Hp Secure Key Manager Bedienungsanleitung Seite 1

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Lager Hp Secure Key Manager herunter. HP Secure Key Manager User Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 327
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - Secure Key Manager

HP StorageWorksSecure Key Managerusers guideAJ087-96011Part number: AJ087–960112nd edition: November 2008

Seite 2

CRLcommands ... 264Clienteventlogcommands ... 267Deviceresetandrestorecommands ...

Seite 3 - Contents

Table 18 Netstat Information section componentsComponent DescriptionRunClick Run to see a list of all active network connections on the SKM.Reading Ne

Seite 4

A SKM appliance information sheetThe information on this sheet is specific to the HP StorageWorks Secure Key Manager (SKM) appliance towhich it is atta

Seite 5

Figure 34 Back of SKM applianceItemDescription1Serial number of the appliance2Product ID number (PID) of the appliance3Pull-out panel that also shows

Seite 6

B Using the Management ConsoleLogging in and outUse the Administrator Authentication screen to log into the Management Console.Figure 35 Viewing the A

Seite 7

Figure 37 Viewing the Security Summary sectionClick the High Security page link to access the High Security page. You can enable FIPS compliancefrom t

Seite 8

Table 21 System Summary section componentsComponent DescriptionProductDisplays your platform.Unit IDDisplays your Unit ID.Software Version Displays th

Seite 9

Figure 40 Viewing the Search Criteria sectionThe following table describes the components of the Search Criteria section.Table 23 Search Criteria sect

Seite 10

Filtering sectionsSome sections of the Management Console normally hold many rows of data. Key and Local Userssections may span multiple pages. Use th

Seite 11

Figure 44 Locating button to launch context-sensitive helpClicking this icon opens the documentation for the specific section in a new window. (Subsequ

Seite 12

The Key and Policy Configuration page enables you to create, import, and manage keys. This pagecontains the following sections:•Keys• Key Properties•Gr

Seite 13

Italiannotice ... 307Latviannotice... 308Lithuaniannotice ...

Seite 14

Figure 47 Viewing the Key sectionThe following table describes the components of the Keys section.110Using the Management Console

Seite 15

Table 27 Keys section componentsComponent DescriptionQuerySelect the query to apply to the pageRun QuerySelect this button to run a query. This Manage

Seite 16

key. Instead it gives a new name to the existing metadata and key bytes. To create a copy of an existingkey,usetheCloneKeysection.Figure 48 Viewing th

Seite 17

key version’s state permits the operation, and the request comes from a member of the permitted group.A key can have a maximum of 4000 versions.Group

Seite 18

For non-global keys, if a user is not the owner and is not a member of a group with permissions to use thekey, the user cannot access the key.The owne

Seite 19

Figure51ViewingtheKeyVersionsandAvailableUsagesectionTable 31 Key Versions and Available Usage section componentsComponent DescriptionVersionDisplays

Seite 20

Create QueryUse this section to create key queries. A key query enables you to view a subset of the keys that exist ontheSKM.Thissection enables you t

Seite 21 - 1 Installing and replacing

Figure 54 Viewing Saved Queries sectionTable 34 Saved Queries section componentsComponent DescriptionQuery NameDisplaysthenameofthequery.DescriptionDi

Seite 22 - Rack planning r

Table 35 Modify Query section componentsComponent DescriptionQuery NameThe name of the query. This field is only required when saving the query. You ca

Seite 23 - Optimum environment

Table 36 Create Key section componentsComponent DescriptionKey NameThis is the name that the server uses to refer to the key. The key name must begin

Seite 24 - Power requirements

Figures1Identifythecontentsoftheshippingcarton... 262Connect the powersuppliestoACpowersources ... 293Viewing the Cer

Seite 25 - Unpacking

Figure 57 Viewing the Clone Key sectionTable 37 Clone Key section componentsComponent DescriptionNew Key NameThis is the name that the server uses to

Seite 26 - Selecting a rack location

Figure 58 Viewing the Import Key sectionThe following table describes the components of the Import Key section.Table 38 Import Key section componentsC

Seite 27 - Removing an exi

Authorization Policy Configuration PageAn authorization policy enables you to limit how a group may use a key. You implement an authorizationpolicy whe

Seite 28 - Attaching the cables

Figure 59 Viewing the Authorization Policies sectionThe following table describes the components of the Authorization Policies section.Table 39 Author

Seite 29

• User1 can make only 100 more requests between 11:31 AM and 11:59 AMNOTE:Had the limit been lowered to 75, User1 would only be allowed to make 25 mor

Seite 30

Active VersionsUse this section to configure the number of active versions allowed for a versioned key. Active versionsof a key can be used for both en

Seite 31 - 2Configuring the system

Figure 63 Viewing the Custom Key Attributes sectionTable 43 Custom Key Attributions section componentsComponents DescriptionAttribute NameEnter a uniq

Seite 32 - Configuring the system

Local UsersUse the Local Users section to add or modify local users. Once a user has been created, you can changethe password butyou cannot change the

Seite 33

NOTE:The User Administration Permission and Change Password Permission apply only tolocalusers. LDAPusers cannot be managed through the SKM; they must

Seite 34 - Setting up the

Figure 66 Viewing the Custom Attributes sectionThe following table describes the components of the Custom Attributes section.Table 46 Custom Attribute

Seite 35

34Back of SKM appliance... 10235ViewingtheAdministratorAuthenticationscreen... 10336Viewing the Logoutwindow

Seite 36

Table 47 Local Groups section componentsComponent DescriptionGroupDisplays the local groups on the SKM.Add Click Add to add a group to the group list.

Seite 37 - Establishing a cluster

LDAP Server ConfigurationLightweight Directory Access Protocol (LDAP) is a protocol that allows you to enable authentication ofyour KMS Serverbased on

Seite 38 - Creating the cluster

Table 50 LDAP User Directory Properties section componentsComponent DescriptionServer IP or HostnameThe IP address or hostname of the primary LDAP ser

Seite 39

Table 51 LDAP Schema Properties section componentsComponent DescriptionUser Base DNThe base distinguished name (DN) from which to begin the search for

Seite 40

Table 52 LDAP Failover Server Properties section componentsComponent DescriptionFailover ServerIPorHostnameTheIPaddressorhostnameoftheLDAPservertousea

Seite 41 - Copying the certificates

Table 53 LDAP Users section componentsComponent DescriptionUsernameDisplays the users that can access the SKM from the LDAP server.LDAP GroupsThe LDAP

Seite 42 - Installing t

Figure 75 Viewing the User List sectionThe following table describes the components of the User List section.Table 55 LDAP Groups section componentsCo

Seite 43 - 3Performingconfiguration and

Figure 76 Viewing the Certificate List sectionThe followingtable describes the components of the Certificate List section.Table 56 Certificate List secti

Seite 44 - Deleting a key

CAUTION:If you are copying the certificate text into an application such as Microsoft Word, it is important toensure that no carriage returns/line feed

Seite 45 - User and group procedures

Table 57 Certificate Information section componentsComponent DescriptionCertificate Name Name of the certificate. This name is only used internally.Key S

Seite 46 - Deleting a user

71ViewingtheLDAPSchemaPropertiessection ... 13272ViewingtheLDAPFailoverServerPropertiessection ... 13373Viewing the LDA

Seite 47 - LDAP server procedures

Figure 78 Viewing the Certificate Installation sectionNOTE:When multiple certificates are nested in one certificate, the certificate is installed as a cer

Seite 48 - Certificate procedures

Figure 79 Viewing the Self Signed Certificate sectionThe following table describes the components of the Self Signed Certificate section.Table 59 Self S

Seite 49 - Secure Key Manager 49

Table 60 Create Certificate Request section componentsComponent DescriptionCertificate NameInternal name of a newly generated CR. This name will be used

Seite 50 - Creating a client certificate

Table 61 Import Certificate section componentsComponent DescriptionSourceSpecify the method for importing the certificate to the SKM. If you are uploadi

Seite 51 - Installing a certificate

Figure 82 Viewing the Trusted Certificate Authority List Profiles sectionThe following table describes the components of the Trusted Certificate Authorit

Seite 52 - Downloading a certificate

Figure 84 Viewing the Trusted Certificate Authority List (Edit Mode)The following table describes the components of the Trusted Certificate Authority Li

Seite 53

Table 65 Local Certificate Authority List section componentsComponent DescriptionCA NameDisplays the internal name of a certificate authority.CA Informa

Seite 54 - Downloading a local CA

Figure 86 Viewing the CA Certifi cate Information sectionThe following table describes the components of the CA Certificate Information section.Table 66

Seite 55 - Creating

Figure 87 Viewing the Sign Certificate Request sectionThe following table describes the components of the Sign Certificate Request section.Table 67 Sign

Seite 56 - Removing a CA certificate

Table 68 Signed Certificates section componentsComponent DescriptionSerial NumberThe Serial Number, which is expressed in Base 16 notation, is assigned

Seite 57 - KMS server procedures

108ViewingtheDateandTimeSettingssection... 181109ViewingtheNTPSettingssection ... 182110ViewingtheNetworkInter

Seite 58 - Enabling the LDAP server

Create Local CAThe Create Local CA section allows you to create a new local CA on the SKM. The fields are similar tothose used to create a certificate o

Seite 59 - Clustering procedures

Table69CreateLocalCertificate Authority section componentsComponent DescriptionCertificate AuthorityNameInternal name of newly generated certificate auth

Seite 60 - Setting up SSL in a cluster

Figure 91 Viewing the CA Certificate List sectionThe following table describes the components of the CA Certificate List section.Table 70 CA Certificate

Seite 61 - Date and time procedures

Figure 92 Viewing the Install CA Certificate sectionThe following table describes the components of the Install CA Certificate section.Table 71 Install

Seite 62 - IP authorization procedures

certificates revoked by local CAs. The format of CRLs exported by the SKM is in PEM-encoded X.509format.Auto-UpdateEach CA promises to update its CRL a

Seite 63 - SNMP procedures

Using advanced security featuresAdvanced security features provide the highest level of secure operation on the SKM. This sectiondiscusses the followi

Seite 64

ClusteringClustering FIPS-compliant devices with non-FIPS-compliant devices will disable FIPS for all devices inthe cluster.BackupsFIPS and non-FIPS d

Seite 65 - Changing your password

Table 72 FIPS Compliance section componentsComponent DescriptionIs FIPS CompliantIndicates if the SKM’s security configuration is consistent with FIPS

Seite 66

Table 73 High Security Settings section componentsComponent DescriptionDisable Creationand Use of GlobalKeysDisables the ability to create and use glo

Seite 67 - Revoking a credential grant

IMPORTANT:Modifyinganyof the items in the Security Settings Configured Elsewhere section immediately takes theSKM out of FIPS compliance.Figure 95 View

Seite 68

14 5ViewingtheActivityLogsection... 23314 6ViewingtheCurrentActivityLogsection ... 234147Viewing the ClientE

Seite 69

1. View the Security Protocols enabled on your Internet Browser. You must enable TLS 1.0 to accessthe Management Console while FIPS-compliant.2. Log i

Seite 70

Table 75 FIPS Status Server testsTestpower-onConditionalDescriptionAES EncryptionXKnown Algorithm Test for the AES algorithm. This testis performed at

Seite 71

Figure 96 Viewing the FIPS Status Report: normalThe following table describes the components of the FIPS Status Server Settings section.162Using the M

Seite 72

Table 76 FIPS Status Report componentsComponent DescriptionProductDisplays the model of your device.Unit IDThe Unit ID is composed of alphanumeric cha

Seite 73

Figure 97 Viewing the FIPS Status Server Settings sectionThe following table describes the components of the FIPS Status Server Settings section.Table

Seite 74

In this scenario, the client application indicates that it is willing to perform an SSL resume (rather thana full handshake) by sending a previously n

Seite 75

Figure 98 Viewing the SSL Options sectionNOTE:Changes to theSSL Options cause the KMS Server to restart, which takes the KMS offline for a fewseconds.T

Seite 76

CAUTION:Exercise caution when modifying the SSL Cipher Order. Unless you are familiar with SSL Ciphers, youshould not rearrange the Cipher Order list.

Seite 77

Configuring the KMS ServerThe HP StorageWorks Secure Key Manager allows you to off-load cryptographic operations fromapplication servers and other back

Seite 78

When the client requests that the server generate a new key, it can specify that the key should beexportable and/or deletable. An exportable key is a

Seite 79

Tables1CreateBackup:SecurityItemssectioncomponents... 872CreateBackup:DeviceItemssectioncomponents ... 883CreateBackup:B

Seite 80 - Log configurati

Table 80 KMS Server Settings section componentsComponent DescriptionIPThis field specifies the IP address(es) on which the KMS Server is enabled on the

Seite 81

Figure 101 Viewing the KMS Server Authentication Settings sectionThe following table describes the elements of the KMS Server Authentication Settings

Seite 82 - Log view procedures

Table 81 KMS Server Authentication Settings section componentsComponent DescriptionUser DirectoryThis field determines whether the KMS Server uses a lo

Seite 83 - 5. Click Clear

User Account Lockout SettingsUse the User Account Lockout Settings section to manage an account lockout policy.Figure 102 Viewing the User Account Loc

Seite 84

Health CheckUse the Health Check section to enable the health check feature, and set the port and IP address.Figure 103 Viewing the Health Check secti

Seite 85 - 4MaintainingtheSKM

the failure in the System Log and sends an SNMP trap indicating that the cluster is out of sync. Once adevice is out of sync, an administrator must sy

Seite 86 - Backup and resto

During synchronization, an SKM will inherit a new list of local CAs from the cluster. The device’s oldlist of local CAs will be deleted. Should you ne

Seite 87 - Create Backup: Device Items

Table 84 Cluster Members section componentsComponent DescriptionServer IPThe IP of the member device.Server PortTheportonwhichthedevicelistensforclust

Seite 88 - Components Description

Table 85 Cluster Settings section componentsComponent DescriptionLocal IPThe IP of the current device. If the device has multiple network interfaces,

Seite 89 - Restore Backup

Table 86 Create Cluster section componentsComponent DescriptionLocal IPThe IP of the current device. If the device has multiple network interfaces, th

Seite 90 - Backup Restore Information

34SavedQueriessectioncomponents ... 11735ModifyQuerysectioncomponents ... 11836 CreateKeysectioncomponents..

Seite 91 - Internal Backup List

Table87JoinClustersectioncomponentsComponent DescriptionLocal IPThe IP of the current device. If the device has multiple network interfaces, thepull-d

Seite 92 - Services Configuration page

NOTE:Synchronizing the time causes the KMS Server to restart if the time change is greater than oneminute. While restarting, the KMS Server is unavail

Seite 93 - Restart/Halt

NOTE:Any change to the Date and Time Settings section causes the KMS Server to restart, which takes theKMS offline for a few seconds.NTP SettingsUse th

Seite 94 - System Informa

•PortSpeedSections• IP Authorization ProceduresNetwork Interfaces sectionsThe Network Configuration page contains the following network interface-relat

Seite 95 - Software Upgrade/Install

Figure 111 Viewing the Default Gateway List sectionThe following table describes the components of the Default Gateway List section.Table 91 Default G

Seite 96 - System Health page

All responses to incoming packets leave from 10.20.41.1 - except the responses to incoming packets fromthe 172.17.7.0 addresses (the local subnet of E

Seite 97 - Power Supp

Figure 112 Viewing the Static Route List sectionThe followingtable describes the components of the Static Route List section.Table 92 Static Route Lis

Seite 98 - Network Diagnostics page

Table 93 Hostname Setting section componentsComponent DescriptionHostnameThe hostname is the name used to identify the SKM on the network. It is origi

Seite 99 - Netstat Information

CAUTION:The Port Speed/Duplex setting is an advanced feature that should only be used when you are certainof the port speed and duplex settings of the

Seite 100 - Reading Netsta

Figure 116 Viewing the IP Authorization Settings sectionThe following table describes the components of the IP Authorization Settings section.Table 96

Seite 101

72FIPSCompliancesectioncomponents ... 15773HighSecuritySettingssectioncomponents ... 15874Security Settings Confi

Seite 102

Table 97 Allowed Client IP Addresses section componentsComponents DescriptionIP Address, Rangeor SubnetEnter IP addresses in the following formats:• s

Seite 103 - Using the Home tab

SNMPv1/v2 rely on the concept of a community to provide a low level of security for communicationsbetween the NMS and agent. In an HP SNMPv1/v2 deploy

Seite 104 - System Summary

Community: A community, also referred to as a community string, is used by the agent when it iscommunicating with an NMS running SNMPv1/v2. A communit

Seite 105 - Search sc

Table 98 SNMP Agent Settings section componentsComponent DescriptionSNMP Agent IPThis field specifies the IP address on which SNMP is enabled. You can s

Seite 106

Table 99 SNMPv1/SNMPv2 Community List section componentsComponent DescriptionCommunity NameCommunity names can contain only alphanumeric characters an

Seite 107 - Accessing the Help system

Table 100 SNMPv3 Username List section componentsComponent DescriptionUsernameTheusernamedefines from whom the SKM accepts SNMP messages, and it is one

Seite 108 - Using the Management Console

Table 101 SNMP Management Station List section componentsComponent DescriptionManager TypeThe SNMP version used on the NMS. All three versions of SNMP

Seite 109

Table 102 SNMP Management Station Properties section componentsComponent DescriptionManager TypeTheSNMPversionusedontheNMS.AllthreeversionsofSNMParesu

Seite 110

Figure123ViewingtheCreateSNMPManagementStationsectionThe following table describes the components of the Create SNMP Management Station section.198Usi

Seite 111 - Key Properties

Table 103 Create SNMP Management Station section componentsComponent DescriptionManager TypeTheSNMPversionusedontheNMS.AllthreeversionsofSNMParesuppor

Seite 112 - Versioned keys

Legal and notice information© Copyright 2007-2008 Hewlett-Packard Development Company, I.E.© Copyright 2000, 2008 Ingrian Networks, Inc.Confidential co

Seite 113 - Group Permissions

110GrantaCredentialsectioncomponents ... 215111RemoteAdministrationSettingssectioncomponents ... 217112LDAPAdministra

Seite 114 - Custom Attributes

• KMS Server Statistics. KMS Server statistics are available through the MIBs; for each statisticset, you can view the following: current requests per

Seite 115 - RSA Public Key

• Multiple Credentials Overview• Multiple Credentials Sections• Multiple Credentials Procedures• Remote Administration Settings Overview• Remote Admin

Seite 116 - Create Query

Using multiple administrator accountsMost likely, youwill want to create multiple administrators. When doing so, you should assign accesscontrols that

Seite 117 - Modify Query

WARNING!It is absolutely crucial that you remember the passwords for all of your local administrators. For securityreasons, there is no way to reset a

Seite 118 - Create Key

If you use LDAP administrators predominantly, at least one local administrator account must always exist,and that local administrator must be a High A

Seite 119 - Clone Key

Create LDAP AdministratorThe Create Local Administrator and Create LDAP Administrator sections are the same except that theCreate LDAP Administrator s

Seite 120 - Import Key

Table 104 Create LDAP Administrator section componentsComponent DescriptionUsernameEnter the loginname the administrator uses to access the SKM.Browse

Seite 121

Select LDAP UsernameThe Select LDAP Username section enables you to browse and select an LDAP user when creating anLDAP administrator account.Figure 1

Seite 122 - Authorization P

Password expirationThe password expiration feature allows you to specify a duration for administrator passwords. By default,this feature is disabled.

Seite 123

Document the password policy and communicate it to all appropriate parties including security officersand other corporate personnel.Password Management

Seite 124 - Authorized Usage Periods

1 Installing and replacinghardwareThis section details the steps to install or replace the SKM hardware:• Preparing for the installation• Rack plannin

Seite 125 - Custom Key Attributes

NOTE:These settings do not apply to LDAP administrator passwords. LDAP administrator passwords are notsubject to any of the constraints that apply to

Seite 126

NOTE:Changes made to this section (with the exception of the Password Expiration feature) apply to passwordscreated after the changes are saved. For e

Seite 127 - Local Users

NOTE:Credential grants cannot be inherited. One administrator can grant only their credentials to one otheradministrator.An administrator can grant cr

Seite 128 - Selected Local User

4. Enable the multiple credentials feature for the cluster by enabling the feature for one device withinthe cluster.System backupThe following informa

Seite 129 - Local Groups

Table 108 Multiple Credentials for Key Administration section componentsComponent DescriptionRequire MultipleCredentialsSelect this checkbox to enable

Seite 130 - User List

Figure 130 Viewing the Grant a Credential sectionThe following table describes the components of the Grant a Credential section.Table 110 Grant a Cred

Seite 131 - LDAP Server Confi

Remote Administration SettingsThe Remote Administration Settings section is shown here.Figure 131 Viewing the Remote Administration Settings sectionTh

Seite 132 - LDAP Sche

Table 111 Remote Administration Settings section componentsComponents DescriptionWeb AdminServer IPTheWebAdminServerIPaddressisthelocalIPaddressusedto

Seite 133

LDAP Administrator ServerYou configure LDAP servers for administrators separately from LDAP servers for users. This allows forgreater flexibility, and s

Seite 134 - LDAP Users

Figure 132 Viewing LDAP Administrator Server Properties sectionTable 112 LDAP Administrator Server Properties section componentsComponent DescriptionH

Seite 135 - LDAP Groups

• Use a portable field service kit with a folding static-dissipating work mat.If you do not have any of the suggested equipment for proper grounding, h

Seite 136 - Certificate List

Figure 133 Viewing LDAP Schema Properties sectionTable 113 LDAP Schema Properties section componentsComponent DescriptionUser Base DNThe base distingu

Seite 137

Figure 134 Viewing the LDAP Failover Server Properties sectionTable 114 LDAP Failover Server Properties section componentsComponent DescriptionFailove

Seite 138

Your rotation schedule can be set to automatically rotate logs on a daily, weekly, or monthly basis, atany time of day. The system maintains these set

Seite 139 - Certificate Installation

For example, the filename audit.log.1.2002-04-04_160146.demo would identify this file as:• An Audit Log.• The first log file in the log index.• A file crea

Seite 140 - Self Signed Certificate

Secure logsThe SKM allows you to sign your log files before moving them to another machine or downloading them,which makes yourlogfiles more secure than

Seite 141 - Create Certificate Request

Table 116 Rotation Schedule section componentsComponent DescriptionLog NameOne of the predefined log names supported by the SKM. Log types are: System,

Seite 142

Table117LogRotationPropertiessectioncomponentsComponent DescriptionLog NameOne of the predefined log names supported by the SKM. Log types are: System,

Seite 143

Figure 137 Viewing the Syslog Settings sectionNOTE:Changes to the Syslog Settings section cause the KMS Server to restart, which takes the KMS offline

Seite 144 - The Default Profile

Table 119 Log Signing section componentsComponent DescriptionLog NameDisplays the logs available on the device.Sign LogSelect this option to enable Se

Seite 145

Table 120 Log Signing Certificate Information section componentsComponent DescriptionDownload LogSigning CertClick Download Log Signing Cert to downloa

Seite 146 - Properties

WARNING!To reduce the risk of personal injury or equipment damage when unloading a rack:• At least two people are needed to safely unload a rack from

Seite 147 - Sign Certificate Request

• Successful or failed cluster replication and synchronization.• Failed log transfers.• License errors.Figure 141 Viewing the System Log sectionThe fo

Seite 148 - Signed Certificates

• Date and time change was made.• Username: the username that made the configuration change.• Event: a text description of the configuration change.Figu

Seite 149 - Signed Certificate Information

data from the client or an error has occurred. When there is no data for a particular field, a dash isinserted. The format of the Activity Log is as fo

Seite 150 - Create Local CA

Table 127 Values for the Detail Field in the Activity LogRequest TypeDetail Informationauthentication username provided by the clientkey generationalg

Seite 151 - CA Certificate List

Figure 146 Viewing the Current Activity Log sectionThe following table describes the components of the Current Activity Log section.Table 129 Current

Seite 152 - ACertificate

Figure 147 Viewing the Client Event Log sectionThe following table describes the components of the Client Event Log section.Table 131 Client Event Log

Seite 153 - Local CAs

•Throughput•LicenseUsage• Refresh Statistics (Server)•KMSStatisticsRefresh StatisticsThe Refresh Statistics section controls how frequently the System

Seite 154 - Related CLI Commands

Table 134 System Statistics section componentsComponent DescriptionCPU Utilization (%)This number represents the percentage of CPU time that was in us

Seite 155 - Advanced Security overview

Figure 152 Viewing the Throughput sectionThe following table describes the components of the Throughput section.Table 136 Throughput section component

Seite 156 - FIPS Compliance

Figure 154 Viewing the Refresh Statistics sectionThe following table describes the components of the Refresh Statistics section.Table 138 Refresh Stat

Seite 157 - High Security Settings

The maximum recommended ambient operating temperature (TMRA) for the SKM system is 35° C (95° F).The temperature in the room where the rack is located

Seite 158

Figure 155 Viewing the KMS Statistics sectionThe following table describes the components of the KMS Statistics section.Table 139 KMS Statistics secti

Seite 159 - High Security Procedures

C Using the Command LineInterfaceShell commandsThe CLI supports a few shell commands that allow you to perform various search, cut, and pasteoperation

Seite 160 - FIPS Status Server overview

new cert “new cert request”is treated as three separate arguments:• new• cert• new cert requestEscaping characters using backslashYou can include a qu

Seite 161 - FIPS Status Report

If multiple commands match the pattern, those commands are displayed on the screen. For example, ifyou type sh au lo on the command line, the SKM exec

Seite 162

hostname (config)#Scripting modeThis section describes how to perform the following actions in scripting mode:•CreatingScripts•ExecutingScripts• Displ

Seite 163 - FIPS Status Server page

Onceloaded,ascriptcaneitherbesteppedthrough(executedonelineatatime),ortheentirescriptcanbe run. To step through a script, use the command “step”, as s

Seite 164 - SSL overview

passwdpassword settingsshow administratorshow credential settingsshow granted credentialshow password settingsAudit Log Commandsshow audit logtransfer

Seite 165 - SSL Sections

cert importcert requestcert selfsign installno certificateno requestshow certcli-show-requestCRL Commandscrl auto-updatecrl list sendcrl list updatecrl

Seite 166 - SSL Cipher Order

show security settingsshow fips servershow fips statusHealth Check Configuration Commandshealth checkshow health checkHelp Commands?helpHistory Commandsh

Seite 167

gatewayip addressip authorizationip authorization allowedip name-serverno gatewayno ip addressno ip authorization allowedno ip name-serverno static ro

Seite 168 - MS Server

UnpackingPlace the shipping carton as close to the installation site as possible. Before unpacking the SKM, inspectthe shipping carton for damage that

Seite 169 - KMS Server Settings

SNMP Commandscommunityedit communityedit snmp usernameedit stationno communityno snmp usernameno stationshow communityshow snmp agentshow snmp usernam

Seite 170

show clockshow hostnameshow ntpshow ras settingstimezone setSystem Health Commandsshow system healthSystem Information Commandsshow deviceshow softwar

Seite 171 - The followin

Activity log commandsactivity log level –SettheActivityLogLevel.Syntaxhostname (config)# activity log levelLog Level:1: Normal2: LowEnter a number (1

Seite 172

Relatedcommand(s)• edit administrator• show administrator•noadministratorcredential settings – establish the multiple credential settings.Syntaxhostna

Seite 173 - Health Check sections

Relatedcommand(s)• show granted credential• no granted credential•credentialsettings• show credential settingsldap test failover – connect to the fail

Seite 174 - Configuring the cluster

Relatedcommand(s)•administrator• edit administrator•noadministratorshow credential settings – display the multiple credential settings.Syntaxhostname#

Seite 175 - The Cluster Key

Audit log commandsshow audit log – display all the audit logs’ names.Syntaxhostname# show audit log [name] [number of lines]Specify a log name and/or

Seite 176 - Cluster Configuration page

Backup and restore commandsbackup – create a system backup.Syntaxhostname (config)# backupAfter executing the backup command, the system prompts you t

Seite 177 - Cluster Settings

Relatedcommand(s)•nocacertificate•showcacertificateca profile –create an empty Trusted CA List profile.Syntaxhostname# ca profile <profile name>The

Seite 178 - Create Cluster

Relatedcommand(s)• cert request•cli-show-request•norequest•nocertificate•certimport•showcert•certselfsigninstallcert renew – renew a certificate that ha

Seite 179 - Join Cluster

Figure 1 Identify the contents of the shipping cartonItemDescription1Appliance2Power cords (2 — 1 black, 1 gray)3Null modem cable41U rack mounting har

Seite 180 - ConfiguringtheDate&Time

Relatedcommand(s)•caprofile•caprofile duplicate•caprofile entry•caprofile rename•showcaprofile•showcaprofile•nocaprofile entryno ca profileentry – delete a C

Seite 181 - Date and Time Settings

Syntaxhostname# show local ca [ca name]Relatedcommand(s)•halt•nolocalcashow signed certificate – display information about certificates signed by local

Seite 182 - Configuring the network

Certificate commandscert import –importacertificate.SyntaxThe certificateimport process varies between SKMs.hostname# certimportPlease pick theupload opt

Seite 183 - Routing sections

Syntaxhostname (config)# cert request <cert name>After executing the cert request command, the system prompts you to provide the followinginform

Seite 184

Relatedcommand(s)•certrequest•cli-show-request•norequest•certinstall•certimport•showcert• cert selfsign installno request –deleteacertificate request.S

Seite 185 - Static Route List

Syntaxhostname (config)# crl list send <ca name>Transport Method:1) FTP 2) SCPEnter a number(1-2):Host:Filename:Username:Password:Relatedcommand

Seite 186 - Hostname & DNS sections

Relatedcommand(s)Noneno crl list –renew all revoked certificates signed by a local CA or delete the CRL published by aknown CA.Syntaxhostname (config)#

Seite 187 - Port Speed sections

Client event logcommandsclientevent log rotate –rotatetheclienteventlog.Syntaxhostname (config)# clientevent log rotate <log name>Relatedcommand

Seite 188 - IP Authorization sections

Device reset and restore commandsreset factory settings – delete all information stored in the SKM and reset it to its original factorysetting.CAUTION

Seite 189 - Allowed Client IP Addresses

Diagnostic commandshost run – look up the host specified using the domain server.Syntaxhostname (config)# host run <hostname>Relatedcommand(s)•tr

Seite 190 - Configuring SNMP

Removing an existing SKM (appliance) from the systemSkip this step if you are installing a new appliance.1. Zeroize the original appliance. To do so,

Seite 191 - Authentication

Syntaxhostname# fips serverEnable FIPS Status Server [y]:Available IP addresses:1. All2. 172.17.3.21Local IP (1-2)[1]:Local Port [9081]:NOTE:You can vi

Seite 192 - The SNMP C

Syntaxhostname# show security settingsKey SecurityDisable Creation and Use of Global Keys: YesDisable Non-FIPS Algorithms and Key Sizes: YesDisable RS

Seite 193 - 2CommunityList

Health check configuration commandshealth check – enable and configure the Health Check feature.Syntaxhostname (config)# health checkEnable Health Check

Seite 194 - SNMPv3 Username List

Log commandsactivity syslog –enabletheSKMtousethesyslogprotocoltosendActivityLogmessagestoanexternal machine.Syntaxhostname (config)# activity syslogE

Seite 195 - SNMP Management Station List

Syntaxhostname (config)# clientevent syslogEnable Syslog [n]:Syslog Server #1 IP [None]:Syslog Server #1 Port [514]:Syslog Server #2 IP [None]:Syslog

Seite 196

Relatedcommand(s)•activitysyslog•showactivitysyslogThe no audit syslog command also clears all values in the Activity Log settings.no audit syslog – d

Seite 197

Relatedcommand(s)• edit log rotationshow log signing – check the status of the Secure Log feature on the SKM for a specificlog.Syntaxhostname# show log

Seite 198

Mode commandsconfigure –enterconfiguration mode.Syntaxhostname# configureRelatedcommand(s)•configure terminal•exit•scriptconfigure terminal –enterconfigu

Seite 199 - Enterprise MIB overview

Relatedcommand(s)•ipauthorization• ip authorization allowed• no ip authorization allowed• show ip authorization• show ip authorization allowedethernet

Seite 200

Syntaxhostname (config)# ip authorizationKMS Server:Please select from the following options:1) Allow All Connections 2) Only Allow IPs SpecifiedKMS S

Seite 201 - Administrato

117765. Repeat these steps with the other side rail.Attaching rails to the appliance1. Align one ofthe rails with the left side of the appliance (as y

Seite 202 - Administrator passwords

SyntaxNOTE:The no ip authorization allowed command requires that you provide the indexnumber of the IP address you want to edit, rather than the actua

Seite 203 - LDAP administrators

Syntaxhostname# show ip authorizationKMS Server: Only Allow IPs SpecifiedWeb Administration: Only Allow IPs SpecifiedSSH Administration: Only Allow IP

Seite 204 - Administrator procedures

Services commandshalt –halttheSKM.Syntaxhostname (config)# haltRelatedcommand(s)• rebootkms-server run –activatetheKMSServer.Syntaxhostname (config)#

Seite 205 - Create LDAP Adm

Syntaxhostname (config)# no webadmin startupRelatedcommand(s)•webadminstartupreboot – reboot the SKM.Syntaxhostname (config)# rebootRelatedcommand(s)•

Seite 206 - Component Description

Relatedcommand(s)•nowebadminrunwebadmin startup – enable web administration when starting up the SKM.Syntaxhostname (config)# webadmin startupRelatedc

Seite 207 - Password Management overview

SyntaxNOTE:When you execute the edit snmp username command, the system prompts you toprovidethenewSNMPv3usernameinformation.hostname (config)# edit sn

Seite 208

SyntaxNOTE:When you execute the edit station command, the system prompts you to providethe new SNMP management station information. In the example sho

Seite 209 - Password Manag

Relatedcommand(s)•showsnmpusername•editsnmpusername•snmpusernameno station – remove an SNMP management station.Syntaxhostname (config)# no station <

Seite 210

SyntaxNOTE:When you execute the snmp username command, the system prompts you to providethe values for the new SNMPv3 username.hostname (config)# snmp

Seite 211 - Multiple Credentials overview

Syntaxhostname (config)# cipherspec priorityCURRENT PRIORITIESThe SSL cipher order is shown below:Priority Key Exchange Cipher KeysizeHash1 RSA AES128

Seite 212

2. Connect the appliance power supplies’ AC power connectors to two separate AC power sourcesusing the power cables provided (see Figure 2).Figure 2 C

Seite 213 - Multiple Credentials sections

Relatedcommand(s)• show cpiherspec•cipherspecpriority•cipherspec•nocipherspec•restorecipherspecno ssl protocol –removethespecified protocol.Syntaxhostn

Seite 214 - Grant a Credential

Statistics commandsshow license – show the number of licenses currently in use.Syntaxhostname# showlicenseLicenses: 5Relatedcommand(s)•showlicenseusag

Seite 215

Syntaxhostname (config)# edit ras settingsAvailable IP addresses:1. All2. 192.168.200.195Web Admin Server IP [192.168.200.195] (1-2): 2Web Admin Serve

Seite 216 - Remote Administ

Relatedcommand(s)Nonereissue webadmin certificate – re–issue the web administration certificate.NOTE:This action is performed when initializing the SKM

Seite 217

Table 141 clock set syntax detailsParameterDescriptionmm/dd/yyhh:mm:ssmm:month:entervalueintherange1–12dd: day: enter value in the range 1 –31yy: year

Seite 218 - LDAP Administra

System information commandsshow device – view the model number and Unit ID of the SKM.Syntaxhostname# show deviceRelatedcommand(s)•showsoftwareshow so

Seite 219 - LDAP Schema Properties

System log commandsno system log – clear the context of a system log file.Syntaxhostname (config)# no system log <log name>Relatedcommand(s)• sys

Seite 220

D TroubleshootingThis appendix addresses some of the typical problems you might face as the administrator of the SKM.Table 142 Common problemsProblem

Seite 222

E Regulatory compliance noticesThis section contains regulatory notices for the HP StorageWorks Secure Key Manager (SKM) appliance.Regulatory complian

Seite 223

Contents1Installingandreplacinghardware... 21Preparingfortheinstallation... 21Toolsforinstallation ...

Seite 224 - Log Configu

30Installing and replacing hardware

Seite 225 - Log Rotation Properties

energy and, if not installed and used in accordance with the instructions, may cause harmful interferenceto radio communications. However, there is no

Seite 226 - Syslog Se

Compliance with these directives implies conformity to the following European Norms (in parentheses arethe equivalent international standards and regu

Seite 227 - Log Signing

Taiwanese noticesBSMI Class A noticeTaiwan battery recycle statementRecovery mark:• Four-in-one recyclingsymbolRecovery text:• “Please recycle wasteba

Seite 228

Dutch laser noticeWAARSCHUWING: French laser noticeAVERTISSEMENT : cet appareil peut être équipé d'un laser classé en tant que Produit laser de

Seite 229 - Log Viewer page

Italian laser noticeAVVERTENZA: AVVERTENZA Questo dispositivo può contenere un laser classificato come prodotto laser di Classe 1 in conformità alle

Seite 230 - Audit Log

Recycling noticesDisposal of waste equipment by users in private household in the EuropeanUnionThis symbol on the product or on its packaging indicate

Seite 231 - Activity Log

Estonian noticeFinnish noticeLaitteiden hävittäminen kotitalouksissa Euroopan unionin alueellaJos tuotteessa tai sen pakkauksessa on tämä merkki, tuot

Seite 232

Greek noticeHungarian noticeItaliannoticeSmaltimento delle apparecchiature da parte di privati nel territorio dell'Unione EuropeaQuesto simbolo p

Seite 233

Latvian noticeLithuanian noticePolish notice308Regulatory compliance notices

Seite 234 - Client Event Log

Portuguese noticeDescarte de Lixo Elétrico na Comunidade Européia Este símbolo encontrado no produto ou na embalagem indica que o produto não deve se

Seite 235 - Statistics page

2Configuring the systemStarting the SKM applianceNOTE:To prepare to configure the system, have ready all information listed on the pre-install survey. T

Seite 236 - System Statistics

Spanish noticeEliminación de residuos de equipos eléctricos y electrónicos por parte de usuarios particulares en la Unión EuropeaEste símbolo en el pr

Seite 237 - Throughput

Battery replacement noticesDutch battery noticeWAARSCHUWING: dit apparaat bevat mogelijk een batterij. - Probeer de batterijen na het verwijderen nie

Seite 238 - Refresh Statistics (server)

German battery noticeVORSICHT: Dieses Produkt enthält unter Umständen eine Batterie oder einen Akku.- Versuchen Sie nicht, Batterien und Akkus außerh

Seite 239 - KMS Statistics

Japanese batterynoticeSpanish battery noticeADVERTENCIA: Este dispositivo podría contener una batería.- No intente recargar las baterías si las extra

Seite 240

314Regulatory compliance notices

Seite 241 - Interface

FSpecificationsThis section provides the VLS node and specifications.SKM appliance specificationsItemSpecificationHeight4.3 cm (1.70 in)Depth70.5 cm (27.8

Seite 242 - Command shortcuts

EnvironmentalspecificationsOperating Non-operatingShippingTemperature110°C to 35°C(50°F to 95°F)-40°C to 66°C(-40°F to 150°F)-40°C to 66°C(-40°F to 150

Seite 243 - Command modes

G About this guideThis guide provides information about:• Installing an HP StorageWorks Secure Key Manager• Configuring an HP StorageWorks Secure Key M

Seite 244 - Scripting mode

WARNING!Indicates that failure to follow directions could result in bodily harm or death.CAUTION:Indicates that failure to follow directions could res

Seite 245 - CLI commands

Customer self repairHP customer self repair (CSR) programs allow you to repair your StorageWorks product. If a CSR partneeds replacing, HP ships the p

Seite 246

c. Dated. Time. The time is based on a 24–hour clock. There is no a.m. or p.m. designation. Forexample, 1:20 p.m. is 13:20:00.e. IP address of the SKM

Seite 247

320About this guide

Seite 248

GlossaryActive Device In the VRRP group, this is the device that is receiving all network traffic. Thisis typically the primary device; however, in cas

Seite 249

fulfill client traffic, the secondary device stands down and the primary deviceagain becomes the active device.Primary device A designated device that,

Seite 250

IndexSymbols?, 272Aaccess control,205activity log level,252activity log rotate,252activity syslog,273administrator,252administratorscreating,205definin

Seite 251

Create LDAP Administrator section,205Create Local Certificate Authority section,150Create SNMP Management Station section,197credentialsgranting,214vie

Seite 252 - Activity log com

keysaccess to and ownership of,168administration via multiple credentials,213authorization policies and usage periods,122 , 124creating,118deletable,1

Seite 253

Ppasswd,254password settings,254passwordsadministrator,202cluster,175patch releases,96permissions, user,127Ping Information section,98ping run,269port

Seite 254

show station,287show statistics,291show system log,296show system syslog,276Sign Certificate Request page,54sign request,261Signed Certificates section,

Seite 255

6. Configure the default settings for the key replication interval and retry attempts.NOTE:These commands require firmware version 1.1 or greater.a. Log

Seite 256 - Autologout commands

Where• <appliance hostname> is the hostname or IP address you provided in Starting the SKMappliance,step4.• <appliance port number> is 944

Seite 257 - CA certificate commands

6. Add the Local CA to the Trusted CAs list.a. In Certificates & CAs,clickTrusted CA Lists to display the Trusted Certificate Authority List Profiles

Seite 258

4. Click Create Certificate Request.5. Click on the newly created certificate from Certificate List, for example SKM Server.6. Copy the certificate data,

Seite 259

11 . Click Sign Request.12. Copy the signed certificate data, from -----BEGIN to END…----- lines. Be careful to excludeextra carriage returns or spaces

Seite 260

• In Creating the cluster, the cluster is created on one SKM appliance.Skip this section if you already have an SKM cluster.• In Copying the Local CA

Seite 261

5. Copy the certifi cate data from the CA Certificate Information,from-----BEGIN CERTIFICATEREQUEST----- to -----END CERTIFICATE REQUEST--–––. Be carefu

Seite 262 - Certificate com

Creatingauser... 45Creatingagroup ... 46Addingausertoagroup...

Seite 263

5. Add the first member’s CA to the Trusted CAs list.a. In the Certificates & CA menu, click Trusted CA Lists.b. Click on the Default Profile Name.c.

Seite 264 - CRL commands

4. Click Create Certificate Request.5. Click on the newly created certificate SKM Server from Certificate List.6. Copy the certificate data, from lines --

Seite 265

3. Click Select None.4. Select Certificates then Choose from list and select SKM Server.5. Click Continue.6. Click Select None.7. Click Continue.8. In

Seite 266

3Performingconfiguration andoperation tasksKey and policy proceduresCreating a keyTo create a key:1. Log in to the Management Console as an administrat

Seite 267 - Client event lo

7. To make the key exportable on from non-FIPS SKM, select Exportable.Anexportablekeycanbe exported by its owner and by members of a group with “Expor

Seite 268 - Device reset an

Authorization policy proceduresCreating an authorization policyTo create an authorization policy:1. Log in to the Management Console as an administrat

Seite 269 - FIPS commands

6. To give this user the ability to change his or her own password via the XML interface, select ChangePassword Permission. Users with User Administra

Seite 270

3. Select the Username and click Delete.Deleting a groupTo delete a group:1. Log in to the Management Console as an administrator with Users, Groups,

Seite 271

Setting up an LDAP failover serverTo set up an LDAP failover server:1. Log in to the Management Console as an administrator with Users, Groups, and LD

Seite 272 - History commands

NOTE:To generate a valid certificate, you must have a certificate authority sign a certificate request. You cancreate local CAs on the SKM, and use those

Seite 273 - Log commands

ConfiguringSNMPv3ontheSKM ... 63Administratorprocedures... 64Creatinganadministrator...

Seite 274

10. Copy the certificate text.11 . Navigate back to the Certificate List section.12. Select the certificate request and click Properties to access the Ce

Seite 275

9. Paste the certificate request into the Certificate Request field. Select Client as the Certificate Purpose,specify a Certificate Duration and click Sign

Seite 276

To install a certificate:1. Log in to the Management Console as an administrator with Certificates access control.2. Navigate to the Certificate List sec

Seite 277 - Network commands

2. Navigate to the Certificate List section of the Certificate and CA Configuration page (Security>Certificates).3. Select the Certificate Name and clic

Seite 278

Deleting a trusted CA list profileTo delete a trusted certificate authority list profile:1. Log in to the Management Console as an administrator with Cer

Seite 279

Deleting a local CATo delete a local CA:1. Log in to the Management Console as an administrator with Certificate Authorities access control.2. Navigate

Seite 280

8. Copy the CA certificate request text.The certificate text looks similar, but not identical, to the following text.-----BEGIN CERTIFICATE REQUEST-----

Seite 281

FIPS status server proceduresEnabling the FIPS status serverTo enable the FIPS Status Server:1. Log in to the Management Console as an administrator w

Seite 282 - Services comma

Enabling key and policy configuration by client applicationsEnabling key and policy configuration by client applications permits the following actions:•

Seite 283

6. Use the Username Field in Client Certificate field to specify which field in the client certificate mustcontain a valid username. This setting is optio

Seite 284 - SNMP commands

Rollingbacksoftware ... 96SystemHealthpage ... 96Refreshpage ...

Seite 285

5. Click Join Cluster.NOTE:After joining the cluster, you will be prompted to synchronize with an existing clustermember. We recommend that you synchr

Seite 286

Removing a device from a clusterTo remove a device from a cluster:1. Log in the ManagementConsoleofthedevicethatwillberemovedfromtheclusterasanadminis

Seite 287

Configuring an NTP server connectionTo configure an NTP server connection:1. Log in to the Management Console as an administrator with Network and Date/

Seite 288 - SSL commands

9. For each service select either Allow All Connections to grant access to all clients or Only Allow IPsSpecified Below to grant access to only the cli

Seite 289

Administrator proceduresCreating an administratorTo create an administrator account:1. Log in the Management Console as an administrator with Administ

Seite 290

3. Click LDAP Test.Setting up the LDAP schemaTo set up the LDAPSchema:1. Log in to the SKM appliance as a Local administrator with High Access Adminis

Seite 291 - System commands

2. Navigate to the Password Settings for Local Administrators section of the Administrator Configurationpage (Device Configuration > Administrators &

Seite 292

2. Navigate to the Multiple Credentials for Key Administration section on the AdministratorConfiguration page (Device > Administrators > Multiple

Seite 293

1. Open the certificate request in a text editor.2. Copy the text of the certificaterequest. Thecopiedtextmustincludetheheader(-----BEGINCERTIFICATE REQ

Seite 294

2. Navigate to the Remote Administration Settings section (Device > Administrators > RemoveAdministration).3. Click Edit.4. Select Web Admin Use

Seite 295 - System informa

LDAPGroups... 135UserList ... 135Certificate and CA ConfigurationPage...

Seite 296 - System log comm

2. Determine the Key Sharing Group.a. From the filtered list of keys, choose the one with the most recent timestamp (the numbersequence at the end of t

Seite 297 - D Troubleshooting

NOTE:Steps c. through f. above ensure the backup filecontainsonlythesinglekey.g. In the Backup Summary section of the panel, verify that no settings, c

Seite 298 - Troubleshooting

4. Send the tape and the Destination (backup) file to the Cluster #2 admin. Also transmit the Groupname and the backup password.NOTE:For security reaso

Seite 299 - Regulatory co

5. Import (restore) the backup file to Cluster #2a. On the SKM, from the Device Tab, in the Maintenance menu on the left, select Backup & Restore,t

Seite 300 - European Union notice

6. Restart the SKM software.NOTE:Following a restore, the SKM must be restarted.a. From the SKM Device tab, in the Maintenance menu, select Services.b

Seite 301 - Korean notices

7. Force replication of the key across Cluster #2.a. From the SKM Security tab, in the Keys menu on the left, select Keys.b. Use filtering from the Key

Seite 302 - Laser compliance

8. Ensure that the key sharing group has been added.a. From the SKM interface, Security tab, Users and LDAP Menu, select Local Users and Groups.b. Ver

Seite 303 - German laser notice

1. FromtheSKMinterfaceontheDevicetabintheMaintenance menu on the left, select Backup &Restore, then select Create Backup.Figure 11 Creating the ba

Seite 304 - Japanese laser notice

7. In the Backup Summary section of the panel, verify that all of the settings, certificates, and localcertificate authorities are included in the backu

Seite 305 - Recycling notic

1. FromtheSKMinterfaceontheDevicetab,intheMaintenance menu, select Backup Restore,thenCreate Backup.2. In the Create Backup pane, in the Security Item

Seite 306 - German notice

ClusterSettings ... 177CreateCluster... 178JoinCluster...

Seite 307 - Hungarian notice

Log configuration proceduresConfiguring log rotationTo configure log rotation:1. Log in to the Management Console as an administrator with Logging access

Seite 308 - Polish notice

2. Change the file extension on the log file to .eml. The file will now be recognized by Windowsas an E-mail file.3. Double-click on the file. Outlook Expr

Seite 309 - Slovenian notice

Recreating the log signing certificatePrior to creating a new log signing certificate, backup the old certificate so you can verify previouslysigned logs

Seite 310 - Swedish notice

2. Navigate to the Log Viewer page (Device > Log Viewer) and click the tab for the log you wouldlike to download.3. Choose a log in the Log File fie

Seite 311 - Avis relatif aux piles

84Performing configuration and operation tasks

Seite 312 - Istruzioni per la batteria

4MaintainingtheSKMBackup and restore overviewClustering SKM nodes is an effective way of exchanging keys and configuration data to allow for failover,b

Seite 313 - Spanish battery notice

Backup and restore pageThe Backup and restore page enables you to create and restore backups. This page contains thefollowing sections:• Create Backup

Seite 314 - Regulatory compliance notices

Table 1 Create Backup: Security Items section componentsComponents DescriptionSecurity ItemsClick Select All toincludeallofthekeymanagementitemsinyour

Seite 315 - FSpecifications

Table 2 Create Backup: Device Items section componentsComponents DescriptionDevice ItemsClick Select All toincludeallofthedeviceconfiguration items in

Seite 316 - Environmental

Table 3 Create Backup: Backup Settings section componentsComponents DescriptionBackup NameEnteranameforthebackupfile. For backups stored externally, th

Seite 317 - G About this guide

RemoteAdministrationSettingsoverview ... 215RemoteAdministrationSettingssections... 215RemoteAdministrati

Seite 318 - HP technical support

Figure 17 Viewing the Restore Backup sectionThe following table describes the components of the Restore Backup section.Table 4 Restore Backup section

Seite 319

Figure 18 Viewing the Backup Restore Information sectionThe following table describes the components of the Internal Backup List section.Table 5 Inter

Seite 320 - About this guide

Table 6 Internal Backup List section componentsComponents DescriptionBackup Name Displays the backup name.DateDisplaysthedateonwhichthebackupwascreate

Seite 321 - Glossary

Table 7 Services List section componentsComponents DescriptionName• KMS Server: the“brains” of the SKM, which manages all incoming and outgoingconnect

Seite 322

System Information pageUse the System Information page to perform software upgrades and examine information about thesystem and software currently ins

Seite 323

The following table describes the components of the License Information section.Table 10 License Information section componentsComponents DescriptionL

Seite 324

Upgradingtoapatch releasePatch releasesare lightweight; customers do not have to re-qualify an entire release. All patches arecumulative, which means

Seite 325

Figure 25 Viewing the Refresh Page sectionThe following table describes the components of the Refresh Page section.Table 12 Refresh Page section compo

Seite 326

Cooling Fan StatusThe Cooling FanStatus section provides information on the status all of the SKM’s cooling fans. Thefollowing table describes the dif

Seite 327

Traceroute InformationUse the Traceroute Information section to examine the path between the SKM and a destination.Figure 29 Viewing the Traceroute In

Kommentare zu diesen Handbüchern

Keine Kommentare