beautypg.com

Brocade Fabric OS Encryption Administrator’s Guide Supporting RSA Data Protection Manager (DPM) Environments (Supporting Fabric OS v7.2.0) User Manual

Page 10

background image

viii

Fabric OS Encryption Administrator’s Guide (DPM)

53-1002922-01

Impact of tape LUN configuration changes. . . . . . . . . . . . . . . . . . 174

Decommissioning LUNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175

Decommissioning replicated LUNs . . . . . . . . . . . . . . . . . . . . . . . . 176

Decommissioning primary R1 LUNs only . . . . . . . . . . . . . . . . 177
Decommissioning mirror R2 LUNs only . . . . . . . . . . . . . . . . . 177
Decommissioning primary R1 and mirror R2 LUN pairs . . . . 178

Force-enabling a decommissioned disk LUN for encryption . . . . 178

Force-enabling a disabled disk LUN for encryption . . . . . . . . . . . 179

SRDF LUNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179

SRDF pairs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
Enabling remote replication mode . . . . . . . . . . . . . . . . . . . . . 181
Adding replication LUNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
Rekey operations for replicated LUNs . . . . . . . . . . . . . . . . . . 181
Reading metadata after sync . . . . . . . . . . . . . . . . . . . . . . . . . 182

Using SRDF, TimeFinder and RecoverPoint with encryption . . . . 182

RecoverPoint Configuration Restrictions . . . . . . . . . . . . . . . . 182
Initial Configuration Requirements. . . . . . . . . . . . . . . . . . . . . 183
SRDF/RP initial setup at the source (R1) site . . . . . . . . . . . . 183
SRDF/RecoverPoint remote target (R2) site . . . . . . . . . . . . . 183

Configuring LUNs for SRDF/TF or RP deployments . . . . . . . . . . . 184

Creating new source LUNs that can later be replicated . . . . 184
Migrating LUNs with existing data to LUNs
that can be replicated . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Synchronizing source and target LUN SRDF/RP pairs . . . . . 186
Configuring TimeFinder target devices. . . . . . . . . . . . . . . . . . 187
Configuring SRDF Gatekeeper LUNs. . . . . . . . . . . . . . . . . . . . 188

SRDF/TF/RP manual rekeying procedures . . . . . . . . . . . . . . . . . . 188

TF snapshot rekeying details. . . . . . . . . . . . . . . . . . . . . . . . . . 188
TF clone/mirror rekeying details . . . . . . . . . . . . . . . . . . . . . . . 188
Rekeying local site (R1) SRDF LUNs . . . . . . . . . . . . . . . . . . . . 189
Rekeying LUNs for RP deployments - local site . . . . . . . . . . . 191
Rekeying remote site (R2) SRDF LUNs . . . . . . . . . . . . . . . . . . 192
Rekeying LUNs for RP deployments - remote site . . . . . . . . . 193
Behavior with Hosts writing beyond reported capacity . . . . . 193

Tape pool configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193

Tape pool labeling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
Creating a tape pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
Deleting a tape pool. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
Modifying a tape pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
Impact of tape pool configuration changes . . . . . . . . . . . . . . 197

Configuring a multi-path Crypto LUN . . . . . . . . . . . . . . . . . . . . . . . 198

Multi-path LUN configuration example . . . . . . . . . . . . . . . . . . 199

First-time encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202

Resource allocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
First-time encryption modes . . . . . . . . . . . . . . . . . . . . . . . . . . 202
Configuring a LUN for first-time encryption . . . . . . . . . . . . . . 202