Dell DR2000v DR Series System Administrator Guide - Page 148

Dell DR Series System Command Line Reference Guide, Creating a Cleaner Schedule

Page 148 highlights

The administrator must set a passphrase as the first step in configuring encryption. This passphrase is used to encrypt the content encryption keys, which adds a second layer of security to the key management. 2. Enabling encryption and setting the mode. The administrator should enable encryption by using the GUI or CLI. At this time, the mode is also set. The default key management mode is "internal" mode, in which key rotation happens periodically as specified by the set key rotation period. 3. Encryption process. After encryption is enabled, the data on the DR Series system that gets backed up is encrypted and is kept encrypted until it is expired and cleaned by the system cleaner. Note that the encryption process is irreversible. 4. Encryption of pre-existing data. Any pre-existing data on a DR Series system will also be encrypted using the currently set mode of key management. This encryption occurs as part of the system cleaner process. Encryption is scheduled as the last action item in the cleaner workflow. You must launch the cleaner manually using the maintenance command to reclaim space. It then encrypts all pre-existing unencrypted data. The cleaner can also be scheduled as per the existing pre-defined cleaner schedule. NOTE: The cleaner can take some time to start the encryption process if the system is nearing full system capacity. Encryption starts only after the cleaner processes data slated for cleaning and the related logs. This ensures that space reclamation is prioritized when free space is low and also ensures that data stores are not redundantly encrypted. Refer to the following topics for more information about enabling encryption and using the system cleaner in the GUI. • Managing Encryption Operations • Creating a Cleaner Schedule Refer to the Dell DR Series System Command Line Reference Guide for information about the CLI commands used for encryption. 148

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187

The administrator must set a passphrase as the first step in configuring encryption. This passphrase is used to
encrypt the content encryption keys, which adds a second layer of security to the key management.
2.
Enabling encryption and setting the mode.
The administrator should enable encryption by using the GUI or CLI. At this time, the mode is also set. The default
key management mode is “internal” mode, in which key rotation happens periodically as specified by the set key
rotation period.
3.
Encryption process.
After encryption is enabled, the data on the DR Series system that gets backed up is encrypted and is kept
encrypted until it is expired and cleaned by the system cleaner. Note that the encryption process is irreversible.
4.
Encryption of pre-existing data
. Any pre-existing data on a DR Series system will also be encrypted using the
currently set mode of key management. This encryption occurs as part of the system cleaner process. Encryption is
scheduled as the last action item in the cleaner workflow. You must launch the cleaner manually using the
maintenance command to reclaim space. It then encrypts all pre-existing unencrypted data. The cleaner can also
be scheduled as per the existing pre-defined cleaner schedule.
NOTE:
The cleaner can take some time to start the encryption process if the system is nearing full system
capacity. Encryption starts only after the cleaner processes data slated for cleaning and the related logs.
This ensures that space reclamation is prioritized when free space is low and also ensures that data stores
are not redundantly encrypted.
Refer to the following topics for more information about enabling encryption and using the system cleaner in the GUI.
Managing Encryption Operations
Creating a Cleaner Schedule
Refer to the
Dell DR Series System Command Line Reference Guide
for information about the CLI commands used for
encryption.
148