Dell PowerVault TL4000 Dell PowerVault ML6000 Encryption Key Manager User's - Page 5

s, LTO 4 or LTO 5 Tape Drive Request - default login

Page 5 highlights

Figures 1-1. 1-2. | 1-3. | | 2-1. | 2-2. 2-3. | 2-4. | 2-5. | 2-6. | The Encryption Key Manager's four main components 1-2 Two possible locations for encryption policy engine and key management. . . . . . 1-4 Encryption Using Symmetric Encryption Keys 1-6 LTO 4 or LTO 5 Tape Drive Request for Encryption Write Operation 2-4 LTO 4 or LTO 5 Tape Drive Request for Encryption Read Operation 2-5 Backup Critical Files Window . . . . . 2-6 Single Server Configuration 2-7 Two Servers with Shared Configurations 2-8 Two Servers with Different Configurations Accessing the Same Devices 2-9 3-1. 3-2. 3-3. 3-4. 3-5. 3-6. 3-7. 3-8. 3-9. 3-10. 5-1. 5-2. Choose Destination Location window 3-3 Set this version of JVM to default 3-3 Start Copying Files window 3-4 EKM Server Configuration Page. . . . . 3-6 EKM Server Certificate Configuration Page 3-7 Backup Critical Files Window . . . . . 3-8 Create a Group of Keys 3-15 Change Default Write Key Group 3-16 Assign Group to Drive 3-17 Delete Drive 3-18 Server Status 5-1 Login Window 5-2 v

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122

Figures
1-1.
The Encryption Key Manager’s four main
components
.
.
.
.
.
.
.
.
.
.
.
1-2
1-2.
Two possible locations for encryption policy
engine and key management
.
.
.
.
.
.
1-4
1-3.
Encryption Using Symmetric Encryption
Keys
.
.
.
.
.
.
.
.
.
.
.
.
.
.
1-6
2-1.
LTO 4 or LTO 5 Tape Drive Request for
Encryption Write Operation
.
.
.
.
.
.
2-4
2-2.
LTO 4 or LTO 5 Tape Drive Request for
Encryption Read Operation
.
.
.
.
.
.
2-5
2-3.
Backup Critical Files Window
.
.
.
.
.
2-6
2-4.
Single Server Configuration
.
.
.
.
.
.
2-7
2-5.
Two Servers with Shared Configurations
2-8
2-6.
Two Servers with Different Configurations
Accessing the Same Devices
.
.
.
.
.
.
2-9
3-1.
Choose Destination Location window
3-3
3-2.
Set this version of JVM to default
3-3
3-3.
Start Copying Files window
.
.
.
.
.
.
3-4
3-4.
EKM Server Configuration Page
.
.
.
.
.
3-6
3-5.
EKM Server Certificate Configuration Page
3-7
3-6.
Backup Critical Files Window
.
.
.
.
.
3-8
3-7.
Create a Group of Keys
.
.
.
.
.
.
.
3-15
3-8.
Change Default Write Key Group
3-16
3-9.
Assign Group to Drive
.
.
.
.
.
.
.
3-17
3-10.
Delete Drive
.
.
.
.
.
.
.
.
.
.
.
3-18
5-1.
Server Status
.
.
.
.
.
.
.
.
.
.
.
5-1
5-2.
Login Window
.
.
.
.
.
.
.
.
.
.
5-2
v
|
|
|
|
|
|
|
|