Skip to main content
Brocade M6505 image

Brocade M6505

Brocade M6505

Articles

Invalid entry. Please use only Letters, numbers and any special characters except <>)(%/;,=#-/*

30 out of 63 shown
63 out of 63 shown

This document highlights minimum, recommended, and latest code versions for Dell Technologies Enterprise and Datacenter Infrastructure products. We carefully evaluate and monitor code deployment data to ensure that product releases meet our stringent expectations to provide our customers with reliable products and solutions.
Updated:  December 22, 2025 ID: 000205512

FOS upgrade from v8.2.1c to v8.2.2d failed due to "Firmware download failed on standby CP - Firmware download timed out. (0x23)
Updated:  August 01, 2021 ID: 000185590

Fan speed of all the fan FRUs is increased to <Fan RPM> RPM per environmental specifications.
Updated:  January 07, 2026 ID: 000223053

FCPH-1014 FC Protocol Error: INVALID SEQ ID
Updated:  December 15, 2025 ID: 000187126

Description: A user wants to capture all logs using remote syslog server for different categories: 1-ZONE, 2-SECURITY, 3-CONFIGURATION, 4-FIRMWARE, 5-FABRIC, 6-FW.
Updated:  November 21, 2025 ID: 000218379

Noticed SCN queue overflow for process 0.weblinker.fcg errors
Updated:  November 21, 2025 ID: 000226593

Failing to install a license on a Connectrix Brocade B-Series switch with error "parser error: Document is empty" can occur due to a certificate issue caused by a DOS/Microsoft Windows transition.
Updated:  November 21, 2025 ID: 000261109

Host fails to boot from SAN when attached to ports with FC ID ALPA of 0x40 or 0xC0
Updated:  October 16, 2025 ID: 000065299

MAPS email alerts are not working after upgrade to v8.2.1a.
Updated:  October 08, 2025 ID: 000057367

Dell Connectrix (Brocade) remediation is available for multiple Fabric OS vulnerabilities that may be exploited by malicious users to compromise the affected system.
Updated:  September 18, 2025 ID: 000201620

Dell Connectrix (Brocade) remediation is available for multiple SANnav security vulnerabilities that may be exploited by malicious users to compromise the affected system.
Updated:  September 18, 2025 ID: 000201619

Dell Connectrix (Brocade) remediation is available for an EZswitch vulnerability in Brocade Fabric OS (FOS) software that may be exploited by malicious users to compromise the affected system.
Updated:  September 18, 2025 ID: 000205092

Dell Connectrix (Brocade) remediation is available for multiple SANnav security vulnerabilities that may be exploited by malicious users to compromise the affected system.
Updated:  September 18, 2025 ID: 000201616

Dell Connectrix (Brocade) remediation is available for a Privileged Directory Traversal Vulnerability that may be exploited by malicious users to compromise the affected system.
Updated:  September 18, 2025 ID: 000206397

This article explains a situation when it is not possible to reset the password using OME-M, Webtools, or CLI.
Updated:  September 16, 2025 ID: 000222203

This article provides switch configuration guidance for Dell PS Series and SC Series SANs. Switch vendors include Arista, Brocade, Cisco, Dell, Huawei, HP, Juniper, and others.
Updated:  July 31, 2025 ID: 000124943

This article explains the procedure to open a Service Request (SR) using the Dell support page. Get help fast for your Dell device. No more waiting on hold. No more tech headaches. Dell makes it simple to fix problems, schedule repairs, or get support—right from your device or our support website.
Updated:  July 31, 2025 ID: 000132371

As a part of the deployment guidance for Dell EMC Storage Spaces Direct Ready Nodes, for infrastructures that use RoCE v2 for RDMA using Mellanox CX4 LX adapters, we recommend disabling DCBX willing globally in the host OS and setting network adapter DCBXMode to Host in charge.
Updated:  July 30, 2025 ID: 000131009

Connectrix Brocade: Loosing the older peer zones from active configuration when adding new members to the existing peer zones or creating new peer zones from Webtools.
Updated:  July 29, 2025 ID: 000056274

Troubleshooting the Switch Fabric Module
Updated:  July 29, 2025 ID: 000133835

Not able to activate or apply a response token when connected to the serial connection of a switch.
Updated:  July 29, 2025 ID: 000224277

Unable to upgrade Fabric OS from 8.1.x or 8.2.x to 9.0.x, due to maintenance user configuration error.
Updated:  July 29, 2025 ID: 000224312

Blast-RADIUS is a vulnerability that impacts all Brocade products using the Radius protocol.
Updated:  July 29, 2025 ID: 000232994

The default severity of RASlog message can be changed using the command #rasadmin --set-log message_ID-severity [DEFAULT | INFO | WARNING | ERROR | CRITICAL]
Updated:  July 18, 2025 ID: 000184759

Secure Connect Gateway (SCG) call home deployment from Connectrix Brocade switches is failing with SCG version 5.28.00.14. Error: Backend Sync failed rc:-1.
Updated:  July 14, 2025 ID: 000303301

This article provides steps on how to set up the third party application named SolarWinds to use an SFTP. Using this application can help with finding firmwaredownload, configupload, configdownload, and collect supportsave.
Updated:  June 20, 2025 ID: 000221949

Dust or chemical contamination at the endface of a fiber optic LC connector or transceiver module impedes signaling. Dell engineering teams have verified cases in which a fully functional port appears to be a bad port because dirty optical connectors manifest as a port failing loop testing with acceptable power measurement levels. Cable connectors should be cleaned and when stored must be protected from dust particle or chemical contamination.
Updated:  June 20, 2025 ID: 000246018

PowerEdge M1000e: AG switch port in persistentdisable state.
Updated:  June 12, 2025 ID: 000185988

After making a switch "aaaconfig" change, the switch user lost access due to a misconfigured or an unreachable server.
Updated:  June 11, 2025 ID: 000197953

If ping is disabled, the user can verify the switch connectivity to an external server using telnet.
Updated:  June 11, 2025 ID: 000203714