Defining custom WWN-N port mappings.........................................................................................................................................................................................171
Access Gateway policy modification.............................................................................................................................................................................................................172
Path Failover and Failback policies.......................................................................................................................................................................................................172
Modifying Path Failover and Failback policies...............................................................................................................................................................................172
Enabling the Automatic Port Configuration policy................................................................................................................................................................................ 172
Administering Extended Fabrics................................................................................................................................................................................................................................ 175
Extended link buffer allocation overview.....................................................................................................................................................................................................175
Configuring a port for long distance.............................................................................................................................................................................................................. 178
Routing Traffic........................................................................................................................................................................................................................................................................181
Routing overview........................................................................................................................................................................................................................................................181
Viewing fabric shortest path first routing.................................................................................................................................................................................................... 182
Configuring dynamic load sharing................................................................................................................................................................................................................. 182
Lossless dynamic load sharing..............................................................................................................................................................................................................183
Specifying frame order delivery.......................................................................................................................................................................................................................183
Configuring the link cost for a port.................................................................................................................................................................................................................184
E_Port balance priority..........................................................................................................................................................................................................................................184
Configuring Standard Security Features...............................................................................................................................................................................................................187
User-defined accounts..........................................................................................................................................................................................................................................187
Virtual Fabrics considerations.................................................................................................................................................................................................................188
Admin Domain considerations...............................................................................................................................................................................................................188
Viewing user account information........................................................................................................................................................................................................189
Creating user-defined accounts............................................................................................................................................................................................................ 189
Deleting user-defined accounts............................................................................................................................................................................................................ 192
Changing user account parameters ...................................................................................................................................................................................................193
Maintaining passwords............................................................................................................................................................................................................................... 194
User-defined roles...................................................................................................................................................................................................................................................196
Guidelines and restrictions........................................................................................................................................................................................................................196
Creating a user-defined role....................................................................................................................................................................................................................196
Editing a user-defined role........................................................................................................................................................................................................................197
Access control list policy configuration....................................................................................................................................................................................................... 198
Virtual Fabrics considerations.................................................................................................................................................................................................................198
Admin Domain considerations...............................................................................................................................................................................................................198
Creating an SCC, DCC, or FCS policy...............................................................................................................................................................................................198
Editing an SCC, DCC, or FCS policy.................................................................................................................................................................................................. 199
Deleting all SCC, DCC, or FCS policies............................................................................................................................................................................................ 199
Activating all SCC, DCC, or FCS policies.........................................................................................................................................................................................199
Distributing an SCC, DCC, or FCS policy......................................................................................................................................................................................200
Moving an FCS policy switch position............................................................................................................................................................................................ 200
Configuring Advanced Device Security policy ..........................................................................................................................................................................200
Fabric-Wide Consistency Policy configuration.......................................................................................................................................................................................201
Authentication policy configuration............................................................................................................................................................................................................. 202
Configuring authentication policies for E_Ports.........................................................................................................................................................................202
Configuring authentication policies for F_Ports......................................................................................................................................................................... 202
Distributing authentication policies.................................................................................................................................................................................................... 203
Re-authenticating policies.......................................................................................................................................................................................................................203
Setting a shared secret key pair...........................................................................................................................................................................................................203
Modifying a shared secret key pair....................................................................................................................................................................................................204
Setting the Switch Policy Authentication mode..........................................................................................................................................................................204
SNMP configuration.............................................................................................................................................................................................................................................204
Brocade Fabric OS Web Tools Administration Guide, 8.0.1
53-1004127-02 9