Administrator's Guide Supporting NetApp Lifetime Key Manager (LKM) and KeySecure Storage Secure Key Manager (SSKM) Environments (Supporting Fabric OS v7.2.0) User Manual
Fabric OS Encryption Administrator’s Guide (LKM/SSKM) 95
53-1002925-01
Viewing and editing switch encryption properties
2
• Group Member
• Leader-Member Comm
• Error
• Discovering
• Not a member
- Encryption Group: The name of the encryption group to which the switch belongs
- Encryption Group Status: Status options are:
• OK/Converged: The group leader can communicate with all members
• Degraded: The group leader cannot communicate with one or more members. The
following operations are not allowed: key vault changes, master key operations,
enable/disable encryption engines, Failback mode changes, HA Cluster creation or
addition (removal is allowed), tape pool changes, and any configuration changes for
storage targets, hosts, and LUNs.
• Unknown: The group leader is in an unmanaged fabric
- Fabric: The name of the fabric to which the switch belongs
- Domain ID: The domain ID of the selected switch
- Firmware Version: The current encryption firmware on the switch.
- Key Vault type: Primary Key Vault Link Key Status/Backup Key Vault Link Key Status:
Status options are:
• No Link Keys, ready to establish: No access request has been sent to an LKM, or a
previous request was not accepted.
• Link key requested, waiting for LKM approval: A request has been sent to LKM and is
waiting for the LKM administrator’s approval.
• Created, not validated: An interim state until first used Link Key valid, online: (LKM
only) a shared link key exists and has been successfully used.
- Primary Key Vault Connection Status/Backup Key Vault Connection Status: Whether the
primary key vault link is connected. Options are:
• Unknown/Busy
• Key Vault Not Configured
• No Response
• Failed authentication
• Connected.
• Key Vault User Name button: (TEKA key vault only.) Shown as inactive.
• Public Key Certificate Request text box: The switch’s KAC certificate signing request, which
must be signed by a certificate authority (CA). The signed certificate must then be imported
onto the switch and onto the primary and backup key vaults.
- Export button: Exports the public key certificate in CSR format to an external file for signing
by a certificate authority (CA).
- Import button: Imports a signed public key certificate.
• Encryption Engine Properties table: The properties for the encryption engine. There may be
0 to 4 slots, one for each encryption engine in the switch.
- Current Status: The status of the encryption engine. Many possible values exist. Common
options are: