HP 8/8 Fabric OS Encryption Administrator's Guide v6.4.0 (53-1001864-01, June - Page 67

Adding encryption targets

Page 67 highlights

Adding encryption targets 2 Adding encryption targets Adding an encryption target maps storage devices and hosts to virtual targets and virtual initiators within the encryption switch. NOTE You must zone the physical host and physical target together to enable creation of a re-direction zone. The re-direction zone is used to redirect the host-target traffic through the encryption engine. Configuring a host/target pair for encryption automatically creates a re-direction zone, but redirection zones can only be created if the host and target are already zoned. If the host and target are not already zoned, you can still configure them for encryption, but afterward you will need to zone the host and target together, and then click the Commit button to create the re-direction zones as a separate step. If you click the Commit button and the encryption group is busy, you are given the option to force the commit or abort the changes. If you attempt to close the Encryption Targets dialog box without committing the changes, you are reminded of uncommitted changes in the Management application. 1. Select Configure > Encryption from the menu bar. The Encryption Center dialog box displays. 2. Select the encryption group, switch, or encryption engine to which you want to add the target. Right-click, or select Group, Switch, or Engine from the menu bar. 3. Select Targets. The Encryption Targets dialog box displays. 4. Click Add. The Configure Storage Encryption welcome panel displays. The welcome panel explains the wizard's purpose, which is to configure encryption for a storage device (target). FIGURE 26 Configure Storage Encryption welcome panel Fabric OS Encryption Administrator's Guide 49 53-1001864-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248

Fabric OS Encryption Administrator’s Guide
49
53-1001864-01
Adding encryption targets
2
Adding encryption targets
Adding an encryption target maps storage devices and hosts to virtual targets and virtual initiators
within the encryption switch.
NOTE
You must zone the physical host and physical target together to enable creation of a re-direction
zone. The re-direction zone is used to redirect the host-target traffic through the encryption engine.
Configuring a host/target pair for encryption automatically creates a re-direction zone, but
redirection zones can only be created if the host and target are already zoned. If the host and target
are not already zoned, you can still configure them for encryption, but afterward you will need to
zone the host and target together, and then click the
Commit
button to create the re-direction zones
as a separate step. If you click the
Commit
button and the encryption group is busy, you are given
the option to force the commit or abort the changes. If you attempt to close the Encryption Targets
dialog box without committing the changes, you are reminded of uncommitted changes in the
Management application.
1.
Select
Configure > Encryption
from the menu bar.
The
Encryption Center
dialog box displays.
2.
Select the encryption group, switch, or encryption engine to which you want to add the target.
Right-click, or select
Group
,
Switch
, or
Engine
from the menu bar.
3.
Select
Targets
.
The
Encryption Targets
dialog box displays.
4.
Click
Add
.
The
Configure Storage Encryption
welcome panel displays. The welcome panel explains the
wizard’s purpose, which is to configure encryption for a storage device (target).
FIGURE 26
Configure Storage Encryption welcome panel