beautypg.com

About this document, In this chapter, How this document is organized – Brocade Fabric OS Encryption Administrator’s Guide Supporting HP Secure Key Manager (SKM) and HP Enterprise Secure Key Manager (ESKM) Environments (Supporting Fabric OS v7.2.0) User Manual

Page 15

background image

Fabric OS Encryption Administrator’s Guide (SKM/ESKM)

xiii

53-1002923-01

About This Document

In this chapter

How this document is organized . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii

Supported hardware and software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv

What’s new in this document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv

Document conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv

Additional information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi

Getting technical help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii

Document feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii

How this document is organized

.

This document is organized to help you find the information that you want as quickly and easily as
possible.

The document contains the following components:

Chapter 1, “Encryption Overview,”

provides a task matrix, an overview of the data encryption

switch and the encryption solution, and the terminology used in this document.

Chapter 2, “Configuring Encryption Using the Management Application”

describes how to

configure and manage encryption features using Brocade Network Advisor.

Chapter 3, “Configuring Encryption Using the CLI,”

describes how to configure and manage

encryption features using the command line interface.

Chapter 4, “Deployment Scenarios,”

describes SAN configurations in which encryption may be

deployed.

Chapter 5, “Best Practices and Special Topics,”

summarizes best practices and addresses

special topics relevant to the implementation of encryption features.

Chapter 6, “Maintenance and Troubleshooting,”

provides information on troubleshooting and

the most common commands and procedures to use to diagnose and recover from problems.

Appendix A, “State and Status Information,”

lists the encryption engine security processor (SP)

states, security processor key encryption key (KEK) status information, and encrypted LUN
states.