San encryption configuration, Chapter 20, Chapter 20, “san encryption configuration – Brocade Network Advisor SAN User Manual v12.3.0 User Manual

Page 745: Chapter

Advertising
background image

Brocade Network Advisor SAN User Manual

693

53-1003154-01

Chapter

20

SAN Encryption Configuration

In this chapter

Encryption Center features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 694

Encryption user privileges. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695

Smart card usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 696

Network connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 707

Blade processor links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 707

Encryption node initialization and certificate generation. . . . . . . . . . . . . . 708

Key Management Interoperability Protocol . . . . . . . . . . . . . . . . . . . . . . . . . 709

Supported encryption key manager appliances . . . . . . . . . . . . . . . . . . . . . 712

Steps for connecting to a DPM appliance . . . . . . . . . . . . . . . . . . . . . . . . . . 713

Steps for connecting to an LKM/SSKM appliance . . . . . . . . . . . . . . . . . . . 718

Steps for connecting to an ESKM/SKM appliance . . . . . . . . . . . . . . . . . . . 723

Steps for connecting to a TEKA appliance. . . . . . . . . . . . . . . . . . . . . . . . . . 734

Steps for connecting to a TKLM appliance . . . . . . . . . . . . . . . . . . . . . . . . . 739

Steps for connecting to a KMIP-compliant SafeNet KeySecure . . . . . . . . . 743

Steps for connecting to a KMIP-compliant keyAuthority . . . . . . . . . . . . . . . 762

Encryption preparation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 763

Creating a new encryption group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 764

Adding a switch to an encryption group. . . . . . . . . . . . . . . . . . . . . . . . . . . . 801

Replacing an encryption engine in an encryption group . . . . . . . . . . . . . . 807

High availability clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 808

Configuring encryption storage targets . . . . . . . . . . . . . . . . . . . . . . . . . . . . 811

Configuring hosts for encryption targets . . . . . . . . . . . . . . . . . . . . . . . . . . . 820

Adding target disk LUNs for encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . 822

Adding target tape LUNs for encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . 829

Moving targets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 832

Configuring encrypted tape storage in a multi-path environment . . . . . . . 833

Tape LUN write early and read ahead . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 834

Tape LUN statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 835

Encryption engine rebalancing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 840

Master keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 841

Security settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 850

Zeroizing an encryption engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 850

Advertising