beautypg.com

Firmware upgrades and enabled traps, Support for administrative domains, Support for role-based access control – Brocade Fabric OS Administrators Guide (Supporting Fabric OS v7.3.0) User Manual

Page 194

background image

Access Gateway MIB support (Continued)

TABLE 33

MIB name

Description

SW-MIB

Disabled in Access Gateway because the conventions are specific to fabric switches.

In Fabric OS v6.4.0, swConnUnitPortExtensionTable is supported in Access Gateway mode.

In Fabric OS v7.0.0, SNMP allows you to access the following tables to support the Advanced
Performance Monitoring feature on Access Gateway, even if the SW-MIB is disabled:

• "swBlmPerfEEMntTable"
• "swBlmPerfFltMntTable"

FA-MIB

The connUnitSnsTable is not supported because a switch in Access Gateway does support name
server services.

CPQ-Rack MIB Supported on embedded switches only.

IF-MIB

Supported.

BD-MIB

Supported for F-ports.

FA-Ext

Supported.

SNMPv2 MIB

Supported.

Firmware upgrades and enabled traps

You can turn on and off traps individually within a trap group. By default the individual traps are turned
off even if the corresponding trap group was enabled before upgrading. You must use the
snmpconfig command to turn on the individual traps within each trap group.

Support for Administrative Domains

Administrative Domains are supported in Fabric OS v5.3.0 and later releases. An Administrative
Domain (AD) is a domain within a fabric. Administrative domains can be used to limit administrator
access within a fabric, and to provide service providers with a means to assign portions of a fabric to
individual consumers. An AD may contain switches, devices, and ports. An AD may also limit access
to a configured set of users.

The following example shows how the AD:xxx field is used in the snmpwalk command. This
command is executed on the host and it walks the entire MIB tree specified (.1).

switch# snmpwalk -v3 -a MD5 -A passpass -x AES128 -u admin1 -X passpass -n AD:4

10.20.8.17 1.3.6.1.4.1.1588.2.1.2.1.5.1 -l authPriv

Support for Role-Based Access Control

Role-Based Access Control (RBAC) is supported in Fabric OS v5.3.0 and later releases. RBAC
applies a fixed set of roles that address the access control needs of a majority of customers. Each role
is a set of permissions that can be applied to a user that controls the kinds of jobs and tasks the user
can perform on a fabric or fabric element.

Firmware upgrades and enabled traps

194

Fabric OS Administrators Guide

53-1003130-01