About this document, In this chapter, How this document is organized – Brocade Fabric OS Encryption Administrator’s Guide Supporting Key Management Interoperability Protocol (KMIP) Key-Compliant Environments (Supporting Fabric OS v7.1.0) User Manual

Page 13

Advertising
background image

Fabric OS Encryption Administrator’s Guide (KMIP)

xiii

53-1002747-02

About This Document

In this chapter

How this document is organized . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii

Supported hardware and software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv

What’s new in this document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv

Document conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv

Text formatting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv

Command syntax conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv

Key terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi

Notice to the reader . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv

Additional information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi

Brocade resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi

Other industry resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi

Getting technical help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii

Document feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii

How this document is organized

.

This document is organized to help you find the information that you want as quickly and easily as
possible.

The document contains the following components:

Chapter 1, “Encryption Overview,”

provides a task matrix, an overview of the data encryption

switch and the encryption solution, and the terminology used in this document.

Chapter 2, “Configuring Encryption Using the Management Application,”

describes how to

configure and manage encryption features using Brocade Network Advisor.

Chapter 3, “Configuring Encryption Using the CLI,”

describes how to configure and manage

encryption features using the command line interface.

Chapter 4, “Deployment Scenarios,”

describes SAN configurations in which encryption may be

deployed.

Chapter 5, “Best Practices and Special Topics,”

summarizes best practices and addresses

special topics relevant to the implementation of encryption features.

Advertising