HP 1606 Fabric OS Encryption Administrator's Guide v6.4.0 (53-1001864-01, June - Page 129

Generating and backing up the master key

Page 129 highlights

Generating and backing up the master key 3 Generating and backing up the master key You must generate a master key on the group leader, and export it to a secure backup location so that it can be restored, if necessary. The master key is used to encrypt DEKs for transmission to and from SKM. The backup location may SKM, a local file, or a secure external SCP-capable host. All three options are shown in the following procedure. Note that the Brocade SAN management application provides the additional option of backing up the master key to system cards. 1. Generate the master key on the group leader. SecurityAdmin:switch>cryptocfg --genmasterkey Master key generated. The master key should be exported before further operations are performed. 2. Export the master key to the key vault. Make a note of the key ID and the passphrase. You will need the Key ID and passphrase should you have to restore the master key from the key vault. SecurityAdmin:switch>cryptocfg --exportmasterkey Enter the passphrase: passphrpase Master key exported. Key ID: 8f:88:45:32:8e:bf:eb:44:c4:bc:aa:2a:c1:69:94:2 3. Save the master key to a file. SecurityAdmin:switch>cryptocfg --exportmasterkey -file Master key file generated. 4. Export the master key to an SCP-capable external host: SecurityAdmin:switch>cryptocfg --export -scp -currentMK \ 192.168.38.245 mylogin GL_MK.mk Password: Operation succeeded. 5. Display the group membership information. Verify that the master key ID for all member nodes is the same. SecurityAdmin:switch>cryptocfg --show -groupmember -all NODE LIST Total Number of defined nodes:2 Group Leader Node Name: 10:00:00:05:1e:41:9a:7e Encryption Group state: CLUSTER_STATE_CONVERGED Node Name: 10:00:00:05:1e:41:9a:7e (current node) State: DEF_NODE_STATE_DISCOVERED Role: GroupLeader IP Address: 10.32.244.71 Certificate: GL_cpcert.pem Current Master Key State: Configured Current Master KeyID: 8f:88:45:32:8e:bf:eb:44:c4:bc:aa:2a:c1:69:94:2 Alternate Master Key State: Not configured Alternate Master KeyID: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 EE Slot: SP state: Current Master KeyID: Alternate Master KeyID: No HA cluster membership 0 Waiting for enableEE 8f:88:45:32:8e:bf:eb:44:c4:bc:aa:2a:c1:69:94:2 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 Node Name: 10:00:00:05:1e:39:14:00 Fabric OS Encryption Administrator's Guide 111 53-1001864-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248

Fabric OS Encryption Administrator’s Guide
111
53-1001864-01
Generating and backing up the master key
3
Generating and backing up the master key
You must generate a master key on the group leader, and export it to a secure backup location so
that it can be restored, if necessary. The master key is used to encrypt DEKs for transmission to
and from SKM.
The backup location may SKM, a local file, or a secure external SCP-capable host. All three options
are shown in the following procedure. Note that the Brocade SAN management application
provides the additional option of backing up the master key to system cards.
1.
Generate the master key on the group leader.
SecurityAdmin:switch>
cryptocfg --genmasterkey
Master key generated. The master key should be
exported before further operations are performed.
2.
Export the master key to the key vault. Make a note of the key ID and the passphrase. You will
need the Key ID and passphrase should you have to restore the master key from the key vault.
SecurityAdmin:switch>
cryptocfg --exportmasterkey
Enter the passphrase:
passphrpase
Master key exported. Key ID:
8f:88:45:32:8e:bf:eb:44:c4:bc:aa:2a:c1:69:94:2
3.
Save the master key to a file.
SecurityAdmin:switch>
cryptocfg --exportmasterkey -file
Master key file generated.
4.
Export the master key to an SCP-capable external host:
SecurityAdmin:switch>
cryptocfg --export -scp -currentMK \
192.168.38.245 mylogin GL_MK.mk
Password:
Operation succeeded.
5.
Display the group membership information. Verify that the master key ID for all member nodes
is the same.
SecurityAdmin:switch>
cryptocfg --show -groupmember -all
NODE LIST
Total Number of defined nodes:2
Group Leader Node Name:
10:00:00:05:1e:41:9a:7e
Encryption Group state:
CLUSTER_STATE_CONVERGED
Node Name:
10:00:00:05:1e:41:9a:7e (current node)
State:
DEF_NODE_STATE_DISCOVERED
Role:
GroupLeader
IP Address:
10.32.244.71
Certificate:
GL_cpcert.pem
Current Master Key State:
Configured
Current Master KeyID:
8f:88:45:32:8e:bf:eb:44:c4:bc:aa:2a:c1:69:94:2
Alternate Master Key State: Not configured
Alternate Master KeyID:
00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
EE Slot:
0
SP state:
Waiting for enableEE
Current Master KeyID:
8f:88:45:32:8e:bf:eb:44:c4:bc:aa:2a:c1:69:94:2
Alternate Master KeyID:
00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
No HA cluster membership
Node Name:
10:00:00:05:1e:39:14:00