HP Brocade 8/12c Fabric OS Encryption Administrator's Guide - Page 112

Selecting the Re-Key All operation, Encryption Targets Disk LUNs

Page 112 highlights

2 Re-keying all disk LUNs manually FIGURE 76 Selecting the Re-Key All operation If REPL support is enabled on the encryption group, a confirmation dialog box appears asking you if you want mirror LUNs to be rekeyed also. 3. Click Yes to includes mirror LUNs. Click No to exclude mirror LUNs. A critical warning message appears, requesting confirmation to proceed with the re-key operation. 4. Click Yes. Rekeying operations begin on up to 10 LUNs. If more than 10 LUNs are configured on the switch, the remaining rekey operations are held in the pending state. 5. Open the Encryption Target Disk LUNs dialog box to see LUNs being re-keyed and LUNs pending. a. Select Configure > Encryption from the menu task bar. The Encryption Center dialog box displays. b. Select the encryption switch from the Encryption Center Devices table, then select Targets from the menu task bar, or right-click the switch and select Targets. The Encryption Targets dialog box displays. 6. Select a disk LUN device from the table, then click LUNs. The Encryption Targets Disk LUNs dialog box displays.The dialog box lists the status of the re-key operation. 92 Fabric OS Encryption Administrator's Guide 53-1002159-03

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282

92
Fabric OS Encryption Administrator’s Guide
53-1002159-03
Re-keying all disk LUNs manually
2
FIGURE 76
Selecting the Re-Key All operation
If REPL support is enabled on the encryption group, a confirmation dialog box appears asking
you if you want mirror LUNs to be rekeyed also.
3.
Click
Yes
to includes mirror LUNs. Click
No
to exclude mirror LUNs.
A critical warning message appears, requesting confirmation to proceed with the re-key
operation.
4.
Click
Yes
.
Rekeying operations begin on up to 10 LUNs. If more than 10 LUNs are configured on the
switch, the remaining rekey operations are held in the pending state.
5.
Open the
Encryption Target Disk LUNs
dialog box to see LUNs being re-keyed and LUNs
pending.
a.
Select
Configure > Encryption
from the menu task bar.
The
Encryption Center
dialog box displays.
b.
Select the encryption switch from the
Encryption Center Devices
table, then select
Targets
from the menu task bar, or right-click the switch and select
Targets.
The
Encryption Targets
dialog box displays.
6.
Select a disk LUN device from the table, then click
LUNs
.
The
Encryption Targets Disk LUNs
dialog box displays.The dialog box lists the status of the
re-key operation.