Consequences Of Removing An Encryption Switch - Brocade Communications Systems Brocade 8/12c Administrator's Manual

Supporting hp secure key manager (skm) environments and hp enterprise secure key manager (eskm) environments
Hide thumbs Also See for Brocade 8/12c:
Table of Contents

Advertisement

Members tab Remove button
You can click the Remove button to remove a selected switch or an encryption group from the
encryption group table.

Consequences of removing an encryption switch

Table 2
TABLE 2
Switch configuration
The switch is the only switch in the encryption
group.
The switch has configured encryption targets on
encryption engines.
The switch has encryption engines in HA
Clusters.
A warning message displays when you attempt to remove a switch. Click Yes to proceed.
Fabric OS Encryption Administrator's Guide
53-1002159-03
OK - the member switch is responding to the group leader switch.
Not Available - the group leader is not a managed switch, so connection statuses are not being
collected from the group leader.
You cannot remove the group leader unless it is the only switch in the group. If you remove the
group leader, the Management application also removes the HA cluster, the target container,
and the tape pool (if configured) that are associated with the switch.
If you remove a switch from an encryption group, the Management application also removes
the HA cluster and target container associated with the switch.
NOTE
If the encryption group is in a degraded state, the Management application does not remove
the HA clusters or target containers associated with the switch. In this case, a pop-up error
message displays.
If you remove the last switch from a group, the Management application also deletes the
group.
explains the impact of removing switches.
Switch removal impact
Viewing and editing group properties
Impact of removal
The encryption group is also removed.
The switch is configured to encrypt traffic to one or more
encryption targets.
The target container configuration is removed.
The encrypted data remains on the encryption target but
is not usable until the encryption target is manually
configured on another encryption switch.
CAUTION
The encryption target data is visible in
encrypted format to zoned hosts. It is
strongly recommended that you remove the
encryption targets from all zones before you
disable encryption. Otherwise, hosts may
corrupt the encrypted data by writing
directly to the encryption target without
encryption.
The HA Clusters are removed. High availability is no longer
provided to the other encryption engine in each HA Cluster.
2
101

Advertisement

Table of Contents
loading

This manual is also suitable for:

Fabric os encryption

Table of Contents