HP Brocade 8/12c Fabric OS Encryption Administrator's Guide - Page 149

on and register SKM as the key vault. The group leader automatically

Page 149 highlights

Steps for connecting to an SKM or ESKM appliance 3 The switch on which you create the encryption group becomes the designated group leader. Once you have created an encryption group, all group-wide configurations, including key vault configuration, adding member nodes, configuring failover policy settings, and setting up storage devices, as well as all encryption management operations, are performed on the group leader. 3. Set the key vault type for SKM/ESKM by entering the cryptocfg --set -keyvault command. Successful execution sets the key vault type for the entire encryption group. The following example sets the key vault type to SKM, which is the selection also used for ESKM. SecurityAdmin:switch>cryptocfg --set -keyvault SKM Set key vault status: Operation Succeeded. 4. Import the CA certificate from the download location used when "Downloading the local CA certificate" on page 121, and register SKM as the key vault. The group leader automatically shares this information with other group members. SecurityAdmin:switch>cryptocfg --import -scp SecurityAdmin:switch>cryptocfg --reg -keyvault primary At this point, it may take around one minute to fully configure the switch with SKM/ESKM. 5. As the switches come up, enable the encryption engines. SecurityAdmin:switch>cryptocfg --enableEE Operation succeeded. 6. Use the cryptocfg - - show groupcfg command to verify that the key vault state is Connected. Mace_127:admin> cryptocg --show groupcfg rbash: cryptocg: command not found Mace_127:admin> cryptocfg --show -groupcfg Encryption Group Name: mace127_mace129 Failback mode: Auto Replication mode: Disabled Heartbeat misses: 3 Heartbeat timeout: 2 Key Vault Type: SKM System Card: Disabled Primary Key Vault: IP address: Certificate ID: Certificate label: State: Type: 10.32.53.55 Brocade skmcert Connected SKM Secondary Key Vault not configured Additional Key Vault/Cluster Information: Key Vault/CA Certificate Validity: Port for Key Vault Connection: Time of Day on Key Server: Server SDK Version: Yes 9000 2010-03-17 17:51:31 4.8.1 Encryption Node (Key Vault Client) Information: Node KAC Certificate Validity: Yes Time of Day on the Switch: 2010-03-17 17:22:05 Fabric OS Encryption Administrator's Guide 129 53-1002159-03

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282

Fabric OS Encryption Administrator’s Guide
129
53-1002159-03
Steps for connecting to an SKM or ESKM appliance
3
The switch on which you create the encryption group becomes the designated group leader. Once
you have created an encryption group, all group-wide configurations, including key vault
configuration, adding member nodes, configuring failover policy settings, and setting up storage
devices, as well as all encryption management operations, are performed on the group leader.
3.
Set the key vault type for SKM/ESKM by entering the
cryptocfg
--
set -keyvault
command.
Successful execution sets the key vault type for the entire encryption group. The following
example sets the key vault type to SKM, which is the selection also used for ESKM.
SecurityAdmin:switch>
cryptocfg --set -keyvault SKM
Set key vault status: Operation Succeeded.
4.
Import the CA certificate from the download location used when
“Downloading the local CA
certificate”
on page 121, and register SKM as the key vault. The group leader automatically
shares this information with other group members.
SecurityAdmin:switch>
cryptocfg --import -scp <CA certificate file>
<host IP> <host username> <host path>
SecurityAdmin:switch>
cryptocfg --reg -keyvault <CA certificate file>
<SKM IP>
primary
At this point, it may take around one minute to fully configure the switch with SKM/ESKM.
5.
As the switches come up, enable the encryption engines.
SecurityAdmin:switch>cryptocfg --enableEE
Operation succeeded.
6.
Use the
cryptocfg - - show groupcfg
command to verify that the key vault state is
Connected
.
Mace_127:admin>
cryptocg --show groupcfg
rbash: cryptocg: command not found
Mace_127:admin> cryptocfg --show -groupcfg
Encryption Group Name:
mace127_mace129
Failback mode:
Auto
Replication mode:
Disabled
Heartbeat misses:
3
Heartbeat timeout:
2
Key Vault Type:
SKM
System Card:
Disabled
Primary Key Vault:
IP address:
10.32.53.55
Certificate ID:
Brocade
Certificate label:
skmcert
State:
Connected
Type:
SKM
Secondary Key Vault not configured
Additional Key Vault/Cluster Information:
Key Vault/CA Certificate Validity:
Yes
Port for Key Vault Connection:
9000
Time of Day on Key Server:
2010-03-17 17:51:31
Server SDK Version:
4.8.1
Encryption Node (Key Vault Client) Information:
Node KAC Certificate Validity:
Yes
Time of Day on the Switch:
2010-03-17 17:22:05