Consequences Of Removing An Encryption Switch - Brocade Communications Systems Brocade BladeSystem 4/24 User Manual

Supporting dcfm 10.4.x
Hide thumbs Also See for Brocade BladeSystem 4/24:
Table of Contents

Advertisement

18
Members tab Remove button
You can click the Remove button to remove a selected switch or an encryption group from the
encryption group table.

Consequences of removing an encryption switch

Table 30
TABLE 30
Switch configuration
The switch is the only switch in the encryption
group.
The switch has configured encryption targets on
encryption engines.
The switch has encryption engines in HA
Clusters.
Figure 205
544
You cannot remove the group leader unless it is the only switch in the group. If you remove the
group leader, the Management application also removes the HA cluster, the target container,
and the tape pool (if configured) that are associated with the switch.
If you remove a switch from an encryption group, the Management application also removes
the HA cluster and target container associated with the switch.
NOTE
If the encryption group is in a degraded state, the Management application does not remove
the HA clusters or target containers associated with the switch. In this case, a pop-up error
message displays.
If you remove the last switch from a group, the Management application also deletes the
group.
explains the impact of removing switches.
shows the warning message that displays if you click Remove to remove a switch.
Impact of removal
The encryption group is also removed.
The switch is configured to encrypt traffic to one or more
encryption targets.
The target container configuration is removed.
The encrypted data remains on the encryption target but
is not usable until the encryption target is manually
configured on another encryption switch.
CAUTION
The encryption target data is visible in
encrypted format to zoned hosts. It is
strongly recommended that you remove the
encryption targets from all zones before you
disable encryption. Otherwise, hosts may
corrupt the encrypted data by writing
directly to the encryption target without
encryption.
The HA Clusters are removed. High availability is no longer
provided to the other encryption engine in each HA Cluster.
DCFM Professional Plus User Manual
53-1001774-01

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dcfm professional plus

Table of Contents