beautypg.com

Brocade Fabric OS Encryption Administrator’s Guide Supporting HP Secure Key Manager (SKM) and HP Enterprise Secure Key Manager (ESKM) Environments (Supporting Fabric OS v7.2.0) User Manual

Page 8

background image

vi

Fabric OS Encryption Administrator’s Guide (SKM/ESKM)

53-1002923-01

Rekeying all disk LUNs manually . . . . . . . . . . . . . . . . . . . . . . . . . . .102

Setting disk LUN Re-key All . . . . . . . . . . . . . . . . . . . . . . . . . . . .103
Viewing disk LUN rekeying details . . . . . . . . . . . . . . . . . . . . . .104
Viewing the progress of manual rekey operations. . . . . . . . . .106

Thin provisioned LUNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .107

Thin provisioning support . . . . . . . . . . . . . . . . . . . . . . . . . . . . .108

Viewing time left for auto rekey . . . . . . . . . . . . . . . . . . . . . . . . . . . .108

Viewing and editing switch encryption properties . . . . . . . . . . . . .109

Exporting the public key certificate signing request
(CSR) from properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
12
Importing a signed public key certificate from properties . . .112
Enabling and disabling the encryption engine state
from properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
13

Viewing and editing encryption group properties . . . . . . . . . . . . . .113

General tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .115
Members tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .117
Consequences of removing an encryption switch . . . . . . . . . .118
Security tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .119
HA Clusters tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .121
Tape Pools tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .123
Engine Operations tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .125

Encryption-related acronyms in log messages . . . . . . . . . . . . . . . .126

Chapter 3

Configuring Encryption Using the CLI

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .128

Command validation checks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .128

Command RBAC permissions and AD types . . . . . . . . . . . . . . . . . .129

Cryptocfg Help command output . . . . . . . . . . . . . . . . . . . . . . . . . . .132

Management LAN configuration . . . . . . . . . . . . . . . . . . . . . . . . . . .132

Configuring cluster links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .133

Special consideration for blades . . . . . . . . . . . . . . . . . . . . . . .133
IP Address change of a node within an encryption group. . . .134

Setting encryption node initialization . . . . . . . . . . . . . . . . . . . . . . .135