HP XP P9000 DKA Encryption User GuideAbstractThis guide describes and provides instructions for using the HP XP P9000 DKA Encryption License Key softw
2 DKA Encryption InstallationThis chapter discusses how to install the EDKA feature.DKA Encryption installation workflowUse the following workflow to
Assigning users to user groupsAssign administrator privileges to users in RWC by adding the users to a user group.A user’s membership to a user group
3 Key Management Server ConnectionsYou can use an optional key management server with P9500 storage systems. This chapter providesinformation on how t
Preparing the client certificate workflowUse the following process to prepare the client certificate, which includes setting the client certificateexp
4. Complete the following information:• Country Name (two-letter code)• Email Address• (Optional) Challenge password• (Optional) Common name - To obta
For more information about the appropriate connection settings, contact the key managementserver administrator. For more information about the network
4. In the Setup Key Management Server window, complete the following:• Specify the options to connect to the key management server.• If the key manage
4 Managing data encryption license keysThis chapter provides information on how to manage data encryption license keys. Managing thekeys includes ensu
You must have the Security Administrator (View & Modify) role to back up secondary data encryptionlicense keys.Use the following process to back u
3. In the Encryption Keys table, select the key ID for the data encryption license key you want toback up to a key management server and then complete
© Copyright 2010, 2013 Hewlett-Packard Development Company, L.P.Confidential computer software. Valid license from HP required for possession, use or
4. In the Edit Encryption window of the Edit Encryption wizard, complete the following and thenclick Add:• For Available Groups, select the parity gro
2. On the LDEVs tab, complete one of the following and then click Block LDEVs:• For Parity Group, select the parity group to which the LDEV is associa
Unblocking LDEVs at the parity-group levelUnblock LDEVs at the parity-group level to protect the data after you format an LDEV at theparity-group leve
1. Block the LDEVs associated to the encrypted parity group. Do one of the following:• Block the LDEV using a file on the RWC computer.For more inform
6. In the Restore Keys from File window, complete the following item and then click Finish:• For File Name, shows the name of the selected file.View-o
1. Create a new parity group.For more information about creating parity groups, see _________.2. Enable encryption with the new data encryption licens
5. In the Confirm window, complete the following and then click Apply:• Confirm the settings.• For Task Name, type a task name.• (Optional) Select Go
5 TroubleshootingCommon problems using EDKA include connection problems, license problems, and administratorpermission problems. Managing or changing
The following table lists common problems and solutions for encryption features.ActionProblemMake sure that:Cannot use the EDKA feature to back up or
6 Support and other resourcesContacting HPFor worldwide technical support information, see the HP support website:http://www.hp.com/supportBefore cont
Contents1 DKA Encryption Overview...6DKA Encryption benefits...
• http://www.hp.com/support/manuals• http://www.hp.com/support/downloads• http://www.hp.com/storage/whitepapersConventions for storage capacity values
WARNING! Indicates that failure to follow directions could result in bodily harm or death.CAUTION: Indicates that failure to follow directions could r
A ConventionsThis appendix describes phrases in this manual that correspond to phrases in the Remote WebConsole windows and messages.Business Copy, Bu
B DKA Encryption GUI ReferenceThis chapter includes descriptions of encryption-related RWC windows and dialog boxes for theEDKA feature.For more infor
Encryption Keys tabUse the Encryption Keys tab to view a list of the data encryption license key details and to selectan unused data encryption licens
Key Management Server Properties tableThe following table lists descriptions of the items in the Key Management Server Properties table.DescriptionIte
Setup Key Management Server windowThe following figure shows the Setup Key Management Server window.The following table lists descriptions of the item
DescriptionItemFor more information about the root certificate file, contact the serveradministrator or the network administrator.Click Check to start
DescriptionItemShows the password for the client certificate as ****** (six asterisks).PasswordShows the root certificate file for connecting to the k
Selected Keys table on Confirm windowThe following table lists descriptions of the items in the Selected Keys table on the Confirm window.DescriptionI
Restoring keys from a key management server...24Viewing backup data encryption li
The following table lists descriptions of the items on the Edit Password Policy window.DescriptionItemThe minimum number of numeric characters that sh
The following table lists descriptions of the items on the Confirm window.DescriptionItemDisplays the minimum number of numeric characters that should
The following table lists descriptions of the items on the Backup Keys to File window.DescriptionItemThe password for the backup data encryption licen
Backup Keys to Server wizardUse the Backup Keys to Server wizard to backup data encryption license keys on the keymanagement server.This wizard includ
Confirm windowThe following figure shows the Confirm window.The following table lists descriptions for the item in the Backup Keys table.DescriptionIt
The following table lists descriptions of the items on the Restore Keys from File window.DescriptionItemThe file name of the selected backup file.File
The following table lists descriptions of the items on the Confirm window.DescriptionItemThe item of the data encryption license key to restore.ItemTh
The following table lists descriptions of the items in the Selected Backup Keys table in the Confirmwindow.DescriptionItemShows the UUID of the data e
The following table lists descriptions of the items in the Selected Keys table in the Delete Keyswindow.DescriptionItemThe IDs of data encryption lice
The following table lists the descriptions of the items in the Selected Backup Keys table.DescriptionItemShows the UUID of the data encryption license
Delete Backup Keys on Server window...48View Backup Keys on Server
Backup Keys tableThe Backup Keys table is shown on the View Backup Keys on Server window. This table lists thebackup data encryption license keys.The
Edit Encryption windowThe Edit Encryption window includes the following items:• Available Parity Groups tableFor more information about this table, se
The following table lists descriptions of the items in the Available Parity Groups table.DescriptionItemShows the parity group IDs.Parity Group IDShow
The following table lists descriptions for the items in the _________ table.DescriptionItemShows parity group IDs.Parity Group IDShows the RAID level
Selected Parity Groups tableUse the Selected Parity Groups table to view a list of the selected parity groups related to the dataencryption license ke
Glossarybit The basic unit of data in a binary numbering system (binary digit), represented by a 0 or a 1.Eight bits equals one byte.DKA Disk adapter.
IndexAAES-256, 6audit logging, 8, 27Bblocking volumes, 20, 23Ccontacting HP, 29conventionsdocument, 30storage capacity values, 30text symbols, 31Ddata
1 DKA Encryption OverviewTo guarantee the security of the data, use the DKA Encryption (EDKA) feature to store encrypteddata in an LDEV and encrypt th
You can use the EDKA feature to back up data encryption license keys. The P9500 storage systemautomatically creates a primary backup of the data encry
1. Data in the parity group is backed up.2. Data encryption at the parity-group level is disabled.3. The LDEVs in the parity group are formatted.4. Th
Interoperability with other software applicationsUse the following table to determine the interoperability of software applications with dataencryptio
Comentarios a estos manuales