Establishing the trusted link – Brocade Fabric OS Encryption Administrator’s Guide Supporting NetApp Lifetime Key Manager (LKM) and KeySecure Storage Secure Key Manager (SSKM) Environments (Supporting Fabric OS v7.2.0) User Manual
Page 145
Fabric OS Encryption Administrator’s Guide (LKM/SSKM)
127
53-1002925-01
Steps for connecting to an LKM/SSKM appliance
3
Establishing the trusted link
You must generate the trusted link establishment package (TEP) on all nodes to obtain a trusted
acceptance package (TAP) before you can establish a trusted link between each node and the
NetApp LKM/SSKM appliance.
NOTE
Complete all steps required to establish a trusted link between LKM/SSKM and the encryption
group members for each node before proceeding to the next node.
1. Issue a Diffie-Hellman challenge to the LKM/SSKM IP address.
SecurityAdmin:switch> cryptocfg --dhchallenge
2. Launch the NetApp DataFort Management Console (DMC) and log in.
3. Click the View Unapproved Trustees tab.
The switch is listed as openkey_trustee_
address.
4. Select the switch, and select Approve and Create TAP.
The Approve TEP dialog box displays. The TEP must be approved before a TAP can be created.
5. Provide a label in the dialog box and click Approve to approve the TEP.
A smart card dialog box may display, requiring TEP approval to be done by a quorum of recovery
officers, using assigned recovery cards.
a. Insert the first card, and enter and verify the password. Wait for the Verify Password box to
go gray before continuing.
b. Select Enable Remote Authorization.
c. Wait for the Start button to become highlighted and then select Start.
d. Repeat The procedure until a quorum of recovery officers has approved the TEP.
When the TEP is approved, that TAP is created.
6. Issue a Diffie-Hellman response to the LKM/SSKM IP address to obtain the TAP from
LKM/SSKM.
SecurityAdmin:switch> cryptocfg --dhresponse
7. At this point, the trusted link should be established. Enter the cryptocfg
--
show
-
groupcfg
command on the encryption node.
SecurityAdmin:enc1_switch> cryptocfg --show -groupcfg
Encryption Group Name:
brocade
Failback mode:
Manual
Heartbeat misses:
3
Heartbeat timeout:
2
Key Vault Type:
LKM
Primary Key Vault:
IP address:
10.33.54.231
Certificate ID:
lkm-1
Certificate label:
LKM1
State:
Connected
Type: LKM