beautypg.com

Setting zeroization – Brocade Network Advisor SAN + IP User Manual v12.3.0 User Manual

Page 1204

background image

1132

Brocade Network Advisor SAN + IP User Manual

53-1003155-01

Zeroizing an encryption engine

25

All encryption operations on this engine are stopped and all virtual initiators (VI) and virtual
targets (VT) are removed from the fabric’s name service.

The key vault link key (for NetApp LKM/SSKM key vaults) or the master key (for other key
vaults) is erased from the encryption engine.

Once enabled, the encryption engine is able to restore the necessary data encryption keys
from the key vault when the link key (for the NetApp Lifetime Key Management application) or
the master key (for other key vaults) is restored.

If the encryption engine was part of an HA cluster, targets fail over to the peer, which assumes
the encryption of all storage targets. Data flow will continue to be encrypted.

If there is no HA backup, host traffic to the target will fail as if the target has gone offline. The
host will not have unencrypted access to the target. There will be no data flow at all because
the encryption virtual targets will be offline.

NOTE

Zeroizing an engine affects the I/Os, but all target and LUN configurations remain intact. Encryption
target configuration data is not deleted.

You can zeroize an encryption engine only if it is enabled (running), or disabled but ready to be
enabled. If the encryption engine is not in one of these states, an error message results.

When using a NetApp LKM/SSKM key vault, if all encryption engines in a switch are zeroized, the
switch loses the link key required to communicate with the LKM/SSKM vault. After the encryption
engines are rebooted and re-enabled, you must use the CLI to create new link keys for the switch.

When using an opaque key vault, if all encryption engines in an encryption group are zeroized, the
encryption group loses the master key required to read data encryption keys from the key vault.
After the encryption engines are rebooted and re-enabled, you must restore the master key from a
backup copy, or alternatively, you can generate a new master key and back it up. Restoring the
master key from a backup copy or generating a new master key and backing it up indicates that all
previously generated DEKs will not be decryptable unless the original master key used to encrypt
them is restored.

Setting zeroization

Use the Restore Master key wizard from the Encryption Group Properties dialog box to restore the
master key from a backup copy.

1. Select Configure > Encryption from the menu task bar to display the Encryption Center

dialog box. (Refer to

Figure 376

on page 976.)

2. Select an encryption engine from the Encryption Center Devices table, then select Engine >

Zeroize from the menu task bar.

A warning dialog box describes consequences and actions required to recover.