HP 8/8 Fabric OS Encryption Administrator's Guide v6.4.0 (53-1001864-01, June - Page 188

Steps after configuration download

Page 188 highlights

5 Configuration upload and download considerations Steps after configuration download For all key vaults except LKM, restore or generate and backup the master key. In cluster environments, the master key is propagated from group leader node. 1. Use the following command to enable the encryption engine. cryptocfg --enableEE [slot num] 2. Commit the configuration. cryptocfg --commit 3. If there are containers that belonged to the old encryption switch or blade, then after configdownload is run, use the following command to change the ownership of containers to the new encryption switch or blade, assuming the host and target physical zone exists. cryptocfg -replace 4. Commit the configuration. cryptocfg --commit 5. Use the following command to check if the switch or blade has the master key. cryptocfg --show -groupmember 6. If a master key is not present, restore the master key from backed up copy. Procedures will differ depending on the backup media used (from recovery smart cards, from the key vault, from a file on the network or a file on a USB-attached device). If new master key needs to be generated, generate the master key and back it up. For LKM key vaults, establish the trusted link with the LKM appliance. If authentication cards are used, set the authentication quorum size from the encryption group leader node, after importing and registering the necessary number of Authentication Card certificates. 170 Fabric OS Encryption Administrator's Guide 53-1001864-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248

170
Fabric OS Encryption Administrator’s Guide
53-1001864-01
Configuration upload and download considerations
5
Steps after configuration download
For all key vaults except LKM, restore or generate and backup the master key. In cluster
environments, the master key is propagated from group leader node.
1.
Use the following command to enable the encryption engine.
cryptocfg --enableEE [slot num]
2.
Commit the configuration.
cryptocfg --commit
3.
If there are containers that belonged to the old encryption switch or blade, then after
configdownload
is run, use the following command to change the ownership of containers to
the new encryption switch or blade, assuming the host and target physical zone exists.
cryptocfg –replace <old EE WWN> <new EE WWN>
4.
Commit the configuration.
cryptocfg --commit
5.
Use the following command to check if the switch or blade has the master key.
cryptocfg --show -groupmember <switch WWN>
6.
If a master key is not present, restore the master key from backed up copy. Procedures will
differ depending on the backup media used (from recovery smart cards, from the key vault,
from a file on the network or a file on a USB-attached device). If new master key needs to be
generated, generate the master key and back it up.
For LKM key vaults, establish the trusted link with the LKM appliance.
If authentication cards are used, set the authentication quorum size from the encryption group
leader node, after importing and registering the necessary number of Authentication Card
certificates.