Network connections – Brocade Fabric OS Encryption Administrator’s Guide Supporting Key Management Interoperability Protocol (KMIP) Key-Compliant Environments (Supporting Fabric OS v7.1.0) User Manual

Page 44

Advertising
background image

26

Fabric OS Encryption Administrator’s Guide (KMIP)

53-1002747-02

Network connections

2

2. Insert the smart card into the card reader.

3. After the card’s ID is displayed by the card reader in the Card ID field, enter the security

administrator password used to allow editing of the smart card, then click Login.

NOTE

The Card Password field is activated after the card ID is read, and the Login button is activated
after the password is entered in the Card Password field.

4. Edit the card as needed. Note the following:

Card Assignment: A maximum of 64 characters is permitted for the user first and last
name to whom the card is assigned. All characters are valid in the editable columns,
including spaces.

Notes: A maximum of 256 characters is permitted for any miscellaneous notes. Editing
these values in BNA does not modify the information that is stored on the card. Notes are
optional.

The Change Password check box must be selected before you can enter the new password
information. You must re-enter the new password for verification.

5. Click OK.

NOTE

You can view the status indicator at the bottom of the dialog box to determine card reader status.

Network connections

Before you use the encryption setup wizard for the first time, you must have the following required
network connections:

The management ports on all encryption switches and DCX Backbone Chassis CPs that have
encryption blades installed must have a LAN connection to the SAN management program,
and must be available for discovery.

A supported key management appliance must be connected on the same LAN as the
management port, which supports of the encryption switches, DCX Backbone Chassis CPs,
and the SAN Management program.

In some cases, you might want to have an external host available on the LAN to facilitate
certificate exchange between encryption nodes and the key management appliance. You may
use the SAN management program host computer rather than an external host.

All switches in the planned encryption group must be interconnected on a private LAN using
the eth-0 and eth-1 ports located on the encryption switch or encryption blade. (We refer to
these ports as RJ-45 gigabit Ethernet ports (labeled eth0 and eth1) for clustering and
centralized management of multiple encryption switches through a group leader.)

Advertising