Hitachi Virtual Storage Platform G1000
|
|
|
- Jeffery Heath
- 9 years ago
- Views:
Transcription
1 Hitachi Virtual Storage Platform G1000 Encryption License Key User Guide FASTFIND LINKS Contents Product Version Getting Help MK-92RD
2 2014 Hitachi, Ltd. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or stored in a database or retrieval system for any purpose without the express written permission of Hitachi, Ltd. Hitachi, Ltd., reserves the right to make changes to this document at any time without notice and assumes no responsibility for its use. This document contains the most current information available at the time of publication. When new or revised information becomes available, this entire document will be updated and distributed to all registered users. Some of the features described in this document might not be currently available. Refer to the most recent product announcement for information about feature and product availability, or contact Hitachi Data Systems Corporation at Notice: Hitachi, Ltd., products and services can be ordered only under the terms and conditions of the applicable Hitachi Data Systems Corporation agreements. The use of Hitachi, Ltd., products is governed by the terms of your agreements with Hitachi Data Systems Corporation. Notice on Export Controls. The technical data and technology inherent in this Document may be subject to U.S. export control laws, including the U.S. Export Administration Act and its associated regulations, and may be subject to export or import regulations in other countries. Reader agrees to comply strictly with all such regulations and acknowledges that Reader has the responsibility to obtain licenses to export, re-export, or import the Document and any Compliant Products. Hitachi is a registered trademark of Hitachi, Ltd., in the United States and other countries. Hitachi Data Systems is a registered trademark and service mark of Hitachi, Ltd., in the United States and other countries. Archivas, Essential NAS Platform, HiCommand, Hi-Track, ShadowImage, Tagmaserve, Tagmasoft, Tagmasolve, Tagmastore, TrueCopy, Universal Star Network, and Universal Storage Platform are registered trademarks of Hitachi Data Systems Corporation. AIX, AS/400, DB2, Domino, DS6000, DS8000, Enterprise Storage Server, ESCON, FICON, FlashCopy, IBM, Lotus, MVS, OS/390, RS/6000, S/390, System z9, System z10, Tivoli, VM/ESA, z/os, z9, z10, zseries, z/ VM, and z/vse are registered trademarks or trademarks of International Business Machines Corporation. All other trademarks, service marks, and company names in this document or website are properties of their respective owners. Microsoft product screen shots are reprinted with permission from Microsoft Corporation. ii
3 Contents Preface vii Intended audience viii Product version viii Document revision level viii Changes in this revision viii Referenced documents viii Document conventions ix Accessing product documentation x Getting help x Comments x 1 Encryption License Key Overview Encryption License Key benefits Encryption License Key support specifications When are data encryption license keys needed Primary and secondary data encryption license keys KMIP key management server support Audit logging of encryption events Interoperability requirements and considerations Workflow for enabling data encryption Workflow for encrypting existing data Workflow for disabling encryption Workflow for changing the encryption license key Encryption License Key Installation Workflow for Encryption License Key installation System requirements Enabling the Encryption License Key feature Disabling the Encryption License Key feature iii
4 3 Key Management Server Connections Key management server requirements Root and client certificates Root certificate on the key management server Client certificate password Workflow for preparing the client certificate Converting the client certificate to the PKCS#12 format Uploading the root and client certificate Workflow for edit encryption environmental settings Configuring the connection settings to the key management server Settings in the Edit Encryption Environmental Settings window Managing data encryption license keys Workflow for creating data encryption license keys Creating data encryption license keys Workflow for backing up secondary data encryption license keys Backing up keys as a file Backing up keys to a key management server Opening the Backup Keys to Server window using the Encryption window 4-5 Opening the Backup Keys to Server window using the View Backup Keys on Server window Editing the password policy Workflow for enabling data encryption on parity groups Enabling data encryption at the parity group-level Workflow for disabling data encryption at the parity-group level Disabling data encryption at the parity-group level Encryption formatting at the parity-group level Workflow for restoring data encryption license keys Restoring keys from a file Restoring keys from a key management server Workflow for deleting data encryption license keys Deleting data encryption license keys Deleting backup data encryption license keys from the server Viewing encryption keys backed up on the key management server Exporting encryption license key table information Rekeying key encryption keys Rekeying certificate encryption keys Retrying Key Encryption Key Acquisition Initialize the connection settings to the key management server Troubleshooting Troubleshooting for Encryption License Key Contacting the Hitachi Data Systems Support Center iv
5 A Encryption License Key GUI Reference A-1 Encryption Keys window A-2 Edit Encryption Environmental Settings wizard A-4 Edit Encryption Environmental Settings window A-4 Edit Encryption Environmental Settings confirmation window A-8 Create Keys wizard A-10 Create Keys window A-10 Create Keys confirmation window A-10 Edit Password Policy (Backup Encryption Keys) wizard A-11 Edit Password Policy (Backup Encryption Keys) window A-12 Edit Password Policy (Backup Encryption Keys) confirmation window.... A-13 Backup Keys to File wizard A-15 Backup Keys to File window A-15 Backup Keys to File confirmation window A-18 Backup Keys to Server wizard A-18 Backup Keys to Server window A-19 Backup Keys to Server confirmation window A-20 Restore Keys from file wizard A-20 Restore Keys from File window A-21 Restore Keys confirmation window A-22 Restore Keys from Server wizard A-22 Restore Keys from Server window A-23 Restore Keys from Server confirmation window A-24 Delete Keys wizard A-24 Delete Keys window A-25 Delete Keys confirmation window A-26 Delete Backup Keys on Server window A-26 View Backup Keys on Server window A-27 Edit Encryption wizard A-29 Edit Encryption window A-30 Edit Encryption confirmation window A-34 Rekey Certificate Encryption Keys window A-35 Rekey Key Encryption Key window A-36 Retry Key Encryption Key Acquisition window A-37 Glossary Index v
6 vi
7 Preface This document describes and provides instructions for installing and using the Encryption License Key feature of the Hitachi Virtual Storage Platform G1000 storage system. Please read this document carefully to understand how to use this product, and maintain a copy for reference purposes. Intended audience Product version Document revision level Changes in this revision Referenced documents Document conventions Accessing product documentation Getting help Comments Preface vii
8 Intended audience Product version This document is intended for system administrators, Hitachi Data Systems representatives, and authorized service providers who install, configure, and operate the Hitachi Virtual Storage Platform G1000. Readers of this document should be familiar with the following: Data processing and RAID storage systems and their basic functions. The Hitachi Virtual Storage Platform G1000 and the Hitachi Virtual Storage Platform G1000 Product Guide. The Hitachi storage management software for the Hitachi Virtual Storage Platform G1000 (Hitachi Command Suite or Hitachi Device Manager - Storage Navigator) and the software user manual (Hitachi Command Suite User Guide or Hitachi Virtual Storage Platform G1000 Mainframe System Administrator Guide). The use of data encryption in a storage environment. This document revision applies to Hitachi Virtual Storage Platform G1000 microcode x or later. Document revision level Changes in this revision Revised navigation steps in procedures. Referenced documents Revision Date Description MK-92RD April 2014 Initial release MK-92RD August 2014 Supersedes and replaces MK-92RD MK-92RD October 2014 Supersedes and replaces MK-92RD Hitachi Virtual Storage Platform G1000 documents: Hitachi Virtual Storage Platform G1000 Hardware Guide, MK-92RD8007 Hitachi Virtual Storage Platform G1000 Mainframe System Administrator Guide, MK-92RD8016 Hitachi Command Suite User Guide, MK-90HC172 Hitachi Command Suite Audit Log Reference Guide, MK-92HC213 Hitachi Virtual Storage Platform G1000 Provisioning Guide for Mainframe Systems, MK-92RD8013 Hitachi Virtual Storage Platform G1000 Provisioning Guide for Open Systems, MK-92RD8014 Hitachi Command Suite Messages, MK-90HC178 viii Preface
9 Document conventions This document uses the following terminology conventions: Convention Description Hitachi storage management software Refers to all supported software products for the Hitachi Virtual Storage Platform G1000 unless otherwise noted: Hitachi Command Suite Hitachi Device Manager - Storage Navigator This document uses the following typographic conventions. Convention Description Bold Italic Indicates text on a window, such as menus, menu options, buttons, text boxes, and labels. Example: Click OK. Indicates a variable, which is a placeholder for actual text provided by the user or system. Example: copy source-file target-file Note: Angled brackets (< >) also indicate variables. screen/code Indicates text that is displayed on screen or typed by the user. Example: # pairdisplay -g oradb < > angled brackets Indicates a variable, which is a placeholder for actual text provided by the user or system. Example: # pairdisplay -g <group> Note: Italic font also indicates variables. [ ] square brackets Indicates optional values. Example: [ a b ] means that you can choose a, b, or nothing. { } braces Indicates required values. Example: { a b } means that you must choose either a or b. vertical bar Indicates that you have a choice between two or more options or arguments. Example:[ a b ] means that you can choose a, b, or nothing. Underline Indicates the default value. Example: [ a b ] This document uses the following icons to draw attention to information. Icon Meaning Description Tip Provides helpful information, guidelines, or suggestions for performing tasks more effectively. Note Calls attention to important and/or additional information. Preface ix
10 Icon Meaning Description Caution Warns the user of adverse conditions and/or consequences (e.g., disruptive operations). WARNING Warns the user of severe conditions and/or consequences (e.g., destructive operations). Accessing product documentation Getting help Comments The Hitachi Virtual Storage Platform G1000 user documentation is available on the Hitachi Data Systems Portal: Check this site for the most current documentation, including important updates that may have been made after the release of the product. The Hitachi Data Systems customer support staff is available 24 hours a day, seven days a week. If you need technical support, log on to the Hitachi Data Systems Portal for contact information: Please send us your comments on this document: [email protected]. Include the document title and number, including the revision level (for example, -05), and refer to specific sections and paragraphs whenever possible. All comments become the property of Hitachi Data Systems Corporation. Thank you! x Preface
11 1 Encryption License Key Overview The chapter describes the Encryption License Key feature of the Hitachi Virtual Storage Platform G1000 storage system. Encryption License Key benefits Encryption License Key support specifications When are data encryption license keys needed Primary and secondary data encryption license keys KMIP key management server support Audit logging of encryption events Interoperability requirements and considerations Workflow for enabling data encryption Workflow for encrypting existing data Workflow for disabling encryption Workflow for changing the encryption license key Encryption License Key Overview 1 1
12 Encryption License Key benefits To guarantee the security of data, use the Encryption License Key feature to encrypt the data stored on the Hitachi Virtual Storage Platform G1000. Encrypting data can prevent information loss and leaks, for example, when a drive is physically removed from the storage system due to failure or theft. The Encryption License Key feature provides the following benefits: Hardware-based AES 256 encryption in XTS mode for open and mainframe systems. You can apply encryption to some or all of the internal drives without throughput or latency impacts for data I/O and little to no disruption to existing applications and infrastructure. Simplified and integrated key management that does note require specialized key management infrastructure. Encryption License Key support specifications The following table lists the support specifications for Encryption License Key. Hardware specifications LDEVs that you can encrypt Item Encryption algorithm Encryption mode Volume type Emulation type Internal/external LDEVs LDEV with existing data Specification Advanced Encryption Standard (AES) 256 bit. XTS mode. Open, mainframe, multiplatform. All emulation types. Internal LDEVs only. Supported. Requires data migration. 1 2 Encryption License Key Overview
13 Managing data encryption license keys Item Creating data encryption license keys Deleting data encryption license keys Unit of encryption/ decryption Scope of data encryption license keys Attribute of encryption license keys Backup/Restore functionality Specification Use the Hitachi storage management software to create data encryption license keys. Use the Hitachi storage management software to delete data encryption license keys. However, you cannot delete data encryption license keys that are allocated to implemented drives. Parity group. Data encryption license keys are used per HDD. 4,096 data encryption license keys per storage system. You can create 4,096 Free keys or DEK keys. You can create 32 CEK keys and one KEK key. Therefore, the total number of data encryption license keys will be 4,129 when including CEK keys and KEK keys. The following attributes will be set for the encryption license keys: Free: The unused key before allocating the encryption license key. DEK: The encryption license key. The key for the encryption of the stored data. CEK: The certificate encryption key. The key for the encryption of the certificate and the key for the encryption of DEK per HDD. KEK: Key Encryption Key. The key for the encryption of the CEK. Redundant (primary and secondary) backup/restore copies. When are data encryption license keys needed After you have completed the encryption environmental settings, you will need data encryption license keys to perform the following operations: Adding drives A Free key is needed for each drive to allocate a DEK key. Replacing drives A Free key is needed for each drive to change a DEK key. Adding or replacing disk adapters Six Free keys are needed for each disk adapter to create four CEK keys and two keys to register CEK keys. Updating CEK keys Encryption License Key Overview 1 3
14 Four Free keys for each disk adapter (32 Free keys per storage system) are needed to change CEK keys. If a problem occurs during an operation, extra keys might be needed to recover from the problem. Primary and secondary data encryption license keys The Hitachi Virtual Storage Platform G1000 automatically creates a primary backup of each data encryption license key and stores this backup on each MP package. The Encryption License Key feature enables you to create secondary backups of the data encryption license keys for the Hitachi Virtual Storage Platform G1000. If the primary backup key is unavailable, the secondary backup is required to restore the key. WARNING: If the primary backup key becomes unavailable and no secondary backup key exists, the system cannot decrypt the encrypted data. It is strongly recommended that you back up each key or group of keys immediately after you create them and schedule regular weekly backups of all keys to ensure data availability. You are responsible for storing the secondary backup keys securely. It is also recommended that you back up each key after you perform any of the following operations: Adding, removing, or replacing drives Adding, removing, or replacing disk adapters Updating CEK keys Updating KEK keys Note: The creation and secure storage of secondary backup encryption license keys must be included as part of your corporate security policy. For details about backing up secondary data encryption license keys, see Workflow for backing up secondary data encryption license keys on page 4-3. KMIP key management server support Using the Encryption License Key feature, you can create backup and restore data encryption license keys on a key management server that supports Key Management Interoperability Protocol (KMIP). There are a limited number of keys you can back up on the key management server. Therefore, it is recommended that you delete unnecessary keys when possible. For details about backing up data encryption license keys to a key management server, see Backing up keys to a key management server on page Encryption License Key Overview
15 Audit logging of encryption events The Audit Log feature of the Hitachi Virtual Storage Platform G1000 provides audit logging of events that happen in the system. The audit log records events related to data encryption and data encryption license keys. For details about audit logging and audit log events, see the Hitachi Command Suite Audit Log Reference Guide. Interoperability requirements and considerations The following table provides the interoperability requirements and considerations for Encryption License Key operations. Functions ShadowImage, TrueCopy, Compatible FlashCopy V2, and Compatible XRC Thin Image Universal Replicator Dynamic Provisioning, Dynamic Tiering, Dynamic Provisioning for Mainframe, and Dynamic Tiering for Mainframe Interoperability requirements and considerations Encrypt both the P-VOL and S-VOLs (S-VOL and T-VOLs for Compatible FlashCopy V2) of pairs to ensure data security. Match the encryption states of the P-VOL and pool-vol. If the P-VOL is encrypted, encrypt all of the pool-vols. If the data pool contains non-encrypted pool-vol, the differential data of the P-VOL is not encrypted. Match the encryption states of a P-VOL and S-VOL. If you encrypt the P-VOL only, the data copied on the S-VOL is not encrypted and therefore not protected. When you encrypt a P-VOL or S-VOL, use a journal to which only encrypted LDEVs are registered as journal volumes. If the encryption states of the P-VOL, S-VOL, and journal volumes do not match, the journal data in the P-VOL is not encrypted, and the security of the data cannot be guaranteed. When enabling encryption for data written to a data pool with a V-VOL, use a data pool that consists of encrypted volumes. Workflow for enabling data encryption Use the following process to set up for and enable data encryption: 1. Create a secondary backup of the data encryption license key. For details, see Workflow for backing up secondary data encryption license keys on page Enable data encryption at the parity-group level. For details, see Enabling data encryption at the parity group-level on page Format the LDEVs in the encrypted parity group. The data to be stored on these new LDEVs will be encrypted. For instructions on formatting LDEVs, see the Hitachi Virtual Storage Platform G1000 Provisioning Guide for Open Systems. Encryption License Key Overview 1 5
16 Workflow for encrypting existing data To encrypt existing data, you must migrate the data to an encrypted parity group. Use the following process to encrypt existing data: 1. Create a new parity group. 2. Enable data encryption on the parity group. For details, see Enabling data encryption at the parity group-level on page Format the LDEVs in the encrypted parity group. For instructions, see the Hitachi Virtual Storage Platform G1000 Provisioning Guide for Open Systems. 4. Migrate the existing data to the LDEVs in the encrypted parity group. For details about data migration, contact your Hitachi Data Systems account team. Workflow for disabling encryption Use the following process to disable encryption: 1. Back up the data in the parity group. 2. Disable data encryption at the parity-group level. For details, see Workflow for disabling data encryption at the parity-group level on page Format the LDEVs in the parity group. For instructions, see the Hitachi Virtual Storage Platform G1000 Provisioning Guide for Open Systems. Workflow for changing the encryption license key To change the encryption license key for existing encrypted data, you must migrate the data to an encrypted parity group that has a different encryption license key. Use the following process to change the encryption license key for encrypted data: 1. Create a new parity group. 2. Enable encryption with a new data encryption license key. For details, see Enabling data encryption at the parity group-level on page Format the LDEVs in the encrypted parity group. For instructions, see the Hitachi Virtual Storage Platform G1000 Provisioning Guide for Open Systems. 4. Migrate the source data to the new target LDEVs in the encrypted parity group. When a drive is replaced, the data encryption license keys that are allocated to that drive are deleted, and new data encryption license keys are allocated when the new drive is added. 1 6 Encryption License Key Overview
17 2 Encryption License Key Installation This chapter describes how to install the Encryption License Key feature. Workflow for Encryption License Key installation System requirements Enabling the Encryption License Key feature Disabling the Encryption License Key feature Encryption License Key Installation 2 1
18 Workflow for Encryption License Key installation Use the following process to install the Encryption License Key feature: 1. Verify that your system meets the system requirements. For details, see System requirements on page Enable the Encryption License Key feature. For details, see Enabling the Encryption License Key feature on page Assign the Security Administrator (View & Modify) role to the administrator who creates, backs up, and restores data encryption license keys. For details, see Enabling the Encryption License Key feature on page 2-2. System requirements The following table lists the system requirements for the Encryption License Key feature. Item Hitachi Virtual Storage Platform G1000 Hitachi Command Suite Hitachi Device Manager - Storage Navigator SVP (Web server) Host platforms Data volumes Disk adapter Requirement Microcode x and later. Encryption License Key software license Security Administrator (View & Modify) role to enable or disable data encryption and to back up or restore keys Storage Administrator (provisioning) role to format volumes To connect to the key management server by specifying the host name instead of IP address, you need the DNS server settings. For SVP configuration, give your service representative the IP address of the DNS server. All open-systems and mainframe host platforms are supported. All volume types and emulations are supported: opensystems, mainframe, and multiplatform. Supported volumes: Internal A disk adapter that provides data encryption. Enabling the Encryption License Key feature To enable the Encryption License Key feature: 1. Enable the software license key for the Encryption License Key feature. For instructions, see the Hitachi Command Suite User Guide or the Hitachi Virtual Storage Platform G1000 Mainframe System Administrator Guide. 2 2 Encryption License Key Installation
19 If the Encryption License Key software license expires or is missing, you cannot delete the encryption key. 2. Assign the Security Administrator (View & Modify) role to the user who will be enabling or disabling data encryption and back up or restoring keys. For details about assigning roles, see the Hitachi Command Suite User Guide or the Hitachi Virtual Storage Platform G1000 Mainframe System Administrator Guide. Disabling the Encryption License Key feature Caution: You must perform steps 1 and 2 in the following procedure before you delete the software license key. 1. Disable data encryption at the parity-group level. For instructions, see Disabling data encryption at the parity-group level on page Initialize the connection settings to the key management server. For instructions, see Initialize the connection settings to the key management server on page Disable the software license key. For instructions, see the Hitachi Command Suite User Guide or the Hitachi Virtual Storage Platform G1000 Mainframe System Administrator Guide. Encryption License Key Installation 2 3
20 2 4 Encryption License Key Installation
21 3 Key Management Server Connections You can use an optional key management server with the Hitachi Virtual Storage Platform G1000. This chapter provides information on setting up the key management server. Key management server requirements Workflow for edit encryption environmental settings Key Management Server Connections 3 1
22 Key management server requirements The key management server must meet the following requirements: Protocol: Key Management Interoperability Protocol 1.0 (KMIP1.0) Software: SafeNet KeySecure k or Thales keyauthority Certificates: Root certificate of the key management server (X.509) Client certificate in PKCS#12 format Root and client certificates Root and client certificates are required to connect to KMIP servers and to ensure that the network access is good. You upload the certificates to the SVP. To access the key management server, the client certificate must be current and not expired. For details about the client certificate password in PKCS#12 format: Contact the key management server administrator. See Client certificate password on page 3-2. To get copies of the root and client certificates, contact the key management server administrator. For details about uploading the client certificates, see Uploading the root and client certificate on page 3-3. Root certificate on the key management server If you use SafeNet KeySecure or Thales keyauthority on the key management server, create and put the root certificate on the server. For details about SafeNet KeySecure, see the SafeNet KeySecure k460 documentation. For details about Thales keyauthority, see the Thales keyauthority documentation. The root certificate of the key management server must be in X.509 format. Client certificate password The password can be from 0 to 128 characters in length. The valid characters for the password are: Numbers (0 to 9) Upper case letters (A-Z) Lower case letters (a-z) The following symbols:! # $ % & ' ( ) * +, -. / : ; < = [ \ ] ^ _ ` { } ~ For details about converting the client certificate to PKCS#12 format, see Converting the client certificate to the PKCS#12 format on page Key Management Server Connections
23 For details about client certificates, see Root and client certificates on page 3-2. Workflow for preparing the client certificate Use the following process to prepare the client certificate, which includes setting the client certificate expiration date and password: 1. Download and install openssl.exe from to the C:\openssl folder. 2. Create the key file. You can create the following types of key files: Private key file. Public key file. 3. Convert the client certificate to PKCS#12 format. For details, see Converting the client certificate to the PKCS#12 format on page Upload the root and client certificates to the SVP. For details, see Uploading the root and client certificate on page 3-3. Converting the client certificate to the PKCS#12 format Convert the client certificate to the PKCS#12 format, which includes uploading the client certificate in the PKCS#12 format to the 200 Storage Virtualization System (SVP). 1. From an open command prompt, change the current directory to the folder where you want to save the client certificate in the PKCS#12 format. 2. Move the private SSL key file (.key) and the client certificate to the folder in the current directory, and run the command. The following is an example for an output folder of c:\key, private key file (client.key), and a client certificate file (client.crt: C:\key>c:\openssl\bin\openssl pkcs12 -export -in client.crt - inkey client.key -out client.p12 3. Type the client certificate password. For details about the client certificate password, see Client certificate password on page 3-2. Uploading the root and client certificate Before you configure the connection settings to the key management server, you must upload the root certificate and the client certificate. Prerequisites Required role: Security Administrator (View & Modify) 1. In Hitachi Command Suite: a. On the Resources tab, click Storage Systems, and then expand All Storage Systems. Key Management Server Connections 3 3
24 b. Expand the target storage system, and then select Encryption Keys. In Device Manager - Storage Navigator (mainframe-only environment): a. Display the Device Manager - Storage Navigator main window. b. Select Administration in Explorer, and select Encryption Keys. 2. Click Edit Encryption Environmental Settings. 3. Upload the certificates in the Edit Encryption Environmental Settings window. Workflow for edit encryption environmental settings To use a key management server, you must configure the connection and network settings. You can also set the encryption settings such as disabling the local key generations and storing key encryption key to DKC. For more information about the appropriate connection settings, contact the key management server administrator. For more information about the network settings, contact your network administrator. Caution: Encryption keys backed up on the key management server are managed with the client certificate. If the client certificate is lost, and the SVP is replaced due to a failure, you cannot restore the encryption keys that were backed up before the replacement. When the connection settings are backed up to the key management server, the system does not back up the client certificate. Make sure that you back up a copy of the connection settings to the key management server and save a copy of the client certificate separately. Refer to your corporate security policy for procedures related to backups. 1. Ensure the client and root certificates are uploaded to the key management server. If the certificates are not uploaded: Contact the key management server administrator. See Converting the client certificate to the PKCS#12 format on page 3-3 and Uploading the root and client certificate on page Configure the connection settings to the key management server. For details, see Configuring the connection settings to the key management server on page Confirm that you can connect to the key management server. 4. Check with the key management server administrator, then save a back up copy of the client certificate. 5. Back up the connection settings to the key management server. For instructions, see the Hitachi Command Suite User Guide or the Hitachi Virtual Storage Platform G1000 Mainframe System Administrator Guide. 3 4 Key Management Server Connections
25 Configuring the connection settings to the key management server Configure the connection settings to the key management server to set up the key management server and to back up the data encryption license keys to the key management server. For more information, see Settings in the Edit Encryption Environmental Settings window on page 3-6 and Backing up keys to a key management server on page 4-4. To connect to the key management server by host name instead of IP address, send the IP address of the DNS server to your service representative and request that the service representative configure the SVP. If the key management server is unavailable after you complete this task, the settings may be incorrect. Contact the server or network administrator. Prerequisites Required role: Security Administrator (View & Modify) 1. In Hitachi Command Suite: a. On the Resources tab, click Storage Systems, and then expand All Storage Systems. b. Expand the target storage system, and then select Encryption Keys. In Device Manager - Storage Navigator (mainframe-only environment): a. Display the Device Manager - Storage Navigator main window. b. Select Administration in Explorer, and select Encryption Keys. 2. Select the Encryption Keys tab. 3. Click Edit Encryption Environmental Settings. 4. In the Edit Encryption Environmental Settings window, select Enable or Disable on the Key Management Server. 5. If you connect to the Key Management Server, specify the primary server and the secondary server. 6. If the key management server is already in use, select Check to test the connection. Error messages appear if the server configuration test fails. 7. Create an encryption key: To generate an encryption key on the key management server, select Generate Encryption Keys on Key Management Server. To store the encryption key on the key management server, select Protect the Key Encryption Key on the Key Management Server, then I Agree. Caution: If you have selected Protect the Key Encryption Key on the Key Management Server in Generate Encryption Keys on Key Management Server, the storage system will try to get encryption keys backed up on the key management server once the storage system is turned on. Therefore, it is recommended that you confirm that the SVP is connected to the key management server properly before turning the storage system on. Key Management Server Connections 3 5
26 To generate an encryption key on the key management server without creating an encryption key in the storage system, select Disable Local Key Generation. Confirm the Warning that displays and select I Agree. Caution: When you select the Disable local key generation and I Agree check-boxes in Generate Encryption Keys on Key Management Server and finished the settings, you cannot undo this action. 8. To backup data encryption license keys to the key management server, click Next. Otherwise, click Finish. 9. In the Confirm window, confirm the settings, and enter your task name in Task Name. If you want the Task window to open after you click Apply, select Go to tasks window for status. Click Apply. The connection to the key management server is set up. Related topics Edit Encryption Environmental Settings window on page A-4 Settings in the Edit Encryption Environmental Settings window To manage encryption keys properly, refer to the following flow chart and table and choose settings for the Edit Encryption Environmental Settings window accordingly. 3 6 Key Management Server Connections
27 Settings in the Edit Encryption Environmental Settings window Key Management Server Generate Encryption Keys on Key Management Server Protect the Key Encryption Key at the Key Management Server Disable local key generation #1 Select Disable Do not check Do not check Do not check #2 Select Enable Do not check Do not check Do not check #3 Select Enable Check Do not check Do not check #4 Select Enable Check Check Do not check #5 Select Enable Check Check Check Key Management Server Connections 3 7
28 3 8 Key Management Server Connections
29 4 Managing data encryption license keys This chapter provides instructions for managing data encryption license keys using the Encryption License Key feature of the Hitachi Virtual Storage Platform G1000 storage system. Workflow for creating data encryption license keys Editing the password policy Workflow for enabling data encryption on parity groups Workflow for disabling data encryption at the parity-group level Workflow for restoring data encryption license keys Workflow for deleting data encryption license keys Viewing encryption keys backed up on the key management server Exporting encryption license key table information Rekeying key encryption keys Rekeying certificate encryption keys Retrying Key Encryption Key Acquisition Initialize the connection settings to the key management server Managing data encryption license keys 4 1
30 Workflow for creating data encryption license keys Create a data encryption license key to use with the Encryption License Key feature. Use the following process to create a data encryption license key: 1. Create the data encryption license key or group of keys. For details, see Creating data encryption license keys on page Back up the secondary data encryption license key. For details, see Workflow for backing up secondary data encryption license keys on page Schedule regular weekly backups of all of your data encryption license keys to ensure data availability. Creating data encryption license keys If you need to change a data encryption license key, create a new data encryption license key. 4,048 Free keys or DEK keys are created when you configure encryption environmental settings on the Edit Encryption Environmental Settings window for the first time (this differs from the configuration. 4,048 keys are created if maximum disk adapters are installed). After that, you can create 4,096 Free keys or DEK keys. You can create up to 4,096 encryption keys per storage system. When you configure encryption environmental settings on the Edit Encryption Environmental Settings window again, Free Keys are not created, and DEK keys and CEK keys are not updated. Keys that were created previously will be used. Encryption keys are commonly created in the storage system. However, when the key management server is in use, and Generate Encryption Keys on Key Management Server is checked in the Edit Encryption Environmental Settings window, encryption keys will be created on the key management server, and used in the storage system. After creating data encryption license keys, it is strongly recommended that you back up each key. Prerequisites Required role: Security Administrator (View & Modify) 1. In Hitachi Command Suite: a. On the Resources tab, click Storage Systems, and then expand All Storage Systems. b. Expand the target storage system, and then select Encryption Keys. In Device Manager - Storage Navigator (mainframe-only environment): a. Display the Device Manager - Storage Navigator main window. b. Select Administration in Explorer, and select Encryption Keys. 2. Select the Encryption Keys tab. 3. Click Create Keys. 4 2 Managing data encryption license keys
31 4. In the Create Keys window, specify the number of encryption keys you want to create. The encryption keys with the attribute of Free will be set. The key IDs will be automatically assigned. 5. To backup data encryption license keys to the key management server, click Next. Otherwise, click Finish. 6. In the Confirm window, confirm the settings, and enter your task name in Task Name. If you want the Task window to open after you click Apply, select Go to tasks window for status. Click Apply. The new data encryption license key is created. Related topics Create Keys window on page A-10 Workflow for backing up secondary data encryption license keys The Hitachi Virtual Storage Platform G1000 automatically creates a primary backup of the data encryption license key. You can also back up a secondary data encryption license. The backup of the encryption key is performed to the existing DEK keys and CEK keys at the same time. In addition, it is recommended that you back up each key after you perform any of the following operations: Creating encryption license keys. Adding, removing, or replacing drives. Adding, removing, or replacing disk adapters. Updating CEK keys. Updating KEK keys. Use the following process to back up a secondary data encryption license key: 1. Confirm that the Virtual Storage Platform G1000 is not processing other tasks. You cannot back up a key while the Virtual Storage Platform G1000 is processing other tasks. 2. Use one of the following methods to back up the secondary data encryption license key: Back up the secondary data encryption license key as a file on the HCS management server or HDvM - SN computer. For details, see Backing up keys as a file on page 4-4. Back up the secondary data encryption license key to a key management server. For details, see Backing up keys to a key management server on page 4-4. Managing data encryption license keys 4 3
32 Backing up keys as a file Back up a secondary data encryption license keys as a file on the computer. Back up the file and the password since the file and password are not automatically backed up. Prerequisites Required role: Security Administrator (View & Modify) 1. In Hitachi Command Suite: a. On the Resources tab, click Storage Systems, and then expand All Storage Systems. b. Expand the target storage system, and then select Encryption Keys. In Device Manager - Storage Navigator (mainframe-only environment): a. Display the Device Manager - Storage Navigator main window. b. Select Administration in Explorer, and select Encryption Keys. 2. Select the Encryption Keys tab. 3. In the Encryption Keys table, select the key ID for the data encryption license key you want to back up and Click Backup Keys > To File. 4. In the Backup Keys to File window, complete the following and then click Finish: For Password, type the key restoration password. Case sensitive: Yes For Re-enter Password, retype the password. 5. In the Confirm window, confirm the settings, and enter your task name in Task Name. If you want the Task window to open after you click Apply, select Go to tasks window for status. Click Apply. 6. In the message that appears, click OK. 7. Select the location to which to save the backup file, and then type the backup file name using the extension.ekf. 8. Click Save. The secondary backup encryption license key is saved. Related topics Encryption Keys window on page A-2 Backup Keys to File window on page A-15 Backing up keys to a key management server Back up data encryption license keys to a key management server. The data encryption license keys that you back up to a key management server are managed with the client certificate. 4 4 Managing data encryption license keys
33 There is a limited number of keys you can back up on the key management server. Therefore, it is recommended that you delete unnecessary keys when possible. When you back up to a key management server, the server uses another data encryption license key to encrypt the original keys. Both keys reside on the server. Prerequisites Required role: Security Administrator (View & Modify) 1. In Hitachi Command Suite: a. On the Resources tab, click Storage Systems, and then expand All Storage Systems. b. Expand the target storage system, and then select Encryption Keys. In Device Manager - Storage Navigator (mainframe-only environment): a. Display the Device Manager - Storage Navigator main window. b. Select Administration in Explorer, and select Encryption Keys. 2. On the Encryption Keys tab, click View Backup Keys on Server to open the Backup Keys to Server window. 3. (Optional) In the Backup Keys to Server window, for Description, type a description and then click Finish. 4. In the Confirm window, confirm the settings, and enter your task name in Task Name. If you want the Task window to open after you click Apply, select Go to tasks window for status. Click Apply. The secondary backup encryption license key is saved. Related topics Encryption Keys window on page A-2 Backup Keys to Server window on page A-19 Opening the Backup Keys to Server window using the Encryption window Prerequisites Required role: Security Administrator (View & Modify) 1. In Hitachi Command Suite: a. On the Resources tab, click Storage Systems, and then expand All Storage Systems. b. Expand the target storage system, and then select Encryption Keys. In Device Manager - Storage Navigator (mainframe-only environment): a. Display the Device Manager - Storage Navigator main window. b. Select Administration in Explorer, and select Encryption Keys. Managing data encryption license keys 4 5
34 2. On the Encryption Keys tab, select the key ID for the data encryption license key you want to back up from the Encryption Keys table, and click Backup Keys > To Server. Opening the Backup Keys to Server window using the View Backup Keys on Server window Prerequisites Required role: Security Administrator (View & Modify) 1. In Hitachi Command Suite: a. On the Resources tab, click Storage Systems, and then expand All Storage Systems. b. Expand the target storage system, and then select Encryption Keys. In Device Manager - Storage Navigator (mainframe-only environment): a. Display the Device Manager - Storage Navigator main window. b. Select Administration in Explorer, and select Encryption Keys. 2. On the Encryption Keys tab, click View Backup Keys on Server. 3. Click Backup Keys to Server. Editing the password policy You can set the minimum number of characters required for passwords. Prerequisites Required role: Security Administrator (View & Modify) 1. In Hitachi Command Suite: a. On the Administration tab, click Security, and then Password. b. In the Password window, click Edit Settings. c. In the Password Policy window, set the minimum number of characters. In Device Manager - Storage Navigator (mainframe-only environment): a. Display the Device Manager - Storage Navigator main window. b. From the Settings menu, select Security > Encryption Key > Edit Password Policy (Backup Encryption Keys). c. In the Edit Password Policy (Backup Encryption Keys) window, set the minimum number of characters. 2. In Hitachi Command Suite, you can click OK. In Device Manager - Storage Navigator, you can click Finish. 3. In the Confirm window, confirm the settings, and enter your task name in Task Name. If you want the Task window to open after you click Apply, select Go to tasks window for status. Click Apply. 4 6 Managing data encryption license keys
35 Related topics Edit Password Policy (Backup Encryption Keys) window on page A-12 Workflow for enabling data encryption on parity groups The Encryption License Key feature provides data encryption at the paritygroup level to protect data on LDEVs. Use the following process to set up for data encryption and enable data encryption on parity groups: 1. Back up the secondary data encryption license key. For details, see Workflow for backing up secondary data encryption license keys on page Block the LDEVs at the parity-group level. For details, see the Hitachi Virtual Storage Platform G1000 Provisioning Guide for Mainframe Systems or Hitachi Virtual Storage Platform G1000 Provisioning Guide for Open Systems. 3. Enable data encryption on the parity group. For details, see Enabling data encryption at the parity group-level on page Format the LDEVs at the parity-group level. For details, see Workflow for enabling data encryption on parity groups on page 4-7. Enabling data encryption at the parity group-level Data encryption is enabled at the parity-group level. Prerequisites Required role: Security Administrator (View & Modify) Required role to format volumes: Storage Administrator (Provisioning) 1. In Hitachi Command Suite: a. On the Resources tab, click Storage Systems, and then expand All Storage Systems. b. Expand the target storage system, and then select Parity Groups. In Device Manager - Storage Navigator (mainframe-only environment): a. Display the Device Manager - Storage Navigator main window. b. Select Storage Systems in Explorer, and select Parity Groups. 2. In the Parity Groups table, select a specific parity group on which you want to enable encryption and then click Edit Encryption. In the tree that is shown, Internal or External is displayed. 3. To select an internal LDEV, select Internal. Otherwise, click the Parity Groups tab. Managing data encryption license keys 4 7
36 4. In the Parity Groups table, select a specific parity group on which you want to enable encryption and then click Actions > Parity Group > Edit Encryption. Note: If you do not select a specific parity group, data encryption is enabled on all of the parity groups in the list. 5. In the Edit Encryption window, complete the following and then click Add: For Available Groups, select the parity group for which you want to enable data encryption. For Encryption, select Enable to enable data encryption or select Disable to disable data encryption at the parity-group level. For Format Type, select the format type. Values: Quick Format, Normal Format, or No Format Default: Quick Format The parity group you selected from the Available Parity Groups table is added to the Selected Parity Groups list. When you click Add, Format Type becomes inactive and you cannot select the format type. If you want to change the format type, delete all parity groups in the Selected Parity Groups list and then select the format type again. You do not need to format volumes when there is no volume selected in the parity group. Therefore, the format type in the Selected Parity Groups list becomes a hyphen (-) regardless of the status of the format type. 6. Click Finish. 7. In the Confirm window, confirm the settings, and enter your task name in Task Name. If you want the Task window to open after you click Apply, select Go to tasks window for status. Click Apply. 8. In the message that appears, click OK. Data encryption is enabled on the parity group. Related topics Edit Encryption window on page A-30 Workflow for disabling data encryption at the paritygroup level Disable encryption, or decrypt data, at the parity-group level. 1. Back up the secondary data encryption license key. For details, see Workflow for backing up secondary data encryption license keys on page Managing data encryption license keys
37 2. Block the LDEVs at the parity-group level. For details, see the Hitachi Virtual Storage Platform G1000 Provisioning Guide for Mainframe Systems or Hitachi Virtual Storage Platform G1000 Provisioning Guide for Open Systems. 3. Disable data encryption at the parity-group level. For details, see Disabling data encryption at the parity-group level on page Format the LDEVs in the parity group for encryption. For details, see Encryption formatting at the parity-group level on page Disabling data encryption at the parity-group level Disable data encryption at the parity-group level to perform (normal) formatting options on encrypted data, such as writing to or overwriting an LDEV. Prerequisites Required role: Security Administrator (View & Modify) Required role to format volumes: Storage Administrator (Provisioning) 1. In Hitachi Command Suite: a. On the Resources tab, click Storage Systems, and then expand All Storage Systems. b. Expand the target storage system, and then select Parity Groups. c. In the table that is shown, Internal or External are displayed. In Device Manager - Storage Navigator (mainframe-only environment): a. Display the Device Manager - Storage Navigator main window. b. Select Storage Systems in Explorer, and select Parity Groups. c. In the tree that is shown, Internal or External are displayed. 2. Select the name for the parity group name you want to disable encryption and then click Edit Encryption. 3. In the Edit Encryption window, complete the following and then click Add: For Available Parity Groups, choose the parity group on which you want to disable data encryption. For Encryption, select Disable. For Format Type, choose the format type. Managing data encryption license keys 4 9
38 The parity group you selected from the Available Parity Groups list is added to the Selected Parity Groups list. Note: When you click Add, Format Type becomes inactive and you cannot select the format type. If you want to change the format type, delete all parity groups in the Selected Parity Groups list and then select the format type again. You do not need to format volumes when there is no volume in the selected parity group. Therefore, the format type in the Selected Parity Groups list becomes "-" (a hyphen) regardless of the status of Format Type. 4. In the Edit Encryption window, click Finish. 5. In the Confirm window, confirm the settings, and enter your task name in Task Name. If you want the Task window to open after you click Apply, select Go to tasks window for status. Click Apply. 6. In the confirmation message that appears asking whether to apply the setting to the storage system, click OK. Encryption is disabled for the parity group. Related topics Edit Encryption window on page A-30 Encryption formatting at the parity-group level The LDEV formatting operation writes zero data to the entire area of all drives in the parity group, or overwrites an LDEV. This process is also referred to as encryption formatting. Workflow for restoring data encryption license keys Restore a data encryption license key from the primary or secondary backup copy when all the LDEVs belonging to an encrypted parity group are blocked or if an existing data encryption license key becomes unavailable or cannot be used (for example, due to a system failure). The system automatically restores data encryption license keys from the primary backup. You must have Security Administrator (View & Modify) role to restore the data encryption license key from a secondary backup data encryption license key. Caution: When you restore the data encryption license key, always restore the latest key. If a data encryption license key is updated after a secondary backup is performed, and the restored key is not the latest key, drives and disk adapters will be blocked and will not be able to read data. Use the following process to restore a data encryption license key: 1. Block the LDEVs associated to the encrypted parity group Managing data encryption license keys
39 For details, see the Hitachi Virtual Storage Platform G1000 Provisioning Guide for Open Systems or the Hitachi Virtual Storage Platform G1000 Provisioning Guide for Mainframe Systems. 2. Restore the data encryption license key from a primary or secondary backup copy. Do one of the following: Restore the data encryption license key from a file backed up on the HCS management server or HDvM - SN computer. For details, see Restoring keys from a file on page Restore the data encryption license key from the key management server. Restoring keys from a file For details, see Restoring keys from a key management server on page Restore the data encryption license keys from a file backed up on the computer. Prerequisites Required role: Security Administrator (View & Modify) 1. In Hitachi Command Suite: a. On the Resources tab, click Storage Systems, and then expand All Storage Systems. b. Expand the target storage system, and then select Encryption Keys. In Device Manager - Storage Navigator (mainframe-only environment): a. Display the Device Manager - Storage Navigator main window. b. Select Administration in Explorer, and select Encryption Keys. 2. On the Encryption Keys tab, click Restore Keys > From File. 3. In the Restore Keys from File window, click Browse and then click OK. 4. In the Open dialog box, select the backup file and click Open. 5. In the Restore Keys from File window, complete the following item and then click Finish: For File Name, shows the name of the selected file. View-only: Yes For Password, type the password for the data encryption license key that you typed when you backed up the selected data encryption license key. 6. In the Confirm window, confirm the settings, and enter your task name in Task Name. If you want the Task window to open after you click Apply, select Go to tasks window for status. Click Apply. The backup data encryption license key is restored. Managing data encryption license keys 4 11
40 Related topics Restore Keys from File window on page A-21 Restoring keys from a key management server Restore a data encryption license key from the key management server. You can restore up to 4,128 data encryption license keys at a time. The client certificate is required to restore backed up data encryption license keys from a key management server. Caution: If you do not have the client certificate, and the system administrator replaces the SVP due to a failure, you cannot restore the backed up data encryption license keys. Prerequisites Required role: Security Administrator (View & Modify) 1. In Hitachi Command Suite: a. On the Resources tab, click Storage Systems, and then expand All Storage Systems. b. Expand the target storage system, and then select Encryption Keys. In Device Manager - Storage Navigator (mainframe-only environment): a. Display the Device Manager - Storage Navigator main window. b. Select Administration in Explorer, and select Encryption Keys. 2. On the Encryption Keys tab, click Restore Keys > From Server. 3. In the Restore Keys from Server window, select the data encryption license key you want to restore. 4. Click Finish. 5. In the Confirm window, confirm the settings, and enter your task name in Task Name. If you want the Task window to open after you click Apply, select Go to tasks window for status. Click Apply. The backup data encryption license key is restored. Related topics Restore Keys from Server window on page A-23 Workflow for deleting data encryption license keys Delete a data encryption license key from a file on the HCS management server or HDvM - SN computer or from a key management server. Use the following process to delete a data encryption license key: 1. Back up the secondary data encryption license key Managing data encryption license keys
41 For details, see Workflow for backing up secondary data encryption license keys on page Ensure the key is not allocated to the parity group. See the Encryption Keys window on page A-2 and check the key allocation. 3. Delete the data encryption license key using one of the following methods: Delete the data encryption license key from a file on the HCS management server or HDvM - SN computer. For details, see Deleting data encryption license keys on page Delete the backup key from the key management server. For details, see Deleting backup data encryption license keys from the server on page Deleting data encryption license keys Delete data encryption license keys from a file on the HCS management server or HDvM - SN computer. You can only delete encryption keys with a Free attribute can be deleted. Encryption keys with the other attributes cannot be deleted. Prerequisites Required role: Security Administrator (View & Modify) 1. In Hitachi Command Suite: a. On the Resources tab, click Storage Systems, and then expand All Storage Systems. b. Expand the target storage system, and then select Encryption Keys. In Device Manager - Storage Navigator (mainframe-only environment): a. Display the Device Manager - Storage Navigator main window. b. Select Administration in Explorer, and select Encryption Keys. 2. On the Encryption Keys tab, select the key ID for the key you want to delete from the Encryption Keys table, and click More Actions > Delete Keys. 3. To back up encryption keys to the key management server, click Next. To back up encryption keys to the server, see Backing up keys to a key management server on page In the Delete Keys window, click Finish. 5. In the Confirm window, confirm the settings, and enter your task name in Task Name. If you want the Task window to open after you click Apply, select Go to tasks window for status. Click Apply. 6. In the message that appears asking whether to apply the setting to the storage system, click OK. Managing data encryption license keys 4 13
42 The data encryption license key is deleted. Related topics Delete Keys window on page A-25 Deleting backup data encryption license keys from the server Delete a backup data encryption license key from the key management server. Caution: Before deleting a primary or secondary backup data encryption license key from the key management server, ensure that you have backed up another data encryption license key. Prerequisites Required role: Security Administrator (View & Modify) 1. In Hitachi Command Suite: a. On the Resources tab, click Storage Systems, and then expand All Storage Systems. b. Expand the target storage system, and then select Encryption Keys. In Device Manager - Storage Navigator (mainframe-only environment): a. Display the Device Manager - Storage Navigator main window. b. Select Administration in Explorer, and select Encryption Keys. 2. On the Encryption Keys tab, click View Backup Keys on Server. 3. In the View Backup Keys on Server window, select the key ID for the backup data encryption license key you want to delete and then click Delete Backup Keys on Server. 4. In the Delete Backup Keys on Server window, confirm the settings, and enter your task name in Task Name. If you want the Task window to open after you click Apply, select Go to tasks window for status. Click Apply. 5. In the message that appears asking whether to apply the setting to the storage system, click OK. The data encryption license key is deleted. Related topics View Backup Keys on Server window on page A-27 Delete Backup Keys on Server window on page A-26 Viewing encryption keys backed up on the key management server You can view encryption keys that are backed up on the key management server Managing data encryption license keys
43 Prerequisites Required role: Security Administrator (View & Modify) 1. In Hitachi Command Suite: a. On the Resources tab, click Storage Systems, and then expand All Storage Systems. b. Expand the target storage system, and then select Encryption Keys. In Device Manager - Storage Navigator (mainframe-only environment): a. Display the Device Manager - Storage Navigator main window. b. Select Administration in Explorer, and select Encryption Keys. 2. On the Encryption Keys tab, click View Backup Keys on Server to view the backup keys on the key management server. Related topics Encryption Keys window on page A-2 View Backup Keys on Server window on page A-27 Exporting encryption license key table information You can output encryption license key table information. Prerequisites Required role: Security Administrator (View & Modify) 1. In Hitachi Command Suite: a. On the Resources tab, click Storage Systems, and then expand All Storage Systems. b. Expand the target storage system, and then select Encryption Keys. In Device Manager - Storage Navigator (mainframe-only environment): a. Display the Device Manager - Storage Navigator main window. b. Select Administration in Explorer, and select Encryption Keys. 2. On the Encryption Keys tab, select the key ID for the data encryption license key information you want to output from the Encryption Keys table. 3. Click More Actions > Export. 4. When the Ready to Download message appears, click OK. Rekeying key encryption keys If you create key encryption keys on the key management server, use the following procedure to rekey key encryption keys. After rekeying key encryption license keys, it is recommended that you back up each key. Use the following procedure to rekey key encryption keys. Managing data encryption license keys 4 15
44 Prerequisites Required role: Security Administrator (View & Modify) 1. In Hitachi Command Suite: a. On the Resources tab, click Storage Systems, and then expand All Storage Systems. b. Expand the target storage system, and then select Encryption Keys. In Device Manager - Storage Navigator (mainframe-only environment): a. Display the Device Manager - Storage Navigator main window. b. Select Administration in Explorer, and select Encryption Keys. 2. On the Encryption Keys tab, select the key ID for the data encryption license key information you want to output from the Encryption Keys table. 3. Click More Actions > Rekey Key Encryption Keys. 4. In the Rekey Key Encryption Key window, confirm the settings, and enter your task name in Task Name. If you want the Task window to open after you click Apply, select Go to tasks window for status. Click Apply. Related topics Rekey Key Encryption Key window on page A-36 Rekeying certificate encryption keys If you change certificate encryption keys, use the following procedure to rekey the keys. After rekeying certificate encryption license keys, it is recommended that you back up each key. Prerequisites Required role: Security Administrator (View & Modify) 1. In Hitachi Command Suite: a. On the Resources tab, click Storage Systems, and then expand All Storage Systems. b. Expand the target storage system, and then select Encryption Keys. In Device Manager - Storage Navigator (mainframe-only environment): a. Display the Device Manager - Storage Navigator main window. b. Select Administration in Explorer, and select Encryption Keys. 2. On the Encryption Keys tab, select Rekey Certificate Encryption Keys. 3. In the Rekey Certificate Encryption Keys window, confirm the settings, and enter your task name in Task Name Managing data encryption license keys
45 If you want the Task window to open after you click Apply, select Go to tasks window for status. Click Apply. Related topics Rekey Certificate Encryption Keys window on page A-35 Retrying Key Encryption Key Acquisition If you acquire the key encryption keys from the key management server when the storage device starts, retry key encryption key acquisition. Prerequisites Required role: Security Administrator (View & Modify) 1. In Hitachi Command Suite: a. On the Resources tab, click Storage Systems, and then expand All Storage Systems. b. Expand the target storage system, and then select Encryption Keys. In Device Manager - Storage Navigator (mainframe-only environment): a. Display the Device Manager - Storage Navigator main window. b. Select Administration in Explorer, and select Encryption Keys. 2. On the Encryption Keys tab, select More Actions > Retry Key Encryption Key Acquisition. 3. In the Retry Key Encryption Key Acquisition window, confirm the settings, and enter your task name in Task Name. If you want the Task window to open after you click Apply, select Go to tasks window for status. Click Apply. You need to restore the disk adapter and blocked drives or blocked volumes after retrying key encryption key acquisition. Contact the Hitachi Data Systems Support Center to restore the disk adapter and blocked drives or blocked volumes. Related topics Retry Key Encryption Key Acquisition window on page A-37 Initialize the connection settings to the key management server Disable data encryption at the parity-group level before initializing the connection settings to the key management server. Prerequisites Required role: Security Administrator (View & Modify) Managing data encryption license keys 4 17
46 1. In Hitachi Command Suite: a. On the Resources tab, click Storage Systems, and then expand All Storage Systems. b. Expand the target storage system, and then select Encryption Keys. In Device Manager - Storage Navigator (mainframe-only environment): a. Display the Device Manager - Storage Navigator main window. b. Select Administration in Explorer, and select Encryption Keys. 2. On the Encryption Keys tab, select Edit Encryption Environmental Settings. 3. In the Edit Encryption Environmental Settings window, select Initialize Encryption Environmental Settings. 4. Select Finish to display the Confirm window. 5. In the Confirm window, confirm the settings, and enter your task name in Task Name. If you want the Task window to open after you click Apply, select Go to tasks window for status. Click Apply. Related topics Edit Encryption Environmental Settings window on page A Managing data encryption license keys
47 5 Troubleshooting This chapter provides troubleshooting information for Encryption License Key. Troubleshooting for Encryption License Key Contacting the Hitachi Data Systems Support Center Troubleshooting 5 1
48 Troubleshooting for Encryption License Key For troubleshooting information for the Hitachi Virtual Storage Platform G1000, see the Hitachi Virtual Storage Platform G1000 Hardware Guide. For troubleshooting information for Hitachi Command Suite, see the Hitachi Command Suite Administrator Guide. For details about HCS error messages, see Hitachi Command Suite Messages. For troubleshooting information for Device Manager - Storage Navigator, see the Hitachi Virtual Storage Platform G1000 Mainframe System Administrator Guide. For details about HDvM - SN error messages, see Hitachi Command Suite Messages. The following table provides general troubleshooting information for Encryption License Key. If you need technical assistance, see Contacting the Hitachi Data Systems Support Center on page 5-3. Problem Cannot use the Encryption License Key feature to back up or restore a key. Cannot create or delete data encryption license keys. Cannot enable encryption for a parity group. Cannot disable encryption for a parity group. Action Verify the following: The Encryption License Key software license is valid and installed. You have the Security Administrator (View & Modify) role. If you backup and restore data encryption license keys with a key management server, the connection to the key management server is available. If you backup and restore data encryption license keys with a key management server, the number of keys which you can back up on the key management server is not exceeded. If you backup and restore data encryption license keys with a key management server, a time-out has not occurred due to the increase in the number of keys on the key management server. The latest key is restored (the key will not be updated after a secondary backup has been performed). Make sure that: The Encryption License Key software license is valid and installed. You have the Security Administrator (View & Modify) role. If you have backed up and restored data encryption license keys with a key management server, that the connection to the key management server is available. Make sure that: The Encryption License Key software license is valid and installed. All LDEVs in the parity group are in the blocked status. Make sure that all LDEVs in the parity group are in the blocked status. 5 2 Troubleshooting
49 Problem Server configuration test failed. The Edit Encryption wizard operation failed, but the status of encryption (enable or disable) has changed. The storage system failed to get encryption keys backed up on the key management server and all volumes are blocked when the storage system is turned on. The SIM code is returned. Editing encryption environmental settings has failed with the error ( ). Action Check the following key management server connection settings: Host name Port number Client certificate file Root certificate file If the communication failure is due to the length of time to connect to the server, try changing these settings: Timeout Retry interval Number of retries The change of the status succeeds, but the format of the volume fails. Confirm the message, remove the error, and format volumes again. Complete the following tasks: Restore the connection to the key management server. Retry key encryption key acquisition. Contact the Hitachi Data Systems Support Center to restore the disk adapter and blocked drives or blocked volumes. If it is the first time you are configuring encryption environmental settings in the Edit Encryption Environmental Settings window and it fails (error message ), complete the following tasks: 1. Wait a few minutes, then click File > Refresh All to reread the configuration information. 2. Initialize the connection settings to the key management server. 3. Configure the encryption environmental settings again. If it is not the first time you are configuring encryption environmental settings in the Edit Encryption Environmental Settings window and it fails (error message ), complete the following tasks: 1. Wait a few minutes, then click File > Refresh All to reread the configuration information. 2. Configure the encryption environmental settings again. Contacting the Hitachi Data Systems Support Center When contacting the Hitachi Data Systems Support Center, provide as much information about the problem as possible, including: The circumstances surrounding the error or failure. The content of any error messages displayed on the host systems. The content of any error messages displayed on Device Manager - Storage Navigator. The Device Manager - Storage Navigator configuration information (use the FD Dump Tool). Troubleshooting 5 3
50 The service information messages (SIMs), including reference codes and severity levels, displayed by Device Manager - Storage Navigator. The Hitachi Data Systems Support Center is available 24 hours a day, seven days a week. If you need technical support, log on to the Hitachi Data Systems Support Portal for contact information: Troubleshooting
51 A Encryption License Key GUI Reference This chapter provides descriptions of the Device Manager - Storage Navigator windows and dialog boxes for the Encryption License Key feature. Encryption Keys window Edit Encryption Environmental Settings wizard Create Keys wizard Edit Password Policy (Backup Encryption Keys) wizard Backup Keys to File wizard Backup Keys to Server wizard Restore Keys from file wizard Restore Keys from Server wizard Delete Keys wizard Delete Backup Keys on Server window View Backup Keys on Server window Edit Encryption wizard Rekey Certificate Encryption Keys window Rekey Key Encryption Key window Retry Key Encryption Key Acquisition window Encryption License Key GUI Reference A 1
52 Encryption Keys window Use the Encryption Keys window to create data encryption license keys. Clicking Encryption Keys in the Administration tree opens this window. Summary on page A-2 Encryption Keys tab on page A-3 Summary Use the Summary to view details about the number of data encryption license keys and to open the View Backup Keys on Server window. A 2 Encryption License Key GUI Reference
53 Item Description Number of Encryption Keys Shows the number of data encryption license keys: Data Encryption Key: Number of data encryption keys. Certificate Encryption Key: Number of certificate encryption keys. Free: Number of free keys (Number of keys that can be created). The number of key encryption keys are not included. Edit Encryption Environmental Settings View Backup Keys on Server Shows the Edit Encryption Environmental Settings window. Shows the View Backup Keys on Server window. Encryption Keys tab Use the Encryption Keys tab to view a list of the data encryption license key details and to select an unused data encryption license key to create. The Encryption Keys tab displays only the created encryption keys and in descending order of the Last Update Date. It also displays Perform the Edit Environmental Settings in the center of the window when the initialized settings are not performed, and displays Perform the Retry Key Encryption Key Acquisition in the center of the window when the Key Encryption Key Acquisition operation has failed. Item Key ID Created Attribute Assigned to Generated on Number of Backups Create Keys Backup Keys Description IDs of data encryption license keys. A hyphen (-) is displayed when the encryption key is CEK or KEK. The date and time the data encryption license key was created or was last updated. Displays the attribute (CEK, DEK, KEK or Free) of the encryption key. When KEK for the key management server is displayed, the format of KEK (UUID) is displayed with UUID. The resource to which the encryption key is assigned is displayed. When the attribute is KEK, a hyphen (-) is displayed. The path in which the encryption key is created. The number of times that a backup of a data encryption license key is created. When the attribute is KEK, a hyphen (-) is displayed. Click to open the Create Keys window. Select To File to open the Backup Keys to File window. Select To Server to open the Backup Keys to Server window. Encryption License Key GUI Reference A 3
54 Restore Keys More Actions Item Description Select From File to open the Restore Keys from File window. Select From Server to open the Restore Keys from Server window. Select Rekey Key Encryption Keys to display the Rekey Key Encryption Keys window. Select Delete Keys from the list to delete a selected data encryption license key. Select Retry Key Encryption Key Acquisition to display the Retry Key Encryption Key Acquisition window. Select Export from the list to open the window for outputting table information. Related topics Creating data encryption license keys on page 4-2 Backing up keys as a file on page 4-4 Backing up keys to a key management server on page 4-4 Restoring keys from a file on page 4-11 Restoring keys from a key management server on page 4-12 Deleting data encryption license keys on page 4-13 Deleting backup data encryption license keys from the server on page 4-14 Viewing encryption keys backed up on the key management server on page 4-14 Edit Encryption Environmental Settings wizard Use the Edit Encryption Environmental Settings wizard to edit the encryption environmental settings. The Edit Encryption Environmental Settings wizard includes the following windows: Edit Encryption Environmental Settings window on page A-4 Edit Encryption Environmental Settings confirmation window on page A- 8 Edit Encryption Environmental Settings window Items to be configured in the Edit Encryption Environmental Settings window can be changed under the following conditions: When the key management server is not in use When local key generation is disabled. When the key encryption key for the key management server is stored on DKC. A 4 Encryption License Key GUI Reference
55 Item Key Management Server Description Select whether to use the key management server: Enable: (default) key management server is used. Disable: key management server is not used. Encryption License Key GUI Reference A 5
56 Server Setting Primary Server Item Description When you use the key management server, the following items display: Primary server Secondary server Server Configuration test Specify the primary server information. Host Name: Enter the host name of the key management server. Identifier: Enter the host identifier. IPv4: Enter the host IPv4 address. IPv6: Enter the host IPv6 address. Port number: Enter the port number of the key management server. Values: 1 to Default: Timeout (sec.): Enter the time until the connection attempt to the key management server times out. Values: 1 to 999. Default: 60. Retry Interval (sec.): Enter the interval to retry the connection to the key management server. Values: 1 to 60. Default: 1. Number of Retries: Enter the number of times to retry the connection to the key management server. Values: 1 to 50. Default: 3. Client Certificate File Name: Select the client certificate file for connecting to the key management server. Click Browse and select the file. Browse: Select the client certificate file. The form of the client certificate is PKCS#12. For information about the client certificate file, contact the server or network administrator. The file name appears in the Client Certificate File Name field. Password: Enter the password for the client certificate. Character limits: 0 to 128. Valid characters: Numbers (0 to 9) Upper case: (A-Z) Lower case: (a-z) Symbols:! # $ % & ' ( ) * +, -. / : ; < = [ \ ] ^ _ ` { } ~ Root Certificate File Name: Select the root certificate file for connecting to the key management server. Click Browse and select the file. Browse: Select the root certificate file. The form of the client certificate is X.509. If you do not know about the root certificate file, contact the server administrator or the network administrator. The name of the selected file appears in the Root Certificate File Name field. A 6 Encryption License Key GUI Reference
57 Secondary Server Server Configuration Test Check Result Item Generate Encryption Keys on Key Management Server Protect the Key Encryption Key at the Key Management Server Disable local key generation Initialize Encryption Environmental Settings Description When the secondary server is set to Enable, the same items can be set as the items of the primary server. Select Check to start a server connection test for the key management server based on the specified settings. Start a server connection test for the key management server based on the specified settings. Shows the result of the server connection test for the key management server. Checks when encryption keys are created on a key management server. Specifies when key encryption keys are saved on key management servers. If Warning is displayed, confirm the content of the warning, and select I Agree. Checks when encryption keys are saved on key management servers and encryption keys cannot be created on the storage system. If Warning is displayed, confirm the content of the warning, and select I Agree. Caution: If you finish the setting, you cannot restore the setting, so it is recommended that you confirm there are no problems before selecting I Agree. Select to initialize the connection settings to the key management server. Encryption License Key GUI Reference A 7
58 Edit Encryption Environmental Settings confirmation window A 8 Encryption License Key GUI Reference
59 Primary Server Item Secondary Server Generate Encryption Keys on Key Management Server Protect the Key Encryption Key at the Key Management Server Disable local key generation Description Displays the primary server information. Key Management Server: Shows whether the key management server is used. Enable: key management server is used. Disable: key management server is not used. Not Set: Initialize the connection settings to the key management server. Host Name: The host name of the key management server. Port number: The port number of the key management server. Timeout (sec.): The time until the connection attempt to the key management server times out. Retry Interval (sec.): The interval to retry the connection to the key management server. Number of Retries: The number of times to retry the connection to the key management server. Client Certificate File Name: The client certificate file for connecting to the key management server. Password: The password for the client certificate is displayed as ****** (six asterisks). Root Certificate File Name: The root certificate file for connecting to the key management server. When the secondary server exists, displays items same as the primary server. Displays whether encryption keys are created on a key management server or not. Yes: Encryption keys are created on a key management server. No: Encryption keys are not created on a key management server. Displays whether key encryption keys are saved on key management servers or not. Yes: Encryption keys are saved on key management servers. No: Encryption keys are not saved on key management servers. Displays whether encryption keys are saved on key management servers and encryption keys cannot be created on the storage system. Yes: Encryption keys are created on key management servers and encryption keys cannot be created on the storage system. No: Encryption keys are not created on key management servers. Encryption keys are created on storage systems. Encryption License Key GUI Reference A 9
60 Create Keys wizard Use the Create Keys wizard to create keys and to backup keys to the key management server. This wizard includes the following windows: Create Keys window Confirm window Create Keys window Use the Create Keys window to create a data encryption license key. This window includes the Selected Keys table. Item Number of Encryption Keys Description Specifies the number of encryption keys (1-4,096). 4,096 is the maximum number of encryption keys. This window shows the value that subtracted the number of created DEK and Free keys from 4,096. Create Keys confirmation window The following is the Confirm window in the Create Keys wizard. A 10 Encryption License Key GUI Reference
61 Item Number of Encryption Keys Description Displays the number of encryption keys. Related topics Workflow for creating data encryption license keys on page 4-2 Creating data encryption license keys on page 4-2 Edit Password Policy (Backup Encryption Keys) wizard Use the Edit Password Policy (Backup Encryption Keys) wizard to edit the password policy for backup keys. This wizard includes the following windows: Edit Password Policy (Backup Encryption Keys) window Confirm window Encryption License Key GUI Reference A 11
62 Edit Password Policy (Backup Encryption Keys) window A 12 Encryption License Key GUI Reference
63 Item Numeric Characters (0-9) Uppercase Characters (A-Z) Lowercase Characters (a-z) Symbols Total Description The minimum number of numeric characters that should be used for this password. Values: 0 to 255 Default: 0 The minimum number of alphabetical upper case characters that should be used for this password. Values: 0 to 255 Default: 0 The minimum number of alphabetical lower case characters that should be used for this password. Values: 0 to 255 Default: 0 The minimum number of symbols that should be used for this password. Values: 0 to 255 Default: 0 The minimum number of characters for this password. Values: 6 to 255 Default: 6 Edit Password Policy (Backup Encryption Keys) confirmation window Use the Confirm window in the Edit Password Policy (Backup Encryption Keys) wizard to confirm the changes to the password policy. Encryption License Key GUI Reference A 13
64 Item Numeric Characters (0-9) Uppercase Characters (A-Z) Description Displays the minimum number of numeric characters that should be used for this password. Displays the minimum number of alphabetical upper case characters that should be used for this password. A 14 Encryption License Key GUI Reference
65 Item Lowercase Characters (a-z) Symbols Total Description Displays the minimum number of alphabetical lower case characters that should be used for this password. Displays the minimum number of symbols that should be used for this password. Displays the minimum number of characters for this password. Backup Keys to File wizard Use the Backup Keys to File wizard to create backup data encryption license keys as files on the HCS management server or HDvM - SN computer. This wizard includes the following windows: Backup Keys to File window Confirm window Backup Keys to File window When the password policy is edited in the Edit Password Policy (Backup Encryption Keys) window, you will see the following figure. Encryption License Key GUI Reference A 15
66 When the password policy is not edited in the Edit Password Policy (Backup Encryption Keys) window, you will see the following figure. A 16 Encryption License Key GUI Reference
67 Password Item Re-enter Password Description The password for the backup data encryption license key. Character limits: 6 to 255 Valid characters: Numbers (0 to 9) Upper case (A-Z) Lower case (a-z) Symbols:! " # $ % & ' ( ) * +, -. / : ; < = [ \ ] ^ _ ` { } ~ Type the password again for confirmation. Encryption License Key GUI Reference A 17
68 Backup Keys to File confirmation window When you click Apply in the Confirm window, a confirmation message will appear. After you click OK, a window for saving the file for encryption keys will appear. Enter the backup file name with the extension of.ekf and save the file. Backup Keys to Server wizard Use the Backup Keys to Server wizard to backup data encryption license keys on the key management server. This wizard includes the following windows: Backup Keys to Server window Confirm window A 18 Encryption License Key GUI Reference
69 Backup Keys to Server window Item Description Description Optionally, enter a description for the backup data encryption license key. Character limits: 256 Encryption License Key GUI Reference A 19
70 Backup Keys to Server confirmation window Item Description Description Shows the description for the backup data encryption license key. Restore Keys from file wizard Use the Restore Keys wizard to restore data encryption license keys from a file you backed up on the HCS management server or HDvM - SN computer. This wizard includes the following windows: Restore Keys from File window Confirm window A 20 Encryption License Key GUI Reference
71 Restore Keys from File window Item Description File Name Browse Password File name of the selected backup file. Select the backup file (.ekf). The name of the selected file is shown for File Name. The password that you typed when you created the backup data encryption license key. Encryption License Key GUI Reference A 21
72 Restore Keys confirmation window Item Description Item Value Item of the data encryption license key to restore. Value of the data encryption license key to restore. Restore Keys from Server wizard Use the Restore Keys from Server wizard to restore data encryption license keys from the key management server. This wizard includes the following windows: Restore Keys from Server window Confirm window A 22 Encryption License Key GUI Reference
73 Restore Keys from Server window Item UUID Backup Date Description Description Shows the UUID of the data encryption license key that you backed up on the key management server. Shows the time you backed up the data encryption license key on the key management server. Shows the description you typed when you backed up the data encryption license key on the key management server. Encryption License Key GUI Reference A 23
74 Restore Keys from Server confirmation window Item UUID Backup Date Description Description Shows the UUID of the data encryption license key you backed up on the key management server. Shows the time when you backed up the data encryption license key on the key management server. Shows the description you typed when you backed up the data encryption license key on the key management server. Delete Keys wizard Use the Delete Keys wizard to delete keys and backup data encryption license keys. This wizard includes the following windows: Delete Keys window Confirm window A 24 Encryption License Key GUI Reference
75 Delete Keys window Item Description Key ID IDs of data encryption license keys. Encryption License Key GUI Reference A 25
76 Delete Keys confirmation window Item Description Key ID The identifiers for the data encryption license keys. Delete Backup Keys on Server window Use the Delete Backup Keys on Server window to confirm the deletion of a backup key. This window includes the Selected Backup Keys table. A 26 Encryption License Key GUI Reference
77 Item UUID Backup Date Description Description Shows the UUID of the data encryption license key you backed up on the key management server. Shows the time when you backed up the data encryption license key on the key management server. Shows the description you typed when you backed up the data encryption license key on the key management server. View Backup Keys on Server window Use the View Backup Keys on Server window to view a list of the backup data encryption license keys on the server. This window includes the Backup Keys table. Encryption License Key GUI Reference A 27
78 Backup Keys table The Backup Keys table is shown on the View Backup Keys on Server window. This table lists the backup data encryption license keys. UUID Backup Date Item Description Shows the UUID of the backup data encryption license key on the key management server. Shows the time you backed up the data encryption license key on the key management server. A 28 Encryption License Key GUI Reference
79 Description Item Delete Backup Keys on Server button Backup Keys to Server button Restore Keys from Server button Description Shows the description you typed when you backed up the data encryption license key on the key management server. Opens the Delete Backup Keys on Server window. Open the Backup Keys to Server window. Opens the Restore Keys from Server window. Edit Encryption wizard Use the Edit Encryption wizard to do the following: Enable data encryption on a parity group. Edit or associate the data encryption license key to the LDEV. Edit the format type for the parity group. This wizard includes the following windows: Edit Encryption window Confirm window Encryption License Key GUI Reference A 29
80 Edit Encryption window The Edit Encryption window includes the following items: Available Parity Groups table For details, see Available Parity Groups table on page A-30. Selected Parity Groups table For details, see Selected Parity Groups table on page A-32. Available Parity Groups table Use the Available Parity Groups table on the Edit Encryption window to view a list of the available parity groups. A 30 Encryption License Key GUI Reference
81 Item Parity Group ID RAID Level Capacity Drive Type/RPM Encryption Description Shows the parity group IDs. Shows the RAID level of the parity group. For an interleaved parity group, the interleaved number appears after the RAID level. Example: 1(2D+2D)*2 Shows the total capacity (unit) of the parity group. Shows the drive types and RPM (rotation per minute) of the LDEV in the parity group. Shows the encryption setting for the parity group. Enable: Encryption is enabled. Disable: Encryption is disabled. Encryption License Key GUI Reference A 31
82 Item Description Encryption Format Type Select the encryption setting for the parity group: If you click Enable, data encryption, select will be enabled. If you click Disable, data encryption, select will be disabled. Select the format types of the parity group. You do not need to format volumes when there are none selected in the parity group. Therefore, the format type in the Selected Parity Groups list becomes a hyphen (-) regardless of the status of the format type. Add Use this button to move a selected parity group in the Available Parity Groups table to the Selected Parity Groups table. Selected Parity Groups table Use the Selected Parity Groups table to remove the parity group from the list. A 32 Encryption License Key GUI Reference
83 Item Parity Group ID RAID Level Capacity Drive Type/RPM Description Shows parity group IDs. Shows the RAID level of the parity group. For an interleaved parity group, the interleaved number appears after the RAID level. Example: 1(2D+2D)*2 Shows the total capacity (unit) of the parity group. Shows the drive types and RPM (rotation per minute) of the LDEV in the parity group. Encryption License Key GUI Reference A 33
84 Item Description Encryption Format Type Remove Shows the encryption setting for the parity group: Enable: Encryption is enabled. Disable: Encryption is disabled. Shows the format types of the parity group. You do not need to format volumes when there are none selected in the parity group. Therefore, the format type in the Selected Parity Groups list becomes a hyphen (-) regardless of the status of the format type. Removes parity groups from the Selected Parity Groups table. Edit Encryption confirmation window Use the Confirm window to confirm the changes to the data encryption license key and to view a list of the selected parity groups related to the data encryption license key. A 34 Encryption License Key GUI Reference
85 Selected Parity Groups table Use the Selected Parity Groups table to view a list of the selected parity groups related to the data encryption license key. Item Parity Group ID RAID Level Capacity Drive Type/RPM Encryption Format Type Description Shows parity group identifier. Shows the RAID level of the parity group. For an interleaved parity group, the interleaved number appears after the RAID level. Example: 1(2D+2D)*2 Shows the total capacity of the parity group. Shows the drive types and RPM (rotation per minute) of the LDEV in the parity group. Encryption setting for the parity group: Enable - encryption enabled Disable - no encryption Shows the format types of the parity group. You do not need to format volumes when there is no volume in the selected parity group. Therefore, the format type in the Selected Parity Groups list becomes - (a hyphen) regardless of the status of Format Type. Rekey Certificate Encryption Keys window If you change certificate encryption keys, you can use the RekeyCertificate Encryption Keys window to rekey certificate encryption keys. Encryption License Key GUI Reference A 35
86 Item Description Task Name You can enter up to 32 ASCII characters (letters,numerals, and symbols) in Task Name. Task namesare case-sensitive. Rekey Key Encryption Key window If you change key encryption keys, you can use the Rekey key Encryption Keys window to rekey key encryption keys. A 36 Encryption License Key GUI Reference
87 Item Description Task Name You can enter up to 32 ASCII characters (letters, numerals, and symbols) in Task Name. Task names are case-sensitive. Retry Key Encryption Key Acquisition window If you acquire the key encryption keys from the external key management server when the storage device starts, retry key encryption key acquisition unless you can acquire them by some reasons. Encryption License Key GUI Reference A 37
88 Item Description Task Name You can enter up to 32 ASCII characters (letters, numerals, and symbols) in Task Name. Task names are case-sensitive. A 38 Encryption License Key GUI Reference
89 Glossary This glossary defines the special terms used in this document. Click the letter links below to navigate. A AES C CU E ECB Advanced Encryption Standard control unit Electronic Code Book emulation type Indicates the type of LDEV (for example, OPEN-V, ). Encryption Administrator User role in Hitachi Command Suite and Hitachi Device Manager - Storage Navigator with permission to perform Encryption License Key operations. Compare with Storage Administrator. encryption key The data encryption license key is used to encrypt and decrypt data on the Hitachi Virtual Storage Platform G1000. # A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Glossary 1
90 external volume I A volume whose data is stored on drives that are physically outside of the RAID storage system. Universal Volume Manager is used to manage external storage. Compare with internal volume. internal volume L A volume whose data is stored on drives that are physically within the RAID storage system. Compare with external volume. logical device (LDEV) An individual logical device (on multiple drives in a RAID configuration) in the storage system. An LDEV may or may not contain any data and may or may not be defined to any hosts. Each LDEV has a unique identifier, or address, within the storage system composed of the LDKC number, CU number, and LDEV number. An LDEV formatted for use by mainframe hosts is called a logical volume image (LVI). An LDEV formatted for use by open-system hosts is called a logical unit (LU). logical unit (LU) An LDEV that is configured for use by open-systems hosts (for example, OPEN-V). logical volume image (LVI) P An LDEV that is configured for use by mainframe hosts (for example, ). parity group A redundant array of independent drives (RAID) that have the same capacity and are treated as one group for data storage and recovery. A parity group contains both user data and parity information, which allows the user data to be accessed in the event that one or more of the drives within the parity group are not available. The RAID level of a parity group determines the number of data drives and parity drives and how the data is striped across the drives. P-VOL primary volume # A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Glossary 2
91 S service information message (SIM) Message generated by the RAID storage system when an error or service requirement is detected. SIMs are reported to hosts and displayed on Device Manager - Storage Navigator. Storage Administrator User role in Hitachi Command Suite and Hitachi Device Manager - Storage Navigator with permission to perform data encryption operations. Compare with Encryption Administrator. S-VOL T secondary volume (source volume for Hitachi Compatible FlashCopy ) T-VOL U target volume USP V/VM V Hitachi Universal Storage Platform V/VM VSP G1000 X XRC XTS Z Hitachi Virtual Storage Platform G1000 Extended Remote Copy XEX-based Tweaked CodeBook mode (TCB) with CipherText Stealing (CTS) zero data The number 0 (zero). A zero-formatting operation is a formatting operation that writes the number 0 (zero) to the entire disk area. # A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Glossary 3
92 # A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Glossary 4
93 Index A AES audit logging 1 5 D data encryption operations audit logging of 1 5 disabling encryption 1 6, 4 8 enabling encryption 1 5, 4 7, 4 10 encrypting existing data 1 5, 1 6 troubleshooting 5 2 decrypting data 4 8 disabling encryption 4 8 T technical support 5 3 troubleshooting 5 2 V volume types 1 2 X XTS mode 1 2 E emulation types 1 2 enabling data encryption workflow 4 7 encryption key operations audit logging of 1 5 backing up the key 1 4, 4 3 restoring the key 4 10 troubleshooting 5 2 encryption setting status A 32, A 34, A 35 external volumes 2 2 L license key 2 2 P primary backup key 1 4, 4 3 R requirements 2 2 host platforms 2 2 license key 2 2 microcode 2 2 password for encryption key A 17 Remote Web Console 2 2 Storage Navigator 2 2 volume types 2 2 Index 1
94 Index 2
95
96 Hitachi Data Systems Corporate Headquarters 750 Central Expressway Santa Clara, California U.S.A. Phone: [email protected] Asia Pacific and Americas 750 Central Expressway Santa Clara, California U.S.A. Phone: [email protected] Europe Headquarters Sefton Park Stoke Poges Buckinghamshire SL2 4HD United Kingdom Phone: + 44 (0) [email protected] MK-92RD
Hitachi Virtual Storage Platform
Hitachi Virtual Storage Platform Encryption License Key User Guide FASTFIND LINKS Contents Product Version Getting Help MK-90RD7015-10 2010-2014 Hitachi, Ltd. All rights reserved. No part of this publication
Hitachi Compute Blade 500 Series NVIDIA GPU Adapter User s Guide
Hitachi Compute Blade 500 Series NVIDIA GPU Adapter User s Guide FASTFIND LINKS Getting Help Contents MK-91CB500083-01 2010-2015 Hitachi, Ltd. All rights reserved. No part of this publication may be reproduced
Hitachi Universal Storage Platform V Hitachi Universal Storage Platform VM Hitachi Data Retention Utility User s Guide
Hitachi Universal Storage Platform V Hitachi Universal Storage Platform VM Hitachi Data Retention Utility User s Guide FASTFIND LINKS Document Organization Product Version Getting Help Contents MK-96RD612-03
Hitachi Data Ingestor
Hitachi Data Ingestor Backup Restore Features Supplement for Hitachi Data Protection Suite Product Version Getting Help Contents MK-90HDI009-14 2010-2015 Hitachi, Ltd. All rights reserved. No part of this
Tuning Manager. Hitachi Command Suite. Server Administration Guide MK-92HC021-38. FASTFIND LINKS Document Organization. Product Version.
Hitachi Command Suite Tuning Manager Server Administration Guide FASTFIND LINKS Document Organization Product Version Getting Help Contents MK-92HC021-38 2015 Hitachi, Ltd. All rights reserved. No part
Hitachi Universal Storage Platform V Hitachi Universal Storage Platform VM Dynamic Provisioning User s Guide
Hitachi Universal Storage Platform V Hitachi Universal Storage Platform VM Dynamic Provisioning User s Guide FASTFIND LINKS Document Organization Product Version Getting Help Contents MK-96RD641-07 Copyright
Hitachi Virtual Storage Platform
Hitachi Virtual Storage Platform Hitachi Storage Navigator User Guide FASTFIND LINKS Contents Product Version Getting Help MK-90RD7027-15 2010-2014 Hitachi, Ltd. All rights reserved. No part of this publication
Hitachi Virtual Storage Platform
Hitachi Virtual Storage Platform Performance Guide FASTFIND LINKS Document Organization Product Version Getting Help Contents MK-90RD7020-12 2010-2013 Hitachi Ltd. All rights reserved. No part of this
Hitachi Virtual Storage Platform
Hitachi Virtual Storage Platform Hitachi Universal Replicator User Guide FASTFIND LINKS Contents Product Version Getting Help MK-90RD7032-14 2010-2014 Hitachi, Ltd. All rights reserved. No part of this
Compute Systems Manager
Hitachi Command Suite Compute Systems Manager Installation and Configuration Guide MK-91HC195-12 2014, 2015 Hitachi, Ltd. All rights reserved. No part of this publication may be reproduced or transmitted
Hitachi Application Protector Version 1.2 for SAP Release Notes
Hitachi Application Protector Version 1.2 for SAP Release Notes Copyright Information... 2 Product Release Information... 4 Introduction... 4 Installation and Configuration Notes... 4 Manifest... 4 Minimum
Hitachi Command Suite. Automation Director. Installation and Configuration Guide MK-92HC204-00
Hitachi Command Suite Automation Director Installation and Configuration Guide MK-92HC204-00 2015 Hitachi, Ltd. All rights reserved No part of this publication may be reproduced or transmitted in any form
Compute Systems Manager
Hitachi Command Suite Compute Systems Manager User Guide MK-91HC194-10 2014, 2015 Hitachi, Ltd. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means,
Hitachi Device Manager Software Getting Started Guide
Hitachi Device Manager Software Getting Started Guide FASTFIND LINKS Document Organization Software Version Getting Help Contents MK-98HC149-03 Copyright 2008, 2009 Hitachi Ltd., Hitachi Data Systems Corporation,
Hitachi NAS Platform F
Hitachi NAS Platform F Plug-in for VMware vsphere Administrator's Guide Product Version Getting Help Contents MK-92NAS072-03 2013-2015 Hitachi, Ltd. All rights reserved. No part of this publication may
Hitachi Command Suite. Command Director. User Guide MK-90HCMD001-13
Hitachi Command Suite Command Director User Guide MK-90HCMD001-13 2014 Hitachi, Ltd. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic
Hitachi Unified Storage VM Block Module
Hitachi Unified Storage VM Block Module System Operations Using Spreadsheets FASTFIND LINKS Contents Product Version Getting Help MK-92HM7015-02 2012-2013 Hitachi Ltd. All rights reserved. No part of this
Storage Systems User Administration
Hitachi Unified Storage File Module Storage Systems User Administration Release 12.1 MK-92USF011-04 2011-2014 Hitachi, Ltd. All rights reserved. No part of this publication may be reproduced or transmitted
Hitachi Command Suite
Hitachi Command Suite Hitachi Command Suite User Guide MK-90HC172-15 2014 Hitachi, Ltd. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic
Hitachi NAS Blade for TagmaStore Universal Storage Platform and Network Storage Controller NAS Blade Error Codes User s Guide
Hitachi NAS Blade for TagmaStore Universal Storage Platform and Network Storage Controller NAS Blade Error Codes User s Guide MK-95RD280-03 2006 Hitachi, Ltd., Hitachi Data Systems Corporation, ALL RIGHTS
Command Control Interface
Command Control Interface User and Reference Guide Hitachi Virtual Storage Platform G1000 Hitachi Unified Storage VM Hitachi Virtual Storage Platform Hitachi Universal Storage Platform V/VM FASTFIND LINKS
Hitachi Command Suite. Dynamic Link Manager. (for Windows ) User Guide. Document Organization. Product Version. Getting Help. Contents MK-92DLM129-30
Hitachi Command Suite Dynamic Link Manager (for Windows ) User Guide Document Organization Product Version Getting Help Contents MK-92DLM129-30 2014 Hitachi, Ltd. All rights reserved. No part of this publication
FASTFIND LINKS. Document Organization. Product Version. Getting Help. Contents MK-96RD617-15
Hitachi Universal Storage Platform V Hitachi Universal Storage Platform VM Hitachi Performance Manager User s Guide Performance Monitor and Server Priority Manager FASTFIND LINKS Document Organization
FASTFIND LINKS. Document Organization Product Version Getting Help Contents MK-96RD617-06
Hitachi Universal Storage Platform V Hitachi Universal Storage Platform VM Hitachi Performance Manager User s Guide Performance Monitor, Volume Migration, and Server Priority Manager FASTFIND LINKS Document
Hitachi Command Suite. Tuning Manager. Installation Guide. Document Organization. Product Version. Getting Help. Contents MK-96HC141-27
Hitachi Command Suite Tuning Manager Installation Guide Document Organization Product Version Getting Help Contents MK-96HC141-27 2014, 2015 Hitachi, Ltd. All rights reserved. No part of this publication
How To Backup A Database In Navision
Making Database Backups in Microsoft Business Solutions Navision MAKING DATABASE BACKUPS IN MICROSOFT BUSINESS SOLUTIONS NAVISION DISCLAIMER This material is for informational purposes only. Microsoft
Hitachi Storage Replication Adapter 2.1 for VMware vcenter Site Recovery Manager 5.1/5.5 Deployment Guide
Hitachi Storage Replication Adapter 2.1 for VMware vcenter Site Recovery Manager 5.1/5.5 Deployment FASTFIND LINKS Document conventions Product version Getting help Contents MK-09RM6745-08 2009-2014 Hitachi
Storage Systems User Administration
Hitachi NAS Platform Storage Systems User Administration Release 12.3 MK-92HNAS013-04 2011-2015 Hitachi, Ltd. All rights reserved. No part of this publication may be reproduced or transmitted in any form
Cisco UCS Director Payment Gateway Integration Guide, Release 4.1
First Published: April 16, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883
Server Installation Guide ZENworks Patch Management 6.4 SP2
Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch
NexentaConnect for VMware Virtual SAN
NexentaConnect for VMware Virtual SAN User Guide 1.0.2 FP3 Date: April, 2016 Subject: NexentaConnect for VMware Virtual SAN User Guide Software: NexentaConnect for VMware Virtual SAN Software Version:
Hitachi Data Ingestor
Hitachi Data Ingestor Backup Restore Features Supplement for Symantec NetBackup Product Version Getting Help Contents MK-90HDI012-16 2010-2015 Hitachi, Ltd. All rights reserved. No part of this publication
Copyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Hitachi Virtual Storage Platform
Hitachi Virtual Storage Platform Hitachi Storage Navigator User Guide FASTFIND LINKS Document Organization Product Version Getting Help Contents MK-90RD7027-11 2010-2013 Hitachi Ltd, All rights reserved.
Release 2.0. Cox Business Online Backup Quick Start Guide
Cox Business Online Backup Quick Start Guide Release 2.0 Cox Business Online Backup Quick Start Guide i IMPORTANT: You must notify Cox in advance if you would like to move or relocate your telephone Service.
Software License Registration Guide
Software License Registration Guide When you have purchased new software Chapter 2 Authenticating a License When you would like to use the software on a different PC Chapter 3 Transferring a License to
Hitachi Application Protector User Guide for Microsoft SQL Server
Hitachi Application Protector User Guide for Microsoft SQL Server FASTFIND LINKS Document Organization Product Version Getting Help Contents MK-91HAP007-06 Copyright 2011-2014 Hitachi, Ltd., Hitachi Data
Hitachi Unified Storage VM Block Module
Hitachi Unified Storage VM Block Module Hitachi Universal Replicator User Guide FASTFIND LINKS Contents Product Version Getting Help MK-92HM7019-08 2012-2014 Hitachi, Ltd. All rights reserved. No part
EMC NetWorker Module for Microsoft Exchange Server Release 5.1
EMC NetWorker Module for Microsoft Exchange Server Release 5.1 Installation Guide P/N 300-004-750 REV A02 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
Rational Rational ClearQuest
Rational Rational ClearQuest Version 7.0 Windows Using Project Tracker GI11-6377-00 Rational Rational ClearQuest Version 7.0 Windows Using Project Tracker GI11-6377-00 Before using this information, be
Back-up Server DOC-OEMSPP-S/2014-BUS-EN-10/12/13
Back-up Server DOC-OEMSPP-S/2014-BUS-EN-10/12/13 The information contained in this guide is not of a contractual nature and may be subject to change without prior notice. The software described in this
NovaBACKUP Storage Server User Manual NovaStor / April 2013
NovaBACKUP Storage Server User Manual NovaStor / April 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change
HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide
HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide Abstract This guide describes the Virtualization Monitor (vmon), an add-on service module of the HP Intelligent Management
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
Unity Error Message: Your voicemail box is almost full
Unity Error Message: Your voicemail box is almost full Document ID: 111781 Contents Introduction Prerequisites Requirements Components Used Conventions Problem Solution Delete Voice Mail Messages from
User guide. Business Email
User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook
MANUFACTURER RamSoft Incorporated 243 College St, Suite 100 Toronto, ON M5T 1R5 CANADA
All Information provided in this document and in the accompanying software is subject to change without notice and does not represent a commitment on the part of RamSoft. RamSoft assumes no responsibility
TOSHIBA GA-1310. Printing from Windows
TOSHIBA GA-1310 Printing from Windows 2009 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45081979 04 February 2009 CONTENTS 3 CONTENTS
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/
StarWind iscsi SAN Software: Using StarWind with MS Cluster on Windows Server 2008
StarWind iscsi SAN Software: Using StarWind with MS Cluster on Windows Server 2008 www.starwindsoftware.com Copyright 2008-2012. All rights reserved. COPYRIGHT Copyright 2008-2012. All rights reserved.
http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
Silect Software s MP Author
Silect MP Author for Microsoft System Center Operations Manager Silect Software s MP Author User Guide September 2, 2015 Disclaimer The information in this document is furnished for informational use only,
User Guide. DocAve Lotus Notes Migrator for Microsoft Exchange 1.1. Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration
User Guide DocAve Lotus Notes Migrator for Microsoft Exchange 1.1 Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration This document is intended for anyone wishing to familiarize themselves
Tivoli Access Manager Agent for Windows Installation Guide
IBM Tivoli Identity Manager Tivoli Access Manager Agent for Windows Installation Guide Version 4.5.0 SC32-1165-03 IBM Tivoli Identity Manager Tivoli Access Manager Agent for Windows Installation Guide
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
Copyright 2013 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
EMC SourceOne Auditing and Reporting Version 7.0
EMC SourceOne Auditing and Reporting Version 7.0 Installation and Administration Guide 300-015-186 REV 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
Easy Setup Guide for the Sony Network Camera
-878-191-11 (1) Easy Setup Guide for the Sony Network Camera For setup, a computer running the Microsoft Windows Operating System is required. For monitoring camera images, Microsoft Internet Explorer
NovaBACKUP xsp Version 15.0 Upgrade Guide
NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject
Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual
Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual www.hillstonenet.com Preface Conventions Content This document follows the conventions below: CLI Tip: provides
1 of 10 1/31/2014 4:08 PM
1 of 10 1/31/2014 4:08 PM copyright 2014 How to backup Microsoft SQL Server with Nordic Backup Pro Before creating a SQL backup set within Nordic Backup Pro it is first necessary to verify that the settings
IBM i Version 7.2. Security Service Tools
IBM i Version 7.2 Security Service Tools IBM i Version 7.2 Security Service Tools Note Before using this information and the product it supports, read the information in Notices on page 37. This edition
Personal Call Manager User Guide. BCM Business Communications Manager
Personal Call Manager User Guide BCM Business Communications Manager Document Status: Standard Document Version: 04.01 Document Number: NN40010-104 Date: August 2008 Copyright Nortel Networks 2005 2008
Setting up VMware ESXi for 2X VirtualDesktopServer Manual
Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples
Sophos Mobile Control as a Service Startup guide. Product version: 3.5
Sophos Mobile Control as a Service Startup guide Product version: 3.5 Document date: August 2013 Contents 1 About this guide...3 2 What are the key steps?...4 3 First login...5 4 Change your administrator
Studio 5.0 User s Guide
Studio 5.0 User s Guide wls-ug-administrator-20060728-05 Revised 8/8/06 ii Copyright 2006 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,
Hitachi Virtual Storage Platform
Hitachi Virtual Storage Platform Hitachi SNMP Agent User Guide FASTFIND LINKS Document Organization Product Version Getting Help Contents MK-90RD7025-09 2010-2013 Hitachi Ltd. All rights reserved. No part
How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)
Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,
Ultimus and Microsoft Active Directory
Ultimus and Microsoft Active Directory May 2004 Ultimus, Incorporated 15200 Weston Parkway, Suite 106 Cary, North Carolina 27513 Phone: (919) 678-0900 Fax: (919) 678-0901 E-mail: [email protected]
http://docs.trendmicro.com/en-us/enterprise/cloud-app-encryption-foroffice-365.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the cloud service described herein without notice. Before installing and using the cloud service, review the readme files,
Backup Server DOC-OEMSPP-S/6-BUS-EN-21062011
Backup Server DOC-OEMSPP-S/6-BUS-EN-21062011 The information contained in this guide is not of a contractual nature and may be subject to change without prior notice. The software described in this guide
Enterprise Manager. Version 6.2. Administrator s Guide
Enterprise Manager Version 6.2 Administrator s Guide Enterprise Manager 6.2 Administrator s Guide Document Number 680-017-017 Revision Date Description A August 2012 Initial release to support version
EMC NetWorker Module for Microsoft Applications Release 2.3. Application Guide P/N 300-011-105 REV A02
EMC NetWorker Module for Microsoft Applications Release 2.3 Application Guide P/N 300-011-105 REV A02 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
NovaBACKUP xsp Version 12.2 Upgrade Guide
NovaBACKUP xsp Version 12.2 Upgrade Guide NovaStor / August 2011 Rev 20110815 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications
Installing LearningBay Enterprise Part 2
Installing LearningBay Enterprise Part 2 Support Document Copyright 2012 Axiom. All Rights Reserved. Page 1 Please note that this document is one of three that details the process for installing LearningBay
StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec
StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011. All rights reserved. No
Sophos Mobile Control Installation guide. Product version: 3
Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External
ATX Document Manager. User Guide
ATX Document Manager User Guide ATX DOCUMENT MANAGER User Guide 2010 CCH Small Firm Services. All rights reserved. 6 Mathis Drive NW Rome, GA 30165 No part of this manuscript may be copied, photocopied,
SafeGuard Enterprise upgrade guide. Product version: 7
SafeGuard Enterprise upgrade guide Product version: 7 Document date: December 2014 Contents 1 About this guide...3 2 Check the system requirements...4 3 Download installers...5 4 About upgrading...6 4.1
How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro
Online Backup by Mozy Restore Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 How do I restore my data? There are five ways of restoring your data: 1) Performing
USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C
USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION Publication: 81-9059-0703-0, Rev. C www.pesa.com Phone: 256.726.9200 Thank You for Choosing PESA!! We appreciate your confidence in our products. PESA produces
SAM 8.0 Backup and Restore Guide. SafeNet Integration Guide
SAM 8.0 Backup and Restore Guide SafeNet Integration Guide Revision A November 2012 SAM 8.0 Backup and Restore Guide - SafeNet Integration Guide Introduction Copyright 2012 SafeNet, Inc. All rights reserved.
McAfee Endpoint Encryption Reporting Tool
McAfee Endpoint Encryption Reporting Tool User Guide Version 5.2.13 McAfee, Inc. McAfee, Inc. 3965 Freedom Circle, Santa Clara, CA 95054, USA Tel: (+1) 888.847.8766 For more information regarding local
VERITAS NetBackup 6.0 Encryption
VERITAS NetBackup 6.0 Encryption System Administrator s Guide for UNIX, Windows, and Linux N15274C September 2005 Disclaimer The information contained in this publication is subject to change without notice.
VMware Horizon FLEX User Guide
Horizon FLEX 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
DIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
How To Use A Microsoft Networker Module For Windows 8.2.2 (Windows) And Windows 8 (Windows 8) (Windows 7) (For Windows) (Powerbook) (Msa) (Program) (Network
EMC NetWorker Module for Microsoft Applications Release 2.3 Application Guide P/N 300-011-105 REV A03 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
Network FAX Driver. Operation Guide
Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
Hitachi NAS Platform F1000 Series
Hitachi NAS Platform F1000 Series Cluster Troubleshooting Guide Product Version Getting Help Contents MK-92NAS066-07 2012-2015 Hitachi, Ltd. All rights reserved. No part of this publication may be reproduced
How to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
Secret Server Installation Windows 8 / 8.1 and Windows Server 2012 / R2
Secret Server Installation Windows 8 / 8.1 and Windows Server 2012 / R2 Table of Contents Table of Contents... 1 I. Introduction... 3 A. ASP.NET Website... 3 B. SQL Server Database... 3 C. Administrative
Hitachi Content Platform Anywhere
Hitachi Content Platform Anywhere HCP Anywhere Software Version 2.0.3.24 HCP Anywhere Operating System Version 20.0.3.2 Desktop Application (for Windows) Version 2.0.0.7 Desktop Application (for Mac) Version
Hitachi Compute Blade Series Hitachi Compute Rack Series Server installation and monitoring tool User's Guide log monitoring functions for VMware vma
Hitachi Compute Blade Series Hitachi Compute Rack Series Server installation and monitoring tool User's Guide log monitoring functions for VMware vma FASTFIND LINKS Document Organization Product Version
PaymentNet Federal Card Solutions Cardholder FAQs
PaymentNet Federal Card Solutions It s easy to find the answers to your questions about PaymentNet! June 2014 Frequently Asked Questions First Time Login How do I obtain my login information?... 2 How
Configuration Guide for VMware ESX Server Host Attachment
Configuration Guide for VMware ESX Server Host Attachment Hitachi Unified Storage VM Hitachi Virtual Storage Platform Hitachi Universal Storage Platform V/VM Hitachi TagmaStore Universal Storage Platform
Xerox Multifunction Devices. Verify Device Settings via the Configuration Report
Xerox Multifunction Devices Customer Tips March 15, 2007 This document applies to these Xerox products: X WC 4150 X WCP 32/40 X WCP 35/45/55 X WCP 65/75/90 X WCP 165/175 X WCP 232/238 X WCP 245/255 X WCP
Hitachi Unified Storage File Module Replication and Disaster Recovery Administration Guide Release 12.0
Hitachi Unified Storage File Module Replication and Disaster Recovery Administration Guide Release 12.0 MK-92USF009-03 2011-2014 Hitachi, Ltd. All rights reserved. No part of this publication may be reproduced
Business Portal for Microsoft Dynamics GP. Key Performance Indicators Release 10.0
Business Portal for Microsoft Dynamics GP Key Performance Indicators Release 10.0 Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the
