Brocade Communications Systems 53-1002745-02 Marine Radio User Manual


 
16 Fabric OS Administrator’s Guide
53-1002745-02
Changing bottleneck detection parameters . . . . . . . . . . . . . . . . . .384
Examples of applying and changing bottleneck detection
parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .385
Advanced bottleneck detection settings . . . . . . . . . . . . . . . . . . . . .388
Excluding a port from bottleneck detection . . . . . . . . . . . . . . . . . .389
Displaying bottleneck statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . .391
Disabling bottleneck detection on a switch . . . . . . . . . . . . . . . . . .392
Chapter 14 In-flight Encryption and Compression
In-flight encryption and compression overview. . . . . . . . . . . . . . . .393
Encryption and compression restrictions. . . . . . . . . . . . . . . . .394
How encryption and compression are enabled . . . . . . . . . . . .396
Authentication and key generation. . . . . . . . . . . . . . . . . . . . . .398
Availability considerations. . . . . . . . . . . . . . . . . . . . . . . . . . . . .398
Virtual Fabrics considerations. . . . . . . . . . . . . . . . . . . . . . . . . .399
Recommendation for compression. . . . . . . . . . . . . . . . . . . . . .399
Configuring encryption and compression . . . . . . . . . . . . . . . . . . . .399
Viewing the encryption and compression configuration . . . . .401
Port speed and encryption/compression enabled ports . . . .401
Changing port speed on encryption/compression enabled
ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .402
Compression ratios and encryption/compression enabled
ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .402
Configuring and enabling authentication. . . . . . . . . . . . . . . . .403
Configuring encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .404
Configuring compression. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .404
Disabling encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .405
Disabling compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .405
Encryption and compression examples. . . . . . . . . . . . . . . . . . . . . .406
Example of enabling encryption and compression on an
E_Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .407
Examples of disabling encryption and compression. . . . . . . .410
Working with EX_Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .411
In-flight encryption/compression on EX_Ports . . . . . . . . . . . .411
Example of enabling encryption and compression on an
EX_Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .412
Chapter 15 NPIV
NPIV overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .419
Upgrade considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .420
Fixed addressing mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .420
10-bit addressing mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .420
Configuring NPIV . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .421
Enabling and disabling NPIV . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .422
Viewing NPIV port configuration information . . . . . . . . . . . . . . . . .423
Viewing virtual PID login information . . . . . . . . . . . . . . . . . . . .424