Administrator Guide
Page 14
... has been processed by which the system processes data storage requests from ingesting encrypted data. PRELIMINARY 1/10/12 - FOR PROOF ONLY 6 Understanding the DR4000 System Data replication improves fault-tolerance, improving the reliability of maintaining consistency between... that email system is backed up, all subsequent instances are identical. FILE LOCATION: C:\Users\bruce_wylie\Desktop\Dell Docs\~Sidewinder_Docs_DR4000\FRAME_Conversion_DR4000_AdminGuide\~DR4000_AG_F By contrast, standard file compression tools identify short repeated substrings inside individual files, with...
... has been processed by which the system processes data storage requests from ingesting encrypted data. PRELIMINARY 1/10/12 - FOR PROOF ONLY 6 Understanding the DR4000 System Data replication improves fault-tolerance, improving the reliability of maintaining consistency between... that email system is backed up, all subsequent instances are identical. FILE LOCATION: C:\Users\bruce_wylie\Desktop\Dell Docs\~Sidewinder_Docs_DR4000\FRAME_Conversion_DR4000_AdminGuide\~DR4000_AG_F By contrast, standard file compression tools identify short repeated substrings inside individual files, with...
Owner's Manual
Page 49
.... When set to the operating system. When set to Deactivate, the TPM is set to the operating system and results in data loss if the encryption keys cannot be changed or disabled at system start-up the TPM keys prior to enabling this field is set to the System Setup program... Activation (No Change default) TPM Clear (No default) Description Restricts access to Yes, all TPM contents are preserved). CAUTION: Clearing the TPM will lose all encryption keys in the system.
.... When set to the operating system. When set to Deactivate, the TPM is set to the operating system and results in data loss if the encryption keys cannot be changed or disabled at system start-up the TPM keys prior to enabling this field is set to the System Setup program... Activation (No Change default) TPM Clear (No default) Description Restricts access to Yes, all TPM contents are preserved). CAUTION: Clearing the TPM will lose all encryption keys in the system.
Owner's Manual
Page 116
... 90. 10 Disconnect all expansion cards and, if applicable, the storage controller card. Read and follow the safety instructions that is not authorized by Dell is not covered by the online or telephone service and support team. See "Removing an iDRAC6 Enterprise Card" on page 87. 6 Remove the...on page 74. 5 Remove all cables from the electrical outlet. 2 Open the system. Damage due to servicing that came with an encryption key, you can access the encrypted data on your warranty. CAUTION: If you replace this recovery key. If you are using the Trusted Program Module (TPM) with the ...
... 90. 10 Disconnect all expansion cards and, if applicable, the storage controller card. Read and follow the safety instructions that is not authorized by Dell is not covered by the online or telephone service and support team. See "Removing an iDRAC6 Enterprise Card" on page 87. 6 Remove the...on page 74. 5 Remove all cables from the electrical outlet. 2 Open the system. Damage due to servicing that came with an encryption key, you can access the encrypted data on your warranty. CAUTION: If you replace this recovery key. If you are using the Trusted Program Module (TPM) with the ...
Glossary
Page 6
... allows a client to communicate with VMware virtual environments to enable you to local disk enclosures. back end In Dell Compellent Storage Center, an isolated and dedicated network that uses an Authentication Protocol encrypted challenge-response mechanism. If the base volume is mounted into an enclosure. CHAP is an element of the host...
... allows a client to communicate with VMware virtual environments to enable you to local disk enclosures. back end In Dell Compellent Storage Center, an isolated and dedicated network that uses an Authentication Protocol encrypted challenge-response mechanism. If the base volume is mounted into an enclosure. CHAP is an element of the host...
Glossary
Page 8
... store Cryptographic Object Data Collector Data Instant Replay Data Progression DDR delegated space Dell Encryption Key Manager (EKM) Dell Remote Access Controller (DRAC) device driver DHCP Digital Versatile Disk disk folder Disk Position DNS Domain Name System (DNS) dormant Persona Within Dell Compellent Storage Center, the combination of centralized support, product education and sales...
... store Cryptographic Object Data Collector Data Instant Replay Data Progression DDR delegated space Dell Encryption Key Manager (EKM) Dell Remote Access Controller (DRAC) device driver DHCP Digital Versatile Disk disk folder Disk Position DNS Domain Name System (DNS) dormant Persona Within Dell Compellent Storage Center, the combination of centralized support, product education and sales...
Glossary
Page 9
... network configurations managed by transferring data on the outer (faster) disk tracks. 7 Double-data Rate (DDR) Double-data rate. EKM See Dell Encryption Key Manager. environment In the context of Dell AIM, the collection of DRAM chips. A FC (or iSCSI) topology with at least one switch present on a SAN and lets new devices...
... network configurations managed by transferring data on the outer (faster) disk tracks. 7 Double-data Rate (DDR) Double-data rate. EKM See Dell Encryption Key Manager. environment In the context of Dell AIM, the collection of DRAM chips. A FC (or iSCSI) topology with at least one switch present on a SAN and lets new devices...
Glossary
Page 12
... how a client may be dedicated for exclusive use by management applications or shared for the communication between enterprise key management systems and encryption systems. Key Serving Ports Ports used to connect to an intelligent IP-enabled device in order to monitor or manage that is a... conceptual division (a subunit) of a storage disk or a set of encrypted keys in EKM. logical unit number (LUN) A logical unit is monitored and managed using Dell OpenManage Server Administrator. LTO Key Group Rollover In EKM, a set of keys assigned to be uniquely ...
... how a client may be dedicated for exclusive use by management applications or shared for the communication between enterprise key management systems and encryption systems. Key Serving Ports Ports used to connect to an intelligent IP-enabled device in order to monitor or manage that is a... conceptual division (a subunit) of a storage disk or a set of encrypted keys in EKM. logical unit number (LUN) A logical unit is monitored and managed using Dell OpenManage Server Administrator. LTO Key Group Rollover In EKM, a set of keys assigned to be uniquely ...
Glossary
Page 13
...environment if the active Controller fails. Media Access Control Your system's unique hardware number on a network. mirror volume A Dell Compellent Storage Center command to serve specific storage needs. network connection An object that is provided by software. Network-Attached ...latency data networks. NAS See Network-Attached Storage. Partitions can then be divided into an existing keystore during (not after) Dell Encryption Key Manager 3.0 installation. NTP The Network Time Protocol (NTP) is created as available but does not perform external management...
...environment if the active Controller fails. Media Access Control Your system's unique hardware number on a network. mirror volume A Dell Compellent Storage Center command to serve specific storage needs. network connection An object that is provided by software. Network-Attached ...latency data networks. NAS See Network-Attached Storage. Partitions can then be divided into an existing keystore during (not after) Dell Encryption Key Manager 3.0 installation. NTP The Network Time Protocol (NTP) is created as available but does not perform external management...
Glossary
Page 141
控制模块 控制器 (Dell AIM) 控制器 (Dell Compellent) Copilot DDR Dell Encryption Key Manager (EKM) Dell DRAC DHCP Dell EqualLogic PS Series Dell EqualLogic PS Series I/O iSCSI iSCSI Dell Compellent Storage Center iSCSI iSCSI Dell AIM RAID)、I/O Dell Compellent Storage Center Storage Center Storage Center 在 Dell AIM SCN CLI IP IP SCN 服务...
控制模块 控制器 (Dell AIM) 控制器 (Dell Compellent) Copilot DDR Dell Encryption Key Manager (EKM) Dell DRAC DHCP Dell EqualLogic PS Series Dell EqualLogic PS Series I/O iSCSI iSCSI Dell Compellent Storage Center iSCSI iSCSI Dell AIM RAID)、I/O Dell Compellent Storage Center Storage Center Storage Center 在 Dell AIM SCN CLI IP IP SCN 服务...
Glossary
Page 142
....188.166 AIM Dell Dell Compellent Storage Center RAID 10 和/或 RAID 6 IP 系统的 RAM DRAM 请参阅 Dell Encryption Key Manager。 在 EKM EKM 在 Dell Compellent Storage Center I/O Dell AIM Dell AIM 0 1。 在 Dell Compellent Storage Center 中,Eth0 Dell Compellent Storage Center 中,Eth1 Dell AIM Dell AIM Dell AIM Dell AIM 6
....188.166 AIM Dell Dell Compellent Storage Center RAID 10 和/或 RAID 6 IP 系统的 RAM DRAM 请参阅 Dell Encryption Key Manager。 在 EKM EKM 在 Dell Compellent Storage Center I/O Dell AIM Dell AIM 0 1。 在 Dell Compellent Storage Center 中,Eth0 Dell Compellent Storage Center 中,Eth1 Dell AIM Dell AIM Dell AIM Dell AIM 6