Solved

Documentation on old Brocade Fibre Switch

Posted on 2012-12-28
3
374 Views
Last Modified: 2013-01-29
Up till now I've setup iSCSI SAN environments. I'm delving into Fibre fabrics for the first time and have acquired some old used fibre hardware to test and learn on before jumping into buying new stuff.

I have an old discontinued Brocade Silkworm 3200 - 2G Fibre.

I'm having a hard time finding any documentation on how to set it up, configure zoning, etc. So I can learn about this subject. Much less how to console in and setup the IP address, reset password, so I can web interface into it, etc. It seems like you might need a support contract to acquire this stuff - but I'm not 100% sure.

Before I jump into buying anything I want to learn about it so I can then buy the right new hardware. Can anyone help?
0
Comment
Question by:RFVDB
  • 2
3 Comments
 
LVL 29

Assisted Solution

by:ScottCha
ScottCha earned 500 total points
ID: 38727791
0
 
LVL 29

Accepted Solution

by:
ScottCha earned 500 total points
ID: 38727794
Google with "brocade silkworm 3200 manual" and you will see quite a few reference manuals.
0
 

Author Comment

by:RFVDB
ID: 38832881
Thanks ScottCha. However, the links you provided were either hardware installation, rack installation, reference manual to other manuals, etc. Finally after digging in and googling how to zone with a Brocade switch I found some very random websites that have them stored.
0

Featured Post

Optimizing Cloud Backup for Low Bandwidth

With cloud storage prices going down a growing number of SMBs start to use it for backup storage. Unfortunately, business data volume rarely fits the average Internet speed. This article provides an overview of main Internet speed challenges and reveals backup best practices.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

#Citrix #Citrix Netscaler #HTTP Compression #Load Balance
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

821 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question