Managing cables, Powering off the switch, Configuring for encryption – Brocade Encryption Switch Hardware Reference Manual (Supporting Fabric OS v6.1.1_enc) User Manual
Page 35: Summary of procedure

Brocade Encryption Switch Hardware Reference Manual
21
53-1001117-02
2
Managing cables
ATTENTION
The minimum bend radius for a 50 micron cable is 2 in. under full tensile load and 1.2 in. with no
tensile load.
Cables can be organized and managed in a variety of ways: for example, using cable channels on
the sides of the cabinet or patch panels to minimize cable management. Following is a list of
recommendations:
•
Plan for rack space required for cable management before installing the switch.
•
Leave at least 3.28 ft (1 m) of slack for each port cable. This provides room to remove and
replace the switch, allows for inadvertent movement of the rack, and helps prevent the
cables from being bent to less than the minimum bend radius.
•
If you are using Brocade ISL Trunking, consider grouping cables by trunking groups. The
cables used in trunking groups must meet specific requirements, as described in the
Fabric OS Administrator’s Guide.
•
For easier maintenance, label the fiber optic cables and record the devices to which they
are connected.
•
Keep LEDs visible by routing port cables and other cables away from the LEDs.
•
Use Velcro straps to secure and organize fibre optic cables. Do not use tie wraps on fiber
optic cables, because wraps are easily overtightened and can damage the optic fibers.
Powering off the switch
Complete the following steps to power off the switch.
1. Using the CLI, enter the sysshutdown command.
2. Set both AC power switches to “0”.
3. Remove both power cords from facility power.
Configuring for encryption
NOTE
Refer to the Fabric OS Encryption Administrator’s Guide for the procedures to configure the
encryption functions.
Summary of procedure
If the Brocade Encryption Switch is being configured for the first time for encryption services, you
will need to perform several pre-initialization tasks related to configuring the encryption node
(switch), including:
•
Generating the Critical Security Parameters (CSPs) and certificates
•
Loading and setting up the certificates
•
Establishing a trusted link (LKM Appliance)