HP 8/8 Fabric OS Encryption Administrator's Guide v6.4.0 (53-1001864-01, June - Page 91

TABLE 1, Encryption Targets dialog box, Encryption Targets dialog box fields and components

Page 91 highlights

Encryption Targets dialog box 2 FIGURE 45 Encryption Targets dialog box TABLE 1 Feature Encryption Targets dialog box fields and components Description Add button Launches the Storage Encryption Setup Wizard, which enables you to configure a new target for encryption. It is the first step in configuring encryption for a storage device. Remove button It is recommended that you zone the host and target together before you add container information. • Note: If the group is in OK-Converged mode, the group leader can communicate with all members. The Configure Storage Encryption wizard dialog box launches when you click Add. Note: • If a group is in the Degraded state, the following operations are not allowed: key vault changes, master key operations, enable/disable encryption engines, failback mode changes, HA Cluster creation or addition (removal is allowed), tape pool changes, and any configuration changes for storage targets, hosts, and LUNs. • If a group is in the Unknown state, the group leader is in an unmanaged fabric. Removes a selected target. Proceed only if the data on the LUN is to be disabled or if the LUN is to be configured for encryption again on some other encryption engine. If the LUN data is to be enabled and later accessed by way of another encryption engine, you should unzone the host with the encryption engine before you remove the encryption target from the encryption engine. This prevents the host from accidentally writing to the encryption target during the unencrypted interim period. CAUTION Removing a selected target can result in data loss, if the host is writing to the target as it is removed. Removing the target will result in lost access to the data, but the data remains encrypted on the target. Move button Moves one encryption target to a different encryption engine. The target and engine must be in the same encryption group. Fabric OS Encryption Administrator's Guide 73 53-1001864-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248

Fabric OS Encryption Administrator’s Guide
73
53-1001864-01
Encryption Targets dialog box
2
FIGURE 45
Encryption Targets dialog box
TABLE 1
Encryption Targets dialog box fields and components
Feature
Description
Add
button
Launches the
Storage Encryption Setup Wizard
, which enables you to
configure a new target for encryption. It is the first step in configuring
encryption for a storage device.
It is recommended that you zone the host and target together before you
add container information.
Note:
If the group is in
OK-Converged
mode, the group leader can
communicate with all members. The
Configure Storage Encryption
wizard dialog box launches when you click
Add
.
Note
:
If a group is in the
Degraded
state, the following operations are not
allowed: key vault changes, master key operations, enable/disable
encryption engines, failback mode changes, HA Cluster creation or
addition (removal is allowed), tape pool changes, and any
configuration changes for storage targets, hosts, and LUNs.
If a group is in the
Unknown
state, the group leader is in an
unmanaged fabric.
Remove
button
Removes a selected target. Proceed only if the data on the LUN is to be
disabled or if the LUN is to be configured for encryption again on some
other encryption engine. If the LUN data is to be enabled and later
accessed by way of another encryption engine, you should unzone the
host with the encryption engine
before
you remove the encryption target
from the encryption engine. This prevents the host from accidentally
writing to the encryption target during the unencrypted interim period.
CAUTION
Removing a selected target can result in data loss, if
the host is writing to the target as it is removed.
Removing the target will result in lost access to the
data, but the data remains encrypted on the target.
Move
button
Moves one encryption target to a different encryption engine. The target
and engine must be in the same encryption group.