HP 8/8 Fabric OS Encryption Administrator's Guide v6.4.0 (53-1001864-01, June - Page 200

Perform one of the following steps to remove the member node from the encryption group.

Page 200 highlights

6 Encryption group and HA cluster maintenance SecurityAdmin:switch>cryptocfg --show -groupmember \ 10:00:00:05:1e:41:99:bc Node Name: 10:00:00:05:1e:41:99:bc (current node) State: DEF_NODE_STATE_DISCOVERED Role: MemberNode IP Address: 10.32.33.145 Certificate: 10.32.33.145_my_cp_cert.pem Current Master Key State: Saved Current Master KeyID: b8:2a:a2:4f:c8:fd:12:e2:a9:25:d9:5b:58:2c:96:7e Alternate Master Key State: Not configured Alternate Master KeyID: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 EE Slot: 0 SP state: Online Current Master KeyID: b8:2a:a2:4f:c8:fd:12:e2:a9:25:d9:5b:58:2c:96:7e Alternate Master KeyID: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 No HA cluster membership a. If the node is in the DISCOVERED State and the security processor (SP) state is online as shown, and you wish to remove the node from the encryption group permanently, proceed to step 4. b. If the node is not in the DISCOVERED State, and you wish to remove the node from the encryption group permanently, de-register the node. Log into the group leader and enter the cryptocfg --dereg -membernode command followed by the node WWN. SecurityAdmin:switch>cryptocfg --dereg -membernode 10:00:00:05:1e:41:99:bc Operation succeeded. 4. Perform one of the following steps to remove the member node from the encryption group. a. Log into the member node and enter the cryptocfg --leave_encryption_group command. This command clears all node states pertaining to group membership. SecurityAdmin:switch>cryptocfg --leave_encryption_group Leave node status: Operation Succeeded. b. On the group leader, enter the cryptocfg --eject -membernode command followed by the node WWN. This command removes the node from the encryption group. SecurityAdmin:switch>cryptocfg --eject -membernode 10:00:00:05:1e:41:99:bc Eject node status: Operation Succeeded. 182 Fabric OS Encryption Administrator's Guide 53-1001864-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248

182
Fabric OS Encryption Administrator’s Guide
53-1001864-01
Encryption group and HA cluster maintenance
6
SecurityAdmin:switch>
cryptocfg --show -groupmember \
10:00:00:05:1e:41:99:bc
Node Name:
10:00:00:05:1e:41:99:bc
(current node)
State:
DEF_NODE_STATE_DISCOVERED
Role:
MemberNode
IP Address:
10.32.33.145
Certificate:
10.32.33.145_my_cp_cert.pem
Current Master Key State:
Saved
Current Master KeyID:
b8:2a:a2:4f:c8:fd:12:e2:a9:25:d9:5b:58:2c:96:7e
Alternate Master Key State: Not configured
Alternate Master KeyID:
00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
EE Slot:
0
SP state:
Online
Current Master KeyID:
b8:2a:a2:4f:c8:fd:12:e2:a9:25:d9:5b:58:2c:96:7e
Alternate Master KeyID:
00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
No HA cluster membership
a.
If the node is in the DISCOVERED State and the security processor (SP) state is
online
as
shown, and you wish to remove the node from the encryption group permanently, proceed
to step 4.
b.
If the node is not in the DISCOVERED State, and you wish to remove the node from the
encryption group permanently, de-register the node. Log into the group leader and enter
the
cryptocfg
--
dereg -membernode
command followed by the node WWN.
SecurityAdmin:switch>
cryptocfg --dereg -membernode
10:00:00:05:1e:41:99:bc
Operation succeeded.
4.
Perform one of the following steps to remove the member node from the encryption group.
a.
Log into the member node and enter the
cryptocfg
--
leave_encryption_group
command
.
This command clears all node states pertaining to group membership.
SecurityAdmin:switch>
cryptocfg --leave_encryption_group
Leave node status: Operation Succeeded.
b.
On the group leader, enter the
cryptocfg
--
eject -membernode
command
followed by the
node WWN. This command removes the node from the encryption group.
SecurityAdmin:switch>
cryptocfg --eject -membernode 10:00:00:05:1e:41:99:bc
Eject node status: Operation Succeeded.