Hp Secure Key Manager Manuale Utente Pagina 1

Navigare online o scaricare Manuale Utente per Magazzini Hp Secure Key Manager. HP Secure Key Manager User Manual Manuale Utente

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa

Sommario

Pagina 1 - Secure Key Manager

HP StorageWorksSecure Key Managerusers guide*AJ087-96018*Part number: AJ087–960183rd edition: April 2009

Pagina 2

Secure logs ... 244Log Configuration page .

Pagina 3 - Contents

DescriptionComponentsClick Cancel to abort the backup and return to the Create Backup: Security Items section.CancelDisplays all of the items that cou

Pagina 4

NOTE:Key Manager DataSecure appliance Number of Active Versions Allowed for a Key setting on the Keyand Policy Configuration page. If the key has more

Pagina 5

Figure 19 Viewing the Internal Backup List sectionThe following table describes the components of the Internal Backup List section.Table 7 Internal Ba

Pagina 6

Figure 20 Viewing the Services List sectionThe following table describes the components of the Services List section.Table 8 Services List section com

Pagina 7

Figure 21 Viewing the Restart/Halt sectionThe following table describes the components of the Restart/Halt section.Table 9 Restart/Halt section compon

Pagina 8

Figure 22 Viewing the Device Information sectionThe following table describes the components of the Device Information section.Table 10 Device Informa

Pagina 9

Software Upgrade/InstallThe software upgrade and installation mechanism can be used to install new features, upgrade coresoftware, and apply security

Pagina 10

IMPORTANT:You must be running the base release upon which the patch is built before upgrading to the patchrelease. You cannot upgrade directly from a

Pagina 11

Figure 25 Viewing the Refresh Page sectionThe following table describes the components of the Refresh Page section.Table 13 Refresh Page section compo

Pagina 12

Cooling Fan StatusThe Cooling Fan Status section provides information on the status all of the SKM's cooling fans. Thefollowing table describes t

Pagina 13

Health check configuration commands ... 297Help commands ...

Pagina 14

Traceroute InformationUse the Traceroute Information section to examine the path between the SKM and a destination.Figure 29 Viewing the Traceroute In

Pagina 15

Figure 31 Viewing the Netstat Information sectionThe following table describes the components of the Netstat Information section.Table 19 Netstat Info

Pagina 16

Maintaining the SKM112

Pagina 17

A SKM appliance information sheetThis information is specific to the HP StorageWorks Secure Key Manager (SKM) appliance to whichit is attached. There

Pagina 18

Figure 33 Front and top of SKM applianceFigure 34 Back of SKM applianceDescriptionItemProduct ID number (PID) of the appliance1Serial number of the ap

Pagina 19

B Using the Management ConsoleLogging in and outUse the Administrator Authentication screen to log into the Management Console.Figure 35 Viewing the A

Pagina 20

• Recent ActionsSecurity SummaryUse this section to view security-related summary information for your SKM.Figure 37 Viewing the Security Summary sect

Pagina 21

DescriptionComponentDisplays the version of the software currently running on the SKM.Software VersionDisplays the current date.DateDisplays the curre

Pagina 22

Figure 40 Viewing the Search Criteria sectionThe following table describes the components of the Search Criteria section.Table 24 Search Criteria sect

Pagina 23 - About this guide

Using features common to the Security and Device tabsThe following sections describe how to set display parameters for Management Console viewing.Thes

Pagina 24 - Rack stability

Estonian notice ... 335Finnish notice ...

Pagina 25 - HP websites

Accessing the Help systemThe Management Console provides you with two ways to access product documentation:context-sensitive help, and help. Both meth

Pagina 26 - Documentation feedback

Figure 46 Finding the Help linkClicking this icon opens the help system in a new web browser. The default page shows the table ofcontents.Using the Ke

Pagina 27 - Taking ESD precautions

CAUTION:Do not delete keys that might be needed to decrypt data at some point in the future. Once youdelete a key, there is no way to decrypt data tha

Pagina 28 - Rack planning resources

DescriptionComponentThe algorithm might be any of the following:• AES-256• AES-192• AES-128• DES-EDE-168 (three key triple DES)• DES-EDE-112 (two key

Pagina 29 - Optimum environment

Figure 48 Viewing the Key Properties sectionThe following table describes the components of the Key Properties section.Table 29 Key Properties section

Pagina 30 - Power requirements

The state, combined with the key type and group permissions determine how the key version can beused. Ultimately, a key version can only be used when:

Pagina 31 - Unpacking

DescriptionComponentClick Delete to remove the permissions for a group.DeleteFor example, in Figure 49, members of group1 have permission to export ke

Pagina 32

DescriptionComponentClick Add to add an attribute.AddClick Delete to remove the selected attribute.DeleteKey Versions and Available UsageUse this sect

Pagina 33 - Selecting a rack location

Figure 52 Viewing the Public Key sectionThe following table describes the components of the Public Key section.Table 33 Public Key section componentsD

Pagina 34

DescriptionComponentClick Save Query to save the query without executing it.Save QueryClick Run Query without Saving to execute the query. The query n

Pagina 35 - Attaching the cables

FiguresIdentify the contents of the shipping carton ... 321Connect the power supplies to

Pagina 36

Figure 55 Viewing the Modify Query sectionNOTE:You cannot greatly modify the built-in query [All]. The Appliance will only permit you to change theCol

Pagina 37 - 2 Configuring the system

Figure 56 Viewing the Create Key sectionThe following table describes the components of the Create Key section.Table 37 Create Key section componentsD

Pagina 38 - Configuring the system38

DescriptionComponentWhen selected, the key contains multiple versions, up to a maximum of 4000. Eachkey version has unique key bytes, but shared key m

Pagina 39

IMPORTANT:The server will not import keys that are known to be weak, such as 64 bit DES. In addition, the paritybits must be set properly; otherwise,

Pagina 40 - Configuring the system40

DescriptionComponentA check mark in the box indicates that the key is deletable via an XML request by thekey owner (or any user for global keys). Afte

Pagina 41

NOTE:Authorization policies cannot be applied to global keys or to certificates. Key owners are not subjectto policy restrictions.The Authorization Po

Pagina 42 - Configuring the system42

Figure 60 Viewing the Authorization Policy Properties sectionThe following table describes the Authorization Policies Properties section.Table 41 Auth

Pagina 43

Figure 61 Viewing the Authorized Usage Periods sectionThe following table describes the Authorization Usage Periods section.Table 42 Authorization Usa

Pagina 44 - Establishing a cluster

Figure 62 Viewing the Active Versions sectionTable 43 Active Versions section componentsDescriptionComponentDisplays the number of active versions all

Pagina 45

Configuring the users and groupsA user directory contains a list of users that may access the keys on your KMS Server, and a list ofgroups to which th

Pagina 46 - Configuring the system46

Front and top of SKM appliance ... 11433Back of SKM appliance ...

Pagina 47

Figure 64 Viewing the Local Users sectionThe following table describes the components of the Local Users section.Table 45 Local Users section componen

Pagina 48 - Copying the certificates

NOTE:The User Administration Permission and Change Password Permission apply only to local users. LDAPusers cannot be managed through the SKM; they mu

Pagina 49 - Installing the certificates

Figure 66 Viewing the Custom Attributes sectionThe following table describes the components of the Custom Attributes section.Table 47 Custom Attribute

Pagina 50 - Configuring the system50

Figure 67 Viewing the Local Groups sectionThe following table describes the components of the Local Groups section.Table 48 Local Groups section compo

Pagina 51 - Key and policy procedures

Figure 69 Viewing the User List sectionThe following table describes the components of the User List section.Table 50 User List section componentsDesc

Pagina 52 - Downloading an RSA key

Figure 70 Viewing the LDAP User Directory Properties sectionThe following table describes the components of the LDAP User Directory Properties section

Pagina 53 - Deleting a key

Figure 71 Viewing the LDAP Schema Properties sectionThe following table describes the components of the LDAP Schema Properties section.Table 52 LDAP S

Pagina 54 - User and group procedures

DescriptionComponentClick Edit to modify the properties.EditClick Clear to remove the current properties.ClearLDAP Failover Server PropertiesUse the L

Pagina 55 - Deleting a group

• User ListLDAP UsersThe LDAP Users section displays the users available in the LDAP user directory.Figure 73 Viewing the LDAP Users sectionThe follow

Pagina 56 - LDAP server procedures

Figure 74 Viewing the LDAP Groups sectionThe following table describes the components of the LDAP Groups section.Table 55 LDAP Groups section componen

Pagina 57 - Certificate procedures

Viewing the LDAP User Directory Properties section ... 14570Viewing the LDAP Schema Properties section

Pagina 58

Certificate and CA Configuration PageCertificates identify one entity to another. In this case, when making SSL connections between a clientapplicatio

Pagina 59 - Creating a client certificate

DescriptionComponentA certificate summary containing the following information:• Common Name: Name of entity to which certificate is issued. This is t

Pagina 60

Figure 77 Viewing the Certificate Information sectionThe following table describes the components of the Certificate Information section.Table 58 Cert

Pagina 61 - Installing a certificate

DescriptionComponentClick Install Certificate to go to the Certificate Installation page. The Install Certificatebutton can be applied to either certi

Pagina 62 - Downloading a certificate

The following table describes the components of the Certificate Installation section.Table 59 Certificate Installation section componentsDescriptionCo

Pagina 63

DescriptionComponentThe duration during which the certificate is valid.Certificate Duration(days)Click Create to create the certificate.CreateClick Ba

Pagina 64 - Downloading a local CA

DescriptionComponentE–mail address of person requesting the certificate. This field is optional.Email AddressSize of key being generated. The SKM supp

Pagina 65 - Creating a local CA

DescriptionComponentThe password used to access the key.Private Key PasswordClick Import Certificate to import the certificate to SKM.Import Certifica

Pagina 66 - Installing a CA certificate

DescriptionComponentClick Edit to change the name of a profile.EditClick Add to create a profile. A newly created profile is initially empty. You must

Pagina 67 - FIPS status server procedures

Figure 84 Viewing the Trusted Certificate Authority List (Edit Mode)The following table describes the components of the Trusted Certificate Authority

Pagina 68 - KMS server procedures

Viewing the Join Cluster section ... 197107Viewing the Date and Time Settin

Pagina 69

Figure 85 Viewing the Local Certificate Authority List sectionThe following table describes the components of the Local Certificate Authority List sec

Pagina 70 - Clustering procedures

Figure 86 Viewing the CA Certificate Information sectionThe following table describes the components of the CA Certificate Information section.Table 6

Pagina 71 - Setting up SSL in a cluster

Sign Certificate RequestUse the Sign Certificate Request section to sign certificate requests.Figure 87 Viewing the Sign Certificate Request sectionTh

Pagina 72 - Date and time procedures

Figure 88 Viewing the Signed Certificates sectionThe following table describes the components of the Signed Certificates section.Table 69 Signed Certi

Pagina 73 - IP authorization procedures

Figure 89 Viewing the Signed Certificate Information sectionThe components of the Signed Certificate Information section are view-only.Create Local CA

Pagina 74 - SNMP procedures

Figure 90 Viewing the Create Local Certificate Authority sectionThe following table describes the components of the Create Local Certificate Authority

Pagina 75

DescriptionComponentLocal CAs can be one of two types: Self-signed root CA, or Intermediate CA Request.When you create a self-signed root CA, you must

Pagina 76 - Setting up the LDAP schema

DescriptionComponentDisplays one of three values:Certificate Active - The CA can be used to issue certsand sign certificate requests.Certificate Expir

Pagina 77 - Changing your password

CRL v2 format. Support for CRLs on the SKM allows you to obtain, query, and maintain CRLs publishedby CAs supported on the SKM. The SKM uses CRLs to v

Pagina 78 - Granting credentials

NOTE:The Auto-Update feature does not apply to local CAs.Force Periodic UpdateThe SKM performs a daily check of the Next Update field to determine whe

Pagina 79 - Revoking a credential grant

Viewing the Current Audit Log section ... 252144Viewing the Activity Log section ..

Pagina 80

Only the following models are capable of operating in accordance with FIPS standards:• HP DL360 R05All other SKM can be configured for high security b

Pagina 81

Software Patches and UpgradesHP will indicate which software patches and upgrades are FIPS certified. Apply only FIPS certifiedsoftware to a FIPS-comp

Pagina 82

DescriptionComponentClick Set FIPS Compliant to alter the settings shown in the High Security Settings andSecurity Settings Configured Elsewhere secti

Pagina 83

Figure 94 Viewing the High Security Settings sectionThe following table describes the components of the High Security Settings section.Table 74 High S

Pagina 84

DescriptionComponentPrevents administrators from changing RAID drives through the Management Console.IMPORTANT:You cannot replace RAID drives and rema

Pagina 85

DescriptionComponentDisplays the SSL Protocols enabled in the SSL Options section. Click the link to accessthe SSL Options section. FIPS compliance re

Pagina 86

Configuring the High Security Settings on an SKMIMPORTANT:When you enable FIPS compliance on the SKM, the functionality displayed here is disabled. Mo

Pagina 87

DescriptionConditionalpower-onTestKnown Algorithm Test for the X9.31 PRNG. This testis performed at power-on.XX9.31 PRNGTest of the random number gene

Pagina 88

Figure 96 Viewing the FIPS Status Report: normalThe following table describes the components of the FIPS Status Server Settings section.Table 77 FIPS

Pagina 89 - Log configuration procedures

DescriptionComponentDisplays the result and timestamp for each of the following self-tests:• AES Encryption• DES Encryption• DSA Encryption• HMAC Algo

Pagina 90 - Enabling signed logs

TablesDocument conventions ... 231Create Backup: Security It

Pagina 91

DescriptionComponentSelect the IP addresses on which the FIPS Status Server is enabled on the SKM.Local IPSelect the port on which the server status r

Pagina 92 - Log view procedures

SSL Session TimeoutAll SSL sessions stored in the SKM's session cache have an expiration period, typically two hours.This means the SKM accepts a

Pagina 93 - Clearing a log

IMPORTANT:Some web browsers, including Internet Explorer 6.0, do not have TLS 1.0 enabled by default. If youdisable SSL 2.0 and 3.0, please check firs

Pagina 94

SSL Cipher OrderUse this section to enable, disable, and order the priority of SSL ciphers.Different applications and databases support different encr

Pagina 95 - 4 Maintaining the SKM

DescriptionComponentThis field specifies the Hash function to use for SSL session integrity. The supportedHash functions are:• SHA–1: (Secure Hash Alg

Pagina 96 - Backup and restore page

The KMS Server can define a local users and groups list or you can use an LDAP server to centrallymanage your users and groups.Authentication OptionsT

Pagina 97 - Secure Key Manager 97

Key Management Services Configuration sectionsThe Key Management Services Configuration page enables you to configure the KMS Server, KMSServer Authen

Pagina 98 - Create Backup: Device Items

DescriptionComponentThe Connection Timeout value specifies in seconds how long client connections canremain idle before the KMS Server begins closing

Pagina 99

Figure 101 Viewing the KMS Server Authentication Settings sectionThe following table describes the elements of the KMS Server Authentication Settings

Pagina 100 - Restore Backup

DescriptionComponentThis field allows you to select a profile to use to verify that client certificates are signedby a CA trusted by the SKM. This opt

Pagina 101 - Internal Backup List

Public Key section components ... 12833Create Query section components ..

Pagina 102 - Services Configuration page

DescriptionComponentClick Edit to modify the account lockout settings.EditHealth Check overviewThe Health Check feature allows you to configure client

Pagina 103 - Restart/Halt

DescriptionComponentIn this field you specify the IP address on which you want to listen for health checkrequests. You can specify an individual IP ad

Pagina 104 - System Information page

• LDAP Server• SSL• Administrators and Remote Administration• IP Authorization• Logging• Service Startup• Known CAs, CRLs, and Trusted CA List Profile

Pagina 105 - License Information

NOTE:When upgrading from a previous release, local CA replication is disabled by default.Automatic Synchronization BackupsPrior to each synchronizatio

Pagina 106 - Software Upgrade/Install

DescriptionComponentThe port on which the device listens for cluster administration requests.CAUTION:The cluster port (typically 9001) must be differe

Pagina 107 - System Health page

Figure 105 Viewing the Cluster Settings sectionThe following table describes the components of the Cluster Settings section.Table 86 Cluster Settings

Pagina 108 - Power Supply Status

Figure 106 Viewing the Create Cluster sectionThe following table describes the components of the Create Cluster section.Table 87 Create Cluster sectio

Pagina 109 - Network Diagnostics page

Figure 107 Viewing the Join Cluster sectionThe following table describes the components of the Join Cluster section.Table 88 Join Cluster section comp

Pagina 110 - Netstat Information

• Date & Time ProceduresNetwork Time Protocol overviewThe Network Time Protocol (NTP) is a protocol by which computers on a network synchronize th

Pagina 111 - Reading Netstat Results

Figure 108 Viewing the Date and Time Settings sectionThe following table describes the components of the Date and Time Settings section.Table 89 Date

Pagina 112 - Maintaining the SKM112

Legal and notice information© Copyright 2007, 2009 Hewlett-Packard Development Company, I.E.© Copyright 2000, 2008 Ingrian Networks, Inc.Confidential

Pagina 113

Create Local Certificate Authority section components ... 16570CA Certificate List section components ...

Pagina 114

Figure 109 Viewing the NTP Settings sectionThe following table describes the components of the NTP Settings section.Table 90 NTP Settings section comp

Pagina 115 - Using the Home tab

Network Interfaces sectionsThe Network Configuration page contains the following network interface-related section:• Network Interface ListNetwork Int

Pagina 116 - System Summary

Figure 111 Viewing the Default Gateway List sectionThe following table describes the components of the Default Gateway List section.Table 92 Default G

Pagina 117 - Search screen

Example 2. Example 2Used for Outgoing ConnectionsDefault GatewayInter-face-----------------------------------------------------------------—nononeEthe

Pagina 118

This configuration is the same as example 3, but in this scenario there are some hosts and networksthat are not reachable through 172.17.7.1. Most oft

Pagina 119 - Filtering sections

Hostname & DNS sectionsThe Network Configuration page contains the following hostname and DNS-related sections:• Hostname Setting• DNS Server List

Pagina 120 - Accessing the Help system

The following table describes the components of the DNS Server List section.Table 95 DNS Server List section componentsDescriptionComponentsUse the Up

Pagina 121

Figure 115 Viewing the Network Interface Port Speed/Duplex sectionThe following table describes the components of the Network Interface Port Speed/Dup

Pagina 122

Figure 116 Viewing the IP Authorization Settings sectionThe following table describes the components of the IP Authorization Settings section.Table 97

Pagina 123 - Key Properties

Figure 117 Viewing the Allowed Client IP Addresses sectionThe following table describes the components of the Allowed Client IP Addresses section.Tabl

Pagina 124 - Versioned keys

Change Your Password section components ... 229107Password Settings for Local Administrator

Pagina 125 - Group Permissions

SNMP overviewThe SNMP protocol enables network and system administrators to remotely monitor devices on thenetwork, such as switches, routers, proxies

Pagina 126 - Custom Attributes

secret key, and sends the message to the receiver, who decrypts it using the DES algorithm and thesame secret key.Access controlAccess control in SNMP

Pagina 127 - RSA Public Key

This page contains the following sections:• SNMP Agent Settings – Changes to the SNMP Agent Settings section apply to all managementstations, username

Pagina 128 - Create Query

NOTE:If you are configuring the agent to communicate with an NMS running SNMPv3 software, you candisregard this section.When creating a community on t

Pagina 129 - Modify Query

SNMPv3 Username ListAs the name suggests, the SNMPv3 Username List is used to configure the agent to communicate withan NMS running SNMPv3 software. Y

Pagina 130 - Create Key

DescriptionComponentThis password is used to create the secret key that performs the encrypt and decryptoperations on the data shared between the agen

Pagina 131

DescriptionComponentDisplays either the management community or username. The management communityis used to send SNMP data to the SNMPv1/v2 managemen

Pagina 132 - Import Key

DescriptionComponentName that is used to send SNMP data to SNMPv3 management stations. The usernameis used to create a key that is shared by the agent

Pagina 133

Figure 123 Viewing the Create SNMP Management Station sectionThe following table describes the components of the Create SNMP Management Station sectio

Pagina 134

DescriptionComponentYou can choose from MD5 and SHA.Auth Protocol (v3only)This password is used to create the secret key that is used to authenticate

Pagina 136 - Authorized Usage Periods

• Security Warnings – an administrative experienced multiple password failures while attemptingto log in, the system was reset to factory settings, th

Pagina 137 - Active Versions

and stored on the SKM appliance. The available access controls are grouped into categories anddescribed here.Security Configuration access controls en

Pagina 138 - Custom Key Attributes

When creating an administrator, you should assign the minimum amount of access controls needed.For example, a backup administrator will only need the

Pagina 139 - Local Users

WARNING!It is absolutely crucial that you remember the passwords for all of your local administrators. Forsecurity reasons, there is no way to reset a

Pagina 140

Configuration of the LDAP Administrator Server and the first LDAP administrator must be performedby a local administrator. Thereafter, you can use the

Pagina 141 - Selected Local User

1. Log in the Management Console as an administrator with High Access Administrator accesscontrol.2. Navigate to the Administrator section on the Admi

Pagina 142 - Local Groups

DescriptionComponentAccess control options related to device security configuration.• Keys and Authorization Policies: Create, modify and delete keys

Pagina 143 - User List

Select LDAP UsernameThe Select LDAP Username section enables you to browse and select an LDAP user when creating anLDAP administrator account.Figure 1

Pagina 144 - LDAP Server Configuration

Password expirationThe password expiration feature allows you to specify a duration for administrator passwords. Bydefault, this feature is disabled.

Pagina 145 - LDAP Schema Properties

CAUTION:In addition to all scheduled password changes, immediately change all administrator, user account,and backup passwords any time a security off

Pagina 146

About this guideThis guide provides information about:• Installing an HP StorageWorks Secure Key Manager• Configuring an HP StorageWorks Secure Key Ma

Pagina 147

DescriptionComponentRe-enter the new password.Confirm New Pass-wordClick Change Password to implement any changes made to this section.Change Password

Pagina 148 - LDAP Groups

DescriptionComponentEnter the minimum password length. The default length is 8. This value applies to allpasswords on the SKM (local administrator, us

Pagina 149

Any request for these operations, from either the Management Console or the CLI, results in a requestfor additional administrator accounts and passwor

Pagina 150 - Certificate List

NOTE:If the SKM is configured to use NTP, modifications to the NTP system time can extend the life span ofa granted credential.NOTE:Granted credential

Pagina 151 - Certificate Information

Multiple Credentials sectionsThe Multiple Credentials sections on the Administrator Configuration page lets you enable the multiplecredentials feature

Pagina 152 - DescriptionComponent

Credentials GrantedUse the Credentials Granted section to view the credentials granted to or by the current administrator.Any credential grants that d

Pagina 153 - Certificate Installation

DescriptionComponentEnter the length of duration. This duration cannot be longer than the Maximum Durationfor Time-Limited Credentials established in

Pagina 154 - Self Signed Certificate

Figure 131 Viewing the Remote Administration Settings sectionThe following table describes the components of the Remote Administration Settings sectio

Pagina 155 - Create Certificate Request

DescriptionComponentsThe SSH Admin Server IP address is the IP address used to configure the SKM from theCLI. You can select one specific IP address o

Pagina 156

LDAP Administrator Server Properties sectionUse the LDAP Administrator Server Properties section to define the basic properties of the LDAPadministrat

Pagina 157

ElementConvention• File and directory names• System output• Code• Commands, their arguments, and argument valuesMonospace text• Code variables• Comma

Pagina 158 - The Default Profile

Figure 133 Viewing LDAP Schema Properties sectionTable 114 LDAP Schema Properties section componentsDescriptionComponentThe base distinguished name (D

Pagina 159

DescriptionComponentClick to modify the properties.EditClick to remove the current properties.ClearClick to test the LDAP connection after you have de

Pagina 160 - CA Certificate Properties

For example, you can schedule that system rotate the Audit Log every Sunday morning at 3:15 orwhen the file size reaches 100 MB, whichever comes first

Pagina 161 - Secure Key Manager 161

DescriptionValueThe date and time when the log file was created.datetime stampThe hostname of the SKM.hostnameFor example, the filename audit.log.1.20

Pagina 162 - Signed Certificates

2005-09-12 10:23:47 irwin.company.com KMS Server: Starting KMS Serverlog message at syslog server (displays on one line):-----------------------------

Pagina 163

Figure 135 Viewing the Rotation Schedule sectionThe following table describes the components of the Rotation Schedule section.Table 117 Rotation Sched

Pagina 164 - Create Local CA

Figure 136 Viewing the Log Rotation Properties sectionThe following table describes the components of the Log Rotation Properties section.Table 118 Lo

Pagina 165 - Secure Key Manager 165

Syslog SettingsTo enable syslog, select a type of log, and click Edit. Specify a hostname or IP address of the primarylog server (Syslog Server #1) an

Pagina 166 - CA Certificate List

Figure 138 Viewing the Log Signing sectionThe following table describes the components of the Log Signing section.Table 120 Log Signing section compon

Pagina 167 - Install CA Certificate

Figure 139 Viewing the Log Signing Certificate Information sectionThe following table describes the components of the Log Signing Certificate Informat

Pagina 168 - Local CAs

HP technical supportFor worldwide technical support information, see the HP support website:http://www.hp.com/supportBefore contacting HP, collect the

Pagina 169 - Advanced Security overview

Figure 140 Viewing the Activity Log Settings sectionThe following table describes the components of the Activity Log Settings section.Table 122 Activi

Pagina 170

Figure 141 Viewing the System Log sectionThe following table describes the components of the System Log section.Table 123 System Log section component

Pagina 171 - FIPS Compliance

• Date and time change was made.• Username: the username that made the configuration change.• Event: a text description of the configuration change.Fi

Pagina 172 - High Security Settings

Activity LogThe Activity Log contains a record of each request received by the KMS Server. For client requeststhat contain multiple cryptographic oper

Pagina 173

Detail InformationRequest Typealgorithm and key size specified in the request; the value for the Deletable and Export-able options are listed as well

Pagina 174

Current Activity LogFigure 146 Viewing the Current Activity Log sectionThe following table describes the components of the Current Activity Log sectio

Pagina 175 - High Security Procedures

DescriptionFieldenclosed in brackets ( [] ), the message field displays the plaintext that correspondswith the base64 encoded message included in the

Pagina 176 - FIPS Status Server overview

DescriptionComponentClick Clear to delete the select log.ClearStatistics pageThe Statistics page enables you to view real-time system statistics about

Pagina 177 - FIPS Status Report

DescriptionComponentClick Set Refresh Time to apply the new value.Set Refresh TimeClick Refresh Now to refresh the System Statistics page on demand.Re

Pagina 178

Figure 151 Viewing the Connection Statistics sectionThe following table describes the components of the Connection Statistics section.Table 136 Connec

Pagina 179 - FIPS Status Server page

Documentation feedbackHP welcomes your feedback.To make comments and suggestions about product documentation, please send a message tostoragedocsFeedb

Pagina 180 - SSL overview

Figure 152 Viewing the Throughput sectionThe following table describes the components of the Throughput section.Table 137 Throughput section component

Pagina 181 - SSL Sections

Refresh Statistics (server)The Refresh Statistics section controls how frequently the Server Statistics page is refreshed. Whenthe page is refreshed,

Pagina 182

Figure 155 Viewing the KMS Statistics sectionThe following table describes the components of the KMS Statistics section.Table 140 KMS Statistics secti

Pagina 183 - SSL Cipher Order

C Using the Command Line InterfaceShell commandsThe CLI supports a few shell commands that allow you to perform various search, cut, and pasteoperatio

Pagina 184 - Configuring the KMS Server

• new cert requestIf there are no spaces between segments of quoted and non–quoted text, the two segments are treatedas one argument. Thus, the comman

Pagina 185 - Authentication Options

If the text you have entered can refer to multiple commands, tab completion will not work, but youcan press the return key to view the possible comman

Pagina 186 - KMS Server Settings

To exit configure mode and go to view mode, type exit at the prompt:hostname (config)# exithostname#Entering script modeScript mode allows you to crea

Pagina 187

NOTE:The Script Recorder takes care of all such formatting issues and hence is probably the best way tocreate scripts initially.Script recorderThe Scr

Pagina 188

Entering passwordsWhenever a command that requires a password is executed in a script, the actual password will notbe stored in the script. Instead, w

Pagina 189 - User Account Lockout Settings

transfer audit logAutologout Commandsautologoutshow-autologoutBackup and Restore Commandsbackupno backuprestore backupshow backupCA Cert Commandsca ce

Pagina 190 - Health Check sections

1 Installing and replacing hardwareThis section details the steps to install or replace the SKM hardware:• Preparing for the installation• Rack planni

Pagina 191 - Configuring the cluster

cert requestcert selfsign installno certificateno requestshow certcli-show-requestCRL Commandscrl auto-updatecrl list sendcrl list updatecrl settingsn

Pagina 192 - The Cluster Key

traceroute runFIPS Commandsshow fips statusfips serverreset factory settings zeroizesecurity settingsshow security settingsshow fips servershow fips s

Pagina 193 - Cluster Configuration page

show log rotationshow log signingshow logsigning certshow system syslogsystem syslogMode Commandsconfigureconfigure terminalexitscriptNetwork Commands

Pagina 194 - Cluster Settings

static routeServices Commandshaltkms-server runkms-server startupno kms-server-runno kms-server startupno snmp runno snmp startupno sshadmin runno ssh

Pagina 195 - Create Cluster

show snmp usernameshow stationsnmp agentsnmp usernamestationSSL Commandscipherspeccipherspec priorityno cipherspecno export cipherspecno ssl protocolr

Pagina 196 - Join Cluster

show ntpshow ras settingstimezone setSystem Health Commandsshow system healthSystem Information Commandsshow deviceshow softwaresoftware installsoftwa

Pagina 197

• activity log rotate• show activity logRelated com-mand(s)show activity log – view the Activity Log.hostname# show activity log <log name> <

Pagina 198 - Date and Time Settings

hostname# credential settingsRequire Multiple Credentials [n]:Num of Admins Required for Operations:1: 22: 33: 4Enter a number (1 - 3) [1]:Allow Time-

Pagina 199 - NTP Settings

• show granted credential• no granted credential• credential settings• show credential settingsRelated com-mand(s)ldap test failover – connect to the

Pagina 200 - Configuring the network

hostname config# password settingsEnable Password Expiration (y/n) [n]:Enable Password History (y/n) [n]:Minimum Password Length [8]:Must Passwords Co

Pagina 201 - Network Interfaces sections

• Use heel straps, toe straps, or boot straps at standing workstations.Wear the straps on both feet when standing on conductive floors or dissipating

Pagina 202

hostname# show password settingsPassword Expiration: After 180 daysPassword History: 4 passwords rememberedMinimum Password Length: 8Passwords Must Co

Pagina 203

show autologout – view the currently configured autologout settings.hostname# show autologoutSyntax• autologoutRelated com-mand(s)Backup and restore c

Pagina 204 - Static Route List

hostname# show backupSyntax• backup• no backup• restore backupRelated com-mand(s)CA certificate commandsca certificate install – install a CA certific

Pagina 205 - Hostname & DNS sections

• ca profile• ca profile duplicate• ca profile rename• show ca profile• show ca profile• no ca profile• no ca profile entryRelated com-mand(s)ca profi

Pagina 206 - Port Speed sections

hostname (config)# local caEnter the certificate name:Enter the common name:Enter the organization name:Enter the organization unit name:Enter the loc

Pagina 207 - IP Authorization sections

• ca profile• ca profile duplicate• ca profile entry• ca profile rename• show ca profile• show ca profile• no ca profileRelated com-mand(s)no local ca

Pagina 208 - Allowed Client IP Addresses

• halt• no local caRelated com-mand(s)show signed certificate – display information about certificates signed by local CAs on the SKM.hostname# show s

Pagina 209 - Configuring SNMP

The certificate import process varies between SKMs.hostname# cert importPlease pick the upload option for uploading your certificate:1) Console Paste

Pagina 210 - SNMP overview

hostname (config)# cert request <cert name>After executing the cert request command, the system prompts you to provide the followinginformation:

Pagina 211 - The SNMP Configuration page

• cert request• cli-show-request• no request• cert install• cert import• show cert• cert selfsign installRelated com-mand(s)no request – delete a cert

Pagina 212 - SNMP Agent Settings

Rack warningsWARNING!To reduce the risk of personal injury or damage to the equipment, be sure that:• The leveling jacks are extended to the floor.• T

Pagina 213

NoneRelated com-mand(s)crl list send – export a CRL.hostname (config)# crl list send <ca name>Transport Method:1) FTP 2) SCPEnter a number(1-2):

Pagina 214 - SNMPv3 Username List

hostname (config)# crl settings <ca name>Transport Method:1) FTP 2) SCP 3) HTTPEnter a number(1-3):Host:Filename:Username:Password:Confirm passw

Pagina 215 - SNMP Management Station List

NoneRelated com-mand(s)show crl list – display the serial number and revocation date of all revoked certificates in the CRL.hostname# show crl listSyn

Pagina 216

show clientevent log – view the client event log.hostname# show clientevent log <log name> <number of lines>Syntax• clientevent log rotate

Pagina 217 - Secure Key Manager 217

NOTE:For security purposes, this command can only be run from the CLI at the console.You cannot execute this command remotely via the CLI over SSH or

Pagina 218

• host run• traceroute run• ping runRelated com-mand(s)traceroute run – print the route packets take to the specified network host.hostname (config)#

Pagina 219 - Enterprise MIB overview

• show fips serverRelated com-mand(s)reset factory settings zeroize – zeroize all keys and passwords on the device.NOTE:For security purposes, this co

Pagina 220 - Administrator overview

hostname# show security settingsKey SecurityDisable Creation and Use of Global Keys: YesDisable Non-FIPS Algorithms and Key Sizes: YesDisable RSA Encr

Pagina 221

hostname (config)# health checkEnable Health Check [n]:Local IP:1: All2: 192.168.200.195Enter a number (1 - 2) [1]:Local Port [9080]:Health check sett

Pagina 222 - Administrator passwords

Log commandsactivity syslog – enable the SKM to use the syslog protocol to send Activity Log messages to an externalmachine.hostname (config)# activit

Pagina 223 - LDAP administrative server

ContentsAbout this guide ... 23Intended audience ...

Pagina 224 - Administrator procedures

When vertical space in the rack is not filled by an SKM or rack component, the gaps between thecomponents cause changes in airflow through the rack an

Pagina 225 - Create LDAP Administrator

• cli-no-audit-syslog• show audit syslogRelated com-mand(s)clientevent syslog – enable the SKM to use the syslog protocol to send Client Event Log mes

Pagina 226

log signing – enable Secure Logs.hostname (config)# log signing <log-name>Syntax• recreate logsigning cert• show logsigning cert• show log signi

Pagina 227 - Password Management overview

show activity syslog – display the syslog settings for the Activity Log.hostname# show activity syslogSyntax• no activity syslog• activity syslogRelat

Pagina 228

hostname (config)# system syslogSyslog Server #1 IP [None]:Syslog Server #1 Port [514]:Syslog Server #2 IP [None]:Syslog Server #2 Port [514]:Syntax•

Pagina 229 - Password Management sections

Network commandsedit ip authorization allowed – edit the IP authorization settings for a particular IP address.NOTE:The ip authorization allowed comma

Pagina 230

hostname (config)# ip address [<ip address> <submask> <interface #>]ip addressEnter the IP address:Enter the subnet mask:Available i

Pagina 231 - Multiple Credentials overview

• no ip addressRelated com-mand(s)ip name–server – add a domain name server.hostname (config)# ip name-server <IP1> <IP2>...<IPn>NOT

Pagina 232

no static route – delete a static route on the SKM.hostname (config)# no static routeSyntax• static route• show static routeRelated com-mand(s)show et

Pagina 233

• edit ip authorization allowed• ip authorization• ip authorization allowed• no ip authorization allowed• show ip authorization allowedRelated com-man

Pagina 234 - Multiple Credentials sections

• show static route• no static routeRelated com-mand(s)Services commandshalt – halt the SKM.hostname (config)# haltSyntax• rebootRelated com-mand(s)km

Pagina 235 - Grant a Credential

CAUTION:Protect the SKM from power fluctuations and temporary interruptions with a regulating uninterruptiblepower supply (UPS). This device protects

Pagina 236

hostname (config)# no sshadmin runSyntax• sshadmin runRelated com-mand(s)no sshadmin startup – disable SSH administration when starting up the SKM.hos

Pagina 237

• no snmp runRelated com-mand(s)snmp startup – enable SNMP when starting up the SKM.hostname (config)# snmp startupSyntax• no snmp startupRelated com-

Pagina 238 - LDAP Administrator Server

edit community – edit a community.hostname (config)# edit community <community name>Enter your changes to the community public below.Press enter

Pagina 239

NOTE:When you execute the edit station command, the system prompts you to provide thenew SNMP management station information. In the example shown her

Pagina 240

NOTE:When you execute the edit snmp username command, the system prompts you toprovide the new SNMPv3 username information.hostname (config)# no snmp

Pagina 241 - Viewing logs and statistics

hostname (config)# snmp agentAvailable IP addresses:1. All2. 192.168.200.195SNMP agent IP [All] (1-2): 1SNMP agent port [161]:Enable SNMP traps? (y/n)

Pagina 242

SSL commandscipherspec – enable a cipher spec.NOTE:The cipher order pertains to the communication channel between the client (application, database,et

Pagina 243

• show cpiherspec• cipherspec• no cipherspec• no export cipherspec• restore cipherspecRelated com-mand(s)no cipherspec – disable a cipherspec.hostname

Pagina 244 - Log Configuration page

• show cpiherspec• cipherspec priority• cipherspec• no cipherspec• no export cipherspecRelated com-mand(s)show cipherspec – view the priority of all c

Pagina 245 - Log Rotation Properties

hostname# show licenseLicenses: 5Syntax• show license usageRelated com-mand(s)show license usage – show the number of licenses currently in use.hostna

Pagina 246

5. Place shipping materials back into the shipping cartons.6. Set the shipping cartons aside for later use.Identifying the shipping carton contentsA n

Pagina 247 - Log Signing

hostname (config)# edit ras settingsAvailable IP addresses:1. All2. 192.168.200.195Web Admin Server IP [192.168.200.195] (1-2): 2Web Admin Server Port

Pagina 248

• show ntp• ntp• no ntp serverRelated com-mand(s)recreate ssh key – recreate the Secure Shell key.NOTE:If you execute the recreate ssh key command fro

Pagina 249 - Activity Log Settings

hostname (config)# timezone set <time zone>Syntax• clock set• show clockRelated com-mand(s)Table 142 clock set syntax detailsDescriptionParamete

Pagina 250 - Log Viewer page

System information commandsshow device – view the model number and Unit ID of the SKM.hostname# show deviceSyntax• show softwareRelated com-mand(s)sho

Pagina 251 - Audit Log

• no system log• show system logRelated com-mand(s)transfer system log – transfer a system log off of the SKM.hostname# transfer system log <log_na

Pagina 252

D TroubleshootingThis appendix addresses some of the typical problems you might face as the administrator of theSKM.Table 143 Common problemsPossible

Pagina 253 - Activity Log

Troubleshooting326

Pagina 254

E Regulatory compliance noticesThis section contains regulatory notices for the HP StorageWorks Secure Key Manager (SKM) appliance.Regulatory complian

Pagina 255 - Client Event Log

of this equipment in a residential area is likely to cause harmful interference, in which case the userwill be required to correct the interference at

Pagina 256

Class B equipmentThis Class B digital apparatus meets all requirements of the Canadian Interference-Causing EquipmentRegulations.Cet appareil numériqu

Pagina 257 - Statistics page

CAUTION:There will be several tamper-evident labels. Do not cut or damage these labels because they arerequired for FIPS compliance audits.Selecting a

Pagina 258 - Connection Statistics

Korean noticesClass A equipmentClass B equipmentTaiwanese noticesBSMI Class A noticeTaiwan battery recycle statementRecovery text:• “Please recycle wa

Pagina 259 - Throughput

Laser compliance noticesEnglish laser noticeThis device may contain a laser that is classified as a Class 1 Laser Product in accordance with U.S.FDA r

Pagina 260 - License Usage

French laser noticeGerman laser noticeItalian laser noticeRegulatory compliance notices332

Pagina 261 - KMS Statistics

Japanese laser noticeSpanish laser noticeRecycling noticesEnglish noticeSecure Key Manager 333

Pagina 262

Bulgarian noticeCzech noticeDanish noticeDutch noticeRegulatory compliance notices334

Pagina 263 - Command Line Interface syntax

Estonian noticeFinnish noticeFrench noticeGerman noticeSecure Key Manager 335

Pagina 264 - Tab completion

Greek noticeHungarian noticeItalian noticeLatvian noticeRegulatory compliance notices336

Pagina 265 - Command modes

Lithuanian noticePolish noticePortuguese noticeRomanian noticeSecure Key Manager 337

Pagina 266 - Scripting mode

Slovak noticeSpanish noticeSwedish noticeTurkish noticeTürkiye Cumhuriyeti: EEE Yönetmeli ine UygundurRegulatory compliance notices338

Pagina 267 - Installing certificates

Battery replacement noticesDutch battery noticeSecure Key Manager 339

Pagina 268 - CLI commands

9. Remove the rails from the original appliance for reuse on the replacement appliance. To do so,pull out on the tab of the rail that locks the center

Pagina 269 - Secure Key Manager 269

French battery noticeGerman battery noticeRegulatory compliance notices340

Pagina 270

Italian battery noticeJapanese battery noticeSecure Key Manager 341

Pagina 271 - Secure Key Manager 271

Spanish battery noticeRegulatory compliance notices342

Pagina 272

F SpecificationsThis section provides the VLS node and specifications.SKM appliance specificationsSpecificationItem4.3 cm (1.70 in)Height70.5 cm (27.8

Pagina 273 - Secure Key Manager 273

ShippingNon-operatingOperating5% to 95%10% to 95%40% to 60%Relative humidity (noncondensing)2-1000 ft to 40,000 ft-1000 ft to 10,000 ft-1000 ft to 10,

Pagina 274

GlossaryActive Device In the VRRP group, this is the device that is receiving all network traffic. This istypically the primary device; however, in ca

Pagina 275 - Activity log commands

periodic time requests to servers, obtaining server time stamps, and using themto adjust the client's clock.Passive device In the VRRP group, the

Pagina 276

IndexSymbols?, 298Aaccess control, 225activity log level, 275activity log rotate, 275activity syslog, 299administrator, 276administratorscreating, 225

Pagina 277 - Secure Key Manager 277

clustersand multiple credentials, 233configuring, 193creating, 195joining, 196overview, 191password protection for, 192community, 311configure, 303con

Pagina 278

Internal Backup List section, 101IP addressesDNS server, 205network, 201ip address, 304IP addressesclient, 208IP authorizationallowed client IP addres

Pagina 279 - Secure Key Manager 279

3. With the appliance fully seated in the rack, tighten the thumbscrews just until the bezel is securedto the rack.Attaching the cables1. Connect a st

Pagina 280 - Autologout commands

no ca certificate, 284no ca profile, 284no certificate, 288no cipherspec, 317no clientevent syslog, 301no community, 313no crl list, 291no export ciph

Pagina 281 - Backup and restore commands

show statistics, 319show activity log, 276show activity syslog, 302show administrator, 279show audit log, 280show audit syslog, 302show autologout, 28

Pagina 282 - CA certificate commands

time settings, 198timezone set, 321TLS, 180tools, installation, 27Traceroute Information section, 109traceroute run, 295transfer audit log, 280transfe

Pagina 283 - Secure Key Manager 283

Installing and replacing hardware36

Pagina 284

2 Configuring the systemStarting the SKM applianceNOTE:To prepare to configure the system, have ready all information listed on the pre-install survey

Pagina 285 - Secure Key Manager 285

5. Follow the prompts to enter the necessary information:TIP:Press Enter to accept the default.a. Admin account password. The Security Officer will us

Pagina 286 - Certificate commands

6. Configure the default settings for the key replication interval and retry attempts.NOTE:These commands require firmware version 1.1 or greater.a. L

Pagina 287

Creating and installing the SKM Server Certificate ... 47Propagating third-party certif

Pagina 288

If you are replacing an SKM appliance or adding a member to an existing cluster, skip to Establishinga cluster.The configurations in this step are per

Pagina 289 - CRL commands

6. Add the Local CA to the Trusted CAs list.a. In Certificates & CAs, click Trusted CA Lists to display the Trusted Certificate Authority ListProf

Pagina 290

3. Enter information required by the Create Certificate Request section of the window to create theSKM server certificate.a. Enter a Certificate Name

Pagina 291 - Secure Key Manager 291

10. Enter data required by the Sign Certificate Request section of the window.a. Select the CA name from the Sign with Certificate Authority drop down

Pagina 292 - Client event log commands

3. In the KMS Server Settings section of the window, click Edit. The following warning may display.4. Configure the KMS Server Settings as shown. (Ens

Pagina 293

1. From the SKM management console, click the Device tab.2. In the Device Configuration menu, click Cluster.3. Type the cluster password in the Create

Pagina 294 - Diagnostic commands

2. If you skipped Creating the cluster, retrieve the cluster key text file now. To do so, select theCluster Settings section of the window, click Down

Pagina 295 - FIPS commands

6. Join the appliance to the cluster.a. Select the Device tab.b. In the Device Configuration menu, click on Cluster.c. In the Cluster, click on Join C

Pagina 296

8. Click on the SKM Local CA.9. Click Sign Request.10. Enter information required in the Sign Certificate Request section of the window as shown:a. In

Pagina 297 - Secure Key Manager 297

6. Click Select None.7. Click Continue.8. In the Create Backup screen, type a name, description, and password for the certificate backup.9. Select Dow

Pagina 298 - History commands

Viewing the FIPS status report ... 67KMS server procedures

Pagina 299 - Log commands

Configuring the system50

Pagina 300

3 Performing configuration and operationtasksKey and policy proceduresCreating a keyTo create a key:1. Log in to the Management Console as an administ

Pagina 301 - Secure Key Manager 301

4. Enter a value in the Owner Username field to assign a specific owner or leave this value blankto create a global key. If an owner is listed for the

Pagina 302

4. Click Download Public Key to download the public portion of the RSA key.Deleting a keyTo delete a key:1. Log in to the Management Console as an adm

Pagina 303 - Mode commands

User and group proceduresNOTE:User accounts and groups can be managed locally on the SKM and shared among clustered nodes.This is the preferred method

Pagina 304 - Network commands

2. Navigate to the Local Groups section of the User & Group Configuration page (Security > LocalUsers & Groups).3. Select a Group and click

Pagina 305 - Secure Key Manager 305

LDAP server proceduresSetting up the LDAP user directoryTo set up the LDAP user directory:1. Log in to the Management Console as an administrator with

Pagina 306

2. Navigate to the LDAP Failover Server Properties section of the LDAP Server Configuration page(Security > LDAP > LDAP Server).3. Click Edit.4.

Pagina 307 - Secure Key Manager 307

NOTE:To generate a valid certificate, you must have a certificate authority sign a certificate request. Youcan create local CAs on the SKM, and use th

Pagina 308

7. Navigate to the Local Certificate Authority List section.8. Select a CA and click Sign Request.9. Paste the certificate request into the Certificat

Pagina 309 - Services commands

Enabling signed logs ... 90Verifying a secure l

Pagina 310

6. Copy the certificate request text. The certificate text looks similar, but not identical, to the followingtext.-----BEGIN CERTIFICATE REQUEST-----M

Pagina 311 - SNMP commands

IMPORTANT:A self-signed certificate should be used for testing purposes only. Any attempt to connect with anSKM using a test self-signed certificate s

Pagina 312

6. Click Save.The SKM verifies the validity of the newly installed certificate. If determined to be valid, thecertificate appears as “Certificate Acti

Pagina 313

Certificate Authority (CA) proceduresAdding a CA certificate to the trusted CA listTo add a CA certificate to the trusted CA list:1. Log in to the Man

Pagina 314

Deleting a trusted CA list profileTo delete a trusted certificate authority list profile:1. Log in to the Management Console as an administrator with

Pagina 315 - Secure Key Manager 315

2. Navigate to the Local Certificate Authority List section of the Certificate and CA Configurationpage (Security > Local CAs).3. Select a certific

Pagina 316 - SSL commands

4. Select Intermediate CA Request as the Certificate Authority Type.5. Click Create. The new request appears in the Local Certificate Authority List s

Pagina 317

2. Navigate to the Install CA Certificate section of the Certificate and CA Configuration page(Security > Known CAs).3. Enter a value for the Certi

Pagina 318 - Statistics commands

KMS server proceduresThe KMS server is the firmware component of the SKM server that manages communications betweenthe SKM and the clients. This secti

Pagina 319 - System commands

Enabling password authenticationTo enable password authentication:1. Log in to the Management Console as an administrator with KMS Server access contr

Pagina 320

Accessing the Help system ... 120Using the Key and Polic

Pagina 321

Clustering proceduresCreating a clusterYou create a cluster on one SKM and then join other members to that cluster. To create a cluster:1. Select an S

Pagina 322 - System health commands

4. Click Synchronize With and confirm this action. As part of the synchronization, the KMS Serverwill create an automatic synchronization backup befor

Pagina 323 - System log commands

Upgrading a clusterA cluster can be upgraded by upgrading one device at a time. Once all of the devices are runningthe new software, you can configure

Pagina 324

2. Navigate to the NTP Settings section of the Date & Time Configuration page (Device > Date &Time).3. Click Edit.4. Select Enable NTP.5. E

Pagina 325 - D Troubleshooting

7. Repeat steps 3 through 6 as needed.8. Click Edit on the IP Authorization Settings section.9. For each service select either Allow All Connections t

Pagina 326 - Troubleshooting326

1. Configure the agent at the SNMP Agent Settings section.2. Create an SNMPv3 username at the SNMPv3 Username List section to enable the NMS to access

Pagina 327 - FCC rating label

5. If using SSL, select Use SSL and enter the Trusted Certificate Authority.6. Enter the number of seconds to wait for the LDAP server during connecti

Pagina 328 - Class A equipment

3. Click LDAP Test.Password management proceduresChanging your passwordTo change your administrator account password:1. Log in to the Management Conso

Pagina 329 - Japanese notices

access to the SKM configuration is secured but not in a haphazard manner. It is best to have adocumented procedure in place to handle such a situation

Pagina 330 - Taiwanese notices

1. Log in to the Management Console as an administrator with High Access Administrator accesscontrol. This is the administrator that will grant creden

Pagina 331 - Laser compliance notices

Support for Certificate Revocation Lists ... 167Local CAs ...

Pagina 332 - Italian laser notice

6. Click Sign Request. This will take you to the CA Certificate Information section where the certificateis displayed in PEM format.7. Click the Downl

Pagina 333 - Recycling notices

5. Click Save.NOTE:This feature is immediately enabled when you select Web Admin User Authentication. Youwill be logged out of the Management Console

Pagina 334 - Dutch notice

2. Determine the Key Sharing Group.a. From the filtered list of keys, choose the one with the most recent timestamp (the numbersequence at the end of

Pagina 335 - German notice

3. Export (backup) the key.a. From the Device tab, in the Maintenance menu on the left, select Backup & Restore, thenselect Create Backup to displ

Pagina 336 - Latvian notice

Figure 7 Entering backup informationi. Click Backup.A message displays when the backup is complete. The backup operation should take a fewseconds.4. S

Pagina 337 - Romanian notice

5. Import (restore) the backup file to Cluster #2a. On the SKM, from the Device Tab, in the Maintenance menu on the left, select Backup &Restore,

Pagina 338 - Turkish notice

6. Restart the SKM software.NOTE:Following a restore, the SKM must be restarted.a. From the SKM Device tab, in the Maintenance menu, select Services.b

Pagina 339 - Battery replacement notices

8. Ensure that the key sharing group has been added.a. From the SKM interface, Security tab, Users and LDAP Menu, select Local Users and Groups.b. Ver

Pagina 340 - German battery notice

3. In the Keys field, select No keys.4. Click Continue.5. In the Device Items field, click Select All.6. Click Continue.7. In the Backup Summary secti

Pagina 341 - Japanese battery notice

1. From the SKM interface on the Device tab, in the Maintenance menu, select Backup Restore, thenCreate Backup.2. In the Create Backup pane, in the Se

Pagina 342 - Spanish battery notice

Hostname Setting ... 205DNS Server List ...

Pagina 343 - F Specifications

1. Log in to the Management Console as an administrator with Logging access control.2. Navigate to the Log Configuration page (Device > Log Configu

Pagina 344

3. Double-click on the file. Outlook Express will open and display a help screen with a securityheader that reads: “Digitally signed - signing digital

Pagina 345 - Glossary

Recreating the log signing certificatePrior to creating a new log signing certificate, backup the old certificate so you can verify previouslysigned l

Pagina 346 - Glossary346

Clearing a logTo clear a log:1. Log in to the Management Console as an administrator with Logging access control.2. Navigate to the Log Viewer page (D

Pagina 347

Performing configuration and operation tasks94

Pagina 348

4 Maintaining the SKMBackup and restore overviewClustering SKM nodes is an effective way of exchanging keys and configuration data to allow forfailove

Pagina 349

If one of these objects is being restored on a device where there is already a similar object with thesame name, the key, certificate, or local CA fro

Pagina 350

Figure 14 Viewing the Create Backup: Security Items sectionThe following table describes the components of the Create Backup: Security Items section.T

Pagina 351

DescriptionComponentsClick Continue to configure the next group of items.ContinueCreate Backup: Device ItemsUse this section to select the device item

Pagina 352

Figure 16 Viewing the Create Backup: Backup Settings sectionThe following table describes the components of the Create Backup: Backup Settings section

Commenti su questo manuale

Nessun commento