Signicantly Higher SAN EfciencyBROCADEPRODUCTTRAININGEducationBCSM in a NutshellStudy Guide for Exam 143-350 Revision 0308Exam Preparation Material
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 8 of 44 Table 1: Password Policy CLI Commands BASE FABRIC OS V5.
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 9 of 44 POLICY DISTRIBUTION • Each switch can be set to Accept o
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 10 of 44 DH-CHAP Fabric OS v5.3.0 uses DH-CHAP and FCAP protocols
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 11 of 44 2 MANAGEMENT TOOLS 2.1 IMPLEMENTING SAN MANAGEMENT TOO
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 12 of 44 REQUIREMENTS To view the route between two products, th
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 13 of 44 EFCM GROUP MANAGER Group Manager allows Event logs, fir
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 14 of 44 ESCM HBA MANAGEMENT TOOL With ESCM you can: • Collect
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 15 of 44 MONITORING B-SERIES SWITCHES • Use pathinfo, topologysho
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 16 of 44 FABRIC MANAGER Fabric Manager is a GUI based application
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 17 of 44 FABRIC MANAGER CHANGE MANAGEMENT Fabric Manager Change M
© 2008 Brocade Communications Systems, Inc. All Rights Reserved. 03/08Brocade, the Brocade B-weave logo, Fabric OS, File Lifecycle Manager, MyView, Se
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 18 of 44 3 REPORTING AND DOCUMENTATION 3.1 SAN DOCUMENTATION SA
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 19 of 44 3.2 TOOLS TO DOCUMENT A SAN TOOLS • EFCM Standard • EFC
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 20 of 44 4 TROUBLESHOOTING 4.1 METHODS & TOOLS FOR TROUBLES
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 21 of 44 For device sharing related issues, two commands are very
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 22 of 44 SAMPLE FABRIC MERGE ERROR MESSAGES Domain ID Conflict er
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 23 of 44 COLLECTING INFORMATION FOR TROUBLESHOOTING No Does the t
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 24 of 44 The fcping command can also be used to identify a margin
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 25 of 44 4.2 IDENTIFYING INFORMATION REQUIRED FOR PROBLEM ESCALA
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 26 of 44 5 SAN MONITORING 5.1 IDENTIFYING TOOLS TO MONITOR A SA
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 27 of 44 5.2 HOW TO MONITOR AND MANAGE SHARED DEVICES BETWEEN ED
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 1 of 44 Welcome to the BCSM in a Nutshell 2008 edition. Obj
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 28 of 44 VERIFYING DEVICE CONNECTIVITY Use the cfgshow command on
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 29 of 44 5.3 HOW TO MONITOR AND MANAGE DEVICES EFCM AND ZONING I
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 30 of 44 ZONING IN A B-SERIES FABRIC Some best practices: • Moni
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 31 of 44
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 32 of 44 6 SAN CONFIGURATION 6.1 MANAGING FICON FABRICS Cascade
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 33 of 44 CASCADED DIRECTOR REQUIREMENTS FOR B-SERIESRequires Secu
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 34 of 44 6.2 PERFORMING ROUTINE MAINTENANCE MEASURING LATENCY EF
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 35 of 44 ISL AND TRUNK MAINTENANCE In order to have fabrics merge
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 36 of 44 6.3 MAINTAINING SAN EXTENSION SOLUTIONS VALIDATE THE IP
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 37 of 44 BB CREDITS Speed Credits/km Credits/50 km Credits/100
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 2 of 44 TABLE OF CONTENTS List of Tables ...
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 38 of 44 6.4 MANAGING ACCESS GATEWAY SOLUTIONS Figure 8: Access
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 39 of 44 ACCESS GATEWAY PORT MAPPING A Brocade Access Gateway use
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 40 of 44 The Access Gateway uses NPIV to assign the 24-bit FC ad
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 41 of 44 7 TAKING THE TEST Once the test begins, you will first
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 42 of 44 After the Introduction Screen, once you click on Next, y
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 43 of 44 Once you agree to the terms, then the timed test will be
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 44 of 44 When you complete the test, you will see a summary of yo
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 3 of 44 LIST OF TABLES Table 1: Password Policy CLI Commands...
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 4 of 44 LIST OF FIGURES Figure 1: EFCM Routing...
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 5 of 44 1 SECURITY 1.1 MANAGING SAN SECURITY PROTECTING YOUR MA
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 6 of 44 ADDITIONAL BEST PRACTICES • Implement the Track Changes
BCSM IN A NUTSHELL 2008 © 2008 Brocade Communications Systems, Incorporated. Page 7 of 44 ACCOUNT LOCKOUT POLICY • Disables a user account when th
Comments to this Manuals