HP Brocade 8/12c Fabric OS Encryption Administrator's Guide - Page 16
Supported hardware and software, What’s new in this document, Document conventions, Text formatting
View all HP Brocade 8/12c manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 16 highlights
• Chapter 6, "Maintenance and Troubleshooting," provides information on troubleshooting and the most common commands and procedures to use to diagnose and recover from problems. • Appendix A, "State and Status Information," lists the encryption engine security processor (SP) states, security processor key encryption key (KEK) status information, and encrypted LUN states. Supported hardware and software . The following hardware platforms support data encryption as described in this manual. • Brocade DCX and DCX-4S with an FS8-18 encryption blade. • Brocade Encryption Switch. What's new in this document The purpose of this release is to note that HP Enterprise Secure Key Manager (ESKM) is now supported. Document conventions This section describes text formatting conventions and important notice formats used in this document. Text formatting The narrative-text formatting conventions that are used are as follows: bold text italic text Identifies command names Identifies the names of user-manipulated GUI elements Identifies keywords and operands Identifies text to enter at the GUI or CLI Provides emphasis Identifies variables Identifies paths and Internet addresses Identifies document titles code text Identifies CLI output Identifies command syntax examples For readability, command names in the narrative portions of this guide are presented in mixed lettercase: for example, switchShow. In actual examples, command lettercase is often all lowercase. Otherwise, this manual specifically notes those cases in which a command is case sensitive. xiv Fabric OS Encryption Administrator's Guide 53-1002159-03