Brocade FICON Administrator’s Guide (Supporting Fabric OS v7.3.0) User Manual
Page 3

Contents
Text formatting conventions.................................................................. 5
Command syntax conventions.............................................................. 5
Notes, cautions, and warnings.............................................................. 6
Brocade resources............................................................................................ 7
Contacting Brocade Technical Support.............................................................7
Document feedback.......................................................................................... 8
Fabric OS support for FICON..............................................................11
Latency guideline................................................................................ 12
FICON concepts..............................................................................................13
FICON configurations......................................................................................14
Cascaded zoning................................................................................ 24
Error reporting..................................................................................... 26
Secure access control.........................................................................26
FICON commands.......................................................................................... 28
Link and FC addressing.................................................................................. 30
Enabling the insistent domain ID.........................................................34
Creating and activating the SCC policy...............................................34
Enabling the fabric-wide consistency policy........................................35
Enabling High-Integrity Fabric mode...................................................35
Using other security commands..........................................................36
Cascaded FICON and two-byte addressing considerations............... 37
Configuring switched point-to-point FICON.....................................................37
Configuring cascaded FICON......................................................................... 41
FCR and FICON cascading............................................................................ 42
FICON and FICON CUP in Virtual Fabrics..................................................... 43
Addressing modes.......................................................................................... 44
FICON Administrator's Guide
1
53-1003144-01