICON display using Server > Options > SAN DIsplay. The first eight columns will display FC Address, Serial #, Tag, Product Type, Model, Vendor, Port Name, Port Type, and Port WWN. 3. Select the object type from the Show list by which you want to graph performance. NOTE Devices with 10GE ports must be running Fabric OS 6.4.
33 SAN real-time performance data 2. Select how the data is measured, in received frames, transmitted frames, or CRC errors. For a list of possible performance measures, refer to “SAN performance measures” on page 970. 3. To select more than one measure, click the Additional Measures expand arrows and select the check box for each additional measure. If Additional Measures area is not shown, click the down arrow. For a list of possible performance measures, refer to “SAN performance measures” on page 970.
SAN real-time performance data 33 • Destination Port Type - The port type through which the selected device is connected to the destination device. • Additional Measures columns - Displays each measure selected in the Measures list and Additional Measures area. • Measures columns - A column for each selected measure in the Measures list or Additional Measures area. Exporting real-time performance data To export real-time performance data, complete the following steps. 1. Generate a performance graph.
33 SAN real-time performance data TABLE 86 Performance statistic counters Counter name Type Protocol Source OID value Formula RX FCIP SNMP .1.3.6.1.2.1.31.1.1.1.6 RX = (delta value1 / (1000 * 1000)) / (polling interval2) Uncompressed Tx/Rx MB/sec FCIP SNMP .1.3.6.1.4.1.1588.4.1.1.
SAN real-time performance data 33 Table 87 lists the additional counters for which you can obtain performance statistics. TABLE 87 Performance counters Counter name Type Protocol Source OID value CRC Errors FC SNMP .1.3.6.1.3.94.4.5.1.40 Signal Losses FC SNMP .1.3.6.1.3.94.4.5.1.43 Sync Losses FC SNMP .1.3.6.1.3.94.4.5.1.44 Link Failures FC SNMP .1.3.6.1.3.94.4.5.1.39 Sequence Errors FC SNMP .1.3.6.1.3.94.4.5.1.42 Invalid Transmissions FC SNMP .1.3.6.1.3.94.4.5.1.
33 IP performance monitoring and traffic analysis FIGURE 397 NOTE Policies set for switches enabled for Monitoring and Alerting Policy Suite (MAPS) also display in this dialog box. IP performance monitoring and traffic analysis Use information in the following sections to monitor IP performance and analyze IP traffic. • IP configuration requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 982 • IP real-time performance monitoring . . . . . . . . . . . . . . . . . . . . .
IP real-time performance monitoring 33 IP real-time performance monitoring Real-time performance monitoring allows you to view a snapshot of current performance data. You can enable real-time performance monitoring without configuring historical data collectors. The data is not stored in the database. Performance monitoring allows you to define a data collector by mapping a Management Information Base (MIB) object to a unit name (refer to “MIB data collectors” on page 1013).
33 IP real-time performance monitoring 2. Select the products you want in the Available Products list and click the right arrow button to move them to the Selected Products list. NOTE You cannot select more than 100 products and ports. 3. Select the ports you want in the Available Ports list and click the right arrow button to move them to the Selected Ports list. 4. Click OK. The Real Time Graphs/Tables dialog box displays. 5.
IP real-time performance monitoring TABLE 88 33 Collection status icons Failed. No value was ever collected for this collectible. Warning: Data collection failed in the last polling cycle. Successful: Last collection successful. Scheduled but not currently active. • Last Value - The last (most current) value collected. • Last Time Polled - The time that the collector was last polled. 10. Click Sources to add products and ports to or remove products and ports from real-time performance monitoring.
33 IP real-time performance monitoring 5. The Real Time Graphs/Tables dialog box displays. Adding measures to products To add measures to products, complete the following steps. 1. Right-click a device and select Performance > Real Time Graph/Table. The Real Time Graphs/Tables dialog box displays. 2. Select Products from the Show list. The available products display in a list. 3. Select a product in the list and click Measures. The Select measures - Real Time Graphs/Tables dialog box displays. 4.
IP real-time performance monitoring 33 3. Select a product in the list and click Measures. The Select measures - Real Time Graphs/Tables dialog box displays. 4. Select Device Measures from the Show list. 5. To remove an MIB or expression from the product, complete the following steps. a. Select the MIB or expression you want to remove from the product in the Selected Measures list. Select multiple MIBs and expressions by holding down the CTRL key and clicking more than one MIB or expression. b.
33 IP real-time performance monitoring 8. Click OK. The Real Time Graphs/Tables dialog box displays. Removing measures from ports To remove measures from ports, complete the following steps. 1. Right-click a device and select Performance > Real Time Graph/Table. The Real Time Graphs/Tables dialog box displays. 2. Select Products from the Show list. The available products display in a list. 3. Expand the list and select a port in the list and click Measures.
IP real-time performance monitoring 33 a. Select Show > Products to show devices on the network that are being polled for collectible data. b. Select the port you want to include in performance in the tree. Press CTRL and click to select multiple ports. c. Click the right arrow button. The graph and table are populated with the collectible performance values. All collectibles defined for the selected port display beneath the graph. 3. Add an individual collectibles by completing the following steps.
33 IP real-time performance monitoring • Select Go to Latest to go to the latest data point on the graph. • Select the Use Logarithmic Axis check box to present data on a logarithmic or non-logarithmic axis. • Select the Show Values check box to annotate data point values in the graph. • Select the Enable Auto Scrolling check box to automatically jump to display the new data when new data is collected while the graph is in view.
IP real-time performance monitoring 33 NOTE Although these settings will apply to all performance graphics in the management application. the change will not reflect instantly on the Performance Dashboard monitor that displays the graph. Rather it will be updated the next time those monitors are launched. 3. Click Options to launch the Graph Options dialog box. Refer to “Configuring graph options” on page 991 for instructions on using this dialog box. 4.
33 IP real-time performance monitoring FIGURE 400 Graph Options dialog box (Historical Graphs/Tables dialog box) NOTE Figure 400 illustrates the Graph Options dialog box available from the Historical Graphs/Tables dialog box. The Graph Options dialog box available from the Real Time Graphs/Tables dialog box is similar, but has fewer control options. 2. Select the type of chart style from the Chart Style list. Available chart styles include Line Chart, Area Chart, or Bar Chart. 3.
IP real-time performance monitoring 33 • (Historical graphs and monitors only) Plot Min/Max - Plots minimum and maximum values along with the average data. The range between the minimum and maximum values will be represented by the width of a color band surrounding the data points as shown in the following illustration. Note that this option is not available if you select Minimum Interval granularity. It also does not apply and is not available for Real Time Performance graphs.
33 IP real-time performance monitoring a. (Historical graphs and monitors only) Select the granularity of the data points to display on the graph from the Granularity list. Options are 5 minutes, 30 minutes, 2 hours, or 1 day. NOTE The graph will not update dynamically if the granularity is 30 Minutes, 2 Hours, or 1 day. To update, click Apply. The graph will update dynamically when Minimum interval is selected. b. Select the duration of time for data display on the graph from Select list.
IP historical performance monitoring 33 1. Right-click the graph and select Print. The Page Setup dialog box displays. 2. Edit the paper, orientation, and margins, as needed. 3. Click Printer to select a printer. 4. Click OK. IP historical performance monitoring Historical performance monitoring allows you create data collectors by choosing MIB object and by choosing or creating mathematical expressions. You can also configure a historical data graph or table to display data.
33 IP historical performance monitoring “Adding third-party device MIB objects manually” “IP performance monitoring and traffic analysis” “IP configuration requirements” “IP real-time performance monitoring” “IP Custom performance reports” “IP sFlow configuration” “IP Traffic analyzer monitoring and sFlow reports” “IP traffic accounting” Using Flow Vision dialog box options Editing system collectors Subject to the following restrictions, you can edit system collectors using the Data Collector wizard (ref
IP historical performance monitoring 33 FIGURE 403 Historical Data Collectors dialog box All configured data collectors are listed, showing the following information: • Name - The name of the data collector. • Enabled - Whether or not the data collector is enabled (Yes) or disabled (No). NOTE The Netiron Ether Stats Collector and NOS Ethernet Port Optics Collector will be disabled by default.
33 IP historical performance monitoring Enabling a historical data collector Use the following steps to enable a data collector to collect historical data or disable a data collector from collecting data. 1. Select an historical data collector on the Historical Data Collectors dialog box. • If the collector is disabled, the Enable button is active. • If the collector is enabled, the Disable button is active. 2. Click Enable to enable the collector. 3. Click Disable to disable the collector.
IP historical performance monitoring 33 FIGURE 404 Data Collector wizard Collector Basics dialog box 3. Enter a descriptive name for the data collector in the Name field. 4. Use the Polling Interval list to set the polling interval. The choices are 1 minute, 5 minutes, 10 minutes, 15 minutes, and 30 minutes. 5. Select the Target Type. • If you select Product level, SNMP data is collected at the product (device) level. • If you select Port level, SNMP data is collected at the port level. 6.
33 IP historical performance monitoring • Duration - Enter a value in the Duration field, and then select the unit of measure. The options are Minutes, Hours, and Days. 7. Click Next on the Collector Basics dialog box. The MIB Objects dialog box displays. FIGURE 405 Data Collector wizard MIB Objects dialog box The Available MIB Objects tree includes all integer-based objects that are available by default and any that have been imported. Third-party device MIB objects are not available by default.
IP historical performance monitoring 33 FIGURE 406 Data Collector wizard Expressions dialog box The Available Expressions list shows all expressions that are available by default and any that have been defined by the user. 12. Select an expression from the Available Expressions list. A description of the expression displays under Details of . 13. To include the expression in your data collector, click the right arrow button to move the expression to the Selected Expressions list.
33 IP historical performance monitoring FIGURE 407 Data Collector wizard Select Sources dialog box The Available Products/Ports tree structure includes all products and ports that can be monitored. You can expand folders to display all available products and ports. If you have selected Port Level on the Collector Basics dialog box, trunk objects will be included as available targets in the form of LAG, vLAG, or TRILL objects. Only ifindex-based MIBs or expressions are supported. 15.
IP historical performance monitoring 33 FIGURE 408 Data Collector wizard MIB Index dialog box You can define index values for each MIB object that requires an index. 17. From the MIB Instances list, select the required MIB variable. The Complete SNMP OID, the Index Name, and the Index Value display beneath the MIB Instances list. 18. You have several options for entering index information: • Select the Dynamic walk check box to dynamically select index values for a particular index.
33 IP historical performance monitoring 19. Click Next on the MIB Index dialog box. The Threshold & Rearm dialog box displays. FIGURE 409 Data Collector wizard Threshold & Rearm dialog box This Threshold & Rearm dialog box allows you to establish a a threshold value that triggers a trap message when the threshold is met, and to establish conditions for repeating threshold check and trap messages. 20. Select the Enable threshold and rearm events check box to enable the Threshold and Rearm selectors. 21.
IP historical performance monitoring 33 Adding third-party device MIB objects manually To add a third-party device MIB object manually, complete the following steps. 1. Copy the third-party device MIB objects to the Install_Home\conf\mibs\ip directory. 2. Go to Install_Home\conf\mibs and open the mibs_to_compile.txt file in a text editor. 3. Add the MIB file names to the mibs_to_compile.txt file. 4. Save and close the mibs_to_compile.txt file. 5.
33 IP historical performance monitoring 1. Select Monitor > Performance > Historical Data Collectors. 2. Select the data collector you want to duplicate. 3. Click Duplicate. The Data Collector wizard is launched. The wizard is pre-populated with the data for the selected data collector. The Name field shows the name of the collector followed by the word copy. Go to any step to edit any of the values. 4. Click Finish on any of the wizard dialog boxes when you are done.
IP historical performance monitoring 33 2. Perform either of the following steps: • Click Add. The Add Expressions dialog box displays. FIGURE 411 Add Expressions dialog box • Select the expression you want to edit or duplicate from the Expressions list and click Edit or Duplicate. The Edit Expression or Duplicate Expression dialog box displays with the details for the selected expression. If you are duplicating an expression, the Management application appends _copy to the name of the expression. 3.
33 IP historical performance monitoring • MIB Object.Delta — Assuming the MIB value polled in the current polling period is M(T1) and the value polled in the previous polling period is M(T0), the MIB value to be used in the expression is calculated using M(T1)- M(T0). • MIB Object.
IP historical performance monitoring 33 Viewing Historical Graphs/Tables 1. Right-click a row in a performance monitor on the dashboard and select Show Graph/Table. OR Select Monitor > Performance > Historical Graphs/Tables. The Historical Graphs/Tables dialog box displays. 2. Select the Data Monitoring tab. The main features are a tree structure and a graph area. You can collapse the tree structure to expand the graph area. FIGURE 412 Historical Graphs/Tables Data Monitoring tab 3.
33 IP historical performance monitoring FIGURE 414 NetIron Historical Graph display FIGURE 415 Wireless access point devices and controllers display • Select Collectibles and the left panel displays measures (MIB objects and expressions) currently being collected. Select a measure, and the targets (products or ports) from which the measure was collected display in the right panel. If SAN historical data collection is enabled, corresponding SAN products and ports display.
IP historical performance monitoring 33 6. Optional:Once data collection begins, the data is presented on the chart (if Graph is selected) or table (if Table is selected). If a graph is displayed, the legend under the graph shows what data each color represents. Also, you see the following text: • MIB: Shows the name of the MIB object that is being used to collect the data and the device that is being polled. If the target is a port, then the interface ID is also displayed.
33 IP historical performance monitoring • Port - The port name when a port is selected. • Collectible - The MIB objects and expressions used by the data collector. When you select a collectible row, collectible information displays in the bottom portion of the panel, such as errors, error count, and messages. • Collector - The data collector name. • Status - The status field uses the following icons:. Failed. No value was ever collected for this collectible.
MIB data collectors 33 MIB data collectors The Management application enables you to define a data collector by mapping a MIB object to a unit name in the mib_unit.properties file. This property file is located in the Install_Home/conf/mibs directory. The default mib_unit.properties file contains commonly used MIB unit definitions. Once mapped, the unit name displays on the line chart of the performance graphs when you select that MIB object as a data collector.
33 IP Custom performance reports IP Custom performance reports You can create customized reports and run or schedule them in the same manner as a standard report. You can modify, copy, or delete customized reports. Select the report from the Report Definitions tab, then click the Edit, Duplicate, or Delete button.
IP Custom performance reports 33 • Select an existing report from the Performance Custom Reports dialog box and click Edit to edit the report. • Select an existing report from the Performance Custom Reports dialog box and click Duplicate to duplicate the report. • Select an existing report from the Performance Custom Reports dialog box and click Delete to delete the report.
33 IP Custom performance reports 5. To schedule the report to run at a specific time, click the Time Settings tab. FIGURE 419 Add/Edit Report Definition dialog box - Time Settings tab You can choose from the following settings: • Relative Time - Enables you to select a time range relative to the present for the display of historical data. The choices are incremental from the last 30 minutes to the last 24 hours.
IP Custom performance reports 33 6. To arrange the order of the columns in the generated report, click the Result Settings tab. FIGURE 420 Add/Edit Report Definition dialog box - Result Settings tab • Data types that will be collected are listed in the Available Columns list. Select the data type you want to include in the report and click the right arrow button to move it to the Selected Columns box. • Select a data type to be used to sort the report.
33 IP Custom performance reports 7. Click the Identification tab. FIGURE 421 Add/Edit Report Definition dialog box - Identification tab 8. Enter a name for the report in the Name field. You can use up to 64 alphanumeric characters. This name appears under the Name column on the SNMP Monitor reports tree. This name must be unique for each SNMP Monitor report. 9. Enter a title for the report, which will be used as the title of a generated report, in the Title field.
IP Custom performance reports 33 12. Select the user accounts that will be able to view and run this definition in the Available Users list and click the right arrow button to move those user accounts into the Selected Roles box. Click the left arrow button to move the user accounts back to the Available Users list. You can share this definition with specific Management application users.
33 IP sFlow configuration IP sFlow configuration The Management application supports the creation of sFlow reports to capture traffic data. Configuring sFlow You can use the sFlow configuration wizard to configure an sFlow data collector and a destination for the sFlow data collector. 1. Select Monitor > Traffic Analysis > Configure sFlow. The Interface Payload - sFlow Configuration dialog box displays.
IP sFlow configuration 33 2. Click Next. The Interface Payload - sFlow Settings dialog box displays. FIGURE 423 Interface Payload - sFlow Settings dialog box 3. Under Global Settings, select Enable to have the sFlow report enabled when it is deployed. Select Disable to deploy the sFlow report as initially disabled. 4. Use the Rate Sampling selector to choose either Adaptive or Custom sampling. If you choose Adaptive, the management server selects the sampling interval and traffic sampling rate.
33 IP sFlow configuration If you choose Custom, you may set your own sampling interval and traffic sampling rate. - Global Settings • Counter sampling interval - defines the interval in seconds between samples. For Ironware devices, the range is 0 to 86400. For Network OS devices, the range is 1 to 65535. • Traffic sampling rate - the ratio between the total number of incoming packets and the number of flow samples taken at the product level.
IP sFlow configuration 33 A new row appears under Collector Details for the collector you just added. NOTE A limit of four collectors is enforced in the Collector Details table. If you add more than four collectors, an error message displays. An error message also displays if you try to add a collector with the same IP address and UDP port combination as an existing collector. NOTE For VCS devices running Network OS v4.0 and above, you can deploy up to five collectors.
33 IP sFlow configuration Creating custom sFlow reports You may create custom sFlow reports if you want to capture traffic analysis information that is not available in the standard reports. 1. Select Monitor > Traffic Analysis > Custom Reports. The Traffic Analyzer Custom Reports dialog box displays. FIGURE 424 Traffic Analyzer Custom Reports dialog box, Definition tab 2. Select the Report Definitions tab. 3. Click the Add button. The Add Report Definitions dialog box displays.
IP sFlow configuration 33 4. Select the Product & Port tab. FIGURE 425 Add Report Definitions dialog box, Product & Port tab The Product & Port tab contains tables of available products and ports that may be selected for sFlow data collection. 5. Determine if you want a report on only one product or port or on two or more products or ports, and select either Single or Multiple as appropriate. Options are displayed differently depending on your choice of Single or Multiple.
33 IP sFlow configuration For VCS fabrics, if you select Single mode, the following report definition behavior may occur: - Displays all ports from all members of the selected VCS fabric in the available ports tables on the Product & Port tab. - Automatically includes fabric changes (adding or deleting members) when you run the report.
IP sFlow configuration 33 8. If you do not chose the Prompt check box, complete the following for each field. - Source VM — Enter the name, IP address, or MAC address of the source VMs in comma separated value (CSV) format or click the ellipsis button to the right of the field to select the VMs from the Select VMs dialog box.
33 IP sFlow configuration 12. Select the Layer 3 & 4 tab. FIGURE 428 Add Report Definitions dialog box, Layer 3 & 4 tab 13. Examine each listed item and decide the following: 1028 - Do you want to enter values in the field, or be prompted to enter the value when running the report? If you want to be prompted, select the Prompt check box.
IP sFlow configuration 33 14. If you do not chose the Prompt check box, you may enter any of the following in comma separated value (CSV) format in the fields provided: - Layer 3 Protocols — Enter the L3 protocols in comma separated value (CSV) format or click the ellipsis button to the right of the field to select the protocols from the Layer 3 Protocols dialog box.
33 IP sFlow configuration 16. Decide if you want to enter the user names in the fields provided, or if you want to be prompted for the user names. - If you want to be prompted, select the Prompt check box. This disables the field. If you do not want to be prompted, enter the name of the user that is sending the traffic in the Source User field, and enter the name of the user that is receiving the traffic in the Destination User field. 17. Select the Routing tab.
IP sFlow configuration 33 20. Select Relative time if the you want to retrieve information relative to a time range, or Absolute time if you want to run the report at a specific date and hour. - If you select Relative time, use the Range selector to If you select Absolute time, use the Start Date and Start Time selectors to set the time that data collection begins, and the End Date and End Time selectors to set the time when data collection ends. 21. Select the Result Settings tab.
33 IP sFlow configuration FIGURE 433 Add Report Definitions dialog box, Result Settings tab 23. If you selected Bottom N Chart and Table or Top N Chart and Table, select the top or bottom number (N) of talkers that you want in the report by clicking the arrows on the selector to the right of the Result Type list. Select a minimum of 5, with increments of 5 to a maximum of 25.
IP sFlow configuration 33 26. Select the Identification tab. Add Report Definitions dialog box displays, as shown in Figure 434 on page 1033. FIGURE 434 Add Report Definitions dialog box, Identification tab 27. Enter a name for the report in the Name field. The name must be unique among all sFlow reports, and can be a maximum of 64 alphanumeric characters. 28. Enter the report title in the Title field. The Title field supports a maximum of 128 alphanumeric characters. 29.
33 IP sFlow configuration FIGURE 435 Example report for top 5 MAC Talkers Scheduling custom sFlow reports You can schedule a custom sFlow report from the Schedules tab of the Custom Reports dialog box. 1. Select Monitor > Traffic Analysis > Custom Reports. 2. Select the Schedules tab. Custom sFlow Reports dialog box displays, as shown in Figure 436 on page 1035.
IP sFlow configuration 33 FIGURE 436 Custom sFlow Reports dialog box, Schedules tab 3. Click Add. The Add Schedule dialog box displays, as shown in Figure 437 on page 1036.
33 IP sFlow configuration FIGURE 437 Add Schedule dialog box 4. Enter a name for the schedule in the Name field. 5. Use the Report Definition selector to select the report definition you want to schedule. NOTE Report definitions that included a prompt are not listed. 6. Use the Format selector to choose either HTML or CSV format. 7. Use the Frequency selector to choose to run the data collector on a Yearly, Monthly, Weekly, Daily, Hourly, or One Time basis.
IP Traffic analyzer monitoring and sFlow reports 33 12. You may include text that you want to add before the auto-generated report content in the Body Prologue field. 13. You may include text that you want to add after the auto-generated report content in the Body Epilogue field. 14. Click OK. Suspending a custom sFlow report schedule To suspend the schedule of a custom sFlow report, complete the following steps. 1. Select Monitor > Traffic Analysis > Custom Reports. 2. Select the Schedules tab. 3.
33 IP Traffic analyzer monitoring and sFlow reports 802.1X configuration requirements 802.1X user information can be displayed on sFlow reports. To ensure that this information is displayed, do the following: • Make sure the device and software release it is running supports 802.1X. • 802.1X must be enabled on the device ports. • Clients must be running software platforms that support 802.1X (for example, Windows XP operating system). • RADIUS authentication servers must have the 802.
IP Traffic analyzer monitoring and sFlow reports 33 4. To launch the sFlow Configuration wizard and configure an sFlow data collector, select Configure sFlow. Selecting a report Use the report header to configure the report display. This section explains the available fields and selection options. Report list Select the type of traffic that you want to view from the list. • • • • For Layer 2 reports, select MAC, VM, or VLAN. For L3/L4 reports, select IPv4, IPv6, IPX, AppleTalk (AT), VM, or Others.
33 IP Traffic analyzer monitoring and sFlow reports Also, if you select 1, 2, 4, or 6 hours for span, top talkers are shown as stacked bar graphs; each bar represents two minutes of data. For example, each bar below represents 2 minutes of data. Each bar is divided into the top talkers for that 2-minute period. Measure list Select how data is to be sorted: Bytes or Frames. Frames is the default.
IP Traffic analyzer monitoring and sFlow reports 33 Include Remaining Talkers The sFlow monitoring reports display the top five talkers and remaining talkers. To exclude any remaining talkers in the chart area, select this check box. Report Title and Device Group Name or Device Name and Device IP Address This field shows the name of the report, followed by one of the following: • Device group name (Group level): If you selected a report for a device group.
33 IP Traffic analyzer monitoring and sFlow reports • The 12 and 24 hour graphs show bars (not stacked bars). Each bar represents a flow aggregated for a 1-hour period. There are six bars to a set, starting with red and ending with gray. Each set represents all the flows in the system aggregated for a 1-hour period, beginning with the time shown on the x-axis. You see this time halfway between the set of six bars. The first five colors used on the graph represent the top five resource users.
IP Traffic analyzer monitoring and sFlow reports 33 • To view a report for a product, click the name of the product group to which the product belongs, and on the Product list page, click the icon for the product. 3. Click View to display the report. 4. In the Category list, select L3/L4 Reports. 5. In the Reports list, select MAC. The following information is provided: • MAC - The source and destination MAC addresses of the traffic and the VM host (Top VM Talkers reports).
33 IP Traffic analyzer monitoring and sFlow reports • MAC - The source and destination MAC addresses of the traffic and the VM host (Top VM Talkers reports). If Source and Destination VM Host column values are not related to VM, no values will display. • User (802.1X) - The name of the user who originated the traffic and the user who received the traffic. This name is the ID the client used to gain access to the network. • Frames - The size of the traffic in frames.
IP Traffic analyzer monitoring and sFlow reports 33 • L3 columns - Source - The source IP addresses of the IPv4 traffic and VM hosts (Top VM Talkers reports). If enabled, host names of the IP address are shown in parentheses. - Destination - The destination IP addresses of the IPv4 traffic and VM hosts (Top VM Talkers reports). If enabled, host names of the IP address are shown in parentheses. - TOS/DSCP - The TOS bit value or the Differentiated Services Code Points (DSCP) value in the packets.
33 IP Traffic analyzer monitoring and sFlow reports The report shows the following information: • IPV4 - Source - The source IP addresses of the IPv4 traffic. If enabled, host names of the IP address are shown in parentheses. - Destination - The destination IP addresses of the IPv4 traffic. If enabled, host names of the IP address are shown in parentheses. - TOS/DSCP - The TOS bit value or the Differentiated Services Code Points (DSCP) value in the packets.
IP Traffic analyzer monitoring and sFlow reports 33 Viewing IPv4 – top UDP talkers The Top IPV4–UDP Talkers report shows the top users of IPv4 UDP services. Complete the following steps to display the report. 1. Select Monitor > Traffic Analysis > Monitor sFlow. 2. On the Monitor sFlow dialog box, choose one of the following options: • To view a report for a device group, click the report icon for the device group you want.
33 IP Traffic analyzer monitoring and sFlow reports A subtotal is displayed for each of the top users. This subtotal is displayed by source and destination IP addresses. If the report is for a device group, the name and IP address of the device that the traffic accessed appear in parentheses. If the report is for an individual device, only the source and destination IP addresses appear. At the end of the report, a subtotal for the remaining network users and a total for the entire network are displayed.
IP Traffic analyzer monitoring and sFlow reports 33 • Mbytes - Size of the traffic in megabytes for the time duration shown on the report. A subtotal is displayed for each of the top users. This subtotal is displayed by source and destination IP addresses. If the report is for a device group, the name and IP address of the device that the traffic accessed appear in parentheses. If the report is for an individual device, only the source and destination IP addresses appear.
33 IP Traffic analyzer monitoring and sFlow reports Viewing other Layer 3 or Layer 4 Top Talkers The Others report under the Layer3/Layer 4 report category provides information on Layer 3 protocols excluding IPV4, IPV6, IPX, and AppleTalk services. Complete the following steps to display the report. 1. Select Monitor > Traffic Analysis > Monitor sFlow. 2.
IP Traffic analyzer monitoring and sFlow reports 33 Enabling and viewing TCP reports You can monitor TCP traffic to determine if there is any unusual activity on the network, such as TCP attacks. Identifying unusual activity will aid in understanding the nature of the traffic and the ports that are affected, so that you can take corrective actions. For example, you may decide to disable a port on which TCP attacks are being received.
33 IP Traffic analyzer monitoring and sFlow reports 2. Select IP Preferences from the Software Configurations list in the Category pane. 3. Go to the SFlowDataMonitoring preferences section. 4. Click in the TCPFlags_InvalidCombos parameter field to edit the invalid bit combinations. 5. Click Apply or OK to save your work. Displaying the invalid TCP Flags report Complete the following steps to display the invalid TCP flags report. 1.
IP Traffic analyzer monitoring and sFlow reports 33 • Frames - Size of the traffic in frames. • MBytes - Size of the traffic in megabytes for the time duration shown on the report. Viewing BGP paths report The BGP Paths report shows source and destination traffic based on BGP autonomous systems paths. Complete the following steps to display the report. 1. Select Monitor > Traffic Analysis > Monitor sFlow. 2.
33 IP traffic accounting Troubleshooting sFlow reports If the sFlow Monitoring report launches with an error on RedHat Linux, use the following steps to resolve. 1. Stop the server. 2. Run the command unset DISPLAY on the terminal. 3. Restart the server. NOTE You can only restart the server using the Server Management Console (Start > Programs > Management_Application_Name 11.X.X > Server Management Console).
IP traffic accounting 33 4. You have three options for displaying traffic accounting information: • Click Summary to view the entire accounting summary report for the selected group. • Click In Traffic to view inbound traffic on the ports in the selected group. • Click Out Traffic to view outbound traffic on the ports in the selected group. The number of records gathered for each device is limited to 10,000 by default.
33 1056 IP traffic accounting Brocade Network Advisor IP User Manual 53-1003056-01
Chapter 34 Frame Monitor In this chapter • Frame Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Creating a custom frame monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Editing a frame monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Assigning a frame monitor to a port. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Finding frame monitor assignments . . . . . . . . . . . . . .
34 Frame Monitor Frame types The frame type can be a standard type (for example, a SCSI read command filter that counts the number of SCSI read commands that have been transmitted by the port) or a user-defined frame type customized for your particular use.
Creating a custom frame monitor 34 Frame Monitoring requirements To configure Frame Monitoring, the following requirements must be met: • The switch must be running Fabric OS 7.0.0 or later. • Frame Monitoring requires the Advanced Performance Monitoring license and the Fabric Watch license. NOTE The Advanced Performance Monitoring license is required to configure frame monitors. The monitoring functionality requires the Fabric Watch license.
34 Creating a custom frame monitor 2. Select the Switch option. The Products / Monitors list displays the switches that support Frame Monitoring. 3. Enter the monitor data in the Configure Monitor area. 4. Select one or more switches in the Products / Monitors list, and click the right arrow button to assign the frame monitor to those switches. 5. Select the Port option. 6. Expand the switch in the Products / Ports list. The Monitors list displays all of the frame monitors defined for that switch. 7.
Editing a frame monitor 34 11. Click Start. The frame monitor configuration is applied to the switches. 12. Click Close after configuration is complete (indicated by “Completed” in the Progress column). Editing a frame monitor 1. Select Monitor > Fabric Watch > Frame Monitor. The Frame Monitor dialog box displays. 2. Select the Switch option. 3. Expand the Products / Monitors list to display the frame monitors for each switch. 4. Select a frame monitor and click the left arrow button.
34 Finding frame monitor assignments 6. Click the right arrow button to move the frame monitor to the selected ports. The Monitor Details list displays the monitors that are assigned to a selected port. If no monitors are assigned, or if more than one port is selected, the Monitor Details list does not display. 7. Click OK. The Frame Monitor Configuration Status dialog box displays. 8. Click Start. The frame monitor configuration is applied to the ports. 9.
Removing a frame monitor from a switch 34 8. Click Start. The frame monitor configuration is applied to the ports. 9. Click Close after configuration is complete (indicated by “Completed” in the Progress column). Removing a frame monitor from a switch When you remove a frame monitor from a switch, the frame monitor is automatically removed from all assigned ports in the switch. You can remove only custom frame types; you cannot remove the pre-defined frame types. 1.
34 1064 Removing a frame monitor from a switch Brocade Network Advisor IP User Manual 53-1003056-01
Chapter 35 Power Center In this chapter • Power center overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Data monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • PoE power on demand . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Schedule PoE power deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • PoE thresholds. . . . . . . . . . . . . . . . . . . . . .
35 Data monitoring Data monitoring Power Center enables you to view PoE data for ports and products in both table and chart formats. Viewing PoE data for products To view PoE data for a product, complete the following steps. 1. Select Monitor > Power Center. The Power Center dialog box displays. 2. Select PoE Products from the View list. FIGURE 442 Power Center dialog box 3.
Data monitoring 35 • Allocation % — The percentage of allocated capacity. For example, if the Capacity (W) is 480 W and Allocation (W) is 120 W, then the Allocation percentage is 25. Only displays when the product running agent version 7.2.2 or later. If the product is running a agent version 7.2.1 or earlier, “-“ displays. • Consumption (W) — The power consumed by all powered devices connected to the product in Watts. • Consumption % — The current power consumed as a percentage of allocated power.
35 Data monitoring 4. Review the details in the Port Data list: • • • • • • Product filter — The name of the Product. Port filter — The port identifier. Name filter — The port name. Status filter — The Ethernet status of the port. Values include: Up and Down. State filter — The Ethernet state of the port. Values include: Enabled and Disabled. Admin State filter — The PoE administrative state of the port. Values include: On (enabled) and Off (disabled). • Oper.
Data monitoring 35 4. Use the following filters to sort the Port Data list: • • • • • • • Product filter Port filter Name filter Status filter State filter Admin State filter Oper. State filter NOTE The administrative state must be On for operational state to be On. • • • • • • • • • Allocation (W) filter Consumption (W) filter Consumption % filter Type filter Class filter Priority filter Mfr. filter. Model filter Software filter 5. Click Close to close the Power Center dialog box.
35 Data monitoring FIGURE 444 Attached Devices tab of the Properties dialog box 4. Review the details in the Attached Devices tab: • POE Port Count — The number of PoE ports, that have power devices which support LLDP, connected to the selected device. • • • • • • System name — The system name of the connected device. System capabilities — The system capabilities enabled on the remote system. Enabled capabilties — The system capabilities enabled on the connected device.
Data monitoring 35 • Med Serial number — The serial number on the connected device. • Med Manufacturer — The manufacturer name on the connected device. • Med Model name — The model name on the connected device. 5. Click OK to close the Properties dialog box. 6. Click Close to close the Power Center dialog box. Viewing PoE charts To view a PoE chart, complete the following steps. 1. Select Monitor > Power Center. The Power Center dialog box displays. 2. Select Charts from the View list. 3.
35 Data monitoring FIGURE 446 Product Power Consumption Percentage bar graph Displays the power consumption percentages for all products in a bar graph using the following colors: • • • • • 0 – 20 % = Green 20 – 40 % = Blue 40 – 60 % = Yellow 60 – 80 % = Orange 80 – 100 % = Red Click a bar in the chart to display the products panel and highlight the corresponding products.
Data monitoring 35 FIGURE 448 Product Power Top Allocations stacked bar graph Displays the top five products with the highest power allocation values in Watts in a stacked bar graph. Click a bar in the chart to display the products panel and highlight the corresponding product. FIGURE 449 Product Power Top Consumers stacked bar graph Displays the top five products with the highest power consumption values in Watts in a stacked bar graph.
35 Data monitoring FIGURE 450 PoE Port Utilization pie chart Displays how many ports with PoE turned on and how many with connected devices in a pie chart using the following colors: • PoE Off = Red • PoE On - Unconnected = Blue • PoE On - Connected = Green Click the pie chart to display the products panel and highlight the All Products row. 4. Click Close to close the Power Center dialog box.
PoE power on demand 35 Configuring automatic data refresh To configure automatic refresh the PoE data, complete the following steps. 1. Select Monitor > Power Center. The Power Center dialog box displays. 2. Select the Auto refresh check box to refresh the data automatically at a specified interval. 3. Select the auto refresh interval from the Interval (min) list. Options include: 15, 30, or 60. 4. Click Close to close the Power Center dialog box.
35 PoE power on demand 3. Select a product in the PoE Product list. The selected Product’s PoE ports display in the Port Data list. The PoE operational state (On or Off) for each port displays in the Admin State column. 4. Select one or more ports and click PoE On. 5. Click Yes on the confirmation message. The Deployment Status dialog box displays, which allows you to view the progress and status of the deployment. Click Abort to stop the deployment.
Schedule PoE power deployment 35 6. Click Close to close the Deployment Status dialog box. NOTE Closing the Deployment Status dialog box does not stop deployment. The updated PoE operational state of the selected port displays in the Admin State column. 7. Click Close to close the Power Center dialog box. Schedule PoE power deployment You can define a deployment schedule on a port, product, port group, or product group.
35 Schedule PoE power deployment FIGURE 452 Schedule PoE On/Off dialog box 4. (Ports only) Select a port from the Port list. 5. Enter a name for the schedule in the Schedule Name field. 6. Enter a description for the schedule in the Description field. 7. Select the Enable check box to enable the schedule. 8. Select the PoE On option to enable PoE. 9.
Schedule PoE power deployment 35 Configuring a one-time deployment schedule To configure a one-time schedule, complete the following steps. 1. Select One Time from the Frequency list. 2. Select the time of day you want deployment to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. 3. Click the Date list to select a date from the calendar.
35 Schedule PoE power deployment Configuring a daily deployment schedule To configure a daily deployment schedule, complete the following steps. 1. Select Daily from the Frequency list. 2. Select the time of day you want deployment to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM.
Schedule PoE power deployment 35 Configuring a monthly deployment schedule To configure a monthly schedule, complete the following steps. 1. Select Monthly from the Frequency list. 2. Select the time of day you want deployment to run from the Time (hh:mm) lists. Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. 3. Select the day you want deployment to run from the Day of the Month list (1 through 31).
35 Schedule PoE power deployment Scheduling a power down deployment To schedule a power down deployment on one or more PoE-capable ports, complete the following steps. 1. Select Monitor > Power Center. The Power Center dialog box displays. 2. Select PoE Products from the View list. 3. Select a port, product, port group, or product group in the PoE Product list and click Schedule PoE On/Off. The Schedule PoE On/Off dialog box displays. 4. (Ports only) Select a port from the Port list. 5.
Schedule PoE power deployment 35 Updating a power deployment schedule To update a power deployment on one or more PoE-capable ports, complete the following steps. 1. Select Monitor > Power Center. The Power Center dialog box displays. 2. Select PoE Products from the View list. 3. Select a port, product, port group, or product group in the PoE Product list and click Schedule PoE On/Off. The Schedule PoE On/Off dialog box displays. 4. Select the schedule you want to update from the All Schedules list.
35 Schedule PoE power deployment Viewing the configured ports for a power deployment schedule To view all ports to which a power deployment schedule is configured, complete the following steps. 1. Select Monitor > Power Center. The Power Center dialog box displays. 2. Select PoE Products from the View list. 3. Select a port, product, port group, or product group in the PoE Product list and click Schedule PoE On/Off. The Schedule PoE On/Off dialog box displays. 4.
Schedule PoE power deployment 35 • Consumption % — The power consumed as a percentage of allocated power. • Type — The type of the device connected to the port. Values include: 802.3af and 802.3at. • Class — The class of the device connected to the port. Values include: Class 0 through Class 4. • Priority — The priority of the device connected to the port. Values include: invalid, critical, high, low, medium, and other. • Mfr.. — The manufacturer of the device connected to the port.
35 PoE thresholds PoE thresholds Power Center enables you to define a threshold on a product or port. You cannot define a threshold on a product group or port group. You can define Product thresholds using the following measures: • PoE Capacity — The total PoE capacity of the product in Watts. NOTE PoE capacity requires the product to be running agent version 7.2.2 or later. • PoE Allocation — The amount of allocated power to the product in Watts. • Allocation % — The percentage of available capacity.
PoE thresholds 35 FIGURE 454 Thresholds dialog box 3. Choose one of the following measures: • • • • • • PoE Capacity (The product must be running agent version 7.2.2 or later.) PoE Allocation Allocation % (The product must be running agent version 7.2.2 or later.) PoE Consumption Consumption % Allocations Count (The product must be running agent version 7.2.2 or later.) 4. Select one of the following from the Conditions list: • > • < • == 5.
35 PoE thresholds 7. Select the time period to be monitored for the number of threshold events in the Interval (min) list. The time period starts with the first event and runs its full duration if the event limit is not reached. Interval values, in minutes, include: • 15 • 30 • 60 Click Refresh on the Power Center dialog box to determine if any thresholds are triggered. 8. Click Add. The new threshold displays in the All Thresholds list. 9.
PoE thresholds 35 FIGURE 455 Thresholds dialog box 3. Choose one of the following measures: • Port allocation • Port consumption • Port consumption % 4. Select one of the following from the Conditions list: • > • < • == 5. Enter the number of events that must be generated to trigger the threshold event in the Value field. The value should not exceed the capacity of the product. If you select a percentage measure, the value should be less than or equal to 100. 6.
35 PoE thresholds 7. Select the time period to be monitored for the number of threshold events in the Interval (min) list. The time period starts with the first event and runs its full duration if the event limit is not reached. Interval values, in minutes, include: • 15 • 30 • 60 8. Click Add. The new threshold displays in the All Thresholds list. 9. Select the Enabled check box of the new threshold in the All Thresholds list to enable the threshold on the product. 10.
PoE thresholds 35 Updating a PoE threshold To update a PoE threshold, complete the following steps. 1. Select Monitor > Power Center. The Power Center dialog box displays. 2. Select a product in the PoE Product list and click Thresholds. The Thresholds dialog box displays with the thresholds defined for that product. 3. Select the threshold you want to edit in the All Thresholds list. The selected threshold displays in the Thresholds Editor area. 4.
35 PoE thresholds 12. Click Refresh on the Power Center dialog box to determine if any thresholds are triggered. 13. Click Close to close the Power Center dialog box. Enabling PoE thresholds To enable PoE thresholds, complete the following steps. 1. Select Monitor > Power Center. The Power Center dialog box displays. 2. Select a product in the PoE Product list and click Thresholds. The Thresholds dialog box displays with the thresholds defined for that product. 3.
Viewing PoE performance 35 Deleting PoE thresholds 1. Select Monitor > Power Center. The Power Center dialog box displays. 2. Select a product in the PoE Product list and click Thresholds. The Thresholds dialog box displays with the thresholds defined for that product. 3. Select the threshold you want to delete and click Delete. Select more than one threshold to delete by pressing Ctrl and clicking each threshold you want to delete. 4. Click Close to close the Thresholds dialog box. 5.
35 Viewing PoE performance FIGURE 456 Real Time Power Graphs/Tables dialog box 4. Select the measures you want to include and click the right arrow button to display it on the Data Monitoring tab. Product power measures include the following: • Allocation (W) • Allocation % 5. Click the Data Monitoring tab to view a performance monitoring graph or table. • Click the Graph option to view a performance graph. The legend under the graph shows what data each color represents.
Viewing PoE performance 35 6. Click the Collection Status Summary tab to view the following information: The Collection Status Summary tab provides a high level overview of all defined collectors. The information is displayed in the following columns: • Product - Shows the product name and IP address. There maybe multiple instances of the product name for each collectible assigned to the product. • Port - The port name when a port is selected.
35 Viewing PoE performance Monitoring real time power performance on ports To view real time power performance graphs or tables, complete the following steps. 1. Select Monitor > Power Center. The Power Center dialog box displays. 2. Select a a port from the Port Data list. 3. Select Real Time Power Graphs/Tables from the Graphs/Tables list. The Real Time Power Graphs/Tables dialog box displays. FIGURE 457 Real Time Power Graphs/Tables dialog box 4.
Viewing PoE performance 35 5. Click the Data Monitoring tab to view a performance monitoring graph or table. • Click the Graph option to view a performance graph. The legend under the graph shows what data each color represents. To configure graph options, refer to “Configuring the performance graph” on page 989. • Click the Table option to view a performance table. The first column displays the time of the collection. The remaining columns display the value of each collectible at the specified time.
35 1098 Viewing PoE performance Brocade Network Advisor IP User Manual 53-1003056-01
Chapter 36 Policy Monitor In this chapter • Policy monitor overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Preconfigured policy monitors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Viewing policy monitor status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Viewing existing policy monitors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Adding a policy monitor . . . . . . . . . . . . . . . . . . . .
36 Policy monitor overview Fabric policy monitors Fabric policy monitors enable you to set the following policy monitors on Ethernet fabrics (refer to “Adding a policy monitor” on page 1108): • Check zoning status — This fabric policy monitor enables you to determine if zoning is enabled or disabled on the fabric. Zoning plays a key role in the management of device communication. When you enforce zoning, devices not in the same zone cannot communicate.
Policy monitor overview 36 Some devices can function as both initiator and target. If the application finds this type of device as one of the active zone members, this device port is treated as both initiator and target: - Target (storage port) — The application counts the number of initiator ports zoned to this storage port. - Initiator — The application counts this device as an initiator port for other storage ports in the same zone.
36 Policy monitor overview • Check for HTTPS (secure HTTP) configuration — This switch and router policy monitor enables you to check each target to see if HTTPS is active for device data transmission. NOTE Not supported on Network OS products and the following IronWare products: Ethernet Core routers, Ethernet Carrier Routers, Ethernet Edge router, and Data Center switch, as well as the 6650 Ethernet switch, router, and L3 router.
Policy monitor overview 36 Rule Violation Fix — If the policy monitor report shows a violation, enable SSH on the device. Disable Telnet settings on the device, if enabled. • Check for SNMPv3 (secure SNMP) configuration — This switch and router policy monitor enables you to check each target to see if SNMPv3 is active for device data transmission and SNMPv1 and SNMPv2 are not configured. NOTE For this check to pass, you must discover the products using SNMPv3 credentials.
36 Policy monitor overview Make sure to configure the host port mapping. (refer to “Host port mapping overview” on page 419) - Host adaptor discovery with 2.1 or later driver for host to unmanaged fabric connections (refer to “Host discovery” on page 93) Make sure there are Brocade HBAs on the host. - Fabric plus Host adapter discovery with 2.1 or earlier driver (refer to “Host discovery” on page 93) Make sure there are Brocade HBAs on the host.
Preconfigured policy monitors 36 Rule Violation Fix — If the policy monitor report shows a violation, the Administrator can add redundant connections (either a host to attached fabrics or attached fabrics to a target LUN or more inter-fabric routes) to establish a complete path from host to target LUN. Management policy monitor The management policy monitor enables you to set a policy monitor on the Management application.
36 Viewing policy monitor status Viewing policy monitor status You can view policy monitor status from the main Management application window or from the Policy Monitor dialog box. The Management application enables you to view the policy monitor status at a glance by providing a policy monitor status icon on the Status Bar. The following table illustrates and describes the icons that indicate the current status of the policy monitor function.
Viewing existing policy monitors 36 Viewing existing policy monitors To view existing policy monitors, complete the following steps. 1. Select Monitor > Policy Monitor (Figure 458). The Policy Monitor dialog box displays. FIGURE 458 Policy Monitor dialog box 2. Review the policy monitor details: • Name — The user-defined name of the policy. • Description — A description of the policy.
36 Adding a policy monitor 7. To open the last executed report for a selected policy monitor, select a policy monitor and click Report (refer to “Viewing a policy monitor report” on page 1136). 8. To view the report history for all policy monitors, click History (refer to “Viewing historical reports for a policy monitor” on page 1139). 9.
Adding a policy monitor 36 3. Enter a user-defined name for the policy in the Name field. The name must be unique. It cannot be over 64 characters, nor can the field be empty. It cannot include asterisks. 4. Enter a description of the policy in the Description field. The description cannot be over 128 characters. It cannot include asterisks. 5.
36 Adding a policy monitor The default recommended threshold ratio is 20:1 (20 initiator ports to 1 target port). Therefore, if the ratio for the storage port is equal to or higher than 20:1, the policy monitor considers it as a violation and logs it in the report. f. Select the Check that all profiles are the same on each RBridge in an Ethernet fabric check box to determine if all RBridge profiles in an Ethernet fabric are the same.
Adding a policy monitor a. 36 Select one or more of the following checks in the Available Checks list to include them in the policy monitor: For more information about these checks and fixes for rule violations, refer to “Switch and router policy monitors” on page 1101.
36 Adding a policy monitor FIGURE 461 Add Policy Monitor dialog box, Hosts Checks tab a. Select the Check for redundant connections to attached fabrics check box to determine if there are at least the minimum number of configured physical connections between the host and the attached fabric. The default is 2. For more information about this check and a fix for rule violations, refer to “Host policy monitors” on page 1103. b.
Policy monitor scheduling 36 FIGURE 462 Add Policy Monitor dialog box, Management Checks tab a. Select the Management Checks tab. b. Select the Check to see if the server backup is enabled and working check box to determine the following configurations: • Backup enabled for the Management application server. • Backup output directory is accessible and writable. This policy only applies to scheduled backup, not manual (on demand) backup.
36 Policy monitor scheduling Configuring an hourly policy monitor schedule To configure an hourly schedule, complete the following steps. 1. Select Hourly from the Frequency list. 2. Select the minute past the hour you want deployment to run from the Minutes past the hour list. Where the minute value is from 00 through 59. 3. Click OK on the Schedule Properties dialog box. To finish configuring the policy monitor, return to step 6 of “Adding a policy monitor” on page 1108.
Editing a policy monitor 36 Where the hour value is from 1 through 12, the minute value is from 00 through 59, and the day or night value is AM or PM. 3. Select the day you want deployment to run from the Day of the Month list (1 through 31). 4. Click OK on the Schedule Properties dialog box. To finish configuring the policy monitor, return to step 6 of “Adding a policy monitor” on page 1108. Editing a policy monitor To edit an existing policy monitor, complete the following steps. 1.
36 Configuration rules Configuration rules A configuration rule is a logical expression built with configuration conditions and blocks. You can use configuration rules to perform a configuration compliance check against a baseline (such as a product’s backup configuration file). Viewing a predefined configuration rule You can view detailed information about predefined configuration rules on the Add Monitor or Edit Monitor dialog box. 1. Select the predefined configuration rule you want to view.
Configuration rules TABLE 94 36 Port Profile Interface Rule expressions AND/OR ( Block/Condition Name ) Details - Description/Condition/Configuration Start: Network OS Ten Gigabit Ethernet Interfaces Processes all 10 Gigabit Ethernet interface on a Network OS device. interface TenGigabitEthernet .* Network OS Interface Port Profiled Checks whether the interface port profiled. This condition should be used with in an interface block.
36 Configuration rules FIGURE 463 Add Configuration Rule dialog box This Add Configuration Rule dialog box contains the following fields and components: • Name — A unique name for the rule. The name cannot be over 128 characters. The only special characters allowed are an underscore (_) or space. • Description — A description for the rule. The description cannot be over 1024 ASCII characters. • Library list — Contains a list of predefined and user-defined conditions or blocks.
Configuration rules 36 • Find > (right arrow) button — To find a condition or block in the Selected Conditions/Blocks list, select a condition or block in the Library list and click. The condition or block is highlighted in the Selected Conditions/Blocks list. • Find < (left arrow) button — To find a condition or block in the Library list, select a condition or block in the Selected Conditions/Blocks list and click. The condition or block is highlighted in the Library list.
36 Configuration rules Move Down button — Use to move a condition or block down in the rule (except the last item). You can only move one item (condition or entire block) down at a time. If you move a condition from the first position in the rule or in a block, the logical operator (AND/OR column) is automatically populated. You can move a condition into a block by moving it between the start and end of a block.
Configuration rules 36 9. To change the logical operator separator, select AND or OR from the AND/OR column. Valid values include AND and OR. The first item in a rule and the first connector in a block display empty fields. Each condition or block you add displays with an AND connector (except the first item) in the list of conditions or blocks. If you add one or more conditions to a block, each condition displays with an OR connector (except the first condition) in the block.
36 Configuration rules 1. Select Monitor > Policy Monitor. The Policy Monitor dialog box displays. 2. Click Add. The Add Monitor dialog box displays. 3. Click the Switch/Router Checks tab. 4. Select the configuration rule (either predefined rule or user-defined) you want to duplicate in the Available Checks list or Selected Checks list. 5. Click Add > Configuration Rule. The Add Configuration Rule dialog box displays. 6. Change the name for the rule in the Name field.
Configuration rules 36 8. Click OK on the Edit Configuration Rule dialog box. 9. Click OK on the Edit Monitor dialog box. The updated policy monitor displays in the Monitors table of the Policy Monitor dialog box. 10. Click Close on the Policy Monitor dialog box. Exporting a configuration rule You can export user-defined configuration rules from one instance of the Management application to another. 1. From the Add Monitor or Edit Monitor dialog box, select Export from the Export list.
36 Configuration rules Viewing predefined configuration conditions 1. Select Monitor > Policy Monitor. The Policy Monitor dialog box displays. 2. Click Add. The Add Monitor dialog box displays. 3. Click the Switch/Router Checks tab. 4. Select Add > Configuration Rule. The Add Configuration Rule dialog box displays. 5. Select the predefined condition you want to view and click Edit/View. The View Condition dialog box displays.
Configuration rules 36 5. Select Add > Condition. The Add Condition dialog box displays (Figure 464). FIGURE 464 Add Condition dialog box 6. Enter a user-defined name for the rule in the Name field. The name must be unique. The name cannot be over 128 characters. The only special character allowed is an underscore (_). 7. Enter a description of the rule in the Description field. The description cannot be over 1024 ASCII characters. 8.
36 Configuration rules • Not Matches — Select this option from the list if you do not want the configuration line to match the line in the device configuration file. 11. Enter one or more configuration lines with which you want to compare the device configuration in the Configuration text box. 12. Select the Lines in exact order check box to match the configuration lines in the same order in the Configuration text box as the device configuration.
Configuration rules 36 4. Select the configuration rule you want to edit in the Available Checks list and click Edit. The Edit Configuration Rule dialog box displays. 5. Select the predefined or user-defined condition you want to edit and click Add > Condition. The Add Condition dialog box displays. 6. Change the user-defined name for the rule in the Name field, if necessary. The name must be unique. The name cannot be over 128 characters. The only special character allowed is an underscore (_). 7.
36 Configuration rules 9. Click OK on the Edit Condition dialog box. 10. Click OK on the Edit Configuration Rule dialog box. 11. Click OK on the Edit Monitor dialog box. The updated policy monitor displays in the Monitors table. 12. Click Close on the Policy Monitor dialog box. Predefined conditions The Management application provides predefined conditions. Table 95 lists the predefined conditions that can be used in a block or at the configuration rule level.
Configuration rules TABLE 95 36 Predefined conditions (Continued) Name Description Use Matches/ regular Not Matches expression Configuration Lines in exact order IronWare OS Interface shutdown check Checks whether the IronWare device port is in shutdown state. (This is not applicable for Ethernet router products.) This condition should be used within an interface block. No Matches disable No IronWare OS Interface sflow check Checks whether sFlow is configured on the IronWare device port.
36 Configuration rules TABLE 95 Predefined conditions (Continued) Name Description Use Matches/ regular Not Matches expression Configuration Lines in exact order RFS with Firmware Auto Install Disabled Checks whether auto-installation of the firmware is disabled in user-specified profile. This condition should be used inside the profile block. If the profile name is not specified in configuration or if user selects all the profiles (profile.
Configuration rules 36 The Add Monitor dialog box displays. 3. Click the Switch/Router Checks tab. 4. Select Add > Configuration Rule. The Add Configuration Rule dialog box displays. 5. Select the predefined block you want to view and click Edit/View. The View Block dialog box displays. This dialog box contains the following fields and components: • • • • Name — The name of the selected block. Description — The description of the selected block.
36 Configuration rules 6. Enter a user-defined name for the block in the Name field. The name must be unique. The name cannot be over 128 characters. The only special character allowed is an underscore (_). 7. Enter a description of the block in the Description field. The description cannot be over 1024 ASCII characters. 8. Select the Use regular expression check box to use a regular expression in the Block Start field. This enables you to match one or more blocks in the device configuration. 9.
Configuration rules 36 6. Change the user-defined name for the rule in the Name field, if necessary. The name must be unique. The name cannot be over 128 characters. The only special character allowed is an underscore (_). 7. Change the description of the rule in the Description field, if necessary. The description cannot be over 1024 ASCII characters. 8. To edit a configuration block, repeat step 8 through step 10 of “Adding a configuration block” on page 1131. 9. Click OK on the Add Block dialog box.
36 Configuration rules 12. Click Close on the Policy Monitor dialog box. Deleting conditions and blocks You can only delete user-defined conditions or blocks. Before you delete a user-defined condition or block, you must remove it from any rules. 1. From the Add Configuration Rule or Edit Configuration Rule dialog box, select one or more user-defined conditions or blocks you want to delete. 2. Click Delete. 3. Click Yes on the confirmation message. 4.
Running a policy monitor 36 Running a policy monitor Before you run a policy monitor, make sure your policy monitors are valid. Valid policy monitors must have at least one policy selected with one or more targets. Management checks do not require a target. To run an existing policy monitor, complete the following steps. 1. Select Monitor > Policy Monitor. The Policy Monitor dialog box displays. 2. Select the policy you want to run in the Monitors list. 3. Click Run.
36 Viewing a policy monitor report Viewing a policy monitor report NOTE You must run the policy monitor at least once before you can view a report. To view an existing policy monitor report, complete the following steps. 1. Select Monitor > Policy Monitor. The Policy Monitor dialog box displays. 2. Select the policy for which you want to view a report in the Monitors list. 3. Click Report. NOTE If you have run this policy more than once, the latest report displays.
Viewing a policy monitor report 36 Fabric checks include the following options: Check zoning is enabled Check that all zones belong to at least one zone configuration Check the number of initiator ports zoned to each storage port is less than Configured_Value. This check provides the following additional detail for this check: Storage Port — WWN of the storage port. Initiator Count — Number of initiator ports zoned to the storage port. Initiator Port — WWN of the initiator port.
36 Viewing a policy monitor report SNMP Status — Whether SNMP is enabled or disabled on the product. Switch - Check for VLAN configurations match for each connection (IP only). This check provides the following additional detail for this check: SNMPv3 Status — Whether SNMPv3 is enabled or disabled on the product. Local Switch Port — Name of the local switch port. Local VLANs — Local VLAN number Status — Whether the configurations matched (Passed) or did not match (Failed).
Viewing historical reports for all policy monitors 36 The Save dialog box displays. 3. Browse to the file location where you want to save the report and click Save. 4. Click the close button (X) on the Policy_Name - Policy Monitor Report browser window. Viewing historical reports for all policy monitors 1. Select Monitor > Policy Monitor. The Policy Monitor dialog box displays. 2. Click History. The Report History dialog box displays the last 10 reports run for all monitors.
36 1140 Viewing historical reports for a policy monitor Brocade Network Advisor IP User Manual 53-1003056-01
Chapter 37 Fault Management In this chapter • Fault management overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Event notification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Defining filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • SNMP traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • SNMP informs . . . . . . . . . . .
37 Event notification Restrictions The following items affect Fault Management operation. Supported IP address types The Management application receives traps and syslog messages for physical IP addresses only. Event Purging The default maximum number of days that historical events are stored is 365. You can select a different default (from 1 to 365 ) in the Options dialog box under Event Storage. Event Archiving The default number of days that purged events are archived is 30.
Event notification 37 2. Select the Enable E-mail Event Notification check box to enable the application to send e-mail messages in case of event notifications. 3. Enter the IP address or the name of the SMTP mail server that the server can use to send the e-mail notifications in the E-mail Server field. The Management application accepts IP addresses in IPv4 and IPv6 formats. The IPv4 format is valid when the operating system has IPv4 mode only or dual stack mode.
37 Defining filters Defining filters The Define Filter dialog box, shown in Figure 468, allows you to define event filters by product, event category, and severity. You can define event filters on SAN products, IP products, or hosts. Setting up basic event filtering To set up advanced event filtering on the selected events for a user, complete the following steps. 1. Select Server > Users. The Users dialog box displays. 2. Select a user in the Users list and click Edit. The Edit User dialog box displays.
Defining filters 37 • When selected (the default), all products, even newly-added products, are added to the Selected Products to be displayed list. • If the check box is cleared, only the products listed in the Selected Products to be displayed list are shown in the Master Log and all newly-added products are added to the Available Products list. 7.
37 Defining filters FIGURE 469 Define Filter dialog box - Advanced tab 5. Select the Start Date check box to display only the events that were logged after the specified start date. The default start date and time is the current date and time. 6. To include events in the event filter, complete the following steps. a. Select the event type you want to include from the Event Category list. All event types are listed in alphabetical order. b.
SNMP traps a. 37 Select the event type you want to remove from the Event Category list. All event types are listed in alphabetical order. b. Select the event column for the event from the Event Column list. All event columns are listed in alphabetical order. c. Enter all or part of the event type value in the Value Contains field. d. Click the right arrow button to move the event type to the Additional Filters - Exclude these Events list. e.
37 SNMP traps Adding a trap recipient to one or more switches The SNMP Trap Recipients dialog box allows you to register any recipient as a trap recipient on selected products. You can register different recipients for different products. NOTE You can register and unregister other recipient servers on the Fabric OS switches on a per-switch basis. For IP products, you can perform registration only at the switch level. To add a trap recipient to one or more switches, complete the following steps. 1.
SNMP traps 7. 37 Click the View Recipients button to list the recipients that correspond to a selected fabric or product from the Available list. The Trap Recipients - Fabric dialog box or the Trap Recipients - IP address dialog box (depending on which product you selected) displays a list of configured recipients. 8. Click OK. The Management application registers the recipient IP address as an SNMP trap recipient.
37 SNMP traps FIGURE 471 SNMP Trap Forwarding dialog box Adding a trap destination The Add Trap Destination dialog box allows you to configure destinations for forwarding SNMP traps. To add a trap destination, complete the following steps. 1. Select Monitor > SNMP Setup > Trap Forwarding. The SNMP Trap Forwarding dialog box, shown in Figure 471, displays. 2. Select the Enable trap forwarding check box.
SNMP traps 37 3. Click Add in the Destinations area of the SNMP Trap Forwarding dialog box. The Add Trap Destination dialog box, shown in Figure 472, displays. FIGURE 472 Add Trap Destination dialog box 4. Enter a general description of the trap destination in the Description field. 5. Enter the IP address of the trap destination in the IP Address field. This is a mandatory field. IPv4 and IPv6 addresses are accepted, but a DNS name is not accepted. 6.
37 SNMP traps 2. Click Add in the Trap Filters area of the SNMP Trap Forwarding dialog box. The Add Trap Filter dialog box, shown in Figure 473, displays. FIGURE 473 Add Trap Filter dialog box 3. Enter a unique name for the trap filter in the Filter Name field. 4. Enter a general description of the trap filter in the Description field. 5. Select the Forward Application Messages check box to forward application events. 6. Select the Forward pseudo events check box to forward pseudo events. 7.
SNMP traps 37 • Debug Traps with the selected severity and those with higher severity levels are forwarded. For example, by default, Critical severity is selected. Therefore, traps with Critical, Alert, and Emergency severity levels are forwarded. To have all traps forwarded, select Debug, the lowest severity level. 8. Select the SAN, IP, or Hosts tab. Depending on the tab selected, the products available to which you can add a trap filter display in the Available Products list. 9.
37 SNMP traps To access the Event Reception dialog box, select Monitor > SNMP > Event Reception. The Event Reception dialog box, shown in Figure 474, displays. FIGURE 474 Event Reception dialog box - Trap Credentials tab By default, the Management application receives SNMP v1 and v2c traps from IronWare OS and Network OS IP products that have any SNMP community strings.
SNMP traps TABLE 97 37 SNMP security and authentication SNMP credential type Privacy protocol Authentication Result v1 No authentication No privacy protocol Community string Uses a community string to match for authentication. v2c No authentication No privacy protocol Community string Uses a community string to match for authentication. v3 No authentication No privacy protocol User name Uses a user name to match for authentication.
37 SNMP traps 5. Select an authentication protocol from the Auth Protocol list. You can select -None-, HMAC-MD5, or HMAC_SHA. HMAC_MD5 is the default. If you select no authentication, the Management application uses the user name to match for authentication. 6. Type a password in the Auth Password field and re-type the password in the Auth Confirm Password field. 7. Select a privacy protocol from the Priv Protocol list. You can select -None-, CBC_DES, or CFB_AES_128.
SNMP traps 37 To add the MIB file that contains the trap you want to register to mibs_to_compile.txt, complete the following steps. 1. Go to \conf\mibs\ (Windows) or /conf/mibs/ (UNIX) directory and copy the MIB file into that directory. You may want to copy the MIB into a subdirectory of that directory. 2. In the \conf\mibs\ (Windows) or /conf/mibs/ (UNIX) directory, search for the mibs_to_compile.txt file. 3.
37 SNMP traps Registering traps Traps must be registered in the Event Reception dialog box to make them available. To register traps, complete the following steps. 1. Select Monitor > SNMP Setup > Event Reception. 2. Click the Trap Configuration tab. The Trap Configuration tab of the Event Reception dialog box, shown in Figure 477, displays. The Registered and Not Registered buttons at the top of the Traps tree serves as a filter for the traps.
SNMP traps 37 Trap details supply the following information: • The name of the MIB to which the trap belongs • Information about the trap • Any variable bindings (varbinds) that the trap uses. Information about the varbind, its name, OID, and type, is displayed • Recommended action specified by the user 5. Enter the following information: a. Select the severity level you want to assign to the trap from the Severity list. If you do not select a severity, it defaults to Emergency. b.
37 SNMP informs The Trap tree displays the MIBs that contain the registered traps. 3. Expand a MIB folder to display the traps that have been registered for that MIB. 4. Select a trap to display its current definition. You can change the severity, message, or alias of the trap. 5. When you have finished, click OK or Apply to accept your entries. If you modified a default trap, its status changes from Registered - Default to Registered Customized.
Syslogs 37 The products display in the SNMP Informs Capable Products list, where you can determine if the product’s status is enabled or disabled. 3. Select a product in the SNMP Informs Capable Products list and click the appropriate Action button, depending on whether you want to enable or disable SNMP informs for that product. 4. Click OK. Syslogs Use the Options dialog box to automatically register the Management application server as the syslog recipient on all managed SAN and IP products.
37 Syslogs FIGURE 478 Syslog Recipients dialog box 2. Select Add from the Action list. 3. Enter the IP address of the syslog port (the recipient server) in the Recipient IP Address field. This is a mandatory field. IPv4 addresses are accepted, but a DNS name is not accepted. 4. Enter the syslog port of the recipient in the Recipient Port field. Valid numeric values range from 1 through 65535. The default value is 514. NOTE For IronWare products, a non-default port can be registered.
Syslogs 37 The Management application removes the recipient from the managed switches. Syslog forwarding The Syslog Forwarding dialog box enables the Management application to forward syslog events to a destination on another host. You can use the Syslog Forwarding feature to set up filters to determine which syslog events will be forwarded. Adding a syslog forwarding destination The Add Syslog Destination dialog box allows you to configure destinations for forwarding syslog events.
37 Syslogs FIGURE 480 Add Syslog Destination dialog box 4. Enter a general description of the syslog destination in the Description field. 5. Enter the IP address of the syslog destination in the IP Address field. This is a mandatory field. IPv4 and IPv6 addresses are accepted, but a DNS name is not accepted. 6. Enter the syslog listening port of the recipient in the Port # field. This is a mandatory field. Valid numeric values range from 1 through 65535. The default is 514. 7.
Syslogs 37 FIGURE 481 Add Syslog Filter dialog box 4. Enter a unique name for the syslog filter in the Filter Name field. 5. Enter a general description of the syslog filter in the Description field. 6. (Optional) For additional filtering, enter a text string using from 1 through 512 characters or wild card symbols in the Regular Expression field. The regular expression is used to describe a pattern in text.
37 Event action definitions 10. Select the product from the Available Products list and click the right arrow button to move it to the Selected Products list. 11. Click OK. Snort message forwarding Snort is a third-party tool that monitors network traffic in real time. When Snort detects dangerous payloads or other abnormal behavior, it sends an alert to the syslog in real time.
Event action definitions 37 FIGURE 482 Event Actions dialog box 2. Click Add to display the Identification pane of the Add Event Action dialog box. 3. Enter a name and description for the event action and select the Enabled check box. 4. Click Next to advance to the Events pane. Selecting an event for an event action To select an event for an event action, complete the following steps. 1. Select Monitor > Event Processing > Event Actions. The Event Actions dialog box displays. 2.
37 Event action definitions FIGURE 483 Add Event Action dialog box - Events pane 3. Select one of the following event types from the Show list: • • • • • Traps (default) Application Events Pseudo Events Custom Events Snort® Message Depending on what event type you select, a box listing the available events or pseudo events displays. 4. By default, all traps are listed in the Available Traps list, under the folders for the MIB to which they belong.
Event action definitions 37 8. If you selected Pseudo Events in step 3, select one or more of the pseudo events you created that you want to include in the definition, then click the right arrow button to move it to the Selected Pseudo Events list. 9. If you selected Custom Events in step 3, click Next to accept the defaults; otherwise, select the Event Category, Severity, Message ID, and Description Contains, as required. 10.
37 Event action definitions 4. For each varbind in the Selected Varbinds list, select one of the following operations for the condition you want to filter: • • • • • • • • • = – Equal to != – Not equal < – Less than > – Greater than >= – Greater than or equal to <= – Less than or equal to In – Matches collection Not_in – Does not match collection ~ – Arbitrary Unicode regular expression 5. Enter the value of the varbind. The value you enter must conform to the data type required by the varbind.
Event action definitions 37 To configure the identity of the event action source, complete the following steps. 1. Select Monitor > Event Processing > Event Actions. The Event Actions dialog box displays. 2. Click Next to advance to the Sources pane. 3. Click the Provide the IP Address / Node WWN / Name of the source button if you want to manually enter the IP address, the world wide name (WWN), or the name of the source in the IP Address field. 4.
37 Event action definitions Configuring event action policies The Policy pane of the Add Event Action dialog box, shown in Figure 486, allows you to define the frequency of the event, enter a message for an event that will be displayed in the event log, and specify the event severity. FIGURE 486 Policy pane of the Add Event Action dialog box To configure the event action policies, complete the following steps. 1.
Event action definitions 37 4. Indicate how often the policy is to be reset. You can choose one of the following options: • Reset immediately - Repeats the policy as soon as the specified action has been applied. • Wait until ____ seconds or minutes - If this parameter is selected, the policy will not be applied to the product for the specified duration of time. Enter the duration in minutes or hours.
37 Event action definitions To configure the policies for the event action, complete the following steps. 1. Select Apply as a Logging Policy to indicate whether or not you want the event occurrence to be logged in the Management application database: - Select Log to log the occurrence in the Management application database and Master Log. - Select Drop to not log the occurrence in the Management application database or Master Log.
Event action definitions 37 8. The Mark as Special Events check box is unselected by default. Leave it this way if you want the event action to be added to the Special Event Handling event action category. Refer to “Special events handling” for more complete information. 9. Click the Collect support save check box to enable SupportSave on the event. The check box is unselected by default. 10.
37 Event action definitions • Event Sender: Deploy the payload to the product that sent the event. If the event was sent by a non-IronWare OS or Network OS product, the event action will not be deployed to that product. • Derived from: Deploy the payload to the product that matches the IP address as specified in the attribute of the selected source. If the matching product is a non-IronWare OS or Network OS product, the event action will not be deployed to that product.
Event action definitions 37 FIGURE 488 Status bar with highlighted special events icon To configure special event acknowledgements, complete the following steps. 1. Click the special events icon to launch the Special Events dialog box, shown in Figure 489. The Special Events dialog box, shown in Figure 489, lists the most recent 1000 events that have been identified as special events. FIGURE 489 Special Events dialog box 2.
37 Event action definitions Configuring event action e-mail settings The Action Group - E-Mail Settings pane of the Add Event Action dialog box, shown in Figure 490, allows you to select e-mail recipients from a list, add new e-mail recipients, and compose e-mail messages. FIGURE 490 Action Group - E-Mail Settings pane of the Add Event Action dialog box To configure the e-mail settings for the event action, complete the following steps. 1.
Event action definitions 37 5. If you want an epilogue to be placed at the end of the e-mail message, enter up to 255 characters in the Body Epilogue field. NOTE The prologue, the event action message, and the epilogue form the body of the e-mail alert. 6. Click Finish. The Summary pane of the Edit Event Action dialog box displays an overview of the e-mail configuration you are creating. 7. Review your entries and take one of the following actions: - Click Finish to approve the configuration.
37 Event action definitions 3. Click Edit to display the Edit Event Action dialog box. 4. Make the changes you want to make to the definition. You can perform this action in any of the panes of the Add Event Action dialog box. 5. Click Finish to save your definition. Deleting an event action definition To delete an event action definition, complete the following steps. 1. Select Monitor > Event Processing > Event Actions. The Event Actions dialog box displays. 2.
Pseudo events 37 2. Click the Import Snort® Rule button. The Import Snort® Rule File dialog box displays, shown in Figure 492. FIGURE 492 Import Snort® Rule File dialog box 3. Enter the complete path of the Snort rule file located on the Syslog server. 4. Click OK to import the Snort rules. 5. While still in the Add Event Action dialog box, continue to click Next until you advance to the Action Group - Actions pane. 6.
37 Pseudo events Displaying pseudo event definitions To display the properties of a pseudo event definition, complete the following steps. 1. Select Monitor > Event Processing > Pseudo Events. The Pseudo Events dialog box, shown in Figure 493, displays. FIGURE 493 Pseudo Events dialog box 2. To view additional information for a definition, select a definition from the list. Additional information displays in the Details of Selected Pseudo Event list at the bottom of the dialog box.
Pseudo events 37 Setting pseudo event policies The Policy pane of the Add Pseudo Event dialog box, shown in Figure 494, allows you to create escalation, resolve, and flapping policies for the pseudo event, and then specify the time duration for each of these policies in minutes or seconds. FIGURE 494 Policy pane of the Add Pseudo Event dialog box To create policies for a pseudo event definition, complete the following steps. 1.
37 Pseudo events The flapping policy checks to see if the event consistently transitions between two opposite states during a specified length of time. If it does, then the specified action in the definition is performed. Refer to “Creating an event action with a pseudo event on the flapping policy” on page 1191 for complete instructions. 4. Enter a description in the Message field. This description is displayed in the event log for this pseudo event.
Pseudo events 37 FIGURE 495 Events pane of the Add Pseudo Event dialog box 3. From the Available Traps list, select the trap for the down state of a product or interface. By default, all traps known to the Management application are included in the Available Traps list, which is a list of all traps that are available based on the MIB and filter criteria. 4. Select a trap for the Selected Down Trap list and a trap for the Selected Up Trap list. You cannot select the same trap for up and down conditions.
37 Pseudo events Creating a pseudo event definition by copying an existing definition You can create a pseudo event definition by copying an existing definition. To create a pseudo event definition by copying an existing definition, complete the following steps. 1. Select Monitor > Event Processing > Pseudo Events. 2. Select the pseudo event definition that you want to copy from the Pseudo Events list. 3. Click the Duplicate button. The Pseudo Events dialog box, shown in Figure 493, displays.
Pseudo events 37 4. Click Yes to delete the selected definition. The definition is removed from the Pseudo Events list. Adding a pseudo event on the escalation policy Use the escalation policy to be notified if a critical event occurs on a product, port, or system. When the event occurs, the escalation policy waits for a duration of time to see if the event remains in that state. If it does, then the specified action in the definition is performed.
37 Pseudo events Creating an event action with a pseudo event on the escalation policy To create an event action with a pseudo event on the escalation policy, complete the following steps. 1. Select Monitor > Event Processing > Event Actions. The Event Actions dialog box displays. 2. Click Add to display the Identification pane of the Add Event Action dialog box. 3. Enter a name and description for the event action and select the Enabled check box to enable the event. 4.
Pseudo events 37 17. If you want an epilogue to be placed at the end of the e-mail message, enter up to 255 characters in the Body Epilogue field. NOTE The prologue, the event action message, and the epilogue form the body of the e-mail alert. 18. Click Next to advance to the Summary pane. 19. Click Finish. The Summary pane of the Add Event Action dialog box displays an overview of the e-mail configuration you are creating.
37 Pseudo events Creating an event action with a pseudo event on the resolving policy To create an event action with a pseudo event on the resolving policy, complete the following steps. 1. Select Monitor > Event Processing > Event Actions. The Event Actions dialog box displays. 2. Click Add to display the Identification pane of the Add Event Action dialog box. 3. Enter a name and description for the event action and select the Enabled check box to enable the event. 4.
Pseudo events 37 Adding a pseudo event on the flapping policy The flapping policy checks to see if the event consistently transitions between two opposite states during a specified length of time. If it does, then the specified action in the definition is performed. The following two-part procedure uses both the Add Pseudo Events dialog box and the Add Event Actions dialog box to create an event action with the flapping policy. To add a pseudo event on the flapping policy, complete the following steps. 1.
37 Pseudo events The available pseudo events display. 6. Select the pseudo event you created and click Next. The Sources pane of the Add Event Action dialog box displays. 7. Select the source that you will use to monitor this event from the Selected Sources list. 8. Click Next to advance to the Policy pane of the Add Event Action dialog box. The Policy pane of the Add Event Action dialog box displays. 9.
Event custom reports 37 13. Select the Deploy Product Configuration check box if you want to deploy a payload to the products if the policy criteria have been met. 14. Select the Apply as a Logging Policy check box to indicate whether or not you want the event occurrence to be logged in the Management application database: • Select Log to log the occurrence in the Management application database. • Select Drop to not log the occurrence in the Management application database. 15.
37 Event custom reports Defining report settings You can configure report settings so that you see only a restricted set of information in a report. NOTE You can change the number of displayed event custom report records by following the procedure in “Configuring custom report preferences” on page 161. By default, 1000 records display, even if the event count is greater than 1000. NOTE You must first enter a name and title on the Identification tab before you can run the result settings.
Event custom reports 37 NOTE The Available Column list lists the attributes you can include in the report. Each attribute represents a column on the report. 5. Select the attribute you want, then click the right arrow to move your selection to the Selected Columns list. To remove an attribute from the Selected Columns list, select the attribute that you want to remove, then click the left arrow button.
37 Event custom reports FIGURE 498 Add/Edit Report Definition dialog box - Identification tab 5. In the Name field, enter a name for the definition. This name appears under the Name column on the Report Definitions tab of the Event Custom Reports dialog box. This name must be unique for each report group. This is a required parameter. 6. In the Title field, enter a title for the definition, which will be used as the title of a generated report. This is a required parameter. 7.
Event custom reports 37 10. Select the roles that will have view and run access to this definition, then press the right arrow button to move the role in the Selected Roles list. All Management application users who have the selected roles will be able to view, copy, and run the definition. NOTE You can share the available users definition with specific Management application users.
37 Event custom reports FIGURE 499 Add/Edit Report Definition dialog box - Product tab 4. Click the Filter tab. The Add/Edit Report Definition dialog box - Filter tab, shown in Figure 500, displays.
Event custom reports 37 5. To limit the search results to traps, syslog, and pseudo event messages with a specific text string, enter the text string in the Description field. You can use an asterisk (*) to indicate a wildcard, as in the following examples: • *cdef: Matches a message ending with cdef • abc*: Matches a message beginning with abc • *abc*: Matches a message that contains abc For example, if you want to find the events that have the text “Auth” in the message, enter “*Auth*”.
37 Event custom reports 3. Click the Time Settings tab. The Add/Edit Report Definition dialog box - Time Settings tab, shown in Figure 501, displays. FIGURE 501 Add/Edit Report Definition dialog box - Time Settings tab 4. Choose between relative time (the default) and absolute time. • Click Relative Time if you want to filter traffic based on when the report is generated, and then select a relative time from the Range list. Relative time is calculated based on the date and time the report is generated.
Event custom reports 37 Creating a new report definition by copying an existing definition The simplest way to create a new report definition is by copying an existing definition. To create a new report definition is by copying an existing definition, complete the following steps. 1. Select the definition you want to copy from the Report Definitions tab of the Event Custom Reports dialog box. 2. Click Duplicate.
37 Event custom report schedules Deleting a report definition You can delete a report definition, but only if it belongs to you. To delete a report definition, complete the following steps. 1. To access the dialog box, select Reports > Event Custom Reports. The Event Custom Reports dialog box displays. 2. Click the Report Definitions tab of the Event Custom Reports dialog box and select the definition you want to delete. 3. Click the Delete button.
Event custom report schedules • • • • 37 Duplicate — Creates a copy of the selected report schedule. Delete — Deletes the selected schedule from the Schedules list. Enable — Enables the selected schedule. Disable — Disables the selected schedule.
37 Event custom report schedules 7. Select one of the following periods from the Frequency list: • One Time • Hourly — If you selected Hourly as the schedule type, Minutes past the hour appears. Select the minutes after the hour when the report will be generated. • Daily — If you selected Daily as the schedule type, Time (hh:mm) appears. • Weekly — If you selected Weekly as the schedule type, Day of the week appears. Select the day of the week when the report will be generated.
Event logs 37 Event logs You can view all events that take place through the Master Log at the bottom of the main window. You can also view a specific log by selecting an option from the Logs submenu of the Monitor menu. The logs are described in the following list: • Audit Log — Displays all Application Events raised by the application modules and all Audit Syslog messages from the switches and Brocade HBAs.
37 Event logs 3. Right-click one of the selected rows and select Copy Rows. 4. Open the application to which you want to paste the data. 5. Click where you want to paste the data. 6. Press CTRL+V (or select Edit > Paste from the other application). All data and column headings are pasted. 7. Click Close to close the dialog box. Copying an entire log entry You can copy data from logs to other applications. Use this method to analyze or store the data using another tool.
Event logs 37 E-mailing all event details from the Master Log NOTE You must configure e-mail notification before you can e-mail event details from the Master Log. To configure e-mail notification, refer to “Configuring e-mail notification” on page 1142. To e-mail all event details from the Master Log, complete the following steps. 1. Right-click an entry in the Master Log. 2. Select E-mail > All. The E-mail dialog box displays. 3.
37 Event logs TABLE 98 Event Properties Event Field Description Probable Cause The most likely reason the event occurred. Description A description of the event. Count Number of times this event occurred on the host. Origin The event’s origin, for example, SNMP trap. Message ID The message associated with the event. Port Name The port name associated with the event. First Event Server Time The time the event occurred. Fabric Name The VCS fabric name.
Event logs 37 Copying part of the Master Log You can copy data from logs to other applications. Use this method to analyze or store the data using another tool. To copy part of the Master Log, complete the following steps. 1. Select the rows you want to copy in the Master Log: • To select contiguous rows, select the first row you want to copy, press Shift, and click the contiguous row or rows you want to copy.
37 Event logs Filtering events in the Master Log You can filter the events that display in the Master Log on the main window. By default, all event types display in the Selected Events list. When you select a filter from the Filter drop-down menu, the Master Log refreshes to display the events associated with that filter. This filter setting is kept when you exit the client. For more information about the Master Log, refer to “Master Log” on page 287.
Event logs 37 • To include an event type in the filter, select the event from the Available Products list and click the right arrow. • To exclude an event type from the filter, select the event from the Selected Products to be displayed list and click the left arrow. • To include all products, select the Allow All Products check box. 4. Select from the following to include or exclude event types.
37 Event logs The ‘none’ filter The filter named none is the default configuration filter. You cannot to edit or delete this filter. Selecting this filter lets you view Master Log events with no filtering applied. This is the default filter selected when no other filter is applied by the user or when there is no migrated filter. Editing a Filter To edit a filter, select the filter you want to edit in the Filters panel and make the desired changes to the filter configuration.
Chapter Packet Capture (Pcap) 38 In this chapter • Configuring packet captures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1213 Configuring packet captures Organizations can configure switches as sensors to capture packets through the embedded sFlow capability and send them back to the Management application, which acts as an sFlow collector. The Management application then converts the sFlow data to Pcap format, which is understood by a variety of open source products.
38 Configuring packet captures For example, if SNORT is installed under the C:\\SNORT\ directory, enter the following commands to launch SNORT: C:\\SNORT\bin\SNORT.exe -c C:\\SNORT\etc\SNORT.conf -Xeds -K none 6. Specify the working directory for the PCAP-aware tool in the Working Directory text box. If this field is blank, the default directory is set to the Install_Home\bin directory. 7. Type the name of the PCAP-aware tool in the Name text box.
Chapter Technical Support 39 In this chapter • Server and client support save. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1215 • Device technical support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1219 Server and client support save You can use Technical Support to collect SupportSave data for the Management server and clients.
39 Server and client support save 4. Select the Include Database check box to include the database in the support save and choose one of the following options. • Select the Partial (Excludes historical performance data and events) option to exclude historical performance data and events from the database capture. • Select the Full option to capture the entire database. Clear the Include Database check box to exclude the database in the support save. 5.
Server and client support save 39 4. Enter a file name for the server support save file in the File Name field. The default file name is DCM-SS-Time_Stamp. 5. Select the Include Database check box to include the database in the support save and choose one of the following options. • Select the Partial (Excludes historical performance data and events) option to exclude historical performance data and events from the database capture. • Select the Full option to capture the entire database.
39 Server and client support save Client support save using a command line interface Use the following procedures to capture client support save files through the command line interface (CLI). Capturing client support save using the CLI (Windows) To capture client support save files through the CLI, complete the following steps. 1. Go to the following location: • (Local client) User_Home/Management_Application_Name/localhost • (Remote client) User_Home/Management_Application_Name/Server IP 2.
Device technical support 39 Device technical support You can use Technical Support to collect SupportSave data (such as, RASLOG, TRACE and so on) and switch events from Fabric OS, IronWare, and Network OS devices. To gather technical support information for the Management application server, refer to “Capturing technical support information” on page 392. Scheduling technical support information collection You can capture technical support and event information for up to 50 devices.
39 Device technical support FIGURE 507 Technical SupportSave dialog box, Schedule tab 3. Select the Enable scheduled Technical Support Data check box. 4. Select how often you want the scheduled collection to occur from the Frequency list. 5. Select the start date for the scheduled collection from the Start Date list. This list is only available when you select Weekly or Monthly from the Frequency list. 6. Select the time you want the scheduled collection to begin from the Start Time Hour and Minute lists.
Device technical support 39 • Contact — The primary contact at the customer site. • Description — A description of the customer site. • Role — A description of the customer site. a. Right-click in the Available IP Products table and select Expand All. b. Select the products you want to collect data for in the Available IP Products table and click the right arrow to move them to the Selected Products and Hosts table.
39 Device technical support • Fabrics — The fabric of the host. a. Right-click in the Available Hosts table and select Expand All. b. Select the products you want to collect data for in the Available Hosts table and click the right arrow to move them to the Selected Products and Hosts table. The Selected Products and Hosts table displays the following information: IP Address — The IP address of the selected product or host. For VCS-enabled product’s, the IP address of the selected node.
Device technical support 39 To capture technical support and event information for specified devices, complete the following steps. 1. Select Monitor > Technical Support > Product/Host SupportSave. The Technical SupportSave dialog box displays. 2. Click the Generate Now tab, if necessary. FIGURE 508 Technical SupportSave dialog box, Generate Now tab 3. Click the IP Products tab, if necessary, and complete the following steps. a. Right-click in the Available IP Products table and select Expand All. b.
39 Device technical support Technical SupportSave data for Network OS products in either standalone or VCS mode are saved to the following directory: Install_Home\data\ftproot\technicalsupport\ipproducts\NOS Technical SupportSave uses the following naming convention for the VCS-enabled Network OS device support save files: IPProd-Fabric_Name-Seed_Switch_IP-Time_Stamp\IPProd-Fabric_Name-Product_NameProduct_IP-Time_Stamp A consolidated fabric zip file is created only in the when the Management application i
Device technical support 39 Viewing the technical support repository You can only view technical support save files that are captured in the default location. Table 99 details the default locations for the technical support save files.
39 Device technical support 2. Review the techncial support repository details: Field/Component Description Available SupportSave table Select the support data file you want to view. Displays the following information: File Name — The name of the SupportSave file. Size (MB) — The name of the SupportSave file. Last Modified — The date the SupportSave file was generated. Firmware Type — The type of file (Client, Server, FOS (Fabric OS), IOS (IronWare), NOS (Network OS), ).
Device technical support 39 E-mailing technical support information NOTE You cannot e-mail technical support information collected from the remote client. To e-mail technical support information, complete the following steps. 1. Select Monitor > Technical Support > View Repository. The Technical Support Repository dialog box displays. 2. Select the file you want to e-mail in the table. 3. Click E-mail to e-mail the event and supportsave files (zip).
39 Device technical support 6. Enter the destination directory where you want to copy the data on the external FTP server in the Destination Directory field. The destination directory should be the sub directory of the external FTP server’s root directory. For example, if you enter “repository” as the destination directory, then the support save file is copied to the “/repository” directory of the external FTP server. 7. Click OK.
Device technical support 39 5.
39 1230 Device technical support Brocade Network Advisor IP User Manual 53-1003056-01
Chapter 40 Reports In this chapter • Reports overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Viewing IP reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Exporting and saving IP reports to a file . . . . . . . . . . . . . . . . . . . . . . . . . • Exporting IP reports to e-mail recipients . . . . . . . . . . . . . . . . . . . . . . . . . • IP report contents . . . . . . . . . . . . . . . . . . . . . . . . . .
40 Exporting and saving IP reports to a file • Click the Reports button on the menu bar to display the report options. • Click a report option to display the report that you want. NOTE ATM ports are not displayed in the reports. The ATM module may appear in the reports, but the modules will be listed as having no ports. Exporting and saving IP reports to a file You can save a report to a CSV (comma seperated values) or HTML file. Each report has an Export list at the top right corner of the page. 1.
IP report contents 40 The Users dialog box displays. 3. Select the preconfigured e-mail user account from the list and click OK. 4. Enter additional e-mail addresses in the Other Recipients field. 5. Enter text in the Subject field to change the subject of the e-mail. 6. Enter text in the Body field to send a message with the report. 7. Click Send to send the report. NOTE Mozilla Firefox Browser does not support the window close script. Click the browser close button (X) to cancel.
40 IP Wired Products report FIGURE 510 Wired Product List The Wired Products report contains the fields and components detailed in Table 100. TABLE 100 Field/Component Description Wired Products Count The number of wired products in the report. Product Status Whether the product is reachable (green icon), marginal ( ( ), unhealthy ( ), or not reachable ( ). Name The name of the product. Click the name of a product to launch the Detailed Product Report. VCS Name The name of the VCS product.
IP Wired Products report TABLE 100 40 Wired Products report fields and components (Continued) Field/Component Description Export button Click to export the report. For more information, refer to “Exporting and saving IP reports to a file” on page 1232. E-mail button Click to e-mail the report. For more information, refer to “Exporting IP reports to e-mail recipients” on page 1232.
40 IP Wired Products report TABLE 101 Detailed Product Report fields and components (Continued) Stacking Port Realtime Admin Status Modules 1236 The name of the stacked device with drill-down support. When you click on the name, the “IP Stacking Ports - Realtime report” launches (refer to “IP Stacking Ports - Realtime report” on page 1244). Admin status information includes the following: Status — Whether the product is in normal operating mode or troubleshooting mode.
IP Wired Products report TABLE 101 40 Detailed Product Report fields and components (Continued) Cluster (MCT switches only) Cluster Peer (MCT switches only) Cluster information for a Multi-Chassis Trunk (MCT) switch. Information includes: Cluster ID — The MCT cluster ID. Cluster Name — The MCT cluster name. Cluster State — Whether the MCT cluster is deployed or undeployed. Client Isolation Mode — Whether isolation mode is loose or strict. Active Member VLAN Range — The active member VLAN for data.
40 IP Wired Products report TABLE 101 Detailed Product Report fields and components (Continued) AP List Count Access Point information for wireless controllers. The table title includes the number of access points attached to the selected device. Information includes: • Product Status — Whether the AP is online (green icon), offline (red icon), or pending adoption (gray icon). • Name — The device name used to identify AP. • Connected Switch — IP address of the controller or switch connected to the AP.
IP Wired Products report TABLE 102 40 Detailed Cluster Report fields and components (Continued) System Information Nodes Admin Status Modules Brocade Network Advisor IP User Manual 53-1003056-01 System information includes the following: Alias Name — An optional name that is entered using the Properties dialog box. It provides an alternate name for the product if you want to override the Host Name and System Name values.
40 IP Module report TABLE 102 Detailed Cluster Report fields and components (Continued) IP Addresses Ethernet Ports FC Ports The IP addresses of each interface, including the virtual routing interface on wired products. For Layer 2 switches, the management IP address displays in the IP Addresses table with "management" in the Interface column. • Port — The port number. • IP Address — The IP address. • Subnet Mask — The subnet mask number. • VRF — The virtual routing interface.
IP Port VLANs report TABLE 103 40 Module List report fields and components Field/Component Description Description The type of module installed. Serial Number The serial number of the module. Product The host name of the product where the module is installed. This name can be set from the CLI. Click the name of the product to display the Detailed Product Report. VCS Name The name of the VCS fabric. [Unit/]Slot No The slot on the product where the module is installed.
40 IP Subnet report TABLE 105 Layer 3 VLAN report fields and components Field/Component Description Protocol VLANs in Port VLAN This section lists the details of protocol VLANs configured under the port VLAN. IP Subnet VLANs in Port VLAN # Several sections on the report display the subnet VLANs that have been configured under the port VLAN.
IP Address report 40 IP Address report The IP Address report displays all discovered IP addresses of wired products on the network. To view the IP Address report, select Reports > IP Address Report. The IP Address report has the parameters described in Table 108. TABLE 108 IP Address report fields and components Field/Component Description IP Address The IP address of the product, access point, or interface. These addresses are in numerical order. Click to launch the Web Element Manager.
40 IP Physical Ports - Realtime report IP Physical Ports - Realtime report The Physical Ports - Realtime report shows the status of physical interfaces of products that have been discovered on the network. To display the report, choose one of the following options; • Right-click the device in the IP Products dialog box and select Physical Ports Report. • Right-click the device on the Network Objects, L2 Topology, Ethernet Fabrics, IP Topology, or VLAN Topology view and select Physical Ports Report.
IP Physical Media - Realtime report 40 IP Physical Media - Realtime report The Physical Media - Realtime report shows the port optics (SFP) details of Network OS devices. To display the report, complete the following steps. 1. Right-click the device on the topology and select Detailed Report. 2. Click the device name in the Physical Media - Realtime table. The Physical Media - Realtime report has the parameters described in Table 112.
40 IP Deployment reports IP Deployment reports Deployment reports provide information about deployments performed from the Management application. These deployments include device configuration deployments, software image backups, Realm Manager deployments, and configuration backups. The reports are available in case administrators want to know whether a deployment succeeded or failed. Deployment reports are not available for third-party devices. Viewing a deployment report 1.
Reports Template Manager overview 40 Reports Template Manager overview The Report Template Manager enables you to run, import, export, or delete preconfigured and user-defined reports. Preconfigured reports The Management application provides four preconfigured reports: • Products List — This report displays general and detailed configuration information about products discovered by the Management application. For more information, refer to “IP Wired Products report” on page 1233.
40 Reports Template Manager overview Accessing the Report Template Manager 1. Select Reports > Report Manager. The Report Template Manager dialog box displays (Figure 511). FIGURE 511 Report Template Manager dialog box The Report Template Manager dialog box includes the following fields and components: • Report Templates table — Lists all reports. Title — The title of the report, which must be unique. File — The file name of the report, which must be unique.
Reports Template Manager overview 40 Viewing a report 1. Select Reports > Report Manager. The Report Template Manager dialog box displays. 2. Select the report you want to run in the Report Templates table. 3. Click Run. If one or more parameters are required for the report, the Parameter dialog box displays (Figure 512). FIGURE 512 Parameter dialog box 4. Enter the parameters (such as IP address, source port name, or destination port name). NOTE The parameter fields cannot be empty.
40 Reports Template Manager overview Importing a report template You can use the BIRT report designer to create user-defined report templates that you can then import into Report Template Manager. 1. Select Reports > Report Manager. The Report Template Manager dialog box displays. 2. Click Import. The Open dialog box displays. 3. Browse to the location from which you want to import the report and click Open.
Reports Template Manager overview 40 Report content and functions Each report contains the following information: • The name of the report displayed at the top of the report. • The date and time the report was generated. • The report data, presented in a tabular format. Depending on the report type, you can perform the following functions: • Sort a table by clicking a column head. Click a column head again to reverse the sort order. • Launch a more detailed report by clicking a link within the report.
40 Reports Template Manager overview Products List report The Products List report displays general and detailed configuration information about all discovered products (Figure 510). The information on the report comes from the software image version that is in the Management application for that product. To ensure that the latest configuration information is in the Management application, run the discovery process or resynchronize the product.
Reports Template Manager overview TABLE 113 40 Products List report fields and components (Continued) Field/Component Description IP Address The IP address of the product. Product Type The type of product. Serial Number The serial number of the product. Admin Status The administrative status of the product. Possible status includes: Normal — The product is in normal operating mode. Troubleshooting — The product is in troubleshooting mode. • • Model The model of the product.
40 Reports Template Manager overview Table 114 describes the fields and components of the Detailed Product Report. TABLE 114 Detailed Product Report fields and components Field/Component Description Product The IP address of the product. System Information Admin Status Modules Ethernet Ports 1254 System information includes the following: Alias Name — An optional name that is entered using the Properties dialog box.
Reports Template Manager overview TABLE 114 40 Detailed Product Report fields and components (Continued) Physical Ports Physical port information for each port on the product. Identifier — The port identifier of the physical interfaces on the product. Port Name — The port name of the physical interfaces on the product. Type — The type of port of the physical interfaces on the product. Speed (Mbps) — The speed of the physical interfaces on the product.
40 Reports Template Manager overview Table 115 describes the fields and components of the Detailed Cluster Report. TABLE 115 Detailed Cluster Report fields and components Field/Component Description Cluster The name of the cluster. System Information Nodes Admin Status 1256 System information includes the following: Alias Name — An optional name that is entered using the Properties dialog box.
Reports Template Manager overview TABLE 115 40 Detailed Cluster Report fields and components (Continued) Modules Ethernet Ports Module information shows what modules are installed on the product. Slot Number — For products that do not support stacking, you can view the slot number. • Type — The type of module installed in the slot. • Serial Number — The serial number of the module. For wired products, the serial number cell may be blank. • Ports — The number of ports on the product.
40 Reports Template Manager overview Table 116 describes the fields and components of the Ports Tx/Rx Ratio report. TABLE 116 Ports Tx/Rx Ratio report fields and components Field/Component Description Summary table Location The location of the device. Device Name The name of the device. Click the device name link to launch the Detailed Product Report. IP Address The IP address of the device. Total Received (MB) The total data received (the sum of Rx in Rx Details table) in megabytes.
Reports Template Manager overview 40 Low Traffic Ports report The Low Traffic Ports report details the port utilization that is less than or equal to the percentage and number of days you specify (Figure 517). FIGURE 517 Low Traffic Ports report Table 117 describes the fields and components of the Low Traffic Ports report. TABLE 117 Low Traffic Ports report fields and components Field/Component Description Location The location of the device. Device Name The name of the device.
40 Reports Template Manager overview Exporting data from the report You can export data from a report to CSV, PDF, or Word. 1. Run a report (refer to “Viewing a report” on page 1249). 2. From the report, click the Export Report icon on the Report toolbar. The Export Report dialog box displays. 3. Select an export format (PDF or Word) from the Export Format list. 4. Configure what content to export by selecting one of the following options: • Select All pages to export the entire report.
Appendix A Application menus In this appendix • Dashboard main menus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1261 • IP main menus. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1262 • IP shortcut menus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1268 Dashboard main menus The menu bar is located at the top of the main window.
A IP main menus Menu Command Command Options License — Select to view or change your License information. About Management_Application_Name — Select to view the application information, such as the company information and release number. IP main menus The menu bar is located at the top of the main window. The following table outlines the many functions available on each menu. Menu Command Command Options Server Menu Users. Select to configure users and user groups. User Profile.
IP main menus Menu Command A Command Options Show Panels. Select to choose which panels to display. All Panels. Select to show all panels. Topology Map. Select to only show the topology map. Product List. Select to only show the Product List. Master Log. Select to only show the Master Log. Main Display. Select to choose which topology to display Network Objects. Select to display Network Objects. L2 Topology. Select to display the L2 topology map. Ethernet Fabrics.
A IP main menus Menu Command Command Options Static. Select to create a product group based on device. Dynamic. Select to create a product group based on device attributes. Add Port Group. Select to create a port management group. Edit Group. Select to edit a management group. Duplicate Group. Select to duplicate a management group. Delete Group. Select to delete a management group. Configure Menu Element Manager. Select to configure a selected device. Front Panel.
IP main menus Menu Command A Command Options Application Delivery. Select to choose an application delivery method. VIP Servers. Select to monitor and configure real and virtual servers. GSLB. Select to create global server load balancing (GSLB) policies. SSL Certificates. Select to manage SSL certificates. MPLS. Select to configure the multiprotocol label switches service (MPLS). VLL. Select to configure virtual leased line (VLL) services. VPLS. Select to configure virtual private LAN services (VPLS).
A IP main menus Menu Command Command Options Set Change Limits. Select to set zone limits for zone activation. List Zone Members. (Trial and Licensed version Only) Select to display all members in a zone. Monitor Menu Performance. Select to monitor IP devices. Dashboard — Select to launch the Performance Dashboard. Historical Data Collectors. Select to monitor historical data. Real-Time Graph/Tables.
IP main menus Menu Command A Command Options Call Home. Select to configure the Management Server to automatically dial-in to or send an E-mail to a support center to report system problems. Event Processing. Select to configure event processing. Pseudo Events. Select to configure pseudo events. Event Actions. Select to configure events actions. Logs. Select to display logs. Audit. Select to display a history of user actions performed through the application (except login/logout). Product Event.
A IP shortcut menus Menu Command Command Options Modules. Select to run a report on modules. VLANs. Select to run a VLAN information report. IP Subnets. Select to run a report of IP subnets on the network. IP Addresses. Select to run a report on IP addresses on the network. MAC Addresses. Select to run a report of MAC addresses on the network. Product CLI. Select to run a product CLI report. Deployment. Select to run a deployment report. Host Adapters — Select to run a Host product report.
IP shortcut menus A • IP Subnet • VLAN • L2 Cloud The table below details the command options available for each component. Component Menu/Submenu Commands Comments Element Manager > Front Panel Web Displays the IronWare device’s front panel. Launches the device’s Web Management Interface. Configuration > Save Restore Configuration Repository Schedule Backup Launches the Configuration dialog box with selected device highlighted. Launches the Configuration dialog box with selected device highlighted.
A IP shortcut menus Component Menu/Submenu Commands Comments Table > Copy “Cell_Value” Copy Row Copy Table Export Row Export Table Print Search Select All Size All Columns To Fit Expand All Collapse All Customize Only available from Product List. Copies the information in the selected cell. Copies all information in the selected row. Copies all information in the table. Copies all information in the selected row. Copies all information in the table. Launches the Print dialog box.
IP shortcut menus Component Menu/Submenu Commands A Comments Fabric Watch > Configure Port Fencing Frame Monitor Performance Thresholds Technical Support > Product / Host SupportSave View Repository Events Port Connectivity Port Optics (SFP) Telnet Telnet through Server Network Objects Displays the Network Objects view with the selected device highlighted. L2 Topology Displays the L2 Topology view with the selected device highlighted.
A IP shortcut menus Component Menu/Submenu Commands Comments Fabric Watch > Configure Port Fencing Frame Monitor Performance Thresholds Technical Support > Product / Host SupportSave View Repository Events CLI through Server Setup Tools Network Objects Displays the Network Objects view with the selected device highlighted. L2 Topology Displays the L2 Topology view with the selected device highlighted.
IP shortcut menus Component Menu/Submenu Commands Comments Physical Ports Report Generates and displays a Physical Ports Report for the selected device Properties Displays the Properties dialog box for the selected device. Table > Copy “Cell_Value” Copy Row Copy Table Export Row Export Table Print Search Select All Size All Columns To Fit Expand All Collapse All Customize Only available from Product List. Copies the information in the selected cell. Copies all information in the selected row.
A 1274 IP shortcut menus Brocade Network Advisor IP User Manual 53-1003056-01
Appendix B Call Home Event Tables In this appendix This appendix provides information about the specific events that display when using Call Home. This information is shown in the following Event Table. • IP Call Home Event . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1275 • Network OS Call Home Event . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
B Call Home Event Tables TABLE 119 Network OS Call Home Event (Continued) Event reason code FRU code/Event type Description Severity 1431 FW-1431 Faulty fans. 3 1432 FW-1432 Faulty WWN cards. 3 1433 FW-1433 Faulty CPs. 3 1434 FW-1434 Faulty blades. 3 1435 FW-1435 Flash usage is out of range.
Appendix C Event Categories In this appendix This section provides information about the events that display in each of the following categories: • Link incident events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Product status events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Product audit events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Security events . . . . . . . . . . . . .
C Product audit events If the event is a RASLOG and if the RASLOG ID matches any of the RASLOGS listed below, then the event is categorized as a product status event. • • • • • • • • • • • • • • • • • • • • • FW-1424 FW-1425 FW-1426 FW-1427 FW-1428 FW-1429 FW-1430 FW-1431 FW-1432 FW-1433 FW-1434 FW-1435 FW-1436 FW-1437 FW-1438 FW-1439 FW-1440 FW-1441 FW-1442 FW-1443 FW-1444 Product audit events Events that are used to track audit information are categorized as product audit events.
Security events C Security events Security events are those that indicate authentication success or failure, a security violation, or user login and logout. Security events for FC devices For FOS switches, if the event is a RASLOG event and the RASLOG ID contains 'SEC', then the event is categorized as a security event. Security events for IP devices For IOS devices, if the event OID starts with any of the following OIDs, then the event is categorized as a security event.
C User action events • • • • • • • • • • • • • • • • • 1.3.6.1.4.1.1991.1.6.1.7.4.2.13 [localMacAddrAuthFail] 1.3.6.1.4.1.1991.1.6.1.7.4.2.14 [pppLogonFail] 1.3.6.1.4.1.1991.1.6.1.7.4.2.18 [dot1xSupplicantAuthenticated] 1.3.6.1.4.1.1991.1.7.2.2.2.9 [apAuthFailureTooMany] 1.3.6.1.4.1.1991.1.8.2.1.4.0.2 [userLoginNotification] 1.3.6.1.4.1.1991.1.8.2.1.4.0.3 [userLogOffNotification] 1.3.6.1.4.1.1991.1.8.2.1.4.0.4 [userLoginFailNotification] 1.3.6.1.4.1.1991.1.11.1.1.2.2.2.32 [mwlAuthFailure] 1.3.6.1.4.1.
Product events C Product events All other events originating from the product are categorized as product events. IP Performance monitoring events IP performance monitoring events, listed in Table 120, occur when users select the option to forward events to the vCenter during VM Manager discovery. TABLE 120 Performance monitoring IP threshold events Trap name OID Description bnaRisingThresholdCrossed 1.3.6.1.4.1.1991.1.13.2.0.
C 1282 IP Performance monitoring events Brocade Network Advisor IP User Manual 53-1003056-01
Appendix User Privileges D In this appendix • About user privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1283 • About Roles and Access Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1298 About user privileges The Management application provides the User Administrator with a high level of control over what functions individual users can see and use.
D About user privileges TABLE 121 Application privileges and behavior Privilege Description No Privilege Read-Only Read/Write Active Session Management Allows you view active client sessions and disconnect an unwanted user. Disables the Active Sessions command from the Server menu. Enables the Active Sessions command from the Server menu. Disables all commands and functions on the dialog box except the Close and Help. Enables the Active Sessions command from the Server menu.
About user privileges TABLE 121 D Application privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Element Manager Product Administration An Element Manager privilege that enables most functionally. Disables the functions described in the Element Manager User Manual for which you do not have rights. Displays the message, “You do not have rights to perform this action.” Same as No Privilege.
D About user privileges TABLE 121 Application privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Fault Management Allows you to control access to the SNMP Trap Registration and Forwarding dialog box, the Event Storage option of the Options dialog box, the Syslog Registration and Forwarding dialog box, as well as the Export and Clear functions in the Event Log dialog box and the Show and Hide functions in the Customize Columns dialog box.
About user privileges TABLE 121 D Application privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Firmware Management Allows you to download firmware to selected switches and manage the firmware repository. Disables the Firmware Management command from the Configure menu and right-click menu. Enables the Firmware Management command from the Configure menu and right-click menu. Disables all commands and functions on the dialog box except the Close and Help.
D About user privileges TABLE 121 Application privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Policy Monitor Allows you to configure policy monitors. Disables Policy Monitor command on the Monitor menu. Enables Policy Monitor command on the Monitor menu. Allows you to open the Policy Monitor dialog box; however, disables the Add, Delete, and Run buttons. No changes can be made. Enables you to use the Edit, Report, and History buttons to view content.
About user privileges TABLE 121 D Application privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Security Allows you to enable and configure SANtegrity features. Disables the Security command from the Configure > Switch > Replicate menu. Disables the Security Log command on the Monitor > Logs menu. Disables the Security Misc command from the Server > Options menu. Disables the Security command from the Configure > Switch > Replicate menu.
D About user privileges TABLE 121 Application privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Technical Support Data Collection Allows you to capture support data from Fabric OS switches. Disables the SupportSave, Upload Failure Data Capture, and View Repository commands from the Monitor > Technical Support menu and right-click menu. Enables the View Repository command from the Monitor > Technical Support menu and right-click menu.
About user privileges TABLE 121 D Application privileges and behavior (Continued) Privilege Description Web Services Allows you to use Web Services API. Zoning Activation (Fabric and offline zone database) Allows you to activate a zone configuration selected in the Zoning dialog box. NOTE You must also have the Zoning Offline and Zoning Online privileges to launch the Zoning dialog box.
D About user privileges TABLE 121 Application privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Zoning Online Allows you to edit any of the fabric zone databases in the available fabrics within the Zoning dialog box from the client side and then save to the switch. In Zoning dialog box, the Zone DB list includes online and offline zones; however, if an online zone is selected, the contents are not loaded into the Zoning dialog box.
About user privileges TABLE 121 D Application privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Zoning Offline Allows you to edit the zone database in offline mode and save the zone database to the repository or to the switch. In Zoning dialog box, the Zone DB list includes offline zones; however, if an offline zone is selected, the contents are not loaded into the Zoning dialog box.
D About user privileges TABLE 121 Application privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write Zoning - LSAN Allows you to edit and activate LSAN zones for the LSAN fabrics that are available within the Zoning dialog box. Prerequisite: Both the backbone fabrics as well as all directly connected edge fabrics must be added to a resource group and a user with LSAN Zoning privilege must be assigned to this specific resource group.
About user privileges TABLE 122 D IP privileges and behavior Privilege Description No Privilege Read-Only Read/Write IP - Address Finder Allows you to use Address Finder. Address Finder finds MAC addresses that are in the forwarding tables at the moment when the search is performed. Disables the Address Finder command. Enables the Address Finder command; however, disables functions on the dialog box. Enables the Address Finder command and all functions on the dialog box.
D About user privileges TABLE 122 IP privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write IP - Element Manager Port Config Allows you to access the device from Element Manager. For read-write access to a device Web Management Interface to manage specific ports, but not for global configuration of a device. Disables the Element Manager - Port Config command. Enables the Element Manager - Port Config command; however, disables functions on the dialog box.
About user privileges TABLE 122 D IP privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write IP - MPLS - VLL Allows you to manage VLL configurations. Disables the MPLS command. Enables the MPLS command; however, disables functions on the dialog box. Enables the MPLS command and all VLL functions on the dialog box. IP - MPLS - VPLS Allows you to manage VPLS configurations Disables the MPLS command.
D About Roles and Access Levels TABLE 122 IP privileges and behavior (Continued) Privilege Description No Privilege Read-Only Read/Write IP - VIP-Server Mgr Leaf Node (Real Server Port View) Allows you to manage VIP Server using the Real Server Port View. When assigned to user as Read-Write privilege, only leaf node can be disabled/enable Disables the VIP Server command. Enables the VIP Server command; however, disables functions on the dialog box.
About Roles and Access Levels TABLE 123 D Application Features and Role Access Levels (Continued) Feature Roles with Read/Write Access Element Manager - Product Administration IP System Administrator, Event Management IP System Administrator, Network Administrator Fabric Watch IP System Administrator, Fault Management IP System Administrator, Network Administrator Operator FCoE Management SAN System Administrator, Network Administrator Security Administrator, Zone Administrator, Security Of
D About Roles and Access Levels TABLE 124 IP Features and Role Access Levels Feature Roles with Read/Write Access IP - Address Finder IP System Administrator, Network Administrator IP - CLI IP System Administrator IP - CLI Configuration IP System Administrator, Network Administrator IP - CLI - Port Config IP System Administrator IP - Deployment Reports IP System Administrator, Report User Group, Network Administrator IP - Discover Setup IP System Administrator IP - Element Manager - Port C
Appendix E Device Properties In this appendix • Viewing SAN device properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • IP device properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Host properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Properties customization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
E Viewing SAN device properties TABLE 125 Fabric properties Field/Component Description Active Zone Configuration Whether active zone configuration is activated on the fabric. Last Discovery The date and time of last discovery. Tracked Whether the fabric is tracked. Location The customer site location. Contact The primary contact at the customer site. Add button Click to add a user-defined property. For more information, refer to “Adding a property field” on page 1329.
Viewing SAN device properties TABLE 126 E Device properties (Continued) Field/Component Description Discovery Status The discovery status of the switch. Examples include ‘Discovered: Seed Switch’ and ‘Discovered: Not Reachable’. Domain ID The device’s domain ID, which is the top-level addressing hierarchy of the domain. Fabric The fabric name. Fabric Name The name specified through the device Element Manager. Fabric Watch Whether Fabric Watch is up or down.
E Viewing SAN device properties TABLE 126 1304 Device properties (Continued) Field/Component Description Node Name The name of the node. Node WWN The world wide name of the node. Physical/Logical Whether the device is a physical device or a logical device. Port Count The number of ports. Port Type The port type. Preshared key configured Whether the preshared key is configured for the FCIP tunnel. Reason The device status. Remote Switch Name The remote switch name of the trunk.
Viewing SAN device properties TABLE 126 E Device properties (Continued) Field/Component Description WWN The world wide name of the device. Add button Click to add a user-defined property. For more information, refer to “Adding a property field” on page 1329. Edit button Click to edit a user-defined property. For more information, refer to “Editing a property field” on page 1330. Delete button Click to delete a user-defined property.
E 1306 Viewing SAN device properties Field Description (Status) Lists two kinds of data: the LUN’s health and the state of the LUN’s disks. The colored icon in the lower-left corner indicates the LUN’s health. In most cases, there is also a number that represents the RAID type. The possible RAID types are 0, 1, 5, or 10, and the number does not display if the RAID type is different from those. The following are examples of generic LUN status icons: Normal. All disks are operating normally and online.
Viewing SAN device properties E Field Description Operational Status The operational status of the product. OS Type The operating system. Protocol The LUN protocol. Size (GB) The total size of this LUN’s storage, in gigabytes. State The state of the LUN. Storage LUN ID The storage product’s LUN ID number for this LUN. Storage Ports The total number of storage ports assigned to the server or the port, or bound to the LUN. Type The level or type of RAID storage.
E Viewing SAN device properties 1. Right-click a product icon and select Properties . The Properties dialog box displays. 2. Select the iSCSI tab. NOTE Some fields may not be available for all products. 1308 Field Description Agent The Caffeine agent version number. Applications The applications. Assigned LUNs The number of unique LUNs (not LUN paths) masked to this host. Assigned LUNs Size (GB) The total size of the unique LUNs (not LUN paths) in gigabytes.
Viewing SAN device properties E Field Description OS Release The operating system release running on the product. Portal Addresses The list of IP addresses. Port The port number. Protocol Error Count The number of protocol errors. Tag The group tag ID of the portal. Sessions button Select to display the Filer Sessions dialog box for the product. Statistics button Select to display the Filer iSCSI Statistics dialog box for the product.
E Viewing SAN device properties FIGURE 518 Port Properties dialog box NOTE Depending on the port type, some of the following properties may not be available for all products. TABLE 127 1310 Port properties Field Description Additional Port Info Additional error information relating to the selected port. Address The address of the port. Addressing Mode The addressing mode of the switch. Active FC4 Types The active FC4 types. Active Tunnels The number of active tunnels.
Viewing SAN device properties TABLE 127 E Port properties (Continued) Field Description Compression Whether compression is enabled or disabled. Connected Devices The number of connected devices. Click the icon in the right side of the field to open the Virtual FCoE Port Connected Devices dialog box. Connected Switch The name of the connected switch. Delete button Click to delete. Description A description of the customer site.
E Viewing SAN device properties TABLE 127 Port properties (Continued) Field Description IP Address The device’s IP address. IPSec Policy # 1312 The IPSec policy number. Also includes the following information: Authentication Algorithm Encryption Algorithm SA Life • • • iSCSI button Click to launch the Element Manager. iSCSI Capable Whether the port is iSCSI capable or not. L2 Capable Whether the device is Layer 2 capable. L3 Capable Whether the device is Layer 3 capable.
Viewing SAN device properties TABLE 127 E Port properties (Continued) Field Description Port Speed (Gb/s) The port speed, in Gbits per second. Port State The port state (online or offline). Port Status The port’s operational status (online or offline). Port Type The port type. Port WWN The port’s world wide name. Preshared key configured Whether the preshared key is configured for the FCIP tunnel. Prohibited Whether the port is prohibited.
E IP device properties TABLE 127 Port properties (Continued) Field Description User Port # The number of the user port. Vendor The product vendor. # Virtual FCoE port count The number of virtual FCoE ports on the device. There is a one-to-one mapping of TE ports to virtual FCoE ports. Therefore, the number of virtual session ports is one for directly connected devices. # Virtual Session Ports The number of virtual session ports associated with the GE port.
IP device properties E The Device_Name Properties dialog box displays. 3. Review the device and port properties. To add user-defined property labels, refer to “Adding a property field” on page 1329. Fields containing a green triangle ( ) in the lower right corner are editable. NOTE Some fields are not available for all products. Field/Component Description Properties tab Select to display information about the device. Detailed Report button Click to launch the detailed product report.
E IP device properties Field/Component 1316 Description Location The physical location of the product. Contact The name of the person or group you should contact about the product. Description The description of the product. Connected AP count Number of APs connected to the controller or switch. Managed AP count Only applicable to the selected controller. Number of APs that the selected controller manages. Controller cluster mode Only applicable to the selected controller.
IP device properties E Field/Component Description Nodes tab Select to display information about nodes in the fabric. For detailed information about this tab, refer to “Viewing VCS fabric properties” on page 1319. Port Profiles tab Select to display information about port profiles for the fabric members. For detailed information about this tab, refer to “Viewing VCS fabric properties” on page 1319. Ports tab Select to display information about ports on the device.
E IP device properties Field/Component Description Connected AP count Number of APs connected to the controller or switch. Managed AP count Only applicable to the selected controller. Number of APs that the selected controller manages. Name The device name used to identify the AP. Device MAC The AP device MAC address. Model The model of the AP. Serial Number The serial number of the AP. Firmware version The firmware level of the AP. Status The status of the AP.
IP device properties E Viewing VCS fabric properties To view properties for a VCS fabric, complete the following steps. 1. Select Ethernet Fabrics from the view list on the Product List toolbar. 2. Right-click the VCS fabric in the Product List and select Properties. The Fabric_Name Properties dialog box displays. 3. Review the device and port properties. Field/Component Description Properties tab Select to display information about the fabric.
E IP device properties Field/Component Description Nodes tab Select to display information about nodes on the fabric. Name The name of the VCS fabric member. Alias The fabric member alias name. Host Name The host name associated with the VCS fabric member. System Name The name of the switch. IP Address The IP address of the switch. System OID The system’s object identifier. Product Type The fabric’s product type, which is a Layer 2 switch. Serial # The VCS fabric member’s serial number.
IP device properties Field/Component E Description Status Port profile states can be one of the following, all of which are configured using the command line interface: • Created • Activated • Associated • Applied MAC Count The number of MAC addresses associated with the port profile. VLANs The number of virtual LANs (VLANs) associated with the port profile, along with the following VLAN information: • All — Indicates that the port profile will allow all VLAN IDs.
E IP device properties Field/Component Configuration Description Displays one of the following VLAN configuration options: • Access mode — Supports MAC address and MAC group classification. • Trunk mode • Add — Adds VLAN IDs to the port profiles. • Remove — Deletes VLAN IDs to the port profiles. • All — Indicates that the port profile allows all VLAN IDs. • None — Indicates that the port profile does not allow any VLAN IDs.
IP device properties Field/Component E Description QoS tab — Non-DCB mode (Ethernet Pause and Ethernet PFC) Mode The mode of Quality of Service (QoS) assigned to the port (non-DCB). Flow Control The Ethernet priority flow control mode of the port. The default flow control mode is Off. Possible modes are as follows: • Off • 802.3x pause • Tx On or Off • Rx On or Off • Priority Flow Control. For this mode, the Tx and Rx values for each CoS display in the table.
E IP device properties Field/Component Fabric and Edge Ports properties Description • • • • • • • • • • • • • • • • 1324 Identifier — The identifier of the port. Name — The name of the port. This is an editable field. Enter a name (up to 64 characters) for the port. MAC Address — The MAC address of the port. Port Status — The status of the port. Port State — The state of the port. Type — The port type. Speed — The speed of the port. L2/Tag Mode — Indicates whether L2 tag mode is enabled or disabled.
IP device properties Field/Component FC Ports properties Description • • • • • • • • • • • • • • • • • • • • • Brocade Network Advisor IP User Manual 53-1003056-01 E Identifier — The identifier of the port. Name — The name of the port. This is an editable field. Enter a name (up to 64 characters) for the port. WWN — The world wide name of the device. FC Address — The Fibre Channel address. Each FC port has both an address identifier and a world wide name. Status — The operational status.
E Host properties Field/Component Description SFP/Port Optics Click to view the SFP/Port Optic information: • TX Power — The power transmitted to the SFP in dBm and uWatts. • RX Power — The power received from the port in dBm and uWatts. • Transceiver Temp (C) — The temperature of the SFP transceiver. • Voltage (mVolts) — The voltage across the port in mVolts. • Transceiver Current (mAmps) — The laser bias current value in mAmps.
Host properties E Viewing adapter port properties To view adapter port properties, complete the following steps. 1. Right-click an HBA icon and select Show Ports. 2. Right-click the port and select Properties, or double-click the port. Fields containing a green triangle ( ) in the lower right corner are editable. The HBA_Port Properties dialog box displays. Table 31 details the properties of the selected port.
E Host properties TABLE 31 Adapter port properties (Continued) Field Description WWN Source The source of the world wide name. Options include: Fabric — The WWN is assigned from the fabric. The fabric assigned address must be enabled. Factory — The WWN is assigned at the factory. Configuration Configured State Indicates whether the port is enabled or disabled. Max Bandwidth The maximum allowable bandwidth output for the selected port.
Properties customization TABLE 31 E Adapter port properties (Continued) Field Description Total BB Credit The total number of buffer credits. Priority Levels Lists the available priorities (High, Medium, Low). Add button Click to add a user-defined property. For more information, refer to “Adding a property field” on page 1329. Edit button Click to edit a user-defined property. For more information, refer to “Editing a property field” on page 1330.
E Properties customization The label must be unique and can be up to 30 characters. The description can be up to 126 characters. 5. Select Port or Property from the Type list, if available. 6. Click OK. The new property displays in the properties list as well as the Product List. To edit the user-defined property field, click in the field and make your changes. Editing a property field NOTE Properties customization requires read and write permissions to the Properties - Add / Delete Columns privilege.
Properties customization E 4. Click Yes on the confirmation message. The property you selected is deleted. Editing a property field directly You can edit fields containing a green triangle ( complete the following steps. ) in the lower right corner. To edit a field, 1. Right-click any product icon and select Properties. The Properties dialog box displays. 2. Select the tab on which you want to edit a field. Fields containing a green triangle ( ) in the lower right corner are editable. 3.
E 1332 Properties customization Brocade Network Advisor IP User Manual 53-1003056-01
Appendix F Regular Expressions In this appendix This appendix presents a summary of Unicode regular expression constructs that you can use in the Management application. • Characters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Character classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Predefined character classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
F Regular Expressions TABLE 1 Matches \e The escape character ('\u001B') \cx The control character corresponding to x TABLE 2 Character classes Construct Matches [abc] a, b, or c (simple class) [^abc] Any character except a, b, or c (negation) [a-zA-Z] a through z or A through Z, inclusive (range) [a-d[m-p]] a through d, or m through p: [a-dm-p] (union) [a-z&&[def]] d, e, or f (intersection) [a-z&&[^bc]] a through z, except for b and c: [ad-z] (subtraction) [a-z&&[^m-p]] a through z
Regular Expressions TABLE 4 POSIX character classes (US-ASCII only) Construct Matches \p{Blank} A space or a tab: [ \t] \p{Cntrl} A control character: [\x00-\x1F\x7F] \p{XDigit} A hexadecimal digit: [0-9a-fA-F] \p{Space} A whitespace character: [ \t\n\x0B\f\r] TABLE 5 java.lang.Character classes (simple java character type) Construct Matches \p{javaLowerCase} Equivalent to java.lang.Character.isLowerCase() \p{javaUpperCase} Equivalent to java.lang.Character.
F Regular Expressions TABLE 8 Construct Matches X? X, once or not at all X* X, zero or more times X+ X, one or more times X{n} X, exactly n times X{n,} X, at least n times X{n,m} X, at least n but not more than m times TABLE 9 Reluctant quantifiers Construct Matches X?? X, once or not at all X*? X, zero or more times X+? X, one or more times X{n}? X, exactly n times X{n,}? X, at least n times X{n,m}? X, at least n but not more than m times TABLE 10 Possessive quantifiers Co
Regular Expressions TABLE 12 F Back references Construct Matches \n Whatever the nth capturing group matched Quotation \ Nothing, but quotes the following character \Q Nothing, but quotes all characters until \E \E Nothing, but ends quoting started by \Q TABLE 13 Special constructs (non-capturing) Construct Matches (?:X) X, as a non-capturing group (?idmsux-idmsux) Nothing, but turns match flags on–off (?idmsux-idmsux:X) X, as a non-capturing group with the given flags on–off (?=X)
F 1338 Regular Expressions Brocade Network Advisor IP User Manual 53-1003056-01
Appendix G CLI Templates In this appendix The Management application provides preconfigured Configuration templates for IronWare and Network OS devices. By default, all preconfigured templates are configure to prompt for additional targets during manual deployment. The preconfigured templates include the following: • HyperEdge – Stack Enable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • HyperEdge – Stack Disable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
G CLI Templates • Network OS – Configure RX Symbol Errors Monitor . . . . . . . . . . . . . . . . . • Network OS – Configure Standard L2 Access List . . . . . . . . . . . . . . . . . . • Network OS – Create CoS Mutation Map. . . . . . . . . . . . . . . . . . . . . . . . . . • Network OS – Create LLDP Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Network OS – Create Port Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Network OS – Create Traffic Class Map . .
CLI Templates G • IronWare OS VLAN – Configure virtual routing interface . . . . . . . . . . . . 1353 • IronWare OS VLAN – Enable Spanning Tree Protocol on IOS VLAN . . . . 1353 • IronWare OS VLAN – Disable Spanning Tree Protocol on IOS VLAN. . . . 1354 • Network OS VLAN – VLAN Interface Creation . . . . . . . . . . . . . . . . . . . . . 1354 • Network OS VLAN – VLAN Interface Deletion . . . . . . . . . . . . . . . . . . . . . 1354 • Network OS VLAN – Layer2 Switch Port Configuration . . . . . . . . . . .
G CLI Templates TABLE 19 Feature HyperEdge – Stack Trunk Deletion Description HyperEdge To delete stacking trunks.
CLI Templates TABLE 27 IronWare OS – Configure L2-Access-List Feature Description CLI Commands ACL access-list $ deny $ $ any access-list $ deny any $ $ access-list $ permit $ $ any access-list $ permit any any no access-list $ permit any any no access-list $ permit $ $ any
G CLI Templates TABLE 31 Feature Description CLI Commands MCT Delete cluster. no cluster $ $ no vlan $ no vlan $ TABLE 32 MCT Client Creation Feature Description CLI Commands MCT Create a cluster client.
CLI Templates TABLE 36 G MPLS – Endpoint Configuration Feature Description CLI Commands MPLS Used to configure MPLS endpoints. Disable FDP, CDP as they are not supported in MPLS endpoints.
G CLI Templates TABLE 39 Network OS – Configure Extended L2 Access List Feature Description CLI Commands ACL This template is used to configure an extended L2 ACL on Network OS products running 3.0 or later.
CLI Templates TABLE 42 G Network OS – Configure RX Missing Terminations Characters Monitor Feature Description CLI Commands Network OS This template is used to configure threshold and alert values for RX Missing Termination Characters monitoring. Possible values for timebase are day, hour, minute and none. Buffer value cannot be more than average of high plus low threshold. Supported Values for High and Low Threshold Action Parameters are email, raslog, all, and none.
G CLI Templates TABLE 46 Feature Description CLI Commands QoS This template is used to create LLDP profile and configure LLDP profile parameters protocol lldp profile $ description $ hello $ multiplier $ advertise dcbx-fcoe-logical-link-tlv advertise dcbx-fcoe-app-tlv TABLE 47 Network OS – Create Port Profile Feature Description CLI Commands AMPP Creates the port profile and its sub profile.
CLI Templates TABLE 50 G Network OS – Create VLAN Classifier Rule Feature Description CLI Commands QoS This template is used to create a protocol-based or MAC address-based VLAN classifier rule vlan classifier rule $ $ TABLE 51 Network OS – Delete Port Profiles Feature Description CLI Commands AMPP Removes the port profile.
G CLI Templates TABLE 55 Feature Description CLI Commands VLAN To configure PVLAN type (Isolated, community or primary) to a VLAN. interface vlan $
CLI Templates TABLE 62 G Private VLAN – Map primary and secondary VLAN to promiscuous port Feature Description CLI Commands VLAN To assign Primary Vlan to Promiscuous port. This command also maps a Promiscuous port to selected secondary VLANs.
G CLI Templates TABLE 68 Feature Description CLI Commands VLAN To display the private vlan status. show vlan private-vlan TABLE 69 VRF – VRF Creation Feature Description CLI Commands VRF To create VRF in specific RBridge. rbridge-id $ vrf $ TABLE 70 VRF – VRF Deletion Feature Description CLI Commands VRF To delete VRF from specific RBridge.
CLI Templates TABLE 75 VRF – Display VRF Information Feature Description CLI Commands VLAN To display the VRF details. show vrf detail show vrf rbridge-id $ show vrf $ TABLE 76 IronWare OS VLAN – Remove interfaces from VLAN as untagged Feature Description CLI Commands VLAN To remove interfaces from the VLAN as untagged.
G CLI Templates TABLE 84 Feature Description CLI Commands VLAN To disable spanning tree protocol on VLAN. vlan $ no spanning-tree TABLE 85 Network OS VLAN – VLAN Interface Creation Feature Description CLI Commands VLAN To create a VLAN Interface. interface vlan $ TABLE 86 Network OS VLAN – VLAN Interface Deletion Feature Description CLI Commands VLAN To delete a VLAN Interface.
CLI Templates TABLE 91 G Network OS VLAN – Disable Native VLAN Configuration Feature Description CLI Commands VLAN To disable native VLAN from a trunk interface. interface tengigabitethernet $ no switchport trunk native-vlan $ TABLE 92 Network OS VLAN – Access Interface Configuration Feature Description CLI Commands VLAN To configure the interface as an access interface.
G 1356 CLI Templates Brocade Network Advisor IP User Manual 53-1003056-01
Appendix H Troubleshooting In this chapter • Application Configuration Wizard troubleshooting . . . . . . . . . . . . . . . . . • Browser troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Client browser troubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . • Configuration backup and restore troubleshooting . . . . . . . . . . . . . . . . • Element Manager troubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
H Application Configuration Wizard troubleshooting Application Configuration Wizard troubleshooting The following section states a possible issue and the recommended solution for Management application Configuration Wizard errors. Problem Resolution Unable to launch the Management application Configuration Wizard on a Windows Vista, Windows 7,or Windows 2008 R2 system The Windows Vista, Windows 7,or Windows 2008 R2 system enables the User Access Control (UAC) option by default.
Client browser troubleshooting H Client browser troubleshooting The following section states a possible issue and the recommended solution for client browser errors. Problem Resolution Downloading Client from a Internet Explorer Browser over HTTPS • If the JNLP file does not launch automatically, use one of the following options: Complete the following steps. 1 Save the JNLP file to the local host. 2 Launch the JNLP file manually. • In Internet Explorer 7, complete the following steps.
H Firmware download troubleshooting Problem Resolution Unable to launch Element Manager from the Management application. To launch Element Manager from the Management application, your local system's browser must run the Java Web Start application. To turn on Java content in the browser, complete the following steps. 1 Launch Java Control Panel. For Windows: Refer to http://java.com/en/download/help/win_controlpanel.xml. For Linux: Follow the steps listed. a Open the Terminal window.
Firmware download troubleshooting H Problem Resolution Firmware download using SCP/SFTP does not work because of one of the following issues: • For internal SCP/SFTP server, the application was uninstalled and reinstalled without migration • For external SCP/SFTP server, the SSH handshake keypair is changed - manually - due to an external server reinstall - due to the SCP/SFTP server preference (Options dialog box) being changed from built-in to external (installed on same machine) or vice versa Clear
H Launch Client troubleshooting Launch Client troubleshooting The following section states a possible issue and the recommended solution if you are unable to launch the remote client. Problem Resolution Remote client does not upgrade from versions prior to 11.0. The remote client does not automatically upgrade when you select the remote client shortcut of client versions earlier than 11.0. To clear the old client and launch the new remote client version, complete the following steps.
Master Log and Switch Console troubleshooting H Problem Resolution Unable to log into the Client (the application does not launch when you use a valid user name and password and exceptions are thrown in the client side). Use one the following procedures to configure the IP address in the host file. Windows operating systems 1 Log in using the 'Administrator' privilege. 2 Select Start > Run. 3 Type drivers in the Open field and press Enter.
H Patch troubleshooting Problem Resolution Too many login and log messages received on switch console and and Master Log due to lazy polling. NOTE: This setting cannot be disabled for DCB switches. To disable lazy polling, complete the following steps. 1 Select Discover > IP Products. The Discover Setup - IP dialog box displays. 2 Click the Global Settings tab. 3 Click the Preferences tab. 4 Clear the Enable lazy polling check box. 5 Click Apply to save your work.
Professional edition login troubleshooting H Professional edition login troubleshooting The following section states a possible issue and the recommended solution for Professional edition login errors. TABLE 96 Professional edition login troubleshooting Problem Resolution Login Failed. Only one client allowed. One client session is active or has not yet timed out.
H Server Management Console troubleshooting Server Management Console troubleshooting The following section states a possible issue and the recommended solution for server management console errors. Problem Resolution Unable to launch the SMC on a Windows Vista,Windows 7 , or Windows 2008 R2 system The Windows Vista,Windows 7,or Windows 2008 R2 system enables the User Access Control (UAC) option by default. When the UAC option is enabled, the SMC cannot launch.
Supportsave troubleshooting H Problem Resolution Unable to launch the SMC on a Windows Vista or Windows 7 system continued Disable using the Group Policy by completing the following steps. You can perform this procedure on you local machine using Local Group Policy editor or for many computers at the same time using the Active Directory-based Group Policy Object (GPO) editor. To disable using the Local Group Policy editor, complete the following steps.
H Technical support data collection troubleshooting Technical support data collection troubleshooting The following section states a possible issue and the recommended solution for technical support data collection errors.
Zoning troubleshooting TABLE 97 H Wireless troubleshooting Problem Master log warning message The Management application successfully registers itself as syslog recipient on the wireless controller as the secondary or ternary recipient (primary slot is already occupied). The wireless controller sends syslog messages to secondary or ternary recipients only if primary recipient is not reachable.
H 1370 Zoning troubleshooting Brocade Network Advisor IP User Manual 53-1003056-01
Appendix I Database Fields In this appendix • Database tables and fields. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1371 • Views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1601 Database tables and fields NOTE The primary keys are marked by an asterisk (*) TABLE 16 ACH_CALL_CENTER Field Definition Format ID * Unique generated database identifier. int NAME Name of the Call Center.
I Database tables and fields TABLE 18 Definition Format Size TYPE Type of the event. varchar 256 CONTRIBUTOR_PATTERN Indicates the Contributor pattern to be used for searching the event contributor in event description. In some cases, FOS uses same message id for different events (e.g MAPS events). To increase the filtering capability of Call Home events, this contributor pattern string is used along with message id.
I Database tables and fields TABLE 23 ADAPTER_DRIVER_FILE_DETAILS Field Definition Format ID Unique generated database identifier.
I Database tables and fields TABLE 27 AOR_DEVICE_MAP Field Definition Format AOR_ID ID of AOR int DEVICE_ID The DEVICE ID can be IP Product or ServerIron ID which is in the AOR int TABLE 28 AOR_FABRIC_MAP Field Definition Format AOR_ID ID of AOR int FABRIC_ID FABRIC ID which is in the AOR int TABLE 29 Definition Format AOR_ID ID of AOR int HOST_ID HOST ID which is in the AOR int Definition Format AOR_ID ID of AOR int PORT_GROUP_ID IP of port group int Definition For
I Database tables and fields TABLE 33 AVAILABLE_FLYOVER_PROPERTY Field Definition Format ID* Unique generated database identifier. int NAME Name of the available property to be included in the flyover display. varchar TYPE Indicates the flyover property type. Product property is 0, Connection property is 1, User Defined property is 2, Cee Product property is 3, Cee Connection property is 4, Host property is 5.
I Database tables and fields TABLE 35 BIRTREPORT_RUN_TEMPLATE (Continued) Field Definition Format Size REPORT_TEMPLATE_TITLE Report Template title. This name is the same as the title name in the REPORT_TEMPLATE table. There is no foreign key relation here as the user may delete and add a template but the schedule should still hold good if looked up by title. Also title is unique in the REPORT_TEMPLATE table. varchar 256 NAME Name of the generated report file.
I Database tables and fields TABLE 38 BOOT_IMAGE_FILE_DETAILS_ (Continued) Field Definition Format MAJOR_VERSION Major Version bit from Boot Image file smallint MINOR_VERSION Minor Version bit from Boot Image file smallint MAINTENANCE Maintenance Version bit from Boot Image file smallint PATCH Patch Version bit from Boot Image file varchar IMPORTED_DATE Imported date of Boot Image file timestamp RELEASE_DATE Release date of Boot Image file timestamp Size 32 RELEASE_NOTES_LOCATI Re
I Database tables and fields TABLE 42 CARD (Continued) Field Definition Format Size EQUIPMENT_TYPE The type of the blade. It is either SW BLADE or CP BLADE. varchar 32 STATE State of the blade, such as ENABLED or DISABLED. varchar 32 POWER_STATE State of power supply to the blade. varchar 16 varchar 32 ATTN_STATE SERIAL_NUMBER Factory serial number of the blade.
I Database tables and fields TABLE 42 CARD (Continued) Field Definition Format Size ETHERNET_IPV6_GATEWAY IPV6 Gateway address of Ethernet management port for the blade. varchar 64 NUMBER_OF_PORTS int HEADER_VERSION The OEM or vendor-assigned version number. int GIGE_MODE Determines the port operating mode for GE ports. 0 - 1G 1 - 10G 2 - Dual mode 3 - Failover mode Default value -1 means it is not applicable.
I Database tables and fields TABLE 47 CEE_PORT Field Definition Format ID Unique generated database identifier.
I Database tables and fields TABLE 48 CFG_BACKUP_ARCHIVE (Continued) Field Definition Format Size DATE_TIME The date and time at which the configuration has been backedup. The date and time will be saved in the following format "Mon May 10 17:59:13 PDT 2010". varchar 64 varchar 64 FILE_NAME IS_BASELINE Indicates if the configuration file is selected by user as baselined configuration or not. num (1,0) DESCRIPTION Brief comments and description about this configuration.
I Database tables and fields TABLE 50 CLI_TEMPLATE (Continued) Field Format Size DEVICE_PASSWORD varchar 256 DATE_TIME varchar 64 DEVICE_ENABLE_USERNA ME varchar 256 DEVICE_ENABLE_PASSWOR D varchar 256 CLI_FILTER varchar HAS_PARAMETERS num (1,0) PROMPT_ADDITIONAL_TAR GET The flag to indicate whether or not to prompt for additional targets during deployment. 1 = Prompt for additional targets. 0 =Do not prompt for additional target.
I Database tables and fields TABLE 52 CLIENT_VIEW_COLUMN Field Definition Format ID * Unique generated database identifier. int NAME Name of the column. It is used as column header in product list and property name in property sheet(SAN and IP) varchar 255 ENTITY_CATEGORY Holds the type of the entity to whom the column name belongs to like Port, Fabric, IPProduct, VCSInterface, etc' varchar 128 COLUMN_INDEX Used to differentiate user defined columns and static columns.
I Database tables and fields TABLE 57 Field Definition Format ID ID of the Eth port int ETH_DEV Ethernet device varchar ETH_LOG_LEVEL Log level for the Ethernet device. Possible values are 0 - Log Invalid 1 - Log Critical 2 - Log Error 3 - Log Warning 4 - Log Info int NAME Name of the port varchar 256 MAC_ADDRESS MAC Address varchar 64 IOC_ID IO controller ID. The default value is 0. varchar 64 HARDWARE_PATH Hardware path of the port varchar 256 STATUS Status of the Eth port.
I Database tables and fields TABLE 59 CNA_ETH_PORT_CONFIG (Continued) Field Definition Format Size MAX_BANDWIDTH Maximum guaranteed bandwidth. Value will be in Gbps (1 to 10). varchar 64 MIN_BANDWIDTH Minimum guaranteed bandwidth. Value will be in Gbps (0 to 10). int PORT_NUMBER Physical port number of adapter. int PORT_TYPE Type of this port. For example, ETH. varchar CREATION_TIME Creation time of this DB record.
I Database tables and fields TABLE 62 Field Definition Format COLLECTOR_MIB_OBJECT_ ENTRY_ID Primary key autogenerated ID. int COLLECTOR_ID ID of the PERF_COLLECTOR. int MIB_OBJECT_ID MIB_OBJECT table DB ID. int TABLE 63 Definition Format COLLECTOR_SNMP_EXPRE SSION_ENTRY_ID Primary key autogenerated ID. int COLLECTOR_ID ID of the PERF_COLLECTOR. int EXPRESSION_ID Id of the SNMP_EXPRESSION.
I Database tables and fields TABLE 66 CONFIG_CONDITION Field Definition Format ID Condition ID. int NAME Name of the condition. varchar 255 DESCRIPTION Description of the condition. varchar 1024 REMEDIATION Remediation details for failed conditions. text USE_REGEX Indicates whether the condition lines are built with regular expression or not.
I Database tables and fields TABLE 67 1388 CORE_SWITCH (Continued) Field Definition Format UNREACHABLE_TIME Time when the switch becomes unreachable. timestamp OPERATIONAL_STATUS Chassis operational status like FRU, Power Supply etc.. varchar CREATION_TIME Core switch record creation time. This tells us when the intial discovery has happened. timestamp LAST_SCAN_TIME Last scan time tells the time when the last time the switch was polled.
I Database tables and fields TABLE 67 CORE_SWITCH (Continued) Field Definition Format Size NAT_PRIVATE_IP_ADDRESS NAT private IP Address. Feature available from NMS DC Eureka release onwards. During a successful NAT translation the Private IP that gets translated will be stored in this field. The new translated IP Address will be stored in the existing IP_ADDRESS field. All the NAT look up will be done using the NAT Private IP Address.
I Database tables and fields TABLE 71 CORE_SWITCH_DETAILS (Continued) Field Definition Format Size FC_MASK FC IP Address ethernet mask. char 64 FC_IP Fibre Channel IP address. char 64 FC_CERTIFICATE FC IP Address. smallint SW_LICENSE_ID License ID of the chassis. char 23 SUPPLIER_SERIAL_ NUMBER Supplier serial number for the switch. varchar 32 PART_NUMBER Partnumber of the switch varchar 32 CHECK_BEACON Denotes if Switch Beacon is enabled or not on the switch.
I Database tables and fields TABLE 71 CORE_SWITCH_DETAILS (Continued) Field Definition Format Size VENDOR_VERSION Required by integrated SMI agent to populate Brocade_Product.Version property. varchar 32 VENDOR_PART_NUMBER Required by integrated SMI agent to populate Brocade_Product.SKUNumber property. varchar 32 SNMP_INFORMS_ENABLED Flag to denote whether SNMP informs option in the switch is enabled or disabled. Default value is 0.
I Database tables and fields TABLE 73 CRYPTO_LUN Field Definition Format ID Unique generated database identifier. int CRYPTO_TARGET_CONTAI NER_ID Foreign key reference to the CRYPTO_TARGET_CONTAINER that contains the host for which these LUNs are configured. int SERIAL_NUMBER The LUN serial number, used to identify the physical LUN. varchar ENCRYPTION_STATE Boolean. • True (1) if LUN is being encrypted. • False (0) if cleartext. The default value is 0.
I Database tables and fields TABLE 73 CRYPTO_LUN (Continued) Field Definition Format DECRYPT_EXISTING_DATA Not used. When configuring disk LUN that was previously encrypted and is to become cleartext, this property tells the switch whether or not to start a re-keying operation to decrypt the existing LUN data. This property does not need to be persisted. This feature is no longer supported in FOS. smallint KEY_ID Hex-encoded binary key vault ID for the current data encryption key for this LUN.
I Database tables and fields TABLE 73 Definition Format Size NEW_LUN_TYPE This field indicates the role of the LUN configured in the SRDF mode. The values could be R1, R2 or UNKNOWN. Feature available only from 6.4 release onwards and for RSA key vaults. CryptoLuncollector fills in this value. varchar 64 DISABLE_WRITE_EARLY_A CK This variable indicates whether write early acknowledgement is enabled (if value is 0) or disabled (if value is 1).
I Database tables and fields TABLE 74 CRYPTO_SWITCH (Continued) Field Definition Format PRIMARY_VAULT_LINK_ STATUS The status of the link key for the primary key vault. Link keys are used only for NetApp LKM key vaults. For possible values, see the enum definition in the DTO class. Default value is 0. smallint BACKUP_VAULT_LINK_ STATUS The status of the link key for the backup key vault. Link keys are used only for NetApp LKM key vaults.
I Database tables and fields TABLE 75 Definition Format FAILOVER_STATUS Indicates whether this container''s target is being encrypted by the encryption engine on which the container is configured (value 0) or by another encryption engine in the HA Cluster (value 1). Default value is 0.. smallint FAILOVER_STATUS_2 Failover status from the HA Cluster peer. smallint DEVICE_STATUS The physical target storage device operational status when the virtual initiator last attempted to access the target.
I Database tables and fields TABLE 77 DASHBOARD (Continued) Field Definition Format CREATION_TIME Time when dashboard was created. timestamp LAST_OPENED_TIME Time when dashboard was last opened. timestamp TABLE 78 Size DASHBOARD_CANVAS Field Definition Format ID Dashboard Canvas ID. int NAME Name of the Dashboard canvas. varchar 128 DESCRIPTION Description of the dashboard canvas.
I Database tables and fields TABLE 80 Definition PROVIDER_GROUP The Group to which the Provider belong to. varchar Similar providers will have same group name. PROVIDER_ORDER The order of execution passed to the Job Executor framework. Provider belong to same group will have different order number. Default: 0 TABLE 81 1398 DASHBOARD_PROVIDER Field Format Size 128 int DASHBOARD_WIDGET Field Definition Format Size ID ID of the dashboard widget. Auto incremented.
I Database tables and fields TABLE 81 DASHBOARD_WIDGET (Continued) Field Definition Format installation_type Indicates the widgets is SAN Only (0) / IP Only (1) / SAN_IP (2)' int shared_provider Can the provider be shared? 0 - Not Shared 1 - Shared. int TABLE 82 Size DASHBOARD_WIDGET_PREFERENCE Field Definition Format ID Auto incremented widget preference ID. int WIDGET_ID Foreign Key to DASHBOARD_WIDGET(ID). int USER_ID Foreign Key to USER_ (ID).
I Database tables and fields TABLE 83 Definition Format Size MAIN_MEASURE The Additional measures based on the FAVORITE.MAIN_MEASURE varchar 40 ADDITIONAL_MEASURE The Additional measures based on the FAVORITE.MAIN_MEASURE int TABLE 84 DEFAULT_WIDGET_PREFERENCE Field Definition Format ID Auto incremented Dashboard Widget Preference ID. int dashboard_id Foreign Key to DASHBOARD(ID). int widget_id Foreign Key to DASHBOARD_WIDGET(ID).
I Database tables and fields TABLE 85 DEPLOYMENT_CONFIGURATION (Continued) Field Definition Format SNAPSHOT_ENABLED 1 indicates that snapshot is applied to the configuration smallint CLI_TEMPLATE_ID Identifies the CLI template details.
I Database tables and fields TABLE 87 Definition Format PRODUCT_ID This record will be per product. Hence this will have the id of the product. int PRODUCT_TYPE_ID Foreign Key references TARGET_TYPE(id). This identifies the PRODUCT_ID. (Whether it is switch, device, etc). int STATUS Indicated the product deployment status 1-Aborted 2-Succesful 3-Partial Failure 4-Failed smallint MESSAGE Message to be displayed in the report.
I Database tables and fields TABLE 90 DEPLOYMENT_TARGET_MAP Field Definition Format ID Unique generated database identifier. serial DEPLOYMENT_CONFIGU RATION_ID Foreign Key References DEPLOYMENT_CONFIGURATION (id) Identifies the deployment configuration this row is applied int TARGET_ID Identifies the target.
I Database tables and fields TABLE 91 DEVICE (Continued) Field Definition Format Size TAC_USER_NAME User name for TACACS access. varchar 512 TAC_PASSWORD Password for TACACS access. varchar 512 TACPLUS_USER_NAME User name for TACACS+ access. varchar 512 TACPLUS_PASSWORD Password for TACACS+ access. varchar 512 IS_ROUTER Flag to identify whether the device is router or not. num (1,0) IS_SLB Flag to identify whether the device supports server load balancing or not.
I Database tables and fields TABLE 91 DEVICE (Continued) Field Definition Format Size TAC_USERNAME_PORT_CFG TACACS username for port configuration. varchar 512 TAC_PASSWORD_PORT_CFG TACACS password for port configuration. varchar 512 TAC_USERNAME_READ_ONLY TACACS username for read only access. varchar 512 TAC_PASSWORD_READ_ONLY TACACS password for read only access. varchar 512 TACPLUS_USERNAME_PORT_CFG TACACS+ username for port configuration.
I Database tables and fields TABLE 91 DEVICE (Continued) Field Definition Format Size SYSLOG_REGISTERED This flag is to indicate whether the device is registered DCM as its syslog destination server. • 0 indicates not registered. • 1 indicates registered. num 1 TRAP_REGISTERED This flag is to indicate whether the device is registered DCM as its SNMP trap destination server. • 0 indicates not registered. • 1 indicates registered.
I Database tables and fields TABLE 91 DEVICE (Continued) Field Definition IS_DCB_SWITCH This column is used to flag whether the device is num a DCB Switch or not. Value 0 indicates that this is not a DCB switch device and hence that is the default value and value 1 indicates that this is a DCB device. The values will be populated by the DCB collector during the discovery of the DCB switch. PRODUCT_FAMILY Record the product family as "BI", "EI", "FGS/FLS/STK".
I Database tables and fields TABLE 91 1408 DEVICE (Continued) Field Definition Format Size VCS_ID This column is used to store the VCS ID of the device. The value will be populated by the NosSwitchAssetCollector during the discovery of the VCS Cluster. The non zero value will be stored as VCS ID. Default value is -1. smallint VCS_LICENSED Indicates whether the cluster device has VCS license or not. Possible values are 0 for not applicable, 1 for licensed, 2 for not licensed. 0 is default.
I Database tables and fields TABLE 91 DEVICE (Continued) Field Definition Format Size USER_DEFINED_VALUE_1 User defined value used for product. varchar 256 USER_DEFINED_VALUE_2 User defined value used for product. varchar 256 USER_DEFINED_VALUE_3 User defined value used for product. varchar 256 CLUSTER_MEMBER_STATE Indicates the state of the member in Fabric Cluster and logical chassis. States can be Online, Offline, Rejoining etc.. For all other devices this column will be empty.
I Database tables and fields TABLE 93 1410 DEVICE_ENCLOSURE (Continued) Field Definition Format Size ICON Type of Icon. int OS Operating System. varchar 256 APPLICATIONS Application which created device enclosure. varchar 256 DEPARTMENT Department using this device enclosure. varchar 256 CONTACT Contact person details. varchar 256 LOCATION Location of physical setup. varchar 256 DESCRIPTION Description if any. varchar 256 COMMENT_ Comments if any.
I Database tables and fields TABLE 93 DEVICE_ENCLOSURE (Continued) Field Definition VIRTUALIZATION smallint If this enclosure is a host, this column indicates whether the host is running a virtualization hypervisor. 0 = unknown 1 = no supported hypervisor present 2 = VMware ESX 3 = Microsoft Hyper-V. Default value is 0. MANAGED_ELEMENT_ID A unique managed element ID for a managed host.If the device enclosure is manually created (does not represent a managed host) then the field is null.
I Database tables and fields TABLE 95 DEVICE_FDMI_DETAILS (Continued) Field Definition Format Size MODEL_DESCRIPTION Holds the model description of the device available via FDMI, ex : Brocade-825 varchar 64 NODE_NAME Holds the node name of the device available via FDMI, ex : 20:00:00:05:1e:7c:64:94 varchar 64 TABLE 96 DEVICE_GROUP Field Definition Format DEVICE_GROUP_ID Primary key for this table. int NAME Name of this device group.
I Database tables and fields TABLE 98 DEVICE_GROUP (Continued) Field Definition Format Size DESCRIPTION Device group description. varchar 255 IS_PUBLIC Flag to identify whether this group is shared across users. num (1,0) IS_INTERNAL Flag to identify this group is internal. num (1,0) TABLE_SUBTYPE Table subtype defined by BizObject framework varchar 32 IS_AP_GROUP Flag to identify whether this group is access point device group.
I Database tables and fields TABLE 100 DEVICE_NODE (Continued) Field Definition Format TRUSTED 1 = the node is trusted for "fabric tracking. Default value is 0. smallint CREATION_TIME Timestamp when the record is created by the Management application server. timestamp MISSING 1 = the device node is missing from the fabric. Default value is 0. smallint MISSING_TIME Time when the device node missed. timestamp PROXY_DEVICE One of the device ports of this device node has translated domain.
I Database tables and fields TABLE 101 DEVICE_PORT Field Definition Format MISSING Denotes if this device port is missing or not. smallint MISSING_TIME Denotes the time from which the device port is missing. Applicable only if the device is missing. timestamp NPV_PHYSICAL Denotes if this is physical device port or a logical NPIV port. smallint EDGE_SWITCH_PORT_WWN EDGE_SWITCH_PORT_WWN will be the same as the SWITCH_PORT_WWN except in the case of devices behind the AG.
I Database tables and fields TABLE 104 Field Definition Format ID Primary key of the table. Autogenerated. int TIME_THRESHOLD_CROSSED Holds the timestamp at which the disk space was analyzed and found to have crossed the threshold (both low to high and vice versa). timestamp MEMORY_UTILIZATION Holds the disk usage as a percentage. Value varies from 0 to 100. double precision THRESHOLD_TYPE Denotes whether disk space usage crosses above or below threshold limit.
I Database tables and fields TABLE 105 ENCRYPTION_ENGINE (Continued) Field Definition Format Size SP_CERTIFICATE The public key certificate, in PEM format, for the Security Processor within the Encryption Engine. Used to create link keys for Decru LKM key vaults. varchar 4096 EE_STATE The operational status of this Encryption Engine. For possible values, see the enum defintion in the DTO class The default value is 0.
I Database tables and fields TABLE 106 ENCRYPTION_GROUP (Continued) Field Definition Format DEPLOYMENT_MODE Indicates Transparent (0) or NonTransparent (1) deployment mode. Only Transparent mode is currently supported. All switches in the Encryption Group share the same deployment mode. Transparent mode uses re-direction zones to preserve existing zoning of physical hosts and targets.
I Database tables and fields TABLE 106 ENCRYPTION_GROUP (Continued) Field Definition Format PRIMARY_KEY_VAULT_ID Foreign key reference to the KEY_VAULT record that describes the primary key vault for this Encryption Group. Null if no primary key vault is configured. int BACKUP_KEY_VAULT_ID Foreign key reference to the KEY_VAULT record that describes the backup key vault for this Encryption Group. Null if no backup key vault is configured.
I Database tables and fields TABLE 109 Definition Format ID Unique generated database identifier. int SWITCH_ID No longer used. Tape pools used to belong to specific switches, but are now shared by all switches in an encryption group int ENCRYPTION_ENGINE_ID No longer used.
I Database tables and fields TABLE 111 ETHERNET_ISL (Continued) Field Definition Format TRUSTED Is this ethernet isl link is trusted. smallint, CREATION_TIME Time when the ethernet isl link record is created. timestamp TABLE 112 Size EVENT Field Definition Format ID* Unique generated database identifier for an event. int ME_ID Unique managed element ID used to refer the product that is associated with the event. int SEVERITY Indicates the severity of the event.
I Database tables and fields TABLE 112 EVENT (Continued) Field Definition Format Size EVENT_AUDIT 'Indicates whether this is an audit event or not. varchar 255 EVENT_KEY Unique key for the event. This is a string message key represents message ID from events originated from switch or the predefined message Id for application events in the Management application. varchar EVENT_ACTION_ID Reference to the ID in the EVENT_POLICY table.
I Database tables and fields TABLE 116 EVENT_DETAILS Field Definition Format ID Unique generated database identifier. int EVENT_ID Database ID of the EVENT instance. int FIRST_OCCURRENCE_SWI TCH_TIME Indicates the first occurrence switch timestamp of the event. timestamp LAST_OCCURRENCE_SWIT CH_TIME Indicates the last occurrence switch timestamp of the event. timestamp CONTRIBUTORS Indicates the contributing factor for the event resulted due to a status change of the switch.
I Database tables and fields TABLE 117 EVENT_FWD_FILTER (Continued) Field Definition Format SNORT_ENABLED If Snort Messages enabled smallint PSUDO_ENABLED If Pseudo Events enabled smallint REGULAR_EXP Common filtering message for Syslog Forwarding varchar SEVERITY Emergency(0), Alert(1), Critical(2), Error(3), Warning(4), Notice(5), Info(6), Debug (7). Traps with selected severity and those with higher severity will be forwarded.
I Database tables and fields TABLE 120 EVENT_NOTIFICATION Field Definition ID* Format Size int STATUS Status of Event Notification. value will be 0 if disabled, 1 otherwise. Default value is 0. smallint SERVER_NAME E-mail (SMTP) server name. varchar 256 REPLY_ADDRESS Reply E-mail address. varchar 50 SEND_ADDRESS E-mail address for which a Test E-mail notification is to be sent. varchar 512 SMTP_PORT SMTP Port number. Default value is 25.
I Database tables and fields TABLE 122 EVENT_POLICY (Continued) Field Definition Format STATUS Administrative status of the Event Policy 0 - disabled 1- enabled smallint LAST_MODIFIED_TIME The Severity of the Event that is logged per Event Policy 0- Unknown 1- Emergency 2- Alert 3- Critical 4- Error 5- Warning 6- Notice 7- Info 8- Debug'; timestamp SEVERITY The Event Policy Sub Type Escalation (0), Resolving (1), Flapping (2),Repeating (3). The default value is 0.
I Database tables and fields TABLE 123 EVENT_POLICY_SOURCE_ENTRY (Continued) Field Definition Format Size WWN Node WWN of source varchar 1024 SOURCE_NAME Source Name varchar 1024 TABLE 124 EVENT_PROCESSOR_MAP Field Definition Format Size PROCESSOR_CLASS_NA ME The fully qualified processor class name which will be invoked for the corresponding event id in this table.
I Database tables and fields TABLE 125 EVENT_RULE (Continued) Field Definition Format Size SOURCE_NAME Name of the source. varchar 1024 DESCRIPTION_CONTAINS Description pattern about the rule. varchar 255 LAST_MODIFIED_TIME Rules last edited time. timestamp SELECTED_TIME_UNIT Timestamp unit of the selected rule: • 0 = second • 1 = Minutes • 2 = Hours Default value is 1.
I Database tables and fields TABLE 127 FABRIC (Continued) Field Definition Format TYPE Denotes the type of Fabric. 0 = legacy fabric, 1 = base fabric, 2 = logical fabric, 3 = partial fabric, 4 = ethernet fabric. Default value is 0. smallint SECURE 1 = it is a secured fabric. Default value is 0. smallint AD_ENVIRONMENT 1 = there are user-defined ADs in this fabric. Default value is 0. smallint MANAGED 1 = it is an actively "monitored" fabric; otherwise, it is an "unmonitored" fabric.
I Database tables and fields TABLE 127 Definition Format Size FABRIC The fabric name persisted on switches running FOS 7.0 and later. Not to be confused with NAME, which is store on Network Advisor only. varchar 128 STATUS Overall operational status of the fabric. 0 is unknown, 1 is healthy, 2 is marginal, 3 is down, 5 is Reachable, 6 is unreachable, 7 is Degraded link.
I Database tables and fields TABLE 129 FABRIC_COLLECTION (Continued) Field Definition Format Size SEED_SWITCH_IP IP address of the switch which serves as the seed switch. This is the switch from which above mentioned fabric level collectors get their information. varchar 128 LAST_SEED_SW_ MODIFICATION Timestamp of the seed switch, when the particular HTML page was changed last. Note that this is not when the last time collection was done.
I Database tables and fields TABLE 132 Definition Format TRUSTED 1 = the switch is a trusted member of the fabric. Either found in the initial discovery or user subsequently entrusted the switch by user action. Default Value is 0. smallint CREATION_TIME When the switch became a member. Default Value is ’now()’. timestamp MISSING 1 = it is missing from the fabric. Default Value is 0. smallint MISSING_TIME When it is missed from the fabric; null if the member is entrusted.
I Database tables and fields TABLE 136 FAVORITES (Continued) Field Definition Format Size FROM_TIME The time interval in which the graph is shown. Time interval can be predefined or custom. If FROM_TIME is Custom, the user can choose the number of minutes/hours/days or specify the time interval. varchar 40 CUSTOM_LAST_VALUE The number of minutes/hours/days. It becomes null in two cases. 1. When the value of FROM_TIME is not Custom. 2.
I Database tables and fields TABLE 139 1434 FCIP_TUNNEL Field Definition Format Size ID* Unique generated database identifier. int TUNNEL_ID Tunnel ID for that GigE Port. smallint VLAN_TAG VLAN Tag on the tunnel (if present). Default value is -1. int SOURCE_IP Source IP on which the tunnel is created. char 64 DEST_IP Destination IP on the other end of tunnel. char 64 LOCAL_WWN Local port WWN for the tunnel. char 23 REMOTE_WWN_RESTRICT Remote Port WWN for the tunnel.
I Database tables and fields TABLE 139 FCIP_TUNNEL (Continued) Field Definition Format FICON_TAPE_MAX_WRITE_ CHAIN The Value for FICON_TAPE_MAX_WRITE_CHAIN on the tunnel. Default value is -1. int FICON_OXID_BASE The Value for FICON_OXID_BASE on the tunnel. Default value is -1. int FICON_XRC_EMULATION_E NABLED Whether Xrc_Emulation is enabled on that tunnel. Default value is 0. smallint FICON_TW_EMUL_ENABLE D Whether Ficon_Tape_Write_Emulation is enabled on that tunnel. Default value is 0.
I Database tables and fields TABLE 139 Definition Format Size AUTH_KEY This is the preshared-key to be used during IKE authentication. varchar 128 CONNECTED_COUNT Active connections count. Default value is 1. smallint TUNNEL_STATUS_STRING Tunnel Status string value from switch for the tunnel. varchar COMPRESSION_MODE Compression mode value (0,1,2,3). Default value is 0. smallint TURBO_WRITE_ENABLED Whether turbo write (fast write) is enabled or not (0,1). Default value is 0.
Database tables and fields TABLE 140 I FCIP_TUNNEL_CIRCUIT (Continued) Field Definition Format IPSEC_POLICY_NUM The IPSEC Policy on the circuit'. The default value is -1 int PRESHARED_KEY The preshared Key on the circuit char( 32 SOURCE_IP SOURCE_IP of the circuit varchar 64 DEST_IP DESTINATION_IP of the circuit varchar 64 VLAN_TAG VLAN Tag of the circuit. The default value is -1 int SELECTIVE_ACK Select acknowledgement flag.The default value is 0.
I Database tables and fields TABLE 140 1438 FCIP_TUNNEL_CIRCUIT (Continued) Field Definition Format Size SECURITY_FLAG Security Flag associated with the circuit. The default value is 0. int DSCP_CONTROL Diffserve marking for control frame. The default value is 0. int CIRCUIT_STATUS Status of the circuit. The default value is 0. smallint ENABLED Is circuit enabled. Default: 0, Values: 0|1. The default value is 0.
I Database tables and fields TABLE 141 FCIP_TUNNEL_PERFORMANCE Field Definition Format TUNNEL_ID Primary key of the Switch Port int SWITCH_ID The number of octets or bytes that have been transmitted by this port. One second periodic polling of the port. This value is saved and compared with the next polled value to compute net throughput. Note, for Fibre Channel, ordered sets are not included in the count int TX 'The number of octets or bytes that have been transmitted by this port.
I Database tables and fields TABLE 142 Field Definition Format DEVICE_NODE_ID The primary key of the DeviceNode. int DIRECT_ATTACH Indicates whether the fcoe device is directly attached to the switch''s TE port or to a cloud. smallint ATTACH_ID The primary key of the port (if direct attached) or cloud (if not direct attached). int MAC_ADDRESS Mac address of device. varchar 64 Size TABLE 143 Size FCR_ROUTE Field Definition Format ID* Unique generated database identifier.
I Database tables and fields TABLE 146 FEATURES_USAGE (Continued) Field Definition Format USAGE_COUNT Count shows how many times the feature is accessed. int FIRST_UPDATED_TIME Identifies the first updated time stamp. timestamp TABLE 147 Size FICON_DEVICE_PORT Field Definition Format DEVICE_PORT_ID* Value for the device port to which these FICON properties are applied. int TYPE_NUMBER Size varchar 16 MODEL_NUMBER Ficon device model number, such as S18.
I Database tables and fields TABLE 149 Field Definition Format FIRMWARE_ID* ID for the firmware file. int SWITCH_TYPE* Switch type that supports this firmware file. smallint REBOOT_REQUIRED Reboot required flag for the switch type. smallint NUMFILES Number of files in the firmware. int TABLE 150 Size FOUNDRY_DEVICE Field Definition Format DEVICE_ID Database ID of the DEVICE instance. int IMAGE_VERSION Firmware image version currently running in the device.
I Database tables and fields TABLE 151 FOUNDRY_MODULE (Continued) Field Definition Format Size EXPANSION_MODULE_TYPE Expansion board type. Refer snAgentBrdExpBrdId in foundry.mib for more details and possible values. num (4,0) EXPANSION_MODULE_DESCRIPTION The expansion board description string. Expansion board are those boards attaching on the main board. varchar 128 TABLE 152 FOUNDRY_PHYSICAL_DEVICE Field Definition Format PHYSICAL_DEVICE_ID Unique generated identifier.
I Database tables and fields TABLE 156 FRU Field Definition Format ID Unique generated database identifier. int CORE_SWITCH_ID int TAG provides the TAG number of FRU element, requested by SMIA and values filled in by Switch Asset Collector. Field probably contains information such as asset tag or serial number data.
I Database tables and fields TABLE 156 FRU (Continued) Field Definition Format TOTAL_OUTPUT_POWER provides the total power output of the power supply FRU element, requested by SMIA and values filled in by Switch Asset Collector will be available only from FOS 6.4 switches and above. this field is applicable only for the power supply FRU element. The default value is -1.
I Database tables and fields TABLE 158 Definition Format Size EFCM_USER Management application user who has generated this report. varchar 128 REPORT_OBJECT Report object BLOB. bytea TIMESTAMP_ Timestamp when the report is generated. timestamp FABRIC_NAME Fabric Name. varchar 256 Field Definition Format Size ID* Unique generated database identifier. int SWITCH_PORT_ID ID for the GigE Port in SWITCH_PORT. int PORT_NUMBER GigE Port Number(0 for ge0 and 1 for ge1).
I Database tables and fields TABLE 160 GIGE_PORT_ETHERNET_CLOUD_LINK Field Definition Format ID Unique generated database identifier. int CLOUD_ID int SWITCH_PORT_ID The unique id of the switch TE port that this member connects to. int TRUSTED smallint CREATION_TIME timestamp MISSING smallint MISSING_TIME timestamp TABLE 161 GIGE_PORT_STATS Field Definition Format ID* Unique generated database identifier. int SWITCH_ID References the ID in CORE_SWITCH table.
I Database tables and fields TABLE 164 Field Definition Format ID Unique generated database identifier. serial NAME User-supplied name for the HA Cluster. varchar ENCRYPTION_GROUP_ID Foreign key reference to the ENCRYPTION_GROUP that contains this HA Cluster. int MEMBER_LIST A comma-separated list of Encryption Engines in the HA Cluster. Each engine is identified by a switch node WWN, followed by "/", followed by the slot number.
Database tables and fields TABLE 165 I HBA (Continued) Field Definition Format Size BIOS_VERSION The version level of the BIOS varchar 256 PCI_REG_VENDOR_ID The identifier of the PCI Register''s vendor varchar 32 PCI_REG_DEVICE_ID The device ID of the PCI Register varchar 32 PCI_REG_SUBSYSTEM_ID The ID of the PCI subsystem varchar 32 PCI_REG_SUBSYS_VENDOR_ID The ID of the PCI subsystem vendor.
I Database tables and fields TABLE 165 Definition Format Size VPD_PW PW details of the device varchar 32 VPD_EDC EDC details of the device varchar 32 VPD_MDC MDC details of the device varchar 32 VPD_FABRIC_GEOGRAPHY FABRIC_GEOGRAPHY of the device varchar 256 VPD_LOCATION LOCATION of the device varchar 256 VPD_MANUFACTURER_ID MANUFACTURER_ID of the device varchar 256 VPD_PCI_GEOGRAPHY PCI_GEOGRAPHY of the device varchar 256 VPD_VENDOR_DATA VENDOR_DATA of the device varchar
I Database tables and fields TABLE 167 HBA_PORT (Continued) Field Definition Format OPERATING_TOPOLOGY The topology setting at which the port is operating. The default value is 1. int SUPPORTED_FC4_TYPES List of supported FC4 types for this port. varchar 32 SUPPORTED_COS Supported Class of Service (COS) for this port. varchar 32 TRUSTED Denotes whether port is trusted or not. 0 denotes untrusted and 1 is for trusted. smallint CREATION_TIME HBA port record creation time.
I Database tables and fields TABLE 168 HBA_PORT_DETAIL Field Definition Format DEVICE_PORT_ID Device port id acts as the primary key int PERSISTENT_BINDING Persistent binding value of the port. With persistent binding (on the host), one can bind a LUN to a specific device file, thus making sure devices reappear on the same device files after reboots. 0 – disable 1 – enabled smallint FABRIC_NAME Principal switch WWN of the Fabric to which the port is associated with.
I Database tables and fields TABLE 168 HBA_PORT_DETAIL (Continued) Field Definition Format MPIO_MODE_STATE Indicates whether multipathing mode is on or off.. The default value is 0. smallint PATH_TIME_OUT The value between 0 to 60 that specifies the time out session. Note you can only enable or edit the path time out when MPIO is disabled. int Size The default value is 0. LOGGING_LEVEL The port logging level. Values include Log Critical, Log Error, Log Warning, and Log Info.
I Database tables and fields TABLE 168 HBA_PORT_DETAIL (Continued) Field Definition Format Size MEDIA media of port varchar 64 IOC_ID IO controller ID int PREBOOT_DISABLED Boolean value indicating if port was disabled during preboot.. The default value is 0. smallint ALARM_WARNING A bit mask indicating degrading SFP if the bit mask has any 1s in it. It bit mask is all 0s then SFP is in good state. varchar IO_EXEC_THROTTLE_MAX Maximum value is 2000.
I Database tables and fields TABLE 170 HBA_PORT_FCOE_DETAILS (Continued) Field Definition Format Size FCF_FCMAP FC Map value of port. Currently not used. varchar 256 FCF_FPMA_MAC FPMA (fabric-provided MAC address) MAC address of port. Currently not used. varchar 64 FCF_MAC FCF (FCoE Forwarder) MAC value of port. varchar 64 FCF_MODE FCF (FCoE Forwarder) Mode of the port. Currently not used. varchar 256 FCF_NAMEID FCF (FCoE Forwarder) Name of the port currently Not used.
I Database tables and fields TABLE 171 1456 HBA_REMOTE_PORT Field Definition Format Size ID Autogenerate primary column. int SYMBOLIC_NAME The symbolic name associated with the remote port. varchar 256 PORT_WWN The world wide name of the remote device''s port.
I Database tables and fields TABLE 171 HBA_REMOTE_PORT (Continued) Field Definition Format Field to indicate whether the remote port supports data retransmission.0 would mean unsupported and nonzero value implies supported. The default value is 0. smallint DATA_RETRANSMISSION_S UPPORT Field to indicate whether the remote port supports the REC ELS command Channel number in the PCI Bus.Zero would mean unsupported and nonzero value implies supported. The default value is 0.
I Database tables and fields TABLE 173 HBA_TARGET Field Definition Format DEVICE_PORT_ID Primary key from the Device port table int HBA_REMOTE_PORT_LUN_ ID Primary key from the HBA Remote port lun table int BOOT_LUN Flag to indicate of the LUN is bootable. The default value is -1. smallint TRUSTED Denotes whether target is trusted or not. 0 denotes untrusted and 1 is for trusted.
I Database tables and fields TABLE 176 HOST_DISCOVERY_OPTION (Continued) Field Definition Format Size JSON_USERNAME Username for the JSON agent varchar 128 JSON_PASSWD Password for the JSON agent varchar 512 DISCOVER_CIM Flag to indicate CIM based discovery. on/off. The default value is 0. smallint CIM_IMPL CIM implemenation used. 1: SMI, 2: WMI. The default value is 0.
I Database tables and fields TABLE 178 HOST_DISCOVERY_REQUEST (Continued) Field Definition DEVICE_ENCLOSURE_ID REQUEST_GROUP_ID int This id is a foreign key to the id in the host_discovery_option table. The default value is -1. int HOST_DISCOVERY_OPTI ON_ID The status of VM Discovery indicating success or failure. The default value is 0. int VM_MANAGEMENT_STAT E The status of HBA discovery using JSON agent, indicating success or failure. The default value is 0.
I Database tables and fields TABLE 180 HYPER_V_VM_HBA_PORT_MAP Field Definition Format ID Primary Key int HYPER_V_VM_ID ID of the HYPER_VIRTUAL_MACHINE instance. int HBA_PORT_ID ID of the HBA_PORT instance which is a Hyper V Virtual FC port. int Field Definition Format ID* Primary key for this table. Serial number which is uniquely generated by DB. int EDGE_FABRIC_ID Edge fabric ID of this IFL link. int EDGE_PORT_WWN Edge switch port wwn of this IFL link.
I Database tables and fields TABLE 182 Definition Format IF_INDEX This column is used to store the ifIndex of the interface. The value will be populated by the DCB collector during the discovery of the DCB switch. Since this value is not populated by IP discovery engine, making the field as nullable. int AMPP_PROFILE_MODE Specifies whether the interface is set to AMPP profile mode.
I Database tables and fields TABLE 184 IP_DEVICE_LICENSE (Continued) Field Definition Format LICENSE_TYPE The type of the license, which can be either normal or trial. Values are: permanent(1), trial(2).The default value is 1. smallint EXPIRY_DATE Expiry Date of the trial license. For normal license, the value is 0. varchar PRECEDENCE Defines the priority of a particular trial license among those having the same package and License ID.
I Database tables and fields TABLE 187 Field Definition Format ID* Unique generated database identifier. int ETHERNET_PORT_ID GigE Port ID. int PORT_NUMBER Port Number related to the GigE Port. int SLOT_NUMBER Slot Number related to the GigE Port. int NET_MASK Subnet Mask for the Route. varchar 64 GATEWAY Gateway for the Route. varchar 64 IP_ADDRESS IP Address created after ''”&”'' operation of gateway. varchar 64 METRIC Metric. int FLAG Flag. int CHECKSUM Check Sum.
I Database tables and fields TABLE 190 ISL (Continued) Field Definition Format TYPE The type of link. smallint TRUSTED Denotes whether ISL link is trusted or not. • 0 denotes untrusted • 1 denotes trusted. smallint CREATION_TIME Creation time of the ISL record in the Management application database. timestamp MISSING Denotes whether ISL link is missing or not. • 0 denotes present • 1 states that ISL is missing smallint MISSING_TIME States the missing time of the this ISL.
I Database tables and fields TABLE 191 Definition Format MASTER_CONNECTION_ID This will hold the id of the master ISL connection for a ISL between trunk members. The ISL Connection between masters will have its own ID in this column. Non trunk ISLs will have the default value of -1. int SOURCE_MASTER_PORT This column will hold the trunk master port for the source port, if the connection is trunked. For the master connection it will have its source por''s port number.
I Database tables and fields TABLE 193 ISL_TRUNK_MEMBER Field Definition Format GROUP_ID* Foreign key reference to the trunk group table for this member. int PORT_NUMBER* Member port number for this trunk.. smallint TRUSTED Denotes whether ISL trunk member is trusted or not. 0 denotes untrusted and 1 is for trusted. smallint MISSING Denotes whether ISL trunk member is missing or not. 0 denotes present and 1 states that ISL trunk member is missing.
I Database tables and fields TABLE 195 L2_ACCESS_CONTROL_ENTRY (Continued) Field Definition ETHERNET_TYPE Size varchar 24 LOG_ENABLE Specifies whether logging is enabled or not: 1 = Enabled 0 = Not Enabled smallint SOURCE_TYPE Indicates the source MAC type (any, host or mac) for DCB Switch L2 ACL entry. varchar 24 DEST_TYPE Indicates the destination MAC type (any, host or mac) for DCB Switch L2 ACL entry.
I Database tables and fields TABLE 198 L2_ACL_INTERFACE_DEPLOY_MAP (Continued) Field Definition Format INBOUND_L2_ACL_ID L2 Access control List ID of the L2 ACL selected for inbound. Foreign Key for L2_ACCESS_CONTROL_LIST table. int INBOUND_WRITE_TO_DEVICE 1/0 corresponding to Write to device/not write to device for inbound traffic. smallint OUTBOUND_L2_ACL_ID L2 Access control List ID of the L2 ACL selected for outbound. Foreign Key for L2_ACCESS_CONTROL_LIST table.
I Database tables and fields TABLE 201 Definition Format OUTBOUND_L3_ACL_ID L3 Access control List Id of the L3 ACL selected for outbound. Foreign Key for ACCESS_CONTROL_LIST table. int OUTBOUND_WRITE_TO_DEVICE 1/0 corresponding to Write to device/not write to device for outbound traffic. smallint TABLE 202 Size LAG Field Definition Format ID DB ID of LAG(Port-Channel).
I Database tables and fields TABLE 203 LAG_MEMBER (Continued) (Continued) Field Definition Format TYPE currently not used. The default value is 0. smallint MEMBER_MODE Dynamic Mode Active/passive. The default value is 0. smallint TABLE 204 LAST_CONFIG_UPDATE_TIME Field Definition ID Primary key. MANAGED_ELEMENT_ID The managed element id of the device. This is the foreign key to MANAGED_ELEMENT table. int CONFIG_XPATH The xpath string.
I Database tables and fields TABLE 205 Definition Format LICENCE_PACKAGE_TYPE Column to indicate whether the dialog is related to SAN or IP license package type. • 0 = SAN package • 1 = IP Package int OPTIONAL_PARAMS Comma separated names of all the optional parameters such as WWN. varchar 256 OPTIONAL_PARAMS_DESC Comma separated descriptions for the above optional parameters.
I Database tables and fields TABLE 207 LICENSE_DOWNGRADE_DETAILS (Continued) Field Definition Format DOWNGRADED_BY User who performed license downgrade. int Takes the value 0 or 1. 1 - currently active downgrade 0 - inactive or older downgrade. smallint IS_ACTIVE TABLE 208 • • LICENSE_FEATURE_MAP Field Definition Format LICENSE_ID* Foreign Key (SWITCH_LICENSE.ID) and is part of the primary key. int FEATURE_ID* Foreign Key (LICENSED_FEATURE.ID) and is part of the primary.
I Database tables and fields TABLE 212 Field Definition Format Size NAME The name of this transaction synchronization lock. The name should be upper case and should describe the activity being synchronized, such as MANAGED_ELEMENT_CREATION. varchar 40 LAST_USED_BY Identifies the transaction that last updated this lock record, such as IP_DISCOVERY. This field is primarily here just to have something to modify. The new value does not need to be different than the previous value.
I Database tables and fields TABLE 216 LSAN_ZONE Field Definition Format ID* Unique generated database identifier. int BB_FABRIC_ID Backbone fabric DB ID. int EDGE_FABRIC_ID FID assigned to edge fabric. int NAME LSAN zone name. varchar BACKBONE 0= is not a backbone lsan zone, 1= is a backbone lsan zone. Default value is 0. smallint TABLE 217 128 LSAN_ZONE_DB_CONFIG Field Definition Format ID Unique generated database identifier. serial BB_FABRIC_ID Backbone fabric db ID.
I Database tables and fields TABLE 220 MAC_FILTER (Continued) Field Definition Format Size DESCRIPTION Description associated with each MAC Filter entry. varchar 256 SOURCE_MAC_ADDRESS Source MAC Address. varchar 24 SOURCE_ADDRESS_MASK Source MAC address mask. varchar 24 DEST_MAC_ADDRESS Destination MAC Address. varchar 24 DEST_ADDRESS_MASK Destination MAC address mask. varchar 24 ETHERNET_TYPE This column specifies the Ethernet Type.
I Database tables and fields TABLE 223 MAC_GROUP Field Definition Format MAC_GROUP_ID The ID will represent any one of the following. 1 A cluster wide unique identifier defined in Network OS switch to be used in mac-based GVLAN classification at access port. Allowed range is 0 through 500 both inclusive. 2 INTERNAL GROUP ID - A dummy group ID (-1), used to represent one or more mac addresses that can be associated with a GVLAN.
I Database tables and fields TABLE 226 Definition Format SWITCH_PORT_ID Nullable foreign key. The FC port for which the event occurred. This will only be populated for port events. int FCIP_CIRCUIT_ID Nullable foreign key. The FCIP tunnel circuit for which the event occurred. This will only be populated for FCIP tunnel events. int FRU_NAME For switch policy status events, the object name is provided in the event and indicates the name of the FRU affected. i.e. PS 1, Fan 2.
I Database tables and fields TABLE 229 MAPS_POLICY Field Definition Format ID The primary key of the table. int VIRTUAL_SWITCH_ID The id of the virtual switch. int NAME The name of the MAPS policy. varchar IS_ACTIVE Indicates if the policy is the active policy on the switch. 0 - No, 1 - Yes. int IS_DEFAULT Indicates if the policy is a default policy on the switch. 0 - No, 1 - Yes. int TABLE 230 32 MARCHING_ANTS Field Definition Format ID* Unique generated database identifier.
I Database tables and fields TABLE 232 Definition Format ID* Unique generated database identifier. int DESCRIPTION Description about recipient. varchar 256 IP_ADDRESS IP Address of the recipient. varchar 128 PORT Port number of the recipient. int RECIPIENT_TYPE_ID Recipient Type (Syslog or SNMP). int ENABLED If forwarding to destination is enabled. smallint SOURCE_ADDRESS_ADD ED If source address is added as another varbind in trap. -1 for Syslog i.e RECIPIENT_TYPE_ID: 2.
I Database tables and fields TABLE 234 MODULE (Continued) Field Definition Format NUM_CPUS The number of CPUs present in the module. smallint HW_REVISION The vendor-specific hardware revision string. Refer entPhysicalHardwareRev of RFC4133-ENTITY-MIB.mib for more details. varchar 64 FW_REVISION The vendor-specific firmware revision string. Refer entPhysicalFirmwareRev of RFC4133-ENTITY-MIB.mib for more details. varchar 64 SW_REVISION The vendor-specific software revision string.
I Database tables and fields TABLE 235 Field Definition Format MODULE_SLOT_PRESENT_ID Unique database generated identifier. int MODULE_ID Database ID of the MODULE instance. int SLOT_ID Database ID of the SLOT instance. int TABLE 236 Definition Format MPLS_ADMIN_GROUP_DB_ID Unique database generated identifier. int NAME The group name that this administrative group is associated with. varchar ID Identifies the administrative group.
Database tables and fields TABLE 239 MPLS_PATH Field Definition Format MPLS_PATH_DB_ID Unique database generated identifier. int NAME Name of the MPLS Path as configured in the device. Refer mplsTunnelHopPathOptionName of RFC3812 for more details. varchar DEVICE_ID Database ID of the DEVICE Instance from which this path information retrieved. int Field Definition Format MPLS_PATH_HOP_DB_ID Unique database generated identifier. int HOP_INDEX Index of the MPLS hop.
I Database tables and fields TABLE 241 MPLS_RSVP_LSP (Continued) Field Definition Format Size IS_USE_LSP_FOR_OSPF_SHOR TCUTS Indicates that this LSP allows shortcut between nodes in an AS. OSPF includes the LSP in its SPF calculation. Possible values are Not Allowed-0 and Allowed-1. num (1,0) IS_USE_LSP_FOR_ISIS_SHORT CUTS Flag to indicate if the LSP is to be used by ISIS destinations.
TABLE 245 Database tables and fields I Size MPLS_RSVP_LSP_FRR_PARAMETERS Field Definition Format MPLS_RSVP_LSP_FRR_PARAMETE RS_DB_ID Unique database generated identifier. int BANDWIDTH Specifies the bandwidth constraint for the MPLS Fast Reroute Path. The value 0 means that the detour route uses a best-effort value for bandwidth. int HOP_LIMIT Represents the limit for the number of hops the LSP can traverse. Accepted range is 0 - 255.
I Database tables and fields TABLE 246 MPLS_RSVP_LSP_PARAMETERS (Continued) Field Definition Format Size HOLD_PRIORITY The holding priority of the tunnel. Valid range between 0-7. num (1,0) IS_RECORD_ROUTES Specifies whether the route is actually recorded route or not. Not Recorded-0 and Recorded-1. num (1,0) REOPTIMIZE_TIMER The number of seconds from the beginning of one reoptimization attempt to the beginning of the next attempt. Valid range is 300-65535 seconds. 0 is also accepted.
I Database tables and fields TABLE 249 MPLS_SERVICE (Continued) Field Definition Format MPLS_SERVICE_TYPE The type of the MPLS Service. Local VLL-1, Remote VLL-2, VLL-3, VPLS-4, Admin Group-8, Path-9, RSVP LSP-10. smallint VLL_MODE Specifies the Virtual Local Loop (VLL) Mode. Possible values are Unknown-0, Raw-1 and Taggged-2. smallint STATUS Status of the MPLS Service. All Peers Up-1, All Peers Down-2, Some Peers Down-3, Undefined-0. smallint CONFLICTS The type of Conflict.
I Database tables and fields TABLE 251 Definition Format VLAN_ID Specifies the Outer VLAN ID value of this endpoint (VLL/VPLS). smallint OPER_STATUS Operational status of the endpoint. Possible values are Up-1, Down-2. num TAG_TYPE The type of tagging supported. Possible values are Untagged-1, Dual-2 and Inner VLAN/ISID-3. ISID applicable only when dual tagging enabled for VPLS. smallint INNER_VLAN_ID This value indicates the inner tag for this endpoint.
I Database tables and fields TABLE 254 MRP_RING_DEVICE (Continued) Field Definition Format PORT_VLAN_DB_ID The database ID of the port VLAN. The master VLAN in the topology group used by this ring. If a topology group is used by MRP, the master VLAN controls the MRP settings for all VLANs in the topology group. int MRP_RING_NAME User configured name for the ring. varchar TOPO_GRP_ID Topology group ID. int STATE Whether MRP is enabled or disabled on the device. Disabled-1, Enabled -2.
I Database tables and fields TABLE 254 MRP_RING_DEVICE (Continued) Field Definition Format STATUS Computed status of device in MRP Ring. Possible status values are Normal-1, Warning-2 and Critical-3. smallint LAST_UPDATED Time when this record was last updated in the database. bigint TABLE 255 N2F_PORT_MAP Field Definition Format ID* Unique generated database identifier. int VIRTUAL_SWITCH_ID Virtual switch ID of AG for N to F_port mapping, foreign key to VIRTUAL_SWITCH table.
I Database tables and fields TABLE 259 NPORT_WWN_MAP (Continued) Field Definition Format N_PORT N Port through which AG is connected to the edge switch smallint DEVICE_PORT_WWN Device Port which is mapped to the N port. This device could be offline device as well. char 23 Size TABLE 260 Size NP_FLOW_DEFINITION Field Definition Format ID The primary key of the table. int NAME The name of the table. varchar VIRTUAL_SWITCH_ID The id for the virtual switch.
I Database tables and fields TABLE 260 Definition Format GENERATOR_FEATURE Flow generator feature state. 0 - not selected, 1 deactivated, 2 - selected and activated. int MIRROR_FEATURE Flow mirror feature state. 0 - not selected, 1 deactivated, 2 - selected and activated. int IS_PREDEFINED Flag which identifies if the flow definition is one of the pre-defined flow definitions on the switch. smallint Field Definition Format ID The primary key of the table.
I Database tables and fields TABLE 263 OUI_VENDOR Field Definition Format Size OUI* Vendor OUI, 6-digit hexadecimal number which can have leading digits as zero. char 6 VENDOR Vendor name. varchar 64 VENDOR_CATEGORY Default is ‘none’. varchar 32 Format Size varchar 128 TABLE 264 PASSWORD_HISTORY Field Definition USER_NAME PASSWORD_UPDATED_ DATETIME The date and time the user updated password recently.
I Database tables and fields TABLE 267 Field Definition Format ID Primary key. int RULE_ID PBR rule id. int NEXT_HOP_SEQUENCE The sequence of the next hop entry that corresponds to a rule within a route map. The sequence of 1 indicates it is the first next hop to be tried for that rule. This is a running integer. int HOP_TYPE The Next hop type. 1 indicates INTERFACE, 2 indicates IP_ADDRESS, 3 indicates FLOOD VLAN.
I Database tables and fields TABLE 270 PBR_RULE_ACL_LIST (Continued) Field Definition Format ACL_MATCH_SEQUENCE The sequence of the matching acl entry that corresponds to a rule within a route map. The sequence of 1 indicates it is the first matching acl for that rule. This is a running integer. int ACL_NAME Name of the ACL for the rule. varchar ACL_TYPE Indicates the ACL type. Value of 4 denotes IPV4, Value of 6 denotes IPV6.
I Database tables and fields TABLE 272 Definition Format Size UNIT_NEIGHBOR1 Stacking neighbor's unit(left) number for the stackable devices. If there is no neighbor unit/non stackable devices, then set to 0. num (2,0) UNIT_NEIGHBOR2 Stacking neighbor's unit(left) number for the stackable devices . If there is no neighbor unit/non stackable devices, then set to 0. num (2,0) UNIT_PRESENT Used to identify the stack unit is present in the chassis or not. Present-1 and Not Present-2.
I Database tables and fields TABLE 273 PHYSICAL_INTERFACE (Continued) Field Definition Format IMAGE_VERSION Image version of the unit in the stack. For non-stacking device it will be always empty. varchar UNIT_ROLE Indicates unit role in the stack. Possible values: 1 other, 2 - active, 3 - standby, 4 - member, 5 standalone. For non-stacking device it will be always -1' int UNIT_PRIORITY Indicates unit priority. Possible values 0 to 255.
I Database tables and fields TABLE 276 Definition Format ME_ID ME_ID of the target. int INDEX_MAP Stores the index_map value in case of an expression. varchar TABLE 277 Size 8192 PM_COLLECTOR_TIME_SERIES_MAPPING Field Definition Format COLLECTOR_ID DB ID of the pm_data_collector. int TARGET_NAME Time series data master table name. It could be either TIME_SERIES_DATA_1 or TIME_SERIES_DATA_2.
I Database tables and fields TABLE 278 PM_DASHBOARD_WIDGET (Continued) Field Definition Format LEVEL3_ENABLED Enable / disable the third threshold check. This value is applicable only for Top N, Top Flow widgets. Default is 0. smallint LEVEL3_VALUE Limit value for the third percentage band. Default is 0. double precision LEVEL3_COLOR Limit value for the third percentage band. int LEVEL4_ENABLED Enable / disable the fourth threshold check.
I Database tables and fields TABLE 279 Definition Format STATUS Status of the collector. 0 - disabled and 1 - enabled. Default - 0. smallint TYPE Target type of the snmp collector data. for device smallint level collector the target type is 0, for port level it is 1. POLLING_INTERVAL Time interval in seconds; indicates the frequency with which the collector will poll the device to get the data. int CREATED_TIME Collector created time.
I Database tables and fields TABLE 281 PM_STATS_AGING_POLICY (Continued) Field Definition Format TWO_HOUR_SAMPLE_AGE The maximum time in seconds for retaining records in the PM stats 2hour sample tables (TIME_SERIES_DATA_1_2HOUR and TIME_SERIES_DATA_2_2HOUR) in database. int ONE_DAY_SAMPLE_AGE The maximum time in seconds for retaining records in the PM stats 1day sample tables (TIME_SERIES_DATA_1_1DAY, TIME_SERIES_DATA_2_1DAY) in database. int POLICY_TYPE Type of the aging policy.
I Database tables and fields TABLE 286 Definition Format TARGET_TYPE 0 - Device 1 - Port smallint TARGET_ID Stores device ID if taret_TYPE is Device, or interface DB ID if target TYPE is port. int MEASURE_ID Measure table DB ID. int MEASURE_INDEX Index value for a MIB variable. For scalar value it will be empty. varchar 256 Size TABLE 287 Definition Format WIDGET_ID The ID of the widget definition. int COLLECTOR_ID ID of the PERF_COLLECTOR. int MEASURE_ID Measure table DB ID.
I Database tables and fields TABLE 289 POE_THRESHOLD (Continued) Field Definition Format CONDITION Condition like ><= to the defined threshold value at which threshold is triggered • 0 > (Greater Than) • 1 >= (Greater Than or Equal) • 2 < (Less Than) • 3 < = (Less Than or Equal) • 4 = (Equal to) • 5 != (Not Equal To) smallint SEVERITY Severity level of defined threshold on port and product Poe measures.
I Database tables and fields TABLE 293 Field Definition Format SWITCH_PORT_ID The database ID of the switch port that the configuration belongs to. int BOTTLENECK_DETECT _ENABLED Flag indicates if bottleneck detection is enabled or not. The default value is 0. smallint ALERTS_ENABLED Flag indicates if bottleneck detection alerts is enabled or not.The default value is -1. smallint CONGESTION_ THRESHOLD Value of bottleneck detection congestion threshold in percent. The default value is -1.
I Database tables and fields TABLE 295 PORT_COMMISSION_CIMOM_SERVER (Continued) Field Definition Format Size PASSWORD Password to be used for authenticating. Stored in encrypted format. varchar 512 STATUS Status before and after contacting the CIMOM Server. Possible values are 0 - OK, 1- Not Contacted Yet , 2 - Credentials Updated, 3 - Credentials Failed, 4 - Not Reachable. int LAST_CONTACTED_TIME Last time CIMOM server contacted.
I Database tables and fields TABLE 297 PORT_FENCING_POLICY_MAP (Continued) Field Definition Format Size SUB_LEVEL • • • char 23 NODE WWN of Node which policy assigned. char 23 Directly assigned or inherited from root level. 0 = Directly assigned 1 = Indirectly assigned smallint INHERITANCE TABLE 298 • • PORT_PROFILE Field Definition Format ID Auto generated id for the created profile int SWITCH_ME_ID Incase of a VCS discovery in M/C mode this is the cluster meid.
I Database tables and fields TABLE 299 PORT_PROFILE_DOMAIN Field Definition Format Size NAME Name of the port profile domain. varchar 255 DEFAULT_DOMAIN This flag determines if this domain is a default domain. 0 - NO 1 - YES smallint TABLE 300 PORT_PROFILE_DOMAIN_MAP Field Definition Format PROFILE_DOMAIN_ID Foreign Key Reference to ID field of PORT_PROFILE_DOMAIN table. int PROFILE_ID Foreign Key Reference to ID field of PORT_PROFILE table.
I Database tables and fields TABLE 303 Definition Format Size TRAFFIC_CLASS Name of the traffic class map set in the NON DCB mode varchar 256 CEE_MAP Name of the cee map set in the DCB mode varchar 256 COS Default COS value for QoS Profile can range from 0-7 if set int TRUST_COS Is trust cos enabled 0=NO 1=YES smallint TABLE 304 PORT_PROFILE_QOS_PFC_MAP Field Definition Format ID Auto generated id for the created profile int PROFILE_ID DB id of the port profile int COS0_TX TX
I Database tables and fields TABLE 305 PORT_PROFILE_VLAN_MAP Field Definition Format MAC_GROUP_DB_ID Nullable Foreign Key Reference to ID field of MAC_GROUP table. In case of VLAN_TYPE 3, MAC_GROUP table entry created with empty GROUP_ID with TYPE 3 and MAC_GROUP_MEMBER have the mac address details. In case of VLAN_TYPE 4, MAC_GROUP table entry created with valid GROUP_ID and TYPE(3). int CTAG_ID This will be populated only if VLAN_TYPE is 6 and 7.
I Database tables and fields TABLE 306 Definition Format PRIMARY_VLAN_ID Private VLAN domain is built with one primary VLAN and one or more secondary VLANs. This column represents primary VLAN ID associated with this secondary Isolated/Community VLAN (if PVLAN_TYPE column value is 2 or 3) in private VLAN domain. For primary VLAN (if PVLAN_TYPE column value is 1) in private VLAN domain and normal VLAN (if PVLAN_TYPE column value is 0) , then default value (i.e 0) will be populated.
I Database tables and fields TABLE 309 PROTOCOL_VLAN Field Definition Format VLAN_DB_ID Database ID of the VLAN instance which is associated with the protocol. int PROTOCOL Protocol for VLAN. Possible values are 1-IP, 2-IPX, 3-AppleTalk, 4-DECnet, 5-NetBIOS, 6-Other and 7-IPv6. num (4,0) TABLE 310 Size QRTZ_BLOB_TRIGGERS Field Definition Format Size TRIGGER_NAME* Name of the trigger. varchar 80 TRIGGER_GROUP* Name of the trigger group. varchar 80 BLOB_DATA The Scheduler info.
I Database tables and fields TABLE 313 Definition Format IS_STATEFUL Whether the job implements the interface StatefulJob. boolean REQUESTS_RECOVERY True or false. boolean TABLE 314 size QRTZ_JOB_DETAILS Field Definition Format Size JOB_NAME* Name of the job. varchar 80 JOB_GROUP* Name of the job group. varchar 80 DESCRIPTION Description of the job (optional). varchar 120 JOB_CLASS_NAME The instance of the job that will be executed.
I Database tables and fields TABLE 318 QRTZ_SCHEDULER_STATE (Continued) Field Definition Format Size CHECKIN_INTERVAL Repeat interval. num (13,0) RECOVERER Misfire instruction.
I Database tables and fields TABLE 322 QUERY_BASED_DEVICE_GROUP Field Definition Format DEVICE_GROUP_ID int QUERY_TEXT varchar 4096 varchar 4096 Format Size GROUP_CRITERIA TABLE 323 Holds the dynamic device group criteria XML value. QUORUM_CARD_GROUP_MAPPING Field Definition ID* int ENCRYPTION_GROUP_ID Foreign key reference to the ENCRYPTION_GROUP for which an authorization card is registered.
I Database tables and fields TABLE 327 REPORT_TYPE Field Definition Format ID* Meta Data for available reports. int NAME Report name. varchar 128 DESCRIPTION Report type description. varchar 256 Size TABLE 328 Size REPORT_TEMPLATE Field Definition Format ID The primary key of the table. int NAME Name of the report and the report names must be descriptive. For example, Wired Device Report. varchar 256 TITLE The title of the report that briefly describes the report contents.
I Database tables and fields TABLE 331 Definition Format Size NAME Resource group name. varchar 128 DESCRIPTION Resource group description. varchar 512 Size TABLE 332 RESOURCE_HOST_MAP Field Definition Format RESOURCE_GROUP_ID Resource Group ID int HOST_ID HOST_ID,which is in the resource group int Field Definition Format ID* Unique generated database identifier. int NAME Role name. varchar 128 DESCRIPTION Role description.
I Database tables and fields TABLE 337 RULE_LOGICAL_EXPRESSION_MAP Field Definition Format POLICY_RULE_ID Policy rule ID. int LOGICAL_EXPRESSION_XM L Configuration Rule Logical Expression XML. text TABLE 338 Size SAN Field Definition Format ID* Unique generated database identifier. int NAME Name of this SAN. varchar 256 CONTACT Contact person for this SAN. varchar 256 LOCATION Location of this SAN. varchar 256 DESCRIPTION Description.
I Database tables and fields TABLE 339 Definition Format MISSING_TIME Timestamp when the connection went missing timestamp LAST_UPDATE_TIME Last update time for this record timestamp CREATION_TIME Creation timestamp timestamp Field Definition Format ID Unique generated database identifier.
I Database tables and fields TABLE 342 SELECTED_FLYOVER_PROPERTY Field Definition Format PROPERTY_ID* Refers to Flyover_Property ID from AVAILABLE_FLYOVER_PROPERTY table. int USER_NAME* The name of the user who selected the property to be shown on flyover. varchar POSITION_ The user preferred position of the selected flyover property. int Field Definition Format ID Unique generated database identifier.
I Database tables and fields TABLE 343 Definition Format CREATION_TIME provides the record creation time, standard columns for Management application and values filled in by Switch Asset Collector timestamp LAST_UPDATE_TIME provides the record last updated time, standard columns for Management application and values filled in by Switch Asset Collector timestamp FRU_TYPE provides the type of the sensor, requested by SMIA and values filled in by Switch Asset Collector will be available only from F
I Database tables and fields TABLE 345 SFLOW_HOUR_SUMMARY Field Definition Format IN_PRIORITY Priority ID of the incoming traffic interface. smallint OUT_PRIORITY Priority ID of the outgoing traffic interface. smallint SRC_MAC MAC address of the source in the received sFlow packet. byte DEST_MAC MAC address of the destination in the received sFlow packet. byte L3_SRC_ADDR L3 address of the source in the received sFlow packet.
I Database tables and fields TABLE 345 Definition IN_PORT_TYPE This column is used to store the port type of the smallint incoming traffic interface. For VCS switch the value of • 0 means its edge port. • 1 means its trill port. For other devices Default value is 0. OUT_PORT_TYPE smallint This column is used to store the port type of the outgoing traffic interface. For VCS switch the value of • 0 means its edge port. • 1 means its trill port. For other devices Default value is 0.
I Database tables and fields TABLE 347 SFLOW_MINUTE_BGP (Continued) Field Definition Format IN_PORT_TYPE Port type of the incoming traffic interface. For VCS member the value of, • 0 means its edge port. • 1 means its fabric port. For other devices Default value is 0. smallint OUT_PORT_TYPE Port type of the outgoing traffic interface. For VCS member the value of, • 0 means its edge port • 1 means its fabric port. For other devices Default value is 0.
I Database tables and fields TABLE 350 Definition Format OUT_PORT_TYPE Port type of the outgoing traffic interface. For VCS member the value of, • 0 means its edge port • 1 means its fabric port. For other devices Default value is 0 smallint L3_SRC_ADDR This column is used to store the L3 address of the source in the received sFlow packet. bytea L3_DEST_ADDR This column is used to store the L3 address of the destination in the received sFlow packet.
I Database tables and fields TABLE 353 SFLOW_MINUTE_VLAN (Continued) Field Definition Format BYTES Number of bytes transmitted through the sFlow sample collected. bigint IN_VLAN Vlan ID of the incoming traffic interface. smallint OUT_VLAN Vlan ID of the outgoing traffic interface. smallint IN_PORT_TYPE Port type of the incoming traffic interface. For VCS member the value of, • 0 means its edge port. • 1 means its fabric port. For other devices Default value is 0.
I Database tables and fields TABLE 357 1526 SFLOW_STAGING (Continued) Field Definition Format IN_UNIT Unit number of the incoming traffic interface. Default value is 0. smallint IN_SLOT Slot number of the incoming traffic interface. smallint IN_PORT Port number of the incoming traffic interface. smallint OUT_UNIT Unit number of the outgoing traffic interface. Default value is 0. smallint OUT_SLOT Slot number of the outgoing traffic interface.
I Database tables and fields TABLE 357 SFLOW_STAGING (Continued) Field Definition Format DEST_USER Name of the destination user in the received sFlow packet. int FRAMES Number of frames transmitted through the sflow sample collected. bigint BYTES Number of bytes transmitted through the sflow sample collected. bigint TCP_FLAGS Tcp flag value of the received sFlow packet. smallint IN_PORT_TYPE This column is used to store the port type of the incoming traffic interface.
I Database tables and fields TABLE 359 SMART_CARD (Continued) Field Definition Format Size GROUP_NAME The name of the Encryption Group used to initialize the card. For recovery set cards, this identifies which group''s master key is backed up on the card. varchar 64 CREATION_TIME The date and time that the card was initialized. For recovery set cards, this is the date and time the master key was written to the card. The default value is 'now()'.
I Database tables and fields TABLE 362 SNMP_CREDENTIALS (Continued) Field Definition Format TIMEOUT Timeout value in seconds for a get/set request to the SNMP agent. Default value is 5. smallint VERSION SNMP agent version running on the switch, as in SNMPv1 or SNMPv3. varchar 6 READ_COMMUNITY_ STRING The SNMP Read-Only Community String is like a password. It is sent along with each SNMP Get-Request and allows (or denies) access to a device. The default value is "public".
I Database tables and fields TABLE 363 SNMP_DATA (Continued) Field Definition Format Size TARGET_TYPE Target type of the SNMP collector data. The target type for, • device level collector is 0 • port level collector it is 1. num (2,0) TARGET_ID Target id of the SNMP collector data. for device level collector it will use deviceId, and for port level it will use interfaceId. int VALUE Value of the OID retrieved from the corresponding target.
I Database tables and fields TABLE 366 SNMP_DATA_30MIN Field Definition Format ID Primary key autogenerated ID int MIB_OBJECT_ID MIB OID used for collection int Target or source type can be, device - 0 or interface or ports - 1 num TARGET_ID DB Id of the target which can be device or interface int VALUE Value collected by the engine double precision TIME_IN_SECONDS Time at which collection occured in seconds int COLLECTOR_ID DB Id of the collector object used for collection int MI
I Database tables and fields TABLE 368 Definition Format TIME_IN_SECONDS Time, in seconds, at which the record was inserted in seconds. int COLLECTOR_ID DB ID of the collector object used for collection.
I Database tables and fields TABLE 371 SNMP_PROFILE (Continued) Field Definition Format Size VERSION SNMP agent version running on the switch as in SNMPv1 and SNMPv3 varchar 6 READ_COMMUNITY_STRING The SNMP Read-Only Community String is like a password. It is sent along with each SNMP Get-Request and allows (or denies) access to device. The default value is "public". This is applicable if the agent is configured to operate in SNMPv1.
I Database tables and fields TABLE 372 SNMP_TRAP_CREDENTIAL Field Definition Format ID PK for the table to uniquely identify the record int VERSION to identify the version of Credentials: v1v2c and v3 are the values varchar 6 COMMUNITY_STRING to decode the v1/v2c traps varchar 64 USER_NAME user access name for v3 trap varchar 64 AUTH_PROTOCOL authentication protocol used for v3 traps varchar 16 AUTH_PASSWORD authentication password for v3 traps varchar 64 PRIV_PROTOCOL privacy
I Database tables and fields TABLE 375 SSL_CERTIFICATE (Continued) Field Definition Format Size EXPIRATION_TIME num (20,0) FORMAT num (2,0) DESCRIPTION varchar 1024 NOTIFICATION_TIME The time stamp (long format) of the last expiration notification sent num (20,0) NOTIFICATION_SENT The status of last notification sent.
I Database tables and fields TABLE 377 Definition Format private_key Content of the private key. txt USER_ID This field will be populated when the Management application user creates certificate or import certificates from file. User can view this certificate not bound to any vip in SSL certificate dialog. int TABLE 378 Size SSL_KEY_PASSWORD Field Definition Format ID Unique generated database identifier.
I Database tables and fields TABLE 380 STP_PORT Field Definition Format INTERFACE_ID Foreign Key Reference to INTERFACE table int PATH_COST Port Path Cost. bigint PRIORITY Port Priority. bigint LINK_TYPE Link Type. 1- Shared 2 - P2P. numeric (1,0) PORT_FAST Port Fast. 0 - Disabled 1 - Enabled numeric (1,0) BPDU_FILTER BPDU Filter. 0 - Disabled 1 - Enabled numeric (1,0) BPDU_GUARD BPDU guard. 0 - Disabled 1 - Enabled numeric (1,0) EDGE_PORT Edge port.
I Database tables and fields TABLE 381 STP_INSTANCE (Continued) Field Definition Format RE_ENABLE_PORT_INTERV AL FOS/NOS Field. Re enable port interval. int RE_ENABLE_PORT_STATE FOS/NOS Field. Re enable port state. smallint PATH_COST 1538 bigint STP Possible values: • 0 - Disabled • 1 - Enabled smallint CISCO_INTER_OP Cisco Interoperability Enabled/Disabled. num TX_HOLD_COUNT Transmit HoldCount of the Bridge smallint MAX_HOPS MST max hop count (1-40) smallint REGION MST Region.
I Database tables and fields TABLE 383 SWITCH_CONFIG Field Definition ID* Format Size int NAME Name of the switch configurations uploaded from the switch either on demand or through scheduler varchar SWITCH_ID ID of the switch from which the configuration has been uploaded. int CORE_SWITCH_ID 64 int BACKUP_DATE_TIME The date/time stamp at which the configuration has been uploaded. timestamp CONFIG_DATA The actual switch configuration data.
I Database tables and fields TABLE 386 Field Definition Format ID* Unique generated database identifier. int SWBD_TYPE Switch type number, universally used by all the Management application module implementation. smallint SUBTYPE Switch subtype. At present no subtypes for existing model records are defined. Default value is 0. smallint DESCRIPTION Model description, such as FC link speed, port count and whether multi-card (director) class switch or other type of switch.
I Database tables and fields TABLE 387 SWITCH_PORT (Continued) Field Definition TYPE Port type. The specific mode currently enabled for the varchar port. The port type could be U-Port, F-Port, E-Port etc. 16 FULL_TYPE Refers to the full type of the port, U-Port, F-Port etc. varchar 128 STATUS Refers to the Status of the port. Eg. No Light, No Module, Mod_inv, Online etc. varchar 64 HEALTH Refers to the Health of the port. Eg. Unmonitored, Healthy, Offline , Error etc.
I Database tables and fields TABLE 387 SWITCH_PORT (Continued) Field 1542 Definition Format Size PROHIBIT_PORT_NUMBERS Indicates the ports prohibited with the current port as configured in the allow prohibit matric (PDCM). varchar 1024 PROHIBIT_PORT_COUNT The count of prohibited ports. smallint NPIV Whether NPIV mode is enabled.
I Database tables and fields TABLE 387 SWITCH_PORT (Continued) Field Definition Format LOGICAL_PORT_NUMBER F-Port trunk logical port number. Default value is -1. smallint DEFAULT_AREA_ID Default Area id of F-Port trunk port. Default value is -1. smallint LOGICAL_PORT_WWN Logical port WWN of F-Port trunk group. char 23 PREVIOUS_TYPE This fields copies the old state of the port type. The field could be used to track the state change information for the switch port type.
I Database tables and fields TABLE 387 Definition Format PORT_COMMISSION_STATE Indicates whether port decommission/recommission was in progress or completed, based on this status we will show the decommission/recommission icon on ports and Indicates the Decommissioned/Recommissioned status of the ports which was performed from the Management application. None - 0, Decommission In Progress - 1 , Decommissioned - 2, Recommission In Progress - 3, Recommissioned - 4.
I Database tables and fields TABLE 388 SWITCH_PORT_PERFORMANCE (Continued) Field Definition Format RX The number of octets or bytes that have been received by this port. One second periodic polling of the port. This value is saved and compared with the next polled value to compute net throughput.
I Database tables and fields TABLE 389 Field Definition Format SWITCH_ID* References the ID in CORE_SWITCH table. int POLICY_ID* References the ID in THRESHOLD_POLICY table. int STATUS The status of applied to the switch. smallint OVERRIDDEN Policy is overridden or not overridden. smallint DESCRIPTION Description about the status of policy applied to the switch.
I Database tables and fields TABLE 394 THRESHOLD_MEASURE Field Definition Format MEASURE_ID* References the ID In PM_MEASURE table, where all measures are defined. int HIGH_BOUNDARY Configured high boundary threshold value for measure ID. int LOW_BOUNDARY Configured low boundary threshold value for measure ID. int BUFFER_SIZE Configured buffer size for measure ID. int POLICY_ID* References the ID in THRESHOLD_POLICY table.
I Database tables and fields TABLE 397 Definition Format COLLECTOR_ID ID of the data_collector. int MEASURE_INDEX Stores the index_map value in case of an expression. varchar ME_ID ME_ID of the target. int VALUE 30 mins aggregated data. double precision TABLE 398 Definition Format TIME_IN_SECONDS Time when the record is inserted. int TARGET_TYPE Target type of the PM collector data. For device level collector the target type is 0, for port level it is 1.
I Database tables and fields TABLE 400 TIME_SERIES_DATA_1 Field Definition Format TIME_IN_SECONDS Time when value of the measure retrieved from the corresponding target. int TARGET_TYPE Target type of the PM collector data. For IP_DEVICE(0), IP_PORT(1), IP_TRUNK(2), FOS_DEVICE(3), FC_PORT(4), GE_PORT(5), TE_PORT(6), HBA_PORT(7), CNA_PORT(8), VIRTUAL_FCOE_PORT(9), FCIP_TUNNEL(10), EE_MONITOR(11), IP_DEVICE_GROUP(12), IP_PORT_GROUP(13), VIRTUAL_GROUP(14), TRILL_TRUNK(15), ALL_SAN_PRODUCTS(16).
I Database tables and fields TABLE 401 Definition Format MIN_VALUE Minimum value in 2 hour table while aggregating 1 day data. double precision MAX_VALUE Maximum value in 2 hour table while aggregating 1 day data. double precision TABLE 402 Size TIME_SERIES_DATA_1_2HOUR Field Definition Format TIME_IN_SECONDS Time when value of the measure retrieved from the corresponding target. int TARGET_TYPE Target type of the PM collector data.
I Database tables and fields TABLE 403 TIME_SERIES_DATA_1_30MIN (Continued) Field Definition Format TARGET_ID Target ID of the PM collector data. For device level collector it will use deviceId/virtualSwitchId, for port level it will use interfaceId/switchPortId/ fcipTunnelId/devicePortId. int COLLECTOR_ID DB ID of the pm_data_collector. int MEASURE_INDEX Stores the index_map value in case of an expression. varchar ME_ID ME_ID of the target.
I Database tables and fields TABLE 405 Field Definition Format TIME_IN_SECONDS Time when value of the measure retrieved from the corresponding target. int TARGET_TYPE Target type of the PM collector data. For IP_DEVICE(0), IP_PORT(1), IP_TRUNK(2), FOS_DEVICE(3), FC_PORT(4), GE_PORT(5), TE_PORT(6), HBA_PORT(7), CNA_PORT(8), VIRTUAL_FCOE_PORT(9), FCIP_TUNNEL(10), EE_MONITOR(11), IP_DEVICE_GROUP(12), IP_PORT_GROUP(13), VIRTUAL_GROUP(14), TRILL_TRUNK(15), ALL_SAN_PRODUCTS(16).
I Database tables and fields TABLE 406 TIME_SERIES_DATA_2_2HOUR (Continued) Field Definition Format VALUE Stores the 2 hours aggregated data. double precision MIN_VALUE Minimum value in 30 min table while aggregating 2 hours of data. double precision MAX_VALUE Maximum value in 30 min table while aggregating 2 hours of data. double precision TABLE 407 TIME_SERIES_DATA_2_30MIN Field Definition Format TIME_IN_SECONDS Time when value of the measure retrieved from the corresponding target.
I Database tables and fields TABLE 408 Definition Format COLLECTOR_ID DB ID of the pm_data_collector. int MEASURE_INDEX Stores the index_map value in case of an expression. varchar ME_ID ME_ID of the target. int VALUE Stores the raw data received from the device. double precision SUM_VALUE Named after SUM_VALUE to be consistent with column names in aggregated data tables.
I Database tables and fields TABLE 410 TIME_SERIES_DATA_3_2HOUR (Continued) Field Definition Format TARGET_ID Target ID of the PM collector data. For device level collector it will use deviceId/virtualSwitchId, for port level it will use interfaceId/switchPortId/ fcipTunnelId/devicePortId. int COLLECTOR_ID DB ID of the pm_data_collector. int MEASURE_INDEX Stores the index_map value in case of an expression. varchar ME_ID ME_ID of the target. int VALUE Stores the 2 hours aggregated data.
I Database tables and fields TABLE 412 Field Definition Format TIME_IN_SECONDS Time when value of the measure retrieved from the corresponding target. int TARGET_TYPE Target type of the PM collector data. smallint MEASURE_ID ID of the measure (MIB/Expression). int TARGET_ID Target ID of the PM collector data. For device level collector it will use deviceId/virtualSwitchId, for port level it will use interfaceId/switchPortId/ fcipTunnelId/devicePortId.
I Database tables and fields TABLE 414 TIME_SERIES_DATA_4_2HOUR Field Definition Format TIME_IN_SECONDS Time when value of the measure retrieved from the corresponding target. int TARGET_TYPE Target type of the PM collector data. smallint MEASURE_ID ID of the measure (MIB/Expression). int TARGET_ID Target ID of the PM collector data. For device level collector it will use deviceId/virtualSwitchId, for port level it will use interfaceId/switchPortId/ fcipTunnelId/devicePortId.
I Database tables and fields TABLE 415 Definition Format MAX_VALUE Maximum value in raw performance statistics table while aggregating 30 minutes of data. double precision SUM_VALUE Named after SUM_VALUE to be consistent with column names in aggregated data tables.Stores the delta changes for counter values between two samples, only used for counter values, 0 for all other types of measures. double precision Field Definition Format Size TOOL_MENU_TEXT* Text to be displayed for the Tool Menu.
I Database tables and fields TABLE 419 TRILL Field Definition Format DEST_ME_ID The Management Element ID of the destination VirtualSwitch. int DEST_DOMAIN_ID The destination vcs member id int DEST_PORT The dest port number as retrieved from the switch.
I Database tables and fields TABLE 423 TRUNK_GROUP_MEMBER Field Definition Format TRUNK_GROUP_MEMBER_I D Primary key for this table. int INTERFACE_ID Foreign key which refers INTERACE table. int TRUNK_INTERFACE_ID Foreign key which refers TRUNK_GROUP_INTERACE table. int LAG_NAME Lag name of the trunk. varchar 64 Field Definition Format Size ID * Unique generated database identifier. int NAME User name. varchar 128 DESCRIPTION User description.
I Database tables and fields TABLE 424 USER_ (Continued) Field Definition Format Size IP_PRODUCT_ENABLE_USE R_NAME User CLI credential enable user name. varchar 256 IP_PRODUCT_ENABLE_PAS SWORD User CLI credential enable password. varchar 768 Format Size varchar 128 TABLE 425 USER_AOR_MAP Field Definition USER_NAME AOR_ID TABLE 426 AOR ID where user has membership. smallint USER_DEFINED_DEVICE_DETAIL Field Definition Format Size WWN WWN of the device.
I Database tables and fields TABLE 428 Definition Format FABRIC_ID Foreign Key FABRIC.ID. The ID of the fabric in the membership. This can be null if user does not include Fabric in his custom membership. int PRODUCT_ME_ID Foreign Key MANAGED_ELEMENT.ID. The ME ID of the device in the membership. This can be null if user does not include Switch in his custom membership. int SWITCH_PORT_ID Foreign Key SWITCH_PORT.ID. The ID of the switch Port in the membership.
I Database tables and fields TABLE 431 USER_REALTIME_MEASURE_SETTING (Continued) Field Definition Format MIB_OBJECT_ID This is the foreign key reference key to the mib_object Table int TYPE This identifies the collectible type. 0 for MIBs, 1 for Expressions int TABLE 432 Size USER_RESOURCE_MAP Field Definition Format Size USER_NAME* User name. varchar 128 RESOURCE_GROUP_ID* Resource group name, which is mapped for the user.
I Database tables and fields TABLE 436 VCN_ICL Field Definition Format ICL_PORT_ID ICL port foreign key. int VCN_MEMBER_ID Virtual Cluster Node member id foreign key. int Field Definition Format VCN_MEMBER_ID Virtual Cluster Node member db id. int CLUSTER_ID Cluster id. int CLUSTER_NAME Cluster name. varchar CLUSTER_RBRIDGE_ID Cluster rbridge id. int SESSION_VLAN Session VLAN id. smallint KEEP_ALIVE_VLAN Keep alive VLAN id.
I Database tables and fields TABLE 438 VCN_PEER Field Definition Format VCN_MEMBER_ID Virtual Cluster Node member id foreign key. int PEER_DEVICE_ID Peer device id. int TABLE 439 Size VCS_CLUSTER_MEMBER Field Definition Format CLUSTER_ME_ID The Management Element ID of the VCS Cluster in the VirtualSwitch. int MEMBER_ME_ID The Management Element ID of the cluster member in the VirtualSwitch.
I Database tables and fields TABLE 440 VCEM_PROFILE (Continued) Field Definition Format LAST_DISCOVERY_STATUS The discovery status of the VCEM server in the previous discovery cycle. smallint CREATION_TIME timestamp LAST_UPDATE_TIME timestamp LAST_FAILURE_TIMESTAMP The time of the last failed collection. timestamp LAST_SUCCESSFUL_TIMES TAMP The time of the last successful collection.
I Database tables and fields TABLE 444 VIRTUAL_FCOE_PORT Field Definition Format ID Unique generated database identifier. int VIRTUAL_SWITCH_ID The unique id of switch the virtual fcoe port belongs to. int PORT_WWN WWN of port varchar 64 PORT_SPEED Will be 10G.
I Database tables and fields TABLE 446 Definition Format CREATION_TIME The time this stats record was created timestamp ACTIVE_STATE Used for error scenario smallint LINK_FAILURES Link failures double precision TX_LINK_RESETS TX Link resets double precision RX_LINK_RESETS RX link resets double precision SYNC_LOSSES Synchronization losses double precision SIGNAL_LOSSES Signal losses double precision SEQUENCE_ERRORS Sequence Errors double precision INVALID_TX Invalid transmission
I Database tables and fields TABLE 447 VIRTUAL_PORT_WWN_DETAILS (Continued) Field Definition Format Size DEVICE_PORT_WWN Physical port WWN of the device for which VPWWN is assigned. char 23 SLOT_NUMBER Slot number of the switch, This will be -1 for AG. smallint TABLE 448 VIRTUAL_SWITCH Field Definition Format ID* Primary key for the table. int NAME Stores the switch name. varchar 64 WWN WWN of the Switch. char 23 VIRTUAL_FABRIC_ID Virtaul fabric ID of the switch.
I Database tables and fields TABLE 448 VIRTUAL_SWITCH (Continued) Field Definition Format Size STATUS_REASON Stores the status reason, which states the contributors for the status. varchar 2048 USER_DEFINED_VALUE_1 User defined value used for annotation. varchar 256 USER_DEFINED_VALUE_2 User defined value used for annotation. varchar 256 USER_DEFINED_VALUE_3 User defined value used for annotation. varchar 256 CORE_SWITCH_ID Reference to Core Switch record.
I Database tables and fields TABLE 448 VIRTUAL_SWITCH (Continued) Field Definition Format INSISTENT_DID_MODE Indicates whether persistent domain ID is enabled on the switch. • 1 is enabled • 0 is disabled. smallint LAST_SCAN_TIME Stores the timestamp of the last scan time, the time which the switch was contacted for update. timestamp DOMAIN_MODE_239 Stores the domain mode offset. Its only used in the mixed fabric (FOS+EOS). smallint DOMAIN_ID_OFFSET Stores the domain id offset value.
I Database tables and fields TABLE 448 1572 VIRTUAL_SWITCH (Continued) Field Definition Format MANAGED_ELEMENT_ID A unique managed element ID for this virtual switch. Also a foreign key reference to the MANAGED_ELEMENT table. int HIF_ENABLED The HIF Enabled bit on the switch. Values are 1 for enabled and 0 for not enabled. -1 the default, stands for not supported and will be used for older firmwares. Default value is -1.
I Database tables and fields TABLE 449 VIRTUAL_SWITCH_CAPABILITY Field Definition Format VIRTUAL-SWITCH_ID * DB ID of virtual switch. int CAPABILITY_ * Name of capability detected on virtual switch. varchar ENABLED 1 = the capability is enabled on the virtual switch. int TABLE 450 Size 256 VIRTUAL_SWITCH_CHECKSUM Field Definition Format VIRTUAL_SWITCH_ID * DB ID of virtual switch. int CHECKSUM_KEY * Checksum key. varchar 32 CHECKSUM Checksum value.
I Database tables and fields TABLE 455 Field Definition Format VLAN_INTERFACE_RELATION_ID Database ID of the VLAN_INTERFACE_RELATION instance which is associated with the interface member. int TABLE 456 Definition Format VLAN_INTERFACE_RELATION_ID Unique database generated identifier. int VLAN_DB_ID Database ID of the VLAN instance which is associated with the interface. int INTERFACE_ID Database ID of the INTERFACE instance which is associated with the vlan.
I Database tables and fields TABLE 461 VLL_ENDPOINT_RELATION Field Definition Format MPLS_SERVICE_ENDPOINT_REL ATION_DB_ID Database ID inherited from MPLS_SERVICE_ENDPOINT_RELATION. int PW_ENET_PW_INSTANCE Represents the Index of Ethernet tables associated with this endpoint Instance. int COS This value indicates the Class Of Service for this smallint endpoint. For VLL, this value is used to select the appropriate tunnel whose COS value is either same, or almost approaching this value.
I Database tables and fields TABLE 462 Definition Format STATUS VMotion event status. 0 = info, 1 = warning, 2 = failed. smallint DRS_TRIGGERED Identifies whether the events was due to DRS. 0 = No, 1 = Yes. smallint USER_NAME Identifies that user who initiated the vmotion. varchar 80 DESCRIPTION Event message that is received.
I Database tables and fields TABLE 465 VM_DATASTORE_DETAILS Field Definition Format Size NAME Name of the datastore. varchar 256 ACCESSIBLE The connectivity status of this datastore. If this is set to false, meaning the datastore is not accessible, this datastores capacity and freespace properties cannot be validated. 0 = no 1 = yes. smallint STATUS Status of the datastore could be normal, enteringMaintenance, inMaintenance.
I Database tables and fields TABLE 466 Definition Format CONFLICT Whether the port is a conflict port. A port could be marked as conflict if an entity is discovered connecting to a port that is already occupied, or if the port is created by the host without conferring with Virtual Center Server. A conflict port will not have its runtime state persisted and the port can''t move away from the host, i.
I Database tables and fields TABLE 467 VM_DV_PORT_GROUP (Continued) Field Definition Format Size DESCRIPTION A description string of the portgroup varchar 256 UPLINK_PORT_GROUP Whether this portgroup is an uplink portgroup smallint KEY The key for the port group varchar MOR_ID The managed object reference number assigned by the hypervisor int TABLE 468 64 VM_DV_SWITCH Field Definition Format ID Unique generated database identifier. serial UUID The generated UUID of the switch.
I Database tables and fields TABLE 468 Definition Format DVS_OPER_SUPPORTED Whether this switch allow Virtual Center users to modify DVS configuration at switch level, except for host memeber, policy and scope operations smallint CREATION_TIME The create time of the switch timestamp UPLINK_PORT_NAME The uniform name of uplink ports on each host varchar VM_DATA_CENTER_ID A foreign key referencing VM_DATACENTER table instance to which this host is associated with int MOR_ID The managed objec
I Database tables and fields TABLE 470 VM_FC_HBA (Continued) Field Definition Format The type of the fiber channel port. One of : Fabric Loop Point to point Unknown smallint SPEED The current operating speed of the adapter in bits per second.
I Database tables and fields TABLE 472 VM_HOST (Continued) Field Definition Format Size CPU_TYPE Text summary of CPU hardware, such as: Intel(R) Xeon(TM) CPU 2.6 GHz varchar 64 CPU_RESOURCES Text summary of CPU resources, such as "20 GHz total, 15 GHz reserved". May be a different format for different VM vendors varchar 64 MEM_RESOURCES Text summary of memory resources, such as "7 GB total, 5 GB reserved".
I Database tables and fields TABLE 474 VM_HOST_PROXY_SWITCH (Continued) Field Definition Format Size DVS_NAME The name of the DistributedVirtualSwitch that the HostProxySwitch is part of varchar 256 DVS_UUID The uuid of the DistributedVirtualSwitch that the HostProxySwitch is a part of varchar 256 KEY_ The proxy switch key varchar 256 NUM_PORTS The number of ports that this switch currently has int NUM_PORTS_AVAILABL E The number of ports that are available on this virtual switch in
I Database tables and fields TABLE 476 Definition Format VM_DV_PORT_ID Foreign key to the vm_dv_port table. DV Port with which this vmknic is associated int MTU The MTU of the port int VM_HOST_ID FOREIGN KEY to the vm_host table int MOR_ID The managed object reference number assigned by the hypervisor int PORT_GROUP_KEY The key for the port group varchar BINARY_MAC MAC address in binary format. bytea BINARY_IP IP address in binary format.
I Database tables and fields TABLE 478 VM_NIC_TEAMING_POLICY (Continued) Field Definition Format REVERSE_POLICY The flag to indicate whether or not the teaming policy is applied to inbound frames as well. For example, if the policy is explicit failover, a broadcast request goes through uplink1 and comes back through uplink2. Then if the reverse policy is set, the frame is dropped when it is received from uplink2. This reverse policy is useful to prevent the virtual machine from getting reflections.
I Database tables and fields TABLE 479 Definition Format FABRIC_ID Identifies the fabric that contains this path. Not a foreign key reference. Copied here for convenience. Determined by locating the HBA port WWN or target port WWN in the DEVICE_PORT table. Zero if the fabric is not managed. The default value is 0. int HBA_PORT The HBAs physical port WWN for this path char 23 VM_PORT_WWN The initiator port WWN used by the VM.
I Database tables and fields TABLE 480 VM_PHYSICAL_NIC (Continued) Field Definition Format DUPLEX The flag to indicate whether or not the link is capable of full-duplex ("true") or only half-duplex ("false"). smallint MAC_ADDRESS The media access control (MAC) address of the physical network adapter. varchar 17 PCI Device hash of the PCI device corresponding to this physical network adapter. varchar 256 WAKE_ON_LAN_SUPPO RTED Flag indicating whether the NIC is wake-on-LAN capable.
I Database tables and fields TABLE 482 Field Definition Format ID Unique generated database identifier. serial NAME The name of the virtual switch. varchar PORTS_COUNT The number of ports that this virtual switch currently has. int PORTS_AVAILABLE The number of ports that are available on this virtual switch. int MTU The maximum transmission unit (MTU) associated with this virtual switch in bytes.
I Database tables and fields TABLE 484 VM_STD_VSWITCH_PORT_GROUP (Continued) Field Definition Format VM_STANDARD_VIRTUA L__SWITCH_ID Foreign Key to the vm_standard_virtual_switch table. The standard virtual swtich on which this port group exists. int MOR_ID The managed object reference number assigned by the hypervisor. int TABLE 485 Size VM_STORAGE Field Definition Format ID Uniquely identifies this LUN. serial HOST_ID Identifies the server that accesses this LUN.
I Database tables and fields TABLE 486 Field Definition Format VM_STORAGE_ID A foreign key referencing VM_STORAGE (ID). int HBA_REMOTE_PORT_ID A foreign key referencing HBA_REMOTE_PORT (ID). int TABLE 487 Size VM_TRAFFIC_SHAPING_POLICY Field Definition Format ID Unique generated database identifier. serial ENABLED 'The flag to indicate whether or not traffic shaper is enabled on the port.
I Database tables and fields TABLE 488 VM_VCENTER (Continued) Field Definition Format Size MANAGED_ELEMENT_ID A foreign key referencing MANAGED_ELEMENT(ID). int FAULT_MONITORING_ST ATE Flag to indicate whether fault monitoring is registered or not for a VM Host. Possible values are: 1.Not registered 2.Registered (Default) smallint NAME The name of the VCenter. varchar 64 UUID Unique identifier for vCenter server instance.
I Database tables and fields TABLE 490 1592 VM_VIRTUAL_ETHERNET_ADAPTER (Continued) Field Definition Format ADDRESS_TYPE MAC address type. Valid values for address type are: • Manual • Statically assigned MAC address. • Generated • Automatically generated MAC address. • Assigned • MAC address assigned by VirtualCenter. smallint MAC_ADDRESS MAC address assigned to the virtual network adapter. Clients can set this property to any of the allowed address types.
I Database tables and fields TABLE 491 VM_VIRTUAL_MACHINE Field Definition Format ID Uniquely identifies the virtual machine serial HOST_ID Identifies the server that contains this VM int HYPERVISOR_VM_ID The VM number assigned by the hypervisor. Some hypervisors identify VMs by number as well as by name int NAME User-assigned name for the VM varchar 80 DESCRIPTION Optional user-entered notes describing the VM. (Annotation in VMware terminology.
I Database tables and fields TABLE 491 Definition Format Size UNCOMMITTED_STORA GE Additional Provisioned storage for a particular virtual machine. varchar 64 UNSHARED_STORAGE Exclusive storage for a particular virtual machine. varchar 64 Size TABLE 492 VM_VIRTUAL_MACHINE_DATASTORE_MAP Field Definition Format VM_DATASTORE_DETAIL S_ID A foreign key referencing VM_DATASTORE_DETAILS(ID). int VIRTUAL_MACHINE_ID A foreign key referencing VM_VIRTUAL_MACHINE(ID).
Database tables and fields TABLE 495 I VR_CONN_DOMAIN Field Definition Format ID Unique generated database identifier. serial VCEM_PROFILE_ID Foreign key references the ID of the VCEM server that the domain belongs to. int VR_CONN_DOMAIN_GROUP_I D Nullable foreign key references the ID of the domain group that the domain may belong to. int VCEM_ASSIGNED_ID The ID assigned by the VCEM server.
I Database tables and fields TABLE 498 VR_CONN_MODULE Field Definition Format ID Unique generated database identifier. serial VR_CONN_DOMAIN_ID Foreign key references the domain ID that the module belongs to. int VCEM_ASSIGNED_ID The ID assigned by VCEM. varchar 256 WWN The WWN of the module. char 23 PRODUCT_NAME The product name of the module. varchar 256 SERIAL_NUMBER The serial number of the module. varchar 32 STATUS The current status of the module.
I Database tables and fields TABLE 500 VR_CONN_SERVER_PROFILE Field Definition Format ID Unique generated database identifier. serial VCEM_PROFILE_ID Foreign key references the ID of the VCEM server that the server profile belongs to. int VR_CONN_DOMAIN_GROUP_I D Nullable foreign key references the ID of the domain group that the server profile may belong to. int VCEM_ASSIGNED_ID The ID assigned by the VCEM server.
I Database tables and fields TABLE 502 Definition Format Size RF_DOMAIN_NAME RF domain name set for the AP. varchar 64 TIME_ZONE Time zone set for the AP. varchar 80 COUNTRY Country set for the AP. varchar 32 VLAN_FOR_CONTROL_TRAFFI C VLAN for control traffic set for the AP. varchar 512 CLIENT_COUNT Number of wireless clients or stations that connected or associated to the AP. int TABLE 503 WIRELESS_PRODUCT_RELATION Field Definition Format ID The primary key of the table.
I Database tables and fields TABLE 506 ZONE_ALIAS Field Definition Format ID* Unique generated database identifier. int ZONE_DB_ID PK of the owning ZONE_DB. int NAME The zone alias name. varchar 64 Size TABLE 507 Size ZONE_ALIAS_IN_ZONE Field Definition Format ZONE_ALIAS_ID* PK of the zone alias. int ZONE_ID* PK of the zone. int 23 Size TABLE 508 ZONE_ALIAS_MEMBER Field Definition Format ID* Unique generated database identifier.
I Database tables and fields TABLE 510 ZONE_DB_CONFIG Field Definition Format ID Unique generated database identifier. int ZONE_DB_ID PK of the owning zone DB int DEFINED_CONTENT Defined zone raw config string, wrapped with $ to prevent special char trimming text ACTIVE_CONTENT Active zone raw config string text TI_ZONE_CONTENT TI zone raw config string text TABLE 511 ZONE_DB_CONTENT Field Definition Format ID* PK of the owning offline zone DB.
I Views TABLE 515 ZONE_SET Field Definition Format ID* Unique generated database identifier. int ZONE_DB_ID PK of owning zone DB. int NAME Zone set name. varchar ACTIVE 1 = active zone set 0 = otherwise. smallint Size 64 Views ADAPTER_PORT_CONFIG_INFO create or replace view ADAPTER_PORT_CONFIG_INFO as select ADAPTER_PORT_CONFIG.ID, ADAPTER_PORT_CONFIG.NAME as CONFIG_NAME, ADAPTER_PORT_CONFIG.TYPE as TYPE, ADAPTER_PORT_CONFIG_PROPERTY.NAME as PROPERTY_NAME, ADAPTER_PORT_CONFIG_DETAILS.
I Views BOOT_IMAGE_FILE_DETAILS_INFO create or replace view BOOT_IMAGE_FILE_DETAILS_INFO as select BOOT_IMAGE_FILE_DETAILS.BOOT_IMAGE_NAME, BOOT_IMAGE_FILE_DETAILS.MAJOR_VERSION, BOOT_IMAGE_FILE_DETAILS.MINOR_VERSION, BOOT_IMAGE_FILE_DETAILS.MAINTENANCE, BOOT_IMAGE_FILE_DETAILS.PATCH, BOOT_IMAGE_FILE_DETAILS.IMPORTED_DATE, BOOT_IMAGE_FILE_DETAILS.RELEASE_DATE, BOOT_IMAGE_FILE_DETAILS.RELEASE_NOTES_LOCATION, BOOT_IMAGE_FILE_DETAILS.LOCATION, BOOT_IMAGE_DRIVER_MAP.
Views I CNA_PORT.NAME, CNA_PORT.MAC_ADDRESS, CNA_PORT.MEDIA, CNA_PORT.CEE_STATE, CNA_PORT.HBA_ID, CNA_PORT.CREATION_TIME as CNA_PORT_CREATION_TIME, CNA_ETH_PORT.ID as ETH_PORT_ID, CNA_ETH_PORT.ETH_DEV, CNA_ETH_PORT.ETH_LOG_LEVEL, CNA_ETH_PORT.NAME as ETH_PORT_NAME, CNA_ETH_PORT.MAC_ADDRESS as ETH_MAC_ADDRESS, CNA_ETH_PORT.IOC_ID, CNA_ETH_PORT.HARDWARE_PATH, CNA_ETH_PORT.STATUS, CNA_ETH_PORT.CREATION_TIME as ETH_PORT_CREATION_TIME, CNA_ETH_PORT.CURRENT_MAC_ADDRESS as CURRENT_MAC_ADDRESS, CNA_ETH_PORT.
I Views CORE_SWITCH_DETAILS_INFO create or replace view CORE_SWITCH_DETAILS_INFO as select CORE_SWITCH.ID, CORE_SWITCH.IP_ADDRESS, CORE_SWITCH.WWN, CORE_SWITCH.NAME, CORE_SWITCH.TYPE, CORE_SWITCH.MODEL, CORE_SWITCH.FIRMWARE_VERSION, CORE_SWITCH.VENDOR, CORE_SWITCH.MAX_VIRTUAL_SWITCHES, CORE_SWITCH.NUM_VIRTUAL_SWITCHES, CORE_SWITCH.REACHABLE, CORE_SWITCH.UNREACHABLE_TIME, CORE_SWITCH.OPERATIONAL_STATUS, CORE_SWITCH.CREATION_TIME, CORE_SWITCH.LAST_SCAN_TIME, CORE_SWITCH.LAST_UPDATE_TIME, CORE_SWITCH.
Views I CORE_SWITCH_DETAILS.DESCRIPTION, CORE_SWITCH_DETAILS.IP_ADDRESS_PREFIX, CORE_SWITCH_DETAILS.DOMAIN_NAME, CORE_SWITCH_DETAILS.FRAME_LOG_SIZE, CORE_SWITCH_DETAILS.FRAME_LOG_ENABLED, CORE_SWITCH_DETAILS.MAPS_ENABLED from CORE_SWITCH LEFT OUTER JOIN CORE_SWITCH_DETAILS on CORE_SWITCH_DETAILS.CORE_SWITCH_ID = CORE_SWITCH.ID; CRYPTO_HOST_LUN_INFO create or replace view CRYPTO_HOST_LUN_INFO as select LUN.CRYPTO_HOST_ID, LUN.ID CRYPTO_LUN_ID, LUN.LUN_NUMBER, LUN.CRYPTO_TARGET_CONTAINER_ID, LUN.
I Views CRYPTO_TARGET_ENGINE_INFO create or replace view CRYPTO_TARGET_ENGINE_INFO as select CRYPTO_TARGET_CONTAINER.ID TARGET_CONTAINER_ID, CRYPTO_TARGET_CONTAINER.NAME, CRYPTO_TARGET_CONTAINER.VT_NODE_WWN, CRYPTO_TARGET_CONTAINER.VT_PORT_WWN, CRYPTO_TARGET_CONTAINER.FAILOVER_STATUS, CRYPTO_TARGET_CONTAINER.FAILOVER_STATUS_2, CRYPTO_TARGET_CONTAINER.DEVICE_STATUS, CRYPTO_TARGET_CONTAINER.DEVICE_TYPE, CRYPTO_TARGET_CONTAINER.TARGET_PORT_WWN, CRYPTO_TARGET_CONTAINER.
Views I DEPLOYMENT_INFO create or replace view DEPLOYMENT_INFO as select DEPLOYMENT_CONFIGURATION.ID as ID, DEPLOYMENT_CONFIGURATION.NAME as NAME, DEPLOYMENT_CONFIGURATION.DESCRIPTION as DESCRIPTION, DEPLOYMENT_HANDLER.MODULE as MODULE, DEPLOYMENT_HANDLER.SUB_MODULE as SUB_MODULE, DEPLOYMENT_STATUS.DEPLOYMENT_TIME as DEPLOYMENT_TIME, DEPLOYMENT_CONFIGURATION.DEPLOY_OPTION as DEPLOYMENT_OPTION, DEPLOYMENT_STATUS.STATUS as STATUS, DEPLOYMENT_STATUS.DEPLOYED_BY as DEPLOYED_BY, DEPLOYMENT_CONFIGURATION.
I Views DEPLOYMENT_CONFIGURATION.SCHEDULE_ENABLED, DEPLOYMENT_CONFIGURATION.SNAPSHOT_ENABLED, DEPLOYMENT_CONFIGURATION.MANAGEMENT_FLAG, DEPLOYMENT_HANDLER.PRIVILEGE_ID, DEPLOYMENT_HANDLER.HANDLER_CLASS, DEPLOYMENT_HANDLER.CLIENT_ACTION_HANDLER_CLASS, DEPLOYMENT_STATUS.ID as STATUS_ID, DEPLOYMENT_HANDLER.MODULE_DISPLAYNAME, DEPLOYMENT_STATUS.TRIGGER_SOURCE as TRIGGER_SOURCE, DEPLOYMENT_REPORT_TEMPLATE.HEADER, DEPLOYMENT_REPORT_TEMPLATE.
Views I EE_MONITOR_STATS_5MIN_INFO create or replace view EE_MONITOR_STATS_5MIN_INFO as select VIRTUAL_SWITCH.
I Views timestamp with time zone 'epoch' + TIME_IN_SECONDS * interval '1 second' as CREATION_TIME, sum(case when MEASURE_ID = 208 then value else 0 end) as TX_UTILIZATION, sum(case when MEASURE_ID = 209 then value else 0 end) as RX_UTILIZATION, sum(case when MEASURE_ID = 210 then value else 0 end) as CRC_ERRORS from TIME_SERIES_DATA_1_1DAY, VIRTUAL_SWITCH where ME_ID = MANAGED_ELEMENT_ID and COLLECTOR_ID = 16 group by ME_ID, TARGET_TYPE, TARGET_ID, TIME_IN_SECONDS,VIRTUAL_SWITCH_ID order by TIME_IN_SECOND
Views I from TIME_SERIES_DATA_1_30MIN, VIRTUAL_SWITCH where ME_ID = MANAGED_ELEMENT_ID and COLLECTOR_ID = 12 group by ME_ID, TARGET_TYPE, TARGET_ID, TIME_IN_SECONDS,VIRTUAL_SWITCH_ID order by TIME_IN_SECONDS desc; TE_PORT_STATS_2HOUR_INFO create or replace view TE_PORT_STATS_2HOUR_INFO as select VIRTUAL_SWITCH.
I Views SWITCH_INFO CREATE VIEW switch_info AS select CORE_SWITCH.ID as PHYSICAL_SWITCH_ID, CORE_SWITCH.NAME as PHYSICAL_SWITCH_NAME, CORE_SWITCH.IP_ADDRESS, CORE_SWITCH.WWN as PHYSICAL_SWITCH_WWN, CORE_SWITCH.OPERATIONAL_STATUS as PHYSICAL_OPERATIONAL_STATUS, CORE_SWITCH.TYPE, CORE_SWITCH.MAX_VIRTUAL_SWITCHES, CORE_SWITCH.NUM_VIRTUAL_SWITCHES, CORE_SWITCH.FIRMWARE_VERSION, CORE_SWITCH.VENDOR, CORE_SWITCH.REACHABLE, CORE_SWITCH.UNREACHABLE_TIME, CORE_SWITCH.MODEL, CORE_SWITCH.
Views I VIRTUAL_SWITCH.FCOE_CAPABLE, VIRTUAL_SWITCH.L2_CAPABLE, VIRTUAL_SWITCH.L3_CAPABLE, VIRTUAL_SWITCH.DEFAULT_LOGICAL_SWITCH, VIRTUAL_SWITCH.FEATURES_SUPPORTED, VIRTUAL_SWITCH.FMS_MODE, VIRTUAL_SWITCH.DYNAMIC_LOAD_SHARING, VIRTUAL_SWITCH.PORT_BASED_ROUTING, VIRTUAL_SWITCH.IN_ORDER_DELIVERY, VIRTUAL_SWITCH.INSISTENT_DID_MODE, VIRTUAL_SWITCH.PREVIOUS_OPERATIONAL_STATUS, VIRTUAL_SWITCH.LAST_SCAN_TIME, VIRTUAL_SWITCH.DOMAIN_MODE_239, VIRTUAL_SWITCH.DOMAIN_ID_OFFSET, VIRTUAL_SWITCH.
I Views DEVICE_NODE.WWN as DEVICE_NODE_WWN, DEVICE_NODE.TYPE as DEVICE_NODE_TYPE, DEVICE_NODE.SYMBOLIC_NAME as DEVICE_NODE_SYMBOLIC_NAME, DEVICE_NODE.DEVICE_TYPE, DEVICE_NODE.FDMI_HOST_NAME, DEVICE_NODE.VENDOR, DEVICE_NODE.CAPABILITY_, DEVICE_NODE.AG, DEVICE_NODE.SIMULATED, DEVICE_PORT.ID as DEVICE_PORT_ID, DEVICE_PORT.DOMAIN_ID as DEVICE_PORT_DOMAIN_ID, DEVICE_PORT.WWN as DEVICE_PORT_WWN, DEVICE_PORT.NUMBER, DEVICE_PORT.PORT_ID, DEVICE_PORT.TYPE as DEVICE_PORT_TYPE, DEVICE_PORT.
Views I SWITCH_INFO.STATUS as VIRTUAL_SWITCH_STATUS, SWITCH_INFO.FABRIC_ID, SWITCH_INFO.MONITORED, SWITCH_INFO.CRYPTO_CAPABLE from DEVICE_NODE, DEVICE_PORT, SWITCH_PORT, SWITCH_INFO where DEVICE_PORT.NODE_ID = DEVICE_NODE.ID and DEVICE_PORT.SWITCH_PORT_WWN = SWITCH_PORT.WWN and SWITCH_PORT.VIRTUAL_SWITCH_ID = SWITCH_INFO.ID and DEVICE_NODE.FABRIC_ID = SWITCH_INFO.FABRIC_ID; N2F_PORT_MAP_INFO create or replace view N2F_PORT_MAP_INFO as select N2F_PORT_MAP.VIRTUAL_SWITCH_ID, N2F_PORT_MAP.
I Views USER_DEFINED_DEVICE_DETAIL.TYPE as USER_DEFINED_TYPE, USER_DEFINED_DEVICE_DETAIL.IP_ADDRESS, USER_DEFINED_DEVICE_DETAIL.CONTACT, USER_DEFINED_DEVICE_DETAIL.LOCATION, USER_DEFINED_DEVICE_DETAIL.DESCRIPTION, USER_DEFINED_DEVICE_DETAIL.USER_DEFINED_VALUE1, USER_DEFINED_DEVICE_DETAIL.USER_DEFINED_VALUE2, USER_DEFINED_DEVICE_DETAIL.USER_DEFINED_VALUE3, FABRIC.PRINCIPAL_SWITCH_WWN as PRINCIPAL_WWN, DEVICE_FDMI_DETAILS.SERIAL_NUMBER AS FDMI_SERIAL_NUMBER, DEVICE_FDMI_DETAILS.
Views I FICON_DEVICE_PORT.FLAG, FICON_DEVICE_PORT.PARAMS, USER_DEFINED_DEVICE_DETAIL.NAME, USER_DEFINED_DEVICE_DETAIL.TYPE as USER_DEFINED_TYPE, USER_DEFINED_DEVICE_DETAIL.IP_ADDRESS, USER_DEFINED_DEVICE_DETAIL.CONTACT, USER_DEFINED_DEVICE_DETAIL.LOCATION, USER_DEFINED_DEVICE_DETAIL.DESCRIPTION, USER_DEFINED_DEVICE_DETAIL.USER_DEFINED_VALUE1, USER_DEFINED_DEVICE_DETAIL.USER_DEFINED_VALUE2, USER_DEFINED_DEVICE_DETAIL.USER_DEFINED_VALUE3, DEVICE_NODE.WWN as DEVICE_NODE_WWN, DEVICE_NODE.
I Views DEVICE_PORT_GIGE_PORT_LINK.DEVICE_PORT_ID = DEVICE_PORT.ID; DEV_PORT_MAC_ADDR_MAP_INFO create or replace view DEV_PORT_MAC_ADDR_MAP_INFO as select DEVICE_PORT_MAC_ADDRESS_MAP.DEVICE_PORT_ID, DEVICE_PORT_MAC_ADDRESS_MAP.MAC_ADDRESS, DEVICE_NODE.ID as DEVICE_NODE_ID, DEVICE_NODE.FABRIC_ID, DEVICE_PORT.TRUSTED, DEVICE_PORT.CREATION_TIME, DEVICE_PORT.MISSING, DEVICE_PORT.MISSING_TIME from DEVICE_PORT_MAC_ADDRESS_MAP, DEVICE_PORT, DEVICE_NODE where DEVICE_PORT_MAC_ADDRESS_MAP.
Views I ISL.ID, ISL.FABRIC_ID, ISL.COST, ISL.TYPE, ISL.SOURCE_DOMAIN_ID, ISL.SOURCE_PORT_NUMBER, ISL.MISSING, ISL.MISSING_TIME, ISL.TRUSTED, ISL.CREATION_TIME, ISL.TRUNKED, SOURCE_VIRTUAL_SWITCH.ID as SOURCE_SWITCH_ID, SOURCE_VIRTUAL_SWITCH.NAME as SOURCE_SWITCH_NAME, SOURCE_VIRTUAL_SWITCH.WWN as SOURCE_SWITCH_WWN, SOURCE_VIRTUAL_SWITCH.CORE_SWITCH_ID as SOURCE_CORE_SWITCH_ID, SOURCE_VIRTUAL_SWITCH.BASE_SWITCH as SOURCE_BASE_SWITCH, SOURCE_VIRTUAL_SWITCH.
I Views DEST_VIRTUAL_SWITCH.DOMAIN_ID = ISL.DEST_DOMAIN_ID and DEST_SWITCH_PORT.VIRTUAL_SWITCH_ID = DEST_VIRTUAL_SWITCH.ID and DEST_SWITCH_PORT.CATEGORY = 1 and DEST_SWITCH_PORT.USER_PORT_NUMBER = ISL.DEST_PORT_NUMBER and FABRIC.ID = ISL.FABRIC_ID; ETHERNET_ISL_INFO create or replace view ETHERNET_ISL_INFO as select ETHERNET_ISL.ID as ETHERNET_ISL_ID, ETHERNET_ISL.SOURCE_PORT_ID, ETHERNET_ISL.DEST_PORT_ID, ETHERNET_ISL.TRUSTED, ETHERNET_ISL.CREATION_TIME, ETHERNET_ISL.MISSING, ETHERNET_ISL.
Views I EVENT.SOURCE_NAME as SOURCE_NAME, EVENT.SOURCE_ADDR as SOURCE_ADDR, EVENT.LAST_OCCURRENCE_HOST_TIME as LAST_OCCURRENCE_HOST_TIME, EVENT.FIRST_OCCURRENCE_HOST_TIME as FIRST_OCCURRENCE_HOST_TIME, EVENT.EVENT_COUNT as EVENT_COUNT, EVENT.EVENT_KEY as EVENT_KEY, EVENT.EVENT_AUDIT as AUDIT, EVENT.RESOLVED as RESOLVED, EVENT.ACKED_TIME as ACKED_TIME, EVENT.EVENT_ACTION_ID as EVENT_ACTION_ID, EVENT.DEVICE_GROUP_ID as DEVICE_GROUP_ID, EVENT.PORT_GROUP_ID as PORT_GROUP_ID, EVENT.SPECIAL_EVENT, EVENT_ORIGIN.
I Views EVENT.SOURCE_ADDR as SOURCE_ADDR, EVENT.LAST_OCCURRENCE_HOST_TIME as LAST_OCCURRENCE_HOST_TIME, EVENT.FIRST_OCCURRENCE_HOST_TIME as FIRST_OCCURRENCE_HOST_TIME, EVENT.EVENT_COUNT as EVENT_COUNT, EVENT.EVENT_AUDIT as AUDIT, EVENT.EVENT_ACTION_ID, EVENT.SPECIAL_EVENT, EVENT_ORIGIN.ID as ORIGIN, EVENT_CATEGORY.ID as EVENT_CATEGORY, EVENT_DESCRIPTION.DESCRIPTION as DESCRIPTION, EVENT_MODULE.ID as MODULE, EVENT_DETAILS.RAS_LOG_ID as RAS_LOG_ID, EVENT_DETAILS.
Views I FABRIC.ENHANCED_TI_ZONE_SUPPORT, FABRIC.FABRIC_NAME, VIRTUAL_SWITCH.ID as SEED_SWITCH_ID, VIRTUAL_SWITCH.VIRTUAL_FABRIC_ID, VIRTUAL_SWITCH.INTEROP_MODE, CORE_SWITCH.IP_ADDRESS as SEED_SWITCH_IP_ADDRESS, (select count(*) from FABRIC_MEMBER where FABRIC_MEMBER.FABRIC_ID = FABRIC.ID) as SWITCH_COUNT from FABRIC, CORE_SWITCH, VIRTUAL_SWITCH, FABRIC_MEMBER where FABRIC.SEED_SWITCH_WWN = VIRTUAL_SWITCH.WWN and VIRTUAL_SWITCH.CORE_SWITCH_ID = CORE_SWITCH.ID and FABRIC_MEMBER.FABRIC_ID = FABRIC.
I Views FCIP_TUNNEL_CIRCUIT.DSCP_LOW, FCIP_TUNNEL_CIRCUIT.FAILOVER_CIRCUIT, FCIP_TUNNEL_CIRCUIT.FAILOVER_GROUP_ID, GIGE_PORT.PORT_NUMBER GIGE_PORT_NUMBER, GIGE_PORT.SLOT_NUMBER GIGE_PORT_SLOT_NUMBER, FCIP_CIRCUIT_PORT_MAP.SWITCH_PORT_ID GIGE_PORT_ID, SWITCH_PORT.VIRTUAL_SWITCH_ID, SWITCH_PORT.USER_PORT_NUMBER from FCIP_TUNNEL_CIRCUIT left outer join FCIP_CIRCUIT_PORT_MAP on FCIP_CIRCUIT_PORT_MAP.CIRCUIT_ID = FCIP_TUNNEL_CIRCUIT.ID left outer join GIGE_PORT on FCIP_CIRCUIT_PORT_MAP.
Views I FCIP_TUNNEL.MISMATCHED_CONFIG_DETAILS, FCIP_TUNNEL.SLOT_NUMBER, FCIP_TUNNEL.FICON_ENABLED, FCIP_TUNNEL.TPERF_ENABLED, FCIP_TUNNEL.AUTH_KEY, FCIP_TUNNEL.CONNECTED_COUNT, FCIP_TUNNEL.TUNNEL_STATUS_STRING, FCIP_TUNNEL.COMPRESSION_MODE, FCIP_TUNNEL.TURBO_WRITE_ENABLED, FCIP_TUNNEL.TAPE_ACCELERATION_ENABLED, FCIP_TUNNEL.IPSEC_ENABLED, FCIP_TUNNEL.PRESHARED_KEY, FCIP_TUNNEL.QOS_HIGH, FCIP_TUNNEL.QOS_MEDIUM, FCIP_TUNNEL.QOS_LOW, FCIP_TUNNEL.BACKWARD_COMPATIBLE, FCIP_TUNNEL.
I Views FRU.TAG, FRU.PART_NUMBER, FRU.SERIAL_NUMBER, FRU.VENDOR_PART_NUMBER, FRU.VENDOR_SERIAL_NUMBER, FRU.CAN_BE_FRUED, FRU.SLOT_NUMBER, FRU.MANUFACTURER_DATE, FRU.UPDATE_DATE, FRU.VERSION, FRU.MANUFACTURER, FRU.VENDOR_EQUIPMENT_TYPE, FRU.OPERATIONAL_STATUS, FRU.TOTAL_OUTPUT_POWER, FRU.SPEED, FRU.CREATION_TIME, FRU.LAST_UPDATE_TIME, FRU.PREVIOUS_OP_STATUS, FRU.VENDOR, CORE_SWITCH.WWN as PHYSICAL_SWITCH_WWN, VIRTUAL_SWITCH.SWITCH_MODE as VIRTUAL_SWITCH_MODE, VIRTUAL_SWITCH.
Views I GIGE_PORT_INFO create or replace view GIGE_PORT_INFO as select GIGE_PORT.ID, GIGE_PORT.SWITCH_PORT_ID, GIGE_PORT.PORT_NUMBER, GIGE_PORT.SLOT_NUMBER, GIGE_PORT.ENABLED, GIGE_PORT.SPEED, GIGE_PORT.MAX_SPEED, GIGE_PORT.MAC_ADDRESS, GIGE_PORT.PORT_NAME, GIGE_PORT.OPERATIONAL_STATUS, GIGE_PORT.LED_STATE, GIGE_PORT.SPEED_LED_STATE, GIGE_PORT.PORT_TYPE, GIGE_PORT.PERSISTENTLY_DISABLED, GIGE_PORT.INTERFACE_TYPE, GIGE_PORT.CHECKSUM, GIGE_PORT.FCIP_CAPABLE, coalesce(CARD.
I Views HBA_PORT.SUPPORTED_FC4_TYPES, HBA_PORT.SUPPORTED_COS, HBA_PORT.TRUSTED as HBA_PORT_TRUSTED, HBA_PORT.CREATION_TIME as HBA_PORT_CREATION_TIME, HBA_PORT.MISSING as HBA_PORT_MISSING, HBA_PORT.MISSING_TIME as HBA_PORT_MISSING_TIME, HBA_PORT.OPERATING_SPEED, HBA_PORT.CNA_PORT_ID, HBA_PORT.PORT_NWWN, HBA_PORT.PHYSICAL_PORT_WWN, HBA_PORT.SWITCH_IP, HBA_PORT.PRINCIPAL_SWITCH_WWN, HBA_PORT.HBA_ID, HBA_PORT.PORT_NUMBER, HBA_PORT.NAME, HBA_PORT.FACTORY_PORT_WWN, HBA_PORT.FACTORY_NODE_WWN, HBA_PORT.
I Views HBA_PORT_FCOE_DETAILS.BANDWIDTH as FCOE_BANDWIDTH, HBA_PORT_FCOE_DETAILS.FIP_STATE, HBA_PORT_FCOE_DETAILS.DISCOVERY_PRIORITY, HBA_PORT_FCOE_DETAILS.FCF_FCMAP, HBA_PORT_FCOE_DETAILS.FCF_FPMA_MAC, HBA_PORT_FCOE_DETAILS.FCF_MAC, HBA_PORT_FCOE_DETAILS.FCF_MODE, HBA_PORT_FCOE_DETAILS.FCF_NAMEID, HBA_PORT_FCOE_DETAILS.FCPIM_MPIO_MODE, HBA_PORT_FCOE_DETAILS.PORT_LOG_ENABLED, HBA_PORT_FCOE_DETAILS.MAX_FRAME_SIZE as FCOE_MAX_FRAME_SIZE, HBA_PORT_FCOE_DETAILS.MTU as FCOE_MTU, HBA_PORT_FCOE_DETAILS.
I Views HBA_REMOTE_PORT.SUPPORTED_COS, HBA_REMOTE_PORT.DEVICE_TYPE, HBA_REMOTE_PORT.BIND_TYPE, HBA_REMOTE_PORT.TARGET_ID, HBA_REMOTE_PORT.ROLE, HBA_REMOTE_PORT.VENDOR, HBA_REMOTE_PORT.PRODUCT_ID, HBA_REMOTE_PORT.PRODUCT_VERSION, HBA_REMOTE_PORT.QOS_PRIORITY, HBA_REMOTE_PORT.QOS_FLOW_ID, HBA_REMOTE_PORT.CURRENT_SPEED, HBA_REMOTE_PORT.TRL_ENFORCED, HBA_REMOTE_PORT.BUS_NO, HBA_REMOTE_PORT_LUN.FCP_LUN, HBA_REMOTE_PORT_LUN.CAPACITY, HBA_REMOTE_PORT_LUN.BLOCK_SIZE, HBA_REMOTE_PORT_LUN.
Views I DEPLOYMENT_STATUS.DEPLOYMENT_CONFIGURATION_ID = DEPLOYMENT_CONFIGURATION.ID and HEALTH_STATUS.DEPLOYMENT_STATUS_ID = DEPLOYMENT_STATUS.ID and HEALTH_TARGET_STATUS.HEALTH_STATUS_ID = HEALTH_STATUS.ID; HOST_DISCOVERY_REQUEST_INFO create or replace view HOST_DISCOVERY_REQUEST_INFO as select HOST_DISCOVERY_REQUEST.ID, HOST_DISCOVERY_REQUEST.HOST_NAME AS REQUEST_HOST_NAME, HOST_DISCOVERY_REQUEST.DEVICE_ENCLOSURE_ID, HOST_DISCOVERY_REQUEST.REQUEST_GROUP_ID, HOST_DISCOVERY_REQUEST.
I Views DEVICE_ENCLOSURE.MISSING, DEVICE_ENCLOSURE.MISSING_TIME, DEVICE_ENCLOSURE.HOST_NAME, DEVICE_ENCLOSURE.SYSLOG_REGISTERED, DEVICE_ENCLOSURE.VIRTUALIZATION, DEVICE_ENCLOSURE.MANAGED_ELEMENT_ID, HOST_DISCOVERY_REQUEST.MANAGEMENT_STATE_DETAILS from HOST_DISCOVERY_REQUEST join HOST_DISCOVERY_OPTION on HOST_DISCOVERY_REQUEST.HOST_DISCOVERY_OPTION_ID = HOST_DISCOVERY_OPTION.ID left outer join DEVICE_ENCLOSURE on HOST_DISCOVERY_REQUEST.DEVICE_ENCLOSURE_ID = DEVICE_ENCLOSURE.
Views I SOURCE_SWITCH_PORT.WWN as SOURCE_SWITCH_PORT_WWN, SOURCE_SWITCH_PORT.NAME as SOURCE_SWITCH_PORT_NAME, SOURCE_SWITCH_PORT.TYPE as PORT_TYPE, SOURCE_SWITCH_PORT.KIND as SOURCE_SWITCH_PORT_KIND, SOURCE_SWITCH_PORT.PHYSICAL_PORT as SOURCE_PHYSICAL_PORT, SOURCE_SWITCH_PORT.TRUNKED as SOURCE_SWITCH_PORT_TRUNKED, ISL.DEST_DOMAIN_ID, ISL.DEST_PORT_NUMBER, DEST_VIRTUAL_SWITCH.ID as DEST_SWITCH_ID, DEST_VIRTUAL_SWITCH.NAME as DEST_SWITCH_NAME, DEST_VIRTUAL_SWITCH.WWN as DEST_SWITCH_WWN, DEST_VIRTUAL_SWITCH.
I Views SOURCE_DEVICE.DEVICE_ID as SOURCE_DEVICE_ID, SOURCE_DEVICE.SYS_NAME as SOURCE_DEVICE_NAME, SOURCE_SWITCH_PORT.ID as SOURCE_SWITCH_PORT_ID, SOURCE_SWITCH_PORT.NAME as SOURCE_SWITCH_PORT_NAME, SOURCE_SWITCH_PORT.IDENTIFIER as SOURCE_SWITCH_PORT_IDENTIFIER, SOURCE_SWITCH_PORT.TYPE as PORT_TYPE, SOURCE_SWITCH_PORT.KIND as SOURCE_SWITCH_PORT_KIND, SOURCE_SWITCH_PORT.PHYSICAL_PORT as SOURCE_PHYSICAL_PORT, SOURCE_SWITCH_PORT.TRUNKED as SOURCE_SWITCH_PORT_TRUNKED, ISL.DEST_DOMAIN_ID, ISL.
Views I ISL_TRUNK_GROUP.ID, ISL_TRUNK_GROUP.VIRTUAL_SWITCH_ID, ISL_TRUNK_GROUP.MASTER_USER_PORT, ISL_TRUNK_MEMBER.MISSING, ISL_TRUNK_MEMBER.TRUSTED, ISL_TRUNK_MEMBER.MISSING_TIME, ISL_TRUNK_MEMBER.PORT_NUMBER, SWITCH_PORT.WWN, SWITCH_PORT.TYPE, SWITCH_PORT.STATUS, SWITCH_PORT.SPEED, SWITCH_PORT.ID as SWITCH_PORT_ID, SWITCH_PORT.SPEED_TYPE from ISL_TRUNK_GROUP, ISL_TRUNK_MEMBER, SWITCH_PORT where ISL_TRUNK_GROUP.id = ISL_TRUNK_MEMBER.GROUP_ID and ISL_TRUNK_GROUP.VIRTUAL_SWITCH_ID = SWITCH_PORT.
I Views VIRTUAL_SWITCH SOURCE_VIRTUAL_SWITCH, VIRTUAL_SWITCH DEST_VIRTUAL_SWITCH where ISL_INFO.SOURCE_SWITCH_ID = ISL_TRUNK_GROUP.VIRTUAL_SWITCH_ID and ISL_INFO.SOURCE_PORT_NUMBER = ISL_TRUNK_GROUP.MASTER_USER_PORT and ISL_INFO.SOURCE_SWITCH_ID = SOURCE_VIRTUAL_SWITCH.ID and SOURCE_VIRTUAL_SWITCH.CORE_SWITCH_ID = SOURCE_CORE_SWITCH.ID and ISL_INFO.DEST_SWITCH_ID = DEST_VIRTUAL_SWITCH.ID and DEST_VIRTUAL_SWITCH.CORE_SWITCH_ID = DEST_CORE_SWITCH.
Views I INTERFACE.NAME AS INTERFACE_NAME, SWITCH_PORT.WWN AS SWITCH_PORT_WWN, SWITCH_PORT.SLOT_NUMBER AS SWITCH_PORT_SLOT, SWITCH_PORT.PORT_NUMBER AS SWITCH_PORT_NUMBER, SWITCH_PORT.PORT_ID AS SWITCH_PORT_PORT_ID, FCIP_TUNNEL_CIRCUIT.CIRCUIT_NUMBER, FCIP_TUNNEL_CIRCUIT.SLOT_NUMBER AS FCIP_SLOT_NUMBER, FCIP_TUNNEL_CIRCUIT.VE_PORT_NUMBER AS FCIP_PORT_NUMBER, NP_FLOW_DEFINITION.NAME AS FLOW_NAME, MAPS_EVENT_CAUSE_ACTION.ACTION FROM MAPS_EVENT_DETAILS JOIN MAPS_EVENT ON MAPS_EVENT.ID = MAPS_EVENT_DETAILS.
I Views TEMP_FOUNDRY_MODULE.CODE_FLASH_SIZE, TEMP_FOUNDRY_MODULE.MODULE_TYPE, TEMP_MODULE.DESCRIPTION as MODULE_TYPE_TXT, TEMP_MODULE.MODULE_STATUS, TEMP_MODULE.REDUNDANT_STATUS from ( select distinct MODULE.MODULE_ID, MODULE.NUM_PORTS, MODULE.IS_PRESENT, MODULE.IS_MANAGEMENT_MODULE, MODULE.NUM_CPUS, MODULE.HW_REVISION, MODULE.SW_REVISION, SLOT.SLOT_NUM, PHYSICAL_DEVICE.DEVICE_ID, PHYSICAL_DEVICE.PHYSICAL_DEVICE_ID, PHYSICAL_DEVICE.UNIT_NUMBER, PHYSICAL_DEVICE.UNIT_PRESENT, DEVICE.
Views I AG_N_PORT.REMOTE_PORT_WWN as EDGE_SWITCH_PORT_WWN, AG_N_PORT.WWN as AG_N_PORT_WWN, AG_F_PORT.USER_PORT_NUMBER as F_PORT, AG_F_PORT.WWN as AG_F_PORT_WWN, AG_F_PORT.REMOTE_NODE_WWN from NPORT_WWN_MAP, SWITCH_PORT AG_N_PORT, SWITCH_PORT AG_F_PORT, VIRTUAL_SWITCH AG_SWITCH where NPORT_WWN_MAP.VIRTUAL_SWITCH_ID = AG_N_PORT.VIRTUAL_SWITCH_ID and NPORT_WWN_MAP.N_PORT = AG_N_PORT.USER_PORT_NUMBER and NPORT_WWN_MAP.VIRTUAL_SWITCH_ID = AG_F_PORT.VIRTUAL_SWITCH_ID and NPORT_WWN_MAP.
I Views end) when TEMP_DEVICE.OPER_STATUS = 2 then 'NOT REACHABLE' when TEMP_DEVICE.OPER_STATUS = 3 then 'DEGRADED' when TEMP_DEVICE.OPER_STATUS = 4 then 'MARGINAL' when TEMP_DEVICE.OPER_STATUS = 5 then 'DOWN' else 'UNKNOWN' end as OPER_STATUS_TXT, TEMP_DEVICE.FABRIC_WATCH_STATUS, TEMP_DEVICE.FABRIC_WATCH_STATUS_REASON, TEMP_DEVICE.ADMIN_STATUS, case when TEMP_DEVICE.ADMIN_STATUS = 1 then 'TROUBLESHOOTING' else 'NORMAL' end as ADMIN_STATUS_TXT, TEMP_DEVICE.ADMIN_STATUS_LAST_UPDATED, TEMP_DEVICE.
Views I when TEMP_DEVICE.CATEGORY = 2 then 'CHASSIS' when TEMP_DEVICE.CATEGORY = 3 then 'STACK' when TEMP_DEVICE.CATEGORY = 4 then 'ACCESS POINT' when TEMP_DEVICE.CATEGORY = 5 then 'WIRELESS CONTROLLER' else 'UNKNOWN' end as CATEGORY_TXT, TEMP_DEVICE.SUB_CATEGORY, case when TEMP_DEVICE.SUB_CATEGORY = 1 then 'DCB 8000' when TEMP_DEVICE.SUB_CATEGORY = 2 then 'DCB 8470' when TEMP_DEVICE.SUB_CATEGORY = 3 then 'DCB M8428' when TEMP_DEVICE.SUB_CATEGORY = 4 then 'DCX' when TEMP_DEVICE.
I Views PORT_BOTTLENECK_CONF_INFO This view provides combine port bottleneck configuration and enough information from switch port for the client to identify the port. create or replace view PORT_BOTTLENECK_CONF_INFO as select PORT_BOTTLENECK_CONFIG.SWITCH_PORT_ID, PORT_BOTTLENECK_CONFIG.BOTTLENECK_DETECT_ENABLED, PORT_BOTTLENECK_CONFIG.ALERTS_ENABLED, PORT_BOTTLENECK_CONFIG.CONGESTION_THRESHOLD, PORT_BOTTLENECK_CONFIG.LATENCY_THRESHOLD, PORT_BOTTLENECK_CONFIG.WINDOW_, PORT_BOTTLENECK_CONFIG.
Views I SWITCH_PORT.PORT_NUMBER, SWITCH_PORT.SLOT_NUMBER, SWITCH_PORT.FICON_SUPPORTED, SWITCH_PORT.STATE, SWITCH_PORT.USER_PORT_NUMBER, VIRTUAL_SWITCH.NAME as VIRTUAL_SWITCH_NAME, VIRTUAL_SWITCH.ID as SWITCH_ID, FABRIC.NAME as FABRIC_NAME, FABRIC.MANAGED as FABRIC_MANAGED, PORT_GROUP.ID as PORT_GROUP_ID, PORT_GROUP_MEMBER.ID as PORT_GROUP_MEMBER_ID from SWITCH_PORT, VIRTUAL_SWITCH, FABRIC, FABRIC_MEMBER, PORT_GROUP_MEMBER, PORT_GROUP where VIRTUAL_SWITCH .ID = SWITCH_PORT.
I Views PORT_PROFILE.ACTIVATED, PORT_PROFILE_QOS_MAP.DCB_MODE, PORT_PROFILE_QOS_MAP.ETHERNET_MODE, PORT_PROFILE_QOS_MAP.PAUSE_TX, PORT_PROFILE_QOS_MAP.PAUSE_RX, PORT_PROFILE_QOS_MAP.COS_COS, PORT_PROFILE_QOS_MAP.TRAFFIC_CLASS, PORT_PROFILE_QOS_MAP.COS, PORT_PROFILE_QOS_MAP.CEE_MAP, PORT_PROFILE_QOS_PFC_MAP.COS0_TX, PORT_PROFILE_QOS_PFC_MAP.COS0_RX, PORT_PROFILE_QOS_PFC_MAP.COS1_TX, PORT_PROFILE_QOS_PFC_MAP.COS1_RX, PORT_PROFILE_QOS_PFC_MAP.COS2_TX, PORT_PROFILE_QOS_PFC_MAP.
Views I select PORT_PROFILE_MAC_MAP.PROFILE_ID, PORT_PROFILE_MAC_MAP.MAC, PORT_PROFILE_MAC_MAP.NAME as MAC_NAME, VM_VIRTUAL_ETHERNET_ADAPTER.PORT_GROUP_NAME, VM_VIRTUAL_ETHERNET_ADAPTER.DISPLAY_LABEL, VM_VIRTUAL_MACHINE.NAME as VM_NAME, VM_VCENTER_MEMBER.HOST_NAME as HOST_NAME, VM_VCENTER.NAME as VCENTER_NAME, INTERFACE.IDENTIFIER from PORT_PROFILE_MAC_MAP left outer join VM_VIRTUAL_ETHERNET_ADAPTER on PORT_PROFILE_MAC_MAP.MAC = VM_VIRTUAL_ETHERNET_ADAPTER.
I Views select DEVICE_ID, IN_SLOT, IN_PORT, OUT_SLOT, OUT_PORT, L4_PROTOCOL, IP_TOS, SRC_SUBNET_BITS, DEST_SUBNET_BITS, IN_PRIORITY, OUT_PRIORITY, IN_VLAN, OUT_VLAN, L3_PROTOCOL, L4_SRC_PORT, L4_DEST_PORT, TIME_IN_SECONDS, SRC_MAC, DEST_MAC, L3_SRC_ADDR, L3_DEST_ADDR, TCP_FLAGS, LOCAL_AS, SRC_AS, SRC_PEER_AS, SFLOW_IP_ROUTE_INFO_ID, IP_FLOW_LABEL, SRC_USER, DEST_USER, FRAMES, BYTES, IN_UNIT, OUT_UNIT from SFLOW_HOUR_SUMMARY where SLNUM <= (select MAX_SLNUM from SFLOW_HOUR_SUMMARY_SLNUM fetch first 1 rows
Views I select distinct EE_MONITOR.NAME, EE_MONITOR.SWITCH_PORT_ID, EE_MONITOR.SOURCE_PORT_ID, EE_MONITOR.DEST_PORT_ID, EE_MONITOR_STATS.TX, EE_MONITOR_STATS.RX, EE_MONITOR_STATS.CRCERRORS, EE_MONITOR_STATS.CREATION_TIME, SOURCE_PORT.PORT_ID as SID, DEST_PORT.PORT_ID as DID, SOURCE_NODE.WWN as SOURCE_DEVICE_WWN, SOURCE_PORT.WWN as SOURCE_PORT_WWN, DEST_NODE.WWN as DEST_DEVICE_WWN, DEST_PORT.WWN as DEST_PORT_WWN, SOURCE_NODE.FABRIC_ID as SOURCE_FABRIC_ID, DEST_NODE.FABRIC_ID as DEST_FABRIC_ID, SOURCE_PORT.
I Views VIRTUAL_SWITCH.SWITCH_MODE as VIRTUAL_SWITCH_MODE, VIRTUAL_SWITCH.MANAGEMENT_STATE, VIRTUAL_SWITCH.MONITORED from SENSOR, CORE_SWITCH, VIRTUAL_SWITCH where SENSOR.CORE_SWITCH_ID = CORE_SWITCH.ID and SENSOR.CORE_SWITCH_ID = VIRTUAL_SWITCH.CORE_SWITCH_ID; SMART_CARD_USAGE_INFO create or replace view SMART_CARD_USAGE_INFO as select SC.ID SMART_CARD_ID, SC.CARD_TYPE, SC.CARD_INFO, SC.CARDCN_ID, SC.FIRST_NAME, SC.LAST_NAME, SC.NOTES, SC.CREATION_TIME, -1 ENGINE_ID, EG.ID ENCRYPTION_GROUP_ID, EG.
Views I and EG.ID = RCGM.ENCRYPTION_GROUP_ID and SC.CARD_TYPE = 1 union select SC.ID SMART_CARD_ID, SC.CARD_TYPE, SC.CARD_INFO, SC.CARDCN_ID, SC.FIRST_NAME, SC.LAST_NAME, SC.NOTES, SC.CREATION_TIME, EE.ID ENGINE_ID, -1 ENCRYPTION_GROUP_ID, '' GROUP_NAME, -1 CARD_POSITION, EE.SWITCH_ID CRYPTO_SWITCH_ID, EE.SLOT_NUMBER SLOT_NUMBER from SMART_CARD SC, ENCRYPTION_ENGINE EE, SYSTEM_CARD_ENGINE_MAPPING SCEM where SC.ID = SCEM.SMART_CARD_ID and EE.ID = SCEM.ENCRYPTION_ENGINE_ID and SC.
I Views CORE_SWITCH.IP_ADDRESS, CORE_SWITCH.WWN as PHYSICAL_SWITCH_WWN, CORE_SWITCH.OPERATIONAL_STATUS as PHYSICAL_OPERATIONAL_STATUS, CORE_SWITCH.TYPE, CORE_SWITCH.MAX_VIRTUAL_SWITCHES, CORE_SWITCH.FIRMWARE_VERSION, CORE_SWITCH.VENDOR, CORE_SWITCH.REACHABLE, CORE_SWITCH.UNREACHABLE_TIME, CORE_SWITCH.MODEL, CORE_SWITCH.SYSLOG_REGISTERED, CORE_SWITCH.SNMP_REGISTERED, CORE_SWITCH.USER_IP_ADDRESS, CORE_SWITCH.MANAGING_SERVER_IP_ADDRESS, CORE_SWITCH.CREATION_TIME as CS_CREATION_TIME, CORE_SWITCH.
Views I VIRTUAL_SWITCH.MANAGED_ELEMENT_ID, VIRTUAL_SWITCH.RNID_SEQUENCE_NUMBER as VS_RNID_SEQUENCE_NUMBER, VIRTUAL_SWITCH.CLUSTER_MODE, VIRTUAL_SWITCH.VCS_ID, VIRTUAL_SWITCH.CLUSTER_TYPE, VIRTUAL_SWITCH.RNID_TAG, VIRTUAL_SWITCH.SWITCH_ID, VIRTUAL_SWITCH.MONITORED, VIRTUAL_SWITCH.MAPS_ENABLED_ACTIONS, VIRTUAL_SWITCH.FEATURES_ENABLED, VIRTUAL_SWITCH.FABRIC_STATUS, FABRIC_MEMBER.FABRIC_ID, FABRIC_MEMBER.TRUSTED, FABRIC_MEMBER.MISSING, FABRIC_MEMBER.MISSING_TIME, CORE_SWITCH_DETAILS.
I Views where VIRTUAL_SWITCH.CORE_SWITCH_ID = CORE_SWITCH.ID and FABRIC_MEMBER.VIRTUAL_SWITCH_ID = VIRTUAL_SWITCH.ID and CORE_SWITCH_DETAILS.CORE_SWITCH_ID = CORE_SWITCH.ID; SWITCH_DISCOVERED_MAC_INFO create or replace view SWITCH_DISCOVERED_MAC_INFO as select L2_NEIGHBOR.LLDP_REM_CHASSIS_ID_VALUE, L2_NEIGHBOR.INTERFACE_ID, INTERFACE.NAME as INTERFACE_NAME, DEVICE.SYS_NAME as DEVICE_NAME, DEVICE.IP_ADDRESS, DEVICE.DEVICE_ID from L2_NEIGHBOR, INTERFACE, DEVICE where L2_NEIGHBOR.
Views I SWITCH_PORT.REMOTE_PORT_WWN, SWITCH_PORT.LICENSED, SWITCH_PORT.SWAPPED, SWITCH_PORT.TRUNKED, SWITCH_PORT.TRUNK_MASTER, SWITCH_PORT.PERSISTENT_DISABLE, SWITCH_PORT.FICON_SUPPORTED, SWITCH_PORT.BLOCKED, SWITCH_PORT.PROHIBIT_PORT_NUMBERS, SWITCH_PORT.PROHIBIT_PORT_COUNT, SWITCH_PORT.NPIV, SWITCH_PORT.NPIV_CAPABLE, SWITCH_PORT.NPIV_ENABLED, SWITCH_PORT.FC_FAST_WRITE_ENABLED, SWITCH_PORT.ISL_RRDY_ENABLED, SWITCH_PORT.RATE_LIMIT_CAPABLE, SWITCH_PORT.RATE_LIMITED, SWITCH_PORT.QOS_CAPABLE, SWITCH_PORT.
I Views CORE_SWITCH.FIRMWARE_VERSION as FIRMWARE_VERSION, CORE_SWITCH.IP_ADDRESS as IP_ADDRESS, CORE_SWITCH.WWN as PHYSICAL_SWITCH_WWN, CORE_SWITCH.MODEL as SWITCH_MODEL, CORE_SWITCH_DETAILS.MODEL_NUMBER as SWITCH_MODEL_NUMBER FROM SWITCH_PORT, VIRTUAL_SWITCH, CORE_SWITCH LEFT JOIN CORE_SWITCH_DETAILS ON CORE_SWITCH_DETAILS.CORE_SWITCH_ID = CORE_SWITCH.ID where SWITCH_PORT.VIRTUAL_SWITCH_ID = VIRTUAL_SWITCH.ID AND VIRTUAL_SWITCH.CORE_SWITCH_ID = CORE_SWITCH.
Views I coalesce(SNMP_CREDENTIALS.PORT_NUMBER, (select SNMP_PROFILE.PORT_NUMBER from SNMP_PROFILE where SNMP_PROFILE.NAME='default')) as SNMP_PORT_NUMBER, coalesce(SNMP_CREDENTIALS.RETRY_COUNT, (select SNMP_PROFILE.RETRY_COUNT from SNMP_PROFILE where SNMP_PROFILE.NAME='default')) as SNMP_RETRY_COUNT, coalesce(SNMP_CREDENTIALS.TIMEOUT, (select SNMP_PROFILE.TIMEOUT from SNMP_PROFILE where SNMP_PROFILE.NAME='default')) as SNMP_TIMEOUT, coalesce(SNMP_CREDENTIALS.VERSION, (select SNMP_PROFILE.
I Views TIME_SERIES_DATA_1_2HOUR.MEASURE_ID, TIME_SERIES_DATA_1_2HOUR.TARGET_ID, TIME_SERIES_DATA_1_2HOUR.COLLECTOR_ID, TIME_SERIES_DATA_1_2HOUR.MEASURE_INDEX, TIME_SERIES_DATA_1_2HOUR.ME_ID, TIME_SERIES_DATA_1_2HOUR.VALUE, TIME_SERIES_DATA_1_2HOUR.SUM_VALUE from TIME_SERIES_DATA_1_2HOUR) union all select TIME_SERIES_DATA_1_1DAY.TIME_IN_SECONDS, TIME_SERIES_DATA_1_1DAY.TARGET_TYPE, TIME_SERIES_DATA_1_1DAY.MEASURE_ID, TIME_SERIES_DATA_1_1DAY.TARGET_ID, TIME_SERIES_DATA_1_1DAY.
Views I ( SELECT de.device_id, cast (de.ip_address as varchar(255)) AS device_ip, tsd.target_type, de.device_id AS target_id, de.sys_name AS target_name, measure.measure_type AS collectible_type, tsd.measure_id AS collectible_id, tsd.collector_id, pdc.name AS collector_name, (measure.name::text || '.'::text) || tsd.measure_index::text AS collectible_name, measure.detail AS collectible_detail, tsd.value, tsd.time_in_seconds, tsd.measure_index FROM time_series_data_info tsd JOIN device de ON tsd.
I Views tsd.time_in_seconds, tsd.measure_index FROM time_series_data_info tsd JOIN switch_port sp ON (tsd.target_type = 4 OR tsd.target_type = 5 OR tsd.target_type = 6) AND tsd.target_id = sp.id JOIN switch_info vs ON sp.virtual_switch_id = vs.id JOIN pm_data_collector ON pm_data_collector.id = tsd.collector_id JOIN measure ON measure.id = tsd.measure_id UNION ALL SELECT 0 as device_id, cast (de.ip_address as varchar(255)) AS device_ip, tsd.target_type, de.id AS target_id, cast (de.
Views I TRILL_TRUNK_INFO create or replace view TRILL_TRUNK_INFO as select TRILL_TRUNK_GROUP.ID, TRILL_TRUNK_GROUP.ME_ID, TRILL_TRUNK_GROUP.MASTER_PORT_NUMBER, TRILL_TRUNK_MEMBER.PORT_NUMBER as MEMBER_PORT_NUMBER, MEMBER_DEVICE.DEVICE_ID, INTERFACE.INTERFACE_ID, VCS_CLUSTER_MEMBER.CLUSTER_ME_ID, CLUSTER_DEVICE.DEVICE_ID as CLUSTER_DEVICE_ID from TRILL_TRUNK_GROUP inner join TRILL_TRUNK_MEMBER on TRILL_TRUNK_MEMBER.GROUP_ID = TRILL_TRUNK_GROUP.ID inner join DEVICE as MEMBER_DEVICE on MEMBER_DEVICE.
I Views VIRTUAL_FCOE_PORT.VIRTUAL_SWITCH_ID, VIRTUAL_FCOE_PORT.PORT_WWN, VIRTUAL_FCOE_PORT.PORT_SPEED, VIRTUAL_FCOE_PORT.PORT_TYPE, VIRTUAL_FCOE_PORT.ENABLED, VIRTUAL_FCOE_PORT.STATUS, VIRTUAL_FCOE_PORT.TRUNK_INDEX, VIRTUAL_FCOE_PORT.PORT_NUMBER, VIRTUAL_FCOE_PORT.NAME, VIRTUAL_FCOE_PORT.SLOT_NUMBER, VIRTUAL_FCOE_PORT.VLAN_ID, VIRTUAL_FCOE_PORT.DEVICE_COUNT, VIRTUAL_FCOE_PORT.PEER_MAC, VIRTUAL_SWITCH.WWN as VIRTUAL_SWITCH_WWN, VIRTUAL_SWITCH.ROLE as SWITCH_ROLE, VIRTUAL_SWITCH.
Views I left outer join VIRTUAL_SWITCH VS2 on VIRTUAL_PORT_WWN_DETAILS.AG_NODE_WWN = VS2.WWN left outer join CORE_SWITCH CS1 on VS1.CORE_SWITCH_ID = CS1.ID left outer join CORE_SWITCH CS2 on VS2.CORE_SWITCH_ID = CS2.ID left outer join SWITCH_PORT SP1 on (SP1.VIRTUAL_SWITCH_ID=VS1.ID and VIRTUAL_PORT_WWN_DETAILS.SLOT_NUMBER = SP1.SLOT_NUMBER and VIRTUAL_PORT_WWN_DETAILS.SWITCH_PORT_NUMBER = SP1.PORT_NUMBER and SP1.TYPE NOT IN ('GigE-Port','TE-Port')) left outer join SWITCH_PORT SP2 on (SP2.
I Views left outer join VLAN_INT_MAC_GROUP_RELATION TEMP_MAC_RELATION on VLAN_INTERFACE_RELATION.VLAN_INTERFACE_RELATION_ID = TEMP_MAC_RELATION.VLAN_INTERFACE_RELATION_ID left outer join VLAN_INT_C_TAG_RELATION on VLAN_INT_C_TAG_RELATION.VLAN_INTERFACE_RELATION_ID = VLAN_INTERFACE_RELATION.VLAN_INTERFACE_RELATION_ID left outer join MAC_GROUP on TEMP_MAC_RELATION.MAC_GROUP_DB_ID = MAC_GROUP.ID left outer join MAC_GROUP_MEMBER on MAC_GROUP_MEMBER.MAC_GROUP_DB_ID = MAC_GROUP.
Views I DEVICE_PORT left join USER_DEFINED_DEVICE_DETAIL on DEVICE_PORT.WWN = USER_DEFINED_DEVICE_DETAIL.WWN, CORE_SWITCH, SWITCH_PORT, VIRTUAL_SWITCH, DEVICE_NODE, FABRIC, VM_STORAGE, VM_PATH, DEVICE_ENCLOSURE, VM_VIRTUAL_MACHINE, VM_VCENTER, VM_DATA_CENTER, VM_HOST where VM_PATH.HBA_PORT = DEVICE_PORT.WWN and VM_PATH.VM_ID = VM_VIRTUAL_MACHINE.ID and VM_PATH.STORAGE_ID = VM_STORAGE.ID and VM_STORAGE.HOST_ID = DEVICE_ENCLOSURE.ID and DEVICE_ENCLOSURE.ID = VM_HOST.DEVICE_ENCLOSURE_ID and DEVICE_ENCLOSURE.
I Views SWITCH_PORT.ID as SWITCH_PORT_ID, SWITCH_PORT.PORT_ID, SWITCH_PORT.PORT_NUMBER, SWITCH_PORT.SLOT_NUMBER, USER_DEFINED_DEVICE_DETAIL.NAME as ADAPTER_PORT_NAME, VM_PATH.FABRIC_ID, VM_PATH.VM_PORT_WWN, VM_STORAGE.MODEL, VM_STORAGE.VENDOR from DEVICE_PORT LEFT JOIN USER_DEFINED_DEVICE_DETAIL on DEVICE_PORT.WWN = USER_DEFINED_DEVICE_DETAIL.
Views I VM_HOST.CLUSTER_NAME, VM_DATA_CENTER.ID as DATA_CENTER_ID, VM_VIRTUAL_ETHERNET_ADAPTER.VM_STD_VSWITCH_PORT_GROUP_ID as STD_PORT_GROUP_ID, VM_VIRTUAL_ETHERNET_ADAPTER.VM_DV_PORT_ID as DV_PORT_ID, VM_STD_VSWITCH_PORT_GROUP.NAME as UPLINK_PORT_GROUP_NAME, VM_STANDARD_VIRTUAL_SWITCH.NAME as VM_SWITCH_NAME, VM_PHYSICAL_NIC.MAC_ADDRESS as PNIC_MAC, VM_HOST_END_DEV_CONNECTIVITY.INTERFACE_ID, INTERFACE.NAME as INTERFACE_NAME, INTERFACE.DEVICE_ID as SWITCH_ID, DEVICE.IP_ADDRESS as SWITCH_IP, DEVICE.
I Views VNIC_DV_PORT.SWITCH_NAME as VM_SWITCH_NAME, PNIC_DV_PORT.PNIC_MAC, VM_HOST_END_DEV_CONNECTIVITY.INTERFACE_ID, INTERFACE.NAME as INTERFACE_NAME, INTERFACE.DEVICE_ID as SWITCH_ID, DEVICE.IP_ADDRESS as SWITCH_IP, DEVICE.SYS_NAME as SWITCH_NAME, DEVICE.OPER_STATUS as SWITCH_STATUS, CLUSTER_DEVICE.VCS_LICENSED, PORT_PROFILE.NAME as PORT_PROFILE_NAME, PROFILE_DOMAINS.DOMAIN_NAMES as PORT_PROFILE_DOMAIN_NAMES, PROFILE_VLAN_MAP.VLAN as PORT_PROFILE_VLAN, VM_NETWORK_SETTINGS.
Views I VM_DATASTORE_DETAILS_INFO create or replace view VM_DATASTORE_DETAILS_INFO as select vm_virtual_machine_datastore_map.virtual_machine_id, vm_virtual_machine_datastore_map.vm_datastore_details_id, vm_datastore_details.datacenter_id, vm_virtual_machine_datastore_map.provisioned_storage, vm_virtual_machine_datastore_map.not_shared_storage, vm_virtual_machine_datastore_map.used_storage, vm_datastore_details.name, vm_datastore_details.accessible, vm_datastore_details.status, vm_datastore_details.
I Views and VM_PATH.VM_ID = VM_VIRTUAL_MACHINE.ID and SOURCE_PORT.ID = EE_MONITOR.SOURCE_PORT_ID and EE_MONITOR.ID = EE_MONITOR_STATS.EE_MONITOR_ID and SOURCE_PORT.NODE_ID = SOURCE_NODE.ID and DEST_PORT.ID = EE_MONITOR.DEST_PORT_ID and DEST_PORT.NODE_ID = DEST_NODE.ID and EE_MONITOR_STATS.
Views I VM_STORAGE.ID as LUN_ID, VM_STORAGE.NAME as LUN_NAME, VM_STORAGE.TARGET_NODE, VM_STORAGE.VENDOR, VM_STORAGE.MODEL, VM_STORAGE.SERIAL_NUMBER, VM_STORAGE.TYPE, VM_STORAGE.CAPACITY, VM_STORAGE.STATUS as LUN_STATUS, VM_STORAGE.PATH_POLICY, VM_STORAGE.ISCSI_TARGET_ADDRESS, VM_STORAGE.ISCSI_TARGET_PORT, VM_STORAGE.NAS_REMOTE_HOST, VM_STORAGE.NAS_REMOTE_PATH, VM_PATH.FS_TYPE, VM_PATH.ID as PATH_ID, VM_PATH.VM_ID as PATH_VM_ID, VM_PATH.NAME as PATH_NAME, VM_PATH.FABRIC_ID, VM_PATH.HBA_PORT, VM_PATH.
I Views SWITCH_PORT.PORT_ID, SWITCH_PORT.PORT_NUMBER from VM_STORAGE, VM_HOST, DEVICE_ENCLOSURE, VM_VIRTUAL_MACHINE, VM_PATH, DEVICE_PORT, SWITCH_PORT, CORE_SWITCH, FC_PORT_STATS, VIRTUAL_SWITCH where VM_PATH.HBA_PORT::BPCHAR = DEVICE_PORT.WWN and VM_PATH.VM_ID = VM_VIRTUAL_MACHINE.ID and VM_PATH.STORAGE_ID = VM_STORAGE.ID and VM_STORAGE.HOST_ID = DEVICE_ENCLOSURE.ID and DEVICE_ENCLOSURE.ID = VM_HOST.DEVICE_ENCLOSURE_ID and DEVICE_ENCLOSURE.ID = VM_VIRTUAL_MACHINE.HOST_ID and DEVICE_PORT.
I Views CORE_SWITCH, SWITCH_TE_PORT_STATS, VIRTUAL_SWITCH, DEVICE_PORT_MAC_ADDRESS_MAP, DEVICE_PORT_GIGE_PORT_LINK, GIGE_PORT where VM_PATH.HBA_PORT::BPCHAR = DEVICE_PORT.WWN and VM_PATH.VM_ID = VM_VIRTUAL_MACHINE.ID and VM_PATH.STORAGE_ID = VM_STORAGE.ID and VM_STORAGE.HOST_ID = DEVICE_ENCLOSURE.ID and DEVICE_ENCLOSURE.ID = VM_HOST.DEVICE_ENCLOSURE_ID and DEVICE_ENCLOSURE.ID = VM_VIRTUAL_MACHINE.HOST_ID and DEVICE_PORT.ID = DEVICE_PORT_MAC_ADDRESS_MAP.DEVICE_PORT_ID and DEVICE_PORT_MAC_ADDRESS_MAP.
I Views left outer join VR_CONN_DOMAIN_GROUP on VR_CONN_DOMAIN_GROUP.ID = VR_CONN_DOMAIN.VR_CONN_DOMAIN_GROUP_ID left outer join VIRTUAL_SWITCH on VIRTUAL_SWITCH.WWN = VR_CONN_MODULE.WWN left outer join CORE_SWITCH on CORE_SWITCH.ID = VIRTUAL_SWITCH.CORE_SWITCH_ID inner join FABRIC_MEMBER on FABRIC_MEMBER.VIRTUAL_SWITCH_ID = VIRTUAL_SWITCH.ID inner join FABRIC on FABRIC_MEMBER.FABRIC_ID = FABRIC.ID union select distinct VR_CONN_MODULE.ID, VR_CONN_MODULE.VR_CONN_DOMAIN_ID, VR_CONN_MODULE.
Views I DEVICE_NODE on DEVICE_NODE.WWN = VR_CONN_MODULE.WWN left outer join FABRIC on DEVICE_NODE.FABRIC_ID = FABRIC.ID; VR_CONN_MODULE_PORT_INFO create or replace view VR_CONN_MODULE_PORT_INFO as select VR_CONN_MODULE_PORT.ID, VR_CONN_MODULE_PORT.VR_CONN_MODULE_ID, VR_CONN_MODULE_PORT.WWN, VR_CONN_MODULE_PORT.POSITION_, VR_CONN_MODULE_PORT.FABRIC_NAME, VR_CONN_MODULE_PORT.SPEED, VR_CONN_MODULE_PORT.STATUS, VR_CONN_MODULE_PORT.LAST_STATUS, VR_CONN_MODULE_PORT.REMOTE_NODE_WWN, VR_CONN_MODULE_PORT.
I Views VR_CONN_DOMAIN.ID as VIRTUAL_CONNECT_DOMAIN_ID, VR_CONN_MODULE.ID as VIRTUAL_CONNECT_MODULE_ID, VR_CONN_MODULE_PORT.ID as VIRTUAL_CONNECT_MODULE_PORT_ID, VIRTUAL_SWITCH.ID as VIRTUAL_SWITCH_ID, coalesce(SWITCH_PORT.WWN, VR_CONN_MODULE_PORT.WWN) as UPLINK_PORT_WWN, coalesce(SWITCH_PORT.PORT_NUMBER, VR_CONN_MODULE_PORT.POSITION_) as UPLINK_PORT_NUMBER, DEVICE_PORT.ID as DEVICE_PORT_ID, DEVICE_PORT.NUMBER as DEVICE_PORT_NUMBER, DEVICE_PORT.TYPE as DEVICE_PORT_TYPE, DEVICE_NODE.
Views I VM_VIRTUAL_MACHINE.NAME AS VIRTUAL_MACHINE_NAME, VM_VCENTER_MEMBER.HOST_NAME, VM_VCENTER.NAME AS VCENTER_NAME from VM_VIRTUAL_ETHERNET_ADAPTER, VM_VIRTUAL_MACHINE, VM_VCENTER_MEMBER, VM_VCENTER where VM_VIRTUAL_ETHERNET_ADAPTER.VIRTUAL_MACHINE_ID = VM_VIRTUAL_MACHINE.ID AND VM_VIRTUAL_MACHINE.HOST_ID = VM_VCENTER_MEMBER.VM_HOST_ID AND VM_VCENTER_MEMBER.VM_VCENTER_ID = VM_VCENTER.ID union all select VM_HOST_VIRTUAL_NIC.MAC AS MAC_ADDRESS, VM_HOST_VIRTUAL_NIC.
I Views VM_VIRTUAL_MACHINE, VM_VCENTER_MEMBER, VM_VCENTER Where VM_VIRTUAL_ETHERNET_ADAPTER.VIRTUAL_MACHINE_ID = VM_VIRTUAL_MACHINE.ID And VM_VIRTUAL_MACHINE.HOST_ID = VM_VCENTER_MEMBER.VM_HOST_ID And VM_VCENTER_MEMBER.VM_VCENTER_ID = VM_VCENTER.ID; ZONE_DB_INFO create or replace view ZONE_DB_INFO as select ZONE_DB.ID, ZONE_DB.FABRIC_ID, ZONE_DB.OFFLINE, ZONE_DB.NAME, ZONE_DB.CREATED, ZONE_DB.CREATED_BY, ZONE_DB.LAST_MODIFIED, ZONE_DB.LAST_MODIFIED_BY, ZONE_DB.LAST_APPLIED, ZONE_DB.
Views I SFLOW_MINUTE_BGP_VIEW create or replace view SFLOW_MINUTE_BGP_VIEW as select DEVICE_ID, TIME_IN_SECONDS, SRC_AS, SFLOW_IP_ROUTE_INFO_ID, IN_VLAN, OUT_VLAN, FRAMES, BYTES from SFLOW_MINUTE_BGP where SLNUM <= (select MAX_SLNUM from SFLOW_MINUTE_BGP_SLNUM fetch first 1 rows only) union all select DEVICE_ID, TIME_IN_SECONDS, SRC_AS, SFLOW_IP_ROUTE_INFO_ID, IN_VLAN, OUT_VLAN, FRAMES, BYTES from SFLOW_STAGING where SLNUM >= (select MIN_SLNUM from SFLOW_STAGING_SLNUM fetch first 1 rows only) and SRC_AS !
I Views SLOT_INFO create or replace view SLOT_INFO as select SLOT.*, PHYSICAL_DEVICE.UNIT_NUMBER, DEVICE.IP_ADDRESS from PHYSICAL_DEVICE, SLOT, DEVICE where DEVICE.DEVICE_ID = PHYSICAL_DEVICE.DEVICE_ID and SLOT.PHYSICAL_DEVICE_ID = PHYSICAL_DEVICE.PHYSICAL_DEVICE_ID; MANAGED_ELEMENT_INFO Common managed element data used by custom DTO methods to identify the managed element type, and provide a link to the details table for the managed element.
Views I SNMP_EXPR_DATA_INFO create or replace view SNMP_EXPR_DATA_INFO as select * from SNMP_EXPR_DATA union all select * from SNMP_EXPR_DATA_30MIN union all select * from SNMP_EXPR_DATA_2HOUR union all select * from SNMP_EXPR_DATA_1DAY; SNMP_DATA_VIEW create or replace view snmp_data_view as ( ( ( ( SELECT de.device_id, de.ip_address AS device_ip, se.target_type, de.device_id AS target_id, de.sys_name AS target_name, 1 AS collectible_type, se.expression_id AS collectible_id, se.
I Views FROM perf_collector WHERE perf_collector.collector_id = sd.collector_id) AS collector_name, ( SELECT (mib_object.name::text || '.'::text) || sd.mib_index::text AS collectible_name FROM mib_object WHERE mib_object.mib_object_id = sd.mib_object_id) AS collectible_name, ( SELECT mib_object.oid AS collectible_detail FROM mib_object WHERE mib_object.mib_object_id = sd.mib_object_id) AS collectible_detail, sd.value, sd.time_in_seconds, sd.mib_index FROM snmp_data_info sd JOIN interface ifs ON sd.
I Views SELECT de.device_id, de.ip_address AS device_ip, se.target_type, sp.id AS target_id, sp.name AS target_name, 1 AS collectible_type, se.expression_id AS collectible_id, se.collector_id, ( SELECT perf_collector.name AS collector_name FROM perf_collector WHERE perf_collector.collector_id = se.collector_id) AS collector_name, ( SELECT snmp_expression.name AS collectible_name FROM snmp_expression WHERE snmp_expression.expression_id = se.expression_id) AS collectible_name, ( SELECT snmp_expression.
I Views PNIC_DV_PORT.VM_DV_SWITCH_ID = VM_DV_SWITCH.ID and PNIC_DV_PORT.ID = VM_PHYSICAL_NIC.VM_DV_PORT_ID and VM_PHYSICAL_NIC.ID = VM_HOST_END_DEV_CONNECTIVITY.VM_PHYSICAL_NIC_ID and VM_HOST_END_DEV_CONNECTIVITY.INTERFACE_ID = INTERFACE.INTERFACE_ID and INTERFACE.DEVICE_ID = DEVICE.DEVICE_ID and VM_HOST_END_DEV_CONNECTIVITY.INTERFACE_ID = PHYSICAL_INTERFACE.INTERFACE_ID and PHYSICAL_INTERFACE.PHYSICAL_PORT_ID = PHYSICAL_PORT.PHYSICAL_PORT_ID union all select VM_HOST.
Views I VCS_DEVICE.MANAGED_ELEMENT_ID as VCS_ME_ID, MEMBER_DEVICE.DEVICE_ID as MEMBER_DEVICE_ID, MEMBER_DEVICE.MANAGED_ELEMENT_ID as MEMBER_ME_ID, VCS_MEMBER.CREATION_TIME, VCS_MEMBER.TRUSTED, VCS_MEMBER.MISSING, VCS_MEMBER.MISSING_TIME, VCS_MEMBER.STATE, VCS_MEMBER.FABRIC_STATUS from device VCS_DEVICE, device MEMBER_DEVICE, VCS_CLUSTER_MEMBER VCS_MEMBER where VCS_MEMBER.CLUSTER_ME_ID = VCS_DEVICE.MANAGED_ELEMENT_ID AND VCS_MEMBER.MEMBER_ME_ID = MEMBER_DEVICE.
I Views MEMBER_DEVICE.MANAGED_ELEMENT_ID = TRILL_TRUNK_GROUP.ME_ID left outer join INTERFACE MASTER_INTERFACE on MASTER_INTERFACE.DEVICE_ID = MEMBER_DEVICE.DEVICE_ID and MASTER_INTERFACE.IDENTIFIER = TRILL_TRUNK_GROUP.MASTER_PORT_NUMBER left outer join INTERFACE MEMBER_INTERFACE on MEMBER_INTERFACE.DEVICE_ID = MEMBER_DEVICE.DEVICE_ID and MEMBER_INTERFACE.IDENTIFIER = TRILL_TRUNK_MEMBER.PORT_NUMBER left outer join VCS_CLUSTER_MEMBER on VCS_CLUSTER_MEMBER.MEMBER_ME_ID = TRILL_TRUNK_GROUP.
Views I AND ((i.table_subtype)::text = 'RADIO_INTERFACE'::text))) l2 LEFT JOIN (SELECT radio_interface.interface_id AS radioif_id, radio_interface.radio_type, radio_interface.is_enabled, radio_interface.is_auto_channel, radio_interface.tx_power, radio_interface.channel_number, radio_interface.max_data_rate, radio_interface.beacon_rate, radio_interface.dtim, radio_interface.rts_threshold, radio_interface.is_turbo_mode, radio_interface.radio_g_mode, radio_interface.
I Views L3.SUBNET_MASK from ( select distinct D.DEVICE_ID, D.MANAGED_ELEMENT_ID, D.IP_ADDRESS as DEVICE_IP_ADDRESS, PD.PHYSICAL_DEVICE_ID, PD.UNIT_NUMBER, S.SLOT_ID, S.SLOT_NUM, MSP.MODULE_ID, PP.PHYSICAL_PORT_ID, PP.PORT_NUM, I.INTERFACE_ID, I.NAME, I.IF_NAME, I.IDENTIFIER, I.TABLE_SUBTYPE, I.TAG_MODE, I.USER_DEFINED_VALUE_1, I.USER_DEFINED_VALUE_2, I.USER_DEFINED_VALUE_3, PI.SPEED_IN_MB, PI.PHYSICAL_ADDRESS, PI.
Views I VIRTUAL_SWITCH.MANAGED_ELEMENT_ID, VIRTUAL_SWITCH.MONITORED, SWITCH_PORT.USER_PORT_NUMBER, SWITCH_PORT.STATE, SWITCH_PORT.STATUS, SWITCH_PORT.NAME, SWITCH_PORT.LICENSED, SWITCH_PORT.TRUNKED, SWITCH_PORT.TRUNK_MASTER, SWITCH_PORT.SPEED_TYPE from CEE_PORT, GIGE_PORT, SWITCH_PORT, VIRTUAL_SWITCH, CORE_SWITCH where CEE_PORT.GIGE_PORT_ID = GIGE_PORT.ID and GIGE_PORT.SWITCH_PORT_ID = SWITCH_PORT.ID and SWITCH_PORT.VIRTUAL_SWITCH_ID = VIRTUAL_SWITCH.ID and VIRTUAL_SWITCH.CORE_SWITCH_ID = CORE_SWITCH.
I 1688 Views Brocade Network Advisor IP User Manual 53-1003056-01
Index A access levels defined, 1298 features, 1298–1299, 1300–?? roles, 1298 accessing FTP server folder, 173 activating Allow/Prohibit Matrix configuration, 708 zone configuration, 652 active session management, roles and access levels, 1298 active sessions, viewing, 8 adapter software using to manage driver files, 459 adapters HBA models, 452 types of, 452 types of converged network adapters, 453 types of fabric adapters, 453 types of HBAs, 452 Adding C3 discard frames threshold, 677 state change thresho
management of, 808 C C3 Discard Frames threshold, 675 call home, 344 centers assigning a device, 359 assigning event filters, 361 disabling, 357 editing, 349 Brocade International, 349 e-mail, 350 EMC, 354 HP LAN, 355 IBM, 349 enabling, 356 enabling support save, 356 hiding, 348 removing a device, 359 removing all devices and filters, 359 removing event filters, 362 test connection, 357 viewing, 348 configuring, 344 roles and access levels, 1298 status, determining, 290 system requirements, 345 viewing sta
status, determining, 289 copying Allow/Prohibit Matrix configuration, 706, 707 log entries, 1206 log entry parts, 1205 master log, 1209 master log parts, 1209 zones, 645 creating zone, 641 zone alias, 647 zone configuration, 650 zone databases, 655 zone members, 643 zone sets, 650 CUP, FICON, 695 D data real time performance, 976 data backup, 128 data backup and restore, 479 data restore, 134 database fields Sybase and Derby, 1371 database, restoring, 392 DCB switches, L2 mode compatibility, 830 deactivati
editing property fields, 1331 property labels, 298, 1330 thresholds, 687 zone alias, 647 editing system collectors, 996 Element Manager, launching launching Element Manager, 366 e-mail event notification setup roles and access levels, 1298 e-mail filter override, 478 e-mail notification configuring, 1142 emailing technical support information, 1227 enabling call home centers, 356 default zone for fabrics, 646 support save for call home centers, 356 enabling backup, 131 ESXi adding host adapter credentials,
Fabric Watch notification types, 442 fabrics deleting from discovery, 101 status, determining, 290 zone database, clearing, 664 fault management roles and access levels, 1299 FC Address for inactive iSCSI devices, 1309 FCoE management, roles and access levels, 1299 feature active session management, 1298 backup, 1299 call home, 344, 1298 CEE management, 1298 configuration management, 1298 e-mail event notification setup, 1298 event management, 1299 fault management, 1299 FCoE management, 1299 firmware manag
high integrity fabrics (HIF), requirements, 695 host adapter discovery, 456 host adapters adding a port configuration, 465 and boot image repository, 461 and driver repository, 460 and fault management, 477 and performance management, 474 and role-based access control, 473 and security authentication, 475 and supportSave, 477 and syslog forwarding, 478 bulk port configuration, 464 configuring FAWWNs, 468 configuring ports, 464 deleting a driver file from the repository, 461 deleting a port configuration, 46
link reset threshold, 676 link reset thresholds adding, 681 listing un-zoned members, 667 zone members, 667 log entries copying, 1206 copying parts, 1205 exporting, 1206 logging in remote client, 4 remote SMIA configuration tool, 397 server, 3 logical chassis cluster mode, 42, 43, 427, 428, 429 login banner configuring, 151 disabling, 151 login security configuring, 150 logon conflicts, 652 logs event, 1205 LSAN zoning roles and access levels, 1299 M Main window master log, 287 minimap, 288 Management appl
new device, adding name, 146 NOS firmware activate, 430, 818 firmware update, 430, 818 notification type e-mail alert, 442 O objects removing thresholds, 692 offline zone database deleting, 656 overwriting, event filter, 362 P PAP, 380 passwords database, changing, 17, 22 patch install, 27 uninstall, 28 performance roles and access levels, 1299 performance data real time, 976 performance graph generating, 976 performance monitoring overview, 969 physical map zooming in, 293 zooming out, 294 port fencing i
removing members from zone, 643 objects from zone alias, 648 thresholds, 692 thresholds from individual objects, 692 thresholds from table, 693 zone from zone configuration, 651 zones from zone configuration, 651 removing event filters call home centers, 362 call home event filters table, 363 devices, 363 renaming zone alias, 649 zone configuration, 654 zones, 644 replacing zone members, 668 report roles and access levels, 1299 reports exporting to e-mail recipients, 1232 restore data, 134 restoring databas
SNMP trap forwarding adding a trap filter, 1151 SNMP trap recipients adding to switches, 1148 removing from switches, 1149 SNMP traps description of, 1147 importing a new MIB, 1156 modifying the definitions of registered traps, 1159 registering, 1158 reverting a trap to its default, 1160 unregistering, 1159 SNMP v3, adding and editing credentials, 1155 software configuration, 155 software configuration properties roles and access levels, 1299 software files obtaining through the image repository, 807 softwa
removing menu options, 370 removing option from device shortcut menu, 373 starting, 365 threshold adding, 677 adding C3 discard frames, 677 adding state change, 684, 690 C3 Discard Frames, 675 Invalid CRCs, 676 Invalid words, 676 ISL protocol, 676 link reset, 676 state change, 677 threshold prioities, 674 thresholds, 674 assigning, 685 editing, 687 finding specific, 691 removing, 692 viewing, 691 viewing on a specific device, 691 thresholds table removing thresholds, 693 tips, turning on and off, 142 tips,
assigning DCB ports, 830 deleting port VLAN from devices, 833 deploying configurations, 834 displaying, 822 displaying by products, 825 displaying in the global view, 823 modifying port, 833 VLAN management in a VCS environment, 822 VLAN Manager configuration requirements, 821 default VLAN, 819 definition of, 819 super-aggregated VLAN, 820 using to display by products, 825 views, 822 VLAN routing, 840 managing IP addresses on an SVI, 840 VLL Manager, 846, 869, 884 copy, 880 delete, 880 edit, 880, 895 VLL Mo
naming conventions, 639 zone set.