Encryption group configuration – Dell POWEREDGE M1000E User Manual
Page 183
Fabric OS Command Reference
151
53-1001764-02
cryptoCfg
2
the same username is configured on all nodes. Different encryption groups
can use different usernames so long as all nodes in the group have the same
username. Changing the username using -KAClogin renders the previously
created keys inaccessible. When changing the username you must do the
same on the key vault, and you must change the key owner for all keys of all
LUNs through the SKM GUI. For downgrade considerations, refer to the Fabric
OS Encryption Administrator’s Guide.
--
show
Displays node configuration information. This command requires one of the
following mutually exclusive operands:
-localEE
Displays encryption engine information local to the node.
-file -all
Displays all imported certificates. The -all parameter is required with the
--
show -file command.
--
rebalance [slot]
Rebalances the disk and tape containers to maximize throughput.
Rebalancing is recommended after containers have been added, removed,
moved, failed over, and failed back. This is a disruptive operation. You may
have to restart backup applications after rebalancing is complete. Optionally
specify a slot number on bladed systems.
Function
2. Encryption group configuration
Synopsis
cryptocfg --help -groupcfg
cryptocfg --create -encgroup encryption_group_name
cryptocfg --delete -encgroup encryption_group_name
cryptocfg --reg -keyvault cert_label certfile hostname | ip_address primary | secondary
cryptocfg --dereg -keyvault cert_label
cryptocfg --reg -KACcert signed_certfile primary | secondary
cryptocfg --set -keyvault LKM | RKM | SKM | TEMS
cryptocfg --set -failbackmode auto | manual
cryptocfg --set -hbmisses value
cryptocfg --set -hbtimeout value
cryptocfg --set -quorumsize value
cryptocfg --set -systemcard enable | disable
cryptocfg --set -replication enable | disable
cryptocfg --add -membernode node_WWN
cryptocfg --eject -membernode node_WWN
cryptocfg --leave_encryption_group
cryptocfg --genmasterkey
cryptocfg --exportmasterkey [-file]
cryptocfg --recovermasterkey currentMK | alternateMK -keyID keyID | -srcfile filename
cryptocfg --show -groupcfg