Configuring switched point-to-point ficon – Brocade FICON Administrator’s Guide (Supporting Fabric OS v7.3.0) User Manual
Page 39

Cascaded FICON and two-byte addressing considerations
The following are considerations when installing a switch in a FICON environment where two-byte
addressing is used. Two-byte addressing is always used in cascaded environments but may be used in
single-switch fabrics as well. Making changes to your switch or backbone may require scheduled
downtime.
•
All fabric operating parameters, such as timeout values, must be the same. If you have not made
any changes outside the scope of this document, there is nothing additional to consider regarding
these parameters.
•
The domain IDs of all switches must be unique and insistent.
•
Although not required, it will be easier to configure the security policies if the zoning matches.
Ensuring proper zoning configuration, ISL connections, and that switches and backbones have
merged into a fabric will also make the process of setting the security attributes much easier.
Configuring switched point-to-point FICON
This section provides detailed steps and commands to configure a switch for point-to-point FICON
operation. The following steps assume that you have used your hardware reference manual to perform
the initial setup of the switch and have performed all the steps from
on
page 36.
For basic steps and commands in a checklist format to quickly configure a switch for fabric and possible
FICON operation, refer to the Basic Switch Configuration chapter, then return to this chapter for detailed
FICON configuration procedures.
Use the worksheet in the Configuration Information Record appendix to record your configuration
information.
on page 28 for a list of FICON-related Fabric OS commands.
CAUTION
Configuring the switch for FICON is a disruptive process. The switch must be disabled to
configure switch parameters.
1.
Connect to the switch and log in using an account assigned to the admin role.
2.
Enter the switchDisable command. You will need to disable the switch to access all the switch
parameters.
3.
Configure the switch and chassis name, if applicable.
4.
Set the routing policy by entering the aptPolicy command.
Port-based routing (PBR) and device-based routing (DBR) are qualified for System z; however,
reference your system qualification letter for current support information. The recommended policy
is DBR (aptPolicy 2).
If FICON Emulation features (IBM z/OS Global Mirror or Tape Pipelining) are enabled on an FCIP
Tunnel in the switch, PBR or (aptPolicy 1) must be used.
5.
Configure Dynamic Load Sharing.
The recommended best practice is to enable Dynamic Load Sharing (DLS); however, DLS is only
supported when Lossless is enabled.
•
To enable Lossless with DLS, use the dlsSet --enable -lossless command.
•
If Lossless will not be used, use the dlsReset command.
Cascaded FICON and two-byte addressing considerations
FICON Administrator's Guide
37
53-1003144-01