Fabric OS Encryption Administrator's Guide
xiv Fabric OS Encryption Administrator’s Guide
53-1002159-03
• Chapter 6, “Maintenance and Troubleshooting,” provides information on troubleshooting and
the most common commands and procedures to use to diagnose and recover from problems.
• Appendix A, “State and Status Information,” lists the encryption engine security processor (SP)
states, security processor key encryption key (KEK) status information, and encrypted LUN
states.
Supported hardware and software
. The following hardware platforms support data encryption as described in this manual.
• Brocade DCX and DCX-4S with an FS8-18 encryption blade.
• Brocade Encryption Switch.
What’s new in this document
The purpose of this release is to note that HP Enterprise Secure Key Manager (ESKM) is now
supported.
Document conventions
This section describes text formatting conventions and important notice formats used in this
document.
Text formatting
The narrative-text formatting conventions that are used are as follows:
bold text Identifies command names
Identifies the names of user-manipulated GUI elements
Identifies keywords and operands
Identifies text to enter at the GUI or CLI
italic text Provides emphasis
Identifies variables
Identifies paths and Internet addresses
Identifies document titles
code text Identifies CLI output
Identifies command syntax examples
For readability, command names in the narrative portions of this guide are presented in mixed
lettercase: for example, switchShow. In actual examples, command lettercase is often all
lowercase. Otherwise, this manual specifically notes those cases in which a command is case
sensitive.