HP 1606 Fabric OS Encryption Administrator's Guide v6.4.0 (53-1001864-01, June - Page 212

Configuration impact of encryption group split or node isolation, TABLE 7

Page 212 highlights

6 Encryption group and HA cluster maintenance Configuration impact of encryption group split or node isolation When a node is isolated from the encryption group or the encryption group is split to form separate encryption group islands, the defined or registered node list in the encryption group is not equal to the current active node list, and the encryption group is in a DEGRADED state rather than in a CONVERGED state. Table 7 and Table 8 list configuration changes that are allowed and disallowed under such conditions. TABLE 7 Allowed Configuration Changes Configuration Type Allowed configuration changes Encryption group HA cluster Security & key vault • Adding a node to the encryption group • Removing a node from the encryption group • Invoking a node leave command • Deleting an encryption group • Registering a member node (IP address, certificates) • Removing an encryption engine from an HA cluster • Deleting an HA cluster • Initializing a node • Initializing an encryption engine • Re-registering an encryption engine • Zeroizing an encryption engine TABLE 8 Disallowed Configuration Changes Configuration Type Disallowed configuration changes Security & key vault HA cluster Crypto Device (target/LUN/tape) • Register or modify key vault settings • Generating a master key • Exporting a master key • Restoring a master key • Enabling or disabling encryption on an encryption engine • Creating an HA cluster • Adding an encryption engine to an HA cluster • Modifying the failback mode • Creating a CryptoTarget container • Adding initiators or LUNs to a CryptoTarget container • Removing initiators or LUNS from a CryptoTarget container • Modifying LUNs or LUN policies • Creating or deleting a tape pool • Modifying a tape pool policy • Starting a manual re-keying session • Performing a manual failback of containers • Deleting a CryptoTarget container 194 Fabric OS Encryption Administrator's Guide 53-1001864-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248

194
Fabric OS Encryption Administrator’s Guide
53-1001864-01
Encryption group and HA cluster maintenance
6
Configuration impact of encryption group split or node isolation
When a node is isolated from the encryption group or the encryption group is split to form separate
encryption group islands, the defined or registered node list in the encryption group is not equal to
the current active node list, and the encryption group is in a DEGRADED state rather than in a
CONVERGED state.
Table 7
and
Table 8
list configuration changes that are allowed and disallowed
under such conditions.
TABLE 7
Allowed Configuration Changes
Configuration Type
Allowed configuration changes
Encryption group
Adding a node to the encryption group
Removing a node from the encryption group
Invoking a node leave command
Deleting an encryption group
Registering a member node (IP address, certificates)
HA cluster
Removing an encryption engine from an HA cluster
Deleting an HA cluster
Security & key vault
Initializing a node
Initializing an encryption engine
Re-registering an encryption engine
Zeroizing an encryption engine
TABLE 8
Disallowed Configuration Changes
Configuration Type
Disallowed configuration changes
Security & key vault
Register or modify key vault settings
Generating a master key
Exporting a master key
Restoring a master key
Enabling or disabling encryption on an encryption engine
HA cluster
Creating an HA cluster
Adding an encryption engine to an HA cluster
Modifying the failback mode
Crypto Device
(target/LUN/tape)
Creating a CryptoTarget container
Adding initiators or LUNs to a CryptoTarget container
Removing initiators or LUNS from a CryptoTarget container
Modifying LUNs or LUN policies
Creating or deleting a tape pool
Modifying a tape pool policy
Starting a manual re-keying session
Performing a manual failback of containers
Deleting a CryptoTarget container