Hp Secure Key Manager Manuale Utente Pagina 1

Navigare online o scaricare Manuale Utente per Magazzini Hp Secure Key Manager. HP Secure Key Manager User Manual Manuale Utente

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa

Sommario

Pagina 1 - Secure Key Manager

HP StorageWorksSecure Key Managerusers guideAJ087-96011Part number: AJ087–960112nd edition: November 2008

Pagina 2

CRLcommands ... 264Clienteventlogcommands ... 267Deviceresetandrestorecommands ...

Pagina 3 - Contents

Table 18 Netstat Information section componentsComponent DescriptionRunClick Run to see a list of all active network connections on the SKM.Reading Ne

Pagina 4

A SKM appliance information sheetThe information on this sheet is specific to the HP StorageWorks Secure Key Manager (SKM) appliance towhich it is atta

Pagina 5

Figure 34 Back of SKM applianceItemDescription1Serial number of the appliance2Product ID number (PID) of the appliance3Pull-out panel that also shows

Pagina 6

B Using the Management ConsoleLogging in and outUse the Administrator Authentication screen to log into the Management Console.Figure 35 Viewing the A

Pagina 7

Figure 37 Viewing the Security Summary sectionClick the High Security page link to access the High Security page. You can enable FIPS compliancefrom t

Pagina 8

Table 21 System Summary section componentsComponent DescriptionProductDisplays your platform.Unit IDDisplays your Unit ID.Software Version Displays th

Pagina 9

Figure 40 Viewing the Search Criteria sectionThe following table describes the components of the Search Criteria section.Table 23 Search Criteria sect

Pagina 10

Filtering sectionsSome sections of the Management Console normally hold many rows of data. Key and Local Userssections may span multiple pages. Use th

Pagina 11

Figure 44 Locating button to launch context-sensitive helpClicking this icon opens the documentation for the specific section in a new window. (Subsequ

Pagina 12

The Key and Policy Configuration page enables you to create, import, and manage keys. This pagecontains the following sections:•Keys• Key Properties•Gr

Pagina 13

Italiannotice ... 307Latviannotice... 308Lithuaniannotice ...

Pagina 14

Figure 47 Viewing the Key sectionThe following table describes the components of the Keys section.110Using the Management Console

Pagina 15

Table 27 Keys section componentsComponent DescriptionQuerySelect the query to apply to the pageRun QuerySelect this button to run a query. This Manage

Pagina 16

key. Instead it gives a new name to the existing metadata and key bytes. To create a copy of an existingkey,usetheCloneKeysection.Figure 48 Viewing th

Pagina 17

key version’s state permits the operation, and the request comes from a member of the permitted group.A key can have a maximum of 4000 versions.Group

Pagina 18

For non-global keys, if a user is not the owner and is not a member of a group with permissions to use thekey, the user cannot access the key.The owne

Pagina 19

Figure51ViewingtheKeyVersionsandAvailableUsagesectionTable 31 Key Versions and Available Usage section componentsComponent DescriptionVersionDisplays

Pagina 20

Create QueryUse this section to create key queries. A key query enables you to view a subset of the keys that exist ontheSKM.Thissection enables you t

Pagina 21 - 1 Installing and replacing

Figure 54 Viewing Saved Queries sectionTable 34 Saved Queries section componentsComponent DescriptionQuery NameDisplaysthenameofthequery.DescriptionDi

Pagina 22 - Rack planning r

Table 35 Modify Query section componentsComponent DescriptionQuery NameThe name of the query. This field is only required when saving the query. You ca

Pagina 23 - Optimum environment

Table 36 Create Key section componentsComponent DescriptionKey NameThis is the name that the server uses to refer to the key. The key name must begin

Pagina 24 - Power requirements

Figures1Identifythecontentsoftheshippingcarton... 262Connect the powersuppliestoACpowersources ... 293Viewing the Cer

Pagina 25 - Unpacking

Figure 57 Viewing the Clone Key sectionTable 37 Clone Key section componentsComponent DescriptionNew Key NameThis is the name that the server uses to

Pagina 26 - Selecting a rack location

Figure 58 Viewing the Import Key sectionThe following table describes the components of the Import Key section.Table 38 Import Key section componentsC

Pagina 27 - Removing an exi

Authorization Policy Configuration PageAn authorization policy enables you to limit how a group may use a key. You implement an authorizationpolicy whe

Pagina 28 - Attaching the cables

Figure 59 Viewing the Authorization Policies sectionThe following table describes the components of the Authorization Policies section.Table 39 Author

Pagina 29

• User1 can make only 100 more requests between 11:31 AM and 11:59 AMNOTE:Had the limit been lowered to 75, User1 would only be allowed to make 25 mor

Pagina 30

Active VersionsUse this section to configure the number of active versions allowed for a versioned key. Active versionsof a key can be used for both en

Pagina 31 - 2Configuring the system

Figure 63 Viewing the Custom Key Attributes sectionTable 43 Custom Key Attributions section componentsComponents DescriptionAttribute NameEnter a uniq

Pagina 32 - Configuring the system

Local UsersUse the Local Users section to add or modify local users. Once a user has been created, you can changethe password butyou cannot change the

Pagina 33

NOTE:The User Administration Permission and Change Password Permission apply only tolocalusers. LDAPusers cannot be managed through the SKM; they must

Pagina 34 - Setting up the

Figure 66 Viewing the Custom Attributes sectionThe following table describes the components of the Custom Attributes section.Table 46 Custom Attribute

Pagina 35

34Back of SKM appliance... 10235ViewingtheAdministratorAuthenticationscreen... 10336Viewing the Logoutwindow

Pagina 36

Table 47 Local Groups section componentsComponent DescriptionGroupDisplays the local groups on the SKM.Add Click Add to add a group to the group list.

Pagina 37 - Establishing a cluster

LDAP Server ConfigurationLightweight Directory Access Protocol (LDAP) is a protocol that allows you to enable authentication ofyour KMS Serverbased on

Pagina 38 - Creating the cluster

Table 50 LDAP User Directory Properties section componentsComponent DescriptionServer IP or HostnameThe IP address or hostname of the primary LDAP ser

Pagina 39

Table 51 LDAP Schema Properties section componentsComponent DescriptionUser Base DNThe base distinguished name (DN) from which to begin the search for

Pagina 40

Table 52 LDAP Failover Server Properties section componentsComponent DescriptionFailover ServerIPorHostnameTheIPaddressorhostnameoftheLDAPservertousea

Pagina 41 - Copying the certificates

Table 53 LDAP Users section componentsComponent DescriptionUsernameDisplays the users that can access the SKM from the LDAP server.LDAP GroupsThe LDAP

Pagina 42 - Installing t

Figure 75 Viewing the User List sectionThe following table describes the components of the User List section.Table 55 LDAP Groups section componentsCo

Pagina 43 - 3Performingconfiguration and

Figure 76 Viewing the Certificate List sectionThe followingtable describes the components of the Certificate List section.Table 56 Certificate List secti

Pagina 44 - Deleting a key

CAUTION:If you are copying the certificate text into an application such as Microsoft Word, it is important toensure that no carriage returns/line feed

Pagina 45 - User and group procedures

Table 57 Certificate Information section componentsComponent DescriptionCertificate Name Name of the certificate. This name is only used internally.Key S

Pagina 46 - Deleting a user

71ViewingtheLDAPSchemaPropertiessection ... 13272ViewingtheLDAPFailoverServerPropertiessection ... 13373Viewing the LDA

Pagina 47 - LDAP server procedures

Figure 78 Viewing the Certificate Installation sectionNOTE:When multiple certificates are nested in one certificate, the certificate is installed as a cer

Pagina 48 - Certificate procedures

Figure 79 Viewing the Self Signed Certificate sectionThe following table describes the components of the Self Signed Certificate section.Table 59 Self S

Pagina 49 - Secure Key Manager 49

Table 60 Create Certificate Request section componentsComponent DescriptionCertificate NameInternal name of a newly generated CR. This name will be used

Pagina 50 - Creating a client certificate

Table 61 Import Certificate section componentsComponent DescriptionSourceSpecify the method for importing the certificate to the SKM. If you are uploadi

Pagina 51 - Installing a certificate

Figure 82 Viewing the Trusted Certificate Authority List Profiles sectionThe following table describes the components of the Trusted Certificate Authorit

Pagina 52 - Downloading a certificate

Figure 84 Viewing the Trusted Certificate Authority List (Edit Mode)The following table describes the components of the Trusted Certificate Authority Li

Pagina 53

Table 65 Local Certificate Authority List section componentsComponent DescriptionCA NameDisplays the internal name of a certificate authority.CA Informa

Pagina 54 - Downloading a local CA

Figure 86 Viewing the CA Certifi cate Information sectionThe following table describes the components of the CA Certificate Information section.Table 66

Pagina 55 - Creating

Figure 87 Viewing the Sign Certificate Request sectionThe following table describes the components of the Sign Certificate Request section.Table 67 Sign

Pagina 56 - Removing a CA certificate

Table 68 Signed Certificates section componentsComponent DescriptionSerial NumberThe Serial Number, which is expressed in Base 16 notation, is assigned

Pagina 57 - KMS server procedures

108ViewingtheDateandTimeSettingssection... 181109ViewingtheNTPSettingssection ... 182110ViewingtheNetworkInter

Pagina 58 - Enabling the LDAP server

Create Local CAThe Create Local CA section allows you to create a new local CA on the SKM. The fields are similar tothose used to create a certificate o

Pagina 59 - Clustering procedures

Table69CreateLocalCertificate Authority section componentsComponent DescriptionCertificate AuthorityNameInternal name of newly generated certificate auth

Pagina 60 - Setting up SSL in a cluster

Figure 91 Viewing the CA Certificate List sectionThe following table describes the components of the CA Certificate List section.Table 70 CA Certificate

Pagina 61 - Date and time procedures

Figure 92 Viewing the Install CA Certificate sectionThe following table describes the components of the Install CA Certificate section.Table 71 Install

Pagina 62 - IP authorization procedures

certificates revoked by local CAs. The format of CRLs exported by the SKM is in PEM-encoded X.509format.Auto-UpdateEach CA promises to update its CRL a

Pagina 63 - SNMP procedures

Using advanced security featuresAdvanced security features provide the highest level of secure operation on the SKM. This sectiondiscusses the followi

Pagina 64

ClusteringClustering FIPS-compliant devices with non-FIPS-compliant devices will disable FIPS for all devices inthe cluster.BackupsFIPS and non-FIPS d

Pagina 65 - Changing your password

Table 72 FIPS Compliance section componentsComponent DescriptionIs FIPS CompliantIndicates if the SKM’s security configuration is consistent with FIPS

Pagina 66

Table 73 High Security Settings section componentsComponent DescriptionDisable Creationand Use of GlobalKeysDisables the ability to create and use glo

Pagina 67 - Revoking a credential grant

IMPORTANT:Modifyinganyof the items in the Security Settings Configured Elsewhere section immediately takes theSKM out of FIPS compliance.Figure 95 View

Pagina 68

14 5ViewingtheActivityLogsection... 23314 6ViewingtheCurrentActivityLogsection ... 234147Viewing the ClientE

Pagina 69

1. View the Security Protocols enabled on your Internet Browser. You must enable TLS 1.0 to accessthe Management Console while FIPS-compliant.2. Log i

Pagina 70

Table 75 FIPS Status Server testsTestpower-onConditionalDescriptionAES EncryptionXKnown Algorithm Test for the AES algorithm. This testis performed at

Pagina 71

Figure 96 Viewing the FIPS Status Report: normalThe following table describes the components of the FIPS Status Server Settings section.162Using the M

Pagina 72

Table 76 FIPS Status Report componentsComponent DescriptionProductDisplays the model of your device.Unit IDThe Unit ID is composed of alphanumeric cha

Pagina 73

Figure 97 Viewing the FIPS Status Server Settings sectionThe following table describes the components of the FIPS Status Server Settings section.Table

Pagina 74

In this scenario, the client application indicates that it is willing to perform an SSL resume (rather thana full handshake) by sending a previously n

Pagina 75

Figure 98 Viewing the SSL Options sectionNOTE:Changes to theSSL Options cause the KMS Server to restart, which takes the KMS offline for a fewseconds.T

Pagina 76

CAUTION:Exercise caution when modifying the SSL Cipher Order. Unless you are familiar with SSL Ciphers, youshould not rearrange the Cipher Order list.

Pagina 77

Configuring the KMS ServerThe HP StorageWorks Secure Key Manager allows you to off-load cryptographic operations fromapplication servers and other back

Pagina 78

When the client requests that the server generate a new key, it can specify that the key should beexportable and/or deletable. An exportable key is a

Pagina 79

Tables1CreateBackup:SecurityItemssectioncomponents... 872CreateBackup:DeviceItemssectioncomponents ... 883CreateBackup:B

Pagina 80 - Log configurati

Table 80 KMS Server Settings section componentsComponent DescriptionIPThis field specifies the IP address(es) on which the KMS Server is enabled on the

Pagina 81

Figure 101 Viewing the KMS Server Authentication Settings sectionThe following table describes the elements of the KMS Server Authentication Settings

Pagina 82 - Log view procedures

Table 81 KMS Server Authentication Settings section componentsComponent DescriptionUser DirectoryThis field determines whether the KMS Server uses a lo

Pagina 83 - 5. Click Clear

User Account Lockout SettingsUse the User Account Lockout Settings section to manage an account lockout policy.Figure 102 Viewing the User Account Loc

Pagina 84

Health CheckUse the Health Check section to enable the health check feature, and set the port and IP address.Figure 103 Viewing the Health Check secti

Pagina 85 - 4MaintainingtheSKM

the failure in the System Log and sends an SNMP trap indicating that the cluster is out of sync. Once adevice is out of sync, an administrator must sy

Pagina 86 - Backup and resto

During synchronization, an SKM will inherit a new list of local CAs from the cluster. The device’s oldlist of local CAs will be deleted. Should you ne

Pagina 87 - Create Backup: Device Items

Table 84 Cluster Members section componentsComponent DescriptionServer IPThe IP of the member device.Server PortTheportonwhichthedevicelistensforclust

Pagina 88 - Components Description

Table 85 Cluster Settings section componentsComponent DescriptionLocal IPThe IP of the current device. If the device has multiple network interfaces,

Pagina 89 - Restore Backup

Table 86 Create Cluster section componentsComponent DescriptionLocal IPThe IP of the current device. If the device has multiple network interfaces, th

Pagina 90 - Backup Restore Information

34SavedQueriessectioncomponents ... 11735ModifyQuerysectioncomponents ... 11836 CreateKeysectioncomponents..

Pagina 91 - Internal Backup List

Table87JoinClustersectioncomponentsComponent DescriptionLocal IPThe IP of the current device. If the device has multiple network interfaces, thepull-d

Pagina 92 - Services Configuration page

NOTE:Synchronizing the time causes the KMS Server to restart if the time change is greater than oneminute. While restarting, the KMS Server is unavail

Pagina 93 - Restart/Halt

NOTE:Any change to the Date and Time Settings section causes the KMS Server to restart, which takes theKMS offline for a few seconds.NTP SettingsUse th

Pagina 94 - System Informa

•PortSpeedSections• IP Authorization ProceduresNetwork Interfaces sectionsThe Network Configuration page contains the following network interface-relat

Pagina 95 - Software Upgrade/Install

Figure 111 Viewing the Default Gateway List sectionThe following table describes the components of the Default Gateway List section.Table 91 Default G

Pagina 96 - System Health page

All responses to incoming packets leave from 10.20.41.1 - except the responses to incoming packets fromthe 172.17.7.0 addresses (the local subnet of E

Pagina 97 - Power Supp

Figure 112 Viewing the Static Route List sectionThe followingtable describes the components of the Static Route List section.Table 92 Static Route Lis

Pagina 98 - Network Diagnostics page

Table 93 Hostname Setting section componentsComponent DescriptionHostnameThe hostname is the name used to identify the SKM on the network. It is origi

Pagina 99 - Netstat Information

CAUTION:The Port Speed/Duplex setting is an advanced feature that should only be used when you are certainof the port speed and duplex settings of the

Pagina 100 - Reading Netsta

Figure 116 Viewing the IP Authorization Settings sectionThe following table describes the components of the IP Authorization Settings section.Table 96

Pagina 101

72FIPSCompliancesectioncomponents ... 15773HighSecuritySettingssectioncomponents ... 15874Security Settings Confi

Pagina 102

Table 97 Allowed Client IP Addresses section componentsComponents DescriptionIP Address, Rangeor SubnetEnter IP addresses in the following formats:• s

Pagina 103 - Using the Home tab

SNMPv1/v2 rely on the concept of a community to provide a low level of security for communicationsbetween the NMS and agent. In an HP SNMPv1/v2 deploy

Pagina 104 - System Summary

Community: A community, also referred to as a community string, is used by the agent when it iscommunicating with an NMS running SNMPv1/v2. A communit

Pagina 105 - Search sc

Table 98 SNMP Agent Settings section componentsComponent DescriptionSNMP Agent IPThis field specifies the IP address on which SNMP is enabled. You can s

Pagina 106

Table 99 SNMPv1/SNMPv2 Community List section componentsComponent DescriptionCommunity NameCommunity names can contain only alphanumeric characters an

Pagina 107 - Accessing the Help system

Table 100 SNMPv3 Username List section componentsComponent DescriptionUsernameTheusernamedefines from whom the SKM accepts SNMP messages, and it is one

Pagina 108 - Using the Management Console

Table 101 SNMP Management Station List section componentsComponent DescriptionManager TypeThe SNMP version used on the NMS. All three versions of SNMP

Pagina 109

Table 102 SNMP Management Station Properties section componentsComponent DescriptionManager TypeTheSNMPversionusedontheNMS.AllthreeversionsofSNMParesu

Pagina 110

Figure123ViewingtheCreateSNMPManagementStationsectionThe following table describes the components of the Create SNMP Management Station section.198Usi

Pagina 111 - Key Properties

Table 103 Create SNMP Management Station section componentsComponent DescriptionManager TypeTheSNMPversionusedontheNMS.AllthreeversionsofSNMParesuppor

Pagina 112 - Versioned keys

Legal and notice information© Copyright 2007-2008 Hewlett-Packard Development Company, I.E.© Copyright 2000, 2008 Ingrian Networks, Inc.Confidential co

Pagina 113 - Group Permissions

110GrantaCredentialsectioncomponents ... 215111RemoteAdministrationSettingssectioncomponents ... 217112LDAPAdministra

Pagina 114 - Custom Attributes

• KMS Server Statistics. KMS Server statistics are available through the MIBs; for each statisticset, you can view the following: current requests per

Pagina 115 - RSA Public Key

• Multiple Credentials Overview• Multiple Credentials Sections• Multiple Credentials Procedures• Remote Administration Settings Overview• Remote Admin

Pagina 116 - Create Query

Using multiple administrator accountsMost likely, youwill want to create multiple administrators. When doing so, you should assign accesscontrols that

Pagina 117 - Modify Query

WARNING!It is absolutely crucial that you remember the passwords for all of your local administrators. For securityreasons, there is no way to reset a

Pagina 118 - Create Key

If you use LDAP administrators predominantly, at least one local administrator account must always exist,and that local administrator must be a High A

Pagina 119 - Clone Key

Create LDAP AdministratorThe Create Local Administrator and Create LDAP Administrator sections are the same except that theCreate LDAP Administrator s

Pagina 120 - Import Key

Table 104 Create LDAP Administrator section componentsComponent DescriptionUsernameEnter the loginname the administrator uses to access the SKM.Browse

Pagina 121

Select LDAP UsernameThe Select LDAP Username section enables you to browse and select an LDAP user when creating anLDAP administrator account.Figure 1

Pagina 122 - Authorization P

Password expirationThe password expiration feature allows you to specify a duration for administrator passwords. By default,this feature is disabled.

Pagina 123

Document the password policy and communicate it to all appropriate parties including security officersand other corporate personnel.Password Management

Pagina 124 - Authorized Usage Periods

1 Installing and replacinghardwareThis section details the steps to install or replace the SKM hardware:• Preparing for the installation• Rack plannin

Pagina 125 - Custom Key Attributes

NOTE:These settings do not apply to LDAP administrator passwords. LDAP administrator passwords are notsubject to any of the constraints that apply to

Pagina 126

NOTE:Changes made to this section (with the exception of the Password Expiration feature) apply to passwordscreated after the changes are saved. For e

Pagina 127 - Local Users

NOTE:Credential grants cannot be inherited. One administrator can grant only their credentials to one otheradministrator.An administrator can grant cr

Pagina 128 - Selected Local User

4. Enable the multiple credentials feature for the cluster by enabling the feature for one device withinthe cluster.System backupThe following informa

Pagina 129 - Local Groups

Table 108 Multiple Credentials for Key Administration section componentsComponent DescriptionRequire MultipleCredentialsSelect this checkbox to enable

Pagina 130 - User List

Figure 130 Viewing the Grant a Credential sectionThe following table describes the components of the Grant a Credential section.Table 110 Grant a Cred

Pagina 131 - LDAP Server Confi

Remote Administration SettingsThe Remote Administration Settings section is shown here.Figure 131 Viewing the Remote Administration Settings sectionTh

Pagina 132 - LDAP Sche

Table 111 Remote Administration Settings section componentsComponents DescriptionWeb AdminServer IPTheWebAdminServerIPaddressisthelocalIPaddressusedto

Pagina 133

LDAP Administrator ServerYou configure LDAP servers for administrators separately from LDAP servers for users. This allows forgreater flexibility, and s

Pagina 134 - LDAP Users

Figure 132 Viewing LDAP Administrator Server Properties sectionTable 112 LDAP Administrator Server Properties section componentsComponent DescriptionH

Pagina 135 - LDAP Groups

• Use a portable field service kit with a folding static-dissipating work mat.If you do not have any of the suggested equipment for proper grounding, h

Pagina 136 - Certificate List

Figure 133 Viewing LDAP Schema Properties sectionTable 113 LDAP Schema Properties section componentsComponent DescriptionUser Base DNThe base distingu

Pagina 137

Figure 134 Viewing the LDAP Failover Server Properties sectionTable 114 LDAP Failover Server Properties section componentsComponent DescriptionFailove

Pagina 138

Your rotation schedule can be set to automatically rotate logs on a daily, weekly, or monthly basis, atany time of day. The system maintains these set

Pagina 139 - Certificate Installation

For example, the filename audit.log.1.2002-04-04_160146.demo would identify this file as:• An Audit Log.• The first log file in the log index.• A file crea

Pagina 140 - Self Signed Certificate

Secure logsThe SKM allows you to sign your log files before moving them to another machine or downloading them,which makes yourlogfiles more secure than

Pagina 141 - Create Certificate Request

Table 116 Rotation Schedule section componentsComponent DescriptionLog NameOne of the predefined log names supported by the SKM. Log types are: System,

Pagina 142

Table117LogRotationPropertiessectioncomponentsComponent DescriptionLog NameOne of the predefined log names supported by the SKM. Log types are: System,

Pagina 143

Figure 137 Viewing the Syslog Settings sectionNOTE:Changes to the Syslog Settings section cause the KMS Server to restart, which takes the KMS offline

Pagina 144 - The Default Profile

Table 119 Log Signing section componentsComponent DescriptionLog NameDisplays the logs available on the device.Sign LogSelect this option to enable Se

Pagina 145

Table 120 Log Signing Certificate Information section componentsComponent DescriptionDownload LogSigning CertClick Download Log Signing Cert to downloa

Pagina 146 - Properties

WARNING!To reduce the risk of personal injury or equipment damage when unloading a rack:• At least two people are needed to safely unload a rack from

Pagina 147 - Sign Certificate Request

• Successful or failed cluster replication and synchronization.• Failed log transfers.• License errors.Figure 141 Viewing the System Log sectionThe fo

Pagina 148 - Signed Certificates

• Date and time change was made.• Username: the username that made the configuration change.• Event: a text description of the configuration change.Figu

Pagina 149 - Signed Certificate Information

data from the client or an error has occurred. When there is no data for a particular field, a dash isinserted. The format of the Activity Log is as fo

Pagina 150 - Create Local CA

Table 127 Values for the Detail Field in the Activity LogRequest TypeDetail Informationauthentication username provided by the clientkey generationalg

Pagina 151 - CA Certificate List

Figure 146 Viewing the Current Activity Log sectionThe following table describes the components of the Current Activity Log section.Table 129 Current

Pagina 152 - ACertificate

Figure 147 Viewing the Client Event Log sectionThe following table describes the components of the Client Event Log section.Table 131 Client Event Log

Pagina 153 - Local CAs

•Throughput•LicenseUsage• Refresh Statistics (Server)•KMSStatisticsRefresh StatisticsThe Refresh Statistics section controls how frequently the System

Pagina 154 - Related CLI Commands

Table 134 System Statistics section componentsComponent DescriptionCPU Utilization (%)This number represents the percentage of CPU time that was in us

Pagina 155 - Advanced Security overview

Figure 152 Viewing the Throughput sectionThe following table describes the components of the Throughput section.Table 136 Throughput section component

Pagina 156 - FIPS Compliance

Figure 154 Viewing the Refresh Statistics sectionThe following table describes the components of the Refresh Statistics section.Table 138 Refresh Stat

Pagina 157 - High Security Settings

The maximum recommended ambient operating temperature (TMRA) for the SKM system is 35° C (95° F).The temperature in the room where the rack is located

Pagina 158

Figure 155 Viewing the KMS Statistics sectionThe following table describes the components of the KMS Statistics section.Table 139 KMS Statistics secti

Pagina 159 - High Security Procedures

C Using the Command LineInterfaceShell commandsThe CLI supports a few shell commands that allow you to perform various search, cut, and pasteoperation

Pagina 160 - FIPS Status Server overview

new cert “new cert request”is treated as three separate arguments:• new• cert• new cert requestEscaping characters using backslashYou can include a qu

Pagina 161 - FIPS Status Report

If multiple commands match the pattern, those commands are displayed on the screen. For example, ifyou type sh au lo on the command line, the SKM exec

Pagina 162

hostname (config)#Scripting modeThis section describes how to perform the following actions in scripting mode:•CreatingScripts•ExecutingScripts• Displ

Pagina 163 - FIPS Status Server page

Onceloaded,ascriptcaneitherbesteppedthrough(executedonelineatatime),ortheentirescriptcanbe run. To step through a script, use the command “step”, as s

Pagina 164 - SSL overview

passwdpassword settingsshow administratorshow credential settingsshow granted credentialshow password settingsAudit Log Commandsshow audit logtransfer

Pagina 165 - SSL Sections

cert importcert requestcert selfsign installno certificateno requestshow certcli-show-requestCRL Commandscrl auto-updatecrl list sendcrl list updatecrl

Pagina 166 - SSL Cipher Order

show security settingsshow fips servershow fips statusHealth Check Configuration Commandshealth checkshow health checkHelp Commands?helpHistory Commandsh

Pagina 167

gatewayip addressip authorizationip authorization allowedip name-serverno gatewayno ip addressno ip authorization allowedno ip name-serverno static ro

Pagina 168 - MS Server

UnpackingPlace the shipping carton as close to the installation site as possible. Before unpacking the SKM, inspectthe shipping carton for damage that

Pagina 169 - KMS Server Settings

SNMP Commandscommunityedit communityedit snmp usernameedit stationno communityno snmp usernameno stationshow communityshow snmp agentshow snmp usernam

Pagina 170

show clockshow hostnameshow ntpshow ras settingstimezone setSystem Health Commandsshow system healthSystem Information Commandsshow deviceshow softwar

Pagina 171 - The followin

Activity log commandsactivity log level –SettheActivityLogLevel.Syntaxhostname (config)# activity log levelLog Level:1: Normal2: LowEnter a number (1

Pagina 172

Relatedcommand(s)• edit administrator• show administrator•noadministratorcredential settings – establish the multiple credential settings.Syntaxhostna

Pagina 173 - Health Check sections

Relatedcommand(s)• show granted credential• no granted credential•credentialsettings• show credential settingsldap test failover – connect to the fail

Pagina 174 - Configuring the cluster

Relatedcommand(s)•administrator• edit administrator•noadministratorshow credential settings – display the multiple credential settings.Syntaxhostname#

Pagina 175 - The Cluster Key

Audit log commandsshow audit log – display all the audit logs’ names.Syntaxhostname# show audit log [name] [number of lines]Specify a log name and/or

Pagina 176 - Cluster Configuration page

Backup and restore commandsbackup – create a system backup.Syntaxhostname (config)# backupAfter executing the backup command, the system prompts you t

Pagina 177 - Cluster Settings

Relatedcommand(s)•nocacertificate•showcacertificateca profile –create an empty Trusted CA List profile.Syntaxhostname# ca profile <profile name>The

Pagina 178 - Create Cluster

Relatedcommand(s)• cert request•cli-show-request•norequest•nocertificate•certimport•showcert•certselfsigninstallcert renew – renew a certificate that ha

Pagina 179 - Join Cluster

Figure 1 Identify the contents of the shipping cartonItemDescription1Appliance2Power cords (2 — 1 black, 1 gray)3Null modem cable41U rack mounting har

Pagina 180 - ConfiguringtheDate&Time

Relatedcommand(s)•caprofile•caprofile duplicate•caprofile entry•caprofile rename•showcaprofile•showcaprofile•nocaprofile entryno ca profileentry – delete a C

Pagina 181 - Date and Time Settings

Syntaxhostname# show local ca [ca name]Relatedcommand(s)•halt•nolocalcashow signed certificate – display information about certificates signed by local

Pagina 182 - Configuring the network

Certificate commandscert import –importacertificate.SyntaxThe certificateimport process varies between SKMs.hostname# certimportPlease pick theupload opt

Pagina 183 - Routing sections

Syntaxhostname (config)# cert request <cert name>After executing the cert request command, the system prompts you to provide the followinginform

Pagina 184

Relatedcommand(s)•certrequest•cli-show-request•norequest•certinstall•certimport•showcert• cert selfsign installno request –deleteacertificate request.S

Pagina 185 - Static Route List

Syntaxhostname (config)# crl list send <ca name>Transport Method:1) FTP 2) SCPEnter a number(1-2):Host:Filename:Username:Password:Relatedcommand

Pagina 186 - Hostname & DNS sections

Relatedcommand(s)Noneno crl list –renew all revoked certificates signed by a local CA or delete the CRL published by aknown CA.Syntaxhostname (config)#

Pagina 187 - Port Speed sections

Client event logcommandsclientevent log rotate –rotatetheclienteventlog.Syntaxhostname (config)# clientevent log rotate <log name>Relatedcommand

Pagina 188 - IP Authorization sections

Device reset and restore commandsreset factory settings – delete all information stored in the SKM and reset it to its original factorysetting.CAUTION

Pagina 189 - Allowed Client IP Addresses

Diagnostic commandshost run – look up the host specified using the domain server.Syntaxhostname (config)# host run <hostname>Relatedcommand(s)•tr

Pagina 190 - Configuring SNMP

Removing an existing SKM (appliance) from the systemSkip this step if you are installing a new appliance.1. Zeroize the original appliance. To do so,

Pagina 191 - Authentication

Syntaxhostname# fips serverEnable FIPS Status Server [y]:Available IP addresses:1. All2. 172.17.3.21Local IP (1-2)[1]:Local Port [9081]:NOTE:You can vi

Pagina 192 - The SNMP C

Syntaxhostname# show security settingsKey SecurityDisable Creation and Use of Global Keys: YesDisable Non-FIPS Algorithms and Key Sizes: YesDisable RS

Pagina 193 - 2CommunityList

Health check configuration commandshealth check – enable and configure the Health Check feature.Syntaxhostname (config)# health checkEnable Health Check

Pagina 194 - SNMPv3 Username List

Log commandsactivity syslog –enabletheSKMtousethesyslogprotocoltosendActivityLogmessagestoanexternal machine.Syntaxhostname (config)# activity syslogE

Pagina 195 - SNMP Management Station List

Syntaxhostname (config)# clientevent syslogEnable Syslog [n]:Syslog Server #1 IP [None]:Syslog Server #1 Port [514]:Syslog Server #2 IP [None]:Syslog

Pagina 196

Relatedcommand(s)•activitysyslog•showactivitysyslogThe no audit syslog command also clears all values in the Activity Log settings.no audit syslog – d

Pagina 197

Relatedcommand(s)• edit log rotationshow log signing – check the status of the Secure Log feature on the SKM for a specificlog.Syntaxhostname# show log

Pagina 198

Mode commandsconfigure –enterconfiguration mode.Syntaxhostname# configureRelatedcommand(s)•configure terminal•exit•scriptconfigure terminal –enterconfigu

Pagina 199 - Enterprise MIB overview

Relatedcommand(s)•ipauthorization• ip authorization allowed• no ip authorization allowed• show ip authorization• show ip authorization allowedethernet

Pagina 200

Syntaxhostname (config)# ip authorizationKMS Server:Please select from the following options:1) Allow All Connections 2) Only Allow IPs SpecifiedKMS S

Pagina 201 - Administrato

117765. Repeat these steps with the other side rail.Attaching rails to the appliance1. Align one ofthe rails with the left side of the appliance (as y

Pagina 202 - Administrator passwords

SyntaxNOTE:The no ip authorization allowed command requires that you provide the indexnumber of the IP address you want to edit, rather than the actua

Pagina 203 - LDAP administrators

Syntaxhostname# show ip authorizationKMS Server: Only Allow IPs SpecifiedWeb Administration: Only Allow IPs SpecifiedSSH Administration: Only Allow IP

Pagina 204 - Administrator procedures

Services commandshalt –halttheSKM.Syntaxhostname (config)# haltRelatedcommand(s)• rebootkms-server run –activatetheKMSServer.Syntaxhostname (config)#

Pagina 205 - Create LDAP Adm

Syntaxhostname (config)# no webadmin startupRelatedcommand(s)•webadminstartupreboot – reboot the SKM.Syntaxhostname (config)# rebootRelatedcommand(s)•

Pagina 206 - Component Description

Relatedcommand(s)•nowebadminrunwebadmin startup – enable web administration when starting up the SKM.Syntaxhostname (config)# webadmin startupRelatedc

Pagina 207 - Password Management overview

SyntaxNOTE:When you execute the edit snmp username command, the system prompts you toprovidethenewSNMPv3usernameinformation.hostname (config)# edit sn

Pagina 208

SyntaxNOTE:When you execute the edit station command, the system prompts you to providethe new SNMP management station information. In the example sho

Pagina 209 - Password Manag

Relatedcommand(s)•showsnmpusername•editsnmpusername•snmpusernameno station – remove an SNMP management station.Syntaxhostname (config)# no station <

Pagina 210

SyntaxNOTE:When you execute the snmp username command, the system prompts you to providethe values for the new SNMPv3 username.hostname (config)# snmp

Pagina 211 - Multiple Credentials overview

Syntaxhostname (config)# cipherspec priorityCURRENT PRIORITIESThe SSL cipher order is shown below:Priority Key Exchange Cipher KeysizeHash1 RSA AES128

Pagina 212

2. Connect the appliance power supplies’ AC power connectors to two separate AC power sourcesusing the power cables provided (see Figure 2).Figure 2 C

Pagina 213 - Multiple Credentials sections

Relatedcommand(s)• show cpiherspec•cipherspecpriority•cipherspec•nocipherspec•restorecipherspecno ssl protocol –removethespecified protocol.Syntaxhostn

Pagina 214 - Grant a Credential

Statistics commandsshow license – show the number of licenses currently in use.Syntaxhostname# showlicenseLicenses: 5Relatedcommand(s)•showlicenseusag

Pagina 215

Syntaxhostname (config)# edit ras settingsAvailable IP addresses:1. All2. 192.168.200.195Web Admin Server IP [192.168.200.195] (1-2): 2Web Admin Serve

Pagina 216 - Remote Administ

Relatedcommand(s)Nonereissue webadmin certificate – re–issue the web administration certificate.NOTE:This action is performed when initializing the SKM

Pagina 217

Table 141 clock set syntax detailsParameterDescriptionmm/dd/yyhh:mm:ssmm:month:entervalueintherange1–12dd: day: enter value in the range 1 –31yy: year

Pagina 218 - LDAP Administra

System information commandsshow device – view the model number and Unit ID of the SKM.Syntaxhostname# show deviceRelatedcommand(s)•showsoftwareshow so

Pagina 219 - LDAP Schema Properties

System log commandsno system log – clear the context of a system log file.Syntaxhostname (config)# no system log <log name>Relatedcommand(s)• sys

Pagina 220

D TroubleshootingThis appendix addresses some of the typical problems you might face as the administrator of the SKM.Table 142 Common problemsProblem

Pagina 222

E Regulatory compliance noticesThis section contains regulatory notices for the HP StorageWorks Secure Key Manager (SKM) appliance.Regulatory complian

Pagina 223

Contents1Installingandreplacinghardware... 21Preparingfortheinstallation... 21Toolsforinstallation ...

Pagina 224 - Log Configu

30Installing and replacing hardware

Pagina 225 - Log Rotation Properties

energy and, if not installed and used in accordance with the instructions, may cause harmful interferenceto radio communications. However, there is no

Pagina 226 - Syslog Se

Compliance with these directives implies conformity to the following European Norms (in parentheses arethe equivalent international standards and regu

Pagina 227 - Log Signing

Taiwanese noticesBSMI Class A noticeTaiwan battery recycle statementRecovery mark:• Four-in-one recyclingsymbolRecovery text:• “Please recycle wasteba

Pagina 228

Dutch laser noticeWAARSCHUWING: French laser noticeAVERTISSEMENT : cet appareil peut être équipé d'un laser classé en tant que Produit laser de

Pagina 229 - Log Viewer page

Italian laser noticeAVVERTENZA: AVVERTENZA Questo dispositivo può contenere un laser classificato come prodotto laser di Classe 1 in conformità alle

Pagina 230 - Audit Log

Recycling noticesDisposal of waste equipment by users in private household in the EuropeanUnionThis symbol on the product or on its packaging indicate

Pagina 231 - Activity Log

Estonian noticeFinnish noticeLaitteiden hävittäminen kotitalouksissa Euroopan unionin alueellaJos tuotteessa tai sen pakkauksessa on tämä merkki, tuot

Pagina 232

Greek noticeHungarian noticeItaliannoticeSmaltimento delle apparecchiature da parte di privati nel territorio dell'Unione EuropeaQuesto simbolo p

Pagina 233

Latvian noticeLithuanian noticePolish notice308Regulatory compliance notices

Pagina 234 - Client Event Log

Portuguese noticeDescarte de Lixo Elétrico na Comunidade Européia Este símbolo encontrado no produto ou na embalagem indica que o produto não deve se

Pagina 235 - Statistics page

2Configuring the systemStarting the SKM applianceNOTE:To prepare to configure the system, have ready all information listed on the pre-install survey. T

Pagina 236 - System Statistics

Spanish noticeEliminación de residuos de equipos eléctricos y electrónicos por parte de usuarios particulares en la Unión EuropeaEste símbolo en el pr

Pagina 237 - Throughput

Battery replacement noticesDutch battery noticeWAARSCHUWING: dit apparaat bevat mogelijk een batterij. - Probeer de batterijen na het verwijderen nie

Pagina 238 - Refresh Statistics (server)

German battery noticeVORSICHT: Dieses Produkt enthält unter Umständen eine Batterie oder einen Akku.- Versuchen Sie nicht, Batterien und Akkus außerh

Pagina 239 - KMS Statistics

Japanese batterynoticeSpanish battery noticeADVERTENCIA: Este dispositivo podría contener una batería.- No intente recargar las baterías si las extra

Pagina 240

314Regulatory compliance notices

Pagina 241 - Interface

FSpecificationsThis section provides the VLS node and specifications.SKM appliance specificationsItemSpecificationHeight4.3 cm (1.70 in)Depth70.5 cm (27.8

Pagina 242 - Command shortcuts

EnvironmentalspecificationsOperating Non-operatingShippingTemperature110°C to 35°C(50°F to 95°F)-40°C to 66°C(-40°F to 150°F)-40°C to 66°C(-40°F to 150

Pagina 243 - Command modes

G About this guideThis guide provides information about:• Installing an HP StorageWorks Secure Key Manager• Configuring an HP StorageWorks Secure Key M

Pagina 244 - Scripting mode

WARNING!Indicates that failure to follow directions could result in bodily harm or death.CAUTION:Indicates that failure to follow directions could res

Pagina 245 - CLI commands

Customer self repairHP customer self repair (CSR) programs allow you to repair your StorageWorks product. If a CSR partneeds replacing, HP ships the p

Pagina 246

c. Dated. Time. The time is based on a 24–hour clock. There is no a.m. or p.m. designation. Forexample, 1:20 p.m. is 13:20:00.e. IP address of the SKM

Pagina 247

320About this guide

Pagina 248

GlossaryActive Device In the VRRP group, this is the device that is receiving all network traffic. Thisis typically the primary device; however, in cas

Pagina 249

fulfill client traffic, the secondary device stands down and the primary deviceagain becomes the active device.Primary device A designated device that,

Pagina 250

IndexSymbols?, 272Aaccess control,205activity log level,252activity log rotate,252activity syslog,273administrator,252administratorscreating,205definin

Pagina 251

Create LDAP Administrator section,205Create Local Certificate Authority section,150Create SNMP Management Station section,197credentialsgranting,214vie

Pagina 252 - Activity log com

keysaccess to and ownership of,168administration via multiple credentials,213authorization policies and usage periods,122 , 124creating,118deletable,1

Pagina 253

Ppasswd,254password settings,254passwordsadministrator,202cluster,175patch releases,96permissions, user,127Ping Information section,98ping run,269port

Pagina 254

show station,287show statistics,291show system log,296show system syslog,276Sign Certificate Request page,54sign request,261Signed Certificates section,

Pagina 255

6. Configure the default settings for the key replication interval and retry attempts.NOTE:These commands require firmware version 1.1 or greater.a. Log

Pagina 256 - Autologout commands

Where• <appliance hostname> is the hostname or IP address you provided in Starting the SKMappliance,step4.• <appliance port number> is 944

Pagina 257 - CA certificate commands

6. Add the Local CA to the Trusted CAs list.a. In Certificates & CAs,clickTrusted CA Lists to display the Trusted Certificate Authority List Profiles

Pagina 258

4. Click Create Certificate Request.5. Click on the newly created certificate from Certificate List, for example SKM Server.6. Copy the certificate data,

Pagina 259

11 . Click Sign Request.12. Copy the signed certificate data, from -----BEGIN to END…----- lines. Be careful to excludeextra carriage returns or spaces

Pagina 260

• In Creating the cluster, the cluster is created on one SKM appliance.Skip this section if you already have an SKM cluster.• In Copying the Local CA

Pagina 261

5. Copy the certifi cate data from the CA Certificate Information,from-----BEGIN CERTIFICATEREQUEST----- to -----END CERTIFICATE REQUEST--–––. Be carefu

Pagina 262 - Certificate com

Creatingauser... 45Creatingagroup ... 46Addingausertoagroup...

Pagina 263

5. Add the first member’s CA to the Trusted CAs list.a. In the Certificates & CA menu, click Trusted CA Lists.b. Click on the Default Profile Name.c.

Pagina 264 - CRL commands

4. Click Create Certificate Request.5. Click on the newly created certificate SKM Server from Certificate List.6. Copy the certificate data, from lines --

Pagina 265

3. Click Select None.4. Select Certificates then Choose from list and select SKM Server.5. Click Continue.6. Click Select None.7. Click Continue.8. In

Pagina 266

3Performingconfiguration andoperation tasksKey and policy proceduresCreating a keyTo create a key:1. Log in to the Management Console as an administrat

Pagina 267 - Client event lo

7. To make the key exportable on from non-FIPS SKM, select Exportable.Anexportablekeycanbe exported by its owner and by members of a group with “Expor

Pagina 268 - Device reset an

Authorization policy proceduresCreating an authorization policyTo create an authorization policy:1. Log in to the Management Console as an administrat

Pagina 269 - FIPS commands

6. To give this user the ability to change his or her own password via the XML interface, select ChangePassword Permission. Users with User Administra

Pagina 270

3. Select the Username and click Delete.Deleting a groupTo delete a group:1. Log in to the Management Console as an administrator with Users, Groups,

Pagina 271

Setting up an LDAP failover serverTo set up an LDAP failover server:1. Log in to the Management Console as an administrator with Users, Groups, and LD

Pagina 272 - History commands

NOTE:To generate a valid certificate, you must have a certificate authority sign a certificate request. You cancreate local CAs on the SKM, and use those

Pagina 273 - Log commands

ConfiguringSNMPv3ontheSKM ... 63Administratorprocedures... 64Creatinganadministrator...

Pagina 274

10. Copy the certificate text.11 . Navigate back to the Certificate List section.12. Select the certificate request and click Properties to access the Ce

Pagina 275

9. Paste the certificate request into the Certificate Request field. Select Client as the Certificate Purpose,specify a Certificate Duration and click Sign

Pagina 276

To install a certificate:1. Log in to the Management Console as an administrator with Certificates access control.2. Navigate to the Certificate List sec

Pagina 277 - Network commands

2. Navigate to the Certificate List section of the Certificate and CA Configuration page (Security>Certificates).3. Select the Certificate Name and clic

Pagina 278

Deleting a trusted CA list profileTo delete a trusted certificate authority list profile:1. Log in to the Management Console as an administrator with Cer

Pagina 279

Deleting a local CATo delete a local CA:1. Log in to the Management Console as an administrator with Certificate Authorities access control.2. Navigate

Pagina 280

8. Copy the CA certificate request text.The certificate text looks similar, but not identical, to the following text.-----BEGIN CERTIFICATE REQUEST-----

Pagina 281

FIPS status server proceduresEnabling the FIPS status serverTo enable the FIPS Status Server:1. Log in to the Management Console as an administrator w

Pagina 282 - Services comma

Enabling key and policy configuration by client applicationsEnabling key and policy configuration by client applications permits the following actions:•

Pagina 283

6. Use the Username Field in Client Certificate field to specify which field in the client certificate mustcontain a valid username. This setting is optio

Pagina 284 - SNMP commands

Rollingbacksoftware ... 96SystemHealthpage ... 96Refreshpage ...

Pagina 285

5. Click Join Cluster.NOTE:After joining the cluster, you will be prompted to synchronize with an existing clustermember. We recommend that you synchr

Pagina 286

Removing a device from a clusterTo remove a device from a cluster:1. Log in the ManagementConsoleofthedevicethatwillberemovedfromtheclusterasanadminis

Pagina 287

Configuring an NTP server connectionTo configure an NTP server connection:1. Log in to the Management Console as an administrator with Network and Date/

Pagina 288 - SSL commands

9. For each service select either Allow All Connections to grant access to all clients or Only Allow IPsSpecified Below to grant access to only the cli

Pagina 289

Administrator proceduresCreating an administratorTo create an administrator account:1. Log in the Management Console as an administrator with Administ

Pagina 290

3. Click LDAP Test.Setting up the LDAP schemaTo set up the LDAPSchema:1. Log in to the SKM appliance as a Local administrator with High Access Adminis

Pagina 291 - System commands

2. Navigate to the Password Settings for Local Administrators section of the Administrator Configurationpage (Device Configuration > Administrators &

Pagina 292

2. Navigate to the Multiple Credentials for Key Administration section on the AdministratorConfiguration page (Device > Administrators > Multiple

Pagina 293

1. Open the certificate request in a text editor.2. Copy the text of the certificaterequest. Thecopiedtextmustincludetheheader(-----BEGINCERTIFICATE REQ

Pagina 294

2. Navigate to the Remote Administration Settings section (Device > Administrators > RemoveAdministration).3. Click Edit.4. Select Web Admin Use

Pagina 295 - System informa

LDAPGroups... 135UserList ... 135Certificate and CA ConfigurationPage...

Pagina 296 - System log comm

2. Determine the Key Sharing Group.a. From the filtered list of keys, choose the one with the most recent timestamp (the numbersequence at the end of t

Pagina 297 - D Troubleshooting

NOTE:Steps c. through f. above ensure the backup filecontainsonlythesinglekey.g. In the Backup Summary section of the panel, verify that no settings, c

Pagina 298 - Troubleshooting

4. Send the tape and the Destination (backup) file to the Cluster #2 admin. Also transmit the Groupname and the backup password.NOTE:For security reaso

Pagina 299 - Regulatory co

5. Import (restore) the backup file to Cluster #2a. On the SKM, from the Device Tab, in the Maintenance menu on the left, select Backup & Restore,t

Pagina 300 - European Union notice

6. Restart the SKM software.NOTE:Following a restore, the SKM must be restarted.a. From the SKM Device tab, in the Maintenance menu, select Services.b

Pagina 301 - Korean notices

7. Force replication of the key across Cluster #2.a. From the SKM Security tab, in the Keys menu on the left, select Keys.b. Use filtering from the Key

Pagina 302 - Laser compliance

8. Ensure that the key sharing group has been added.a. From the SKM interface, Security tab, Users and LDAP Menu, select Local Users and Groups.b. Ver

Pagina 303 - German laser notice

1. FromtheSKMinterfaceontheDevicetabintheMaintenance menu on the left, select Backup &Restore, then select Create Backup.Figure 11 Creating the ba

Pagina 304 - Japanese laser notice

7. In the Backup Summary section of the panel, verify that all of the settings, certificates, and localcertificate authorities are included in the backu

Pagina 305 - Recycling notic

1. FromtheSKMinterfaceontheDevicetab,intheMaintenance menu, select Backup Restore,thenCreate Backup.2. In the Create Backup pane, in the Security Item

Pagina 306 - German notice

ClusterSettings ... 177CreateCluster... 178JoinCluster...

Pagina 307 - Hungarian notice

Log configuration proceduresConfiguring log rotationTo configure log rotation:1. Log in to the Management Console as an administrator with Logging access

Pagina 308 - Polish notice

2. Change the file extension on the log file to .eml. The file will now be recognized by Windowsas an E-mail file.3. Double-click on the file. Outlook Expr

Pagina 309 - Slovenian notice

Recreating the log signing certificatePrior to creating a new log signing certificate, backup the old certificate so you can verify previouslysigned logs

Pagina 310 - Swedish notice

2. Navigate to the Log Viewer page (Device > Log Viewer) and click the tab for the log you wouldlike to download.3. Choose a log in the Log File fie

Pagina 311 - Avis relatif aux piles

84Performing configuration and operation tasks

Pagina 312 - Istruzioni per la batteria

4MaintainingtheSKMBackup and restore overviewClustering SKM nodes is an effective way of exchanging keys and configuration data to allow for failover,b

Pagina 313 - Spanish battery notice

Backup and restore pageThe Backup and restore page enables you to create and restore backups. This page contains thefollowing sections:• Create Backup

Pagina 314 - Regulatory compliance notices

Table 1 Create Backup: Security Items section componentsComponents DescriptionSecurity ItemsClick Select All toincludeallofthekeymanagementitemsinyour

Pagina 315 - FSpecifications

Table 2 Create Backup: Device Items section componentsComponents DescriptionDevice ItemsClick Select All toincludeallofthedeviceconfiguration items in

Pagina 316 - Environmental

Table 3 Create Backup: Backup Settings section componentsComponents DescriptionBackup NameEnteranameforthebackupfile. For backups stored externally, th

Pagina 317 - G About this guide

RemoteAdministrationSettingsoverview ... 215RemoteAdministrationSettingssections... 215RemoteAdministrati

Pagina 318 - HP technical support

Figure 17 Viewing the Restore Backup sectionThe following table describes the components of the Restore Backup section.Table 4 Restore Backup section

Pagina 319

Figure 18 Viewing the Backup Restore Information sectionThe following table describes the components of the Internal Backup List section.Table 5 Inter

Pagina 320 - About this guide

Table 6 Internal Backup List section componentsComponents DescriptionBackup Name Displays the backup name.DateDisplaysthedateonwhichthebackupwascreate

Pagina 321 - Glossary

Table 7 Services List section componentsComponents DescriptionName• KMS Server: the“brains” of the SKM, which manages all incoming and outgoingconnect

Pagina 322

System Information pageUse the System Information page to perform software upgrades and examine information about thesystem and software currently ins

Pagina 323

The following table describes the components of the License Information section.Table 10 License Information section componentsComponents DescriptionL

Pagina 324

Upgradingtoapatch releasePatch releasesare lightweight; customers do not have to re-qualify an entire release. All patches arecumulative, which means

Pagina 325

Figure 25 Viewing the Refresh Page sectionThe following table describes the components of the Refresh Page section.Table 12 Refresh Page section compo

Pagina 326

Cooling Fan StatusThe Cooling FanStatus section provides information on the status all of the SKM’s cooling fans. Thefollowing table describes the dif

Pagina 327

Traceroute InformationUse the Traceroute Information section to examine the path between the SKM and a destination.Figure 29 Viewing the Traceroute In

Commenti su questo manuale

Nessun commento