Encryption center features – Brocade Network Advisor SAN + IP User Manual v12.1.0 User Manual

Page 906

Advertising
background image

852

Brocade Network Advisor SAN + IP User Manual

53-1002949-01

Encryption Center features

25

Using the Encryption Targets dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . 1011

Redirection zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1012

Disk device decommissioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1012

Rekeying all disk LUNs manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1015

Thin provisioned LUNs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1020

Viewing time left for auto rekey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1021

Viewing and editing switch encryption properties. . . . . . . . . . . . . . . . . . 1022

Viewing and editing encryption group properties . . . . . . . . . . . . . . . . . . . 1027

Encryption-related acronyms in log messages . . . . . . . . . . . . . . . . . . . . 1043

Encryption Center features

The Encryption Center dialog box is the single launching point for all encryption-related
configuration in the Management application. (Refer to

Figure 303

.) It also provides a table that

shows the general status of all encryption-related hardware and functions at a glance. To open the
dialog box, select Configure > Encryption.

FIGURE 303

Encryption Center dialog box

Beginning with Fabric OS 6.4, the Encryption Center is dynamically updated to reflect the latest
changes based on any of the following events:

Encryption group creation or deletion.

A change in encryption group status or encryption engine status

Addition or removal of an encryption group member or encryption engine

If you are using the Encryption Center for the first time, please read the following topics before you
begin to perform encryption operations:

“Encryption user privileges”

on page 853 describes the Role-based Access Control privileges

that are specific to encryption.

“Smart card usage”

on page 854 and the topics that follow describe the options available for

the use of Smart Cards for user authentication, system access control, and storing backup
copies of data encryption master keys.

“Network connections”

on page 865 describes the network connections that must be in place

to enable encryption.

Advertising