Dell PowerVault TL4000 Dell PowerVault ML6000 Encryption Key Manager User's - Page 109

TransportListener.ssl.ciphersuites = JSSE_ALL, sync.timeinhours

Page 109 highlights

sync.action = value Specifies what should be done with the data during an auto synchronize. Required Optional. Values rewrite | merge Default merge Note: merging configuration information is the same as rewriting it. sync.ipaddress = ip_addr:ssl Specifies the IP address and port of the remote Encryption Key Manager to auto synchronize. Required Optional. If this property is unspecified or specified incorrectly, the sync function is disabled. Values IP address of remote server:SSL port number sync.timeinhours = value Specifies how many hours to wait before doing an auto synchronize with a remote Encryption Key Manager. Required Optional. Values Specified in hours. Default 24 sync.type = value Specifies what data to auto synchronize. Required Optional. Values config | drivetab | all Default drivetab TransportListener.ssl.ciphersuites = JSSE_ALL Cipher suites to be used for communication between Encryption Key Manager servers. A cipher suite describes the cryptographic algorithms and handshake protocols Transport Layer Security (TLS) and Secure Sockets Layer (SSL) use for data transfer. Required Optional. Values Values - any cipher suites supported by IBMJSSE2. TransportListener.ssl.clientauthentication = 0 SSL authentication needed for communication between Encryption Key Manager servers. Required Optional. Values 0 - no client authentication (default) 1 - server wants to do client authentication with the client 2 - the server must do client authentication with the client TransportListener.ssl.keystore.name = value The name of the database used by the Encryption Key Manager Server to hold the certificate and private keys for the Secure Socket Server. This certificate is given to the Secure Socket client for authentication and trust checking. This keystore is also used by the Encryption Key Manager Client to talk to the Encryption Key Manager Server and act as a Secure Sockets client. Appendix B. Encryption Key Manager Configuration Properties Files B-7

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122

sync.action =
value
Specifies what should be done with the data during an auto synchronize.
Required
Optional.
Values
rewrite | merge
Default
merge
Note:
merging configuration information is the same as rewriting it.
sync.ipaddress =
ip_addr:ssl
Specifies the IP address and port of the remote Encryption Key Manager to
auto synchronize.
Required
Optional. If this property is unspecified or specified
incorrectly, the sync function is disabled.
Values
IP address of remote server:SSL port number
sync.timeinhours =
value
Specifies how many hours to wait before doing an auto synchronize with a
remote Encryption Key Manager.
Required
Optional.
Values
Specified in hours.
Default
24
sync.type =
value
Specifies what data to auto synchronize.
Required
Optional.
Values
config | drivetab | all
Default
drivetab
TransportListener.ssl.ciphersuites = JSSE_ALL
Cipher suites to be used for communication between Encryption Key
Manager servers. A cipher suite describes the cryptographic algorithms and
handshake protocols Transport Layer Security (TLS) and Secure Sockets
Layer (SSL) use for data transfer.
Required
Optional.
Values
Values – any cipher suites supported by IBMJSSE2.
TransportListener.ssl.clientauthentication = 0
SSL authentication needed for communication between Encryption Key
Manager servers.
Required
Optional.
Values
0 - no client authentication (default)
1 - server wants to do client authentication with the client
2 - the server must do client authentication with the client
TransportListener.ssl.keystore.name =
value
The name of the database used by the Encryption Key Manager Server to
hold the certificate and private keys for the Secure Socket Server. This
certificate is given to the Secure Socket client for authentication and trust
checking. This keystore is also used by the Encryption Key Manager Client
to talk to the Encryption Key Manager Server and act as a Secure Sockets
client.
Appendix B. Encryption Key Manager Configuration Properties Files
B-7