Interoperability with other software applications

Use the following table to determine the interoperability of software applications with data encryption.

Software application

Interoperability notes

ShadowImage and TrueCopy

Encrypt the P-VOL and S-VOLs to ensure data security.

Thin Image

Match the encryption states of the P-VOL and pool-VOL. If the P-VOL is encrypted, encrypt all of the pool-VOLs. If the data pool contains non-encrypted pool-VOL, the differential data of the P-VOL is not encrypted.

Universal Replicator

Match the encryption states of a P-VOL and S-VOL. If you encrypt the P-VOL only, the data copied on the S-VOL is not encrypted is not protected.

When you encrypt a P-VOL or S-VOL, use a journal to which only encrypted LDEVs are registered as journal volumes. If the encryption states of the P-VOL, S-VOL, and journal volumes do not match, the journal data in the P-VOL is not encrypted, and the security of the data cannot be guaranteed.

Dynamic Provisioning and Dynamic Tiering

When enabling encryption for data written to a data pool with a V-VOL, use a data pool that consists of encrypted volumes.

Note:If encryption is set, encryption formatting for pool volumes is also required.