Fabric OS Documentation Updates Supporting Fabric OS v7.0.x
Table Of Contents
- Contents
- About This Document
- Access Gateway Administrator’s Guide
- CEE Administrator’s Guide
- CEE Command Reference
- Fabric OS Administrator’s Guide
- Documentation updates for Fabric OS v7.0.0 and later
- Chapter 2, Performing Basic Configuration Tasks
- Chapter 4, Routing Traffic
- Chapter 5, Managing User Accounts
- Chapter 6, Configuring Protocols
- Chapter 7, Configuring Security Policies
- Chapter 9, Installing and Maintaining Firmware
- Chapter 12, Traffic Isolation Zoning
- Chapter 18, Administering Licensing
- Chapter 19, Monitoring Fabric Performance
- Chapter 20, Optimizing Fabric Behavior
- Chapter 22, Managing Long Distance Fabrics
- Chapter 23, Using the FC-FC Routing Service
- Documentation updates for Fabric OS v7.0.1 and later
- Documentation updates for Fabric OS v7.0.0 and later
- Fabric OS Command Reference
- Fabric OS Encryption Guide Supporting LKM
- Fabric OS Encryption Guide Supporting RKM
- Fabric OS Encryption Guide Supporting SKM and ESKM
- Fabric OS Encryption Guide Supporting TEMS
- Fabric OS Encryption Guide Supporting TEMS
- Fabric OS FCIP Administrator’s Guide
- Fabric OS FICON Administrator’s Guide
- Fabric OS Message Reference
- Fabric OS MIB Reference
- Fabric OS Troubleshooting and Diagnostics Guide
- Fabric Watch Administrator’s Guide
- Web Tools Administrator’s Guide
- Brocade DCX Backbone Hardware Reference Manual
- Brocade DCX-4S Backbone Hardware Reference Manual
Fabric OS Documentation Updates 43
53-1002165-10
Documentation updates for RKM
7
Failover/failback policy configuration
A correction has been made to heartbeat values for the following:
• Heartbeat misses—The range is 3-14 in integer increments only.
• Heartbeat timeout—The range is 2-9 seconds in integer increments only.
Chapter 5, Best Practices and Special Topics
Key Vault Best Practices
• When encrypted disk LUNs are to be configured or moved to an Encryption Group that uses a
different key vault, make sure to decommission the encrypted LUNs from the old Encryption
Group.
Chapter 6, Maintenance and Troubleshooting
Manually synchronizing the security database
This operation can resolve problems with master key propagation (and connectivity issues between
peer node encryption engines in an encryption group). The synchronization occurs every time this
command is executed regardless of whether or not the security database was synchronized across
all nodes in the encryption group.
Use the - -sync -securitydb command to distribute the security database from the group leader
node to all member nodes. This command is valid only on the group leader.
In scenarios where this master key propagation issue still persists, exporting the master key to a
file and recovering it resolves the issue. To do this, use the following commands:
• Use the cryptocfg --exportmasterkey -file option to export the master key to a file.
• Use the cryptocfg --recovermasterkey currentMK -srcfile to recover the master key.
Command name User Admin Operator Switch
Admin
Zone
Admin
Fabric
Admin
Basic
Switch
Admin
Security
Admin
Admin Domain
enable
NOMNNNOMN ODisallowed
kvdiag
NOMNNNO N OMDisallowed
reclaim
NOMNNNO N OMDisallowed
remove -haclustermember
NOMNNNO N OM
show -file -all
NOMNNNO N OM