Generating And Backing Up The Master Key - Brocade Communications Systems StoreFabric SN6500B Administrator's Manual

Brocade fabric os encryption administrator's guide v7.1.0 (53-1002721-01, march 2013)
Hide thumbs Also See for StoreFabric SN6500B:
Table of Contents

Advertisement

3

Generating and backing up the master key

Generating and backing up the master key

You must generate a master key on the group leader, and export it to a secure backup location so
that it can be restored, if necessary. The master key is used to encrypt DEKs for transmission to
and from an SKM/ESKM.
The backup location may be an SKM/ESKM, a local file, or a secure external SCP-capable host. All
three options are shown in the following procedure. Note that the Brocade SAN Management
application (BNA) provides the additional option of backing up the master key to system cards.
1. Generate the master key on the group leader.
2. Export the master key to the key vault. Make a note of the key ID and the passphrase. You will
3. Save the master key to a file.
4. Export the master key to an SCP-capable external host:
5. Display the group membership information. Verify the master key ID for all member nodes is
152
Node Name:
State:
Role:
IP Address:
Certificate:
Current Master Key State:
Current Master KeyID:
Alternate Master Key State:Not configured
Alternate Master KeyID:
EE Slot:
0
SP state:
Current Master KeyID:
Alternate Master KeyID:
No HA cluster membership
SecurityAdmin:switch> cryptocfg --genmasterkey
Master key generated. The master key should be
exported before further operations are performed.
need the Key ID and passphrase should you have to restore the master key from the key vault.
SecurityAdmin:switch> cryptocfg --exportmasterkey
Enter the passphrase: passphrase
Master key exported. Key ID: 8f:88:45:32:8e:bf:eb:44:c4:bc:aa:2a:c1:69:94:2
SecurityAdmin:switch> cryptocfg --exportmasterkey -file
Master key file generated.
SecurityAdmin:switch> cryptocfg --export -scp -currentMK \
192.168.38.245 mylogin GL_MK.mk
Password:
Operation succeeded.
the same.
SecurityAdmin:switch> cryptocfg --show -groupmember -all
10:00:00:05:1e:39:14:00
DEF_NODE_STATE_DISCOVERED
MemberNode
10.32.244.60
enc1_cpcert.pem
Not configured
00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
Unknown State
00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00
Fabric OS Encryption Administrator's Guide (SKM/ESKM)
53-1002721-01

Advertisement

Table of Contents
loading

This manual is also suitable for:

Fabric os 7.1.0

Table of Contents