About This Document; In This Chapter; How This Document Is Organized - Brocade Communications Systems 1606 Administrator's Manual

Fabric os encryption administrator's guide v6.4.0 (53-1001864-01, june 2010)
Hide thumbs Also See for 1606:
Table of Contents

Advertisement

About This Document

In this chapter

How this document is organized

.
This document is organized to help you find the information that you want as quickly and easily as
possible.
The document contains the following components:
Fabric OS Encryption Administrator's Guide
53-1001864-01
How this document is organized . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Supported hardware and software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
What's new in this document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
Document conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
Notice to the reader . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi
Additional information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi
Getting technical help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
Document feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii
Chapter 1, "Encryption overview,"
switch and the encryption solution, and the terminology used in this document.
Chapter 2, "Encryption configuration using the Management application"
configure and manage encryption features using DCFM.
Chapter 3, "Configuring Brocade encryption using the CLI"
manage encryption features using the command line interface.
Chapter 4, "Deployment Scenarios"
deployed.
Chapter 5, "Best Practices and Special Topics,"
special topics relevant to the implementation of encryption features.
Chapter 6, "Maintenance and Troubleshooting,"
the most common commands and procedures to use to diagnose and recover from problems.
Appendix A, "State and Status Information,"
states, security processor key encryption key (KEK) status information, and encrypted LUN
states.
Appendix B, "LUN Policies,"
LUNs, and includes LUN policy troubleshooting information.
Appendix C, "NS-Based Transparent Frame Redirection,"
transparent frame redirection interop matrix.
provides a task matrix, an overview of the data encryption
describes SAN configurations in which encryption may be
summarizes best practices and addresses
provides information on troubleshooting and
lists the encryption engine security processor (SP)
provides a DataFort compatibility support matrix for disk and tape
describes how to
describes how to configure and
provides a name server (NS)-based
xiii

Advertisement

Table of Contents
loading

Table of Contents