Administrator's Guide Supporting HP Secure Key Manager (SKM) and HP Enterprise Secure Key Manager (ESKM) Environments (Supporting Fabric OS v7.2.0) Instruction Manual
Fabric OS Encryption Administrator’s Guide (SKM/ESKM) 301
53-1002923-01
using the CLI, 248
removing an encryption engine using the CLI
, 243
removing engines
, 59, 156
removing engines from
, 59
replacing a member using the CLI
, 245
requirements for
, 57
rules
, 57, 154
swapping engines
, 59, 156
HA clusters tab
encryption group properties
HA clusters tab
, 121
high availability
deployment
, 38
high availability cluster
adding an appliance
, 36
creating
, 35
hosts
configuring for encryption targets
, 69
HP-UX considerations
, 227
http
//www.gemalto.com/readers/index.html
, 16
I
import commands, --import, 145, 151
initialize commands
--initEE
, 250
initEE
, 144
--initnode
, 143, 250
initializing
encryption switch using the CLI
, 143
initiator target zones
creating
, 164
initiators, removing from CryptoTarget container
, 170
initiator-target zone, creating
, 164
K
KAC certificate
importing into a switch
, 38
KAC certificates
signing
, 37
KEK security processor status
, 292
Key IDs
exporting
, 160
key vault deregistration
, 40, 149
key vault settings
configuring
, 45
key vaults
connections between encryption nodes
, 9
entering the IP address or host name for
, 46
KMS server
enabling SSL
, 34
L
labeling
CommVault Galaxy
, 191
NetBackup
, 191
NetWorker
, 191
latency in re-key operations
, 233
license, adding
, 5
licensing
best practices
, 5
LKM
support for high availability (HA)
, 35, 141
local CA
setting up on ESKM/SKM
, 32
local CA certificate
copying for a clustered appliance
, 35
downloading from ESKM/SKM
, 33
LUN
adding Crypto LUN to CryptoTarget container
, 174
adding to a CryptoTarget container
, 173
choosing to be added to an encryption target
container
, 78
configuration warning
, 167, 169, 171, 172, 173, 174,
175, 179, 180, 181
configuring for first-time encryption
, 194
configuring for multi-path example
, 182
configuring policies using the CLI
, 176
force-enabling for encryption
, 188, 189
impact of policy changes
, 181
modifying parameters using the CLI
, 180
multi-path configuration requirements
, 168
policy parameters
, 180
removing Crypto LUN to CryptoTarget container
, 179
setting policy for automatic re-keying
, 198
lun decommissioning
both primary and secondary luns
, 188
primary luns only
, 187
secondary luns only
, 187
lun discovery
, 173
lun rebalancing
when hosting both disk and tape targets
, 167