Hp Secure Key Manager Instrukcja Użytkownika Strona 1

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Przechowywanie Hp Secure Key Manager. HP Secure Key Manager User Manual Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj

Podsumowanie treści

Strona 1 - Secure Key Manager

HP StorageWorksSecure Key Managerusers guide*AJ087-96018*Part number: AJ087–960183rd edition: April 2009

Strona 2

Secure logs ... 244Log Configuration page .

Strona 3 - Contents

DescriptionComponentsClick Cancel to abort the backup and return to the Create Backup: Security Items section.CancelDisplays all of the items that cou

Strona 4

NOTE:Key Manager DataSecure appliance Number of Active Versions Allowed for a Key setting on the Keyand Policy Configuration page. If the key has more

Strona 5

Figure 19 Viewing the Internal Backup List sectionThe following table describes the components of the Internal Backup List section.Table 7 Internal Ba

Strona 6

Figure 20 Viewing the Services List sectionThe following table describes the components of the Services List section.Table 8 Services List section com

Strona 7

Figure 21 Viewing the Restart/Halt sectionThe following table describes the components of the Restart/Halt section.Table 9 Restart/Halt section compon

Strona 8

Figure 22 Viewing the Device Information sectionThe following table describes the components of the Device Information section.Table 10 Device Informa

Strona 9

Software Upgrade/InstallThe software upgrade and installation mechanism can be used to install new features, upgrade coresoftware, and apply security

Strona 10

IMPORTANT:You must be running the base release upon which the patch is built before upgrading to the patchrelease. You cannot upgrade directly from a

Strona 11

Figure 25 Viewing the Refresh Page sectionThe following table describes the components of the Refresh Page section.Table 13 Refresh Page section compo

Strona 12

Cooling Fan StatusThe Cooling Fan Status section provides information on the status all of the SKM's cooling fans. Thefollowing table describes t

Strona 13

Health check configuration commands ... 297Help commands ...

Strona 14

Traceroute InformationUse the Traceroute Information section to examine the path between the SKM and a destination.Figure 29 Viewing the Traceroute In

Strona 15

Figure 31 Viewing the Netstat Information sectionThe following table describes the components of the Netstat Information section.Table 19 Netstat Info

Strona 16

Maintaining the SKM112

Strona 17

A SKM appliance information sheetThis information is specific to the HP StorageWorks Secure Key Manager (SKM) appliance to whichit is attached. There

Strona 18

Figure 33 Front and top of SKM applianceFigure 34 Back of SKM applianceDescriptionItemProduct ID number (PID) of the appliance1Serial number of the ap

Strona 19

B Using the Management ConsoleLogging in and outUse the Administrator Authentication screen to log into the Management Console.Figure 35 Viewing the A

Strona 20

• Recent ActionsSecurity SummaryUse this section to view security-related summary information for your SKM.Figure 37 Viewing the Security Summary sect

Strona 21

DescriptionComponentDisplays the version of the software currently running on the SKM.Software VersionDisplays the current date.DateDisplays the curre

Strona 22

Figure 40 Viewing the Search Criteria sectionThe following table describes the components of the Search Criteria section.Table 24 Search Criteria sect

Strona 23 - About this guide

Using features common to the Security and Device tabsThe following sections describe how to set display parameters for Management Console viewing.Thes

Strona 24 - Rack stability

Estonian notice ... 335Finnish notice ...

Strona 25 - HP websites

Accessing the Help systemThe Management Console provides you with two ways to access product documentation:context-sensitive help, and help. Both meth

Strona 26 - Documentation feedback

Figure 46 Finding the Help linkClicking this icon opens the help system in a new web browser. The default page shows the table ofcontents.Using the Ke

Strona 27 - Taking ESD precautions

CAUTION:Do not delete keys that might be needed to decrypt data at some point in the future. Once youdelete a key, there is no way to decrypt data tha

Strona 28 - Rack planning resources

DescriptionComponentThe algorithm might be any of the following:• AES-256• AES-192• AES-128• DES-EDE-168 (three key triple DES)• DES-EDE-112 (two key

Strona 29 - Optimum environment

Figure 48 Viewing the Key Properties sectionThe following table describes the components of the Key Properties section.Table 29 Key Properties section

Strona 30 - Power requirements

The state, combined with the key type and group permissions determine how the key version can beused. Ultimately, a key version can only be used when:

Strona 31 - Unpacking

DescriptionComponentClick Delete to remove the permissions for a group.DeleteFor example, in Figure 49, members of group1 have permission to export ke

Strona 32

DescriptionComponentClick Add to add an attribute.AddClick Delete to remove the selected attribute.DeleteKey Versions and Available UsageUse this sect

Strona 33 - Selecting a rack location

Figure 52 Viewing the Public Key sectionThe following table describes the components of the Public Key section.Table 33 Public Key section componentsD

Strona 34

DescriptionComponentClick Save Query to save the query without executing it.Save QueryClick Run Query without Saving to execute the query. The query n

Strona 35 - Attaching the cables

FiguresIdentify the contents of the shipping carton ... 321Connect the power supplies to

Strona 36

Figure 55 Viewing the Modify Query sectionNOTE:You cannot greatly modify the built-in query [All]. The Appliance will only permit you to change theCol

Strona 37 - 2 Configuring the system

Figure 56 Viewing the Create Key sectionThe following table describes the components of the Create Key section.Table 37 Create Key section componentsD

Strona 38 - Configuring the system38

DescriptionComponentWhen selected, the key contains multiple versions, up to a maximum of 4000. Eachkey version has unique key bytes, but shared key m

Strona 39

IMPORTANT:The server will not import keys that are known to be weak, such as 64 bit DES. In addition, the paritybits must be set properly; otherwise,

Strona 40 - Configuring the system40

DescriptionComponentA check mark in the box indicates that the key is deletable via an XML request by thekey owner (or any user for global keys). Afte

Strona 41

NOTE:Authorization policies cannot be applied to global keys or to certificates. Key owners are not subjectto policy restrictions.The Authorization Po

Strona 42 - Configuring the system42

Figure 60 Viewing the Authorization Policy Properties sectionThe following table describes the Authorization Policies Properties section.Table 41 Auth

Strona 43

Figure 61 Viewing the Authorized Usage Periods sectionThe following table describes the Authorization Usage Periods section.Table 42 Authorization Usa

Strona 44 - Establishing a cluster

Figure 62 Viewing the Active Versions sectionTable 43 Active Versions section componentsDescriptionComponentDisplays the number of active versions all

Strona 45

Configuring the users and groupsA user directory contains a list of users that may access the keys on your KMS Server, and a list ofgroups to which th

Strona 46 - Configuring the system46

Front and top of SKM appliance ... 11433Back of SKM appliance ...

Strona 47

Figure 64 Viewing the Local Users sectionThe following table describes the components of the Local Users section.Table 45 Local Users section componen

Strona 48 - Copying the certificates

NOTE:The User Administration Permission and Change Password Permission apply only to local users. LDAPusers cannot be managed through the SKM; they mu

Strona 49 - Installing the certificates

Figure 66 Viewing the Custom Attributes sectionThe following table describes the components of the Custom Attributes section.Table 47 Custom Attribute

Strona 50 - Configuring the system50

Figure 67 Viewing the Local Groups sectionThe following table describes the components of the Local Groups section.Table 48 Local Groups section compo

Strona 51 - Key and policy procedures

Figure 69 Viewing the User List sectionThe following table describes the components of the User List section.Table 50 User List section componentsDesc

Strona 52 - Downloading an RSA key

Figure 70 Viewing the LDAP User Directory Properties sectionThe following table describes the components of the LDAP User Directory Properties section

Strona 53 - Deleting a key

Figure 71 Viewing the LDAP Schema Properties sectionThe following table describes the components of the LDAP Schema Properties section.Table 52 LDAP S

Strona 54 - User and group procedures

DescriptionComponentClick Edit to modify the properties.EditClick Clear to remove the current properties.ClearLDAP Failover Server PropertiesUse the L

Strona 55 - Deleting a group

• User ListLDAP UsersThe LDAP Users section displays the users available in the LDAP user directory.Figure 73 Viewing the LDAP Users sectionThe follow

Strona 56 - LDAP server procedures

Figure 74 Viewing the LDAP Groups sectionThe following table describes the components of the LDAP Groups section.Table 55 LDAP Groups section componen

Strona 57 - Certificate procedures

Viewing the LDAP User Directory Properties section ... 14570Viewing the LDAP Schema Properties section

Strona 58

Certificate and CA Configuration PageCertificates identify one entity to another. In this case, when making SSL connections between a clientapplicatio

Strona 59 - Creating a client certificate

DescriptionComponentA certificate summary containing the following information:• Common Name: Name of entity to which certificate is issued. This is t

Strona 60

Figure 77 Viewing the Certificate Information sectionThe following table describes the components of the Certificate Information section.Table 58 Cert

Strona 61 - Installing a certificate

DescriptionComponentClick Install Certificate to go to the Certificate Installation page. The Install Certificatebutton can be applied to either certi

Strona 62 - Downloading a certificate

The following table describes the components of the Certificate Installation section.Table 59 Certificate Installation section componentsDescriptionCo

Strona 63

DescriptionComponentThe duration during which the certificate is valid.Certificate Duration(days)Click Create to create the certificate.CreateClick Ba

Strona 64 - Downloading a local CA

DescriptionComponentE–mail address of person requesting the certificate. This field is optional.Email AddressSize of key being generated. The SKM supp

Strona 65 - Creating a local CA

DescriptionComponentThe password used to access the key.Private Key PasswordClick Import Certificate to import the certificate to SKM.Import Certifica

Strona 66 - Installing a CA certificate

DescriptionComponentClick Edit to change the name of a profile.EditClick Add to create a profile. A newly created profile is initially empty. You must

Strona 67 - FIPS status server procedures

Figure 84 Viewing the Trusted Certificate Authority List (Edit Mode)The following table describes the components of the Trusted Certificate Authority

Strona 68 - KMS server procedures

Viewing the Join Cluster section ... 197107Viewing the Date and Time Settin

Strona 69

Figure 85 Viewing the Local Certificate Authority List sectionThe following table describes the components of the Local Certificate Authority List sec

Strona 70 - Clustering procedures

Figure 86 Viewing the CA Certificate Information sectionThe following table describes the components of the CA Certificate Information section.Table 6

Strona 71 - Setting up SSL in a cluster

Sign Certificate RequestUse the Sign Certificate Request section to sign certificate requests.Figure 87 Viewing the Sign Certificate Request sectionTh

Strona 72 - Date and time procedures

Figure 88 Viewing the Signed Certificates sectionThe following table describes the components of the Signed Certificates section.Table 69 Signed Certi

Strona 73 - IP authorization procedures

Figure 89 Viewing the Signed Certificate Information sectionThe components of the Signed Certificate Information section are view-only.Create Local CA

Strona 74 - SNMP procedures

Figure 90 Viewing the Create Local Certificate Authority sectionThe following table describes the components of the Create Local Certificate Authority

Strona 75

DescriptionComponentLocal CAs can be one of two types: Self-signed root CA, or Intermediate CA Request.When you create a self-signed root CA, you must

Strona 76 - Setting up the LDAP schema

DescriptionComponentDisplays one of three values:Certificate Active - The CA can be used to issue certsand sign certificate requests.Certificate Expir

Strona 77 - Changing your password

CRL v2 format. Support for CRLs on the SKM allows you to obtain, query, and maintain CRLs publishedby CAs supported on the SKM. The SKM uses CRLs to v

Strona 78 - Granting credentials

NOTE:The Auto-Update feature does not apply to local CAs.Force Periodic UpdateThe SKM performs a daily check of the Next Update field to determine whe

Strona 79 - Revoking a credential grant

Viewing the Current Audit Log section ... 252144Viewing the Activity Log section ..

Strona 80

Only the following models are capable of operating in accordance with FIPS standards:• HP DL360 R05All other SKM can be configured for high security b

Strona 81

Software Patches and UpgradesHP will indicate which software patches and upgrades are FIPS certified. Apply only FIPS certifiedsoftware to a FIPS-comp

Strona 82

DescriptionComponentClick Set FIPS Compliant to alter the settings shown in the High Security Settings andSecurity Settings Configured Elsewhere secti

Strona 83

Figure 94 Viewing the High Security Settings sectionThe following table describes the components of the High Security Settings section.Table 74 High S

Strona 84

DescriptionComponentPrevents administrators from changing RAID drives through the Management Console.IMPORTANT:You cannot replace RAID drives and rema

Strona 85

DescriptionComponentDisplays the SSL Protocols enabled in the SSL Options section. Click the link to accessthe SSL Options section. FIPS compliance re

Strona 86

Configuring the High Security Settings on an SKMIMPORTANT:When you enable FIPS compliance on the SKM, the functionality displayed here is disabled. Mo

Strona 87

DescriptionConditionalpower-onTestKnown Algorithm Test for the X9.31 PRNG. This testis performed at power-on.XX9.31 PRNGTest of the random number gene

Strona 88

Figure 96 Viewing the FIPS Status Report: normalThe following table describes the components of the FIPS Status Server Settings section.Table 77 FIPS

Strona 89 - Log configuration procedures

DescriptionComponentDisplays the result and timestamp for each of the following self-tests:• AES Encryption• DES Encryption• DSA Encryption• HMAC Algo

Strona 90 - Enabling signed logs

TablesDocument conventions ... 231Create Backup: Security It

Strona 91

DescriptionComponentSelect the IP addresses on which the FIPS Status Server is enabled on the SKM.Local IPSelect the port on which the server status r

Strona 92 - Log view procedures

SSL Session TimeoutAll SSL sessions stored in the SKM's session cache have an expiration period, typically two hours.This means the SKM accepts a

Strona 93 - Clearing a log

IMPORTANT:Some web browsers, including Internet Explorer 6.0, do not have TLS 1.0 enabled by default. If youdisable SSL 2.0 and 3.0, please check firs

Strona 94

SSL Cipher OrderUse this section to enable, disable, and order the priority of SSL ciphers.Different applications and databases support different encr

Strona 95 - 4 Maintaining the SKM

DescriptionComponentThis field specifies the Hash function to use for SSL session integrity. The supportedHash functions are:• SHA–1: (Secure Hash Alg

Strona 96 - Backup and restore page

The KMS Server can define a local users and groups list or you can use an LDAP server to centrallymanage your users and groups.Authentication OptionsT

Strona 97 - Secure Key Manager 97

Key Management Services Configuration sectionsThe Key Management Services Configuration page enables you to configure the KMS Server, KMSServer Authen

Strona 98 - Create Backup: Device Items

DescriptionComponentThe Connection Timeout value specifies in seconds how long client connections canremain idle before the KMS Server begins closing

Strona 99

Figure 101 Viewing the KMS Server Authentication Settings sectionThe following table describes the elements of the KMS Server Authentication Settings

Strona 100 - Restore Backup

DescriptionComponentThis field allows you to select a profile to use to verify that client certificates are signedby a CA trusted by the SKM. This opt

Strona 101 - Internal Backup List

Public Key section components ... 12833Create Query section components ..

Strona 102 - Services Configuration page

DescriptionComponentClick Edit to modify the account lockout settings.EditHealth Check overviewThe Health Check feature allows you to configure client

Strona 103 - Restart/Halt

DescriptionComponentIn this field you specify the IP address on which you want to listen for health checkrequests. You can specify an individual IP ad

Strona 104 - System Information page

• LDAP Server• SSL• Administrators and Remote Administration• IP Authorization• Logging• Service Startup• Known CAs, CRLs, and Trusted CA List Profile

Strona 105 - License Information

NOTE:When upgrading from a previous release, local CA replication is disabled by default.Automatic Synchronization BackupsPrior to each synchronizatio

Strona 106 - Software Upgrade/Install

DescriptionComponentThe port on which the device listens for cluster administration requests.CAUTION:The cluster port (typically 9001) must be differe

Strona 107 - System Health page

Figure 105 Viewing the Cluster Settings sectionThe following table describes the components of the Cluster Settings section.Table 86 Cluster Settings

Strona 108 - Power Supply Status

Figure 106 Viewing the Create Cluster sectionThe following table describes the components of the Create Cluster section.Table 87 Create Cluster sectio

Strona 109 - Network Diagnostics page

Figure 107 Viewing the Join Cluster sectionThe following table describes the components of the Join Cluster section.Table 88 Join Cluster section comp

Strona 110 - Netstat Information

• Date & Time ProceduresNetwork Time Protocol overviewThe Network Time Protocol (NTP) is a protocol by which computers on a network synchronize th

Strona 111 - Reading Netstat Results

Figure 108 Viewing the Date and Time Settings sectionThe following table describes the components of the Date and Time Settings section.Table 89 Date

Strona 112 - Maintaining the SKM112

Legal and notice information© Copyright 2007, 2009 Hewlett-Packard Development Company, I.E.© Copyright 2000, 2008 Ingrian Networks, Inc.Confidential

Strona 113

Create Local Certificate Authority section components ... 16570CA Certificate List section components ...

Strona 114

Figure 109 Viewing the NTP Settings sectionThe following table describes the components of the NTP Settings section.Table 90 NTP Settings section comp

Strona 115 - Using the Home tab

Network Interfaces sectionsThe Network Configuration page contains the following network interface-related section:• Network Interface ListNetwork Int

Strona 116 - System Summary

Figure 111 Viewing the Default Gateway List sectionThe following table describes the components of the Default Gateway List section.Table 92 Default G

Strona 117 - Search screen

Example 2. Example 2Used for Outgoing ConnectionsDefault GatewayInter-face-----------------------------------------------------------------—nononeEthe

Strona 118

This configuration is the same as example 3, but in this scenario there are some hosts and networksthat are not reachable through 172.17.7.1. Most oft

Strona 119 - Filtering sections

Hostname & DNS sectionsThe Network Configuration page contains the following hostname and DNS-related sections:• Hostname Setting• DNS Server List

Strona 120 - Accessing the Help system

The following table describes the components of the DNS Server List section.Table 95 DNS Server List section componentsDescriptionComponentsUse the Up

Strona 121

Figure 115 Viewing the Network Interface Port Speed/Duplex sectionThe following table describes the components of the Network Interface Port Speed/Dup

Strona 122

Figure 116 Viewing the IP Authorization Settings sectionThe following table describes the components of the IP Authorization Settings section.Table 97

Strona 123 - Key Properties

Figure 117 Viewing the Allowed Client IP Addresses sectionThe following table describes the components of the Allowed Client IP Addresses section.Tabl

Strona 124 - Versioned keys

Change Your Password section components ... 229107Password Settings for Local Administrator

Strona 125 - Group Permissions

SNMP overviewThe SNMP protocol enables network and system administrators to remotely monitor devices on thenetwork, such as switches, routers, proxies

Strona 126 - Custom Attributes

secret key, and sends the message to the receiver, who decrypts it using the DES algorithm and thesame secret key.Access controlAccess control in SNMP

Strona 127 - RSA Public Key

This page contains the following sections:• SNMP Agent Settings – Changes to the SNMP Agent Settings section apply to all managementstations, username

Strona 128 - Create Query

NOTE:If you are configuring the agent to communicate with an NMS running SNMPv3 software, you candisregard this section.When creating a community on t

Strona 129 - Modify Query

SNMPv3 Username ListAs the name suggests, the SNMPv3 Username List is used to configure the agent to communicate withan NMS running SNMPv3 software. Y

Strona 130 - Create Key

DescriptionComponentThis password is used to create the secret key that performs the encrypt and decryptoperations on the data shared between the agen

Strona 131

DescriptionComponentDisplays either the management community or username. The management communityis used to send SNMP data to the SNMPv1/v2 managemen

Strona 132 - Import Key

DescriptionComponentName that is used to send SNMP data to SNMPv3 management stations. The usernameis used to create a key that is shared by the agent

Strona 133

Figure 123 Viewing the Create SNMP Management Station sectionThe following table describes the components of the Create SNMP Management Station sectio

Strona 134

DescriptionComponentYou can choose from MD5 and SHA.Auth Protocol (v3only)This password is used to create the secret key that is used to authenticate

Strona 136 - Authorized Usage Periods

• Security Warnings – an administrative experienced multiple password failures while attemptingto log in, the system was reset to factory settings, th

Strona 137 - Active Versions

and stored on the SKM appliance. The available access controls are grouped into categories anddescribed here.Security Configuration access controls en

Strona 138 - Custom Key Attributes

When creating an administrator, you should assign the minimum amount of access controls needed.For example, a backup administrator will only need the

Strona 139 - Local Users

WARNING!It is absolutely crucial that you remember the passwords for all of your local administrators. Forsecurity reasons, there is no way to reset a

Strona 140

Configuration of the LDAP Administrator Server and the first LDAP administrator must be performedby a local administrator. Thereafter, you can use the

Strona 141 - Selected Local User

1. Log in the Management Console as an administrator with High Access Administrator accesscontrol.2. Navigate to the Administrator section on the Admi

Strona 142 - Local Groups

DescriptionComponentAccess control options related to device security configuration.• Keys and Authorization Policies: Create, modify and delete keys

Strona 143 - User List

Select LDAP UsernameThe Select LDAP Username section enables you to browse and select an LDAP user when creating anLDAP administrator account.Figure 1

Strona 144 - LDAP Server Configuration

Password expirationThe password expiration feature allows you to specify a duration for administrator passwords. Bydefault, this feature is disabled.

Strona 145 - LDAP Schema Properties

CAUTION:In addition to all scheduled password changes, immediately change all administrator, user account,and backup passwords any time a security off

Strona 146

About this guideThis guide provides information about:• Installing an HP StorageWorks Secure Key Manager• Configuring an HP StorageWorks Secure Key Ma

Strona 147

DescriptionComponentRe-enter the new password.Confirm New Pass-wordClick Change Password to implement any changes made to this section.Change Password

Strona 148 - LDAP Groups

DescriptionComponentEnter the minimum password length. The default length is 8. This value applies to allpasswords on the SKM (local administrator, us

Strona 149

Any request for these operations, from either the Management Console or the CLI, results in a requestfor additional administrator accounts and passwor

Strona 150 - Certificate List

NOTE:If the SKM is configured to use NTP, modifications to the NTP system time can extend the life span ofa granted credential.NOTE:Granted credential

Strona 151 - Certificate Information

Multiple Credentials sectionsThe Multiple Credentials sections on the Administrator Configuration page lets you enable the multiplecredentials feature

Strona 152 - DescriptionComponent

Credentials GrantedUse the Credentials Granted section to view the credentials granted to or by the current administrator.Any credential grants that d

Strona 153 - Certificate Installation

DescriptionComponentEnter the length of duration. This duration cannot be longer than the Maximum Durationfor Time-Limited Credentials established in

Strona 154 - Self Signed Certificate

Figure 131 Viewing the Remote Administration Settings sectionThe following table describes the components of the Remote Administration Settings sectio

Strona 155 - Create Certificate Request

DescriptionComponentsThe SSH Admin Server IP address is the IP address used to configure the SKM from theCLI. You can select one specific IP address o

Strona 156

LDAP Administrator Server Properties sectionUse the LDAP Administrator Server Properties section to define the basic properties of the LDAPadministrat

Strona 157

ElementConvention• File and directory names• System output• Code• Commands, their arguments, and argument valuesMonospace text• Code variables• Comma

Strona 158 - The Default Profile

Figure 133 Viewing LDAP Schema Properties sectionTable 114 LDAP Schema Properties section componentsDescriptionComponentThe base distinguished name (D

Strona 159

DescriptionComponentClick to modify the properties.EditClick to remove the current properties.ClearClick to test the LDAP connection after you have de

Strona 160 - CA Certificate Properties

For example, you can schedule that system rotate the Audit Log every Sunday morning at 3:15 orwhen the file size reaches 100 MB, whichever comes first

Strona 161 - Secure Key Manager 161

DescriptionValueThe date and time when the log file was created.datetime stampThe hostname of the SKM.hostnameFor example, the filename audit.log.1.20

Strona 162 - Signed Certificates

2005-09-12 10:23:47 irwin.company.com KMS Server: Starting KMS Serverlog message at syslog server (displays on one line):-----------------------------

Strona 163

Figure 135 Viewing the Rotation Schedule sectionThe following table describes the components of the Rotation Schedule section.Table 117 Rotation Sched

Strona 164 - Create Local CA

Figure 136 Viewing the Log Rotation Properties sectionThe following table describes the components of the Log Rotation Properties section.Table 118 Lo

Strona 165 - Secure Key Manager 165

Syslog SettingsTo enable syslog, select a type of log, and click Edit. Specify a hostname or IP address of the primarylog server (Syslog Server #1) an

Strona 166 - CA Certificate List

Figure 138 Viewing the Log Signing sectionThe following table describes the components of the Log Signing section.Table 120 Log Signing section compon

Strona 167 - Install CA Certificate

Figure 139 Viewing the Log Signing Certificate Information sectionThe following table describes the components of the Log Signing Certificate Informat

Strona 168 - Local CAs

HP technical supportFor worldwide technical support information, see the HP support website:http://www.hp.com/supportBefore contacting HP, collect the

Strona 169 - Advanced Security overview

Figure 140 Viewing the Activity Log Settings sectionThe following table describes the components of the Activity Log Settings section.Table 122 Activi

Strona 170

Figure 141 Viewing the System Log sectionThe following table describes the components of the System Log section.Table 123 System Log section component

Strona 171 - FIPS Compliance

• Date and time change was made.• Username: the username that made the configuration change.• Event: a text description of the configuration change.Fi

Strona 172 - High Security Settings

Activity LogThe Activity Log contains a record of each request received by the KMS Server. For client requeststhat contain multiple cryptographic oper

Strona 173

Detail InformationRequest Typealgorithm and key size specified in the request; the value for the Deletable and Export-able options are listed as well

Strona 174

Current Activity LogFigure 146 Viewing the Current Activity Log sectionThe following table describes the components of the Current Activity Log sectio

Strona 175 - High Security Procedures

DescriptionFieldenclosed in brackets ( [] ), the message field displays the plaintext that correspondswith the base64 encoded message included in the

Strona 176 - FIPS Status Server overview

DescriptionComponentClick Clear to delete the select log.ClearStatistics pageThe Statistics page enables you to view real-time system statistics about

Strona 177 - FIPS Status Report

DescriptionComponentClick Set Refresh Time to apply the new value.Set Refresh TimeClick Refresh Now to refresh the System Statistics page on demand.Re

Strona 178

Figure 151 Viewing the Connection Statistics sectionThe following table describes the components of the Connection Statistics section.Table 136 Connec

Strona 179 - FIPS Status Server page

Documentation feedbackHP welcomes your feedback.To make comments and suggestions about product documentation, please send a message tostoragedocsFeedb

Strona 180 - SSL overview

Figure 152 Viewing the Throughput sectionThe following table describes the components of the Throughput section.Table 137 Throughput section component

Strona 181 - SSL Sections

Refresh Statistics (server)The Refresh Statistics section controls how frequently the Server Statistics page is refreshed. Whenthe page is refreshed,

Strona 182

Figure 155 Viewing the KMS Statistics sectionThe following table describes the components of the KMS Statistics section.Table 140 KMS Statistics secti

Strona 183 - SSL Cipher Order

C Using the Command Line InterfaceShell commandsThe CLI supports a few shell commands that allow you to perform various search, cut, and pasteoperatio

Strona 184 - Configuring the KMS Server

• new cert requestIf there are no spaces between segments of quoted and non–quoted text, the two segments are treatedas one argument. Thus, the comman

Strona 185 - Authentication Options

If the text you have entered can refer to multiple commands, tab completion will not work, but youcan press the return key to view the possible comman

Strona 186 - KMS Server Settings

To exit configure mode and go to view mode, type exit at the prompt:hostname (config)# exithostname#Entering script modeScript mode allows you to crea

Strona 187

NOTE:The Script Recorder takes care of all such formatting issues and hence is probably the best way tocreate scripts initially.Script recorderThe Scr

Strona 188

Entering passwordsWhenever a command that requires a password is executed in a script, the actual password will notbe stored in the script. Instead, w

Strona 189 - User Account Lockout Settings

transfer audit logAutologout Commandsautologoutshow-autologoutBackup and Restore Commandsbackupno backuprestore backupshow backupCA Cert Commandsca ce

Strona 190 - Health Check sections

1 Installing and replacing hardwareThis section details the steps to install or replace the SKM hardware:• Preparing for the installation• Rack planni

Strona 191 - Configuring the cluster

cert requestcert selfsign installno certificateno requestshow certcli-show-requestCRL Commandscrl auto-updatecrl list sendcrl list updatecrl settingsn

Strona 192 - The Cluster Key

traceroute runFIPS Commandsshow fips statusfips serverreset factory settings zeroizesecurity settingsshow security settingsshow fips servershow fips s

Strona 193 - Cluster Configuration page

show log rotationshow log signingshow logsigning certshow system syslogsystem syslogMode Commandsconfigureconfigure terminalexitscriptNetwork Commands

Strona 194 - Cluster Settings

static routeServices Commandshaltkms-server runkms-server startupno kms-server-runno kms-server startupno snmp runno snmp startupno sshadmin runno ssh

Strona 195 - Create Cluster

show snmp usernameshow stationsnmp agentsnmp usernamestationSSL Commandscipherspeccipherspec priorityno cipherspecno export cipherspecno ssl protocolr

Strona 196 - Join Cluster

show ntpshow ras settingstimezone setSystem Health Commandsshow system healthSystem Information Commandsshow deviceshow softwaresoftware installsoftwa

Strona 197

• activity log rotate• show activity logRelated com-mand(s)show activity log – view the Activity Log.hostname# show activity log <log name> <

Strona 198 - Date and Time Settings

hostname# credential settingsRequire Multiple Credentials [n]:Num of Admins Required for Operations:1: 22: 33: 4Enter a number (1 - 3) [1]:Allow Time-

Strona 199 - NTP Settings

• show granted credential• no granted credential• credential settings• show credential settingsRelated com-mand(s)ldap test failover – connect to the

Strona 200 - Configuring the network

hostname config# password settingsEnable Password Expiration (y/n) [n]:Enable Password History (y/n) [n]:Minimum Password Length [8]:Must Passwords Co

Strona 201 - Network Interfaces sections

• Use heel straps, toe straps, or boot straps at standing workstations.Wear the straps on both feet when standing on conductive floors or dissipating

Strona 202

hostname# show password settingsPassword Expiration: After 180 daysPassword History: 4 passwords rememberedMinimum Password Length: 8Passwords Must Co

Strona 203

show autologout – view the currently configured autologout settings.hostname# show autologoutSyntax• autologoutRelated com-mand(s)Backup and restore c

Strona 204 - Static Route List

hostname# show backupSyntax• backup• no backup• restore backupRelated com-mand(s)CA certificate commandsca certificate install – install a CA certific

Strona 205 - Hostname & DNS sections

• ca profile• ca profile duplicate• ca profile rename• show ca profile• show ca profile• no ca profile• no ca profile entryRelated com-mand(s)ca profi

Strona 206 - Port Speed sections

hostname (config)# local caEnter the certificate name:Enter the common name:Enter the organization name:Enter the organization unit name:Enter the loc

Strona 207 - IP Authorization sections

• ca profile• ca profile duplicate• ca profile entry• ca profile rename• show ca profile• show ca profile• no ca profileRelated com-mand(s)no local ca

Strona 208 - Allowed Client IP Addresses

• halt• no local caRelated com-mand(s)show signed certificate – display information about certificates signed by local CAs on the SKM.hostname# show s

Strona 209 - Configuring SNMP

The certificate import process varies between SKMs.hostname# cert importPlease pick the upload option for uploading your certificate:1) Console Paste

Strona 210 - SNMP overview

hostname (config)# cert request <cert name>After executing the cert request command, the system prompts you to provide the followinginformation:

Strona 211 - The SNMP Configuration page

• cert request• cli-show-request• no request• cert install• cert import• show cert• cert selfsign installRelated com-mand(s)no request – delete a cert

Strona 212 - SNMP Agent Settings

Rack warningsWARNING!To reduce the risk of personal injury or damage to the equipment, be sure that:• The leveling jacks are extended to the floor.• T

Strona 213

NoneRelated com-mand(s)crl list send – export a CRL.hostname (config)# crl list send <ca name>Transport Method:1) FTP 2) SCPEnter a number(1-2):

Strona 214 - SNMPv3 Username List

hostname (config)# crl settings <ca name>Transport Method:1) FTP 2) SCP 3) HTTPEnter a number(1-3):Host:Filename:Username:Password:Confirm passw

Strona 215 - SNMP Management Station List

NoneRelated com-mand(s)show crl list – display the serial number and revocation date of all revoked certificates in the CRL.hostname# show crl listSyn

Strona 216

show clientevent log – view the client event log.hostname# show clientevent log <log name> <number of lines>Syntax• clientevent log rotate

Strona 217 - Secure Key Manager 217

NOTE:For security purposes, this command can only be run from the CLI at the console.You cannot execute this command remotely via the CLI over SSH or

Strona 218

• host run• traceroute run• ping runRelated com-mand(s)traceroute run – print the route packets take to the specified network host.hostname (config)#

Strona 219 - Enterprise MIB overview

• show fips serverRelated com-mand(s)reset factory settings zeroize – zeroize all keys and passwords on the device.NOTE:For security purposes, this co

Strona 220 - Administrator overview

hostname# show security settingsKey SecurityDisable Creation and Use of Global Keys: YesDisable Non-FIPS Algorithms and Key Sizes: YesDisable RSA Encr

Strona 221

hostname (config)# health checkEnable Health Check [n]:Local IP:1: All2: 192.168.200.195Enter a number (1 - 2) [1]:Local Port [9080]:Health check sett

Strona 222 - Administrator passwords

Log commandsactivity syslog – enable the SKM to use the syslog protocol to send Activity Log messages to an externalmachine.hostname (config)# activit

Strona 223 - LDAP administrative server

ContentsAbout this guide ... 23Intended audience ...

Strona 224 - Administrator procedures

When vertical space in the rack is not filled by an SKM or rack component, the gaps between thecomponents cause changes in airflow through the rack an

Strona 225 - Create LDAP Administrator

• cli-no-audit-syslog• show audit syslogRelated com-mand(s)clientevent syslog – enable the SKM to use the syslog protocol to send Client Event Log mes

Strona 226

log signing – enable Secure Logs.hostname (config)# log signing <log-name>Syntax• recreate logsigning cert• show logsigning cert• show log signi

Strona 227 - Password Management overview

show activity syslog – display the syslog settings for the Activity Log.hostname# show activity syslogSyntax• no activity syslog• activity syslogRelat

Strona 228

hostname (config)# system syslogSyslog Server #1 IP [None]:Syslog Server #1 Port [514]:Syslog Server #2 IP [None]:Syslog Server #2 Port [514]:Syntax•

Strona 229 - Password Management sections

Network commandsedit ip authorization allowed – edit the IP authorization settings for a particular IP address.NOTE:The ip authorization allowed comma

Strona 230

hostname (config)# ip address [<ip address> <submask> <interface #>]ip addressEnter the IP address:Enter the subnet mask:Available i

Strona 231 - Multiple Credentials overview

• no ip addressRelated com-mand(s)ip name–server – add a domain name server.hostname (config)# ip name-server <IP1> <IP2>...<IPn>NOT

Strona 232

no static route – delete a static route on the SKM.hostname (config)# no static routeSyntax• static route• show static routeRelated com-mand(s)show et

Strona 233

• edit ip authorization allowed• ip authorization• ip authorization allowed• no ip authorization allowed• show ip authorization allowedRelated com-man

Strona 234 - Multiple Credentials sections

• show static route• no static routeRelated com-mand(s)Services commandshalt – halt the SKM.hostname (config)# haltSyntax• rebootRelated com-mand(s)km

Strona 235 - Grant a Credential

CAUTION:Protect the SKM from power fluctuations and temporary interruptions with a regulating uninterruptiblepower supply (UPS). This device protects

Strona 236

hostname (config)# no sshadmin runSyntax• sshadmin runRelated com-mand(s)no sshadmin startup – disable SSH administration when starting up the SKM.hos

Strona 237

• no snmp runRelated com-mand(s)snmp startup – enable SNMP when starting up the SKM.hostname (config)# snmp startupSyntax• no snmp startupRelated com-

Strona 238 - LDAP Administrator Server

edit community – edit a community.hostname (config)# edit community <community name>Enter your changes to the community public below.Press enter

Strona 239

NOTE:When you execute the edit station command, the system prompts you to provide thenew SNMP management station information. In the example shown her

Strona 240

NOTE:When you execute the edit snmp username command, the system prompts you toprovide the new SNMPv3 username information.hostname (config)# no snmp

Strona 241 - Viewing logs and statistics

hostname (config)# snmp agentAvailable IP addresses:1. All2. 192.168.200.195SNMP agent IP [All] (1-2): 1SNMP agent port [161]:Enable SNMP traps? (y/n)

Strona 242

SSL commandscipherspec – enable a cipher spec.NOTE:The cipher order pertains to the communication channel between the client (application, database,et

Strona 243

• show cpiherspec• cipherspec• no cipherspec• no export cipherspec• restore cipherspecRelated com-mand(s)no cipherspec – disable a cipherspec.hostname

Strona 244 - Log Configuration page

• show cpiherspec• cipherspec priority• cipherspec• no cipherspec• no export cipherspecRelated com-mand(s)show cipherspec – view the priority of all c

Strona 245 - Log Rotation Properties

hostname# show licenseLicenses: 5Syntax• show license usageRelated com-mand(s)show license usage – show the number of licenses currently in use.hostna

Strona 246

5. Place shipping materials back into the shipping cartons.6. Set the shipping cartons aside for later use.Identifying the shipping carton contentsA n

Strona 247 - Log Signing

hostname (config)# edit ras settingsAvailable IP addresses:1. All2. 192.168.200.195Web Admin Server IP [192.168.200.195] (1-2): 2Web Admin Server Port

Strona 248

• show ntp• ntp• no ntp serverRelated com-mand(s)recreate ssh key – recreate the Secure Shell key.NOTE:If you execute the recreate ssh key command fro

Strona 249 - Activity Log Settings

hostname (config)# timezone set <time zone>Syntax• clock set• show clockRelated com-mand(s)Table 142 clock set syntax detailsDescriptionParamete

Strona 250 - Log Viewer page

System information commandsshow device – view the model number and Unit ID of the SKM.hostname# show deviceSyntax• show softwareRelated com-mand(s)sho

Strona 251 - Audit Log

• no system log• show system logRelated com-mand(s)transfer system log – transfer a system log off of the SKM.hostname# transfer system log <log_na

Strona 252

D TroubleshootingThis appendix addresses some of the typical problems you might face as the administrator of theSKM.Table 143 Common problemsPossible

Strona 253 - Activity Log

Troubleshooting326

Strona 254

E Regulatory compliance noticesThis section contains regulatory notices for the HP StorageWorks Secure Key Manager (SKM) appliance.Regulatory complian

Strona 255 - Client Event Log

of this equipment in a residential area is likely to cause harmful interference, in which case the userwill be required to correct the interference at

Strona 256

Class B equipmentThis Class B digital apparatus meets all requirements of the Canadian Interference-Causing EquipmentRegulations.Cet appareil numériqu

Strona 257 - Statistics page

CAUTION:There will be several tamper-evident labels. Do not cut or damage these labels because they arerequired for FIPS compliance audits.Selecting a

Strona 258 - Connection Statistics

Korean noticesClass A equipmentClass B equipmentTaiwanese noticesBSMI Class A noticeTaiwan battery recycle statementRecovery text:• “Please recycle wa

Strona 259 - Throughput

Laser compliance noticesEnglish laser noticeThis device may contain a laser that is classified as a Class 1 Laser Product in accordance with U.S.FDA r

Strona 260 - License Usage

French laser noticeGerman laser noticeItalian laser noticeRegulatory compliance notices332

Strona 261 - KMS Statistics

Japanese laser noticeSpanish laser noticeRecycling noticesEnglish noticeSecure Key Manager 333

Strona 262

Bulgarian noticeCzech noticeDanish noticeDutch noticeRegulatory compliance notices334

Strona 263 - Command Line Interface syntax

Estonian noticeFinnish noticeFrench noticeGerman noticeSecure Key Manager 335

Strona 264 - Tab completion

Greek noticeHungarian noticeItalian noticeLatvian noticeRegulatory compliance notices336

Strona 265 - Command modes

Lithuanian noticePolish noticePortuguese noticeRomanian noticeSecure Key Manager 337

Strona 266 - Scripting mode

Slovak noticeSpanish noticeSwedish noticeTurkish noticeTürkiye Cumhuriyeti: EEE Yönetmeli ine UygundurRegulatory compliance notices338

Strona 267 - Installing certificates

Battery replacement noticesDutch battery noticeSecure Key Manager 339

Strona 268 - CLI commands

9. Remove the rails from the original appliance for reuse on the replacement appliance. To do so,pull out on the tab of the rail that locks the center

Strona 269 - Secure Key Manager 269

French battery noticeGerman battery noticeRegulatory compliance notices340

Strona 270

Italian battery noticeJapanese battery noticeSecure Key Manager 341

Strona 271 - Secure Key Manager 271

Spanish battery noticeRegulatory compliance notices342

Strona 272

F SpecificationsThis section provides the VLS node and specifications.SKM appliance specificationsSpecificationItem4.3 cm (1.70 in)Height70.5 cm (27.8

Strona 273 - Secure Key Manager 273

ShippingNon-operatingOperating5% to 95%10% to 95%40% to 60%Relative humidity (noncondensing)2-1000 ft to 40,000 ft-1000 ft to 10,000 ft-1000 ft to 10,

Strona 274

GlossaryActive Device In the VRRP group, this is the device that is receiving all network traffic. This istypically the primary device; however, in ca

Strona 275 - Activity log commands

periodic time requests to servers, obtaining server time stamps, and using themto adjust the client's clock.Passive device In the VRRP group, the

Strona 276

IndexSymbols?, 298Aaccess control, 225activity log level, 275activity log rotate, 275activity syslog, 299administrator, 276administratorscreating, 225

Strona 277 - Secure Key Manager 277

clustersand multiple credentials, 233configuring, 193creating, 195joining, 196overview, 191password protection for, 192community, 311configure, 303con

Strona 278

Internal Backup List section, 101IP addressesDNS server, 205network, 201ip address, 304IP addressesclient, 208IP authorizationallowed client IP addres

Strona 279 - Secure Key Manager 279

3. With the appliance fully seated in the rack, tighten the thumbscrews just until the bezel is securedto the rack.Attaching the cables1. Connect a st

Strona 280 - Autologout commands

no ca certificate, 284no ca profile, 284no certificate, 288no cipherspec, 317no clientevent syslog, 301no community, 313no crl list, 291no export ciph

Strona 281 - Backup and restore commands

show statistics, 319show activity log, 276show activity syslog, 302show administrator, 279show audit log, 280show audit syslog, 302show autologout, 28

Strona 282 - CA certificate commands

time settings, 198timezone set, 321TLS, 180tools, installation, 27Traceroute Information section, 109traceroute run, 295transfer audit log, 280transfe

Strona 283 - Secure Key Manager 283

Installing and replacing hardware36

Strona 284

2 Configuring the systemStarting the SKM applianceNOTE:To prepare to configure the system, have ready all information listed on the pre-install survey

Strona 285 - Secure Key Manager 285

5. Follow the prompts to enter the necessary information:TIP:Press Enter to accept the default.a. Admin account password. The Security Officer will us

Strona 286 - Certificate commands

6. Configure the default settings for the key replication interval and retry attempts.NOTE:These commands require firmware version 1.1 or greater.a. L

Strona 287

Creating and installing the SKM Server Certificate ... 47Propagating third-party certif

Strona 288

If you are replacing an SKM appliance or adding a member to an existing cluster, skip to Establishinga cluster.The configurations in this step are per

Strona 289 - CRL commands

6. Add the Local CA to the Trusted CAs list.a. In Certificates & CAs, click Trusted CA Lists to display the Trusted Certificate Authority ListProf

Strona 290

3. Enter information required by the Create Certificate Request section of the window to create theSKM server certificate.a. Enter a Certificate Name

Strona 291 - Secure Key Manager 291

10. Enter data required by the Sign Certificate Request section of the window.a. Select the CA name from the Sign with Certificate Authority drop down

Strona 292 - Client event log commands

3. In the KMS Server Settings section of the window, click Edit. The following warning may display.4. Configure the KMS Server Settings as shown. (Ens

Strona 293

1. From the SKM management console, click the Device tab.2. In the Device Configuration menu, click Cluster.3. Type the cluster password in the Create

Strona 294 - Diagnostic commands

2. If you skipped Creating the cluster, retrieve the cluster key text file now. To do so, select theCluster Settings section of the window, click Down

Strona 295 - FIPS commands

6. Join the appliance to the cluster.a. Select the Device tab.b. In the Device Configuration menu, click on Cluster.c. In the Cluster, click on Join C

Strona 296

8. Click on the SKM Local CA.9. Click Sign Request.10. Enter information required in the Sign Certificate Request section of the window as shown:a. In

Strona 297 - Secure Key Manager 297

6. Click Select None.7. Click Continue.8. In the Create Backup screen, type a name, description, and password for the certificate backup.9. Select Dow

Strona 298 - History commands

Viewing the FIPS status report ... 67KMS server procedures

Strona 299 - Log commands

Configuring the system50

Strona 300

3 Performing configuration and operationtasksKey and policy proceduresCreating a keyTo create a key:1. Log in to the Management Console as an administ

Strona 301 - Secure Key Manager 301

4. Enter a value in the Owner Username field to assign a specific owner or leave this value blankto create a global key. If an owner is listed for the

Strona 302

4. Click Download Public Key to download the public portion of the RSA key.Deleting a keyTo delete a key:1. Log in to the Management Console as an adm

Strona 303 - Mode commands

User and group proceduresNOTE:User accounts and groups can be managed locally on the SKM and shared among clustered nodes.This is the preferred method

Strona 304 - Network commands

2. Navigate to the Local Groups section of the User & Group Configuration page (Security > LocalUsers & Groups).3. Select a Group and click

Strona 305 - Secure Key Manager 305

LDAP server proceduresSetting up the LDAP user directoryTo set up the LDAP user directory:1. Log in to the Management Console as an administrator with

Strona 306

2. Navigate to the LDAP Failover Server Properties section of the LDAP Server Configuration page(Security > LDAP > LDAP Server).3. Click Edit.4.

Strona 307 - Secure Key Manager 307

NOTE:To generate a valid certificate, you must have a certificate authority sign a certificate request. Youcan create local CAs on the SKM, and use th

Strona 308

7. Navigate to the Local Certificate Authority List section.8. Select a CA and click Sign Request.9. Paste the certificate request into the Certificat

Strona 309 - Services commands

Enabling signed logs ... 90Verifying a secure l

Strona 310

6. Copy the certificate request text. The certificate text looks similar, but not identical, to the followingtext.-----BEGIN CERTIFICATE REQUEST-----M

Strona 311 - SNMP commands

IMPORTANT:A self-signed certificate should be used for testing purposes only. Any attempt to connect with anSKM using a test self-signed certificate s

Strona 312

6. Click Save.The SKM verifies the validity of the newly installed certificate. If determined to be valid, thecertificate appears as “Certificate Acti

Strona 313

Certificate Authority (CA) proceduresAdding a CA certificate to the trusted CA listTo add a CA certificate to the trusted CA list:1. Log in to the Man

Strona 314

Deleting a trusted CA list profileTo delete a trusted certificate authority list profile:1. Log in to the Management Console as an administrator with

Strona 315 - Secure Key Manager 315

2. Navigate to the Local Certificate Authority List section of the Certificate and CA Configurationpage (Security > Local CAs).3. Select a certific

Strona 316 - SSL commands

4. Select Intermediate CA Request as the Certificate Authority Type.5. Click Create. The new request appears in the Local Certificate Authority List s

Strona 317

2. Navigate to the Install CA Certificate section of the Certificate and CA Configuration page(Security > Known CAs).3. Enter a value for the Certi

Strona 318 - Statistics commands

KMS server proceduresThe KMS server is the firmware component of the SKM server that manages communications betweenthe SKM and the clients. This secti

Strona 319 - System commands

Enabling password authenticationTo enable password authentication:1. Log in to the Management Console as an administrator with KMS Server access contr

Strona 320

Accessing the Help system ... 120Using the Key and Polic

Strona 321

Clustering proceduresCreating a clusterYou create a cluster on one SKM and then join other members to that cluster. To create a cluster:1. Select an S

Strona 322 - System health commands

4. Click Synchronize With and confirm this action. As part of the synchronization, the KMS Serverwill create an automatic synchronization backup befor

Strona 323 - System log commands

Upgrading a clusterA cluster can be upgraded by upgrading one device at a time. Once all of the devices are runningthe new software, you can configure

Strona 324

2. Navigate to the NTP Settings section of the Date & Time Configuration page (Device > Date &Time).3. Click Edit.4. Select Enable NTP.5. E

Strona 325 - D Troubleshooting

7. Repeat steps 3 through 6 as needed.8. Click Edit on the IP Authorization Settings section.9. For each service select either Allow All Connections t

Strona 326 - Troubleshooting326

1. Configure the agent at the SNMP Agent Settings section.2. Create an SNMPv3 username at the SNMPv3 Username List section to enable the NMS to access

Strona 327 - FCC rating label

5. If using SSL, select Use SSL and enter the Trusted Certificate Authority.6. Enter the number of seconds to wait for the LDAP server during connecti

Strona 328 - Class A equipment

3. Click LDAP Test.Password management proceduresChanging your passwordTo change your administrator account password:1. Log in to the Management Conso

Strona 329 - Japanese notices

access to the SKM configuration is secured but not in a haphazard manner. It is best to have adocumented procedure in place to handle such a situation

Strona 330 - Taiwanese notices

1. Log in to the Management Console as an administrator with High Access Administrator accesscontrol. This is the administrator that will grant creden

Strona 331 - Laser compliance notices

Support for Certificate Revocation Lists ... 167Local CAs ...

Strona 332 - Italian laser notice

6. Click Sign Request. This will take you to the CA Certificate Information section where the certificateis displayed in PEM format.7. Click the Downl

Strona 333 - Recycling notices

5. Click Save.NOTE:This feature is immediately enabled when you select Web Admin User Authentication. Youwill be logged out of the Management Console

Strona 334 - Dutch notice

2. Determine the Key Sharing Group.a. From the filtered list of keys, choose the one with the most recent timestamp (the numbersequence at the end of

Strona 335 - German notice

3. Export (backup) the key.a. From the Device tab, in the Maintenance menu on the left, select Backup & Restore, thenselect Create Backup to displ

Strona 336 - Latvian notice

Figure 7 Entering backup informationi. Click Backup.A message displays when the backup is complete. The backup operation should take a fewseconds.4. S

Strona 337 - Romanian notice

5. Import (restore) the backup file to Cluster #2a. On the SKM, from the Device Tab, in the Maintenance menu on the left, select Backup &Restore,

Strona 338 - Turkish notice

6. Restart the SKM software.NOTE:Following a restore, the SKM must be restarted.a. From the SKM Device tab, in the Maintenance menu, select Services.b

Strona 339 - Battery replacement notices

8. Ensure that the key sharing group has been added.a. From the SKM interface, Security tab, Users and LDAP Menu, select Local Users and Groups.b. Ver

Strona 340 - German battery notice

3. In the Keys field, select No keys.4. Click Continue.5. In the Device Items field, click Select All.6. Click Continue.7. In the Backup Summary secti

Strona 341 - Japanese battery notice

1. From the SKM interface on the Device tab, in the Maintenance menu, select Backup Restore, thenCreate Backup.2. In the Create Backup pane, in the Se

Strona 342 - Spanish battery notice

Hostname Setting ... 205DNS Server List ...

Strona 343 - F Specifications

1. Log in to the Management Console as an administrator with Logging access control.2. Navigate to the Log Configuration page (Device > Log Configu

Strona 344

3. Double-click on the file. Outlook Express will open and display a help screen with a securityheader that reads: “Digitally signed - signing digital

Strona 345 - Glossary

Recreating the log signing certificatePrior to creating a new log signing certificate, backup the old certificate so you can verify previouslysigned l

Strona 346 - Glossary346

Clearing a logTo clear a log:1. Log in to the Management Console as an administrator with Logging access control.2. Navigate to the Log Viewer page (D

Strona 347

Performing configuration and operation tasks94

Strona 348

4 Maintaining the SKMBackup and restore overviewClustering SKM nodes is an effective way of exchanging keys and configuration data to allow forfailove

Strona 349

If one of these objects is being restored on a device where there is already a similar object with thesame name, the key, certificate, or local CA fro

Strona 350

Figure 14 Viewing the Create Backup: Security Items sectionThe following table describes the components of the Create Backup: Security Items section.T

Strona 351

DescriptionComponentsClick Continue to configure the next group of items.ContinueCreate Backup: Device ItemsUse this section to select the device item

Strona 352

Figure 16 Viewing the Create Backup: Backup Settings sectionThe following table describes the components of the Create Backup: Backup Settings section

Komentarze do niniejszej Instrukcji

Brak uwag