About this document, In this chapter, How this document is organized – Brocade Fabric OS Encryption Administrator’s Guide Supporting Key Management Interoperability Protocol (KMIP) Key-Compliant Environments (Supporting Fabric OS v7.1.0) User Manual
Page 13
Fabric OS Encryption Administrator’s Guide (KMIP)
xiii
53-1002747-02
About This Document
In this chapter
•
•
Supported hardware and software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
•
•
•
•
•
•
Notice to the reader . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
•
•
•
•
•
How this document is organized
.
This document is organized to help you find the information that you want as quickly and easily as
possible.
The document contains the following components:
•
Chapter 1, “Encryption Overview,”
provides a task matrix, an overview of the data encryption
switch and the encryption solution, and the terminology used in this document.
•
Chapter 2, “Configuring Encryption Using the Management Application,”
describes how to
configure and manage encryption features using Brocade Network Advisor.
•
Chapter 3, “Configuring Encryption Using the CLI,”
describes how to configure and manage
encryption features using the command line interface.
•
Chapter 4, “Deployment Scenarios,”
describes SAN configurations in which encryption may be
deployed.
•
Chapter 5, “Best Practices and Special Topics,”
summarizes best practices and addresses
special topics relevant to the implementation of encryption features.