Fujitsu ETERNUS LT260 User Manual page 8

Tape library
Hide thumbs Also See for ETERNUS LT260:
Table of Contents

Advertisement

How the Key Management Function Option works ...................................................................................... 12
Automatic generation of encryption keys .................................................................................................... 15
Data cartridge sharing using one master key .............................................................................................. 16
External storage of data cartridges.............................................................................................................. 17
Encryption of each logical library................................................................................................................. 18
Interoperation among LT-series models ...................................................................................................... 19
Basic setup procedure ................................................................................................................................. 21
Login screen for the security administrator account .................................................................................... 23
Screen for changing the security administrator password ........................................................................... 24
Logging in to the remote panel................................................................................................................... 25
Initial value of SSL (disabled)...................................................................................................................... 26
SSL setting (enabled) .................................................................................................................................. 26
Confirming the SSL setting change.............................................................................................................. 27
Logging out of the remote panel................................................................................................................. 27
Logging in to the security administrator account ........................................................................................ 28
Setting the key management function ........................................................................................................ 29
Setting the key management function (to enable) ..................................................................................... 30
Confirming the key management function setting ...................................................................................... 30
Selecting the key management function..................................................................................................... 31
Example of enabling the key management function................................................................................... 32
Example of disabling the key management function .................................................................................. 32
Setting the master key ................................................................................................................................ 34
Confirmation screen for the master key setting........................................................................................... 35
Setting a password for the master key......................................................................................................... 36
Exporting the master key ............................................................................................................................ 37
Saving the master key to export.................................................................................................................. 38
Importing the master key............................................................................................................................ 39
Confirmation screen for importing the master key ...................................................................................... 40
Status of importing the master key ............................................................................................................. 40
Deleting the master key .............................................................................................................................. 41
Confirmation screen for deleting the master key......................................................................................... 42
Encryption key password settings................................................................................................................ 44
Selecting the partition to export the target data cartridges ........................................................................ 45
Selecting the data cartridges that are to be exported ................................................................................. 46
Removing the export target data cartridges................................................................................................ 47
Exporting the encryption key ...................................................................................................................... 48
Saving the encryption key to export ............................................................................................................ 49
Importing the encryption key ...................................................................................................................... 50
Confirmation screen for importing the encryption key ................................................................................ 51
Progress status screen for importing the encryption key ............................................................................. 51
Selecting the partition where the deletion target encryption key exists...................................................... 52
Selecting data cartridges with deletion target encryption keys ................................................................... 53
Excluding data cartridges with deletion target encryption keys .................................................................. 54
Selecting imported encryption keys that are to be deleted ......................................................................... 54
Deleting the imported encryption keys ....................................................................................................... 55
Deletion confirmation of the imported encryption key................................................................................ 55
performed ................................................................................................................................................... 56
FUJITSU Storage ETERNUS LT260 Tape Library Key Management Function Option User's Guide
8
Copyright 2016 FUJITSU LIMITED
List of Figures
P3AG-1192-02ENZ0

Advertisement

Table of Contents
loading

Table of Contents