Dell PowerVault TL2000 Dell PowerVault TL2000/TL4000 - Important Informatio - Page 6
Notes on TL2000/TL4000 Storage Capabilities, Multiple Key, Managers for Redundancy - tl4000 user guide
View all Dell PowerVault TL2000 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 6 highlights
Notes on TL2000/TL4000 Storage Capabilities The Dell PowerVault TL2000 is configured out of the factory with 23 data slots and one Import/Export (I/E) slot. It is possible to use all 24 slots as data slots by configuring the Import/Export (I/E) slot as a storage slot. NOTE: To change the configuration of the Dell PowerVault TL2000, you must have library firmware 3.90 or later. For more information, see the Dell PowerVault TL2000/TL4000 User's Guide available on the Dell Support website at support.dell.com. The Dell PowerVault TL4000 is configured out of the factory with 44 data slots, three Import/Export (I/E) slots, and a dedicated cleaning slot. NOTE: The dedicated cleaning slot is not available from firmware 3.90 onwards. For information on setting up the cleaning slot as a storage slot, see the Dell PowerVault TL2000/TL4000 User's Guide available on the Dell Support website at support.dell.com. It is possible to use all 48 slots as data slots by configuring the Import/Export (I/E) slot and the dedicated cleaning slot as a storage slots. NOTE: To change the configuration of the Dell PowerVault TL2000, you must have library firmware 3.90 or later. For more information, see the Dell PowerVault TL2000/TL4000 User's Guide available on the Dell Support website at support.dell.com. Notes on Library Managed Encryption • Encrypted media cannot be re-used with a different EKM server In order to re-use previously encrypted media using a different EKM server (when the server has a different EKM keystore), the media must be erased with encryption turned off in the library. This issue is a result of the ISV applications attempting a read, prior to performing the erase and no key is available for the read. • EKM server offline causes issues in the ISV To prevent possible data loss due to an EKM server failure, it is recommended to use a primary and secondary EKM server. This configuration provides redundancy in the event of the primary EKM server being down or unavailable. For more information on configuring a primary and secondary EKM server for the library, refer to the Multiple Key Managers for Redundancy (Chapter 2) of the Dell Encryption Key Manager 6 Important Information