Hp Secure Key Manager User Manual

Browse online or download User Manual for Storage Hp Secure Key Manager. HP Secure Key Manager User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 352
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews

Summary of Contents

Page 1 - Secure Key Manager

HP StorageWorksSecure Key Managerusers guide*AJ087-96018*Part number: AJ087–960183rd edition: April 2009

Page 2

Secure logs ... 244Log Configuration page .

Page 3 - Contents

DescriptionComponentsClick Cancel to abort the backup and return to the Create Backup: Security Items section.CancelDisplays all of the items that cou

Page 4

NOTE:Key Manager DataSecure appliance Number of Active Versions Allowed for a Key setting on the Keyand Policy Configuration page. If the key has more

Page 5

Figure 19 Viewing the Internal Backup List sectionThe following table describes the components of the Internal Backup List section.Table 7 Internal Ba

Page 6

Figure 20 Viewing the Services List sectionThe following table describes the components of the Services List section.Table 8 Services List section com

Page 7

Figure 21 Viewing the Restart/Halt sectionThe following table describes the components of the Restart/Halt section.Table 9 Restart/Halt section compon

Page 8

Figure 22 Viewing the Device Information sectionThe following table describes the components of the Device Information section.Table 10 Device Informa

Page 9

Software Upgrade/InstallThe software upgrade and installation mechanism can be used to install new features, upgrade coresoftware, and apply security

Page 10

IMPORTANT:You must be running the base release upon which the patch is built before upgrading to the patchrelease. You cannot upgrade directly from a

Page 11

Figure 25 Viewing the Refresh Page sectionThe following table describes the components of the Refresh Page section.Table 13 Refresh Page section compo

Page 12

Cooling Fan StatusThe Cooling Fan Status section provides information on the status all of the SKM's cooling fans. Thefollowing table describes t

Page 13

Health check configuration commands ... 297Help commands ...

Page 14

Traceroute InformationUse the Traceroute Information section to examine the path between the SKM and a destination.Figure 29 Viewing the Traceroute In

Page 15

Figure 31 Viewing the Netstat Information sectionThe following table describes the components of the Netstat Information section.Table 19 Netstat Info

Page 16

Maintaining the SKM112

Page 17

A SKM appliance information sheetThis information is specific to the HP StorageWorks Secure Key Manager (SKM) appliance to whichit is attached. There

Page 18

Figure 33 Front and top of SKM applianceFigure 34 Back of SKM applianceDescriptionItemProduct ID number (PID) of the appliance1Serial number of the ap

Page 19

B Using the Management ConsoleLogging in and outUse the Administrator Authentication screen to log into the Management Console.Figure 35 Viewing the A

Page 20

• Recent ActionsSecurity SummaryUse this section to view security-related summary information for your SKM.Figure 37 Viewing the Security Summary sect

Page 21

DescriptionComponentDisplays the version of the software currently running on the SKM.Software VersionDisplays the current date.DateDisplays the curre

Page 22

Figure 40 Viewing the Search Criteria sectionThe following table describes the components of the Search Criteria section.Table 24 Search Criteria sect

Page 23 - About this guide

Using features common to the Security and Device tabsThe following sections describe how to set display parameters for Management Console viewing.Thes

Page 24 - Rack stability

Estonian notice ... 335Finnish notice ...

Page 25 - HP websites

Accessing the Help systemThe Management Console provides you with two ways to access product documentation:context-sensitive help, and help. Both meth

Page 26 - Documentation feedback

Figure 46 Finding the Help linkClicking this icon opens the help system in a new web browser. The default page shows the table ofcontents.Using the Ke

Page 27 - Taking ESD precautions

CAUTION:Do not delete keys that might be needed to decrypt data at some point in the future. Once youdelete a key, there is no way to decrypt data tha

Page 28 - Rack planning resources

DescriptionComponentThe algorithm might be any of the following:• AES-256• AES-192• AES-128• DES-EDE-168 (three key triple DES)• DES-EDE-112 (two key

Page 29 - Optimum environment

Figure 48 Viewing the Key Properties sectionThe following table describes the components of the Key Properties section.Table 29 Key Properties section

Page 30 - Power requirements

The state, combined with the key type and group permissions determine how the key version can beused. Ultimately, a key version can only be used when:

Page 31 - Unpacking

DescriptionComponentClick Delete to remove the permissions for a group.DeleteFor example, in Figure 49, members of group1 have permission to export ke

Page 32

DescriptionComponentClick Add to add an attribute.AddClick Delete to remove the selected attribute.DeleteKey Versions and Available UsageUse this sect

Page 33 - Selecting a rack location

Figure 52 Viewing the Public Key sectionThe following table describes the components of the Public Key section.Table 33 Public Key section componentsD

Page 34

DescriptionComponentClick Save Query to save the query without executing it.Save QueryClick Run Query without Saving to execute the query. The query n

Page 35 - Attaching the cables

FiguresIdentify the contents of the shipping carton ... 321Connect the power supplies to

Page 36

Figure 55 Viewing the Modify Query sectionNOTE:You cannot greatly modify the built-in query [All]. The Appliance will only permit you to change theCol

Page 37 - 2 Configuring the system

Figure 56 Viewing the Create Key sectionThe following table describes the components of the Create Key section.Table 37 Create Key section componentsD

Page 38 - Configuring the system38

DescriptionComponentWhen selected, the key contains multiple versions, up to a maximum of 4000. Eachkey version has unique key bytes, but shared key m

Page 39

IMPORTANT:The server will not import keys that are known to be weak, such as 64 bit DES. In addition, the paritybits must be set properly; otherwise,

Page 40 - Configuring the system40

DescriptionComponentA check mark in the box indicates that the key is deletable via an XML request by thekey owner (or any user for global keys). Afte

Page 41

NOTE:Authorization policies cannot be applied to global keys or to certificates. Key owners are not subjectto policy restrictions.The Authorization Po

Page 42 - Configuring the system42

Figure 60 Viewing the Authorization Policy Properties sectionThe following table describes the Authorization Policies Properties section.Table 41 Auth

Page 43

Figure 61 Viewing the Authorized Usage Periods sectionThe following table describes the Authorization Usage Periods section.Table 42 Authorization Usa

Page 44 - Establishing a cluster

Figure 62 Viewing the Active Versions sectionTable 43 Active Versions section componentsDescriptionComponentDisplays the number of active versions all

Page 45

Configuring the users and groupsA user directory contains a list of users that may access the keys on your KMS Server, and a list ofgroups to which th

Page 46 - Configuring the system46

Front and top of SKM appliance ... 11433Back of SKM appliance ...

Page 47

Figure 64 Viewing the Local Users sectionThe following table describes the components of the Local Users section.Table 45 Local Users section componen

Page 48 - Copying the certificates

NOTE:The User Administration Permission and Change Password Permission apply only to local users. LDAPusers cannot be managed through the SKM; they mu

Page 49 - Installing the certificates

Figure 66 Viewing the Custom Attributes sectionThe following table describes the components of the Custom Attributes section.Table 47 Custom Attribute

Page 50 - Configuring the system50

Figure 67 Viewing the Local Groups sectionThe following table describes the components of the Local Groups section.Table 48 Local Groups section compo

Page 51 - Key and policy procedures

Figure 69 Viewing the User List sectionThe following table describes the components of the User List section.Table 50 User List section componentsDesc

Page 52 - Downloading an RSA key

Figure 70 Viewing the LDAP User Directory Properties sectionThe following table describes the components of the LDAP User Directory Properties section

Page 53 - Deleting a key

Figure 71 Viewing the LDAP Schema Properties sectionThe following table describes the components of the LDAP Schema Properties section.Table 52 LDAP S

Page 54 - User and group procedures

DescriptionComponentClick Edit to modify the properties.EditClick Clear to remove the current properties.ClearLDAP Failover Server PropertiesUse the L

Page 55 - Deleting a group

• User ListLDAP UsersThe LDAP Users section displays the users available in the LDAP user directory.Figure 73 Viewing the LDAP Users sectionThe follow

Page 56 - LDAP server procedures

Figure 74 Viewing the LDAP Groups sectionThe following table describes the components of the LDAP Groups section.Table 55 LDAP Groups section componen

Page 57 - Certificate procedures

Viewing the LDAP User Directory Properties section ... 14570Viewing the LDAP Schema Properties section

Page 58

Certificate and CA Configuration PageCertificates identify one entity to another. In this case, when making SSL connections between a clientapplicatio

Page 59 - Creating a client certificate

DescriptionComponentA certificate summary containing the following information:• Common Name: Name of entity to which certificate is issued. This is t

Page 60

Figure 77 Viewing the Certificate Information sectionThe following table describes the components of the Certificate Information section.Table 58 Cert

Page 61 - Installing a certificate

DescriptionComponentClick Install Certificate to go to the Certificate Installation page. The Install Certificatebutton can be applied to either certi

Page 62 - Downloading a certificate

The following table describes the components of the Certificate Installation section.Table 59 Certificate Installation section componentsDescriptionCo

Page 63

DescriptionComponentThe duration during which the certificate is valid.Certificate Duration(days)Click Create to create the certificate.CreateClick Ba

Page 64 - Downloading a local CA

DescriptionComponentE–mail address of person requesting the certificate. This field is optional.Email AddressSize of key being generated. The SKM supp

Page 65 - Creating a local CA

DescriptionComponentThe password used to access the key.Private Key PasswordClick Import Certificate to import the certificate to SKM.Import Certifica

Page 66 - Installing a CA certificate

DescriptionComponentClick Edit to change the name of a profile.EditClick Add to create a profile. A newly created profile is initially empty. You must

Page 67 - FIPS status server procedures

Figure 84 Viewing the Trusted Certificate Authority List (Edit Mode)The following table describes the components of the Trusted Certificate Authority

Page 68 - KMS server procedures

Viewing the Join Cluster section ... 197107Viewing the Date and Time Settin

Page 69

Figure 85 Viewing the Local Certificate Authority List sectionThe following table describes the components of the Local Certificate Authority List sec

Page 70 - Clustering procedures

Figure 86 Viewing the CA Certificate Information sectionThe following table describes the components of the CA Certificate Information section.Table 6

Page 71 - Setting up SSL in a cluster

Sign Certificate RequestUse the Sign Certificate Request section to sign certificate requests.Figure 87 Viewing the Sign Certificate Request sectionTh

Page 72 - Date and time procedures

Figure 88 Viewing the Signed Certificates sectionThe following table describes the components of the Signed Certificates section.Table 69 Signed Certi

Page 73 - IP authorization procedures

Figure 89 Viewing the Signed Certificate Information sectionThe components of the Signed Certificate Information section are view-only.Create Local CA

Page 74 - SNMP procedures

Figure 90 Viewing the Create Local Certificate Authority sectionThe following table describes the components of the Create Local Certificate Authority

Page 75

DescriptionComponentLocal CAs can be one of two types: Self-signed root CA, or Intermediate CA Request.When you create a self-signed root CA, you must

Page 76 - Setting up the LDAP schema

DescriptionComponentDisplays one of three values:Certificate Active - The CA can be used to issue certsand sign certificate requests.Certificate Expir

Page 77 - Changing your password

CRL v2 format. Support for CRLs on the SKM allows you to obtain, query, and maintain CRLs publishedby CAs supported on the SKM. The SKM uses CRLs to v

Page 78 - Granting credentials

NOTE:The Auto-Update feature does not apply to local CAs.Force Periodic UpdateThe SKM performs a daily check of the Next Update field to determine whe

Page 79 - Revoking a credential grant

Viewing the Current Audit Log section ... 252144Viewing the Activity Log section ..

Page 80

Only the following models are capable of operating in accordance with FIPS standards:• HP DL360 R05All other SKM can be configured for high security b

Page 81

Software Patches and UpgradesHP will indicate which software patches and upgrades are FIPS certified. Apply only FIPS certifiedsoftware to a FIPS-comp

Page 82

DescriptionComponentClick Set FIPS Compliant to alter the settings shown in the High Security Settings andSecurity Settings Configured Elsewhere secti

Page 83

Figure 94 Viewing the High Security Settings sectionThe following table describes the components of the High Security Settings section.Table 74 High S

Page 84

DescriptionComponentPrevents administrators from changing RAID drives through the Management Console.IMPORTANT:You cannot replace RAID drives and rema

Page 85

DescriptionComponentDisplays the SSL Protocols enabled in the SSL Options section. Click the link to accessthe SSL Options section. FIPS compliance re

Page 86

Configuring the High Security Settings on an SKMIMPORTANT:When you enable FIPS compliance on the SKM, the functionality displayed here is disabled. Mo

Page 87

DescriptionConditionalpower-onTestKnown Algorithm Test for the X9.31 PRNG. This testis performed at power-on.XX9.31 PRNGTest of the random number gene

Page 88

Figure 96 Viewing the FIPS Status Report: normalThe following table describes the components of the FIPS Status Server Settings section.Table 77 FIPS

Page 89 - Log configuration procedures

DescriptionComponentDisplays the result and timestamp for each of the following self-tests:• AES Encryption• DES Encryption• DSA Encryption• HMAC Algo

Page 90 - Enabling signed logs

TablesDocument conventions ... 231Create Backup: Security It

Page 91

DescriptionComponentSelect the IP addresses on which the FIPS Status Server is enabled on the SKM.Local IPSelect the port on which the server status r

Page 92 - Log view procedures

SSL Session TimeoutAll SSL sessions stored in the SKM's session cache have an expiration period, typically two hours.This means the SKM accepts a

Page 93 - Clearing a log

IMPORTANT:Some web browsers, including Internet Explorer 6.0, do not have TLS 1.0 enabled by default. If youdisable SSL 2.0 and 3.0, please check firs

Page 94

SSL Cipher OrderUse this section to enable, disable, and order the priority of SSL ciphers.Different applications and databases support different encr

Page 95 - 4 Maintaining the SKM

DescriptionComponentThis field specifies the Hash function to use for SSL session integrity. The supportedHash functions are:• SHA–1: (Secure Hash Alg

Page 96 - Backup and restore page

The KMS Server can define a local users and groups list or you can use an LDAP server to centrallymanage your users and groups.Authentication OptionsT

Page 97 - Secure Key Manager 97

Key Management Services Configuration sectionsThe Key Management Services Configuration page enables you to configure the KMS Server, KMSServer Authen

Page 98 - Create Backup: Device Items

DescriptionComponentThe Connection Timeout value specifies in seconds how long client connections canremain idle before the KMS Server begins closing

Page 99

Figure 101 Viewing the KMS Server Authentication Settings sectionThe following table describes the elements of the KMS Server Authentication Settings

Page 100 - Restore Backup

DescriptionComponentThis field allows you to select a profile to use to verify that client certificates are signedby a CA trusted by the SKM. This opt

Page 101 - Internal Backup List

Public Key section components ... 12833Create Query section components ..

Page 102 - Services Configuration page

DescriptionComponentClick Edit to modify the account lockout settings.EditHealth Check overviewThe Health Check feature allows you to configure client

Page 103 - Restart/Halt

DescriptionComponentIn this field you specify the IP address on which you want to listen for health checkrequests. You can specify an individual IP ad

Page 104 - System Information page

• LDAP Server• SSL• Administrators and Remote Administration• IP Authorization• Logging• Service Startup• Known CAs, CRLs, and Trusted CA List Profile

Page 105 - License Information

NOTE:When upgrading from a previous release, local CA replication is disabled by default.Automatic Synchronization BackupsPrior to each synchronizatio

Page 106 - Software Upgrade/Install

DescriptionComponentThe port on which the device listens for cluster administration requests.CAUTION:The cluster port (typically 9001) must be differe

Page 107 - System Health page

Figure 105 Viewing the Cluster Settings sectionThe following table describes the components of the Cluster Settings section.Table 86 Cluster Settings

Page 108 - Power Supply Status

Figure 106 Viewing the Create Cluster sectionThe following table describes the components of the Create Cluster section.Table 87 Create Cluster sectio

Page 109 - Network Diagnostics page

Figure 107 Viewing the Join Cluster sectionThe following table describes the components of the Join Cluster section.Table 88 Join Cluster section comp

Page 110 - Netstat Information

• Date & Time ProceduresNetwork Time Protocol overviewThe Network Time Protocol (NTP) is a protocol by which computers on a network synchronize th

Page 111 - Reading Netstat Results

Figure 108 Viewing the Date and Time Settings sectionThe following table describes the components of the Date and Time Settings section.Table 89 Date

Page 112 - Maintaining the SKM112

Legal and notice information© Copyright 2007, 2009 Hewlett-Packard Development Company, I.E.© Copyright 2000, 2008 Ingrian Networks, Inc.Confidential

Page 113

Create Local Certificate Authority section components ... 16570CA Certificate List section components ...

Page 114

Figure 109 Viewing the NTP Settings sectionThe following table describes the components of the NTP Settings section.Table 90 NTP Settings section comp

Page 115 - Using the Home tab

Network Interfaces sectionsThe Network Configuration page contains the following network interface-related section:• Network Interface ListNetwork Int

Page 116 - System Summary

Figure 111 Viewing the Default Gateway List sectionThe following table describes the components of the Default Gateway List section.Table 92 Default G

Page 117 - Search screen

Example 2. Example 2Used for Outgoing ConnectionsDefault GatewayInter-face-----------------------------------------------------------------—nononeEthe

Page 118

This configuration is the same as example 3, but in this scenario there are some hosts and networksthat are not reachable through 172.17.7.1. Most oft

Page 119 - Filtering sections

Hostname & DNS sectionsThe Network Configuration page contains the following hostname and DNS-related sections:• Hostname Setting• DNS Server List

Page 120 - Accessing the Help system

The following table describes the components of the DNS Server List section.Table 95 DNS Server List section componentsDescriptionComponentsUse the Up

Page 121

Figure 115 Viewing the Network Interface Port Speed/Duplex sectionThe following table describes the components of the Network Interface Port Speed/Dup

Page 122

Figure 116 Viewing the IP Authorization Settings sectionThe following table describes the components of the IP Authorization Settings section.Table 97

Page 123 - Key Properties

Figure 117 Viewing the Allowed Client IP Addresses sectionThe following table describes the components of the Allowed Client IP Addresses section.Tabl

Page 124 - Versioned keys

Change Your Password section components ... 229107Password Settings for Local Administrator

Page 125 - Group Permissions

SNMP overviewThe SNMP protocol enables network and system administrators to remotely monitor devices on thenetwork, such as switches, routers, proxies

Page 126 - Custom Attributes

secret key, and sends the message to the receiver, who decrypts it using the DES algorithm and thesame secret key.Access controlAccess control in SNMP

Page 127 - RSA Public Key

This page contains the following sections:• SNMP Agent Settings – Changes to the SNMP Agent Settings section apply to all managementstations, username

Page 128 - Create Query

NOTE:If you are configuring the agent to communicate with an NMS running SNMPv3 software, you candisregard this section.When creating a community on t

Page 129 - Modify Query

SNMPv3 Username ListAs the name suggests, the SNMPv3 Username List is used to configure the agent to communicate withan NMS running SNMPv3 software. Y

Page 130 - Create Key

DescriptionComponentThis password is used to create the secret key that performs the encrypt and decryptoperations on the data shared between the agen

Page 131

DescriptionComponentDisplays either the management community or username. The management communityis used to send SNMP data to the SNMPv1/v2 managemen

Page 132 - Import Key

DescriptionComponentName that is used to send SNMP data to SNMPv3 management stations. The usernameis used to create a key that is shared by the agent

Page 133

Figure 123 Viewing the Create SNMP Management Station sectionThe following table describes the components of the Create SNMP Management Station sectio

Page 134

DescriptionComponentYou can choose from MD5 and SHA.Auth Protocol (v3only)This password is used to create the secret key that is used to authenticate

Page 136 - Authorized Usage Periods

• Security Warnings – an administrative experienced multiple password failures while attemptingto log in, the system was reset to factory settings, th

Page 137 - Active Versions

and stored on the SKM appliance. The available access controls are grouped into categories anddescribed here.Security Configuration access controls en

Page 138 - Custom Key Attributes

When creating an administrator, you should assign the minimum amount of access controls needed.For example, a backup administrator will only need the

Page 139 - Local Users

WARNING!It is absolutely crucial that you remember the passwords for all of your local administrators. Forsecurity reasons, there is no way to reset a

Page 140

Configuration of the LDAP Administrator Server and the first LDAP administrator must be performedby a local administrator. Thereafter, you can use the

Page 141 - Selected Local User

1. Log in the Management Console as an administrator with High Access Administrator accesscontrol.2. Navigate to the Administrator section on the Admi

Page 142 - Local Groups

DescriptionComponentAccess control options related to device security configuration.• Keys and Authorization Policies: Create, modify and delete keys

Page 143 - User List

Select LDAP UsernameThe Select LDAP Username section enables you to browse and select an LDAP user when creating anLDAP administrator account.Figure 1

Page 144 - LDAP Server Configuration

Password expirationThe password expiration feature allows you to specify a duration for administrator passwords. Bydefault, this feature is disabled.

Page 145 - LDAP Schema Properties

CAUTION:In addition to all scheduled password changes, immediately change all administrator, user account,and backup passwords any time a security off

Page 146

About this guideThis guide provides information about:• Installing an HP StorageWorks Secure Key Manager• Configuring an HP StorageWorks Secure Key Ma

Page 147

DescriptionComponentRe-enter the new password.Confirm New Pass-wordClick Change Password to implement any changes made to this section.Change Password

Page 148 - LDAP Groups

DescriptionComponentEnter the minimum password length. The default length is 8. This value applies to allpasswords on the SKM (local administrator, us

Page 149

Any request for these operations, from either the Management Console or the CLI, results in a requestfor additional administrator accounts and passwor

Page 150 - Certificate List

NOTE:If the SKM is configured to use NTP, modifications to the NTP system time can extend the life span ofa granted credential.NOTE:Granted credential

Page 151 - Certificate Information

Multiple Credentials sectionsThe Multiple Credentials sections on the Administrator Configuration page lets you enable the multiplecredentials feature

Page 152 - DescriptionComponent

Credentials GrantedUse the Credentials Granted section to view the credentials granted to or by the current administrator.Any credential grants that d

Page 153 - Certificate Installation

DescriptionComponentEnter the length of duration. This duration cannot be longer than the Maximum Durationfor Time-Limited Credentials established in

Page 154 - Self Signed Certificate

Figure 131 Viewing the Remote Administration Settings sectionThe following table describes the components of the Remote Administration Settings sectio

Page 155 - Create Certificate Request

DescriptionComponentsThe SSH Admin Server IP address is the IP address used to configure the SKM from theCLI. You can select one specific IP address o

Page 156

LDAP Administrator Server Properties sectionUse the LDAP Administrator Server Properties section to define the basic properties of the LDAPadministrat

Page 157

ElementConvention• File and directory names• System output• Code• Commands, their arguments, and argument valuesMonospace text• Code variables• Comma

Page 158 - The Default Profile

Figure 133 Viewing LDAP Schema Properties sectionTable 114 LDAP Schema Properties section componentsDescriptionComponentThe base distinguished name (D

Page 159

DescriptionComponentClick to modify the properties.EditClick to remove the current properties.ClearClick to test the LDAP connection after you have de

Page 160 - CA Certificate Properties

For example, you can schedule that system rotate the Audit Log every Sunday morning at 3:15 orwhen the file size reaches 100 MB, whichever comes first

Page 161 - Secure Key Manager 161

DescriptionValueThe date and time when the log file was created.datetime stampThe hostname of the SKM.hostnameFor example, the filename audit.log.1.20

Page 162 - Signed Certificates

2005-09-12 10:23:47 irwin.company.com KMS Server: Starting KMS Serverlog message at syslog server (displays on one line):-----------------------------

Page 163

Figure 135 Viewing the Rotation Schedule sectionThe following table describes the components of the Rotation Schedule section.Table 117 Rotation Sched

Page 164 - Create Local CA

Figure 136 Viewing the Log Rotation Properties sectionThe following table describes the components of the Log Rotation Properties section.Table 118 Lo

Page 165 - Secure Key Manager 165

Syslog SettingsTo enable syslog, select a type of log, and click Edit. Specify a hostname or IP address of the primarylog server (Syslog Server #1) an

Page 166 - CA Certificate List

Figure 138 Viewing the Log Signing sectionThe following table describes the components of the Log Signing section.Table 120 Log Signing section compon

Page 167 - Install CA Certificate

Figure 139 Viewing the Log Signing Certificate Information sectionThe following table describes the components of the Log Signing Certificate Informat

Page 168 - Local CAs

HP technical supportFor worldwide technical support information, see the HP support website:http://www.hp.com/supportBefore contacting HP, collect the

Page 169 - Advanced Security overview

Figure 140 Viewing the Activity Log Settings sectionThe following table describes the components of the Activity Log Settings section.Table 122 Activi

Page 170

Figure 141 Viewing the System Log sectionThe following table describes the components of the System Log section.Table 123 System Log section component

Page 171 - FIPS Compliance

• Date and time change was made.• Username: the username that made the configuration change.• Event: a text description of the configuration change.Fi

Page 172 - High Security Settings

Activity LogThe Activity Log contains a record of each request received by the KMS Server. For client requeststhat contain multiple cryptographic oper

Page 173

Detail InformationRequest Typealgorithm and key size specified in the request; the value for the Deletable and Export-able options are listed as well

Page 174

Current Activity LogFigure 146 Viewing the Current Activity Log sectionThe following table describes the components of the Current Activity Log sectio

Page 175 - High Security Procedures

DescriptionFieldenclosed in brackets ( [] ), the message field displays the plaintext that correspondswith the base64 encoded message included in the

Page 176 - FIPS Status Server overview

DescriptionComponentClick Clear to delete the select log.ClearStatistics pageThe Statistics page enables you to view real-time system statistics about

Page 177 - FIPS Status Report

DescriptionComponentClick Set Refresh Time to apply the new value.Set Refresh TimeClick Refresh Now to refresh the System Statistics page on demand.Re

Page 178

Figure 151 Viewing the Connection Statistics sectionThe following table describes the components of the Connection Statistics section.Table 136 Connec

Page 179 - FIPS Status Server page

Documentation feedbackHP welcomes your feedback.To make comments and suggestions about product documentation, please send a message tostoragedocsFeedb

Page 180 - SSL overview

Figure 152 Viewing the Throughput sectionThe following table describes the components of the Throughput section.Table 137 Throughput section component

Page 181 - SSL Sections

Refresh Statistics (server)The Refresh Statistics section controls how frequently the Server Statistics page is refreshed. Whenthe page is refreshed,

Page 182

Figure 155 Viewing the KMS Statistics sectionThe following table describes the components of the KMS Statistics section.Table 140 KMS Statistics secti

Page 183 - SSL Cipher Order

C Using the Command Line InterfaceShell commandsThe CLI supports a few shell commands that allow you to perform various search, cut, and pasteoperatio

Page 184 - Configuring the KMS Server

• new cert requestIf there are no spaces between segments of quoted and non–quoted text, the two segments are treatedas one argument. Thus, the comman

Page 185 - Authentication Options

If the text you have entered can refer to multiple commands, tab completion will not work, but youcan press the return key to view the possible comman

Page 186 - KMS Server Settings

To exit configure mode and go to view mode, type exit at the prompt:hostname (config)# exithostname#Entering script modeScript mode allows you to crea

Page 187

NOTE:The Script Recorder takes care of all such formatting issues and hence is probably the best way tocreate scripts initially.Script recorderThe Scr

Page 188

Entering passwordsWhenever a command that requires a password is executed in a script, the actual password will notbe stored in the script. Instead, w

Page 189 - User Account Lockout Settings

transfer audit logAutologout Commandsautologoutshow-autologoutBackup and Restore Commandsbackupno backuprestore backupshow backupCA Cert Commandsca ce

Page 190 - Health Check sections

1 Installing and replacing hardwareThis section details the steps to install or replace the SKM hardware:• Preparing for the installation• Rack planni

Page 191 - Configuring the cluster

cert requestcert selfsign installno certificateno requestshow certcli-show-requestCRL Commandscrl auto-updatecrl list sendcrl list updatecrl settingsn

Page 192 - The Cluster Key

traceroute runFIPS Commandsshow fips statusfips serverreset factory settings zeroizesecurity settingsshow security settingsshow fips servershow fips s

Page 193 - Cluster Configuration page

show log rotationshow log signingshow logsigning certshow system syslogsystem syslogMode Commandsconfigureconfigure terminalexitscriptNetwork Commands

Page 194 - Cluster Settings

static routeServices Commandshaltkms-server runkms-server startupno kms-server-runno kms-server startupno snmp runno snmp startupno sshadmin runno ssh

Page 195 - Create Cluster

show snmp usernameshow stationsnmp agentsnmp usernamestationSSL Commandscipherspeccipherspec priorityno cipherspecno export cipherspecno ssl protocolr

Page 196 - Join Cluster

show ntpshow ras settingstimezone setSystem Health Commandsshow system healthSystem Information Commandsshow deviceshow softwaresoftware installsoftwa

Page 197

• activity log rotate• show activity logRelated com-mand(s)show activity log – view the Activity Log.hostname# show activity log <log name> <

Page 198 - Date and Time Settings

hostname# credential settingsRequire Multiple Credentials [n]:Num of Admins Required for Operations:1: 22: 33: 4Enter a number (1 - 3) [1]:Allow Time-

Page 199 - NTP Settings

• show granted credential• no granted credential• credential settings• show credential settingsRelated com-mand(s)ldap test failover – connect to the

Page 200 - Configuring the network

hostname config# password settingsEnable Password Expiration (y/n) [n]:Enable Password History (y/n) [n]:Minimum Password Length [8]:Must Passwords Co

Page 201 - Network Interfaces sections

• Use heel straps, toe straps, or boot straps at standing workstations.Wear the straps on both feet when standing on conductive floors or dissipating

Page 202

hostname# show password settingsPassword Expiration: After 180 daysPassword History: 4 passwords rememberedMinimum Password Length: 8Passwords Must Co

Page 203

show autologout – view the currently configured autologout settings.hostname# show autologoutSyntax• autologoutRelated com-mand(s)Backup and restore c

Page 204 - Static Route List

hostname# show backupSyntax• backup• no backup• restore backupRelated com-mand(s)CA certificate commandsca certificate install – install a CA certific

Page 205 - Hostname & DNS sections

• ca profile• ca profile duplicate• ca profile rename• show ca profile• show ca profile• no ca profile• no ca profile entryRelated com-mand(s)ca profi

Page 206 - Port Speed sections

hostname (config)# local caEnter the certificate name:Enter the common name:Enter the organization name:Enter the organization unit name:Enter the loc

Page 207 - IP Authorization sections

• ca profile• ca profile duplicate• ca profile entry• ca profile rename• show ca profile• show ca profile• no ca profileRelated com-mand(s)no local ca

Page 208 - Allowed Client IP Addresses

• halt• no local caRelated com-mand(s)show signed certificate – display information about certificates signed by local CAs on the SKM.hostname# show s

Page 209 - Configuring SNMP

The certificate import process varies between SKMs.hostname# cert importPlease pick the upload option for uploading your certificate:1) Console Paste

Page 210 - SNMP overview

hostname (config)# cert request <cert name>After executing the cert request command, the system prompts you to provide the followinginformation:

Page 211 - The SNMP Configuration page

• cert request• cli-show-request• no request• cert install• cert import• show cert• cert selfsign installRelated com-mand(s)no request – delete a cert

Page 212 - SNMP Agent Settings

Rack warningsWARNING!To reduce the risk of personal injury or damage to the equipment, be sure that:• The leveling jacks are extended to the floor.• T

Page 213

NoneRelated com-mand(s)crl list send – export a CRL.hostname (config)# crl list send <ca name>Transport Method:1) FTP 2) SCPEnter a number(1-2):

Page 214 - SNMPv3 Username List

hostname (config)# crl settings <ca name>Transport Method:1) FTP 2) SCP 3) HTTPEnter a number(1-3):Host:Filename:Username:Password:Confirm passw

Page 215 - SNMP Management Station List

NoneRelated com-mand(s)show crl list – display the serial number and revocation date of all revoked certificates in the CRL.hostname# show crl listSyn

Page 216

show clientevent log – view the client event log.hostname# show clientevent log <log name> <number of lines>Syntax• clientevent log rotate

Page 217 - Secure Key Manager 217

NOTE:For security purposes, this command can only be run from the CLI at the console.You cannot execute this command remotely via the CLI over SSH or

Page 218

• host run• traceroute run• ping runRelated com-mand(s)traceroute run – print the route packets take to the specified network host.hostname (config)#

Page 219 - Enterprise MIB overview

• show fips serverRelated com-mand(s)reset factory settings zeroize – zeroize all keys and passwords on the device.NOTE:For security purposes, this co

Page 220 - Administrator overview

hostname# show security settingsKey SecurityDisable Creation and Use of Global Keys: YesDisable Non-FIPS Algorithms and Key Sizes: YesDisable RSA Encr

Page 221

hostname (config)# health checkEnable Health Check [n]:Local IP:1: All2: 192.168.200.195Enter a number (1 - 2) [1]:Local Port [9080]:Health check sett

Page 222 - Administrator passwords

Log commandsactivity syslog – enable the SKM to use the syslog protocol to send Activity Log messages to an externalmachine.hostname (config)# activit

Page 223 - LDAP administrative server

ContentsAbout this guide ... 23Intended audience ...

Page 224 - Administrator procedures

When vertical space in the rack is not filled by an SKM or rack component, the gaps between thecomponents cause changes in airflow through the rack an

Page 225 - Create LDAP Administrator

• cli-no-audit-syslog• show audit syslogRelated com-mand(s)clientevent syslog – enable the SKM to use the syslog protocol to send Client Event Log mes

Page 226

log signing – enable Secure Logs.hostname (config)# log signing <log-name>Syntax• recreate logsigning cert• show logsigning cert• show log signi

Page 227 - Password Management overview

show activity syslog – display the syslog settings for the Activity Log.hostname# show activity syslogSyntax• no activity syslog• activity syslogRelat

Page 228

hostname (config)# system syslogSyslog Server #1 IP [None]:Syslog Server #1 Port [514]:Syslog Server #2 IP [None]:Syslog Server #2 Port [514]:Syntax•

Page 229 - Password Management sections

Network commandsedit ip authorization allowed – edit the IP authorization settings for a particular IP address.NOTE:The ip authorization allowed comma

Page 230

hostname (config)# ip address [<ip address> <submask> <interface #>]ip addressEnter the IP address:Enter the subnet mask:Available i

Page 231 - Multiple Credentials overview

• no ip addressRelated com-mand(s)ip name–server – add a domain name server.hostname (config)# ip name-server <IP1> <IP2>...<IPn>NOT

Page 232

no static route – delete a static route on the SKM.hostname (config)# no static routeSyntax• static route• show static routeRelated com-mand(s)show et

Page 233

• edit ip authorization allowed• ip authorization• ip authorization allowed• no ip authorization allowed• show ip authorization allowedRelated com-man

Page 234 - Multiple Credentials sections

• show static route• no static routeRelated com-mand(s)Services commandshalt – halt the SKM.hostname (config)# haltSyntax• rebootRelated com-mand(s)km

Page 235 - Grant a Credential

CAUTION:Protect the SKM from power fluctuations and temporary interruptions with a regulating uninterruptiblepower supply (UPS). This device protects

Page 236

hostname (config)# no sshadmin runSyntax• sshadmin runRelated com-mand(s)no sshadmin startup – disable SSH administration when starting up the SKM.hos

Page 237

• no snmp runRelated com-mand(s)snmp startup – enable SNMP when starting up the SKM.hostname (config)# snmp startupSyntax• no snmp startupRelated com-

Page 238 - LDAP Administrator Server

edit community – edit a community.hostname (config)# edit community <community name>Enter your changes to the community public below.Press enter

Page 239

NOTE:When you execute the edit station command, the system prompts you to provide thenew SNMP management station information. In the example shown her

Page 240

NOTE:When you execute the edit snmp username command, the system prompts you toprovide the new SNMPv3 username information.hostname (config)# no snmp

Page 241 - Viewing logs and statistics

hostname (config)# snmp agentAvailable IP addresses:1. All2. 192.168.200.195SNMP agent IP [All] (1-2): 1SNMP agent port [161]:Enable SNMP traps? (y/n)

Page 242

SSL commandscipherspec – enable a cipher spec.NOTE:The cipher order pertains to the communication channel between the client (application, database,et

Page 243

• show cpiherspec• cipherspec• no cipherspec• no export cipherspec• restore cipherspecRelated com-mand(s)no cipherspec – disable a cipherspec.hostname

Page 244 - Log Configuration page

• show cpiherspec• cipherspec priority• cipherspec• no cipherspec• no export cipherspecRelated com-mand(s)show cipherspec – view the priority of all c

Page 245 - Log Rotation Properties

hostname# show licenseLicenses: 5Syntax• show license usageRelated com-mand(s)show license usage – show the number of licenses currently in use.hostna

Page 246

5. Place shipping materials back into the shipping cartons.6. Set the shipping cartons aside for later use.Identifying the shipping carton contentsA n

Page 247 - Log Signing

hostname (config)# edit ras settingsAvailable IP addresses:1. All2. 192.168.200.195Web Admin Server IP [192.168.200.195] (1-2): 2Web Admin Server Port

Page 248

• show ntp• ntp• no ntp serverRelated com-mand(s)recreate ssh key – recreate the Secure Shell key.NOTE:If you execute the recreate ssh key command fro

Page 249 - Activity Log Settings

hostname (config)# timezone set <time zone>Syntax• clock set• show clockRelated com-mand(s)Table 142 clock set syntax detailsDescriptionParamete

Page 250 - Log Viewer page

System information commandsshow device – view the model number and Unit ID of the SKM.hostname# show deviceSyntax• show softwareRelated com-mand(s)sho

Page 251 - Audit Log

• no system log• show system logRelated com-mand(s)transfer system log – transfer a system log off of the SKM.hostname# transfer system log <log_na

Page 252

D TroubleshootingThis appendix addresses some of the typical problems you might face as the administrator of theSKM.Table 143 Common problemsPossible

Page 253 - Activity Log

Troubleshooting326

Page 254

E Regulatory compliance noticesThis section contains regulatory notices for the HP StorageWorks Secure Key Manager (SKM) appliance.Regulatory complian

Page 255 - Client Event Log

of this equipment in a residential area is likely to cause harmful interference, in which case the userwill be required to correct the interference at

Page 256

Class B equipmentThis Class B digital apparatus meets all requirements of the Canadian Interference-Causing EquipmentRegulations.Cet appareil numériqu

Page 257 - Statistics page

CAUTION:There will be several tamper-evident labels. Do not cut or damage these labels because they arerequired for FIPS compliance audits.Selecting a

Page 258 - Connection Statistics

Korean noticesClass A equipmentClass B equipmentTaiwanese noticesBSMI Class A noticeTaiwan battery recycle statementRecovery text:• “Please recycle wa

Page 259 - Throughput

Laser compliance noticesEnglish laser noticeThis device may contain a laser that is classified as a Class 1 Laser Product in accordance with U.S.FDA r

Page 260 - License Usage

French laser noticeGerman laser noticeItalian laser noticeRegulatory compliance notices332

Page 261 - KMS Statistics

Japanese laser noticeSpanish laser noticeRecycling noticesEnglish noticeSecure Key Manager 333

Page 262

Bulgarian noticeCzech noticeDanish noticeDutch noticeRegulatory compliance notices334

Page 263 - Command Line Interface syntax

Estonian noticeFinnish noticeFrench noticeGerman noticeSecure Key Manager 335

Page 264 - Tab completion

Greek noticeHungarian noticeItalian noticeLatvian noticeRegulatory compliance notices336

Page 265 - Command modes

Lithuanian noticePolish noticePortuguese noticeRomanian noticeSecure Key Manager 337

Page 266 - Scripting mode

Slovak noticeSpanish noticeSwedish noticeTurkish noticeTürkiye Cumhuriyeti: EEE Yönetmeli ine UygundurRegulatory compliance notices338

Page 267 - Installing certificates

Battery replacement noticesDutch battery noticeSecure Key Manager 339

Page 268 - CLI commands

9. Remove the rails from the original appliance for reuse on the replacement appliance. To do so,pull out on the tab of the rail that locks the center

Page 269 - Secure Key Manager 269

French battery noticeGerman battery noticeRegulatory compliance notices340

Page 270

Italian battery noticeJapanese battery noticeSecure Key Manager 341

Page 271 - Secure Key Manager 271

Spanish battery noticeRegulatory compliance notices342

Page 272

F SpecificationsThis section provides the VLS node and specifications.SKM appliance specificationsSpecificationItem4.3 cm (1.70 in)Height70.5 cm (27.8

Page 273 - Secure Key Manager 273

ShippingNon-operatingOperating5% to 95%10% to 95%40% to 60%Relative humidity (noncondensing)2-1000 ft to 40,000 ft-1000 ft to 10,000 ft-1000 ft to 10,

Page 274

GlossaryActive Device In the VRRP group, this is the device that is receiving all network traffic. This istypically the primary device; however, in ca

Page 275 - Activity log commands

periodic time requests to servers, obtaining server time stamps, and using themto adjust the client's clock.Passive device In the VRRP group, the

Page 276

IndexSymbols?, 298Aaccess control, 225activity log level, 275activity log rotate, 275activity syslog, 299administrator, 276administratorscreating, 225

Page 277 - Secure Key Manager 277

clustersand multiple credentials, 233configuring, 193creating, 195joining, 196overview, 191password protection for, 192community, 311configure, 303con

Page 278

Internal Backup List section, 101IP addressesDNS server, 205network, 201ip address, 304IP addressesclient, 208IP authorizationallowed client IP addres

Page 279 - Secure Key Manager 279

3. With the appliance fully seated in the rack, tighten the thumbscrews just until the bezel is securedto the rack.Attaching the cables1. Connect a st

Page 280 - Autologout commands

no ca certificate, 284no ca profile, 284no certificate, 288no cipherspec, 317no clientevent syslog, 301no community, 313no crl list, 291no export ciph

Page 281 - Backup and restore commands

show statistics, 319show activity log, 276show activity syslog, 302show administrator, 279show audit log, 280show audit syslog, 302show autologout, 28

Page 282 - CA certificate commands

time settings, 198timezone set, 321TLS, 180tools, installation, 27Traceroute Information section, 109traceroute run, 295transfer audit log, 280transfe

Page 283 - Secure Key Manager 283

Installing and replacing hardware36

Page 284

2 Configuring the systemStarting the SKM applianceNOTE:To prepare to configure the system, have ready all information listed on the pre-install survey

Page 285 - Secure Key Manager 285

5. Follow the prompts to enter the necessary information:TIP:Press Enter to accept the default.a. Admin account password. The Security Officer will us

Page 286 - Certificate commands

6. Configure the default settings for the key replication interval and retry attempts.NOTE:These commands require firmware version 1.1 or greater.a. L

Page 287

Creating and installing the SKM Server Certificate ... 47Propagating third-party certif

Page 288

If you are replacing an SKM appliance or adding a member to an existing cluster, skip to Establishinga cluster.The configurations in this step are per

Page 289 - CRL commands

6. Add the Local CA to the Trusted CAs list.a. In Certificates & CAs, click Trusted CA Lists to display the Trusted Certificate Authority ListProf

Page 290

3. Enter information required by the Create Certificate Request section of the window to create theSKM server certificate.a. Enter a Certificate Name

Page 291 - Secure Key Manager 291

10. Enter data required by the Sign Certificate Request section of the window.a. Select the CA name from the Sign with Certificate Authority drop down

Page 292 - Client event log commands

3. In the KMS Server Settings section of the window, click Edit. The following warning may display.4. Configure the KMS Server Settings as shown. (Ens

Page 293

1. From the SKM management console, click the Device tab.2. In the Device Configuration menu, click Cluster.3. Type the cluster password in the Create

Page 294 - Diagnostic commands

2. If you skipped Creating the cluster, retrieve the cluster key text file now. To do so, select theCluster Settings section of the window, click Down

Page 295 - FIPS commands

6. Join the appliance to the cluster.a. Select the Device tab.b. In the Device Configuration menu, click on Cluster.c. In the Cluster, click on Join C

Page 296

8. Click on the SKM Local CA.9. Click Sign Request.10. Enter information required in the Sign Certificate Request section of the window as shown:a. In

Page 297 - Secure Key Manager 297

6. Click Select None.7. Click Continue.8. In the Create Backup screen, type a name, description, and password for the certificate backup.9. Select Dow

Page 298 - History commands

Viewing the FIPS status report ... 67KMS server procedures

Page 299 - Log commands

Configuring the system50

Page 300

3 Performing configuration and operationtasksKey and policy proceduresCreating a keyTo create a key:1. Log in to the Management Console as an administ

Page 301 - Secure Key Manager 301

4. Enter a value in the Owner Username field to assign a specific owner or leave this value blankto create a global key. If an owner is listed for the

Page 302

4. Click Download Public Key to download the public portion of the RSA key.Deleting a keyTo delete a key:1. Log in to the Management Console as an adm

Page 303 - Mode commands

User and group proceduresNOTE:User accounts and groups can be managed locally on the SKM and shared among clustered nodes.This is the preferred method

Page 304 - Network commands

2. Navigate to the Local Groups section of the User & Group Configuration page (Security > LocalUsers & Groups).3. Select a Group and click

Page 305 - Secure Key Manager 305

LDAP server proceduresSetting up the LDAP user directoryTo set up the LDAP user directory:1. Log in to the Management Console as an administrator with

Page 306

2. Navigate to the LDAP Failover Server Properties section of the LDAP Server Configuration page(Security > LDAP > LDAP Server).3. Click Edit.4.

Page 307 - Secure Key Manager 307

NOTE:To generate a valid certificate, you must have a certificate authority sign a certificate request. Youcan create local CAs on the SKM, and use th

Page 308

7. Navigate to the Local Certificate Authority List section.8. Select a CA and click Sign Request.9. Paste the certificate request into the Certificat

Page 309 - Services commands

Enabling signed logs ... 90Verifying a secure l

Page 310

6. Copy the certificate request text. The certificate text looks similar, but not identical, to the followingtext.-----BEGIN CERTIFICATE REQUEST-----M

Page 311 - SNMP commands

IMPORTANT:A self-signed certificate should be used for testing purposes only. Any attempt to connect with anSKM using a test self-signed certificate s

Page 312

6. Click Save.The SKM verifies the validity of the newly installed certificate. If determined to be valid, thecertificate appears as “Certificate Acti

Page 313

Certificate Authority (CA) proceduresAdding a CA certificate to the trusted CA listTo add a CA certificate to the trusted CA list:1. Log in to the Man

Page 314

Deleting a trusted CA list profileTo delete a trusted certificate authority list profile:1. Log in to the Management Console as an administrator with

Page 315 - Secure Key Manager 315

2. Navigate to the Local Certificate Authority List section of the Certificate and CA Configurationpage (Security > Local CAs).3. Select a certific

Page 316 - SSL commands

4. Select Intermediate CA Request as the Certificate Authority Type.5. Click Create. The new request appears in the Local Certificate Authority List s

Page 317

2. Navigate to the Install CA Certificate section of the Certificate and CA Configuration page(Security > Known CAs).3. Enter a value for the Certi

Page 318 - Statistics commands

KMS server proceduresThe KMS server is the firmware component of the SKM server that manages communications betweenthe SKM and the clients. This secti

Page 319 - System commands

Enabling password authenticationTo enable password authentication:1. Log in to the Management Console as an administrator with KMS Server access contr

Page 320

Accessing the Help system ... 120Using the Key and Polic

Page 321

Clustering proceduresCreating a clusterYou create a cluster on one SKM and then join other members to that cluster. To create a cluster:1. Select an S

Page 322 - System health commands

4. Click Synchronize With and confirm this action. As part of the synchronization, the KMS Serverwill create an automatic synchronization backup befor

Page 323 - System log commands

Upgrading a clusterA cluster can be upgraded by upgrading one device at a time. Once all of the devices are runningthe new software, you can configure

Page 324

2. Navigate to the NTP Settings section of the Date & Time Configuration page (Device > Date &Time).3. Click Edit.4. Select Enable NTP.5. E

Page 325 - D Troubleshooting

7. Repeat steps 3 through 6 as needed.8. Click Edit on the IP Authorization Settings section.9. For each service select either Allow All Connections t

Page 326 - Troubleshooting326

1. Configure the agent at the SNMP Agent Settings section.2. Create an SNMPv3 username at the SNMPv3 Username List section to enable the NMS to access

Page 327 - FCC rating label

5. If using SSL, select Use SSL and enter the Trusted Certificate Authority.6. Enter the number of seconds to wait for the LDAP server during connecti

Page 328 - Class A equipment

3. Click LDAP Test.Password management proceduresChanging your passwordTo change your administrator account password:1. Log in to the Management Conso

Page 329 - Japanese notices

access to the SKM configuration is secured but not in a haphazard manner. It is best to have adocumented procedure in place to handle such a situation

Page 330 - Taiwanese notices

1. Log in to the Management Console as an administrator with High Access Administrator accesscontrol. This is the administrator that will grant creden

Page 331 - Laser compliance notices

Support for Certificate Revocation Lists ... 167Local CAs ...

Page 332 - Italian laser notice

6. Click Sign Request. This will take you to the CA Certificate Information section where the certificateis displayed in PEM format.7. Click the Downl

Page 333 - Recycling notices

5. Click Save.NOTE:This feature is immediately enabled when you select Web Admin User Authentication. Youwill be logged out of the Management Console

Page 334 - Dutch notice

2. Determine the Key Sharing Group.a. From the filtered list of keys, choose the one with the most recent timestamp (the numbersequence at the end of

Page 335 - German notice

3. Export (backup) the key.a. From the Device tab, in the Maintenance menu on the left, select Backup & Restore, thenselect Create Backup to displ

Page 336 - Latvian notice

Figure 7 Entering backup informationi. Click Backup.A message displays when the backup is complete. The backup operation should take a fewseconds.4. S

Page 337 - Romanian notice

5. Import (restore) the backup file to Cluster #2a. On the SKM, from the Device Tab, in the Maintenance menu on the left, select Backup &Restore,

Page 338 - Turkish notice

6. Restart the SKM software.NOTE:Following a restore, the SKM must be restarted.a. From the SKM Device tab, in the Maintenance menu, select Services.b

Page 339 - Battery replacement notices

8. Ensure that the key sharing group has been added.a. From the SKM interface, Security tab, Users and LDAP Menu, select Local Users and Groups.b. Ver

Page 340 - German battery notice

3. In the Keys field, select No keys.4. Click Continue.5. In the Device Items field, click Select All.6. Click Continue.7. In the Backup Summary secti

Page 341 - Japanese battery notice

1. From the SKM interface on the Device tab, in the Maintenance menu, select Backup Restore, thenCreate Backup.2. In the Create Backup pane, in the Se

Page 342 - Spanish battery notice

Hostname Setting ... 205DNS Server List ...

Page 343 - F Specifications

1. Log in to the Management Console as an administrator with Logging access control.2. Navigate to the Log Configuration page (Device > Log Configu

Page 344

3. Double-click on the file. Outlook Express will open and display a help screen with a securityheader that reads: “Digitally signed - signing digital

Page 345 - Glossary

Recreating the log signing certificatePrior to creating a new log signing certificate, backup the old certificate so you can verify previouslysigned l

Page 346 - Glossary346

Clearing a logTo clear a log:1. Log in to the Management Console as an administrator with Logging access control.2. Navigate to the Log Viewer page (D

Page 347

Performing configuration and operation tasks94

Page 348

4 Maintaining the SKMBackup and restore overviewClustering SKM nodes is an effective way of exchanging keys and configuration data to allow forfailove

Page 349

If one of these objects is being restored on a device where there is already a similar object with thesame name, the key, certificate, or local CA fro

Page 350

Figure 14 Viewing the Create Backup: Security Items sectionThe following table describes the components of the Create Backup: Security Items section.T

Page 351

DescriptionComponentsClick Continue to configure the next group of items.ContinueCreate Backup: Device ItemsUse this section to select the device item

Page 352

Figure 16 Viewing the Create Backup: Backup Settings sectionThe following table describes the components of the Create Backup: Backup Settings section

Comments to this Manuals

No comments