HP 8/8 Fabric OS Encryption Administrator's Guide v6.4.0 (53-1001864-01, June - Page 124

Initializing the Brocade encryption engines, Key Archive Client

Page 124 highlights

3 Steps for connecting to an SKM appliance Initializing the Brocade encryption engines You must perform a series of encryption engine initialization steps on every Brocade encryption node (switch or blade) that is expected to perform encryption within the fabric. NOTE The initialization process overwrites any authentication data and certificates that reside on the node and the security processor. If this is not a first-time initialization, make sure to export the master key by running cryptocfg --exportmasterkey and cryptocfg -export -scp --currentMK before running --initEE. Take the following steps to initialize an encryption engine. 1. Log into the switch as Admin or SecurityAdmin. 2. Zeroize all critical security parameters (CSPs) on the switch by entering the cryptocfg --zeroizeEE command. Provide a slot number if the encryption engine is a blade. SecurityAdmin:switch>cryptocfg --zeroizeEE This will zeroize all critical security parameters ARE YOU SURE (yes, y, no, n): [no]y Operation succeeded. 3. Zeroization leaves the switch or blade faulted. Perform the appropriate action depending on whether the encryption engine is a switch or a blade. • When the encryption engine is on an encryption switch, reboot the switch. • When the encryption engine is on an FS8-18 blade, issue the slotpoweroff slot number command followed by the slotpoweron slot number command. 4. Synchronize the time on the switch and the key manager appliance. They should be within one minute of each other. Differences in time can invalidate certificates and cause key vault operations to fail. 5. Initialize the node by entering the cryptocfg --initnode command. Successful execution generates the following security parameters and certificates: • Node CP certificate • Key Archive Client (KAC) certificate NOTE Node initialization overwrites any existing authentication data on the node. SecurityAdmin:switch>cryptocfg --initnode This will overwrite all identification and authentication data ARE YOU SURE (yes, y, no, n): [no] y Notify SPM of Node Cfg Operation succeeded. 6. Initialize the encryption engine by entering the cryptocfg --initEE command. Provide a slot number if the encryption engine is a blade. This step generates critical security parameters (CSPs) and certificates in the CryptoModule's security processor (SP). The CP and the SP perform a certificate exchange to register respective authorization data. SecurityAdmin:switch>cryptocfg --initEE This will overwrite previously generated identification and authentication data 106 Fabric OS Encryption Administrator's Guide 53-1001864-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248

106
Fabric OS Encryption Administrator’s Guide
53-1001864-01
Steps for connecting to an SKM appliance
3
Initializing the Brocade encryption engines
You must perform a series of encryption engine initialization steps on every Brocade encryption
node (switch or blade) that is expected to perform encryption within the fabric.
NOTE
The initialization process overwrites any authentication data and certificates that reside on the node
and the security processor. If this is not a first-time initialization, make sure to export the master key
by running
cryptocfg
--
exportmasterkey
and
cryptocfg –export -scp
--
currentMK
before running
--
initEE
.
Take the following steps to initialize an encryption engine.
1.
Log into the switch as Admin or SecurityAdmin.
2.
Zeroize all critical security parameters (CSPs) on the switch by entering the
cryptocfg
--
zeroizeEE
command. Provide a slot number if the encryption engine is a blade.
SecurityAdmin:switch>
cryptocfg --zeroizeEE
This will zeroize all critical security parameters
ARE YOU SURE
(yes, y, no, n): [no]
y
Operation succeeded.
3.
Zeroization leaves the switch or blade faulted. Perform the appropriate action depending on
whether the encryption engine is a switch or a blade.
When the encryption engine is on an encryption switch, reboot the switch.
When the encryption engine is on an FS8-18 blade, issue the
slotpoweroff
slot number
command followed by the
slotpoweron
slot number
command.
4.
Synchronize the time on the switch and the key manager appliance. They should be within one
minute of each other. Differences in time can invalidate certificates and cause key vault
operations to fail.
5.
Initialize the node by entering the
cryptocfg
--
initnode
command. Successful execution
generates the following security parameters and certificates:
Node CP certificate
Key Archive Client
(
KAC) certificate
NOTE
Node initialization overwrites any existing authentication data on the node.
SecurityAdmin:switch>
cryptocfg --initnode
This will overwrite all identification and authentication data
ARE YOU SURE
(yes, y, no, n): [no] y
Notify SPM of Node Cfg
Operation succeeded.
6.
Initialize the encryption engine by entering the
cryptocfg
--
initEE
command. Provide a slot
number if the encryption engine is a blade. This step generates critical security parameters
(CSPs) and certificates in the CryptoModule’s security processor (SP). The CP and the SP
perform a certificate exchange to register respective authorization data.
SecurityAdmin:switch>
cryptocfg --initEE
This will overwrite previously generated identification
and authentication data