Importing An Encryption Key; Exporting An Encryption Key; Removing An Encryption Key; Understanding Replication - Dell PowerVault DL4000 User Manual

Backup to disk appliance - poweredby appassure
Hide thumbs Also See for PowerVault DL4000:
Table of Contents

Advertisement

Importing An Encryption Key

To import an encryption key
1.
Navigate to the AppAssure 5 Core, and then click the Configuration tab.
2.
From the Manage option, click Security.
3.
Click right angle bracket (>) symbol next to the name of the encryption key you want to import, and then click
Import.
The Import Key dialog box is displayed.
4.
In the Import Key dialog box, click Browse to locate the encryption key you want to import.
5.
Click OK.

Exporting An Encryption Key

To export an encryption key:
1.
Navigate to the AppAssure 5 Core, and then click the Configuration tab.
2.
From the Manage option, click Security.
3.
Click right angle bracket symbol (>) next to the name of the encryption key you want to export, and then click
Export.
The Export Key dialog box is displayed.
4.
In the Export Key dialog box, click Download Key to save and store the encryption keys in a secure location.
5.
Click OK.

Removing An Encryption Key

To remove an encryption key:
1.
Navigate to the AppAssure 5 Core, and then click the Configuration tab.
2.
From the Manage option, click Security.
3.
Click right angle bracket symbol (>) next to the name of the encryption key you want to remove, and then click
Remove.
The Remove Key dialog box is displayed.
4.
In the Remove Key dialog box, click OK to remove the encryption key.
NOTE: Removing an encryption key does decrypt the data.

Understanding Replication

About Replication

Replication is the process of copying recovery points and transmitting them to a secondary location for the purpose of
disaster recovery. The process requires a paired source-target relationship between two cores. The source core copies
the recovery points of the protected agents and then asynchronously and continuously transmits them to a target core
at a remote disaster recovery site. The off-site location can be a company-owned data center (self-managed core) or a
third-party managed service provider's (MSP's) location or cloud environment. When replicating to a MSP, you can use
built-in work flows that let you request connections and receive automatic feedback notifications.
58

Advertisement

Table of Contents
loading

Table of Contents