User Manual v12.3.0 User Manual

694 Brocade Network Advisor SAN User Manual
53-1003154-01
Encryption Center features
20
Using the Encryption Targets dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . 851
Redirection zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 852
Disk device decommissioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 853
Rekeying all disk LUNs manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 856
Thin provisioned LUNs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 861
Viewing time left for auto rekey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 862
Viewing and editing switch encryption properties. . . . . . . . . . . . . . . . . . . . 863
Viewing and editing encryption group properties . . . . . . . . . . . . . . . . . . . . 868
Encryption-related acronyms in log messages . . . . . . . . . . . . . . . . . . . . . . 884
Encryption Center features
The Encryption Center dialog box is the single launching point for all encryption-related
configuration in the Management application. (Refer to Figure 266.) It also provides a table that
shows the general status of all encryption-related hardware and functions at a glance. To open the
dialog box, select Configure > Encryption.
FIGURE 266 Encryption Center dialog box
Beginning with Fabric OS 6.4, the Encryption Center is dynamically updated to reflect the latest
changes based on any of the following events:
Encryption group creation or deletion.
A change in encryption group status or encryption engine status
Addition or removal of an encryption group member or encryption engine
If you are using the Encryption Center for the first time, please read the following topics before you
begin to perform encryption operations:
“Encryption user privileges” on page 695 describes the Role-based Access Control privileges
that are specific to encryption.
“Smart card usage” on page 696 and the topics that follow describe the options available for
the use of Smart Cards for user authentication, system access control, and storing backup
copies of data encryption master keys.
“Network connections” on page 707 describes the network connections that must be in place
to enable encryption.