Restore the image on the boot media - ASA A1K
After installing the new boot media device in your ASA A1K system, you can start the automated boot media recovery process to restore the configuration from the partner node.
During the recovery process, the system checks whether encryption is enabled and determines the type of key encryption in use. If key encryption is enabled, the system guides you through the appropriate steps to restore it.
-
Determine if Onboard Key Manger (OKM) or Eternal Key Manager (EKM) is configured using one of the following methods:
-
You can ask the customer or system administrator if OKM or EKM are enabled.
-
To check if OKM is enabled, use the following command:
security key-manager onboard show
-
To check if EKM is enabled, use the following command:
security key-manager external show
-
-
For OKM, you need the OKM passphrase file contents.
-
For EKM, you need copies of the following files from the partner node:
-
/cfcard/kmip/servers.cfg file.
-
/cfcard/kmip/certs/client.crt file.
-
/cfcard/kmip/certs/client.key file.
-
/cfcard/kmip/certs/CA.pem file.
-
-
From the LOADER prompt, enter the command:
boot_recovery -partner
The screen displays the following message:
Starting boot media recovery (BMR) process. Press Ctrl-C to abort…
-
Monitor the boot media install recovery process.
The process completes and displays the
Installation complete.
message. -
The system checks for encryption and encryption type and displays one of two messages. Depending on what message is displayed, take one of the following actions:
Occasionally, the process may not be able to identify if key manager is configured on the system. It will display an error message, ask if key manager is configured for the system, and then ask what type of key manager is configured. The process will resume after you resolve the issue. Show example of configuration error finding prompts
Error when fetching key manager config from partner ${partner_ip}: ${status} Has key manager been configured on this system Is the key manager onboard
If you see this message… Do this… key manager is not configured. Exiting.
Encryption is not installed on the system. Complete the following steps:
-
Log into the node when the login prompt is displayed and give back the storage:
storage failover giveback -ofnode impaired_node_name
-
Go to step 5 to enable automatic giveback if it was disabled.
key manager is configured.
Go to step 4 to restore the appropriate key manager.
The node access the boot menu and runs:
-
Option 10 for systems with Onboard Key Manager (OKM).
-
Option 11 for systems with External Key Manager (EKM).
-
-
Select the appropriate key manager restoration process.
Onboard Key Manager (OKM)If OKM is detected, the system displays the following message and begins running BootMenu Option 10.
key manager is configured. Entering Bootmenu Option 10... This option must be used only in disaster recovery procedures. Are you sure? (y or n):
-
Enter
Y
at the prompt to confirm you want to start the OKM recovery process. -
Enter the passphrase for onboard key manager when prompted, and enter the passphrase again when prompted, to confirm.
Show example of passphrase prompts
Enter the passphrase for onboard key management: Enter the passphrase again to confirm: Enter the backup data: -----BEGIN PASSPHRASE----- <passphrase_value> -----END PASSPHRASE-----
-
Continue to monitor the recovery process as it restores the appropriate files from the partner node.
When the recovery process is complete, the node will reboot. The following messages indicate a successful recovery:
Trying to recover keymanager secrets.... Setting recovery material for the onboard key manager Recovery secrets set successfully Trying to delete any existing km_onboard.keydb file. Successfully recovered keymanager secrets.
-
When the node reboots, verify the boot media recovery was successful by confirming that the system is back online and operational.
-
Return the impaired controller to normal operation by giving back its storage:
storage failover giveback -ofnode impaired_node_name
-
After the partner node is fully up and serving data, synchronize the OKM keys across the cluster.
security key-manager onboard sync
External Key Manager (EKM)If EKM is detected, the system displays the following message and begins running BootMenu Option 11.
key manager is configured. Entering Bootmenu Option 11...
-
The next step depends on which version of ONTAP your system is running:
If your system is running… Do this… ONTAP 9.16.0
-
Press
Ctlr-C
to exit BootMenu Option 11. -
Press
Ctlr-C
to exit the EKM configuration process and return to the boot menu. -
Select BootMenu Option 8.
-
Reboot the node.
If
AUTOBOOT
is set, the node reboots and uses the configuration files from the partner node.If
AUTOBOOT
is not set, enter the appropriate boot command. The node reboots and uses the configuration files from the partner node. -
Reboot the node so that EKM protects the boot media partition.
-
Proceed to step c.
ONTAP 9.16.1
Proceed to the next step.
-
-
Enter the following EKM configuration setting when prompted:
Action Example Enter the client certificate contents from the
/cfcard/kmip/certs/client.crt
file.Show example of client certificate contents
-----BEGIN CERTIFICATE----- <certificate_value> -----END CERTIFICATE-----
Enter the client key file contents from the
/cfcard/kmip/certs/client.key
file.Show example of client key file contents
-----BEGIN RSA PRIVATE KEY----- <key_value> -----END RSA PRIVATE KEY-----
Enter the KMIP server CA(s) file contents from the
/cfcard/kmip/certs/CA.pem
file.Show example of KMIP server file contents
-----BEGIN CERTIFICATE----- <KMIP_certificate_CA_value> -----END CERTIFICATE-----
Enter the server configuration file contents from the
/cfcard/kmip/servers.cfg
file.Show example of server configuration file contents
xxx.xxx.xxx.xxx:5696.host=xxx.xxx.xxx.xxx xxx.xxx.xxx.xxx:5696.port=5696 xxx.xxx.xxx.xxx:5696.trusted_file=/cfcard/kmip/certs/CA.pem xxx.xxx.xxx.xxx:5696.protocol=KMIP1_4 1xxx.xxx.xxx.xxx:5696.timeout=25 xxx.xxx.xxx.xxx:5696.nbio=1 xxx.xxx.xxx.xxx:5696.cert_file=/cfcard/kmip/certs/client.crt xxx.xxx.xxx.xxx:5696.key_file=/cfcard/kmip/certs/client.key xxx.xxx.xxx.xxx:5696.ciphers="TLSv1.2:kRSA:!CAMELLIA:!IDEA:!RC2:!RC4:!SEED:!eNULL:!aNULL" xxx.xxx.xxx.xxx:5696.verify=true xxx.xxx.xxx.xxx:5696.netapp_keystore_uuid=<id_value>
If prompted, enter the ONTAP Cluster UUID from the partner.
Show example of ONTAP Cluster UUID
Notice: bootarg.mgwd.cluster_uuid is not set or is empty. Do you know the ONTAP Cluster UUID? {y/n} y Enter the ONTAP Cluster UUID: <cluster_uuid_value> System is ready to utilize external key manager(s).
If prompted, enter the temporary network interface and settings for the node.
Show example of a temporary network setting
In order to recover key information, a temporary network interface needs to be configured. Select the network port you want to use (for example, 'e0a') e0M Enter the IP address for port : xxx.xxx.xxx.xxx Enter the netmask for port : xxx.xxx.xxx.xxx Enter IP address of default gateway: xxx.xxx.xxx.xxx Trying to recover keys from key servers.... [discover_versions] [status=SUCCESS reason= message=]
-
Depending on whether the key is successfully restored, take one of the following actions:
-
If the EKM configuration has been successfully restored, the process attempts to restore the appropriate files from the partner node and reboots the node. Go to step d.
Show example of successful 9.16.0 restore messages
kmip2_client: Importing keys from external key server: xxx.xxx.xxx.xxx:5696 [Feb 6 04:57:43]: 0x80cc09000: 0: DEBUG: kmip2::kmipCmds::KmipLocateCmdUtils: [locateMrootAkUuids]:420: Locating local cluster MROOT-AK with keystore UUID: <uuid> [Feb 6 04:57:43]: 0x80cc09000: 0: DEBUG: kmip2::kmipCmds::KmipLocateCmdBase: [doCmdImp]:79: Calling KMIP Locate for the following attributes: [<x-NETAPP-ClusterId, <uuid>>, <x-NETAPP-KeyUsage, MROOT-AK>, <x-NETAPP-KeystoreUuid, <uuid>>, <x-NETAPP-Product, Data ONTAP>] [Feb 6 04:57:44]: 0x80cc09000: 0: DEBUG: kmip2::kmipCmds::KmipLocateCmdBase: [doCmdImp]:84: KMIP Locate executed successfully! [Feb 6 04:57:44]: 0x80cc09000: 0: DEBUG: kmip2::kmipCmds::KmipLocateCmdBase: [setUuidList]:50: UUID returned: <uuid> ... kmip2_client: Successfully imported the keys from external key server: xxx.xxx.xxx.xxx:5696 GEOM_ELI: Device nvd0s4.eli created. GEOM_ELI: Encryption: AES-XTS 256 GEOM_ELI: Crypto: software Feb 06 05:02:37 [_server-name_]: crypto_get_mroot_ak:140 MROOT-AK is requested. Feb 06 05:02:37 [_server-name_]: crypto_get_mroot_ak:162 Returning MROOT-AK.
Show example of successful 9.16.1 restore messages
System is ready to utilize external key manager(s). Trying to recover keys from key servers.... [discover_versions] [status=SUCCESS reason= message=] ... kmip2_client: Successfully imported the keys from external key server: xxx.xxx.xxx.xxx:xxxx Successfully recovered keymanager secrets.
-
If the key is not successfully restored, the system will halt and indicate that it could not restore the key. The error and warning messages are displayed. Rerun the recovery process by entering
boot_recovery -partner
.Show example of key recovery error and warning messages
ERROR: kmip_init: halting this system with encrypted mroot... WARNING: kmip_init: authentication keys might not be available. ******************************************************** * A T T E N T I O N * * * * System cannot connect to key managers. * * * ******************************************************** ERROR: kmip_init: halting this system with encrypted mroot... . Terminated Uptime: 11m32s System halting... LOADER-B>
-
-
When the node reboots, verify that the boot media recovery was successful by confirming that the system is back online and operational.
-
Return the controller to normal operation by giving back its storage:
storage failover giveback -ofnode impaired_node_name
.
-
-
If automatic giveback was disabled, reenable it:
storage failover modify -node local -auto-giveback true
. -
If AutoSupport is enabled, restore automatic case creation:
system node autosupport invoke -node * -type all -message MAINT=END
.
After you've restored the ONTAP image and the node is up and serving data, you return the failed part to NetApp.