HP 8/8 Fabric OS Encryption Administrator's Guide v6.4.0 (53-1001864-01, June - Page 6

Encryption configuration using the Management application

Page 6 highlights

Chapter 2 Encryption configuration using the Management application In this chapter 13 Encryption Center features 14 Encryption user privileges 15 Smart card usage 16 Registering authentication cards from a card reader 16 Registering authentication cards from the database 17 De-registering an authentication card 18 Using authentication cards 18 Enabling or disabling the system card requirement 19 Registering system cards from a card reader 19 De-registering a system card 20 Tracking smart cards 20 Editing smart cards 21 Network connections 22 Configuring blade processor links 22 Encryption node initialization and certificate generation 23 Steps for connecting to an SKM appliance 24 Configuring a Brocade group on SKM 25 Registering the SKM Brocade group user name and password 26 Setting up the local Certificate Authority (CA) on SKM 27 Downloading the local CA certificate from SKM 28 Creating and installing the SKM server certificate 28 Enabling SSL on the Key Management System (KMS) Server 29 Creating an SKM High Availability cluster 30 Copying the local CA certificate for a clustered SKM appliance 30 Adding SKM appliances to the cluster 31 Signing the Brocade encryption node KAC certificates 32 Importing a signed KAC certificate into a switch 32 Gathering information 33 Creating a new encryption group 34 Adding a switch to an encryption group 41 Replacing an encryption engine in an encryption group 45 Creating high availability (HA) clusters 46 Removing engines from an HA cluster 47 Swapping engines in an HA cluster 48 Failback option 48 Invoking failback 48 Adding encryption targets 49 Configuring hosts for encryption targets 56 Adding target disk LUNs for encryption 57 vi Fabric OS Encryption Administrator's Guide 53-1001864-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248

vi
Fabric OS Encryption Administrator’s Guide
53-1001864-01
Chapter 2
Encryption configuration using the Management application
In this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
Encryption Center features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Encryption user privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
Smart card usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Registering authentication cards from a card reader . . . . . . . . 16
Registering authentication cards from the database . . . . . . . . 17
De-registering an authentication card . . . . . . . . . . . . . . . . . . . . 18
Using authentication cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
Enabling or disabling the system card requirement . . . . . . . . . 19
Registering system cards from a card reader . . . . . . . . . . . . . . 19
De-registering a system card. . . . . . . . . . . . . . . . . . . . . . . . . . . .20
Tracking smart cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
Editing smart cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Network connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22
Configuring blade processor links . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Encryption node initialization and certificate generation. . . . . . . . . 23
Steps for connecting to an SKM appliance . . . . . . . . . . . . . . . . . . . . 24
Configuring a Brocade group on SKM . . . . . . . . . . . . . . . . . . . .25
Registering the SKM Brocade group
user name and password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Setting up the local Certificate Authority (CA) on SKM . . . . . . . 27
Downloading the local CA certificate from SKM . . . . . . . . . . . .28
Creating and installing the SKM server certificate . . . . . . . . . . 28
Enabling SSL on the Key Management System
(KMS) Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29
Creating an SKM High Availability cluster . . . . . . . . . . . . . . . . .30
Copying the local CA certificate for a
clustered SKM appliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30
Adding SKM appliances to the cluster . . . . . . . . . . . . . . . . . . . .31
Signing the Brocade encryption node KAC certificates. . . . . . . 32
Importing a signed KAC certificate into a switch . . . . . . . . . . . . 32
Gathering information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Creating a new encryption group . . . . . . . . . . . . . . . . . . . . . . . . . . . .34
Adding a switch to an encryption group. . . . . . . . . . . . . . . . . . . . . . . 41
Replacing an encryption engine in an encryption group . . . . . . . . .45
Creating high availability (HA) clusters . . . . . . . . . . . . . . . . . . . . . . .46
Removing engines from an HA cluster . . . . . . . . . . . . . . . . . . . . 47
Swapping engines in an HA cluster . . . . . . . . . . . . . . . . . . . . . .48
Failback option. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Invoking failback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .48
Adding encryption targets. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Configuring hosts for encryption targets . . . . . . . . . . . . . . . . . . . . . . 56
Adding target disk LUNs for encryption . . . . . . . . . . . . . . . . . . . . . . . 57