Configuring; Copying; Importing - Brocade Communications Systems WFT-2D User Manual

San user manual
Table of Contents

Advertisement

Brocade Network Advisor SAN User Manual
53-1003154-01
Copying the local CA certificate for a clustered
ESKM/SKM appliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .730
Adding ESKM/SKM appliances to the cluster . . . . . . . . . . . . .730
Data Encryption Keys. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .733
ESKM/SKM key vault deregistration . . . . . . . . . . . . . . . . . . . .734
Steps for connecting to a TEKA appliance. . . . . . . . . . . . . . . . . . . .734
Setting up TEKA network connections . . . . . . . . . . . . . . . . . . .735
Creating a client on TEKA . . . . . . . . . . . . . . . . . . . . . . . . . . . . .736
Signing the encryption node KAC CSR on the
TEKA appliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .738
Steps for connecting to a TKLM appliance . . . . . . . . . . . . . . . . . . .739
Converting the KAC certificate format . . . . . . . . . . . . . . . . . . . 740
Adding a device to the device group. . . . . . . . . . . . . . . . . . . . . 740
Creating a self-signed certificate for TKLM . . . . . . . . . . . . . . . 741
Importing the Fabric OS encryption node KAC
certificates to TKLM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 741
Setting FIPS compliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 744
Creating a local CA. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 745
Creating a server certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . 746
Creating a cluster. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .751
Registering the KeySecure Brocade group user name
and password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .753
Importing a signed KAC certificate into a switch . . . . . . . . . . .756
Backing up the certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . .757
Configuring the KMIP server . . . . . . . . . . . . . . . . . . . . . . . . . . .759
Adding a node to the cluster . . . . . . . . . . . . . . . . . . . . . . . . . . .760
Encryption preparation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .763
Creating a new encryption group . . . . . . . . . . . . . . . . . . . . . . . . . . .764
Configuring key vault settings for RSA Data Protection
Manager (DPM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .769
Configuring key vault settings for NetApp Link Key
Manager (LKM/SSKM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 774
Configuring key vault settings for HP Enterprise Secure
Key Manager (ESKM/SKM) . . . . . . . . . . . . . . . . . . . . . . . . . . . .780
Configuring key vault settings for Thales e_Security
keyAuthority (TEKA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .784
xxiii

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network advisor 12.3.0

Table of Contents