Brocade Fabric OS Encryption Administrator’s Guide Support Manual de usuario Pagina 270

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 300
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 269
252 Fabric OS Encryption Administrator’s Guide (LKM/SSKM)
53-1002925-01
Brocade Encryption Switch removal and replacement
6
11. Initialize the new Brocade Encryption Switch node using following command.
Admin:switch> cryptocfg –-initnode
12. Zeroize the new Brocade Encryption Switch using the following command.
Admin:switch> cryptocfg –-zeroizeEE
13. Initialize the new EE using the following command.
Admin:switch> cryptocfg –-initEE
14. Register the new EE using the following command.
Admin:switch> cryptocfg –-regEE
15. Enable the new EE using the following command.
Admin:switch> cryptocfg –-enableEE
16. Invoke the following command to clean up the WWN base on the new Brocade Encryption
Switch if it was used earlier.
Admin:switch> cryptocfg –-reclaim -cleanup
17. From the new Brocade Encryption Switch node, invoke the following command to export the CP
certificate of the new Brocade Encryption Switch.
Admin:switch> cryptocfg --export -scp -CPcert <host IP> <host user> <host file
path>
18. From the group leader node, invoke the following command to import the new Brocade
Encryption Switch node certificate on the group leader node.
Admin:switch> cryptocfg --import -scp <Certificate file name> <host IP> <host
user> <host file path>
19. From the group leader node, run the following command to register the new Brocade
Encryption Switch node as a member node on the group leader.
Admin:switch> cryptocfg --reg -membernode <New BES WWN> <Cert file Name> <Old
IP address>
20. Register the node KAC Cert on the LKM/SSKM cluster (both the primary and secondary
LKM/SSKMs).
21. Establish the trusted link with both the primary and secondary LKM/SKMs from this node.
22. Invoke the following command on the new node:
Admin:switch> cryptocfg --dhchallenge <Key Vault IP>
23. Approve the TEP for this node on the LKM/SSKM.
24. Invoke the following command on the new node after approval of the trustee on LKM/SSKM.
Admin:switch> cryptocfg --dhresponse <Key Vault IP>
25. Remove the trustee link for the failed node from the LKM/SSKM appliances.
26. Check the EE state using the following command to ensure that the EE is online.
Vista de pagina 269
1 2 ... 265 266 267 268 269 270 271 272 273 274 275 ... 299 300

Comentarios a estos manuales

Sin comentarios