Brocade, the B-wing symbol, BigIron, DCX, Fabric OS, FastIron, IronPoint, IronShield, IronView, IronWare, JetCore, NetIron,
SecureIron, ServerIron, StorageX, and TurboIron are registered trademarks, and DCFM, Extraordinary Networks, and SAN Health
are trademarks of Brocade Communications Systems, Inc., in the United States and/or in other countries. All other brands,
products, or service names are or may be trademarks or service marks of, and are used to identify, products or services of their
respective owners.
Notice: This document is for informational purposes only and does not set forth any warranty, expressed or implied, concerning
any equipment, equipment feature, or service offered or to be offered by Brocade. Brocade reserves the right to make changes to
this document at any time, without notice, and assumes no responsibility for its use. This informational document describes
features that may not be currently available. Contact a Brocade sales office for information on feature and product availability.
Export of technical data contained in this document may require an export license from the United States government.
The authors and Brocade Communications Systems, Inc. shall have no liability or responsibility to any person or entity with
respect to any loss, cost, liability, or damages arising from the information contained in this book or the computer programs that
accompany it.
The product described by this document may contain “open source” software covered by the GNU General Public License or other
open source license agreements. To find out which open source software is included in Brocade products, view the licensing
terms applicable to the open source software, and obtain a copy of the programming source code, please visit
http://www.brocade.com/support/oscd.
Brocade Communications Systems, Incorporated
Corporate and Latin American Headquarters
Brocade Communications Systems, Inc.
1745 Technology Drive
San Jose, CA 95110
Tel: 1-408-333-8000
Fax: 1-408-333-8101
E-mail: info@brocade.com
European Headquarters
Brocade Communications Switzerland Sàrl
Centre Swissair
Tour B - 4ème étage
29, Route de l'Aéroport
Case Postale 105
CH-1215 Genève 15
Switzerland
Tel: +41 22 799 5640
Fax: +41 22 799 5641
E-mail: emea-info@brocade.com
Asia-Pacific Headquarters
Brocade Communications Systems China HK, Ltd.
No. 1 Guanghua Road
Chao Yang District
Units 2718 and 2818
Beijing 100020, China
Tel: +8610 6588 8888
Fax: +8610 6588 9999
E-mail: china-info@brocade.com
Asia-Pacific Headquarters
Brocade Communications Systems Co., Ltd. (Shenzhen WFOE)
Citic Plaza
No. 233 Tian He Road North
Unit 1308 – 13th Floor
Guangzhou, China
Tel: +8620 3891 2000
Fax: +8620 3891 2111
E-mail: china-info@brocade.com
Document History
TitlePublication numberSummary of changesDate
Fabric OS Encryption Administrator’s
Guide
Fabric OS Encryption Administrator’s
Guide
Fabric OS Encryption Administrator’s
Guide
Fabric OS Encryption Administrator’s
Guide
Fabric OS Encryption Administrator’s
Guide
Fabric OS Encryption Administrator’s
Guide
Fabric OS Encryption Administrator’s
Guide
Fabric OS Encryption Administrator’s
Guide
Fabric OS Encryption Administrator’s
Guide
53-1001114-01New document.August 2008
53-1001114-02Revised document to
include additional best
practices.
53-1001114-03Revised document to
include new performance
licensing information.
53-1001201-01Revised document for
Fabric OS version 6.2.0.
53-1001201-02Revised document to
synchronize with DCFM
version 10.1.0.
53-1001201-03Revised document to
incorporate changes to key
manager software
procedures.
53-1001341-01Revised document for Fabric
OS version 6.3.0.
53-1001341-02Revised document to
incorporate support for
Virtual Fabrics, KAC login
information for HP and
Thales key vaults, and other
various updates.
53-1001864-01Revised document for Fabric
OS version 6.4.0. Began the
practice of creating
separate manuals for each
supported Key Manager.
This is the SKM manual.
September 2008
September 2008
November 2008
December 2008
March 2009
July 2009
August 2009
March 2010
Fabric OS Encryption Administrator’s Guideiii
53-1001864-01
.This document is organized to help you find the information that you want as quickly and easily as
possible.
The document contains the following components:
• Chapter 1, “Encryption overview,” provides a task matrix, an overview of the data encryption
switch and the encryption solution, and the terminology used in this document.
• Chapter 2, “Encryption configuration using the Management application” describes how to
configure and manage encryption features using DCFM.
• Chapter 3, “Configuring Brocade encryption using the CLI” describes how to configure and
manage encryption features using the command line interface.
• Chapter 4, “Deployment Scenarios” describes SAN configurations in which encryption may be
deployed.
• Chapter 5, “Best Practices and Special Topics,” summarizes best practices and addresses
special topics relevant to the implementation of encryption features.
• Chapter 6, “Maintenance and Troubleshooting,” provides information on troubleshooting and
the most common commands and procedures to use to diagnose and recover from problems.
• Appendix A, “State and Status Information,” lists the encryption engine security processor (SP)
states, security processor key encryption key (KEK) status information, and encrypted LUN
states.
• Appendix B, “LUN Policies,” provides a DataFort compatibility support matrix for disk and tape
LUNs, and includes LUN policy troubleshooting information.
• Appendix C, “NS-Based Transparent Frame Redirection,” provides a name server (NS)-based
transparent frame redirection interop matrix.
Fabric OS Encryption Administrator’s Guidexiii
53-1001864-01
Supported hardware and software
.The following hardware platforms support data encryption as described in this manual.
• Brocade DCX and DCX-4S with an FS8-18 encryption blade.
• Brocade Encryption Switch.
What’s new in this document
Information about decommissioning a encrypted LUN, hosting disk and tape containers on the
same encryption engine and support for replicated LUN environments is included in this
document..
Document conventions
This section describes text formatting conventions and important notice formats used in this
document.
Text formatting
The narrative-text formatting conventions that are used are as follows:
bold textIdentifies command names
Identifies the names of user-manipulated GUI elements
Identifies keywords and operands
Identifies text to enter at the GUI or CLI
italic textProvides emphasis
Identifies variables
Identifies paths and Internet addresses
Identifies document titles
code textIdentifies CLI output
Identifies command syntax examples
For readability, command names in the narrative portions of this guide are presented in mixed
lettercase: for example, switchShow. In actual examples, command lettercase is often all
lowercase. Otherwise, this manual specifically notes those cases in which a command is case
sensitive.
Command syntax conventions
Command syntax in this manual follows these conventions:
commandCommands are printed in bold.
--option, optionCommand options are printed in bold.
-argument, argArguments.
xivFabric OS Encryption Administrator’s Guide
53-1001864-01
NOTE
ATTENTION
CAUTION
DANGER
[ ]Optional element.
variableVariables are printed in italics. In the help pages, variables are underlined
enclosed in angled brackets < >.
...Repeat the previous element, for example “member[;member...]”
valueFixed values following arguments are printed in plain font. For example,
--show WWN
|Boolean. Elements are exclusive. Example:
\Backslash. Indicates that the line continues through the line break. For
command line input, type the entire line without the backslash.
--show -mode egress | ingress
or
Notes, cautions, and warnings
The following notices and statements are used in this manual. They are listed below in order of
increasing severity of potential hazards.
A note provides a tip, guidance or advice, emphasizes important information, or provides a reference
to related information.
An Attention statement indicates potential damage to hardware or data.
A Caution statement alerts you to situations that can cause damage to hardware, firmware,
software, or data.
A Danger statement indicates conditions or situations that can be potentially lethal or extremely
hazardous to you. Safety labels are also attached directly to products to warn of these conditions
or situations.
Key terms
For definitions specific to Brocade and Fibre Channel, see the technical glossaries on Brocade
Connect. See “Brocade resources” on page xvi for instructions on accessing Brocade Connect.
For definitions specific to this document, see “Terminology” on page 2.
For definitions of SAN-specific terms, visit the Storage Networking Industry Association online
dictionary at:
http://www.snia.org/education/dictionary
Fabric OS Encryption Administrator’s Guidexv
53-1001864-01
Notice to the reader
This document may contain references to the trademarks of the following corporations. These
trademarks are the properties of their respective companies and corporations.
These references are made for informational purposes only.
CorporationReferenced Trademarks and Products
Microsoft CorporationWindows, Windows NT, Internet Explorer
Net AppLifetime Key Manager (LKM)
EMCRSA Key Manager (RKM)
Hewlett PackardSecure Key Manager (SKM)
ThalesThales Encryption Manager for Storage (TEMS)
IBMIBM Tivoli Storage Manager 5.4 (Windows 2003)— Tape backup only, no support for
EMC LegatoLegato Networker 7.4 (Windows 2003 and Red Hat Linux 5.1)
SymantecSymantec Veritas NetBackup 6.5 Enterprise Server (Windows 2003 and Solaris 10)
CommVaultCommvault Galaxy Data Protection 7.0 (Windows 2003)
tape pool
Additional information
This section lists additional Brocade and industry-specific documentation that you might find
helpful.
Brocade resources
To get up-to-the-minute information, go to http://my.brocade.com and register at no cost for a user
ID and password.
For practical discussions about SAN design, implementation, and maintenance, you can obtain
Building SANs with Brocade Fabric Switches through:
http://www.amazon.com
For additional Brocade documentation, visit the Brocade SAN Info Center and click the Resource
Library location:
http://www.brocade.com
Release notes are available on the MyBrocade web site and are also bundled with the Fabric OS
firmware.
Other industry resources
• White papers, online demos, and data sheets are available through the Brocade Web site at
• Best practice guides, white papers, data sheets, and other documentation is available through
the Brocade Partner Web site.
For additional resource information, visit the Technical Committee T11 Web site. This Web site
provides interface standards for high-performance and mass storage applications for Fibre
Channel, storage management, and other applications:
http://www.t11.org
For information about the Fibre Channel industry, visit the Fibre Channel Industry Association Web
site:
http://www.fibrechannel.org
Getting technical help
Contact your switch support supplier for hardware, firmware, and software support, including
product repairs and part ordering. To expedite your call, have the following information available:
1. General Information
• Switch model
• Switch operating system version
• Error numbers and messages received
• supportSave command output
• Detailed description of the problem, including the switch or fabric behavior immediately
following the problem, and specific questions
• Description of any troubleshooting steps already performed and the results
• Serial console and Telnet session logs
• syslog message logs
2. Switch Serial Number
The switch serial number and corresponding bar code are provided on the serial number label,
as illustrated below.:
*FT00X0054E9*
FT00X0054E9
The serial number label is located as follows:
• Brocade Encryption Switch—On the switch ID pull-out tab located inside the chassis on the
port side of the switch on the left.
• Brocade DCX—On the bottom right on the port side of the chassis
• Brocade DCX-4S—On the bottom right on the port side of the chassis, directly above the
cable management comb.
3. World Wide Name (WWN)
Use the licenseIdShow command to display the WWN of the chassis.
Fabric OS Encryption Administrator’s Guidexvii
53-1001864-01
If you cannot use the licenseIdShow command because the switch is inoperable, you can get
the WWN from the same place as the serial number, except for the Brocade DCX. For the
Brocade DCX, access the numbers on the WWN cards by removing the Brocade logo plate at
the top of the non-port side of the chassis.
Document feedback
Quality is our first concern at Brocade and we have made every effort to ensure the accuracy and
completeness of this document. However, if you find an error or an omission, or you think that a
topic needs further development, we want to hear from you. Forward your feedback to:
documentation@brocade.com
Provide the title and version number of the document and as much detail as possible about your
comment, including the topic heading and page number and your suggestions for improvement.
Encrypting data-at-rest provides peace of mind in terms of protecting data from loss or theft, but
very careful planning must be done to ensure encrypted data is handled correctly. Much of the
planning must come from careful evaluation of host application and LUN resources, and of the
path that the data will take to get from one or more hosts to a LUN.
When implementing encryption for data-at-rest, all hosts that access a LUN that is to hold
encrypted data need to be configured for encryption to avoid data corruption. If a host, possibly in
another fabric, writes cleartext to an encrypted LUN, the data on the LUN will be lost. The user
must ensure that all hosts that can access a LUN are configured in the same manner.
Fabric OS Encryption Administrator’s Guide1
53-1001864-01
Terminology
1
Terminology
The following are definitions of terms used extensively in this document.
ciphertext
cleartext
CryptoModule
Data Encryption Key (DEK)
Data Encryption Key Cluster
(DEK Cluster)
Encryption Engine
Encryption Group
Failback
Failover
Group Leader
High Availability Cluster
(HA Cluster)
Encrypted data.
Unencrypted data.
The secure part of an encryption engine that is protected to the FIPS 140-2 level 3
standard. The term CryptoModule is used primarily in the context of FIPS
authentication.
An encryption key generated by the encryption engine. The DEK is used to encrypt
cleartext received from a host before it is sent to a target LUN, and to decrypt that data
when it is retrieved by the host.
A cluster of encryption engines which can host all paths to a LUN and share the same
data encryption key (DEK) set. The encryption engines can be in the same or different
fabrics. DEK clusters enable host MPIO failover.
The entity within a node that performs encryption operations, including the generation
of Data Encryption Keys.
A collection of one or more DEK clusters, HA clusters, or both, which share the same key
vault and device configuration, and is managed as a single group.
In the context of this implementation of encryption, failback refers to behavior after a
failed encryption switch recovers. Devices that were transferred to another switch by
failover processing may automatically be transferred back, or they may be manually
switched back. This is determined as a configuration option.
In the context of this implementation of encryption, failover refers to the automatic
transfer of devices hosted by one encryption switch to another encryption switch within
a high availability cluster (HA cluster).
A group leader is a special node within an encryption group which acts as a group and
cluster manager, and manages and distributes all group-wide and cluster-wide
configurations to all members of the group or cluster.
A collection of peer-level encryption engines that provide failover capabilities within a
fabric.
Key Encryption Key
Link Key
Master Key
Node
Opaque Key Vault
2Fabric OS Encryption Administrator’s Guide
A key used to encrypt and decrypt Data Encryption Keys (DEKs) within encryption
devices so that DEKs are transmitted in a secure manner outside of the encryption
engines, and stored persistently inside key vaults.
A shared secret exchanged between an encryption engine and a FIPS 140-2 level 3
certified key management appliance and key vault. The link key is an Key Encryption
Key (KEK) that is used to encrypt Data Encryption Keys (DEKs) in transit over a secure
connection to and from the key vault. The key management appliance decrypts the
DEKs and stores them encrypted with its own master key.
An Key Encryption Key (KEK) used to encrypt and decrypt DEKs when storing DEKs in
opaque key vaults. There is one master key per encryption group. That means all node
encryption engines within an encryption group use the same master key to encrypt and
decrypt the DEKs.
In terms of encryption, a switch, DCX, or DCX-4S through which users can manage an
encryption engine.
A storage location that provides untrusted key management functionality. Its contents
may be visible to a third party. DEKs in an opaque key vault are stored encrypted in a
master key to protect them.
53-1001864-01
Recovery cards
Redirection zone
Re-keying
Trusted Key Vault
Virtual Initiator
Virtual Target
Terminology
A set of smart cards that contain a backup master key. Each recovery card holds a
portion of the master key. The cards must be gathered and read together from a card
reader attached to a PC running the Brocade SAN Management Application to restore
the master key. Recovery cards may be stored in different locations, making it very
difficult to steal the master key. The cards should not be stored together, as that defeats
the purpose.
When encryption is implemented, data traffic is routed to and from virtual initiators and
virtual targets. Redirection zones are automatically created to enable frame redirection
to the virtual initiators and virtual targets.
Re-keying refers to decrypting data with the current Data Encryption Key (DEK), and
encrypting it with a new DEK. This is done when the security of the current key is
compromised, or when a DEK is configured to expire in a specific time frame. The
re-keying operation can be used to encrypt existing data currently stored as cleartext. In
that case, there is no existing DEK, and the data does not have to be decrypted before it
is encrypted using the new DEK.
Very secure storage on a hardware appliance that establishes a trusted link with the
encryption device for secure exchange of DEKs. DEKs are encrypted with the link for
transit between the encryption device and the hardware appliance. At the hardware
appliance, the DEKs are re-encrypted, using master key created and maintained by
hardware appliance, and then stored in the trusted key vault.
A logical entity that acts as a stand-in for a physical host when communicating with a
physical target LUN.
A logical entity that acts as a stand-in for a physical target LUN when communicating
with a physical host. A virtual target is mapped one to one to a specific physical target.
1
Fabric OS Encryption Administrator’s Guide3
53-1001864-01
The Brocade encryption switch
1
The Brocade encryption switch
The Brocade encryption switch (Figure 1) is a high performance 32 port auto-sensing 8 Gbps Fibre
Channel switch with data cryptographic (encryption/decryption) and data compression capabilities.
The switch is a network-based solution that secures data-at-rest for heterogeneous tape drives,
disk array LUNs, and virtual tape libraries by encrypting the data, using Advanced Encryption
Standard (AES) 256-bit algorithms. Encryption and decryption engines provide in-line encryption
services with up to 96 Gbps throughput for disk I/O (mix of ciphertext and cleartext traffic) and up
to 48 Gbps throughput for tape I/O (mix of ciphertext and cleartext traffic). Refer to “The FS8-18
blade” on page 5 for information about license requirements for 48 Gbps and 96 Gbps bandwidth.
In addition to its 32 Fibre Channel ports, the switch has one RJ45 Gigabit Ethernet (GE)
management port, two RJ45 GE ports for clustering interconnection and re-key synchronization,
one RJ45 Serial console port, and one USB port for serviceability, error logging, and firmware
upgrades.
1
2
3
4
5
6
7
8
Power LED.
Status LED.
RJ45 gigabit Ethernet ports for clustering and centralized management of multiple encryption
switches through a group leader.
Smart card reader.
RJ45 gigabit Ethernet port for the management interface. This interface is used for the secure
connection to the key vault location and to the Data Center Fabric Manager (DCFM).
RJ45 serial console port.
USB port for firmware upgrades and other support services.
Fibre Channel ports (0-31) - 1, 2, 4, or 8 Gbps auto-sensing F, FL, E, EX, or M ports to connect
host servers, SAN disks, SAN tapes, edge switches, or core switches.
FIGURE 1Brocade encryption switch
4Fabric OS Encryption Administrator’s Guide
53-1001864-01
The FS8-18 blade
The FS8-18 blade provides the same features and functionality as the encryption switch. The
FS8-18 blade installs on the Brocade DCX and DCX-4S. Four FS8-18 blades may be installed in a
single DCX or DCX-4S.
Performance licensing
Encryption processing power is scalable, and may be increased by purchasing and installing an
encryption performance license. The base unit Brocade Encryption Switch and FS8-18 Encryption
Blade have a standard capacity of 48 Gbps of encryption processing power. Additional encryption
processing power can be added for disk I/O by purchasing and installing a Disk Advanced
Encryption Performance license. When the performance upgrade license is applied, encryption
processing power of up to 96 Gbps is available. Note that when the license is applied to a DCX or
DCX-4S chassis, it applies to all FS8-18 blades installed on that chassis.
Adding a license
The FS8-18 blade
1
The encryption performance licenses are added just like any other Fabric OS feature license. After
the license is added, the encryption switch, DCX, or DCX-4S with encryption blades installed must
be rebooted for the license to take effect. See the Fabric OS Administrator’s Guide for information
about obtaining and adding licenses.
Licensing best practices
Licenses installed on the switches and blades must have identical performance numbers when
used together in high availability (HA) clusters or data encryption key (DEK) clusters.
Fabric OS Encryption Administrator’s Guide5
53-1001864-01
Recommendation for connectivity
1
Recommendation for connectivity
In order to achieve high performance and throughput, the encryption engines perform what is
referred to as “cut-through” encryption. In simple terms this is achieved by encrypting the data in
data frames on a per frame basis. This enables the encryption engine to buffer only a frame,
encrypt it and send the frame out to the target on write I/Os. For read I/Os the reverse is done. This
puts some constraints on the topology and the container configurations to support acceptable
performance for encrypted and decrypted I/O to and from LUNs, and to support acceptable levels
of scale in terms of the number of LUNs and the number of flows. The topology and container
configuration constraint is stated below:
Care must be taken when connecting the encryption engines to the fabric and configuring
crypto-target containers to be sure that the traffic flow between the host initiator and the physical
storage array LUN through the container flows through only one encryption engine that is hosting
the container. This is to avoid crisscrossing of flows to and from virtual entities; that is, from virtual
targets and virtual initiators on two different encryption engines over the same path.
Although there is considerable flexibility in connecting and configuring the containers for
encryption, the following guidelines are the recommended best practices:
• Host and Storage Array ports that are not involved in any encryption flow can be connected to
any Encryption Engines.
• Recommendations for host and target ports with respect to encryption flows are as follows:
-Only ISLs are connected to the Brocade Encryption Switch encryption engine in order to
-Only host ports are connected to the FS8-18 blade encryption engine. and no ISLs are
Usage limitations
There are usage limitations to be aware of when planning an encryption implementation:
• Special redirection zones are created to handle data that is redirected to an encryption switch
or blade. Quality of Service (QoS) cannot be applied to a redirection zone.
• In order for frame redirection to be applied, regular zones for hosts and targets must be
defined in the effective configuration. Hosts and targets must be zoned together by worldwide
port name (WWPN) rather than worldwide node name (WWNN) in configurations where frame
redirection will be used. If hosts or targets are zoned together using worldwide node name,
frame redirection will not occur properly.
• On tapes written in DataFort format, the encryption switch or blade cannot read and decrypt
files with a block size of one MB or greater.
• Th e To p Talker feature is not compatible wi t h redirection z o n e s. The Top Talker featur e s hould
not be enabled when an encryption switch or blade is present in the fabric.
connect it to the fabric. No devices (initiators and targets) are connected to it.
connected to it.
6Fabric OS Encryption Administrator’s Guide
53-1001864-01
Host
Encryption Switch
Cleartext
DEKs
Ciphertext
based on
AES256-GCM
Ciphertext
based on
AES256-XTS
Disk Storage
Tape Storage
Key Management
System
Ciphertext
Cleartext
Brocade encryption solution overview
The loss of stored private data, trade secrets, intellectual properties, and other sensitive
information through theft or accidental loss of disk or tape media can have widespread negative
consequences for governments, businesses, and individuals. This threat is countered by an
increasing demand from governments and businesses for solutions that create and enforce
policies and procedures that protect stored data. Encryption is a powerful tool for data protection.
Brocade provides an encryption solution that resides in a Storage Area Network (SAN) fabric. This
location, between computers and storage, is ideal for implementing a solution that works
transparently with heterogeneous servers, disk storage subsystems, and tape libraries. Data
entering the SAN from a server is encrypted before it is written to storage. When stored data is
encrypted, theft or loss of storage media does not pose a security threat.
Figure 2 provides a high level view of the Brocade encryption solution. Cleartext is sent from the
server to the encryption engine, where it is encrypted into ciphertext using one of two encryption
algorithms, one for disk storage targets, and one for tape storage targets. The encrypted data
cannot be read without first being decrypted. The key management system is required for
management of the data encryption keys (DEKs) that are generated by the encryption engine, and
used for encrypting and decrypting the data. The key management system is provided by a third
party vendor.
Brocade encryption solution overview
1
FIGURE 2Encryption overview
Fabric OS Encryption Administrator’s Guide7
53-1001864-01
Brocade encryption solution overview
Host
Encryption
Switch
Ciphertext
Cleartext
Virtual
Initiator
Lun
X
Virtual
Target
Fabric 1
Target
1
Data flow from server to storage
The Brocade encryption switch can be introduced into a SAN with minimum disruption, with no
need for SAN reconfiguration, and with no need to reconfigure host applications. Frames sent from
a host and a target LUN are redirected to a virtual target associated with the encryption switch. The
encryption switch then acts as a virtual initiator to forward the frames to the target LUN.
FIGURE 3Frame redirection
8Fabric OS Encryption Administrator’s Guide
53-1001864-01
Node 1
Key Management
System
EE
Node 2
Group Leader
Management Group
EE
Node 3
EE
Node 4
EE
IO Sync LAN
LAN
Data encryption key life cycle management
Data encryption key life cycle management
Data encryption keys (DEKs) are generated by the encryption engine. Data is encrypted and
decrypted using the same DEK, so a DEK must be preserved at least long enough to decrypt the
ciphertext that it created. The length of time data is stored before it is retrieved can vary greatly,
and some data may be stored for years or decades before it is accessed. To be sure the data
remains accessible, DEKs may also need to be stored for years or decades. Key management
systems provide life cycle management for all DEKs created by the encryption engine. Key
management systems are provided by third party vendors.
Figure 4 shows the relationship of the LAN connections to the key vault and between encryption
nodes.
1
FIGURE 4LAN connections to the key vault, and between encryption nodes
Regardless of the length of the life cycle, there are four stages in the life of a DEK, as shown in
Figure 5. A DEK is created by an encryption engine, distributed, and stored in a key vault. The key is
used to encrypt and decrypt data at least once, and possibly many times. A DEK may be configured
to expire in a certain time frame, or it may become compromised. Under those conditions, it must
be used one more time to decrypt the data, and the resulting cleartext is encrypted with a new key
(re-keyed).
Fabric OS Encryption Administrator’s Guide9
53-1001864-01
Data encryption key life cycle management
1
FIGURE 5DEK life cycle
10Fabric OS Encryption Administrator’s Guide
53-1001864-01
Key management systems
Key management systems are available from several vendors. This release supports the following
leading key management systems:
• The NetApp LIfetime Key Manager (LKM) version 4.0 or later.
• The RSA Key Manager (RKM) version 2.1.3 or later, available through EMC.
• The HP Secure Key Manager (SKM) version 1.1 or later, available through Hewlett Packard.
• The Thales Encryption Manager for Storage (TEMS).
Master key management
Communications with opaque key vaults are encrypted using a master key that is created by the
encryption engine on the encryption switch. Currently, this includes the key vaults of all supported
key management systems except NetApp LKM.
Master key generation
Key management systems
1
A master key must be generated by the group leader encryption engine. The master key can be
generated once by the group leader, and propagated to the other members of an encryption group.
Master key backup
It is essential to back up the master key immediately after it is generated. The master key may be
backed up to any of the following,
• To a file as an encrypted key.
• To the key management system as an encrypted key record.
• To a set of recovery smart cards. This option is only available if the switch is managed by the
Data Center Fabric Manager (DFCM), and if a card reader is available for attachment to the
DCFM workstation.
The use of smart cards provides the highest level of security. When smart cards are used, the key is
split and written on up to five cards, and the cards may be kept and stored by up to five individuals,
and all are needed to restore the master key.
Fabric OS Encryption Administrator’s Guide11
53-1001864-01
Support for Virtual Fabrics
NOTE
1
Support for Virtual Fabrics
The Brocade encryption switch does not support the logical switch partitioning capability and can
not be partitioned, but the switch can be connected to any Logical Switch partition or Logical Fabric
using an E-Port.
The FS8-18 encryption blades are supported in only in a default switch partition All FS8-18 blades
must be placed in a default switch partition in DCX or DCX-4S. The encryption resource from
default switch partition/fabric can be shared with other logical switch partitions/fabrics or other
fabrics only through external device sharing using FCR or EX_Ports through a base switch/fabric. A
separate port blade must be used in the base switch/fabric for EX_Port connectivity from the
logical switch partition (default switch partition) of FS8-18 blades and host/target fabrics. The
EX_Port can be on any external FCR switch.
Please refer to Fabric OS Administrator’s Guide for more details on how to configure the DCX and
DCX-4S in virtual fabrics environments including configuration of default switch partition and any
other logical switch partitions.
12Fabric OS Encryption Administrator’s Guide
53-1001864-01
Loading...
+ 218 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.