Managing cables, Powering off the switch, Configuring for encryption – Brocade Encryption Switch QuickStart Guide (Supporting Fabric OS v6.1.1_enc) User Manual

Page 19: Summary of procedure

Advertising
background image

Encryption Switch QuickStart Guide

19 of 20

53-1001118-01

Managing cables

ATTENTION

The minimum bend radius for a 50 micron cable is 2 in. under full tensile load and 1.2 in. with no tensile load.

Cables can be organized and managed in a variety of ways: for example, using cable channels on the sides of the
cabinet or patch panels to minimize cable management. Following is a list of recommendations:

Plan for rack space required for cable management before installing the switch.

Leave at least 3.28 ft (1 m) of slack for each port cable. This provides room to remove and replace the
switch, allows for inadvertent movement of the rack, and helps prevent the cables from being bent to less
than the minimum bend radius.

If you are using Brocade ISL Trunking, consider grouping cables by trunking groups. The cables used in
trunking groups must meet specific requirements, as described in the Fabric OS Administrator’s Guide.

For easier maintenance, label the fiber optic cables and record the devices to which they are connected.

Keep LEDs visible by routing port cables and other cables away from the LEDs.

Use Velcro™ straps to secure and organize fibre optic cables. Do not use tie wraps on fiber optic cables,
because wraps are easily overtightened and can damage the optic fibers.

Powering off the switch

Complete the following steps to power off the switch.

1. Using the CLI, enter the sysshutdown command.

2. Set both AC power switches to “0”.

3. Remove both power cords from facility power.

Configuring for encryption

NOTE

Refer to the Fabric OS Encryption Administrator’s Guide for the procedures to configure the encryption functions.

Summary of procedure

If the Brocade Encryption Switch is being configured for the first time for encryption services, you will need to
perform several pre-initialization tasks related to configuring the encryption node (switch), including:

Generating the Critical Security Parameters (CSPs) and certificates

Loading and setting up the certificates

Establishing a trusted link (LKM Appliance)

Configuring the global parameters and policies of the encryption group

Generating and backing up the master key in RSA environments

Handling key-vault high-availability

Configuring cluster interconnect

Advertising