Hp Secure Key Manager User Manual

Browse online or download User Manual for Storage Hp Secure Key Manager. HP Secure Key Manager User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 327
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews

Summary of Contents

Page 1 - Secure Key Manager

HP StorageWorksSecure Key Managerusers guideAJ087-96011Part number: AJ087–960112nd edition: November 2008

Page 2

CRLcommands ... 264Clienteventlogcommands ... 267Deviceresetandrestorecommands ...

Page 3 - Contents

Table 18 Netstat Information section componentsComponent DescriptionRunClick Run to see a list of all active network connections on the SKM.Reading Ne

Page 4

A SKM appliance information sheetThe information on this sheet is specific to the HP StorageWorks Secure Key Manager (SKM) appliance towhich it is atta

Page 5

Figure 34 Back of SKM applianceItemDescription1Serial number of the appliance2Product ID number (PID) of the appliance3Pull-out panel that also shows

Page 6

B Using the Management ConsoleLogging in and outUse the Administrator Authentication screen to log into the Management Console.Figure 35 Viewing the A

Page 7

Figure 37 Viewing the Security Summary sectionClick the High Security page link to access the High Security page. You can enable FIPS compliancefrom t

Page 8

Table 21 System Summary section componentsComponent DescriptionProductDisplays your platform.Unit IDDisplays your Unit ID.Software Version Displays th

Page 9

Figure 40 Viewing the Search Criteria sectionThe following table describes the components of the Search Criteria section.Table 23 Search Criteria sect

Page 10

Filtering sectionsSome sections of the Management Console normally hold many rows of data. Key and Local Userssections may span multiple pages. Use th

Page 11

Figure 44 Locating button to launch context-sensitive helpClicking this icon opens the documentation for the specific section in a new window. (Subsequ

Page 12

The Key and Policy Configuration page enables you to create, import, and manage keys. This pagecontains the following sections:•Keys• Key Properties•Gr

Page 13

Italiannotice ... 307Latviannotice... 308Lithuaniannotice ...

Page 14

Figure 47 Viewing the Key sectionThe following table describes the components of the Keys section.110Using the Management Console

Page 15

Table 27 Keys section componentsComponent DescriptionQuerySelect the query to apply to the pageRun QuerySelect this button to run a query. This Manage

Page 16

key. Instead it gives a new name to the existing metadata and key bytes. To create a copy of an existingkey,usetheCloneKeysection.Figure 48 Viewing th

Page 17

key version’s state permits the operation, and the request comes from a member of the permitted group.A key can have a maximum of 4000 versions.Group

Page 18

For non-global keys, if a user is not the owner and is not a member of a group with permissions to use thekey, the user cannot access the key.The owne

Page 19

Figure51ViewingtheKeyVersionsandAvailableUsagesectionTable 31 Key Versions and Available Usage section componentsComponent DescriptionVersionDisplays

Page 20

Create QueryUse this section to create key queries. A key query enables you to view a subset of the keys that exist ontheSKM.Thissection enables you t

Page 21 - 1 Installing and replacing

Figure 54 Viewing Saved Queries sectionTable 34 Saved Queries section componentsComponent DescriptionQuery NameDisplaysthenameofthequery.DescriptionDi

Page 22 - Rack planning r

Table 35 Modify Query section componentsComponent DescriptionQuery NameThe name of the query. This field is only required when saving the query. You ca

Page 23 - Optimum environment

Table 36 Create Key section componentsComponent DescriptionKey NameThis is the name that the server uses to refer to the key. The key name must begin

Page 24 - Power requirements

Figures1Identifythecontentsoftheshippingcarton... 262Connect the powersuppliestoACpowersources ... 293Viewing the Cer

Page 25 - Unpacking

Figure 57 Viewing the Clone Key sectionTable 37 Clone Key section componentsComponent DescriptionNew Key NameThis is the name that the server uses to

Page 26 - Selecting a rack location

Figure 58 Viewing the Import Key sectionThe following table describes the components of the Import Key section.Table 38 Import Key section componentsC

Page 27 - Removing an exi

Authorization Policy Configuration PageAn authorization policy enables you to limit how a group may use a key. You implement an authorizationpolicy whe

Page 28 - Attaching the cables

Figure 59 Viewing the Authorization Policies sectionThe following table describes the components of the Authorization Policies section.Table 39 Author

Page 29

• User1 can make only 100 more requests between 11:31 AM and 11:59 AMNOTE:Had the limit been lowered to 75, User1 would only be allowed to make 25 mor

Page 30

Active VersionsUse this section to configure the number of active versions allowed for a versioned key. Active versionsof a key can be used for both en

Page 31 - 2Configuring the system

Figure 63 Viewing the Custom Key Attributes sectionTable 43 Custom Key Attributions section componentsComponents DescriptionAttribute NameEnter a uniq

Page 32 - Configuring the system

Local UsersUse the Local Users section to add or modify local users. Once a user has been created, you can changethe password butyou cannot change the

Page 33

NOTE:The User Administration Permission and Change Password Permission apply only tolocalusers. LDAPusers cannot be managed through the SKM; they must

Page 34 - Setting up the

Figure 66 Viewing the Custom Attributes sectionThe following table describes the components of the Custom Attributes section.Table 46 Custom Attribute

Page 35

34Back of SKM appliance... 10235ViewingtheAdministratorAuthenticationscreen... 10336Viewing the Logoutwindow

Page 36

Table 47 Local Groups section componentsComponent DescriptionGroupDisplays the local groups on the SKM.Add Click Add to add a group to the group list.

Page 37 - Establishing a cluster

LDAP Server ConfigurationLightweight Directory Access Protocol (LDAP) is a protocol that allows you to enable authentication ofyour KMS Serverbased on

Page 38 - Creating the cluster

Table 50 LDAP User Directory Properties section componentsComponent DescriptionServer IP or HostnameThe IP address or hostname of the primary LDAP ser

Page 39

Table 51 LDAP Schema Properties section componentsComponent DescriptionUser Base DNThe base distinguished name (DN) from which to begin the search for

Page 40

Table 52 LDAP Failover Server Properties section componentsComponent DescriptionFailover ServerIPorHostnameTheIPaddressorhostnameoftheLDAPservertousea

Page 41 - Copying the certificates

Table 53 LDAP Users section componentsComponent DescriptionUsernameDisplays the users that can access the SKM from the LDAP server.LDAP GroupsThe LDAP

Page 42 - Installing t

Figure 75 Viewing the User List sectionThe following table describes the components of the User List section.Table 55 LDAP Groups section componentsCo

Page 43 - 3Performingconfiguration and

Figure 76 Viewing the Certificate List sectionThe followingtable describes the components of the Certificate List section.Table 56 Certificate List secti

Page 44 - Deleting a key

CAUTION:If you are copying the certificate text into an application such as Microsoft Word, it is important toensure that no carriage returns/line feed

Page 45 - User and group procedures

Table 57 Certificate Information section componentsComponent DescriptionCertificate Name Name of the certificate. This name is only used internally.Key S

Page 46 - Deleting a user

71ViewingtheLDAPSchemaPropertiessection ... 13272ViewingtheLDAPFailoverServerPropertiessection ... 13373Viewing the LDA

Page 47 - LDAP server procedures

Figure 78 Viewing the Certificate Installation sectionNOTE:When multiple certificates are nested in one certificate, the certificate is installed as a cer

Page 48 - Certificate procedures

Figure 79 Viewing the Self Signed Certificate sectionThe following table describes the components of the Self Signed Certificate section.Table 59 Self S

Page 49 - Secure Key Manager 49

Table 60 Create Certificate Request section componentsComponent DescriptionCertificate NameInternal name of a newly generated CR. This name will be used

Page 50 - Creating a client certificate

Table 61 Import Certificate section componentsComponent DescriptionSourceSpecify the method for importing the certificate to the SKM. If you are uploadi

Page 51 - Installing a certificate

Figure 82 Viewing the Trusted Certificate Authority List Profiles sectionThe following table describes the components of the Trusted Certificate Authorit

Page 52 - Downloading a certificate

Figure 84 Viewing the Trusted Certificate Authority List (Edit Mode)The following table describes the components of the Trusted Certificate Authority Li

Page 53

Table 65 Local Certificate Authority List section componentsComponent DescriptionCA NameDisplays the internal name of a certificate authority.CA Informa

Page 54 - Downloading a local CA

Figure 86 Viewing the CA Certifi cate Information sectionThe following table describes the components of the CA Certificate Information section.Table 66

Page 55 - Creating

Figure 87 Viewing the Sign Certificate Request sectionThe following table describes the components of the Sign Certificate Request section.Table 67 Sign

Page 56 - Removing a CA certificate

Table 68 Signed Certificates section componentsComponent DescriptionSerial NumberThe Serial Number, which is expressed in Base 16 notation, is assigned

Page 57 - KMS server procedures

108ViewingtheDateandTimeSettingssection... 181109ViewingtheNTPSettingssection ... 182110ViewingtheNetworkInter

Page 58 - Enabling the LDAP server

Create Local CAThe Create Local CA section allows you to create a new local CA on the SKM. The fields are similar tothose used to create a certificate o

Page 59 - Clustering procedures

Table69CreateLocalCertificate Authority section componentsComponent DescriptionCertificate AuthorityNameInternal name of newly generated certificate auth

Page 60 - Setting up SSL in a cluster

Figure 91 Viewing the CA Certificate List sectionThe following table describes the components of the CA Certificate List section.Table 70 CA Certificate

Page 61 - Date and time procedures

Figure 92 Viewing the Install CA Certificate sectionThe following table describes the components of the Install CA Certificate section.Table 71 Install

Page 62 - IP authorization procedures

certificates revoked by local CAs. The format of CRLs exported by the SKM is in PEM-encoded X.509format.Auto-UpdateEach CA promises to update its CRL a

Page 63 - SNMP procedures

Using advanced security featuresAdvanced security features provide the highest level of secure operation on the SKM. This sectiondiscusses the followi

Page 64

ClusteringClustering FIPS-compliant devices with non-FIPS-compliant devices will disable FIPS for all devices inthe cluster.BackupsFIPS and non-FIPS d

Page 65 - Changing your password

Table 72 FIPS Compliance section componentsComponent DescriptionIs FIPS CompliantIndicates if the SKM’s security configuration is consistent with FIPS

Page 66

Table 73 High Security Settings section componentsComponent DescriptionDisable Creationand Use of GlobalKeysDisables the ability to create and use glo

Page 67 - Revoking a credential grant

IMPORTANT:Modifyinganyof the items in the Security Settings Configured Elsewhere section immediately takes theSKM out of FIPS compliance.Figure 95 View

Page 68

14 5ViewingtheActivityLogsection... 23314 6ViewingtheCurrentActivityLogsection ... 234147Viewing the ClientE

Page 69

1. View the Security Protocols enabled on your Internet Browser. You must enable TLS 1.0 to accessthe Management Console while FIPS-compliant.2. Log i

Page 70

Table 75 FIPS Status Server testsTestpower-onConditionalDescriptionAES EncryptionXKnown Algorithm Test for the AES algorithm. This testis performed at

Page 71

Figure 96 Viewing the FIPS Status Report: normalThe following table describes the components of the FIPS Status Server Settings section.162Using the M

Page 72

Table 76 FIPS Status Report componentsComponent DescriptionProductDisplays the model of your device.Unit IDThe Unit ID is composed of alphanumeric cha

Page 73

Figure 97 Viewing the FIPS Status Server Settings sectionThe following table describes the components of the FIPS Status Server Settings section.Table

Page 74

In this scenario, the client application indicates that it is willing to perform an SSL resume (rather thana full handshake) by sending a previously n

Page 75

Figure 98 Viewing the SSL Options sectionNOTE:Changes to theSSL Options cause the KMS Server to restart, which takes the KMS offline for a fewseconds.T

Page 76

CAUTION:Exercise caution when modifying the SSL Cipher Order. Unless you are familiar with SSL Ciphers, youshould not rearrange the Cipher Order list.

Page 77

Configuring the KMS ServerThe HP StorageWorks Secure Key Manager allows you to off-load cryptographic operations fromapplication servers and other back

Page 78

When the client requests that the server generate a new key, it can specify that the key should beexportable and/or deletable. An exportable key is a

Page 79

Tables1CreateBackup:SecurityItemssectioncomponents... 872CreateBackup:DeviceItemssectioncomponents ... 883CreateBackup:B

Page 80 - Log configurati

Table 80 KMS Server Settings section componentsComponent DescriptionIPThis field specifies the IP address(es) on which the KMS Server is enabled on the

Page 81

Figure 101 Viewing the KMS Server Authentication Settings sectionThe following table describes the elements of the KMS Server Authentication Settings

Page 82 - Log view procedures

Table 81 KMS Server Authentication Settings section componentsComponent DescriptionUser DirectoryThis field determines whether the KMS Server uses a lo

Page 83 - 5. Click Clear

User Account Lockout SettingsUse the User Account Lockout Settings section to manage an account lockout policy.Figure 102 Viewing the User Account Loc

Page 84

Health CheckUse the Health Check section to enable the health check feature, and set the port and IP address.Figure 103 Viewing the Health Check secti

Page 85 - 4MaintainingtheSKM

the failure in the System Log and sends an SNMP trap indicating that the cluster is out of sync. Once adevice is out of sync, an administrator must sy

Page 86 - Backup and resto

During synchronization, an SKM will inherit a new list of local CAs from the cluster. The device’s oldlist of local CAs will be deleted. Should you ne

Page 87 - Create Backup: Device Items

Table 84 Cluster Members section componentsComponent DescriptionServer IPThe IP of the member device.Server PortTheportonwhichthedevicelistensforclust

Page 88 - Components Description

Table 85 Cluster Settings section componentsComponent DescriptionLocal IPThe IP of the current device. If the device has multiple network interfaces,

Page 89 - Restore Backup

Table 86 Create Cluster section componentsComponent DescriptionLocal IPThe IP of the current device. If the device has multiple network interfaces, th

Page 90 - Backup Restore Information

34SavedQueriessectioncomponents ... 11735ModifyQuerysectioncomponents ... 11836 CreateKeysectioncomponents..

Page 91 - Internal Backup List

Table87JoinClustersectioncomponentsComponent DescriptionLocal IPThe IP of the current device. If the device has multiple network interfaces, thepull-d

Page 92 - Services Configuration page

NOTE:Synchronizing the time causes the KMS Server to restart if the time change is greater than oneminute. While restarting, the KMS Server is unavail

Page 93 - Restart/Halt

NOTE:Any change to the Date and Time Settings section causes the KMS Server to restart, which takes theKMS offline for a few seconds.NTP SettingsUse th

Page 94 - System Informa

•PortSpeedSections• IP Authorization ProceduresNetwork Interfaces sectionsThe Network Configuration page contains the following network interface-relat

Page 95 - Software Upgrade/Install

Figure 111 Viewing the Default Gateway List sectionThe following table describes the components of the Default Gateway List section.Table 91 Default G

Page 96 - System Health page

All responses to incoming packets leave from 10.20.41.1 - except the responses to incoming packets fromthe 172.17.7.0 addresses (the local subnet of E

Page 97 - Power Supp

Figure 112 Viewing the Static Route List sectionThe followingtable describes the components of the Static Route List section.Table 92 Static Route Lis

Page 98 - Network Diagnostics page

Table 93 Hostname Setting section componentsComponent DescriptionHostnameThe hostname is the name used to identify the SKM on the network. It is origi

Page 99 - Netstat Information

CAUTION:The Port Speed/Duplex setting is an advanced feature that should only be used when you are certainof the port speed and duplex settings of the

Page 100 - Reading Netsta

Figure 116 Viewing the IP Authorization Settings sectionThe following table describes the components of the IP Authorization Settings section.Table 96

Page 101

72FIPSCompliancesectioncomponents ... 15773HighSecuritySettingssectioncomponents ... 15874Security Settings Confi

Page 102

Table 97 Allowed Client IP Addresses section componentsComponents DescriptionIP Address, Rangeor SubnetEnter IP addresses in the following formats:• s

Page 103 - Using the Home tab

SNMPv1/v2 rely on the concept of a community to provide a low level of security for communicationsbetween the NMS and agent. In an HP SNMPv1/v2 deploy

Page 104 - System Summary

Community: A community, also referred to as a community string, is used by the agent when it iscommunicating with an NMS running SNMPv1/v2. A communit

Page 105 - Search sc

Table 98 SNMP Agent Settings section componentsComponent DescriptionSNMP Agent IPThis field specifies the IP address on which SNMP is enabled. You can s

Page 106

Table 99 SNMPv1/SNMPv2 Community List section componentsComponent DescriptionCommunity NameCommunity names can contain only alphanumeric characters an

Page 107 - Accessing the Help system

Table 100 SNMPv3 Username List section componentsComponent DescriptionUsernameTheusernamedefines from whom the SKM accepts SNMP messages, and it is one

Page 108 - Using the Management Console

Table 101 SNMP Management Station List section componentsComponent DescriptionManager TypeThe SNMP version used on the NMS. All three versions of SNMP

Page 109

Table 102 SNMP Management Station Properties section componentsComponent DescriptionManager TypeTheSNMPversionusedontheNMS.AllthreeversionsofSNMParesu

Page 110

Figure123ViewingtheCreateSNMPManagementStationsectionThe following table describes the components of the Create SNMP Management Station section.198Usi

Page 111 - Key Properties

Table 103 Create SNMP Management Station section componentsComponent DescriptionManager TypeTheSNMPversionusedontheNMS.AllthreeversionsofSNMParesuppor

Page 112 - Versioned keys

Legal and notice information© Copyright 2007-2008 Hewlett-Packard Development Company, I.E.© Copyright 2000, 2008 Ingrian Networks, Inc.Confidential co

Page 113 - Group Permissions

110GrantaCredentialsectioncomponents ... 215111RemoteAdministrationSettingssectioncomponents ... 217112LDAPAdministra

Page 114 - Custom Attributes

• KMS Server Statistics. KMS Server statistics are available through the MIBs; for each statisticset, you can view the following: current requests per

Page 115 - RSA Public Key

• Multiple Credentials Overview• Multiple Credentials Sections• Multiple Credentials Procedures• Remote Administration Settings Overview• Remote Admin

Page 116 - Create Query

Using multiple administrator accountsMost likely, youwill want to create multiple administrators. When doing so, you should assign accesscontrols that

Page 117 - Modify Query

WARNING!It is absolutely crucial that you remember the passwords for all of your local administrators. For securityreasons, there is no way to reset a

Page 118 - Create Key

If you use LDAP administrators predominantly, at least one local administrator account must always exist,and that local administrator must be a High A

Page 119 - Clone Key

Create LDAP AdministratorThe Create Local Administrator and Create LDAP Administrator sections are the same except that theCreate LDAP Administrator s

Page 120 - Import Key

Table 104 Create LDAP Administrator section componentsComponent DescriptionUsernameEnter the loginname the administrator uses to access the SKM.Browse

Page 121

Select LDAP UsernameThe Select LDAP Username section enables you to browse and select an LDAP user when creating anLDAP administrator account.Figure 1

Page 122 - Authorization P

Password expirationThe password expiration feature allows you to specify a duration for administrator passwords. By default,this feature is disabled.

Page 123

Document the password policy and communicate it to all appropriate parties including security officersand other corporate personnel.Password Management

Page 124 - Authorized Usage Periods

1 Installing and replacinghardwareThis section details the steps to install or replace the SKM hardware:• Preparing for the installation• Rack plannin

Page 125 - Custom Key Attributes

NOTE:These settings do not apply to LDAP administrator passwords. LDAP administrator passwords are notsubject to any of the constraints that apply to

Page 126

NOTE:Changes made to this section (with the exception of the Password Expiration feature) apply to passwordscreated after the changes are saved. For e

Page 127 - Local Users

NOTE:Credential grants cannot be inherited. One administrator can grant only their credentials to one otheradministrator.An administrator can grant cr

Page 128 - Selected Local User

4. Enable the multiple credentials feature for the cluster by enabling the feature for one device withinthe cluster.System backupThe following informa

Page 129 - Local Groups

Table 108 Multiple Credentials for Key Administration section componentsComponent DescriptionRequire MultipleCredentialsSelect this checkbox to enable

Page 130 - User List

Figure 130 Viewing the Grant a Credential sectionThe following table describes the components of the Grant a Credential section.Table 110 Grant a Cred

Page 131 - LDAP Server Confi

Remote Administration SettingsThe Remote Administration Settings section is shown here.Figure 131 Viewing the Remote Administration Settings sectionTh

Page 132 - LDAP Sche

Table 111 Remote Administration Settings section componentsComponents DescriptionWeb AdminServer IPTheWebAdminServerIPaddressisthelocalIPaddressusedto

Page 133

LDAP Administrator ServerYou configure LDAP servers for administrators separately from LDAP servers for users. This allows forgreater flexibility, and s

Page 134 - LDAP Users

Figure 132 Viewing LDAP Administrator Server Properties sectionTable 112 LDAP Administrator Server Properties section componentsComponent DescriptionH

Page 135 - LDAP Groups

• Use a portable field service kit with a folding static-dissipating work mat.If you do not have any of the suggested equipment for proper grounding, h

Page 136 - Certificate List

Figure 133 Viewing LDAP Schema Properties sectionTable 113 LDAP Schema Properties section componentsComponent DescriptionUser Base DNThe base distingu

Page 137

Figure 134 Viewing the LDAP Failover Server Properties sectionTable 114 LDAP Failover Server Properties section componentsComponent DescriptionFailove

Page 138

Your rotation schedule can be set to automatically rotate logs on a daily, weekly, or monthly basis, atany time of day. The system maintains these set

Page 139 - Certificate Installation

For example, the filename audit.log.1.2002-04-04_160146.demo would identify this file as:• An Audit Log.• The first log file in the log index.• A file crea

Page 140 - Self Signed Certificate

Secure logsThe SKM allows you to sign your log files before moving them to another machine or downloading them,which makes yourlogfiles more secure than

Page 141 - Create Certificate Request

Table 116 Rotation Schedule section componentsComponent DescriptionLog NameOne of the predefined log names supported by the SKM. Log types are: System,

Page 142

Table117LogRotationPropertiessectioncomponentsComponent DescriptionLog NameOne of the predefined log names supported by the SKM. Log types are: System,

Page 143

Figure 137 Viewing the Syslog Settings sectionNOTE:Changes to the Syslog Settings section cause the KMS Server to restart, which takes the KMS offline

Page 144 - The Default Profile

Table 119 Log Signing section componentsComponent DescriptionLog NameDisplays the logs available on the device.Sign LogSelect this option to enable Se

Page 145

Table 120 Log Signing Certificate Information section componentsComponent DescriptionDownload LogSigning CertClick Download Log Signing Cert to downloa

Page 146 - Properties

WARNING!To reduce the risk of personal injury or equipment damage when unloading a rack:• At least two people are needed to safely unload a rack from

Page 147 - Sign Certificate Request

• Successful or failed cluster replication and synchronization.• Failed log transfers.• License errors.Figure 141 Viewing the System Log sectionThe fo

Page 148 - Signed Certificates

• Date and time change was made.• Username: the username that made the configuration change.• Event: a text description of the configuration change.Figu

Page 149 - Signed Certificate Information

data from the client or an error has occurred. When there is no data for a particular field, a dash isinserted. The format of the Activity Log is as fo

Page 150 - Create Local CA

Table 127 Values for the Detail Field in the Activity LogRequest TypeDetail Informationauthentication username provided by the clientkey generationalg

Page 151 - CA Certificate List

Figure 146 Viewing the Current Activity Log sectionThe following table describes the components of the Current Activity Log section.Table 129 Current

Page 152 - ACertificate

Figure 147 Viewing the Client Event Log sectionThe following table describes the components of the Client Event Log section.Table 131 Client Event Log

Page 153 - Local CAs

•Throughput•LicenseUsage• Refresh Statistics (Server)•KMSStatisticsRefresh StatisticsThe Refresh Statistics section controls how frequently the System

Page 154 - Related CLI Commands

Table 134 System Statistics section componentsComponent DescriptionCPU Utilization (%)This number represents the percentage of CPU time that was in us

Page 155 - Advanced Security overview

Figure 152 Viewing the Throughput sectionThe following table describes the components of the Throughput section.Table 136 Throughput section component

Page 156 - FIPS Compliance

Figure 154 Viewing the Refresh Statistics sectionThe following table describes the components of the Refresh Statistics section.Table 138 Refresh Stat

Page 157 - High Security Settings

The maximum recommended ambient operating temperature (TMRA) for the SKM system is 35° C (95° F).The temperature in the room where the rack is located

Page 158

Figure 155 Viewing the KMS Statistics sectionThe following table describes the components of the KMS Statistics section.Table 139 KMS Statistics secti

Page 159 - High Security Procedures

C Using the Command LineInterfaceShell commandsThe CLI supports a few shell commands that allow you to perform various search, cut, and pasteoperation

Page 160 - FIPS Status Server overview

new cert “new cert request”is treated as three separate arguments:• new• cert• new cert requestEscaping characters using backslashYou can include a qu

Page 161 - FIPS Status Report

If multiple commands match the pattern, those commands are displayed on the screen. For example, ifyou type sh au lo on the command line, the SKM exec

Page 162

hostname (config)#Scripting modeThis section describes how to perform the following actions in scripting mode:•CreatingScripts•ExecutingScripts• Displ

Page 163 - FIPS Status Server page

Onceloaded,ascriptcaneitherbesteppedthrough(executedonelineatatime),ortheentirescriptcanbe run. To step through a script, use the command “step”, as s

Page 164 - SSL overview

passwdpassword settingsshow administratorshow credential settingsshow granted credentialshow password settingsAudit Log Commandsshow audit logtransfer

Page 165 - SSL Sections

cert importcert requestcert selfsign installno certificateno requestshow certcli-show-requestCRL Commandscrl auto-updatecrl list sendcrl list updatecrl

Page 166 - SSL Cipher Order

show security settingsshow fips servershow fips statusHealth Check Configuration Commandshealth checkshow health checkHelp Commands?helpHistory Commandsh

Page 167

gatewayip addressip authorizationip authorization allowedip name-serverno gatewayno ip addressno ip authorization allowedno ip name-serverno static ro

Page 168 - MS Server

UnpackingPlace the shipping carton as close to the installation site as possible. Before unpacking the SKM, inspectthe shipping carton for damage that

Page 169 - KMS Server Settings

SNMP Commandscommunityedit communityedit snmp usernameedit stationno communityno snmp usernameno stationshow communityshow snmp agentshow snmp usernam

Page 170

show clockshow hostnameshow ntpshow ras settingstimezone setSystem Health Commandsshow system healthSystem Information Commandsshow deviceshow softwar

Page 171 - The followin

Activity log commandsactivity log level –SettheActivityLogLevel.Syntaxhostname (config)# activity log levelLog Level:1: Normal2: LowEnter a number (1

Page 172

Relatedcommand(s)• edit administrator• show administrator•noadministratorcredential settings – establish the multiple credential settings.Syntaxhostna

Page 173 - Health Check sections

Relatedcommand(s)• show granted credential• no granted credential•credentialsettings• show credential settingsldap test failover – connect to the fail

Page 174 - Configuring the cluster

Relatedcommand(s)•administrator• edit administrator•noadministratorshow credential settings – display the multiple credential settings.Syntaxhostname#

Page 175 - The Cluster Key

Audit log commandsshow audit log – display all the audit logs’ names.Syntaxhostname# show audit log [name] [number of lines]Specify a log name and/or

Page 176 - Cluster Configuration page

Backup and restore commandsbackup – create a system backup.Syntaxhostname (config)# backupAfter executing the backup command, the system prompts you t

Page 177 - Cluster Settings

Relatedcommand(s)•nocacertificate•showcacertificateca profile –create an empty Trusted CA List profile.Syntaxhostname# ca profile <profile name>The

Page 178 - Create Cluster

Relatedcommand(s)• cert request•cli-show-request•norequest•nocertificate•certimport•showcert•certselfsigninstallcert renew – renew a certificate that ha

Page 179 - Join Cluster

Figure 1 Identify the contents of the shipping cartonItemDescription1Appliance2Power cords (2 — 1 black, 1 gray)3Null modem cable41U rack mounting har

Page 180 - ConfiguringtheDate&Time

Relatedcommand(s)•caprofile•caprofile duplicate•caprofile entry•caprofile rename•showcaprofile•showcaprofile•nocaprofile entryno ca profileentry – delete a C

Page 181 - Date and Time Settings

Syntaxhostname# show local ca [ca name]Relatedcommand(s)•halt•nolocalcashow signed certificate – display information about certificates signed by local

Page 182 - Configuring the network

Certificate commandscert import –importacertificate.SyntaxThe certificateimport process varies between SKMs.hostname# certimportPlease pick theupload opt

Page 183 - Routing sections

Syntaxhostname (config)# cert request <cert name>After executing the cert request command, the system prompts you to provide the followinginform

Page 184

Relatedcommand(s)•certrequest•cli-show-request•norequest•certinstall•certimport•showcert• cert selfsign installno request –deleteacertificate request.S

Page 185 - Static Route List

Syntaxhostname (config)# crl list send <ca name>Transport Method:1) FTP 2) SCPEnter a number(1-2):Host:Filename:Username:Password:Relatedcommand

Page 186 - Hostname & DNS sections

Relatedcommand(s)Noneno crl list –renew all revoked certificates signed by a local CA or delete the CRL published by aknown CA.Syntaxhostname (config)#

Page 187 - Port Speed sections

Client event logcommandsclientevent log rotate –rotatetheclienteventlog.Syntaxhostname (config)# clientevent log rotate <log name>Relatedcommand

Page 188 - IP Authorization sections

Device reset and restore commandsreset factory settings – delete all information stored in the SKM and reset it to its original factorysetting.CAUTION

Page 189 - Allowed Client IP Addresses

Diagnostic commandshost run – look up the host specified using the domain server.Syntaxhostname (config)# host run <hostname>Relatedcommand(s)•tr

Page 190 - Configuring SNMP

Removing an existing SKM (appliance) from the systemSkip this step if you are installing a new appliance.1. Zeroize the original appliance. To do so,

Page 191 - Authentication

Syntaxhostname# fips serverEnable FIPS Status Server [y]:Available IP addresses:1. All2. 172.17.3.21Local IP (1-2)[1]:Local Port [9081]:NOTE:You can vi

Page 192 - The SNMP C

Syntaxhostname# show security settingsKey SecurityDisable Creation and Use of Global Keys: YesDisable Non-FIPS Algorithms and Key Sizes: YesDisable RS

Page 193 - 2CommunityList

Health check configuration commandshealth check – enable and configure the Health Check feature.Syntaxhostname (config)# health checkEnable Health Check

Page 194 - SNMPv3 Username List

Log commandsactivity syslog –enabletheSKMtousethesyslogprotocoltosendActivityLogmessagestoanexternal machine.Syntaxhostname (config)# activity syslogE

Page 195 - SNMP Management Station List

Syntaxhostname (config)# clientevent syslogEnable Syslog [n]:Syslog Server #1 IP [None]:Syslog Server #1 Port [514]:Syslog Server #2 IP [None]:Syslog

Page 196

Relatedcommand(s)•activitysyslog•showactivitysyslogThe no audit syslog command also clears all values in the Activity Log settings.no audit syslog – d

Page 197

Relatedcommand(s)• edit log rotationshow log signing – check the status of the Secure Log feature on the SKM for a specificlog.Syntaxhostname# show log

Page 198

Mode commandsconfigure –enterconfiguration mode.Syntaxhostname# configureRelatedcommand(s)•configure terminal•exit•scriptconfigure terminal –enterconfigu

Page 199 - Enterprise MIB overview

Relatedcommand(s)•ipauthorization• ip authorization allowed• no ip authorization allowed• show ip authorization• show ip authorization allowedethernet

Page 200

Syntaxhostname (config)# ip authorizationKMS Server:Please select from the following options:1) Allow All Connections 2) Only Allow IPs SpecifiedKMS S

Page 201 - Administrato

117765. Repeat these steps with the other side rail.Attaching rails to the appliance1. Align one ofthe rails with the left side of the appliance (as y

Page 202 - Administrator passwords

SyntaxNOTE:The no ip authorization allowed command requires that you provide the indexnumber of the IP address you want to edit, rather than the actua

Page 203 - LDAP administrators

Syntaxhostname# show ip authorizationKMS Server: Only Allow IPs SpecifiedWeb Administration: Only Allow IPs SpecifiedSSH Administration: Only Allow IP

Page 204 - Administrator procedures

Services commandshalt –halttheSKM.Syntaxhostname (config)# haltRelatedcommand(s)• rebootkms-server run –activatetheKMSServer.Syntaxhostname (config)#

Page 205 - Create LDAP Adm

Syntaxhostname (config)# no webadmin startupRelatedcommand(s)•webadminstartupreboot – reboot the SKM.Syntaxhostname (config)# rebootRelatedcommand(s)•

Page 206 - Component Description

Relatedcommand(s)•nowebadminrunwebadmin startup – enable web administration when starting up the SKM.Syntaxhostname (config)# webadmin startupRelatedc

Page 207 - Password Management overview

SyntaxNOTE:When you execute the edit snmp username command, the system prompts you toprovidethenewSNMPv3usernameinformation.hostname (config)# edit sn

Page 208

SyntaxNOTE:When you execute the edit station command, the system prompts you to providethe new SNMP management station information. In the example sho

Page 209 - Password Manag

Relatedcommand(s)•showsnmpusername•editsnmpusername•snmpusernameno station – remove an SNMP management station.Syntaxhostname (config)# no station <

Page 210

SyntaxNOTE:When you execute the snmp username command, the system prompts you to providethe values for the new SNMPv3 username.hostname (config)# snmp

Page 211 - Multiple Credentials overview

Syntaxhostname (config)# cipherspec priorityCURRENT PRIORITIESThe SSL cipher order is shown below:Priority Key Exchange Cipher KeysizeHash1 RSA AES128

Page 212

2. Connect the appliance power supplies’ AC power connectors to two separate AC power sourcesusing the power cables provided (see Figure 2).Figure 2 C

Page 213 - Multiple Credentials sections

Relatedcommand(s)• show cpiherspec•cipherspecpriority•cipherspec•nocipherspec•restorecipherspecno ssl protocol –removethespecified protocol.Syntaxhostn

Page 214 - Grant a Credential

Statistics commandsshow license – show the number of licenses currently in use.Syntaxhostname# showlicenseLicenses: 5Relatedcommand(s)•showlicenseusag

Page 215

Syntaxhostname (config)# edit ras settingsAvailable IP addresses:1. All2. 192.168.200.195Web Admin Server IP [192.168.200.195] (1-2): 2Web Admin Serve

Page 216 - Remote Administ

Relatedcommand(s)Nonereissue webadmin certificate – re–issue the web administration certificate.NOTE:This action is performed when initializing the SKM

Page 217

Table 141 clock set syntax detailsParameterDescriptionmm/dd/yyhh:mm:ssmm:month:entervalueintherange1–12dd: day: enter value in the range 1 –31yy: year

Page 218 - LDAP Administra

System information commandsshow device – view the model number and Unit ID of the SKM.Syntaxhostname# show deviceRelatedcommand(s)•showsoftwareshow so

Page 219 - LDAP Schema Properties

System log commandsno system log – clear the context of a system log file.Syntaxhostname (config)# no system log <log name>Relatedcommand(s)• sys

Page 220

D TroubleshootingThis appendix addresses some of the typical problems you might face as the administrator of the SKM.Table 142 Common problemsProblem

Page 222

E Regulatory compliance noticesThis section contains regulatory notices for the HP StorageWorks Secure Key Manager (SKM) appliance.Regulatory complian

Page 223

Contents1Installingandreplacinghardware... 21Preparingfortheinstallation... 21Toolsforinstallation ...

Page 224 - Log Configu

30Installing and replacing hardware

Page 225 - Log Rotation Properties

energy and, if not installed and used in accordance with the instructions, may cause harmful interferenceto radio communications. However, there is no

Page 226 - Syslog Se

Compliance with these directives implies conformity to the following European Norms (in parentheses arethe equivalent international standards and regu

Page 227 - Log Signing

Taiwanese noticesBSMI Class A noticeTaiwan battery recycle statementRecovery mark:• Four-in-one recyclingsymbolRecovery text:• “Please recycle wasteba

Page 228

Dutch laser noticeWAARSCHUWING: French laser noticeAVERTISSEMENT : cet appareil peut être équipé d'un laser classé en tant que Produit laser de

Page 229 - Log Viewer page

Italian laser noticeAVVERTENZA: AVVERTENZA Questo dispositivo può contenere un laser classificato come prodotto laser di Classe 1 in conformità alle

Page 230 - Audit Log

Recycling noticesDisposal of waste equipment by users in private household in the EuropeanUnionThis symbol on the product or on its packaging indicate

Page 231 - Activity Log

Estonian noticeFinnish noticeLaitteiden hävittäminen kotitalouksissa Euroopan unionin alueellaJos tuotteessa tai sen pakkauksessa on tämä merkki, tuot

Page 232

Greek noticeHungarian noticeItaliannoticeSmaltimento delle apparecchiature da parte di privati nel territorio dell'Unione EuropeaQuesto simbolo p

Page 233

Latvian noticeLithuanian noticePolish notice308Regulatory compliance notices

Page 234 - Client Event Log

Portuguese noticeDescarte de Lixo Elétrico na Comunidade Européia Este símbolo encontrado no produto ou na embalagem indica que o produto não deve se

Page 235 - Statistics page

2Configuring the systemStarting the SKM applianceNOTE:To prepare to configure the system, have ready all information listed on the pre-install survey. T

Page 236 - System Statistics

Spanish noticeEliminación de residuos de equipos eléctricos y electrónicos por parte de usuarios particulares en la Unión EuropeaEste símbolo en el pr

Page 237 - Throughput

Battery replacement noticesDutch battery noticeWAARSCHUWING: dit apparaat bevat mogelijk een batterij. - Probeer de batterijen na het verwijderen nie

Page 238 - Refresh Statistics (server)

German battery noticeVORSICHT: Dieses Produkt enthält unter Umständen eine Batterie oder einen Akku.- Versuchen Sie nicht, Batterien und Akkus außerh

Page 239 - KMS Statistics

Japanese batterynoticeSpanish battery noticeADVERTENCIA: Este dispositivo podría contener una batería.- No intente recargar las baterías si las extra

Page 240

314Regulatory compliance notices

Page 241 - Interface

FSpecificationsThis section provides the VLS node and specifications.SKM appliance specificationsItemSpecificationHeight4.3 cm (1.70 in)Depth70.5 cm (27.8

Page 242 - Command shortcuts

EnvironmentalspecificationsOperating Non-operatingShippingTemperature110°C to 35°C(50°F to 95°F)-40°C to 66°C(-40°F to 150°F)-40°C to 66°C(-40°F to 150

Page 243 - Command modes

G About this guideThis guide provides information about:• Installing an HP StorageWorks Secure Key Manager• Configuring an HP StorageWorks Secure Key M

Page 244 - Scripting mode

WARNING!Indicates that failure to follow directions could result in bodily harm or death.CAUTION:Indicates that failure to follow directions could res

Page 245 - CLI commands

Customer self repairHP customer self repair (CSR) programs allow you to repair your StorageWorks product. If a CSR partneeds replacing, HP ships the p

Page 246

c. Dated. Time. The time is based on a 24–hour clock. There is no a.m. or p.m. designation. Forexample, 1:20 p.m. is 13:20:00.e. IP address of the SKM

Page 247

320About this guide

Page 248

GlossaryActive Device In the VRRP group, this is the device that is receiving all network traffic. Thisis typically the primary device; however, in cas

Page 249

fulfill client traffic, the secondary device stands down and the primary deviceagain becomes the active device.Primary device A designated device that,

Page 250

IndexSymbols?, 272Aaccess control,205activity log level,252activity log rotate,252activity syslog,273administrator,252administratorscreating,205definin

Page 251

Create LDAP Administrator section,205Create Local Certificate Authority section,150Create SNMP Management Station section,197credentialsgranting,214vie

Page 252 - Activity log com

keysaccess to and ownership of,168administration via multiple credentials,213authorization policies and usage periods,122 , 124creating,118deletable,1

Page 253

Ppasswd,254password settings,254passwordsadministrator,202cluster,175patch releases,96permissions, user,127Ping Information section,98ping run,269port

Page 254

show station,287show statistics,291show system log,296show system syslog,276Sign Certificate Request page,54sign request,261Signed Certificates section,

Page 255

6. Configure the default settings for the key replication interval and retry attempts.NOTE:These commands require firmware version 1.1 or greater.a. Log

Page 256 - Autologout commands

Where• <appliance hostname> is the hostname or IP address you provided in Starting the SKMappliance,step4.• <appliance port number> is 944

Page 257 - CA certificate commands

6. Add the Local CA to the Trusted CAs list.a. In Certificates & CAs,clickTrusted CA Lists to display the Trusted Certificate Authority List Profiles

Page 258

4. Click Create Certificate Request.5. Click on the newly created certificate from Certificate List, for example SKM Server.6. Copy the certificate data,

Page 259

11 . Click Sign Request.12. Copy the signed certificate data, from -----BEGIN to END…----- lines. Be careful to excludeextra carriage returns or spaces

Page 260

• In Creating the cluster, the cluster is created on one SKM appliance.Skip this section if you already have an SKM cluster.• In Copying the Local CA

Page 261

5. Copy the certifi cate data from the CA Certificate Information,from-----BEGIN CERTIFICATEREQUEST----- to -----END CERTIFICATE REQUEST--–––. Be carefu

Page 262 - Certificate com

Creatingauser... 45Creatingagroup ... 46Addingausertoagroup...

Page 263

5. Add the first member’s CA to the Trusted CAs list.a. In the Certificates & CA menu, click Trusted CA Lists.b. Click on the Default Profile Name.c.

Page 264 - CRL commands

4. Click Create Certificate Request.5. Click on the newly created certificate SKM Server from Certificate List.6. Copy the certificate data, from lines --

Page 265

3. Click Select None.4. Select Certificates then Choose from list and select SKM Server.5. Click Continue.6. Click Select None.7. Click Continue.8. In

Page 266

3Performingconfiguration andoperation tasksKey and policy proceduresCreating a keyTo create a key:1. Log in to the Management Console as an administrat

Page 267 - Client event lo

7. To make the key exportable on from non-FIPS SKM, select Exportable.Anexportablekeycanbe exported by its owner and by members of a group with “Expor

Page 268 - Device reset an

Authorization policy proceduresCreating an authorization policyTo create an authorization policy:1. Log in to the Management Console as an administrat

Page 269 - FIPS commands

6. To give this user the ability to change his or her own password via the XML interface, select ChangePassword Permission. Users with User Administra

Page 270

3. Select the Username and click Delete.Deleting a groupTo delete a group:1. Log in to the Management Console as an administrator with Users, Groups,

Page 271

Setting up an LDAP failover serverTo set up an LDAP failover server:1. Log in to the Management Console as an administrator with Users, Groups, and LD

Page 272 - History commands

NOTE:To generate a valid certificate, you must have a certificate authority sign a certificate request. You cancreate local CAs on the SKM, and use those

Page 273 - Log commands

ConfiguringSNMPv3ontheSKM ... 63Administratorprocedures... 64Creatinganadministrator...

Page 274

10. Copy the certificate text.11 . Navigate back to the Certificate List section.12. Select the certificate request and click Properties to access the Ce

Page 275

9. Paste the certificate request into the Certificate Request field. Select Client as the Certificate Purpose,specify a Certificate Duration and click Sign

Page 276

To install a certificate:1. Log in to the Management Console as an administrator with Certificates access control.2. Navigate to the Certificate List sec

Page 277 - Network commands

2. Navigate to the Certificate List section of the Certificate and CA Configuration page (Security>Certificates).3. Select the Certificate Name and clic

Page 278

Deleting a trusted CA list profileTo delete a trusted certificate authority list profile:1. Log in to the Management Console as an administrator with Cer

Page 279

Deleting a local CATo delete a local CA:1. Log in to the Management Console as an administrator with Certificate Authorities access control.2. Navigate

Page 280

8. Copy the CA certificate request text.The certificate text looks similar, but not identical, to the following text.-----BEGIN CERTIFICATE REQUEST-----

Page 281

FIPS status server proceduresEnabling the FIPS status serverTo enable the FIPS Status Server:1. Log in to the Management Console as an administrator w

Page 282 - Services comma

Enabling key and policy configuration by client applicationsEnabling key and policy configuration by client applications permits the following actions:•

Page 283

6. Use the Username Field in Client Certificate field to specify which field in the client certificate mustcontain a valid username. This setting is optio

Page 284 - SNMP commands

Rollingbacksoftware ... 96SystemHealthpage ... 96Refreshpage ...

Page 285

5. Click Join Cluster.NOTE:After joining the cluster, you will be prompted to synchronize with an existing clustermember. We recommend that you synchr

Page 286

Removing a device from a clusterTo remove a device from a cluster:1. Log in the ManagementConsoleofthedevicethatwillberemovedfromtheclusterasanadminis

Page 287

Configuring an NTP server connectionTo configure an NTP server connection:1. Log in to the Management Console as an administrator with Network and Date/

Page 288 - SSL commands

9. For each service select either Allow All Connections to grant access to all clients or Only Allow IPsSpecified Below to grant access to only the cli

Page 289

Administrator proceduresCreating an administratorTo create an administrator account:1. Log in the Management Console as an administrator with Administ

Page 290

3. Click LDAP Test.Setting up the LDAP schemaTo set up the LDAPSchema:1. Log in to the SKM appliance as a Local administrator with High Access Adminis

Page 291 - System commands

2. Navigate to the Password Settings for Local Administrators section of the Administrator Configurationpage (Device Configuration > Administrators &

Page 292

2. Navigate to the Multiple Credentials for Key Administration section on the AdministratorConfiguration page (Device > Administrators > Multiple

Page 293

1. Open the certificate request in a text editor.2. Copy the text of the certificaterequest. Thecopiedtextmustincludetheheader(-----BEGINCERTIFICATE REQ

Page 294

2. Navigate to the Remote Administration Settings section (Device > Administrators > RemoveAdministration).3. Click Edit.4. Select Web Admin Use

Page 295 - System informa

LDAPGroups... 135UserList ... 135Certificate and CA ConfigurationPage...

Page 296 - System log comm

2. Determine the Key Sharing Group.a. From the filtered list of keys, choose the one with the most recent timestamp (the numbersequence at the end of t

Page 297 - D Troubleshooting

NOTE:Steps c. through f. above ensure the backup filecontainsonlythesinglekey.g. In the Backup Summary section of the panel, verify that no settings, c

Page 298 - Troubleshooting

4. Send the tape and the Destination (backup) file to the Cluster #2 admin. Also transmit the Groupname and the backup password.NOTE:For security reaso

Page 299 - Regulatory co

5. Import (restore) the backup file to Cluster #2a. On the SKM, from the Device Tab, in the Maintenance menu on the left, select Backup & Restore,t

Page 300 - European Union notice

6. Restart the SKM software.NOTE:Following a restore, the SKM must be restarted.a. From the SKM Device tab, in the Maintenance menu, select Services.b

Page 301 - Korean notices

7. Force replication of the key across Cluster #2.a. From the SKM Security tab, in the Keys menu on the left, select Keys.b. Use filtering from the Key

Page 302 - Laser compliance

8. Ensure that the key sharing group has been added.a. From the SKM interface, Security tab, Users and LDAP Menu, select Local Users and Groups.b. Ver

Page 303 - German laser notice

1. FromtheSKMinterfaceontheDevicetabintheMaintenance menu on the left, select Backup &Restore, then select Create Backup.Figure 11 Creating the ba

Page 304 - Japanese laser notice

7. In the Backup Summary section of the panel, verify that all of the settings, certificates, and localcertificate authorities are included in the backu

Page 305 - Recycling notic

1. FromtheSKMinterfaceontheDevicetab,intheMaintenance menu, select Backup Restore,thenCreate Backup.2. In the Create Backup pane, in the Security Item

Page 306 - German notice

ClusterSettings ... 177CreateCluster... 178JoinCluster...

Page 307 - Hungarian notice

Log configuration proceduresConfiguring log rotationTo configure log rotation:1. Log in to the Management Console as an administrator with Logging access

Page 308 - Polish notice

2. Change the file extension on the log file to .eml. The file will now be recognized by Windowsas an E-mail file.3. Double-click on the file. Outlook Expr

Page 309 - Slovenian notice

Recreating the log signing certificatePrior to creating a new log signing certificate, backup the old certificate so you can verify previouslysigned logs

Page 310 - Swedish notice

2. Navigate to the Log Viewer page (Device > Log Viewer) and click the tab for the log you wouldlike to download.3. Choose a log in the Log File fie

Page 311 - Avis relatif aux piles

84Performing configuration and operation tasks

Page 312 - Istruzioni per la batteria

4MaintainingtheSKMBackup and restore overviewClustering SKM nodes is an effective way of exchanging keys and configuration data to allow for failover,b

Page 313 - Spanish battery notice

Backup and restore pageThe Backup and restore page enables you to create and restore backups. This page contains thefollowing sections:• Create Backup

Page 314 - Regulatory compliance notices

Table 1 Create Backup: Security Items section componentsComponents DescriptionSecurity ItemsClick Select All toincludeallofthekeymanagementitemsinyour

Page 315 - FSpecifications

Table 2 Create Backup: Device Items section componentsComponents DescriptionDevice ItemsClick Select All toincludeallofthedeviceconfiguration items in

Page 316 - Environmental

Table 3 Create Backup: Backup Settings section componentsComponents DescriptionBackup NameEnteranameforthebackupfile. For backups stored externally, th

Page 317 - G About this guide

RemoteAdministrationSettingsoverview ... 215RemoteAdministrationSettingssections... 215RemoteAdministrati

Page 318 - HP technical support

Figure 17 Viewing the Restore Backup sectionThe following table describes the components of the Restore Backup section.Table 4 Restore Backup section

Page 319

Figure 18 Viewing the Backup Restore Information sectionThe following table describes the components of the Internal Backup List section.Table 5 Inter

Page 320 - About this guide

Table 6 Internal Backup List section componentsComponents DescriptionBackup Name Displays the backup name.DateDisplaysthedateonwhichthebackupwascreate

Page 321 - Glossary

Table 7 Services List section componentsComponents DescriptionName• KMS Server: the“brains” of the SKM, which manages all incoming and outgoingconnect

Page 322

System Information pageUse the System Information page to perform software upgrades and examine information about thesystem and software currently ins

Page 323

The following table describes the components of the License Information section.Table 10 License Information section componentsComponents DescriptionL

Page 324

Upgradingtoapatch releasePatch releasesare lightweight; customers do not have to re-qualify an entire release. All patches arecumulative, which means

Page 325

Figure 25 Viewing the Refresh Page sectionThe following table describes the components of the Refresh Page section.Table 12 Refresh Page section compo

Page 326

Cooling Fan StatusThe Cooling FanStatus section provides information on the status all of the SKM’s cooling fans. Thefollowing table describes the dif

Page 327

Traceroute InformationUse the Traceroute Information section to examine the path between the SKM and a destination.Figure 29 Viewing the Traceroute In

Comments to this Manuals

No comments