NOTE: Once Permissive mode is disabled, only those systems with IP addresses in the rules will
be able to connect to the service processor.
9.
Click OK at the bottom of the Service Processor Settings dialog.
10. The Service Processor setup page will show the process of reconfiguring the service processor.
Configuring the host and SAN: Process overview
Procedure
•
Complete Configuring a host using a host-OS implementation guide on page 53.
•
Only for HPE 3PAR Smart SAN, see the HPE 3PAR Smart SAN User Guide available at the Hewlett
Packard Enterprise Information Library website: www.hpe.com/info/storage/docs.
Configuring a host using a host-OS implementation guide
Procedure
To configure your servers as hosts for your storage system, use the HPE 3PAR host-OS implementation
guides.
These host-OS implementation guides, the HPE 3PAR StoreServ Storage best practices guide white
paper, and additional HPE 3PAR documentation are available at the Hewlett Packard Enterprise
Information Library website:
www.hpe.com/info/storage/docs
Enhancing security with data encryption
The HPE 3PAR Data Encryption security feature enables you to encrypt all specifically formatted drives
with an authentication key and the use of Federal Information Processing Standard (FIPS) capable HPE
3PAR StoreServ Storage drives.
When a Data Encryption license is registered, you must manually enable the encryption feature on the
HPE 3PAR StoreServ Storage system. When the encryption feature is enabled successfully, all the
installed drives become automatically set in an encrypted state.
NOTE: To review the encryption status of individual drives, use the HPE 3PAR StoreServ Management
Console (SSMC).
This feature allows you to perform the following encryption-related tasks:
•
Check encryption status
•
Enable encryption
•
Back up an authentication key
•
Restore an authentication key
•
Generate a new key
•
Recover a key
For more information about enabling the feature, see the HPE 3PAR StoreServ Management Console
User Guide available at the Hewlett Packard Enterprise Information Library website:
Post-installation tasks
53