Brocade Network Advisor SAN User Manual v12.0.0 (53-1002696-01, April 2013)

xviii Brocade Network Advisor SAN User Manual
53-1002696-01
Chapter 19 Virtual Fabrics
Virtual Fabrics overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .511
Terminology for Virtual Fabrics . . . . . . . . . . . . . . . . . . . . . . . .512
Virtual Fabrics requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .512
Configuring Virtual Fabrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514
Enabling Virtual Fabrics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .515
Disabling Virtual Fabrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .515
Creating a logical switch or base switch . . . . . . . . . . . . . . . . .516
Finding the physical chassis for a logical switch . . . . . . . . . . .518
Finding the logical switch from a physical chassis . . . . . . . . .518
Assigning ports to a logical switch . . . . . . . . . . . . . . . . . . . . . .519
Removing ports from a logical switch. . . . . . . . . . . . . . . . . . . .519
Deleting a logical switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .520
Configuring fabric-wide parameters for a logical fabric. . . . . .521
Applying logical fabric settings to all associated
logical switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .522
Moving a logical switch to a different fabric. . . . . . . . . . . . . . .523
Changing a logical switch to a base switch . . . . . . . . . . . . . . .523
Chapter 20 SAN Encryption Configuration
Encryption Center features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .526
Encryption user privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .527
Smart card usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .528
Using authentication cards with a card reader . . . . . . . . . . . .528
Registering authentication cards from a card reader . . . . . . .529
Registering authentication cards from the database . . . . . . .531
Deregistering an authentication card . . . . . . . . . . . . . . . . . . .532
Setting a quorum for authentication cards . . . . . . . . . . . . . . .532
Using system cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .533
Enabling or disabling the system card requirement . . . . . . . .534
Registering systems card from a card reader . . . . . . . . . . . . .534
Deregistering system cards . . . . . . . . . . . . . . . . . . . . . . . . . . .535
Using smart cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .535
Tracking smart cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .535
Editing smart cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .538
Network connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .539
Blade processor links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .539
Configuring blade processor links . . . . . . . . . . . . . . . . . . . . . .540
Encryption node initialization and certificate generation. . . . . . . .540
Setting encryption node initialization . . . . . . . . . . . . . . . . . . .541
Key Management Interoperability Protocol . . . . . . . . . . . . . . . . . . .541
Supported encryption key manager appliances . . . . . . . . . . . . . . .542
Steps for connecting to a DPM appliance . . . . . . . . . . . . . . . . . . . .544
Exporting the KAC certificate signing request (CSR) . . . . . . . .544
Submitting the CSR to a certificate authority . . . . . . . . . . . . .545
KAC certificate registration expiry. . . . . . . . . . . . . . . . . . . . . . .545