Cryptocfg – Dell POWEREDGE M1000E User Manual
Page 176
144
Fabric OS Command Reference
53-1001764-02
cryptoCfg
2
cryptoCfg
Name
Performs encryption configuration and management functions.
Synopsis
cryptocfg --help -nodecfg
cryptocfg --help -groupcfg
cryptocfg --help -hacluster
cryptocfg --help -devicecfg
cryptocfg --help -transcfg
cryptocfg --help -decommission
Description
Use the cryptoCfg command to configure and manage the Brocade Encryption Switch and the
FS8-18 encryption blade. These platforms support the encryption of data-at-rest for tape devices
and disk array logical unit numbers (LUNs).
The cryptoCfg CLI consists of six command sets grouped around the following configuration
functions:
“2. Encryption group configuration”
“3. High Availability (HA) cluster configuration”
“4. Storage device configuration and management”
Each of these command groups is documented in a separate section that includes function,
synopsis, description, and operands. Examples are presented at the end of the help page.
For detailed encryption switch management and configuration procedures, refer to the Fabric OS
Encryption Administrator’s Guide.
CAUTION
When configuring a LUN with multiple paths, there is a considerable risk of ending up with
potentially catastrophic scenarios where different policies exist for each path of the LUN, or a
situation where one path ends up being exposed through the encryption switch and other path
has direct access to the device from a host outside the secured realm of the encryption platform.
To protect against this risk, it is necessary to configure containers IN SEQUENCE and with the
same policies and not issue a commit until the configuration for all hosts accessing the LUN is
complete. Failure to follow correct configuration procedures for multi-path LUNs results in data
corruption. If you are configuring multi-path LUNs as part of an HA cluster or DEK cluster or as a
standalone LUN accessed by multiple hosts, follow the instructions described in the section
"Configuring a multi-path Crypto LUN" in the Fabric OS Encryption Administrator's Guide.
Note
The execution of this command is subject to Virtual Fabric or Admin Domain restrictions that may
be in place. For details on command availability, refer to Appendix A,