Book description
"Do everything that is necessary and absolutely nothing that is not."
This IBM® Redbooks® publication, written at a Data Center Fabric Manager v10.1.4 and Fabric Operating System v6.4 level, consolidates critical information while also covering procedures and tasks that you are likely to encounter on a daily basis when implementing an IBM b-type SAN.
The products that we describe in this book have more functionality than we can possibly cover in a single book. A storage area network (SAN) is a powerful infrastructure for consolidation, distance solutions, and data sharing. The quality applications that the IBM SAN portfolio provides can help you take full advantage of the benefits of the SAN.
In this book, we cover the latest additions to the IBM b-type SAN family and show how you can implement them in an open systems environment. In particular, we focus on the Fibre Channel Protocol (FCP) environment. We address the key concepts that these products bring to the market and, in each case, we provide an overview of the functions that are essential to building a robust SAN environment.
Table of contents
- Front cover
- Notices
- Preface
- Summary of changes
-
Chapter 1. Product introduction
- 1.1 Overview of the product
-
1.2 Product descriptions
- 1.2.1 IBM System Storage SAN24B-4 switch
- 1.2.2 IBM System Storage SAN40B-4 switch
- 1.2.3 IBM System Storage SAN80-B4 switch
- 1.2.4 IBM Converged Switch B32
- 1.2.5 SAN32B-E4(2498-E32)
- 1.2.6 IBM System Storage SAN06B-R (2498-R06)
- 1.2.7 IBM System Storage SAN384B Director
- 1.2.8 IBM System Storage SAN768B Director
- 1.2.9 Brocade 4 Gbps SAN Switch Modules
- 1.2.10 Brocade 8 Gbps SAN Switch Modules
- 1.2.11 Fabric Operating System
- 1.2.12 Management tools
- 1.2.13 Licensing
- 1.2.14 Security
- 1.2.15 Virtual Fabrics
- 1.2.16 Support
- Chapter 2. Data Center Fabric
- Chapter 3. Hardware features
- Chapter 4. Fabric Operating System
- Chapter 5. Management tools
-
Chapter 6. Implementation
-
6.1 Implementation
- 6.1.1 Initial setup
- 6.1.2 The command-line interface initial setup
- 6.1.3 SAN768B, SAN384B, and SAN256B configuration procedure
- 6.1.4 Connecting to the switch
- 6.1.5 Setting the switch name
- 6.1.6 The Port Identifier format
- 6.1.7 Setting the date
- 6.1.8 Firmware update
- 6.1.9 SAN256B optional modem setup
- 6.2 SAN32B-3 implementation using EZSwitchSetup
-
6.1 Implementation
-
Chapter 7. License administration
-
7.1 Licensed features
- 7.1.1 Ports on Demand
- 7.1.2 Full Fabric
- 7.1.3 8 Gbps
- 7.1.4 Inter-Chassis Link (ICL)
- 7.1.5 Adaptive Networking
- 7.1.6 Frame Based ISL Trunking
- 7.1.7 Fabric Watch
- 7.1.8 Advanced Performance Monitoring
- 7.1.9 Extended Fabrics
- 7.1.10 ISL Trunking
- 7.1.11 Integrated Routing
- 7.1.12 High Performance Extension over FCIP/FC
- 7.1.13 FICON Management Server
- 7.2 Using Web Tools to administer licenses
- 7.3 Tips on solving licensing issues
-
7.1 Licensed features
-
Chapter 8. Web Tools
- 8.1 Web Tools walk-through
- 8.2 Web Tools buttons
- 8.3 Name Server task
- 8.4 Zone Admin task
- 8.5 Admin Domain task
-
8.6 Port Admin task
- 8.6.1 Renaming a port
- 8.6.2 Editing the configuration
- 8.6.3 Enabling and disabling a port
- 8.6.4 Persistent enable and persistent disable options for a port
- 8.6.5 Enabling or disabling trunking for a specific port
- 8.6.6 Enabling or disabling N_Port ID virtualization (NPIV)
- 8.6.7 Port swap
- 8.6.8 F_Port Trunking
- 8.6.9 Re-authenticating
- 8.6.10 F_Port BB credit
- 8.6.11 QoS Enable/Disable
- 8.6.12 Port beaconing
- 8.6.13 WWN to N_Port mapping
- 8.6.14 Port Administration window on the SAN256B and SAN768B
- 8.6.15 Port Administration for the FCOE switch
- 8.6.16 Port Administration for the IBM System Storage SAN06B-R
-
8.7 Switch Admin task
- 8.7.1 Switch Administration window layout
- 8.7.2 Switch tab
- 8.7.3 Network tab
- 8.7.4 Firmware Download tab
- 8.7.5 SNMP tab
- 8.7.6 License tab
- 8.7.7 User tab
- 8.7.8 Configure tab
- 8.7.9 Routing tab
- 8.7.10 Extended Fabric tab
- 8.7.11 AAA Service tab
- 8.7.12 Trace tab
- 8.7.13 Security Policies tab
- 8.7.14 FICON CUP tab
- 8.7.15 Trunking tab
- 8.8 Telnet/SSH Client task
- 8.9 Fabric Watch task
- 8.10 IBM SAN ICL connectivity
- Chapter 9. IBM System Storage Data Center Fabric Manager
-
Chapter 10. Host Connectivity Manager
- 10.1 HCM features
-
10.2 Getting started with HCM software
- 10.2.1 HCM software launch
- 10.2.2 Command line utility
- 10.2.3 HCM configuration data
- 10.2.4 Remembering the password
- 10.2.5 Skipping login
- 10.2.6 Changing an HCM application password
- 10.2.7 Changing an HCM agent password
- 10.2.8 Resetting a password or restoring a factory default password
- 10.2.9 Backing up data after an uninstall
- 10.2.10 Backing up HCM data using HCM
- 10.2.11 Restoring HCM data using HCM
- 10.2.12 HCM main window
- 10.2.13 HCM product icons
- 10.2.14 Discovery
- 10.2.15 Setting up out-of-band discovery for an adapter
- 10.2.16 Logging off HCM
-
10.3 Host configuration
- 10.3.1 Host security authentication
- 10.3.2 Configuring security authentication using the GUI
- 10.3.3 Configuring security authentication using the CLI
- 10.3.4 Buffer credits
- 10.3.5 Basic port configuration
- 10.3.6 Opening the Basic Port Configuration dialog box
- 10.3.7 Port logging level
- 10.3.8 Port speed
- 10.3.9 Frame data field size
- 10.3.10 Persistent binding
- 10.3.11 QoS (HBA only)
- 10.3.12 Path Time Out
- 10.3.13 Target rate limiting
- 10.3.14 Boot over SAN
- 10.3.15 Configuring Boot over SAN
- 10.3.16 Boot code image upload
- 10.3.17 Updating the boot code using the GUI
- 10.3.18 Virtual port configuration
- 10.3.19 Creating a virtual port
- 10.3.20 Deleting a virtual port
- 10.3.21 HCM logging levels
- 10.3.22 Advanced port configuration
- 10.3.23 Opening the Advanced Port Configuration dialog box
- 10.3.24 NPIV
- 10.3.25 Name configuration
- 10.3.26 Exporting the properties for a WWN
- 10.3.27 Importing the properties for a WWN
- 10.3.28 Importing properties in EFCM format
- 10.3.29 VLAN configuration
- 10.3.30 Adding a VLAN
- 10.3.31 Editing a VLAN
- 10.3.32 Removing a VLAN
- 10.4 Monitoring
-
Chapter 11. Virtual Fabrics
- 11.1 IBM/Brocade Virtual Fabric
- 11.2 What Virtual Fabrics are
-
11.3 Configuring Virtual Fabrics
- 11.3.1 Changing the context to a different logical switch
- 11.3.2 Enabling Virtual Fabrics
- 11.3.3 Disabling Virtual Fabrics
- 11.3.4 Logical switch management
- 11.3.5 Modifying the base switch
- 11.3.6 Creating a logical switch
- 11.3.7 Deleting a logical switch
- 11.3.8 Displaying the logical switch configuration
- 11.3.9 Changing the fabric ID of a logical switch
- 11.3.10 Changing a logical switch to a base switch
- 11.3.11 Configuring a logical switch for XISL use
- 11.3.12 Creating a logical fabric using XISLs
- 11.4 A real life example of Virtual Fabrics
-
Chapter 12. Basic zoning
- 12.1 Zoning in general
- 12.2 Zoning using DCFM
- 12.3 Implementing zoning
- 12.4 Basic zoning using Web Tools
- 12.5 Backing up a zone configuration
-
12.6 Zoning using CLI
- 12.6.1 Using CLI to create a zone
- 12.6.2 Using CLI to create a zone configuration
- 12.6.3 Backing up a zone configuration using the CLI
- 12.6.4 Backing up a zone configuration using a USB drive
- 12.6.5 Downloading a zone configuration from an FTP server
- 12.6.6 Downloading a zone configuration from a USB device
- Chapter 13. Multiple switches and fabrics
-
Chapter 14. Security
- 14.1 User accounts overview
- 14.2 Account management
- 14.3 Security protocols
- 14.4 Simple Network Management Protocol
- 14.5 Secure Sockets Layer protocol
- 14.6 Secure Shell protocol
- 14.7 Telnet protocol
- 14.8 Ports and applications used by switches
-
14.9 Security policies
- 14.9.1 ACL policies overview
- 14.9.2 ACL policy management
- 14.9.3 FCS policies
- 14.9.4 Overview of FCS policy management
- 14.9.5 Creating an FCS policy
- 14.9.6 Modifying the order of FCS switches
- 14.9.7 FCS policy distribution
- 14.9.8 DCC policies
- 14.9.9 DCC policy restrictions
- 14.9.10 Creating a DCC policy
- 14.9.11 Creating a device policy
- 14.9.12 Deleting a device policy
- 14.9.13 Activating policy changes
- 14.9.14 SCC policies
- 14.9.15 Creating an SCC policy
- 14.9.16 Authentication policy for fabric elements
- 14.9.17 E_Port authentication
- 14.9.18 AUTH policy restrictions
- 14.9.19 Viewing current authentication parameter settings for a switch
- 14.9.20 Setting authentication protocol used by the switch to DH-CHAP
- 14.9.21 Re-authenticating E_Ports
- 14.9.22 Secret key pairs
- 14.9.23 Viewing a list of secret key pairs in the current switch database
- 14.9.24 Setting a secret key pair
- 14.9.25 Distributing the local ACL policies
- 14.9.26 IP Filter policy
- 14.9.27 Creating an IP Filter policy
- 14.9.28 Cloning an IP Filter policy
- 14.9.29 Saving an IP Filter policy
- 14.9.30 Activating an IP Filter policy
- 14.9.31 Deleting an IP Filter policy
- 14.9.32 IP Filter policy rules
- 14.9.33 IP Filter policy enforcement
- 14.9.34 Adding a rule to an IP Filter policy
- 14.9.35 Deleting a rule in an IP Filter policy
- 14.9.36 Aborting a transaction associated with IP Filter
- 14.9.37 IP Filter policy distributions
- 14.9.38 IP Filter policy restrictions
- Chapter 15. Adaptive Networking
-
Chapter 16. Performance monitoring
- 16.1 Performance monitoring with Web Tools
- 16.2 Basic Performance Monitoring
-
16.3 Advanced Performance Monitoring
- 16.3.1 Virtual Fabrics considerations
- 16.3.2 Performance Monitors
- 16.3.3 Displaying Performance Monitors with the CLI
- 16.3.4 SID/DID Performance Monitor
- 16.3.5 End-to-end monitoring with DCFM
- 16.3.6 Filter-based performance monitoring
- 16.3.7 ISL performance monitoring
- 16.3.8 Top Talker monitors
- 16.3.9 Top Talkers monitors in port mode
- 16.3.10 Top Talkers monitors in fabric mode
- 16.3.11 Top Talkers monitoring considerations
- 16.3.12 Trunk monitoring
- 16.3.13 Saving and restoring the monitoring configuration
- 16.4 SCSI commands with Web Tools
- 16.5 Bottleneck detection
- Chapter 17. Health and troubleshooting
- Related publications
- Back cover
Product information
- Title: Implementing an IBM b-type SAN with 8 Gbps Directors and Switches
- Author(s):
- Release date: March 2011
- Publisher(s): IBM Redbooks
- ISBN: 9780738435374
You might also like
book
Implementing the IBM FlashSystem 5010 and FlashSystem 5030 with IBM Spectrum Virtualize V8.3.1
Organizations of all sizes face the challenge of managing massive volumes of increasingly valuable data. But …
book
IBM System Storage SAN Volume Controller, IBM Storwize V7000, and IBM FlashSystem 7200 Best Practices and Performance Guidelines
This IBM® Redbooks® publication captures several of the preferred practices and describes the performance gains that …
book
IBM eServer Certification Study Guide - pSeries AIX System Administration
This redbook is designed as a study guide for professionals wishing to prepare for the certification …
book
Getting Started with IBM Hyper Protect Data Controller
IBM® Hyper Protect Data Controller is designed to provide privacy protection of your sensitive data and …