Scalar i500 User’s Guide vii
Configuring and Viewing the Media Security Log................................... 143
Viewing the Media Usage Log..................................................................... 144
Automatically E-mailing Advanced Reporting Reports and Logs......... 145
Chapter 5 Capacity on Demand 147
Chapter 6 Storage Networking 149
About the Storage Networking License...................................................... 150
Configuring Control Path Failover.............................................................. 151
Basic Control Path Failover (BPF) ........................................................ 152
Multi-Control Path Failover (MCPF) ................................................... 152
Advance Control Path Failover (ACPF).............................................. 153
Forcing Control Path Failover............................................................... 153
Configuring Data Path Failover................................................................... 156
Basic Data Path Failover ........................................................................ 157
Multi-Data Path Failover ....................................................................... 157
Advanced Data Path Failover (ADPF)................................................. 158
Enabling Data Path Failover ................................................................. 159
Forcing Data Path Failover.................................................................... 160
Configuring Host Access .............................................................................. 163
Registering a Host for Host Access...................................................... 164
Enabling Tape Drives for Host Access ................................................ 165
Mapping a Host to Tape Drives and Partitions.................................. 166
Modifying a Host.................................................................................... 166
Deleting a Host........................................................................................ 167
Chapter 7 Encryption Key Management 168
KMIP-compliant Encryption Key Management........................................ 171
General Notes About Encryption on the Library............................... 171
About the EKM License ......................................................................... 172
Configuring Encryption Key Management on the Library ..................... 172
Using EKM Path Diagnostics................................................................ 187
Differences Between Manual and Automatic EKM Path Diagnostics ..
188
Using Manual EKM Path Diagnostics ................................................. 189
Using Automatic EKM Path Diagnostics ............................................ 190