HP 8/8 Fabric OS Encryption Administrator's Guide v6.4.0 (53-1001864-01, June - Page 9
Deployment Scenarios, Best Practices and Special Topics
View all HP 8/8 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 9 highlights
Chapter 4 Chapter 5 Tape pool configuration 137 Tape pool labeling 137 Creating a tape pool 139 Deleting a tape pool 140 Modifying a tape pool 140 Impact of tape pool configuration changes 140 Configuring a multi-path Crypto LUN 141 Multi-path LUN configuration example 141 First time encryption 145 Resource allocation 145 First time encryption modes 145 Configuring a LUN for first time encryption 145 Data re-keying 146 Resource Allocation 146 Re-keying modes 146 Configuring a LUN for automatic re-keying 147 Initiating a manual re-key session 148 Suspension and resumption of re-keying operations 149 Deployment Scenarios In this chapter 151 Single encryption switch, two paths from host to target 152 Single fabric deployment - HA cluster 153 Single fabric deployment - DEK cluster 154 Dual fabric deployment - HA and DEK cluster 155 Multiple paths, one DEK cluster, and two HA clusters 156 Multiple paths, DEK cluster, no HA cluster 158 Deployment in Fibre Channel routed fabrics 159 Deployment as part of an edge fabric 161 Deployment with FCIP extension switches 162 VmWare ESX server deployments 163 Best Practices and Special Topics In this chapter 165 Firmware download considerations 166 Firmware Upgrades and Downgrades 166 Specific guidelines for HA clusters 167 Fabric OS Encryption Administrator's Guide ix 53-1001864-01