Quantum, the Quantum logo, and Scalar are registered trademarks of Quantum Corporation, registered in the U.S. and other
countries. All other trademarks are the property of their respective companies. Specifications are subject to change without
notice.
Release Notes
6-66612-02 Rev A
June 2010
Purpose of This Release
The SKM 1.1 release includes several new features and enhancements that
extend the product’s capabilities. These release notes describe these new
features and enhancements, as well as currently known issues and issues that
were resolved for this release of the product. These notes also provide library,
tape drive, and firmware compatibility information. Visit http://
www.quantum.com for additional information about Scalar Key Manager.
New Features and Enhancements
SKM 1.1 includes the following new features and enhancements.
• Name change from Quantum Key Manager to Scalar Key Manager.
• Scalar Key Manager can now be deployed as a virtual machine (VM) in a
VMware® environment.
Firmware Notes
• Users may now install their own TLS communication certificates on the SKM
servers.
These release notes list information should be aware of as you set up, configure,
and use SKM.
• SKM and Quantum Encryption Key Manager (Q-EKM) are not supported on
the same library.
• Password — If you change the password on the SKM server (the default
password is “password”), it is extremely important that you remember the
new password. The password can be different for each SKM server, so be
sure to remember both. If you forget your password, you will lose login
access to the SKM server, including backup and restore capability. Quantum
will NOT be able to reset or restore the password.
• Date settings on SKM servers and library — The date on the SKM servers and
the library must be set to the current date. Incorrect date settings may
interfere with the TLS certificates and cause the library to stop
communicating with the SKM servers.
• Backing up the keystores — It is extremely important that you back up the
keystores on both SKM servers (best practice) every time you generate new
data encryption keys and before you use these new keys to encrypt data.
You must back up each keystore separately because they contain different
data. The only way to read encrypted tapes is via the data encryption keys in
the keystore. If your SKM servers fail without a backup, you will
2Purpose of This Release
permanently lose access to all your encrypted data. If a SKM server fails and
needs to be replaced, the backup is required to restore operation.
Compatibility Matrix
SKM supports the following tape libraries, tape drives, and firmware:
Tape Library Firmware• Scalar i500, minimum firmware version 570G
Tape DrivesOn Scalar i500 libraries:
Release Notes
6-66612-02 Rev A
June 2010
• Scalar i2000, minimum firmware version 595A
• Scalar i6000, minimum firmware version 600A
•HP LTO-4 Fibre Channel
•HP LTO-4 SAS
•HP LTO-5 Fibre Channel
•HP LTO-5 SAS
On Scalar i2000/i6000 libraries:
•HP LTO-4 Fibre Channel
•HP LTO-5 Fibre Channel
Tape Drive FirmwareInstall the latest version of tape drive firmware
Supported Backup Applications
SKM has been tested with the following backup applications:
Backup ApplicationSupported Versions
CA ARCserve® 11.5 and later
CommVault® Simpana® 7 and later
EMC® NetWorker® 7.5 and later
HP Data Protector6.1 and later
IBM® Tivoli® Storage Manager6.1 and later
that is qualified for the library firmware installed
on your library. Refer to the library release notes
for the correct version of tape drive firmware.
Symantec™ Backup Exec™12.5 and later
Symantec NetBackup™ 6.5 x and later
Compatibility Matrix3
Release Notes
6-66612-02 Rev A
June 2010
Resolved Issues
This release of firmware resolved the follow
Change
Request
Number
24134 1149660
27543 Multiple pings of the SKM server can
Service
Request
Number
112662
DescriptionSolution
Intermittent inability to ping/connect
with SKM servers.
The SKM server attempts to route
traffic to Ethernet Port 1 (eth0) even
when there is no cable plugged into
that port.
result in SKM server network port
restarts.
Known Issues
This release of firmware has the following known issues:
ing issues:
Fixed.
Fixed.
Change
Request
Number
27518Once you configure the primary and
Service
Request
Number
DescriptionWorkaround
secondary SKM servers on the library
remote web client and encryption keys
are generated, if you switch the key
servers (i.e., you try to make the
primary server the secondary server, or
vice versa), SKM will not function.
Once configured on the library, do not
switch the primary SKM server to the
secondary, or vice versa.
4Resolved Issues
Related Documents
The following publications provide information related to SKM. For the latest
versions, visit www.quantum.com
Document No.Document Title
Release Notes
6-66612-02 Rev A
June 2010
.
6-66532-xx
6-66531-xx
6-66533-xx
6-66572-xx
6-66535-xx
6-01210-xx
6-00421-xx
6-66879-xx
Contacting Quantum
More information about this product is available on the Service and Support
Web site at www.quantum.com/support
contains a collection of information, including answers to frequently asked
questions (FAQs). You can also access software, firmware, and drivers through
this site.
Scalar Key Manager Quick Start Guide
Scalar Key Manager User’s Guide
Scalar Key Manager Rack Installation
Scalar Key Manager Safety Information by IBM
Scalar Key Manager Open Source License
Agreement
Scalar i500 User’s Guide
Scalar i2000 User’s Guide
Scalar i6000 User’s Guide
. The Service and Support Web site
For further assistance, or if training is desired, contact Quantum:
http://www.quantum.com/
Telephone Support — Find contact
information for your location