Ficon environments, Ficon configurations, Chapter 23 – Brocade Network Advisor IP User Manual v12.1.0 User Manual

Page 797: Chapter 23, “ficon environments

Advertising
background image

Brocade Network Advisor IP User Manual

743

53-1002947-01

Chapter

23

FICON Environments

In this chapter

FICON configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 743

Configuring a switch for FICON operation . . . . . . . . . . . . . . . . . . . . . . . . . . 744

Configuring an Allow/Prohibit Matrix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 750

Configuring an Allow/Prohibit Matrix manually . . . . . . . . . . . . . . . . . . . . . . 752

Saving or copying Allow/Prohibit Matrix configurations to another device 753

Activating an Allow/Prohibit Matrix configuration . . . . . . . . . . . . . . . . . . . . 756

Deleting an Allow/Prohibit Matrix configuration . . . . . . . . . . . . . . . . . . . . . 757

Changing the Allow/Prohibit Matrix display . . . . . . . . . . . . . . . . . . . . . . . . . 757

Cascaded FICON fabric . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 758

Cascaded FICON fabric merge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 761

Port groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 766

Swapping blades . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 769

FICON configurations

NOTE

FICON configurations are available only for Fabric OS products.

IBM Fibre Connection (FICON) is a protocol used between IBM (and compatible) mainframes and
storage. FICON configurations can be categorized into three types, based on complexity:

Point-to-point configurations that do not use a switch.

Switched point-to-point configurations, also called single switch configurations, connect a host
channel to a storage control unit using a single switch. In this type of configuration, the
channel is configured to use single-byte addressing.

Cascaded configurations, also called high integrity fabrics, connect host channels and storage
control units that reside in different domains. Cascaded FICON fabrics must be configured as
high integrity fabrics. In this type of configuration, the channel is configured to use two-byte link
addressing.

Figure 255

and

Figure 256

are examples of cascaded FICON configurations. IBM

does not support configurations that have more than two domains in a path from a FICON
Channel interface to a FICON Control Unit interface to Channel-to-Channel (CTC) except under
special circumstances.

Advertising