HP SN6000 Fibre Channel Switch Installation PDF
HP SN6000 Fibre Channel Switch Installation PDF
HP SN6000 Fibre Channel Switch Installation PDF
Reference Guide
This guide describes the HP SN6000 Fibre Channel Switch features and capabilities, planning considerations, installation,
diagnostics, and troubleshooting. This guide is intended for users who are responsible for installing and servicing network
equipment.
1 General Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Switch LEDs and controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Input power LED (green) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Heartbeat LED (green) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
System fault LED (amber). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Maintenance button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Resetting a switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Placing the switch in maintenance mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Fibre Channel ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Port LEDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Port Logged-in LED (green) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Port Activity LED (green). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Transceivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Port types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Ethernet port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Serial port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Power supplies and fans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Switch management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
QuickTools web applet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
SAN Connection Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Command line interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Enterprise Fabric Management Suite . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Simple Network Management Protocol. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Storage Management Initiative–Specification (SMI-S) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
File transfer protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2 Planning a Fabric . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Device access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Performance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Distance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Bandwidth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Latency. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Feature licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Multiple switch fabrics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Optimizing device performance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Domain ID, principal priority, and domain ID lock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Stacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Common topologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Transparent routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Switch services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
User account security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
IP security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Port binding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Connection security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Device security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Fabric management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
3 Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Site requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . ......... 33
Management station and workstation requirements . . . . . . . . . . . . . . . . . . . . . . . . . .. . ......... 33
Switch power requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . ......... 34
Environmental conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . ......... 34
4
5 Removal/Replacement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Transceiver removal and replacement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Power supply removal and replacement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
C Technical Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
General specifications. . . . . . . . . . . . .. . .. .. . .. .. . .. . .. .. . .. .. . .. . .. .. . .. .. . ..... . . . . 75
Maintainability features . . . . . . . . . . . .. . .. .. . .. .. . .. . .. .. . .. .. . .. . .. .. . .. .. . ..... . . . . 77
Fabric management specifications . . . .. . .. .. . .. .. . .. . .. .. . .. .. . .. . .. .. . .. .. . ..... . . . . 77
Weight and physical dimensions . . . . .. . .. .. . .. .. . .. . .. .. . .. .. . .. . .. .. . .. .. . ..... . . . . 78
Electrical specifications . . . . . . . . . . . .. . .. .. . .. .. . .. . .. .. . .. .. . .. . .. .. . .. .. . ..... . . . . 78
Environmental requirements . . . . . . . . .. . .. .. . .. .. . .. . .. .. . .. .. . .. . .. .. . .. .. . ..... . . . . 78
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Figures
1 SN6000 Fibre Channel Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2 Switch LEDs and controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3 Fibre Channel ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
4 Port LEDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
5 Ethernet port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
6 Serial port and pin identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
7 SN6000 power supplies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
8 Two-switch stack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
9 Three-switch stack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
10 Four-switch stack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
11 Five-switch stack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
12 Six-switch stack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
13 Attaching the rails to the switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
14 Installing the rear mounting brackets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
15 Installing the switch and rail assembly . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
16 Fastening the rail to the front of the rack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
17 Fastening the rail to the rear mounting bracket . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
18 Installing the filler panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
19 Management station and workstation cable connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
20 Switch LEDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
21 Logged-in LED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
22 SN6000 Fibre Channel Switch power supply LEDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
23 Power supply removal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
24 Power supply installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
25 Class 1 laser product label . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Tables
1 Fibre Channel port types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2 Serial port pin identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3 Zoning database limits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
4 Extended credit distances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
5 Extended credit minimum cable lengths . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
6 Port-to-port latency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
7 Management station requirements for SAN Connection Manager and Enterprise Fabric Management Suite
33
8 Workstation requirements for QuickTools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
9 8/20q and SN6000 Fibre Channel Switch rack mount kit hardware . . . . . . . . . . . . . . . . . . . . . . . . . 36
10 Document conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
11 General specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
12 Maintainability features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
13 Fabric management specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
14 Switch physical dimensions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
15 Electrical specifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
16 Environmental requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
17 Switch configuration defaults. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
18 Port configuration defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
19 Port threshold alarm configuration defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
20 Zoning configuration defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
21 SNMP configuration defaults. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
22 Services configuration defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
23 DNS host name configuration defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
24 IP version 4 Ethernet configuration defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
6
25 IP version 6 Ethernet configuration defaults . . . . . . . . . . . . . . . .. .. . .. . .. .. . .. .. . .. . .. ... . . 84
26 Event logging configuration defaults. . . . . . . . . . . . . . . . . . . . .. .. . .. . .. .. . .. .. . .. . .. ... . . 84
27 NTP server configuration defaults. . . . . . . . . . . . . . . . . . . . . . .. .. . .. . .. .. . .. .. . .. . .. ... . . 84
28 Timer configuration defaults . . . . . . . . . . . . . . . . . . . . . . . . . .. .. . .. . .. .. . .. .. . .. . .. ... . . 85
29 RADIUS configuration defaults . . . . . . . . . . . . . . . . . . . . . . . . .. .. . .. . .. .. . .. .. . .. . .. ... . . 85
30 Security configuration defaults . . . . . . . . . . . . . . . . . . . . . . . . .. .. . .. . .. .. . .. .. . .. . .. ... . . 85
31 Call Home service configuration defaults . . . . . . . . . . . . . . . . .. .. . .. . .. .. . .. .. . .. . .. ... . . 86
3 4
10
Maintenance button
The Maintenance button (Figure 2) is a dual-function momentary switch on the front panel. Its purpose is to
reset the switch or to place the switch in maintenance mode. Maintenance mode sets the IP address to
10.0.0.1 and provides access to the switch for maintenance purposes when flash memory or the resident
configuration file is corrupted. For more information, see ”Recovering a switch using maintenance
mode” (page 57).
Resetting a switch
To reset the switch, press and hold the Maintenance button with a pointed tool for less than 2 seconds. The
switch will respond as follows:
1. All the switch LEDs will illuminate except the System Fault LED.
2. After approximately 1 minute, the power-on self test (POST) begins, extinguishing the Heartbeat LED.
3. When the POST is complete, the Input Power LED is illuminated and the Heartbeat LED is flashing once
per second.
Placing the switch in maintenance mode
To place the switch in maintenance mode:
1. Isolate the switch from the fabric.
2. Press and hold the Maintenance button with a pointed tool for a few seconds until only the Heartbeat
LED (Figure 2) is illuminated. Continue holding the maintenance button until the Heartbeat LED goes
off, then release the button. The Heartbeat LED illuminates continuously while the switch is in
maintenance mode.
To exit maintenance mode and return to normal operation, press and release the Maintenance button
momentarily to reset the switch.
NOTE: Setting a Fibre Channel port that has an 8 Gb/s SFP transceiver to 1 Gb/s downs the port.
1 2
0 1 2 3 4 5 6 7 8 9 20 22
10 11 12 13 14 15 16 17 18 19 21 23
12
Port LEDs
Each port has its own Logged-in LED (green) and Activity LED (green) (Figure 4).
1 2
3 4
Transceivers
The HP SN6000 Fibre Channel Switch supports SFP optical transceivers for the SFP ports and XPAK optical
transceivers or XPAK stacking cables for the XPAK ports. A transceiver converts electrical signals to and
from optical laser signals to transmit and receive data. Duplex fiber optic cables plug into the SFP
transceivers which then connect to the devices. An SFP port is capable of transmitting at 1-, 2-, 4-, or
8-Gb/s; however, the transceiver must also be capable of delivering at these rates.
The SFP and XPAK transceivers are hot-pluggable. This means that you can remove or install a transceiver
while the switch is operating without harming the switch or the transceiver. However, communication with
the connected device is interrupted. For information about installing and removing SFP+ optical
transceivers, see ”Install the transceivers” (page 39).
14
Ethernet port
The Ethernet port is an RJ-45 connector that provides a connection to a workstation through a 10/100
Base-T Ethernet cable (Figure 5). A workstation can be a Windows or a Linux server that is used to
configure and manage the switch fabric. An Ethernet connection to the switch is required to manage the
switch using the CLI, QuickTools, Enterprise Fabric Management Suite, SAN Connection Manager, or
Simple Network Management Protocol (SNMP).
The Ethernet port has two LEDs: the Link Status LED (green) and the Activity LED (green). The Link Status LED
illuminates continuously when an Ethernet connection has been established. The Activity LED illuminates
when data is being transmitted or received over the Ethernet connection.
1 2
Serial port
The SN6000 Fibre Channel Switch is equipped with an RS-232 serial port for maintenance purposes
(Figure 6). You can manage the switch through the serial port using the CLI.
3
5
4
1 2
16
Each power supply is capable of providing all of the switch’s power needs. During normal operation, each
power supply provides half of the demand. If one power supply goes offline, the second power supply
steps up and provides the difference.
The power supplies are hot-pluggable and interchangeable. Hot-pluggable means that you can remove
and replace one power supply while the switch is in operation without disrupting service. See ”Transceiver
removal and replacement” (page 61) for information about replacing the power supplies.
Connecting a power supply to an AC voltage source energizes the switch logic circuitry. Internal fans
provide cooling. Air flow is front-to-back.
Switch management
The switch supports the following management tools and protocols:
• QuickTools web applet, page 17
• SAN Connection Manager, page 17
• Command line interface, page 17
• Enterprise Fabric Management Suite, page 18
• Simple Network Management Protocol, page 18
• Storage Management Initiative–Specification (SMI-S), page 18
• File transfer protocols, page 18
18
2 Planning a Fabric
This chapter contains information about planning a fabric.
Devices
When planning a fabric, consider the following:
• The number of devices and the anticipated demand. This will determine the number of ports that are
needed and in turn the number of switches.
• The transmission speeds of your HBAs, SFPs, and XPAKs. The switch supports 2 Gb/s, 4 Gb/s and 8
Gb/s transmission speeds with SFPs. The transmission speed for XPAKs is 10 Gb/s or 20 Gb/s when
enabled by installation of the SN6000 Stackable 20Gb ISL Upgrade LTU.
IMPORTANT: Setting a Fibre Channel port that has an 8 Gb/s SFP transceiver to 1 Gb/s downs the port.
• The distribution of targets and initiators. An F_Port supports a single device. An FL_Port can support up
to 126 devices in an arbitrated loop.
Device access
Consider device access needs within the fabric. Access is controlled by the use of zoning. Some zoning
strategies include the following:
• Separating devices by operating system
• Separating devices that have no need to communicate with other devices in the fabric or have
classified data
• Separating devices into department, administrative, or other functional group
Zoning divides the fabric for purposes of controlling discovery and inbound traffic. A zone is a named
group of ports or devices. Members of the same zone can communicate with each other and transmit
outside the zone, but cannot receive inbound traffic from outside the zone. Zoning is hardware-enforced
only when a port/device is a member of no more than eight zones whose combined membership does not
exceed 64. If this condition is not satisfied, that port behaves as a soft zone member. You can assign
ports/devices to a zone individually or as a group by creating an alias.
A zone can be a component of more than one zone set. Several zone sets can be defined for a fabric, but
only one zone set can be active at one time. The active zone set determines the current fabric zoning.
Limit Description
MaxZoneSets Maximum number of zone sets (256).
MaxZones Maximum number of zones (2,000).
MaxAliases Maximum number of aliases (2,500).
MaxTotalMembers Maximum number of zone and alias members (10,000) that
can be stored in the zoning database. Each instance of a zone
member or alias member counts toward this maximum.
MaxZonesInZoneSets Maximum number of zones that are components of zone sets
(2,000), excluding the orphan zone set. Each instance of a
zone in a zone set counts toward this maximum.
MaxMembersPerZone Maximum number of members in a zone (2,000).
MaxMembersPerAlias Maximum number of members in an alias (2,000)
Performance
The SN6000 Fibre Channel Switch supports class 2 and class 3 Fibre Channel service at transmission rates
of 8 Gb/s with a maximum frame size of 2,148 bytes. Related performance characteristics include the
following:
• Distance, page 20
• Bandwidth, page 21
• Latency, page 21
Distance
Consider the physical distribution of devices and switches in the fabric. Choose SFP transceivers that are
compatible with the cable type, distance, Fibre Channel revision level, and the device host bus adapter.
Each Fibre Channel port is supported by a data buffer with a 16 credit capacity; that is, 16 maximum sized
frames. For fibre optic cables, this enables full bandwidth over approximately 3 kilometers at 8 Gb/s (4.8
credits/km).
With the optional Enterprise Fabric Management Suite application, longer distances can be spanned at
full bandwidth on SFP ports by extending credits to G_Ports, F_Ports, and E_Ports. Each port can donate 15
credits to a pool from which a recipient port can borrow. However, SFP ports can borrow only from other
SFP ports. XPAK ports cannot borrow or donate credits. The recipient port also loses a credit in the process.
For example, you can configure an SFP recipient port to borrow 15 credits from one donor port for a total
of 30 credits (15+15=30). For more information about Enterprise Fabric Management Suite, see
”Enterprise Fabric Management Suite” (page 18).
Table 4 describes the possible distances for a port with 30 credits as an example.
Extending credits requires a minimum cable length that is dependent on transmission speed, but is
independent of the number of credits borrowed. Extending credits using short cables can cause excessive
20
port resets. Table 5 describes the minimum cable lengths for a port with extended credits.
For more information about cable types, transceivers, and maximum supported distances, see the SAN
Design Reference Guide available at the HP website: http://www.hp.com/go/SANdesignguide.
Bandwidth
Bandwidth is a measure of the volume of data that can be transmitted at a given transmission rate. An SFP
port can transmit or receive at nominal rates of 1, 2, 4, or 8 Gb/s depending on the device to which it is
connected. This corresponds to full duplex bandwidth values of 212 MB, 424 MB, 850 MB, and 1700 MB
respectively. XPAK ports transmit at a nominal rate of 10 Gb/s which corresponds to a full duplex
bandwidth value of 2550 MB. With an SN6000 Stackable 20Gb ISL Upgrade LTU, XPAK ports can
transmit at a nominal rate of 20 Gb/s (5100 MB bandwidth).
Multiple source ports can transmit to the same destination port if the destination bandwidth is greater than
or equal to the combined source bandwidth. For example, two 2 Gb/s source ports can transmit to one 4
Gb/s destination port. Similarly, one source port can feed multiple destination ports if the combined
destination bandwidth is greater than or equal to the source bandwidth.
In multiple chassis fabrics, each link between chassis contributes 424, 850, 1700, 2550 or 5100
megabytes of bandwidth between those chassis, depending on the speed of the link. When additional
bandwidth is needed between devices, increase the number of links between the connecting switches. The
switch guarantees in-order delivery with any number of links between chassis.
Latency
Latency is a measure of how fast a frame travels through a switch from one port to another. The factors that
affect latency include transmission rate and the source/destination port relationship (Table 6).
Destination Rate
Gb/s 2 4 8 10 20
Source 2 < 0.6 μsec < 0.7 μsec1 < 0.6 μsec1 < 0.6 μsec1 < 0.6 μsec1
Rate
1
4 < 0.4 μsec < 0.3 μsec < 0.4 μsec < 0.4 μsec1 < 0.3 μsec1
8 < 0.3 μsec < 0.2 μsec < 0.2 μsec < 0.2 μsec1 < 0.2 μsec1
10 < 0.3 μsec < 0.3 μsec < 0.2 μsec < 0.2 μsec < 0.2 μsec1
20 < 0.3 μsec < 0.2 μsec < 0.2 μsec < 0.2 μsec < 0.2 μsec
1 Based on minimum frame size of 36 bytes. Latency increases for larger frame sizes.
22
Domain ID, principal priority, and domain ID lock
The following switch configuration settings affect multiple switch fabrics:
• Domain ID
• Principal priority
• Domain ID lock
The domain ID is a unique number from 1–239 that identifies each switch in a fabric. The principal priority
is a number (1–255) that determines the principal switch which manages domain ID assignments for the
fabric. The switch with the highest principal priority (1 is high, 255 is low) becomes the principal switch. If
the principal priority is the same for all switches in a fabric, the switch with the lowest Worldwide Name
(WWN) becomes the principal switch.
The domain ID lock allows (False) or prevents (True) the reassignment of the domain ID on that switch.
Switches come from the factory with the domain ID set to 1, the domain ID lock set to False, and the
principal priority set to 254. For information about changing the default domain ID, domain ID lock, and
principal priority parameters, see the set config switch command in the HP SN6000 Fibre Channel
Switch Command Line Interface Guide.
If you connect a new switch to an existing fabric with its domain ID unlocked, and a domain ID conflict
occurs, the new switch will isolate as a separate fabric. You can remedy this by resetting the new switch or
taking it offline then putting it back online. The principal switch will reassign the domain ID and the switch
will join the fabric.
NOTE: Domain ID reassignment is not reflected in zoning that is defined by domain ID/port number pair
or Fibre Channel address. You must reconfigure zones that are affected by domain ID reassignment. To
prevent zoning definitions from becoming invalid under these conditions, lock the domain IDs. Domain ID
reassignment has no effect on zone members defined by WWN.
24
Figure 11 shows a five-switch stack of model SN6000 switches using ten XPAK switch stacking cables. 100
SFP ports are available for devices.
Transparent routing
IMPORTANT: SAN Connection Manager (SCM) version 3.0 or later is required for the HP SN6000 Fibre
Channel Switch. The SAN Connection Manager application can manage H-series switches with active
TR_Ports; however, SCM cannot manage or discover remote switches or devices in the remote fabric. Use
QuickTools or Enterprise Fabric Management Suite and the storage management interface to present
Logical Unit Numbers (LUNs) to remote devices.
\
The transparent routing feature provides inter-fabric routing to allow controlled and limited access between
devices on a SN6000 Fibre Channel Switch (local) fabric and devices on a remote fabric consisting of
B-series or C-series switches. For a list of switches that are supported in a remote fabric, see the HP
SN6000 Fibre Channel Switch Release Notes, and the HP SAN Design Reference Guide on the HP
website: http://www.hp.com/go/sandesignguide. This type of inter-fabric connection uses the Fibre
Channel industry N-Port ID Virtualization (NPIV), and makes local and remote devices accessible to each
other while maintaining the local and remote fabrics as separate fabrics.
You can connect multiple SN6000 Fibre Channel Switches to one or more remote fabrics using multiple
TR_Ports. Local and remote devices are identified by their respective port worldwide names. Consider the
following mapping rules:
• A TR_Port can support a maximum of 32 local device/remote device mappings.
• A specific local device can be mapped to devices on only one remote fabric. Local devices on the same
SN6000 Fibre Channel Switch can each be mapped to different remote fabrics.
• For mappings between a specific SN6000 Fibre Channel Switch and a remote fabric, each local
device or remote device can be mapped over only one TR_Port. Additional mappings to either device
must use that same TR_Port.
• Multiple local devices connected to different local switches can be mapped to the same remote device
over one TR_Port on each local switch.
• A local device cannot be mapped over an E_Port to another local switch, then over a TR_Port to the
remote device. The local switch to which the local device is connected must connect directly to the
remote fabric over a TR_Port.
NOTE: When a local device is mapped over a TR_Port to a remote device, the local device and its
TR_Port appear as an NPIV connected device in the remote fabric. It is possible, though not
recommended, to map such a local device over a second TR_Port to a local device in a second
local fabric. In this case, if you merge the two local fabrics, the transparent route becomes inactive
for the devices that now have a path over an ISL, and an alarm is generated.
26
You can configure transparent routing using QuickTools, Enterprise Fabric Management Suite, or the CLI,
though HP recommends QuickTools and Enterprise Fabric Management Suite because they validate your
entries, manage the zone mapping for the local fabric, and create a list of zoning commands that can be
run in a script on a HP B-series or C-series SAN switch. For more detailed information, see the HP SN6000
Fibre Channel Switch QuickTools Switch Management User Guide, HP 8/20q and SN6000 Fibre
Channel Switch Enterprise Fabric Management Suite User Guide, and the HP SN6000 Fibre Channel
Switch Command Line Interface Guide.
IMPORTANT: Since C-series switches do not support the Unzoned Name Server, C-series fabrics must be
“pre-zoned” before you can set up TR mappings to a remote C-series fabric using the TR Mapping
Manager dialog box. The C-series fabric zone set must be changed to add zones so that the WWNs of the
remote devices to be mapped and the WWNs of the SN6000 Fibre Channel Switch TR ports are zoned
together. For more information, see the C-series documentation for specific information to configure zoning.
Retain these zones in the zone set after completion of the TR mapping as a best practice, until you no
longer need to map the device to the local fabric.
NOTE: Be sure to configure the TR_Port before connecting the remote fabric to the HP SN6000
Fibre Channel Switch. If the remote fabric is connected to a port on the HP SN6000 Fibre Channel
Switch that is not a TR_Port, the two fabrics may establish an E_Port connection and the local and
remote fabrics may merge. This mixed fabric is not a supported configuration. If the port type is
changed to TR_Port after connecting the remote fabric, a port reset may be required to completely
establish the TR connection.
3. Map local devices to remote devices and activate the connection. The mapping process creates an
inter-fabric zone (IFZ) in the active zone set consisting of the local device, the remote device, and the
TR_Port. When the mapping is complete, the new zone set is activated.
The name of the inter-fabric zone begins with IFZ followed by the lowest device port WWN followed by
the remaining port WWN, all uppercase, separated by underscores (_). For example, consider the
following local and remote device WWNs:
• Local device: 21:00:00:e0:8b:0e:d3:59
• Remote device: 22:00:00:04:cf:a8:7f:2d
The inter-fabric zone name would be:
IFZ_210000E08B0ED359_22000004CFA87F2D
4. Apply the same inter-fabric zone that was created on the local fabric to the active zoning on the remote
fabric. The application creates a suggested list of commands during the mapping process that, when
run on a remote fabric consisting of HP B-series or C-series switches, will make the necessary zoning
changes to the remote fabric. See the HP SN6000 Fibre Channel Switch QuickTools Switch
Management User Guide or HP 8/20q and SN6000 Fibre Channel Switch Enterprise Fabric
Management Suite User Guide for important details on creating and using this list of suggested
commands. When modifications to the active zoning on both fabrics are complete, the transparent
routing connection becomes active, and the local devices will discover the remote devices.
IMPORTANT: The Call Home service provides an e-mail notification capability for the switch. This
service has no relationship with the HP Call Home feature, which notifies only HP services.
Provides for automated e-mail notification of switch status and operating conditions based on specified
event severity levels. The default is enabled. The Call Home service requires an Ethernet connection to
at least one Simple Mail Transfer Protocol (SMTP) server. You must configure the Call Home service to
do the following:
• Enable primary and secondary SMTP servers and specify their IP addresses
• Specify contact information
Configure one or more Call Home profiles to specify e-mail recipients, message format, and the event
severity level that will initiate a message. In addition, you can configure periodic event data collection
and processing through the Tech_Support_Center profile for automated status and trend analysis.
28
Security
Security is available at the following levels:
• User account security, page 29
• IP security, page 29
• Port binding, page 30
• Connection security, page 30
• Device security, page 30
NOTE: If the same user account exists on a switch and its RADIUS server, that user can login with either
password, but the authority and account expiration will always come from the switch database.
IP security
IP security provides encryption-based security for IPv4 and IPv6 communications through policies and
associations. Policies define security for host-to-host and host-to-gateway connections; one policy for each
direction. For example, to secure the connection between two hosts, you need two policies: one for
outbound traffic from the source to the destination, and another for inbound traffic to the source from the
destination. A security association defines the encryption algorithm and encryption key (public key or
secret) to apply when called by a security policy. A security policy can call several associations at different
times, but each association is related to only one policy.
You must configure matching security associations on the switch and on the connected devices (peers) that
require secure IP communication. To simplify the IP security configuration process, the switch supports the
Internet key exchange (IKE). IKE is a protocol that automates the configuration of matching IP security
associations on the switch and on the connected device (or peer). The IKE peer defines the IKE security
association connection through which the IKE policy configures the IP security associations.The IKE policy
defines the type of data traffic to secure between the switch and the peer, and how to encrypt that data.
You must create the same IKE peer and IKE policy configurations on the switch and the peer device.
Public key encryption requires a public key, a corresponding private key, and the necessary certificates to
authenticate them. Public key infrastructure (PKI) provides support for the creation and management of
public/private key pairs, signed certificates, and certificate authority (CA) certificates when using IKE. You
can create a public/private key and combine it with one or more device identities to generate a certificate
request. Submit the certificate request to a CA to obtain a signed certificate, which contains the
authenticated public/private key pair. In addition to the signed certificate, you must also obtain a CA
certificate to authenticate the CA. After downloading the signed certificate and a CA certificate to the
switch and importing them into the PKI database, the signed certificate (which contains the authenticated
public key) can then be used to complete the IKE peer configuration.
Port binding
Port binding provides authorization for a list of up to 32 switch and device WWNs that are permitted to
log in to a particular switch port. Switches or devices that are not among the 32 are refused access to the
port. Consider what ports to secure and the set of switches and devices that are permitted to log in to those
ports. Use the CLI to configure port binding. For more information about port binding configuration, see
the HP SN6000 Fibre Channel Switch Command Line Interface Guide.
Connection security
Connection security provides an encrypted data path for switch management methods. The switch supports
the Secure Shell (SSH) protocol for the command line interface and the Secure Socket Layer (SSL) protocol
for management applications such as QuickTools, Enterprise Fabric Management Suite, and SMI-S. Use
the CLI to configure SSH and SSL. For more information about SSH and SSL configuration, see the HP
SN6000 Fibre Channel Switch Command Line Interface Guide.
The SSL handshake process between the workstation and the switch involves the exchanging of certificates.
These certificates contain the public and private keys that define the encryption. When the SSL service is
enabled, a certificate is automatically created on the switch. The workstation validates the switch certificate
by comparing the workstation date and time to the switch certificate creation date and time. For this
reason, it is important to synchronize the workstation and switch with the same date, time, and time zone.
The switch certificate is valid 24 hours before its creation date and 365 days after its creation date. If the
certificate should become invalid, create a new certificate using the create certificate CLI
command. For information about the create certificate CLI command, see the HP SN6000 Fibre
Channel Switch Command Line Interface Guide.
Consider your requirements for connection security: for the command line interface (SSH), management
applications (SSL), or both. If an SSL connection security is required, also consider using the Network Time
Protocol (NTP) to synchronize workstations and switches.
Device security
Device security provides for the authorization and authentication of devices that you attach to a switch. You
can configure a switch with a group of devices against which the switch authorizes new attachments by
devices, other switches, or devices issuing management server commands. Device security is configured
through the use of security sets and groups. Use the CLI to configure device security. For more information
about device security configuration, see the HP SN6000 Fibre Channel Switch Command Line Interface
Guide.
A group is a list of device worldwide names that are authorized to attach to a switch. There are three types
of groups: one for other switches (ISL), another for devices (port), and a third for devices issuing
management server commands (MS).
A security set is a set of up to three groups with no more than one of each group type. The security
configuration is made up of all security sets on the switch. The security database has the following limits:
• Maximum number of security sets is 4.
• Maximum number of groups is 16.
• Maximum number of members in a group is 1,000.
• Maximum total number of group members is 1,000.
In addition to authorization, the switch can be configured to require authentication to validate the identity
of the connecting switch, device, or host. Authentication can be performed locally using the switch’s
security database, or remotely using a RADIUS server such as Microsoft RADIUS. With a RADIUS server,
the security database for the entire fabric resides on the server. In this way, the security database can be
managed centrally, rather than on each switch. You can configure up to five RADIUS servers to provide
failover.
You can configure the RADIUS server to authenticate just the switch or both the switch and the initiator
device if the device supports authentication. When using a RADIUS server, every switch in the fabric must
30
have a network connection. A RADIUS server can also be configured to authenticate user accounts as
described in ”User account security” (page 29). A secure connection is required to authenticate user logins
with a RADIUS server. For more information, see ”Connection security” (page 30).
Consider the devices, switches, and management agents and evaluate the need for authorization and
authentication. Also consider whether the security database is to be distributed on the switches or
centralized on a RADIUS server and how many servers to configure. Use the CLI to configure RADIUS
servers. For more information about RADIUS server configuration, see the HP SN6000 Fibre Channel
Switch Command Line Interface Guide.
Fabric management
The SAN Connection Manager (SCM) application is a GUI-based management application for HP H-series
Fibre Channel switches that run on the management station. SCM provides a single pane of glass
management application for managing and provisioning storage from HP MSA/EVA storage arrays,
managing HBAs and managing H-series switches. SCM provides switch functions for day to day
management activities such as, IP network configuration, administrative password control, SNMP setup,
firmware upgrades, and implementation of HP best zoning practices (single initiator zoning). It provides
basic automated configuration and management of switches, HBAs, and storage devices. Switch
management functions include IP address configuration and limited control of zoning. SCM version 3.0 or
later is required for the HP SN6000 Fibre Channel Switch.
The browser-based application, QuickTools, and the CLI reside in the switch firmware and provide for the
management of individual switches in a single fabric.
The Enterprise Fabric Management Suite application is an optional, workstation-based fabric management
application that provides for the configuration, control, and maintenance of multiple fabrics. For more
information about Enterprise Fabric Management Suite, see ”Enterprise Fabric Management
Suite” (page 18).
It is recommended that SCM be used to setup and manage the entire SAN. Users that want more detailed
switch level control can launch QuickTools or the optional Enterprise Fabric Management Suite for
advanced switch management features and functions.
A switch supports a combined maximum of 19 logins, which are reserved as follows:
• 4 logins or sessions for internal applications, such as management server and SNMP
• 9 high priority Telnet sessions
• 6 logins or sessions for SAN Connection Manager inband and out-of-band logins, QuickTools logins,
Enterprise Fabric Management Suite logins, and Telnet logins.
Additional logins will be refused.
Site requirements
Consider the following items when installing an SN6000 Fibre Channel Switch.
Table 7 Management station requirements for SAN Connection Manager and Enterprise Fabric
Management Suite
Operating System • Windows Server 2003 R2, Windows Storage Server 2003 R2
x64/x86 with SP2. This requires Microsoft hotfix QFE932755
(updated Storport storage driver). The update is available on
the Microsoft website:
http://support.microsoft.com/kb/932755.
• Windows Server 2008 x64/x86 with SP2
• Windows Server 2008 x64/x86 R2
Memory 2 GB
Disk Space • 200 MB of disk space for HP SAN Connection Manager
software
• 150 MB of disk space for HP Enterprise Fabric Management
Suite
Processor 2 GHz or faster
Internet browser Microsoft Internet Explorer 6.0 or later
Netscape Navigator 6.0 and later
Firefox 1.5 and later
Java Runtime Environment 1.5 or higher
Hardware RJ-45 Ethernet port
PCI-e slots for the HP PCI-e FC HBA
Hardware CD-ROM drive (optional)
RJ-45 Ethernet port
RS-232 serial port (optional)
PCI-e slots for the HP PCI-e FC HBA
Telnet workstations require an RJ-45 Ethernet port or an RS-232 serial port and an operating system with a
Telnet client.
Environmental conditions
Consider the factors that affect the climate in your facility such as equipment heat dissipation and
ventilation. The switch requires the following operating conditions:
• Operating temperature range: 5°–40°C (41°–104°F)
• Relative humidity: 10–90%, non-condensing
Installing a switch
Unpack the switch and accessories. The SN6000 Fibre Channel Switch product is shipped with the
following components
• One Read-Me-First document
• One End User License Agreement (EULA)
• One HP 8/20q and SN6000 Fibre Channel Switch Rack-Mount Kit Quick Start Installation Instructions
• One HP 8/20q and SN6000 Fibre Channel Switch Quick Start Installation Instructions
• One HP SN6000 Fibre Channel Switch (12 port single power supply, 24 port single power supply, or
24 port dual power supply)
• One HP 8/20q and SN6000 Fibre Channel Switch Rack-Mount Kit
• One or two standard power cords (depending on the switch model)
• One or two HP Power Distribution Unit (PDU) power cables (depending on the switch model)
• One serial cable
• Four adhesive rubber feet
For the latest product information, including firmware, documentation, and supported SAN configurations,
see the following HP website: http://www.hp.com/go/SN6000.
Installing a SN6000 Fibre Channel Switch involves the following steps:
1. Mount the switch, page 35
2. Install the transceivers, page 39
3. Configure the workstation, page 39
4. Apply power to the switch, page 40
5. Connect the management station or workstation to the switch, page 41
6. Configure the switch, page 41
7. Cable devices to the switch, page 43
34
Mount the switch
The switch can be placed on a flat surface and stacked, or mounted in a 19” Electronics Industries
Association (EIA) rack. See ”Weight and physical dimensions” (page 78) for weight and dimensional
specifications. Adhesive rubber feet are provided for surface mounts only. Without the rubber feet, the
switch occupies 1U of space in an EIA rack.
The rack mount kit is supported with the following HP custom racks only:
• HP 9000 Series Rack
• HP 10000 Series Rack
• HP 10000 G2 Series Rack
Before you begin
WARNING! To reduce the risk of personal injury or damage to the equipment, ensure that:
• In single-rack installations, stabilizing feet are attached to the rack.
• In multiple-rack installations, racks are coupled together.
• Leveling jacks on the rack are extended to the floor.
• The full weight of the rack rests on the leveling jacks.
• Heavy items, such as uninterruptible power supplies and hard drive storage enclosures, are installed
near the bottom of the rack.
• Similar components are installed next to each other in the rack. Because devices are of differing
depths, this will facilitate maintenance and service tasks.
• Only one device in a rack is extended at a time. A rack may become unstable if more than one device
is extended.
CAUTION:
• For proper airflow, the SFP+ media side (port side) of the device must face the front of the rack.
Mounting the switch in this direction allows air to enter from the front of the rack (SFP-port side of
switch) and exhaust through the back of the rack (power-supply side of switch). This prevents
overheating, which may cause equipment in the rack to fail.
• Allow a minimum of 63.5 cm (25 in.) clearance in front of the rack to allow the doors to open fully, and
76.2 cm (30 in.) in back of the rack to allow for servicing and airflow.
• If the device is mounted in a closed rack or there are multiple rack-mounted devices, make sure that the
operating temperature inside the rack enclosure does not exceed the maximum rated ambient
temperature.
• Multiple rack-mounted devices connected to the same AC supply circuit may overload that circuit or the
AC supply wiring. Consider the power source capacity and the total power usage of all switches on the
circuit.
• Reliable grounding in the rack must be maintained.
Table 9 8/20q and SN6000 Fibre Channel Switch rack mount kit hardware
Item Description
36
2. Attach each rail to the switch using two 10-32 x .375-inch screws with captive washers (Figure 13).
Make sure the slotted ends of the rails are on the power-supply side (not the SFP-port side) of the switch.
38
Install the transceivers
A small form-factor pluggable (SFP) transceiver is required for each switch port connected to a device or
another switch. SFPs are not included with the switch. An XPAK transceiver is required for each switch 10
Gb/s port connected to the 10 Gb/s port of another switch. Only HP transceivers are supported for use in
the switch. To install an transceiver, insert the transceiver into any of the active switch ports and gently press
until it snaps in place. To remove a transceiver, gently press the transceiver into the port to release the
tension, then pull on the release tab or lever and remove the transceiver.
TIP: The transceiver fits only one way. If the transceiver is not installed under gentle pressure, invert it and
try again. A new switch has all ports active.
NOTE: If you plan to use SAN Connection Manager, QuickTools, or Enterprise Fabric Management Suite
to manage the switch, proceed to ”Apply power to the switch” (page 40).
If you plan to use the CLI to configure and manage the switch, you must configure the workstation. This
involves setting the workstation IP address for Ethernet connections, or configuring the workstation serial
port.
Configuring the workstation IP address for Ethernet connections
The default IP address of a new switch is 10.0.0.1. To ensure that your workstation is configured to
communicate with the 10.0.0 subnet:
• For a Windows workstation:
a. Click Start, then choose Settings > Control Panel > Network and Dial-Up Connections.
b. Choose Make New Connection.
c. Click the Connect to a private network through the Internet radio button, then click Next.
d. Enter 10.0.0.253 for the IP address.
• For a Linux workstation, open a command window and enter the following command where
interface is your interface name:
ifconfig interface ipaddress 10.0.0.253 netmask 255.255.255.0 up
Configuring the workstation serial port
To configure the workstation serial port:
1. Connect a null modem F/F DB9 cable from a COM port on the workstation to the RS-232 serial port on
the switch.
2. Configure the workstation serial port according to your platform:
For a Windows workstation:
a. Open the HyperTerminal application. Click Start, then select Programs > Accessories >
Communications > HyperTerminal.
b. Enter a name for the switch connection and choose an icon in the Connection Description window.
Click OK.
c. Enter the following COM Port settings in the COM Properties window, and click OK.
• Bits per second: 9,600
• Data Bits: 8
• Parity: None
• Stop Bits: 1
• Flow Control: None
WARNING! This product is supplied with a 3-wire power cable and plug for the user’s safety. Use this
power cable in conjunction with a properly grounded outlet to avoid electrical shock. An electrical outlet
that is not correctly wired could place hazardous voltage on metal parts of the switch. It is the responsibility
of the customer to ensure that the outlet is correctly wired and grounded to prevent electrical shock.
You may require a different power cable in some countries because the plug on the cable supplied with the
equipment will not fit your electrical outlet. In this case, you must supply your own power cable. The cable
you use must meet the following requirements:
• For 125 Volt electrical service, the cable must be rated at 10 Amps and be approved by Underwriters
Laboratories (UL) and Canadian Standards Association (CSA).
• For 250 Volt electrical service: The cable must be rated at 10 Amps, meet the requirements of H05VV-F,
and be approved by Verband der Elektrotechnik (VDE), SEMKO, and DEMKO.
To power up a SN6000 Fibre Channel Switch, attach the AC power cord to each receptacle on the back
of the switch and to the power source.
The switch runs its self-tests and begins normal operation—this may take a few minutes:
1. The switch LEDs (Input Power, Heartbeat, System Fault) illuminate followed by all port Logged-in LEDs.
The Logged-in LEDs that illuminate indicate the ports that are enabled.
2. After a couple of seconds, the System Fault LED is extinguished while the Input Power LED and
Heartbeat LED remain illuminated.
3. After approximately one minute, the POST executes and the Heartbeat LED is extinguished.
4. After about another minute, the POST is complete, all LEDs are extinguished, except the Input Power
LED and the Heartbeat LED:
• The Input Power LED remains illuminated indicating that the switch logic circuitry is receiving DC
voltage. If not, contact your authorized maintenance provider.
• The Heartbeat LED indicates the results of the POST. The POST tests the condition of firmware,
memories, data-paths, and switch logic circuitry. If the Heartbeat LED blinks steadily about once per
second, the POST was successful, and you can continue with the installation process. Any other
blink pattern indicates that an error has occurred. For more information, see ”Heartbeat LED blink
patterns” (page 52).
40
Connect the management station or workstation to the switch
You can manage the switch using the SAN Connection Manager, QuickTools, Enterprise Fabric
Management Suite, or the CLI. SAN Connection Manager requires at least one FC connection and an
Ethernet connection to the switch. QuickTools and Enterprise Fabric Management Suite require an Ethernet
connection to the switch. The CLI can use an Ethernet connection or a serial connection.
• If this switch is part of the 8Gb SAN Connectivity Kit installation:
a. Connect at least one FC cable from the management station to the switch, or to another switch in
the same fabric.
b. Use a 10/100 Base-T straight cable to connect the switch Ethernet port to the LAN that connects
your management station that will run SAN Connection Manager (see Indirect Ethernet in
Figure 19).
• If this switch is a standalone installation and you plan to use QuickTools, Enterprise Fabric
Management Suite, or the CLI, connect the switch Ethernet port to the workstation, in one of the
following ways:
• Indirect Ethernet connection from the workstation to the switch RJ-45 Ethernet connector through an
Ethernet switch or a hub. This requires a 10/100 Base-T straight cable (Figure 19).
• Direct Ethernet connection from the workstation to the switch RJ-45 Ethernet connector. This requires
a 10/100 Base-T cross-over cable (Figure 19).
• Serial port connection from the workstation to the switch RS-232 serial port connector. This requires
a null modem F/F DB9 cable (Figure 19). This connection supports the CLI only.
1 2 3
8 1 8 1 5 1
9 6
8 8 8 8 9 9
7 7 7 7 8 8
6 6 6 6 7 7
5 5 5 5 6 6
4 4 4 4 5 5
3 3 3 3 4 4
2 2 2 2 3 3
1 1 1 1 2 2
1 1
NOTE: To insure user account security, change the password for the Admin account name. See the
passwd command in the HP SN6000 Fibre Channel Switch Command Line Interface Guide.
For a Windows serial connection, open the HyperTerminal application on a Windows platform.
a. Click Start, then select Programs > Accessories > Communications > HyperTerminal.
b. Select the connection you created earlier and click OK. See ”Configuring the workstation serial
port” (page 39).
For a Linux serial connection, open a command window and enter the following command:
minicom
2. Open an admin session and enter the set setup system CLI command. Enter the values you want
for switch IP address (EthNetworkAddress) and the network mask (EthNetworkMask). For more
information about CLI commands, see the HP SN6000 Fibre Channel Switch Command Line Interface
Guide.
SN6000 FC Switch#> admin start
SN6000 FC Switch (admin) #> set setup system
3. Open a Config Edit session and use the set config switch CLI command to modify the switch
configuration.
4. When the configuration is complete, proceed to ”Cable devices to the switch” (page 43).
42
Cable devices to the switch
Connect cables to the SFP transceivers and their corresponding devices, and then energize the devices.
Device host bus adapters can have SFP (or SFF) transceivers. Duplex cable connectors are keyed to ensure
proper orientation. Choose the Fibre Channel cables with the connector combination that matches the
device host bus adapter.
GL_Ports self configure as FL_Ports when connected to loop of devices or F_Ports when connected to a
single device. G_Ports self-configure as F_Ports when connected to a single device. Both GL_Ports and
G_Ports self-configure as E_Ports when connected to another switch.
Installing firmware
The switch comes with current firmware installed. You can upgrade the firmware from the management
station or workstation as new firmware becomes available using SAN Connection Manager, QuickTools,
Enterprise Fabric Management Suite, or the CLI. This guide describes the use of QuickTools and the CLI.
For information about installing firmware using SAN Connection Manager, see the HP SAN Connection
Manager User Guide. For information about installing firmware using Enterprise Fabric Management
Suite, see the HP 8/20q and SN6000 Fibre Channel Switch Enterprise Fabric Management Suite User
Guide.
• Using QuickTools to install firmware, page 44
• Using the CLI to install firmware, page 44
You can load and activate firmware upgrades on an operating switch without disrupting data traffic or
re-initializing attached devices. If you attempt to perform a non-disruptive activation without satisfying the
following conditions, the activation will fail. If the non-disruptive activation fails, you will usually be
prompted to try again later. Otherwise, the switch will perform a disruptive activation.
• The current firmware version supports the installation and non-disruptive activation of the new firmware.
For information about compatible firmware versions, see the firmware release notes.
• No changes are being made to switches in the fabric including powering up, powering down,
disconnecting or connecting ISLs, changing switch configurations, or installing firmware.
• No port in the fabric is in the diagnostic state.
• No Zoning Edit sessions are open in the fabric.
• No changes are being made to attached devices including powering up, powering down,
disconnecting, connecting, and HBA configuration changes.
If you are installing firmware on more than one switch in the fabric, wait until the activation is complete on
the first switch before installing firmware on a second switch. If you attempt to activate firmware on a
second switch before activation is complete on the first, you will receive a message advising you to wait
and perform a hot reset later on the second switch to complete the installation.
Ports that are stable when the non-disruptive activation begins and then change states, will be reset. When
the non-disruptive activation is complete, SAN Connection Manager, QuickTools, and Enterprise Fabric
Management Suite sessions reconnect automatically. However, Telnet sessions must be restarted manually.
TIP: After upgrading firmware that includes changes to QuickTools, an open QuickTools session may
indicate that the firmware is not supported. This means the new firmware is not supported by the previous
QuickTools version. To correct this, close the QuickTools session and the browser window, then open a new
QuickTools session.
44
3. Enter your account name on the remote host (FTP only) and the IP address of the remote host. When
prompted for the source file name, enter the path for the firmware image file.
User Account : johndoe
IP Address : 10.20.20.200
Source Filename : 8.0.00.11_epc
About to install image. Do you want to continue? [y/n] y
4. When prompted to install the new firmware, enter y to continue or n to cancel. Entering y will disrupt
traffic. This is the last opportunity to cancel.
About to install image. Do you want to continue? [y/n] y
Connected to 10.20.20.200 (10.20.20.200).
220 localhost.localdomain FTP server (Version wu-2.6.1-18) ready.
5. Enter the password for your account name (FTP only).
331 Password required for johndoe.
Password:******
230 User johndoe logged in.
The firmware will now be downloaded from the remote host to the switch, installed, and activated.
Custom firmware installation
A custom firmware installation downloads the firmware image file from an FTP or TFTP server to the switch,
unpacks the image file, and resets the switch in separate steps. This allows you to choose the type of switch
reset and whether the activation will be disruptive (reset switch command) or nondisruptive
(hotreset command). The following example illustrates a custom firmware installation with a
nondisruptive activation.
1. Download the firmware image file from the server to the switch.
• If your server has an FTP server, you can enter the image fetch command:
SN6000 FC Switch (admin) #> image fetch account_name ip_address
filename
• If your server has a TFTP server, you can enter the image tftp command to download the
firmware image file.
SN6000 FC Switch (admin) #> image tftp ip_address filename
• If your server has neither an FTP nor a TFTP server, open an FTP session and enter FTP commands:
>ftp ip_address or switchname
user:images
password: images
ftp>bin
ftp>put filename
ftp>quit
2. Display the list of firmware image files on the switch to confirm that the file was loaded.
SN6000 FC Switch (admin) $>image list
3. Unpack the firmware image file to install the new firmware in flash memory.
SN6000 FC Switch (admin) $>image unpack filename
4. Wait for the unpack to complete.
image unpack command result: Passed
5. A message will prompt you to reset the switch to activate the firmware. Use the hotreset command to
attempt a non-disruptive activation.
SN6000 FC Switch (admin) $>hotreset
46
Role of the Remote Support Software Manager
When you install RSP, Remote Support Software Manager (RSSWM) is also installed on your CMS.
RSSWM downloads required and recommended software components, including the required software
components listed below, which are used to allow communication with HP Services, contract and warranty
entitlement capabilities and to provide on-site analysis.
• Remote Support Client (RSC)
• Remote Support Common Components (MC3)
• Remote Support Eligible Systems List
• Open Service Event Manager (OSEM)
• Web-Based Enterprise Services (WEBES)
These and other software management options you select are downloaded by RSSWM. Once configured,
RSSWM will download and install updated versions as they become available according to the policies
selected during the configuration of RSSWM.
NOTE: Java plug-in is not installed by default in the Internet Explorer Web Browser for 32-bit and
x64 editions of Windows Server 2003.
NOTE: OSEM can also be installed on the server that is used to run SIM and RSC.
3. To enable a switch to Call Home to HP Services, configure an SNMP trap in the switch using
QuickTools or the CLI, as described in the following procedures:
To configure an SNMP trap using QuickTools:
a. Enter the IP address of the switch into the web browser of a server that has LAN access to the
switch, and login to the switch.
b. To open the SNMP Properties dialog box: In the fabric tree, click the switch graphic for the switch
you are configuring to open its faceplate display, and then select Switch > SNMP Properties.
c. In the SNMP Properties dialog, select the tab for a trap that is not currently in use.
d. In the display for the selected trap, select the Trap Enabled checkbox to enable the trap.
e. In the Trap Version field, select the trap version V1.
f. In the Trap Severity field, select Critical.
g. In the Trap Address field, enter the IP address of the server running OSEM.
h. In the Trap Port field, enter the trap port number used by OSEM (the OSEM default trap port is 162).
i. In the Trap Community field, enter the trap community name. The name can be up to 32 characters
and must agree with the community name used in the OSEM application. The following characters
may not be used in the user-defined fields: pound sign (#), semi-colon (;), and comma (,).
48
j. Click OK to enable the changes.
For more information about QuickTools, see the HP SN6000 Fibre Channel Switch QuickTools Switch
Management User Guide.
To configure an SNMP trap using the CLI:
a. Telnet to the IP address of the switch from a server that has LAN access to the switch, and login to
the switch.
b. To modify the SNMP configuration, open an admin session and enter the
set setup snmp trap CLI command. This will display the current configuration of SNMP trap
parameters, followed by queries to allow changes to these parameters. Enter changes as needed to
the trap enabled state, IP address, port number, severity, version, and community name.
The following example configures SNMP trap 1:
SN6000 FC Switch #> admin start
SN6000 FC Switch (admin) #> set setup snmp trap 1
A list of attributes with formatting and current values will follow.
Enter a new value or simply press the ENTER key to accept the current value.
If you wish to terminate this process before reaching the end of the list
press 'q' or 'Q' and the ENTER key to do so.
Current Values:
Trap1Enabled False
Trap1Address 10.0.0.254
Trap1Port 162
Trap1Severity warning
Trap1Version 2
Trap1Community public
Do you want to save and activate this snmp setup? (y/n): [n]
For more information about CLI commands, see the HP SN6000 Fibre Channel Switch Command Line
Interface Guide.
4. Configure the switches in OSEM by adding each SN6000 Fibre Channel Switch as a Managed System
configured with System Type set to FC Switch and the IP address for the switch. For detailed instructions,
see the OSEM documentation available at the websites listed in ”Installation instructions and
documentation for SIM, RSP, and OSEM” (page 47).
Switch diagnostics
The SN6000 Fibre Channel Switch has three switch LEDs that are used for diagnostics: Input Power LED,
Heartbeat LED, and the System Fault LED (Figure 20).
2 seconds
52
Fatal POST error blink pattern
A system error blink pattern is 3 blinks followed by a 2-second pause. The 3-blink error pattern indicates
that a POST failure or a system error has left the switch inoperable. If a system error occurs, contact your
authorized maintenance provider. Momentarily press and release the Maintenance button to reset the
switch.
2 seconds
2 seconds
2 seconds
54
3. Display the fabric domain IDs using the show domains CLI command or by selecting the QuickTools
Switch tab, Summary icon. Are all domain IDs in the fabric unique?
• Yes—Continue.
• No—Correct the domain IDs on the offending switches using the set config switch CLI
command or the QuickTools Switch Properties dialog. Reset the port. If the condition remains,
continue.
4. Compare the RA_TOV and ED_TOV timeout values for all switches in the fabric using the show
config switch CLI command or by selecting the QuickTools Switch tab, Advanced icon. Is each
timeout value the same on every switch?
• Yes—Continue.
• No—Correct the timeout values on the offending switches using the set config switch CLI
command or selecting Switch>Advanced Switch Properties in QuickTools. Reset the port. If the
condition remains, continue.
5. Display the active zone set on each switch using the zoning active CLI command or by selecting
the QuickTools Active Zoneset tab. Compare the zone membership between the two active zone sets.
Are they the same?
• Yes—Contact your authorized maintenance provider.
• No—Deactivate one of the active zone sets or edit the conflicting zones so that their membership is
the same, then reset the port. If the condition remains, contact your authorized maintenance
provider.
NOTE: E_Port isolation can be caused by merging two fabrics whose active zone sets have two zones
with the same name, but different membership.
6. Is the port connected to a switch that supports connection to a TR_Port of an SN6000 Fibre Channel
Switch?
• Yes—Configure the port as a TR_Port and map the local and remote fabric devices.
• No—Contact your authorized maintenance provider.
Excessive port errors
The switch can monitor a set of port errors and generate alarms based on user-defined sample windows
and thresholds. These port errors include the following:
• Cyclic Redundancy Check (CRC) errors
• Decode errors
• ISL connection count
• Device login errors
• Device logout errors
• Loss-of-signal errors
Port threshold alarm monitoring is disabled by default. For information about managing port threshold
alarms, see the HP SN6000 Fibre Channel Switch Command Line Interface Guide.
If the count for any of these errors exceeds the rising trigger for three consecutive sample windows, the
switch generates an alarm and disables the affected port, changing its operational state to “down.” Port
errors can be caused by the following:
• Triggers are too low or the sample window is too small
• Faulty Fibre Channel port cable
• Faulty SFP
• Faulty port
• Faulty device or HBA
Transceiver diagnostics
You can display the following transceiver information using the show media CLI command:
• Port number
• Manufacturer
• Temperature (°C)
• Operating voltage (volts)
• Transmitter bias (milliamps)
• Transmitter power (milliwatts)
• Receiver power (milliwatts)
The display indicates warning and alarm conditions for both high and low values.
56
Power Supply Diagnostics
The same model power supply is used for the SN6000 Single Power Supply Fibre Channel Switch and the
SN6000 Dual Power Supply Fibre Channel Switch. The power supply is replaceable on both SN6000
Fibre Channel Switches, and is hot-swappable on the SN6000 Dual Power Supply Fibre Channel Switch.
The power supply has a Status LED (Green) and a Fault LED (Amber) as shown in Figure 22. Under normal
operating conditions, the Power Supply Status LED is illuminated and the Power Supply Fault LED is
extinguished.
4. Enter the maintenance mode account name (prom) and password (prom), and press Enter.
Switch login: prom
Password: xxxx
5. Select option 1 from the maintenance menu. When prompted for a file name, enter the firmware image
file name:
Image filename: filename
Unpacking ’filename’, please wait...
Unpackage successful.
6. Select option 7, Reset Switch, to reset the switch and exit maintenance mode.
58
Resetting the network configuration in maintenance mode (option 2)
The Reset Network Config option resets the network properties to the factory default values and saves them
on the switch. For default network configuration values, see ”Factory Configuration Defaults” (page 79).
NOTE: If you choose the Remake Filesystem option, you will lose all changes made to the fabric
configuration that involve that switch, such as password and zoning changes. You must then restore the
switch from an archived configuration or reconfigure the portions of the fabric that involve the switch.
WARNING! The battery may explode if replaced incorrectly. Replace only with the same or equivalent
type recommended by the manufacturer. Dispose of the used battery according to the manufacturer’s
instructions.
WARNING! Bei unsachgemäß ausgetauschter Batterie besteht Explosionsgefahr. Die Batterie nur mit der
gleichen Batterie oder mit einem äquivalenten, vom Hersteller empfohlenen Batterietyp ersetzen. Die
gebrauchte Batterie gemäß den Herstelleranweisungen entsorgen.
WARNING! Danger d’explosion si le remplacement de la pile est incorrect. Ne remplacer que par une
pile de type identique ou équivalent recommandé par le fabricant. Jeter la pile usagée en observant les
instructions du fabricant.
NOTE: The SFP and XPAK transceivers fits only one way. If the transceiver does not install under gentle
pressure, invert it and try again.
NOTE: Both power supplies on the SN6000 Dual Power Supply Fibre Channel Switch must have the same
air flow direction to prevent the switch from overheating. To avoid overheating, do not operate the switch
with one power supply any longer than necessary.
62
4. Plug the power cord into the AC receptacle. Confirm that air flow direction is correct.
1
2
Convention Element
Medium blue text: Figure 1 Cross-reference links and email addresses
Monospace, bold font Emphasis of monospace text, including file and directory names,
system output, code, and text typed at the command line
WARNING! Indicates that failure to follow directions could result in bodily harm or death.
CAUTION: Indicates that failure to follow directions could result in damage to equipment or data.
Rack stability
Subscription service
HP recommends that you register your product at the Subscriber's Choice for Business website:
http://www.hp.com/go/e-updates. After registering, you will receive an e-mail notification of product
enhancements, new driver versions, firmware updates, and other product resources.
Documentation feedback
HP welcomes your feedback.
To make comments and suggestions about product documentation, send a message to
[email protected]. Include the document title and manufacturing part number. All
submissions become the property of HP.
Related information
Documents
In addition to this guide, see the following documents for this product:
• HP 8/20q and SN6000 Fibre Channel Switch Quick Start Installation Instructions
• HP 8Gb SAN Connection Kit Quick Start Instructions
• HP 8/20q and SN6000 Fibre Channel Switch Rack-Mount Kit Quick Start Installation Instructions
• HP SN6000 Fibre Channel Switch QuickTools Switch Management User Guide
• HP SN6000 Fibre Channel Switch Command Line Interface Guide
66
• HP SN6000 Fibre Channel Switch Command Line Interface Quick Reference Guide
• HP 8/20q and SN6000 Fibre Channel Switch Enterprise Fabric Management Suite User Guide
• HP SAN Connection Manager User Guide
• HP 8/20q and SN6000 Fibre Channel Switch Event Message Reference Guide
• HP 8/20q and SN6000 Fibre Channel Switch Simple Network Management Protocol Reference
Guide
• HP 8/20q and SN6000 Fibre Channel Switch CIM Agent Reference Guide
For the latest product information, including firmware, documentation, and supported SAN configurations,
see the following HP website: http://www.hp.com/go/SN6000.
Other HP websites
For additional information, see the following HP websites:
• http://www.hp.com
• http://www.hp.com/go/storage
• http://www.docs.hp.com
• http://www.hp.com/go/sandesignguide
NOTE:
Some HP parts are not designed for Customer Self Repair. In order to satisfy the customer warranty, HP
requires that an authorized service provider replace the part. These parts are identified as No in the
Illustrated Parts Catalog.
Based on availability and where geography permits, Customer Self Repair parts will be shipped for next
business day delivery. Same day or four-hour delivery may be offered at an additional charge where
geography permits. If assistance is required, you can call the HP Technical Support Center and a
technician will help you over the telephone. HP specifies in the materials shipped with a replacement
Customer Self Repair part whether a defective part must be returned to HP. In cases where it is required to
return the defective part to HP, you must ship the defective part back to HP within a defined period of time,
normally five (5) business days. The defective part must be returned with the associated documentation in
the provided shipping material. Failure to return the defective part may result in HP billing you for the
replacement. With a Customer Self Repair, HP will pay all shipping and part return costs and determine
the courier/carrier to be used.
For more information about the HP Customer Self Repair program, contact your local service provider. For
the North American program, visit the HP website: (http://www.hp.com/go/selfrepair).
Laser device
All HP systems equipped with a laser device comply with safety standards, including International
Electrotechnical Commission (IEC) 825, and 21 CFR 1040.10 and 11040.11. With specific regard to the
laser, the equipment complies with laser product performance standards set by government agencies as a
Class 1 laser product. The product does not emit hazardous light.
WARNING!
To reduce the risk of exposure to hazardous radiation:
• Do not try to open the laser device enclosure. There are no user-serviceable components inside.
• Do not operate controls, make adjustments, or perform procedures to the laser device other than those
specified herein.
• Allow only HP authorized service technicians to repair the laser device.
70
European Union regulatory notice
This product complies with the following Eurupean Union (EU) directives:
• Low Voltage Directive 2006/95/EC
• EMC Directive 2004/108/EC
Compliance with these directives implies conformity to applicable harmonized European standards
(European norms), which are listed on the EU Declaration of Conformity issued by Hewlett-Packard for this
product or product family. This compliance is indicated by the following conformity marking placed on the
product:
This marking is valid for non-telecommunications This marking is valid for EU non-harmonized
products and EU harmonized telecommunications telecomunications products.
products. *Notified body number (used only if applicable—
refer to the product label)
Japanese notice
Korean notice
Taiwan notice
\
仅适用于非热带气候条件下安全使用
May be used safely only in non-tropical climates.
72
B How to Prevent Electrostatic Discharge
To prevent damage to the system, you must follow certain precautions when setting up the system or
handling parts. A discharge of static electricity from a finger or other conductor may damage system
boards or other static-sensitive devices. This type of damage may reduce the life expectancy of the device.
To prevent electrostatic damage, observe the following precautions:
• Avoid hand contact by transporting and storing products in static-safe containers.
• Keep electrostatic-sensitive parts in their containers until they arrive at static-free workstations.
• Place parts on a grounded surface before removing them from their containers.
• Avoid touching pins, leads, or circuitry.
• Always make sure you are properly grounded when touching a static-sensitive component or assembly.
Grounding methods
There are several methods for grounding. Use one or more of the following methods when handling or
installing electrostatic-sensitive parts:
• Use a wrist strap connected by a ground cord to a grounded workstation or chassis. Wrist straps are
flexible straps with a minimum of 1 megohm ± 10 percent resistance in the ground cords. To provide
proper ground, wear the strap snug against the skin.
• Use heel straps, toe straps, or boot straps at standing workstations. Wear the straps on both feet when
standing on conductive floors or static-dissipating floor mats.
• Use conductive field service tools.
• Use a portable field service kit with a folding static-dissipating work mat.
If you do not have any of the suggested equipment for proper grounding, have an HP authorized reseller
install the part.
NOTE: For more information on static electricity, or for assistance with product installation, contact your
HP authorized reseller.
General specifications
Table 11 lists general specifications for the SN6000 Fibre Channel Switch.
Specification Description
Fibre Channel protocols FC-PH Rev. 4.3
FC-PH-2
FC-PH-3
FC-AL Rev 4.6
FC-AL-2 Rev 7.0
FC-FLA
FC-GS
FC-GS-2
FC-GS-3
FC-FG
FC-SW-2
FC-Tape
FC-VI
Fibre Alliance MIB Version 4.0
Fibre Channel Element MIB RFC 2837\
Fibre Channel classes of service Classes 2 and 3
Modes of operation Fibre Channel Classes 2 and 3,
connectionless
Port types
• SFP ports G_Port, GL_Port, F_Port, FL_Port, E_Port,
TR_Port
• XPAK ports G_Port, F_Port, E_Port
Port characteristics All ports are auto-discovering and
self-configuring.
Number of Fibre Channel ports 12-port single power supply model: Four
XPAK ports and eight SFP ports are active.
Additional ports can be activated in four
port increments with the port activation
license key.
24-port single and dual power supply
models: Four XPAK ports and 20 SFP ports
are active.
Specification Description
Scalability Maximum 239 switches, depending on
configuration. For the latest supported
configurations, see the SAN Design
Reference Guide available at
http://www.hp.com/go/SANdesignguide.
Maximum user ports > 475,000 ports depending on
configuration. For the latest supported
configurations, see the SAN Design
Reference Guide available at
http://www.hp.com/go/SANdesignguide.
Buffer credits 16 buffer credits per port, ASIC embedded
memory
Media type SFP optical transceiver (ports 0-19)
XPAK optical transceive (ports 20-23)
Fabric port speed 2.125, 4.250, 8.50 Gb/s
Maximum frame size 2,148 bytes (2112 byte payload)
System processor 440EP PowerPc
Fabric latency (intra-switch)
2 Gb/s to 2 Gb/s < 0.6 μsec
4 Gb/s to 4 Gb/s < 0.3 μsec
8 Gb/s to 8 Gb/s < 0.2 μsec
10 Gb/s to 10 Gb/s < 0.2 μsec
20 Gb/s to 20 Gb/s < 0.2 μsec
Bandwidth
Point-to-point 425 MB, full duplex at 2 Gb/s
850 MB, full duplex at 4 Gb/s
1,700 MB, full duplex at 8 Gb/s
2,550 MB, full duplex at 10 Gb/s
5,100 MB, full duplex at 20 Gb/s
Aggregate (single switch) Up to 54 GB full duplex
Air flow Front-to-back
76
Maintainability features
Table 12 lists maintainability features for the SN6000 Fibre Channel Switch.
Specification Description
Diagnostics The POST tests all functional components
except SFP transceivers. Port tests include
online, internal, and external tests.
User interface LED indicators
Field replaceable units (FRUs) Power supply
Specification Description
Management methods Command Line Interface
FTP
GS-3 Management Server
SAN Connection Manager graphical user
interface
QuickTools web applet
Enterprise Fabric Management Suite
SMI-S
SNMP
TFTP
Maintenance connection RS-232 connector; null modem F/F DB9
cable
Ethernet connection RJ-45 connector; 10/100 BASE-T cable
Switch agent Allows a network management station to
obtain configuration values, traffic
information, and failure data pertaining to
the Fibre Channels using SNMP through the
Ethernet interface.
Property Value
Height 1U or 43.2 mm (1.70 in)
Electrical specifications
Table 15 lists electrical specifications for the SN6000 Fibre Channel Switch.
Specification Description
Operating voltage 100 to 240 VAC; 50 to 60 Hz
Heat output (maximum) Dual power: 80 watts nominal; 90 watts typical maximum
Single power: 73 watts nominal; 83 watts typical maximum
Environmental requirements
To ensure proper operation, the switch must not be subjected to environmental conditions beyond those for
which it was tested. The ranges specified in Table 16 identify the acceptable environment for both
operating and non-operating conditions.
78
D Factory Configuration Defaults
This appendix describes the factory configuration defaults.
Parameter Default
AdminState Online
BroadcastEnabled True
InbandEnabled True
FDMIEnabled True
FDMIEntries 1,000
DefaultDomainID 1 (0x Hex)
DomainIDLock False
SymbolicName SN6000 FC Switch
R_A_TOV 10000
E_D_TOV 2000
PrincipalPriority 254
ConfigDescription Default Config
InteropMode Standard
80
Factory port threshold alarm configuration
Enter show config threshold CLI command to display threshold alarm configuration values. If the
ThresholdMonitoringEnabled parameter is disabled (False), none of the individual threshold monitoring
parameter settings can be applied.
Parameter Default
ThresholdMonitoringEnabled False
CRCErrorsMonitoringEnabled True
• RisingTrigger 25
• FallingTrigger 1
• SampleWindow
10
DecodeErrorsMonitoringEnabled True
• RisingTrigger 25
• FallingTrigger 0
• SampleWindow
10
ISLMonitoringEnabled True
• RisingTrigger 2
• FallingTrigger 0
• SampleWindow
10
LoginMonitoringEnabled True
• RisingTrigger 5
• FallingTrigger 1
• SampleWindow
10
LogoutMonitoringEnabled True
• RisingTrigger 5
• FallingTrigger 1
• SampleWindow
10
LOSMonitoringEnabled True
• RisingTrigger 100
• FallingTrigger 5
• SampleWindow
10
Parameter Default
MergeAutoSave True
DefaultZone Allow
DiscardInactive False
Parameter Default
SNMPEnabled True
Contact <syscontact undefined>
Location <sysLocation undefined>
Description For AW575A and BK780A:
HP SN6000 Stackable Single Power
Supply Fibre Channel Switch
For AW576A:
HP SN6000 Stackable Dual Power
Supply Fibre Channel Switch
ObjectID HP SN6000 Stackable Single Power
Supply Fibre Channel Switch:
1.3.6.1.4.1.3873.1.24
HP SN6000 Stackable Dual Power
Supply Fibre Channel Switch:
1.3.6.1.4.1.3873.1.25
AuthFailureTrap False
ProxyEnabled True
SNMPv3Enabled False
Trap [1-5] Address Trap 1: 10.0.0.254
Traps 2–5: 0.0.0.0
Trap [1-5] Port 162
Trap [1-5] Severity Warning
Trap [1-5] Version 2
Trap [1-5] Enabled False
82
Factory switch services configuration
Enter the show setup services CLI command to display switch service configuration values.
Parameter Default
TelnetEnabled True
SSHEnabled False
GUIMgmtEnabled True
SSLMgmtEnabled False
EmbeddedGUIEnabled True
SNMPEnabled True
NTPEnabled False
CIMEnabled True
FTPEnabled True
MgmtServerEnabled True
CallHomeEnabled True
Parameter Default
DNSClientEnabled False
DNSLocalHostname <undefined>
DNSServerDiscovery Static
DNSServer1Address <undefined>
DNSServer2Address <undefined>
DNSServer3Address <undefined>
DNSSearchListDiscovery Static
DNSSearchList1 <undefined>
DNSSearchList2 <undefined>
DNSSearchList3 <undefined>
DNSSearchList4 <undefined>
DNSSearchList5 <undefined>
Parameter Default
EthIPv4NetworkEnable True
EthIPv4NetworkDiscovery Static
EthIPv4NetworkIPAddress 10.0.0.1
EthIPv4NetworkIPMask 255.0.0.0
EthIPv4GatewayAddress 10.0.0.254
Parameter Default
EthIPv6NetworkEnable True
EthIPv6NetworkDiscovery Ndp
EthIPv6NetworkAddress ::/64
EthIPv6GatewayAddress ::
Parameter Default
LocalLogEnabled True
RemotelogEnabled False
RemoteLogHostAddress 10.0.0.254
Parameter Default
NTPClientEnabled False
NTPServerAddress 10.0.0.254
NTPServerDiscovery Static
84
Factory timer configuration
Enter the show setup system timers CLI command to display the timer configuration values.
Parameter Default
AdminTimeout 30
InactivityTimeout 0
Parameter Default
DeviceAuthOrder Local
UserAuthOrder Local
TotalServers 0
DeviceAuthServer False
UserAuthServer False
AccountingServer False
ServerIPAddress 10.0.0.1
ServerUDPPort 1812
Timeout 2 seconds
Retries 0
SignPackets False
Parameter Default
AutoSave True
FabricBindingEnabled False
PortBindingEnabled False
Parameters Default
PrimarySMTPServerAddr 0.0.0.0
PrimarySMTPServerPort 25
PrimarySMTPServerEnabled False
SecondarySMTPServerAddr 0.0.0.0
SecondarySMTPServerPort 25
SecondarySMTPServerEnabled False
ContactEmailAddress [email protected]
PhoneNumber <undefined>
StreetAddress <undefined>
FromEmailAddress [email protected]
ReplyToEmailAddress [email protected]
ThrottleDupsEnabled True
86
Glossary
This glossary defines terms used in this guide or related to this product. It is not a comprehensive glossary
of computer terms.
88
Maintenance mode Maintenance mode sets the IP address to 10.0.0.1 and provides access to the switch for
maintenance purposes.
Management Information A set of guidelines and definitions for SNMP functions. See Simple Network
Base (MIB) Management Protocol (SNMP).
Management station Workstation or server used to run SAN Connection Manager.
N_Port Node port. A Fibre Channel device port in a point-to-point or fabric connection.
Network Time Protocol A network protocol that enables a client to synchronize its time with a server.
(NTP)
NL_Port Node loop port. A Fibre Channel device port that supports arbitrated loop protocol.
N-Port ID Virtualization A Fibre Channel facility allowing multiple N_Port IDs to share a single physical N_Port.
(NPIV)
Pending firmware The firmware image that will be activated upon the next switch reset.
Port binding An authorization method that defines a list of device WWNs that can login to a switch
port. See Worldwide Name (WWN).
Power-on self test (POST) Diagnostics that the switch performs at start up.
Principal switch The switch in the fabric that manages domain ID assignments. See Domain ID.
QuickTools A browser-based switch management application that resides in the switch firmware.
Remote Authentication A service that supports the remote authentication of user and device logins to a switch.
Dial-in Service (RADIUS)
SAN Connection Manager A management application that provides a single pane of glass management for
(SCM) managing and provisioning storage from HP MSA/EVA storage arrays, managing
HBAs and managing H-series switches. SCM provides switch functions for day to day
management activities such as, IP network configuration, administrative password
control, SNMP setup, firmware upgrades, and implementation of HP best zoning
practices (single initiator zoning).
Secure shell (SSH) A protocol that secures connections to the switch for the command line interface.
Secure socket layer (SSL) A protocol that secures connections to the switch for QuickTools, Enterprise Fabric
Management Suite, and SMI-S.
Security association An IP security profile that defines the encryption algorithm and encryption key to apply
when called by a security policy. See IP Security.
Security policy An IP security profile that defines host-to-host, host-to-gateway, and gateway-to-gateway
connections; one policy for each direction. See IP Security.
Security set A set of up to three groups containing no more than one of each group type: ISL, Port, or
MS. The active security set defines the device security for a switch. See Group.
Simple Network An application protocol that manages and monitors network communications and
Management Protocol functions. It also controls the Management Information Base (MIB). See Management
(SNMP) Information Base (MIB).
Small form-factor A transceiver device, smaller than a GigaBit interface converter, that plugs into the Fibre
pluggable (SFP) Channel port.
Stacking cable An XPAK cable used to connect two or more switches through the 10 Gb/s ports.
Storage Management A standard that provides for the management of the switch through third-party
Initiative–Specification management applications.
(SMI-S)
System Fault LED A switch LED that indicates that a fault exists in the switch firmware or hardware.
Target A storage device that responds to an initiator device.
TR_Port Transparent routing port. A port type that uses the Fibre Channel industry standard NPIV
to provide access to devices on a remote HP B-series or C-series fabric.
User account An object stored on a switch that consists of an account name, password, authority level,
and expiration date.
90
Index
Numerics authorization 30
10/100 Base-T straight cable 41 cabling 43
20Gb ISL license key 22 description 19
performance 22
A security 30
diagnostics 51, 52, 77
account name
digital certificate 29
default 42
dimensions 78
FTP 45
disk space 33
maintenance mode 58
distance 20
active zone set 19
document conventions 65
Activity LED 13, 15
documentation, HP website 67
air flow 76
domain ID
alias 19
conflict 55
altitude 78
description 23
association 29
lock 23
authority 29
authorization 30
E
B E_Port 14, 54
e-mail notification 28
bandwidth 21, 76
encryption 29
boot loader 59
Enterprise Fabric Management Suite 18
browser 33, 34
environmental
buffer credit 20, 76
conditions 34
specifications 78
C
error
cable critical 52
10/100 Base-T 41 fatal POST 53
10/100 Base-T crossover 41 port 55
null modem F/F DB9 41 Ethernet
cable length 20 direct connection 41
Call Home service indirect connection 41
configure to HP service 46 port 15
description 28 extended credits 20
certificate 29, 30
certificate authority 29 F
classes of service 75
F_Port 14
command line interface 17
fabric
Common Information Model 28
management 31, 77
configuration
management switch 15
file system error 11, 53
point-to-point bandwidth 76
remove 59
port 14
restore default 59
security 29
controls 10
factory defaults 59
conventions
feature licenses 22
document 65
Fibre Channel
text symbols 65
ports 12
credits 20, 76
protocols 75
critical error 52
Field Replaceable Unit 77
File Transfer Protocol
D
account name 45
device description 18
access 19 service 28
authentication 30
92
number of 75 serial port 15, 39, 41
security 30 SFP - See Small Form-Factor Pluggable
serial 15 shock 78
SFP 12 Simple Mail Transfer Protocol 28
speed 76 Simple Network Management Protocol
transparent routing 14 description 18
types 14, 75 service 28
XPAK 12 site requirements 33
port activation license key 22 six-switch stacking 25
POST - See Power-on self test small form-factor pluggable
power installation 39
consumption 78 port 12
requirements 34 transceiver 13, 61
source loading 78 SMI-S - See Storage Management Initiative-Specification
Power Supply Fault LED 16 SMTP - See Simple Mail Transfer Protocol
Power Supply Status LED 16 SNMP - See Simple Network Management Protocol
Power-on self test soft zone 19
description 52 SSH - See Secure Shell
fatal error 53 SSL - See Secure Socket Layer
principal stacking 24
priority 23 Storage Management Initiative-Specification 18
switch 23 Subscriber’s choice, HP 66
processor 33, 34, 76 surface mount 35
Public Key Infrastructure 29 switch
add to fabric 46
Q air flow 76
QuickTools configuration 41
service 28 diagnostics 51
web applet 17 management 17
management service 28
R power up 40
rack mount 35 recovery 57
rack stability, warning 66 reset 11, 59
RADIUS - See Remote Dial-In User Service. services 28
recovering a switch 57 shock 78
remake filesystem 59 specifications 75
Remote Dial-In User Service 29, 30 vibration 78
Remote Support Pack 47 symbols in text 65
Remote Support Software Manager 47 System Fault LED 10, 52
RS-232 port 15 system processor 76
S T
SAN Connection Manager 17 technical support, HP 66
scalability 76 Telnet service 28
Secure Shell temperature
description 30 error 53
service 28 operating range 34, 78
Secure Socket Layer service 28 text symbols 65
security three-switch-stacking 24
association 29 timeout values 55
certificate 30 TR_Port 14
connection 30 transceiver
database limits 30 description 13
device 30 diagnostics 56
fabric 29 installation 39
IP 29 replacement 61
policy 29 transmission rate 20, 21
user account 29 transparent routing 14, 26
two-switch stacking 24
V
vibration 78
voltage 78
W
warning
rack stability 66
web applet
description 17
service 28
websites
HP documentation 67
HP storage 67
HP Subscriber’s choice 66
workstation
configuration 39
connecting 41
IP address 39
operating system 15
requirements 33
X
XPAK port 12
Z
zone
conflict 55
definition 19
zone set
active 19
definition 19
zoning
database 20
hardware-enforced 19
limits 20
94