Brocade Fabric OS Encryption Administrator’s Guide Supporting RSA Data Protection Manager (DPM) Environments (Supporting Fabric OS v7.2.0) User Manual

Page 11

Advertising
background image

Fabric OS Encryption Administrator’s Guide (DPM)

ix

53-1002922-01

Thin provisioned LUNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203

Space reclamation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
Supported operations on thin provisioned LUNs. . . . . . . . . . 205

Data rekeying. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205

Thin provisioned LUN limitations during rekey. . . . . . . . . . . . 206
Resource allocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
Rekeying modes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
Configuring a LUN for automatic rekeying . . . . . . . . . . . . . . . 207
Initiating a manual rekey session . . . . . . . . . . . . . . . . . . . . . . 208
Suspension and resumption of rekeying operations. . . . . . . 209

Chapter 4

Deployment Scenarios

In this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .211

Single encryption switch, two paths from host to target . . . . . . . 212

Single fabric deployment - HA cluster . . . . . . . . . . . . . . . . . . . . . . 213

Single fabric deployment - DEK cluster . . . . . . . . . . . . . . . . . . . . . 214

Dual fabric deployment - HA and DEK cluster. . . . . . . . . . . . . . . . 215

Multiple paths, one DEK cluster, and two HA clusters . . . . . . . . . 216

Multiple paths, DEK cluster, no HA cluster . . . . . . . . . . . . . . . . . . 217

Deployment in Fibre Channel routed fabrics. . . . . . . . . . . . . . . . . 219

Deployment as part of an edge fabric . . . . . . . . . . . . . . . . . . . . . . 221

Deployment with FCIP extension switches . . . . . . . . . . . . . . . . . . 222

Data mirroring deployment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223

If metadata is not present on the LUN . . . . . . . . . . . . . . . . . . 224

VMware ESX server deployments. . . . . . . . . . . . . . . . . . . . . . . . . . 225

Chapter 5

Best Practices and Special Topics

In this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227

Firmware upgrade and downgrade considerations . . . . . . . . . . . 228

General guidelines. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
Specific guidelines for HA clusters . . . . . . . . . . . . . . . . . . . . . 229

Configuration upload and download considerations . . . . . . . . . . 230

Configuration upload at an encryption group
leader node . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
Configuration upload at an encryption group
member node. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
Information not included in an upload . . . . . . . . . . . . . . . . . . 231
Steps before configuration download. . . . . . . . . . . . . . . . . . . 231
Configuration download at the encryption group leader. . . . 232
Configuration download at an encryption group member . . 232
Steps after configuration download . . . . . . . . . . . . . . . . . . . . 232

HP-UX considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233

AIX considerations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233

Advertising