Dell TL2000 User Guide - Page 29

Supported Internet Protocols, SNMP Messaging, SNMP Traps, tapeautomation, Product Identification - encryption

Page 29 highlights

If you purchased library-managed encryption at the time you purchased your library, a hard copy of the license key is provided with your library as a backup. If there are any issues with the license key for library-managed encryption purchased with the library, please visit http://www.dell.com/ tapeautomation to obtain your license key. You will need the library serial number and worldwide node name to obtain the license key. Please refer to the following tables in this document for instructions on locating this information: v Table 1.2 for library serial number v Table 5.6 for library worldwide node name If this does not resolve your issue, please contact Dell technical support. 3. Configure library-managed encryption on your library. Please refer to "Configure Library: Encryption" on page 5-47 for instructions. 4. Install the Dell Encryption Key Manager (EKM) application on the server designated for EKM. Please refer to Chapter 3.0 of the Dell Encryption Key Manager User's Guide for instructions. This document can be found at http://support.dell.com. 5. Configure the EKM application. Please refer to Chapter 4.0 of the Dell Encryption Key Manager User's Guide for instructions. 6. Start the EKM application. Please refer to Chapter 5.0 of the Dell Encryption Key Manager User's Guide for instructions. Note: All encryption settings should be configured or re-verified in the drive after any library or drive reset. This is because a new drive may have been added or an existing drive may have been swapped with another drive. Supported Internet Protocols The library supports the following Internet protocols: v IPv4 v IPv6 To learn more about Internet protocols, visit http://www.iana.org/. SNMP Messaging Occasionally, the library may encounter a situation that you want to know about, such as an open magazine or a fault that causes the library to stop. The library provides a standard TCP/IP protocol called Simple Network Management Protocol (SNMP) to send alerts about conditions (such as need for operator intervention) over a TCP/IP LAN network to an SNMP monitoring station. These alerts are called SNMP traps. Using the information supplied in each SNMP trap, the monitoring station (together with customer-supplied software) can alert operations personnel of possible problems or operator interventions that occur. SNMP Traps SNMP traps are alerts or status messages that can be collected, monitored and used to proactively manage attached libraries using SNMP protocol with the host server(s). In summary, each trap provides the following information: v Product Identification such as product name, description, manufacturer, model number, firmware level, and the URL that the trap is designated for. v Product Status such as the severity of the trap, status (current and previous) and the time the trap occurred. Chapter 1. Product Description 1-7

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277

If you purchased library-managed encryption at the time you purchased your
library, a hard copy of the license key is provided with your library as a
backup. If there are any issues with the license key for library-managed
encryption purchased with the library, please visit
tapeautomation
to obtain your license key. You will need the library serial
number and worldwide node name to obtain the license key. Please refer to the
following tables in this document for instructions on locating this information:
v
Table 1.2 for library serial number
v
Table 5.6 for library worldwide node name
If this does not resolve your issue, please contact Dell technical support.
3.
Configure library-managed encryption on your library. Please refer to
“Configure Library: Encryption” on page 5-47 for instructions.
4.
Install the Dell Encryption Key Manager (EKM) application on the server
designated for EKM. Please refer to Chapter 3.0 of the
Dell Encryption Key
Manager User's Guide
for instructions. This document can be found at
.
5.
Configure the EKM application. Please refer to Chapter 4.0 of the
Dell
Encryption Key Manager User's Guide
for instructions.
6.
Start the EKM application. Please refer to Chapter 5.0 of the
Dell Encryption Key
Manager User's Guide
for instructions.
Note:
All encryption settings should be configured or re-verified in the drive after
any library or drive reset. This is because a new drive may have been added
or an existing drive may have been swapped with another drive.
Supported Internet Protocols
The library supports the following Internet protocols:
v
IPv4
v
IPv6
To learn more about Internet protocols, visit
.
SNMP Messaging
Occasionally, the library may encounter a situation that you want to know about,
such as an open magazine or a fault that causes the library to stop. The library
provides a standard TCP/IP protocol called Simple Network Management Protocol
(SNMP) to send alerts about conditions (such as need for operator intervention)
over a TCP/IP LAN network to an SNMP monitoring station. These alerts are
called SNMP traps. Using the information supplied in each SNMP trap, the
monitoring station (together with customer-supplied software) can alert operations
personnel of possible problems or operator interventions that occur.
SNMP Traps
SNMP traps are alerts or status messages that can be collected, monitored and
used to proactively manage attached libraries using SNMP protocol with the host
server(s). In summary, each trap provides the following information:
v
Product Identification
such as product name, description, manufacturer, model
number, firmware level, and the URL that the trap is designated for.
v
Product Status
such as the severity of the trap, status (current and previous) and
the time the trap occurred.
Chapter 1. Product Description
1-7