Encryption preparation – Brocade Fabric OS Encryption Administrator’s Guide Supporting Key Management Interoperability Protocol (KMIP) Key-Compliant Environments (Supporting Fabric OS v7.1.0) User Manual

Page 67

Advertising
background image

Fabric OS Encryption Administrator’s Guide (KMIP)

49

53-1002747-02

Encryption preparation

2

8. Under Restore Backup, select Upload from browser, then enter a file name or browse to the file

location.

9. Enter the Backup Password in the field provided, then click Restore.

10. After the certificate is restored to the secondary node from the previously backed-up primary

node, select Maintenance > Services.

The Services Configuration page displays (

Figure 40

).

NOTE

A message displays, advising that the secondary node requires a restart.

FIGURE 40

KeySecure Services Configuration page

11. Under Restart/Halt, select Restart, then click Commit and wait until the restart is completed.

The primary and second KeySecure nodes are now in a cluster and active for use.

Encryption preparation

Before you use the encryption setup wizard for the first time, you should have a detailed
configuration plan in place and available for reference. The encryption setup wizard assumes the
following:

You have a plan in place to organize encryption devices into encryption groups.

If you want redundancy and high availability in your implementation, you have a plan to create
high availability (HA) clusters of two encryption switches or blades to provide failover support.

All switches in the planned encryption group are interconnected on an I/O synch LAN.

The management ports on all encryption switches and DCX Backbone Chassis CPs that have
encryption blades installed, have a LAN connection to the SAN management program and are
available for discovery.

A supported key management appliance is connected on the same LAN as the encryption
switches, DCX Backbone Chassis CPs, and the SAN Management program.

Advertising