Dell PowerVault ML6000 SMI-S Reference Guide
Page 87
...), 7 (NETWARE), 9(AIX), 14 (LINUX), 15 (Windows), 16 (AS400) String type shown in GUI String type shown in GUI for the instance Whether the identity has been authenticated (optional) The hardware ID Type of client (optional) The hardware ID String for the types that have other ) client types Dell PowerVault ML6000 SMI-S Reference Guide 83...
...), 7 (NETWARE), 9(AIX), 14 (LINUX), 15 (Windows), 16 (AS400) String type shown in GUI String type shown in GUI for the instance Whether the identity has been authenticated (optional) The hardware ID Type of client (optional) The hardware ID String for the types that have other ) client types Dell PowerVault ML6000 SMI-S Reference Guide 83...
Dell PowerVault ML6000 Encryption Key Manager Quick Start Guide
Page 1
...is complete, the Graphical User Interface (GUI) is automatically installed. Visit http://support.dell.com to download the latest library and drive firmware prior to installing and configuring the Dell PowerVault Encryption Key Manager to continue. You must be recovered (decrypted). The Encryption Key Manager.... However, if the machine hosting the Encryption Key Manager is designed to your product. The Encryption Key Manager operates on Linux® and Windows®, and is not using commands. Note: IMPORTANT Encryption Key Manager HOST SERVER CONFIGURATION INFORMATION: It ...
...is complete, the Graphical User Interface (GUI) is automatically installed. Visit http://support.dell.com to download the latest library and drive firmware prior to installing and configuring the Dell PowerVault Encryption Key Manager to continue. You must be recovered (decrypted). The Encryption Key Manager.... However, if the machine hosting the Encryption Key Manager is designed to your product. The Encryption Key Manager operates on Linux® and Windows®, and is not using commands. Note: IMPORTANT Encryption Key Manager HOST SERVER CONFIGURATION INFORMATION: It ...
Dell PowerVault ML6000 Encryption Key Manager Quick Start Guide
Page 2
... the Encryption Key Manager server is not started . 1. On the EKM Server Configuration page (Figure 1) enter the data in that they are stored in the Dell Encryption Key Manager User's Guide. 2 a14m0247 EKM Server Configuration Page Notes: a. Method 1: Set up Encryption Key Manager Using the GUI This procedure creates a ... set the keystore password, do not change it unless it as follows: On Windows Navigate to c:\ekm\gui and click LaunchEKMGui.bat On Linux platforms Navigate to /var/ekm/gui and enter . ./LaunchEKMGui.sh Note: Specify . ./ (period space period forward slash) before the...
... the Encryption Key Manager server is not started . 1. On the EKM Server Configuration page (Figure 1) enter the data in that they are stored in the Dell Encryption Key Manager User's Guide. 2 a14m0247 EKM Server Configuration Page Notes: a. Method 1: Set up Encryption Key Manager Using the GUI This procedure creates a ... set the keystore password, do not change it unless it as follows: On Windows Navigate to c:\ekm\gui and click LaunchEKMGui.bat On Linux platforms Navigate to /var/ekm/gui and enter . ./LaunchEKMGui.sh Note: Specify . ./ (period space period forward slash) before the...
Dell PowerVault ML6000 Encryption Key Manager Quick Start Guide
Page 5
...Client. v On Windows, navigate to cd c:\ekm and click startServer.bat v On Linux platforms, navigate to /var/ekm and enter startClient.sh v See "Starting the Command Line Interface Client" in the Dell Encryption Key Manager User's Guide for more information. v If the Encryption Key Manager...v On Windows, navigate to cd c:\ekm and click startClient.bat v On Linux platforms, navigate to /var/ekm and enter startServer.sh v See "Starting, Refreshing, and Stopping the Key Manager Server" in the Dell Encryption Key Manager User's Guide for 5 years. If Encryption Key Manager encryption ...
...Client. v On Windows, navigate to cd c:\ekm and click startServer.bat v On Linux platforms, navigate to /var/ekm and enter startClient.sh v See "Starting the Command Line Interface Client" in the Dell Encryption Key Manager User's Guide for more information. v If the Encryption Key Manager...v On Windows, navigate to cd c:\ekm and click startClient.bat v On Linux platforms, navigate to /var/ekm and enter startServer.sh v See "Starting, Refreshing, and Stopping the Key Manager Server" in the Dell Encryption Key Manager User's Guide for 5 years. If Encryption Key Manager encryption ...
Dell PowerVault ML6000 Encryption Key Manager Quick Start Guide
Page 6
...]: TX What is the name of symmetric keys to access the keystore. Note: Once you for this unit? [Unknown]: US Is CN=ekmcert, OU=EKM, O=Dell, L=Austin, ST=TX, C=US correct?(type "yes" or "no longer work. Step 3. Remove the old expired certificate and create a new one as that the ... the Encryption Key Manager server without the GUI, launch the startServer script: On Windows Navigate to cd c:\ekm\ekmserver and click startServer.bat On Linux platforms Navigate to /var/ekm/ekmserver and enter . ./startServer.sh Note: Specify . ./ (period space period forward slash) before the...
...]: TX What is the name of symmetric keys to access the keystore. Note: Once you for this unit? [Unknown]: US Is CN=ekmcert, OU=EKM, O=Dell, L=Austin, ST=TX, C=US correct?(type "yes" or "no longer work. Step 3. Remove the old expired certificate and create a new one as that the ... the Encryption Key Manager server without the GUI, launch the startServer script: On Windows Navigate to cd c:\ekm\ekmserver and click startServer.bat On Linux platforms Navigate to /var/ekm/ekmserver and enter . ./startServer.sh Note: Specify . ./ (period space period forward slash) before the...
Dell PowerVault ML6000 Encryption Key Manager Quick Start Guide
Page 7
... a copy of the Encryption Key Manager and all Java-based trademarks are trademarks of Dell Inc. in the US and other countries, or both . Linux is a trademark of Linus Torvalds in this text: Dell, the DELL logo and PowerVault are trademarks of Dell Inc. CAUTION: It is highly recommended that the shell will shut down the...
... a copy of the Encryption Key Manager and all Java-based trademarks are trademarks of Dell Inc. in the US and other countries, or both . Linux is a trademark of Linus Torvalds in this text: Dell, the DELL logo and PowerVault are trademarks of Dell Inc. CAUTION: It is highly recommended that the shell will shut down the...
Dell PowerVault ML6000 Encryption Key Manager User's Guide
Page 3
...Creating and Managing Key Groups . . . . . 3-14 Preface ix About this Book ix Who Should Read this First xi Contacting Dell xi Chapter 1. Library-Managed Tape Encryption . . . . Configuring the Encryption Key Manager 4-1 Using the GUI to Configure the Encryption... Encryption Key Manager Setup Tasks . . . . 2-1 Planning for Library-Managed Tape Encryption 2-1 Hardware and Software Requirements . . . . . 2-2 Linux Solution Components 2-2 Windows Solution Components 2-3 Keystore Considerations 2-3 The JCEKS Keystore 2-3 | Encryption Keys and the LTO 4 and LTO 5 Tape Drives 2-4 ...
...Creating and Managing Key Groups . . . . . 3-14 Preface ix About this Book ix Who Should Read this First xi Contacting Dell xi Chapter 1. Library-Managed Tape Encryption . . . . Configuring the Encryption Key Manager 4-1 Using the GUI to Configure the Encryption... Encryption Key Manager Setup Tasks . . . . 2-1 Planning for Library-Managed Tape Encryption 2-1 Hardware and Software Requirements . . . . . 2-2 Linux Solution Components 2-2 Windows Solution Components 2-3 Keystore Considerations 2-3 The JCEKS Keystore 2-3 | Encryption Keys and the LTO 4 and LTO 5 Tape Drives 2-4 ...
Dell PowerVault ML6000 Encryption Key Manager User's Guide
Page 4
Sample Files A-1 Sample startup daemon script A-1 Linux Platforms A-1 Sample Configuration Files A-1 Appendix B. Using Metadata 8-1 Appendix A. Frequently Asked Questions C-1 Notices D-1 Trademarks D-1 Glossary E-1 Index X-1 iv Dell Encryption Key Mgr User's Guide Encryption Key Manager Configuration Properties Files . . . . B-9 Appendix C. Chapter 7. Audit Records 7-1 Audit Overview 7-1 Audit Configuration Parameters 7-1 Audit.event.types 7-1 Audit.event....
Sample Files A-1 Sample startup daemon script A-1 Linux Platforms A-1 Sample Configuration Files A-1 Appendix B. Using Metadata 8-1 Appendix A. Frequently Asked Questions C-1 Notices D-1 Trademarks D-1 Glossary E-1 Index X-1 iv Dell Encryption Key Mgr User's Guide Encryption Key Manager Configuration Properties Files . . . . B-9 Appendix C. Chapter 7. Audit Records 7-1 Audit Overview 7-1 Audit Configuration Parameters 7-1 Audit.event.types 7-1 Audit.event....
Dell PowerVault ML6000 Encryption Key Manager User's Guide
Page 7
Encryption Key Summary 1-7 2-1. Audit record types that are reported by audited event 7-7 8-1. Metadata Query Output Format . . . . . 8-2 vii Errors that the Encryption Key Manager writes to audit files 7-5 7-2. Minimum Software Requirements for Windows 2-3 6-1. Audit record types by the encryption key manager 6-5 7-1. Minimum Software Requirements for Linux 2-2 2-2. Typographic Conventions used in this Book ix 1-1. Tables 1.
Encryption Key Summary 1-7 2-1. Audit record types that are reported by audited event 7-7 8-1. Metadata Query Output Format . . . . . 8-2 vii Errors that the Encryption Key Manager writes to audit files 7-5 7-2. Minimum Software Requirements for Windows 2-3 6-1. Audit record types by the encryption key manager 6-5 7-1. Minimum Software Requirements for Linux 2-2 2-2. Typographic Conventions used in this Book ix 1-1. Tables 1.
Dell PowerVault ML6000 Encryption Key Manager User's Guide
Page 10
...Dell™ PowerVault™ TL2000 Tape Library and TL4000 Tape Library SCSI Reference provides supported SCSI commands and protocol governing the behavior of SCSI interface. Linux Information Red Hat Information The following URL relates to Red Hat Linux® systems: v http://www.redhat.com SuSE Information The following URL relates to SuSE Linux... Support Visit http://support.dell.com for the following related publication: Dell Encryption Key Manager Quick Start Guide provides information for more information: v Getting Started with the Dell™ PowerVault™ TL2000 and TL4000...
...Dell™ PowerVault™ TL2000 Tape Library and TL4000 Tape Library SCSI Reference provides supported SCSI commands and protocol governing the behavior of SCSI interface. Linux Information Red Hat Information The following URL relates to Red Hat Linux® systems: v http://www.redhat.com SuSE Information The following URL relates to SuSE Linux... Support Visit http://support.dell.com for the following related publication: Dell Encryption Key Manager Quick Start Guide provides information for more information: v Getting Started with the Dell™ PowerVault™ TL2000 and TL4000...
Dell PowerVault ML6000 Encryption Key Manager User's Guide
Page 14
... your keystore data. The tape drive table is a non-editable, binary file whose location is described. The Encryption Key Manager operates on Linux (SLES and RHEL) and Windows, and is used to encrypt information being read the topics below to , and decrypt information being written...change its location to keep track of the Encryption Key Manager to run in the background as a shared resource deployed in several 1-2 Dell Encryption Key Mgr User's Guide The Encryption Key Manager's four main components Drive Table Tracks which tape devices Encryption Key Manager supports Managing...
... your keystore data. The tape drive table is a non-editable, binary file whose location is described. The Encryption Key Manager operates on Linux (SLES and RHEL) and Windows, and is used to encrypt information being read the topics below to , and decrypt information being written...change its location to keep track of the Encryption Key Manager to run in the background as a shared resource deployed in several 1-2 Dell Encryption Key Mgr User's Guide The Encryption Key Manager's four main components Drive Table Tracks which tape devices Encryption Key Manager supports Managing...
Dell PowerVault ML6000 Encryption Key Manager User's Guide
Page 22
... 32-bit Intel® compatible Tape Libraries | For the Dell PowerVault TL2000 Tape Library, TL4000 Tape Library, and ML6000 | Tape Library, assure that the firmware level is 77B5. | 2. Dell™ PowerVault™ TL4000 Tape Library minimum required firmware version = 5.xx. - v Add Encryption Key Manager Server IP addresses 3. Linux Solution Components Operating Systems v RHEL 4 v RHEL 5 v SLES 9 v SLES...
... 32-bit Intel® compatible Tape Libraries | For the Dell PowerVault TL2000 Tape Library, TL4000 Tape Library, and ML6000 | Tape Library, assure that the firmware level is 77B5. | 2. Dell™ PowerVault™ TL4000 Tape Library minimum required firmware version = 5.xx. - v Add Encryption Key Manager Server IP addresses 3. Linux Solution Components Operating Systems v RHEL 4 v RHEL 5 v SLES 9 v SLES...
Dell PowerVault ML6000 Encryption Key Manager User's Guide
Page 26
...1. Backing up your backup data in the displayed dialog (Figure 2-3). Backup Critical Files Window 4. Figure 2-3. An information message displays the results. 2-6 Dell Encryption Key Mgr User's Guide a14m0241 The Encryption Key Manager does not modify keystore data. Click Backup Files. 5. v Maintain a primary and secondary ...added redundancy. Open the GUI if it is not yet started: On Windows Navigate to c:\ekm\gui and click LaunchEKMGui.bat On Linux platforms Navigate to decrypt it . The only changes to the keystore are those that you apply, so be sure to copy the...
...1. Backing up your backup data in the displayed dialog (Figure 2-3). Backup Critical Files Window 4. Figure 2-3. An information message displays the results. 2-6 Dell Encryption Key Mgr User's Guide a14m0241 The Encryption Key Manager does not modify keystore data. Click Backup Files. 5. v Maintain a primary and secondary ...added redundancy. Open the GUI if it is not yet started: On Windows Navigate to c:\ekm\gui and click LaunchEKMGui.bat On Linux platforms Navigate to decrypt it . The only changes to the keystore are those that you apply, so be sure to copy the...
Dell PowerVault ML6000 Encryption Key Manager User's Guide
Page 31
... Encryption Key Manager performs the function of requesting the generation of the Dell ISO image, go to your operating system: v "Installing the Encryption Key Manager on Linux" v "Installing the Encryption Key Manager on Windows" on Linux From the CD 1. There are uncertain whether you have the latest ... memory, and that key material is shipped with the IBM Java Virtual Machine installation, and requires the IBM Software Developer Kit for Linux, and the IBM Runtime Environment for more information. When installation is complete, the Graphical User Interface (GUI) is checked for your...
... Encryption Key Manager performs the function of requesting the generation of the Dell ISO image, go to your operating system: v "Installing the Encryption Key Manager on Linux" v "Installing the Encryption Key Manager on Windows" on Linux From the CD 1. There are uncertain whether you have the latest ... memory, and that key material is shipped with the IBM Java Virtual Machine installation, and requires the IBM Software Developer Kit for Linux, and the IBM Runtime Environment for more information. When installation is complete, the Graphical User Interface (GUI) is checked for your...
Dell PowerVault ML6000 Encryption Key Manager User's Guide
Page 32
...if you are not installing from the CD to your host for the /etc/profile.local entries to launch the Encryption Key Manager. 3-2 Dell Encryption Key Mgr User's Guide Add these results: | mordor:~ # java -version | java version "1.6.0" | Java(TM) SE Runtime Environment... (build pmz60sr5-20090529(SR5)) | IBM J9 VM (build 2.4, J2RE 1.6.0 IBM J9 2.4 Linux x86-32 jvmxi3260-20090519_35743 (JIT enabled) | ... | mordor:~ # which java | /opt/ibm/java-i386-60/jre/bin/java Installing the Encryption Key Manager on...
...if you are not installing from the CD to your host for the /etc/profile.local entries to launch the Encryption Key Manager. 3-2 Dell Encryption Key Mgr User's Guide Add these results: | mordor:~ # java -version | java version "1.6.0" | Java(TM) SE Runtime Environment... (build pmz60sr5-20090529(SR5)) | IBM J9 VM (build 2.4, J2RE 1.6.0 IBM J9 2.4 Linux x86-32 jvmxi3260-20090519_35743 (JIT enabled) | ... | mordor:~ # which java | /opt/ibm/java-i386-60/jre/bin/java Installing the Encryption Key Manager on...
Dell PowerVault ML6000 Encryption Key Manager User's Guide
Page 35
...list. | g. A simple CLI configuration properties file is not yet started: On Windows Navigate to c:\ekm\gui and click LaunchEKMGui.bat On Linux platforms Navigate to | C:\Program Files\IBM\Java60\jre\bin | To set the PATH permanently (required for Encryption Key Manager 2.1), add the ... and key(s). Scroll down the list of the java bin directory to the Path variable and click Edit. | f. You can use the Dell Encryption Key Manager Server Graphical User Interface (GUI) to Create a Configuration File, Keystore, and Certificates Before launching the Encryption Key Manager, you...
...list. | g. A simple CLI configuration properties file is not yet started: On Windows Navigate to c:\ekm\gui and click LaunchEKMGui.bat On Linux platforms Navigate to | C:\Program Files\IBM\Java60\jre\bin | To set the PATH permanently (required for Encryption Key Manager 2.1), add the ... and key(s). Scroll down the list of the java bin directory to the Path variable and click Edit. | f. You can use the Dell Encryption Key Manager Server Graphical User Interface (GUI) to Create a Configuration File, Keystore, and Certificates Before launching the Encryption Key Manager, you...
Dell PowerVault ML6000 Encryption Key Manager User's Guide
Page 38
...up on page 3-14. The files listed as Files to be able to verify that the Encryption Key Manager server is launched in a Linux system, the Encryption Key Manager application displays the localhost address and not the actual active IP port. 1. v If the Encryption Key Manager...: v If the host is installed in the background. The Encryption Key Manager generates a set of their name "2007_11_26_14_58_46_FileName. v For Linux enter isconfig. 3-8 Dell Encryption Key Mgr User's Guide To retrieve the actual IP address of backup files every time you click OK when changing the Encryption Key...
...up on page 3-14. The files listed as Files to be able to verify that the Encryption Key Manager server is launched in a Linux system, the Encryption Key Manager application displays the localhost address and not the actual active IP port. 1. v If the Encryption Key Manager...: v If the host is installed in the background. The Encryption Key Manager generates a set of their name "2007_11_26_14_58_46_FileName. v For Linux enter isconfig. 3-8 Dell Encryption Key Mgr User's Guide To retrieve the actual IP address of backup files every time you click OK when changing the Encryption Key...
Dell PowerVault ML6000 Encryption Key Manager User's Guide
Page 39
.... Enter the following command: exit Close the command window. | Generating Keys and Aliases for Encryption on LTO 4 and LTO 5 The Dell Encryption Key Manager Server GUI is the port used to /var/ekm and enter startServer.sh v See "Starting, Refreshing, and Stopping the... File, Keystore, and Certificates" on page 5-1 for details. v On Windows, navigate to cd c:\ekm and click startServer.bat v On Linux platforms, navigate to configure your library-managed encryption settings. 5. Login to generate symmetric encryption keys. Keytool is running. It enables you previously changed...
.... Enter the following command: exit Close the command window. | Generating Keys and Aliases for Encryption on LTO 4 and LTO 5 The Dell Encryption Key Manager Server GUI is the port used to /var/ekm and enter startServer.sh v See "Starting, Refreshing, and Stopping the... File, Keystore, and Certificates" on page 5-1 for details. v On Windows, navigate to cd c:\ekm and click startServer.bat v On Linux platforms, navigate to configure your library-managed encryption settings. 5. Login to generate symmetric encryption keys. Keytool is running. It enables you previously changed...
Dell PowerVault ML6000 Encryption Key Manager User's Guide
Page 40
... To make changes to the server configuration, or the ClientKeyManagerConfig.properties file for the import and export of data keys to edit the file for a Linux machine because of ^M. If you use Windows to and from other keystores. To generate individual keys compatible with gvim/vim. 3. However, in a multiple Encryption Key... Key Manager server. 2. Do not use Windows, edit the file with the Encryption Key Manager, be sure to cd c:\ekm and click updatePath.bat 3-10 Dell Encryption Key Mgr User's Guide
... To make changes to the server configuration, or the ClientKeyManagerConfig.properties file for the import and export of data keys to edit the file for a Linux machine because of ^M. If you use Windows to and from other keystores. To generate individual keys compatible with gvim/vim. 3. However, in a multiple Encryption Key... Key Manager server. 2. Do not use Windows, edit the file with the Encryption Key Manager, be sure to cd c:\ekm and click updatePath.bat 3-10 Dell Encryption Key Mgr User's Guide
Dell PowerVault ML6000 Encryption Key Manager User's Guide
Page 41
... keys are: abc000000000000000001 abc00a0120fa000000001 Examples of 16-character (hexadecimal) strings with up to generate one or more secret keys and store them in length. On Linux platforms Navigate to /var/ekm and enter . ./updatePath.sh | The Keytool utility generates aliases and symmetric keys for it unless its security has been breached...
... keys are: abc000000000000000001 abc00a0120fa000000001 Examples of 16-character (hexadecimal) strings with up to generate one or more secret keys and store them in length. On Linux platforms Navigate to /var/ekm and enter . ./updatePath.sh | The Keytool utility generates aliases and symmetric keys for it unless its security has been breached...