Dell PowerVault ML6000 User's Manual

Download Operation & user’s manual of Dell PowerVault TL2000 Network Hardware, Software for Free or View it Online on All-Guides.com.

Dell PowerVault TL2000 Operation & user’s manual - Page 1
1
Dell PowerVault TL2000 Operation & user’s manual - Page 2
2
Dell PowerVault TL2000 Operation & user’s manual - Page 3
3
Dell PowerVault TL2000 Operation & user’s manual - Page 4
4
Dell PowerVault TL2000 Operation & user’s manual - Page 5
5
Dell PowerVault TL2000 Operation & user’s manual - Page 6
6
Dell PowerVault TL2000 Operation & user’s manual - Page 7
7
Dell PowerVault TL2000 Operation & user’s manual - Page 8
8
Dell PowerVault TL2000 Operation & user’s manual - Page 9
9
Dell PowerVault TL2000 Operation & user’s manual - Page 10
10
Dell PowerVault TL2000 Operation & user’s manual - Page 11
11
Dell PowerVault TL2000 Operation & user’s manual - Page 12
12
Dell PowerVault TL2000 Operation & user’s manual - Page 13
13
Dell PowerVault TL2000 Operation & user’s manual - Page 14
14
Dell PowerVault TL2000 Operation & user’s manual - Page 15
15
Dell PowerVault TL2000 Operation & user’s manual - Page 16
16
Dell PowerVault TL2000 Operation & user’s manual - Page 17
17
Dell PowerVault TL2000 Operation & user’s manual - Page 18
18
Dell PowerVault TL2000 Operation & user’s manual - Page 19
19
Dell PowerVault TL2000 Operation & user’s manual - Page 20
20
Dell PowerVault TL2000 Operation & user’s manual - Page 21
21
Dell PowerVault TL2000 Operation & user’s manual - Page 22
22
Dell PowerVault TL2000 Operation & user’s manual - Page 23
23
Dell PowerVault TL2000 Operation & user’s manual - Page 24
24
Dell PowerVault TL2000 Operation & user’s manual - Page 25
25
Dell PowerVault TL2000 Operation & user’s manual - Page 26
26
Dell PowerVault TL2000 Operation & user’s manual - Page 27
27
Dell PowerVault TL2000 Operation & user’s manual - Page 28
28
Dell PowerVault TL2000 Operation & user’s manual - Page 29
29
Dell PowerVault TL2000 Operation & user’s manual - Page 30
30
Dell PowerVault TL2000 Operation & user’s manual - Page 31
31
Dell PowerVault TL2000 Operation & user’s manual - Page 32
32
Dell PowerVault TL2000 Operation & user’s manual - Page 33
33
Dell PowerVault TL2000 Operation & user’s manual - Page 34
34
Dell PowerVault TL2000 Operation & user’s manual - Page 35
35
Dell PowerVault TL2000 Operation & user’s manual - Page 36
36
Dell PowerVault TL2000 Operation & user’s manual - Page 37
37
Dell PowerVault TL2000 Operation & user’s manual - Page 38
38
Dell PowerVault TL2000 Operation & user’s manual - Page 39
39
Dell PowerVault TL2000 Operation & user’s manual - Page 40
40
Dell PowerVault TL2000 Operation & user’s manual - Page 41
41
Dell PowerVault TL2000 Operation & user’s manual - Page 42
42
Dell PowerVault TL2000 Operation & user’s manual - Page 43
43
Dell PowerVault TL2000 Operation & user’s manual - Page 44
44
Dell PowerVault TL2000 Operation & user’s manual - Page 45
45
Dell PowerVault TL2000 Operation & user’s manual - Page 46
46
Dell PowerVault TL2000 Operation & user’s manual - Page 47
47
Dell PowerVault TL2000 Operation & user’s manual - Page 48
48
Dell PowerVault TL2000 Operation & user’s manual - Page 49
49
Dell PowerVault TL2000 Operation & user’s manual - Page 50
50
Dell PowerVault TL2000 Operation & user’s manual - Page 51
51
Dell PowerVault TL2000 Operation & user’s manual - Page 52
52
Dell PowerVault TL2000 Operation & user’s manual - Page 53
53
Dell PowerVault TL2000 Operation & user’s manual - Page 54
54
Dell PowerVault TL2000 Operation & user’s manual - Page 55
55
Dell PowerVault TL2000 Operation & user’s manual - Page 56
56
Dell PowerVault TL2000 Operation & user’s manual - Page 57
57
Dell PowerVault TL2000 Operation & user’s manual - Page 58
58
Dell PowerVault TL2000 Operation & user’s manual - Page 59
59
Dell PowerVault TL2000 Operation & user’s manual - Page 60
60
Dell PowerVault TL2000 Operation & user’s manual - Page 61
61
Dell PowerVault TL2000 Operation & user’s manual - Page 62
62
Dell PowerVault TL2000 Operation & user’s manual - Page 63
63
Dell PowerVault TL2000 Operation & user’s manual - Page 64
64
Dell PowerVault TL2000 Operation & user’s manual - Page 65
65
Dell PowerVault TL2000 Operation & user’s manual - Page 66
66
Dell PowerVault TL2000 Operation & user’s manual - Page 67
67
Dell PowerVault TL2000 Operation & user’s manual - Page 68
68
Dell PowerVault TL2000 Operation & user’s manual - Page 69
69
Dell PowerVault TL2000 Operation & user’s manual - Page 70
70
Dell PowerVault TL2000 Operation & user’s manual - Page 71
71
Dell PowerVault TL2000 Operation & user’s manual - Page 72
72
Dell PowerVault TL2000 Operation & user’s manual - Page 73
73
Dell PowerVault TL2000 Operation & user’s manual - Page 74
74
Dell PowerVault TL2000 Operation & user’s manual - Page 75
75
Dell PowerVault TL2000 Operation & user’s manual - Page 76
76
Dell PowerVault TL2000 Operation & user’s manual - Page 77
77
Dell PowerVault TL2000 Operation & user’s manual - Page 78
78
Dell PowerVault TL2000 Operation & user’s manual - Page 79
79
Dell PowerVault TL2000 Operation & user’s manual - Page 80
80
Dell PowerVault TL2000 Operation & user’s manual - Page 81
81
Dell PowerVault TL2000 Operation & user’s manual - Page 82
82
Dell PowerVault TL2000 Operation & user’s manual - Page 83
83
Dell PowerVault TL2000 Operation & user’s manual - Page 84
84
Dell PowerVault TL2000 Operation & user’s manual - Page 85
85
Dell PowerVault TL2000 Operation & user’s manual - Page 86
86
Dell PowerVault TL2000 Operation & user’s manual - Page 87
87
Dell PowerVault TL2000 Operation & user’s manual - Page 88
88
Dell PowerVault TL2000 Operation & user’s manual - Page 89
89
Dell PowerVault TL2000 Operation & user’s manual - Page 90
90
Dell PowerVault TL2000 Operation & user’s manual - Page 91
91
Dell PowerVault TL2000 Operation & user’s manual - Page 92
92
Dell PowerVault TL2000 Operation & user’s manual - Page 93
93
Dell PowerVault TL2000 Operation & user’s manual - Page 94
94
Dell PowerVault TL2000 Operation & user’s manual - Page 95
95
Dell PowerVault TL2000 Operation & user’s manual - Page 96
96
Dell PowerVault TL2000 Operation & user’s manual - Page 97
97
Dell PowerVault TL2000 Operation & user’s manual - Page 98
98
Dell PowerVault TL2000 Operation & user’s manual - Page 99
99
Dell PowerVault TL2000 Operation & user’s manual - Page 100
100
Dell PowerVault TL2000 Operation & user’s manual - Page 101
101
Dell PowerVault TL2000 Operation & user’s manual - Page 102
102
Dell PowerVault TL2000 Operation & user’s manual - Page 103
103
Dell PowerVault TL2000 Operation & user’s manual - Page 104
104
Dell PowerVault TL2000 Operation & user’s manual - Page 105
105
Dell PowerVault TL2000 Operation & user’s manual - Page 106
106
Dell PowerVault TL2000 Operation & user’s manual - Page 107
107
Dell PowerVault TL2000 Operation & user’s manual - Page 108
108
Dell PowerVault TL2000 Operation & user’s manual - Page 109
109
Dell PowerVault TL2000 Operation & user’s manual - Page 110
110
Dell PowerVault TL2000 Operation & user’s manual - Page 111
111
Dell PowerVault TL2000 Operation & user’s manual - Page 112
112
Dell PowerVault TL2000 Operation & user’s manual - Page 113
113
Dell PowerVault TL2000 Operation & user’s manual - Page 114
114
Dell PowerVault TL2000 Operation & user’s manual - Page 115
115
Dell PowerVault TL2000 Operation & user’s manual - Page 116
116
Dell PowerVault TL2000 Operation & user’s manual - Page 117
117
Dell PowerVault TL2000 Operation & user’s manual - Page 118
118
Dell PowerVault TL2000 Operation & user’s manual - Page 119
119
Dell PowerVault TL2000 Operation & user’s manual - Page 120
120
Dell PowerVault TL2000 Operation & user’s manual - Page 121
121
Dell PowerVault TL2000 Operation & user’s manual - Page 122
122
Application-managed tape encryption is supported in LTO 4 and LTO 5 Tape
Drives in:
v Dell
PowerVault
TL2000 Tape Library
v Dell
PowerVault
TL4000 Tape Library
v Dell
PowerVault
ML6000 Tape Library
See your tape backup software application documentation to learn how to manage
encryption policies and keys.
Library-Managed Tape Encryption
Use this method for LTO 4 and LTO 5 tape drives in the Dell
PowerVault
TL2000 Tape Library, Dell
PowerVault
TL4000 Tape Library, or Dell
PowerVault
ML6000 Tape Library. Key generation and management is performed
by the Encryption Key Manager, a Java application running on a library-attached
host. Policy control and keys pass through the library-to-drive interface, therefore
encryption is transparent to the applications.
About Encryption Keys
An encryption key is a random string of bits generated specifically to scramble and
unscramble data. Encryption keys are created using algorithms designed to ensure
that each key is unique and unpredictable. The longer the key constructed this
way, the harder it is to break the encryption code. Both the IBM and T10 methods
of encryption use 256-bit AES algorithm keys to encrypt data. 256-bit AES is the
encryption standard currently recognized and recommended by the U.S.
government, which allows three different key lengths. 256-bit keys are the longest
allowed by AES.
Two types of encryption algorithms are used by the Encryption Key Manager:
symmetric algorithms and asymmetric algorithms. Symmetric, or secret key
encryption, uses a single key for both encryption and decryption. Symmetric key
encryption is generally used for encrypting large amounts of data in an efficient
manner. 256-bit AES keys are symmetric keys. Asymmetric, or public/private
encryption, uses a pair of keys. Data encrypted using one key can only be
decrypted using the other key in the public/private key pair. When an asymmetric
key pair is generated, the public key is used to encrypt, and the private key is
used to decrypt.
The Encryption Key Manager uses both symmetric and asymmetric keys;
symmetric encryption for high-speed encryption of user or host data, and
asymmetric encryption (which is necessarily slower) for protecting the symmetric
key.
Encryption keys may be generated for the Encryption Key Manager by a utility
such as keytool. The responsibility for generating AES keys and the manner in
which they are transferred to the tape drive depends on the method of encryption
management. However, it may be helpful to understand the difference between
how the Encryption Key Manager uses encryption keys and how other applications
use them.
Encryption Key Processing by the Dell Encryption Key Manager
In library-managed tape encryption, unencrypted data is sent to the LTO 4 or LTO
5 Tape Drive and converted to ciphertext using a pre-generated symmetric Data
Key (DK) from a keystore available to the Encryption Key Manager, and is then
Chapter 1. Tape Encryption Overview 1-5
|
|
|
|