Brocade Fabric OS Encryption Administrator's Guide v7.1.0 (53-1002721-01, March 2013)

Table Of Contents
14 Fabric OS Encryption Administrator’s Guide (SKM/ESKM)
53-1002721-01
Encryption Center features
2
Viewing and editing encryption group properties . . . . . . . . . . . . . . . . . . . . 112
Encryption-related acronyms in log messages . . . . . . . . . . . . . . . . . . . . . . 125
Encryption Center features
The Encryption Center dialog box is the single launching point for all encryption-related
configuration in Brocade Network Advisor (BNA) (Figure 1). It also provides a table that shows the
general status of all encryption-related hardware and functions at a glance. To open the dialog box,
select Configure > Encryption.
FIGURE 1 Encryption Center dialog box
Beginning with Fabric OS 6.4, the Encryption Center is dynamically updated to reflect the latest
changes based on any of the following events:
Encryption group creation or deletion.
A change in encryption group status or encryption engine status
Addition or removal of an encryption group member or encryption engine
If you are using the Encryption Center for the first time, please read the following topics before you
begin to perform encryption operations:
“Encryption user privileges” on page 15 describes the Role-based Access Control privileges
that are specific to encryption.
“Smart card usage” on page 16 and the topics that follow describe the options available for the
use of Smart Cards for user authentication, system access control, and storing backup copies
of data encryption master keys.
“Network connections” on page 27 describes the network connections that must be in place to
enable encryption.
“Blade processor links” on page 27 describes the steps for interconnecting encryption
switches or blades in an encryption group through a dedicated LAN. This must be done before
the encryption engines are enabled. Security parameters and certificates cannot be
exchanged if these links are not configured and active.
“Encryption node initialization and certificate generation” on page 28 lists the security
parameters and certificates that are generated when an encryption node is initialized.