Technical data
Fabric OS Encryption Administrator’s Guide (DPM) ix
53-1002720-02
Thin provisioned LUNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
Space reclamation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
Data rekeying. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
Resource allocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
Rekeying modes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
Configuring a LUN for automatic rekeying . . . . . . . . . . . . . . . 206
Initiating a manual rekey session . . . . . . . . . . . . . . . . . . . . . . 207
Suspension and resumption of rekeying operations. . . . . . . 208
chapter 4 Deployment Scenarios
In this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
Single encryption switch, two paths from host to target . . . . . . . 210
Single fabric deployment - HA cluster . . . . . . . . . . . . . . . . . . . . . . 211
Single fabric deployment - DEK cluster . . . . . . . . . . . . . . . . . . . . . 212
Dual fabric deployment - HA and DEK cluster. . . . . . . . . . . . . . . . 213
Multiple paths, one DEK cluster, and two HA clusters . . . . . . . . . 214
Multiple paths, DEK cluster, no HA cluster . . . . . . . . . . . . . . . . . . 215
Deployment in Fibre Channel routed fabrics. . . . . . . . . . . . . . . . . 217
Deployment as part of an edge fabric . . . . . . . . . . . . . . . . . . . . . . 219
Deployment with FCIP extension switches . . . . . . . . . . . . . . . . . . 220
Data mirroring deployment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
If metadata is not present on the LUN . . . . . . . . . . . . . . . . . . 222
VMware ESX server deployments. . . . . . . . . . . . . . . . . . . . . . . . . . 223
Chapter 5 Best Practices and Special Topics
In this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Firmware upgrade and downgrade considerations . . . . . . . . . . . 226
General guidelines. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
Specific guidelines for HA clusters . . . . . . . . . . . . . . . . . . . . . 227
Configuration upload and download considerations . . . . . . . . . . 228
Configuration upload at an encryption group leader
node . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
Configuration upload at an encryption group member
node . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
Information not included in an upload . . . . . . . . . . . . . . . . . . 229
Steps before configuration download. . . . . . . . . . . . . . . . . . . 229
Configuration download at the encryption group leader. . . . 229
Configuration download at an encryption group
member . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
Steps after configuration download . . . . . . . . . . . . . . . . . . . . 230
HP-UX considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
AIX Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
Enabling a disabled LUN. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231