Brocade Communications Systems 4016 manual Interpreting Post Results

Page 37

Interpreting POST Results

4

Secure telnet access is available using Secure Shell (SSH), a network security protocol for secure remote login and other secure network services over an insecure network.

Brocade Web Tools management is available via a secure browser using Secure Sockets Layer (SSL). The SSL security protocol provides data encryption, server authentication, message integrity, and optional client authentication for a TCP/IP connection. Because SSL is built into all major browsers and Web servers, installing a digital certificate enables the SSL capabilities.

Interpreting POST Results

The power-on self test (POST) system check is performed each time the switch is powered on, rebooted, or reset.

Example POSTOutput

POST1: Started running Tue Nov 9 20:27:57 GMT 2004

POST1: Test #1 - Running turboramtest

POST1: Test #2 - Running centralmemorytest

POST1: Test #3 - Running cmitest

POST2: Running diagshow

POST1: Script PASSED with exit status of 0 Tue Nov 9 20:28:10 GMT 2004 took (0: 0:13)

POST2: Started running Tue Nov 9 20:28:12 GMT 2004

POST2: Test #1 - Running camtest

POST2: Test #2 - Running txdpath

POST2: Test #3 - Running spinsilk (SERDES)

POST2: Running diagshow

POST2: Script PASSED with exit status of 0 Tue Nov 9 20:29:11 GMT 2004 took (0: 0:59)

Initializing Ports ....

Port Initialization Completed

Enabling switch...

During POST, the LEDs are activated in various indicator patterns.

To determine POST completion status:

Verify that the LEDs on the switch indicate a healthy SilkWorm 4016. LED patterns are described in “Interpreting LED Activity,” next.

If one or more LEDs do not display a healthy state, verify that the LEDs are not set to beacon. Use the switchShow command or Web Tools to verify the LED state. For information about how to turn beaconing on and off, see the Fabric OS Administrator’s Guide or the Web Tools Administrator’s Guide.

Use the blade server chassis’ management module to verify that the switch is working correctly. Refer to the blade server chassis documentation for details.

Review the system log for errors.

Any errors detected during POST are written to the system log. Access this log through the errShow command. For information about this command, see the Fabric OS Command Reference Manual. For information about error messages, see the Fabric OS System Error Message Reference Manual.

SilkWorm 4016 Hardware Reference Manual

4-3

Publication Number: 53-1000175-01

Image 37
Contents SilkWorm Brocade Communications Systems, Incorporated Document History Page Contents Chapter Installing the Brocade SilkWorm Index Publication Number How This Document Is Organized About This DocumentWhat’s New in This Document Supported Hardware and SoftwareDocument Conventions Text FormattingAdditional Information Fabric OS Optional FeaturesBrocade Resources Fabric OSOther Industry Resources Optional Brocade FeaturesGeneral Information Getting Technical HelpDocumentation@brocade.com Document FeedbackIntroducing the SilkWorm SilkWorm 4016 FeaturesSilkWorm 4016 Features Weight and Physical Dimensions Switch CharacteristicsMemory Additional Port Activation1Port Side of the SilkWorm Port SideLabeling Nonport Side4Insertion Arm Label SFPsISL Trunking Groups Brocade Optional Features# Active Ports External Port # Trunking groups Brocade Optional Features Unpacking the SilkWorm Installing the Brocade SilkWormTo remove the SilkWorm 4016 from its shipping package Inserting a SilkWorm 4016 into the Chassis Preparing the Blade Server for the SilkWormTo insert the SilkWorm 4016 into a blade server chassis Inserting a SilkWorm 4016 into the Chassis Inserting a SilkWorm 4016 into the Chassis Configuring the SilkWorm Configuring the Brocade SilkWormItems Required Creating a Serial Connection Setting the Switch IP Address Connecting to the SwitchCreating an Ethernet Connection To complete the switch configuration Completing the Switch ConfigurationConfiguring the SilkWorm Activating Ports with a POD License Activating Ports on Demand PODTo connect to the switch using Brocade’s Web Tools Connecting to the Switch Using Web ToolsRemoving POD-licensed Ports Connecting to the Switch Using Web Tools Operating the Brocade SilkWorm Switch Minimum VersionInteroperability Port Negotiation Accessing the SilkWormOperating System Support Operating System VersionTo determine Post completion status Interpreting Post ResultsInterpreting LED Activity Location Indicator Color OperationTo remove a failed or replaced SilkWorm Removing and Replacing the SilkWormSqueeze the release lever latch to release the SilkWorm Scale 1/8 = Removing and Replacing the SilkWorm Weight and Physical Dimensions Brocade SilkWorm 4016 SpecificationsFacility Requirements Table A-2Supported HBAs Architectural SpecificationTable A-3 Regulatory Compliance Fibre Channel Standards ComplianceFCC Warning US only MIC Statement Republic of KoreaBsmi Statement Chinese Vcci StatementCE Statement RTC BatteryCanadian Requirements Laser ComplianceCountry Safety Specification EMC Specification Electrical SafetyRegulatory Certifications Regulatory Compliance 3EMC Certifications Regulatory Compliance Index LED 1-2,4-3,4-4,4-5 Weight 1-3,A-1 Index-4