beautypg.com

About this document, In this chapter, How this document is organized – Brocade Fabric OS Encryption Administrator’s Guide Supporting NetApp Lifetime Key Manager (LKM) and KeySecure Storage Secure Key Manager (SSKM) Environments (Supporting Fabric OS v7.2.0) User Manual

Page 13

background image

Fabric OS Encryption Administrator’s Guide (LKM/SSKM)

xi

53-1002925-01

About This Document

In this chapter

How this document is organized . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi

Supported hardware and software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii

What’s new in this document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii

Document conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii

Additional information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv

Getting technical help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv

Document feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi

How this document is organized

.

This document is organized to help you find the information that you want as quickly and easily as
possible.

The document contains the following components:

Chapter 1, “Encryption Overview,”

provides a task matrix, an overview of the data encryption

switch and the encryption solution, and the terminology used in this document.

Chapter 2, “Configuring Encryption Using the Management Application,”

describes how to

configure and manage encryption features using Brocade Network Advisor.

Chapter 3, “Configuring Encryption Using the CLI,”

describes how to configure and manage

encryption features using the command line interface.

Chapter 4, “Deployment Scenarios,”

describes SAN configurations in which encryption may be

deployed.

Chapter 5, “Best Practices and Special Topics,”

summarizes best practices and addresses

special topics relevant to the implementation of encryption features.

Chapter 6, “Maintenance and Troubleshooting,”

provides information on troubleshooting and

the most common commands and procedures to use to diagnose and recover from problems.

Appendix A, “State and Status Information,”

lists the encryption engine security processor (SP)

states, security processor key encryption key (KEK) status information, and encrypted LUN
states.

Appendix B, “LUN Policies,”

summarizes DF-compatibility support for disk LUNs.