Q-Logic MKII-BASE16 Manuel D’Utilisation

Page de 138
GigWorks MkII-16 Switch Model MKII-BASE16
Installer's/User's Manual            59003-01 Rev. A
Switch Management  
3-45
Managing the Switch Using TFTP
Loading New Management Interface Code Over an Invalid Management Interface Flash Load: (16-
Port Switch Only)
If the Switch is reset with invalid Management interface code in flash, it will not
automatically enter PROM mode, but will continue to switch data normally
through the Fibre Channel ports.  However, the management functions will not
operate. 
This procedure explains how to load new management interface code when an
invalid executable in flash was placed in execution by a reset operation.
1.
Set the Force PROM toggle switch on the Chassis Switch Panel to the ON
position. Refer to the Chassis Switch Panel appendix in this manual for the
location of the Force PROM (FP) switch.
2.
Reset the Switch by cycling its power.  The Switch will come up in PROM
mode.
3.
Connect to the Switch using TFTP.
4.
Select binary file transfer mode.
5.
Transfer the new management interface code into the Switch file named
mkiimgmt..  
6.
Return the Force PROM toggle switch on the Chassis Switch Panel to the
OFF position.
If the file transfer succeeds, the new executable has been saved in the Switch
flash, and will be executed next time the Switch is reset. A reset operation takes
place when the Switch power is cycled. You may also reset the Switch using
TFTP. This is described later in this section.
Reset the Switch Using TFTP:
Reset the Switch via TFTP by attempting to read or write a file named reset.  This
is not a valid file name on the Switch, but any request from a TFTP client to store
or retrieve a file named reset will cause the Switch to reset itself.
To reset the Switch using TFTP
1.
Connect to the Switch using TFTP.
2.
Select either binary or text file transfer mode.
3.
Attempt either to upload or to download a file named reset.
The Switch will return the error message, “MKII RESET” before resetting.
Note: Since resetting the Switch disrupts service on the Fibre Channel ports, this
feature allows a possible denial-of-service attack on the Switch.  Only trusted
users should have access to the management port on the Switch.