Table Of Contents
A - B - C - D - E - F - H - I - J - K - L - M - N - O - P - Q - R - S - T - V -
Index
A
Advanced security
about 7-4
configuring smart cards 4-16
stored keyshares 4-16
advanced security
about 4-12
Auto key replication
remote replication relationships
create 5-15
remove 5-15
translating media keys 7-6
B
Basic security
about 7-3
downloading key file 4-15
basic security
about 4-12
best practices
overview 10-1
C
CFS requirement 1-14
Changing the Fabric Name 2-23
Cisco Key Management Center
about 1-4, 7-3
advantages 7-3
features 1-4
Cisco KMC 6-10
Cisco MDS 9000 Family 18/4-Port Multiservice Module (MSM-18/4)
replacing 11-7
Cisco SME
best practices 10-1
configuration
initial 2-26
limitations 2-26
required engines 1-7
security overview 1-14
Terminology 1-6
CLI
DCNM-SAN alternative 2-2
description 2-2
cluster details
transport settings
modifying,viewing 4-22
viewing cluster members 4-22
viewing cluster states 4-22
clustering 1-5
clusters
archiving 4-17
creating 4-10
purging 4-17, 4-18
quorum 4-1
recovery scenarios 11-1
reviving 11-4
viewing details 4-22
viewing members 4-22
viewing states 4-22
viewing using DCNM-SAN 4-23
viewing using Device Manager 4-23
command-line interface. See CLI
contacting support 11-8
D
DCNM-SAN
description 2-1
installation 2-23
DCNM-SAN Client
installation 2-23
DCNM-SAN Server 2-2
Backing Up O-1
DCNM-SAN Server database
Restoring O-2
DCNM-SAN Web Client 2-1
Device Manager 2-2
Disaster Recovery
SME Disk M-2
SME Tape M-1
disk key 7-2
DNS
alternative 2-19
configuration 11-6
enabling 2-18
E
Enabling clustering
using DCNM-SAN 2-17
Encryption 1-3
exporting volume groups 5-13
F
fabrics
adding 2-23
changing a fabric name 2-23
selecting 4-11
FCIP tape acceleration
requriements 2-4
FC Redirect 1-6
FC redirect
requirements 1-13
H
hardware
requirements 1-10
Cisco MDS 18/4-Port Multiservice Module (MSM-18/4) 1-11
Cisco MDS 9222i Multiservice Module Switch 1-11
Hardware Requirements 1-10
High Availability KMC
about 7-6
I
IEEE-compliant AES 256 encryption 1-3
importing volume groups 5-13
interfaces
selecting 4-11
IVR zoneset 1-14
J
Java Requirement 1-13
K
key hierarchy
about 7-1
disk key 7-2
master key 7-2
tape volume group key 7-2
tape volume key 7-2
Key Management 1-4
key management
operations 5-11
key management settings 7-4
Key-On-Tape 7-5
Shared 7-5
Unique Key 7-5
keys
active 7-15
purging 5-12
viewing for SME disk 7-15
viewing for SME tape 7-15
KMC server 7-9
L
licenses
for fixed slot - MDS 9222i Switch 2-3
for MSM-18/4 module-MDS 9200 Series with SSM 2-3
for MSM-18/4 module - MDS 9500 Series with SSM 2-3
load balancing
about 1-6
M
master key 7-2
Master Key Security
Advanced 4-12, 7-4
Basic 4-12, 7-3
modes 7-3
Standard 4-12, 7-4
master key security levels
selecting 4-11
master switch election 4-1
four-switch cluster scenarios 4-4
three-switch cluster scenarios 4-4
Media Key Settings
selecting 4-13
store key on tape 4-13
unique key 4-13
members
viewing 4-22
migrating 7-9
migrating database tables
about Q-1
procedure Q-1
MSM-18/4 1-11
N
NIST 1-3
O
Offline Data Restore Tool
about N-1
P
purging
clusters 4-17
Q
Quorum Disk 6-12
R
recycling tapes 7-5
replication relationship 7-6
Requirements
FC-Redirect 1-13
Hardware 1-10
Installation 2-3
Java Cryptography Extension 1-13
Software 1-10
Zoning 1-13
Roles
about 1-3
S
security
additional capabilities 1-14
security levels
selecting Advanced 4-13
selecting Basic 4-12
selecting Standard 4-12
Server-based discovery for provisioning tapes 1-6
Server Clusters 4-5
smart cards
drivers 2-25
GemSafe library file 2-25
installing 2-25
SME 1-3
security 1-14
supported single-fabric topology 1-8, 1-9
SME configuration
Basic 2-26
SME Disk
adding disk to the disk group 6-19
adding paths to the disk 5-5, 6-20
adding SME encryption engine 6-18
adding SME nodes 6-18
architecture 6-2
cluster support 6-5
configuring disk group 6-19
configuring using the CLI 6-16
configuring using the GUI 6-29
data preparation 6-6
data replication 6-12
Disk Key Replication, features 6-14
Disk Key Replication, relationships 6-14
disk states 6-10
ISSU 6-15
key generation 6-10
key management 6-9
key replication 6-12
managing disks 6-21
monitoring SME Disk management 6-58
offline data preparation 6-7
online data preparation 6-8
purging disk groups 6-11
purging disks 6-11
recovering SME disk 6-26
rekeying 6-8
verifying SME Disk management configuration 6-56
Standard security
about 7-4
configuring smart cards 4-15, 5-17, 6-54, 6-55
stored keyshares 4-15
standard security
about 4-12
supported topologies
single-fabric 1-8, 1-9
T
tape drives
troubleshooting 11-8
tapes
recycling 7-5
tape volume group key 7-2
tape volume key 7-2
translation context 7-6
transparent fabric service 1-3
troubleshooting 11-1
"no paths found" 11-7
cluster recovery scenarios 11-1
deleting a cluster 11-2, 11-3
deleting an offline switch 11-2
DNS 11-6
newly added tape drives 11-8
replacing an MSM-18/4 module 11-7
reviving a cluster 11-4
scenarios 11-6
V
volume groups
exporting 5-13
importing 5-13