Configuring LUN Mapping Using a Cipher Machine
This section explains how to use a cipher machine to configure mapping relationships between application servers and LUNs to keep critical services running in an encrypted environment. If no cipher machine is available, skip this section.
Prerequisites
A cipher machine has been started and initially configured.
Context
A cipher machine can detect and encrypt LUNs and hosts, and configure mapping relationships between them.
Configuration Process
Certain versions of storage systems do not support iSCSI connections to cipher machines. In these cases, use Fibre Channel connections.
Procedure
Use a cipher machine to configure mapping relationships between hosts and LUNs. For details, see the user manual provided by the cipher machine vendor.