Fabric OS Documentation Updates Supporting Fabric OS v7.0.x
Table Of Contents
- Contents
- About This Document
- Access Gateway Administrator’s Guide
- CEE Administrator’s Guide
- CEE Command Reference
- Fabric OS Administrator’s Guide
- Documentation updates for Fabric OS v7.0.0 and later
- Chapter 2, Performing Basic Configuration Tasks
- Chapter 4, Routing Traffic
- Chapter 5, Managing User Accounts
- Chapter 6, Configuring Protocols
- Chapter 7, Configuring Security Policies
- Chapter 9, Installing and Maintaining Firmware
- Chapter 12, Traffic Isolation Zoning
- Chapter 18, Administering Licensing
- Chapter 19, Monitoring Fabric Performance
- Chapter 20, Optimizing Fabric Behavior
- Chapter 22, Managing Long Distance Fabrics
- Chapter 23, Using the FC-FC Routing Service
- Documentation updates for Fabric OS v7.0.1 and later
- Documentation updates for Fabric OS v7.0.0 and later
- Fabric OS Command Reference
- Fabric OS Encryption Guide Supporting LKM
- Fabric OS Encryption Guide Supporting RKM
- Fabric OS Encryption Guide Supporting SKM and ESKM
- Fabric OS Encryption Guide Supporting TEMS
- Fabric OS Encryption Guide Supporting TEMS
- Fabric OS FCIP Administrator’s Guide
- Fabric OS FICON Administrator’s Guide
- Fabric OS Message Reference
- Fabric OS MIB Reference
- Fabric OS Troubleshooting and Diagnostics Guide
- Fabric Watch Administrator’s Guide
- Web Tools Administrator’s Guide
- Brocade DCX Backbone Hardware Reference Manual
- Brocade DCX-4S Backbone Hardware Reference Manual
Fabric OS Documentation Updates 41
53-1002165-10
Chapter
7
Fabric OS Encryption Guide Supporting RKM
In this chapter
The updates in this chapter are for the Fabric OS Encryption Administrator’s Guide Supporting RSA
Key Manager (RKM) Environments, publication number 53-1002158-02, published June 2011.
Documentation updates for RKM
Chapter 2, Encryption configuration using the Management application
Disk device decommissioning
Under the heading of “Displaying and deleting decommissioned key IDs” on page 87, additional
steps in the procedure have been added that must be performed from the RKM key vault server.
FIGURE 1 Decommissioned Key IDs dialog box
When disk LUNs are decommissioned, the process includes the disabling of the key record in the
key vault and indication that the key has been decommissioned. These decommissioned key IDs
are still stored on the switch. You can display, copy, and delete them as an additional security
measure.
For RKM key vaults, you need to know the Universal ID (UUID) associated with the decommissioned
LUN key IDs to delete keys from the key vault. To delete decommissioned key IDs, you must first
display the vendor-specific UUIDs of decommissioned key IDs for RKM key vaults from the
Management application. You must then remove key attributes directly from the RKM key vault
server.
1. Select Configure > Encryption from the menu task bar.
The Encryption Center dialog box displays.