beautypg.com

Managing cables, Powering off the switch, Configuring for encryption – Brocade Encryption Switch Hardware Reference Manual (Supporting Fabric OS v6.1.1_enc) User Manual

Page 35: Summary of procedure

background image

Brocade Encryption Switch Hardware Reference Manual

21

53-1001117-02

2

Managing cables

ATTENTION

The minimum bend radius for a 50 micron cable is 2 in. under full tensile load and 1.2 in. with no
tensile load.

Cables can be organized and managed in a variety of ways: for example, using cable channels on
the sides of the cabinet or patch panels to minimize cable management. Following is a list of
recommendations:

Plan for rack space required for cable management before installing the switch.

Leave at least 3.28 ft (1 m) of slack for each port cable. This provides room to remove and
replace the switch, allows for inadvertent movement of the rack, and helps prevent the
cables from being bent to less than the minimum bend radius.

If you are using Brocade ISL Trunking, consider grouping cables by trunking groups. The
cables used in trunking groups must meet specific requirements, as described in the
Fabric OS Administrator’s Guide.

For easier maintenance, label the fiber optic cables and record the devices to which they
are connected.

Keep LEDs visible by routing port cables and other cables away from the LEDs.

Use Velcro straps to secure and organize fibre optic cables. Do not use tie wraps on fiber
optic cables, because wraps are easily overtightened and can damage the optic fibers.

Powering off the switch

Complete the following steps to power off the switch.

1. Using the CLI, enter the sysshutdown command.

2. Set both AC power switches to “0”.

3. Remove both power cords from facility power.

Configuring for encryption

NOTE

Refer to the Fabric OS Encryption Administrator’s Guide for the procedures to configure the
encryption functions.

Summary of procedure

If the Brocade Encryption Switch is being configured for the first time for encryption services, you
will need to perform several pre-initialization tasks related to configuring the encryption node
(switch), including:

Generating the Critical Security Parameters (CSPs) and certificates

Loading and setting up the certificates

Establishing a trusted link (LKM Appliance)