Access Gateway - Admin Guide
Access Gateway - Admin Guide
29 May 2015
Access Gateway
Administrator's Guide
ADX, Brocade, Brocade Assurance, the B-wing symbol, DCX, Fabric OS, HyperEdge, ICX, MLX, MyBrocade, OpenScript, The Effortless
Network, VCS, VDX, Vplane, and Vyatta are registered trademarks, and Fabric Vision and vADX are trademarks of Brocade
Communications Systems, Inc., in the United States and/or in other countries. Other brands, products, or service names mentioned may be
trademarks of others.
Notice: This document is for informational purposes only and does not set forth any warranty, expressed or implied, concerning any
equipment, equipment feature, or service offered or to be offered by Brocade. Brocade reserves the right to make changes to this document
at any time, without notice, and assumes no responsibility for its use. This informational document describes features that may not be
currently available. Contact a Brocade sales office for information on feature and product availability. Export of technical data contained in
this document may require an export license from the United States government.
The authors and Brocade Communications Systems, Inc. assume no liability or responsibility to any person or entity with respect to the
accuracy of this document or any loss, cost, liability, or damages arising from the information contained herein or the computer programs that
accompany it.
The product described by this document may contain open source software covered by the GNU General Public License or other open
source license agreements. To find out which open source software is included in Brocade products, view the licensing terms applicable to
the open source software, and obtain a copy of the programming source code, please visit http://www.brocade.com/support/oscd.
Contents
Preface..................................................................................................................................... 7
Document conventions......................................................................................7
Text formatting conventions.................................................................. 7
Command syntax conventions.............................................................. 7
Notes, cautions, and warnings.............................................................. 8
Brocade resources............................................................................................ 9
Contacting Brocade Technical Support.............................................................9
Document feedback........................................................................................ 10
Troubleshooting......................................................................................................................93
● Document conventions......................................................................................................7
● Brocade resources............................................................................................................ 9
● Contacting Brocade Technical Support.............................................................................9
● Document feedback........................................................................................................ 10
Document conventions
The document conventions describe text formatting conventions, command syntax conventions, and
important notice formats used in Brocade technical documentation.
Format Description
bold text Identifies command names
Identifies keywords and operands
Identifies the names of user-manipulated GUI elements
Identifies text to enter at the GUI
Convention Description
bold text Identifies command names, keywords, and command options.
italic text Identifies a variable.
value In Fibre Channel products, a fixed value provided as input to a command
option is printed in plain text, for example, --show WWN.
Convention Description
NOTE
A Note provides a tip, guidance, or advice, emphasizes important information, or provides a reference
to related information.
ATTENTION
An Attention statement indicates a stronger note, for example, to alert you when traffic might be
interrupted or the device might reboot.
CAUTION
A Caution statement alerts you to situations that can be potentially hazardous to you or cause
damage to hardware, firmware, software, or data.
DANGER
A Danger statement indicates conditions or situations that can be potentially lethal or
extremely hazardous to you. Safety labels are also attached directly to products to warn of
these conditions or situations.
Brocade resources
Visit the Brocade website to locate related documentation for your product and additional Brocade
resources.
You can download additional publications supporting your product at www.brocade.com. Select the
Brocade Products tab to locate your product, then click the Brocade product name or image to open the
individual product page. The user manuals are available in the resources module at the bottom of the
page under the Documentation category.
To get up-to-the-minute information on Brocade products and resources, go to MyBrocade. You can
register at no cost to obtain a user ID and password.
Release notes are available on MyBrocade under Product Downloads.
White papers, online demonstrations, and data sheets are available through the Brocade website.
Brocade customers
For product support information and the latest information on contacting the Technical Assistance
Center, go to http://www.brocade.com/services-support/index.html.
If you have purchased Brocade product support directly from Brocade, use one of the following methods
to contact the Brocade Technical Assistance Center 24x7.
Preferred method of contact for non- Required for Sev 1-Critical and Sev [email protected]
urgent issues: 2-High issues:
Please include:
• My Cases through MyBrocade • Continental US: 1-800-752-8061
• Problem summary
• Software downloads and licensing • Europe, Middle East, Africa, and
• Serial number
tools Asia Pacific: +800-AT FIBREE
(+800 28 34 27 33) • Installation details
• Knowledge Base
• For areas unable to access toll • Environment description
free number: +1-408-333-6061
• Toll-free numbers are available in
many countries.
• Brocade Supplemental Support augments your existing OEM support contract, providing direct
access to Brocade expertise. For more information, contact Brocade or your OEM.
• For questions regarding service levels and response times, contact your OEM/Solution Provider.
Document feedback
To send feedback and report errors in the documentation you can use the feedback form posted with
the document or you can e-mail the documentation team.
Quality is our first concern at Brocade and we have made every effort to ensure the accuracy and
completeness of this document. However, if you find an error or an omission, or you think that a topic
needs further development, we want to hear from you. You can provide feedback in two ways:
• Through the online feedback form in the HTML documents posted on www.brocade.com.
• By sending your feedback to [email protected].
Provide the publication title, part number, and as much detail as possible, including the topic heading
and page number if applicable, as well as your suggestions for improvement.
• Updated command syntax of the example in Removing F_Ports from an N_Port on page 38.
• In Fabric OS features in Access Gateway mode on page 17, updated the table for NTP support in
Acess Gateway mode and added the section NTP configuration distribution to Access Gateways on
page 24 for NTP support.
• In Removing devices from the list of allowed devices on page 54, corrected typos in the ag --
adsdel command
• In Adding new devices to the list of allowed devices on page 54corrected typos in the ag --
adsadd command.
• In Monitoring trunking on page 76, references to Advanced Performance Monitoring (APM) are
removed. The Advanced Performance Monitoring feature is deprecated in Fabric OS 7.4.0.
• In Performance Monitoring on page 83, references to Advanced Performance Monitoring (APM)
are removed. The Advanced Performance Monitoring feature is deprecated in Fabric OS 7.4.0.
E_Port An interswitch link (ISL) port. A switch port that connects switches together
to form a fabric.
Edge switch A fabric switch that connects host, storage, or other devices, such as
Brocade Access Gateway, to the fabric.
Fabric A fabric system consists of interconnected nodes that look like a single
system logical unit when viewed collectively. This refers to a consolidated high-
performance network system consisting of coupled storage devices,
networking devices, and parallel processing high bandwidth interconnects
such as 4-Gbps, 8-Gbps, 10-Gbps, and 16-Gbps Fibre channel ports.
F_Port A fabric port. A switch port that connects a host, host bus adapter (HBA), or
storage device to the SAN. On Brocade Access Gateway, the F_Port
connects to a host or a target.
FCoE Fibre Channel over Ethernet (FCoE) refers to a network technology that
encapsulates Fibre Channel frames over Ethernet networks. This allows
Fibre Channel to use 10-Gigabit Ethernet or higher speed networks while
preserving the Fibre Channel protocol.
N_Port A node port. A Fibre Channel host or storage port in a fabric or point-to-point
connection. On Brocade Access Gateway, the N_Port connects to the Edge
switch.
Port Port Grouping (PG) policy is used to partition the fabric, host, or target ports
Grouping within an AG-enabled module into independently operated groups.
(PG) policy
NOTE
In this document, a switch operating in Access Gateway mode is also referred to as an Access Gateway
device or AG device.
The following figures show differences between the switch function in Native mode and switch function
in AG mode.
Feature Support
Feature Support
Admin Domains No
Audit Yes
Beaconing Yes
DHCP Yes
Extended Fabrics No
Fabric Provisioning No
Fabric Services No
1 When a switch is operating in AG mode, RBAC features in Fabric OS are available, with limitations. For more information on the
limitations, refer to Access Gateway hardware considerations on page 27.
Feature Support
License Yes**
Management Server NA
Name Server NA
Open E_Port NA
Port Decommission No
Port Mirroring No
Security Yes
ADS/DCC Policy
SNMP Yes
Feature Support
Trunking Yes**
Virtual Fabrics No
Refer to Virtual Fabrics support on page 21.
Zoning NA
NOTE
If a device that supports 16 Gbps is connected to a device that supports only 8 Gbps, buffer credit
recovery is disabled, even if both devices are running 8 Gbps.
Switch platforms support buffer credit recovery in R_RDY or VC_RDY mode. In R_RDY mode, buffer
credit recovery is supported without FA-PWWN and QoS. In VC_RDY mode, buffer credit recovery is
supported with fabric-assigned PWWN (FA-PWWN), FEC, QoS, and trunking.
Disable this feature on the AG device before connecting to a switch running Fabric OS earlier than 7.1.
Use the portcfgcreditrecovery command to enable and disable credit recovery. Refer to the Fabric
OS Command Reference for more information.
for both switch and device policy. You must configure DH-CHAP shared secrets or install FCAP
certificates on the AG device and connected fabric switch before switching a policy mode from off to
on.
• Passive—Incoming authentication requests are accepted. The AG device does not initiate
authentication when connected to a device, but accepts incoming authentication requests if the
connecting device initiates authentication. The F_Ports on the AG device are not disabled if the
connecting device does not support authentication or the policy mode is off. Passive mode is the
safest mode for an AG device when the connected devices do not support authentication.
For device policy support, the AG device supports policy modes on, off, and passive.
For switch policy support, the AG device supports policy modes on and off.
The following tables describe interactions between switch policy modes on the AG device and policy
modes on the connected devices for both fabric switches and HBAs.
TABLE 2 Behavior of AG sending device and receiving fabric switch with different policies configured
Fabric switch, device Fabric switch, device policy Fabric switch, device
policy mode ON mode PASSIVE policy mode OFF
TABLE 3 Behavior of HBA sending device and receiving AG device with different policies configured
• authutil --policy
• authutil --show
• authutil --set
• secauthsecret --set
• secauthsecret --show
NOTE
Although authutil --authinit is not supported in AG mode, it is supported in Native mode.
For more information, refer to the Fabric OS Command Reference.
Beginning with Fabric OS 7.3.0 and later, you can distribute the password database to all switches
that are connected to the same fabric. Use the distribute command on any switch that is in Native
mode to distribute the password database to all AG devices and switches connected to the same
fabric. You can selectively distribute the password database by specifying the AG device name or use
a wildcard matching character (*) to distribute to all switches and AG devices.
Consider the following points when configuring password distribution:
• On the AG device, the fddcfg command is used to either accept or reject the password database
from any of the switches in the same fabric.
• To accept the password database from any switch, the AG device must be running Fabric OS 7.3.0
or later, and at least one of the switches in Native mode within the same fabric must be running
Fabric OS 7.3.0 or later.
• Other databases supported by fddcfg are not supported on AG devices.
• Virtual Fabrics (VF) mode distribution does not apply to an AG device.
• The distribute command is not supported in AG mode. Therefore, an AG device cannot distribute
its password database to switches that are in Native mode.
FDMI support
Starting with Fabric OS 7.3.0, an AG device can register its N_Port with FDMI devices. Use the
fdmishow command to display the device details in AG mode. The fdmishow command displays only
the local devices. Remote device details are blocked.
• F_Port - Fabric port that connects a host, HBA, or storage device to an AG device.
• N_Port - Node port that connects an AG device to the F_Port of the fabric switch.
• D_Port - Diagnostic port that is configured in diagnostic mode to run tests between it and a
connected D_Port on another switch or HBA.
NOTE
Use the portcfgpersisentenable command on all external (outward facing) ports to ensure that these
ports come back online after a switch reboot or power failure. To ensure this command persists on an
embedded switch, enter the portcfgpersisentenable command through the chassis management
console and not the CLI. Refer to Persistent port online state on page 48 for more information.
You can test the link between ports on an AG device and another AG device, fabric switch, or HBA by
configuring each connection in the link as a D_Port. When you configure the ports at each end of the
link as D_Ports, diagnostic tests automatically initiate on the link when the D_Ports come online. You
can view results by using Fabric OS commands, such as portdporttest, during or after testing. When
configured as a D_Port, the port does not participate in fabric operations, log in to a remote device, or
transmit data traffic. The following figure shows D_Port links between multiple devices.
The following table shows a comparison of port configurations between AG and a standard fabric
switch.
F_Port Yes Connects hosts and targets to Access Yes Connects devices, such as hosts, HBAs, and
Gateway. storage to the fabric.
N_Port Yes Connects Access Gateway to a fabric N/A N_Ports are not supported.
switch.
E_Port N/A ISL is not supported.2 Yes Connects the switch to other switches to form
a fabric.
D_Port Yes Allows diagnostic testing across link to Yes Allows diagnostic testing across link to
connected AG switch, fabric switch, or HBA. connected AG switch.
2 The switch is logically transparent to the fabric, therefore it does not participate in the SAN as a fabric switch.
This command disables all user ports on a switch. All Fibre Channel ports are taken offline. If the
switch is part of a fabric, the remaining switches reconfigure. You must disable the switch before
making configuration changes.
6. Enter the ag --modeenable command.
switch:admin> ag --modeenable
The switch automatically reboots and comes back online in AG mode using a factory default port
mapping. For more information on AG mode default port mapping, refer to Table 7 on page 33.
7. Enter the ag --modeshow command to verify that AG mode is enabled.
switch:admin> ag --modeshow
Access Gateway mode is enabled.
8. Use the ag --mapshow command to display all the mapped ports.
The ag --mapshow command shows all enabled N_Ports, even if those N_Ports are not connected.
9. Use the switchshow command to display the status and port state of all ports. Refer to the Fabric
OS Command Reference for examples of output. For a description of the port state, refer to Table 5
on page 30.
10.Enter the switchdisable command to disable the switch.
switch:admin> switchdisable
11.Enter the ag --modedisable command to disable AG mode.
switch:admin> ag --modedisable
12.Enter the ag --modeshow command to verify that AG mode is disabled.
switch:admin> ag --modeshow
Access Gateway mode is NOT enabled
State Description
• Device mapping
Device mapping is optional. Port maps must exist before you can create device maps. Device
mapping allows a virtual port to access its destination device regardless of the F_Port where the
device resides. Device mapping also allows multiple virtual ports on a single physical machine to
access multiple destinations residing in different fabrics.
The preferred method is to map a device WWN to an N_Port group. When a device WWN is mapped
to an N_port, and a failover N_port is also specified, the device can reach the fabric through the
primary or secondary N_port only. However, when a device WWN is mapped to a port group, it can
login to the fabric until the last N_port in the particular port group remains online.
You can map a device to multiple groups. Alternatively, you can map a device to a specific N_Port.
Port mapping
F_Ports must be mapped to N_Ports before the F_Ports can come online. The following figure shows
an example in which eight F_Ports are mapped evenly to four N_Ports on a switch in AG mode. The
N_Ports connect to the same fabric through different Edge switches.
The following table describes the port mapping details shown in the example.
NOTE
By default, Failover and Failback policies are enabled on all N_Ports.
To change the default mapping, refer to Adding F_Ports to an N_Port on page 37. Note that all
F_Ports must be mapped to an N_Port before the F_Port can come online.
NOTE
For releases earlier than Fabric OS 7.3.0, all PoD licenses must be present to use the Brocade 300,
5100, 6505, and 6510 as an Access Gateway device. For Fabric OS 7.3.0 and later, all PoD licenses
are not required to run in AG mode.
NOTE
Communication between host and target ports is not supported if both are mapped to the same
N_Port.
Use the following recommendations for mapping between host and target ports:
• Use separate port groups for the host and target ports.
• If connecting a host and target port to the same AG device, map the host and target to separate
N_Ports and connect those N_Ports to the same fabric.
• When configuring secondary port mapping for failover and failback situations, make sure that host
and target F_Ports do not fail over or fail back to the same N_Port.
The F_Port list can contain multiple F_Port numbers separated by semicolons. In the following
example, F_Ports 6 and 7 are mapped to N_Port 13.
When the F_Port static mapping is changed or added, the F_Port and all attached devices log out
of the previously mapped N_Port and log in to the new N_Port.
3. Use the ag staticdel N_Port " F_Port1 [; F_Port2;...] " command to remove static port mapping. In
the following example, F_Ports 3, 4, and 5 are removed from N_Port 17.
ag --staticdel 17 "3;4;5"
Considerations for using F_Port Static Mapping with other AG features and policies
Consider the following when using F_Port Static Mapping with Access Gateway features and policies:
Device mapping
Device mapping allows you to map individual N_Port ID Virtualization (NPIV) devices to N_Ports. By
mapping device WWNs directly to an N_Port group, traffic from the device will always go to the same
N_Port group, independently of the F_Port where the device logs in. When the Port Grouping and
Device Load Balancing policies are enabled for a port group, WWNs mapped to that port group are
automatically balanced among the online N_Ports in that group (refer to Port Grouping policy modes on
page 59).
NOTE
Port Grouping policy is not supported when both Automatic Login Balancing and Device Load Balancing
are enabled.
Device mapping does not affect or replace the traditional port mapping. Device mapping is optional and
is in addition to the existing port mapping. In general, it is recommended that you map devices to
N_Port groups rather than map devices to individual N_Ports within a port group. Group mapping
ensures maximum device up-time during failover conditions and system power up. Connections occur
more quickly when a large number of devices must connect to the same fabric through a single port
group.
The following aspects of device mapping are important to note:
• Device mapping has priority over port mapping. That is, logins from a device mapped to a specific
N_Port group or N_Port always have priority over unmapped devices that log in to an F_Port that has
been mapped to the same N_Port group or N_Port.
• Current device routing (dynamic mapping) may turn out different than your intended mapping (static
mapping), depending on which N_Ports are online and which policies are enabled, for example,
Automatic Port Configuration, Device Load Balancing, Failover, or Failback. Therefore, it is
recommended to map devices to N_Port groups instead of specific N_Ports within a port group
when using device mapping.
NOTE
Automatic Port Configuration and Device Load Balancing cannot be enabled at the same time.
The following figure illustrates an example of device mapping to port groups. In the example, WWNs 1,
2, and 3 can connect to any N_Port in Port Group 1 (PG1), while WWNs 4 and 5 can connect with any
N_Port in Port Group 2 (PG2).
The following figure shows an example of device mapping to specific N_Ports. Note that you can map
one or multiple WWNs to one N_Port to allow multiple devices to log in through one N_Port.
NOTE
Static and dynamic mapping only applies to NPIV devices and cannot redirect devices that are
physically attached to Access Gateway devices because physically-attached devices use port maps to
connect to the fabric.
ag --addwwnpgmapping 3 "10:00:00:06:2b:0f:71:0c;10:00:00:05:1e:5e:2c:11"
3. To change all currently existing device mappings to a different port group, use the --all keyword
instead of listing all the WWNs.
The following example changes all the currently mapped devices to use port group 3 instead of the
current port group mappings.
ag --addwwnpgmapping 3 --all
4. To remove one or multiple devices to an N_Port group , enter the ag --delwwnpgmapping
Port_Group [WWN];[WWN] command.
All the listed devices stop using the least-loaded N_Port in the group when they log in.
The following example removes mapping for two devices from port group 3.
ag --delwwnpgmapping 3 "10:00:00:06:2b:0f:71:0c;10:00:00:05:1e:5e:2c:11"
5. To remove all devices mapped to an N_Port group, enter the command with the --all option instead
of listing all WWNs. All of the devices will cease automatic use of the least-loaded port in the port
group when they log in. The --all option is a shortcut for specifying all of the devices that are already
mapped with the ag --addwwnpgmapping command.
The following example removes all devices mapped to port group 3.
ag --delwwnpgmapping 3 --all
6. Use the ag --wwnmapshow command to display the list of WWNs mapped to port groups and
verify that the correct devices have been mapped to the desired port group.
ag --addwwnmapping 17 "10:00:00:06:2b:0f:71:0c;10:00:00:05:1e:5e:2c:11"
The --all option edits all the currently existing mappings. None of the --all options can detect what
devices are using the switch. This option affects the mappings that are in the list.
3. To change all current device mappings to a different N_Port, use the ag --addwwnmapping N_Port
--all command.
The following command changes all the existing device mappings to use port 17.
ag --addwwnmapping 17 --all
4. To remove mapping for one or multiple devices from an N_Port, use the ag --delwwnmapping
N_Port [WWN];[WWN] command. All listed device WWNs no longer attempt to use the N_Port unless
a device logs in through an F_Port that is mapped to the N_Port.
The following example removes two devices from N_Port 17.
ag --delwwnmapping 17 "10:00:00:06:2b:0f:71:0c;10:00:00:05:1e:5e:2c:11"
5. To remove all devices currently mapped from an N_Port, use the ag --delwwnmapping N_Port --all
command. All listed devices no longer attempt to use the N_Port unless a device logs in through an
F_Port that is mapped to the N_Port. The --all option is a shortcut for specifying all of the devices
that are already mapped with the ag --addwwnmapping command.
The following command removes all devices currently mapped to port 17.
ag --delwwnmapping 17 --all
6. Enter the ag --wwnmapshow command to display the list of N_Ports mapped to WWNs and verify
that the correct WWNs have been mapped or removed from the desired N_Ports.
Pre-provisioning
Pre-provisioning is when you use Fabric OS commands, Web Tools, and Fabric Manager to map
devices not yet connected to the fabric. Pre-provisioning allows management programs to push
configuration changes with no concern for the order in which the changes are received. For example, if
system administrators must push port group changes and device mapping changes, those changes
can be pushed in either order without error. Pre-provisioning also applies to using Fabric OS
commands for device mapping.
If anything interrupts the virtual port connection for the VM, such as a failover port being used, traffic will
originate from the ESX server base device port ID and not the VM port ID.
If there are any additional disruptions, the server does not switch back to the virtual port, and the VM
traffic does not follow the configured device mapping. Note that this behavior can also occur when a VM
first boots, prior to any failover.
When this behavior occurs, the VM WWN will be logged in to the fabric. The WWN appears in the
output of ag --show and ag --wwnmapshow, as well as on the switch. The portperfshow command
displays all traffic on the port to which the ESX server port is mapped (base PID).
To configure WWN mapping on VMware ESX systems, use the following steps.
1. Make sure that virtual world wide port names (VWWPNs) of virtual machines (VMs) are mapped to
the correct port group (or N_Port). Map all VWWPNs to N_Ports to avoid confusion.
2. Make sure all VWWPNs are mapped for LUN access for array-based targets.
3. Make sure to include all VWWPNs in the zone configuration.
4. Reboot the VM.
5. Zone the physical port on the server to the storage device.
6. Check the traffic that originates from the virtual node PID (VN PID). If the configuration is correct,
traffic will flow from the VN PID.
When using device mapping with VMware, the base device initiates port login (PLOGI) and process
login (PRLI) to the target, and then discovers the logical unit number (LUN). The virtual device also
initiates a PLOGI and PRLI to the target, but LUN discovery does not occur. Therefore, when the
device-mapped port is toggled and failover or failback takes place, traffic resumes from the base device.
One of the following actions is recommended when using device mapping with VMware:
• Make sure targets can be reached by the base device so that network traffic can resume if the
mapped device fails over and traffic moves over to the base PID.
• Reboot the server so that it initializes and uses configured device mapping.
Mapping priority
To avoid problems when both port and device mapping are implemented, AG mode uses a priority
system to select the N_Port where a fabric login (FLOGI) is routed. Access Gateway mode considers
mappings in the following order until one can be used.
NOTE
Only NPIV devices can use device mapping and the automatic Device Load Balancing policy. Device
Load Balancing policy is enabled per module rather than per port group.
NOTE
Access Gateway algorithms reduce the chances of PID collisions, but they cannot be totally
eliminated. In some cases, you may be able to configure your virtual or physical fabrics to further
reduce PID collisions.
• Device mapping is not supported when firmware is downgraded to Fabric OS v6.3.x or earlier. You
must delete device mappings or disable Device Load Balancing before downgrading .
• Static and dynamic device mapping are only supported on the edge module in a cascaded Access
Gateway device configuration.
• When mapping devices to a port group, make sure all ports in that group have the same NPIV login
limit. If some ports have a lower login limit than the other ports, and there are many logins to the
group, some devices can repeatedly attempt to connect to the device with the lower limit, because it
has the fewest logins, and fail to connect.
N_Port configurations
By default, on embedded switches, only the internal ports of the Access Gateway device are
configured as F_Ports. All external ports are configured, or locked, as N_Ports. On standalone
switches that support AG mode, a preset number of ports are locked as N_Ports, and the rest of the
ports operate as standard F_Ports.
The following figure shows a host connected to external ports of an embedded switch that is in AG
mode. Although some ports are locked as N_Ports, you can convert N_Ports to F_Ports, as follows.
1. Before converting an N_Port to an F_Port, remap all F_Ports on that N_port to another N_Port.
2. Remove all the F_Ports that are mapped to the selected N_Port.
3. Unlock the selected port from N_Port state.
4. Define a map for the port.
Note that if the Automatic Port Configuration (APC) policy is enabled, the port conversion is done
automatically and no user intervention is necessary. For more information on which ports are locked as
N_Ports by default, refer to Table 7 on page 33.
NOTE
A switch in Access Gateway mode must have at least one port configured as an N_Port. Therefore, the
maximum number of F_Ports that can be mapped to an N_Port is the number of ports on the switch
minus one.
Unlocking N_Ports
By default, when you enable Access Gateway mode on embedded switches, all external ports are
configured in N_Port lock mode. A switch in Access Gateway mode connects only Fibre Channel
Protocol (FCP) hosts and targets to the fabric. It does not support other types of ports, such as
interswitch link (ISL) ports.
On fabric switches in Native mode, the port types are not locked. Fabric OS Native mode dynamically
assigns the port type based on the connected device: F_Ports and FL_Ports for hosts, HBAs, and
storage devices; and E_Ports, EX_Ports, and VE_Ports for connections to other switches.
When you unlock an N_Port, the configuration automatically changes the port to an F_Port. Any
F_Ports mapped to that N_Port are unmapped and disabled.
The following steps show how to unlock and lock N_Ports.
1. Connect to the switch and log in using an account with admin permissions.
2. Enter the portcfgnport command to display which ports on the switch are locked as N_Ports.
Command output will display ON for locked N_Ports.
NOTE
The portcfgnport command only works when the Port Grouping policy is enabled.
3. To unlock N_Port mode, enter the portcfgnport command and specify the N_Port port number and
0 (zero).
switch:admin> portcfgnport 10 0
4. To lock a port in N_Port mode, enter the portcfgnport command and specify the port number and
1.
switch:admin> portcfgnport 10 1
NOTE
If the port is connected to another switch when this command is entered, the fabric may reconfigure.
After the port is persistently enabled, devices connected to the port can again communicate with the
fabric when the port comes back online. You can Identify a single port to be configured by its port
number or by its port index number. Port ranges are supported with index numbers or by specifying a
slot or a slot range. Use the switchShow command for a list of valid ports, slots, and port index
numbers.
As an example, to persistently enable a single port, enter the following command.
D_Port support
The D_Port (diagnostic port) feature is supported on 16-Gbps ports in the following configurations:
NOTE
N_Port-to-F_Port mappings must be removed from an AG device F_Port before configuring it as a
D_Port. Refer to Saving port mappings on page 50 for more information.
• Dynamic D_Port — An AG device supports dynamic D_Port mode starting with Fabric OS 7.3.0. If
the port on the connected HBA is configured as a static D_Port, the AG device port automatically
enters D_Port mode. After the AG device port enters dynamic D_Port mode, the switch runs all
diagnostic tests automatically from the AG device to the connected HBA. When the tests are
complete, the AG device port automatically reverts to F_Port mode, if the HBA or device port reverts
back to be a normal port. However, dynamic D_Port mode is not supported in AG-to-AG and AG-to-
Switch connections; you must configure and remove the D_Port statically in these cases.
To verify dynamic D_Port support on the switch, enter the configure command:
switch:admin> configure
Configure...
• Any D_Port must be configured on the AG device, fabric switch, cascaded AG device, or HBA
before enabling D_Ports on both sides of the link. Otherwise, the port will be persistently disabled.
• After configuring a D_Port for an AG device port, mapping is not retained. Static D_Port
configuration cannot be made unless mappings are removed from the port. This includes F_Port-to-
N_Port, static, preferred, and device (WWN) mapping. Therefore, all mappings must be manually
removed on the Access Gateway port before configuring the port as a D_Port.
For a complete list of D_Port limitations and considerations, refer to the Fabric OS Administrator's
Guide.
sw0:root>ag --backupmappingshow 44
Configured static and prefered mappings have been saved for the N_port
successfully
N_Port 44
Backed-up Configured F_Ports
20:21:22
Backed-up Static F_Ports 23:24
Backed-up Preferred F_Ports
26:27:28:29
• To delete configured N_Port mappings, use the following command:
ag --backupmappingdel N_Port
NOTE
The ag --show command only displays F_Ports on Core AGs, such as the AGs that are directly
connected to fabric. Use the agshow --name command on the fabric switch to display the F_Ports of
both the Core and Edge AGs.
Alternatively, the security policy can be established in the Enterprise fabric using the Device
Connection Control (DCC) policy. For information on configuring the DCC policy, refer to Enabling the
DCC policy on a trunk on page 75. The DCC policy in the Enterprise fabric takes precedence over
the ADS policy. It is generally recommended to implement the security policy in the AG module rather
than in the main fabric, especially if the Failover and Failback policies are enabled.
1. Connect to the switch and log in using an account assigned to the admin role.
2. Enter the ag --policyenable ads command to enable the ADS policy.
switch:admin> ag --policyenable ads
The policy ADS is enabled
3. Enter the ag --policydisable ads command to disable the ADS policy.
switch:admin> ag --policydisable ads
The policy ADS is disabled
NOTE
Use the ag --policyshow command to determine the current status of the ADS policy.
Allow lists
You can determine which devices are allowed to log in on a per-F_Port basis by specifying lists of
F_Ports and device WWNs in the ag --adsset command. The ADS policy must be enabled for this
command to succeed.
ag --adsset " F_Port [ ;F_Port2;... ]" " WWWN [ ;WWN2;... ]"
Lists must be enclosed in quotation marks. List members must be separated by semicolons. The
maximum number of entries in the allowed device list is twice the per-port maximum login count.
Use an asterisk (*) instead of port numbers in the F_Port list to add the specified WWNs to all the
F_Ports allow lists. Use an asterisk (*) instead of WWNs to indicate access to all devices from the
specified F_Port list. A blank WWN list ("") indicates no access.
NOTE
Use an asterisk enclosed in quotation marks ("*") to set the allow list to "all access"; use a pair of double
quotation marks ("") to set the allow list to "no access".
Note the following characteristics of the allow list:
• The maximum number of device entries allowed in the allow list is twice the per-port maximum login
count.
• Each port can be configured to "not allow any device" or "to allow all the devices" to log in.
• If the ADS policy is enabled, by default, every port is configured to allow all devices to log in.
• The same allow list can be specified for more than one F_Port.
For more details on this command and its operands, refer to the Fabric OS Command Reference.
Lists must be enclosed in quotation marks. List members must be separated by semicolons. Replace
the F_Port list with an asterisk (*) to remove the specified WWNs from all the F_Ports allow lists. The
ADS policy must be enabled for this command to succeed.
1. Connect to the switch and log in using an account assigned to the admin role.
2. Enter the ag --adsdel command to remove one or more devices from the list of allowed devices.
In the following example, two devices are removed from the list of allowed devices (ports 3 and 9).
For each F_Port, command output will show access for all devices, a list of device WWNs, or no
access. For more details on this command and its output, refer to the Fabric OS Command
Reference.
The following below shows that if you have created port groups and then an N_Port goes offline, the
F_Ports being routed through that port will fail over to any of the N_Ports that are part of that port group
and are currently online. For example, if N_Port 4 goes offline, then F_Ports 7 and 8 are routed through
to N_Port 3 as long as N_Port 3 is online because both N_Ports 3 and 4 belong to the same port group,
PG2. If no active N_Ports are available, the F_Ports are disabled. The F_Ports belonging to a port
group do not fail over to N_Ports belonging to another port group.
When a dual redundant fabric configuration is used, F_Ports connected to a switch in AG mode can
access the same target devices from both of the fabrics. In this case, you must group the N_Ports
connected to the redundant fabric into a single port group. It is recommended to have paths fail over to
the redundant fabric when the primary fabric goes down.
switch:admin> ag --pgadd 3 14
N_Port[s] are added to the port group 3
Rebalancing F_Ports
To minimize disruption that could occur once F_Ports go offline or when additional N_Ports are
brought online, you can modify the default behavior of Automatic Login Balancing mode by disabling
or enabling rebalancing of F_Ports when F_Port offline or N_Port online events occur.
1. Connect to the switch and log in using an account assigned to the admin role.
2. Enter the agautomapbalance --enable command with the appropriate options to enable automatic
login redistribution of F_Ports. In the following example, rebalancing of F_Ports in port group 1 in
Access Gateway is enabled when an F_Port online event occurs.
switch:admin> agautomapbalance --enable -fport -pg 1
3. Enter the agautomapbalance --disable -all command with the appropriate options to disable
automatic login distribution of N_Ports for all port groups in the Access Gateway when an N_Port
online event occurs.
switch:admin> agautomapbalance --disable -nport -all
4. Enter the agautomapbalance --disable -all command with the appropriate options to disable
automatic login distribution of F_Ports for all port groups in the Access Gateway when an F_Port
online event occurs.
switch:admin> agautomapbalance --disable -fport -all
5. Enter the agautomapbalance --show command to display the automatic login redistribution
settings for port groups. In the following example, there are two port groups, 0 and 1.
switch:admin> agautomapbalance --show
AG Policy: pg
--------------------------------------------
PG_ID LB mode nport fport
--------------------------------------------
0 Enabled Enabled Disabled
1 Disabled - -
This command also displays the automatic login redistribution settings for N_Ports and F_Ports. For
more details on this command and its output, refer to the Fabric OS Command Reference.
fabrics and disables failover of the N_Ports in the port group. For more information on MFNM, refer
to Managed Fabric Name Monitoring mode on page 59.
• Flexible ALPA assigns an unassigned ALPA value when the ALPA assigned to the device is taken by
another host.
• Stringent ALPA causes the host login request to be rejected by AG if assignment of the same ALPA
is not possible.
To enable Persistent ALPA, use the following steps.
1. Connect to the switch and log in using an account assigned to the admin role.
2. Enter the ag --persistentalpaenable command to enable persistent ALPA in flexible (-f) or stringent
(-s) mode. The following example shows enabling the policy in flexible mode.
switch:admin> ag --persistentalpaenable 1 -f
To ensure consistency among the different devices, after Persistent ALPA is enabled, all the ALPAs
become persistent, whether or not they were logged in before the Persistent ALPA policy was
enabled.
In the example, PWWN is the port that you want to remove from the database.
1. Connect to the switch and log in using an account assigned to the admin role.
2. Enter the ag --clearalpamap command with the appropriate option to remove the PWW-to-ALPA
mapping for a specific port. In the following example, the mapping for port 2 is cleared from the
database.
switch:admin> ag --clearalpamap 2
NOTE
All the device data must be persistent in case of a reboot. During a reboot, the tables will be dumped
to the persistent_NPIV_config file.
Failover policy
The Access Gateway Failover policy ensures maximum uptime for the servers. When a port is
configured as an N_Port, the Failover policy is enabled by default and is enforced during power-up. The
Failover policy allows hosts and targets to automatically remap to another online N_Port if the primary
N_Port goes offline.
NOTE
For port mapping, the Failover policy must be enabled on an N_Port for failover to occur. For device
mapping, if a device is mapped to an N_Port in a port group, the device will always reconnect to the
least-loaded online N_Port in the group (or secondary N_Port in the group if configured) if the primary
N_Port goes offline. This occurs regardless of whether the Failover policy is enabled or disabled for the
primary N_Port.
NOTE
If failover and failback policy are disabled, an F_Port mapped to an N_Port will go offline when the
N_Port goes offline and it will come online when the N_Port comes online.
Failover example
The following example shows the failover sequence of events in a scenario where two fabric ports go
offline, one after the other. Note that this example assumes that no preferred secondary N_Port is set
for any of the F_Ports.
• First, the Edge switch F_A1 port goes offline, as shown in Example 1 in the following figure, causing
the corresponding Access Gateway N_1 port to be disabled.
The ports mapped to N_1 fail over; F_1 fails over to N_2 and F_2 fails over to N_3.
• Next, the F_A2 port goes offline, as shown in Example 2 in the following figure, causing the
corresponding Access Gateway N_2 port to be disabled.
The ports mapped to N_2 (F_1, F_3, and F_4) fail over to N_3 and N_4. Note that the F_Ports are
evenly distributed to the remaining online N_Ports and that the F_2 port did not participate in the
failover event.
1. Connect to the switch and log in using an account assigned to the admin role.
2. Enter the ag --prefset command with the "F_Port1;F_Port2; ..." N_Port options to add the preferred
secondary F_Ports to the specified N_Port.
The F_Ports must be enclosed in quotation marks and the port numbers must be separated by a
semicolon, as shown in the following example.
NOTE
Preferred mapping is not allowed when Automatic Login Balancing mode is enabled for a port
group. All N_Ports are the same when Automatic Login Balancing mode is enabled.
The following example configures N_Port 32 as the failover port for two devices already mapped to a
primary N_Port.
ag --addwwnfailovermapping 32 "10:00:00:06:2b:0f:71:0c;10:00:00:05:1e:5e:2c:11"
To configure N_Port 32 as a failover port for all WWNs mapped to the N_Port, enter the ag --
addwwnfailovermapping N_Port command with the --all option.
ag --addwwnfailovermapping 32 --all
ag --delwwnfailovermapping 32 "10:00:00:06:2b:0f:71:0c;10:00:00:05:1e:5e:2c:11"
To remove an N_Port as a failover port for all devices mapped to the N_Port, enter the ag --
delwwnfailovermapping N_Port command with the --all option.
The following command removes N_Port 32 as the secondary N_Port for all available devices.
ag --delwwnfailovermapping 32 --all
1. Connect to the switch and log in using an account assigned to the admin role.
2. Enter the ag --failoverenable -pg pgid command to enable failover.
switch:admin> ag --failoverenable -pg 3
Failover policy is enabled for port group 3
3. Enter the ag --failoverdisable -pg pgid command to disable failover.
switch:admin> ag --failoverdisable -pg 3
Failover policy is disabled for port group 3
Failback policy
The Failback policy provides a means for hosts that have failed over to automatically reroute back to
their intended mapped N_Ports when these N_Ports come back online. The Failback policy is an
attribute of an N_Port and is enabled by default when a port is locked to the N_Port.
Only the originally mapped F_Ports fail back. In the case of multiple N_Port failures, only F_Ports that
were mapped to a recovered N_Port experience failback. The remaining F_Ports are not redistributed.
NOTE
For port mapping, the Failback policy must be enabled on an N_Port for failback to occur. For device
mapping, the Failback policy has no effect. If a device is mapped to a port group, it will always fail over
to an online N_Port in the port group (or secondary N_Port if configured) and will remain connected to
this failover N_Port when the original N_Port comes back online.
NOTE
If failover and failback policy are disabled, an F_Port mapped to an N_Port will go offline when the
N_Port goes offline and it will come online when the N_Port comes online.
NOTE
The failback period is quite fast and rarely causes an I/O error at the application level.
Failback example
In Example 3, in the following figure, the Access Gateway N_1 remains disabled because the
corresponding F_A1 port is offline. However, N_2 comes back online. Refer to Failover example on
page 66 for the original failover scenario.
Ports F_1 and F_2 are mapped to N_1 and continue routing to N_3. Ports F_3 and F_4, which were
originally mapped to N_2, are disabled and rerouted to N_2, and then enabled.
1. Connect to the switch and log in using an account assigned to the admin role.
2. Enter the ag --failbackshow n_portnumber command to display the failback setting.
switch:admin> ag --failbackshow 13
Failback on N_Port 13 is not supported
3. Use the following commands to enable or disable the Failback policy:
• Enter the ag --failbackenable n_portnumber command to enable failback.
switch:admin> ag --failbackenable 13
Failback policy is enabled for port 13
• Enter the ag --failbackdisable n_portnumber command to disable failback.
switch:admin> ag --failbackdisable 13
Failback policy is disabled for port 13
ag --reliabilitycounterset "count"
ag --reliabilitycountershow
NOTE
N_Port trunking is not supported for HBAs connected to switches running in Access Gateway mode.
N_Port trunking is only supported for HBAs connected to switches running in Native mode.
NOTE
You can also enable F_Ports on the Access Gateway switch for trunking using the portcfgtrunkport
command.
trunk group enables F_Port masterless trunking on that port or trunk group. On switches running in
Access Gateway mode, the masterless trunking feature trunks N_Ports because these are the only
ports that connect to the Enterprise fabric. When a TA is assigned to a port or trunk group, the ports
will immediately acquire the TA as the area of its port IDs (PIDs). When a TA is removed from a port or
trunk group, the port reverts to the default area as its PID.
NOTE
By default, trunking is enabled on all N_Ports of the AG; ensure that this feature is enabled on N_Ports
that are part of a port trunk group.
Setting up trunking
Use the following steps to set up trunking.
1. Connect to the switch and log in using an account assigned to the admin role.
2. Ensure that both modules (Edge switch and the switch running in AG mode) have the trunking
licenses enabled.
3. Ensure that the ports have trunking enabled by issuing the portcfgshow command. If trunking is
not enabled, issue the portcfgtrunkport [ slot / ] port , 1 command.
4. Ensure that the ports within a trunk have the same speed.
5. Ensure that the ports within an ASIC trunk group are used to group the ports as part of a trunk on
the Edge switch or on an AG.
6. Ensure that both modules are running the same Fabric OS versions.
A port within a TA can be removed, but this adds the Index back to the switch. For example, the same
AD1 and AD2 with TA 8 holds true. If you remove port 7 from the TA, it adds Index 7 back to the switch.
That means AD1's 3,7 can be seen by AD1 along with 3,8; 4,13 and 4,14.
23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0
1. Connect to the switch and log in using an account assigned to the admin role.
2. Disable the ports to be included in the TA.
3. Enable a TA for the appropriate ports. The following example enables a TA for ports 13 and 14 on
slot 10 with port index of 125.
switch:admin> porttrunkarea --enable 10/13-14 -index 125
4. Display the TA port configuration (ports still disabled) using the porttrunkarea --show enabled
command.
5. Enable the ports specified in step 3 using the portenable command.
switch:admin> portenable 10/13
switch:admin> portenable 10/14
6. Show the TA port configuration after enabling the ports using the porttrunkarea --show enabled
command. The ports that you enabled should appear in the output.
Trunk ports should be turned on after issuing the secpolicyactivate command to prevent the ports
from becoming disabled in the case where there is a DCC security policy violation.
Enabling trunking
1. Connect to the switch and log in using an account assigned to the admin role.
2. Disable the desired ports by entering the portdisable port command for each port to be included in
the TA.
3. Enter the porttrunkarea--enable 3 command with the appropriate options to form a trunk group for
the desired ports. For example, if ports 36-39 were disabled in step 2, then the following example
command forms a trunk group for ports 36-39 with index 37. These will be connected to N_Ports on
an AG module.
switch:admin> porttrunkarea --enable 36-39 -index 37
Trunk area 37 enabled for ports 36, 37, 38 and 39.
4. Enter the portenable port command for each port in the TA to re-enable the desired ports, such as
ports 36-39.
5. Enter the switchshow command to display the switch or port information, including created trunks.
If an error occurs as in the previous example, disable each port using the portdisable port
command, and then reissue the command.
Monitoring trunking
For F_Port masterless trunking, you must install Filter, EE, or TT monitors on the F_Port trunk port.
Whenever the master port changes, it is required to move the monitor to the new master port. For
example, if a master port goes down, a new master is selected from the remaining slave ports. If you
attempt to add a monitor to a slave port, it is automatically added to the master port.
Category Description
Area assignment You statically assign the area within the trunk group on the Edge switch. That group is
the F_Port masterless trunk. The static trunk area you assign must fall within the
F_Port trunk group starting from port 0 on an Edge switch or blade.The static trunk
area you assign must be one of the port’s default areas of the trunk group.
TABLE 10 Access Gateway trunking considerations for the Edge switch (Continued)
Category Description
Authentication Authentication occurs only on the F_Port trunk master port and only once per the
entire trunk. This behavior is the same as E_Port trunk master authentication.
Because only one port in the trunk does FLOGI to the switch, and authentication
follows FLOGI on that port, only that port displays the authentication details when you
issue the portshow command.
NOTE
Authentication is also supported on switches configured in AG mode.
Management Server Registered Node ID (RNID), Link Incident Record Registration (LIRR), and Query
Security Attributes (QSA) Extended Link Service Requests (ELSs) are not supported
on F_Port trunks.
Trunk area The port must be disabled before assigning a Trunk Area on the Edge switch to the
port or removing a Trunk Area from a trunk group.You cannot assign a Trunk Area to
ports if the standby CP is running a firmware version earlier than Fabric OS v6.2.0.
PWWN The entire Trunk Area trunk group shares the same Port WWN within the trunk group.
The PWWN is the same across the F_Port trunk that will have 0x2f or 0x25 as the first
byte of the PWWN. The TA is part of the PWWN in the format listed in Table 11 .
Downgrade You can have trunking on, but you must disable the trunk ports before performing a
firmware downgrade.
NOTE
Removing a Trunk Area on ports running traffic is disruptive. Use caution before
assigning a Trunk Area if you need to downgrade to a firmware earlier than Fabric OS
v6.1.0.
Upgrade No limitations on upgrade to Fabric OS 7.1.0 if the F_Port is present on the switch.
Upgrading is not disruptive.
HA Sync If you plug in a standby CP with a firmware version earlier than Fabric OS v6.1.0 and a
Trunk Area is present on the switch, the CP blades will become out of sync.
Port Types Only F_Port trunk ports are allowed on a Trunk Area port. All other port types that
include F/FL/E/EX are persistently disabled.
Default Area Port X is a port that has its Default Area the same as its Trunk Area. The only time you
can remove port X from the trunk group is if the entire trunk group has the Trunk Area
disabled.
portCfgTrunkPort [slot/] portCfgTrunkPort [slot/] port, 0 will fail if a Trunk Area is enabled on a port. The port
port , 0 must be Trunk Area-disabled first.
switchCfgTrunk 0 switchCfgTrunk 0 will fail if a port has TA enabled. All ports on a switch must be TA
disabled first.
Port Swap When you assign a Trunk Area to a Trunk group, the Trunk Area cannot be port
swapped; if a port is swapped, then you cannot assign a Trunk Area to that port.
TABLE 10 Access Gateway trunking considerations for the Edge switch (Continued)
Category Description
Trunk Master No more than one trunk master in a trunk group. The second trunk master will be
persistently disabled with reason "Area has been acquired".
Fast Write When you assign a Trunk Area to a trunk group, the trunk group cannot have fast write
enabled on those ports; if a port is fast- write-enabled, the port cannot be assigned a
Trunk Area.
FICON FICON is not supported on F_Port trunk ports. However, FICON can still run on ports
that are not F_Port trunked within the same switch.
FC8-48 blades F_Port trunking does not support shared area ports on the Brocade FC8-48 blades in
a 48000. F_Port trunking is supported on all ports on the Brocade FC8-48 in the DCX
and DCX-4S.
FC4-32 blade If an FC4-32 blade has the Trunk Area enabled on ports 16 - 31 and the blade is
swapped with a FC8-48 blade, the Trunk Area ports will be persistently disabled. You
can run the porttrunkarea command to assign a Trunk Area on those ports.
Trunking You must first enable trunking on the port before the port can have a Trunk Area
assigned to it.
PID format F_Port masterless trunking is only supported in CORE PID format.
Long Distance Long distance is not allowed when AG is enabled on a switch. This means you cannot
enable long distance on ports that have a Trunk Area assigned to them.
Port mirroring Port mirroring is not supported on Trunk Area ports or on the PID of an F_Port trunk
port.
Port speed Ports within a trunk must have the same port speed for a trunk to successfully be
created.
configDownload and If you issue the configdownload command for a port configuration that is not
configUpload compatible with F_Port trunking, and the port is Trunk-Area-enabled, then the port will
be persistently disabled.
Note: Configurations that are not compatible with F_Port trunking are long distance,
port mirroring, non-CORE_PID, and Fast Write.
ICL port F_Port trunks are not allowed on ICL ports. The porttrunkarea command does not
allow it.
TABLE 10 Access Gateway trunking considerations for the Edge switch (Continued)
Category Description
AD You cannot create a Trunk Area on ports with different Admin Domains. You cannot
create a Trunk Area in AD255.
DCC Policy DCC policy enforcement for the F_Port trunk is based on the Trunk Area; the FDISC
request to a trunk port is accepted only if the WWN of the attached device is part of
the DCC policy against the TA. The PWWN of the FLOGI sent from the AG will be
dynamic for the F_Port trunk master. Because you do not know ahead of time what
PWWN AG will use, the PWWN of the FLOGI will not go through DCC policy check on
an F_Port trunk master. However, the PWWN of the FDISC will continue to go through
DCC policy check.
D,I Zoning (D,I) AD Creating a Trunk Area may remove the Index ("I") from the switch to be grouped to the
Trunk Area. All ports in a Trunk Area share the same "I". This means that
(D, I) DCC and (PWWN, Domain,Index (D,I), which refers to an "I", that might have been removed, will no
I) DCC longer be part of the switch.
Note : Ensure to include AD, zoning, and DCC when creating a Trunk Area.
You can remove the port from the Trunk Area to have the "I" back into effect. D,I will
behave as normal, but you may see the effects of grouping ports into a single "I".
Also, D,I continues to work for Trunk Area groups. The "I" can be used in D,I if the "I"
was the "I" for the Trunk Area group.
Two masters Two masters is not supported in the same F_Port trunk group.
QoS Supported.
NAA = 2 2f:xx:nn:nn:nn:nn:nn:nn Port WWNs for: The valid range of xx is [0 - FF], for maximum
of 256.
(1) switch FX_Ports.
NAA = 2 25:xx:nn:nn:nn:nn:nn:nn Port WWNs for: switch The valid range of xx is [0 - FF], for maximum
FX_Ports of 256.
(1)
trunk will be proportional to the number of ports in that trunk. Use the ag -show command to
determine the devices using a particular trunk.
PWWN will be rejected and the port will be persistently disabled with reason as "Duplicate Port WWN
detected."
• Enforced login - The second login request will have precedence over the existing login and Access
Gateway will accepts the login.
• Mixed - This option takes port type into consideration. The second login request will have
precedence over the existing login in case of a duplicate entry exit on the F_Port with an NPIV device
logged in. The first login takes precedence over the second login request in case of a duplicate entry
exit on the F_Port without any NPIV device logged in.
You can configure different handling of duplicate PWWNs other than the default operation using the
configure command through the F_Port login parameters. For more information on configuration and
handling of duplicate PWWNs during device login, refer to the "Duplicate PWWN handling during device
login" section in the Fabric OS Administrator’s Guide.
This feature is supported in the following configurations:
• AG switch connected to AG switch in cascaded configuration.
• AG switch connected to Brocade fabric switch.
• AG switch connected to a Brocade Host Bus Adapter (HBA).
Performance Monitoring
Performance monitoring is available through the Flow Vision "Flow Monitor" for platforms using Fabric
OS 7.2 and later. With Fabric OS 7.4.0 and later, legacy Advanced Performance Monitoring features
are no longer supported.
Flow Monitor
Flow Vision is a licensed feature supported on platforms using Fabric OS 7.2 and later. It provides a
unified platform to manage traffic-related applications on Fabric OS devices. Storage administrators can
use this platform to simulate, monitor, and capture the network’s traffic patterns and to make capacity-
planning decisions based on the collected statistical data.
To access Flow Vision, the Fabric Vision (FV) license must be installed on the hardware platform.
The Flow Monitor component of Flow Vision is supported by Access Gateway. Flow Monitor allows you
to monitor the network’s traffic pattern and provides statistics to make capacity planning decisions
based on the collected data. Flow Monitor provides a single interface to manage flows and unifies
different performance monitoring features such as end-to-end monitors and frame monitors.
Flow Monitor expands on basic performance monitoring by allowing you to monitor any hardware-
supported flow parameters and define your own flows using combinations of source and destination
devices, source and destination IDs, LUN IDs, CSCTL values, and frame types as parameters.
Following are examples of monitors that you can replicate using Flow Monitor:
• End to End Monitor - This measures the traffic in terms of word count between a pair of ports (host
and target). Use this to view end-to end traffic values on an Access Gateway.
• Frame monitoring - Set up an SCSI monitor so that you can view the -frametype frame and byte
count for a flow.
• LUN monitoring - This allows you to view the -frametype frame and byte count for a specific LUN.
• Flow learning monitor - This learns flows going through a specific F_Port in the Access Gateway.
• DST monitor - This provides the legacy support equivalent to a frame monitor.
Access Gateway switches support flow monitors on F_Ports only, and only the ingress port parameter
is supported. For more information on using Flow Monitor features for Access Gateway in Flow Vision,
refer to the Flow Vision Administrator's Guide.
Although target devices can be connected directly to AG ports, it is recommended that the switch
operating in AG mode be connected to the core fabric.
Target aggregation
Access Gateway mode is normally used as host aggregation. In other words, a switch in AG mode
aggregates traffic from a number of host systems onto a single uplink N_Port. Similarly, many targets
can be aggregated onto to a single uplink N_Port, as shown in the following figure. Target aggregation
has many applications. As one example, you can consolidate targets with various lower Fibre Channel
speeds (such as 1, 2, or 4 Gbps) onto a single high-speed uplink port to the core fabric. This reduces
the number of core fabric ports used by target devices and allows higher scalability.
AG cascading provides higher over-subscription because it allows you to consolidate the number of
ports going to the main fabric. There is no license requirement to use this feature.
• Due to high subscription ratios that could occur when cascading AGs, ensure there is enough
bandwidth for all servers when creating such configurations. The subscription ratio becomes more
acute in a virtual environment.
• Starting with Fabric OS 7.3.0 and later, the registration and de-registration of FDMI devices
connected to an AG or cascaded AG is supported, and the fdmishow command on AG will display
the local FDMI devices connected to the AG. However, remote FDMI devices will not be displayed.
switch:admin> switchshow
switchName: switch
switchType: 76.6
switchState: Online
switchMode: Native
switchRole: Subordinate
switchDomain: 13
switchId: fffc01
switchWwn: 10:00:00:05:1e:03:4b:e7
zoning: OFF
switchBeacon: OFF
----------------------------------------=
If the switch is in Native mode, you can enable AG mode; otherwise, set the switch to Native mode,
and then reboot the switch.
In the command, vfid is the virtual fabric identification number. The state variable can be enable for
the enabled state or disable for the disabled state.
The osmsState variable can be enable or 1 for the enabled state or disable or 0 for the disabled
state.
3. Enable NPIV functionality on the Edge fabric ports so that multiple logins are allowed for each port.
Enter the following command on the M-EOS switch to enable NPIV on the specified ports.
config NPIV
NOTE
You can run the agshow command to display Access Gateway information registered with the
fabric. When an Access Gateway is exclusively connected to non-Fabric-OS-based switches, it will
not show up in the agshow output on other Brocade switches in the fabric.
Your Cisco switch is now ready to connect to a switch in Access Gateway mode.
The following table provides troubleshooting information for Fabric OS switches in AG mode.
TABLE 12 Troubleshooting
Switch is not in Switch is in Native Disable switch using the switchDisable command.
Access Gateway switch mode
mode Enable Access Gateway mode using the ag --modeenable
command.
Answer yes when prompted; the switch reboots.
Log in to the switch.
Display the switch settings using the switchShow command.
Verify that the field switchMode displays Access Gateway mode.
NPIV disabled on Inadvertently turned off On the Edge switch, enter the portCfgShow command.
Edge switch ports
Verify that NPIV status for the port to which Access Gateway is
connected is ON.
If the status displays as "--" NPIV is disabled. Enter the
portCfgNpivPort port_number command with the enable option to
enable NPIV.
Repeat this step for each port as required.
Need to reconfigure Default port setting not Enter the portCfgShow command.
N_Port and F_Ports adequate for customer
environment For each port that is to be activated as an N_Port, enter the
portCfgNport port_number command with the 1 option.
All other ports remain as F_Ports.
To reset the port to an F_Port, enter the portCfgNpivPort
port_number command with the disable option.
LUNs are not visible Zoning on fabric switch Verify zoning on the Edge switch.
is incorrect.
Verify that F_Ports are mapped to an online N_Port. Refer to Table
Port mapping on 7 on page 33.
Access Gateway mode
switch is incorrect. Perform a visual inspection of the cabling; check for issues such as
wrong ports, twisted cable, or bent cable. Replace the cable and
Cabling not properly try again. Ensure the F_Port on AG module is enabled and active.
connected.
Failover is not Failover disabled on Verify that the failover and failback policies are enabled, as follows:
working N_Port.
Enter the ag --failoverShow command with the port_number
option.
Enter the ag --failbackShow command with the port_number
option.
Command returns "Failback (or Failover) on N_Port port_number
is supported."
If it returns, "Failback (or Failover) on N_Port port_number is not
supported." Refer to Adding a preferred secondary N_Port
(optional) on page 67.
Access Gateway is Access Gateway must Disable switch using the switchDisable command.
mode not wanted be disabled.
Disable Access Gateway mode using the ag --modeDisable
command.
Answer yes when prompted; the switch reboots.
Log in to the switch.
Display the switch settings using the switchShow command.
Verify that the field switchMode displays Fabric OS Native mode.
"Login Rejected by The CNA host is Messages display as designed. After the switch has completed
FC stack" messages retrying a login before LOGO processing, it will accept another login.
on console may be the switch has finished
seen during F_Port precessing a previous
and N_Port fabric logout (LOGO)
disruptions on attempt.
Brocade 8470 in AG
mode.