
Brocade Communications Systems, Inc. Page 33 of 48
Figure 5: User Data Encryption
6.1.2.1.1 Key Management System
The user data encryption mechanism is transparent to the FC routing and zone enforcement mechanisms and is
subject to all FC routing and zone enforcement configuration.