Administrator Guide
Page 14
...distinguish the difference between redundant resources in which the system processes data storage requests from ingesting encrypted data. FOR PROOF ONLY 6 Understanding the DR4000 System For example, there may be cases where an email system may be additionally compressed ...and the following shows how this process allows for a long period of time. FILE LOCATION: C:\Users\bruce_wylie\Desktop\Dell Docs\~Sidewinder_Docs_DR4000\FRAME_Conversion_DR4000_AdminGuide\~DR4000_AG_F By contrast, standard file compression tools identify short repeated substrings inside individual files, with the goal...
...distinguish the difference between redundant resources in which the system processes data storage requests from ingesting encrypted data. FOR PROOF ONLY 6 Understanding the DR4000 System For example, there may be cases where an email system may be additionally compressed ...and the following shows how this process allows for a long period of time. FILE LOCATION: C:\Users\bruce_wylie\Desktop\Dell Docs\~Sidewinder_Docs_DR4000\FRAME_Conversion_DR4000_AdminGuide\~DR4000_AG_F By contrast, standard file compression tools identify short repeated substrings inside individual files, with the goal...
Owner's Manual
Page 49
... Off. Using the System Setup Program and UEFI Boot Manager 49 If On without Pre-boot Measurements, the system reports the TPM to Yes, all encryption keys in the TPM. When set to enabling this field is enabled to default settings. NOTE: For more information, see "Using the System Password" on...: This field is read -only when TPM Security is disabled. If Off, the presence of the Trusted Platform Module (TPM) in data loss if the encryption keys cannot be changed or disabled at system start-up the TPM keys prior to Deactivate, the TPM is set to the TPM during POST...
... Off. Using the System Setup Program and UEFI Boot Manager 49 If On without Pre-boot Measurements, the system reports the TPM to Yes, all encryption keys in the TPM. When set to enabling this field is enabled to default settings. NOTE: For more information, see "Using the System Password" on...: This field is read -only when TPM Security is disabled. If Off, the presence of the Trusted Platform Module (TPM) in data loss if the encryption keys cannot be changed or disabled at system start-up the TPM keys prior to Deactivate, the TPM is set to the TPM during POST...
Owner's Manual
Page 116
Read and follow the safety instructions that is not authorized by Dell is not covered by your warranty. If you replace this recovery key. See "Removing an iDRAC6 Express Card" on page 90. 10 Disconnect all expansion ... the system board assembly toward the front end of the chassis. 116 Installing System Components Damage due to servicing that came with an encryption key, you can access the encrypted data on page 74. 5 Remove all cables from the electrical outlet. 2 Open the system. See "Opening the System" on page 87. 6 Remove...
Read and follow the safety instructions that is not authorized by Dell is not covered by your warranty. If you replace this recovery key. See "Removing an iDRAC6 Express Card" on page 90. 10 Disconnect all expansion ... the system board assembly toward the front end of the chassis. 116 Installing System Components Damage due to servicing that came with an encryption key, you can access the encrypted data on page 74. 5 Remove all cables from the electrical outlet. 2 Open the system. See "Opening the System" on page 87. 6 Remove...
Glossary
Page 6
...bay in a chassis. Snapshots depend on all drives. Baseboard A server management module that uses an Authentication Protocol encrypted challenge-response mechanism. blade For the Dell AIM SDK, blade is mounted into an enclosure. Challenge Handshake Challenge Handshake Authentication Protocol, a network login protocol that...the context of EKM, a specialized encrypted key that allows a client to communicate with VMware virtual environments to enable you to administer Smart Copies. base volume (Dell A volume mounted on the array. In the context of Dell AIM, the Controller uses the BMC ...
...bay in a chassis. Snapshots depend on all drives. Baseboard A server management module that uses an Authentication Protocol encrypted challenge-response mechanism. blade For the Dell AIM SDK, blade is mounted into an enclosure. Challenge Handshake Challenge Handshake Authentication Protocol, a network login protocol that...the context of EKM, a specialized encrypted key that allows a client to communicate with VMware virtual environments to enable you to administer Smart Copies. base volume (Dell A volume mounted on the array. In the context of Dell AIM, the Controller uses the BMC ...
Glossary
Page 8
...second column from which volume storage space is security data such as 208.77.188.166. See Double-data Rate. Dell Encryption Key Manager (EKM) secures the data stored on a group set aside to be viewed and managed by assigning all...Host Configuration Protocol. Copilot Services Copy-Mirror-Migrate credential store Cryptographic Object Data Collector Data Instant Replay Data Progression DDR delegated space Dell Encryption Key Manager (EKM) Dell Remote Access Controller (DRAC) device driver DHCP Digital Versatile Disk disk folder Disk Position DNS Domain Name System (DNS) dormant Persona...
...second column from which volume storage space is security data such as 208.77.188.166. See Double-data Rate. Dell Encryption Key Manager (EKM) secures the data stored on a group set aside to be viewed and managed by assigning all...Host Configuration Protocol. Copilot Services Copy-Mirror-Migrate credential store Cryptographic Object Data Collector Data Instant Replay Data Progression DDR delegated space Dell Encryption Key Manager (EKM) Dell Remote Access Controller (DRAC) device driver DHCP Digital Versatile Disk disk folder Disk Position DNS Domain Name System (DNS) dormant Persona...
Glossary
Page 9
... rising and falling pulses of hardware, software, and network configurations managed by using RAID 10 and/or RAID 6. EKM See Dell Encryption Key Manager. external switch In the context of the Dell Aim environment, a switch that is usually made up entirely of interconnected switches that potentially doubles the data rate by transferring data...
... rising and falling pulses of hardware, software, and network configurations managed by using RAID 10 and/or RAID 6. EKM See Dell Encryption Key Manager. external switch In the context of the Dell Aim environment, a switch that is usually made up entirely of interconnected switches that potentially doubles the data rate by transferring data...
Glossary
Page 12
... iSCSI traffic (Volume I /O load, essentially doubling throughput, but only the leader controller performs external management functions. Managed Disks In Dell Compellent Storage Center, storage media devices (disks, SSDs) that are configured to monitor or manage that defines how a client may...(KMIP) Standards set up for the communication between enterprise key management systems and encryption systems. Key Serving Ports Ports used by management and service applications. Keys An encrypted certificate used to connect to an intelligent IP-enabled device in order to dedicate...
... iSCSI traffic (Volume I /O load, essentially doubling throughput, but only the leader controller performs external management functions. Managed Disks In Dell Compellent Storage Center, storage media devices (disks, SSDs) that are configured to monitor or manage that defines how a client may...(KMIP) Standards set up for the communication between enterprise key management systems and encryption systems. Key Serving Ports Ports used by management and service applications. Keys An encrypted certificate used to connect to an intelligent IP-enabled device in order to dedicate...
Glossary
Page 13
...but not physically present (i.e., configured space minus available space). Used in time copies of the network. mirror volume A Dell Compellent Storage Center command to take over managing the environment if the active Controller fails. Mirroring functionality is created as available... thin provisioning, the amount of the data. Partitions can then be divided into an existing keystore during (not after) Dell Encryption Key Manager 3.0 installation. Network-Attached Storage (NAS) NAS is manually broken. manual transfer replication Replication done through transportable media...
...but not physically present (i.e., configured space minus available space). Used in time copies of the network. mirror volume A Dell Compellent Storage Center command to take over managing the environment if the active Controller fails. Mirroring functionality is created as available... thin provisioning, the amount of the data. Partitions can then be divided into an existing keystore during (not after) Dell Encryption Key Manager 3.0 installation. Network-Attached Storage (NAS) NAS is manually broken. manual transfer replication Replication done through transportable media...
Glossary
Page 141
控制模块 控制器 (Dell AIM) 控制器 (Dell Compellent) Copilot DDR Dell Encryption Key Manager (EKM) Dell DRAC DHCP Dell EqualLogic PS Series Dell EqualLogic PS Series I/O iSCSI iSCSI Dell Compellent Storage Center iSCSI iSCSI Dell AIM RAID)、I/O Dell Compellent Storage Center Storage Center Storage Center 在 Dell AIM SCN CLI IP IP SCN 服务...
控制模块 控制器 (Dell AIM) 控制器 (Dell Compellent) Copilot DDR Dell Encryption Key Manager (EKM) Dell DRAC DHCP Dell EqualLogic PS Series Dell EqualLogic PS Series I/O iSCSI iSCSI Dell Compellent Storage Center iSCSI iSCSI Dell AIM RAID)、I/O Dell Compellent Storage Center Storage Center Storage Center 在 Dell AIM SCN CLI IP IP SCN 服务...
Glossary
Page 142
....188.166 AIM Dell Dell Compellent Storage Center RAID 10 和/或 RAID 6 IP 系统的 RAM DRAM 请参阅 Dell Encryption Key Manager。 在 EKM EKM 在 Dell Compellent Storage Center I/O Dell AIM Dell AIM 0 1。 在 Dell Compellent Storage Center 中,Eth0 Dell Compellent Storage Center 中,Eth1 Dell AIM Dell AIM Dell AIM Dell AIM 6
....188.166 AIM Dell Dell Compellent Storage Center RAID 10 和/或 RAID 6 IP 系统的 RAM DRAM 请参阅 Dell Encryption Key Manager。 在 EKM EKM 在 Dell Compellent Storage Center I/O Dell AIM Dell AIM 0 1。 在 Dell Compellent Storage Center 中,Eth0 Dell Compellent Storage Center 中,Eth1 Dell AIM Dell AIM Dell AIM Dell AIM 6