SANnavMP-231a-RN-v4
SANnavMP-231a-RN-v4
SANnavMP-231a-RN-v4
1a
SANnav Management Portal v2.3.1a Release Notes
Version 4
Broadcom SANnavMP-231a-RN-v4
October 17, 2024
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
Copyright © 2024 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
For more information, go to www.broadcom.com. All trademarks, trade names, service marks, and logos referenced
herein belong to their respective companies.
Broadcom reserves the right to make changes without further notice to any products or data herein to improve reliability,
function, or design. Information furnished by Broadcom is believed to be accurate and reliable. However, Broadcom does
not assume any liability arising out of the application or use of this information, nor the application or use of any product or
circuit described herein, neither does it convey any license under its patent rights nor the rights of others.
The product described by this document may contain open source software covered by the GNU General Public License
or other open source license agreements. To find out which open source software is included in Brocade products or to
view the licensing terms applicable to the open source software, please download the open source attribution disclosure
document in the Broadcom Support Portal. If you do not have a support account or are unable to log in, please contact
your support provider for this information.
Broadcom SANnavMP-231a-RN-v4
2
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
Table of Contents
Broadcom SANnavMP-231a-RN-v4
3
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
Revision History................................................................................................................................ 66
Broadcom SANnavMP-231a-RN-v4
4
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
Chapter 1: Preface
Online Telephone
For nonurgent issues, the preferred method is to log on to the For Severity 1 (critical) issues, call Brocade Fibre Channel
Support portal at support.broadcom.com. You must initially Networking Global Support at one of the phone numbers listed
register to gain access to the Support portal. Once registered, log at www.broadcom.com/support/fibre-channel-
on and then select Brocade Products. You can now navigate to networking/contact-brocade-support
the following sites:
Case Management
Software Downloads
Licensing
SAN Reports
Brocade Support Link
Training & Education
If you purchased Brocade product support from a Broadcom OEM/solution provider, contact your OEM/solution provider
for all your product support needs.
OEM/solution providers are trained and certified by Broadcom to support Brocade products.
Broadcom provides backline support for issues that cannot be resolved by the OEM/solution provider.
Brocade Supplemental Support augments your existing OEM support contract, providing direct access to Brocade
expertise. For more information on this option, contact Broadcom or your OEM.
For questions regarding service levels and response times, contact your OEM/solution provider.
To expedite your call, have the following information immediately available:
General Information
– Technical support contract number, if applicable
– Switch model
– Switch operating system version and SANnav version
– Error numbers and messages received
– SANnav Support Data Capture (SSDC) and Switch supportSave command output and associated files
For dual-CP platforms, the supportSave command gathers information from both CPs and any AP blades installed
in the chassis:
– Detailed description of the problem, including the SANnav and switch or fabric behavior immediately following the
problem and any specific questions
– Description of any troubleshooting steps already performed and the results
– Serial console and telnet session logs
– Syslog message logs
Broadcom SANnavMP-231a-RN-v4
5
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
FT00X0054E9
– If you cannot use the wwn command because the switch is inoperable, you can get the primary WWN from the
same place as the serial number.
Broadcom SANnavMP-231a-RN-v4
6
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
3. The list of documents will be listed under Documentation tab in the search result screen as shown below:
ATTENTION Be sure to periodically check for newer versions updates of SANnav Release Notes and User
Guide documents.
Broadcom SANnavMP-231a-RN-v4
7
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
Broadcom SANnavMP-231a-RN-v4
8
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
Support and qualification for RHEL 8.8 and 9.2 for bare metal and Virtual Machine (VM) deployments, including
Disaster Recovery (DR)
Support and qualification of Rocky 8.9 for OVA deployments, including DR
NOTE For OVA deployments, it is mandatory to upgrade the SANnav server to Rocky Linux to 8.9 before
attempting the upgrade to SANnav v2.3.1a.
Resolution of other important defect fixes are listed in Chapter 9 of this document.
Broadcom SANnavMP-231a-RN-v4
10
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
NOTE Extraction of the SANnav OVA image using vCenter 7.x should work but has not been tested or
qualified with SANnav v2.3.x.
OVA is currently available only for SANnav Management Portal and not for SANnav Global View.
Upgrade and migration from SANnav v2.3.0x to SANnav v2.3.1x is to be performed inline, since the OS kernel is the
same (8.x based).
NOTE For upgrade from SANnav v2.3.0 to SANnav v2.3.1a, it is recommended to upgrade the server OS to
Rocky Linux 8.9 prior to performing the inline OVA upgrade. Refer to Section 4.3 Software Upgrade.
Upgrade and migration from SANnav v2.2.2x to SANnav v2.3.1x cannot be performed inline (disruptive OS change,
CentOS to Rocky).
Instead of automatically starting the installation on the first login, the script install-sannav.sh must be manually
run after successfully setting up the VM. This is the same as SANnav v2.3.0.
By default, firewalld is disabled in the OVA-deployed VM. This is the same as SANnav v2.3.0.
A SANnav v2.3.1x OVA deployment will force a change of the OS root password at the first login. A new root
password must be entered by the user deploying SANnav v2.3.1x OVA.
While deploying SANnav 2.3.1x OVA, if a valid DNS IP address is not available, use the following IP address:
127.0.0.1 (IPv4) or ::1 (IPv6).
ATTENTION Make sure to strictly follow the SANnav MP Installation and Upgrade Guide before attempting the
upgrade and migration from SANnav Management Portal v2.2.2x OVA to SANnav MP v2.3.1x
OVA.
Broadcom SANnavMP-231a-RN-v4
11
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
While Brocade ensures that Rocky Linux CVEs on the OS are addressed at the release of SANnav v2.3.1x, it is possible
that some specific Rocky Linux 8.8/8.9 CVEs are only found and disclosed after SANnav v2.3.1x has been released and
before a patch on SANnav v2.3.1x is issued.
NOTE In the event this occurs, it is the end user’s responsibility to update Rocky Linux with OS security
patches on the SANnav server and the OS to address new CVEs. If that is not possible due to
internal constraints such as internet access and security, contact Brocade Support.
NOTE When installing SANnav 2.3.1a on an untested or unqualified OS version, (RHEL 8.2, 8.3, 8.4, 8.5,
8.6, 8.7, 8.9, 8.10, 9.3, 9.4 for VM/BM) or (Rocky 8.6, 8.8, 8.10 for OVA), the installation script
displays a warning message indicating that the SANnav Management Portal installation will proceed
on an untested and unqualified OS version. Explicit end user acceptance is required for SANnav
Management Portal installation to proceed. While it may be possible to successfully install SANnav
on these OS versions, if issues occur while using SANnav it may be necessary to migrate to a fully
qualified and tested OS version and reproduce the issues to receive support.
The following table shows the various OS types and versions and the associated support in SANnav v2.3.1a cells marked
with (Blocked) indicate that the SANnav v2.3.1a installation/upgrade will not proceed and exit, while cells marked (Not
Blocked) indicate the SANnav v2.3.1a installation/upgrade will proceed with explicit user acceptance that SANnav will run
on an untested and unqualified OS Release. DR support is also shown in the table for completeness.
VM or BM (Bare
OS Type and Version OVA DR Support
Metal)
CentOS 7.9, RHEL 7.9, 8.0, 8.1, 9.0, 9.1 No (Blocked) No No (Blocked)
RHEL 8.2, 8.3, 8.4, 8.5, 8.6, 8.7, 8.9, 8.10, 9.3, 9.4 No (Not Blocked) No No (Not Blocked)
Rocky Linux 8.6, 8.8, 8.10 No (Blocked) No (Not Blocked) No (Not Blocked)
For both Rocky and RHEL OS, the following must be set in the OS on which SANnav Management Portal server is
installed:
Language = English
Locale = US
Other Languages and Locales are not supported.
Broadcom SANnavMP-231a-RN-v4
12
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
Email notifications on the DR standby server can now be configured, updated, and disabled after completion of the
DR setup.
– Execute the setup-dr-email-notifications.sh script after DR on the standby server setup to update
email notification settings.
ATTENTION The SANnav Management Portal Installation and Upgrade Guide, 2.3.x document provides step-
by-step procedures in eight different use cases (VM/BM or OVA, revertive failover or not,
planned, or unplanned combinations) to perform DR functions. Make sure to refer to this section
of the document before proceeding with setting up DR in SANnav MP.
Starting with SANnav v2.3.1x, a SANnav Application Event is raised 30 days before the SANnav SSL certificate expires.
After that, and within the 30-day window, an event is sent daily asking the user to replace the current SSL certificates with
new ones.
The following SANnav Application Events are raised for SANnav certificates expiration:
SSMP-SMON-1005 – Warning – 30 to 6 days before expiration.
SSMP-SMON-1006 – Major – 5 days to 3 days before expiration.
SSMP-SMON-1007 – Critical – 2 days before expiration.
With SANnav v2.3.1, the SAN administrator user can generate and replace the current (valid or expired) SSL certificates
with a set of new self-signed certificates by running the script $INST_HOME/bin/generate-and-replace-self-
signed-certificates.sh
NOTE It is recommended to use Certificate Authority (CA) signed certificates instead of self-signed
certificates, and to install them on the SANnav server for the highest security protection.
ATTENTION SANnav SSL certificate expiration will impact and interrupt features such as Streaming and
Secure Syslog.
Broadcom SANnavMP-231a-RN-v4
13
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
With SANnav v2.3.0, all files under the SANnav installation directory had Linux permissions 775 (rwx-rwx-r-x).
With SANnav v2.3.1x, all files and folders under the SANnav installation directory now belong to UID/GID sannavmgr
(UID/GID 56900) with file permissions set to 770 (rwx-rwx----) as shown in one folder example below:
drwxrwx--- 2 sannavmgr sannavmgr 4096 Oct 16 19:18 templates
With SANnav v2.3.1x, when an administrator performs a graceful reboot of the OS on the machine where SANnav server
is running, the SANnav application will be gracefully stopped and restarted properly after the OS reboots successfully.
SANnav needs a valid Time Zone set in the operating system in order to operate properly. When starting SANnav v2.3.1x,
if the time zone settings are deleted accidentally, the SANnav server will not start.
An error message will be shown asking the administrator to set the time zone using the command timedatectl set-
timzone <TIME_ZONE>
3.6.5 FIPS-140-Enabled OS
SANnav MP v2.3.1x is supported on FIPS-140-enabled RHEL (VM or bare metal) or Rocky (OVA). Refer to the RHEL or
Rocky-specific OS version for the exact commands to enable FIPS mode.
NOTE SANnav itself is not FIPS-140 certified. SANnav v2.3.1x may be installed and run on an officially
supported RHEL version with FIPS-140 enabled.
On bare metal and VM deployments, FIPS-140 mode may be enabled prior to installing SANnav.
On OVA deployment, FIPS-140 mode must be enabled post installation.
It is possible to enable FIPS after running SANnav in non-FIPS-140-enabled OS by stopping the SANnav server,
enabling FIPS-140 mode at the OS level, then starting the SANnav server again.
ATTENTION Customers requiring SE Linux in Enforcing mode should deploy SANnav MP in OVA
environment.
Broadcom SANnavMP-231a-RN-v4
14
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
Up to SANnav v2.3.0, it is possible to bulk select multiple chassis and request that SANnav changes the password for the
FOS admin user on all user-selected chassis to the user-provided password.
With SANnav v2.3.1x, this functionality has been extended to support the same functionality for the FOS maintenance
user.
NOTE For security reasons, changing the FOS default maintenance password the first time on a factory-
shipped chassis is not allowed from SANnav. A message will be shown asking the user to first
change the switch default maintenance account in FOS CLI before changing it with SANnav.
With SANnav v2.3.1x, it is now possible to select a single vCenter-discovered instance in SANnav and change the user
name and/or the password for SANnav to subsequently login to that vCenter instance using the new credentials. Note that
this will trigger rediscovery of the vCenter instance in SANnav. A bulk change is not allowed.
Prior to SANnav v2.3.x, only the root user could install and manage the SANnav server. Users with sudo privileges
could not install, upgrade, run, or manage the SANnav server.
With SANnav v2.3.x, users with sudo privileges can now install and manage the SANnav server. This is in addition to
the root user.
Users with sudo privileges can install and manage the SANnav server by prefixing the script execution with sudo:
sudo ./install-sannav.sh.
After installing SANnav v2.3.x, additional sudo users may be added to manage SANnav by executing the script add-
user-to-sannavmgr-group.sh. This script can be executed by the sudo user.
NOTE The user to be added must have sudo privileges already. This script simply adds that user to the list
of users that can manage and run SANnav.
With SANnav v2.3.x, docker containers will run as a new user sannavmgr with UID/GID 56900. This new user does
not require sudo privileges.
For security reasons, the sannavmgr user cannot be used for remote SSH login to the SANnav server.
During SANnav v2.3.x installation, upgrade, or migration, the sannavmgr user with UID/GID 56900 will be created.
Make sure it is available prior to starting the first-time installation of SANnav v2.3.1.
ATTENTION UIDs 56900 is not configurable in SANnav v2.3.x. If UID and GID 56900 is occupied by another
user on the SANnav host, the installation or upgrade will fail.
Broadcom SANnavMP-231a-RN-v4
15
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
UID 1000 was required in prior SANnav releases, and is still required for SANnav v2.3.x to receive streams from FOS.
SANnav will create UID/GID 1000 with the sannavstreaming user name/group name. If UID/GID are occupied by
another user name and group name, then whatever user name/group name is associated with UID/GID 1000 will be
used.
The SANnav server needs ports lower than 1024 to run some of its services.
– Due to this, the Linux ip_unprivileged_port_start parameter is set to 0 to allow sannavmgr to run services on
ports lower than 1024.
With SANnav v2.3.x, it is now possible to change the SANnav password after installation.
The SANnav Server Security password is used to encrypt the SSL private key and to secure Kafka Keystore and Kafka
truststore.
Prior to SANnav v2.3.x, this SANnav Server Security password cannot be changed after SANnav installation or upgrade.
With SANnav v2.3.x, this password can be changed by an authorized and privileged user after installation or upgrade
completes. Invoke the SANnav console script manage-sannav-configurations.sh.
This script has been renamed to manage-sannav-configuration.sh in SANnav v2.3.x, from sannav-
management-consol.sh in previous releases.
With SANnav v2.3.x, it is now possible to fetch SANnav Groups names (Authentication Groups) even if they are
defined in a nested fashion. This was not possible with SANnav releases prior to SANnav v2.3.x.
To fetch the complete hierarchy, the user can import the nested hierarchy from the topmost outer group.
SANnav v2.3.x now supports SAML 2.0 integration with various Identity Providers (IdP). SANnav v2.3.x should work
seamlessly with any IdP complying with SAML 2.0 REST specifications.
SANnav v2.3.x has been specifically tested and validated with the following SAML Identity Providers:
Okta
Microsoft Azure (SANnav MP and GV are now available in the Azure Gallery)
Microsoft ADFS
Keycloak
Since FOS v8.2.x, there is validation/authentication of the host name (FQDN or IP address – IPv4 or IPv6) with HTTPS
certificates on FOS. SANnav v2.3.x secure syslog reception will ensure the following occur:
Third-party or self-signed HTTPS certificates are used when registering the following:
– FQDN
– IPv4 or IPv6 addresses
Broadcom SANnavMP-231a-RN-v4
16
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
For secure syslog to work properly with custom (third-party signed) certificates, a FQDN must be configured on the
SANnav host server before SANnav installation.
– If the FQDN has not been configured on the SANnav server, then SANnav falls back to using the IP address.
After upgrade and migration, a previously registered secure syslog with an IPv4 or IPv6 address will be replaced with
the SANnav FQDN if an FQDN was defined for the SANnav host.
If a switch (SwitchA) is discovered in a SANnav server (ServerA) and if an attempt is made to discover SwitchA in
another SANnav server (Server B), then the syslog HTTPS certificate will be automatically imported in ServerB, and
secure syslog will no longer be functional in ServerA.
When an external Authentication (LDAP, RADIUS, SAML) is used, the user accounts are automatically created upon
successful login for the first time in SANnav. This applies to user names only; passwords are not stored in SANnav for
external users.
Prior to SANnav v2.3.1x, email addresses could not be added to these accounts. This prevented external users from
receiving event notifications via email.
SANnav 2.3.1x now enables the Tags, Description, Email, and Phone Number fields to be configured and used to forward
event notifications and reports by email to those external users.
In addition, any external user may configure their own personal information, including email, in the form found at User
Preferences > Personal Info UI.
When a user is deleted from the SANnav database, the Filters that were associated with that user will be associated with
the default System user.
Any other user can then save these System filters using Save As… to retain them or delete them if they are no longer
needed.
Prior to SANnav v2.3.1x, SANnav events cannot be suppressed using an Event Action Policy. This may cause unwanted
events to be displayed when too many such SANnav events are triggered. Most of the time, these messages should be
suppressed.
In the absence of the suppress action, SANnav 2.3.1x provides an out-of-the-box default filter that excludes all
acknowledged events. The default filter is called Exclude Unacknowledged Events and can be seen under the Filters
view.
Users can now create a new Event Action Policy (EAP) to acknowledge unwanted SANnav events by using this new
default Exclude Unacknowledged Events filter when creating the EAP.
Under the SANnav > Fault Management menu tab, a new entry called SANnav Events has been added. This view
provides a reference table with Message ID, Severity, Feature, and Event Summary fields.
The intent of this new reference table is to help users to easily search and identify the correct Message IDs to be used
when creating and updating Event filters and Event Action Policies.
Broadcom SANnavMP-231a-RN-v4
17
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
With FOS, certain traps do not contain the key fields Severity and Description. They are left empty in the FOS MIB
definition. These traps are as follows:
connUnitPortStatusChange
swStateChangeTrap
swPortMoveTrap
fruStatusChanged
fruHistoryTrap
swFabricSegmentTrap
swDeviceStatusTrap
swZoneConfigChangeTrap
cpStatusChanged
swFault
When SANnav receives these kinds of traps, it will customize the Severity and the Description attributes before displaying
them in the SANnav Events list view. However, when using the SNMP Forwarding feature of SANnav to forward such
traps to an external SNMP collector system, they will be sent as is (raw).
In SANnav v2.3.1x, the Description customization prepends the text SANnav custom description: at the beginning
of the description field to indicate that these have been customized by SANnav.
In addition, an information message (i) has been added when creating a new Forwarding Filter next to the Description
field to clarify that the user should use the OID field instead of description for these types of traps.
This information message appears when user creates a Forwarding Filter, and add a Forwarding Rules where the
Category is set to Switch Event and the Event Column is set to Description. In this case the (i) message will appear as
follows:
Prior to SANnav v2.3.1x, the logic for filters when multiple Category values are selected always resulted in zero results.
For example, if a user created a filter with two different Categories and two different Event Columns for the filter, the filter
would yield no results prior to SANnav v2.3.1x. This is because prior to SANnav v2.3.1x, rules created with multiple
Categories resulted in zero records fetched as per SANnav logic.
SANnav v2.3.1x uses a new logic to group by Categories first and then group by the Event Columns and uses an OR
operation in between to yield the desired/expected results.
Broadcom SANnavMP-231a-RN-v4
18
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
In the Event Action Policy filters, a new message has been added to explain the new behavior of the EAP filter with
regards to Exclude behavior as follows:
Include and exclude rules are applied per category. All events that fulfill the
criteria defined by Include rules will be selected first, then events fulfilling
the criteria defined by the Exclude rules will be removed from that Include rule.
The All option for Category is deprecated as its use may lead to unexpected results
in some situations. Refer to the SANnav Management Portal User Guide for details.
Since raw traps are used for forwarding, SANnav versions prior to SANnav v2.3.1x default to Info severity if the SNMP
trap sent by FOS does not have a severity associated with it. This behavior results in traps not being forwarded if a filter is
used based on custom severity.
SANnav v2.3.1x enhances the SNMP trap forwarding to take the custom severity into account while applying forwarding
filters.
The IBM Call Home Center in SANnav 2.3.0x has been enhanced to add the following customer details:
First Name
Last Name
Phone Number
Alternate Phone Number
Email
SANnav server Location
In SANnav v2.3.1x the fields First Name and Last name above have been enhanced to support the following special
characters .\_-!@#$%^() and the white space “ “ character.
3.7.4.1.2 Test Call Home to Include all Three Chassis Serial Numbers
In SANnav v2.3.1x, the IBM Test Call Home email has been modified to include all three Chassis Serial Numbers in the
body of the email, so it is now the same as the production Call Home email:
Factory Serial Number
Supplier Serial Number
Chassis Serial Number (this field has also been added the reproduction email)
Broadcom SANnavMP-231a-RN-v4
19
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
Starting with SANnav v2.3.1x onwards, Dell SRS will no longer be supported. It is replaced by a new Dell SCG software.
SRS will be renamed to SCG in the Dell Technologies Call Home details page in the SANnav UI and in associated
SANnav application events.
When upgrading and migrating from prior versions to SANnav v2.3.1x, the SRS gateway details previously configured
(including the chassis that were associated with the SRS center) will be preserved and associated with a new SCG entry
instead. If modifications need to be made after upgrade and migration, they may be done form the Dell SCG details page.
ATTENTION SANnav v2.3.1x has been tested and validated with SCG version 5.20.00.10. Other releases
have not been tested with SANnav v2.3.1x and therefore are not supported by SANnav v2.3.1x.
In addition to migrating from Dell SRS to Dell SCG, SANnav v2.3.1 adds a keep alive support for Dell Technologies SCG
Call Home Center.
The Keep Alive RESTful services from SCG allow the SANnav management application to ping SCG every 15 minutes
using secure RESTful services. SCG creates an alarm if the Keep Alive update is not updated within the threshold period
This feature is useful for monitoring functioning of the SCG Call Home Center.
NetApp’s automation case creation tool relies on the Chassis Factory Serial Number in the subject line to check for valid
entitlement. Up to SANnav v2.3.0, the title of the email for NetApp Call Home Center included the WWN Factory Serial
Number instead.
SANnav v2.3.1x now includes the Chassis Factory Serial Number in the email subject line for the NetApp Call Home
Center. Other fields in the subject are untouched.
In addition to updating the subject line, the following Serial Number is also added to the body of the NetApp Call Home
email:
Chassis Serial Number
NOTE The Factory Serial Number and Supplier Serial Number were already in the email.
3.7.4.4 License Serial Number in Call Home Email (Brocade and NetApp only)
The SANnav License Serial Number will be included in the Call Home email for Brocade and NetApp Call Home Centers.
A new entry in the body of the email will be added under the Management Server Information section of the email follows:
Management Server Information
– Server Name = sannav-portal-v231
– Server IP = <IP Address>
– Server Version = 2.3.1 build <xyz>
– SANnav Active License Serial Number : <Serial Number>
A new column has been added in each Call Home Center list page called Last Notification, which will indicate when the
last notification was sent from SANnav to the Call Home Center.
The intent of this new column is to help customers determine if the Call Home Center is working properly.
Broadcom SANnavMP-231a-RN-v4
20
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
3.7.5 Discovery
ATTENTION
FOS v9.2.1 has introduced a new authentication mechanism for machine-to-machine interfaces
using an OAuth protocol Federated Identify Provider (Azure). SANnav v2.3.1x does not use this
method of authentication and continues to use a traditional user name and password to discover
fabrics.
Fabric Discovery with RSA-based FOS user names and passwords are not supported in SANnav.
Specifying an RSA-based user name and password for the seed switch in the Fabric Discovery
dialog will result in SANnav discovery failing with the following message:
seed switch authentication failed.
In the SANnav > SAN Monitoring > Fabric Discovery list page, which shows the list of Discovered Fabrics, clicking on
the Fabric name will show the details of the Fabric with a table showing the list of Logical Switches in this Fabric. In this
list, two new columns are added in SANnav v2.3.1x:
Auth Protocol value (e.g. HMAC_SHA512)
Priv Protocol value (e.g. CFB_AES256)
Prior to SANnav 2.3.1x, during Fabric discovery, SANnav checks if the SNMP account to be used by SANnav exists on
the switch.
If the SNMP user does not exist on the switch, SANnav adds it to the switch using SANnav default predefined credentials,
which are not visible to the user.
If the SNMP user already exists on the switch, SANnav does not overwrite the existing configuration using its default
predefined credentials on the switch if the SNMP credentials do not match. Because of this mismatch all of the SNMP
communication fails.
To resolve this issue, SANnav v2.3.1x will first detect if there is an SNMP credentials mismatch. If a mismatch is found
between the SANnav predefined configuration and the switch, SANnav will overwrite the SNMP configuration on the
switch if the SNMP Manual configuration is not selected and a firmware download is not in progress on that switch.
In some cases, the SNMP communication may fail due to the SNMP access control and security level security settings on
the switch. To detect these problems, SANnav will check the SNMP access control and security level when the FOS
version on the switch is equal to or higher than 8.2.1b, since FOS does not support this for older versions.
Prior to FOS v9.2.1, FOS allowed SANnav to discover a switch no matter what the SANnav version is. There was no
version restriction from FOS to allow SANnav to discover a given switch.
Starting with FOS v9.2.1 and higher, FOS will only allow discovery by specific SANnav versions. Attempts to discover the
switch with a non-supported SANnav version will be denied by FOS v9.2.1 and later.
For example, FOS v9.2.1 can only be discovered by SANnav v2.3.1x or higher. Attempting to discover a FOS v9.2.1
switch with SANnav v2.3.0 or v2.2.2xa will be rejected by FOS v9.2.1. Refer to the FOS Administration Guide for more
information.
3.7.5.4 More Prominent Message When Deleting a Logical Fabric from SANnav
When deleting a Logical Fabric of any type from SANnav 2.3.1x, the user will be shown a more prominent message with a
red triangle and an explanation of the side effects of deleting the Logical Fabric from SANnav.
Broadcom SANnavMP-231a-RN-v4
21
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
With SANnav v2.3.0x and SANnav v2.3.1x there is a known issue if a user checks the “SNMP Manual Configuration”
checkbox during the first time discovery of the fabric or after discovery of the fabric.
The issue is that once the fabric is successfully discovered, if the user goes back to the Fabric Discovery dialog, the
“SNMP Manual Configuration” checkbox shows as “unchecked” leading the user to believe the Fabric was discovered
using SANnav “automatic” SNMP credentials, which is not the case.
3.7.6 Inventory
This feature was introduced in SANnav v2.3.0 to define policies to map device ports (host ports and storage ports) to
enclosures (hosts and storage) in a stateless and idempotent manner (can be run multiple times and at any time). The
policy contains rules to determine this mapping at runtime.
In the menu SANnav > SAN Monitoring > Inventory Settings, a tab called Host and Storage Naming Policy was
introduced in SANnav v2.3.0 to control and manage the device ports to enclosure mapping formation.
In this tab there are four main items:
1. SANnav Automatic Host Enclosure
2. Automatic Storage Enclosure
– These two items determine whether the SANnav automatic device port to enclosure mapping formation should be
enabled or not. By default, Host Auto Enclosure is enabled and Auto Storage Enclosure is disabled.
3. Manual Host Naming Policy
4. Manual Storage Naming Policy
– These two items allow to control how SANnav should determine the mapping between the device ports and their
associated container enclosures using specific naming components, such as zone alias, Node Symbolic Name,
and Port Symbolic Name, and regular expressions (regex grammar) to pick only certain characters from the value
of the component.
– In SANnav v2.3.1x, under each item Manual Host Naming Policy and Manual Storage Naming Policy, a new
option menu called Case Conversion with values None, Uppercase, Lowercase is added to control the case of the
formed enclosure name.
Prior to SANnav v2.3.1x, when all device ports are removed after performing an un-map from the manual enclosures
using a REST call, the empty enclosures were not deleted. When this same operation is performed from the SANnav UI,
the enclosures are deleted.
With SANnav v2.3.1x, after either map or un-map operation through REST URL, empty enclosures will be deleted so that
REST and UI operations are consistent in behavior.
When a device port associated with a manual enclosure goes offline and either tracking is disabled or changes are
accepted, releases prior to SANnav v2.3.1x will remove the association between the device port and the manually formed
enclosure. The user must manually re-map the device port to the manual enclosure again when the device port comes
back online.
SANnav v2.3.1x stores the mapping between the device port and the manual enclosure in the offline device ports view
when the device port goes offline, regardless of whether tracking changes is on or off. When the device port returns
Broadcom SANnavMP-231a-RN-v4
22
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
online, SANnav v2.3.1x will remove the corresponding offline device port mapping entry, and the device port is
automatically mapped to the manual enclosure present in the offline device port mapping.
This generic enhancement addresses all use cases regardless of device port connectivity to either a Native Switch or an
AG switch.
NOTE If a given device port(s) went offline before upgrade and migration to SANnav v2.3.1x and later came
back online after the upgrade and migration to 2.3.1x was done, then those ports must be manually
re-mapped after upgrade and migration to SANnav v2.3.1x.
3.7.7 Zoning
SANnav v2.3.0 offered several enhancements and new features related to effectively managing Zoning. These features
may be used whether automation is used to manage Zoning in customer environment or not.
SANnav v2.3.0 Zoning provides the following key features to manage SAN Zoning effectively:
Manage up to five Zone DB snapshots of the entire Zone Database of a Fabric in SANnav.
Provide new option to create I-* or *-T Zoning Policy with multiple Principals, as opposed to one peer zone per
principal as is the case up to SANnav v2.2.2.
Enhance Policy-Based Zoning to provide the option to only save to Defined Zone Config (no Activation).
Provide new Zoning System Policy.
Display affected Zone tree entities when deleting Zones or Zone Aliases.
SANnav v2.3.1x adds more features and enhancements to the existing Zoning introduced in SANnav v2.3.0 with the
enhancements listed in the next subsections.
There are two enhancements implemented for Zone Database snapshots in SANnav v2.3.1x.
The first enhancement increases the limit of the number of snapshots for a given Fabric from 5 to 20 in SANnav v2.3.1x
with the same behavior. The oldest snapshot is overwritten when the limit is reached.
The second enhancement is a behavior change from SANnav v2.3.0 when restoring a zone Database snapshot in
SANnav v2.3.1x as explained below:
In SANnav 2.3.0, restoring a snapshot with an effective configuration involves the following two steps:
1. Disable the effective zone configuration in the fabric.
2. Submit the snapshot content to replace the zone database and activate the zone configuration from the
snapshot.
This approach could result in momentary traffic disruption due to step 1, as the default zone policies can come into effect
between steps 1 and 2.
With SANnav v2.3.1x, the Fabric Zone DB snapshot restore operation with the activate option checked will not disable the
fabric’s effective zone configuration.
CAUTION
Take a snapshot of the Fabric Zoning Database when the Effective and Defined zone
configurations are identical, that is when the Defined Zone Configuration is in the Defined (Copy)
state. If the Defined configuration is not the same as the Effective configuration, that is in Defined
(Modified) state, then care must be taken when restoring this snapshot in the future. The Defined
configuration is always used to restore the Effective configuration in the Fabric no matter its state,
Defined (Copy) or, Defined (Modified).
Broadcom SANnavMP-231a-RN-v4
23
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
Users are not allowed to edit a Fabric Zoning Database snapshot when restoring the Fabric
Zoning Database from an existing snapshot. Restoring the Fabric Zoning Database from a user
modified snapshot content (JSON backup file) is not supported and may void support from
Broadcom.
When decommissioning large arrays and cleaning up the zone databases for multiple Fabrics, there is a need to be able
to delete multiple Zone Configurations at one time. This has been added in SANnav v2.3.1x.
This operation is only supported from the Zone Configuration view, not the Zone Inventory view, and is only supported
when the seed switch is running FOS version 9.0 or higher.
New Zoning preferences were introduced in SANnav v2.3.0 which allowed users to define system-wide behavior and
choices for managing Fabric Zoning with SANnav. The following five new items are available in SANnav v2.3.0:
Allow Mixed Zones creation/edit/deletion
Allow for preferred default zone type on creation (Standard or Peer)
Allow for preferred Zone Policy default creation Type (I-T, I-*, *-T)
Zone naming scheme
Zone Alias naming scheme
With SANnav v2.3.1x for both the zone naming policy and the zone alias naming schemes, a new Case Conversion
option menu called Case Conversion with the values None, Uppercase, Lowercase is added to control the case of the
formed zone alias and/or zone names.
Importing zone aliases from a CSV file involves creating new zone aliases and modifying existing zone aliases. The
workflow up to SANnav v2.3.0 may lead to unintended behavior at times, as conflicts may occur when importing zone
aliases that already exist in the fabric zone database.
To resolve this side effect, the import zone aliases workflow has been changed in SANnav 2.3.1x as follows:
Allow importing zone aliases that do not exist in the live fabric
Show conflicting zone aliases and skip importing them, and proceed with importing other aliases from the CSV file
When conflicts are detected, a new UI will show the conflicts to the user when importing the CSV file. SANnav will not
attempt to merge or resolve conflicts automatically. Instead, the user will have to decide to either skip the conflicts and
resolve them through either changing the zone aliases in the Fabric zone database using zone alias operations in
SANnav if the zone aliases menu if CSV file is correct, or to modify the zone aliases in the CSV file and re-import it again
if the zone aliases in fabric zone database are correct.
3.7.7.4.1 Import Aliases into SANnav That Were Exported from Brocade Network Advisor (BNA)
When importing the aliases that are exported from BNA, the import will fail with the following message in SANnav v2.3.1x:
Importing zone aliases failed. Invalid file header. The header should match
"Member WWN / D,P", "Zone Alias", "Tags", "Description"
To import aliases exported from BNA, the file exported from BNA must be modified to include the following header (first
row in the CSV file exported from BNA). Then proceed with importing the file into SANnav v2.3.1x:
"Member WWN / D,P", "Zone Alias", "Tags", "Description"
Broadcom SANnavMP-231a-RN-v4
24
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
This is a minor usability enhancement where, in environments with large zone sets, it is difficult to read the details of a
Zone when using the Show Details for a Zone.
In SANnav v2.3.1x, the UI to Show Details of a Zone has now been changed to only show the zones selected by the user.
In SANnav v2.3.0, all zones were shown, even those not selected by the user, which caused a usability issue when the
list of entities was large.
NOTE The Quiet Time at the Logical Switch level for FOS versions prior to FOS 9.2.0 is still supported. The
Configuration Policy Manager feature contains a data model to derive which FOS version supports
the new Adaptive Quiet Time and which do not.
Based on the flow violations streamed to SANnav, a new widget is derived and calculated to determine the Initiator Host
and Target Storage device ports that are impacted by violated flows.
The new widget is available as a dashboard widget, which gets updated every five minutes and is kept for the last two
hours. This widget is a troubleshooting widget to determine which device ports are impacted by violated flows indicating
possible traffic issues such as errors, congestion, and/or oversubscription on these ports.
While a Fabric scope may be selected for this widget, Fabric scope and filter are not honored in the dashboard widget
view.
Broadcom SANnavMP-231a-RN-v4
25
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
SANnav v2.3.0 runs an algorithm to determine the severity of the impacted host ports or storage ports as one of the
following:
Severely Degraded
Degraded
Marginally Degraded
3.8.1.1.1 Investigate Violated Flows and F-Ports from the IO Health and Latency Widget
When the widget shows the device ports that are impacted by having flows going through them that are violated (severity
is either Severely Degrade, Degraded, or Marginally Degraded) it is possible to drill down on the severity bar to view the
violated flows.
Upon drill down, a table will show the violated flows, the flow attributes, and sample metrics aggregated over the last two
hours. From this table, it is possible to investigate any flow or to investigate the entry and exit F-ports associated with the
Flow. With this feature, a user may view the flow metrics and the physical port (F-port) metrics to detect any correlation or
relation.
In a customer environment, there could be millions of flows going through the Fabric at any time. SANnav does not collect
flow telemetry statistics through streams of data for all of these possible flows.
To manage flow scale, which can be quite large, the SANnav user must determine which chassis to receive flows from. By
default, no flow streams are received until the user registers for flow telemetry streaming reception.
To control and manage from which chassis SANnav will receive flow telemetry streams (both flow metrics and flow
violated metrics), use the new menu under SANnav > SAN Monitoring > Flow Telemetry Registration Management.
This menu is only available on large platforms, as stated earlier. This menu lists all currently managed chassis and
whether the chassis is registered for sending flow telemetry data to SANnav.
The user may select up to 150,000 flows total, which is the current flow scale supported and tested/validated in SANnav
v2.3.0. When there are more than 150,000 flows registered, SANnav will not allow any more chassis registration.
Each type of switch or Director chassis has a specific limit that is platform dependent. Refer to the FOS v9.2.0
Administration Guide and the SANnav v2.3.0 User Guide for details on supported flows per hardware platform.
CAUTION Flow Management is only supported on large platforms (96GB RAM, 24 vCPUs, 1.2TB storage).
If a SANnav server with a Base license is upgraded to a large platform, then the Flow telemetry
chassis registration menu will be available, but this configuration has not been tested or validated.
ATTENTION The SANnav v2.3.1x Flow Management feature changes are as follows:
SANnav v2.3.1x does not support flows from any Fabric OS® release other than Fabric OS v9.2.1x.
– SANnav v2.3.1x consumes IT flows (only) streams with FOS v9.2.1, and only at a five-minute interval.
– SANnav v2.3.1x no longer consumes ITL/ITN or VITL/VITN flows from any hardware platform.
– Upgrades and migrations to SANnav v2.3.1x will not migrate previous flow data (including ITL/ITN and VITL/VITN
flows). See Important Considerations When Upgrading to SANnav v2.3.1x.
Broadcom SANnavMP-231a-RN-v4
26
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
FOS 9.2.1 will support IT flows only, no ITL/ITN or VITL/VITN flows, streaming to SANnav combining IT flow statistics
and violations in one new consolidated and optimized Kafka data schema.
– SANnav v2.3.1x Flow Inventory continues to display VM and LUN columns however, they will never be populated.
– Filters: Using filters with LUN or VM values will lead zero flows as a result. Only IT filters will yield results.
The SANnav IO Health and Latency Flow Widget continues to be available in SANnav v2.3.1x, however, it will
process and compute affected device ports for IT flows only (no ITL/ITN/VITL/VITN flows) and for FOS v9.2.1
platforms only.
– The SANnav IO Health and Latency widget only processes IT flow violations on Gen 7 platforms running FOS
v9.2.1x only.
– The SANnav IO Health and Violation widget is not supported on any Gen 6 platforms for any FOS version.
Broadcom SANnavMP-231a-RN-v4
27
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
"specialCharacter": "0"
"maximumRepeat": "2"
"maximumSequence": "1"
"passwordExpires": "true"
"lockoutAttempts": "3"
"lockoutDuration": "15"
"passwordAge": "0"
"historyCount": "0"
"warningPeriod": "0"
"inactiveLockoutTime": "30"
"dashboardKeepAlive": false
A new policy to delete/purge SANnav scheduled backups (currently on demand) is provided in SANnav v2.3.1x. Options
to retain scheduled backups for 5, 10, or 15 days before purging them is provided.
This new purge schedule applies only to scheduled backups and not to backups taken manually or on-demand. Those are
excluded from the new purge schedule and are the reason why, after migration, the previous unwanted backups must be
removed manually.
The time at which the backup is purged depends on the time at which it was scheduled to be taken, with a possible buffer
of 30 minutes. For example, if a backup was generated previously by the schedule at 3:00 PM and the purging is
scheduled in five days, then the backup will get purged in five days at either 3:00 PM or 3:30 PM. This buffer is randomly
added to avoid SANnav having to run all tasks at the same time.
SANnav v2.3.1x backup files will now be assigned to user (UID) sannavmgr and group (GID) sannavmgr (as opposed to
root in previous releases) with Linux permissions 770 (rwxrwx---).
NOTE The backup files taken prior to SANnav v2.3.1x are upgraded and migrated. However, their file
permissions are left as-is (that is, owned by root). It is the user’s responsibility to manually delete
these backup files if they are no longer needed.
With SANnav v2.3.1x, a clear and explicit reason for failure will be shown when taking a switch support from SANnav
save fails. There are various reasons why a Switch Support Save might fail from SANnav. This field provides additional
details.
SANnav Support Data collection provided several options when taking a partial SANnav Support Data Capture (SSDC)
(SANnav supportsave) prior to SANnav v2.3.1x.
With SANnav v2.3.1x, users will be able to select either Full or Partial SSDC for one day from the UI. When selecting
Partial, the only option available is whether to take an HTTP capture. All other options have been removed. Users will not
have the option to select anything if taking the SSDC from the SANnav CLI console.
The name of the Support data collection format is shown below:
<SANnav_host_name>-<SMP>-<GUI/CLI>-<Full/Partial>-<Timestamp>.tar.gz
Broadcom SANnavMP-231a-RN-v4
28
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
SANnav Support Data will include a summary file for quick and easy debugging by the support team. A file called
sannav-summary.txt will be generated and will have general, host, memory, network, IP tables, and other SANnav
details included and present inside the SSDC file.
With FOS v9.2.1 and higher, the streaming interval of performance stats will change as follows:
FC port metrics streaming frequency is changed to 10 seconds from the current 2 seconds.
FCIP Tunnel, FCIP Circuit, Eth port, and GigE port streaming is changed to 10 seconds from the current 5 seconds.
The investigation view for scheduled ports will show data points spaced at 10 second intervals instead of 2 seconds as in
previous releases.
The investigation view for scheduled Tunnels/Circuits will show data points spaced at 10 second intervals instead of 5
seconds as in previous releases.
There are no impact or changes on historical port or tunnels/circuits Investigation.
Broadcom SANnavMP-231a-RN-v4
29
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
The same workflow used to discover a FC or FICON Fabric in SANnav applies to discovering an IPS Fabric. There is no
change in the input required in the UI to discover an IPS Fabric.
There are two visible changes when the Fabric is discovered successfully. First, a new Logical Role attribute is added to
indicate whether the Logical Switch is Logical FC or Logical IP (for UPS and IPS Fabrics) type. Second, a new attribute
Type with the values FC or IP has also been added for the Discovered Fabrics view in SANnav.
A new Tab called IP Storage Fabrics in the SANnav > SAN Configuration > Logical Fabric Management has been
added to initiate the creation/editing/deletion of IPS Fabrics. The workflow to create an IPS Fabric is very similar to that
used for creating Logical Fabrics (for FC Fabrics) or FICON Fabrics (for FICON Fabrics).
The most notable difference is the fact that the user needs to specify which AnyIO ports to assign to the IP Logical
Switches (IP LS). There are restrictions for IPS creation, such that only one IP LS per chassis is allowed in the SANnav
v2.3.1x and FOS v9.2.1x releases along with other restrictions which are described in detail in the USF section of the
SANnav Management Portal User Guide, as well as the Brocade Fabric OS Administration Guide.
Broadcom SANnavMP-231a-RN-v4
30
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
While any combination of IP device connectivity is allowed in both FOS v9.2.1x and SANnav v2.3.1x, the only
recommended and test/validated IPS configuration is the topology where IP servers are connected through L3TOR
switches to the IPS Fabric and where the IP Storage ports are directly attached/connected to the IPS Fabric.
It is important to have a topology diagram representing the end-to-end device connectivity drawn before proceeding to
the provisioning steps in SANnav. An example is provided in the Getting Started with IP Storage section of the
SANnav Management Portal User Guide.
Another important and fundamental aspect in SANnav 2.3.1x and FOS v9.2.1x is that since there is no device name
server in FOS v9.2.1x for IP devices (such as iSNS, for example), the device port discovery by SANnav cannot be
performed as is done for traditional FC-connected devices and will require user intervention and data input.
To provision end-to-end IP device connectivity requires two tasks performed by potentially two different Administrator
roles (who may be the same person).
– The first part is performed by the SAN Administrator, who will provision all aspects in the SAN and IPS Fabric
through SANnav (or CLI).
– The second part is performed by a Network Administrator, who is responsible for connecting and configuring
(through the L3TOR CLI console) the L3TOR switches and LAGs to the IPS Fabric, as well as the Host subnets
attached behind the L3TOR that need to access IP Storage ports on the other end of the IPS Fabric.
ATTENTION When provisioning end-to-end IP Device Connectivity through one fabric (FabricA), if redundancy
is required through a second Fabric (FabricB) because the IP devices are redundantly connected
through two IPS Fabrics, then the complete provisioning steps described below need to be
performed on both FabricA and FabricB in SANnav, one fabric at a time.
The launch point for all tasks related to IPS end-to-end device connectivity is under a new menu tab in SANnav > SAN
Configuration > IP Storage Fabric Configuration.
When this menu is launched, the IPS Port Connectivity Tab displays. By default, the first time that this menu is launched,
the user must select an IPS Fabric on the right side of the IPS Connectivity table. If no IPS Fabric has been provisioned,
this table (and the other tabs) will be empty.
There are five tabs shown when the IP Storage Fabric Configuration menu is launched. The order of provisioning for
these tabs follows the standard SANnav paradigm, from right to left. The user is expected to navigate from the right-most
tab to the left-most tab to properly configure the device connectivity through an IPS Fabric as follows:
1. IPS Port Connectivity tab
2. Connected Subnet tab
3. VRF tab
4. VLAN tab
5. Routing tab
The next subsections will briefly explain the tasks that the user is expected to perform in each tab above.
Once the SANnav > SAN Configuration > IP Storage Fabric Configuration is clicked, the IPS Port Connectivity tab is
shown. If the Fabric context has been set before, the last Fabric used is shown. If the Fabric context has not been set
before, a specific IPS Fabric scope must be selected.
This IPS Port Connectivity table represents the inventory of all the AnyIO ports attached to the Fabric that are available for
IP device connectivity or that are used to interconnect, link, and trunk IP LS switches (E-Ports).
These ETH ports have been previously provisioned, either during IPS Fabric creation or discovery, as ETH ports. An ETH
port is an AnyIO port whose protocol has been configured or provisioned to ETH, indicating that it is used for IP Device
Broadcom SANnavMP-231a-RN-v4
31
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
connectivity (server or storage). An E-Port belonging to the IPS Fabric is an FC port used to connect to another E-Port in
another IP LS in the IPS Fabric.
This table allows operations to properly configure and provision the end devices connected to the IPS Fabric. As
mentioned previously, since there is no name server in FOS v9.2.1 and SANnav v2.3.1x, the user is expected to provision
through this IPS Port Connectivity UI the L3TOR connected to the IPS Fabric as well as the IP Storage Ports directly
attached to the IPS Fabric.
The L3TOR is likely connected to the IPS Fabric using a LAG that contains multiple individual links. This LAG object also
needs to be provisioned as part of provisioning the L3TOR in SANnav.
In the IPS Connectivity view, an important column is the Configuration Status column, which has a few key values:
Available: The AnyIO port is not provisioned to have an attached device to it (L3TOR or IP Storage port) and is
available to use.
Configured: The required objects have been provisioned from SANnav and the IPS Fabric side. This does not mean
that the end-to-end IP device connectivity is working properly.
Auto Config: This applies for E-Ports and means that the AnyIO it has been automatically configured to E-Port (for an
ISL connection).
Partially Configured: This typically applies to LAG objects and is a transient state.
Provisioned: The Connected Type device has been entered, but the rest of the data (Subnet/VRF/VLAN/static
routing) has not been entered. This is also a transient state.
NOTE The Network Administrator will also need to provision the L3TOR and LAG in the L3TOR switch.
After the IPS device port connectivity, including devices, device ports, and LAGS, has been provisioned, the user is
expected to provision the subnets.
There are two types of subnets: Intermediate Subnets and Destination Subnets.
In most typical deployments, one Intermediate Subnet is created for the L3TOR switch connected via LAGs to the IPS
Fabric. Destination Subnets are created for each host subnet attached to the L3TOR that need to access the storage
ports.
For example, if there is one L3TOR switch with two host subnets connected to it, then the following subnets will need to
be provisioned so that the hosts in each subnet can be routed to the proper storage ports on the other side of the IPS
Fabric:
One Intermediate Subnet for the storage ports attached directly to the IPS Fabric
Two Destination Subnets, one for each host subnet attached to the L3TOR
Once the Subnets have been provisioned, Virtual Routing and Forwarding (VRF) can be provisioned. By default, VRF 0 is
the default VRF created by FOS.
VRF provisioning is optional. VRF provisioning may be required to partition various independent traffic flows on the same
IPS Fabric to segregate traffic from multiple devices on the same single IPS Fabric; otherwise, there is no need to
provision VRFs. An example of VRF provisioning would be to use VRF 0 for a certain set of applications and VRF 1 for
another set of applications; all traffic is carried over the same IPS Fabric with no interference between traffic on VRF 0
and VRF 1.
If VRF is required, then up to four VRFs may be provisioned in FOS v9.2.1x in one single IPS Fabric.
Broadcom SANnavMP-231a-RN-v4
32
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
Once the subnets and the optional VRF objects have been created, the next step is to provision the VLANs. There are two
types of VLAN objects used: VLAN and Interface (Intermediate) VLAN.
In most cases, when a set of storage ports directly attached to the IPS Fabric need to communicate to host subnets
behind an L3TOR, then one Interface VLAN and one VLAN would need to be created.
The VLAN object is to be created for the direct attached devices, most typically, storage ports.
The Interface VLAN would need to be created for the L3TOR device attached to the Fabric.
NOTE
The fundamental difference between VLAN and Interface VLAN is that when creating a VLAN, an
object storage port directly attached to the IPS must be specified, while when creating an
Interface VLAN, a subnet or a link must be added instead of ports.
The Network Administrator will also need to provision the VLAN objects on the L3TOR switch.
Once the VLAN objects have been created, the last and final step is to specify the static route for the storage ports to
reach the host subnets behind the L3TOR switch.
From SANnav, one static route per host subnet behind the L3TOR needs to be created. So, with the example of two
storage ports directly connected to the IPS Fabric and two host subnets behind the L3TOR switch, two static routes need
to be provisioned:
– One static route for the storage ports to reach the first host subnet
– One static route for the storage ports to reach the second host subnet
NOTE The static route provisioned in SANnav is a one-way static route, from the storage ports to the host
subnets behind the TOR. The route from each of the host subnets behind the L3TOR to the storage
ports needs to be configured by the Network Administrator on the L3TOR.
Once all the provisioning on the SANnav has been performed (all five tabs have been fully completed) it is important to go
back to the IPS Port Connectivity tab to Export the complete IPS end-to-end device connectivity. This export function is
not like an Inventory Export where only the data in the inventory being viewed is exported. Here, all data is exported
including IPS Port Connectivity, Subnets, VRFs, VLANs, and static routes.
This feature is useful to get a complete end-to-end view of each IPS fabric port and what is connected to it. The SAN
Administrator may then exchange this file with the Network Administrator to make sure all data is consistent and matches
on the L3TOR side. Note that the reverse can occur as well. That is, the Network Administrator provides to the SAN
Administrator the Host Subnets, LAGs, VLANs and static routes configured from IP side so that the SAN Administrator
configures the SAN portion accordingly.
NOTE When all the provisioning steps above have been completed, the Configuration Status column in the
IPS Connectivity view should be set to Configured state.
In SANnav v2.3.1x, there are no features to troubleshoot IP Device end-to-end connectivity, such as ping or other
means. However, FOS v9.2.2 CLI does provide a set of commands to do so. Since these commands are interactive, it is
not recommended to use SANnav switch CLI to send them. Instead SSH to the FOS switch to run these commands
directly.
Broadcom SANnavMP-231a-RN-v4
33
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
As is the case for SAN zoning, it may be required to add storage ports due to an existing zone in FC for better
performance and to scale the application. The same is true for IPS device ports, it may be required to add more storage
ports to an existing end-to-end application.
The SAN Administrator needs to configure any IO port as direct-attached storage in the IPS Port Connectivity view and
add the port to the storage VLAN in the SANnav VLAN tab. There is no need to add a new static route. There is nothing
for the Network Administrator to do.
A new server may need to be added under a host subnet to access the storage provisioned Day 1. To add a new host
inside an existing host subnet, there is nothing to do if the subnet has available IP addresses. If the host subnet has a
CIDR of 24, up to 255 hosts IP addresses can be added in the subnet.
The Network Administrator need to configure the IP address of the host to be added to an available one. There is nothing
for the SAN Administrator to do.
A new subnet for storage may need to be created if either the maximum number of storage ports in a subnet limit is
reached or if it is required to manage different storage subnets.
In this case, the Storage Administrator needs to follow the same steps described to provision the storage ports in Day 1
activities. However, there is no need to add new static routes by the SAN Administrator. The Network Administrator will
need to add a new static route on the L3TOR to reach the newly added storage subnet.
In some cases, if the number of hosts exceeded the number of allowed hosts, and new hosts need to access the storage
ports already configured in Day 1, a new host subnet may need to be added behind the L3TOR switch in SANnav and a
new static route defined (added) for the storage VLAN ports to reach new host subnet.
In this case, both the SAN Administrator and the Network Administrator need to perform tasks. The SAN Administrator
needs to define a static route to reach the storage VLAN for the new host subnet. The Network Administrator must
configure a new host subnet behind the L3TOR switch and define a new static route for the new host subnet to reach the
existing storage subnet.
3.10.4.5 Add Links to an Existing LAG Between the L3TOR Switch and the IPS Fabric
With scale and many devices connected, congestion between the L3TOR switch and the IPS Fabric may occur.
In this case, more links may need to be added to LAG between the L3TOR and the IP LS created on Day 1. In this case,
both the SAN Administrator and the Network Administrator need to perform tasks to add ports to the LAG on each of their
respective end. In SANnav, the SAN Administrator can invoke Add Port(s) to LAG from the IPS Port Connectivity view on
any port that is already part of the LAG created in Day 1.
Broadcom SANnavMP-231a-RN-v4
34
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
There are other use cases for Day 2 operations which are like the previous use cases explained above. Refer to the
SANnav Management Portal v2.3.1x User Guide for details on how to achieve these use cases in the SANnav UI. These
use cases include the following:
Removing storage ports from a VLAN (operations by SAN Administrator only)
Removing a server from a host subnet (operations by Network Administrator only)
Removing an entire host subnet behind the L3TOR (operations by both SAN Administrator and the Network
Administrator)
Removing ports from a LAG (operations by both SAN Administrator and the Network Administrator)
ATTENTION SANnav v2.3.1x does not support IP Hosts or IP Storage as a context, therefore it is not possible
to display redundant and resilient host subnets connected to two Fabrics with storage ports on
the other side in topology as can be done for traditional FC devices.
Broadcom SANnavMP-231a-RN-v4
35
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
NOTE TACACS+ authentication to the switches has also been deprecated with FOS v9.2.1x.
Real time investigation of flows at a 10-second interval has been removed from both FOS v9.2.1x and from SANnav
v2.3.1x.
Investigation at a six-hour interval has been removed from SANnav v2.3.1x, since there are no longer ITL/VITL flows
in SANnav v2.3.1x.
– Only IT flows may be investigated at either 5-minute (native stream) or 1-hour (aggregated) intervals.
The SNMP MIB Foundry attribute with Vendor Id 1991 was used for authorization by releases of SANnav before
v2.3.1x. In SANnav 2.3.1x, support for the Foundry attribute on the RADIUS server has been removed. Customers
using this specific attribute should change their RADIUS server dictionary file typically called
dictionary.NM_AAA_dictionary to use the Brocade attribute with Vendor Id 1588 and the attribute
sequence number to 1 or any other unique number for RADIUS authorization. An example is shown below. The
changes to be made are shown in blue:
# -*- text -*-
#
# dictionary.Brocade
#
VENDOR Brocade 1588
BEGIN-VENDOR Brocade
ATTRIBUTE NM-Roles-AORs-List 1 string.
END-VENDOR Brocade
Save and close the RADIUS server dictionary file. Restart the RADIUS server.
NOTE If Attribute sequence number 1 is already used for the other attribute for Vendor Id 1588, change
the attribute sequence number to any unique number.
ATTENTION Customers wishing to keep previous SANnav release flow data (especially ITL/ITN and
VITL/VITN) must remain on previous SANnav versions (v2.3.0x or v2.2.2x) and should not
upgrade to SANnav v2.3.1x.
Backing up a SANnav instance on a large platform and restoring it on a small platform running SANnav v2.3.x is not
recommended. The flow data will not be migrated on the small SANnav v2.3.x platform as flow management is not
supported on small platforms.
Broadcom SANnavMP-231a-RN-v4
37
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
NOTE Switches running EOS FOS versions such as FOS v7.4.x or any FOS v8.x non-target path releases
may be managed by SANnav, however, issues specific to those FOS firmware versions will not be
addressed by Broadcom.
Broadcom SANnavMP-231a-RN-v4
38
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
Gen 5 Switches Brocade 7840 Extension Switch FOS v8.2.3d and later
Brocade DCX 8510-4
Brocade DCX 8510-8
Brocade 6505
Brocade 6510
Brocade 6520
Brocade M6505 Blade Server SAN I/O module
Brocade 6542 Blade Server SAN I/O module
Brocade 6543 Blade Server SAN I/O module
Brocade 6547 Blade Server SAN I/O module
Brocade 6548 Blade Server SAN I/O module
Brocade 6558 Blade Server SAN I/O module
*Not all FOS versions listed in this column are supported on all hardware model platforms. Refer to the FOS and SANnav
User Guides for details of which FOS version is supported by which platform.
For new Gen7 hardware models (7850), only FOS v9.2.0 and above is supported.
Broadcom SANnavMP-231a-RN-v4
39
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
RHEL 8.2, 8.3, 8.5, 8.6, 8.7, 8.9, 8.10, 9.3, 9.4 are not officially supported, but installing and running SANnav on these
versions is allowed upon user acceptance with conditional support.
RHEL 7.9, 8.0, 8.1, 9.0 and 9.1 are not supported; the installation script exits if RHEL 7.9/8.0/8.1 or 9.0/9.1 are
running on the SANnav host.
ESXi 8.0 is recommended. SANnav v2.3.x has not been validated with ESXi 7.x but installation should work.
The recommended CPU speed is 2000 MHz. Running SANnav with lower CPU speed may result in lower
performance.
The recommended number of physical CPU sockets is two.
OVA Deployments
Max Switch Ports Supported Host Type Minimum Memory Hard Disk
Under Management Hypervisor vCPU
(Base or Enterprise)
Small VMware ESXi 8.0 VMware ESXi VM 16 vCPUs 48 GB 600 GB
600 Ports (Base) or,
3000 (Enterprise)
Large VMware ESXi 8.0 VMware ESXi VM 24 vCPUs 96 GB 1.2 TB
15,000 (Enterprise)
SANnav MP v2.3.1a OVA packages Rocky Linux 8.9 in the OVA file
ESXi 8.0 is recommended. SANnav v2.3.x has not been validated with ESXi 7.x but installation should work.
Broadcom SANnavMP-231a-RN-v4
40
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
The OVA deployment allows user to select a small or large deployment configuration.
The recommended CPU speed is 2000 MHz. Running SANnav with lower CPU speed may result in lower
performance.
The recommended number of physical CPU sockets is two.
NOTE Refer to Web Tools User Guide and Release Notes for supported list of browsers for Web Tools
launch for all FOS versions (FOS v8.x and below – Java required, and FOS v9.x and above – no
Java required)
SANnav 2.1.x and earlier SANnav v2.3.1a No Unsupported releases as per Brocade support policy.
SANnav v2.2.0x SANnav v2.3.1a No SANnav v2.2.0 was BR GA 12/15/2021. Not a valid
upgrade path to SANnav v2.3.0a (over 1 year) as per
Brocade support policy. Upgrade to SANnav v2.2.2a first.
SANnav v2.2.1x SANnav v2.3.1a No SANnav v2.2.1 was BR GA 06/22/2022. Not a valid
upgrade path to SANnav v2.3.0a (over 1 year) as per
Brocade support policy. Upgrade to SANnav v2.2.2a or
v2.3.0 first.
SANnav v2.2.2/2.2.2.1 SANnav 2.3.1a No SANnav v2.2.2 was BR GA 10/05/2022 and SANnav
v2.2.2.1 was BR GA 12/16/2022. Not a valid upgrade
path to SANnav v2.3.0a (over 1 year) as per Brocade
support policy. Upgrade to SANnav v2.2.2a or v2.3.0
first.
SANnav v2.2.2a SANnav v2.3.1a No Upgrade to SANnav v2.3.0x first.
Broadcom SANnavMP-231a-RN-v4
41
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
SANnav v2.3.0x SANnav v2.3.1a Yes OVA upgrade inline. OS upgrade first to Rocky 8.9
(recommended)
SANnav v2.3.1 SANnav v2.3.1a Yes OVA upgrade inline. OS upgrade first to Rocky 8.9
(recommended)
For upgrade from SANnav v2.3.0 to v2.3.1a or v2.3.1 to v2.3.1a OVA case, it is recommended to upgrade the OS to
Rocky Linux 8.9 first. If that is not possible, then in these cases SANnav will require user acceptance to run SANnav
v2.3.1a on an untested OS. Refer to the Note in section SANnav Management Portal v2.3.1a OS Support.
Refer to the SANnav Installation and Upgrade Guide for details before attempting a SANnav MP upgrade in all
deployments.
NOTE
Migration from SANnav v2.3.0a to v2.3.1 is not supported.
SANnav v2.3.1x will auto-detect the source version running and will prompt the user to proceed
with the upgrade/migration on the detected path or to change the path instead.
Broadcom SANnavMP-231a-RN-v4
42
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
Chapter 5: Licensing
The Brocade SANnav Management Portal can be licensed in either a Base or Enterprise version.
SANnav Management Portal Base enables management of up to 600 ports residing on fixed port switches or
embedded blade switches, but it cannot be used to manage ports from any Directors (4-slot or 8-slot).
SANnav Management Portal Enterprise enables management of up to 15,000 ports from any embedded switch, fixed
port switch, or Director-class products.
Product Offerings Description
SANnav Management Portal Base Manages up to 600 ports from fixed-port or embedded switches but does not manage
directors.
SANnav Management Portal Enterprise Manages up to 15,000 switch ports from any type of switch including directors (either
4-slot or 8-slot).
ATTENTION SANnav Management Portal uses a subscription-based licensing model, which allows the product
to function for the duration purchased. The SANnav Management Portal license must be renewed
and installed in a timely manner to keep the product functioning without disruption.
Broadcom SANnavMP-231a-RN-v4
43
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
User may export the current Active, Active (Released) or Expired SANnav license details to renew the current license.
The Export Renewal Request menu will show the following:
Current License Expiration Date
Renewal License Start Date (one day after the current expiration)
Renewal License End Date: by default, this is set to one year after the Renewal Start Date, but the user can change it
to any arbitrary date in the future. The duration must be between 60 days and seven years.
– SANnav calculates the number of days between the start and end renewal dates in days: renewal end date minus
renewal start date, expressed in days.
The Export Renewal Request will download and generate a file (into the client-specified browser default download
folder) containing all the relevant information for the customer to request the renewal quote.
SANnav will generate a new SANnav Renewal Verification (SRV) Code as part of the Export Renewal Request to be
used when placing an order for a license renewal.
– Example SRV Code: SRVS999D0777FMX12345
Refer to the Licensing section of the SANnav Management Portal v2.3.x User Guide for details on how to export the
License Renewal Request file from the SANnav UI.
Broadcom SANnavMP-231a-RN-v4
44
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
Chapter 6: Scalability
Broadcom SANnavMP-231a-RN-v4
45
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
7.1 General
The network latency between SANnav clients to the SANnav Management Portal server and between the SANnav
Management Portal server to the switches must not exceed 100 ms. If the latency is higher than 100 ms, then
communication time outs may occur and cause undesirable behavior.
When configuring the VM for SANnav installation, make sure the MTU size of the network interface is set to 1500,
otherwise SANnav will not receive Port Performance data for switches running Fabric OS less than v8.2.1b.
Cockpit web console for Linux cannot co-exist with SANnav Management Portal.
SE Linux is not supported (Enforcing and Permissive).
SANnav is expected to be installed and run on a dedicated host. If any other application is installed on the host, it is
mandatory to uninstall it before starting the SANnav installation.
SANnav application performance may be affected during operations like SANnav backup and support data collection.
It is recommended to schedule SANnav backup during application idle time.
DR is supported for SANnav Management Portal only. DR is not supported for Global View
In the SANnav > SANnav Password and Lockout Policies menu tab, even if the checkbox Keep dashboard
active after session expires is checked, the dashboard will disappear after 24 hours if there is no user activity due to
nginx forcing the session timeout.
Migration from SANnav v2.2.2x or v2.3.0 to v2.3.1 will fail when at least one of the following conditions are
encountered:
1. In SANnav versions prior to v2.2.1, the SANnav docker home path was customized to something other than the
default path of /var/lib, then later upgraded to 2.2.1 or 2.2.2x or 2.3.0 with this customized path, and then
migration to v2.3.1 was attempted.
2. Backup from a SANnav server having a different docker home path than the current SANnav server is restored
and then migration to v2.3.1 is attempted e.g. backup from an OVA (which has default docker home path) is
restored on a server with a custom docker home path.
Please refer to the TSB TSB-2024-291-A for more information including the workaround and recovery.
SANnav uses a set of ports for internal communication which is available in the SANnav Management Portal
Installation and Migration Guide. Do not use those ports while customizing the SCP/SFTP server, SNMP trap,
Syslog/Secure Syslog, or HTTPS communication. Doing so will result in the SANnav server not starting properly.
Broadcom SANnavMP-231a-RN-v4
46
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
Where <Active Zone Details> is listed in the output of the command firewall-cmd --list-
all.
2. Change the firewall backend:
When installing SANnav Management Portal v2.3.x and the firewall needs to be enabled, ensure the firewalld is
configured before SANnav Management Portal installation. If the step to configure the firewall is missed or omitted
before starting the SANnav Management Portal server, fabric, and switch discovery in SANnav Management Portal
will fail (network reachability issue). If this happens, use the following procedure to resolve the network reachability
issue:
– Stop the SANnav Management Portal server using the script stop-sannav.sh present in
<install_home>/bin folder.
– Start the SANnav GV server using the script start-sannav.sh present in <install_home>/bin folder.
If the host on which the SANnav server is installed is rebooted and the firewall was enabled in that host, then the
reboot will clear the firewall rules added by SANnav during installation. It is mandatory to run the command below
before restarting the SANnav server to re-insert all the missing firewall rules:
systemctl restart sannaviptablesetup.service
When migrating from previous releases to SANnav v2.3.1, if a custom port is used for internal SFTP/SCP, make sure
that this port is not part of the required ports list in the installation guide. If the custom port is in the required ports list,
change this port to any other free port using the change-internal-ssh-port.sh script before starting the
migration.
SANnav product is designed to use firewalld/iptables to block external access to ports used for internal
communications. If firewalld/iptables is not used, internally used ports will be exposed and may be reported as
vulnerable by security scanning software. This note covers all SANnav versions and CSI patches.
When upgrading to SANnav Management Portal v2.3.1, take a backup of the current SANnav installation and
generate a full support data collection before proceeding with the migration process.
Broadcom SANnavMP-231a-RN-v4
47
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
If upgrading to SANnav v2.3.1a OVA when FIPS is enabled in the VM and the openSSL is running a non-FIPS
complaint version, the upgrade to SANnav 2.3.1a will fail. In order to fix the problem upgrade the openSSL version in
the VM to a FIPS-complaint version or disable FIPS before the SANnav upgrade.
When upgrading to SANnav v2.3.1, SANnav may be using TLS v1.2. Switches that are using TLS v1.3 and are
configured to use the default-strong seccryptocfg template cannot be discovered in SANnav. In this situation, you
must configure SANnav to use TLSv1.3 as follows:
– Stop SANnav by running the following script: <install_home>/bin/stop-sannav.sh.
– Go to the <install_home>/conf folder and edit the server.properties file. Change the tls.protocol.version
property from TLSv1.2 to TLSv1.3.
– Start SANnav by running the following script: <install_home>/bin/start-sannav.sh.
– Wait a minimum of 45 minutes for the SANnav server start-up to complete one round of discovery asset
collection.
– After 45 minutes, the status of the switch configured with default-strong seccryptocfg template should be changed
to Discovered.
A switch Supportsave or firmware download operation initiated via SCP or SFTP protocol from SANnav Management
Portal will fail in the following scenario for switches running Fabric OS less than v9.0:
1. User has performed a switch Supportsave or a firmware download operation at least once on that switch using
SANnav Management Portal.
2. User has uninstalled SANnav Management Portal.
3. User has re-installed SANnav Management Portal and attempted to either perform a switch Supportsave or a
firmware download for the same switch that was used in step 1.
To avoid this situation, before uninstalling SANnav Management Portal, take a backup of the ssh-
keypair.ser file from the following location: <SANnav_home>/conf/security. After reinstalling
SANnav, restore the previously backed-up file to the same location.
To recover from this situation, log in to the switch on which the firmware download or supportsave was
performed, and delete the SANnav Management Portal server IP address from the list of known hosts by
using the following command: sshutil delknownhost <SANnav-server-IP>
Importing a Fabric OS software package into the SANnav Management Portal repository will fail if the firmware
package is stored on a network shared folder. The workaround for this situation is to download the firmware package
to a local disk on the SANnav Management Portal server, and then import it into the repository.
SANnav supports only strong ciphers and if switch configuration supports only weak ciphers, firmware download will
not work from SANnav. Please contact Broadcom support for a workaround in case user is willing to use weak
ciphers.
Updated firmware might not show in the SANnav when one or more ports in the fabric are bouncing. Fix the issue to
see the new firmware details in SANnav
Broadcom SANnavMP-231a-RN-v4
48
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
SANnav has a limit of two switches for on-demand Supportsave collection if using an internal SCP/SFTP server. If
more than two switches are selected in bulk, it may take a long time to complete the Supportsave collection with an
internal SCP/SFTP server.
– To work around this issue, either select only two switches at a time with an internal SCP/SFTP server or use an
external SCP/SFTP server which has no switch limit.
– Additionally, if a switch Supportsave is scheduled using the Bulk Select option, the operation may fail for some of
the switches. The workaround is to use an external SCP/SFTP server, which has no switch limit.
A Web Tools session depends on the session timeout set on the switch irrespective of direct or proxy launch. Web
Tools running in proxy mode validates the SANnav session before sending a request to the switch to avoid any
illegitimate connection. If Web Tools is open in proxy mode, the SANnav client session will be considered as active;
inactive time will be computed from the time Web Tools is closed.
A switch will become unreachable after upgrading its firmware to FOS v9.2.0 or above when it was previously
discovered with HTTP protocol in SANnav. To work around this, before upgrading the switch FOS firmware, configure
the switch either with self-signed generated HTTPS certificate or load the custom certificate in the switch.
In cases where a switch was discovered using HTTP initially and then changed to HTTPS later, the port 80 and/or 443
must not be blocked until the protocol change is reflected in the SANnav UI.
If a DSA algorithm is used for the HTTPS certificate, then SANnav cannot discover the switch because all the
supported ciphers for this algorithm are no longer supported.
Broadcom SANnavMP-231a-RN-v4
49
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
When the SANnav Management Portal server is restored from a SANnav Management Portal backup or when
performing a DR fail over, high granularity performance data, FCIP performance data, and flow statistics and
violations are no longer collected due to a new HTTPS digital certificate that is generated in the server, which does
not match with the digital HTTPS certificates on the switches.
– To resolve this issue, un-monitor and monitor all data-streaming switches. This will update the certificates on the
switches with the new certificate on the SANnav server.
When the SANnav Management Portal support data file size is greater than 5 GB, copy the file directly from the
SANnav server rather than trying to download it using the client.
Backups taken from a CLI script cannot be used for restoring the data. Users are required to always collect SANnav
backups through the SANnav client.
SANnav Backup generated on large (96-GB) platform cannot be restored on small (48-GB) platforms.
When collecting support data collection when SANnav services are down, use the CLI option. Run the SANnav
support data collection from the Linux server machine console at the system-level console; all the system commands
can be executed there to collect the required logs and data, which is not possible with the UI option.
If any of the backup files are moved, renamed, or deleted manually from the file system then SANnav will not show
these files on the Outputs page.
When triggering on-demand SANnav backup when the disk is running more than 70% of the file system, the backup
fails with the following message: Something went wrong. Try again later. If it happens, please check the
corresponding application event in fault management, which will show the exact reason of the failure.
DR on OVA:
– When the SANnav version is upgraded, DR needs to be reconfigured. Before reconfiguration, the standby VM
needs to be removed and redeployed as a new VM even though the primary server is migrated inline Refer the
installation guide for the migration procedure and then perform the DR reconfiguration.
– When the DR configuration is reset on the primary server, the standby server VM needs to be removed and
redeployed as a new VM, as there is no reset option on the standby server. Then perform the DR reconfiguration.
Broadcom SANnavMP-231a-RN-v4
51
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
In addition to defect fixes, software releases may also contain updates to address Common Vulnerabilities and Exposures
(CVEs). The latest security vulnerability disclosures and descriptions of each CVE can be found by visiting the Brocade
Security Advisories web page:
www.broadcom.com/support/fibre-channel-networking/security-advisories
Specific CVEs addressed within any given software release will be publicly released a short period after the initial posting
of the software. This is done to provide enough time for OEMs to qualify security updates prior to public disclosure.
The exact CVEs addressed within the SANnav software releases are provided in the following security announcement
support.broadcom.com/external/content/SecurityAdvisories/0/24999
Broadcom SANnavMP-231a-RN-v4
52
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
Chapter 9: Defects
Broadcom SANnavMP-231a-RN-v4
53
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
Broadcom SANnavMP-231a-RN-v4
54
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
Broadcom SANnavMP-231a-RN-v4
55
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
Broadcom SANnavMP-231a-RN-v4
56
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
Broadcom SANnavMP-231a-RN-v4
57
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
Broadcom SANnavMP-231a-RN-v4
58
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
Broadcom SANnavMP-231a-RN-v4
59
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
Broadcom SANnavMP-231a-RN-v4
60
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
Broadcom SANnavMP-231a-RN-v4
61
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
Broadcom SANnavMP-231a-RN-v4
62
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
Broadcom SANnavMP-231a-RN-v4
63
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
Broadcom SANnavMP-231a-RN-v4
64
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
Broadcom SANnavMP-231a-RN-v4
65
SANnav™ Management Portal v2.3.1a SANnav Management Portal v2.3.1a Release Notes
Revision History
Broadcom SANnavMP-231a-RN-v4
66