AvailabilityGuard™ uses the following methods to collect configuration data regarding Brocade fabric switches:
Direct Brocade SAN Switch Scanning
When using a direct switch scan, AvailabilityGuard™ opens an SSH session to the Brocade SAN switch and executes read-only Brocade CLI show commands.
To scan a Brocade SAN switch, you should make the following preparations:
- Obtain the Switch Name or IP address - if not automatically discovered.
- Obtain a Switch user account with permission to run read-only commands. In a Virtual
Fabric environment, chassis permission is required.
- Verify that IP connectivity through SSH (default is port 22) is available between the AvailabilityGuard™ collector server and the Brocade Switch.
Brocade Network Advisor (BNA)
When using Brocade Network Advisor (BNA), AvailabilityGuard collects configuration data from BNA by running read-only REST API requests.
To scan BNA, you should make the following preparations:
- Obtain the BNA server name or IP address.
- Obtain a BNA user name and password with read-only rights.
- Verify that IP connectivity through REST API (port 443) is available between the AvailabilityGuard™ collector server and the BNA server.
- When scanning switches directly, AvailabilityGuard™ will automatically detect other Brocade switches in the same fabric. There's no need to manually define each Switch.
- It is possible to configure AvailabilityGuard™ to automatically add newly detected switches to the scan. For this reason, it is recommended to use a standard credential set for scanning Brocade SAN switches.
Please sign in to leave a comment.