![IBM SAN384B-2 Installation, Service And User Manual Download Page 78](http://html1.mh-extra.com/html/ibm/san384b-2/san384b-2_installation-service-and-user-manual_608950078.webp)
v
Refer to the "Steps for connecting to a TKLM appliance" section of the
Fabric OS
Encryption Administrator’s Guide Supporting Tivoli Key Lifecycle Manager (TKLM)
Environments
for detailed information on initial setup. That section includes the
following information:
– All switches you plan to include in an encryption group must have a secure
connection to the Tivoli Key Lifecycle Manager (TKLM). A local LINUX host
must be available to transfer certificates.
– Be sure that the clock time on the TKLM server and on the Brocade
encryption nodes are the same. A difference of only a few minutes can cause
the TLS connectivity to fail.
– Repeat the same steps for configuring both the primary and the secondary
key vault.
– Both the primary and secondary key vaults should be registered before
exporting MK or encrypting LUNs. If the secondary key vault is registered
midway after encryption is done for some of the LUNs, then the key database
should be backed up and restored on the secondary TKLM from the already
registered primary TKLM before registering the secondary TKLM.
– The following is a suggested order for the initial steps needed to create a
secure connection to TKLM. (Refer to the "Steps for connecting to a TKLM
appliance" section of the
Fabric OS Encryption Administrator’s Guide Supporting
Tivoli Key Lifecycle Manager (TKLM) Environments
for additional steps.)
1.
Initialize all encryption nodes to generate Key authentication center (KAC)
certificates and export the signed KAC certificates to a local LINUX host.
2.
Obtain the necessary user credentials and log in to the TKLM server
appliance from the TKLM management web console.
Configuring for encryption (optional)
Summary of procedure
The optional FS8-18 encryption blade requires configuration to enable the
configuration functions. This section provides a brief overview of those
configuration steps. Refer to the
Fabric OS Encryption Administrator’s Guide (TKLM
Key Management)
for the detailed procedures to configure the encryption functions.
Note:
If the encryption blade (FS8-18) is being configured for the first time for encryption
services, you will need to perform several pre-initialization tasks related to
configuring the encryption node (switch), including:
v
Generating the Critical Security Parameters (CSPs) and certificates
v
Loading and setting up the certificates
v
Establishing a trusted link (LKM Appliance)
v
Configuring the global parameters and policies of the encryption group
v
Generating and backing up the master key in RSA environments
v
Handling key-vault high-availability
v
Configuring cluster interconnect
After completing the pre-initialization tasks, you may need to perform several
tasks related to configuring the encryption group. Figure 18 on page 47
summarizes the flow of the encryption-configuration tasks.
46
SAN384B-2 Installation, Service, and User Guide
Summary of Contents for SAN384B-2
Page 2: ......
Page 8: ...vi SAN384B 2 Installation Service and User Guide ...
Page 12: ...x SAN384B 2 Installation Service and User Guide ...
Page 14: ...xii SAN384B 2 Installation Service and User Guide ...
Page 16: ...xiv SAN384B 2 Installation Service and User Guide ...
Page 28: ...xxvi SAN384B 2 Installation Service and User Guide ...
Page 32: ...xxx SAN384B 2 Installation Service and User Guide ...
Page 82: ...50 SAN384B 2 Installation Service and User Guide ...
Page 146: ...114 SAN384B 2 Installation Service and User Guide ...
Page 172: ...140 SAN384B 2 Installation Service and User Guide ...
Page 188: ...156 SAN384B 2 Installation Service and User Guide ...
Page 189: ......
Page 190: ... Part Number 98Y2654 Printed in USA GA32 0894 03 1P P N 98Y2654 ...