Configuring For Encryption; Summary Of Procedure - IBM System Storage SAN32B-E4 Installation, Service And User Manual

System storage
Table of Contents

Advertisement

4. Verify the correct operation of the switch by entering the switchShow
5. Verify the correct operation of the switch in the fabric by entering the
6. Back up the switch configuration to an FTP server by entering the
It is recommended that the configuration be backed up on a regular basis to ensure
that a complete configuration is available for downloading to a replacement
switch. For specific instructions about how to back up the configuration, see the
Fabric OS Administrator's Guide. The switchShow, fabricShow, and configUpload
commands are described in detail in the Fabric OS Command Reference.

Configuring for encryption

Note: Refer to the Fabric OS Encryption Administrator's Guide Supporting Tivoli Key

Summary of procedure

If the switch is being configured for the first time for encryption services, you will
need to perform several pre-initialization tasks related to configuring the
encryption node (switch), including:
v Generating the Critical Security Parameters (CSPs) and certificates
v Loading and setting up the certificates
v Establishing a trusted link (LKM Appliance)
v Configuring the global parameters and policies of the encryption group
v Generating and backing up the master key in RSA environments
v Handling key-vault high-availability
v Configuring cluster interconnect
After completing the pre-initialization tasks, you may need to perform several
tasks related to configuring the encryption group. Figure 14 on page 27
summarizes the flow of the encryption-configuration tasks.
26
SAN32B-E4 Installation, Service, and User Guide
command from the workstation. This command provides information about the
switch and its port status.
fabricShow command from the workstation. This command provides general
information about the fabric.
configUpload command and following the prompts.
This command uploads the switch configuration to the server, making it
available for downloading to a replacement switch if necessary.
Lifecycle Manager (TKLM) Environments for the procedures to configure the
encryption functions.

Advertisement

Table of Contents
loading

Table of Contents