Brocade Communications Systems Encryption Switch Service Manual Page 46

  • Download
  • Add to my manuals
  • Print
  • Page
    / 326
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 45
28 Fabric OS Encryption Administrator’s Guide (DPM)
53-1002720-02
Encryption node initialization and certificate generation
2
Configuring blade processor links
To configure blade processor links, complete the following steps:
1. Select Configure > Encryption from the menu task bar to display the Encryption Center
dialog box. (Refer to Figure 6 on page 14.)
2. Select the encryption engine from the Encryption Center Devices table, then select Engine >
Blade Processor Link from the menu task bar to display the Blade Processor Link dialog box
(Figure 14).
FIGURE 14 Blade Processor Link dialog box
3. Enter the link IP address and mask, and the gateway IP address.
Eth0 IP /Mask identifies the Ge0 interface IP address and mask.
Eth1 IP /Mask identifies the Ge1 interface IP address and mask.
The Gateway IP address is optional.
4. Click OK.
Encryption node initialization and certificate generation
When an encryption node is initialized, the following security parameters and certificates are
generated:
FIPS crypto officer
FIPS user
Node CP certificate
A signed Key Authentication Center (KAC) certificate
A KAC Certificate Signing Request (CSR)
From the standpoint of external SAN management application operations, the FIPS crypto officer,
FIPS user, and node CP certificates are transparent to users. The KAC certificates are required for
operations with key managers. In most cases, KAC certificate signing requests must be sent to a
Certificate Authority (CA) for signing to provide authentication before the certificate can be used. In
all cases, signed KACs must be present on each switch.
Page view 45
1 2 ... 41 42 43 44 45 46 47 48 49 50 51 ... 325 326

Comments to this Manuals

No comments