HP StorageWorks
Secure Key Manager
users guide
AJ087-96011
Part number: AJ087–96011
nd edition: November 2008
2
Legal and notice information
© Copyright 2007-2008 Hewlett-Packard Development Company, I.E.
© Copyright 2000, 2008 Ingrian Networks, Inc.
Confi dential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and
12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed
to the U.S. Government under vendor’s standard commercial license.
The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth
in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting
an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
Compaq Computer Corporation is a wholly-owned subsidiary of Hewlett-Packard Company.
Adobe® and Acrobat® are trademarks of Adobe Systems Incorporated.
Intel, Itanium, Pentium, Intel Inside, and the Intel Inside logo are trademarks or registered trademarks of Intel Corporation or its
subsidiaries in the United States and other countries.
Microsoft, Windows, Windows XP, and Windows NT are U.S. registered trademarks of Microsoft Corporation.
Microsoft, Windows, Windows NT, and Windows XP are U.S. registered trademarks of Microsoft Corporation.
Java is a US trademark of Sun Microsystems, Inc.
Oracle® is a registered U.S. trademark of Oracle Corporation, Redwood City, California.
UNIX® is a registered trademark of The Open Group.
Contents
1Installingandreplac inghar dwar e................. 2 1
Preparingfortheinstallation................................. 21
Toolsforinstallation .................................. 21
TakingESDprecautions................................. 21
Groundingmethodstopreventelectrostaticdischarge.................... 21
Rackplanningresources .................................. 22
Rackrequirements................................... 22
Rackwarnings .................................... 22
Optimumenvironment ................................... 23
Space and airfl owrequirements ............................. 23
Temperaturerequirements................................ 23
Powerrequirements .................................. 24
Electricalgroundingrequirements ............................ 24
Unpacking ........................................ 25
Identifyingtheshippingcartoncontents............................ 25
Selectingaracklocation .................................. 26
RemovinganexistingSKM(appliance)fromthesystem ..................... 27
Installingtherailsintherack ................................ 27
Attachingrailstotheappliance ............................... 28
Installingtheapplianceintherack.............................. 28
Attachingthecables.................................... 28
2Configuring the system . . . . ................... 3 1
StartingtheSKMappliance................................. 31
Confi guring the fi rstSKMappliance ............................. 33
Setting up the local Certifi cateAuthority(CA) ....................... 34
Creating the SKM server certifi cate............................ 35
EnablingSSLontheKeyManagementSystem(KMS)Server ................. 37
Establishingacluster.................................... 37
Creatingthecluster .................................. 38
Copying the Local CA certifi cate............................. 38
Adding SKM appliances to the cluster . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Creating and installing the SKM Server Certifi cate ..................... 40
Propagating third-party certifi cates.............................. 41
Copying the certifi cates................................. 41
Installing the certifi cates ................................ 42
EnrollingclientdeviceswiththeSKM............................. 42
Verifying that installation and initial confi gurationissuccessful .................. 42
3Performingconfigur ationandoperationtasks ............ 4 3
Keyandpolicyprocedures ................................. 43
Creatingakey .................................... 43
Importingakey.................................... 43
Settinggrouppermissionsforakey............................ 44
DownloadinganRSAkey................................ 44
Deletingakey..................................... 44
Authorizationpolicyprocedures ............................... 45
Creatinganauthorizationpolicy............................. 45
Deletinganauthorizationpolicy ............................. 45
Userandgroupprocedures................................. 45
Secure Key Manager
3
Creatingauser .................................... 45
Creatingagroup ................................... 46
Addingausertoagroup................................ 46
Removingauserfromagroup.............................. 46
Deletingauser .................................... 46
Deletingagroup ................................... 47
LDAPserverprocedures................................... 47
SettinguptheLDAPuserdirectory ............................ 47
TestingtheLDAPuserdirectoryconnection......................... 47
SettinguptheLDAPschema............................... 47
SettingupanLDAPfailoverserver ............................ 48
TestingtheLDAPfailoverserverconnection ........................ 48
Certifi cateprocedures ................................... 48
Creating a certifi caterequest .............................. 48
Creating a server certifi catefortheSKM ......................... 48
Creating a client certifi cate ............................... 50
Creating a self-signed certifi cate............................. 51
Installing a certifi cate.................................. 51
Installing a certifi catechain............................... 52
Downloading a certifi cate................................ 52
Certifi cateAuthority(CA)procedures............................. 53
Adding a CA certifi catetothetrustedCAlist ....................... 53
Removing a CA certifi catefromthetrustedCAlist ..................... 53
Creating a new trusted CA list profi le........................... 53
Deleting a trusted CA list profi le ............................. 54
Signing certifi caterequestswithalocalCA ........................ 54
Viewing the certifi catessignedbyalocalCA ....................... 54
DownloadingalocalCA................................ 54
DeletingalocalCA .................................. 55
CreatingalocalCA.................................. 55
Creatingaself-signedrootCA.............................. 55
CreatinganintermediateCArequest........................... 55
Installing a CA certifi cate................................ 56
Removing a CA certifi cate ............................... 56
FIPSstatusserverprocedures ................................ 57
EnablingtheFIPSstatusserver.............................. 57
ViewingtheFIPSstatusreport .............................. 57
KMSserverprocedures................................... 57
EnablingSSL ..................................... 57
Enabling key and policy confi gurationbyclientapplications................. 58
EnablingtheLDAPserver................................ 58
Enablingpasswordauthentication ............................ 58
Enabling client certifi cateauthentication.......................... 58
Confi guringtheuseraccountlockoutsettings........................ 59
Clusteringprocedures ................................... 59
Creatingacluster ................................... 59
Joiningacluster.................................... 59
Synchronizingwithaclustermember........................... 60
SettingupSSLinacluster................................ 60
Removingadevicefromacluster............................. 61
Upgradingacluster .................................. 61
Deletingacluster ................................... 61
Dateandtimeprocedures.................................. 61
SettingthedateandtimeontheSKM........................... 61
Confi guringanNTPserverconnection .......................... 62
ManuallysynchronizingwithanNTPserver ........................ 62
IPauthorizationprocedures................................. 62
SpecifyingwhichclientscanconnecttotheSKM...................... 62
SNMPprocedures..................................... 63
Confi guringSNMPv1/v2ontheSKM .......................... 63
4
Confi guringSNMPv3ontheSKM ............................ 63
Administratorprocedures.................................. 64
Creatinganadministrator................................ 64
Deletinganadministrator................................ 64
LDAPAdministratorserverprocedures............................. 64
SettinguptheLDAPadministratorserver ......................... 64
TestingtheLDAPadministratorserverconnection...................... 64
SettinguptheLDAPschema............................... 65
SettinguptheLDAPfailoverserver............................ 65
TestingtheLDAPfailoverserverconnection ........................ 65
Passwordmanagementprocedures.............................. 65
Changingyourpassword................................ 65
Confi guringpasswordsettingsforlocaladministrators.................... 65
Changing passwords when a security offi cerleaves..................... 66
Multiplecredentialsprocedures ............................... 66
Confi guringthemultiplecredentialsfeature ........................ 66
Grantingcredentials.................................. 67
Revokingacredentialgrant............................... 67
Remoteadministrationprocedures .............................. 67
EnablingtheWebAdminUserAuthenticationfeature.................... 67
Signing a certifi cate request and downloading the certifi cate............... 67
Converting a certifi catefromPEMtoPKCS12format .................. 68
Importing a certifi catetoawebbrowser ....................... 68
EnablingWebAdminUserAuthenticationontheSKM ................. 68
Backup procedures for keys, confi gurations, and certifi cates ................... 69
Importingandexportingkeysbetweenclusters....................... 69
Backing up confi gurations and certifi catestoexternalserver,thentoCD............ 76
Backingupkeystoexternalserver,thentoDVD ...................... 78
Log confi gurationprocedures ................................ 80
Confi guringlogrotation ................................ 80
Enablingsyslog.................................... 80
Enablingsignedlogs.................................. 80
VerifyingasecurelogusingMicrosoftOutlook....................... 80
VerifyingasecurelogusingOpenSSL........................... 81
Recreating the log signing certifi cate........................... 82
Logviewprocedures.................................... 82
Viewinganarchivedlog ................................ 82
Manuallyrotatingalog................................. 82
Downloadingalog .................................. 82
Clearingalog .................................... 82
4 Maintaining the SKM ...................... 8 5
Backupandrestoreoverview ................................ 85
Backupandrestorepage.................................. 86
Createbackup .................................... 86
Createbackup:securityitems ............................ 86
CreateBackup:DeviceItems ............................ 87
CreateBackup:BackupSettings........................... 88
RestoreBackup .................................... 89
BackupRestoreInformation ............................... 90
InternalBackupList................................... 91
Services Confi gurationpage ................................ 92
ServicesList...................................... 92
Restart/Halt...................................... 93
SystemInformationpage .................................. 94
DeviceInformation................................... 94
LicenseInformation................................... 94
SoftwareUpgrade/Install................................ 95
Upgradingtoapatchrelease............................ 96
Secure Key Manager
5
Rollingbacksoftware ............................... 96
SystemHealthpage .................................... 96
Refreshpage ..................................... 96
PowerSupplyStatus .................................. 97
CoolingFanStatus................................... 98
NetworkDiagnosticspage ................................. 98
PingInformation.................................... 98
TracerouteInformation ................................. 99
HostInformation.................................... 99
NetstatInformation................................... 99
ReadingNetstatResults............................... 100
ASKMapplianceinf ormationsheet ................. 1 0 1
BUsingtheManagementC onsole.................. 1 03
Logginginandout..................................... 103
UsingtheHometab .................................... 103
Summaryscreen.................................... 103
SecuritySummary................................. 103
SystemSummary ................................. 104
RecentActions .................................. 105
Searchscreen..................................... 105
UsingfeaturescommontotheSecurityandDevicetabs ..................... 106
Filteringsections.................................... 107
Settingthenumberofitemsperpage........................... 107
AccessingtheHelpsystem ............................... 107
Using the Key and Policy Confi gurationscreen......................... 108
Keys......................................... 109
KeyProperties..................................... 111
Versionedkeys .................................... 112
GroupPermissions................................... 113
CustomAttributes ................................... 114
KeyVersionsandAvailableUsage............................ 114
RSAPublicKey .................................... 115
CreateQuery..................................... 116
ModifyQuery..................................... 117
CreateKey...................................... 118
CloneKey ...................................... 1 19
ImportKey ...................................... 120
Authorization Policy Confi gurationPage.......................... 122
AuthorizationPolicies................................ 122
AuthorizationPolicyProperties............................ 123
AuthorizedUsagePeriods.............................. 124
ActiveVersions .................................... 125
CustomKeyAttributes ................................. 125
Confi guringtheusersandgroups .............................. 126
LocalUsers...................................... 127
UserAdministrationPermission............................ 127
SelectedLocalUser .................................. 128
CustomAttributes ................................... 128
LocalGroups ..................................... 129
LocalGroupProperties................................. 130
UserList ....................................... 130
LDAP Server Confi guration ............................... 131
LDAPUserDirectoryProperties............................ 131
LDAPSchemaProperties .............................. 132
LDAPFailoverServerProperties ........................... 133
LDAP User & Group Confi guration............................ 134
LDAPUsers.................................... 134
6
LDAPGroups ................................... 135
UserList ..................................... 135
Certifi cate and CA Confi gurationPage............................ 136
Certifi cateList..................................... 136
Certifi cateInformation ................................. 137
Certifi cateInstallation ................................. 139
Self Signed Certifi cate ................................. 140
Create Certifi cateRequest................................ 141
Using the Import Certifi catescreen............................ 142
Using the Certifi cate and CA Confi gurationscreen ....................... 143
Trusted Certifi cate Authority List Profi les .......................... 143
The Default Profi le................................. 144
Trusted Certifi cateAuthorityList ............................. 144
Local Certifi cateAuthority(CA)List............................ 145
CA Certifi cateProperties ................................ 146
Sign Certifi cateRequest................................. 147
Signed Certificates................................... 148
Signed CertificateInformation.............................. 149
CreateLocalCA.................................... 150
CA Certifi cateList ................................... 151
Install CA Certifi cate.................................. 152
Support for Certifi cateRevocationLists ............................ 153
LocalCAs ...................................... 153
Auto-Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
ForcePeriodicUpdate ............................... 154
RelatedCLICommands............................... 154
Usingadvancedsecurityfeatures............................... 155
AdvancedSecurityoverview............................... 155
AdvancedSecurityAccessControl.......................... 155
High Security Confi gurationpage ............................ 156
FIPSCompliance ................................. 156
HighSecuritySettings ............................... 157
Security Settings Confi guredElsewhere ........................ 158
HighSecurityProcedures................................ 159
Confi guringtheSKMforFIPSCompliance....................... 159
Confi guringtheHighSecuritySettingsonanSKM ................... 160
FIPSStatusServeroverview............................... 160
FIPSStatusReport ................................. 161
FIPSStatusServerpage................................. 163
FIPSStatusServerSettings.............................. 163
SSLoverview ..................................... 164
SSLHandshake .................................. 164
SSLSections ..................................... 165
SSLOptions.................................... 165
SSLCipherOrder ................................. 166
Confi guringtheKMSServer................................. 168
Authenticationoverview................................. 168
AuthenticationOptions............................... 168
Key Management Services Confi gurationsections...................... 169
KMSServerSettings ................................ 169
KMSServerAuthenticationSettings.......................... 170
UserAccountLockoutSettings............................ 173
HealthCheckoverview................................. 173
HealthChecksections ................................. 173
HealthCheck................................... 174
Confi guringthecluster ................................... 174
Clusteringoverview .................................. 174
TheClusterKey .................................. 175
Cluster Confi gurationpage ............................... 176
ClusterMembers ................................. 176
Secure Key Manager
7
ClusterSettings .................................. 177
CreateCluster................................... 178
JoinCluster.................................... 179
Confi guringtheDate&Time ................................ 180
NetworkTimeProtocoloverview............................. 180
Date&TimeConfigurationPage............................. 181
DateandTimeSettings............................... 181
NTPSettings ................................... 182
Confi guringthenetwork .................................. 182
NetworkInterfacessections............................... 183
NetworkInterfaceList ............................... 183
Gateways&Routingsections .............................. 183
DefaultGatewayList................................ 183
Examples of Default Gateway Confi gurations ..................... 184
StaticRouteList .................................. 185
Hostname&DNSsections ............................... 186
HostnameSetting ................................. 186
DNSServerList .................................. 187
PortSpeedsections .................................. 187
NetworkInterfacePortSpeed/Duplex......................... 187
IPAuthorizationsections ................................ 188
IPAuthorizationSettings .............................. 188
AllowedClientIPAddresses............................. 189
Confi guringSNMP..................................... 190
SNMPoverview.................................... 190
Authentication................................... 191
The SNMP Confi gurationpage ............................. 192
SNMPAgentSettings ............................... 192
SNMPv1/SNMPv2CommunityList.......................... 193
SNMPv3UsernameList............................... 194
SNMPManagementStationList ........................... 195
SNMPManagementStationProperties ........................ 196
CreateSNMPManagementStation ......................... 197
EnterpriseMIBoverview ................................ 199
Confi guringadministratoraccounts.............................. 200
Administratoroverview................................. 201
Accesscontrols .................................. 201
Usingmultipleadministratoraccounts......................... 202
HighAccessAdministrators............................. 202
DefaultAdministrator................................ 202
LocalandLDAPAdministrators............................ 202
Administratorpasswords .............................. 202
LDAPadministrators .................................. 203
LDAPadministrativeserver ............................... 203
Administratorprocedures................................ 204
Creatinganadministrator.............................. 204
Deletinganadministrator.............................. 204
CreateLDAPAdministrator ............................. 205
SelectLDAPUsername ............................... 207
PasswordManagementoverview............................. 207
Passwordconstraints................................ 207
PasswordManagementsections ............................. 209
ChangeYourPasswordsection............................ 209
PasswordSettingsforLocalAdministrators....................... 209
MultipleCredentialsoverview.............................. 211
Operationsrequiringmultipleauthentication...................... 211
MultipleCredentialssections .............................. 213
MultipleCredentialsforKeyAdministration ...................... 213
CredentialsGranted................................ 214
GrantaCredential................................. 214
8
RemoteAdministrationSettingsoverview ......................... 215
RemoteAdministrationSettingssections.......................... 215
RemoteAdministrationSettings ........................... 216
LDAPAdministratorServer ................................. 218
LDAPAdministratorserverandFIPScompliance ...................... 218
LDAPAdministratorServerPropertiessection........................ 218
LDAPSchemaProperties ................................ 219
LDAPFailoverServerProperties ............................. 220
Viewinglogsandstatistics ................................. 221
Loggingoverview ................................... 221
Logrotation.................................... 221
Securelogs.................................... 224
Log Confi gurationpage ................................ 224
RotationSchedule ................................. 224
LogRotationProperties............................... 225
SyslogSettings .................................. 226
LogSigning.................................... 227
Log Signing Certifi cateInformation.......................... 228
ActivityLogSettings ................................ 229
LogViewerpage ................................... 229
SystemLog.................................... 229
AuditLog..................................... 230
ActivityLog.................................... 231
ClientEventLog.................................. 234
Statisticspage..................................... 235
RefreshStatistics.................................. 236
SystemStatistics.................................. 236
ConnectionStatistics................................ 237
Throughput.................................... 237
LicenseUsage................................... 238
RefreshStatistics(server) .............................. 238
KMSStatistics................................... 239
CUsingtheCommandL ineInterface................. 24 1
Shellcommands...................................... 241
CommandLineInterfacesyntax ............................... 241
Quotingarguments .................................. 241
Escapingcharactersusingbackslash......................... 242
Tabcompletion .................................. 242
Commandshortcuts ................................ 242
Commandsearch ................................. 243
Commandmodes ..................................... 243
Enteringviewmode .................................. 243
Entering confi guremode .............................. 243
Enteringscriptmode................................ 243
Scriptingmode ...................................... 244
Creatingscripts.................................... 244
Manualcreation.................................. 244
Executingscripts.................................. 244
Displayinganddeletingscripts ........................... 245
Installing certifi cates ................................ 245
Enteringpasswords ................................ 245
CLIcommands ...................................... 245
Activitylogcommands................................. 252
Administrator&LDAPcommands ............................ 252
Auditlogcommands.................................. 256
Autologoutcommands ................................. 256
Backupandrestorecommands ............................. 257
CA certifi catecommands................................ 257
Certifi catecommands ................................. 262
Secure Key Manager
9
CRLcommands .................................... 264
Clienteventlogcommands ............................... 267
Deviceresetandrestorecommands ........................... 268
Diagnosticcommands ................................. 269
FIPScommands.................................... 269
Health check confi gurationcommands .......................... 272
Helpcommands.................................... 272
Historycommands................................... 272
Logcommands .................................... 273
Modecommands ................................... 277
Networkcommands .................................. 277
Servicescommands .................................. 282
SNMPcommands................................... 284
SSLcommands .................................... 288
Statisticscommands .................................. 291
Systemcommands................................... 291
Systemhealthcommands................................ 294
Systeminformationcommands.............................. 295
Systemlogcommands ................................. 296
DT ro ubleshooting......................... 2 9 7
ERegula torycompliancenoti ces .................. 29 9
Regulatory compliance identifi cationnumbers ......................... 299
FederalCommunicationsCommissionnotice.......................... 299
FCCratinglabel.................................... 299
ClassAequipment................................. 299
ClassBequipment................................. 299
Declaration of Conformity for products marked with the FCC logo, United States only . . . . . . 300
Modifi cation ..................................... 300
Cables........................................ 300
Canadiannotice(AvisCanadien) .............................. 300
ClassAequipment................................... 300
ClassBequipment................................... 300
EuropeanUnionnotice................................... 300
Japanesenotices ..................................... 301
Koreannotices ...................................... 301
ClassAequipment................................... 301
ClassBequipment................................... 301
Taiwanesenotices..................................... 302
BSMIClassAnotice.................................. 302
Taiwanbatteryrecyclestatement............................. 302
Lasercompliance ..................................... 302
Dutchlasernotice ................................... 303
Frenchlasernotice................................... 303
Germanlasernotice.................................. 303
Italianlasernotice................................... 304
Japaneselasernotice ................................. 304
Spanishlasernotice .................................. 304
Recyclingnotices ..................................... 305
Disposal of waste equipment by users in private household in the European Union . . . . . . . . 305
Dutchnotice ..................................... 305
Czecholslovakiannotice ................................ 305
Estoniannotice .................................... 306
Finnishnotice..................................... 306
Frenchnotice ..................................... 306
Germannotice .................................... 306
Greeknotice ..................................... 307
Hungariannotice ................................... 307
10
Italiannotice ..................................... 307
Latviannotice..................................... 308
Lithuaniannotice ................................... 308
Polishnotice ..................................... 308
Portuguesenotice ................................... 309
Slovakiannotice.................................... 309
Sloveniannotice.................................... 309
Spanishnotice .................................... 310
Swedishnotice .................................... 310
Batteryreplacementnotices................................. 311
Dutchbatterynotice .................................. 311
Frenchbatterynotice.................................. 311
Germanbatterynotice................................. 312
Italianbatterynotice.................................. 312
Japanesebatterynotice................................. 313
Spanishbatterynotice ................................. 313
FSpecifications.......................... 3 1 5
SKM appliance specifi cations................................ 315
Environmental specifi cations................................. 316
GAboutthisguide ........................ 3 1 7
Intendedaudience..................................... 317
Relateddocumentation................................... 317
Documentconventionsandsymbols ............................. 317
Rackstability ....................................... 318
HPtechnicalsupport.................................... 318
Customerselfrepair .................................... 319
Productwarranties..................................... 319
Subscriptionservice .................................... 319
HPwebsites........................................ 319
Documentationfeedback .................................. 319
Gloss ary............................. 32 1
Inde x .............................. 3 2 3
Secure Key Manager
11
Figures
1
Identifythecontentsoftheshippingcarton..................... 26
2
Connect the pow
3
Viewing the Certifi cateResponseField....................... 52
4
Filteringthelistofkeys.............................. 70
5
Exportingthekey................................ 70
6
VerifyingtheBackupSummarysectiontoexportandimportthekey .......... 71
7
Enteringbackupinformation ........................... 71
8
CompletingtheBackupRestoreInformationscreen.................. 73
9
Findingthekeytoforcereplication ........................ 75
10
Toggling t
11
Creating the backup of confi gurations and certifi cates ................ 77
12
Verifying
13
Verifying the Backup Summary section to backup all keys to an external server . . . . . . 79
14
ViewingtheCreateBackup:SecurityItemssection.................. 86
15
ViewingtheCreateBackup:DeviceItemssection .................. 87
16
Viewing
17
ViewingtheRestoreBackupsection ........................ 90
heDeletableproperty.......................... 75
the Backup Summary section to backup the confi gurations and certifi cates . . . 78
theCreateBackup:BackupSettingssection................. 88
ersuppliestoACpowersources .................. 29
18
ViewingtheBackupRestoreInformationsection................... 91
19
ViewingtheInternalBackupListsection ...................... 91
20
21
22
23
24
25
26
27
28
29
30
31
32
33
gtheServicesListsection.......................... 92
Viewin
ViewingtheRestart/Haltsection ......................... 93
ngtheDeviceInformationsection....................... 94
Viewi
ViewingtheLicenseInformationsection ...................... 94
ngtheSoftwareUpgrade/Installsection.................... 95
Viewi
ViewingtheRefreshPagesection ......................... 97
ViewingthePowerSupplyStatussection...................... 97
ViewingtheCoolingFanStatussection....................... 98
ViewingthePingInformationsection........................ 98
ViewingtheTracerouteInformationsection ..................... 99
ViewingtheHostInformationsection........................ 99
ViewingtheNetstatInformationsection ...................... 99
ewingtheNetstatResults............................ 100
Vi
FrontandtopofSKMappliance ......................... 101
12
34
Back of SKM appli
35
ViewingtheAdministratorAuthenticationscreen................... 103
ance............................. 102
36
Viewing the Log
37
ViewingtheSecuritySummarysection....................... 104
38
ViewingtheSystemSummarysection ....................... 104
39
ViewingtheRecentActionssection ........................ 105
40
ViewingtheSearchCriteriasection ........................ 106
41
ViewingtheResultssection............................ 106
42
Viewing the Filter fi elds ............................. 107
43
Viewing the number of items per page fi elds .................... 107
44
Locating b
45
Viewingthecontext-sensitivehelpwindow ..................... 108
46
FindingtheHelplink .............................. 108
47
ViewingtheKeysection ............................. 110
48
ViewingtheKeyPropertiessection......................... 112
49
ViewingtheGroupPermissionssection....................... 113
50
51
gtheCustomAttributessection ....................... 114
Viewin
ViewingtheKeyVersionsandAvailableUsagesection................ 115
outwindow ........................... 103
uttontolaunchcontext-sensitivehelp ................... 108
52
ViewingthePublicKeysection .......................... 115
53 ViewingCreateQuerysection .......................... 116
54
ViewingSavedQueriessection.......................... 117
55
ViewingtheModifyQuerysection ........................ 117
56
ViewingtheCreateKeysection.......................... 118
57
ViewingtheCloneKeysection .......................... 120
58
ViewingtheImportKeysection.......................... 121
59
ViewingtheAuthorizationPoliciessection...................... 123
60
61
62
63
6
65
66
67
wingtheAuthorizationPolicyPropertiessection.................. 123
Vie
ViewingtheAuthorizedUsagePeriodssection.................... 124
ViewingtheActiveVersionssection ........................ 125
ViewingtheCustomKeyAttributessection ..................... 126
4
ViewingtheLocalUserssection.......................... 127
ViewingtheSelectedLocalUsersection ...................... 128
ViewingtheCustomAttributessection ....................... 129
ViewingtheLocalGroupssection......................... 129
68
ViewingtheLocalGroupPropertiessection..................... 130
69
ViewingtheUserListsection ........................... 130
70
ViewingtheLDAPUserDirectoryPropertiessection ................. 131
Secure Key Manager
13
71
ViewingtheLDAPSchemaPropertiessection .................... 132
72
ViewingtheLDAPFailoverServerPropertiessection ................. 133
73
Viewing the LDA
74
ViewingtheLDAPGroupssection......................... 135
75
ViewingtheUserListsection ........................... 136
76
Viewing the Certifi cateListsection......................... 137
77
Viewing the Certifi cateInformationsection ..................... 138
78
Viewing the Certifi cateInstallationsection ..................... 140
79
Viewing the Self Signed Certifi catesection..................... 141
80
Viewing the Create Certifi cateRequestsection ................... 141
81
Viewing the Import Certifi catesection ....................... 142
82
Viewing the Trusted Certifi cate Authority List Profi lessection.............. 144
83
Viewing the Trusted Certifi cateAuthorityListsection ................. 144
84
Viewing the Trusted Certifi cateAuthorityList(EditMode) ............... 145
85
Viewing the Local Certifi cateAuthorityListsection.................. 145
86
Viewing the CA Certifi cateInformationsection ................... 147
87
Viewing the Sign Certifi cateRequestsection .................... 148
88
Viewing the Signed Certifi catessection ...................... 148
PUserssection.......................... 134
89
Viewing the Signed Certifi cateInformationsection.................. 149
90
Viewing the Create Local Certifi cateAuthoritysection ................ 150
91
Viewing the CA Certifi cateListsection....................... 152
92
Viewing the Install CA Certifi catesection...................... 153
93
94
95
96
97
98
99
100
101
102
10
104
3
gtheFIPSCompliancesection ....................... 156
Viewin
ViewingtheHighSecuritySettingssection ..................... 157
Viewing the Security Settings Confi guredElsewheresection.............. 159
ViewingtheFIPSStatusReport:normal....................... 162
ingtheFIPSStatusServerSettingssection ................... 164
View
ViewingtheSSLOptionssection ......................... 166
ViewingtheSSLCipherOrdersection ....................... 167
ViewingtheKMSServerSettingssection...................... 169
ViewingtheKMSServerAuthenticationSettingssection ............... 171
ViewingtheUserAccountLockoutSettingssection.................. 173
ewingtheHealthChecksection......................... 174
Vi
ViewingtheClusterMemberssection ....................... 176
14
105
ViewingtheClusterSettingssection ........................ 177
106
ViewingtheCreateClustersection ........................ 178
107
ViewingtheJoinClustersection.......................... 179
108
ViewingtheDateandTimeSettingssection..................... 181
109
ViewingtheNTPSettingssection ......................... 182
110
ViewingtheNetworkInterfaceListsection ..................... 183
111
ViewingtheDefaultGatewayListsection...................... 184
11 2
Viewing the St
11 3
ViewingtheHostnameSettingsection ....................... 186
11 4
ViewingtheDNSServerListsection........................ 187
11 5
ViewingtheNetworkInterfacePortSpeed/Duplexsection .............. 188
11 6
Viewing the
11 7
ViewingtheAllowedClientIPAddressessection................... 189
11 8
ViewingtheSNMPAgentSettingssection ..................... 192
11 9
ViewingtheSNMPv1/SNMPv2CommunityListsection................ 193
12 0
Viewing t
121
ViewingtheSNMPManagementStationListsection................. 195
12 2
ViewingtheSNMPManagementStationPropertiessection.............. 196
123
ViewingtheCreateSNMPManagementStationsection ............... 198
124
ViewingtheCreateLDAPAdministratorsection ................... 205
12 5
ViewingtheSelectLDAPUsernamesection..................... 207
126
127
gtheChangeYourPasswordsection..................... 209
Viewin
ViewingthePasswordSettingsforLocalAdministratorssection............. 210
aticRouteListsection ........................ 186
IPAuthorizationSettingssection .................... 189
heSNMPv3UsernameListsection..................... 194
12 8
12 9
13 0
131
13 2
13 3
13 4
13 5
13 6
13 7
13 8
13 9
14 0
141
14 2
14 3
ngtheMultipleCredentialsforKeyAdministrationsection ............ 213
Viewi
ViewingtheCredentialsGrantedsection...................... 214
ViewingtheGrantaCredentialsection ...................... 215
ViewingtheRemoteAdministrationSettingssection ................. 216
ViewingLDAPAdministratorServerPropertiessection ................ 219
ViewingLDAPSchemaPropertiessection...................... 220
wingtheLDAPFailoverServerPropertiessection ................. 221
Vie
ViewingtheRotationSchedulesection....................... 224
ViewingtheLogRotationPropertiessection..................... 225
ViewingtheSyslogSettingssection ........................ 227
ViewingtheLogSigningsection ......................... 227
Viewing the Log Signing Certifi cateInformationsection................ 228
ViewingtheActivityLogSettingssection ...................... 229
ViewingtheSystemLogsection.......................... 230
ViewingtheCurrentSystemLogsection ...................... 230
ViewingtheAuditLogsection........................... 231
14 4
ViewingtheCurrentAuditLogsection ....................... 231
Secure Key Manager
15
14 5
ViewingtheActivityLogsection.......................... 233
14 6
ViewingtheCurrentActivityLogsection ...................... 234
147
Viewing the Cli
14 8
ViewingtheCurrentClientEventLogsection .................... 235
14 9
ViewingtheRefreshStatisticssection........................ 236
15 0
ViewingtheSystemStatisticssection........................ 236
151
Viewing the C
152
ViewingtheThroughputsection.......................... 238
15 3
ViewingtheLicenseUsagesection......................... 238
15 4
ViewingtheRefreshStatisticssection........................ 239
15 5
Viewing th
entEventLogsection........................ 235
onnectionStatisticssection...................... 237
eKMSStatisticssection......................... 240
16
Tables
1
2
3
4
5
CreateBackup:SecurityItemssectioncomponents.................. 87
CreateBackup:DeviceItemssectioncomponents .................. 88
CreateBackup:BackupSettingssectioncomponents................. 89
RestoreBackupsectioncomponents ........................ 90
InternalBackupListsectioncomponents ...................... 91
6
Internal Ba
7
ServicesListsectioncomponents ......................... 93
8
Restart/H
9
DeviceInformationsectioncomponents....................... 94
10
LicenseInformationsectioncomponents ...................... 95
11
SoftwareUpgrade/Installsectioncomponents.................... 95
12
Refresh
13
PowerSupplyStatussectioncomponents...................... 97
14
Coolin
15
PingInformationsectioncomponents........................ 98
16
Tracer
17
HostInformationsectioncomponents ....................... 99
18
NetstatInformationsectioncomponents ...................... 100
19
NetstatHeadings................................ 100
20
AdministratorAuthenticationscreencomponents................... 103
21SystemSummarysectioncomponents ....................... 105
ckupListsectioncomponents ...................... 92
altsectioncomponents ......................... 93
Pagesectioncomponents ......................... 97
gFanStatussectioncomponents ...................... 98
outeInformationsectioncomponents..................... 99
22
RecentActionssectioncomponents ........................ 105
23
SearchCriteriasectioncomponents ........................ 106
24
25
2
27
28 KeyPropertiessectioncomponents ........................ 112
29 GroupPermissionssectioncomponents....................... 113
30
32
33 CreateQuerysectioncomponents......................... 116
sultssectioncomponents............................ 106
Re
Filter fi eldscomponents ............................. 107
6
Items Per Page fi eldscomponents ......................... 107
Keyssectioncomponents............................. 111
CustomAttributessectioncomponents ....................... 114
31
KeyVersionsandAvailableUsagesectioncomponents................ 115
PublicKeysectioncomponents .......................... 115
Secure Key Manager
17
34
SavedQueriessectioncomponents ........................ 117
35
ModifyQuerysectioncomponents ........................ 118
36 CreateKeysectioncomponents.......................... 1 19
37
CloneKeysectioncomponents .......................... 120
38 ImportKeysectioncomponents.......................... 121
39
AuthorizationPoliciessectioncomponents ..................... 123
40
Authorizat
41
AuthorizationUsagePeriodssectioncomponents .................. 124
ionPolicyPropertiessectioncomponents.................. 123
42ActiveVersionssectioncomponents ........................ 125
43
CustomKeyAttributionssectioncomponents .................... 126
44
Local Use
45
SelectedLocalUsersectioncomponents ...................... 128
46
CustomAttributessectioncomponents ....................... 129
47
LocalGroupssectioncomponents......................... 130
48
LocalGroupPropertiessectioncomponents..................... 130
UserListsectioncomponents ........................... 130
49
50
LDAPUserDirectoryPropertiessectioncomponents ................. 132
51
LDAPSchemaPropertiessectioncomponents .................... 133
52
LDA
53
LDAPUserssectioncomponents.......................... 135
rssectioncomponents.......................... 127
PFailoverServerPropertiessectioncomponents ................. 134
54 LDAPGroupssectioncomponents......................... 135
55
LDAPGroupssectioncomponents......................... 136
56
Certifi cateListsectioncomponents......................... 137
57
Certifi cateInformationsectioncomponents..................... 139
58
Certifi cateInstallationsectioncomponents ..................... 140
59
Self Signed Certifi catesectioncomponents..................... 141
60
Create Certifi cateRequestsectioncomponents ................... 142
61
Import Certifi catesectioncomponents ....................... 143
62
Trusted Certifi cate Authority List Profi lessectioncomponents.............. 144
63
Trusted Certifi cateAuthorityListsectioncomponents ................. 144
64
Trusted Certifi cateAuthorityListComponents .................... 145
65
Local Certifi cateAuthorityListsectioncomponents.................. 146
66
CA Certifi cateInformationsectioncomponents ................... 147
67
Sign Certifi cateRequestsectioncomponents .................... 148
68
Signed Certificatessectioncomponents ...................... 149
69
Create Local Certifi cateAuthoritysectioncomponents ................ 151
70
CA Certifi cateListsectioncomponents....................... 152
71
Install CA Certifi catesectioncomponents...................... 153
18
72
FIPSCompliancesectioncomponents ....................... 157
73
HighSecuritySettingssectioncomponents ..................... 158
74
Security Setti
75
FIPSStatusServertests.............................. 161
76 FIPS Sta tus Re
77
FIPSStatusServerSettingssectioncomponents ................... 164
ngs Confi guredElsewheresectioncomponents.............. 159
portcomponents .......................... 163
78 SSLOptionssectioncomponents ......................... 166
79
SSLCipherOrdersectioncomponents....................... 167
80
KMSServerSettingssectioncomponents...................... 170
81
KMSServerAuthenticationSettingssectioncomponents ............... 172
82
UserAccountLockoutSettingssectioncomponents.................. 173
83
HealthChecksectioncomponents......................... 174
84
ClusterMemberssectioncomponents ....................... 177
85
ClusterSettingssectioncomponents........................ 178
86
CreateClustersectioncomponents ........................ 179
87
JoinClustersectioncomponents.......................... 180
88
DateandTimeSettingssectioncomponents..................... 181
89
NTPSettingssectioncomponents ......................... 182
90
NetworkInterfaceListsectioncomponents ..................... 183
91
DefaultGatewayListsectioncomponents...................... 184
92 StaticRouteListsectioncomponents........................ 186
93 HostnameSettingsectioncomponents....................... 187
94 DNSServerListsectioncomponents........................ 187
95
NetworkInterfacePortSpeed/Duplexsectioncomponents .............. 188
96
IPAuthorizationSettingssectioncomponents .................... 189
97
AllowedClientIPAddressessectioncomponents .................. 190
98
NMPAgentSettingssectioncomponents ..................... 193
S
99
SNMPv1/SNMPv2CommunityListsectioncomponents................ 194
100
SNMPv3UsernameListsectioncomponents .................... 195
101
SNMPManagementStationListsectioncomponents................. 196
102
SNMPManagementStationPropertiessectioncomponents.............. 197
103
CreateSNMPManagementStationsectioncomponents ............... 199
104
CreateLDAPAdministratorsectioncomponents ................... 206
105
SelectLDAPUsernamesectioncomponents..................... 207
106
ChangeYourPasswordsectioncomponents..................... 209
107
PasswordSettingsforLocalAdministratorssectioncomponents............. 210
108
Multiple Credentials for Key Administration section components . . . . . . . . . . . . 214
109
CredentialsGrantedsectioncomponents...................... 214
Secure Key Manager
19
11 0
GrantaCredentialsectioncomponents ...................... 215
111
RemoteAdministrationSettingssectioncomponents ................. 217
11 2
LDAPAdministratorServerPropertiessectioncomponents............... 219
11 3
LDAPSchemaPropertiessectioncomponents .................... 220
11 4
LDAPFailoverServerPropertiessectioncomponents ................. 221
11 5
Log fi lenamingconventions ........................... 222
11 6
RotationSchedulesectioncomponents....................... 225
11 7
LogRotationPropertiessectioncomponents..................... 226
11 8
SyslogSettingssectioncomponents ........................ 227
119 LogSigningsectioncomponents ......................... 228
12 0
Log Signing Certifi cateInformationsectioncomponents................ 229
121
ActivityLogSettingssectioncomponents...................... 229
12 2 S y st e m L o
gsectioncomponents.......................... 230
123CurrentSystemLogsectioncomponents ...................... 230
12 4
AuditLogsectioncomponents .......................... 231
12 5
CurrentAuditLogsectioncomponents....................... 231
126
FieldsintheActivityLog............................. 232
127
ValuesfortheDetailFieldintheActivityLog .................... 233
12 8
ActivityLogsectioncomponents.......................... 233
12 9
CurrentActivityLogsectioncomponents ...................... 234
13 0
FieldsintheClientEventLog........................... 234
131
ClientEventLogsectioncomponents........................ 235
13 2
CurrentClientEventLogsectioncomponents .................... 235
13 3
RefreshStatisticssectioncomponents........................ 236
temStatisticssectioncomponents........................ 237
Sys
13 4
135ConnectionStatisticssectioncomponents...................... 237
13 6
Throughputsectioncomponents.......................... 238
137 LicenseUsagesectioncomponents ........................ 238
8
13
RefreshStatisticssectioncomponents........................ 239
20
13 9
KMSStatisticssectioncomponents......................... 240
14 0
ListofCLIcommands .............................. 245
141
clocksetsyntaxdetails ............................. 294
14 2
Commonproblems ............................... 297
Documentconventions.............................. 317
14 3
1 Installing and replacing
hardware
This section details the steps to install or replace the SKM hardware:
• Preparing for the installation
• Rack planning resources
•Optimumenvironment
• Unpacking
• Identifying the shipping carton contents
• Removing the existing appliance
• Install rails in the rack
Preparing for the installation
Tools for installation
• Two people
• #2 Phillips screwdriver
• Box cutting knife
• Laptop or PC that can be attached to the appliance using the null modem cable for the initial
confi guration.
Taking ESD precautions
To prevent damaging the system, be aware of the precautions you need to follow when setting up the
system or handling parts. A discharge of static electricity from a fi nger or other conductor may damage
system boards or other static-sensitive devices. This type of damage may reduce the life expectancy of
the device.
To preve
• Avoid hand contact by transporting and storing products in static-safe containers.
• Keep electrostatic-sensitive parts in their containers until they arrive at static-free workstations.
• Place p
• Avoid touching pins, leads, or circuitry.
• Always be properly grounded when touching a static-sensitive component or assembly.
nt electrostatic damage:
arts on a grounded surface before removing them from their containers.
Grounding methods to prevent electrostatic discharge
Several methods are used for grounding. Use one or more of the following methods when handling or
installing electrostatic-sensitive parts:
• Use a wrist strap connected by a ground cord to a grounded workstation or computer chassis.
Wrist straps are fl exible straps with a minimum of 1 megaohm ±10 percent resistance in the
ground cords. To provide proper ground, wear the strap snug against the skin.
• Use heel straps, toe straps, or boot straps at standing workstations.
Wear the straps on both feet when standing on conductive fl oors or dissipating fl oor mats.
• Use conductive fi eld service tools.
Secure Key Manager
21
• Use a portable fi eld service kit with a folding static-dissipating work mat.
If you do not have any of the suggested equipment for proper grounding, have an authorized reseller
install the part.
For more information on static electricity or assistance with product installation, contact your authorized
reseller.
Rack planning r
The rack resource kit ships with all HP or Compaq branded 9000, 10000, and H9 series racks. A
summary of the content of each resource follows:
• Custom Builde
can be created using:
•Asimple,guidedinterface
•Build-it-yo
• The Installing Rack Products video provides a visual overview of operations required for
confi guring a rack with rack-mountable components. It also provides the following important
confi guration steps:
• Planning the site
•Installin
•Cablingserversinarack
• Coupling multiple racks
• The Rack P
HP and Compaq branded racks and rack options. It also helps you set up and optimize a rack
in a manner that best fi ts your environment.
Rack requirements
HP supports the HP System E racks and the HP 10000 Series racks for use with the SKM. Other racks
mightalsobesuitable,buthavenotbeentestedwiththeSKM.
g rack servers and rack options
roducts Documentation CD enables you to view, search, and print documentation for
esources
r is a web-based service for confi guring one or many racks. Rack confi gurations
urself model
NOTE:
If desired, when installing an SKM expansion unit, place it in a different rack from the other SKM
appliances as far away from each other as possible to minimize the chance that they will both be
disabled by the same physical or electrical event.
Rack warnings
WARNING!
To reduce the risk of personal injury or damage to the equipment, be sure that:
• The leveling jacks are extended to the fl oor.
• The full weight of the rack rests on the leveling jacks.
• The stabilizing feet are attached to the rack if it is a single-rack installation.
• The racks are coupled together in multiple-rack installations.
• Only one component is extended at a time. A rack may become unstable if more than one
component is extended for any reason.
22
Installing and replacing hardware
WARNING!
To reduce the risk of personal injury or equipment damage when unloading a rack:
• At least two people are needed to safely unload a rack from a pallet. An empty 42U rack can weigh
as much as 115 kg (253 lb), can stand more than 2.1 m (7 ft) tall, and may become unstable when
being moved on its casters.
• Never stand in front of a rack when it is rolling down the ramp from the pallet. Always handle a
rack from both sides.
Optimum environment
When installing an SKM in a rack, select a location that meets the environmental standards described
in this section and Environmental specifi cations .
Space and airfl ow requirements
To allow for servicing and adequate airfl ow, observe the following space and airfl ow requirements
when deciding where to install a rack:
• Leave a minimum clearance of 122 cm (48 in) in front of the rack.
• Leave a minimum clearance of 76.2 cm (30 in) behind the rack.
• Leave a minimum clearance of 122 cm (48 in) from the back of the rack to the back of another
rack when racks are back-to-back.
An SKM draws in cool air through the front door and expels warm air through the rear door. Therefore,
the front and rear rack doors must be adequately ventilated to allow ambient room air to enter the cabinet,
and the rear door must be adequately ventilated to allow the warm air to escape from the cabinet.
CAUTION:
To prevent improper cooling and damage to the equipment, do not block the ventilation openings.
When vertical space in the rack is not fi lled by an SKM or rack component, the gaps between the
components cause changes in airfl ow through the rack and across the servers. Cover all gaps with
blanking panels to maintain proper airfl ow. Using a rack without blanking panels results in improper
cooling
The Comp
and rea
CAUTION:
If a third-party rack is used, observe the following additional requirements to ensure adequate airfl ow
and to prevent damage to the equipment:
• Front and rear doors—If the 42U rack includes closing front and rear doors, you must allow
• Side—The clearance between the installed rack component and the side panels of the rack must
that can lead to thermal damage.
aq 10000 Series racks provide proper SKM cooling from fl ow-through perforations in the front
r doors that provide 64 percent open area for ventilation.
5,350 sq cm (830 sq in) of holes evenly distributed from top to bottom to permit adequate airfl ow
(equivalent to the required 64 percent open area for ventilation).
be a minimum of 7 cm (2.75 in).
Temperature requirements
To ensure continued safe and reliable equipment operation, install or position the system in a
well-ventilated, climate-controlled environment.
Secure Key Manager
23
The maximum recommended ambient operating temperature (TMRA) for the SKM system is 35° C (95° F).
The temperature in the room where the rack is located must not exceed 35° C (95° F).
CAUTION:
To reduce the risk of damage to the equipment when installing third-party options:
• Do not permit optional equipment to impede airfl ow around the SKM or to increase the internal rack
temperature beyond the maximum allowable limits.
• Do not exceed the TMRA.
Power requirements
Installation of an SKM must comply with local and regional electrical regulations governing the installation
of information technology equipment by licensed electricians. This equipment is designed to operate in
installations covered by NFPA 70, 1999 Edition (National Electric Code) and NFPA-75, 1992 (code for
Protection of Electronic Computer/Data Processing Equipment). For electrical power ratings on options,
see the product rating label or the user documentation supplied with that option.
WARNING!
To reduce the risk of personal injury, fi re, or damage to the equipment, do not overload the AC supply
branch circuit that provides power to the rack. Consult the electrical authority having jurisdiction over
wiring and installation requirements of your facility.
CAUTION:
Protect the SKM from power fl uctuations and temporary interruptions with a regulating uninterruptible
power supply (UPS). This device protects the hardware from damage caused by power surges and
voltage spikes and keeps the system in operation during a power failure.
When installing an SKM connected to more than one disk array, you may need to use additional power
distribution devices to safely provide power to all devices. Observe the following guidelines:
• Balance the device power load between available AC supply branch circuits.
• Do not allow the overall system AC current load to exceed 80 percent of the branch circuit
AC current rating.
• Do not use common power outlet strips for this equipment.
• Provide a separate electrical circuit for each device.
Electrical grounding requirements
The SKM must be grounded properly for proper operation and safety. In the United States, you must
install the equipment in accordance with NFPA 70, 1999 Edition (National Electric Code), Article 250, as
well as any local and regional building codes. In Canada, you must install the equipment in accordance
with Canadian Standards Association, CSA C22.1, Canadian Electrical Code. In all other countries,
you must install the equipment in accordance with any regional or national electrical wiring codes, such
as the International Electrotechnical Commission (IEC) Code 364, parts 1 through 7. Furthermore, you
must be sure that all power distribution devices used in the installation, such as branch wiring and
receptacles, are listed or certifi ed grounding-type devices.
Because of the high ground-leakage currents associated with multiple SKM and servers connected to the
same power source, HP recommends the use of a power distribution unit (PDU) that is either permanently
wired to the building’s branch circuit or includes a non-detachable cord that is wired to an industrial-style
plug. NEMA locking-style plugs or those complying with IEC 60309 are considered suitable for this
purpose. Using common power outlet strips for an SKM is not recommended.
24
Installing and replacing hardware
Unpacking
Place the shipp
the shipping ca
notify the carr
To unpack the SKM:
1. Open the top of the shipping cartons.
2. Carefully lift the units out of the boxes and remove the packing materials.
3. Place the units on a stable work surface.
NOTE:
Inspect the units for any damage that may have occurred during shipment. If damage is
detected, co
4. Remove the accessory kits and documentation from the shipping cartons. Set them aside for later use.
5. Place shipping materials back into the shipping cartons.
6. Set the shipping cartons aside for later use.
ing carton as close to the installation site as possible. Before unpacking the SKM, inspect
rton for damage that may have occurred during shipment. If you detect any damage,
ier and HP before unpacking the unit.
ntact your authorized service representative.
Identifying the shipping carton contents
A new SKM cluster contains at least two appliances, individually boxed.
NOTE:
Important System ROM updates for new processors
If the
are included in the carton, please disregard them.
,orthe
HP ProLiant Essentials Foundation Pack
Each appliance box contains the items shown in Figure 1 .
Secure Key Manager
25
Figure 1 Identify the contents of the shipping carton
Item
1
2
3
4
5
6D o c u m e n t a t i o n C D
71 U s p a c e r
8
9
Description
Appliance
Power cords (2 — 1 black, 1 gray)
Null modem cable
1U rack mounting hardware kit and documentation
Keys to the bezel (2 sets of 2 keys)
USB key
Completed appliance information sheet,
Pre-installation survey and checklist, and Installation
poster
NOTE:
Ifthisisareplacementappliance,notehowtheunitispackedintheshippingcarton. Handlethe
packing materials carefully so that you can repackage the old appliance using the replacement carton
and packing materials.
CAUTION:
There will be several tamper-evident labels. Do not cut or damage these labels because they are required
for FIPS compliance audits.
Selecting a rack location
Select a rack location that meets the space, airfl ow, temperature, power, and electrical grounding
requirements described in Rack planning resources .
For adequate airfl ow within the rack, use appropriate high airfl ow inserts in rack cabinet doors and
observe industry standard practices for adequate spacing between racks or rows of racks.
NOTE:
Do not in
from op
26
stall an appliance in the bottom unit of the rack; doing so will prevent the locking bezel cover
ening.
Installing and replacing hardware
Removing an exi
sting SKM (appliance) from the system
Skip this step i
1. Zeroize the or
following com
hostname# configure
hostname# reset factory settings zeroize
Confi rm that yo
Allow the system to zeroize the contents of the appliance. During this process the appliance reboots
automatically several times. The process may take several minutes.
2. Halt the syste
Are you ready to begin setup? (y/halt):
Type halt .Afteryouconfirm that you want to halt the system, the appliance begins a shutdown
process. This may take a few minutes and powers off the appliance.
Once the appl
3. Release the p
the appliance.
4. Unlock and open the locking bezel cover.
5. Loosen the thumbscrews on the front bezel to release the appliance from the rack.
6. Close and r
7. Extendtheapplianceoutoftherackuntilthesliderailslockintoplace.
8. With another person, press the inner rail release latches. Pull the appliance out of the rack and set
it on a sta
9. Remove the rails from the original appliance for reuse on the replacement appliance. To do so,
pull out on the tab of the rail that locks the center tab of the appliance, slide the rail forward,
and pull the rail off the appliance.
10. Return t
11 . Skip to Attaching rails to the appliance .
f you are installing a new appliance.
iginal appliance. To do so, sign into the command line interface and enter the
mands:
u wish to perform the zeroize operation.
m. At the end of the zeroize process the system displays the following:
iance has powered itself off it is ready to be removed and packaged for shipment.
ower cables from the strain relief clip. Disconnect the Ethernet and power cables from
e-lock the front bezel and remove the keys.
ble work surface.
he original appliance to HP according to the repackaging instructions sent separately.
Installing the rails in the rack
1. Locate the rail kit.
2. Adjust the outer slide rail to the approximate rack depth.
3. At one side of the rack, align the rail with the holes in the rack. The word Front is engraved on
the front of the rails; the word Rear is engraved on the rear of the rails.
4. Insert the rail into the holes in the rack and press fi rmly until the rail is secure.
Secure Key Manager
27
5. Repeat these steps with the other side rail.
Attaching rails to the appliance
11776
Instal
1. Align one of
so that the
2. Align the holes in the rail with the round tabs on the side of the appliance.
3. Put the rail onto the appliance with the tabs extending into the holes on the side of the rail, then
slidetherailtowardthefrontoftheapplianceuntilthetabsarelockedintotherail.
4. Perform these steps again to install the other rail on the other side of the appliance.
the rails with the left side of the appliance (as you face the front of the appliance)
word “FRONT” on the rail is seen right-side-up and at the front of the node.
11184
lingtheapplianceintherack
1. Align the rails on the appliance with the rails in the rack.
2. Slide the appliance fully into the rack.
ils on the appliance will lock into the rails on the rack. When fully seated against the
The ra
rack, the appliance will also lock into place.
3. With the appliance fully seated in the rack, tighten the thumbscrews just until the bezel is
ed to the rack.
secur
Attaching the cables
1. Connect a standard Ethernet (CAT-5) cable from your local IP network (LAN) to the 10/100/1000
NIC 1 (RJ-45) connector.
WARNING!
To reduce the risk of electric shock, fi re, or damage to the equipment, do not
plug telephone or telecommunications connectors into RJ-45 (NIC) connectors.
28
Installing and replacing hardware
2. Connect the appliance power supplies’ AC power connectors to two separate AC power sources
using the power cables provided (see Figure 2 ).
Figure 2 Connec
3. Use the strain
t the power supplies to AC power sources
relief clip from the hardware kit to secure the power cord to the rack.
4. If this is a replacement appliance, pack the old appliance in the shipping materials for the
replacement appliance. You may need to remove the slide rails and null modem cable from the old
appliance to fi titinthebox.
5. Plug one end o
that you will
f the null modem cable into the serial port. Plug the other end into the laptop or PC
use to confi gure the appliance.
Secure Key Manager
29
30
Installing and replacing hardware