beautypg.com

Brocade Fabric OS Encryption Administrator’s Guide Supporting RSA Data Protection Manager (DPM) Environments (Supporting Fabric OS v7.2.0) User Manual

Page 325

background image

Fabric OS Encryption Administrator’s Guide (DPM)

305

53-1002922-01

DEK (data encryption keys)

,

9

DEK life cycle

,

10

delete commands

--delete -container

,

165

,

247

--delete -encgroup

,

249

--delete -hacluster

,

253

--delete -tapepool

,

196

deployment scenarios

data mirroring deployment

,

223

deployment as part of an edge fabric

,

221

deployment in fibre channel routed fabrics

,

219

deployment with FCIP extension switches

,

222

dual fabric deployment

,

215

single fabric and DEK cluster

,

214

single fabric deployment

,

213

,

214

single switch, two paths from host to target

,

212

deployment with admin domains (AD)

,

237

deregister command,--dereg -membernode

,

248

DHCP for IP interfaces

,

237

discover commands

--discover -LUN

,

200

--discoverLUN

,

167

,

171

disk devices

decommissioning

,

97

disk luns

decommissioning

,

98

rekeying manually

,

100

setting rekey all

,

101

viewing rekey details

,

102

disk metadata

,

234

downloading firmware

,

292

E

EE state

disabling from properties

,

111

enabling from properties

,

111

eject commands

-eject -membernode

,

248

enable a disabled LUN using the CLI

,

233

enable commands

--enable -LUN

,

179

--enable -rekey

,

207

--enable_rekey

,

202

--enableEE

,

256

enableEE

,

156

encrypted LUN states

,

298

encryption

adding a license

,

5

best practices for licensing

,

5

certificate generation

,

28

configuration planning for the management

application

,

27

,

35

configure dialog box

,

14

configuring

LUNs for first-time encryption

,

202

configuring in a multi-path environment

,

61

cut-through

,

6

definition of terms

,

2

description of blade

,

5

engines

,

4

first-time encryption modes

,

202

frame redirection diagram

,

8

gathering information before using the setup wizard

,

27

,

35

host and LUN considerations

,

1

launching the encryption targets dialog box

,

96

limitations

,

6

node initialization

,

28

overview diagram

,

7

performance licensing for switch

,

5

physical view of switch

,

4

preparation

,

35

selecting mode for LUNs

,

76

solution overview

,

7

viewing and editing group properties

,

111

encryption blades

port labeling

,

131

special configuration considerations

,

131

encryption center

features

,

14

encryption engine

rebalancing

,

83

encryption engines

adding to HA clusters

,

119

checking status

,

156

effects of zeroizing

,

94

enabing

,

156

initializing

,

135

recovering from zeroizing

,

94

removing from HA clusters

,

119

security processor (SP) states

,

297

states during an active failover and failback

,

254

support for tape pools

,

121

verifying status using the CLI

,

156

zeroizing

,

94