Hp StorageWorks XP Data Integrity Check XP Software Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Úložný prostor Hp StorageWorks XP Data Integrity Check XP Software. HP StorageWorks XP Data Integrity Check XP Software User Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 56
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 0
HP XP P9000 DKA Encryption User Guide
Abstract
This guide describes and provides instructions for using the HP XP P9000 DKA Encryption License Key software to configure
and perform HP DKA Encryption License Key operations. The intended audience is a storage system administrator or authorized
service provider with independent knowledge of HP XP P9000 disk arrays and the HP Remote Web Console.
HP Part Number: AV400-96578
Published: July 2013
Edition: Tenth
Zobrazit stránku 0
1 2 3 4 5 6 ... 55 56

Shrnutí obsahu

Strany 1

HP XP P9000 DKA Encryption User GuideAbstractThis guide describes and provides instructions for using the HP XP P9000 DKA Encryption License Key softw

Strany 2

2 DKA Encryption InstallationThis chapter discusses how to install the EDKA feature.DKA Encryption installation workflowUse the following workflow to

Strany 3 - Contents

Assigning users to user groupsAssign administrator privileges to users in RWC by adding the users to a user group.A user’s membership to a user group

Strany 4 - 4 Contents

3 Key Management Server ConnectionsYou can use an optional key management server with P9500 storage systems. This chapter providesinformation on how t

Strany 5 - Contents 5

Preparing the client certificate workflowUse the following process to prepare the client certificate, which includes setting the client certificateexp

Strany 6 - 1 DKA Encryption Overview

4. Complete the following information:• Country Name (two-letter code)• Email Address• (Optional) Challenge password• (Optional) Common name - To obta

Strany 7

For more information about the appropriate connection settings, contact the key managementserver administrator. For more information about the network

Strany 8 - 8 DKA Encryption Overview

4. In the Setup Key Management Server window, complete the following:• Specify the options to connect to the key management server.• If the key manage

Strany 9

4 Managing data encryption license keysThis chapter provides information on how to manage data encryption license keys. Managing thekeys includes ensu

Strany 10 - 2 DKA Encryption Installation

You must have the Security Administrator (View & Modify) role to back up secondary data encryptionlicense keys.Use the following process to back u

Strany 11

3. In the Encryption Keys table, select the key ID for the data encryption license key you want toback up to a key management server and then complete

Strany 12 - Root and client certificates

© Copyright 2010, 2013 Hewlett-Packard Development Company, L.P.Confidential computer software. Valid license from HP required for possession, use or

Strany 13

4. In the Edit Encryption window of the Edit Encryption wizard, complete the following and thenclick Add:• For Available Groups, select the parity gro

Strany 14

2. On the LDEVs tab, complete one of the following and then click Block LDEVs:• For Parity Group, select the parity group to which the LDEV is associa

Strany 15

Unblocking LDEVs at the parity-group levelUnblock LDEVs at the parity-group level to protect the data after you format an LDEV at theparity-group leve

Strany 16

1. Block the LDEVs associated to the encrypted parity group. Do one of the following:• Block the LDEV using a file on the RWC computer.For more inform

Strany 17

6. In the Restore Keys from File window, complete the following item and then click Finish:• For File Name, shows the name of the selected file.View-o

Strany 18 - Backing up keys as a file

1. Create a new parity group.For more information about creating parity groups, see _________.2. Enable encryption with the new data encryption licens

Strany 19

5. In the Confirm window, complete the following and then click Apply:• Confirm the settings.• For Task Name, type a task name.• (Optional) Select Go

Strany 20

5 TroubleshootingCommon problems using EDKA include connection problems, license problems, and administratorpermission problems. Managing or changing

Strany 21

The following table lists common problems and solutions for encryption features.ActionProblemMake sure that:Cannot use the EDKA feature to back up or

Strany 22

6 Support and other resourcesContacting HPFor worldwide technical support information, see the HP support website:http://www.hp.com/supportBefore cont

Strany 23 - Restoring keys from a file

Contents1 DKA Encryption Overview...6DKA Encryption benefits...

Strany 24

• http://www.hp.com/support/manuals• http://www.hp.com/support/downloads• http://www.hp.com/storage/whitepapersConventions for storage capacity values

Strany 25

WARNING! Indicates that failure to follow directions could result in bodily harm or death.CAUTION: Indicates that failure to follow directions could r

Strany 26

A ConventionsThis appendix describes phrases in this manual that correspond to phrases in the Remote WebConsole windows and messages.Business Copy, Bu

Strany 27 - 5 Troubleshooting

B DKA Encryption GUI ReferenceThis chapter includes descriptions of encryption-related RWC windows and dialog boxes for theEDKA feature.For more infor

Strany 28

Encryption Keys tabUse the Encryption Keys tab to view a list of the data encryption license key details and to selectan unused data encryption licens

Strany 29 - 6 Support and other resources

Key Management Server Properties tableThe following table lists descriptions of the items in the Key Management Server Properties table.DescriptionIte

Strany 30 - Typographic conventions

Setup Key Management Server windowThe following figure shows the Setup Key Management Server window.The following table lists descriptions of the item

Strany 31 - Typographic conventions 31

DescriptionItemFor more information about the root certificate file, contact the serveradministrator or the network administrator.Click Check to start

Strany 32 - A Conventions

DescriptionItemShows the password for the client certificate as ****** (six asterisks).PasswordShows the root certificate file for connecting to the k

Strany 33 - Summary section

Selected Keys table on Confirm windowThe following table lists descriptions of the items in the Selected Keys table on the Confirm window.DescriptionI

Strany 34 - Encryption Keys tab

Restoring keys from a key management server...24Viewing backup data encryption li

Strany 35 - • Confirm window

The following table lists descriptions of the items on the Edit Password Policy window.DescriptionItemThe minimum number of numeric characters that sh

Strany 36

The following table lists descriptions of the items on the Confirm window.DescriptionItemDisplays the minimum number of numeric characters that should

Strany 37 - Confirm window

The following table lists descriptions of the items on the Backup Keys to File window.DescriptionItemThe password for the backup data encryption licen

Strany 38 - Create Keys wizard

Backup Keys to Server wizardUse the Backup Keys to Server wizard to backup data encryption license keys on the keymanagement server.This wizard includ

Strany 39 - Edit Password Policy wizard

Confirm windowThe following figure shows the Confirm window.The following table lists descriptions for the item in the Backup Keys table.DescriptionIt

Strany 40

The following table lists descriptions of the items on the Restore Keys from File window.DescriptionItemThe file name of the selected backup file.File

Strany 41 - Backup Keys to File wizard

The following table lists descriptions of the items on the Confirm window.DescriptionItemThe item of the data encryption license key to restore.ItemTh

Strany 42

The following table lists descriptions of the items in the Selected Backup Keys table in the Confirmwindow.DescriptionItemShows the UUID of the data e

Strany 43 - Backup Keys to Server wizard

The following table lists descriptions of the items in the Selected Keys table in the Delete Keyswindow.DescriptionItemThe IDs of data encryption lice

Strany 44 - Restore Keys from file wizard

The following table lists the descriptions of the items in the Selected Backup Keys table.DescriptionItemShows the UUID of the data encryption license

Strany 45

Delete Backup Keys on Server window...48View Backup Keys on Server

Strany 46

Backup Keys tableThe Backup Keys table is shown on the View Backup Keys on Server window. This table lists thebackup data encryption license keys.The

Strany 47 - Delete Keys wizard

Edit Encryption windowThe Edit Encryption window includes the following items:• Available Parity Groups tableFor more information about this table, se

Strany 48

The following table lists descriptions of the items in the Available Parity Groups table.DescriptionItemShows the parity group IDs.Parity Group IDShow

Strany 49

The following table lists descriptions for the items in the _________ table.DescriptionItemShows parity group IDs.Parity Group IDShows the RAID level

Strany 50 - Edit Encryption wizard

Selected Parity Groups tableUse the Selected Parity Groups table to view a list of the selected parity groups related to the dataencryption license ke

Strany 51 - Edit Encryption window

Glossarybit The basic unit of data in a binary numbering system (binary digit), represented by a 0 or a 1.Eight bits equals one byte.DKA Disk adapter.

Strany 52 - Selected Parity Groups table

IndexAAES-256, 6audit logging, 8, 27Bblocking volumes, 20, 23Ccontacting HP, 29conventionsdocument, 30storage capacity values, 30text symbols, 31Ddata

Strany 53

1 DKA Encryption OverviewTo guarantee the security of the data, use the DKA Encryption (EDKA) feature to store encrypteddata in an LDEV and encrypt th

Strany 54

You can use the EDKA feature to back up data encryption license keys. The P9500 storage systemautomatically creates a primary backup of the data encry

Strany 55 - Glossary

1. Data in the parity group is backed up.2. Data encryption at the parity-group level is disabled.3. The LDEVs in the parity group are formatted.4. Th

Strany 56 - 56 Index

Interoperability with other software applicationsUse the following table to determine the interoperability of software applications with dataencryptio

Komentáře k této Příručce

Žádné komentáře