Brocade Fabric OS Encryption Administrator’s Guide Supporting RSA Data Protection Manager (DPM) Environments (Supporting Fabric OS v7.2.0) User Manual
Page 10

viii
Fabric OS Encryption Administrator’s Guide (DPM)
53-1002922-01
Impact of tape LUN configuration changes. . . . . . . . . . . . . . . . . . 174
Decommissioning LUNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
Decommissioning replicated LUNs . . . . . . . . . . . . . . . . . . . . . . . . 176
Decommissioning primary R1 LUNs only . . . . . . . . . . . . . . . . 177
Decommissioning mirror R2 LUNs only . . . . . . . . . . . . . . . . . 177
Decommissioning primary R1 and mirror R2 LUN pairs . . . . 178
Force-enabling a decommissioned disk LUN for encryption . . . . 178
Force-enabling a disabled disk LUN for encryption . . . . . . . . . . . 179
SRDF LUNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
SRDF pairs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
Enabling remote replication mode . . . . . . . . . . . . . . . . . . . . . 181
Adding replication LUNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Rekey operations for replicated LUNs . . . . . . . . . . . . . . . . . . 181
Reading metadata after sync . . . . . . . . . . . . . . . . . . . . . . . . . 182
Using SRDF, TimeFinder and RecoverPoint with encryption . . . . 182
RecoverPoint Configuration Restrictions . . . . . . . . . . . . . . . . 182
Initial Configuration Requirements. . . . . . . . . . . . . . . . . . . . . 183
SRDF/RP initial setup at the source (R1) site . . . . . . . . . . . . 183
SRDF/RecoverPoint remote target (R2) site . . . . . . . . . . . . . 183
Configuring LUNs for SRDF/TF or RP deployments . . . . . . . . . . . 184
Creating new source LUNs that can later be replicated . . . . 184
Migrating LUNs with existing data to LUNs
that can be replicated . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Synchronizing source and target LUN SRDF/RP pairs . . . . . 186
Configuring TimeFinder target devices. . . . . . . . . . . . . . . . . . 187
Configuring SRDF Gatekeeper LUNs. . . . . . . . . . . . . . . . . . . . 188
SRDF/TF/RP manual rekeying procedures . . . . . . . . . . . . . . . . . . 188
TF snapshot rekeying details. . . . . . . . . . . . . . . . . . . . . . . . . . 188
TF clone/mirror rekeying details . . . . . . . . . . . . . . . . . . . . . . . 188
Rekeying local site (R1) SRDF LUNs . . . . . . . . . . . . . . . . . . . . 189
Rekeying LUNs for RP deployments - local site . . . . . . . . . . . 191
Rekeying remote site (R2) SRDF LUNs . . . . . . . . . . . . . . . . . . 192
Rekeying LUNs for RP deployments - remote site . . . . . . . . . 193
Behavior with Hosts writing beyond reported capacity . . . . . 193
Tape pool configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Tape pool labeling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
Creating a tape pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
Deleting a tape pool. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
Modifying a tape pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
Impact of tape pool configuration changes . . . . . . . . . . . . . . 197
Configuring a multi-path Crypto LUN . . . . . . . . . . . . . . . . . . . . . . . 198
Multi-path LUN configuration example . . . . . . . . . . . . . . . . . . 199
First-time encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202