You are previewing Implementing an IBM b-type SAN with 8 Gbps Directors and Switches.
O'Reilly logo
Implementing an IBM b-type SAN with 8 Gbps Directors and Switches

Book Description

"Do everything that is necessary and absolutely nothing that is not."

This IBM® Redbooks® publication, written at a Data Center Fabric Manager v10.1.4 and Fabric Operating System v6.4 level, consolidates critical information while also covering procedures and tasks that you are likely to encounter on a daily basis when implementing an IBM b-type SAN.

The products that we describe in this book have more functionality than we can possibly cover in a single book. A storage area network (SAN) is a powerful infrastructure for consolidation, distance solutions, and data sharing. The quality applications that the IBM SAN portfolio provides can help you take full advantage of the benefits of the SAN.

In this book, we cover the latest additions to the IBM b-type SAN family and show how you can implement them in an open systems environment. In particular, we focus on the Fibre Channel Protocol (FCP) environment. We address the key concepts that these products bring to the market and, in each case, we provide an overview of the functions that are essential to building a robust SAN environment.

Table of Contents

  1. Front cover
  2. Notices
    1. Trademarks
  3. Preface
    1. The team who wrote this book
    2. Now you can become a published author, too!
    3. Comments welcome
    4. Stay connected to IBM Redbooks
  4. Summary of changes
    1. March 2011, Eleventh Edition
  5. Chapter 1. Product introduction
    1. 1.1 Overview of the product
      1. 1.1.1 Hardware features
      2. 1.1.2 Hardware naming convention: IBM and Brocade
    2. 1.2 Product descriptions
      1. 1.2.1 IBM System Storage SAN24B-4 switch
      2. 1.2.2 IBM System Storage SAN40B-4 switch
      3. 1.2.3 IBM System Storage SAN80-B4 switch
      4. 1.2.4 IBM Converged Switch B32
      5. 1.2.5 SAN32B-E4(2498-E32)
      6. 1.2.6 IBM System Storage SAN06B-R (2498-R06)
      7. 1.2.7 IBM System Storage SAN384B Director
      8. 1.2.8 IBM System Storage SAN768B Director
      9. 1.2.9 Brocade 4 Gbps SAN Switch Modules
      10. 1.2.10 Brocade 8 Gbps SAN Switch Modules
      11. 1.2.11 Fabric Operating System
      12. 1.2.12 Management tools
      13. 1.2.13 Licensing
      14. 1.2.14 Security
      15. 1.2.15 Virtual Fabrics
      16. 1.2.16 Support
  6. Chapter 2. Data Center Fabric
    1. 2.1 Methodologies of current SAN design
      1. 2.1.1 Availability considerations
      2. 2.1.2 Benefits of a consolidated SAN design
    2. 2.2 IBM/Brocade Data Center Fabric value enhanced
    3. 2.3 IBM/Brocade backbone models
    4. 2.4 Scalability at the core
      1. 2.4.1 Scalability advantages
      2. 2.4.2 Moving a backbone-class switch from core to edge
    5. 2.5 Blade options
    6. 2.6 Advance Feature and Licensing
      1. 2.6.1 Advanced Feature summary
      2. 2.6.2 Fabric Operating Systems
  7. Chapter 3. Hardware features
    1. 3.1 The hardware
      1. 3.1.1 Entry level, midrange, and director models
      2. 3.1.2 Switch and director model types
    2. 3.2 Generic features
      1. 3.2.1 Auto-sensing speed negotiation
      2. 3.2.2 Zoning
      3. 3.2.3 Frame filtering
      4. 3.2.4 Routing
      5. 3.2.5 Service functions
      6. 3.2.6 Port Fencing
      7. 3.2.7 ISL Trunking
      8. 3.2.8 Diagnostics
    3. 3.3 Products and features
      1. 3.3.1 2499-384
      2. 3.3.2 2499-192
      3. 3.3.3 2109-M48
      4. 3.3.4 b-type top of rack switches
  8. Chapter 4. Fabric Operating System
    1. 4.1 Fabric Operating System overview
    2. 4.2 Fabric Operating System v6.2.0 features
      1. 4.2.1 New features
      2. 4.2.2 Feature descriptions
    3. 4.3 Fabric OS v6.3.1 and v6.4.0 updates
      1. 4.3.1 Changes in Fabric OS version 6.3.1
      2. 4.3.2 Changes in Fabric OS version 6.4.0
    4. 4.4 Firmware upgrade considerations
      1. 4.4.1 Licensing changes
      2. 4.4.2 Fabric scalability
      3. 4.4.3 FICON support
    5. 4.5 Additional important notes and guidelines
  9. Chapter 5. Management tools
    1. 5.1 Web Tools
    2. 5.2 Fabric Watch
    3. 5.3 SNMP
    4. 5.4 Data Center Fabric Manager
      1. 5.4.1 Time-saving tools
      2. 5.4.2 Exceeding service level agreements
  10. Chapter 6. Implementation
    1. 6.1 Implementation
      1. 6.1.1 Initial setup
      2. 6.1.2 The command-line interface initial setup
      3. 6.1.3 SAN768B, SAN384B, and SAN256B configuration procedure
      4. 6.1.4 Connecting to the switch
      5. 6.1.5 Setting the switch name
      6. 6.1.6 The Port Identifier format
      7. 6.1.7 Setting the date
      8. 6.1.8 Firmware update
      9. 6.1.9 SAN256B optional modem setup
    2. 6.2 SAN32B-3 implementation using EZSwitchSetup
      1. 6.2.1 Implementing EZSwitchSetup
      2. 6.2.2 Using Switch Manager to manage a switch
      3. 6.2.3 Basic troubleshooting with EZSwitchSetup
  11. Chapter 7. License administration
    1. 7.1 Licensed features
      1. 7.1.1 Ports on Demand
      2. 7.1.2 Full Fabric
      3. 7.1.3 8 Gbps
      4. 7.1.4 Inter-Chassis Link (ICL)
      5. 7.1.5 Adaptive Networking
      6. 7.1.6 Frame Based ISL Trunking
      7. 7.1.7 Fabric Watch
      8. 7.1.8 Advanced Performance Monitoring
      9. 7.1.9 Extended Fabrics
      10. 7.1.10 ISL Trunking
      11. 7.1.11 Integrated Routing
      12. 7.1.12 High Performance Extension over FCIP/FC
      13. 7.1.13 FICON Management Server
    2. 7.2 Using Web Tools to administer licenses
      1. 7.2.1 Using Web Tools to check licensed ports
      2. 7.2.2 Installed licenses
    3. 7.3 Tips on solving licensing issues
  12. Chapter 8. Web Tools
    1. 8.1 Web Tools walk-through
      1. 8.1.1 Web Tools, the EGM license, and DCFM
      2. 8.1.2 System requirements
      3. 8.1.3 Java installation on the workstation
      4. 8.1.4 Java plug-in configuration
      5. 8.1.5 Value line licenses
      6. 8.1.6 Opening Web Tools
      7. 8.1.7 Requirements for the examples in this chapter
      8. 8.1.8 Overview of the Web Tools user interface
    2. 8.2 Web Tools buttons
      1. 8.2.1 Status button
      2. 8.2.2 Temp button
      3. 8.2.3 Power button
      4. 8.2.4 Fan button
      5. 8.2.5 HA button
      6. 8.2.6 Beacon button
      7. 8.2.7 Switch Status Policy button
      8. 8.2.8 Legend button
    3. 8.3 Name Server task
    4. 8.4 Zone Admin task
    5. 8.5 Admin Domain task
      1. 8.5.1 Requirements for Admin Domains
      2. 8.5.2 Creating an Admin Domain
    6. 8.6 Port Admin task
      1. 8.6.1 Renaming a port
      2. 8.6.2 Editing the configuration
      3. 8.6.3 Enabling and disabling a port
      4. 8.6.4 Persistent enable and persistent disable options for a port
      5. 8.6.5 Enabling or disabling trunking for a specific port
      6. 8.6.6 Enabling or disabling N_Port ID virtualization (NPIV)
      7. 8.6.7 Port swap
      8. 8.6.8 F_Port Trunking
      9. 8.6.9 Re-authenticating
      10. 8.6.10 F_Port BB credit
      11. 8.6.11 QoS Enable/Disable
      12. 8.6.12 Port beaconing
      13. 8.6.13 WWN to N_Port mapping
      14. 8.6.14 Port Administration window on the SAN256B and SAN768B
      15. 8.6.15 Port Administration for the FCOE switch
      16. 8.6.16 Port Administration for the IBM System Storage SAN06B-R
    7. 8.7 Switch Admin task
      1. 8.7.1 Switch Administration window layout
      2. 8.7.2 Switch tab
      3. 8.7.3 Network tab
      4. 8.7.4 Firmware Download tab
      5. 8.7.5 SNMP tab
      6. 8.7.6 License tab
      7. 8.7.7 User tab
      8. 8.7.8 Configure tab
      9. 8.7.9 Routing tab
      10. 8.7.10 Extended Fabric tab
      11. 8.7.11 AAA Service tab
      12. 8.7.12 Trace tab
      13. 8.7.13 Security Policies tab
      14. 8.7.14 FICON CUP tab
      15. 8.7.15 Trunking tab
    8. 8.8 Telnet/SSH Client task
    9. 8.9 Fabric Watch task
      1. 8.9.1 Alarm Notification tab
      2. 8.9.2 Threshold Configuration tab
      3. 8.9.3 Configuration Report tab
      4. 8.9.4 Memory and CPU Usage monitor with Fabric Watch
      5. 8.9.5 Modifying settings for switches with one power supply
      6. 8.9.6 Email Configuration
    10. 8.10 IBM SAN ICL connectivity
      1. 8.10.1 Before you begin
      2. 8.10.2 ICL cabling
  13. Chapter 9. IBM System Storage Data Center Fabric Manager
    1. 9.1 DCFM products
      1. 9.1.1 DCFM Professional
      2. 9.1.2 DCFM Enterprise Edition
      3. 9.1.3 Enhanced Group Management
      4. 9.1.4 DCFM Enterprise scalability
      5. 9.1.5 DCFM operating system support
    2. 9.2 DCFM installation
      1. 9.2.1 Installation of DCFM Enterprise Edition on Windows platform
      2. 9.2.2 DCFM server and client
    3. 9.3 DCFM GUI orientation
      1. 9.3.1 Front panel
      2. 9.3.2 Main toolbar
      3. 9.3.3 Product list
      4. 9.3.4 Connectivity Map
      5. 9.3.5 Master Log
      6. 9.3.6 Performance Legend
      7. 9.3.7 Minimap
      8. 9.3.8 Status bar
      9. 9.3.9 Fabric tracking
      10. 9.3.10 WWN display
      11. 9.3.11 Object naming
    4. 9.4 DCFM Fabric Discovery
      1. 9.4.1 Seed switch
      2. 9.4.2 Setting up the discovery
      3. 9.4.3 DCFM Discovery Verification
    5. 9.5 DCFM reports
      1. 9.5.1 Fabric Summary Report and Port Report
      2. 9.5.2 Generating performance reports
      3. 9.5.3 Generating zoning reports
    6. 9.6 Event logs
    7. 9.7 Performance management
      1. 9.7.1 Performance measures
      2. 9.7.2 Collecting performance data
      3. 9.7.3 Real time performance data
      4. 9.7.4 Historical performance data
      5. 9.7.5 Performance thresholds
      6. 9.7.6 Connection utilization
    8. 9.8 Encryption configuration
    9. 9.9 User management
    10. 9.10 DCFM Server Management Console
      1. 9.10.1 Changing server port numbers
      2. 9.10.2 Restoring the database
      3. 9.10.3 Configuring authentication
      4. 9.10.4 Capturing technical support information
      5. 9.10.5 Gathering switch information for support
      6. 9.10.6 Viewing technical support information
      7. 9.10.7 HMC upgrade
  14. Chapter 10. Host Connectivity Manager
    1. 10.1 HCM features
      1. 10.1.1 Software features
      2. 10.1.2 Tree node pop-up menus
    2. 10.2 Getting started with HCM software
      1. 10.2.1 HCM software launch
      2. 10.2.2 Command line utility
      3. 10.2.3 HCM configuration data
      4. 10.2.4 Remembering the password
      5. 10.2.5 Skipping login
      6. 10.2.6 Changing an HCM application password
      7. 10.2.7 Changing an HCM agent password
      8. 10.2.8 Resetting a password or restoring a factory default password
      9. 10.2.9 Backing up data after an uninstall
      10. 10.2.10 Backing up HCM data using HCM
      11. 10.2.11 Restoring HCM data using HCM
      12. 10.2.12 HCM main window
      13. 10.2.13 HCM product icons
      14. 10.2.14 Discovery
      15. 10.2.15 Setting up out-of-band discovery for an adapter
      16. 10.2.16 Logging off HCM
    3. 10.3 Host configuration
      1. 10.3.1 Host security authentication
      2. 10.3.2 Configuring security authentication using the GUI
      3. 10.3.3 Configuring security authentication using the CLI
      4. 10.3.4 Buffer credits
      5. 10.3.5 Basic port configuration
      6. 10.3.6 Opening the Basic Port Configuration dialog box
      7. 10.3.7 Port logging level
      8. 10.3.8 Port speed
      9. 10.3.9 Frame data field size
      10. 10.3.10 Persistent binding
      11. 10.3.11 QoS (HBA only)
      12. 10.3.12 Path Time Out
      13. 10.3.13 Target rate limiting
      14. 10.3.14 Boot over SAN
      15. 10.3.15 Configuring Boot over SAN
      16. 10.3.16 Boot code image upload
      17. 10.3.17 Updating the boot code using the GUI
      18. 10.3.18 Virtual port configuration
      19. 10.3.19 Creating a virtual port
      20. 10.3.20 Deleting a virtual port
      21. 10.3.21 HCM logging levels
      22. 10.3.22 Advanced port configuration
      23. 10.3.23 Opening the Advanced Port Configuration dialog box
      24. 10.3.24 NPIV
      25. 10.3.25 Name configuration
      26. 10.3.26 Exporting the properties for a WWN
      27. 10.3.27 Importing the properties for a WWN
      28. 10.3.28 Importing properties in EFCM format
      29. 10.3.29 VLAN configuration
      30. 10.3.30 Adding a VLAN
      31. 10.3.31 Editing a VLAN
      32. 10.3.32 Removing a VLAN
    4. 10.4 Monitoring
      1. 10.4.1 Performance monitoring
      2. 10.4.2 Polling frequency rate
      3. 10.4.3 Resetting statistics
      4. 10.4.4 Master Log
      5. 10.4.5 Filtering event log entries
      6. 10.4.6 Application log
      7. 10.4.7 Syslog support
      8. 10.4.8 Opening the Syslog Server Configuration dialog box
      9. 10.4.9 Removing a host server
  15. Chapter 11. Virtual Fabrics
    1. 11.1 IBM/Brocade Virtual Fabric
      1. 11.1.1 Virtual Fabrics introduction
      2. 11.1.2 Logical switches and logical fabrics
    2. 11.2 What Virtual Fabrics are
      1. 11.2.1 Logical switch
      2. 11.2.2 Logical fabric
      3. 11.2.3 ISL sharing
      4. 11.2.4 Administrative Domains
      5. 11.2.5 User accounts
    3. 11.3 Configuring Virtual Fabrics
      1. 11.3.1 Changing the context to a different logical switch
      2. 11.3.2 Enabling Virtual Fabrics
      3. 11.3.3 Disabling Virtual Fabrics
      4. 11.3.4 Logical switch management
      5. 11.3.5 Modifying the base switch
      6. 11.3.6 Creating a logical switch
      7. 11.3.7 Deleting a logical switch
      8. 11.3.8 Displaying the logical switch configuration
      9. 11.3.9 Changing the fabric ID of a logical switch
      10. 11.3.10 Changing a logical switch to a base switch
      11. 11.3.11 Configuring a logical switch for XISL use
      12. 11.3.12 Creating a logical fabric using XISLs
    4. 11.4 A real life example of Virtual Fabrics
      1. 11.4.1 The scenario
      2. 11.4.2 Enabling Virtual Fabric on the switches
      3. 11.4.3 Creating logical switches
      4. 11.4.4 Assigning ports to the newly created switch
      5. 11.4.5 Creating the base switch
      6. 11.4.6 Creating a user to manage the Virtual Fabric
  16. Chapter 12. Basic zoning
    1. 12.1 Zoning in general
      1. 12.1.1 Mixed fabrics
      2. 12.1.2 Zone configurations
    2. 12.2 Zoning using DCFM
      1. 12.2.1 Administrative Domains
      2. 12.2.2 Implementing Administrative Domains
    3. 12.3 Implementing zoning
      1. 12.3.1 Managing zoning
      2. 12.3.2 Creating an alias
      3. 12.3.3 Creating a zone
      4. 12.3.4 Creating a zone configuration
      5. 12.3.5 Enabling zone configurations
      6. 12.3.6 Adding a zone to a existing zone configuration
      7. 12.3.7 Analyzing a zone configuration
    4. 12.4 Basic zoning using Web Tools
      1. 12.4.1 To start zoning with Web Tools
      2. 12.4.2 Creating an alias
      3. 12.4.3 Creating a zone
      4. 12.4.4 Using Web Tools to create a zone
      5. 12.4.5 Creating a zone configuration
      6. 12.4.6 Enabling zone configurations
      7. 12.4.7 Analyzing a zone configuration
      8. 12.4.8 Zoning and E_Ports
      9. 12.4.9 Broadcast zone
    5. 12.5 Backing up a zone configuration
      1. 12.5.1 Backing up a zone configuration to an FTP server
      2. 12.5.2 Backing up a zone configuration to a Brocade USB device
      3. 12.5.3 Downloading a zone configuration from a USB device
    6. 12.6 Zoning using CLI
      1. 12.6.1 Using CLI to create a zone
      2. 12.6.2 Using CLI to create a zone configuration
      3. 12.6.3 Backing up a zone configuration using the CLI
      4. 12.6.4 Backing up a zone configuration using a USB drive
      5. 12.6.5 Downloading a zone configuration from an FTP server
      6. 12.6.6 Downloading a zone configuration from a USB device
  17. Chapter 13. Multiple switches and fabrics
    1. 13.1 Multiple switch environments
      1. 13.1.1 Gateway links
      2. 13.1.2 Buffer credit recovery
      3. 13.1.3 ISL Trunking
      4. 13.1.4 Connecting switches over distance
      5. 13.1.5 Routing policies
    2. 13.2 Merging fabrics
      1. 13.2.1 Duplicate domain IDs
      2. 13.2.2 Zoning configuration conflicts
      3. 13.2.3 Merging fabrics example
      4. 13.2.4 Merging with a configuration cleared switch
      5. 13.2.5 Operating parameter conflicts
      6. 13.2.6 InteropMode
  18. Chapter 14. Security
    1. 14.1 User accounts overview
      1. 14.1.1 User authentication
      2. 14.1.2 Role-Based Access Control
      3. 14.1.3 Local database user accounts
    2. 14.2 Account management
      1. 14.2.1 Displaying account information
      2. 14.2.2 Creating an account
      3. 14.2.3 Modifying User and Account settings
    3. 14.3 Security protocols
      1. 14.3.1 Security protocol support
      2. 14.3.2 Secure file copy
    4. 14.4 Simple Network Management Protocol
      1. 14.4.1 SNMP and Virtual Fabrics
      2. 14.4.2 Security level
      3. 14.4.3 snmpConfig command
    5. 14.5 Secure Sockets Layer protocol
      1. 14.5.1 Browser and Java support
      2. 14.5.2 SSL configuration overview
      3. 14.5.3 Certificate authorities
    6. 14.6 Secure Shell protocol
      1. 14.6.1 SSH public key authentication
      2. 14.6.2 Configuring SSH authentication
    7. 14.7 Telnet protocol
      1. 14.7.1 Blocking Telnet
      2. 14.7.2 Unblocking Telnet
      3. 14.7.3 Listener applications
    8. 14.8 Ports and applications used by switches
      1. 14.8.1 Access defaults
      2. 14.8.2 Port configuration
    9. 14.9 Security policies
      1. 14.9.1 ACL policies overview
      2. 14.9.2 ACL policy management
      3. 14.9.3 FCS policies
      4. 14.9.4 Overview of FCS policy management
      5. 14.9.5 Creating an FCS policy
      6. 14.9.6 Modifying the order of FCS switches
      7. 14.9.7 FCS policy distribution
      8. 14.9.8 DCC policies
      9. 14.9.9 DCC policy restrictions
      10. 14.9.10 Creating a DCC policy
      11. 14.9.11 Creating a device policy
      12. 14.9.12 Deleting a device policy
      13. 14.9.13 Activating policy changes
      14. 14.9.14 SCC policies
      15. 14.9.15 Creating an SCC policy
      16. 14.9.16 Authentication policy for fabric elements
      17. 14.9.17 E_Port authentication
      18. 14.9.18 AUTH policy restrictions
      19. 14.9.19 Viewing current authentication parameter settings for a switch
      20. 14.9.20 Setting authentication protocol used by the switch to DH-CHAP
      21. 14.9.21 Re-authenticating E_Ports
      22. 14.9.22 Secret key pairs
      23. 14.9.23 Viewing a list of secret key pairs in the current switch database
      24. 14.9.24 Setting a secret key pair
      25. 14.9.25 Distributing the local ACL policies
      26. 14.9.26 IP Filter policy
      27. 14.9.27 Creating an IP Filter policy
      28. 14.9.28 Cloning an IP Filter policy
      29. 14.9.29 Saving an IP Filter policy
      30. 14.9.30 Activating an IP Filter policy
      31. 14.9.31 Deleting an IP Filter policy
      32. 14.9.32 IP Filter policy rules
      33. 14.9.33 IP Filter policy enforcement
      34. 14.9.34 Adding a rule to an IP Filter policy
      35. 14.9.35 Deleting a rule in an IP Filter policy
      36. 14.9.36 Aborting a transaction associated with IP Filter
      37. 14.9.37 IP Filter policy distributions
      38. 14.9.38 IP Filter policy restrictions
  19. Chapter 15. Adaptive Networking
    1. 15.1 Traffic Management
      1. 15.1.1 Committed rate considerations on FCIP
      2. 15.1.2 Adaptive Rate Limiting considerations
      3. 15.1.3 Trunking across multiple FCIP circuits
      4. 15.1.4 Supported packet loss and delay
      5. 15.1.5 Scalability considerations
    2. 15.2 Ingress rate limiting
      1. 15.2.1 Ingress Rate limiting with the CLI
      2. 15.2.2 Ingress Rate Limiting with Web Tools
    3. 15.3 Traffic Isolation
      1. 15.3.1 TI zone failover
      2. 15.3.2 FSPF routing rules and traffic isolation
      3. 15.3.3 TI zone misconfiguration example
      4. 15.3.4 Supported configurations
      5. 15.3.5 Virtual Fabric configuration
      6. 15.3.6 TI zones using CLI
      7. 15.3.7 Other zoning CLI commands
      8. 15.3.8 TI zones with DCFM
    4. 15.4 QoS: SID/BID traffic prioritization
      1. 15.4.1 QoS zones
      2. 15.4.2 QoS E_Ports
      3. 15.4.3 Supported configurations and limitations
      4. 15.4.4 QoS with CLI
      5. 15.4.5 Web Tools and QoS Zones
      6. 15.4.6 DCFM and QoS zones
  20. Chapter 16. Performance monitoring
    1. 16.1 Performance monitoring with Web Tools
    2. 16.2 Basic Performance Monitoring
      1. 16.2.1 Basic Performance Monitoring with Web Tools
      2. 16.2.2 Throughput examples
    3. 16.3 Advanced Performance Monitoring
      1. 16.3.1 Virtual Fabrics considerations
      2. 16.3.2 Performance Monitors
      3. 16.3.3 Displaying Performance Monitors with the CLI
      4. 16.3.4 SID/DID Performance Monitor
      5. 16.3.5 End-to-end monitoring with DCFM
      6. 16.3.6 Filter-based performance monitoring
      7. 16.3.7 ISL performance monitoring
      8. 16.3.8 Top Talker monitors
      9. 16.3.9 Top Talkers monitors in port mode
      10. 16.3.10 Top Talkers monitors in fabric mode
      11. 16.3.11 Top Talkers monitoring considerations
      12. 16.3.12 Trunk monitoring
      13. 16.3.13 Saving and restoring the monitoring configuration
    4. 16.4 SCSI commands with Web Tools
      1. 16.4.1 SCSI versus IP traffic
      2. 16.4.2 ALPA error
    5. 16.5 Bottleneck detection
      1. 16.5.1 Latency bottleneck
      2. 16.5.2 Congestion bottleneck
  21. Chapter 17. Health and troubleshooting
    1. 17.1 SAN Health
      1. 17.1.1 New features of SAN Health
      2. 17.1.2 Implementing SAN Health
    2. 17.2 Error logs
      1. 17.2.1 Capturing a trace dump
      2. 17.2.2 The supportsave command
      3. 17.2.3 DCFM support information
    3. 17.3 General troubleshooting
      1. 17.3.1 Troubleshooting device connectivity
      2. 17.3.2 Trace route
    4. 17.4 Port Fencing
      1. 17.4.1 Port Fencing using DCFM
      2. 17.4.2 Port Fencing using CLI
      3. 17.4.3 Enabling Port Fencing for E_Port class link loss
      4. 17.4.4 Testing the configuration
      5. 17.4.5 Basic troubleshooting commands
  22. Related publications
    1. IBM Redbooks publications
    2. Other resources
    3. Referenced websites
    4. Help from IBM
  23. Back cover