IBM System Storage SAN32B-E4 Installation, Service And User Manual page 33

System storage
Table of Contents

Advertisement

v There is no support of Cisco switches at this time by IBM. The section in the
Fabric OS Encryption Administrator's Guide Supporting Tivoli Key Lifecycle Manager
(TKLM) Environments related to Cisco Fabric connectivity does not currently
apply.
v The use of Smart Cards provides additional encryption security management,
and is highly recommended. Smart cards can be ordered as FRUs through IBM.
v The Top Talker feature is not compatible with redirection zones. The Top Talker
feature should not be enabled when an encryption switch or blade is present in
the fabric.
v Alias zoning is not supported in encryption environments. You must use the real
WWPN.
v Refer to the "Steps for connecting to a TKLM appliance" section of the Fabric OS
Encryption Administrator's Guide Supporting Tivoli Key Lifecycle Manager (TKLM)
Environments for detailed information on initial setup. That section includes the
following information:
– All switches you plan to include in an encryption group must have a secure
connection to the Tivoli Key Lifecycle Manager (TKLM). A local LINUX host
must be available to transfer certificates.
– Be sure that the clock time on the TKLM server and on the Brocade
encryption nodes are the same. A difference of only a few minutes can cause
the TLS connectivity to fail.
– Repeat the same steps for configuring both the primary and the secondary
key vault.
– Both the primary and secondary key vaults should be registered before
exporting MK or encrypting LUNs. If the secondary key vault is registered
midway after encryption is done for some of the LUNs, then the key database
should be backed up and restored on the secondary TKLM from the already
registered primary TKLM before registering the secondary TKLM.
– The following is a suggested order for the initial steps needed to create a
secure connection to TKLM. (Refer to the "Steps for connecting to a TKLM
appliance" section of the Fabric OS Encryption Administrator's Guide Supporting
Tivoli Key Lifecycle Manager (TKLM) Environments for additional steps.)
1. Initialize all encryption nodes to generate Key authentication center (KAC)
certificates and export the signed KAC certificates to a local LINUX host.
2. Obtain the necessary user credentials and log in to the TKLM server
appliance from the TKLM management web console.
Chapter 1. Introducing the SAN32B-E4
7

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the System Storage SAN32B-E4 and is the answer not in the manual?

Table of Contents