IBM System Storage DS3500 Introduction And Implementation Manual page 488

Table of Contents

Advertisement

7914FDE.fm
When the process is complete, the key is created and located as specified; also, as shown in
Figure 15-14 the security identifier is displayed. There are three items that must be kept
secure in order to manage any changes to the FDE drives when they are encryption enabled.
Security key file created from the process
Security key identifier created from the process
Password used
Figure 15-14 Security key creation process complete
The key authorizations now generated are synchronized between both controllers in the
DS3500 storage subsystem. With these authorizations in place, arrays on the FDE drives in
the storage subsystem can be secured.
464
IBM System Storage DS3500: Introduction and Implementation Guide
Draft Document for Review March 28, 2011 12:24 pm

Advertisement

Table of Contents
loading

Table of Contents