Fabric OS Encryption Administrator's Guide

Fabric OS Encryption Administrator’s Guide 101
53-1002159-03
Viewing and editing group properties
2
OK - the member switch is responding to the group leader switch.
Not Available - the group leader is not a managed switch, so connection statuses are not being
collected from the group leader.
Members tab Remove button
You can click the Remove button to remove a selected switch or an encryption group from the
encryption group table.
You cannot remove the group leader unless it is the only switch in the group. If you remove the
group leader, the Management application also removes the HA cluster, the target container,
and the tape pool (if configured) that are associated with the switch.
If you remove a switch from an encryption group, the Management application also removes
the HA cluster and target container associated with the switch.
NOTE
If the encryption group is in a degraded state, the Management application does not remove
the HA clusters or target containers associated with the switch. In this case, a pop-up error
message displays.
If you remove the last switch from a group, the Management application also deletes the
group.
Consequences of removing an encryption switch
Table 2 explains the impact of removing switches.
A warning message displays when you attempt to remove a switch. Click Yes to proceed.
TABLE 2 Switch removal impact
Switch configuration Impact of removal
The switch is the only switch in the encryption
group.
The encryption group is also removed.
The switch has configured encryption targets on
encryption engines.
The switch is configured to encrypt traffic to one or more
encryption targets.
The target container configuration is removed.
The encrypted data remains on the encryption target but
is not usable until the encryption target is manually
configured on another encryption switch.
CAUTION
The encryption target data is visible in
encrypted format to zoned hosts. It is
strongly recommended that you remove the
encryption targets from all zones before you
disable encryption. Otherwise, hosts may
corrupt the encrypted data by writing
directly to the encryption target without
encryption.
The switch has encryption engines in HA
Clusters.
The HA Clusters are removed. High availability is no longer
provided to the other encryption engine in each HA Cluster.