In This Chapter - Brocade Communications Systems Brocade 8/12c Administrator's Manual

Supporting hp secure key manager (skm) environments and hp enterprise secure key manager (eskm) environments
Hide thumbs Also See for Brocade 8/12c:
Table of Contents

Advertisement

Encryption configuration

In this chapter

Fabric OS Encryption Administrator's Guide
53-1002159-03
Encryption Center features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Encryption user privileges. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Smart card usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Network connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Configuring blade processor links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Steps for connecting to an SKM or ESKM appliance . . . . . . . . . . . . . . . . . . 26
Steps for Migrating from SKM to ESKM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Encryption preparation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Creating a new encryption group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Adding a switch to an encryption group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Creating high availability (HA) clusters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Adding encryption targets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Configuring hosts for encryption targets . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Adding target disk LUNs for encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Adding target tape LUNs for encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Tape LUN write early and read ahead . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Tape LUN statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Re-balancing the encryption engine. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Master keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Zeroizing an encryption engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Using the Encryption Targets dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Re-keying all disk LUNs manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Viewing time left for auto re-key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Viewing and editing switch encryption properties. . . . . . . . . . . . . . . . . . . . . 95
Viewing and editing group properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Encryption-related acronyms in log messages . . . . . . . . . . . . . . . . . . . . . . 109
Chapter
2
13

Advertisement

Table of Contents
loading

This manual is also suitable for:

Fabric os encryption

Table of Contents