Encryption center features – Brocade Fabric OS Encryption Administrator’s Guide Supporting Key Management Interoperability Protocol (KMIP) Key-Compliant Environments (Supporting Fabric OS v7.1.0) User Manual

Page 32

Advertising
background image

14

Fabric OS Encryption Administrator’s Guide (KMIP)

53-1002747-02

Encryption Center features

2

Viewing and editing encryption group properties . . . . . . . . . . . . . . . . . . . . 126

Encryption-related acronyms in log messages . . . . . . . . . . . . . . . . . . . . . . 140

Encryption Center features

The Encryption Center dialog box is the single launching point for all encryption-related
configuration in the Brocade Network Advisor (BNA) Management application (

Figure 6

). It also

provides a table that shows the general status of all encryption-related hardware and functions at a
glance. To open the dialog box, select Configure > Encryption.

FIGURE 6

Encryption Center dialog box

Beginning with Fabric OS 6.4, the Encryption Center is dynamically updated to reflect the latest
changes based on any of the following events:

Encryption group creation or deletion.

A change in encryption group status or encryption engine status

Addition or removal of an encryption group member or encryption engine

If you are using the Encryption Center for the first time, please read the following topics before you
begin to perform encryption operations:

“Encryption user privileges”

on page 15 describes the Role-based Access Control privileges

that are specific to encryption.

“Smart card usage”

on page 16 and the topics that follow describe the options available for the

use of Smart Cards for user authentication, system access control, and storing backup copies
of data encryption master keys.

“Network connections”

on page 26 describes the network connections that must be in place to

enable encryption.

“Blade processor links”

on page 27 describes the steps for interconnecting encryption

switches or blades in an encryption group through a dedicated LAN. This must be done before
the encryption engines are enabled. Security parameters and certificates cannot be
exchanged if these links are not configured and active.

“Encryption node initialization and certificate generation”

on page 28 lists the security

parameters and certificates that are generated when an encryption node is initialized.

Advertising