Ethernet network. A client is a computer using the nShield Connect for cryptography. You can also configure clients to use other nShield Connects on the network, as well as locally installed HSMs.
Page 5
Model number Used for NH2047 Connect 6000 NH2040 Connect 1500 NH2033 Connect 500 NH2068 Connect 6000+ NH2061 Connect 1500+ NH2054 Connect 500+ NH2075-B Connect XC Base NH2075-M Connect XC Medium NH2075-H Connect XC High NH2082 Connect XC SCAP NH2089-B Connect XC Base - Serial Console NH2089-M Connect XC Mid - Serial Console NH2089-H...
Read this guide in conjunction with the nShield product’s Warnings and Cautions documentation (available in multiple languages). 1.2.1. Terminology The nShield Connect is referred to as the nShield Connect, the hardware security module, or the HSM. 1.3. Handling an nShield Connect An nShield Connect contains solid-state devices that can withstand normal handling.
In the unlikely event that the internal encryption module overheats, the module shuts down (see Module Overheating). If the whole nShield Connect overheats, the orange warning LED on the front panel illuminates (see Orange warning LED) and a critical error message is shown on the display.
1.5. Physical location considerations Entrust nShield HSMs are certified to NIST FIPS 140-2 Level 2 and 3. In addition to the intrinsic protection provided by an nShield HSM, customers must exercise due diligence to ensure that the environment within which the nShield HSMs are deployed is configured properly and is regularly examined as part of a comprehensive risk mitigation program to assess both logical and physical threats.
2. Recycling and disposal information For recycling and disposal guidance, see the nShield product’s Warnings and Cautions documentation. nShield® Connect Installation Guide 9 of 73...
3. Before you install the software Before you install the software, you should: • If required, install an optional nToken in the client computer, see nToken Installation Guide for more information about the installation steps. • Uninstall any older versions of Security World Software. See Uninstalling existing software.
Page 11
You must have Java installed to use KeySafe. 3.1.3.2. Identify software components to be installed Entrust supply standard component bundles that contain many of the necessary components for your installation and, in addition, individual components for use with supported applications. To be sure that all component dependencies are satisfied, you can install either: •...
During the installation process, you are asked to choose which bundles and components to install. Your choice depends on a number of considerations, including: • The types of application that are to use the module • The amount of disc space available for the installation •...
Page 13
Internal privileged connections from Java applications including KeySafe Hardserver 9004 Incoming impath connections from other hardservers, e.g.: • From a nShield Connect to the Remote File System (RFS) • From a non-attended nShield Connect to an attended host machine when using Remote Operator Hardserver in...
4. Installing the software This chapter describes how to install the Security World Software on the computer, client, or RFS associated with your nShield HSM. After you have installed the software, you must complete further Security World creation, configuration and setup tasks before you can use your nShield environment to protect and manage your keys.
◦ If nShield CSPs (CAPI, CNG) was selected: 32bit CSP install wizard, which sets up CSPs for 32-bit applications ◦ If nShield CSPs (CAPI, CNG) was selected: 64bit CSP install wizard, which sets up CSPs for 64-bit applications ◦ If nShield CSPs (CAPI, CNG) was selected: CNG configuration wizard, which sets up the CNG providers ◦...
Page 16
/opt/nfast/sbin/install 6. Log in to your normal account. 7. Add /opt/nfast/bin PATH to your system variable: ◦ If you use the Bourne shell, add these lines to your system or personal profile: PATH=/opt/nfast/bin:$PATH export PATH ◦ If you use the C shell, add this line to your system or personal profile: setenv PATH /opt/nfast/bin:$PATH nShield®...
If any optional components are missing, contact Support. 5.3. Check the physical security of the nShield Connect See the nShield Connect Physical Security Checklist, provided in the box with an nShield document Connect and available in the folder on the installation media.
To install the nShield Connect in a 19” rack, follow the instructions supplied with your rack mounting kit. To install the nShield Connect in a cabinet or a shelf, fit the four self-adhesive rubber feet (supplied with the HSM) to the bottom of the HSM. An is scored into the chassis at each of the four corners on the bottom of the HSM as a guide to placing the feet.
Page 19
Connect is viewed from the back RJ45 port for a serial console cable If you connect only one Ethernet cable to the nShield Connect, we recommend that you connect it to Ethernet port 1. This is the left-hand ...
Connect (See the nShield Connect User Guide). The RJ45 connector for the serial cable is at the rear of the nShield Connect and is labelled Console (Connecting Ethernet, console and power cables.
6.3. Connecting the optional USB keyboard Instead of using the controls on the front panel to configure the nShield Connect, you can use a US or UK keyboard. You might find a keyboard easier for entering dates and IP addresses. You connect the keyboard to the USB connector on the front of the nShield Connect.
USB connector For more information about the user interface, including the front panel controls, see the nShield Connect User Guide. Use the touch wheel to change values or move the cursor on the display screen. To confirm a value, press the Select button.
8. Top-level menu If you select an option, the module displays the menu options in the level below. If you cancel a selected option, you return to level above. * Submenus depend on the settings of the module. 1 System ...
Page 24
2‑3 HSM feature enable 2‑3‑1 Read FEM from card 2‑3‑2 Read from a file 2‑3‑3 View current state 2‑3‑4 Write state to file 2‑4 Set HSM mode 2‑4‑1 Operational 2‑4‑2 Initialization 3 Security World mgmt ...
9.1.1. Remote file system (RFS) Each nShield Connect must have a remote file system (RFS) configured. This includes master copies of all the files that the nShield Connect needs. See the User Guide for your HSM for more information about the RFS.
(Windows) or (Linux) to the system variable. 9.2. Basic nShield Connect and RFS configuration After installing the Security World Software and the nShield Connect, you need to do the following: • Configure the nShield Connect Ethernet interfaces. • Configure the RFS.
Page 27
If the nShield Connect is already configured, you can update the displayed values. If you ever change any of the IP addresses on the nShield Connect, you must update the configuration of all the clients that work with it to reflect the new IP addresses.
Page 28
Inter-Domain Routing (CIDR) notation. 9.2.1.1.2. IPv6 Address notation An nShield Connect will accept an IPv6 address if it is entered in one of the forms shown below and if the address is valid for context in which it is used. There are two conventional forms for representing IPv6 addresses as text strings: •...
Page 29
Operating System, SLAAC IPv6 addresses are not subject to the same validation rules as addresses entered via the nShield Connect front panel. If SLAAC is to be used to configure nShield Connect IPv6 addresses in preference to statically entered...
Page 30
Use Case Acceptable Address Type IPv6 Route Entry - IP • Unknown Range • Loopback • Global Unicast • Local Unicast • Link local • Teredo • Benchmarking • Orchid • 6to4 • Documentation • Multicast IPv6 Route Entry - • Global Unicast Gateway •...
Page 31
IPv6 address(es). SLAAC is disabled by default in an nShield Connect, but can be selectively enabled for each Ethernet interface either using the nShield Connect front panel or by setting the appropriate configuration item and pushing an nShield Connect configuration file.
Page 32
9.2.2. Configure Ethernet Interface #1 To set up Ethernet interface #1 (default): 9.2.2.1. Enable/disable IPv4 To enable/disable IPv4: 1. From the front panel menu, select System > System configuration > Network config > Set up interface #1 > Configure #1 IPv4 > IPv4 enable/disable. The following screen displays: Network configuration IPv4 enable/disable:...
Page 33
9.2.2.3. Enable/disable IPv6 To enable/disable IPv6: 1. From the front panel menu, select System > System configuration > Network config > Set up interface #1 > Configure #1 IPv6 > Enable/Disable IPv6. The following screen displays: Network configuration IPv6 enable/disable: DISABLE CANCEL FINISH...
Page 34
asked to confirm the changes if auto / 1Gb is not selected. On the nShield Connect, selecting auto / 1Gb is the only means of achieving 1Gb link speed. 3. Press the right-hand navigation button and you will be returned to the Set up interface #1 screen and you can then continue with the configuration.
Page 35
9.2.3. Configure Ethernet Interface #2 To set up the Ethernet interface #2, if required: 1. From the front panel menu, select System > System configuration > Network config > Set up interface #2. 2. Enter the details for interface #2 in the same manner that you entered the details for interface #1.
Page 36
9.2.4.2. Set up a bond interface 1. From the front panel menu, select System > System configuration > Network config > Set up bond > Configure bond. The following screen displays: Bond interface config will use the eth0 IPv4 and IPv6 config if they are enabled CANCEL NEXT...
Page 37
Bond interface config Update parameter lacp_rate: slow only valid for 802.3ad (LACP) mode BACK NEXT 7. Set the lacp_rate slow or fast. field to the required option, either 802.3ad This parameter is only valid for mode. This setting is ignored in other modes. slow request LACPDUs to be transmitted every 30 seconds fast...
Page 38
Bond interface config Update parameter primary device: eth0 only valid for active-backup mode BACK NEXT 11. Set the primary device eth0 or eth1. field to the required option, either active backup This parameter is only valid for mode. This setting is ignored in other modes.
Page 39
9.2.5. Default gateway 9.2.5.1. Set default gateway for IPv4 To set a default gateway for IPv4: 1. From the front panel menu, select System > System configuration > Network config > Set default gateway > IPv4 Gateway. The following screen is displayed: Gateway configuration Enter IPv4 address of the default gateway:...
Page 40
Select the interface for the IPv6 gateway. Press the right-hand navigation button to accept. 9.2.6. Set up Routing 9.2.6.1. Set up routing for IPv4 To set a new route entry for IPv4: 1. From the front panel menu, select System > System configuration > Network config >...
Page 41
Edit route entry xxxx:xxxx:xxxx:xxxx: xxxx:xxxx:xxxx:xxxx /xxx Enter the gateway: BACK NEXT 3. Enter the gateway address; if it is a link local address, the following screen is displayed. Edit route entry Select an interface for link-local address: fe80:xxxx:xxxx:xxxx: xxxx:xxxx:xxxx:xxxx Interface #1 BACK NEXT 4.
Page 42
Edit route entry Enter the IP range and mask length: 1. 1. 1. 1/ 1 Enter the gateway 2. 2. 2. 2 CANCEL FINISH 3. Edit the IPv4 route entry Press the right-hand navigation button to accept the changes. 9.2.7.2. Edit IPv6 route entry To edit a route entry for IPv6: 1.
Page 43
4. Enter the IPv6 route gateway If a link-local address is entered for the IPv6 route gateway the screen below will be displayed. Edit route entry Select an interface for link-local address: fe80:2222:2222:2222: 2222:2222:2222:2222 Interface #1 BACK NEXT 5. Select the interface for the IPv6 gateway. Press the right-hand navigation button to accept.
Page 44
See the User Guide for more about the RFS and its contents. The nShield Connect must be able to connect to TCP port 9004 of the RFS. If necessary, modify the firewall configuration to allow this connection on either the RFS itself, or on a router between the RFS and the nShield Connect, or both.
Page 45
<Unit IP> In this command, <Unit IP> is the IP address of the nShield Connect, which could be one of the following: • An IPv4 address, for example 123.456.789.123. • An IPv6 address, for example fc00::1. • A link-local IPv6 address, for example, fe80::1%eth0.
9.2.10.1. Systems configured for Remote Administration If you are planning to use Remote Administration or to configure NTP, you should enable auto push on the nShield Connect for the client computer you intend to use for configuration. On the nShield Connect display, use the right-hand navigation button to select System >...
Page 47
[Options] --privileged <nShield Connect IP> <nShield Connect ESN> <nShield Connect KNETI HASH> Options: --module=MODULE Specifies the local module number that should be used (default is for dynamic configuration by hardserver). --privileged Makes the hardserver request a privileged connection to the nShield Connect (default unprivileged).
Page 48
--help 9.3.2. Configuring a client to communicate through an nToken You can configure a client to use its nToken to communicate with an nShield Connect, if it has one installed. When this happens, the nShield Connect: • Examines the IP address of the client.
Page 49
1. On the client, open a command line window, and run the command: nethsmenroll --help 2. To retrieve the HKNETI of the nShield Connect, run the command: anonkneti <Unit IP> The following is an example of the output: 3138-147F-2D64 691be427bb125f38768638a18bfd2eab75623320...
Do you want to save the IP in the config? (No for dynamic client IPs) Back Next 4. Use the touch wheel to select the connection type between the nShield Connect and the client. Client configuration Please choose the client permissions Unprivileged BACK...
Page 51
BACK NEXT The next steps in the configuration process vary slightly depending on whether the client uses an nToken to communicate with the nShield Connect, or not. 6. Do one of the following: To enroll the client without secure authentication: a.
Ensure that you write down the hash or have it otherwise available for the next steps. d. On the nShield Connect, enter the number of the port on which the client is listening and press the right-hand navigation button. (The default port is 9004.) The following is an example of the information displayed by the nShield Connect.
You can optionally set the IP address of the client that is allowed to push config files. By default any IP address that is configured as a client of the nShield Connect is allowed to push configuration files. If you set an IP address you can optionally set the hash of the key with which the authorized client is to authenticate itself (defaults to no key authentication required).
For an example of the output following a successful command. See Enquiry utility. If you are configuring a client belonging to an nShield Connect, the response to the enquiry hardware status shown as OK. command should be populated and the...
10. Troubleshooting This chapter describes what to do if you have an issue with your HSM, or your Security World Software. 10.1. Checking operational status Use the following methods to check the operational status of the module. 10.1.1. Enquiry utility enquiry enquiry Run the...
Page 56
Existing Security World data on the module has been erased. The module is automatically placed in Initialization mode after a Security World is created. For more information, see the nShield Connect User Guide. Flashes two long pulses followed Status: Maintenance mode by a pause.
Page 57
Status LED Description Flashes SOS, the Morse code Status: Error mode distress code (three short pulses, If the module encounters an unrecoverable error, it three long pulses, three short enters Error mode. In Error mode, the module does pulses). not respond to commands and does not write data After flashing SOS, the Status LED to the bus.
Page 58
The physical security measures implemented on the module include tamper detection. This warns you of tampering in an operational environment. For more information about tamper detection, including the tamper warning messages, see the nShield Connect Physical Security Checklist or the nShield Connect User Guide.
Page 59
Power button Display screen Status On, displaying menus and The module is operational. dialogs On, displaying messages but The module is running an not displaying labels for the upgrade. A color-coded navigation buttons footer indicates the specific status: yellow for initialization, red (maintenance) for upgrade.
On, green and orange Indicates a 1Gb Ethernet link. 10.2. Module overheating If the internal module of the nShield Connect exceeds the safe operating temperature, SOS‑T the unit stops operating and displays the error message on the Status LED. See SOS‑T...
Page 61
10.3.2. Notice This type of message is sent for information only: nFast server: Notice: message 10.3.3. Client This type of message indicates that the server has detected an error in the data sent by the client (but other clients are unaffected): nFast server: Detected error in client behaviour: message 10.3.4.
Real Time Clock (RTC) operation when the module is powered down. This battery normally lasts for up to two weeks if no power is supplied to the nShield Connect unit. If the module is without power for an extended period, the RTC time is lost. When this...
Connect, or result in a tamper event. However, in the very rare event that a PSU or fan tray module requires replacement, contact Support before carrying out the replacement procedure. Do not allow a fan tray to be removed from the nShield Connect for longer than 30 minutes, otherwise a tamper event will occur.
12. Approved accessories The following parts can be ordered with the HSM or separately. Part Part number Comments Slide rail assembly AC2050 Optional slide rail assembly and fixing kit. For details of contents, see the nShield Connect Slide Rails Instructions. USB keyboard M-030099-L For more information about using a USB...
Appendix A: Uninstalling existing software Entrust recommends that you uninstall any existing older versions of Security World Software before you install new software. In Windows environments, if the installer detects an existing Security World Software installation, it asks you if you want to install the new components.
Entrust recommends that you do not uninstall the Security World Software unless you are either certain it is no longer required, or you intend to upgrade it. A.1. Uninstalling the Security World Software on Windows %NFAST_HOME% Before uninstalling the Security World software, you should back up your directory.
Page 67
5. If you are not planning to re-install the product, delete the configuration file /etc/nfast.conf if it exists. Do not delete the configuration file if you are planning to re-install the product 6. Unless needed for a subsequent installation, remove the user nfast and, if it exists, the user ncsnmpd:...
Installing the software. Entrust supply the hardserver and associated software as bundles of common components that provide much of the required software for your installation. In addition to the component bundles, provide individual components for use with specific applications and features supported by certain ncversions command-line utility.
Linux Windows Feature in the Content Package Installer nShield Device Drivers Device drivers for PCI and USB attached hwsp nShield devices, included in for Linux. javasp nShield Java nCipherKM JCA/JCE Provider, associated classes (including nFast Java generic stub classes) and the KeySafe application. nShield Java Developer Java developer libraries and documentation for the nCore API and...
• The appropriate third-party integration guide for your application We have produced Integration Guides for many supported applications. The Integration Guides describe how to install and configure an application so that it works with Entrust hardware security modules and Security Worlds. For more information about the Entrust range of Integration Guides: •...
B.4. SNMP monitoring agent If you want to use the SNMP monitoring agent to monitor your modules, install the nShield SNMP component (ncsnmp on Linux). During the first installation process of the SNMP agent, the agent displays the following message: If this is a first time install, the {product_family} SNMP Agent will not run by default.
Appendix C: Valid IPv6 Addresses This appendix provides a list of valid IPv6 addresses for each of the types of addresses recognized by certain parts of the system. For information on setting up IPv6 addresses, Configuring the Ethernet interfaces - IPv4 and IPv6.
Page 73
nShield® Connect Installation Guide 73 of 73...
Need help?
Do you have a question about the nShield Connect and is the answer not in the manual?
Questions and answers