Brocade Fabric OS Encryption Administrator’s Guide Support Manual de usuario Pagina 58

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 324
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 57
38 Fabric OS Encryption Administrator’s Guide (SKM/ESKM)
53-1002923-01
Steps for connecting to an ESKM/SKM appliance
2
Importing a signed KAC certificate into a switch
After a KAC CSR has been submitted and signed by a CA, the signed certificate must be imported
into the switch.
NOTE
This operation can be performed only after the switch is added to the encryption group.
1. Select Configure > Encryption from the menu task bar to display the Encryption Center
dialog box. (Refer to Figure 1 on page 14.)
2. Select a switch from the Encryption Center Devices table, then select Switch > Import
Certificate from the menu task bar.
The Import Signed Certificate dialog box displays. (Refer to Figure 12.)
FIGURE 12 Import Signed Certificate dialog box
3. Browse to the location where the signed certificate is stored, then click OK.
The signed certificate is stored on the switch.
ESKM/SKM key vault high availability deployment
The ESKM/SKM key vault has high availability clustering capability. ESKM/SKM appliances can be
clustered together in a transparent manner to the end user. Encryption keys saved to one key vault
are synchronously hardened to the cluster pairs. Refer to the HP ESKM/SKM Appliance user
documentation for configuration requirements and procedures.
The configured primary and secondary HP ESKM/SKM appliances must be registered with the
encryption switch or blade to begin key operations. You can register only a single ESKM/SKM if
desired. In that case, the HA features are lost, but the archived keys are backed up to any other
non-registered cluster members. Beginning with Fabric OS 6.3.0, the primary and secondary
appliances must be clustered.
Both ESKM/SKM appliances in the cluster can be registered using the following command.
cryptocfg --reg -keyvault <cert label> <certfile> <hostname/ip address>
<primary | secondary>
Vista de pagina 57
1 2 ... 53 54 55 56 57 58 59 60 61 62 63 ... 323 324

Comentarios a estos manuales

Sin comentarios