Brocade FICON Administrator's Guide v7.1.0 (53-1002753-01, March 2013)

FICON Administrator’s Guide 19
53-1002753-01
Preparing a switch for FICON
2
Deleting SCC_POLICY
Enter the following command if you get messages that the E_Port in a security violation state.
secpolicydelete "SCC_POLICY"
Recovering the E_Port
Enter the following commands for each switch if the E_Port is down.
secpolicyactivate
portenable n
NOTE
For more detailed information on commands and command output referenced in this section, refer
to the Brocade Fabric OS Command Reference Manual.
Preparing a switch for FICON
Use the following steps to verify and prepare a switch for use in a switched point-to-point FICON
environment. A single-switch configuration does not require insistent domain IDs (IDIDs) or fabric
binding, provided that connected channels are configured for single-byte addressing. However, you
should configure IDID to ensure that domain IDs are maintained.
1. Connect to the switch and log in using an account assigned to the admin role.
2. Verify the management IP addresses have been set up.
3. Verify the switches can be seen by your management tool.
4. Verify the switches have the correct version of Fabric OS.
5. Add feature keys, if applicable.
6. Enter the configUpload to save a baseline of the switch configuration.
Cascaded FICON and 2-byte addressing considerations
The following are considerations when installing a switch in a FICON environment where 2-byte
addressing is used. Two-byte addressing is always used in cascaded environments but may be used
in single-switch fabrics as well. Making changes to your Brocade switch or Backbone may require
scheduled downtime.
All fabric operating parameters, such as timeout values, must be the same. If you have not
made any changes outside the scope of this document, there is nothing additional to consider
regarding these parameters.
The domain IDs of all switches must be unique and insistent.
Although not required, it will be easier to configure the security policies if the zoning matches.
Configuration, connecting the ISLs, and ensuring that the switches and Backbones have
merged into a fabric, will also make the process of setting the security attributes much easier.