Brocade Network Advisor SAN User Manual v12.1.0 User Manual
Page 948
900
Brocade Network Advisor SAN User Manual
53-1002948-01
Configuring a switch for FICON operation
25
18. Define port fencing parameters for the switch using the following steps (optional):
NOTE
Although this is an optional step, best practice is to configure port fencing.
a. Configure thresholds that you require for the switch using steps under the “Adding
thresholds” in
Chapter 30, “Port Fencing”
.
Following are recommend parameters for the various thresholds:
•
C3 Discard Frames = 2 per minute.
•
Invalid Words = 25 per minute.
•
Invalid CRCs = 3 per minute. Note that it is not uncommon for an ISL to travel through
a path that is more prone to noise than internal data center connections to control
units and channels. Therefore, a slightly higher CRC threshold may be better for E-Port
connections. In most cases the CRC is set to 3.
•
Link Reset = 2 per minute.
•
Protocol Error = 2 per minute.
•
State Change = 7 per minute.
b. Assign a threshold to the switch using steps under “Assigning thresholds” in
Chapter 30,
“Port Fencing”
.
19. Set the zoning policy for the switch by referring to steps under “Enabling or disabling the
default zone for fabrics” in
Chapter 27, “Zoning”
.
The recommended policy is to disable the default zone (No Access). Although enabling the
default zone (All Access) can be used for FICON environments, prohibiting connection between
ports using the Configure Allow/Prohibit Matrix dialog box requires activating at least one zone.
Even if you do not want to prohibit connections using the matrix, configuring a single zone
containing all ports provides the same benefits as All Access, while providing flexibility to
configure “prohibits” or more restrictive zoning in the future. In addition, when moving an ISL in
the future, there will not need to modify zoning.
20. Configure zoning using steps under “Configuring zoning” in
Chapter 27, “Zoning”
.
Be sure to reference the “Zoning and FICON” section of
Chapter 27, “Zoning”
for more
information on FICON environments.
21. Configure the Allow/Prohibit Matrix for the switch using steps under
22. Configure Call Home by referring to procedures in
Chapter 12, “Call Home”
.
NOTE
The call home number and the events to trigger a call home depend on your service contract
and service provider. Contact your service provider for additional information.