Finding assigned thresholds, Viewing thresholds – Brocade Network Advisor IP User Manual v12.3.0 User Manual

Page 860

Advertising
background image

808

Brocade Network Advisor IP User Manual

53-1003153-01

Editing thresholds

21

Use to block a port when a state change violation type meets the Fabric OS switch threshold. For
4 Gbps Router, Extension Switches and Blades only, when you apply this threshold on an E Port, the
threshold is also applied to the VE Ports (internally by Fabric OS).

To edit an State Change threshold, complete the following steps.

1. Select Monitor > Fabric Watch > Port Fencing.

The Port Fencing dialog box displays.

2. Select State Change (Fabric OS only) from the Violation Type list.

3. Select the threshold you want to change and click Edit.

The Edit State Change Threshold dialog box displays.

4. Complete

step 4

through

step 7

in

“Adding a State Change threshold”

on page 802.

5. Click OK to add the state change threshold to the table and close the Edit State Change

Threshold dialog box.

To assign this threshold to fabrics, switches, or switch ports, refer to

“Assigning thresholds”

on

page 803.

6. Click OK on the Port Fencing dialog box.

Finding assigned thresholds

The Management application allows you to find all ports with a specific threshold applied.

NOTE

This search is performed on the threshold name. Since Fabric OS devices do not retain the threshold
name, the ability to search for a threshold on a Fabric OS device is not available in most cases.

To find assigned thresholds, complete the following steps.

1. Select Monitor > Fabric Watch > Port Fencing.

The Port Fencing dialog box displays.

2. Select a threshold type from the Violation Type list.

3. Select a threshold from the Threshold table.

4. Click Find.

5. Every port which uses the selected threshold is highlighted in the Ports table.

6. Click OK on the Port Fencing dialog box.

Viewing thresholds

1. Select Monitor > Fabric Watch > Port Fencing.

The Port Fencing dialog box displays.

2. Select a threshold type from the Violation Type list.

3. Review the Thresholds and Ports tables.

4. Repeat

step 2

and

step 3

, as necessary.

Advertising