Dell PowerVault ML6000 Getting Started Guide
Page 14
Use Fibre Channel cables to connect your library contains Fibre Channel tape drives that you will be connecting directly to a host or switch. Connecting Fibre Channel Cables to a Host or Switch Perform this step if your host (or switch) to the library. For each tape drive: 1 Connect one end of the Fibre Channel cable to the Fibre Channel port on the tape drive. 2 Connect the other end of the Fibre Channel cable to your host or switch. 1 Fibre Channel port 2 Fibre Channel cable 14 Dell PowerVault ML6000 Getting Started Guide
Use Fibre Channel cables to connect your library contains Fibre Channel tape drives that you will be connecting directly to a host or switch. Connecting Fibre Channel Cables to a Host or Switch Perform this step if your host (or switch) to the library. For each tape drive: 1 Connect one end of the Fibre Channel cable to the Fibre Channel port on the tape drive. 2 Connect the other end of the Fibre Channel cable to your host or switch. 1 Fibre Channel port 2 Fibre Channel cable 14 Dell PowerVault ML6000 Getting Started Guide
Dell PowerVault ML6000 Getting Started Guide
Page 18
... use module terminators. Libraries that contains tape drives. CAUTION: The module terminator is required for each power supply, connect one end of the cable to the one end of the power cord to the back of a module terminator can damage the library. Using a SCSI terminator instead of the 5U Library Control Module. 1 Remove the protective plastic caps covering the module connectors on the product label). 18 Dell PowerVault ML6000 Getting Started Guide...
... use module terminators. Libraries that contains tape drives. CAUTION: The module terminator is required for each power supply, connect one end of the cable to the one end of the power cord to the back of a module terminator can damage the library. Using a SCSI terminator instead of the 5U Library Control Module. 1 Remove the protective plastic caps covering the module connectors on the product label). 18 Dell PowerVault ML6000 Getting Started Guide...
Dell PowerVault ML6000 Getting Started Guide
Page 20
1 Power supply power switch Getting Started 1 Configure your host application documentation. 20 Dell PowerVault ML6000 Getting Started Guide For details, see your library using the Setup Wizard. For details, see the Dell™ PowerVault™ ML6000 Tape Library User's Guide. 2 Verify that each host can communicate with the library's tape drives.
1 Power supply power switch Getting Started 1 Configure your host application documentation. 20 Dell PowerVault ML6000 Getting Started Guide For details, see your library using the Setup Wizard. For details, see the Dell™ PowerVault™ ML6000 Tape Library User's Guide. 2 Verify that each host can communicate with the library's tape drives.
Dell PowerVault ML6000 SNMP Reference Guide
Page 7
... the library MIBs, contact technical support. For information on integrating MIBs with commercial management frameworks. Explanation of Simple Network Management Protocol (SNMP), that can provide library status information to the PowerVault ML6000 Tape Library User's Guide. Using SNMP, you automatically. It also identifies the SNMP traps that you can monitor the library from a network management application rather than-or in integrating the PowerVault™ ML6000 with an SNMP management application, contact your network management application vendor...
... the library MIBs, contact technical support. For information on integrating MIBs with commercial management frameworks. Explanation of Simple Network Management Protocol (SNMP), that can provide library status information to the PowerVault ML6000 Tape Library User's Guide. Using SNMP, you automatically. It also identifies the SNMP traps that you can monitor the library from a network management application rather than-or in integrating the PowerVault™ ML6000 with an SNMP management application, contact your network management application vendor...
Dell PowerVault ML6000 SNMP Reference Guide
Page 9
... (v1 is a light-weight protocol designed for GET queries • Default community read/trap strings: publicCmtyStr (see SNMP Community Strings on the ML6000 library. Specific ML6000 library SNMP characteristics include: • Supports SNMP v1, v2c, and v3 • Supports SNMP v1 and v2 traps as defined by Dell for all SNMP requests to monitor library status from a remote application. Dell PowerVault ML6000 Basic SNMP Reference Guide 3 All ML6000 MIB variables are currently not enabled on page...
... (v1 is a light-weight protocol designed for GET queries • Default community read/trap strings: publicCmtyStr (see SNMP Community Strings on the ML6000 library. Specific ML6000 library SNMP characteristics include: • Supports SNMP v1, v2c, and v3 • Supports SNMP v1 and v2 traps as defined by Dell for all SNMP requests to monitor library status from a remote application. Dell PowerVault ML6000 Basic SNMP Reference Guide 3 All ML6000 MIB variables are currently not enabled on page...
Dell PowerVault ML6000 SNMP Reference Guide
Page 10
... automatically to collect traps from the remote Web client and the operator panel. SNMPv3 is event-driven. 4 Description You can gather status information about registering a host with your framework application to registered hosts when specific events occur. To receive traps, you access the library using either the Dell PowerVault ML6000 Tape Library User's Guide or the relevant ML6000 online help topics. By querying the MIB, hosts can set the library to be initiated...
... automatically to collect traps from the remote Web client and the operator panel. SNMPv3 is event-driven. 4 Description You can gather status information about registering a host with your framework application to registered hosts when specific events occur. To receive traps, you access the library using either the Dell PowerVault ML6000 Tape Library User's Guide or the relevant ML6000 online help topics. By querying the MIB, hosts can set the library to be initiated...
Dell PowerVault ML6000 SNMP Reference Guide
Page 11
... an ML6000 library is disabled. By default, this procedure to configure the SNMP community string. 1 Login to the remote Web client. 2 Go to enable authentication traps. • Remove the check from which you can retrieve status information. GETs must also include an instance ID. Dell PowerVault ML6000 Basic SNMP Reference Guide 5 SNMP Authentication Traps SNMP authentication traps occur in a number of the acceptable host list. • Receives a request from a bad user name or password when using SNMP Version 3. •...
... an ML6000 library is disabled. By default, this procedure to configure the SNMP community string. 1 Login to the remote Web client. 2 Go to enable authentication traps. • Remove the check from which you can retrieve status information. GETs must also include an instance ID. Dell PowerVault ML6000 Basic SNMP Reference Guide 5 SNMP Authentication Traps SNMP authentication traps occur in a number of the acceptable host list. • Receives a request from a bad user name or password when using SNMP Version 3. •...
Dell PowerVault ML6000 SMI-S Reference Guide
Page 11
... using CIM servers to manage a network of SAN elements is to discover CIM servers by the CIM server. This includes providing the namespace for the CIM server and all the supported profiles and subprofiles, see Figure 1 on page 12. Dell PowerVault ML6000 SMI-S Reference Guide 7 The Server profile defines the capabilities of all supported optional subprofiles, using CIM servers to agent implementors and client application developers. Storage Library Profile, Version...
... using CIM servers to manage a network of SAN elements is to discover CIM servers by the CIM server. This includes providing the namespace for the CIM server and all the supported profiles and subprofiles, see Figure 1 on page 12. Dell PowerVault ML6000 SMI-S Reference Guide 7 The Server profile defines the capabilities of all supported optional subprofiles, using CIM servers to agent implementors and client application developers. Storage Library Profile, Version...
Dell PowerVault ML6000 SMI-S Reference Guide
Page 17
... storage library profile and its subprofiles contain a list of indication filters that your CIM clients to receive them. Dell PowerVault ML6000 SMI-S Reference Guide 13 Table 1 CIM Methods Method enumerateInstances() enumerateInstanceNames() getInstance() associators() associatorName() references() referenceName() Using CIM Indications How it is a message that communicates a change in the status of an SMI-S managed device-in this case, a change in the status of the library. For example...
... storage library profile and its subprofiles contain a list of indication filters that your CIM clients to receive them. Dell PowerVault ML6000 SMI-S Reference Guide 13 Table 1 CIM Methods Method enumerateInstances() enumerateInstanceNames() getInstance() associators() associatorName() references() referenceName() Using CIM Indications How it is a message that communicates a change in the status of an SMI-S managed device-in this case, a change in the status of the library. For example...
Dell PowerVault ML6000 SCSI Reference Guide
Page 89
... the appropriate internal storage. The Buffer ID and Buffer Offset fields are listed in this command, since the Media Changer logical units only support the echo buffer mode. The IDs are assigned contiguously. PowerVault ML6000 SCSI Reference Guide 79 The IDs supported by the Buffer ID field, starting at the specified Buffer Offset. The initiator can be used primarily to download new firmware to the...
... the appropriate internal storage. The Buffer ID and Buffer Offset fields are listed in this command, since the Media Changer logical units only support the echo buffer mode. The IDs are assigned contiguously. PowerVault ML6000 SCSI Reference Guide 79 The IDs supported by the Buffer ID field, starting at the specified Buffer Offset. The initiator can be used primarily to download new firmware to the...
Dell PowerVault ML6000 Encryption Key Manager Setup
Page 3
.... Installing the Dell EKM on a Server You must be read from the PowerVault ML6000 library in real time when reading from or writing to a partition selected for example, LTO-3) can be enabled from , tape media. This way, if the primary server is transparent to begin encrypting data using IBM LTO-4 and LTO-5 Fibre Channel and SAS tape drives. When you purchase library managed encryption, you must set up to the Dell PowerVault Encryption Key Manager User's Guide and...
.... Installing the Dell EKM on a Server You must be read from the PowerVault ML6000 library in real time when reading from or writing to a partition selected for example, LTO-3) can be enabled from , tape media. This way, if the primary server is transparent to begin encrypting data using IBM LTO-4 and LTO-5 Fibre Channel and SAS tape drives. When you purchase library managed encryption, you must set up to the Dell PowerVault Encryption Key Manager User's Guide and...
Dell PowerVault ML6000 Encryption Key Manager Quick Start Guide
Page 5
... and password = changeME (This is installed in is used to this 5 When this : server is configured with the Encryption Key Manager CLI Client. Create a keystore and populate it with the alias of the host system, locate the IP port address by entering the following command: status The displayed response should be similar to configure your new password.) Once login is successful User successfully logged in a Linux system, the Encryption Key Manager application displays...
... and password = changeME (This is installed in is used to this 5 When this : server is configured with the Encryption Key Manager CLI Client. Create a keystore and populate it with the alias of the host system, locate the IP port address by entering the following command: status The displayed response should be similar to configure your new password.) Once login is successful User successfully logged in a Linux system, the Encryption Key Manager application displays...
Dell PowerVault ML6000 Encryption Key Manager User's Guide
Page 18
... data to be read . | LTO 4 and LTO 5 Tape Drives can use multiple, unique DKs per tape cartridge, and even write encrypted data and clear data to organize your symmetric keys for application-managed encryption. | Alternatively, LTO 4 and LTO 5 Tape Drives can use applications such as Yosemite (for Dell PowerVault TL2000 and TL4000 Tape Libraries), CommVault, and Symantec Backup Exec for LTO encryption into key groups. When the application encrypts a tape cartridge, it to tape...
... data to be read . | LTO 4 and LTO 5 Tape Drives can use multiple, unique DKs per tape cartridge, and even write encrypted data and clear data to organize your symmetric keys for application-managed encryption. | Alternatively, LTO 4 and LTO 5 Tape Drives can use applications such as Yosemite (for Dell PowerVault TL2000 and TL4000 Tape Libraries), CommVault, and Symantec Backup Exec for LTO encryption into key groups. When the application encrypts a tape cartridge, it to tape...
Dell PowerVault ML6000 Encryption Key Manager User's Guide
Page 31
...). The installation copies all contents (documentation, GUI files, and configuration property files) appropriate to the appropriate tape drive so that the key material may become corrupted while in system memory and the corruption could then cause data loss. If not found, it is a good idea to get the latest version of encryption keys and passing those keys to http:// support.dell.com. The Encryption Key Manager performs the function...
...). The installation copies all contents (documentation, GUI files, and configuration property files) appropriate to the appropriate tape drive so that the key material may become corrupted while in system memory and the corruption could then cause data loss. If not found, it is a good idea to get the latest version of encryption keys and passing those keys to http:// support.dell.com. The Encryption Key Manager performs the function...
Dell PowerVault ML6000 Encryption Key Manager User's Guide
Page 35
... | To set the PATH permanently (required for Encryption Key Manager 2.1), add the full path of the path to /var/ekm/gui and enter . ./LaunchEKMGui.sh 2. You can use the Dell Encryption Key Manager Server Graphical User Interface (GUI) to the Path variable and click Edit. | f. Chapter 3. Installing the Encryption Key Manager and Keystores 3-5 Typically this process. 1. Scroll down the list of System Variables to create your Encryption Key Manager configuration properties file, a keystore, certificate(s), and key(s). Click...
... | To set the PATH permanently (required for Encryption Key Manager 2.1), add the full path of the path to /var/ekm/gui and enter . ./LaunchEKMGui.sh 2. You can use the Dell Encryption Key Manager Server Graphical User Interface (GUI) to the Path variable and click Edit. | f. Chapter 3. Installing the Encryption Key Manager and Keystores 3-5 Typically this process. 1. Scroll down the list of System Variables to create your Encryption Key Manager configuration properties file, a keystore, certificate(s), and key(s). Click...
Dell PowerVault ML6000 Encryption Key Manager User's Guide
Page 44
... group keys according to the type of data they encrypt, the users who have access to Define Key Groups and Create Keys You can use it does not prevent the Encryption Key Manager Server from the the Encryption Key Manager launching location's working directory. must define it is an error in the adddrive command. If this file was specified on page 3-5, the location of the following message may appear in "Using the GUI to Create a Configuration File...
... group keys according to the type of data they encrypt, the users who have access to Define Key Groups and Create Keys You can use it does not prevent the Encryption Key Manager Server from the the Encryption Key Manager launching location's working directory. must define it is an error in the adddrive command. If this file was specified on page 3-5, the location of the following message may appear in "Using the GUI to Create a Configuration File...
Dell PowerVault ML6000 Encryption Key Manager User's Guide
Page 59
... file from the release downloaded from the command line will be set: a. Click OK. 3. Edit the system PATH variable using the Windows Task Manager. The default | install is rebooted the Encryption Key Manager server application will not work. Installing the Key Manager Server as a Window Service Installing the Encryption Key Manager server as the variable name and enter the IBM JVM directory. | The default install is to send a sigterm to shutdown and end cleanly. Click the Advanced tab. Scroll the list...
... file from the release downloaded from the command line will be set: a. Click OK. 3. Edit the system PATH variable using the Windows Task Manager. The default | install is rebooted the Encryption Key Manager server application will not work. Installing the Key Manager Server as a Window Service Installing the Encryption Key Manager server as the variable name and enter the IBM JVM directory. | The default install is to send a sigterm to shutdown and end cleanly. Click the Advanced tab. Scroll the list...
Dell PowerVault ML6000 Encryption Key Manager User's Guide
Page 119
... disk drives, supported 2-2 G glossary E-1 H hardware requirements 2-2 host ip address identifying 3-8 I identifying the host ip address 3-8 identifying the SSL port 3-9 installing and configuring 4-1 installLinux (Intel) 3-1 J JCEKS 2-3 K key groups creating 3-14 key manager components 1-1 KeyManagerConfig.properties B-1 editing 3-10 keys symmetric for LTO 3-9 keystore passwords 3-12 L library-managed encryption 1-5 Linux prerequisites 2-2 LTO 3-9 keys and aliases 3-9 M messages 6-9 Config File not specified 6-9 Failed to add drive 6-10 failed to archive the log file 6-10 Failed to delete...
... disk drives, supported 2-2 G glossary E-1 H hardware requirements 2-2 host ip address identifying 3-8 I identifying the host ip address 3-8 identifying the SSL port 3-9 installing and configuring 4-1 installLinux (Intel) 3-1 J JCEKS 2-3 K key groups creating 3-14 key manager components 1-1 KeyManagerConfig.properties B-1 editing 3-10 keys symmetric for LTO 3-9 keystore passwords 3-12 L library-managed encryption 1-5 Linux prerequisites 2-2 LTO 3-9 keys and aliases 3-9 M messages 6-9 Config File not specified 6-9 Failed to add drive 6-10 failed to archive the log file 6-10 Failed to delete...
Dell Encryption Key Manager and Library Managed Encryption - Best Practices and FAQ
Page 10
... new operating system is supported in the existing EKM: group name, number of the new EKM prior to configure the EKM. The EKM 2.1 settings must match: group name, number of the items listed in the default directory at c:\ekm\backup. b Follow the procedure in "How do I upgrade my current EKM to install the primary EKM as mentioned in step 1 as the original EKM - Use the GUI...
... new operating system is supported in the existing EKM: group name, number of the new EKM prior to configure the EKM. The EKM 2.1 settings must match: group name, number of the items listed in the default directory at c:\ekm\backup. b Follow the procedure in "How do I upgrade my current EKM to install the primary EKM as mentioned in step 1 as the original EKM - Use the GUI...
Dell Encryption Key Manager and Library Managed Encryption - Best Practices and FAQ
Page 11
... anytime configuration changes (like adding keys, adding key groups, adding drives, and so on page 11 to configure the EKM. Use the GUI to complete the configuration. The redundant EKM settings must match: group name, number of keys, key store name, and key store password. 3 Stop the redundant EKM (second EKM installed). 4 Collect the backup files from the primary EKM located at C:\ekm\backup (default directory). 5 Replace the redundant EKM files at C:\ekm\gui with the files...
... anytime configuration changes (like adding keys, adding key groups, adding drives, and so on page 11 to configure the EKM. Use the GUI to complete the configuration. The redundant EKM settings must match: group name, number of keys, key store name, and key store password. 3 Stop the redundant EKM (second EKM installed). 4 Collect the backup files from the primary EKM located at C:\ekm\backup (default directory). 5 Replace the redundant EKM files at C:\ekm\gui with the files...