Administrator's Guide Supporting Key Management Interoperability Protocol (KMIP) Key-Compliant Environments (Supporting Fabric OS v7.1.0) User guide
300 Fabric OS Encryption Administrator’s Guide (KMIP)
53-1002747-02
encryption node
setting initialization
, 28
encryption nodes
setting initialization
, 148
encryption properties
viewing properties
, 122
encryption switch
definition of
, 4
initialization
, 157
port labeling
, 146
encryption switch or group, removing using the
management application
, 132
encryption targets
adding
, 72
adding to virtual targets and virtual initiators within the
encryption switch
, 71
configuring hosts for
, 80
using the dialog box
, 111
using the dialog box to add Disk LUNs
, 113
engine operations tab
, 139
ensure uniform licensing in HA clusters
, 237
error recovery instructions
for adding a switch to a new group
, 273
for adding a switch to an existing group
, 272
error recovery instructions for adding a switch to an
existing group
, 272
errors related to the CLI
, 267
export commands
--export
, 161
--exportmasterkey
, 164
F
failback
invoking
, 71
modes
, 71
failback command, --failback -EE
, 252
failover and failback, states of encryption engines during
,
252
field replaceable unit
See FRU
file names, certificates
, 160
FIPS compliance
setting
, 150
FIPS mode
, 5
firmware download considerations
, 228
frame redirection
creating and enabling in an FCR configuration (edge to
edge)
, 222
deploying the encryption switch or blade to hosts and
targets
, 174
enabling
, 174
prerequesites
, 174
viewing the zone using the CLI
, 180
frame redirection zoning
creating and enabled in a FCR configuration
, 221
G
general tab, 128
generate commands
--genmasterkey
, 163
group-wide policies, examples using the CLI
, 168
H
HA clusters
adding an encryption engine using the CLI
, 166
adding engines
, 69
configuration rules
, 68, 164
configuring using the CLI
, 164
creating using BNA
, 68
deleting a member using the CLI
, 251
displaying configuration using the CLI
, 248
performing a manual failback of an encryption engine
using the CLI
, 252
removing an encryption engine using the CLI
, 247
removing engines
, 70, 166
removing engines from
, 70
replacing a member using the CLI
, 249
requirements for
, 68
rules
, 68, 164
swapping engines
, 166
swapping engines in
, 70
HA clusters tab
, 135
hosts
configuring for encryption targets
, 80
HP-UX considerations
, 232
http
//www.gemalto.com/readers/index.html
, 16