Encryption Center Features - Brocade Communications Systems 1606 Administrator's Manual

Fabric os encryption administrator's guide v6.4.0 (53-1001864-01, june 2010)
Hide thumbs Also See for 1606:
Table of Contents

Advertisement

2

Encryption Center features

Encryption Center features

The Encryption Center dialog box
configuration in the Management application. It also provides a table that shows the general status
of all encryption-related hardware and functions at a glance.
FIGURE 6
Beginning with Fabric OS version 6.4, the Encryption Center is dynamically updated to reflect the
latest changes based on any of the following events:
If you are using the Encryption Center for the first time, please read the following topics before you
begin to perform encryption operations:
14
Encryption Center dialog box
Encryption group creation or deletion.
A change in encryption group status.
Addition or removal of an encryption group member.
Addition or removal of an encryption engine.
A change in encryption engine status.
"Encryption user privileges"
that are specific to encryption.
"Smart card usage"
on page 16 and the topics that follow describe the options available for the
use of Smart Cards for user authentication, system access control, and storing backup copies
of data encryption master keys.
"Network connections"
on page 22 describes the network connections that must be in place to
enable encryption.
"Configuring blade processor links"
encryption switches or blades in an encryption group through a dedicated LAN. This must be
done before their encryption engines are enabled. Security parameters and certificates cannot
be exchanged if these links are not configured and active.
"Encryption node initialization and certificate generation"
parameters and certificates that are generated when an encryption node is initialized.
"Steps for connecting to an SKM appliance"
appliances, and lists topics that provide additional detail.
(Figure
6) is the single launching point for all encryption-related
on page 15 describes the Role-based Access Control privileges
on page 22 describes the steps for interconnecting
on page 24 lists the supported key manager
on page 23 lists the security
Fabric OS Encryption Administrator's Guide
53-1001864-01

Advertisement

Table of Contents
loading

Table of Contents