HP 8/8 Fabric OS Encryption Administrator's Guide v6.4.0 (53-1001864-01, June - Page 11

Maintenance and Troubleshooting, Appendix A, State and Status Information, LUN Policies

Page 11 highlights

Chapter 6 Appendix A Appendix B Best practices for host clusters in an encryption environment . . .180 HA Cluster Deployment Considerations and Best Practices . . . . .180 Maintenance and Troubleshooting In this Chapter 181 Encryption group and HA cluster maintenance 181 Removing a node from an encryption group 181 Deleting an encryption group 183 Removing an HA cluster member 184 Displaying the HA cluster configuration 184 Replacing an HA cluster member 185 Deleting an HA cluster member 188 Performing a manual failback of an encryption engine . . . . .188 Encryption group merge and split use cases 189 Configuration impact of encryption group split or node isolation 194 General encryption troubleshooting I 195 Troubleshooting examples using the CLI 198 Encryption Enabled Crypto Target LUN 198 Encryption Disabled Crypto Target LUN 199 Management application encryption wizard troubleshooting . . . .200 Errors related to adding a switch to an existing group 200 Errors related to adding a switch to a new group 201 General errors related to the Configure Switch Encryption wizard 203 LUN policy troubleshooting 204 Loss of encryption group leader after power outage 205 MPIO and internal LUN states 206 Suspension and resumption of re-keying operations 206 State and Status Information In this appendix 209 Encryption engine security processor (SP) states 209 Security processor KEK status 210 Encrypted LUN states 210 LUN Policies In this appendix 215 DF-compatibility support for disk LUNs 215 DF-compatibility support for tape LUNs 219 Fabric OS Encryption Administrator's Guide xi 53-1001864-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248

Fabric OS Encryption Administrator’s Guide
xi
53-1001864-01
Best practices for host clusters in an encryption environment . . .180
HA Cluster Deployment Considerations and Best Practices . . . . .180
Chapter 6
Maintenance and Troubleshooting
In this Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .181
Encryption group and HA cluster maintenance. . . . . . . . . . . . . . . .181
Removing a node from an encryption group . . . . . . . . . . . . . .181
Deleting an encryption group . . . . . . . . . . . . . . . . . . . . . . . . . .183
Removing an HA cluster member . . . . . . . . . . . . . . . . . . . . . . .184
Displaying the HA cluster configuration . . . . . . . . . . . . . . . . . .184
Replacing an HA cluster member . . . . . . . . . . . . . . . . . . . . . . .185
Deleting an HA cluster member . . . . . . . . . . . . . . . . . . . . . . . .188
Performing a manual failback of an encryption engine . . . . .188
Encryption group merge and split use cases . . . . . . . . . . . . . .189
Configuration impact of encryption group split
or node isolation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .194
General encryption troubleshooting I . . . . . . . . . . . . . . . . . . . . . . .195
Troubleshooting examples using the CLI. . . . . . . . . . . . . . . . . . . . .198
Encryption Enabled Crypto Target LUN. . . . . . . . . . . . . . . . . . .198
Encryption Disabled Crypto Target LUN . . . . . . . . . . . . . . . . . .199
Management application encryption wizard troubleshooting . . . .200
Errors related to adding a switch to an existing group . . . . . . . . . .200
Errors related to adding a switch to a new group . . . . . . . . . .201
General errors related to the Configure Switch
Encryption wizard. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .203
LUN policy troubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .204
Loss of encryption group leader after power outage . . . . . . . . . . .205
MPIO and internal LUN states . . . . . . . . . . . . . . . . . . . . . . . . . . . . .206
Suspension and resumption of re-keying operations . . . . . . .206
Appendix A
State and Status Information
In this appendix. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .209
Encryption engine security processor (SP) states. . . . . . . . . . . . . .209
Security processor KEK status. . . . . . . . . . . . . . . . . . . . . . . . . . . . .210
Encrypted LUN states . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .210
Appendix B
LUN Policies
In this appendix. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .215
DF-compatibility support for disk LUNs . . . . . . . . . . . . . . . . . . . . . .215
DF-compatibility support for tape LUNs. . . . . . . . . . . . . . . . . . . . . .219