Brocade Network Advisor SAN User Manual v11.1x (53-1002167-01, May 2011)

xvi Brocade Network Advisor SAN User Manual
53-1002167-01
Configuring routing domain IDs . . . . . . . . . . . . . . . . . . . . . . . . . . . .412
Chapter 17 Virtual Fabrics
In this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .413
Virtual Fabrics overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .413
Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .414
Virtual Fabrics requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .415
Configuring Virtual Fabrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416
Enabling Virtual Fabrics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417
Disabling Virtual Fabrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .417
Creating a logical switch or base switch . . . . . . . . . . . . . . . . .418
Finding the physical chassis for a logical switch . . . . . . . . . . .420
Finding the logical switch from a physical chassis . . . . . . . . .420
Assigning ports to a logical switch . . . . . . . . . . . . . . . . . . . . . .420
Removing ports from a logical switch. . . . . . . . . . . . . . . . . . . .421
Deleting a logical switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .422
Configuring fabric-wide parameters for a logical fabric. . . . . .423
Applying logical fabric settings to all associated logical switches424
Moving a logical switch to a different fabric. . . . . . . . . . . . . . .425
Changing a logical switch to a base switch . . . . . . . . . . . . . . .426
Chapter 18 SAN Encryption configuration
In this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .427
Encryption Center features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .428
Encryption user privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .429
Smart card usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .431
Registering authentication cards from a card reader . . . . . . .431
Registering authentication cards from the database . . . . . . .433
Deregistering an authentication card. . . . . . . . . . . . . . . . . . . .434
Using authentication cards . . . . . . . . . . . . . . . . . . . . . . . . . . . .435
Enabling or disabling the system card requirement . . . . . . . .435
Registering system cards from a card reader . . . . . . . . . . . . .436
Deregistering a system card . . . . . . . . . . . . . . . . . . . . . . . . . . .437
Tracking smart cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .437
Editing smart cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .438
Network connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .439
Configuring blade processor links . . . . . . . . . . . . . . . . . . . . . . . . . .440
Encryption node initialization and certificate generation. . . . . . . .441
Supported encryption key manager appliances . . . . . . . . . . . . . . .442
Steps for connecting to an RKM appliance. . . . . . . . . . . . . . . . . . .443
Exporting the KAC certificate signing request (CSR) . . . . . . . .443
Submitting the CSR to a certificate authority . . . . . . . . . . . . .444
Importing the signed KAC certificate . . . . . . . . . . . . . . . . . . . .444
Uploading the KAC and CA certificates onto the RKM appliance444
RKM key vault high availability deployment. . . . . . . . . . . . . . .446
Loading the CA certificate onto the encryption group leader .446