HP 8/8 Fabric OS Encryption Administrator's Guide v6.4.0 (53-1001864-01, June - Page 208

On the new node, invoke, to initialize the Encryption

Page 208 highlights

6 Encryption group and HA cluster maintenance Recovery 1. Configure the IP address 0f the new node that is replacing the failed node, and the IP addresses of the I/O cluster sync ports (Ge0 and Ge1), and initialize the node with the cryptocfg --initnode command. 2. Register the new node IP address and CP certificate with the group leader node. 3. On the group leader node, export the member node certificate. 4. On the group leader node, import the member node certificate. 5. On the group leader node, register the member node with the group leader node. Enter the cryptocfg --reg -membernode command with appropriate parameters to register the member node. Specify the member node's WWN, Certificate filename, and IP address when executing this command. Successful execution of this command distributes all necessary node authentication data to the other members of the group. SecurityAdmin:switch>cryptocfg --reg -membernode \ 10:00:00:05:1e:39:14:00 enc_switch1_cert.pem 10.32.244.60 Operation succeeded. 6. Add the new node to the encryption group by invoking the cryptocfg --add -membernode command on the group leader node. Provide the node WWN and a slot number if the encryption engine is a blade. SecurityAdmin:switch>cryptocfg --add -membernode 10:00:00:05:1e:39:14:00 Add node status: Operation Succeeded. 7. Initialize and enable the encryption engines. On the new node, invoke the cryptocfg --initEE and cryptocfg --regEE commands to initialize the encryption engines. 8. Register the new node with the key manager appliance. 9. On the new node, invoke cryptocfg -initEE and cryptocfg -regEE to initialize the Encryption Engines, and do reboot -f an encryption switch, or SlotPowerOff and SlotPowerOn for an FS8-18 blade in a DCX or DCX-4S. 10. After the new node has come online, invoke the cryptocfg --enableEE [slot_number] command to enable crypto operations on the node's encryption engines. 11. Replace the failed encryption engine on N3 with the encryption engine of the new node N4 to restore broken HA cluster peer relationships. Use the cryptocfg --replaceEE command. 12. Remove the failed node from the encryption group. Follow the procedures described in the section "Removing a node from an encryption group" on page 181. 190 Fabric OS Encryption Administrator's Guide 53-1001864-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248

190
Fabric OS Encryption Administrator’s Guide
53-1001864-01
Encryption group and HA cluster maintenance
6
Recovery
1.
Configure the IP address 0f the new node that is replacing the failed node, and the IP
addresses of the I/O cluster sync ports (Ge0 and Ge1), and initialize the node with the
cryptocfg
--
initnode
command.
2.
Register the new node IP address and CP certificate with the group leader node.
3.
On the group leader node, export the member node certificate.
4.
On the group leader node, import the member node certificate.
5.
On the group leader node, register the member node with the group leader node. Enter the
cryptocfg
--
reg -membernode
command with appropriate parameters to register the member
node. Specify the member node’s WWN, Certificate filename, and
IP address when executing
this command. Successful execution of this command distributes all necessary node
authentication data to the other members of the group.
SecurityAdmin:switch>
cryptocfg --reg -membernode \
10:00:00:05:1e:39:14:00 enc_switch1_cert.pem 10.32.244.60
Operation succeeded.
6.
Add the new node to the encryption group by invoking the
cryptocfg
--
add -membernode
command on the group leader node. Provide the node WWN and a slot number if the
encryption engine is a blade.
SecurityAdmin:switch>
cryptocfg --add -membernode 10:00:00:05:1e:39:14:00
Add node status: Operation Succeeded.
7.
Initialize and enable the encryption engines. On the new node, invoke the
cryptocfg
--
initEE
and
cryptocfg
--
regEE
commands to initialize the encryption engines.
8.
Register the new node with the key manager appliance.
9.
On the new node, invoke
cryptocfg -initEE
and
cryptocfg -regEE
to initialize the Encryption
Engines, and do
reboot -f
an encryption switch, or
SlotPowerOff
and
SlotPowerOn
for an
FS8-18 blade in a DCX or DCX-4S.
10.
After the new node has come online, invoke the
cryptocfg
–-
enableEE
[
slot_number
]
command to enable crypto operations on the node’s encryption engines.
11.
Replace the failed encryption engine on N3 with the encryption engine of the new node N4 to
restore broken HA cluster peer relationships. Use the
cryptocfg
--
replaceEE
command.
12.
Remove the failed node from the encryption group. Follow the procedures described in the
section
“Removing a node from an encryption group”
on page 181.