Brocade Fabric OS Encryption Administrator’s Guide Supporting RSA Data Protection Manager (DPM) Environments (Supporting Fabric OS v7.2.0) User Manual
Page 11

Fabric OS Encryption Administrator’s Guide (DPM)
ix
53-1002922-01
Thin provisioned LUNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
Data rekeying. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
Thin provisioned LUN limitations during rekey. . . . . . . . . . . . 206
Resource allocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
Rekeying modes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
Configuring a LUN for automatic rekeying . . . . . . . . . . . . . . . 207
Initiating a manual rekey session . . . . . . . . . . . . . . . . . . . . . . 208
Suspension and resumption of rekeying operations. . . . . . . 209
Single encryption switch, two paths from host to target . . . . . . . 212
Single fabric deployment - HA cluster . . . . . . . . . . . . . . . . . . . . . . 213
Single fabric deployment - DEK cluster . . . . . . . . . . . . . . . . . . . . . 214
Dual fabric deployment - HA and DEK cluster. . . . . . . . . . . . . . . . 215
Multiple paths, one DEK cluster, and two HA clusters . . . . . . . . . 216
Multiple paths, DEK cluster, no HA cluster . . . . . . . . . . . . . . . . . . 217
Deployment in Fibre Channel routed fabrics. . . . . . . . . . . . . . . . . 219
Deployment as part of an edge fabric . . . . . . . . . . . . . . . . . . . . . . 221
Deployment with FCIP extension switches . . . . . . . . . . . . . . . . . . 222
Data mirroring deployment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
If metadata is not present on the LUN . . . . . . . . . . . . . . . . . . 224
VMware ESX server deployments. . . . . . . . . . . . . . . . . . . . . . . . . . 225
Best Practices and Special Topics
Firmware upgrade and downgrade considerations . . . . . . . . . . . 228
General guidelines. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
Specific guidelines for HA clusters . . . . . . . . . . . . . . . . . . . . . 229
Configuration upload and download considerations . . . . . . . . . . 230
Configuration upload at an encryption group
leader node . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
Configuration upload at an encryption group
member node. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
Information not included in an upload . . . . . . . . . . . . . . . . . . 231
Steps before configuration download. . . . . . . . . . . . . . . . . . . 231
Configuration download at the encryption group leader. . . . 232
Configuration download at an encryption group member . . 232
Steps after configuration download . . . . . . . . . . . . . . . . . . . . 232
HP-UX considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
AIX considerations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233