Dell PowerVault DL4000 Dell PowerVault DL4000 Backup To Disk Appliance - Power - Page 56

Checking A Repository, Managing Security, Adding An Encryption Key

Page 56 highlights

Checking A Repository AppAssure 5 provides the ability to perform a diagnostic check of a repository volume when errors occur. Core errors could be the result of it being improperly shut down, a hardware failure, and so on. NOTE: This procedure must only be performed for diagnostic purposes. For example, in the event of hardware failure, improper shutdown of the Core, and so on. To check a repository: 1. On the Configuration tab, click Repositories, and then select the right angle bracket (>) symbol next to the repository you want to check. 2. In the Actions pane, click Check. The Check Repository dialog box is displayed. 3. In the Check Repository dialog box, click Check. NOTE: If the check fails, restore the repository from an archive. Deleting A Repository To delete a repository 1. On the Configuration tab, click Repositories, and then select the right angle bracket (>) symbol next to the repository you want to delete. 2. In the Actions pane, click Delete. 3. In the Delete Repository dialog box, click Delete. CAUTION: When a repository is deleted, the data contained in the repository is discarded and cannot be recovered. Managing Security The AppAssure 5 Core can encrypt agent snapshot data within the repository. Instead of encrypting the entire repository, AppAssure 5 lets you specify an encryption key during the protection of an agent in a repository which lets the keys be re-used for different agents. Encryption does not impact performance, as each active encryption key creates an encryption domain. Thus letting a single core support multitenancy by hosting multiple encryption domains. In a multi-tenant environment, data is partitioned and deduplicated within the encryption domains. Because you manage the encryption keys, loss of the volume cannot leak the keys. Key security concepts and considerations include: • Encryption is performed using 256-bit AES in Cipher Block Chaining (CBC) mode that is compliant with SHA-3. • Deduplication operates within an encryption domain to ensure privacy. • Encryption is performed without impact on performance. • You can add, remove, import, export, modify, and delete encryption keys that are configured on the AppAssure 5 Core. • There is no limit to the number of encryption keys you can create on the Core. Adding An Encryption Key To add an encryption key: 56

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163

Checking A Repository
AppAssure 5 provides the ability to perform a diagnostic check of a repository volume when errors occur. Core errors
could be the result of it being improperly shut down, a hardware failure, and so on.
NOTE:
This procedure must only be performed for diagnostic purposes. For example, in the event of hardware
failure, improper shutdown of the Core, and so on.
To check a repository:
1.
On the
Configuration
tab, click
Repositories
, and then select the right angle bracket (>) symbol next to the
repository you want to check.
2.
In the
Actions
pane, click
Check
.
The
Check Repository
dialog box is displayed.
3.
In the
Check Repository
dialog box, click
Check
.
NOTE:
If the check fails, restore the repository from an archive.
Deleting A Repository
To delete a repository
1.
On the
Configuration
tab, click
Repositories
, and then select the right angle bracket (>) symbol next to the
repository you want to delete.
2.
In the
Actions
pane, click
Delete
.
3.
In the
Delete Repository
dialog box, click Delete.
CAUTION: When a repository is deleted, the data contained in the repository is discarded and cannot be
recovered.
Managing Security
The AppAssure 5 Core can encrypt agent snapshot data within the repository. Instead of encrypting the entire
repository, AppAssure 5 lets you specify an encryption key during the protection of an agent in a repository which lets
the keys be re-used for different agents. Encryption does not impact performance, as each active encryption key
creates an encryption domain. Thus letting a single core support multitenancy by hosting multiple encryption domains.
In a multi-tenant environment, data is partitioned and deduplicated within the encryption domains. Because you manage
the encryption keys, loss of the volume cannot leak the keys. Key security concepts and considerations include:
Encryption is performed using 256-bit AES in Cipher Block Chaining (CBC) mode that is compliant with SHA-3.
Deduplication operates within an encryption domain to ensure privacy.
Encryption is performed without impact on performance.
You can add, remove, import, export, modify, and delete encryption keys that are configured on the AppAssure 5
Core.
There is no limit to the number of encryption keys you can create on the Core.
Adding An Encryption Key
To add an encryption key:
56