Brocade Fabric OS Command Reference Manual Supporting Fabric OS v6.4.0 (53-1001764-01, March 2010)
Fabric OS Command Reference 151
53-1001764-01
cryptoCfg
2
ensure the same username is configured on all nodes. Different encryption
groups can use different usernames so long as all nodes in the group have
the same username. Changing the username using -KAClogin renders the
previously created keys inaccessible. When changing the username you must
do the same on the key vault, and you must change the key owner for all keys
of all LUNs through the SKM GUI. For downgrade considerations, refer to the
Fabric OS Encryption Administrator’s Guide.
--show Displays node configuration information. This command requires one of the
following mutually exclusive operands:
-localEE Displays encryption engine information local to the node.
-file -all Displays all imported certificates. The -all parameter is required with the
--show -file command.
--rebalance [slot]
Rebalances the disk and tape containers to maximize throughput.
Rebalancing is recommended after containers have been added, removed,
moved, failed over, and failed back. This is a disruptive operation. You may
have to restart backup applications after rebalancing is complete. Optionally
specify a slot number on bladed systems.
Function 2. Encryption group configuration
Synopsis cryptocfg --help -groupcfg
cryptocfg --create -encgroup encryption_group_name
cryptocfg --delete -encgroup encryption_group_name
cryptocfg --reg -keyvault cert_label certfile hostname | ip_address primary | secondary
cryptocfg --dereg -keyvault cert_label
cryptocfg --reg -KACcert signed_certfile primary | secondary
cryptocfg --set -keyvault LKM | RKM | SKM | TEMS
cryptocfg --set -failbackmode auto | manual
cryptocfg --set -hbmisses value
cryptocfg --set -hbtimeout value
cryptocfg --set -quorumsize value
cryptocfg --set -systemcard enable | disable
cryptocfg --set -replication enable | disable
cryptocfg --add -membernode node_WWN
cryptocfg --eject -membernode node_WWN
cryptocfg
--leave_encryption_group
cryptocfg --genmasterkey
cryptocfg --exportmasterkey [-file]
cryptocfg --recovermasterkey currentMK | alternateMK -keyID keyID | -srcfile filename
cryptocfg --show -groupcfg