Finding assigned thresholds, Viewing thresholds – Brocade Network Advisor SAN + IP User Manual v12.3.0 User Manual

Page 1368

Advertising
background image

1296

Brocade Network Advisor SAN + IP User Manual

53-1003155-01

Editing thresholds

29

Use to block a port when a state change violation type meets the Fabric OS switch threshold. For
4 Gbps Router, Extension Switches and Blades only, when you apply this threshold on an E Port, the
threshold is also applied to the VE Ports (internally by Fabric OS).

To edit an State Change threshold, complete the following steps.

1. Select Monitor > Fabric Watch > Port Fencing.

The Port Fencing dialog box displays.

2. Select State Change (Fabric OS only) from the Violation Type list.

3. Select the threshold you want to change and click Edit.

The Edit State Change Threshold dialog box displays.

4. Complete

step 4

through

step 7

in

“Adding a State Change threshold”

on page 1290.

5. Click OK to add the state change threshold to the table and close the Edit State Change

Threshold dialog box.

To assign this threshold to fabrics, switches, or switch ports, refer to

“Assigning thresholds”

on

page 1291.

6. Click OK on the Port Fencing dialog box.

Finding assigned thresholds

The Management application allows you to find all ports with a specific threshold applied.

NOTE

This search is performed on the threshold name. Since Fabric OS devices do not retain the threshold
name, the ability to search for a threshold on a Fabric OS device is not available in most cases.

To find assigned thresholds, complete the following steps.

1. Select Monitor > Fabric Watch > Port Fencing.

The Port Fencing dialog box displays.

2. Select a threshold type from the Violation Type list.

3. Select a threshold from the Threshold table.

4. Click Find.

5. Every port which uses the selected threshold is highlighted in the Ports table.

6. Click OK on the Port Fencing dialog box.

Viewing thresholds

1. Select Monitor > Fabric Watch > Port Fencing.

The Port Fencing dialog box displays.

2. Select a threshold type from the Violation Type list.

3. Review the Thresholds and Ports tables.

4. Repeat

step 2

and

step 3

, as necessary.

Advertising