Master keys, Master keys 2, Rebalancing an encryption engine – Brocade Network Advisor SAN + IP User Manual v12.3.0 User Manual
Page 1194
1122
Brocade Network Advisor SAN + IP User Manual
53-1003155-01
Master keys
25
During rebalancing operations, be aware of the following:
•
You might notice a slight disruption in Disk I/O. In some cases, manual intervention may be
needed.
•
Backup jobs to tapes might need to be restarted after rebalancing is completed.
To determine if rebalancing is recommended for an encryption engine, check the encryption engine
properties. Beginning with Fabric OS 6.4, a field is added that indicates whether or not rebalancing
is recommended.
You might be prompted to rebalance during the following operations:
•
When adding a new disk or tape target container.
•
When removing an existing disk or tape target container.
•
After failover to a backup encryption engine in an HA cluster.
•
After a failed encryption engine in an HA cluster is recovered, and failback processing has
occurred.
Rebalancing an encryption engine
To re-balance an encryption engine, complete the following steps:
1. Select Configure > Encryption from the menu task bar to display the Encryption Center
dialog box. (Refer to
Figure 376
on page 976.)
2. Select an engine, then select Engine > Re-Balance from the menu task bar.
A warning message displays, noting the potential disruption of disk and tape I/O, and that the
operation may take several minutes.
3. Click Yes to begin rebalancing.
Master keys
Master keys belong to the group and are managed from Group Properties.
When an opaque key vault is used, a master key is used to encrypt the data encryption keys. The
master key status indicates whether a master key is used and whether it has been backed up.
Encryption is not allowed until the master key has been backed up.
Only the active master key can be backed up, and multiple backups are recommended. You can
back up or restore the master key to the key vault, to a file, or to a recovery card set. A recovery
card set is set of smart cards. Each recovery card holds a portion of the master key. The cards must
be gathered and read together from a card reader attached to a PC running the Management
application to restore the master key.
Although it is generally not necessary to create a new master key, you might be required to create
one due to the following:
•
The previous master key has been compromised.
•
Corporate policy might require a new master key every year for security purposes.
With regard to DPM, any DEK in the key vault that is either compromised, or needs to be
deactivated or destroyed, must first undergo the decommissioning procedure. For more
information, refer to