Brocade Communications Systems Brocade 8/12c Administrator's Manual page 11

Supporting hp secure key manager (skm) environments and hp enterprise secure key manager (eskm) environments
Hide thumbs Also See for Brocade 8/12c:
Table of Contents

Advertisement

Fabric OS Encryption Administrator's Guide
53-1002159-03
Do not use DHCP for IP interfaces . . . . . . . . . . . . . . . . . . . . . . . . . .199
Ensure uniform licensing in HA clusters . . . . . . . . . . . . . . . . . . . . .199
Tape library media changer considerations . . . . . . . . . . . . . . . . . .199
Turn off host-based encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . .199
Avoid double encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .199
PID failover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .200
Turn off compression on extension switches . . . . . . . . . . . . . . . . .200
Re-keying best practices and policies . . . . . . . . . . . . . . . . . . . . . . .200
KAC certificate registration expiry . . . . . . . . . . . . . . . . . . . . . . . . . .201
Changing IP addresses in encryption groups . . . . . . . . . . . . . . . . .202
Disabling the encryption engine . . . . . . . . . . . . . . . . . . . . . . . . . . .202
Recommendations for Initiator Fan-Ins . . . . . . . . . . . . . . . . . . . . . .202
Key Vault Best Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .204
Tape Device LUN Mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .204
Chapter 6
In this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .205
Encryption group and HA cluster maintenance. . . . . . . . . . . . . . . .205
Manual re-key. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .200
Latency in re-key operations . . . . . . . . . . . . . . . . . . . . . . . . . . .200
Re-key operations and firmware upgrades . . . . . . . . . . . . . . .201
rekeying and first time encryption . . . . . . . . . . . . . . . . . . . . . .201
Displaying encryption group configuration or status
information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .205
Deleting an encryption group . . . . . . . . . . . . . . . . . . . . . . . . . .208
Removing an HA cluster member . . . . . . . . . . . . . . . . . . . . . . .208
Displaying the HA cluster configuration . . . . . . . . . . . . . . . . . .208
Replacing an HA cluster member . . . . . . . . . . . . . . . . . . . . . . .209
Deleting an HA cluster member . . . . . . . . . . . . . . . . . . . . . . . .211
xi

Advertisement

Table of Contents
loading

This manual is also suitable for:

Fabric os encryption

Table of Contents