Resetting Brocade VDX 6740T

Notice: Page may contain affiliate links for which we may earn a small commission through services like Amazon Affiliates or Skimlinks.

Mwilliamson

New Member
Aug 15, 2020
19
7
3
Fenton, Michigan, USA
I recently picked up a Brocade VDX 6740T off Ebay, and I need a little assistance in resetting the default users and passwords. Admittedly, this purchase was a gamble, as it was listed as For Parts, with the stipulation that it runs but "we don't know the passwords".

Having done some homework, I ran across a couple of useful articles, linked below, however after following them, I am still denied access over the serial port with what should be the default username and password of... admin and password. The switch so helpfully tells me about a security violation, caused by an attempted login over the serial port, with an incorrect login.

At this point I have tried the procedure on both of the OS partitions, but neither has resulted in allowing me access; so either I made a mistake in copying user.db.default file over the user.db file at some point, or the switch's previous owner(s) did. I was wondering if anyone had an unaltered version of the user.db.default file available, and would be willing to share it? Any assistance here would be greatly appreciated, else I will chalk this gamble up in the loss column and learn from the experience.

Here's the article I was following: Password Recovery for VDX6740 | Extreme Networks Support Community
Resetting just the root user: Connectrix Brocade VDX: Recovering the ROOT and other users password for Brocade VDX switch. | Dell US
 

klui

Well-Known Member
Feb 3, 2019
824
453
63
The link at Dell is the right procedure. Did you get to the point where you use noscli and set the password for admin and user? root password is "fibranne" not "password".

It would help if you have your console log.
 

Mwilliamson

New Member
Aug 15, 2020
19
7
3
Fenton, Michigan, USA
Unfortunately I have not been able to log in with either the root, admin or even just user logins with the either of the default passwords, fibranne for root, or password for admin & user. The next time I'm playing at my bench I'll post the exact message about the failed login attempts.
 

Jason Antes

Active Member
Feb 28, 2020
224
76
28
Twin Cities
Unfortunately I have not been able to log in with either the root, admin or even just user logins with the either of the default passwords, fibranne for root, or password for admin & user. The next time I'm playing at my bench I'll post the exact message about the failed login attempts.
I had a similar issue with my 6740. I'll look and see if I still have the putty logs from when fohdeesha helped me out since I don't remember what it all entailed. Not sure if the thread I had put in of the resolution in it or not.
 

Jason Antes

Active Member
Feb 28, 2020
224
76
28
Twin Cities
I don't still have the logs but know that this is likely doable. I'm just not the person that is experienced enough to help more. If you don't care about licenses you could flash a new firwmare to it via USBBOOT.
 

klui

Well-Known Member
Feb 3, 2019
824
453
63
License keys already applied are displayed during boot. Just make it a habit to save your console logs.

It seems many VDX 6700s sold on eBay have 6.0.x installed. The Extreme site allows people who don't have a support contract but a free login to download 7.0.2.
 

leon_pro

New Member
Nov 3, 2017
24
5
3
40
License keys already applied are displayed during boot. Just make it a habit to save your console logs.
Noob question: is there a way to backup licenses? I have a switch with NOS 4.x and want to update it, and don't want to loose port upgrade license. Is it stored on internal CF card or somewhere else?
 

fohdeesha

Kaini Industries
Nov 20, 2016
2,728
3,078
113
33
fohdeesha.com
Noob question: is there a way to backup licenses? I have a switch with NOS 4.x and want to update it, and don't want to loose port upgrade license. Is it stored on internal CF card or somewhere else?
like he said, they're displayed during boot. just watch the boot output/log, the entire license string (one or more) will be displayed. that's the whole license. if for some reason it becomes unlicensed, you can just that string to re-install them with the license add command Q A: Licensing on VDX | Extreme Portal
 

leon_pro

New Member
Nov 3, 2017
24
5
3
40
Here's what shown during 1st boot:

BootROM version: 1.0.30
Copyright (C) 2011 Brocade Communication.

CPU0: P3041, Version: 2.0, (0x82110320)
Core: E500MC, Version: 3.2, (0x80230032)
Clock Configuration:
CPU0:1500 MHz, CPU1:1500 MHz, CPU2:1500 MHz, CPU3:1500 MHz,
CCB:750 MHz,
DDR:500 MHz (1000 MT/s data rate) (Asynchronous), LBC:46.875 MHz
FMAN1: 375 MHz
PME: 375 MHz
L1: D-cache 32 kB enabled
I-cache 32 kB enabled
Model ID: 137
Board: P3041 CASTOR-T, 36-bit Addressing
reset reason was 0x00000001: Power Up
I2C: ready
DRAM: Initializing....
Enabled DHC_EN
DIMM 0 [0xfe008174=0x8675a607] [0xfe008f38=0x0c0e0b0f] [0xfe008f3c=0x0e0b0d0c] [0xfe008f40=0x11004004]
6 GiB left unmapped
DDR: 8 GiB (DDR3, 64-bit, CL=7, ECC on)
testdram value not set, dram test not run
Now running in RAM - U-Boot at: 7ff20000
FLASH: 4 MiB
L2: 128 KB enabled
Corenet Platform Cache: 1024 KB enabled
SERDES: bank 2 disabled
PCI: gd->brcd_flags = 0, PCI init
PCIE1 connected to Slot 1 as Root Complex (base addr fe200000)
Scanning PCI bus 01
PCIE0 on bus 00 - 01
In: serial
Out: serial
Err: serial
SRIO1: disabled
SRIO2: disabled
NVRAM/RTC oscillator already turned on in a previous boot
Net: Fman: Uploading microcode version 101.6.0.
FM1@DTSEC4, FM1@DTSEC5
usb reset 0
(Re)start USB 0...
USB: Register 10011 NbrPorts 1
USB EHCI 1.00
scanning bus for devices... 2 USB Device(s) found
scanning bus for storage devices... 1 Storage Device(s) found
Hit ESC to stop autoboot: 5 4 3 2 1 0
Loading Environment 0 from NVRAM...
(Re)start USB 0...
USB: Register 10011 NbrPorts 1
USB EHCI 1.00
scanning bus for devices... 2 USB Device(s) found
scanning bus for storage devices... 1 Storage Device(s) found
setting prt to 1
Loading file "boot/zImage.tree.initrd" from usb device 0:1 (usbda1)
3538211 bytes read
Loading file "boot/silkworm.dtb" from usb device 0:1 (usbda1)
21396 bytes read
Loading file "boot/hv.uImage" from usb device 0:1 (usbda1)
420128 bytes read
Loading file "boot/silkworm_hct.dtb" from usb device 0:1 (usbda1)
12843 bytes read
WARNING: adjusting available memory to 30000000
## Booting kernel from Legacy Image at 02000000 ...
Image Name:
Image Type: PowerPC Linux Kernel Image (uncompressed)
Data Size: 420064 Bytes = 410.2 KiB
Load Address: 00000000
Entry Point: 00000000
Verifying Checksum ... OK
## Flattened Device Tree blob at 04000000
Booting using the fdt blob at 0x4000000
Loading Kernel Image ... OK
OK
Loading Device Tree to 00ff7000, end 00fff393 ... OK
=======================================
Freescale Hypervisor 0.8-004
Hypervisor command line: config-addr=0x3000000 p1-linux="root=/dev/sda1 rootfstype=ext4 quiet"
[0] malloc_init: using 31 MiB at 0x7e0b7930 - 0x7fffffff
Device tree compatible: brocade,SILKWORM_PB
[0] dt_read_aliases: Alias pci1 points to non-existent /pcie@ffe201000
[0] dt_read_aliases: Alias sec_jr0 points to non-existent /soc@ffe000000/crypto@300000/jr@1000
[0] dt_read_aliases: Alias sec_jr1 points to non-existent /soc@ffe000000/crypto@300000/jr@2000
[0] dt_read_aliases: Alias sec_jr2 points to non-existent /soc@ffe000000/crypto@300000/jr@3000
[0] dt_read_aliases: Alias sec_jr3 points to non-existent /soc@ffe000000/crypto@300000/jr@4000
[0] dt_read_aliases: Alias rtic_a points to non-existent /soc@ffe000000/crypto@300000/rtic@6000/rtic-a@0
[0] dt_read_aliases: Alias rtic_b points to non-existent /soc@ffe000000/crypto@300000/rtic@6000/rtic-b@20
[0] dt_read_aliases: Alias rtic_c points to non-existent /soc@ffe000000/crypto@300000/rtic@6000/rtic-c@40
[0] dt_read_aliases: Alias rtic_d points to non-existent /soc@ffe000000/crypto@300000/rtic@6000/rtic-d@60
[0] assign_callback: device serial0 in serial0 not found
[0] assign_callback: device /hvcpld in fpga not found
[0] remap_restart_init: undefine restart-maps-to. Setting to remap_restart_unc.
[0] watchdog enabled with period 38
HV> [1] watchdog enabled with period 38
HV> [2] watchdog enabled with period 38
HV> [3] watchdog enabled with period 38
HV> [0] assign_callback: device /soc/memory-controller@9000 in memory-controller@9000 not found
HV> [0] assign_callback: device mdio0 in mdio0 not found
HV> [0] assign_callback: device phy5 in phy5 not found
HV> Bootargs set for cpu = 0 guest p1-linux bootagrs = root=/dev/sda1 rootfstype=ext4 quiet
HV>
part1 ACTIVE
HV> [0] loading binary image from 0x79fff000 to 0x3000000
HV> [0] Loading uImage from 0x78000000 to 0
HV> [0] branching to guest p1-linux, 2 cpus
HV> this is quiet!

end of DRAM 4294967296 memstart_addr0 total_lowmem 4294967296
SLUB: dfree enabled
PRIMING SLUB: main caches
SLUB: export __kmalloc at 0x401068c0 changed to 0x40106c80
SLUB: export vmalloc at 0x400f55a8 changed to 0x400f535c
SLUB: export vfree at 0x400f4748 changed to 0x400f4678
network namespace NR (VRF) started
mdio_bus mdio: /devices/fman0/mdio@f1000/p4080ds-xmdio1 has invalid PHY address
mmod_sysctl_inited: 1

Fman microcode 51 45 46

FMAN microcode UC size 0x1b64
default MII is 0xc10a8000 for tsec0
default MII is 0xc10b0000 for tsec0
Uboot wdt counter value: 0
INIT: version 2.78 booting
e2fsck 1.41.12 (17-May-2010)
/dev/sda1: clean, 16342/122160 files, 172513/488281 blocks
e2fsck 1.41.12 (17-May-2010)
/dev/sda2: recovering journal
/dev/sda2: clean, 6967/122160 files, 124695/488192 blocks
Firmware Integrity Check is default off
Bypassing firmware validation.
mount: sysfs already mounted or /sys busy
mount: according to mtab, none is already mounted on /sys
mknod: /dev/fsl-hv: File exists
Hostname is ETH2
INIT: Entering runlevel: 3
FIPS-mode test application

1. Non-Approved cryptographic operation test...
a. Excluded algorithm (MD5)...successful
b. Included algorithm (D-H)...successful
2. Automatic power-up self test...successful
3. AES-128,192,256 CBC encryption/decryption...successful
4. RSA key generation and encryption/decryption...successful
4.1. RSA 2048 with 'SHA256' testing...successful
5. TDES-CBC encryption/decryption...successful
6a. SHA-1 hash...successful
6b. SHA-256 hash...successful
6c. SHA-512 hash...successful
6d. HMAC-SHA-1 hash...successful
6e. HMAC-SHA-224 hash...successful
6f. HMAC-SHA-256 hash...successful
6g. HMAC-SHA-384 hash...successful
6h. HMAC-SHA-512 hash...successful
7. Non-Approved cryptographic operation test...
a. Excluded algorithm (MD5)...Not executed
b. Included algorithm (D-H)...successful as expected
8. Zero-ization...Successful
9. TLS KDF...successful
10. SSH KDF...successful

All tests completed with 0 errors
Waiting to starting configuration management service
Starting configuration management service
[wmd_init]: chunk_size = 0xa00000
[wmd_init]: Checksum does not match. current_cksum = 0x16c0388f stored_cksum = 0x8fd5a6c1
[wmd_init]: FPGA version = 0x70007445
[wmd_init]: reset_reason = 0x1
[wmd_init]: updated reset_reason = 0x0

Reset reason = 0x1
wmem: b0004000:247439360
tbuf: 8ff00000:536854528
Found 1(threshold 5) abnormal reboots within 3000 seconds window(threshold)
KernelSpace rastrace_register
SWBD module launch ... Sat Oct 16 10:09:59 GMT 2021
Castor: PCIe Err handler init plat_pci_init[636]
bhpc_irq_init: Using default device map. Size 10

pcie_event_isr: ###### virq 174 core 0 MCSR 0x0 MSR 0x10021002 count 1
plat_pcie_error:Last addresses 0x0 0x0 0x0 0x0
0x0 0x0 0x0 0x0
0x0 0x0
CPLD INIT DONE
PCIe Event [UNKNOWN] slot 0 Source Bus 0 Dev 0 MM Parent Bus 0 Dev 0 Events: 1
AQ1402: Loaded Platform 137
MDIO Driver: Name [Freescale P4080DS MDIO Bus], Address [8acaa220]
GPIO CCSR phys addr = 0xffe130000, virt addr = 0xd830a000
cbr_rev_init: pci config word 0xc0220008 for Castors
cbr_rev_init: prs_reg[0].ctrl=0x00000102
cbr_rev_init: chip_rev detected=2
Cobra rev B found
Found Castor-T Type board Blade ID 145
Info: panic dump has been initialized!
Creating L3-L2 fifo Sat Oct 16 10:10:10 GMT 2021 ...
Starting HASM ... Sat Oct 16 10:10:10 GMT 2021
Exisitng reboot reason fsize = 5 rb=
Global Fan Direction: Port Side EXHAUST


Network OS (ETH2)


ETH2 console login: Starting Dcmd ... Sat Oct 16 10:10:19 GMT 2021
Starting Ccmd ... Sat Oct 16 10:10:19 GMT 2021
server starting
Restoring CCM databaseserver starting
Restoring DCM database..tp_register, got none fss tp handle=10000001h
2021/10/16-10:10:24, [HASM-1004], 45336,, INFO, VDX6740T, Processor reloaded - Reset.
........done
....................................waiting for server to shut down..... done
server stopped
...pg_ctl: PID file "/etc/fabos/Dcmd/WaveDatabase/postmaster.pid" does not exist
Is server running?
Dcmd Database is corrupted. Hence, clearing the database.
Sat Oct 16 10:12:54 GMT 2021 :: Confd: Waiting for Dcmd to become ready...
CHASSIS RECOV_ACTIVE
SNMP Research EMANATE/Lite Agent Version 16.2.0.9
Copyright 1989-2006 SNMP Research, Inc.
Sat Oct 16 10:13:09 GMT 2021 :: Triggering confd load phase1 after waiting for 5 secs
pcap_master_init - sm is NULL after ha_calloc
Critical FDB init success
2021/10/16-10:13:22, [BGP-1002], 45337,, INFO, ETH2, BGP: Daemon ready for action
.

Warn: imi_debug :zg->protocol is not set before lib_start()


CMSH called

nsm_client_start - ret = 0
nsm_client_start_resp_socket-2874 Starts ...
message_client_connect_resp_socket-859 ends
nsm_client_start_resp_socket-2894 succeeds.
Activating haml.. l2sys_client_haml_activate
NOS : Initialize DY-SYNC LIB : mgmt_state 34002110
NOS : Init bc_pkt 1024cc54 bc_index 20 ***
***********************************************************
hal_new_link_cb: NSM: initialized system SVI mac: 50:eb:1a:f4:a9:1f
************************************************************
2021/10/16-10:13:30, [NSM-1019], 45338, DCE, INFO, ETH2, Interface Ve 4093 is administratively up.
2021/10/16-10:13:32, [MFIC-1002], 45339,, INFO, ETH2, Chassis FRU header not programmed for switch NID, using defaults (applies only to FICON environments).
2021/10/16-10:13:46, [IPAD-1002], 45340,, INFO, VDX6740T, Switch name has been successfully changed to sw0.
All service instances on Active
2021/10/16-10:13:46, [HASM-1108], 45341,, INFO, VDX6740T, All service instances become active.
2021/10/16-10:13:46, [DCM-1002], 45342,, INFO, VDX6740T, PostBoot processing on global config has started.
2021/10/16-10:13:46, [DOT1-1013], 45343, DCE, INFO, sw0, DOT1X test timeout value is set to 10.
2021/10/16-10:13:46, [ONMD-1002], 45344, DCE, INFO, sw0, LLDP global configuration is changed.
2021/10/16-10:13:46, [ONMD-1002], 45345, DCE, INFO, sw0, LLDP global configuration is changed.
2021/10/16-10:13:47, [EM-1034], 45346,, ERROR, VDX6740T, PS 2 is set to faulty, rc=2000e.
2021/10/16-10:13:48, [RAS-2001], 45347,, INFO, sw0, Audit message log is enabled.
2021/10/16-10:13:48, [RAS-2003], 45348,, INFO, sw0, Audit message class configuration has been changed to SECURITY,CONFIGURATION,FIRMWARE.
DCE Blade: board type 4 Revision 4 Software Model 137
In cbr_chip_cfg_init
In cbr_chip_cfg_init ldev size 2048
In cbr_chip_cfg_init ldev size 0
2021/10/16-10:13:49, [NSM-2014], 45349, DCE, INFO, sw0, VLAN sub-profile for port-profile UpgradedVlanProfile is created.
2021/10/16-10:13:49, [NSM-2017], 45350, DCE, INFO, sw0, Port-profile UpgradedVlanProfile is configured for switching properties.
2021/10/16-10:13:49, [NSM-2019], 45351, DCE, INFO, sw0, The trunk mode is configured for port-profile UpgradedVlanProfile.
2021/10/16-10:13:49, [NSM-2024], 45352, DCE, INFO, sw0, All VLANs are configured as tagged VLANs for port-profile UpgradedVlanProfile.
2021/10/16-10:13:49, [NSM-2044], 45353, DCE, INFO, sw0, Domain: default creation successful.
2021/10/16-10:13:49, [NSM-2046], 45354, DCE, INFO, sw0, Profile: UpgradedVlanProfile addition to domain default successful.
2021/10/16-10:13:49, [RTM-1023], 45355, DCE, INFO, sw0, Route 0.0.0.0/0 pointing to management interface will not be redistributed to other protocols.
.
2021/10/16-10:13:49, [DCM-1003], 45356,, INFO, VDX6740T, PostBoot processing on global config is complete.
FCOE agent in ctor function
2021/10/16-10:13:52, [HASM-1108], 45357,, INFO, VDX6740T, All service instances become active.
Enabling Eth switch... 1
POST1: started running Sat Oct 16 10:13:52 GMT 2021
POST1: Script PASSED with exit status of 0 Sat Oct 16 10:13:52 GMT 2021 took (0:0:0)
POST2: started running Sat Oct 16 10:13:56 GMT 2021
POST2: Test #1 - Running portloopbacktest -dports 1-48 (10G)
POST2: Test #2 - Running portloopbacktest -dports 49-64 (40G)
POST2: Script PASSED with exit status of 0 Sat Oct 16 10:14:03 GMT 2021 took (0:0:7)
LPM Critical Data Size [526336]
NH Critical Data Size [6272]
QOS-TXQ Critical Data Structure Size = [13704]
2021/10/16-10:14:10, [BL-1000], 45358,, INFO, VDX6740T, Initializing ports...
2021/10/16-10:14:12, [BL-1034], 45359,, INFO, VDX6740T, SWITCH CEE initialization completed.
Set VLP module index 0 to module 0
sys_init: before msg_init1
init_dy_sync_slave(), sync_type = 49 >= 49
module_slot_pre_init: setting module # 0 fid_base to: 1774
link is up
2021/10/16-10:14:18, [NSM-1019], 45360, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/1 is administratively up.
2021/10/16-10:14:18, [NSM-1019], 45361, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/2 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45362, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/3 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45363, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/4 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45364, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/5 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45365, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/6 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45366, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/7 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45367, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/8 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45368, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/9 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45369, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/10 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45370, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/11 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45371, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/12 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45372, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/13 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45373, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/14 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45374, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/15 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45375, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/16 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45376, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/17 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45377, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/18 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45378, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/19 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45379, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/20 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45380, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/21 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45381, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/22 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45382, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/23 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45383, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/24 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45384, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/25 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45385, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/26 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45386, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/27 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45387, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/28 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45388, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/29 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45389, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/30 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45390, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/31 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45391, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/32 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45392, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/33 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45393, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/34 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45394, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/35 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45395, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/36 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45396, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/37 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45397, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/38 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45398, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/39 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45399, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/40 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45400, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/41 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45401, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/42 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45402, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/43 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45403, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/44 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45404, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/45 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45405, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/46 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45406, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/47 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45407, DCE, INFO, sw0, Interface TenGigabitEthernet 7/0/48 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45408, DCE, INFO, sw0, Interface FortyGigabitEthernet 7/0/49 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45409, DCE, INFO, sw0, Interface FortyGigabitEthernet 7/0/50 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45410, DCE, INFO, sw0, Interface FortyGigabitEthernet 7/0/51 is administratively up.
2021/10/16-10:14:19, [NSM-1019], 45411, DCE, INFO, sw0, Interface FortyGigabitEthernet 7/0/52 is administratively up.
2021/10/16-10:14:40, [DCM-1002], 45412,, INFO, VDX6740T, PostBoot processing on L0 config has started.
2021/10/16-10:14:54, [HASM-1111], 45413,, INFO, VDX6740T, Configuration replay has completed on SWITCH.
2021/10/16-10:14:54, [DCM-1003], 45414,, INFO, VDX6740T, PostBoot processing on L0 config is complete.
2021/10/16-10:14:54, [DCM-1004], 45415,, INFO, VDX6740T, Configuration File Replay has started.
2021/10/16-10:15:00, [IPAD-1002], 45416,, INFO, VDX6740T, Switch name has been successfully changed to ETH2.
2021/10/16-10:15:02, [SNMP-1005], 45417,, INFO, ETH2, SNMP configuration attribute, community string 1 , [ConvergedNetwork] has been added.
2021/10/16-10:15:03, [SNMP-1005], 45418,, INFO, ETH2, SNMP configuration attribute, community string 2 , [OrigEquipMfr] has been added.
2021/10/16-10:15:03, [SNMP-1005], 45419,, INFO, ETH2, SNMP configuration attribute, Access 2 , has changed from [false] to [true].
2021/10/16-10:15:03, [SNMP-1005], 45420,, INFO, ETH2, SNMP configuration attribute, community string 3 , [Secret C0de] has been added.
2021/10/16-10:15:03, [SNMP-1005], 45421,, INFO, ETH2, SNMP configuration attribute, Access 3 , has changed from [false] to [true].
2021/10/16-10:15:03, [SNMP-1005], 45422,, INFO, ETH2, SNMP configuration attribute, community string 4 , [common] has been added.
2021/10/16-10:15:04, [SNMP-1005], 45423,, INFO, ETH2, SNMP configuration attribute, community string 5 , [private] has been added.
2021/10/16-10:15:04, [SNMP-1005], 45424,, INFO, ETH2, SNMP configuration attribute, Access 5 , has changed from [false] to [true].
2021/10/16-10:15:04, [SNMP-1005], 45425,, INFO, ETH2, SNMP configuration attribute, community string 6 , [public] has been added.
2021/10/16-10:15:04, [SNMP-1005], 45426,, INFO, ETH2, SNMP configuration attribute, SNMPv3 User Name 1, [snmpadmin1] has been added.
2021/10/16-10:15:05, [SNMP-1005], 45427,, INFO, ETH2, SNMP configuration attribute, SNMPv3 User Name 2, [snmpadmin2] has been added.
2021/10/16-10:15:05, [SNMP-1005], 45428,, INFO, ETH2, SNMP configuration attribute, SNMPv3 User Name 3, [snmpadmin3] has been added.
2021/10/16-10:15:05, [SNMP-1005], 45429,, INFO, ETH2, SNMP configuration attribute, SNMPv3 User Name 4, [snmpuser1] has been added.
2021/10/16-10:15:06, [SNMP-1005], 45430,, INFO, ETH2, SNMP configuration attribute, SNMPv3 User Name 5, [snmpuser2] has been added.
2021/10/16-10:15:06, [SNMP-1005], 45431,, INFO, ETH2, SNMP configuration attribute, SNMPv3 User Name 6, [snmpuser3] has been added.
2021/10/16-10:15:09, [FW-1424], 45432,, WARNING, ETH2, Switch status changed from HEALTHY to MARGINAL.
2021/10/16-10:15:09, [FW-1427], 45433,, WARNING, ETH2, Switch status change contributing factor Power supply: 1 bad.
2021/10/16-10:15:13, [NSM-1010], 45434, DCE, INFO, ETH2, InterfaceMode changed from None to L2 for interface TenGigabitEthernet 7/0/3.
2021/10/16-10:15:13, [NSM-1011], 45435, DCE, INFO, ETH2, OperationalEndpointMode changed from None to Access for interface TenGigabitEthernet 7/0/3.
2021/10/16-10:15:14, [NSM-1010], 45436, DCE, INFO, ETH2, InterfaceMode changed from None to L2 for interface TenGigabitEthernet 7/0/5.
2021/10/16-10:15:14, [NSM-1011], 45437, DCE, INFO, ETH2, OperationalEndpointMode changed from None to Access for interface TenGigabitEthernet 7/0/5.
2021/10/16-10:15:15, [NSM-1020], 45438, DCE, INFO, ETH2, Interface TenGigabitEthernet 7/0/5 is administratively down.
2021/10/16-10:15:19, [NSM-1010], 45439, DCE, INFO, ETH2, InterfaceMode changed from None to L2 for interface TenGigabitEthernet 7/0/20.
2021/10/16-10:15:19, [NSM-1011], 45440, DCE, INFO, ETH2, OperationalEndpointMode changed from None to Access for interface TenGigabitEthernet 7/0/20.
2021/10/16-10:15:20, [NSM-1010], 45441, DCE, INFO, ETH2, InterfaceMode changed from None to L2 for interface TenGigabitEthernet 7/0/21.
2021/10/16-10:15:20, [NSM-1011], 45442, DCE, INFO, ETH2, OperationalEndpointMode changed from None to Access for interface TenGigabitEthernet 7/0/21.
2021/10/16-10:15:21, [NSM-1010], 45443, DCE, INFO, ETH2, InterfaceMode changed from None to L2 for interface TenGigabitEthernet 7/0/22.
2021/10/16-10:15:21, [NSM-1011], 45444, DCE, INFO, ETH2, OperationalEndpointMode changed from None to Access for interface TenGigabitEthernet 7/0/22.
2021/10/16-10:15:22, [NSM-1010], 45445, DCE, INFO, ETH2, InterfaceMode changed from None to L2 for interface TenGigabitEthernet 7/0/23.
2021/10/16-10:15:22, [NSM-1011], 45446, DCE, INFO, ETH2, OperationalEndpointMode changed from None to Access for interface TenGigabitEthernet 7/0/23.
2021/10/16-10:15:23, [NSM-1010], 45447, DCE, INFO, ETH2, InterfaceMode changed from None to L2 for interface TenGigabitEthernet 7/0/24.
2021/10/16-10:15:23, [NSM-1011], 45448, DCE, INFO, ETH2, OperationalEndpointMode changed from None to Access for interface TenGigabitEthernet 7/0/24.
2021/10/16-10:15:24, [NSM-1010], 45449, DCE, INFO, ETH2, InterfaceMode changed from None to L2 for interface TenGigabitEthernet 7/0/25.
2021/10/16-10:15:24, [NSM-1011], 45450, DCE, INFO, ETH2, OperationalEndpointMode changed from None to Access for interface TenGigabitEthernet 7/0/25.
2021/10/16-10:15:25, [NSM-1010], 45451, DCE, INFO, ETH2, InterfaceMode changed from None to L2 for interface TenGigabitEthernet 7/0/26.
2021/10/16-10:15:25, [NSM-1011], 45452, DCE, INFO, ETH2, OperationalEndpointMode changed from None to Access for interface TenGigabitEthernet 7/0/26.
2021/10/16-10:15:26, [NSM-1010], 45453, DCE, INFO, ETH2, InterfaceMode changed from None to L2 for interface TenGigabitEthernet 7/0/27.
2021/10/16-10:15:26, [NSM-1011], 45454, DCE, INFO, ETH2, OperationalEndpointMode changed from None to Access for interface TenGigabitEthernet 7/0/27.
2021/10/16-10:15:27, [NSM-1010], 45455, DCE, INFO, ETH2, InterfaceMode changed from None to L2 for interface TenGigabitEthernet 7/0/28.
2021/10/16-10:15:27, [NSM-1011], 45456, DCE, INFO, ETH2, OperationalEndpointMode changed from None to Access for interface TenGigabitEthernet 7/0/28.
2021/10/16-10:15:28, [NSM-1010], 45457, DCE, INFO, ETH2, InterfaceMode changed from None to L2 for interface TenGigabitEthernet 7/0/29.
2021/10/16-10:15:28, [NSM-1011], 45458, DCE, INFO, ETH2, OperationalEndpointMode changed from None to Access for interface TenGigabitEthernet 7/0/29.
2021/10/16-10:15:29, [NSM-1010], 45459, DCE, INFO, ETH2, InterfaceMode changed from None to L2 for interface TenGigabitEthernet 7/0/30.
2021/10/16-10:15:29, [NSM-1011], 45460, DCE, INFO, ETH2, OperationalEndpointMode changed from None to Access for interface TenGigabitEthernet 7/0/30.
2021/10/16-10:15:30, [NSM-1010], 45461, DCE, INFO, ETH2, InterfaceMode changed from None to L2 for interface TenGigabitEthernet 7/0/31.
2021/10/16-10:15:30, [NSM-1011], 45462, DCE, INFO, ETH2, OperationalEndpointMode changed from None to Access for interface TenGigabitEthernet 7/0/31.
2021/10/16-10:15:35, [NSM-1010], 45463, DCE, INFO, ETH2, InterfaceMode changed from None to L2 for interface TenGigabitEthernet 7/0/47.
2021/10/16-10:15:35, [NSM-1011], 45464, DCE, INFO, ETH2, OperationalEndpointMode changed from None to Access for interface TenGigabitEthernet 7/0/47.
2021/10/16-10:15:57, [DCM-1005], 45465,, INFO, VDX6740T, Configuration Replay is complete.
2021/10/16-10:15:57, [SEC-1334], 45466,, INFO, VDX6740T, local security policy not saved.
2021/10/16-10:15:57, [SEC-1334], 45467,, INFO, VDX6740T, local security policy not saved.
2021/10/16-10:15:58, [SEC-1197], 45468,, INFO, VDX6740T, Changed account admin.
2021/10/16-10:15:59, [HASM-1110], 45469,, INFO, VDX6740T, Configuration replay has completed on the system.
2021/10/16-10:15:59, [DCM-1116], 45470,, INFO, VDX6740T, System initialization is complete. NOS is ready to handle all commands.
2021/10/16-10:15:59, [SEC-1197], 45471,, INFO, VDX6740T, Changed account user.

Maybe there were no port licenses installed?
But I remember that 'show license' (or similar) command showed something. I haven't saved that.

I've bought a headache. With ancient firmware, only 24 10G ports, failing CF card. And, of course, there's RS232 interface in mini-USB connector, which could be unsafe if you plug it in your PC's USB port. I love proprietary stuff!
 

Jason Antes

Active Member
Feb 28, 2020
224
76
28
Twin Cities
Well, the firmware can be taken care of easily enough either by the one klui mentioned or one of the several that are in my Google drive.

I don't see your license in that output, but there are "fixes" for that. ;)
 

klui

Well-Known Member
Feb 3, 2019
824
453
63
I've bought a headache. With ancient firmware, only 24 10G ports, failing CF card. And, of course, there's RS232 interface in mini-USB connector, which could be unsafe if you plug it in your PC's USB port. I love proprietary stuff!
@fohdeesha did warn about his dislike of VDXes at https://forums.servethehome.com/index.php?threads/brocade-vdx-6740.23248/#post-216713

Your switch has no additional licenses besides what the SKU comes with. If there are any it would be displayed after "[NSM-1019] ... Interface ... is administratively up." Look for "license key". show license won't display the license key, only what licenses are active.
 
  • Like
Reactions: fohdeesha

leon_pro

New Member
Nov 3, 2017
24
5
3
40
@fohdeesha did warn about his dislike of VDXes at https://forums.servethehome.com/index.php?threads/brocade-vdx-6740.23248/#post-216713

Your switch has no additional licenses besides what the SKU comes with. If there are any it would be displayed after "[NSM-1019] ... Interface ... is administratively up." Look for "license key". show license won't display the license key, only what licenses are active.
Thanks for this tip about licenses, it's still cheapest option for me, if invested time not counted.
 

Mwilliamson

New Member
Aug 15, 2020
19
7
3
Fenton, Michigan, USA
I've had this project set aside on my workbench since my last post. This weekend I made time to return to it, and made some significant headway; after following another guide on setting up a USB drive with updated firmware, I've got an operational VDX 6740T! As a first foray with Brocade / Extreme Networks, this was a challenge, and I'd like to offer thanks for the support from @Jason Antes and @fohdeesha and the resources they've posted.

10gbe-successful.jpg
 
  • Like
Reactions: Jason Antes

Jason Antes

Active Member
Feb 28, 2020
224
76
28
Twin Cities
Do you know if these will work with the VDX6730?
I don't honestly know. Here is a list of the supported platforms from the tar file
Code:
#    Copyright (c) 1996-2013 Brocade Communications Systems, Inc.
#    All rights reserved.
#
#    Description:
#      List of supported platforms.
#


#
# List of acceptable names for each platform ID.
# Each platform ID has a single line with all associated names on the same line
#
SWBD10: swbd10 sw12000 ulysses
SWBD12: swbd12 sw3900 terminator
SWBD21: swbd21 sw24000 meteor
SWBD22: swbd22 sw3016 blazer
SWBD23: swbd23 pulsar
SWBD24: swbd24 swbd25 olympus apollo
SWBD26: swbd26 sw3850 dazzler
SWBD27: swbd27 sw3250 dazzlerjr
SWBD28: swbd28 hampton
SWBD29: swbd29 sw4012 icecube
SWBD30: swbd30 sw3950 terminator-cr
SWBD31: swbd31 sw3916 cygnus
SWBD32: swbd32 pulsar32
SWBD33: swbd33 sw3014 glacier
SWBD34: swbd34 stealth
SWBD36: swbd36 marathon
SWBD37: swbd37 sw4020 blazer2
SWBD42: swbd42 saturn
SWBD43: swbd43 sw4024 icecube2 bradley
SWBD44: swbd44 sw4900 viking
SWBD45: swbd45 sw4016 glacier2 nighthawk
SWBD46: swbd46 sprint
SWBD47: swbd47 ironman
SWBD50: swbd50 scimitar
SWBD51: swbd51 sw4018 dragon
SWBD52: swbd52 scimitar-sas
SWBD55: swbd55 scimitar-freescale
SWBD57: swbd57 scimitar-dmm
SWBD58: swbd58 Brocade5000 pulsar2
SWBD61: swbd61 Brocade4424 superhawk
SWBD62: swbd62 zentron
SWBD63: swbd63 zentron-cocpu
SWBD64: swbd64 thor
SWBD66: swbd66 spirit
SWBD67: swbd67 mace
SWBD68: swbd68 lance
SWBD70: swbd70 sw5410 little bear 8g
SWBD71: swbd71 tomahawk
SWBD72: swbd72 bulova
SWBD73: swbd73 blazer3 dirk
SWBD75: swbd75 superhawk2
SWBD76: swbd76 elara
SWBD77: swbd77 zentron-Pluto
SWBD79: swbd79 spear CP
SWBD80: swbd80 spearlite CP
SWBD81: swbd81 spear/spearlite BP
SWBD82: swbd82 utah
SWBD83: swbd83 spike CP
SWBD85: swbd85 spike BP
SWBD86: swbd86 falcon2
SWBD87: swbd87 kestrel2
SWBD88: swbd88 europa
SWBD89: swbd89 striker
SWBD90: swbd90 frisco
SWBD91: swbd91 elara2
SWBD92: swbd92 gladius
SWBD95: swbd95 elara2e
SWBD96: swbd96 elara2f
SWBD97: swbd97 callistoE
SWBD98: swbd98 europa TTV
SWBD99: swbd99 frisco-ttv
SWBD107: swbd107 callistoF
SWBD109: swbd109 Stinger
SWBD112: swbd112 katana
SWBD116: swbd116 carmeE
SWBD123: swbd123 harrier
SWBD131: swbd131 castor
SWBD137: swbd137 castor-T
SWBD138: swbd138 blackbird
SWBD151: swbd151 draco-T
SWBD155: swbd155 toucan
SWBD153: swbd153 Rigel1
SWBD154: swbd154 Rigel2
SWBD164: swbd164 RigelMor
SWBD1000: swbd1000 mercury 4 slot chassis
SWBD1001: swbd1001 mercury 8 slot chassis
SWBD1002: swbd1002 mercury 16 slot chassis
SWBD1003: swbd1003 mercury 32 slot chassis
SWBD1004: swbd1004 mercury LC blade
SWBD1005: swbd1005 mercury LC12X40BLADE
SWBD1006: swbd1006 mercury LC72X1BLADE
SWBD1008: swbd1008 mercury LC36x10BLADE_TTV
SWBD1009: swbd1009 mercury LC6X100G
SWBD1010: swbd1010 mercury LC27X40G
SWBD1011: swbd1011 mercury LC48X10GT
but I haven't a clue what these are called by in this list.