
768
Brocade Network Advisor SAN User Manual
53-1003154-01
Creating a new encryption group
20
-
Thales e-Security keyAuthority (TEKA): If an encryption group contains mixed firmware
nodes, the Encryption Group Properties Key Vault Type name is based on the firmware
version of the Group Leader. For example, If a switch is running Fabric OS 7.1.0 or
later, the Key Vault Type is displayed as “Thales e-Security keyAuthority (TEKA).”If a
switch is running a Fabric OS version prior to v7.1.0, Key Vault Type is displayed as
“Thales Key Manager (TEMS)”.
-
Tivoli Key Lifecycle Manager (TKLM)
-
Key Management Interoperability Protocol (KMIP): Any KMIP-compliant server can be
registered as a key vault on the switch after setting the key vault type to KMIP.
If you are using a SafeNet KeySecure server, only SafeNet KeySecure for key
management (SSKM) native hosting LKM is supported from the Management
application; however, before selecting KMIP as the key vault type, all nodes in an
encryption group must be running Fabric OS 7.1.0 or later.
If you are using a TEKA KMIP-compliant server, only Thales e-Security keyAuthority
running version 4.0 is supported (from the CLI); however, all nodes in an encryption
group must be running Fabric OS 7.2.0 or later. For more information about supported
platforms and configuration instructions, refer to the
Fabric OS Encryption
Administrator’s Guide Supporting Key Management Interoperability Protocol (KMIP)
Key-Compliant Environments
.
•
Primary Key Vault: The primary key vault name, either an IPv4 address or Host name.
•
Primary Certificate File: The name of a file containing the key vault’s public key certificate.
This file can be generated from the key vault’s administrative console.
•
User Name: The key vault user name. This field is active for ESKM/SKM and TEKA key
vaults. For ESKM/SKM, it is needed only for the primary key vault. For TEKA, it is needed
only for the secondary key vault.
•
Password: The key vault password. This field is active for ESKM/SKM and TEKA key vaults.
For ESKM/SKM, it is needed only for the primary key vault. For TEKA, it is needed for both
the primary and secondary key vaults.
•
Re-type Password: Re-enter the password for verification.
•
Backup Key Vault:
(Optional.)
The secondary key vault, either an IPv4 address or Host
name. The backup address can be left blank.
•
Backup Certificate File:
(Optional.)
If a backup key vault is entered, the backup certificate
file must also be entered. Navigate to and select the secondary public key certificate from
your desktop, if applicable.
•
Serial Number: (
TKLM only
.) Serial number of the switch, which is required for registering
the switch on the key vault.
•
Device Group: (
TKLM only
.) The name of the device group of which the switch is a member.
This information is required for registering the switch on the key vault.
Summary of Contents for Network Advisor 12.3.0
Page 4: ...iv Brocade Network Advisor SAN User Manual 53 1003154 01...
Page 86: ...34 Brocade Network Advisor SAN User Manual 53 1003154 01 Uninstalling a patch 2...
Page 190: ...138 Brocade Network Advisor SAN User Manual 53 1003154 01 Fabric tracking 4...
Page 216: ...164 Brocade Network Advisor SAN User Manual 53 1003154 01 User profiles 5...
Page 612: ...560 Brocade Network Advisor SAN User Manual 53 1003154 01 Exporting Host port mapping 13...
Page 620: ...568 Brocade Network Advisor SAN User Manual 53 1003154 01 Exporting storage port mapping 14...
Page 720: ...668 Brocade Network Advisor SAN User Manual 53 1003154 01 Security configuration deployment 17...
Page 744: ...692 Brocade Network Advisor SAN User Manual 53 1003154 01 Configuring Virtual Fabrics 19...
Page 1068: ...1016 Brocade Network Advisor SAN User Manual 53 1003154 01 Removing thresholds 24...
Page 1098: ...1046 Brocade Network Advisor SAN User Manual 53 1003154 01 Swapping blades 25...
Page 1176: ...1124 Brocade Network Advisor SAN User Manual 53 1003154 01 SAN connection utilization 28...
Page 1378: ...1326 Brocade Network Advisor SAN User Manual 53 1003154 01 Event logs 32...
Page 1448: ...1396 Brocade Network Advisor SAN User Manual 53 1003154 01 Upload failure data capture 34...
Page 1490: ...1438 Brocade Network Advisor SAN User Manual 53 1003154 01 SAN shortcut menus A...
Page 1494: ...1442 Brocade Network Advisor SAN User Manual 53 1003154 01 Call Home Event Tables B...
Page 1524: ...1472 Brocade Network Advisor SAN User Manual 53 1003154 01 About Roles and Access Levels D...
Page 1552: ...1500 Brocade Network Advisor SAN User Manual 53 1003154 01 Regular Expressions F...
Page 1920: ...1868 Brocade Network Advisor SAN User Manual 53 1003154 01 Views H...