Hp Secure Key Manager Manual do Utilizador

Consulte online ou descarregue Manual do Utilizador para Armazenamento Hp Secure Key Manager. HP Secure Key Manager User Manual Manual do Utilizador

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir

Resumo do Conteúdo

Página 1 - Secure Key Manager

HP StorageWorksSecure Key Managerusers guide*AJ087-96018*Part number: AJ087–960183rd edition: April 2009

Página 2

Secure logs ... 244Log Configuration page .

Página 3 - Contents

DescriptionComponentsClick Cancel to abort the backup and return to the Create Backup: Security Items section.CancelDisplays all of the items that cou

Página 4

NOTE:Key Manager DataSecure appliance Number of Active Versions Allowed for a Key setting on the Keyand Policy Configuration page. If the key has more

Página 5

Figure 19 Viewing the Internal Backup List sectionThe following table describes the components of the Internal Backup List section.Table 7 Internal Ba

Página 6

Figure 20 Viewing the Services List sectionThe following table describes the components of the Services List section.Table 8 Services List section com

Página 7

Figure 21 Viewing the Restart/Halt sectionThe following table describes the components of the Restart/Halt section.Table 9 Restart/Halt section compon

Página 8

Figure 22 Viewing the Device Information sectionThe following table describes the components of the Device Information section.Table 10 Device Informa

Página 9

Software Upgrade/InstallThe software upgrade and installation mechanism can be used to install new features, upgrade coresoftware, and apply security

Página 10

IMPORTANT:You must be running the base release upon which the patch is built before upgrading to the patchrelease. You cannot upgrade directly from a

Página 11

Figure 25 Viewing the Refresh Page sectionThe following table describes the components of the Refresh Page section.Table 13 Refresh Page section compo

Página 12

Cooling Fan StatusThe Cooling Fan Status section provides information on the status all of the SKM's cooling fans. Thefollowing table describes t

Página 13

Health check configuration commands ... 297Help commands ...

Página 14

Traceroute InformationUse the Traceroute Information section to examine the path between the SKM and a destination.Figure 29 Viewing the Traceroute In

Página 15

Figure 31 Viewing the Netstat Information sectionThe following table describes the components of the Netstat Information section.Table 19 Netstat Info

Página 16

Maintaining the SKM112

Página 17

A SKM appliance information sheetThis information is specific to the HP StorageWorks Secure Key Manager (SKM) appliance to whichit is attached. There

Página 18

Figure 33 Front and top of SKM applianceFigure 34 Back of SKM applianceDescriptionItemProduct ID number (PID) of the appliance1Serial number of the ap

Página 19

B Using the Management ConsoleLogging in and outUse the Administrator Authentication screen to log into the Management Console.Figure 35 Viewing the A

Página 20

• Recent ActionsSecurity SummaryUse this section to view security-related summary information for your SKM.Figure 37 Viewing the Security Summary sect

Página 21

DescriptionComponentDisplays the version of the software currently running on the SKM.Software VersionDisplays the current date.DateDisplays the curre

Página 22

Figure 40 Viewing the Search Criteria sectionThe following table describes the components of the Search Criteria section.Table 24 Search Criteria sect

Página 23 - About this guide

Using features common to the Security and Device tabsThe following sections describe how to set display parameters for Management Console viewing.Thes

Página 24 - Rack stability

Estonian notice ... 335Finnish notice ...

Página 25 - HP websites

Accessing the Help systemThe Management Console provides you with two ways to access product documentation:context-sensitive help, and help. Both meth

Página 26 - Documentation feedback

Figure 46 Finding the Help linkClicking this icon opens the help system in a new web browser. The default page shows the table ofcontents.Using the Ke

Página 27 - Taking ESD precautions

CAUTION:Do not delete keys that might be needed to decrypt data at some point in the future. Once youdelete a key, there is no way to decrypt data tha

Página 28 - Rack planning resources

DescriptionComponentThe algorithm might be any of the following:• AES-256• AES-192• AES-128• DES-EDE-168 (three key triple DES)• DES-EDE-112 (two key

Página 29 - Optimum environment

Figure 48 Viewing the Key Properties sectionThe following table describes the components of the Key Properties section.Table 29 Key Properties section

Página 30 - Power requirements

The state, combined with the key type and group permissions determine how the key version can beused. Ultimately, a key version can only be used when:

Página 31 - Unpacking

DescriptionComponentClick Delete to remove the permissions for a group.DeleteFor example, in Figure 49, members of group1 have permission to export ke

Página 32

DescriptionComponentClick Add to add an attribute.AddClick Delete to remove the selected attribute.DeleteKey Versions and Available UsageUse this sect

Página 33 - Selecting a rack location

Figure 52 Viewing the Public Key sectionThe following table describes the components of the Public Key section.Table 33 Public Key section componentsD

Página 34

DescriptionComponentClick Save Query to save the query without executing it.Save QueryClick Run Query without Saving to execute the query. The query n

Página 35 - Attaching the cables

FiguresIdentify the contents of the shipping carton ... 321Connect the power supplies to

Página 36

Figure 55 Viewing the Modify Query sectionNOTE:You cannot greatly modify the built-in query [All]. The Appliance will only permit you to change theCol

Página 37 - 2 Configuring the system

Figure 56 Viewing the Create Key sectionThe following table describes the components of the Create Key section.Table 37 Create Key section componentsD

Página 38 - Configuring the system38

DescriptionComponentWhen selected, the key contains multiple versions, up to a maximum of 4000. Eachkey version has unique key bytes, but shared key m

Página 39

IMPORTANT:The server will not import keys that are known to be weak, such as 64 bit DES. In addition, the paritybits must be set properly; otherwise,

Página 40 - Configuring the system40

DescriptionComponentA check mark in the box indicates that the key is deletable via an XML request by thekey owner (or any user for global keys). Afte

Página 41

NOTE:Authorization policies cannot be applied to global keys or to certificates. Key owners are not subjectto policy restrictions.The Authorization Po

Página 42 - Configuring the system42

Figure 60 Viewing the Authorization Policy Properties sectionThe following table describes the Authorization Policies Properties section.Table 41 Auth

Página 43

Figure 61 Viewing the Authorized Usage Periods sectionThe following table describes the Authorization Usage Periods section.Table 42 Authorization Usa

Página 44 - Establishing a cluster

Figure 62 Viewing the Active Versions sectionTable 43 Active Versions section componentsDescriptionComponentDisplays the number of active versions all

Página 45

Configuring the users and groupsA user directory contains a list of users that may access the keys on your KMS Server, and a list ofgroups to which th

Página 46 - Configuring the system46

Front and top of SKM appliance ... 11433Back of SKM appliance ...

Página 47

Figure 64 Viewing the Local Users sectionThe following table describes the components of the Local Users section.Table 45 Local Users section componen

Página 48 - Copying the certificates

NOTE:The User Administration Permission and Change Password Permission apply only to local users. LDAPusers cannot be managed through the SKM; they mu

Página 49 - Installing the certificates

Figure 66 Viewing the Custom Attributes sectionThe following table describes the components of the Custom Attributes section.Table 47 Custom Attribute

Página 50 - Configuring the system50

Figure 67 Viewing the Local Groups sectionThe following table describes the components of the Local Groups section.Table 48 Local Groups section compo

Página 51 - Key and policy procedures

Figure 69 Viewing the User List sectionThe following table describes the components of the User List section.Table 50 User List section componentsDesc

Página 52 - Downloading an RSA key

Figure 70 Viewing the LDAP User Directory Properties sectionThe following table describes the components of the LDAP User Directory Properties section

Página 53 - Deleting a key

Figure 71 Viewing the LDAP Schema Properties sectionThe following table describes the components of the LDAP Schema Properties section.Table 52 LDAP S

Página 54 - User and group procedures

DescriptionComponentClick Edit to modify the properties.EditClick Clear to remove the current properties.ClearLDAP Failover Server PropertiesUse the L

Página 55 - Deleting a group

• User ListLDAP UsersThe LDAP Users section displays the users available in the LDAP user directory.Figure 73 Viewing the LDAP Users sectionThe follow

Página 56 - LDAP server procedures

Figure 74 Viewing the LDAP Groups sectionThe following table describes the components of the LDAP Groups section.Table 55 LDAP Groups section componen

Página 57 - Certificate procedures

Viewing the LDAP User Directory Properties section ... 14570Viewing the LDAP Schema Properties section

Página 58

Certificate and CA Configuration PageCertificates identify one entity to another. In this case, when making SSL connections between a clientapplicatio

Página 59 - Creating a client certificate

DescriptionComponentA certificate summary containing the following information:• Common Name: Name of entity to which certificate is issued. This is t

Página 60

Figure 77 Viewing the Certificate Information sectionThe following table describes the components of the Certificate Information section.Table 58 Cert

Página 61 - Installing a certificate

DescriptionComponentClick Install Certificate to go to the Certificate Installation page. The Install Certificatebutton can be applied to either certi

Página 62 - Downloading a certificate

The following table describes the components of the Certificate Installation section.Table 59 Certificate Installation section componentsDescriptionCo

Página 63

DescriptionComponentThe duration during which the certificate is valid.Certificate Duration(days)Click Create to create the certificate.CreateClick Ba

Página 64 - Downloading a local CA

DescriptionComponentE–mail address of person requesting the certificate. This field is optional.Email AddressSize of key being generated. The SKM supp

Página 65 - Creating a local CA

DescriptionComponentThe password used to access the key.Private Key PasswordClick Import Certificate to import the certificate to SKM.Import Certifica

Página 66 - Installing a CA certificate

DescriptionComponentClick Edit to change the name of a profile.EditClick Add to create a profile. A newly created profile is initially empty. You must

Página 67 - FIPS status server procedures

Figure 84 Viewing the Trusted Certificate Authority List (Edit Mode)The following table describes the components of the Trusted Certificate Authority

Página 68 - KMS server procedures

Viewing the Join Cluster section ... 197107Viewing the Date and Time Settin

Página 69

Figure 85 Viewing the Local Certificate Authority List sectionThe following table describes the components of the Local Certificate Authority List sec

Página 70 - Clustering procedures

Figure 86 Viewing the CA Certificate Information sectionThe following table describes the components of the CA Certificate Information section.Table 6

Página 71 - Setting up SSL in a cluster

Sign Certificate RequestUse the Sign Certificate Request section to sign certificate requests.Figure 87 Viewing the Sign Certificate Request sectionTh

Página 72 - Date and time procedures

Figure 88 Viewing the Signed Certificates sectionThe following table describes the components of the Signed Certificates section.Table 69 Signed Certi

Página 73 - IP authorization procedures

Figure 89 Viewing the Signed Certificate Information sectionThe components of the Signed Certificate Information section are view-only.Create Local CA

Página 74 - SNMP procedures

Figure 90 Viewing the Create Local Certificate Authority sectionThe following table describes the components of the Create Local Certificate Authority

Página 75

DescriptionComponentLocal CAs can be one of two types: Self-signed root CA, or Intermediate CA Request.When you create a self-signed root CA, you must

Página 76 - Setting up the LDAP schema

DescriptionComponentDisplays one of three values:Certificate Active - The CA can be used to issue certsand sign certificate requests.Certificate Expir

Página 77 - Changing your password

CRL v2 format. Support for CRLs on the SKM allows you to obtain, query, and maintain CRLs publishedby CAs supported on the SKM. The SKM uses CRLs to v

Página 78 - Granting credentials

NOTE:The Auto-Update feature does not apply to local CAs.Force Periodic UpdateThe SKM performs a daily check of the Next Update field to determine whe

Página 79 - Revoking a credential grant

Viewing the Current Audit Log section ... 252144Viewing the Activity Log section ..

Página 80

Only the following models are capable of operating in accordance with FIPS standards:• HP DL360 R05All other SKM can be configured for high security b

Página 81

Software Patches and UpgradesHP will indicate which software patches and upgrades are FIPS certified. Apply only FIPS certifiedsoftware to a FIPS-comp

Página 82

DescriptionComponentClick Set FIPS Compliant to alter the settings shown in the High Security Settings andSecurity Settings Configured Elsewhere secti

Página 83

Figure 94 Viewing the High Security Settings sectionThe following table describes the components of the High Security Settings section.Table 74 High S

Página 84

DescriptionComponentPrevents administrators from changing RAID drives through the Management Console.IMPORTANT:You cannot replace RAID drives and rema

Página 85

DescriptionComponentDisplays the SSL Protocols enabled in the SSL Options section. Click the link to accessthe SSL Options section. FIPS compliance re

Página 86

Configuring the High Security Settings on an SKMIMPORTANT:When you enable FIPS compliance on the SKM, the functionality displayed here is disabled. Mo

Página 87

DescriptionConditionalpower-onTestKnown Algorithm Test for the X9.31 PRNG. This testis performed at power-on.XX9.31 PRNGTest of the random number gene

Página 88

Figure 96 Viewing the FIPS Status Report: normalThe following table describes the components of the FIPS Status Server Settings section.Table 77 FIPS

Página 89 - Log configuration procedures

DescriptionComponentDisplays the result and timestamp for each of the following self-tests:• AES Encryption• DES Encryption• DSA Encryption• HMAC Algo

Página 90 - Enabling signed logs

TablesDocument conventions ... 231Create Backup: Security It

Página 91

DescriptionComponentSelect the IP addresses on which the FIPS Status Server is enabled on the SKM.Local IPSelect the port on which the server status r

Página 92 - Log view procedures

SSL Session TimeoutAll SSL sessions stored in the SKM's session cache have an expiration period, typically two hours.This means the SKM accepts a

Página 93 - Clearing a log

IMPORTANT:Some web browsers, including Internet Explorer 6.0, do not have TLS 1.0 enabled by default. If youdisable SSL 2.0 and 3.0, please check firs

Página 94

SSL Cipher OrderUse this section to enable, disable, and order the priority of SSL ciphers.Different applications and databases support different encr

Página 95 - 4 Maintaining the SKM

DescriptionComponentThis field specifies the Hash function to use for SSL session integrity. The supportedHash functions are:• SHA–1: (Secure Hash Alg

Página 96 - Backup and restore page

The KMS Server can define a local users and groups list or you can use an LDAP server to centrallymanage your users and groups.Authentication OptionsT

Página 97 - Secure Key Manager 97

Key Management Services Configuration sectionsThe Key Management Services Configuration page enables you to configure the KMS Server, KMSServer Authen

Página 98 - Create Backup: Device Items

DescriptionComponentThe Connection Timeout value specifies in seconds how long client connections canremain idle before the KMS Server begins closing

Página 99

Figure 101 Viewing the KMS Server Authentication Settings sectionThe following table describes the elements of the KMS Server Authentication Settings

Página 100 - Restore Backup

DescriptionComponentThis field allows you to select a profile to use to verify that client certificates are signedby a CA trusted by the SKM. This opt

Página 101 - Internal Backup List

Public Key section components ... 12833Create Query section components ..

Página 102 - Services Configuration page

DescriptionComponentClick Edit to modify the account lockout settings.EditHealth Check overviewThe Health Check feature allows you to configure client

Página 103 - Restart/Halt

DescriptionComponentIn this field you specify the IP address on which you want to listen for health checkrequests. You can specify an individual IP ad

Página 104 - System Information page

• LDAP Server• SSL• Administrators and Remote Administration• IP Authorization• Logging• Service Startup• Known CAs, CRLs, and Trusted CA List Profile

Página 105 - License Information

NOTE:When upgrading from a previous release, local CA replication is disabled by default.Automatic Synchronization BackupsPrior to each synchronizatio

Página 106 - Software Upgrade/Install

DescriptionComponentThe port on which the device listens for cluster administration requests.CAUTION:The cluster port (typically 9001) must be differe

Página 107 - System Health page

Figure 105 Viewing the Cluster Settings sectionThe following table describes the components of the Cluster Settings section.Table 86 Cluster Settings

Página 108 - Power Supply Status

Figure 106 Viewing the Create Cluster sectionThe following table describes the components of the Create Cluster section.Table 87 Create Cluster sectio

Página 109 - Network Diagnostics page

Figure 107 Viewing the Join Cluster sectionThe following table describes the components of the Join Cluster section.Table 88 Join Cluster section comp

Página 110 - Netstat Information

• Date & Time ProceduresNetwork Time Protocol overviewThe Network Time Protocol (NTP) is a protocol by which computers on a network synchronize th

Página 111 - Reading Netstat Results

Figure 108 Viewing the Date and Time Settings sectionThe following table describes the components of the Date and Time Settings section.Table 89 Date

Página 112 - Maintaining the SKM112

Legal and notice information© Copyright 2007, 2009 Hewlett-Packard Development Company, I.E.© Copyright 2000, 2008 Ingrian Networks, Inc.Confidential

Página 113

Create Local Certificate Authority section components ... 16570CA Certificate List section components ...

Página 114

Figure 109 Viewing the NTP Settings sectionThe following table describes the components of the NTP Settings section.Table 90 NTP Settings section comp

Página 115 - Using the Home tab

Network Interfaces sectionsThe Network Configuration page contains the following network interface-related section:• Network Interface ListNetwork Int

Página 116 - System Summary

Figure 111 Viewing the Default Gateway List sectionThe following table describes the components of the Default Gateway List section.Table 92 Default G

Página 117 - Search screen

Example 2. Example 2Used for Outgoing ConnectionsDefault GatewayInter-face-----------------------------------------------------------------—nononeEthe

Página 118

This configuration is the same as example 3, but in this scenario there are some hosts and networksthat are not reachable through 172.17.7.1. Most oft

Página 119 - Filtering sections

Hostname & DNS sectionsThe Network Configuration page contains the following hostname and DNS-related sections:• Hostname Setting• DNS Server List

Página 120 - Accessing the Help system

The following table describes the components of the DNS Server List section.Table 95 DNS Server List section componentsDescriptionComponentsUse the Up

Página 121

Figure 115 Viewing the Network Interface Port Speed/Duplex sectionThe following table describes the components of the Network Interface Port Speed/Dup

Página 122

Figure 116 Viewing the IP Authorization Settings sectionThe following table describes the components of the IP Authorization Settings section.Table 97

Página 123 - Key Properties

Figure 117 Viewing the Allowed Client IP Addresses sectionThe following table describes the components of the Allowed Client IP Addresses section.Tabl

Página 124 - Versioned keys

Change Your Password section components ... 229107Password Settings for Local Administrator

Página 125 - Group Permissions

SNMP overviewThe SNMP protocol enables network and system administrators to remotely monitor devices on thenetwork, such as switches, routers, proxies

Página 126 - Custom Attributes

secret key, and sends the message to the receiver, who decrypts it using the DES algorithm and thesame secret key.Access controlAccess control in SNMP

Página 127 - RSA Public Key

This page contains the following sections:• SNMP Agent Settings – Changes to the SNMP Agent Settings section apply to all managementstations, username

Página 128 - Create Query

NOTE:If you are configuring the agent to communicate with an NMS running SNMPv3 software, you candisregard this section.When creating a community on t

Página 129 - Modify Query

SNMPv3 Username ListAs the name suggests, the SNMPv3 Username List is used to configure the agent to communicate withan NMS running SNMPv3 software. Y

Página 130 - Create Key

DescriptionComponentThis password is used to create the secret key that performs the encrypt and decryptoperations on the data shared between the agen

Página 131

DescriptionComponentDisplays either the management community or username. The management communityis used to send SNMP data to the SNMPv1/v2 managemen

Página 132 - Import Key

DescriptionComponentName that is used to send SNMP data to SNMPv3 management stations. The usernameis used to create a key that is shared by the agent

Página 133

Figure 123 Viewing the Create SNMP Management Station sectionThe following table describes the components of the Create SNMP Management Station sectio

Página 134

DescriptionComponentYou can choose from MD5 and SHA.Auth Protocol (v3only)This password is used to create the secret key that is used to authenticate

Página 136 - Authorized Usage Periods

• Security Warnings – an administrative experienced multiple password failures while attemptingto log in, the system was reset to factory settings, th

Página 137 - Active Versions

and stored on the SKM appliance. The available access controls are grouped into categories anddescribed here.Security Configuration access controls en

Página 138 - Custom Key Attributes

When creating an administrator, you should assign the minimum amount of access controls needed.For example, a backup administrator will only need the

Página 139 - Local Users

WARNING!It is absolutely crucial that you remember the passwords for all of your local administrators. Forsecurity reasons, there is no way to reset a

Página 140

Configuration of the LDAP Administrator Server and the first LDAP administrator must be performedby a local administrator. Thereafter, you can use the

Página 141 - Selected Local User

1. Log in the Management Console as an administrator with High Access Administrator accesscontrol.2. Navigate to the Administrator section on the Admi

Página 142 - Local Groups

DescriptionComponentAccess control options related to device security configuration.• Keys and Authorization Policies: Create, modify and delete keys

Página 143 - User List

Select LDAP UsernameThe Select LDAP Username section enables you to browse and select an LDAP user when creating anLDAP administrator account.Figure 1

Página 144 - LDAP Server Configuration

Password expirationThe password expiration feature allows you to specify a duration for administrator passwords. Bydefault, this feature is disabled.

Página 145 - LDAP Schema Properties

CAUTION:In addition to all scheduled password changes, immediately change all administrator, user account,and backup passwords any time a security off

Página 146

About this guideThis guide provides information about:• Installing an HP StorageWorks Secure Key Manager• Configuring an HP StorageWorks Secure Key Ma

Página 147

DescriptionComponentRe-enter the new password.Confirm New Pass-wordClick Change Password to implement any changes made to this section.Change Password

Página 148 - LDAP Groups

DescriptionComponentEnter the minimum password length. The default length is 8. This value applies to allpasswords on the SKM (local administrator, us

Página 149

Any request for these operations, from either the Management Console or the CLI, results in a requestfor additional administrator accounts and passwor

Página 150 - Certificate List

NOTE:If the SKM is configured to use NTP, modifications to the NTP system time can extend the life span ofa granted credential.NOTE:Granted credential

Página 151 - Certificate Information

Multiple Credentials sectionsThe Multiple Credentials sections on the Administrator Configuration page lets you enable the multiplecredentials feature

Página 152 - DescriptionComponent

Credentials GrantedUse the Credentials Granted section to view the credentials granted to or by the current administrator.Any credential grants that d

Página 153 - Certificate Installation

DescriptionComponentEnter the length of duration. This duration cannot be longer than the Maximum Durationfor Time-Limited Credentials established in

Página 154 - Self Signed Certificate

Figure 131 Viewing the Remote Administration Settings sectionThe following table describes the components of the Remote Administration Settings sectio

Página 155 - Create Certificate Request

DescriptionComponentsThe SSH Admin Server IP address is the IP address used to configure the SKM from theCLI. You can select one specific IP address o

Página 156

LDAP Administrator Server Properties sectionUse the LDAP Administrator Server Properties section to define the basic properties of the LDAPadministrat

Página 157

ElementConvention• File and directory names• System output• Code• Commands, their arguments, and argument valuesMonospace text• Code variables• Comma

Página 158 - The Default Profile

Figure 133 Viewing LDAP Schema Properties sectionTable 114 LDAP Schema Properties section componentsDescriptionComponentThe base distinguished name (D

Página 159

DescriptionComponentClick to modify the properties.EditClick to remove the current properties.ClearClick to test the LDAP connection after you have de

Página 160 - CA Certificate Properties

For example, you can schedule that system rotate the Audit Log every Sunday morning at 3:15 orwhen the file size reaches 100 MB, whichever comes first

Página 161 - Secure Key Manager 161

DescriptionValueThe date and time when the log file was created.datetime stampThe hostname of the SKM.hostnameFor example, the filename audit.log.1.20

Página 162 - Signed Certificates

2005-09-12 10:23:47 irwin.company.com KMS Server: Starting KMS Serverlog message at syslog server (displays on one line):-----------------------------

Página 163

Figure 135 Viewing the Rotation Schedule sectionThe following table describes the components of the Rotation Schedule section.Table 117 Rotation Sched

Página 164 - Create Local CA

Figure 136 Viewing the Log Rotation Properties sectionThe following table describes the components of the Log Rotation Properties section.Table 118 Lo

Página 165 - Secure Key Manager 165

Syslog SettingsTo enable syslog, select a type of log, and click Edit. Specify a hostname or IP address of the primarylog server (Syslog Server #1) an

Página 166 - CA Certificate List

Figure 138 Viewing the Log Signing sectionThe following table describes the components of the Log Signing section.Table 120 Log Signing section compon

Página 167 - Install CA Certificate

Figure 139 Viewing the Log Signing Certificate Information sectionThe following table describes the components of the Log Signing Certificate Informat

Página 168 - Local CAs

HP technical supportFor worldwide technical support information, see the HP support website:http://www.hp.com/supportBefore contacting HP, collect the

Página 169 - Advanced Security overview

Figure 140 Viewing the Activity Log Settings sectionThe following table describes the components of the Activity Log Settings section.Table 122 Activi

Página 170

Figure 141 Viewing the System Log sectionThe following table describes the components of the System Log section.Table 123 System Log section component

Página 171 - FIPS Compliance

• Date and time change was made.• Username: the username that made the configuration change.• Event: a text description of the configuration change.Fi

Página 172 - High Security Settings

Activity LogThe Activity Log contains a record of each request received by the KMS Server. For client requeststhat contain multiple cryptographic oper

Página 173

Detail InformationRequest Typealgorithm and key size specified in the request; the value for the Deletable and Export-able options are listed as well

Página 174

Current Activity LogFigure 146 Viewing the Current Activity Log sectionThe following table describes the components of the Current Activity Log sectio

Página 175 - High Security Procedures

DescriptionFieldenclosed in brackets ( [] ), the message field displays the plaintext that correspondswith the base64 encoded message included in the

Página 176 - FIPS Status Server overview

DescriptionComponentClick Clear to delete the select log.ClearStatistics pageThe Statistics page enables you to view real-time system statistics about

Página 177 - FIPS Status Report

DescriptionComponentClick Set Refresh Time to apply the new value.Set Refresh TimeClick Refresh Now to refresh the System Statistics page on demand.Re

Página 178

Figure 151 Viewing the Connection Statistics sectionThe following table describes the components of the Connection Statistics section.Table 136 Connec

Página 179 - FIPS Status Server page

Documentation feedbackHP welcomes your feedback.To make comments and suggestions about product documentation, please send a message tostoragedocsFeedb

Página 180 - SSL overview

Figure 152 Viewing the Throughput sectionThe following table describes the components of the Throughput section.Table 137 Throughput section component

Página 181 - SSL Sections

Refresh Statistics (server)The Refresh Statistics section controls how frequently the Server Statistics page is refreshed. Whenthe page is refreshed,

Página 182

Figure 155 Viewing the KMS Statistics sectionThe following table describes the components of the KMS Statistics section.Table 140 KMS Statistics secti

Página 183 - SSL Cipher Order

C Using the Command Line InterfaceShell commandsThe CLI supports a few shell commands that allow you to perform various search, cut, and pasteoperatio

Página 184 - Configuring the KMS Server

• new cert requestIf there are no spaces between segments of quoted and non–quoted text, the two segments are treatedas one argument. Thus, the comman

Página 185 - Authentication Options

If the text you have entered can refer to multiple commands, tab completion will not work, but youcan press the return key to view the possible comman

Página 186 - KMS Server Settings

To exit configure mode and go to view mode, type exit at the prompt:hostname (config)# exithostname#Entering script modeScript mode allows you to crea

Página 187

NOTE:The Script Recorder takes care of all such formatting issues and hence is probably the best way tocreate scripts initially.Script recorderThe Scr

Página 188

Entering passwordsWhenever a command that requires a password is executed in a script, the actual password will notbe stored in the script. Instead, w

Página 189 - User Account Lockout Settings

transfer audit logAutologout Commandsautologoutshow-autologoutBackup and Restore Commandsbackupno backuprestore backupshow backupCA Cert Commandsca ce

Página 190 - Health Check sections

1 Installing and replacing hardwareThis section details the steps to install or replace the SKM hardware:• Preparing for the installation• Rack planni

Página 191 - Configuring the cluster

cert requestcert selfsign installno certificateno requestshow certcli-show-requestCRL Commandscrl auto-updatecrl list sendcrl list updatecrl settingsn

Página 192 - The Cluster Key

traceroute runFIPS Commandsshow fips statusfips serverreset factory settings zeroizesecurity settingsshow security settingsshow fips servershow fips s

Página 193 - Cluster Configuration page

show log rotationshow log signingshow logsigning certshow system syslogsystem syslogMode Commandsconfigureconfigure terminalexitscriptNetwork Commands

Página 194 - Cluster Settings

static routeServices Commandshaltkms-server runkms-server startupno kms-server-runno kms-server startupno snmp runno snmp startupno sshadmin runno ssh

Página 195 - Create Cluster

show snmp usernameshow stationsnmp agentsnmp usernamestationSSL Commandscipherspeccipherspec priorityno cipherspecno export cipherspecno ssl protocolr

Página 196 - Join Cluster

show ntpshow ras settingstimezone setSystem Health Commandsshow system healthSystem Information Commandsshow deviceshow softwaresoftware installsoftwa

Página 197

• activity log rotate• show activity logRelated com-mand(s)show activity log – view the Activity Log.hostname# show activity log <log name> <

Página 198 - Date and Time Settings

hostname# credential settingsRequire Multiple Credentials [n]:Num of Admins Required for Operations:1: 22: 33: 4Enter a number (1 - 3) [1]:Allow Time-

Página 199 - NTP Settings

• show granted credential• no granted credential• credential settings• show credential settingsRelated com-mand(s)ldap test failover – connect to the

Página 200 - Configuring the network

hostname config# password settingsEnable Password Expiration (y/n) [n]:Enable Password History (y/n) [n]:Minimum Password Length [8]:Must Passwords Co

Página 201 - Network Interfaces sections

• Use heel straps, toe straps, or boot straps at standing workstations.Wear the straps on both feet when standing on conductive floors or dissipating

Página 202

hostname# show password settingsPassword Expiration: After 180 daysPassword History: 4 passwords rememberedMinimum Password Length: 8Passwords Must Co

Página 203

show autologout – view the currently configured autologout settings.hostname# show autologoutSyntax• autologoutRelated com-mand(s)Backup and restore c

Página 204 - Static Route List

hostname# show backupSyntax• backup• no backup• restore backupRelated com-mand(s)CA certificate commandsca certificate install – install a CA certific

Página 205 - Hostname & DNS sections

• ca profile• ca profile duplicate• ca profile rename• show ca profile• show ca profile• no ca profile• no ca profile entryRelated com-mand(s)ca profi

Página 206 - Port Speed sections

hostname (config)# local caEnter the certificate name:Enter the common name:Enter the organization name:Enter the organization unit name:Enter the loc

Página 207 - IP Authorization sections

• ca profile• ca profile duplicate• ca profile entry• ca profile rename• show ca profile• show ca profile• no ca profileRelated com-mand(s)no local ca

Página 208 - Allowed Client IP Addresses

• halt• no local caRelated com-mand(s)show signed certificate – display information about certificates signed by local CAs on the SKM.hostname# show s

Página 209 - Configuring SNMP

The certificate import process varies between SKMs.hostname# cert importPlease pick the upload option for uploading your certificate:1) Console Paste

Página 210 - SNMP overview

hostname (config)# cert request <cert name>After executing the cert request command, the system prompts you to provide the followinginformation:

Página 211 - The SNMP Configuration page

• cert request• cli-show-request• no request• cert install• cert import• show cert• cert selfsign installRelated com-mand(s)no request – delete a cert

Página 212 - SNMP Agent Settings

Rack warningsWARNING!To reduce the risk of personal injury or damage to the equipment, be sure that:• The leveling jacks are extended to the floor.• T

Página 213

NoneRelated com-mand(s)crl list send – export a CRL.hostname (config)# crl list send <ca name>Transport Method:1) FTP 2) SCPEnter a number(1-2):

Página 214 - SNMPv3 Username List

hostname (config)# crl settings <ca name>Transport Method:1) FTP 2) SCP 3) HTTPEnter a number(1-3):Host:Filename:Username:Password:Confirm passw

Página 215 - SNMP Management Station List

NoneRelated com-mand(s)show crl list – display the serial number and revocation date of all revoked certificates in the CRL.hostname# show crl listSyn

Página 216

show clientevent log – view the client event log.hostname# show clientevent log <log name> <number of lines>Syntax• clientevent log rotate

Página 217 - Secure Key Manager 217

NOTE:For security purposes, this command can only be run from the CLI at the console.You cannot execute this command remotely via the CLI over SSH or

Página 218

• host run• traceroute run• ping runRelated com-mand(s)traceroute run – print the route packets take to the specified network host.hostname (config)#

Página 219 - Enterprise MIB overview

• show fips serverRelated com-mand(s)reset factory settings zeroize – zeroize all keys and passwords on the device.NOTE:For security purposes, this co

Página 220 - Administrator overview

hostname# show security settingsKey SecurityDisable Creation and Use of Global Keys: YesDisable Non-FIPS Algorithms and Key Sizes: YesDisable RSA Encr

Página 221

hostname (config)# health checkEnable Health Check [n]:Local IP:1: All2: 192.168.200.195Enter a number (1 - 2) [1]:Local Port [9080]:Health check sett

Página 222 - Administrator passwords

Log commandsactivity syslog – enable the SKM to use the syslog protocol to send Activity Log messages to an externalmachine.hostname (config)# activit

Página 223 - LDAP administrative server

ContentsAbout this guide ... 23Intended audience ...

Página 224 - Administrator procedures

When vertical space in the rack is not filled by an SKM or rack component, the gaps between thecomponents cause changes in airflow through the rack an

Página 225 - Create LDAP Administrator

• cli-no-audit-syslog• show audit syslogRelated com-mand(s)clientevent syslog – enable the SKM to use the syslog protocol to send Client Event Log mes

Página 226

log signing – enable Secure Logs.hostname (config)# log signing <log-name>Syntax• recreate logsigning cert• show logsigning cert• show log signi

Página 227 - Password Management overview

show activity syslog – display the syslog settings for the Activity Log.hostname# show activity syslogSyntax• no activity syslog• activity syslogRelat

Página 228

hostname (config)# system syslogSyslog Server #1 IP [None]:Syslog Server #1 Port [514]:Syslog Server #2 IP [None]:Syslog Server #2 Port [514]:Syntax•

Página 229 - Password Management sections

Network commandsedit ip authorization allowed – edit the IP authorization settings for a particular IP address.NOTE:The ip authorization allowed comma

Página 230

hostname (config)# ip address [<ip address> <submask> <interface #>]ip addressEnter the IP address:Enter the subnet mask:Available i

Página 231 - Multiple Credentials overview

• no ip addressRelated com-mand(s)ip name–server – add a domain name server.hostname (config)# ip name-server <IP1> <IP2>...<IPn>NOT

Página 232

no static route – delete a static route on the SKM.hostname (config)# no static routeSyntax• static route• show static routeRelated com-mand(s)show et

Página 233

• edit ip authorization allowed• ip authorization• ip authorization allowed• no ip authorization allowed• show ip authorization allowedRelated com-man

Página 234 - Multiple Credentials sections

• show static route• no static routeRelated com-mand(s)Services commandshalt – halt the SKM.hostname (config)# haltSyntax• rebootRelated com-mand(s)km

Página 235 - Grant a Credential

CAUTION:Protect the SKM from power fluctuations and temporary interruptions with a regulating uninterruptiblepower supply (UPS). This device protects

Página 236

hostname (config)# no sshadmin runSyntax• sshadmin runRelated com-mand(s)no sshadmin startup – disable SSH administration when starting up the SKM.hos

Página 237

• no snmp runRelated com-mand(s)snmp startup – enable SNMP when starting up the SKM.hostname (config)# snmp startupSyntax• no snmp startupRelated com-

Página 238 - LDAP Administrator Server

edit community – edit a community.hostname (config)# edit community <community name>Enter your changes to the community public below.Press enter

Página 239

NOTE:When you execute the edit station command, the system prompts you to provide thenew SNMP management station information. In the example shown her

Página 240

NOTE:When you execute the edit snmp username command, the system prompts you toprovide the new SNMPv3 username information.hostname (config)# no snmp

Página 241 - Viewing logs and statistics

hostname (config)# snmp agentAvailable IP addresses:1. All2. 192.168.200.195SNMP agent IP [All] (1-2): 1SNMP agent port [161]:Enable SNMP traps? (y/n)

Página 242

SSL commandscipherspec – enable a cipher spec.NOTE:The cipher order pertains to the communication channel between the client (application, database,et

Página 243

• show cpiherspec• cipherspec• no cipherspec• no export cipherspec• restore cipherspecRelated com-mand(s)no cipherspec – disable a cipherspec.hostname

Página 244 - Log Configuration page

• show cpiherspec• cipherspec priority• cipherspec• no cipherspec• no export cipherspecRelated com-mand(s)show cipherspec – view the priority of all c

Página 245 - Log Rotation Properties

hostname# show licenseLicenses: 5Syntax• show license usageRelated com-mand(s)show license usage – show the number of licenses currently in use.hostna

Página 246

5. Place shipping materials back into the shipping cartons.6. Set the shipping cartons aside for later use.Identifying the shipping carton contentsA n

Página 247 - Log Signing

hostname (config)# edit ras settingsAvailable IP addresses:1. All2. 192.168.200.195Web Admin Server IP [192.168.200.195] (1-2): 2Web Admin Server Port

Página 248

• show ntp• ntp• no ntp serverRelated com-mand(s)recreate ssh key – recreate the Secure Shell key.NOTE:If you execute the recreate ssh key command fro

Página 249 - Activity Log Settings

hostname (config)# timezone set <time zone>Syntax• clock set• show clockRelated com-mand(s)Table 142 clock set syntax detailsDescriptionParamete

Página 250 - Log Viewer page

System information commandsshow device – view the model number and Unit ID of the SKM.hostname# show deviceSyntax• show softwareRelated com-mand(s)sho

Página 251 - Audit Log

• no system log• show system logRelated com-mand(s)transfer system log – transfer a system log off of the SKM.hostname# transfer system log <log_na

Página 252

D TroubleshootingThis appendix addresses some of the typical problems you might face as the administrator of theSKM.Table 143 Common problemsPossible

Página 253 - Activity Log

Troubleshooting326

Página 254

E Regulatory compliance noticesThis section contains regulatory notices for the HP StorageWorks Secure Key Manager (SKM) appliance.Regulatory complian

Página 255 - Client Event Log

of this equipment in a residential area is likely to cause harmful interference, in which case the userwill be required to correct the interference at

Página 256

Class B equipmentThis Class B digital apparatus meets all requirements of the Canadian Interference-Causing EquipmentRegulations.Cet appareil numériqu

Página 257 - Statistics page

CAUTION:There will be several tamper-evident labels. Do not cut or damage these labels because they arerequired for FIPS compliance audits.Selecting a

Página 258 - Connection Statistics

Korean noticesClass A equipmentClass B equipmentTaiwanese noticesBSMI Class A noticeTaiwan battery recycle statementRecovery text:• “Please recycle wa

Página 259 - Throughput

Laser compliance noticesEnglish laser noticeThis device may contain a laser that is classified as a Class 1 Laser Product in accordance with U.S.FDA r

Página 260 - License Usage

French laser noticeGerman laser noticeItalian laser noticeRegulatory compliance notices332

Página 261 - KMS Statistics

Japanese laser noticeSpanish laser noticeRecycling noticesEnglish noticeSecure Key Manager 333

Página 262

Bulgarian noticeCzech noticeDanish noticeDutch noticeRegulatory compliance notices334

Página 263 - Command Line Interface syntax

Estonian noticeFinnish noticeFrench noticeGerman noticeSecure Key Manager 335

Página 264 - Tab completion

Greek noticeHungarian noticeItalian noticeLatvian noticeRegulatory compliance notices336

Página 265 - Command modes

Lithuanian noticePolish noticePortuguese noticeRomanian noticeSecure Key Manager 337

Página 266 - Scripting mode

Slovak noticeSpanish noticeSwedish noticeTurkish noticeTürkiye Cumhuriyeti: EEE Yönetmeli ine UygundurRegulatory compliance notices338

Página 267 - Installing certificates

Battery replacement noticesDutch battery noticeSecure Key Manager 339

Página 268 - CLI commands

9. Remove the rails from the original appliance for reuse on the replacement appliance. To do so,pull out on the tab of the rail that locks the center

Página 269 - Secure Key Manager 269

French battery noticeGerman battery noticeRegulatory compliance notices340

Página 270

Italian battery noticeJapanese battery noticeSecure Key Manager 341

Página 271 - Secure Key Manager 271

Spanish battery noticeRegulatory compliance notices342

Página 272

F SpecificationsThis section provides the VLS node and specifications.SKM appliance specificationsSpecificationItem4.3 cm (1.70 in)Height70.5 cm (27.8

Página 273 - Secure Key Manager 273

ShippingNon-operatingOperating5% to 95%10% to 95%40% to 60%Relative humidity (noncondensing)2-1000 ft to 40,000 ft-1000 ft to 10,000 ft-1000 ft to 10,

Página 274

GlossaryActive Device In the VRRP group, this is the device that is receiving all network traffic. This istypically the primary device; however, in ca

Página 275 - Activity log commands

periodic time requests to servers, obtaining server time stamps, and using themto adjust the client's clock.Passive device In the VRRP group, the

Página 276

IndexSymbols?, 298Aaccess control, 225activity log level, 275activity log rotate, 275activity syslog, 299administrator, 276administratorscreating, 225

Página 277 - Secure Key Manager 277

clustersand multiple credentials, 233configuring, 193creating, 195joining, 196overview, 191password protection for, 192community, 311configure, 303con

Página 278

Internal Backup List section, 101IP addressesDNS server, 205network, 201ip address, 304IP addressesclient, 208IP authorizationallowed client IP addres

Página 279 - Secure Key Manager 279

3. With the appliance fully seated in the rack, tighten the thumbscrews just until the bezel is securedto the rack.Attaching the cables1. Connect a st

Página 280 - Autologout commands

no ca certificate, 284no ca profile, 284no certificate, 288no cipherspec, 317no clientevent syslog, 301no community, 313no crl list, 291no export ciph

Página 281 - Backup and restore commands

show statistics, 319show activity log, 276show activity syslog, 302show administrator, 279show audit log, 280show audit syslog, 302show autologout, 28

Página 282 - CA certificate commands

time settings, 198timezone set, 321TLS, 180tools, installation, 27Traceroute Information section, 109traceroute run, 295transfer audit log, 280transfe

Página 283 - Secure Key Manager 283

Installing and replacing hardware36

Página 284

2 Configuring the systemStarting the SKM applianceNOTE:To prepare to configure the system, have ready all information listed on the pre-install survey

Página 285 - Secure Key Manager 285

5. Follow the prompts to enter the necessary information:TIP:Press Enter to accept the default.a. Admin account password. The Security Officer will us

Página 286 - Certificate commands

6. Configure the default settings for the key replication interval and retry attempts.NOTE:These commands require firmware version 1.1 or greater.a. L

Página 287

Creating and installing the SKM Server Certificate ... 47Propagating third-party certif

Página 288

If you are replacing an SKM appliance or adding a member to an existing cluster, skip to Establishinga cluster.The configurations in this step are per

Página 289 - CRL commands

6. Add the Local CA to the Trusted CAs list.a. In Certificates & CAs, click Trusted CA Lists to display the Trusted Certificate Authority ListProf

Página 290

3. Enter information required by the Create Certificate Request section of the window to create theSKM server certificate.a. Enter a Certificate Name

Página 291 - Secure Key Manager 291

10. Enter data required by the Sign Certificate Request section of the window.a. Select the CA name from the Sign with Certificate Authority drop down

Página 292 - Client event log commands

3. In the KMS Server Settings section of the window, click Edit. The following warning may display.4. Configure the KMS Server Settings as shown. (Ens

Página 293

1. From the SKM management console, click the Device tab.2. In the Device Configuration menu, click Cluster.3. Type the cluster password in the Create

Página 294 - Diagnostic commands

2. If you skipped Creating the cluster, retrieve the cluster key text file now. To do so, select theCluster Settings section of the window, click Down

Página 295 - FIPS commands

6. Join the appliance to the cluster.a. Select the Device tab.b. In the Device Configuration menu, click on Cluster.c. In the Cluster, click on Join C

Página 296

8. Click on the SKM Local CA.9. Click Sign Request.10. Enter information required in the Sign Certificate Request section of the window as shown:a. In

Página 297 - Secure Key Manager 297

6. Click Select None.7. Click Continue.8. In the Create Backup screen, type a name, description, and password for the certificate backup.9. Select Dow

Página 298 - History commands

Viewing the FIPS status report ... 67KMS server procedures

Página 299 - Log commands

Configuring the system50

Página 300

3 Performing configuration and operationtasksKey and policy proceduresCreating a keyTo create a key:1. Log in to the Management Console as an administ

Página 301 - Secure Key Manager 301

4. Enter a value in the Owner Username field to assign a specific owner or leave this value blankto create a global key. If an owner is listed for the

Página 302

4. Click Download Public Key to download the public portion of the RSA key.Deleting a keyTo delete a key:1. Log in to the Management Console as an adm

Página 303 - Mode commands

User and group proceduresNOTE:User accounts and groups can be managed locally on the SKM and shared among clustered nodes.This is the preferred method

Página 304 - Network commands

2. Navigate to the Local Groups section of the User & Group Configuration page (Security > LocalUsers & Groups).3. Select a Group and click

Página 305 - Secure Key Manager 305

LDAP server proceduresSetting up the LDAP user directoryTo set up the LDAP user directory:1. Log in to the Management Console as an administrator with

Página 306

2. Navigate to the LDAP Failover Server Properties section of the LDAP Server Configuration page(Security > LDAP > LDAP Server).3. Click Edit.4.

Página 307 - Secure Key Manager 307

NOTE:To generate a valid certificate, you must have a certificate authority sign a certificate request. Youcan create local CAs on the SKM, and use th

Página 308

7. Navigate to the Local Certificate Authority List section.8. Select a CA and click Sign Request.9. Paste the certificate request into the Certificat

Página 309 - Services commands

Enabling signed logs ... 90Verifying a secure l

Página 310

6. Copy the certificate request text. The certificate text looks similar, but not identical, to the followingtext.-----BEGIN CERTIFICATE REQUEST-----M

Página 311 - SNMP commands

IMPORTANT:A self-signed certificate should be used for testing purposes only. Any attempt to connect with anSKM using a test self-signed certificate s

Página 312

6. Click Save.The SKM verifies the validity of the newly installed certificate. If determined to be valid, thecertificate appears as “Certificate Acti

Página 313

Certificate Authority (CA) proceduresAdding a CA certificate to the trusted CA listTo add a CA certificate to the trusted CA list:1. Log in to the Man

Página 314

Deleting a trusted CA list profileTo delete a trusted certificate authority list profile:1. Log in to the Management Console as an administrator with

Página 315 - Secure Key Manager 315

2. Navigate to the Local Certificate Authority List section of the Certificate and CA Configurationpage (Security > Local CAs).3. Select a certific

Página 316 - SSL commands

4. Select Intermediate CA Request as the Certificate Authority Type.5. Click Create. The new request appears in the Local Certificate Authority List s

Página 317

2. Navigate to the Install CA Certificate section of the Certificate and CA Configuration page(Security > Known CAs).3. Enter a value for the Certi

Página 318 - Statistics commands

KMS server proceduresThe KMS server is the firmware component of the SKM server that manages communications betweenthe SKM and the clients. This secti

Página 319 - System commands

Enabling password authenticationTo enable password authentication:1. Log in to the Management Console as an administrator with KMS Server access contr

Página 320

Accessing the Help system ... 120Using the Key and Polic

Página 321

Clustering proceduresCreating a clusterYou create a cluster on one SKM and then join other members to that cluster. To create a cluster:1. Select an S

Página 322 - System health commands

4. Click Synchronize With and confirm this action. As part of the synchronization, the KMS Serverwill create an automatic synchronization backup befor

Página 323 - System log commands

Upgrading a clusterA cluster can be upgraded by upgrading one device at a time. Once all of the devices are runningthe new software, you can configure

Página 324

2. Navigate to the NTP Settings section of the Date & Time Configuration page (Device > Date &Time).3. Click Edit.4. Select Enable NTP.5. E

Página 325 - D Troubleshooting

7. Repeat steps 3 through 6 as needed.8. Click Edit on the IP Authorization Settings section.9. For each service select either Allow All Connections t

Página 326 - Troubleshooting326

1. Configure the agent at the SNMP Agent Settings section.2. Create an SNMPv3 username at the SNMPv3 Username List section to enable the NMS to access

Página 327 - FCC rating label

5. If using SSL, select Use SSL and enter the Trusted Certificate Authority.6. Enter the number of seconds to wait for the LDAP server during connecti

Página 328 - Class A equipment

3. Click LDAP Test.Password management proceduresChanging your passwordTo change your administrator account password:1. Log in to the Management Conso

Página 329 - Japanese notices

access to the SKM configuration is secured but not in a haphazard manner. It is best to have adocumented procedure in place to handle such a situation

Página 330 - Taiwanese notices

1. Log in to the Management Console as an administrator with High Access Administrator accesscontrol. This is the administrator that will grant creden

Página 331 - Laser compliance notices

Support for Certificate Revocation Lists ... 167Local CAs ...

Página 332 - Italian laser notice

6. Click Sign Request. This will take you to the CA Certificate Information section where the certificateis displayed in PEM format.7. Click the Downl

Página 333 - Recycling notices

5. Click Save.NOTE:This feature is immediately enabled when you select Web Admin User Authentication. Youwill be logged out of the Management Console

Página 334 - Dutch notice

2. Determine the Key Sharing Group.a. From the filtered list of keys, choose the one with the most recent timestamp (the numbersequence at the end of

Página 335 - German notice

3. Export (backup) the key.a. From the Device tab, in the Maintenance menu on the left, select Backup & Restore, thenselect Create Backup to displ

Página 336 - Latvian notice

Figure 7 Entering backup informationi. Click Backup.A message displays when the backup is complete. The backup operation should take a fewseconds.4. S

Página 337 - Romanian notice

5. Import (restore) the backup file to Cluster #2a. On the SKM, from the Device Tab, in the Maintenance menu on the left, select Backup &Restore,

Página 338 - Turkish notice

6. Restart the SKM software.NOTE:Following a restore, the SKM must be restarted.a. From the SKM Device tab, in the Maintenance menu, select Services.b

Página 339 - Battery replacement notices

8. Ensure that the key sharing group has been added.a. From the SKM interface, Security tab, Users and LDAP Menu, select Local Users and Groups.b. Ver

Página 340 - German battery notice

3. In the Keys field, select No keys.4. Click Continue.5. In the Device Items field, click Select All.6. Click Continue.7. In the Backup Summary secti

Página 341 - Japanese battery notice

1. From the SKM interface on the Device tab, in the Maintenance menu, select Backup Restore, thenCreate Backup.2. In the Create Backup pane, in the Se

Página 342 - Spanish battery notice

Hostname Setting ... 205DNS Server List ...

Página 343 - F Specifications

1. Log in to the Management Console as an administrator with Logging access control.2. Navigate to the Log Configuration page (Device > Log Configu

Página 344

3. Double-click on the file. Outlook Express will open and display a help screen with a securityheader that reads: “Digitally signed - signing digital

Página 345 - Glossary

Recreating the log signing certificatePrior to creating a new log signing certificate, backup the old certificate so you can verify previouslysigned l

Página 346 - Glossary346

Clearing a logTo clear a log:1. Log in to the Management Console as an administrator with Logging access control.2. Navigate to the Log Viewer page (D

Página 347

Performing configuration and operation tasks94

Página 348

4 Maintaining the SKMBackup and restore overviewClustering SKM nodes is an effective way of exchanging keys and configuration data to allow forfailove

Página 349

If one of these objects is being restored on a device where there is already a similar object with thesame name, the key, certificate, or local CA fro

Página 350

Figure 14 Viewing the Create Backup: Security Items sectionThe following table describes the components of the Create Backup: Security Items section.T

Página 351

DescriptionComponentsClick Continue to configure the next group of items.ContinueCreate Backup: Device ItemsUse this section to select the device item

Página 352

Figure 16 Viewing the Create Backup: Backup Settings sectionThe following table describes the components of the Create Backup: Backup Settings section

Comentários a estes Manuais

Sem comentários