San Encryption Configuration - Brocade Communications Systems WFT-2D User Manual

San user manual
Table of Contents

Advertisement

SAN Encryption Configuration

In this chapter
Brocade Network Advisor SAN User Manual
53-1003154-01
Encryption Center features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 694
Encryption user privileges. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695
Smart card usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 696
Network connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 707
Blade processor links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 707
Encryption node initialization and certificate generation . . . . . . . . . . . . . . 708
Key Management Interoperability Protocol . . . . . . . . . . . . . . . . . . . . . . . . . 709
Supported encryption key manager appliances . . . . . . . . . . . . . . . . . . . . . 712
Steps for connecting to a DPM appliance . . . . . . . . . . . . . . . . . . . . . . . . . . 713
Steps for connecting to an LKM/SSKM appliance . . . . . . . . . . . . . . . . . . . 718
Steps for connecting to an ESKM/SKM appliance . . . . . . . . . . . . . . . . . . . 723
Steps for connecting to a TEKA appliance . . . . . . . . . . . . . . . . . . . . . . . . . . 734
Steps for connecting to a TKLM appliance . . . . . . . . . . . . . . . . . . . . . . . . . 739
Steps for connecting to a KMIP-compliant SafeNet KeySecure . . . . . . . . . 743
Steps for connecting to a KMIP-compliant keyAuthority . . . . . . . . . . . . . . . 762
Encryption preparation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 763
Creating a new encryption group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 764
Adding a switch to an encryption group . . . . . . . . . . . . . . . . . . . . . . . . . . . . 801
Replacing an encryption engine in an encryption group . . . . . . . . . . . . . . 807
High availability clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 808
Configuring encryption storage targets . . . . . . . . . . . . . . . . . . . . . . . . . . . . 811
Configuring hosts for encryption targets . . . . . . . . . . . . . . . . . . . . . . . . . . . 820
Adding target disk LUNs for encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . 822
Adding target tape LUNs for encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . 829
Moving targets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 832
Configuring encrypted tape storage in a multi-path environment . . . . . . . 833
Tape LUN write early and read ahead . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 834
Tape LUN statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 835
Encryption engine rebalancing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 840
Master keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 841
Security settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 850
Zeroizing an encryption engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 850
Chapter
20
693

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network advisor 12.3.0

Table of Contents