Brocade Fabric OS Administration Guide, 8.2.X

Total Page:16

File Type:pdf, Size:1020Kb

Brocade Fabric OS Administration Guide, 8.2.X Brocade® Fabric OS® Administration Guide, 8.2.x Administration Guide 12 October 2020 Broadcom FOS-82x-AG107 12 October 2020 FOS-82x-AG107 Administration Guide Brocade® Fabric OS® Administration Guide, 8.2.x Table of Contents Copyright Statement.......................................................................................................................... 25 Introduction.........................................................................................................................................26 About This Document....................................................................................................................................................26 What Is New in This Document....................................................................................................................................26 Supported Hardware and Software.............................................................................................................................. 26 ® Contacting Technical Support for Your Brocade Product....................................................................................... 27 Document Feedback...................................................................................................................................................... 27 Understanding Fibre Channel Services...........................................................................................29 Fibre Channel Services Overview................................................................................................................................ 29 Management Server....................................................................................................................................................... 29 Application Server..................................................................................................................................................... 30 Platform Services........................................................................................................................................................... 30 Platform Services and Virtual Fabrics...................................................................................................................... 30 Enabling Platform Services.......................................................................................................................................31 Disabling Platform Services...................................................................................................................................... 31 Management Server Database...................................................................................................................................... 31 Displaying the Management Server ACL................................................................................................................. 31 Adding a Member to the ACL...................................................................................................................................32 Deleting a Member from the ACL............................................................................................................................ 33 Viewing the Contents of the Management Server Database................................................................................... 34 Clearing the Management Server Database............................................................................................................ 34 Topology Discovery....................................................................................................................................................... 35 Displaying Topology Discovery Status......................................................................................................................35 Enabling Topology Discovery....................................................................................................................................35 Disabling Topology Discovery................................................................................................................................... 35 Device Login................................................................................................................................................................... 36 Principal Switch......................................................................................................................................................... 36 E_Port Login Process............................................................................................................................................... 37 Fabric Login process.................................................................................................................................................37 Port Login Process....................................................................................................................................................37 RSCNs.......................................................................................................................................................................37 Duplicate Port World Wide Name.............................................................................................................................38 Device Recovery................................................................................................................................................ 38 High Availability of Daemon Process.......................................................................................................................... 38 FL_Port and Arbitrated Loop Support.........................................................................................................................39 Performing Basic Configuration Tasks............................................................................................40 Broadcom FOS-82x-AG107 2 FOS-82x-AG107 Administration Guide Brocade® Fabric OS® Administration Guide, 8.2.x Fabric OS Overview......................................................................................................................................................40 Command Line Interface............................................................................................................................................... 40 Console Sessions Using the Serial Port.................................................................................................................. 40 Connecting to Fabric OS through the Serial Port............................................................................................. 41 Telnet or SSH Session..............................................................................................................................................41 Rules for Telnet Connections............................................................................................................................ 42 Connecting to Fabric OS Using Telnet..............................................................................................................42 Getting Help on a Command....................................................................................................................................43 Viewing the History of Command Line Entry........................................................................................................... 43 CLI History......................................................................................................................................................... 44 cliHistory --show.................................................................................................................................................45 cliHistory --showuser Username........................................................................................................................45 cliHistory --showall............................................................................................................................................. 45 cliHistory --help.................................................................................................................................................. 45 Considerations when Viewing CLI Logs............................................................................................................46 Using Fosexec to Run Commands on Remote Switch or Domain.......................................................................... 47 Modification of the Default Password..........................................................................................................................49 Default Account Password........................................................................................................................................49 Changing the Default Account Password at Login............................................................................................50 The Switch Ethernet Interface...................................................................................................................................... 51 Brocade Directors......................................................................................................................................................51 Brocade Switches......................................................................................................................................................51
Recommended publications
  • Clustered Data ONTAP® 8.3 SAN Configuration Guide
    Updated for 8.3.1 Clustered Data ONTAP® 8.3 SAN Configuration Guide NetApp, Inc. Telephone: +1 (408) 822-6000 Part number: 215-10114_A0 495 East Java Drive Fax: +1 (408) 822-4501 June 2015 Sunnyvale, CA 94089 Support telephone: +1 (888) 463-8277 U.S. Web: www.netapp.com Feedback: [email protected] Table of Contents | 3 Contents Considerations for iSCSI configurations .................................................... 5 Ways to configure iSCSI SAN hosts with single nodes .............................................. 5 Ways to configure iSCSI SAN hosts with HA pairs ................................................... 7 Benefits of using VLANs in iSCSI configurations ..................................................... 8 Static VLANs .................................................................................................. 8 Dynamic VLANs ............................................................................................. 9 Considerations for FC configurations ...................................................... 10 Ways to configure FC SAN hosts with single nodes ................................................. 10 Ways to configure FC with HA pairs ........................................................................ 12 FC switch configuration best practices ..................................................................... 13 Supported number of FC hop counts ......................................................................... 13 Supported FC ports ...................................................................................................
    [Show full text]
  • AEDIT Text Editor Iii Notational Conventions This Manual Uses the Following Conventions: • Computer Input and Output Appear in This Font
    Quick Contents Chapter 1. Introduction and Tutorial Chapter 2. The Editor Basics Chapter 3. Editing Commands Chapter 4. AEDIT Invocation Chapter 5. Macro Commands Chapter 6. AEDIT Variables Chapter 7. Calc Command Chapter 8. Advanced AEDIT Usage Chapter 9. Configuration Commands Appendix A. AEDIT Command Summary Appendix B. AEDIT Error Messages Appendix C. Summary of AEDIT Variables Appendix D. Configuring AEDIT for Other Terminals Appendix E. ASCII Codes Index AEDIT Text Editor iii Notational Conventions This manual uses the following conventions: • Computer input and output appear in this font. • Command names appear in this font. ✏ Note Notes indicate important information. iv Contents 1 Introduction and Tutorial AEDIT Tutorial ............................................................................................... 2 Activating the Editor ................................................................................ 2 Entering, Changing, and Deleting Text .................................................... 3 Copying Text............................................................................................ 5 Using the Other Command....................................................................... 5 Exiting the Editor ..................................................................................... 6 2 The Editor Basics Keyboard ......................................................................................................... 8 AEDIT Display Format ..................................................................................
    [Show full text]
  • COMMAND LINE CHEAT SHEET Presented by TOWER — the Most Powerful Git Client for Mac
    COMMAND LINE CHEAT SHEET presented by TOWER — the most powerful Git client for Mac DIRECTORIES FILES SEARCH $ pwd $ rm <file> $ find <dir> -name "<file>" Display path of current working directory Delete <file> Find all files named <file> inside <dir> (use wildcards [*] to search for parts of $ cd <directory> $ rm -r <directory> filenames, e.g. "file.*") Change directory to <directory> Delete <directory> $ grep "<text>" <file> $ cd .. $ rm -f <file> Output all occurrences of <text> inside <file> (add -i for case-insensitivity) Navigate to parent directory Force-delete <file> (add -r to force- delete a directory) $ grep -rl "<text>" <dir> $ ls Search for all files containing <text> List directory contents $ mv <file-old> <file-new> inside <dir> Rename <file-old> to <file-new> $ ls -la List detailed directory contents, including $ mv <file> <directory> NETWORK hidden files Move <file> to <directory> (possibly overwriting an existing file) $ ping <host> $ mkdir <directory> Ping <host> and display status Create new directory named <directory> $ cp <file> <directory> Copy <file> to <directory> (possibly $ whois <domain> overwriting an existing file) OUTPUT Output whois information for <domain> $ cp -r <directory1> <directory2> $ curl -O <url/to/file> $ cat <file> Download (via HTTP[S] or FTP) Copy <directory1> and its contents to <file> Output the contents of <file> <directory2> (possibly overwriting files in an existing directory) $ ssh <username>@<host> $ less <file> Establish an SSH connection to <host> Output the contents of <file> using
    [Show full text]
  • Observation and a Numerical Study of Gravity Waves During Tropical Cyclone Ivan (2008)
    Open Access Atmos. Chem. Phys., 14, 641–658, 2014 Atmospheric www.atmos-chem-phys.net/14/641/2014/ doi:10.5194/acp-14-641-2014 Chemistry © Author(s) 2014. CC Attribution 3.0 License. and Physics Observation and a numerical study of gravity waves during tropical cyclone Ivan (2008) F. Chane Ming1, C. Ibrahim1, C. Barthe1, S. Jolivet2, P. Keckhut3, Y.-A. Liou4, and Y. Kuleshov5,6 1Université de la Réunion, Laboratoire de l’Atmosphère et des Cyclones, UMR8105, CNRS-Météo France-Université, La Réunion, France 2Singapore Delft Water Alliance, National University of Singapore, Singapore, Singapore 3Laboratoire Atmosphères, Milieux, Observations Spatiales, UMR8190, Institut Pierre-Simon Laplace, Université Versailles-Saint Quentin, Guyancourt, France 4Center for Space and Remote Sensing Research, National Central University, Chung-Li 3200, Taiwan 5National Climate Centre, Bureau of Meteorology, Melbourne, Australia 6School of Mathematical and Geospatial Sciences, Royal Melbourne Institute of Technology (RMIT) University, Melbourne, Australia Correspondence to: F. Chane Ming ([email protected]) Received: 3 December 2012 – Published in Atmos. Chem. Phys. Discuss.: 24 April 2013 Revised: 21 November 2013 – Accepted: 2 December 2013 – Published: 22 January 2014 Abstract. Gravity waves (GWs) with horizontal wavelengths ber 1 vortex Rossby wave is suggested as a source of domi- of 32–2000 km are investigated during tropical cyclone (TC) nant inertia GW with horizontal wavelengths of 400–800 km, Ivan (2008) in the southwest Indian Ocean in the upper tropo- while shorter scale modes (100–200 km) located at northeast sphere (UT) and the lower stratosphere (LS) using observa- and southeast of the TC could be attributed to strong local- tional data sets, radiosonde and GPS radio occultation data, ized convection in spiral bands resulting from wave number 2 ECMWF analyses and simulations of the French numerical vortex Rossby waves.
    [Show full text]
  • Process Text Streams Using Filters
    Process Text Streams Using Filters OBJECTIVE: Candidates should should be able to apply filters to text streams. 1 Process Text Streams Using Filters KeyKEY knowledge KNOWLEDGE area(s): AREAS: Send text files and output streams through text utility filters to modify the output using standard UNIX commands found in the GNU textutils package. 2 Process Text Streams Using Filters KEY FILES,TERMS, UTILITIES cat nl tail cut paste tr expand pr unexpand fmt sed uniq head sort wc hexdump split join tac 3 cat cat the editor - used as a rudimentary text editor. cat > short-message we are curious to meet penguins in Prague Crtl+D *Ctrl+D - command is used for ending interactive input. 4 cat cat the reader More commonly used to flush text to stdout. Options: -n number each line of output -b number only non-blank output lines -A show carriage return Example cat /etc/resolv.conf ▶ search mydomain.org nameserver 127.0.0.1 5 tac tac reads back-to-front This command is the same as cat except that the text is read from the last line to the first. tac short-message ▶ penguins in Prague to meet we are curious 6 head or tail using head or tail - often used to analyze logfiles. - by default, output 10 lines of text. List 20 first lines of /var/log/messages: head -n 20 /var/log/messages head -20 /var/log/messages List 20 last lines of /etc/aliases: tail -20 /etc/aliases 7 head or tail The tail utility has an added option that allows one to list the end of a text starting at a given line.
    [Show full text]
  • Character Set Migration Best Practices For
    Character Set Migration Best Practices $Q2UDFOH:KLWH3DSHU October 2002 Server Globalization Technology Oracle Corporation Introduction - Database Character Set Migration Migrating from one database character set to another requires proper strategy and tools. This paper outlines the best practices for database character set migration that has been utilized on behalf of hundreds of customers successfully. Following these methods will help determine what strategies are best suited for your environment and will help minimize risk and downtime. This paper also highlights migration to Unicode. Many customers today are finding Unicode to be essential to supporting their global businesses. Oracle provides consulting services for very large or complex environments to help minimize the downtime while maximizing the safe migration of business critical data. Why migrate? Database character set migration often occurs from a requirement to support new languages. As companies internationalize their operations and expand services to customers all around the world, they find the need to support data storage of more World languages than are available within their existing database character set. Historically, many legacy systems required support for only one or possibly a few languages; therefore, the original character set chosen had a limited repertoire of characters that could be supported. For example, in America a 7-bit character set called ASCII is satisfactory for supporting English data exclusively. While in Europe a variety of 8 bit European character sets can support specific subsets of European languages together with English. In Asia, multi byte character sets that could support a given Asian language and English were chosen. These were reasonable choices that fulfilled the initial requirements and provided the best combination of economy and performance.
    [Show full text]
  • FICON Native Implementation and Reference Guide
    Front cover FICON Native Implementation and Reference Guide Architecture, terminology, and topology concepts Planning, implemention, and migration guidance Realistic examples and scenarios Bill White JongHak Kim Manfred Lindenau Ken Trowell ibm.com/redbooks International Technical Support Organization FICON Native Implementation and Reference Guide October 2002 SG24-6266-01 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. Second Edition (October 2002) This edition applies to FICON channel adaptors installed and running in FICON native (FC) mode in the IBM zSeries procressors (at hardware driver level 3G) and the IBM 9672 Generation 5 and Generation 6 processors (at hardware driver level 26). © Copyright International Business Machines Corporation 2001, 2002. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Preface . ix The team that wrote this redbook. ix Become a published author . .x Comments welcome. .x Chapter 1. Overview . 1 1.1 How to use this redbook . 2 1.2 Introduction to FICON . 2 1.3 zSeries and S/390 9672 G5/G6 I/O connectivity. 3 1.4 zSeries and S/390 FICON channel benefits . 5 Chapter 2. FICON topology and terminology . 9 2.1 Basic Fibre Channel terminology . 10 2.2 FICON channel topology. 12 2.2.1 Point-to-point configuration . 14 2.2.2 Switched point-to-point configuration . 15 2.2.3 Cascaded FICON Directors configuration. 16 2.3 Access control. 18 2.4 Fibre Channel and FICON terminology.
    [Show full text]
  • A Brief Introduction to Unix-2019-AMS
    Brief Intro to Linux/Unix Brief Intro to Unix (contd) A Brief Introduction to o Brief History of Unix o Compilers, Email, Text processing o Basics of a Unix session o Image Processing Linux/Unix – AMS 2019 o The Unix File System Pete Pokrandt o Working with Files and Directories o The vi editor UW-Madison AOS Systems Administrator o Your Environment [email protected] o Common Commands Twitter @PTH1 History of Unix History of Unix History of Unix o Created in 1969 by Kenneth Thompson and Dennis o Today – two main variants, but blended o It’s been around for a long time Ritchie at AT&T o Revised in-house until first public release 1977 o System V (Sun Solaris, SGI, Dec OSF1, AIX, o It was written by computer programmers for o 1977 – UC-Berkeley – Berkeley Software Distribution (BSD) linux) computer programmers o 1983 – Sun Workstations produced a Unix Workstation o BSD (Old SunOS, linux, Mac OSX/MacOS) o Case sensitive, mostly lowercase o AT&T unix -> System V abbreviations 1 Basics of a Unix Login Session Basics of a Unix Login Session Basics of a Unix Login Session o The Shell – the command line interface, o Features provided by the shell o Logging in to a unix session where you enter commands, etc n Create an environment that meets your needs n login: username n Some common shells n Write shell scripts (batch files) n password: tImpAw$ n Define command aliases (this Is my password At work $) Bourne Shell (sh) OR n Manipulate command history IHateHaving2changeMypasswordevery3weeks!!! C Shell (csh) n Automatically complete the command
    [Show full text]
  • Clostridium Difficile (C. Diff)
    Living with C. diff Learning how to control the spread of Clostridium difficile (C. diff) This can be serious, I need to do something about this now! IMPORTANT C. diff can be a serious condition. If you or someone in your family has been diagnosed with C. diff, there are steps you can take now to avoid spreading it to your family and friends. This booklet was developed to help you understand and manage C. diff. Follow the recommendations and practice good hygiene to take care of yourself. C. diff may cause physical pain and emotional stress, but keep in mind that it can be treated. For more information on your C.diff infection, please contact your healthcare provider. i CONTENTS Learning about C. diff What is Clostridium difficile (C. diff)? ........................................................ 1 There are two types of C.diff conditions .................................................... 2 What causes a C. diff infection? ............................................................... 2 Who is most at risk to get C. diff? ............................................................ 3 How do I know if I have C. diff infection? .................................................. 3 How does C. diff spread from one person to another? ............................... 4 What if I have C. diff while I am in a healthcare facility? ............................. 5 If I get C. diff, will I always have it? ........................................................... 6 Treatment How is C. diff treated? ............................................................................. 7 Prevention How can the spread of C. diff be prevented in healthcare facilities? ............ 8 How can I prevent spreading C. diff (and other germs) to others at home? .. 9 What is good hand hygiene? .................................................................... 9 What is the proper way to wash my hands? ............................................ 10 What is the proper way to clean? .........................................................
    [Show full text]
  • How the /Etc/Passwd File Relates to the Laua User
    Page 1 (2) System Foundation 9.0 laua User and Group How the /etc/passwd File Relates to the laua User Scenario Most users who need access to the Lawson environment will need to have a user account set up on the Operating System where Lawson System Foundation 9.0 has been installed. Users will need resources allocated to run their jobs and space in the directory structure to store their print files. The user account on the Operating System is what allows the allocation of resources and space. In the example presented in this session, users are associated to the Unix Operating System and setup via the /etc/passwd file. The information stored on the user account in the file is used by Lawson’s Legacy Security System, laua. This scenario will present the /etc/passwd file and highlight the important parts of the user represented in the file and how it relates to user setup. Workflow Step 1 of 3: To verify that a user has an account on the Unix Operating System where the Lawson server resides, view the /etc/passwd file on the Lawson server. To do so, you must first access a command line which can be done either through LID (Lawson Insight Desktop) or through lawterminal which is command line access through the Lawson portal. This demonstration will use LID. First access your command line. Action: Type in 'cd /etc' and press the 'Enter' key. © Copyright Lawson Learning 2008 Page 2 (2) Step 2 of 3: You can use any method you choose to view the file.
    [Show full text]
  • Powerview Command Reference
    PowerView Command Reference TRACE32 Online Help TRACE32 Directory TRACE32 Index TRACE32 Documents ...................................................................................................................... PowerView User Interface ............................................................................................................ PowerView Command Reference .............................................................................................1 History ...................................................................................................................................... 12 ABORT ...................................................................................................................................... 13 ABORT Abort driver program 13 AREA ........................................................................................................................................ 14 AREA Message windows 14 AREA.CLEAR Clear area 15 AREA.CLOSE Close output file 15 AREA.Create Create or modify message area 16 AREA.Delete Delete message area 17 AREA.List Display a detailed list off all message areas 18 AREA.OPEN Open output file 20 AREA.PIPE Redirect area to stdout 21 AREA.RESet Reset areas 21 AREA.SAVE Save AREA window contents to file 21 AREA.Select Select area 22 AREA.STDERR Redirect area to stderr 23 AREA.STDOUT Redirect area to stdout 23 AREA.view Display message area in AREA window 24 AutoSTOre ..............................................................................................................................
    [Show full text]
  • Fibre Channel and Iscsi Configuration Guide for the Data ONTAP® 8.0 Release Family
    Fibre Channel and iSCSI Configuration Guide for the Data ONTAP® 8.0 Release Family NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888) 463-8277 Web: www.netapp.com Feedback: [email protected] Part number: 215-08164_A0 August 2013 Table of Contents | 3 Contents iSCSI configurations .................................................................................... 6 Single-network HA pair in an iSCSI SAN .................................................................. 6 Multi-network HA pair in an iSCSI SAN ................................................................... 7 Direct-attached single-controller configurations in an iSCSI SAN ............................ 8 VLANs for iSCSI configurations ................................................................................ 9 Static VLANs ................................................................................................ 10 Dynamic VLANs ........................................................................................... 10 Fibre Channel configurations .................................................................... 11 FC onboard and expansion port combinations .......................................................... 11 Fibre Channel supported hop count .......................................................................... 12 Fibre Channel supported speeds ................................................................................ 13 Fibre Channel switch
    [Show full text]