Administrator's Guide Supporting HP Secure Key Manager (SKM) and HP Enterprise Secure Key Manager (ESKM) Environments (Supporting Fabric OS v7.2.0) Instruction Manual
Fabric OS Encryption Administrator’s Guide (SKM/ESKM) 299
53-1002923-01
disk devices
decommissioning
, 99
disk luns
decommissioning
, 100
rekeying manually
, 102
setting rekey all
, 103
viewing rekey details
, 104
disk metadata
, 228
E
EE state
disabling from properties
, 113
enabling from properties
, 113
eject commands
-eject -membernode
, 242
enable a disabled LUN using the CLI
, 228
enable commands
--enable -LUN
, 189
--enable -rekey
, 198
--enable_rekey
, 194
--enableEE
, 250
enableEE
, 162
encrypted LUN states
, 292
encryption
adding a license
, 5
best practices for licensing
, 5
certificate generation
, 28
configuration planning for the management
application
, 27, 40
configure dialog box
, 14
configuring
LUNs for first-time encryption
, 194
configuring in a multi-path environment
, 67
definition of terms
, 2
description of blade
, 5
engines
, 4
first-time encryption modes
, 194
frame redirection diagram
, 8
gathering information before using the setup wizard
,
27, 40
host and LUN considerations
, 1
launching the encryption targets dialog box
, 98
limitations
, 6
node initialization
, 28
overview diagram
, 7
performance licensing for switch
, 5
physical view of switch
, 4
preparation
, 40
selecting mode for LUNs
, 78
solution overview
, 7
viewing and editing group properties
, 114
encryption blades
port labeling
, 133
special configuration considerations
, 133
encryption center
features
, 14
encryption engine
rebalancing
, 85
encryption engines
adding to HA clusters
, 121
checking status
, 162
effects of zeroizing
, 96
enabing
, 162
recovering from zeroizing
, 96
removing from HA clusters
, 121
security processor (SP) states
, 291
states during an active failover and failback
, 248
support for tape pools
, 124
verifying status using the CLI
, 162
zeroizing
, 96
encryption group
adding a switch using the management application
, 51
advanced configuration
, 240
allowed configuration changes
, 258
basic configuration
, 145
configuration impact of split or node isolation
, 258
creating using the CLI
, 145
creating using the encryption setup wizard
, 41
deleting using the CLI
, 243
disallowed configuration changes
, 259
group-wide policy configuration
, 157
merge and split use cases
, 249
removing a node using the CLI
, 240
switch connection requirements
, 132
use cases
a member node lost connection to all other nodes
in the encryption group
, 251