Administrator's Guide Supporting RSA Data Protection Manager (DPM) Environments (Supporting Fabric OS v7.2.0) Owner's manual

Table Of Contents
Fabric OS Encryption Administrator’s Guide (DPM) 305
53-1002922-01
DEK (data encryption keys), 9
DEK life cycle
, 10
delete commands
--delete -container
, 165, 247
--delete -encgroup
, 249
--delete -hacluster
, 253
--delete -tapepool
, 196
deployment scenarios
data mirroring deployment
, 223
deployment as part of an edge fabric
, 221
deployment in fibre channel routed fabrics
, 219
deployment with FCIP extension switches
, 222
dual fabric deployment
, 215
single fabric and DEK cluster
, 214
single fabric deployment
, 213, 214
single switch, two paths from host to target
, 212
deployment with admin domains (AD)
, 237
deregister command,--dereg -membernode
, 248
DHCP for IP interfaces
, 237
discover commands
--discover -LUN
, 200
--discoverLUN
, 167, 171
disk devices
decommissioning
, 97
disk luns
decommissioning
, 98
rekeying manually
, 100
setting rekey all
, 101
viewing rekey details
, 102
disk metadata
, 234
downloading firmware
, 292
E
EE state
disabling from properties
, 111
enabling from properties
, 111
eject commands
-eject -membernode
, 248
enable a disabled LUN using the CLI
, 233
enable commands
--enable -LUN
, 179
--enable -rekey
, 207
--enable_rekey
, 202
--enableEE
, 256
enableEE
, 156
encrypted LUN states
, 298
encryption
adding a license
, 5
best practices for licensing
, 5
certificate generation
, 28
configuration planning for the management
application
, 27, 35
configure dialog box
, 14
configuring
LUNs for first-time encryption
, 202
configuring in a multi-path environment
, 61
cut-through
, 6
definition of terms
, 2
description of blade
, 5
engines
, 4
first-time encryption modes
, 202
frame redirection diagram
, 8
gathering information before using the setup wizard
,
27, 35
host and LUN considerations
, 1
launching the encryption targets dialog box
, 96
limitations
, 6
node initialization
, 28
overview diagram
, 7
performance licensing for switch
, 5
physical view of switch
, 4
preparation
, 35
selecting mode for LUNs
, 76
solution overview
, 7
viewing and editing group properties
, 111
encryption blades
port labeling
, 131
special configuration considerations
, 131
encryption center
features
, 14
encryption engine
rebalancing
, 83
encryption engines
adding to HA clusters
, 119
checking status
, 156
effects of zeroizing
, 94
enabing
, 156
initializing
, 135
recovering from zeroizing
, 94
removing from HA clusters
, 119
security processor (SP) states
, 297
states during an active failover and failback
, 254
support for tape pools
, 121
verifying status using the CLI
, 156
zeroizing
, 94