HP 8/8 Fabric OS Encryption Administrator's Guide v6.4.0 (53-1001864-01, June - Page 185

Specific guidelines for HA clusters, Fabric OS, Administrator's Guide

Page 185 highlights

Firmware download considerations 5 • A firmware consistency check for Fabric OS version 6.4.0 is enforced in an encryption group if any of the Fabric OS version 6.4.0 features are enabled. If any Fabric OS version 6.4.0 feature is in an enabled state then any firmware download to Fabric OS version 6.3.x or earlier versions is blocked. - Do not try to use configupload from Fabric OS version 6.4.0 and then configdownload to Fabric OS version 6.3.x or earlier versions with any Fabric OS version 6.4.0 feature in an enabled state. - Do not try registering a node running Fabric OS version 6.3.x or earlier to an encryption group when all nodes are running Fabric OS version 6.4.0 with one or more Fabric OS version 6.4.0 features enabled. - Disable all Fabric OS version 6.4.0 features before ejecting a node running Fabric OS version 6.4.0 and registering the node as a member of an encryption group with nodes running Fabric OS version 6.3.x or earlier versions. Specific guidelines for HA clusters The following are specific guidelines for a firmware upgrade of the encryption switch or blade when deployed in HA cluster. The guidelines are based on the following scenario: • There are 2 nodes (BES1 and BES2) in the HA cluster. • Each node hosts certain number of CryptoTarget containers and associated LUNs. • node 1 (BES1) needs to be upgraded first. 1. Change the failback mode to manual if it was set to auto by issuing the following command: cryptocfg --set -failback manual 2. On node 1 (BES1), disable the encryption engine to force the failover of CryptoTarget containers and associated LUNs onto the HA cluster peer member node 2 (BES2) by issuing the following command. cryptocfg --disableEE 3. Make sure that these Crypto Target Containers and LUNs actually failover to node 2 (BES2) in the HA cluster. Check for all LUNs in encryption enabled state on node 2 (BES2). This ensures that I/O also fails over to node 2 (BES2) and continues during this process. 4. On node 1 (BES1) enable the Encryption Engine, by issuing the following command. cryptocfg --enableEE 5. Start firmware download (upgrade) on the node 1 (BES1). Refer to the Fabric OS Administrator's Guide if necessary to review firmware download procedures. 6. After firmware download is complete and node 1 (BES1) is back up, make sure the encryption engine is online. 7. On node 1 (BES1) initiate manual failback of CryptoTarget containers and associated LUNs from node 2 (BES2) to node 1 (BES1) by issuing the following command. cryptocfg --failback -EE 8. Check that Crypto Target Containers and associated LUNs fail back successfully on node 1 (BES1) and host I/O also moves from node 2 (BES2) to node 1 (BES1) and continues during the failback process. 9. To upgrade node 2 (BES2), Repeat steps 2 to 8. Fabric OS Encryption Administrator's Guide 167 53-1001864-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248

Fabric OS Encryption Administrator’s Guide
167
53-1001864-01
Firmware download considerations
5
A firmware consistency check for Fabric OS version 6.4.0 is enforced in an encryption group if
any of the Fabric OS version 6.4.0 features are enabled. If any Fabric OS version 6.4.0 feature
is in an enabled state then any firmware download to Fabric OS version 6.3.x or earlier versions
is blocked.
-
Do not try to use configupload from Fabric OS version 6.4.0 and then configdownload to
Fabric OS version 6.3.x or earlier versions with any Fabric OS version 6.4.0 feature in an
enabled state.
-
Do not try registering a node running Fabric OS version 6.3.x or earlier to an encryption
group when all nodes are running Fabric OS version 6.4.0 with one or more Fabric OS
version 6.4.0 features enabled.
-
Disable all Fabric OS version 6.4.0 features before ejecting a node running Fabric OS
version 6.4.0 and registering
the node as a member of an encryption group with nodes
running Fabric OS version 6.3.x or earlier versions.
Specific guidelines for HA clusters
The following are specific guidelines for a firmware upgrade of the encryption switch or blade when
deployed in HA cluster. The guidelines are based on the following scenario:
There are 2 nodes (BES1 and BES2) in the HA cluster.
Each node hosts certain number of CryptoTarget containers and associated LUNs.
node 1 (BES1) needs to be upgraded first.
1.
Change the failback mode to manual if it was set to auto by issuing the following command:
cryptocfg --set -failback manua
l
2.
On node 1 (BES1), disable the encryption engine to force the failover of CryptoTarget
containers and associated LUNs onto the HA cluster peer member node 2 (BES2) by issuing
the following command.
cryptocfg --disableEE
3.
Make sure that these Crypto Target Containers and LUNs actually failover to node 2 (BES2) in
the HA cluster. Check for all LUNs in encryption enabled state on node 2 (BES2). This ensures
that I/O also fails over to node 2 (BES2) and continues during this process.
4.
On node 1 (BES1) enable the Encryption Engine, by issuing the following command.
cryptocfg --enableEE
5.
Start firmware download (upgrade) on the node 1 (BES1). Refer to the
Fabric OS
Administrator’s Guide
if necessary to review firmware download procedures.
6.
After firmware download is complete and node 1 (BES1) is back up, make sure the encryption
engine is online.
7.
On node 1 (BES1) initiate manual failback of CryptoTarget containers and associated LUNs
from node 2 (BES2) to node 1 (BES1) by issuing the following command.
cryptocfg --failback -EE
8.
Check that Crypto Target Containers and associated LUNs fail back successfully on node 1
(BES1) and host I/O also moves from node 2 (BES2) to node 1 (BES1) and continues during
the failback process.
9.
To upgrade node 2 (BES2), Repeat steps 2 to 8.