Dell PowerVault DL4000 Dell PowerVault DL4000 Backup To Disk Appliance - Power - Page 58

Importing An Encryption Key, Understanding Replication, About Replication

Page 58 highlights

Importing An Encryption Key To import an encryption key 1. Navigate to the AppAssure 5 Core, and then click the Configuration tab. 2. From the Manage option, click Security. 3. Click right angle bracket (>) symbol next to the name of the encryption key you want to import, and then click Import. The Import Key dialog box is displayed. 4. In the Import Key dialog box, click Browse to locate the encryption key you want to import. 5. Click OK. Exporting An Encryption Key To export an encryption key: 1. Navigate to the AppAssure 5 Core, and then click the Configuration tab. 2. From the Manage option, click Security. 3. Click right angle bracket symbol (>) next to the name of the encryption key you want to export, and then click Export. The Export Key dialog box is displayed. 4. In the Export Key dialog box, click Download Key to save and store the encryption keys in a secure location. 5. Click OK. Removing An Encryption Key To remove an encryption key: 1. Navigate to the AppAssure 5 Core, and then click the Configuration tab. 2. From the Manage option, click Security. 3. Click right angle bracket symbol (>) next to the name of the encryption key you want to remove, and then click Remove. The Remove Key dialog box is displayed. 4. In the Remove Key dialog box, click OK to remove the encryption key. NOTE: Removing an encryption key does decrypt the data. Understanding Replication About Replication Replication is the process of copying recovery points and transmitting them to a secondary location for the purpose of disaster recovery. The process requires a paired source-target relationship between two cores. The source core copies the recovery points of the protected agents and then asynchronously and continuously transmits them to a target core at a remote disaster recovery site. The off-site location can be a company-owned data center (self-managed core) or a third-party managed service provider's (MSP's) location or cloud environment. When replicating to a MSP, you can use built-in work flows that let you request connections and receive automatic feedback notifications. 58

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163

Importing An Encryption Key
To import an encryption key
1.
Navigate to the AppAssure 5 Core, and then click the
Configuration
tab.
2.
From the
Manage
option, click
Security
.
3.
Click right angle bracket (>) symbol next to the name of the encryption key you want to import, and then click
Import
.
The
Import Key
dialog box is displayed.
4.
In the
Import Key
dialog box, click
Browse
to locate the encryption key you want to import.
5.
Click
OK
.
Exporting An Encryption Key
To export an encryption key:
1.
Navigate to the AppAssure 5 Core, and then click the
Configuration
tab.
2.
From the
Manage
option, click
Security
.
3.
Click right angle bracket symbol (>) next to the name of the encryption key you want to export, and then click
Export.
The
Export Key
dialog box is displayed.
4.
In the
Export Key
dialog box, click
Download Key
to save and store the encryption keys in a secure location.
5.
Click
OK
.
Removing An Encryption Key
To remove an encryption key:
1.
Navigate to the AppAssure 5 Core, and then click the
Configuration
tab.
2.
From the
Manage
option, click
Security
.
3.
Click right angle bracket symbol (>) next to the name of the encryption key you want to remove, and then click
Remove
.
The
Remove Key
dialog box is displayed.
4.
In the
Remove Key
dialog box, click
OK
to remove the encryption key.
NOTE:
Removing an encryption key does decrypt the data.
Understanding Replication
About Replication
Replication is the process of copying recovery points and transmitting them to a secondary location for the purpose of
disaster recovery. The process requires a paired source-target relationship between two cores. The source core copies
the recovery points of the protected agents and then asynchronously and continuously transmits them to a target core
at a remote disaster recovery site. The off-site location can be a company-owned data center (self-managed core) or a
third-party managed service provider’s (MSP’s) location or cloud environment. When replicating to a MSP, you can use
built-in work flows that let you request connections and receive automatic feedback notifications.
58