Interoperability with other software applications – HP StorageWorks XP Data Integrity Check XP Software User Manual

Page 9

Advertising
background image

Interoperability with other software applications

Use the following table to determine the interoperability of software applications with data
encryption.

Interoperability notes

Software application

Encrypt the P-VOL and S-VOLs to ensure data security.

Business Copy, Continuous Access
Synchronous, Compatible FlashCopy,
and Compatible XRC

Match the encryption states of the P-VOL and pool-VOL. If the P-VOL is
encrypted, encrypt all of the pool-VOLs. If the data pool contains
non-encrypted pool-VOL, the differential data of the P-VOL is not encrypted.

Snapshot and Fast Snap

Match the encryption states of a P-VOL and S-VOL. If you encrypt the P-VOL
only, the data copied on the S-VOL is not encrypted is not protected.

Continuous Access Journal

When you encrypt a P-VOL or S-VOL, use a journal to which only encrypted
LDEVs are registered as journal volumes. If the encryption states of the P-VOL,
S-VOL, and journal volumes do not match, the journal data in the P-VOL is
not encrypted, and the security of the data cannot be guaranteed.

Encrypt all LDEVs to ensure all areas are encrypted.

LUN Expansion (LUSE)

For more information about LUSE LDEVs and migration practices, see

“Migration practices with encryption” (page 8)

.

When enabling encryption for data written to a data pool with a V-VOL, use
a data pool that consists of encrypted volumes.

Thin Provisioning, Smart Tiers, Thin
Provisioning Z, and Smart Tiers Z

Encrypt the source LDEV and the target LDEV. The encryption states of the
source and target LDEVs must match for the EDKA feature to encrypt and
guarantee the security of the data on the target LDEV.

Flex Copy XP

Interoperability with other software applications

9

Advertising
This manual is related to the following products: