Contents
Chapter 9
Chapter 10
Chapter 11
Chapter 12
vi
Encryption Key Management Systems . . . . . . . . . . . . . . . . . . . . . . . . 279
KMIP-compliant Encryption Key Management. . . . . . . . . . . . . . . . . . 281
FIPS-Certified Encryption Solution . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Setting up EKM on the Scalar i6000 . . . . . . . . . . . . . . . . . . . . . . . . . 285
Using EKM Path Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304
Monitoring EKM Server Status. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
Using Q-EKM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
Using SKM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308
Extended Data Lifecycle Management
About EDLM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
Configuring EDLM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322
Running Manual EDLM Tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
Viewing EDLM Test Sessions and Report Details . . . . . . . . . . . . . . . . 340
Diagnosing a Suspect EDLM Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . 348
Storage Networking
Using the Storage Networking Wizard . . . . . . . . . . . . . . . . . . . . . . . 350
Licensing Drives for Storage Networking . . . . . . . . . . . . . . . . . . . . . . 351
Configuring Control Path Failover . . . . . . . . . . . . . . . . . . . . . . . . . . . 353
Configuring Data Path Failover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359
Configuring Host Access to Storage Networking Drives and Partitions . .
362
Configuring Access to StorNext
Partition Utilization Reporting
Quantum Scalar i6000 User's Guide
319
349
397
405
Need help?
Do you have a question about the Scalar i6000 and is the answer not in the manual?