Brocade Communications Systems Brocade BladeSystem 4/24 User Manual page 19

Supporting dcfm 10.4.x
Hide thumbs Also See for Brocade BladeSystem 4/24:
Table of Contents

Advertisement

DCFM Professional Plus User Manual
53-1001774-01
Steps for connecting to an LKM appliance . . . . . . . . . . . . . . . . . . .467
The NetApp DataFort Management Console . . . . . . . . . . . . . 467
Establishing the trusted link . . . . . . . . . . . . . . . . . . . . . . . . . . 468
Obtaining and importing the LKM certificate. . . . . . . . . . . . . 469
LKM key vault high availability deployment . . . . . . . . . . . . . . 470
LKM Key Vault Deregistration . . . . . . . . . . . . . . . . . . . . . . . . . 471
Steps for connecting to an SKM appliance . . . . . . . . . . . . . . . . . . .472
Configuring a Brocade group on SKM . . . . . . . . . . . . . . . . . . 473
Creating an SKM High Availability cluster . . . . . . . . . . . . . . . 478
Adding SKM appliances to the cluster . . . . . . . . . . . . . . . . . . 479
Steps for connecting to a TEMS appliance . . . . . . . . . . . . . . . . . . .481
Setting up TEMS network connections. . . . . . . . . . . . . . . . . . 481
Creating a client on TEMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482
Gathering information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .485
Creating a new encryption group . . . . . . . . . . . . . . . . . . . . . . . . . . .486
Adding a switch to an encryption group. . . . . . . . . . . . . . . . . . . . . .499
Creating high availability (HA) clusters . . . . . . . . . . . . . . . . . . . . . .503
Removing engines from an HA cluster . . . . . . . . . . . . . . . . . . 504
Swapping engines in an HA cluster . . . . . . . . . . . . . . . . . . . . 505
Failback option. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505
Invoking failback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505
Adding encryption targets. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .506
Configuring hosts for encryption targets . . . . . . . . . . . . . . . . . . . . .513
Adding target disk LUNs for encryption . . . . . . . . . . . . . . . . . . . . . . 514
Remote replication LUNs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516
SRDF pairs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516
Adding Target Tape LUNs for encryption . . . . . . . . . . . . . . . . . . . . .519
Configuring encrypted tape storage in a multi-path environment 520
Re-balancing the encryption engine . . . . . . . . . . . . . . . . . . . . . . . .521
Contents
xix

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dcfm professional plus

Table of Contents