Dell PowerVault TL4000 Dell PowerVault ML6000 Encryption Key Manager User's - Page 69

refresh, status, stopekm, symrec, Example, Example: refresh, config.keystore.file, Example: status

Page 69 highlights

-rec1 Specifies the alias (or key label) of the drive's certificate. -rec2 Specifies a second alias (or key label) of the drive's certificate. -symrec Specifies an alias (of the symmetric key) or a key group name for the tape drive. Example: moddrive -drivename 000123456789 -rec1 newalias1 refresh Tells the Encryption Key Manager to refresh the debug, audit, and drive table values with the latest configuration parameters. Example: refresh refreshks Refreshes the keystore. Use this to reload the keystore specified in config.keystore.file if it was modified while the Encryption Key Manager server was running. Use this command only when needed as it may degrade performance. Example: refreshks status Displays whether key manager server is started or stopped. Example: status stopekm Stops the Encryption Key Manager server. Example: stopekm sync Synchronizes the configuration file properties, or drive table information, or both on another Encryption Key Manager server with those on the key manager server issuing the command. Note: Neither synchronization method acts on the keystore or KeyGroups.xml file. These must be copied manually. sync {-all | -config | -drivetab} -ipaddr ip_addr :ssl:port [-merge | -rewrite] -all Send both the configuration properties file and the drive table information to the Encryption Key Manager server specified by -ipaddr. -config Send only the configuration properties file to the Encryption Key Manager server specified by -ipaddr. Chapter 5. Administering the Encryption Key Manager 5-13

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122

-rec1
Specifies the
alias
(or key label) of the drive’s certificate.
-rec2
Specifies a second
alias
(or key label) of the drive’s certificate.
-symrec
Specifies an
alias
(of the symmetric key) or a key group name for the tape
drive.
Example:
moddrive -drivename 000123456789 -rec1 newalias1
refresh
Tells the Encryption Key Manager to refresh the debug, audit, and drive table
values with the latest configuration parameters.
Example: refresh
refreshks
Refreshes the keystore. Use this to reload the keystore specified in
config.keystore.file
if it was modified while the Encryption Key Manager server
was running. Use this command only when needed as it may degrade
performance.
Example: refreshks
status
Displays whether key manager server is started or stopped.
Example: status
stopekm
Stops the Encryption Key Manager server.
Example: stopekm
sync
Synchronizes the configuration file properties, or drive table information, or both
on another Encryption Key Manager server with those on the key manager server
issuing the command.
Note:
Neither synchronization method acts on the keystore or KeyGroups.xml file.
These must be copied manually.
sync
{
-all
|
-config
|
-drivetab
}
-ipaddr
ip_addr
:
ssl
:
port
[
-merge
|
-rewrite
]
-all
Send both the configuration properties file and the drive table information to
the Encryption Key Manager server specified by
-ipaddr
.
-config
Send only the configuration properties file to the Encryption Key Manager
server specified by
-ipaddr
.
Chapter 5. Administering the Encryption Key Manager
5-13