EasyManua.ls Logo

Dell PowerVault ML6000 User Manual

Dell PowerVault ML6000
122 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
Dell
PowerVault
Encryption Key Manager
User's Guide

Table of Contents

Other manuals for Dell PowerVault ML6000

Question and Answer IconNeed help?

Do you have a question about the Dell PowerVault ML6000 and is the answer not in the manual?

Dell PowerVault ML6000 Specifications

General IconGeneral
TypeTape Library
Drive TypesLTO-4, LTO-5, LTO-6
ConnectivitySAS
InterfaceSAS
Management InterfaceWeb-based
Tape TechnologyLTO
ScalabilityScalable to multiple libraries

Summary

Preface

About this Book

Provides an overview of the manual's content and scope.

Who Should Read this Book

Identifies the target audience for the user's guide.

Conventions and Terminology Used in this Book

Explains typographic conventions and terminology used throughout the document.

Attention Notice

Highlights potential damage to programs, devices, systems, or data.

Related Publications

Lists other Dell publications for more information.

Online Support

Directs users to Dell's online support resources.

Chapter 1. Tape Encryption Overview

Components

Details the main components of the Encryption Key Manager.

Managing Encryption

Explains the process and methods of managing tape encryption.

Application-Managed Tape Encryption

Describes encryption managed by backup applications.

Library-Managed Tape Encryption

Describes encryption managed by the Encryption Key Manager via the library.

About Encryption Keys

Explains encryption key types, generation, and usage.

Chapter 2. Planning Your Encryption Key Manager Environment

Encryption Setup Tasks at a Glance

Provides a checklist of tasks for setting up encryption.

Encryption Key Manager Setup Tasks

Outlines essential tasks for configuring the Encryption Key Manager.

Planning for Library-Managed Tape Encryption

Details requirements for library-managed tape encryption.

Hardware and Software Requirements

Lists the necessary hardware and software for the system.

Keystore Considerations

Highlights the importance of preserving keystore data.

Backing up Keystore Data

Provides critical instructions for backing up keystore data for recovery.

Encryption Key Manager Server Configurations

Describes single-server and two-server configurations for the key manager.

Federal Information Processing Standard 140-2 Considerations

Addresses FIPS 140-2 certification requirements for cryptographic providers.

Chapter 3. Installing the Encryption Key Manager and Keystores

Installing the Encryption Key Manager on Linux

Provides step-by-step instructions for installing EKM on Linux.

Installing the Encryption Key Manager on Windows

Provides step-by-step instructions for installing EKM on Windows.

Using the GUI to Create a Configuration File, Keystore, and Certificates

Details using the GUI to create configuration files, keystores, and certificates.

Generating Keys and Aliases for Encryption on LTO 4 and LTO 5

Explains how to generate encryption keys and aliases for LTO drives.

Creating and Managing Key Groups

Covers organizing symmetric keys into key groups.

Chapter 4. Configuring the Encryption Key Manager

Automatically Update Tape Drive Table

Explains automatic addition of new drives to the drive table.

Synchronizing Data Between Two Key Manager Servers

Details methods for synchronizing data between key manager servers.

Chapter 5. Administering the Encryption Key Manager

Starting, Refreshing, and Stopping the Key Manager Server

Guides on managing the lifecycle of the key manager server.

The Command Line Interface Client

Explains how to use the CLI client for managing EKM.

CLI Commands

Lists and describes available commands for the CLI client.

Chapter 6. Problem Determination

Check These Important Files for Encryption Key Manager Server Problems

Identifies key files for troubleshooting server startup issues.

Debugging Communication Problems Between the CLI Client and the EKM Server

Provides steps to diagnose and resolve communication issues between client and server.

Encryption Key Manager-Reported Errors

Lists common errors reported by EKM and their solutions.

Chapter 7. Audit Records

Audit Overview

Describes the audit subsystem and its record generation.

Audit Configuration Parameters

Details parameters for configuring audit log behavior.

Audit Record Format

Explains the structure and format of audit records.

Chapter 8. Using Metadata

Querying the Metadata XML File

Explains how to query the metadata XML file using EKMDataParser.

Recovering from a Corrupted Metadata File

Provides steps to recover corrupted metadata files.

Appendix A. Sample Files

Sample Configuration Files

Offers example EKM properties files for configuration.

Appendix B. Encryption Key Manager Configuration Properties Files

Encryption Key Manager Server Configuration Properties File

Details properties for the EKM server configuration file.

CLI Client Configuration Properties File

Details properties for the EKM CLI client configuration file.

Appendix C. Frequently Asked Questions

Will the Encryption Key Manager require that a certificate be renamed on renewal?

Discusses certificate renewal and its impact on the Encryption Key Manager.

Notices

Trademarks

Lists trademarks used in the document.

Glossary

Related product manuals