HP Brocade 8/12c Fabric OS Encryption Administrator's Guide - Page 192

Initiating a manual re-key session, Management LAN configuration

Page 192 highlights

3 Data re-keying NOTE For a scheduled re-keying session to proceed, all encryption engines in a given HA cluster, DEK cluster, or encryption group must be online, and I/O sync links must be configured. Refer to the section "Management LAN configuration" on page 116 for more information. 1. Log in to the group leader as FabricAdmin. 2. Enable automatic re-keying by setting the -enable_rekey parameter followed by a time period (in days). The following example enables the automatic re-keying feature on an existing LUN with a 90-day re-keying interval. The data will automatically be re-encrypted every 90 days. FabricAdmin:switch>cryptocfg --modify -LUN my_disk_tgt 0x0 \ 10:00:00:00:c9:2b:c9:3a -enable_rekey 90 Operation Succeeded 3. Commit the configuration. FabricAdmin:switch>cryptocfg --commit Operation Succeeded Initiating a manual re-key session You can initiate a re-keying session manually at your own convenience. All encryption engines in a given HA cluster, DEK cluster, or encryption group must be online for this operation to succeed. The manual re-keying feature is useful when the key is compromised and you want to re-encrypt existing data on the LUN before taking action on the compromised key. CAUTION Do not commit this operation if there are any changes pending for the container in which the re-key was started. If you attempt to do this, the system displays a warning stating that the encryption engine is busy and a forced commit is required for the changes to take effect. A forced commit in this situation will halt any re-key that is in-progress (in any container) and corrupt any LUN that is running re-key at the time. There is no recovery for this type of failure. 1. Log in to the group leader as FabricAdmin. 2. Do LUN discovery by issuing the cryptocfg --discoverLUN command before issuing the manual_rekey command to avoid a potential I/O timeout because of a path state change at the host. 3. Ensure that all encryption engines in the HA cluster, DEK cluster, or encryption group are online by issuing the cryptocfg --show -groupmember -all command. 4. Enter the cryptocfg --manual_rekey command. Specify the CryptoTarget container name, the LUN number and the initiator PWWN. FabricAdmin:switch>cryptocfg --manual_rekey my_disk_tgt 0x0\ 10:00:00:05:1e:53:37:99 Operation Succeeded Please check the status of the operation using "cryptocfg --show -rekey" 172 Fabric OS Encryption Administrator's Guide 53-1002159-03

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282

172
Fabric OS Encryption Administrator’s Guide
53-1002159-03
Data re-keying
3
NOTE
For a scheduled re-keying session to proceed, all encryption engines in a given HA cluster, DEK
cluster, or encryption group must be online, and I/O sync links must be configured. Refer to the
section
“Management LAN configuration”
on page 116 for more information.
1.
Log in to the group leader as FabricAdmin.
2.
Enable automatic re-keying by setting the
-enable_rekey
parameter followed by a time period
(in days). The following example enables the automatic re-keying feature on an existing LUN
with a 90-day re-keying interval. The data will automatically be re-encrypted every 90 days.
FabricAdmin:switch>
cryptocfg --modify -LUN my_disk_tgt 0x0 \
10:00:00:00:c9:2b:c9:3a -enable_rekey 90
Operation Succeeded
3.
Commit the configuration.
FabricAdmin:switch>
cryptocfg --commit
Operation Succeeded
Initiating a manual re-key session
You can initiate a re-keying session manually at your own convenience. All encryption engines in a
given HA cluster, DEK cluster, or encryption group must be online for this operation to succeed. The
manual re-keying feature is useful when the key is compromised and you want to re-encrypt
existing data on the LUN before taking action on the compromised key.
CAUTION
Do not commit this operation if there are any changes pending for the container in which the
re-key was started. If you attempt to do this, the system displays a warning stating that the
encryption engine is busy and a forced commit is required for the changes to take effect. A forced
commit in this situation will halt any re-key that is in-progress (in any container) and corrupt any
LUN that is running re-key at the time. There is no recovery for this type of failure.
1.
Log in to the group leader as FabricAdmin.
2.
Do LUN discovery by issuing the
cryptocfg
--
discoverLUN
command before issuing the
manual_rekey
command to avoid a potential I/O timeout because of a path state change at
the host.
3.
Ensure that all encryption engines in the HA cluster, DEK cluster, or encryption group are online
by issuing the
cryptocfg
--
show -groupmember -all
command.
4.
Enter the
cryptocfg
--
manual_rekey
command. Specify the CryptoTarget container name, the
LUN number and the initiator PWWN.
FabricAdmin:switch>
cryptocfg --manual_rekey my_disk_tgt 0x0\
10:00:00:05:1e:53:37:99
Operation Succeeded
Please check the status of the operation using "cryptocfg --show -rekey"