Dell POWEREDGE M1000E User Manual
Page 228
200
Fabric OS Command Reference
53-1002746-01
cryptoCfg
2
LUN_Num initiator_PWWN
cryptocfg --show -tape_sessions -all
cryptocfg --show -tape_sessions crypto_target_container_name
cryptocfg --clearstats -container
[-all | crypto_target_container_name ]
cryptocfg --clearstats -LUN crypto_target_container_name
LUN_Num initiator_PWWN
cryptocfg --refreshDEK crypto_target_container_name
LUN_Num initiator_PWWN
cryptocfg --reclaimWWN -membernode node_WWN [-list]
cryptocfg --reclaimWWN -EE node_WWN slot[-list]
cryptocfg --reclaimWWN -cleanup
DESCRIPTION
Use these cryptoCfg commands to configure and manage tape or disk devices that store the encrypted
and compressed data.
A CryptoTarget container (CTC) is a configuration of "virtual devices" that is created for each target port
hosted on a Brocade Encryption Switch or FS8-18 blade. The container holds the configuration
information for a single target, including associated hosts and LUN settings. A CryptoTarget container
interfaces between the encryption engine, the external storage devices (targets), and the initiators
(hosts) that can access the storage devices through the target ports.
Virtual devices redirect the traffic between host and target/LUN to encryption engines so they can
perform cryptographic operations. To enable frame redirection, you must create a target-initiator zone
prior to performing any CryptoTarget container configuration.
The CryptoTarget container (CTC) and associated Crypto LUN configuration is always configured from
the group leader node, and the configuration is subsequentlyn propagated to all members in the
encryption group.
CTC configuration uses a transaction model. Configuration changes must be committed before they take
effect. Use the cryptocfg --commit command to commit the transaction. Refer to section "5. Transaction
management" for more information.
This command set supports the following tasks:
•
Configure and manage CryptoTarget containers (CTCs). Create, move, or delete a CTC, add or
remove initiators (hosts permitted to access the targets), or manually initiate a failback of an
encryption engine.
•
Configure and manage logical unit numbers (LUNs) for disk and tape storage devices: add a LUN to
a CTC, set or modify LUN encryption policy parameters, or remove a LUN from a CTC. Perform LUN
discovery.
•
Configure and manage tape pools: create a tape pool, set or modify tape pool encryption policies, or
delete a tape pool. Perform LUN discovery.
•
Manage rekey operations for primary and mirror LUNS.
•
Reallocate or change the world wide name (WWN) of virtual entities that have been moved or
removed from an encryption group. This operation is indicated when you want to eject a Brocade
Encryption Switch from an encryption group as a result of a move operation or a split EG, or if you
intend to remove an FS8-18 Encryption blade from an encryption group.