Brocade Fabric OS Encryption Administrator’s Guide Supporting Key Management Interoperability Protocol (KMIP) Key-Compliant Environments (Supporting Fabric OS v7.1.0) User Manual

Page 147

Advertising
background image

Fabric OS Encryption Administrator’s Guide (KMIP)

129

53-1002747-02

Viewing and editing encryption group properties

2

When the first encryption engine comes back online, the encryption group’s failback
setting determines whether the first encryption engine automatically resumes encrypting
and decrypting traffic to its encryption targets. In manual mode, the second encryption
engine continues handling the traffic until you manually invoke failback using the CLI, or
until the second encryption engine fails.

Key Vault Type: Options are:

RSA Data Protection Manager (DPM): If an encryption group contains mixed firmware
nodes, the Encryption Group Properties Key Vault Type name is based on the firmware
version of the Group Leader. For example, If a switch is running Fabric OS 7.1.0 or
later, the Key Vault Type is displayed as “RSA Data Protection Manager (DPM).”If a
switch is running a Fabric OS version prior to v7.1.0, Key Vault Type is displayed as
“RSA Key Manager (RKM)”.

NetApp Lifetime Key Manager (LKM): The NetApp Key Vault Type name is shown as
NetApp Lifetime Key Manager (LKM) for both NetApp Lifetime Key Manager (LKM) and
SafeNet KeySecure for key management (SSKM) Key Vault Types.)

HP Secure Key Manager (SKM): The HP Key Vault Type name is shown as HP Secure
Key Manager (SKM) for both SKM and Enterprise Secure Key Management (ESKM)
Key Vault Types.

Thales e-Security keyAuthority (TEKA): If an encryption group contains mixed firmware
nodes, the Encryption Group Properties Key Vault Type name is based on the firmware
version of the Group Leader. For example, If a switch is running Fabric OS 7.1.0 or
later, the Key Vault Type is displayed as “Thales e-Security keyAuthority (TEKA).”If a
switch is running a Fabric OS version prior to v7.1.0, Key Vault Type is displayed as
“Thales Key Manager (TEMS)”.

Tivoli Key Lifetime Manager (TKLM)

Key Management Interoperability Protocol (KMIP): Any KMIP-compliant server can be
registered as a key vault on the Brocade Encryption Switch after setting the key vault
type to KMIP.

Currently, only KMIP with SafeNet KeySecure for key management (SSKM) native
hosting LKM is supported.

REPL Support: (For DPM key vault only.) Shown as Not Applicable.

Primary Key Vault IP Address: The IP address of the primary key vault, either IPv4 or host
name.

Primary Key Vault Connection Status: The status of the primary key vault link. In an
operating environment, the status should be Connected. Other options are:

Unknown/Busy

Not configured

Not responding

Failed authentication

Backup Key Vault IP Address: (Optional.) The IP address of the backup key vault. This field
can be left blank.

Backup Key Vault Connection Status: The status of the backup key vault link. Options are:

Connected

Unknown/Busy

Not configured

Advertising