The encryption key management server works with IBM encryption-enabled storage components (DDMs, device adapter, and functional code) in generating, protecting, storing, and maintaining encryption keys that are used to encrypt information being written to and decrypt information being read from storage media. Disk encryption gives the customer an added layer of protection for their data. The combination of data encryption on the DS8000® and the customer data encryption key stored on the customer's encryption key management server external to the DS8000 ensures that if the DS8000 or any DDMs with encrypted data are stolen, data cannot be accessed.
To enable encryption, you must have encryption-capable DDMs along with supporting encryption software stack installed on the DS8000. The customer must have configured at least two encryption key management servers.
| SRC | SRC Description | Service action/machine state when serviceable event is generated | Action |
|---|---|---|---|
| BE14CFE1 | DS8000 management console regained access to the customer's encryption key management servers. Automatic dual cluster reboot is initiated. No further action is needed. | Dual cluster IML | This is an informational serviceable event. |
| BE14CFE5 | Base page mismatch detected and recovered by automatic dual cluster reboot. ESC=0xCFE5 | Dual cluster IML | This is an informational serviceable event. |
| BE14CFEB | DS8000 microcode detected less than two encryption key management servers can be accessed by the LPARs. DS8000 management console should be configured with at least two encryption key management servers. | Periodic key retrieval |
If the periodic key retrieval completes successfully, close the existing BE14CFEB serviceable event. Otherwise, check for any open serviceable events that begin with BE14E0 or BE14EA and repair that serviceable event. |
| BE14CFF5 | An invalid encryption-capable SFI configuration has been detected. A valid certificate is not installed on the SFI or the SFI does not have a homogeneous configuration of self-encrypting drives. | Field install when DDM certify is initiated | Customer has received a DS8000 with an invalid configuration for encryption-capable SFI. Contact next level of support for problem determination and resolution. |
| BE14E004 | The DS8000 management console cannot retrieve encryption keys from the customer's encryption key management server because the DS8000 management console could not detect any active encryption key management server paths. Suspected configuration error. | Dual cluster IML; Periodic key retrieval |
|
| BE14E008 | The DS8000 management console cannot retrieve encryption keys from the customer's encryption key management server(s) because of communication errors between the DS8000 Hardware Management Console (HMC) and encryption key management servers. A suspected network error. | Dual cluster IML; Periodic key retrieval – ESSNI is running on the HMC but is encountering a socket open error with the encryption key management servers. |
|
| BE14E009 | The DS8000 management console cannot retrieve encryption keys from the configured encryption key management server because of communication errors between the DS8000 partitions (LPARs) and the Hardware Management Console (HMC). | Dual cluster IML; Periodic key retrieval |
|
| BE14E00B | The DS8000 management console cannot retrieve encryption keys from the configured encryption key management server. A command timeout has occurred between DS8000 partitions (LPARs) and the hardware management console (HMC). | Dual cluster IML; Periodic key retrieval | Contact your next level of support for resolution. |
| BE14E011 | Encryption key management server error: All configured encryption key management servers are unable to unwrap keys provided by the DS8000 management console ESC=0XCFE0; Reason Code=0xF1 | Dual cluster IML; Periodic key retrieval | Contact your next level of support for resolution. |
| BE14E012 | Encryption key management server error: Microcode unable to unwrap keys received from all configured encryption key management servers. | Dual cluster IML; Periodic key retrieval |
|
| BE14E0F1 | The DS8000 management console cannot access the customer's encryption key management server. | Dual cluster IML |
|
| BE14E1F6 | DS8000 partitions IMLed with the configured encryption key management servers not available. The encryption key management server is available and DS8000 partitions must be re-IMLed to allow data access. | DS8000 partitions regained access to encryption key management servers. However, a dual cluster reboot and IML was not attempted because of a service action in progress. | Dual cluster IML could not be attempted on the DS8000 partitions
because of the service action in progress. The DS8000 partitions
must be re-IMLed (shutdown and rebooted) using the following steps:
Valid state should be "quiesce." Click Quiesce SFI, then monitor by refreshing the panel. When valid state is "shutdown," click Shutdown SFI, then monitor by refreshing the panel. When valid state is "resume," click Resume SFI, then monitor by refreshing the panel. |
| BE14E3F7 | DS8000 data encryption key repository reported a permanent error. Failure to read record or certificate. | Contact your next level of support for resolution. | |
| BE14EA0B | Encryption key management server error: The DS8000 management console cannot retrieve encryption keys from some of the configured encryption key management servers. A command timeout has occurred between DS8000 partitions (LPARs) and the hardware management console (HMC). | Periodic key retrieval | Contact your next level of support for resolution. |
| BE14EA11 | Encryption key management server error: One or more encryption key management servers have an invalid key, or a record is corrupted in the key repository, or a failure to unwrap keys. ESC = 0xCFEA; Reason Code =0XF1 | Periodic key retrieval |
|
| BE14EA12 | Encryption key management server error: Microcode cannot unwrap keys received from one or more encryption key management servers. | Periodic key retrieval |
|
| BE14EA13 | Key retrieved from the encryption key management server failed signature verification. | Periodic key retrieval | Contact your next level of support for resolution. |
| BE14EAF1 | DS8000 management console has failed to communicate with the encryption key management server. If the communication continues to fail after four hours, a request for service will occur. |
|
|
| BE14EAF2 | DS8000 management console has failed to communicate with the encryption key management server for four hours. | Refer to actions for BE14EAF1. | |
| BE14EAF3 | DS8000 management console has failed to communicate with the encryption key management server using an SSL link. If the communication continues to fail after four hours, a request for service will occur. | Refer to actions for BE14EAF1. If connectivity works with an unencrypted link but fails when using an SSL link, a likely cause is an untrusted certificate. Contact your next level of support. |
|
| BE14EAF4 | DS8000 management console has failed to communicate with the encryption key management server for four hours, using an SSL link. | Refer to actions for BE14EAF1. If connectivity works with an unencrypted link but fails when using an SSL link, a likely cause is an untrusted certificate. Contact your next level of support. |
|
| BE316023 | A severe software error has been discovered. | Contact your next level of support for resolution. | |
| BE31CFE8 | A severe software error has been discovered. | Contact your next level of support for resolution. | |
| BE31F004 | Failed to initialize the replacement encryption-capable DDM to the existing configured encryption group during its repair. The more likely cause was a DDM hardware problem. | Access credential migration failed after DDM
repair during the DDM resume operation. Access credential migration
was initiated because of one of the following conditions:
|
Use this procedure to do software checks before replacing the DDM:
|
| BE34009E | An encryption-capable DDM was not cryptographically erased during a DDM repair, DDM install, rank removal, or recovery after a failed rank creation. | A DDM repair; storage enclosure/DDM Install MES operation; rank removal appeared successful to the customer. Recovery after a failed rank creation. |
|
| BE34009F | One or more encryption-capable DDMs were not automatically cryptographically erased after the customer removed one or more ranks. | This serviceable event is generated when a SF Discontinue utility queries the cryptographically erase status of all FDE drives and detects that one ore more drives are security degraded. | This condition is only detected during a check for a storage facility removal process. If the customer removed all their data and logical configuration including ranks, the encrypted DDMs should have been automatically cryptographically erased. Contact your next level of support for resolution. |
| BE3400A2 | Failed to initialize the replacement encryption-capable DDM to the existing configured encryption group during its repair. The existing encryption group is inaccessible. | RAS initiated an issraid exchange Smart rebuild. | Perform the following software checks before replacing the
DDM:
|
| BE3400A3 | Adding or replacing an encryption-capable DDM and the DDM FRU is already in a configured state. A cryptographic erase could not be initiated. | This should not occur during any RAS-initiated service action. A probable cause for this serviceable event is a cryptographic erase that was attempted on a drive that stores customer data during manual recovery. | Contact your next level of support for resolution. |
| BE3400B3 | Hourly health checks on the partitions detected one or more encryption-capable drives inaccessible (security degraded). | This serviceable event is generated during a RAS hourly health check running on the partitions. | Perform the following software checks:
|
| Other SRCs | Contact your next level of support for resolution. |
dscli> lskeymgr
Date/Time: October 28, 2008
8:04:45 PM MST IBM DSCLI Version: 5.4.2.221 DS:
ID state status addr port
===============================
1 active normal tens 3801
2 active failed automan 3801






