Data Center Fabric Manager Enterprise User Manual v10.3.X (53-1001357-01, November 2009)

480 DCFM Enterprise User Manual
53-1001357-01
Consequences of removing an encryption switch
16
Members tab Remove button
You can click the Remove button to remove a selected switch or an encryption group from the
encryption group table.
You cannot remove the group leader unless it is the only switch in the group. If you remove the
group leader, the Management application also removes the HA cluster, the target container,
and the tape pool (if configured) that are associated with the switch.
If you remove a switch from an encryption group, the Management application also removes
the HA cluster and target container associated with the switch.
NOTE
If the encryption group is in a degraded state, the Management application does not remove
the HA clusters or target containers associated with the switch. In this case, a pop-up error
message displays.
If you remove the last switch from a group, the Management application also deletes the
group.
Consequences of removing an encryption switch
Table 26 explains the impact of removing switches.
Figure 187 shows the warning message that displays if you click Remove to remove a switch.
TABLE 26
Switch configuration Impact of removal
The switch is the only switch in the encryption
group.
The encryption group is also removed.
The switch has configured encryption targets on
encryption engines.
The switch is configured to encrypt traffic to one or more
encryption targets.
The target container configuration is removed.
The encrypted data remains on the encryption target but
is not usable until the encryption target is manually
configured on another encryption switch.
CAUTION
The encryption target data is visible in
encrypted format to zoned hosts. It is
strongly recommended that you remove the
encryption targets from all zones before you
disable encryption. Otherwise, hosts may
corrupt the encrypted data by writing
directly to the encryption target without
encryption.
The switch has encryption engines in HA
Clusters.
The HA Clusters are removed. High availability is no longer
provided to the other encryption engine in each HA Cluster.