Brocade Fabric OS Documentation Updates - Supporting Fabric OS v7.0.x (53-1002165-05, March 2012)

iv Fabric OS Documentation Updates
53-1002165-05
Documentation updates for LKM. . . . . . . . . . . . . . . . . . . . . . . . . . . .13
Chapter 3, Configuring Brocade Encryption Using CLI . . . . . . .13
Failover/failback policy configuration. . . . . . . . . . . . . . . . . . . . .13
Chapter 5, Best Practices and Special Topics . . . . . . . . . . . . . . 13
Key Vault Best Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Chapter 6, Maintenance and Troubleshooting. . . . . . . . . . . . . .13
Manually synchronizing the security database . . . . . . . . . . . . .13
Chapter 6 Fabric OS Encryption Guide Supporting RKM
In this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Documentation updates for RKM . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Chapter 2, Encryption configuration using the Management
application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Disk device decommissioning. . . . . . . . . . . . . . . . . . . . . . . . . . .15
Chapter 3, Configuring Brocade Encryption Using CLI . . . . . . . 16
Failover/failback policy configuration. . . . . . . . . . . . . . . . . . . . .16
Chapter 5, Best Practices and Special Topics . . . . . . . . . . . . . . 17
Key Vault Best Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Chapter 6, Maintenance and Troubleshooting. . . . . . . . . . . . . . 17
Manually synchronizing the security database . . . . . . . . . . . . . 17
Chapter 7 Fabric OS Encryption Guide Supporting SKM and ESKM
In this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Documentation updates for SKM . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Chapter 3, Configuring Brocade Encryption Using CLI . . . . . . . 19
Failover/failback policy configuration. . . . . . . . . . . . . . . . . . . . .19
Chapter 5, Best Practices and Special Topics . . . . . . . . . . . . . . 19
Key Vault Best Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Chapter 6, Maintenance and Troubleshooting. . . . . . . . . . . . . . 19
Manually synchronizing the security database . . . . . . . . . . . . .19
Chapter 8 Fabric OS Encryption Guide Supporting TEMS
In this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Documentation updates for TEMS. . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Chapter 3, Configuring Brocade Encryption Using CLI . . . . . . . 21
Failover/failback policy configuration. . . . . . . . . . . . . . . . . . . . .21
Chapter 5, Best Practices and Special Topics . . . . . . . . . . . . . . 21
Key Vault Best Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Chapter 6, Maintenance and Troubleshooting. . . . . . . . . . . . . . 21
Manually synchronizing the security database . . . . . . . . . . . . . 21
Chapter 9 Fabric OS Encryption Guide Supporting TEMS
In this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23