|
Other manuals for this model:
manual abstract
Contents
About This Document.....................................................................................5
Supported Release Version Updates (RVUs)..................................................................................5
Intended Audience....................................................................................................................5
New and Changed Information..................................................................................................5
New and Changed Information in the 580572-005 Edition.......................................................5
New and Changed Information in Previous Editions..................................................................6
Document Organization............................................................................................................6
Notation Conventions................................................................................................................6
General Syntax Notation......................................................................................................6
Related Information...................................................................................................................8
Publishing History.....................................................................................................................8
HP Encourages Your Comments..................................................................................................8
1 Overview..................................................................................................9
Encryption...............................................................................................................................9
Encryption principles.................................................................................................................9
Encryption techniques................................................................................................................9
Encryption management..........................................................................................................10
HP NonStop I/O Essentials ................................................................................................10
Supported systems and devices................................................................................................10
System requirements and planning............................................................................................10
Encryption in a system.............................................................................................................11
Licensing...............................................................................................................................12
2 Installation...............................................................................................13
Installation overview................................................................................................................13
Moving an ESKM device and its license to another system............................................................14
Installation steps.....................................................................................................................15
1. Install Storage CLIMs......................................................................................................15
2. Install the license............................................................................................................15
3. Verify that SAFEGUARD is running...................................................................................15
4. Create security group.....................................................................................................15
5. Configure eth1 (enterprise LAN).......................................................................................15
6. Install the ESKM.............................................................................................................15
7. Perform pre-enrollment tasks.............................................................................................18
8. Register the CLIMs.........................................................................................................42
9. Verify connection between the CLIM and the key managers.................................................43
10. Back up the configuration files.......................................................................................43
11. Back up the Key Managers.............................................................................................43
3 Encrypting data on storage devices............................................................44
Encrypting data on disk drives..................................................................................................44
Encrypting disk data with CLIM key rotation..........................................................................44
Encrypting disk data with REVIVE key rotation........................................................................48
Changing encrypted disk keys.............................................................................................50
Moving disk drives.............................................................................................................50
Decrypting a disk..............................................................................................................50
Disk hardware replacement.................................................................................................50
Encrypting data on tape drives.................................................................................................51
Encrypting tape data..........................................................................................................51
Changing tape drive keys...................................................................................................51
Moving tape drives............................................................................................................52
Temporarily turning encryption off........................................................................................52
Contents
3
...Other models in this manual:
Desktops - HP Integrity NonStop J-Series (1.26 mb)
Desktops - HP NonStop L-Series (1.26 mb)