Brocade Network Advisor SAN User Manual v12.3.0 User Manual

Page 1076

Advertising
background image

1024

Brocade Network Advisor SAN User Manual

53-1003154-01

Configuring a switch for FICON operation

25

18. Define port fencing parameters for the switch using the following steps (optional):

NOTE

Although this is an optional step, best practice is to configure port fencing.

a. Configure thresholds that you require for the switch using steps under the “Adding

thresholds” in

Chapter 24, “Port Fencing”

.

Following are recommend parameters for the various thresholds:

C3 Discard Frames = 2 per minute.

Invalid Words = 25 per minute.

Invalid CRCs = 3 per minute. Note that it is not uncommon for an ISL to travel through
a path that is more prone to noise than internal data center connections to control
units and channels. Therefore, a slightly higher CRC threshold may be better for E-Port
connections. In most cases the CRC is set to 3.

Link Reset = 2 per minute.

Protocol Error = 2 per minute.

State Change = 7 per minute.

b. Assign a threshold to the switch using steps under “Assigning thresholds” in

Chapter 24,

“Port Fencing”

.

19. Set the zoning policy for the switch by referring to steps under “Enabling or disabling the

default zone for fabrics” in

Chapter 21, “Zoning”

.

The recommended policy is to disable the default zone (No Access). Although enabling the
default zone (All Access) can be used for FICON environments, prohibiting connection between
ports using the Configure Allow/Prohibit Matrix dialog box requires activating at least one zone.
Even if you do not want to prohibit connections using the matrix, configuring a single zone
containing all ports provides the same benefits as All Access, while providing flexibility to
configure “prohibits” or more restrictive zoning in the future. In addition, when moving an ISL in
the future, there will not need to modify zoning.

20. Configure zoning using steps under “Configuring zoning” in

Chapter 21, “Zoning”

.

Be sure to reference the “Zoning and FICON” section of

Chapter 21, “Zoning”

for more

information on FICON environments.

21. Configure the Allow/Prohibit Matrix for the switch using steps under

“Configuring an

Allow/Prohibit Matrix”

on page 1025.

22. Configure Call Home by referring to procedures in

Chapter 9, “Call Home”

.

NOTE

The call home number and the events to trigger a call home depend on your service contract
and service provider. Contact your service provider for additional information.

Advertising