Dell™PowerVault™Encryption Key Manager
gkZ H;-
Dell™PowerVault™Encryption Key Manager
gkZ H;-
© 2007, 2010 Dell Inc. All rights reserved.
L %! in V B $8 B kv x L /fI v V @OY.
n0Q fD8Ng Dell Inc. G -i BN xB 9& B -BO T ]vK OY. L .-! g kH Dell, DELL Nm W PowerVaultB
Dell Inc.G s% TOY .
b 8 s% W s #& g kOB }N G B Li } NG & 0 ; p ^ O b 'X 8
gG s% W s#! ; .-!- gkI v V@O
Y . Dell Inc. B ZgG M L F Q s% G B s#! k X n0 Q R/G5 .v J@ OY .
qw
W2 .................v
% .................vii
-. .................ix
L %! kQ $8 ............ix
L % G 6 Z .............ix
L %! g kH T" W kn .......ix
V GgW ................x
| C -{ ...............x
Linux $8 ..............x
Microsoft Windows $8 .........x
B sN v x ..............x
U zPn_ R g W ...........xiii
Dell ,t3 ..............xiii
& 1 e W L A O#- 3d ........1-1
D wM . ...............1-2
O #- |. ..............1-3
@kANW % !-
s Lj/.!- | .OB O#- ......1-6
O#- 0 $8 .............1-6
& 2 e Encryption Key Manager /fh9 2-1
O #- 3$ [ w 3d ..........2-1
Encryption Key Manager 3$ [w ....2-1
s Lj/.!- | .OB W L A O#- h 9 2-2
Oe~n W R A.~n d8g W .......2-2
Linux Vg G DwM . .........2-3
Windows Vg G D
0 zeR mAgW ...........2-4
JCEKS 0 zeR ...........2-4
|
O #- 0 W LTO 4 W LTO 5 W LA es L
j ................2-4
0 zeR % L M iw .........2-6
iwk8N )/ 3G Key Manager v x ...2-8
Encryption Key Manager -v 8 : ....2-9
eV 98 g L. mAgW ........2-11
@ AgL. !- O#-H WLA& x / OB f l
mAgW...............2-11
FIPS(Federal Information Processing Standard)
m AgW ............2-12
140-2
| .OB WL A O#- ...1-5
w M . ........2-3
& 3 e Encryption Key Manager W 0 zeR
3! ................3-1
|
V E v| Key Manager ISO L L v YnNe . . 3-1
Linux! Encryption Key Manager 3! ....3-1
Windows! Encryption Key Manager 3! ...3-3
GUI& gkO ) 8: DO , 0 zeR W Nu-
[ : ................3-6
|
LTO 4 W LTO 5!- O#- ! kQ 0 W 0m
} : ................3-11
0 Wl [: W |. ..........3-16
& 4 e Encryption Key Manager 8: ...4-1
GUI& g
8: |+ ...............4-1
8: b; gW .............4-4
& 5 e Encryption Key Manager |. ...5-1
Key Manager -v C[ , uN m' W _v ...5-1
m I` NMd L : ,s L p. ........5-6
CLI mI ...............5-9
& 6 e . &! G0 ...........6-1
Y=G
-v.&! .N ............6-1
CLI ,sLp. W EKM -v # kE .&! p
v k ................6-2
Key Manager -v.&! pvk ......6-3
Encryption Key Manager!- 8mOB @y . . 6-6
^ Cv ...............6-10
k O ) Encryption Key Manager 8: 4-1
W LA es L j W Lm Z ? w % L . ....4-1
N 3G Key Manager -v g L!- %LM ?
b- ...............4-2
_d DO !- Encryption Key Manager
8 : DOL v$Gv J = .......6-10
esLj _! GP ..........6-10
N W DO! F+ L j G P .......6-10
8: h& GP ...........6-11
esLj
!.@b GP ............6-11
8:v$ GP ...........6-12
DOL': N(null) O v x = ......6-12
DO )b QhB =v O v x = .....6-12
?b-R %LM x = .........6-13
CY#v J:TB ..........6-13
Wq h& GP ........6-11
iii
8: DOG SSL w. x#! C Y#v J= 6-14
8: DOG TCP w. x#! C Y#v J= 6-14
8: DO! - SSL w. x#& v$X_ T 6-14
8: DO! - TCP w. x#& v$X_ T 6-15
-v C[ GP ...........6-15
?b- GP ............6-15
v$ H (g NW DOL P b |k S ....6-16
|. 0 zeR & Ne
0 zeR& NeR v x = .......6-17
|[ 0 zeR& NeR v x = .....6-17
vxG v JB 6! ..........6-18
& 7 e (g 9Ze ...........7-1
(g 3d...............7-1
(g 8: E 3/v ...........7-1
Audit.event.types ...........7-1
Audit.event.outcome ..........7-2
Audit.eventQueue.max .........7- 2
Audit.handler.file.directory ........7 -3
Audit.handler.file.size .........7 -3
Audit.handler.file.name .........7-4
Audit.handler.file.multithreads ......7- 4
Audit.handler.file.threadlifespan ......7-4
(g 9Ze |D ............7-5
R v x= .....6-16
Encryption Key Manager !-G (g v! . . 7-5
(g 9Z
(gH L%. .............7-8
& 8 e ^8% LM gk .........8 -1
NO A. yC DO ...........A -1
y C C[ pU :)3. .........A-1
Linux C'{ ............A-1
y C 8: DO.............A-1
NO B. Encryption Key Manager 8: n O $
8 DO ...............B -1
Encryption Key Manager -v 8 : nO $8 D
O .................B-1
CLI ,sLp. 8: nO $8 D O .....B-11
N O C. ZV /B z .
VGgW ...............D -1
s% ................D -1
kn ................E- 1
vN ................X -1
e S: ...........7 -6
(FAQ) .......C-1
iv Dell Encryption Key Manager gkZ H;-
W2
1-1. Encryption Key ManagerG W !v b;
D wM . ............1-3
1-2. O#- $% # x W 0 |.! V; v V
B N '! ............1-5
|
1-3. k* O#- 0& gkO ) O#- 1-8
|
2-1. LTO 4 GB LTO 5 WLA es Lj G O
#- 2b 6[ d; ........2-5
|
2-2. LTO 4 GB LTO 5 WLA es Lj G O
#- Pb 6 [ d; ........2-6
2-3. _d DO iw " .........2 -8
||
2-4. \O -
2-5. 8:; x /OB N 3 G -v .....2-10
||
2-6. 0:e!! W<:OB -N Y% 8 :G
|
||
N 3G -v...........2-10
3-1. ks '! 1C (Choose Destination
Location) " ...........3- 3
v 8: ..........2-9
3-2. b;*8N L JVM v| 3$ .....3-4
3-3. DO 9g C [ " .........3 -4
3-4. EKM -v 8 :(EKM Server
Configuration) dLv ........3 -7
3-5. EKM -v Nu - 8 :(EKM Server
Certificate Configuration) dLv ....3- 8
3-6. _d DO iw " .........3 -9
3-7. 0 Wl [: ...........3-18
3-8. b; 2 b 0 Wl /f .......3-19
3-9. esLj! Wl v$ ........3-20
3-10. esLj h& ..........3-21
5-1. -v sB ............5-2
5-2. NWN " ............5- 2
v
vi Dell Encryption Key Manager gkZ H;-
%
1. L %! g kH Nb T" .......ix
1-1. O#- 0 d ` ..........1-8
2-1. Linux!-G V RRA.~n d8g W 2-3
2-2. Windows!-G V RRA.~n d8g W 2-3
6-1. Encryption Key Manager!- 8mH @y 6-6
7-1. Encryption Key Manager!(g DO!
2 B (g 9Ze /| ........7-6
7-2. (gH L%.0 (g 9Ze /| 7-8
8-1. ^8%L M 68 bB |
D ......8-3
vii
viii Dell Encryption Key Manager gkZ H;-
-.
L %! kQ $8
L % G 6 Z
L %! g kH T" W kn
L H;-!B Dell ™Encryption Key ManagerG 3! W [?! J dQ $8 M v
C gWL w T Gn V @ OY. GQ Y =! |Q 3 d W | C A N C z! V @ OY.
v O#- !I LTO 4 W LTO 5 WLA es Lj
v O#- 0
v pvP N u-
L % : _dQ % LM G 8H Wiw; cgO B :d.v W 8 H |.ZMn5
/ f!- Encryption Key Manager -vG 3 ! W /v8 v & v x OB g k Z& k
s8N UOY. L %!-B 6 Z! :d.v e! W W.v)! kQ G& {N vD
; ._zY m!$UOY.
L %!-BY=Nb T"; gkUOY.
%1.L %! g kH Nb T"
T" gk}
=:< =:<N %CH \n* .Z B m In, DOL',
C !W L', f N L' W 1CH ^ : IGz0
L .Z WkN gkX_ O B C:[ dR& * 8
@OY.
m$ [C 9&, g kZ! v$ Q X:. W C:[ !- %CO
B $8 B m$ [
boS< boS<
_ OB /v*; *8 @ OY .
[Wq ] 1C{ Wq ; * 8@OY .
{Wq } |D W 8 . 3m! - Wq; 1C X_ OB qO
; -@OY.
| <N 7kB 1CgW qO! - Wq; 8P UOY .
<0 > )# B 0
N %CH \n* .Z B gkZ! & x X
& *8 @OY.
CN %C UOY.
ix
VGgW
|C -{
VGgW : ANW %, e!, C:[ GB % LM! UsI !I: L V=; *8 @OY.
VGgW!B@&% b#! T2 %CI v Vv8 Ws %CGvB J @OY. Y=:
VGgW! k Q yC TOY.
fm: esLv& gkO ) L}w& v`OB fl WL A! U
sI v V@OY.
Z<Q $8BY= -{; |6OJC@.
™
v Dell
$8& &xUOY.
v Dell
Reference!-B SCSI NMd L: ? [; &nO B v xGB SCSI mI W A Nd
]; &xUOY.
PowerVault™TL2000
™
PowerVault™TL2000 Tape Library and TL4000 Tape Library SCSI
W
TL4000
WLA s Lj/. C [Ob
!-B 3!
Linux $8
Red Hat $8
Y=: Red Hat Linux ®C:[z|CH URLTOY .
v http://www.redhat.com
SuSE $8
Y=: SuSE Linux C:[z|CH URLTOY .
v http://www.suse.com
Microsoft Windows $8
Y=: Microsoft ®Windows®C:[! kQ $8 ! W< :R v VB URL TOY.
v http://www.microsoft.com
BsN v x
Y= |C - {; 8Ai http://support.dell.com ; f.OJC@.
Dell Encryption Key Manager
$ 8& & xUOY.
|% C[ H;-
!-B b; 8 :3$! kQ
Y= |C - {; 8Ai http://www.dell.com ; f.OJC@.
x
Dell Encryption Key Manager gkZ H;-
Library Managed Encryption for Tape i-!-B LTO WLA O#-! k Q
p | gJ & &xUOY.
-. xi
xii Dell Encryption Key Manager gkZ H;-
UzPn_ R g W
Dell ,t3
L9! EVOB m4: 800-WWW-DELL(800-999-3355)N |-OJC @.
V: NM] ,a L 0:- Gn Vv J : fl! B 8E [ e, w e m<- , ;8- G
B Dell &0 +;NW!- cgZ $8& # ; v V@ OY.
Dell: )/ !v Bs N, |- b] vx W -q: I G ; &xUOY .
: 9! W &0! {s Y#g, Q 9!-B ON -q:& gkOv xR v5 V@O
Y. 5w , bz vx G B m4 -q: .&N Dell!,tOAi Y=; v `OJC@.
1. http://supportapj.dell.com/support/index.aspx; f.OJC@ .
2. dLv G F!! VB Choose A Country/Region eS Yn ^ :!- X g 9
G B v*; .N OJC @ .
!
3. dLv G ^J !- Contact Us& ,/OJC @ .
4. Jd! {s {} Q -q: GB vx 5)& 1C OJC@ .
5. gkZ !T m.Q Dell ,t f}; 1COJC @.
L/Q IG
xiii
xiv Dell Encryption Key Manager gkZ H;-
& 1 e W LA O#- 3d
% LMB f o B V B qn O : /f!- E l _ d Q !!& v OB Z x _ O* T O
Y. 8HG _d: L N"G B vG!- L/ Q %LM& 8# Om L! kQ W<:&
& nOg %LM b3 & .N O B ?C! !k :;/v8vOB b I L !e l
m V@OY. % LM O#-B L/Q 9 : d8 ! kX d ; Y v VB 58 TOY.
Dell Encryption Key Manager(LDNB Encryption Key ManagerN v*T ))B O
#- [w ; \x -UOY.
1CG
|
|
LTO 4 W LTO 5 esLjB LTO 4 W LTO 5 %LM +..v! %LM& 2B
f l Xg %LM& O#- R v V@OY. L u
-N NQ :I zO W 3. @ v le G _} W |k b8 ! kQ q k ; vbO v
J m5 ze H% LM! kQ -B Q 8H v \ ; _!UOY.
WLA es Lj O#- Vg G : Y =z0: < !vVddRN 8 :KOY.
O#- !I
pg LTO 4 W LTO 5 WLA esLjB sLj/ . NMd L: & kX gkI
v Vn_ UOY.
W LA es L j! kQ Z <Q $8B 2-2 d L v G :Oe~n W R A .~n d
8gW;; |6 OJC@.
O#- 0 |.
O#-B OC G ,SH
0 G }:, / v8v, & n W | [ : O#-OB W LA es L j! 3!H n5
/f! {s Y(OY. ON @ kANW %: 0 |.& v`R v V@OY. L/
Q @k A NW % L xB /f G B @ k A N
/fG fl, Dell Encryption Key Manager!- J dQ pg 0 |. [w ; v
`R v V@OY. 1-3 d Lv G :O#- |. ;! - L/ Q [w ;Z<w 3mU
OY.
Q WL A esLj
h ~!- )/ > y G 0 g k z| CLV@OY. L/Q
Nn bI: -v !-v`GB O#
W %! >SG v JB O #-! J d Q
O#- $%
O#-& 8vOB % gk G B f}T OY. ) b!B 0 1 C ^?Or W O#-
< }; &nOB T" L wTKOY. L / Q T"; 3$ O B f} W '! B
OB
n5 /f ! {s Y(OY. Z<Q $8 B 1-3 dLv G :O#- |. ;& |6O
JC@.
1-1
DwM .
Encryption Key ManagerB Java /f! wTGn V8 g O # bI;'X Java
Security DwM .& gkUOY . Java Security DwM .! kQ Z< Q $8 B |C
-{; |6OJC@. Encryption Key Manager !B Xg ? [; &nOB % gk G
B < !v b; DwM . ! V@ OY. L DwM . BY=z0@OY.
Java Security 0 zeR
0 zeRB
Java Security G dR W JCE(Java Cryptography Extension) G
ONN $ GKOY. GQ Java SecurityB Java Runtime Environment GO
N N wTKOY. 0 zeR B Encryption Key Manager!- O#- 6[;
v`Ob ' X gk OB Nu - W 0& 8/Om VE* Xg W q8N w N
M OB M; ; U OY. gkZG d 8& f7C 0 b 'X Yg Q 6 [ /: ;
OB )/ !v>yG Java 0 zeR! vxKOY. L /Q /:: 2-4
&x
dLv G :0 zeR mAgW;! - Z<w 3mUOY.
0 zeR % L M& 88OB [w : El _ dUOY. 0 zeR! W <:Ov J 8i
O #-H WLA G O #& X6 R v x @OY. F ! V&& Z<w P m 0 ze R %
LM& 8#OB % gk R v VB f} ; KdOJC@.
8: DO
8 : DO; gkOi 6w d 8 &87O5O Encryption Key Manager G ?
[; gk Z $ GR v V@OY. L/Q ? [! kQ IG:L.-!- Z
<w 3mUOY. 2-1 dLv G & 2 e : Encryption Key Manager /fh
9;, 4-1 dLv G & 4 e :Encryption Key Manager 8: ;!- wJN 3
mOm 6v 7!B NO B !
WLA es Lj WLm
WLA es Lj WLm : Encryption Key Manager!- v xOB WLA e
!& _{R ' gkKOY. W LA es Lj W Lm : m}R v xB 2 x D
OLg Xg '!B 8: D O! v$Gn V@OY. L'!B g
BT / f!IU OY.
KeyGroups.xml DO
L O#N 8 # GB D O !B pg O#- 0 Wl GL ' W " 0 Wl z ,
|H O#- 0 0mL wT KOY.
- 8 : IGG|< <.& 3mUOY.
kZ d8 !
Dell Encryption Key Manager gkZ H;-
1-2
W2
1-1. Encryption Key Manager
O#- |.
G W !v b; Dw M.
Dell Encryption Key ManagerB WLA E< (WLA W +..v |D )! 5 $8&
O#-OE* )b !- P8AB $8& O# X6 OB % gk G B O#- 0& }:,
™
8#, ze W /v 8vOB fl O#- ! I WL A esL j& vxOB Java
R
A .~n A NW % TOY. Encryption Key ManagerB Linux(SLES W RHEL) W
Windows!- [?Og , #MAsLn ; )/ '! ! hwH x/Zx8N iWs n
e !- G`O 5 O 3h G n V@OY. mI` N Md L : ,s L p .B gkZ /f !
BT Encryption Key Manager & gkZ $ GOm LG [? ; pOM
R v VB m
I <.& &xUOY. Dell Encryption Key Manager GUI(Graphical User Interface)
!-5 9: g kZ $ G W pOM 5 bI ; g kR v V@OY. Encryption Key
ManagerB pg O#- [ w! J dQ Nu- W 0 & 8/OE* X g Wq8N w
NMOb 'XO* Ls G 0 zeR& gkUOY. Z<Q ;k: 2-4 d Lv G :
0
ze R mAgW; ; |6OJC@.
& 1 e W LA O#- 3d 1-3
_d Encryption Key Manager #:. -v 8 : $8: Dell Encryption Key Manager
ANW %; #:. OB C:[: % LM / GG'h; VR- Ob ' X ECC ^p.&
g kR M; G e U OY. Encryption Key ManagerB O#- 0G } :; d;Om L
|
i 0& LTO 4 W LTO 5 W LA e sLj! | ^O B b I ; v`UOY. & H (O#
-H) 0B
! bOH%LM& 98(O# X6 )R v V8Ai @ y x L 0& {}Q W LA es
Lj! |[X_ UOY. C:[ ^p. G q. @yN 0! UsGz m + ..v! % L
M & 5 ' L 0 & gkOB f l , Xg +.
Y.(o, wD! O #& X6 R v x@OY .) L/Q % LM @y! _}O v J5O O
B 8# e!! 6CGn V@ OY. W/* Encryption Key Manager& #:.O B C
:[L ECC(Error Correction Code) ^p.& gkOv JB f l , C: [ ^p. ! V
B ?H 0!
V@OY . LM 0 : % LM /G !I: :{v8 _d @kANW %( 9: Encryption Key
Manager); #:.OB C:[ : ECC ^p.& gkR M; G e UOY .
3. _ Encryption Key Manager! C:[ ^p.! h!UOY. +. .v
.v! 2 )x %LMB 98R v x@ O
UsGm L/Q Us8N % LM /G L _ }R v VB !I :: 2F
Encryption Key Manager B WLA s L j/.M G TCP/IP kE fN& k X |[H
0 5x d; GB 0 }:; bY.B i Wsne AN <: *R; UOY. WLA e
s Lj!- O#-H%LM& 2B fl U z Encryption Key Manager! O#- 0
& d;UOY . d;L 5xO i Encryption Key ManagerBY=[w; v`UOY .
Encryption Key Manager B 0 zeR!- b8 G AES 0& !.M 8H |[ ;'
X 5x C L 0& & NX &Om L 0& gk O ) WL A ! 5 %LM& O #- O
B WLA es L j! 0 5N&NUOY.
|
LTO 4 GB LTO 5 esLj!- O #-H WLA& PB fl Encryption Key
ManagerB WLA G 0 ID! wTH
$8! {s 0 zeR !- J dQ 0& ! .B
Y = 8H | [;'X & N H WL A esLj! &x U OY.
1CR v VB O#- |. f} : N !v ! V@OY. L f} : O#- $% # x
LVB '!M O#- Vg G !- 0 |.& v`O B '!, es LjM Encryption
Key ManagerG ,
a f}! {s Y(OY . VsG f} : n5 / f !- a $UO
Y. 0 |. W O#- $% # x: Y= N /fh~ _ O*! V@OY.
1-4
Dell Encryption Key Manager gkZ H;-
W2
1-2.
O#- $% # x W 0 |.! V; v VB N '!
@kANW % h~
Key Manager MB 05N @ k ANW % : W L A :d.v !- %LM | [ ; C
[UOY. vxG B @kANW % : :@kANW % !- |.OB W LA O#-;&
|6OJC@.
sLj/. h~
W LA : d .vG ]3 e !(9: Dell PowerVault TL2000/TL4000 W
&0:LL! Xg UOY. dr&xGB WLA s Lj/.! B ;N! " WL
A esLj! k Q ;N NMd L:! V@OY.
@kANW % !- |.OB W LA O#-
L f} : n5 /f !- LL O#- $% W 0& }:Om|.R v VB @k A
N W % ; G`OB fl! ! e{ UUOY. O#-& gk R Cb& v$ O B $%:
@kANW % NMd L:& kX $ GKOY. $% W 0 B @kANW % h~ z O#
-Q WL A esL
#- !IQ WL A esLj g L!- s# [k Q azLg O #- '.! C:[ W
sLj/. h~ ; /fRJdB x@ OY. @ kANW % !- O#- 0& | .OGN
@kANW % ; gkO
@kANW % !- |.OB O#- f} ; gkX_8 P; v V@OY.
j # %LM f N& kX |^K OY . O#- B @ k A N W % W O
) 2m O#-H <}:@kANW % !- <}; 4 fDk N
ML6000
Encryption Key ManagerB @kANW % !- |.O B WLA O#-!- g kG
E* d;GB Wq: F UOY.
& 1 e W L A O#- 3d 1-5
O#-& | .OB fl Y=z0: VR v |G @kANW % ; gkR v V@OY.
v CommVault Galaxy 7.0 SP1
v Symantec Backup Exec 12
|
@ kANW % !- |.OB W L A O#-BY=z0: LTO 4 W LTO 5 W L A
e sLj!- v x K OY.
™
v Dell
v Dell
v Dell
PowerVault™TL2000 WLA s Lj/.
™
PowerVault™TL4000 WLA s Lj/.
™
PowerVault™ML6000 WLA s Lj/.
O#- $% W 0 |. f}; KAi WLA i w RA.~ n @kANW % .-&
|6OJC@.
sLj/.!- | .OB O#-
Dell™PowerVault™TL2000 WLA s Lj/. , Dell™PowerVault™TL4000 WL
™
|
|
A sLj/. GB Dell
5 WLA es Lj!- L f} ; gkUOY . 0 }: W |.B sLj/ .!,aH
# :.!- G `GB Java @k A NW % N Encryption Key Manager!-v`UOY.
$% &n W 0B sLj/.!- e sLjN ,aH N MdL:& kX |^
#- B @kANW % ! k X um U OY .
PowerVault™ML6000 WLA s Lj/. G LTO 4 W LTO
GGN O
O#- 0 $8
O#- 0B %L M& : )%m(O> G O#-)Om L& X& Ob ' X /0 w }:H
+ [' q. .Z-T OY. O#- 0 B " 0 !m /Om 0& 9s R v x5O 3 h
H Km.r; gkO ) [: KOY. 0!- L/Q fD 8N 8 : H fL! fvO O
#- Ze& zb u nF@ OY . IBM W T10 G O #- f} pN%LM& O#-
O B % 256q. AES Km.r; gk U OY. 256q. AES B v g L9 $N!-
N$ W G eOB O#- %X 8N < !v - N Y% 0 f L& ck UOY. 256q.
0 B AES!- c k Q 0 _ !e f L ! iOY
.
Encryption Key Manager!-Bk* Km.r W qk * Km.r z0: N !v
/| G O#- Km.r ; gkUOY. k* G B qP 0 O#- !-B O#- W O
# X6! \O 0& g k UOY. 8k k* 0 O #-B 9: g G % LM & ?2{8
N O#-OB fl! g k K OY . 256q. AES 0
Bk* 0TOY. q k * GB x
k /3N k 0 O#-B Q VG 0 & g k UOY. 0 O *& g k O ) O#-H%LM
B xk/ 3Nk 0 V G Y% 0 & gkX_ 8 O# & X6 R v V@ OY. q k* 0
V L }:Gi xk 0B O#- !, 3 N k 0B O# X6
! g kKOY.
1-6
Dell Encryption Key Manager gkZ H;-
Encryption Key Manager!-Bk* W qk * 0&pN gkUOY. k* O#-
B gkZ G B #:. %LM& !. O #- O B fl!, q k * O#- Bk * 0&
8#OB fl(S5 ! u@2)! g kKOY .
keytoolz0:/?.<& gkO ) Encryption Key Manager! kQ O#- 0 &
}:R v V@OY. AES 0& }
:OB %Sz L& W L A esLj! | [OB f
D : O#- |. f}! {s Y (OY. W/* Encryption Key Manager !- O #
- 0& gkOB f}z Y % @kANW % !- g kOB f} g LG w L & LXO
i 5rL I v V@OY.
Dell Encryption Key Manager!-G O#- 0 3.
|
|
s Lj/.!- | .OB W L A O#- G fl O#-Gv J : % L MB LTO 4 G
B LTO 5 WLA es LjN |[Gn Encryption Key Manager!- g k ! IQ
0 zeR G g | ! }:H k* % L M0 (DK)& gkO ) O# X:.N / / H D
YC WLA! bOK OY. Encryption Key Manager B sne Ns
f D8N g | !
}:H DK& 1CUOY. )/ 3G WLA +..v! - g| }:H DK v! N7
Q fl DK& YC g k U OY.DKB Encryption Key Manager!- O#- G B
|
|
|
& NH gD8 N LTO 4 GB LTO 5 WLA e s Lj N |[KOY. LTO 4 W LTO
5 WLA es LjB L/Q DK& &
NX &O) O#- GB O # X 6! g k U O
Y. W/* &NX&G v J: 0B LTO 4 G B LTO 5 W LA +.. vG SGG
'!! ze KOY. O#- H <} L bOGi DKB < } !- P: x-kN 0m G
B 0 9Lm! {s W<: ! IOm Encryption Key Manager!- g k R v Vn
_ UOY. 1-8
d Lv G W2 1-3!- L AN<:& 8)]OY.
Dell Encryption Key Manager!-B LTO O#-& 'Q k* 0 & 0 Wl8 N 6
w OB b I 5 & xUOY. L' O#- O B %LM / | , L % L M! W<: O B g
kZ GBY% _dQ /! ! {s 0 & Wl-R v V@OY. Z < Q
$8B 3-16
d LvG :0 Wl [ : W |.;& |6OJC@.
Y% @kANW % !- O#- 0 3 .
|
|
|
@ kANW % !- |.OB W L A O#- G fl O#- Gv J : % L MB LTO 4 W
LTO 5 WLA es LjN |[Gn Xg @kANW % !- &xOBk* DK& g
kO ) O# X:.N / /H D YC WLA ! bOKOY.DKB WLA +..v G
SGG '!! zeG
v J@OY. O #-H <}L b O G i DKB 9 & i n <}!
- P: x-kN @kA NW %! - gk !IQ '!, -v %LM# L:! Vn_ U
OY.
@ kANW % !- |.OB O#- G fl LTO 4 W LTO 5 W L A es L jB
Yosemite(Dell PowerVault TL2000 W TL4000 WLA s Lj/.k ), CommVault
Symantec Backup ExecM 0:@kANW %; g kR v V@OY.
W
& 1 e W L A O#- 3d 1-7
|
|
G B O#-& v`O B T10 mI <. & gkO B @kANW % G fl LTO 4 W
LTO 5 WLA es Lj& gkR v V@ OY . T10 mI <.B @kA NW %!- &
x OBk* 256 q. AES 0& gkUOY.T10: W L A +..vg m/ Q )/ DK
& gkR v V8 g O#-H%L
M W O] %L M & 0: W LA +..v! 5 v
V@OY. @kANW % !- W LA +..v & O#- OB fl @kANW % !- G
0 Q f}; gk O ) DK& 1C O E* }: Q D WL A esL j N |[UOY. 0
B q k* xk 0& g kO ) &
NGv J8g WL A +..v! zeG v J@OY.
O #-H%LM! W L A! bOGi DKB % L M& P: x-kN @ kANW % !
- gk !IQ '! ! Vn_ UOY.
@ kANW % !- |.OB O#- W s L j/.!- | .OB O#-! | Q W L A
#-! kQAN<:B W2 1-3! * M V @OY.
O
W2
1-3.
k * O#- 0& gkO ) O #-
#- W @kANW % !- |.OB O #-
d`
" <}!- g k R v VB O#- 0 G v B O#-& | .OB % gk O B f},
|
||
O #- %X W WL A esLj! { s Y(OY . LTO 4 W LTO 5 G um O #-
(o , Encryption Key Manager!- sLj/. | . O#- g k)G fl DKG m /
T : Encryption Key Manager!- fP Q vG g | } :H 0& gk R
! >SGn V@OY.
%
1-1.
O#- 0 d `
O#- |. f}
s Lj/.!- | .OB O#- \ O DK/+..v N/A
@kANW % !- |.OB O#- 9 v DK/+..v 9 v DK/+..v
DK = k* AES 256q. DK
. LTO 4 W LTO 5 WLA es L j!- G s L j/.!- | .OB O
v VBv
gkGB 0
IBM O#- T10 O#-
1-8 Dell Encryption Key Manager gkZ H;-
& 2 e Encryption Key Manager /fh9
L =G!-B gk Z d8 ! B5O Encryption Key Manager & 8:OB %5r
L GB $8& &xU OY. O#- |+ ; 3$OB f} ; h9OAi9: dR& m
AX_ UOY.
O#- 3$ [ w 3d
W LA es L j G O#- bI ; gkOAiUz /$ RA .~n W Oe ~ n d 8
gW; 87 X_ UOY. L/ Q d8 gW; 87 OB %5rL G5O Y = !K q
OL &xKOY.
Encryption Key Manager 3$ [w
W LA& O#- O AiUz O#- Q W L A es L jM kER v V 5O Encryption
Key Manager& 8: W G`X _ UOY . WL A esLj & 3! OB ?H! B
Encryption Key Manager& G`R Jd! xv 8 O#- & v`OA i L & G`X
_ UOY.
v Encryption Key Manager -vN gkR C:[ C '{; a$OJC@ .
Jd Q fl -v n5 <&& wW9Le OJC@. 2-2 dLv G : Oe~n W R
v
A.~n d8g W;; |6 OJC@.
v Java UR(Unrestricted) $% DO; 3!OJC@ . 2-2 dLv G :Oe~n W R A
.~n d8gW;; |6 OJC @.
v Encryption Key Manager JAR; wW9 L eOJC@. 3-1 dLv
|
Manager ISO LLv YnNe;& | 6OJC@ .
v 0, Nu- W 0 Wl;[:OJC@.
3-6 dLv G : GUI& gkO ) 8: DO , 0 zeR W Nu- [:;
3-16 dLv G :0 Wl [: W |.;
v _! 8: I G ; 0kOv JB f l 3-6 dLv
0 zeR W N u- [ :;G} w& {zY i L \h B Jd O v J@ OY .
– Jd Q fl 0 W Nu-& !.@JC @ . 3-14 dLv G : Keytool -importseckey
& gkO ) %LM0 !. @ b; & |6OJC@.
– 8: nO $8 DO; $GOJC@ . 4-1
Manager 8:;; |6OJC@ .
– Encryption Key Manager! WLA es Lj& $ GOE*
drive.acceptUnknownDrives 8: nO $8 *; 3 $O JC@. esLj&m
G :GUI& gkO ) 8: D O,
d Lv G & 4 e :Encryption Key
G :VE v | Key
2-1
C {8N $ G OAi 5-10 d L v G :adddrive ;& |6OE* 4-1 d L v G :W
LA es Lj W Lm Z? w % L.;& |6OJC@.
– Encryption Key Manager -v& C[O JC @ . 5-1 dLv G : Key Manager
-v C[, uN m' W _v;& | 6OJC@.
– mI` NMd L : ,s L p.
& C[O JC@. 5-6 dLv G : mI` NMd L:
,sLp.;& |6OJC@.
sLj/.!- | .OB W LA O#- h 9
O #-& v`OA i Y=L Jd U OY .
|
v O#- !I LTO 4 W LTO 5 WLA es Lj
v 0 zeR
v Dell Encryption Key Manager
sLj/.!- | .OB W LA O#- [w
|
1. LTO 4 W LTO 5 WLA es Lj& 3!Om ,a OJC@ .
v sLj/. _~n(J d Q f l TL2000, TL4000, ML6000) & w% L .OJC
@. http://supportapj.dell.com/support/index.aspx; f.OJC @.
™
– Dell
PowerVault™TL2000 WLA s Lj/. VR J v _~n v |: 5.xx
T OY.
™
– Dell
PowerVault™TL4000 WLA s Lj/. VR J v _~n v |: 5.xx
T OY.
™
– Dell
PowerVault™ML6000 WLA s Lj/. VR J v _~n v |:
415G.xxxTOY .
v Jd Q fl WL A esLj _~n& w % L. O JC@. VR J v _~n v
|: 77B5 TOY.
|
2. sLj/.!- | .OB W LA O#-& 'X LTO 4 W LTO 5 WLA es L
j W WLA s L j/.& 3$
8 |6).
v Encryption Key Manager -v IP VR& _!UOY .
3. sLj/. x\ A NW % bI ; gkO ) Encryption Key Manager fN W O
#- 8:; .NOJC@( Z <Q ;k : Dell W L A s L j/. $ 8 |6).
Oe~n W R A.~n d8g W
V : Y=G " C'{!- B JRE(Java Runtime Environment)G IBM v | 8
Encryption Key Manager& vxUOY .
Dell Encryption Key Manager gkZ H;-
2-2
OJC @(Z< Q ;k: Dell W L A sLj/. $
Linux Vg G DwM .
n5 <&
v RHEL 4
v RHEL 5
v SLES 9
v SLES 10
|
v SLES 11
Encryption Key Manager(Linux!- G` _ )
%
2-1. Linux
C'{
|
64q. AMD/Opteron/EM64T
32q. Intel
!-G V RRA.~n d8g W
IBM Software
Developer Kit Zx % g L.
®
#/
Java 6.0 SR5 http://support.dell.com
WLA s Lj/.
|
|
|
Dell PowerVault TL2000 WLA s Lj/. , TL4000 WLA s Lj/. W ML6000
W LA s L j/. G _~n 9' L VE N v . N OJC @. _ ~ n& w % L .OAi
http://support.dell.com ; f.OJC@.
WLA es Lj
|
|
LTO 4 W LTO 5 WLA es Lj G _~n 9' L VE Nv . NOJC@ . _~n
& w%L.OA i http://support.dell.com; f.OJC@.
Windows Vg G DwM .
n5 <&
|
Windows Server 2003, 2008 W 2008 R2
Dell Encryption Key Manager
Encryption Key ManagerG VR J v v |: te /%! 2007b 9y 14O(20070914)
LD N 2.1 v |Lg, Y = IBM Runtime Environment _ O* TOY.
%
2-2. Windows
n5 <& IBM Runtime Environment
Windows 2003
!-G V RRA.~n d8g W
v AMD64/EM64T 86G Windows! kQ IBM ®64 q. Runtime Environment,
Java 2 Technology Edition, v| 5.0 SR5
v Windows! kQ IBM 32q. Runtime Environment, Java 2 Technology
Edition, v| 5.0 SR5
& 2 e Encryption Key Manager /fh9 2-3
%
2-2. Windows
n5 <& IBM Runtime Environment
|
|
Windows 2008 W
2008 R2
!-G V RRA.~n d8g W (hS
AMD64/EM64T 86G Windows! kQ IBM 64q. Runtime Environment,
Java 2 Technology Edition, v| 6.0 SR5
)
WLA s Lj/.
|
|
|
|
|
|
0 zeR mAgW
JCEKS 0 zeR
Dell™PowerVault™TL2000 WLA s Lj/. , Dell™PowerVault™TL4000 WL
™
A sLj/. W Dell
PowerVault™ML6000 WLA s Lj/. G _~n 9' L
V ENv . N O JC @. _ ~ n& w %L.OAi http://support.dell.com ; f.O J
C@.
WLA es Lj
LTO 4 W LTO 5 WLA es Lj G _~n 9' L VE Nv . NOJC@ . _~n
& w%L.OA i http://support.dell.com; f.OJC@.
0 zeR % L M & 88OB [w: E l _ d UOY. 0 zeR! W < :Ov J 8 i
O#-H WLA G O#& X6 R v x@OY. F! V&& Z<w Pm 0 zeR %
L M& 8#OB % gk R v V B f} ; KdOJC@.
EKM!-B JCEKS 0 zeR /| ; vxUOY .
JCEKS(Unix System Services DO b] ) B EKM; G`OB pg C'{!- v
x GB DO b] 0 ze R T OY . { s- sk{8N iw W 98 C L 0 ze R
;k; 9gOm e V 98 C N EKM N :O :& ?b-OB [ w L k LUOY .
JCEKSB 8
H;'X 0 zeR ;k! k Q O# b] 8 #& &x Og sk{8N
g#Q :I; &x UOY. FTPM 0: D O 9g f} ; g k R v5 V@OY.
|
O#- 0 W LTO 4 W LTO 5 WLA es Lj
Dell Encryption Key Manager W pg vx G B WLA e sLjB % LM & O#
-R ' k* 256q. AES 0& gk UOY. L V&!- B L/ Q 0 W Nu-M
| CO) KF_ O B $8& 3 m U OY.
|
LTO WLA +..v G LTO 4 GB LTO 5 WLA es Lj!- O#- [w ; v
`OB fl Encryption Key Manager!
-B 256q. AES k* %LM08 gkU
OY.
Dell Encryption Key Manager gkZ H;-
2-4
|
LTO 4 GB LTO 5! 0& d;O i Encryption Key Manager!-B WLA es
L j! v$ H 0 m ; gkU OY . W L A e s L j ! v$ H 0 m L x 8 i
symmetricKeySet 8: nO $8! v$ H 0 0m |' , 0 0mqO GB 0 W l
G 0m L gkKOY . W L A es L j! kQ /$ 0 m L N7O
i 0 & UnOT g
k Ob ' X wJN Y% # << !- 0m; 1 CUOY.
1CH 0m: L . 0 ze R! NeH k* %LM0(DK)M,|KOY. Encryption
Key Manager!-B WLA es Lj! O# X6 R v VBY% 0 & gkO ) &
|
NH L DK& LTO 4 GB LTO 5 W L A esLj! |[
O) %LM& O#- U
OY .DKB O] X:. | D 8 N TCP/IP& kX | [Gv J@ OY . 1CH 0m:
%LM0 ID(DKi)sm OB #<<N // Gm LB O#- H%LM& gkO ) W
LA! bOKOY. L fD ; gkOi Encryption Key Manager !-B DKi& gk
|
O ) LTO 4 GB LTO 5 WL A &
P; ' % LM O#& X6 OB % Jd Q CY
% DK& D0R v V @ OY.
5-9 dLv G : CLI mI;G adddrive W moddrive V&!-B W LA es Lj!
k Q 0m; v$ O B f} ; 8)] OY . symmetricKeySet 8: nO $8! - 0 !
|
|
.@b, 0 ;8 ; b W b ;0m v$ ! |Q $8B 3-11
5!- O#- ! kQ 0 W 0m }:;; |6 OJC @. 3-16 dLv G :0 Wl [:
d Lv G :LTO 4 W LTO
W |.;!-B 0 Wl; $ GO m L& 0 zeR G 0m 8N $lB f}; 8)]
OY.
W 2 2-1!-B O#-H 2 b 6[!- 0& 3 .OB f} ; 8) ]
5
DK, DKi
6
7
OY.
Key Manager
alias
3
DK
1
Config
File
4
Key
store
W2
|
2-1. LTO 4
GB
LTO 5
WLA es Lj G O#- 2b 6 [ d;
1. WLA es Lj!- WLA& O#- OB 0& d;UOY .
2. Encryption Key ManagerB esLj W Lm G W LA e!& . NU OY .
2
Drive
Table
& 2 e Encryption Key Manager /fh9 2-5
3. d;!- 0m; v$ Ov Jm es L j WL m ! v$ H 0mL x 8i Encryption
Key ManagerB keyAliasList! VB 0 Wl G B 0m <. !- 0m; 1CU
OY .
4. Encryption Key ManagerB L! k@O B DK& 0 zeR!- !.IOY .
5. Encryption Key ManagerB 0m; DKiN //Om esL j! O# X6 R v
VB 0&
gkO ) DK& &NUOY .
6. Encryption Key ManagerB DK W DKi& WLA es Lj! |[UOY .
7. WLA es Lj! DK& &NX&Om O#-H%LM W DKi& W LA! 9
OY .
W 2 2-2!-B O#-H P b 6[!- 0& 3 .OB f} ; 8) ] OY.
4
DK
Key Manager
3
DKi Alias
5
6
1
Config
File
2
Key
store
W2
|
2-2. LTO 4
GB
LTO 5
WLA es Lj G O#- Pb 6 [ d;
1. WLA es L jB P b d;
[ UOY.
2. Encryption Key ManagerB esLj W Lm G W LA e!& . NU OY .
3. Encryption Key ManagerB DKi& 0 m8N //Om L! k @OB DK& 0
ze R!- !.IOY.
Drive
Table
; vEOg Encryption Key Manager! DKi & |
4. Encryption Key ManagerB esLj! O# X 6R v V B 0& gkO ) DK
& &NUOY.
5. Encryption Key ManagerB &NH DK& WL
6. WLA es Lj! DK& &NX&Om L& gk O) %LM O#& X6 UOY.
0 zeR % L M iw
V : 0 zeR! V B 0 G _ dQ /! '. ! O#-G v J:e!!- L % L M&
iwOB ML _d UOY. W! _8 JdQ fl L & 98O) Xg WL A es
2-6 Dell Encryption Key Manager gkZ H;-
A esLj! |[ UOY.