Administrator's Guide Supporting NetApp Lifetime Key Manager (LKM) and KeySecure Storage Secure Key Manager (SSKM) Environments (Supporting Fabric OS v7.2.0) User Manual
Fabric OS Encryption Administrator’s Guide (LKM/SSKM) 209
53-1002925-01
Chapter
6
Maintenance and Troubleshooting
In this chapter
•Encryption group and HA cluster maintenance . . . . . . . . . . . . . . . . . . . . . . . 210
•Encryption group merge and split use cases. . . . . . . . . . . . . . . . . . . . . . . . . 219
•Encryption group database manual operations . . . . . . . . . . . . . . . . . . . . . . 229
•Key vault diagnostics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
•Measuring encryption performance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
•Enabling encrypted LUNs in the disabled state following zeroization . . . . . 234
•General encryption troubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
•SSKM recommendations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
•Troubleshooting examples using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
•Management application encryption wizard troubleshooting . . . . . . . . . . . . 241
•LUN policy troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244
•Loss of encryption group leader after power outage . . . . . . . . . . . . . . . . . . 245
•MPIO and internal LUN states. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
•FS8-18 blade removal and replacement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
•Brocade Encryption Switch removal and replacement . . . . . . . . . . . . . . . . . 251
•Reclaiming the WWN base of a failed Brocade Encryption Switch . . . . . . . 256
•Removing stale rekey information for a LUN . . . . . . . . . . . . . . . . . . . . . . . . . 256
•Downgrading firmware from Fabric OS 7.1.0. . . . . . . . . . . . . . . . . . . . . . . . . 257
•Splitting an encryption group into two encryption groups . . . . . . . . . . . . . . 258
•Moving an encryption blade from one EG to another in the same fabric . . 259
•Moving an encryption switch from one EG to another in the same fabric. . 260