HP StorageWorks 2/16V HP StorageWorks Fabric OS 5.3.x administrator guide (569 - Page 166

Admin Domain interactions, Table 48 Admin Domain interaction with Fabric OS features (continued)

Page 166 highlights

that are not part of the current zone enforcement table. A member might not be part of the zone enforcement table because: • The device is offline. • The device is online, but is connected to an AD-unaware switch. • The device is online but is not part of the current Admin Domain. For more information about the zone command and its use with Admin Domains, see the Fabric OS Command Reference Manual. Admin Domain interactions The administrative domain feature provides interaction with other Fabric OS features and across third-party applications. You can manage Admin Domains with Web Tools applications and with Fabric Manager. If the current Admin Domain owns the switch, you can perform Fabric Watch operations. Admin Domain interactions do not extend to user session tunneling across switches. A user logged into a switch can control only the local switch ports as specified in the Admin Domain. When the fabric is in secure mode, the following applies: • There is no support for ACL configuration under each Administrative Domain. • ACL configuration commands are allowed only in AD0 and AD255. None of the policy configurations are validated with AD membership. • You cannot use Admin Domains and Secure Fabric OS in combination. The Secure Fabric OS environment does not support Admin Domains: • If Secure Fabric OS is active, you cannot configure Admin Domains. • If Admin Domains are configured, you cannot use Secure Fabric OS. Table 48 lists some of the Fabric OS features and considerations that apply when using Admin Domains. Table 48 Admin Domain interaction with Fabric OS features Fabric OS feature Admin Domain interaction ACLs Advanced Performance Monitoring (APM) Fabric Watch FCR FDMI If no user-defined Admin Domains exist, you can run ACL configuration commands in only AD0 and AD255. If any user-defined Admin Domains exist, you can run ACL configuration commands only in AD255. You cannot use ACL configuration commands or validate ACL policy configurations against AD membership under each Admin Domain. All APM-related filter setup and statistics viewing is allowed only if the local switch is part of the current Admin Domain. Fabric Watch configuration operations are allowed only if the local switch is part of the current Admin Domain. You can create LSAN zones as a physical fabric administrator or as an individual AD administrator. The LSAN zone can be part of the root zone database or the AD zone database. • FCR collects the LSAN zones from all ADs. If both edge fabrics have matching LSAN zones and both devices are online, FCR triggers a device import. • LSAN zone enforcement in the local fabric occurs only if the AD member list contains both of the devices (local and imported device) specified in the LSAN zone. To support legacy applications, WWNs are reported based on the AD context using NAA=5. As a result, you cannot use the NAA=5 field alone in the WWN to detect an FC Router. FDMI operations are allowed only in AD0 and AD255. 168 Managing administrative domains

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465

168
Managing administrative domains
that are not part of the current zone enforcement table. A member might not be part of the zone
enforcement table because:
The device is offline.
The device is online, but is connected to an AD-unaware switch.
The device is online but is not part of the current Admin Domain.
For more information about the
zone
command and its use with Admin Domains, see the
Fabric OS
Command Reference Manual
.
Admin Domain interactions
The administrative domain feature provides interaction with other Fabric OS features and across third-party
applications. You can manage Admin Domains with Web Tools applications and with Fabric Manager. If
the current Admin Domain owns the switch, you can perform Fabric Watch operations.
Admin Domain interactions do not extend to user session tunneling across switches. A user logged into a
switch can control only the local switch ports as specified in the Admin Domain.
When the fabric is in secure mode, the following applies:
There is no support for ACL configuration under each Administrative Domain.
ACL configuration commands are allowed only in AD0 and AD255. None of the policy configurations
are validated with AD membership.
You cannot use Admin Domains and Secure Fabric OS in combination. The Secure Fabric OS
environment does not support Admin Domains:
If Secure Fabric OS is active, you cannot configure Admin Domains.
If Admin Domains are configured, you cannot use Secure Fabric OS.
Table 48
lists some of the Fabric OS features and considerations that apply when using Admin Domains.
Table 48
Admin Domain interaction with Fabric OS features
Fabric OS feature
Admin Domain interaction
ACLs
If no user-defined Admin Domains exist, you can run ACL configuration
commands in only AD0 and AD255. If any user-defined Admin Domains exist,
you can run ACL configuration commands only in AD255.
You
cannot
use ACL configuration commands or validate ACL policy
configurations against AD membership under each Admin Domain.
Advanced
Performance
Monitoring (APM)
All APM-related filter setup and statistics viewing is allowed only if the local switch
is part of the current Admin Domain.
Fabric Watch
Fabric Watch configuration operations are allowed only if the local switch is part
of the current Admin Domain.
FCR
You can create LSAN zones as a physical fabric administrator or as an individual
AD administrator. The LSAN zone can be part of the root zone database or the
AD zone database.
FCR collects the LSAN zones from all ADs. If both edge fabrics have matching
LSAN zones and both devices are online, FCR triggers a device import.
LSAN zone enforcement in the local fabric occurs only if the AD member list
contains both of the devices (local and imported device) specified in the
LSAN zone.
To support legacy applications, WWNs are reported based on the AD context
using NAA=5. As a result, you cannot use the NAA=5 field alone in the WWN
to detect an FC Router.
FDMI
FDMI operations are allowed only in AD0 and AD255.