Dell Brocade 5100 Brocade Fabric OS v7.3.0a Release Notes v2.0 - Page 42

With Windows and Veritas Volume Manager/Veritas Dynamic Multipathing, when LUN sizes less than

Page 42 highlights

FOS v6.4.0x Any version prior to FOS v6.4.0 500 ms 500 ms Gen 5 platforms and blades are capable of setting an EHT value on an individual port basis. On 8G platforms EHT is set on an ASIC-wide basis, meaning all ports on a common ASIC will have the same EHT setting. Extra care should be given when configuring EHT on 8G platforms or Gen 5 platforms with 8G blades to ensure E_Ports are configured with an appropriate Hold Time setting. When using Virtual Fabrics and creating a new Logical Switch when running FOS v7.1.0 or later, the default EHT setting for the new Logical Switch will be the FOS default value of 220ms. However, with FOS v7.1.0 and later, each Logical Switch can be configured with a unique EHT setting that is independent of other Logical Switches and the Default Switch. Any Gen 5 ports (Condor3 based) assigned to that Logical Switch will be configured with that Logical Switch's EHT setting. Any 8G ports (Condor2 based) will continue to share the EHT value configured for the Default Switch. For more information on EHT behaviors and recommendations, refer to the Brocade SAN Fabric Resiliency Best Practices v2.0 document available on www.brocade.com. Encryption Behavior for the Brocade Encryption Switch (BES) and FS8-18  SafeNet's KeySecure hosting NetApp's LKM (SSKM) is supported for data encryption operations with SSKM operating in PVM mode. Please see SSKM documentation for operating in PVM mode for details. Operation in HVM mode is not supported  RASlog SPC-3005 with error 34 may be seen if the link key used by a BES/FS8-18 is re- established. Please refer to the LKM/SSKM Encryption Admin Guide for the workaround. Also, please ensure that two (2) SSKM's are present in the deployment for workaround to be performed.  For crypto tape operations, please ensure to use Emulex FC HBA firmware/drivers 2.82A4/7.2.50.007 or higher. Use of lower level firmware/drivers may result in hosts not being able to access their tape LUNs through a crypto target container.  Adding of 3PAR Session/Enclosure LUNs to CTCs is now supported. Session/Enclosure LUNs (LUN 0xFE) used by 3PAR InServ arrays must be added to CryptoTarget (CTC) containers with LUN state set to "cleartext", encryption policy set to "cleartext". BES/FS8-18 will not perform any explicit enforcement of this requirement.  The Brocade Encryption switch and FS8-18 blade do not support QoS. When using encryption or Frame Redirection, participating flows should not be included in QoS Zones.  The RSA DPM Appliance SW v3.2 is supported. The procedure for setting up the DPM Appliance with BES or a DCX/DCX-4S/DCX 8510 with FS8-18 blades is located in the Encryption Admin Guide.  Support for registering a 2nd DPM Appliance on BES/FS8-18 is blocked. If the DPM Appliances are clustered, then the virtual IP address hosted by a 3rd party IP load balancer for the DPM Cluster must be registered on BES/FS8-18 in the primary slot for Key Vault IP.  With Windows and Veritas Volume Manager/Veritas Dynamic Multipathing, when LUN sizes less than 400MB are presented to BES for encryption, a host panic may occur and this configuration is not supported in the FOS v6.3.1 or later release.  Hot Code Load from FOS v7.2.x to FOS v7.3 is supported. Cryptographic operations and I/O will be disrupted but other layer 2 FC traffic will not be disrupted.  When disk and tape CTCs are hosted on the same encryption engine, re-keying cannot be done while tape backup or restore operations are running. Re-keying operations must be scheduled at a time that Fabric OS v7.3.0a Release Notes v2.0 Page 42 of 55

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55

Fabric OS v7.3.0a Release Notes v2.0
Page 42 of 55
FOS v6.4.0x
500 ms
Any version prior to FOS v6.4.0
500 ms
Gen 5 platforms and blades are capable of setting an EHT value on an individual port basis. On 8G
platforms EHT is set on an ASIC-wide basis, meaning all ports on a common ASIC will have the same
EHT setting. Extra care should be given when configuring EHT on 8G platforms or Gen 5 platforms
with 8G blades to ensure E_Ports are configured with an appropriate Hold Time setting.
When using Virtual Fabrics and creating a new Logical Switch when running FOS v7.1.0 or later, the
default EHT setting for the new Logical Switch will be the FOS default value of 220ms. However, with
FOS v7.1.0 and later, each Logical Switch can be configured with a unique EHT setting that is
independent of other Logical Switches and the Default Switch. Any Gen 5 ports (Condor3 based)
assigned to that Logical Switch will be configured with that Logical Switch’s EHT setting.
Any 8G ports
(Condor2 based) will continue to share the EHT value configured for the Default Switch.
For more information on EHT behaviors and recommendations, refer to the Brocade SAN Fabric
Resiliency Best Practices v2.0 document available on
www.brocade.com
.
Encryption Behavior for the Brocade Encryption Switch (BES) and FS8-18
SafeNet’s KeySecure hosting NetApp’s LKM (S
SKM) is supported for data encryption operations with
SSKM operating in PVM mode. Please see SSKM documentation for operating in PVM mode for
details. Operation in HVM mode is not supported
RASlog SPC-3005 with error 34 may be seen if the link key used by a BES/FS8-18 is re-
established.
Please refer to the LKM/SSKM Encryption Admin Guide for the workaround.
Also, please ensure that two (2)
SSKM’s are present in the deployment for workaround to be
performed.
For crypto tape operations, please ensure to use Emulex FC HBA firmware/drivers 2.82A4/7.2.50.007
or higher. Use of lower level firmware/drivers may result in hosts not being able to access their tape
LUNs through a crypto target container.
Adding of 3PAR Session/Enclosure LUNs to CTCs is now supported.
Session/Enclosure LUNs (LUN
0xFE) used by 3PAR InServ arrays must be added to CryptoTarget (CTC) containers with LUN state set
to
“cleartext”, encryption policy
set to
“cleartext”.
BES/FS8-18 will not perform any explicit
enforcement of this requirement.
The Brocade Encryption switch and FS8-18 blade do not support QoS.
When using encryption or
Frame Redirection, participating flows should not be included in QoS Zones.
The RSA DPM Appliance SW v3.2 is supported.
The procedure for setting up the DPM Appliance with
BES or a DCX/DCX-4S/DCX 8510 with FS8-18 blades is located in the Encryption Admin Guide.
Support for registering a 2nd DPM Appliance on BES/FS8-18 is blocked.
If the DPM Appliances are
clustered, then the virtual IP address hosted by a 3rd party IP load balancer for the DPM Cluster must
be registered on BES/FS8-18 in the primary slot for Key Vault IP.
With Windows and Veritas Volume Manager/Veritas Dynamic Multipathing, when LUN sizes less than
400MB are presented to BES for encryption, a host panic may occur and this configuration is not
supported in the FOS v6.3.1 or later release.
Hot Code Load from FOS v7.2.x to FOS v7.3 is supported.
Cryptographic operations and I/O will be
disrupted but other layer 2 FC traffic will not be disrupted.
When disk and tape CTCs are hosted on the same encryption engine, re-keying cannot be done while
tape backup or restore operations are running. Re-keying operations must be scheduled at a time that