beautypg.com

Encryption group configuration – Dell POWEREDGE M1000E User Manual

Page 183

background image

Fabric OS Command Reference

151

53-1001764-02

cryptoCfg

2

the same username is configured on all nodes. Different encryption groups
can use different usernames so long as all nodes in the group have the same
username. Changing the username using -KAClogin renders the previously
created keys inaccessible. When changing the username you must do the
same on the key vault, and you must change the key owner for all keys of all
LUNs through the SKM GUI. For downgrade considerations, refer to the Fabric
OS
Encryption Administrator’s Guide.

--

show

Displays node configuration information. This command requires one of the
following mutually exclusive operands:

-localEE

Displays encryption engine information local to the node.

-file -all

Displays all imported certificates. The -all parameter is required with the
--

show -file command.

--

rebalance [slot]

Rebalances the disk and tape containers to maximize throughput.
Rebalancing is recommended after containers have been added, removed,
moved, failed over, and failed back. This is a disruptive operation. You may
have to restart backup applications after rebalancing is complete. Optionally
specify a slot number on bladed systems.

Function

2. Encryption group configuration

Synopsis

cryptocfg --help -groupcfg

cryptocfg --create -encgroup encryption_group_name

cryptocfg --delete -encgroup encryption_group_name

cryptocfg --reg -keyvault cert_label certfile hostname | ip_address primary | secondary

cryptocfg --dereg -keyvault cert_label

cryptocfg --reg -KACcert signed_certfile primary | secondary

cryptocfg --set -keyvault LKM | RKM | SKM | TEMS

cryptocfg --set -failbackmode auto | manual

cryptocfg --set -hbmisses value

cryptocfg --set -hbtimeout value

cryptocfg --set -quorumsize value

cryptocfg --set -systemcard enable | disable

cryptocfg --set -replication enable | disable

cryptocfg --add -membernode node_WWN

cryptocfg --eject -membernode node_WWN

cryptocfg --leave_encryption_group

cryptocfg --genmasterkey

cryptocfg --exportmasterkey [-file]

cryptocfg --recovermasterkey currentMK | alternateMK -keyID keyID | -srcfile filename

cryptocfg --show -groupcfg