Dell PowerVault TL2000 Important Information Manual

Download Important information manual of Dell PowerVault TL2000 Network Hardware, Software for Free or View it Online on All-Guides.com.

Brand: Dell

Category: Network Hardware , Software , Storage

Type: Important information manual

Model: Dell PowerVault TL2000 , Dell PowerVault TL4000

Pages: 10 (0.59 Mb)

Download Dell PowerVault TL2000 Important information manual

Dell PowerVault TL2000 Important information manual - Page 1
1
Dell PowerVault TL2000 Important information manual - Page 2
2
Dell PowerVault TL2000 Important information manual - Page 3
3
Dell PowerVault TL2000 Important information manual - Page 4
4
Dell PowerVault TL2000 Important information manual - Page 5
5
Dell PowerVault TL2000 Important information manual - Page 6
6
Dell PowerVault TL2000 Important information manual - Page 7
7
Dell PowerVault TL2000 Important information manual - Page 8
8
Dell PowerVault TL2000 Important information manual - Page 9
9
Dell PowerVault TL2000 Important information manual - Page 10
10
Important Information 7
User's Guide
and to the
Configure Library: Encryption
section (Chapter 4)
of the
Dell PowerVault TL2000/TL4000 User's Guide
available on the
Dell Support website at
support.dell.com
.
Dell PowerVault Encryption Key Manager User's Guide contains
information that the KeyManagerConfig.Properties and
K
eyManagerConfig_Client.properties files need to be modified on
certain occasions
To modify the EKM configuration files:
a
Stop the EKM server.
b
Open the
.properties
file that needs to be updated using the text
editor of your choice.
c
Make the necessary updates. Follow the instructions in the
Dell
PowerVault Encryption Key Manager User's Guide
available on the
Dell Support website at
support.dell.com
.
d
Save the document.
e
Re-start the EKM server.
Backup application services must be stopped and restarted after making
encryption configuration changes to the TL2000/TL4000 system
The TL4000/TL2000 system offers three different options for configuring
the LT04 devices — None, AME, or LME. When changing the encryption
configuration, the backup application services must be re-started for the
backup application to recognize the new encryption setting.
Secondary EKM server configuration steps
It is recommended to use a secondary EKM server (fully redundant) when
user enables LME. The secondary EKM server adds reliability to the
backup system. The documentation contains all the required information,
but is not all in a single section of the documentation.
Shadow_techbook.book Page 7 Thursday, May 29, 2008 3:39 PM