v6.2.2d_ReleaseNotes_v1.0
v6.2.2d_ReleaseNotes_v1.0
v6.2.2d_ReleaseNotes_v1.0
2d
Release Notes v1.0
Document History
Document Title Summary of Changes Publication Date
Brocade Fabric OS v6.2.2d Release Notes v1.0 Initial release September 21, 2010
© 2010 Brocade Communications Systems, Inc. All Rights Reserved.
Brocade, the B-wing symbol, BigIron, DCX, Fabric OS, FastIron, IronView, NetIron, SAN Health, ServerIron,
and TurboIron are registered trademarks, and Brocade Assurance, DCFM, Extraordinary Networks, and
Brocade NET Health are trademarks of Brocade Communications Systems, Inc., in the United States and/or
in other countries. Other brands, products, or service names mentioned are or may be trademarks or
service marks of their respective owners.
Notice: This document is for informational purposes only and does not set forth any warranty, expressed or
implied, concerning any equipment, equipment Feature, or service offered or to be offered by Brocade.
Brocade reserves the right to make changes to this document at any time, without notice, and assumes no
responsibility for its use. This informational document describes Features that may not be currently
available. Contact a Brocade sales office for information on Feature and product availability. Export of
technical data contained in this document may require an export license from the United States
government.
Notice: The product described by this document may contain “open source” software covered by the GNU
General Public License or other open source license agreements. To find-out which open source software is
included in Brocade products, view the licensing terms applicable to the open source software, and obtain
a copy of the programming source code, please visit http://www.brocade.com/support/oscd.
Export of technical data contained in this document may require an export license from the United States
Government
This release also contains fixes for many defects including those from the following list of patch
releases:
• FOS v5.3.2c
• FOS v6.0.1a
• FOS v6.1.1d
• FOS v6.1.2b
• FOS v6.2.0g
• FOS v6.2.1b
• FOS v6.2.2b
• FOS v6.2.2c
The defects fixed in this release are listed in the defect tables provided at the end of this document.
Defect 319613: While upgrading from FOS v6.1.x to FOS v6.2.2c Access Gateway (AG) enabled switches
panic. This only affects AG enabled switches upgraded to FOS v6.2.2c. This defect does not
apply to AG enabled switches upgraded from FOS v6.1.x to any other FOS v6.2.x release. In
addition, this defect does not apply to AG enabled switches upgraded from FOS v6.2.x to FOS
v6.3.x.
Diagnostics Restrictions
The following command restrictions now apply for porttest and spinfab diagnostics:
The porttest and spinfab commands are not supported on the following ports in FOS v6.2.2
and prior releases:
• Ports connected to shared-area ports (port 16 to port 47 on 48-port blades).
• Ports connected to ports with area-swapped.
• Inter-chassis Links (ICLs).
• Slave ports in trunk groups.
• Long Distance ports.
• If Virtual Fabrics is enabled, ports connected to a Logical Switch and Base Switch. (v6.2.x only)
Supported Switches
Fabric OS v6.2.2 supports the Brocade 200E, 300, 4012, 4016, 4018, 4020, 4024, 4424, 5410,
5480, 5424, 4100, 4900, 5000, 5100, 5300, 7500, 7600, 48000, Brocade Encryption Switch
(BES), VA-40FC, DCX and DCX-4S. All supported products are qualified for Native Connectivity in
interopmode 2 and 3 for deployment in M-EOS fabrics with the exception of the Brocade 4100.
Access Gateway is also supported by Fabric OS v6.2.2, and is supported on the following switches:
the Brocade 200E, 300, 5100, VA-40FC*, 4012, 4016, 4018, 4020, 4024, 4424, 5480 and 5424.
Standards Compliance
This software conforms to the Fibre Channel Standards in a manner consistent with accepted
engineering practices and procedures. In certain cases, Brocade might add proprietary
supplemental functions to those specified in the standards. For a list of standards
conformance, visit the following Brocade Web site: http://www.brocade.com/sanstandards
Technical Support
Contact your switch supplier for hardware, firmware, and software support, including product repairs
and part ordering. To expedite your call, have the following information immediately available:
1. General Information
• Technical Support contract number, if applicable
• Switch model
• Switch operating system version
• Error numbers and messages received
• supportSave command output
FT00X0054E9
FT00X0054E9
TSB Summary
2009-
2009-069-
069-A FICON environments that have configured ASM Mode (i.e. Active=Saved Mode, for
(Defect
the CUP port connectivity configuration parameter in the PDCM/allow/prohibit
265697) matrix), could experience an unexpected change to port block states after a reboot.
2009-
2009-074-
074-A Fabrics that are configured with EX_Ports in a multi-switch backbone fabric utilizing
(No Defect
edge-to-edge routing could experience a traffic impact due to a loss of credit across
Reference) the EX_Port link. The fix for this issue is part of an architectural change that was
included in Brocade Fabric OS v6.3.0 and above.
TSB Summary
When upgrading a DCX, DCX-4S or Brocade 5300 from Fabric OS v6.2.2a or lower
2010-
2010-075-
075-A
to FOS v6.3.1 or 6.3.0c or lower, the Compact Flash (CF) may report an access
(Defect error. This will cause a reboot of the affected CP within the DCX/DCX-4S or Brocade
270261)
5300 to fail.
A Brocade 200E, 4012, 4016, 4018, 4020, 4024, 4424, 4100, 4900, 5000,
2010-
2010-080-
080-A 7500 or 7600 switch or the standby CP within a Brocade 48000 director may
(Defect remain in a perpetual reboot state when upgrading from Fabric OS version v6.1.x to
285644) Fabric OS version v6.2.x. FOS v6.2.2c and later prevents upgrades when this
condition may occur until the configuration is corrected.
All products supported by Fabric OS v6.1.0, v6.1.1, or v6.2.x can be upgraded to Fabric OS v6.2.2. The
following is a list of products that can be upgraded to Fabric OS v6.2.2:
• 300, 4012, 4016, 4018, 4020, 4024, 4424, 5424, 5410, 5480, 4100, 4900, 5000, 5100,
5300, 7500, 7600, 200E, 48000, BES, VA-40FC, DCX, and DCX-4S.
All downgrades from FOS v6.2.2 to FOS v6.1.x require a restart and are disruptive to traffic. Platforms
supporting Virtual Fabrics must have the Feature disabled prior to downgrading below v6.2.0.
When downgrading from FOS v6.2.x to v6.1, configuration parameters such as switch name in FOSv6.2 are
not persisted.
To ensure non-disruptive Hot Code Load (HCL), neighbor switches should be operating with FOS v6.2.x
prior to loading FOS v6.2.2 on the following platforms:
When upgrading to FOS v6.2.x from FOS v6.1.0g or earlier, the CPs do not fully synchronize until both the
new active and new standby CPs are running v6.2.x. This is normal behavior and the firmware upgrade is
still not disruptive.
FOS does not support concurrent FC Routing (EX_Ports) and TopTalkers Features. Upgrading to FOS v6.2.x
requires that one of these Features be disabled first.
The Brocade Encryption Switch and DCX with one or more FS8-18 blades may not be downgraded below
FOS v6.1.1_enc.
The Brocade Encryption Switch and DCX with one or more FS8-18 blades may not be downgraded below
FOS v6.2.0 if HP SKM Key Vault is configured. Doing so will result in loss of encryption services in HP SKM
environments.
When Tape Encryption is configured on BES or DCX/DCX-4S with FS8-18 blade, downgrading to v6.1.1_enc
will result in loss of Tape Encryption Services.
If there are multiple node EGs (encryption groups) in a fabric, please complete firmwaredownload on one
node at a time before downloading on another node.
Important Notes
This section contains information that you should consider before you use this Fabric OS
release.
FM Compatibility
Fabric Manager v5.x software and older versions are not compatible with versions of FOS v6.1.0x
patches and higher software. For Manageability support, customers are encouraged to upgrade
to DCFM 10.3.x software.
DCFM Compatibility
FOS v6.2.2 is fully compatible with Brocade’s Data Center Fabric Manager (DCFM) v10.1.x management
software. DCFM is a comprehensive SAN management application that enables end-to-end management
of Brocade Data Center Fabrics. It is the next-generation product and the successor to existing Brocade
management products, including Brocade Fabric Manager (FM) and Brocade Enterprise Fabric
Connectivity Manager (EFCM).
DCFM is available in two versions: DCFM Professional, an application bundled with Brocade switches that
is ideally suited for small and medium size businesses that need a light-weight management product to
manage their smaller fabrics (one physical fabric at a time, up to 1,000 ports); and DCFM Enterprise, that
is designed for enterprise-class customers and showcases unparalleled performance and scalability (24
physical fabrics, up to 9,000 switch ports). DCFM Enterprise configures and manages Brocade DCX
Backbones, along with Brocade directors, routers, switches, and HBAs. It also supports Brocade fabric-
based encryption capabilities for data-at-rest. Existing EFCM v9.6 and higher and FM v5.4 and higher
customers are provided an easy migration path to DCFM Enterprise.
EFCM Compatibility
EFCM v9.7.4 is the minimum version of Brocade management software that should be used to manage
Brocade switches deployed with FOS v6.2.2. EFCM v9.7.4 cannot manage the DCX-4S or platforms with
the Virtual Fabrics Feature enabled. For more information on migrating from previous versions of EFCM to
EFCM v9.7.4, refer to the EFCM v9.7.4 Release Notes documentation.
Fabric OS Compatibility
The following table lists the earliest versions of Brocade software supported in this release, that is, the
earliest supported software versions that interoperate. Brocade recommends using the latest software
versions to get the greatest benefit from the SAN.
When using the new Virtual Fabrics Feature, it is highly recommended that all switches participating in a
fabric with a logical switch use the latest firmware available for those switches. All switches must be
operating at minimum firmware levels noted in the FOS Interoperability table below.
When using any of Brocade’s encryption platforms (Brocade Encryption Switch or Brocade FS8-18 blade in
a DCX or DCX-4S) it is required that switches attached to hosts and targets or those that are part of the
encryption flow be operating with minimum specified levels:
• 2Gb/4Gb platforms must operate with FOS v5.3.1b or later
• 4Gb/8Gb platforms must operate with FOS v6.1.0e, v6.1.1 or later (4Gb platforms may use
v5.3.1b but are recommended to use the v6.x versions)
Table Notes:
1All zoning and fabric operations performed in a fabric with products running older versions of FOS should
be done via interfaces to products running the latest version of FOS. This is particularly important for
Brocade 3XXX series switches that do not support zoning configuration for newer products.
2Other M-EOS models may participate in a fabric with FOS v6.2.2, but may not be directly attached via
E_Port to any products running FOS v6.2.2. The McDATA ED-5000 director may not participate in a mixed
M-EOS/FOS fabric.
3It is highly recommended that M-EOS products operate with the most recent version of M-EOS released
and supported for interoperability. M-EOS 9.7.2 is the minimum version of firmware that is fully qualified
to interoperate with FOS 6.2.0 or later. For support of frame redirection in McDATA Fabric Mode
(interopmode 2), M-series products must use M-EOS v9.8 or later. For support of frame redirection in
McDATA Open Fabric Mode (interopmode 3), M-series products must use M-EOS v9.9 or later. Only the ES-
Fabric OS v6.2.2 software is fully qualified and supports the blades for the 48000 platform noted in
the following table:
FC-IP/FC Router blade (FR4-18i) Up to a maximum of 2 blades of this type. This can be
extended under special circumstances but must be
approved by Brocade’s Product Team. Up to 8 FR4-18i
blades can be installed if they are used only for FC
FastWrite or FCIP without routing.
FC-IP/FC Router blade (FR4-18i) Up to a maximum of 4 blades of this type. This can be
extended under special circumstances, but must be
approved by Brocade’s Product Team. Up to 8 FR4-18i
blades can be installed in a DCX if they are used only
for FC FastWrite or FCIP without routing.
Note: the iSCSI FC4-16IP blade is not qualified for the DCX/DCX-4S.
*Note: the iSCSI FC4-16IP blade is not qualified for the DCX/DCX-4S.
Secure Fabric OS
Secure Fabric OS (SFOS) is not compatible with FOS v6.2.2. Customers that wish to use the security Features
available in SFOS should upgrade to FOS v5.3 or later version, which includes all SFOS Features as part of the
base FOS. For environments with SFOS installed on switches that cannot be upgraded to FOS v5.3 or later
version, FC routing can be used to interoperate with FOS v6.2.2.
FOS Feature Compatibility in Native Connectivity Modes
Some FOS Features are not fully supported when operating in the native connectivity modes for
deployment with M-EOS based products. All Brocade models that are supported by Fabric OS v6.2.2
support both intermodal 2 and 3 with the exception of the Brocade 4100.
The following table specifies the support of various FOS Features when operating in either
interopmode 2 (McDATA Fabric Mode) or interopmode 3 (Open Fabric Mode) with Fabric OS v6.2.2.
Scalability
All scalability limits are subject to change. Limits may be increased once further testing has been
completed, even after the release of Fabric OS. For current scalability limits for Fabric OS, refer to the
Brocade Scalability Guidelines document, available under the Technology and Architecture Resources
section at http://www.brocade.com/compatibility
FICON Support
The DCX-4S is not supported for FICON Cascading in interopmode 2 or 3 for use in mixed
fabrics with M-EOS platforms.
This behavioral change in saved zone alias WWN members will not impact most environments.
For additional details and Workaround solutions, please refer to the latest FOS Admin Guide updates
or contact Brocade Customer Support.
Fabric Watch
• Fabric Watch has been modified so that Core blade status reporting behaves like a CP blade instead a
port blade:
Note: If any type of blade goes to a faulty state, the switch/blade state will be marginal.
Fabric Watch: Port Fencing
• For Port Fencing, once the trigger threshold is exceeded (e.g. for ITWs or CRCs or LRs), Fabric Watch
will wait for approximately six seconds to see if the port is going offline. If it is still online at the next
poll cycle, FW will fence the port. Extensive testing has shown that ports that are in the process of
going offline may exhibit bursts of errors. Waiting the additional six seconds to check the port status
helps prevent false positives and unnecessarily fencing a port (e.g. during a server reboot) When using
the Port Fencing Feature, you must first run the fwalarmsfilterset command. This command enables
the port and allows you to receive Port Fencing messages.
• Port Fencing can be inadvertently disabled from Web Tools. This happens when you do the following:
1. Open the Fabric Watch configuration window.
2. Check the "SNMP Trap" checkbox in the "Above" row.
This change in Web Tools disables Port Fencing. If this happens, you must re-enable the Port Fencing
bit from the command line interface.
• Port Fencing Feature is not supported for Loss of Sync (LOS) and Link Failure (LF) areas of Port/F-
port/E-port classes.
Extended Fabrics and R_RDY Flow Control
Beginning with Fabric OS v5.1, Brocade supported the Extended Fabrics Feature in conjunction with
R_RDY flow control (R_RDY flow control mode can be enabled via portCfgISLMode command). R_RDY flow
control mode that uses IDLE primitives does not support Brocade frame-based Trunking for devices such
as Time Division Multiplexor (TDM).In order to overcome this limitation and provide support for frame-
based Trunking with Extended Fabrics, Fabric OS v6.2.x has been enhanced to support interoperability
with these distance extension devices.
Fabric OS v6.2.x allows Extended Fabrics E_Ports to operate in VC_RDY mode using either ARB or IDLE
primitives as fill words. This allows frame-based Trunking to be supported on Extended Fabrics E-ports
even when IDLE primitives are configured for these ports when operating in native VC_RDY mode. Prior to
this change, frame-based Trunking was supported only when ARB primitives were used in VC_RDY mode.
The only mode of operation in FOS 6.1 up to this time had been the Idle
implementation. With the introduction of FOS v6.1.2 there will be the
introduction of the new command to facilitate a change to the ARB
Default mode implementation. FOS 6.2.0specifically v6.2.0, v6.2.0a & v6.2.0b had
defaulted to ARB/ARB for 8Gb devices. With the introduction of v6.2.0c the
new command will default to mode 0 (Idle) and provide the user the ability to
configure the ARB configuration.
For product in the field, this change has no effect on current configurations.
The mode is currently 0 and during a firmware upgrade the mode will remain
0 and no devices will be impacted. Should a new device be added to the
configuration that requires the ARB sequence those ports can be configured
at such time.
Existing Product
Loading 6.2.0c will not automatically change the mode. In current
configurations, the mode will have to be changed manually.
This change does not affect 1Gb/2Gb or 4Gb devices. Any of the settings of 0
or 1 have no affect on these devices. It only affects devices that negotiate or
are fixed to 8Gb speeds.
Changing the The portCfgFillWord command will change the configuration parameter and
mode on the fly automatically disable/enable the port for which the command invoked.
after v6.2.0c has Subsequent link initializations will use ARB(FF).
been installed.
The command has no effect on 1Gb / 2Gb /4Gb devices but the mode is
persistent. If in the future, a device attempts to negotiate or is fixed to 8G the
configured mode will take effect. The persistent configuration is on a port by
Other scenarios
port basis (i.e. if an 8Gb device was connected to a 2Gb or 4Gb optic and that
optic was replaced with an 8Gb optic, then the current behavior of the mode is
activated.)
On page 9, in Chapter 1, under the heading “Setting the static addresses for the Ethernet network
interface,” remove the following example from step 3:
In chapter 2, “Managing User Accounts” on page 70 under the heading “RADIUS configuration with
Admin Domains or Virtual Fabrics” replace the bullets:
• HomeContext is the designated home Virtual Fabric for the account. The valid values are
between 1 to 128 and chassis context. The first valid HomeContext key-value pair is
accepted by the switch, Additional HomeContext key-value pairs are ignored.
• HomeLF is the designated home Virtual Fabric for the account. The valid values are between
1 to 128 and chassis context. The first valid HomeLF key-value pair is accepted by the switch,
additional HomeLF key-value pairs are ignored.
RADIUS authentication requires that the account have a valid role through the attribute type
Brocade-Auth-Role. The additional attribute values ADList, HomeAD, HomeLF, and LFRoleList
are optional. If they are unspecified, the account can log in with AD0 as its member list and
home Admin Domain or VF128 as its member list and home Virtual Fabric. If there is an error
in the ADList, HomeAD, LFRoleList, or HomeLF specification, the account cannot log in until
the AD list or Virtual Fabric list is corrected; an error message is displayed.
In the next example, on a Linux FreeRadius Server, the user takes the “zoneAdmin” role, with
VFlist 2, 4, 5, 6, 7, 8, 10, 11, 12, 13, 15 17, 19, 22, 23, 24, 25, 29, 31 and HomeLF 1.
user300 Auth-Type := Local, User-Password == "password"
Brocade-Auth-Role = "zoneadmin",
On page 77, “LDAP configuration and Microsoft Active Directory” the following bullets should be
added:
• You can use the User-Principal-Name and not the Common-Name for AD LDAP authentication.
• A user can belong to multiple groups as long as one of the groups has the same name as the
Brocade role name. Among those groups, one group name must match with either the
Brocade role or mapped to a switch role in the Brocade switch.
should be:
In Chapter 4, “Configuring Advanced Security” on page 120, the following HBA models should be
added to the list of supported HBAs:
In chapter 4, “Configuring Advanced Security” on page 146 under the heading “Example of an End-to-
End Transport Tunnel mode” replace the word BRCD7500 with Remote Host and replace steps 1
through 9 with the following:
Secure traffic between two systems using AH protection with MD5 and configure IKE with pre-
shared keys. The two systems are a switch, BROCADE300 (IPv4 address 10.33.74.13), and an
external host (10.33.69.132).
1. On the system console, log in to the switch as Admin and enable IPsec.
switch:admin> ipsecconfig –enable
2. Create an IPsec SA policy named AH01, which uses AH protection with MD5.
switch:admin> ipsecconfig --add policy ips sa -t AH01 \
-p ah -auth hmac_md5
3. Create an IPsec proposal IPSEC-AH to use AH01 as SA.
switch:admin> ipsecconfig --add policy ips sa-proposal \
-t IPSEC-AH -sa AH01
4. Configure the SA proposal's lifetime in time units.
switch:admin> ipsecconfig --add policy ips sa-proposal \
-t IPSEC-AH -lttime 280000 -sa AH01
On page 150, in Table 41, the row for IPSec applies to FCIP IPSec. For IPSec (Ethernet), only MD5 is
blocked in FIPS mode. DH group 1 is FIPS compliant and is not blocked.
In Chapter 8, “Installing and Maintaining Firmware” on page 220, the following paragraph should be
added to the caution statement:
On page 290, in Chapter 10, in Table 69, for the FS8-18 blade, change the support under the Brocade
48000 (CP4) heading to ‘unsupported’.
On page 351, in the section “Limitations and restrictions of Traffic Isolation,” add the following items:
• Two N_Ports that have the same shared area cannot be configured in different TI zones.
This limitation does not apply to E_Ports that use the same shared area.
For example, the following figure shows two hosts and three targets in two TI zones.
Assume that Host 1, Host 2, Target 1, Target 2, and Target 3 are also included in a
regular zone, Zone A. Even though the hosts and targets are all in the same zone, if
failover is disabled on the TI zones, traffic from Host 1 is isolated to the dashed line and
Host 1 cannot communicate with Target 2. Likewise, traffic from Host 2 is isolated to the
dotted line and Host 2 cannot communicate with Target 1.
Host 1 can communicate with Target 3, however, because even though N_Port 3 is in a
different TI zone than Host 1, Host 1 and Target 3 are connected to the same switch, with
no E_Ports between.
In chapter 16, “Using the FC-FC Routing Service,” under the section Supported Configurations on page
428, add the following note after the last paragraph:
In configurations with two backbones connected to the same edge fabric, routing is not
supported between edge fabrics that are not directly attached to the same backbone.
Routing over multiple backbones is a multi-hop topology and is not allowed.
In chapter 20, “Configuring and Monitoring FCIP Extension Services,” under the heading “Constraints
for FC FastWrite” on page 540, the following bullet should be added to the list of bullets:
On page 420, in the section “QoS zones,” replace the last paragraph on the page (the paragraph
starting with “A QoS zone has a special name…”) with the following:
A QoS zone has a special name, to differentiate it from a regular zone. The format of the QoS
zone name is as follows:
Where id is a flow identifier that designates a specific virtual channel for the traffic flow and xxxxx
is the user-defined portion of the name. For example, the following are valid QoS zone names:
QOSH3_HighPriorityTraffic
QOSL1_LowPriorityZone
The switch automatically sets the priority for the “host, target” pairs specified in the zones based
on the priority level (H or L) in the zone name.
The flow id allows you to have control over the VC assignment and control over balancing the flows
throughout the fabric. The id is from 1 – 5 for high priority traffic, which corresponds to VCs 10 –
14. For low priority traffic, the id is from 1 – 2, which corresponds to VCs 8 and 9. The id is
optional; if it is not specified, the virtual channels are allocated using a round-robin scheme.
On page 424, in the section “Setting traffic prioritization,” replace step 2 with the following:
2. Enter the zoneCreate command. The format varies depending on whether you want high or
low priority traffic.
where:
id A flow identifier that indicates a specific virtual channel to which the traffic is
assigned. This value is from 1 – 5 for high priority traffic and from 1 – 2 for
low priority traffic.
zonename The user-defined part of the name of the zone to be created.
member A member or list of members to be added to the zone. A zone member must
be specified using WWN only.
In Section II, “Licensed Features,” the chapter numbering is wrong. The correct chapter numbers
should be:
Chapter 16, “Optimizing Fabric Behavior”
Chapter 17, “Using the FC-FC Routing Service”
Chapter 18, “Administering Advanced Performance Monitoring”
Chapter 19, “Administering Extended Fabrics”
Chapter 20, “Administering ISL Trunking”
Chapter 21, “Configuring and Monitoring FCIP Extension Services”
Chapter 22, “FICON Fabrics”
Chapter 23, “Configuring and Monitoring FICON Extension Services”
The chapter numbers referred to in the “Documentation Updates” section of this release note refer to
the original chapter numbers.
The following text should be added to the bpPortloopbackTest (page 55) and the bpTurboramTest
commands (page 57) and the associated man pages on the switch:
• A [--slot
--slot slotnumber] operand should be added to the syntax. This operand specifies the
slotnumber and is required on bladed systems.
• The following text should be added to both commands: “Before running this diagnostic, you
must disable the chassis and clear all logs using the following command sequence:
1. chassisdisable
2. slotstatsclear
3. diagclearerror -all
4. burninerrclear
5. cryptocfg --disableEE
--disableEE (if the encryption engine is in enabled state)”
This procedure disables the chassis, the encryption engine, and clears all logs. Failure to run this
procedure will cause the diagnostic to abort with failure status.
On page 89, cfgDefault command and associated man page: The new –chassis parameter introduced
in this release is currently unavailable. When you execute configdefault –chassis in the root or admin
role, permission denied message is displayed. Use the –all parameter instead.
On page 543, portCfg command and associated man page, the following should be changed:
On page 787”systemVerification” command and associated man page, the following should be
changed:
• The -fru
fru type parameter is invalid and should not be used.
• The first note in the Notes section should read, “The switch must be offline for this command
to run. If Virtual Fabrics are enabled on the switch, run chassisDisable to take all Logical
Switches offline.”
• The third note in the Notes section should read, “On platforms that include a security
processor, you must disable the security processor by running cryptocfg --disableEE
--disableEE slot
before running systemVerification.
systemVerification You must re-enable the security processor with the
cryptocfg -enablEE slot command once system verification is complete.”
• The following note should be added to the Notes section: “Do not perform any configuration
changes such as configUpload or configDownload while the systemVerification test is in
progress.”
On page 853: The permission table in the command availability chapter, Appendix A, for the aptpolicy
command incorrectly states that the command requires chassis permissions. This is not the case as
this command is executed on a per logical switch basis. The context value for aptpolicy should read
VF and the switch type is “All”.
The following error should be corrected in the man page for the configure command:
• The man page currently states about the Allow XISL use parameter: “On the Brocade 5100 or
5300 default switch, the Feature is disabled by default (default value: yes).”
• The description should be corrected to read, “On the Brocade 5100 or 5300 default switch,
the Feature is disabled by default (default value: no).”
• Note that the corresponding description in the Command Reference (page 107) is correct.
On page 47, in the “Preinstallation Messages” section, append the first paragraph and following
courier text with the following additional information:
The blocking cases, except the new cases specific to Fabric OS v6.2.2, can be removed. The
blocking cases are not accumulative from version to version.
Downgrade is not allowed because VF is enabled. Please run "lscfg --config" and "lscfg --delete"
commands to remove the non-default LS first, then run "fosconfig --disable vf" to disable VF
before proceeding."
Downgrade is not allowed because AG is enabled. Please run "ag --modedisable" command to
disable AG mode before proceeding."
The FS8-18 (type 43) blade is not supported by the target firmware. Please use slotshow to
find out which slot it is in and remove it first."
DCX-4S is not supported by the target firmware. Please try to download another firmware.
In Chapter 7, “Fabric Watch default settings,” a number of default setting high thresholds were
changed, as follows:
• On page 45, “Port Class Default Settings,” the link failure count (high) setting was
changed from 1000 to 500. The loss of synchronization count (high) was changed from
1000 to 500.
• On page 47, “E_Port Class Default Settings,” the link failure count (high) setting was
changed from 5 to 500. The loss of synchronization count (high) was changed from 1000
to 500.
• On page 49, “F/FL_Port Class Default Settings,” the link failure count (high) setting was
changed from 1000 to 500. The loss of synchronization count was changed from 1000
to 500.
In Chapter 8, on page 58, the example in step 3 is missing the Link Reset class. The new menu is as
follows:
1: Link loss
2: Sync loss
3: Signal loss
4: Protocol error
5: Invalid words
6: Invalid CRCs
7: RXPerformance
8: TXPerformance
9: State Changes
10: Link Reset
11: return to previous page
• 10: coreblade(10)
• 11: applicationblade(11)
The entry for the brocade 5100 in Table 11 (Access Gateway Default F_Port-to-N_Port Mapping) on
page 55 should read as follows:
• On page 77, under the topic “Master Keys”, the opening sentence should read, “When an
RSA or SKM key vault is used”.
• On page 78, the three bulleted items should include SKM, as follows:
• On page 95, the following lines should be removed from the Help command output.
• On page 119, Step 2, “Set the RKM key vault type” should read “Set the SKM key vault
type”.
• On page 119, Step 3a, the cryptocfg command example should have the -KACcsr option
rather than -KACCert, e.g., cryptocfg --export -scp -KACcsr
KACcsr.
KACcsr
You must generate a master key on the group leader, and export it to a backup location.
SecurityAdmin:switch>cryptocfg --genmasterkey
SecurityAdmin:switch>cryptocfg –exportmasterkey
3. Enter the pass phrase when prompted. The pass phrase is used for the master key
encryption. A pass phrase must be between 8 and 40 characters in length and can
contain any character combination. Make a note of the key ID and the pass phrase. You
will need the key ID and pass phrase if you should need to restore the master key from
backup.
SecurityAdmin:switch cryptocfg --export -scp -currentMK <host IP> <host user> <host file path>
All references to the FC4-16IP blade (iSCSI blade) should be ignored. The DCX Backbone does NOT
support the FC4-16IP.
The Power Cords table of Appendix A - Specifications should read as follows:
Power cords
The types of power cords provided with the Brocade DCX are specific to the country where it is
installed. For each of these types of power cords (Table 5), the end that connects to the Brocade DCX
has an IEC 60320/C19 cable connector. The AC power receptacles on each power supply are
equipped with IEC 60320/C20 power connectors.
Argentina X
Australia X
Austria X
Bahrain X
Belgium X
Brazil X
Chile X
China, People’s X
Rep
Czech, Rep. of X
Denmark X
Egypt X
England X
Finland X
France X
Germany X
Greece X
Hong Kong X
Hungary X
India X
Indonesia X
Ireland, North X
Ireland, South X
Israel X
Italy X
Japan X
Korea, South X
Malaysia Alternate Recommended
Mexico X
Monaco X
Netherlands X
New Zealand X
Norway X
Poland X
Portugal X
Puerto Rico X
Russia X
Saudi Arabia X
Scotland X
Singapore X
South Africa X
Spain X
Sweden X
Switzerland X
Taiwan x
Turkey X
United Arab X
Emirates
United X
Kingdom/
Ireland
United States X
Venezuela X
Yugoslavia X
The entry for step 8 on page 65 should be deleted. When you pull the WWN card out by the pull tab
(step 7), it unplugs directly from the backplane.
2. Hold the card by the pull tab and plug the card into the backplane. Use the Philips
screwdriver and the captive screw to attach the WWN card to the chassis.
Table 1 on page 19 describes LED operation for the power supply. Following is an addition to this
table.
Power Supply Status Flashing green Power supply failure. Replace power supply.
Brocade 7500 Extension Switches Hardware Reference Manual (Publication Number 53-1000026-
04)
Table 4 on page 25 describes LED operation for the Fibre Channel ports. Following is an addition to
this table that describes operation of the two GbE ports.
Port Status No light No signal or light carrier Verify the unit power
(media or cable) LED is on, and check
detected. the SFP and cable.
No SFP installed or
A fully populated Brocade 48000 with eight FC8-32 or eight FC8-16 port blades does not have enough
power with only one power supply. It is recommended that the 48000 be configured with four power
supplies in this scenario. The blades will not power down or fail to power up unless three power
supplies fail. A fully populated 48000 will continue to operate properly with two power supplies.
The Hardware Components section on page 2 should include the following sub-bullet beneath the
“Modular hot-swappable field replaceable units (FRUs) bullet:
• Two power supplies are required at all times in a fully populated 48000 chassis.
Under “Regulatory Compliance” in “Product Specifications” (Appendix A), add the following statement:
Power Cords (Japan, Denan)
Attention: Never use the power cord packed with your equipment for other products.
Brocade SilkWorm Multiprotocol Router Model AP7420 Hardware Reference Manual (Publication
Number 53-1000179-01)
Under “Regulatory Compliance” in “Specifications and Regulatory Compliance” (Appendix A), add the
following statement:
Power Cords (Japan, Denan)
Attention: Never use the power cord packed with your equipment for other products.
Change the IP address, subnet mask, and gateway address as directed by the customer. To
change the addresses, type the following and press Enter.
Enter
system ip address xxx.xxx.xxx.xxx yyy.yyy.yyy.yyy zzz.zzz.zzz.zzz
The IP address is xxx.xxx.xxx.xxx, the subnet mask is yyy.yyy.yyy.yyy, and the gateway address
is zzz.zzz.zzz.zzz, where the octets xxx, yyy, and zzz are decimals from zero through 255. If an
address is to remain unchanged, type the current address in the respective field.
On page 515, in Chapter 86, the “TRCK-1004” raslog messages are not logged in v6.2.2 due to
Feature deprecation.