Dell PowerVault TL2000 Dell PowerVault ML6000 Encryption Key Manager User's - Page 9

Preface, About this Book, Who Should Read this Book, Conventions and Terminology Used in this Book - manual

Page 9 highlights

Preface About this Book This manual contains information and instructions necessary for the installation and operation of the Dell™ Encryption Key Manager. It includes concepts and procedures pertaining to: | v Encryption-capable LTO 4 and LTO 5 Tape Drives v Cryptographic keys v Digital certificates Who Should Read this Book This book is intended for storage and security administrators responsible for security and backup of vital data, and anyone assisting in the setup and maintenance of Encryption Key Manager servers in the operating environment. It assumes the reader has a working knowledge of storage devices and networks. Conventions and Terminology Used in this Book This book uses the following typographic conventions: Table 1. Typographic Conventions used in this Book Convention bold constant width italic [item] {item} | Usage Bold words or characters represent system elements that you must use literally, such as command names, file names, flag names, path names, and selected menu options. Examples, text specified by the user, and information that the system displays appear in constant width typeface. Italicized words or characters represent variable values that you must supply. Indicates optional items. Encloses a list from which you must choose an item in format and syntax descriptions. A vertical bar separates items in a list of choices. Indicates keys you press. Attention Notice An attention notice indicates the possibility of damage to a program, device, system, or to data. An exclamation point symbol may accompany an attention notice, but is not required. Sample attention notices follow: Attention: If you use a power screwdriver to perform this procedure it could destroy the tape. ix

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122

Preface
About this Book
This manual contains information and instructions necessary for the installation
and operation of the Dell
Encryption Key Manager. It includes concepts and
procedures pertaining to:
v
Encryption-capable LTO 4 and LTO 5 Tape Drives
v
Cryptographic keys
v
Digital certificates
Who Should Read this Book
This book is intended for storage and security administrators responsible for
security and backup of vital data, and anyone assisting in the setup and
maintenance of Encryption Key Manager servers in the operating environment. It
assumes the reader has a working knowledge of storage devices and networks.
Conventions and Terminology Used in this Book
This book uses the following typographic conventions:
Table 1. Typographic Conventions used in this Book
Convention
Usage
bold
Bold
words or characters represent system
elements that you must use literally, such as
command names, file names, flag names,
path names, and selected menu options.
constant width
Examples, text specified by the user, and
information that the system displays appear
in
constant width
typeface.
italic
Italicized
words or characters represent
variable values that you must supply.
[item]
Indicates optional items.
{item}
Encloses a list from which you must choose
an item in format and syntax descriptions.
|
A vertical bar separates items in a list of
choices.
<Key>
Indicates keys you press.
Attention Notice
An attention notice indicates the possibility of damage to a program, device,
system, or to data. An exclamation point symbol may accompany an attention
notice, but is not required. Sample attention notices follow:
Attention:
If you use a power screwdriver to perform this
procedure it could destroy the tape.
ix
|