EasyManuals Logo

Dell PowerVault ML6000 User Manual

Dell PowerVault ML6000
122 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #19 background imageLoading...
Page #19 background image
In Summary
The number of encryption keys that may be used for each volume depends on the
tape drive, the encryption standard, and method used to manage the encryption.
For transparent encryption of LTO 4 and LTO 5, (that is, using library-managed
encryption with the Encryption Key Manager,) the uniqueness of DKs depends on
the availability of a sufficient number of pre-generated keys to the Encryption Key
Manager.
Table 1-1. Encryption Key Summary
Encryption Management
Method
Keys used by
IBM Encryption T10 Encryption
Library-Managed Encryption 1 DK / cartridge N/A
Application-Managed
Encryption
Multiple DKs / cartridge Multiple DKs / cartridge
DK = Symmetric AES 256-bit DK
Chapter 1. Tape Encryption Overview 1-7
|
||

Table of Contents

Other manuals for Dell PowerVault ML6000

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Dell PowerVault ML6000 and is the answer not in the manual?

Dell PowerVault ML6000 Specifications

General IconGeneral
BrandDell
ModelPowerVault ML6000
CategoryStorage
LanguageEnglish

Related product manuals