Summary – Dell POWEREDGE M1000E User Manual
Page 400
400
Fabric OS Administrator’s Guide
53-1002745-02
Configuring encryption and compression
14
Notes
•
If you need to disable authentication on a port that has encryption or compression configured,
you must first disable encryption or compression on the port, and then disable authentication.
•
If you want to enable authentication across a FC router and an edge fabric switch, you must
first bring all EX_Ports online without using authentication. After this, the front wwn of any
online EX_Port connected to the same switch can be used to configure the secret keys in the
edge fabric switch.
Summary
These steps summarize how to enable encryption or compression on a port:
1. Use the portEncCompShow command to determine which ports are available for encryption or
compression.
NOTE
Enabling/disabling encryption/compression is a offline event. Ports must be disabled first, and
then re-enabled after.
2. If you are enabling encryption on the port, configure port level authentication for the port using
the secAuthSecret and authUtil commands. Omit this step if you want to enable only
compression on the port.
3. Use the portCfgEncrypt command to enable encryption on the port. This step fails if you try to
exceed the number of allowable ports available for encryption or compression on the ASIC.
4. Use the portCfgCompress command to enable compression on the port. This step fails if you
try to exceed the number of allowable ports available for encryption or compression on the
ASIC.
Following successful port initialization, the configured features are enabled and active. You can use
the islShow command to check that the E_Port (or fcrEdgeShow for EX_Ports) has come online with
encryption or compression enabled. Alternatively, you can use the portEncCompShow command to
see which ports are active.
If port initialization is not successful, you can check for port segmentation errors with the
switchShow command. This command will tell you if the segmentation was due to mismatched
encryption or compression configurations on the ports at either end of the ISL, if port-level
authentication failed, or if a required resource was not available.
The following topics provide step-by-step instructions for performing encryption and compression
tasks:
•
“Viewing the encryption and compression configuration”
•
“Configuring and enabling authentication”
•
•