HP 8/8 Fabric OS Encryption Administrator's Guide v6.4.0 (53-1001864-01, June - Page 213

General encryption troubleshooting

Page 213 highlights

General encryption troubleshooting I 6 General encryption troubleshooting I Table 9 lists the commands you can use to check the health of your encryption setup. Table 10 provides additional information for failures you might encounter while configuring switches using the CLI. TABLE 9 Command General troubleshooting tips using the CLI Activity supportsave errdumpall • errdumpall | grep KAC • errdumpall | grep CVLM • errdumpall | grep CVLC • errdumpall | grep SPM • errdumpall | grep CNM configshow cfgshow nsshow switch:SecurityAdmin> cryptocfg --show -groupcfg switch:SecurityAdmin> cryptocfg --show -groupmember -all Check whole system configuration. Run RAS logs. Run RAS traces. Run Security Processor (SP) logs (mainly kpd.log). Run error logs: • Key Adapter Module error logs. • Crypto Virtual device module error logs. • Crypto LUN module error logs. • SP Manager error logs. • Cluster Node Manager error logs. NOTE: errdumpall requires root user access. Check whole system persistent configuration database dump. Check for SPM-, CVLM-, and CNM-related persistent database entries. Check for redirection zones starting with "red_xxx" in defined database for virtual and physical devices. Check for crypto virtual target and crypto virtual initiator entries for VT/VI Check key vault connection status. Check encryption group/cluster status. Note: CONVERGED status means the cluster is formed successfully. 1 Check encryption group/cluster member status. Note: DISCOVERED state means the member is currently part of a cluster. 2 Check encryption engine/SP and KEK status. Note: SP state ONLINE means encryption engine is enabled for encryption with valid KEK (Link Key or Master Key). TABLE 10 Problem General errors and conditions Resolution When the connectivity to an LKM key vault is lost, a RAS log Issue any of the cryptocfg commands that attempt a key vault communication message is not generated. (such as the cryptocfg --show -groupcfg command). Connection to a key vault returns a "Not Responding" message. After you create an encryption group using RKM, a newly created container's LUN state changes between "Write metadata is pending" and "Write metadata is in progress" with continuous [RKD-1001] messages displayed on the console. Determine if the default port has been changed on the key vault. Power cycle the DCX chassis and then issue the cryptocfg --enableEE [slot number] command to bring the container's LUN state to Encryption Enabled.If the eth0 IP address on the Brocade Encryption Switch or on the FS8-18 port blade has been modified, a reboot is required. Fabric OS Encryption Administrator's Guide 195 53-1001864-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248

Fabric OS Encryption Administrator’s Guide
195
53-1001864-01
General encryption troubleshooting I
6
General encryption troubleshooting I
Table 9
lists the commands you can use to check the health of your encryption setup.
Table 10
provides additional information for failures you might encounter while configuring switches using
the CLI.
TABLE 9
General troubleshooting tips using the CLI
Command
Activity
supportsave
Check whole system configuration.
Run RAS logs.
Run RAS traces.
Run Security Processor (SP) logs (mainly
kpd.log
).
errdumpall
errdumpall | grep KAC
errdumpall | grep CVLM
errdumpall | grep CVLC
errdumpall | grep SPM
errdumpall | grep CNM
Run error logs:
Key Adapter Module error logs.
Crypto Virtual device module error logs.
Crypto LUN module error logs.
SP Manager error logs.
Cluster Node Manager error logs.
NOTE:
errdumpall
requires root user access.
configshow
Check whole system persistent configuration database dump.
Check for SPM-, CVLM-, and CNM-related persistent database entries.
cfgshow
Check for redirection zones starting with “red_xxx” in defined database for
virtual and physical devices.
nsshow
Check for crypto virtual target and crypto virtual initiator entries for VT/VI
switch:SecurityAdmin>
cryptocfg --show
-groupcfg
Check key vault connection status.
Check encryption group/cluster status.
Note:
CONVERGED status means the cluster is formed successfully.
switch:SecurityAdmin>
cryptocfg --show
-groupmember -all
1
Check encryption group/cluster member status.
Note:
DISCOVERED state means the member is currently part of a cluster.
2
Check encryption engine/SP and KEK status.
Note:
SP state ONLINE means encryption engine is enabled for
encryption with valid KEK (Link Key or Master Key).
TABLE 10
General errors and conditions
Problem
Resolution
When the connectivity to an LKM key vault is lost, a RAS log
message is not generated.
Issue any of the
cryptocfg
commands that attempt a key vault communication
(such as the
cryptocfg
--
show -groupcfg
command).
Connection to a key vault returns a “Not Responding”
message.
Determine if the default port has been changed on the key vault.
After you create an encryption group using RKM, a newly
created container's LUN state changes between “Write
metadata is pending” and “Write metadata is in progress”
with continuous [RKD-1001] messages displayed on the
console.
Power cycle the DCX chassis and then issue the
cryptocfg
--
enableEE
[
slot
number
] command to bring the container’s LUN state to Encryption Enabled.If
the eth0 IP address on the Brocade Encryption Switch or on the FS8-18 port
blade has been modified, a reboot is required.