HP 4400 HP B-series Fabric OS 7.0.0a Release Notes (5697-0881, June 2011) - Page 42

In a DC SAN Director or DC04 SAN Director with Fabric OS 6.3.1x and DC Switch encryption

Page 42 highlights

There is no outstanding zoning transaction • Each LUN is uniquely identified by the HP Encryption Switch or HP Encryption Blade using the LUN serial number. The LUN serial numbers must be unique for LUNs exposed from the same target port. The LUN serial numbers must also be unique for LUNs belonging to different target ports in nonmultipathing configurations. Failure to ensure unique LUN serial numbers results in nondeterministic behavior and may result in faulting of the HP Encryption Switch or HP Encryption Blade. • When creating an HA cluster or EG with two or more HP Encryption Switch/Encryption Blades, the GE ports (I/O sync links) must be configured with an IP address for the eth0 and eth1 Ethernet interfaces using ipaddrset. In addition, the eth0 and eth1 Ethernet ports should be connected to the network for redundancy. These I/O sync links connections must be established before any Re-Key, First Time Encryption, or enabling EE for crypto operations. Failure to do so results in HA Cluster creation failure. If the IP address for these ports is configured after the EE was enabled for encryption, HP Encryption Switch needs to be rebooted and Encryption Blades should be slotpoweroff/slotpoweron to sync up the IP address information to the EEs. If only one Ethernet port is configured and connected to a network, data loss or suspension of Re-Key may occur when the network connection toggles or fails. • initEE removes the existing master key or link key. Backup the master key by running cryptocfg -exportmasterkey and cryptocfg -export -currentMK before running initEE. After initEE, regEE and enableEE, run cryptocfg -recovermasterkey to recover the master key previously backed up, or in the case of fresh install run cryptocfg - genmasterkey to generate a new master key. If you are using SKM/ESKM, establish a trusted link with SKM/ESKM again. Certificate exchange between key vaults and switches are not required in this case. • The disable EE interface CLI cryptocfg --disableEE [slot no] should be used only to disable encryption and security capabilities of the EE from the Fabric OS Security Admin in the event of a security compromise. When disabling the encryption capabilities of the EE using the noted commands, the EE should not be hosting any CTCs. Ensure that all CTCs hosted on the HP Encryption Switch or HP Encryption Blade are either removed or moved to a different EE in the HA Cluster or EG before disabling the encryption and security capabilities. • Whenever initNode is performed, new certificates for CP and KAC (SKM/ESKM) are generated. Hence, each time InitNode is performed, the new KAC Certificate must be exported and signed by SKM/ESKM. Without this step, errors occur, such as key vault not responding and ultimately key archival and retrieval problems. • The HTTP server should be listening to port 9443. SKM/ESKM is supported only when configured to port 9443. • Configuring a Brocade group on SKM/ESKM: As described in the Fabric OS Encryption Administrator's Guide, a Brocade group needs to be configured on SKM/ESKM (under Local Users and Groups) for managing all keys generated by Brocade encryption switches and blades. It is important to note that the name for this group is case sensitive and must be "brocade," not "Brocade." • The -key_lifespan option has no effect for cryptocfg -add -LUN, and only has an effect for cryptocfg --create -tapepool for tape pools declared -encryption_format native. For all other encryption cases, a new key is generated each time a medium is rewound and block zero is written or overwritten. For the same reason, the Key Life field in the output of cryptocfg --show -container -all -stat should always be ignored, and the Key Life field in cryptocfg --show -tapepool -cfg is significant only for native-encrypted pools. • In a DC SAN Director or DC04 SAN Director with Fabric OS 6.3.1x and DC Switch encryption FC blades installed, you must set the quorum size to zero and disable the system card on the blade prior to downgrading to a Fabric OS version earlier than 6.3.0. • The System Card feature requires DCFM 10.3.0 or later or HP Network Advisor. Note that all nodes in the EG must be running Fabric OS 6.3.0 or later for system verification to be properly supported. 42

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54

There is no outstanding zoning transaction
Each LUN is uniquely identified by the HP Encryption Switch or HP Encryption Blade using the
LUN serial number. The LUN serial numbers must be unique for LUNs exposed from the same
target port. The LUN serial numbers must also be unique for LUNs belonging to different target
ports in nonmultipathing configurations. Failure to ensure unique LUN serial numbers results in
nondeterministic behavior and may result in faulting of the HP Encryption Switch or HP Encryption
Blade.
When creating an HA cluster or EG with two or more HP Encryption Switch/Encryption Blades,
the GE ports (I/O sync links) must be configured with an IP address for the
eth0
and
eth1
Ethernet
interfaces using
ipaddrset
. In addition, the
eth0
and
eth1
Ethernet ports should be connected
to the network for redundancy. These I/O sync links connections must be established before any
Re-Key, First Time Encryption, or enabling EE for crypto operations. Failure to do so results in HA
Cluster creation failure. If the IP address for these ports is configured after the EE was enabled for
encryption, HP Encryption Switch needs to be rebooted and Encryption Blades should be
slot-
poweroff
/
slotpoweron
to sync up the IP address information to the EEs. If only one Ethernet
port is configured and connected to a network, data loss or suspension of Re-Key may occur when
the network connection toggles or fails.
initEE
removes the existing master key or link key. Backup the master key by running
cryptocfg
–exportmasterkey
and
cryptocfg –export –currentMK
before running
initEE
. After
initEE
,
regEE
and
enableEE
, run
cryptocfg –recovermasterkey
to recover the master
key previously backed up, or in the case of fresh install run
cryptocfg – genmasterkey
to
generate a new master key. If you are using SKM/ESKM, establish a trusted link with SKM/ESKM
again. Certificate exchange between key vaults and switches are not required in this case.
The disable EE interface CLI
cryptocfg --disableEE [slot no]
should be used only to
disable encryption and security capabilities of the EE from the Fabric OS Security Admin in the
event of a security compromise. When disabling the encryption capabilities of the EE using the
noted commands, the EE should not be hosting any CTCs. Ensure that all CTCs hosted on the HP
Encryption Switch or HP Encryption Blade are either removed or moved to a different EE in the
HA Cluster or EG before disabling the encryption and security capabilities.
Whenever
initNode
is performed, new certificates for CP and KAC (SKM/ESKM) are generated.
Hence, each time
InitNode
is performed, the new KAC Certificate must be exported and signed
by SKM/ESKM. Without this step, errors occur, such as key vault not responding and ultimately
key archival and retrieval problems.
The HTTP server should be listening to port 9443. SKM/ESKM is supported only when configured
to port 9443.
Configuring a Brocade group on SKM/ESKM: As described in the
Fabric OS Encryption Admin-
istrator's Guide
, a Brocade group needs to be configured on SKM/ESKM (under Local Users and
Groups) for managing all keys generated by Brocade encryption switches and blades. It is important
to note that the name for this group is case sensitive and must be
brocade,
not
Brocade.
The
–key_lifespan
option has no effect for
cryptocfg –add –LUN
, and only has an effect
for
cryptocfg --create –tapepool
for tape pools declared
-encryption_format
native
. For all other encryption cases, a new key is generated each time a medium is rewound
and block zero is written or overwritten. For the same reason, the
Key Life
field in the output of
cryptocfg --show -container -all –stat
should always be ignored, and the
Key Life
field in
cryptocfg --show –tapepool –cfg
is significant only for native-encrypted pools.
In a DC SAN Director or DC04 SAN Director with Fabric OS 6.3.1x and DC Switch encryption
FC blades installed, you must set the quorum size to zero and disable the system card on the blade
prior to downgrading to a Fabric OS version earlier than 6.3.0.
The System Card feature requires DCFM 10.3.0 or later or HP Network Advisor. Note that all
nodes in the EG must be running Fabric OS 6.3.0 or later for system verification to be properly
supported.
42