HP 8/8 Fabric OS Encryption Administrator's Guide v6.4.0 (53-1001864-01, June - Page 115

Management LAN configuration

Page 115 highlights

Management LAN configuration 3 --export -scp [-dhchallenge | -currentMK | -KACcert | -KACcsr | -CPcert] : Export a specified file to an external host via scp. --export -usb [-dhchallenge | -currentMK | -KACcert | -KACcsr | -CPcert] : Export a specified file to a mounted USB storage device. --delete -file : Delete a file previously imported to the switch. --show -nodecerts: Display all authorization lists certificates for Cluster Members, Key Vaults, CP certificate and local EE certificates. --show -file -all: Display the files that are imported or to be exported. --show -localEE: Display status of EEs on the local node. Management LAN configuration Each encryption switch has one GbE management port. In the case of a DCX or DCX-4S with FS8-18 blades installed, management ports are located on the CP blades. The management port IP address is normally set as part of the hardware installation. A static IP address should be assigned. To eliminate DNS traffic and potential security risks related to DHCP, DHCP should not be used. For encryption switches and blades, the management port is used to communicate with a key management system, and a secure connection must be established between the management port and the key management system. All switches you plan to include in an encryption group must be connected to the key management system. Either IPv4 and IPv6 addressing may be used, but all nodes, including the key management system, must use the same version of IP addressing. Fabric OS Encryption Administrator's Guide 97 53-1001864-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248

Fabric OS Encryption Administrator’s Guide
97
53-1001864-01
Management LAN configuration
3
--export-scp[-dhchallenge<vaultIPaddr>|-currentMK|-KACcert|-KACcsr|
-CPcert]
<host IP> <host username> <host path>:
Export a specified file to an external host via scp.
--export-usb[-dhchallenge<vaultIPaddr>|-currentMK|-KACcert|-KACcsr|
-CPcert]
<dest filename>:
Export a specified file to a mounted USB storage device.
--delete -file <file name>:
Delete a file previously imported to the switch.
--show -nodecerts:
Display all authorization lists certificates for Cluster Members,
Key Vaults, CP certificate and local EE certificates.
--show -file -all:
Display the files that are imported or to be exported.
--show -localEE:
Display status of EEs on the local node.
Management LAN configuration
Each encryption switch has one GbE management port. In the case of a DCX or DCX-4S with
FS8-18 blades installed, management ports are located on the CP blades. The management port
IP address is normally set as part of the hardware installation. A static IP address should be
assigned. To eliminate DNS traffic and potential security risks related to DHCP, DHCP should not be
used.
For encryption switches and blades, the management port is used to communicate with a key
management system, and a secure connection must be established between the management
port and the key management system. All switches you plan to include in an encryption group must
be connected to the key management system. Either IPv4 and IPv6 addressing may be used, but all
nodes, including the key management system, must use the same version of IP addressing.