Fujitsu ETERNUS LT140 User Manual page 8

Hide thumbs Also See for ETERNUS LT140:
Table of Contents

Advertisement

How the Key Management Function Option works ...................................................................................... 12
Automatic generation of encryption keys .................................................................................................... 15
Data cartridge sharing using one master key .............................................................................................. 16
External storage of data cartridges.............................................................................................................. 17
Encryption of each logical library................................................................................................................. 18
Interoperation among LT-series models ...................................................................................................... 19
Basic setup procedure ................................................................................................................................. 21
Account setting screen ................................................................................................................................ 23
Changing passwords.................................................................................................................................... 24
Logging in to the remote panel................................................................................................................... 25
Initial value of SSL (disabled)...................................................................................................................... 26
SSL setting (enabled) .................................................................................................................................. 27
Confirming the SSL setting change.............................................................................................................. 27
Logging out of the remote panel................................................................................................................. 28
Logging in to the security administrator account ........................................................................................ 29
Setting the key management function ........................................................................................................ 31
Default setting of the key management function........................................................................................ 31
Setting the key management function per partition ................................................................................... 32
Example setting of the key management function for each partition ......................................................... 34
Setting the master key ................................................................................................................................ 36
Confirmation screen for the master key setting........................................................................................... 37
Setting a password for the master key......................................................................................................... 38
Exporting the master key ............................................................................................................................ 39
Saving the master key to export.................................................................................................................. 40
Importing the master key............................................................................................................................ 41
Confirmation screen for importing the master key ...................................................................................... 42
Status of importing the master key ............................................................................................................. 42
Deleting the master key .............................................................................................................................. 43
Confirmation screen for deleting the master key......................................................................................... 44
Encryption key password settings................................................................................................................ 46
Selecting the partition to export the target data cartridges ........................................................................ 47
Selecting the data cartridges that are to be exported ................................................................................. 48
Removing the export target data cartridges................................................................................................ 49
Exporting the encryption key ...................................................................................................................... 50
Saving the encryption key to export ............................................................................................................ 51
Importing the encryption key ...................................................................................................................... 52
Confirmation screen for importing the encryption key ................................................................................ 53
Progress status screen for importing the encryption key ............................................................................. 53
Selecting the partition where the deletion target encryption key exists...................................................... 54
Selecting data cartridges with deletion target encryption keys ................................................................... 55
Excluding data cartridges with deletion target encryption keys .................................................................. 56
Selecting imported encryption keys that are to be deleted ......................................................................... 56
Deleting the imported encryption keys ....................................................................................................... 57
Deletion confirmation of the imported encryption key................................................................................ 57
for the library configuration is performed.................................................................................................... 58
[Status > Security > Security Encryption Status] screen................................................................................ 59
[Status > Security > Partition Encryption Status] screen .............................................................................. 60
FUJITSU Storage ETERNUS LT140 Tape Library Key Management Function Option User's Guide
8
Copyright 2019 FUJITSU LIMITED
List of Figures
P3AG-3762-02ENZ0

Advertisement

Table of Contents
loading

Table of Contents