HP Brocade 8/12c Fabric OS Encryption Administrator's Guide - Page 132

Overview, Command validation checks

Page 132 highlights

3 Overview Overview This chapter explains how to use the command line interface (CLI) to configure a Brocade Encryption Switch, or an FS8-18 Encryption blade in a DCX or DCX-4S to perform data encryption. This chapter assumes that the basic setup and configuration of the Brocade Encryption Switch (BES), DCX, or DCX-4S has been done as part of the initial hardware installation, including setting the management port IP address. For command syntax and description of parameters, refer to the Fabric OS Command Reference Manual. Command validation checks Before a command is executed, it is validated against the following checks. 1. Active or Standby availability: on enterprise-class platforms, checks that the command is available on the Control Processor (CP). 2. Role Based Access Control (RBAC) availability: checks that the invoking user's role is permitted to invoke the command. If the command modifies system state, the user's role must have modify permission for the command. If the command only displays system state, the user's role must have observe permission for the command. Some commands both observe and modify system state and thus require observe-modify permission. The following RBAC permissions are supported: • O = observe • OM = observe-modify • N = none/not available 3. Admin Domain availability: checks that the command is allowed in the currently selected Admin Domain. For information on Admin Domain concepts and restrictions, refer to the Fabric OS Administrator's Guide. Admin Domain Types are one or more of the following. If more than one AD type is listed for a command, the AD type is option-specific. Display options may be allowed, but set options may be subject to Admin Domain restrictions. SwitchMember Allowed PhysFabricOnly Disallowed AD0Disallowed AD0Only Command-specific Allowed to execute only if the local switch is part of the current AD. Allowed to execute in all ADs. Allowed to execute only in AD255 context (and the user should own access to AD0-AD255 and have admin RBAC privilege). Allowed to execute in AD0 or AD255 context only; not allowed in AD1-AD254 context. Allowed to execute only in AD255 and AD0 (if no ADs are configured). Allowed to execute only in AD0 when ADs are not configured. Checks whether the command is supported on the platform for which it is targeted. 4. PortMember: allows all control operations only if the port or the local switch is part of the current AD. View access is allowed if the device attached to the port is part of the current AD. 112 Fabric OS Encryption Administrator's Guide 53-1002159-03

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282

112
Fabric OS Encryption Administrator’s Guide
53-1002159-03
Overview
3
Overview
This chapter explains how to use the command line interface (CLI) to configure a Brocade
Encryption Switch, or an FS8-18 Encryption blade in a DCX or DCX-4S to perform data encryption.
This chapter assumes that the basic setup and configuration of the Brocade Encryption Switch
(BES), DCX, or DCX-4S has been done as part of the initial hardware installation, including setting
the management port IP address.
For command syntax and description of parameters, refer to the
Fabric OS Command Reference
Manual.
Command validation checks
Before a command is executed, it is validated against the following checks.
1.
Active or Standby availability:
on enterprise-class platforms, checks that the command is
available on the Control Processor (CP).
2.
Role Based Access Control (RBAC) availability:
checks that the invoking user’s role is permitted
to invoke the command. If the command modifies system state, the user's role must have
modify
permission for the command. If the command only displays system state, the user's role
must have
observe
permission for the command. Some commands both observe and modify
system state and thus require
observe-modify
permission. The following RBAC permissions are
supported:
O = observe
OM = observe-modify
N = none/not available
3.
Admin Domain availability:
checks that the command is allowed in the currently selected
Admin Domain. For information on Admin Domain concepts and restrictions, refer to the
Fabric
OS Administrator’s Guide
.
Admin Domain Types are one or more of the following. If more than one AD type is listed for a
command, the AD type is option-specific. Display options may be allowed, but set options may
be subject to Admin Domain restrictions.
4.
PortMember:
allows all control operations only if the port or the local switch is part of the
current AD. View access is allowed if the device attached to the port is part of the current AD.
SwitchMember
Allowed to execute only if the local switch is part of the current AD.
Allowed
Allowed to execute in all ADs.
PhysFabricOnly
Allowed to execute only in AD255 context (and the user should own
access to AD0-AD255 and have admin RBAC privilege).
Disallowed
Allowed to execute in AD0 or AD255 context only; not allowed in
AD1-AD254 context.
AD0Disallowed
Allowed to execute only in AD255 and AD0 (if no ADs are configured).
AD0Only
Allowed to execute only in AD0 when ADs are not configured.
Command-specific
Checks whether the command is supported on the platform for which
it is targeted.