-xxii-
Figure 5-23 Date and Time setup .............................................................................................. 107
Figure 5-24 SMTP setup ........................................................................................................... 108
Figure 5-25 SNMP setup .......................................................................................................... 109
Figure 5-26 SNMPv3 setup ....................................................................................................... 110
Figure 5-27 Trap list.................................................................................................................. 111
Figure 5-28 Encryption Basis setup ............................................................................................ 112
Figure 5-29 Encryption Detail setup ........................................................................................... 113
Figure 5-30 Licenses Registration .............................................................................................. 114
Figure 5-31 Save/Restore .......................................................................................................... 115
Figure 5-32 View Library logs ................................................................................................... 117
Figure 5-33 Download Logs ...................................................................................................... 118
Figure 5-34 Reset Library / Drive............................................................................................... 119
Figure 5-35 Firmware Update ................................................................................................... 120
Figure 5-36 Usage Statistics ..................................................................................................... 121
Figure 5-37 Web Shell .............................................................................................................. 122
Figure 6-1 activation key is not registered .................................................................................. 129
Figure 6-2 activation key is registered ....................................................................................... 129
Figure 6-3 Encryption Enable ................................................................................................... 130
Figure 6-4 Master key is registered ........................................................................................... 130
Figure 6-5 Manual Input of Master key...................................................................................... 131
Figure 6-6 File Input of Master key ........................................................................................... 132
Figure 6-7 Export of Master key ............................................................................................... 133
Figure 6-8 Encryption Detail .................................................................................................... 134
Figure 6-9 Encryption Detail .................................................................................................... 138
Figure 6-10 Encryption Setting ................................................................................................. 139
Figure 6-11 manual inputting of the encryption key .................................................................... 141
Figure 6-12 file inputting of the encryption key .......................................................................... 142
Figure 6-13 Export of the encryption key ................................................................................... 143
Figure 6-14 Disabling the Encryption Management Function ...................................................... 144
Figure 6-15 Changing Master Key ............................................................................................ 145
Figure 6-16 Backup or Restore of KEY Database ....................................................................... 145
Figure 6-17 Backup of KEY Database ....................................................................................... 146
Figure 6-18 Clear of Encryption information ............................................................................. 147
Figure 8-1 Names of Cartridge Parts ......................................................................................... 152
Figure 8-2 Data Cartridge Label ................................................................................................ 154
Figure 8-3 Attaching a cartridge label ........................................................................................ 155
Figure 8-4 Write Protection of cartridge ..................................................................................... 156
Figure 9-1 Confirming the Firmware Version ............................................................................. 162
Figure 9-2 Firmware Update Window (Library Firmware Update) ............................................... 163
Figure 9-3 Firmware Update Window (Drive Firmware Update) ................................................. 164
Figure 10-1 Save/Restore Window ............................................................................................ 168
Figure 10-2 Save/Restore Window ............................................................................................ 169