Cisco MDS 9000 Family Storage Media Encryption Configuration Guide
Index

Table Of Contents

A - B - C - D - E - F - H - I - J - K - L - M - N - O - P - R - S - T - U - V - Z

Index

A

Advanced security

about 3-5, 6-3

configuring smart cards 3-17

stored keyshares 3-16

archiving

clusters 3-23

B

Basic security

about 3-5, 6-3

downloading key file 3-12

best practices

Cisco SME topologies 8-2

overview 8-1

C

CFS requirement 2-23

Changing the Fabric Name 2-18

Cisco Key Management Center

about 1-3, 6-2

advantages 6-2

features 1-3

Cisco MDS 9000 Family 18/4-Port Multiservice Module (MSM-18/4) 1-8

replacing 9-8

Cisco SAN-OS features

changed (table) 1-vii

new (table) 1-vii

Cisco SME

best practices 8-1

configuration

initial 2-23

limitations 2-24

overview 2-23

licenses 2-22

required engines 1-5

Cisco SME Administrators 1-3

Cisco SME Recovery Officers 1-3

Cisco SME Roles

about 1-3

Cisco SME Terminology 1-5

Cisco Storage Media Encryption

About 1-1

features 1-2

security overview 1-9

See Cisco SME 1-1

CLI

description 2-2

clustering 1-4

enabling 2-3

clusters

archiving 3-23

creating 3-2

management 3-1

purging 3-23, 3-24

quorum 3-30

recovery scenarios 9-1

reviving 9-4

viewing details 3-26

viewing members 3-27

viewing states 3-26

viewing using Device Manager 3-29

viewing using Fabric Manager 3-28

command-line interface. See CLI

contacting support 9-9

core-edge topology 8-3

D

Device Manager 2-2

DNS

alternative 2-14

configuration 9-7

enabling 2-13

E

edge-core-edge topology 8-4

Enabling clustering

using Fabric Manager 2-3

Encryption 1-3

exporting volume groups 6-8

F

Fabric Manager

description 2-2

using to enable HTTPS 2-17

Fabric Manager features

changed (table) 1-vii

new (table) 1-vii

Fabric Manager Server 2-2

Backing Up D-1

Fabric Manager Server database

Restoring D-2

Fabric Manager Web Client 2-2

fabrics

adding 2-18

changing a fabric name 2-18

manage continuously 2-20

seed switch login 2-19

selecting 3-4

FC Redirect 1-4

FC redirect

requirements 2-22

unsupported switches 2-24

FC redirect restrictions 2-24

FICON Limitation 2-24

H

hardware

requirements 1-7

Cisco MDS 18/4-port Multiservice Module (MSM-18/4) 1-8

Cisco MDS 9222i Multiservice Module Switch 1-8

Hardware Requirements 1-7

HTTPS

enabling 2-17

I

IEEE-compliant AES 256 encryption 1-3

importing volume groups 6-10

interfaces

selecting 3-4

IVR zoneset 2-23

J

Java Requirement 2-22

K

key hierarchy

about 6-1

master key 6-2

tape volume group key 6-2

tape volume key 6-2

Key Management 1-3

about 6-1

key management

operations 6-5

key management settings 6-4

Key-On-Tape 6-4

Shared 6-4

Unique Key 6-4

keys

active 6-6

archived 6-7

purging 6-7

viewing 6-6

L

licenses

for fixed slot - MDS 9222i Switch 2-22

for MSM-18/4 module-MDS 9200 Series with SSM 2-22

for MSM-18/4 module - MDS 9500 Series with SSM 2-22

obtaining and installing 2-21

limitations 2-24

M

master key 6-2

Master Key Security

Advanced 3-5, 6-3

Basic 3-5, 6-3

modes 6-3

Standard 3-5, 6-3

master key security levels

selecting 3-5

master switch

reassigning 9-5

master switch election 3-30

four-switch cluster scenarios 3-33

three-switch cluster scenarios 3-32

Media Key Settings

selecting 3-8

store key on tape 3-9

unique key 3-9

members

viewing 3-27

N

NIST 1-3

O

Offline Data Restore Tool

about B-1

P

purging

clusters 3-23

R

recycling tapes 6-4

S

SANs

homogeneous 8-3

security

additional capabilities 1-9

security levels

selecting Advanced 3-7

selecting Basic 3-6

selecting Standard 3-6

Server Based Discovery for Provisioning Tapes 1-4

Single-fabric Topology 1-6

smart cards

drivers 2-21

GemSafe library file 2-21

installing 2-21

SME

security 1-9

supported single-fabric topology 1-6

SME configuration

Basic 2-23

Overview 2-23

SME installation

requirements 2-1

Software Requirements 1-7

Standard security

about 3-5, 6-3

configuring smart cards 3-14, 6-22

stored keyshares 3-13

Supported Topologies 1-5

supported topologies

single-fabric 1-6

T

tape drives

troubleshooting 9-8

tapes

recycling 6-4

tape volume group key 6-2

tape volume key 6-2

topologies

core-edge 8-3

edge-core-edge 8-4

guidelines 8-2

Transparent Fabric Service 1-2

troubleshooting 9-1

"no paths found" 9-8

cluster recovery scenarios 9-1

deleting a cluster 9-2, 9-3

deleting an offline switch 9-2

DNS 9-7

naming conventions 9-7

newly added tape drives 9-8

reassigning a master switch 9-5

replacing an MSM-18/4 module 9-8

reviving a cluster 9-4

scenarios 9-7

U

Using DNS and using IP 2-12

V

volume groups

exporting 6-8

importing 6-10

Z

Zoning Requirement 2-22