Fabric OS Encryption Administrator's Guide v6.4.0 (53-1001864-01, June 2010)
Fabric OS Encryption Administrator’s Guide xiii
53-1001864-01
About This Document
In this chapter
•How this document is organized . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
•Supported hardware and software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
•What’s new in this document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
•Document conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
•Notice to the reader . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi
•Additional information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi
•Getting technical help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
•Document feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii
How this document is organized
. This document is organized to help you find the information that you want as quickly and easily as
possible.
The document contains the following components:
• Chapter 1, “Encryption overview,” provides a task matrix, an overview of the data encryption
switch and the encryption solution, and the terminology used in this document.
• Chapter 2, “Encryption configuration using the Management application” describes how to
configure and manage encryption features using DCFM.
• Chapter 3, “Configuring Brocade encryption using the CLI” describes how to configure and
manage encryption features using the command line interface.
• Chapter 4, “Deployment Scenarios” describes SAN configurations in which encryption may be
deployed.
• Chapter 5, “Best Practices and Special Topics,” summarizes best practices and addresses
special topics relevant to the implementation of encryption features.
• Chapter 6, “Maintenance and Troubleshooting,” provides information on troubleshooting and
the most common commands and procedures to use to diagnose and recover from problems.
• Appendix A, “State and Status Information,” lists the encryption engine security processor (SP)
states, security processor key encryption key (KEK) status information, and encrypted LUN
states.
• Appendix B, “LUN Policies,” provides a DataFort compatibility support matrix for disk and tape
LUNs, and includes LUN policy troubleshooting information.
• Appendix C, “NS-Based Transparent Frame Redirection,” provides a name server (NS)-based
transparent frame redirection interop matrix.