Security tab – Brocade Network Advisor SAN User Manual v12.3.0 User Manual

Page 927

Advertising
background image

Brocade Network Advisor SAN User Manual

875

53-1003154-01

Viewing and editing encryption group properties

20

The consequences of removing the last switch in a group (which will be the Group Leader) are all
switch removal consequences noted above, plus the following:

The encryption group is deleted.

All configured tape pools are deleted.

Table 67

explains the impact of removing switches.

A warning message is displayed when you attempt to remove a switch or an encryption group. After
you have read the warning, you must click Yes to proceed.

Security tab

The Security tab displays the status of the master key for the encryption group and whether smart
cards are required. From here, you register smart cards for use.

The Security tab is viewed from the Encryption Group Properties dialog box. (Refer to

Figure 414

.)

To access the Security tab, select a group from the Encryption Center Devices table, then select
Group > Security from the menu task bar. The Properties dialog box displays with the Security tab
selected.

NOTE

You can also select a group from the Encryption Center Devices table, then click the Properties icon.

TABLE 67

Switch removal impact

Switch configuration

Impact of removal

The switch is the only switch in the
encryption group.

The encryption group is also removed.

The switch has configured encryption
targets on encryption engines.

The switch is configured to encrypt traffic to one or more encryption
targets.

The target container configuration is removed.

The encrypted data remains on the encryption target but is not
usable until the encryption target is manually configured on another
encryption switch.

CAUTION

The encryption target data is visible in encrypted format
to zoned hosts. It is strongly recommended that you
remove the encryption targets from all zones before you
disable encryption. Otherwise, hosts might corrupt the
encrypted data by writing directly to the encryption
target without encryption.

The switch has encryption engines in
HA clusters.

The HA clusters are removed. High availability is no longer provided to the
other encryption engine in each HA cluster.

Advertising