DL4300 Appliance
Applying an encryption key from the Protected Machines page
103
a new key. For more information, see
, respectively.
•
By modifying the configuration settings for a machine. This method applies an encryption key to one protected machine
at a time. There are two approaches for modifying configuration settings for a machine in the Rapid Recovery UI:
◦
Modify the configuration settings for a specific protected machine. The encryption key you want to use for this
approach must already exist on the Rapid Recovery Core, be a universal key type, and must be in an unlocked
state. Encryption is part of the General settings. For more information, see
Viewing and modifying protected
.
◦
Click the
Not Encrypted icon on the Protected Machines page. Using this approach you can create and apply
a new encryption key, or assign an existing unlocked universal key to the specified protected machine. For more
information, see
Applying an encryption key from the Protected Machines page
Parent topic
Applying an encryption key from the Protected Machines page
Once an encryption key has been added to a Rapid Recovery Core, it can be used for any number of protected
machines.
If you select an encryption key during the initial protection of one or more machines, that key is automatically
applied to any machines you protect using that wizard. In such cases, this procedure is not required.
Perform this procedure:
•
If you want to apply an existing, universal, unlocked encryption key to any protected machine in your Core.
•
If you just added a new encryption key using the process described in the topic
apply that key to a protected machine.
•
If encryption is already applied to a protected machine in your Core, but you want to change the key to a different
universal, unlocked key available in your Core.
CAUTION:
After you apply an encryption key to a protected machine, Rapid Recovery takes a new base
image for that machine upon the next scheduled or forced snapshot.
1. Navigate to the Rapid Recovery Core and click Protected Machines.
The Protected Machines page appears, listing all the machines protected by this Core. An open lock
appears for any machine that does not have an encryption key applied. A closed lock
indicates that a
protected machine has encryption applied.
2. In the Protected Machines pane, click the lock icon for the protected machine you want to configure.
The Encryption Configuration dialog box appears.
3. Do one of the following:
•
If you want to apply an existing encryption key to this machine, select Encrypt data using Core-based encryption
with an existing key, and from the drop-down menu, select the appropriate key. Click OK to confirm.
•
If you want to change an existing encryption key to a different universal, unlocked key, select Encrypt data using
Core-based encryption with a new key, and from the drop-down menu, select the appropriate key. Click OK to
confirm.
•
If you want to create a new encryption key and apply it to this protected machine, select Encrypt data using Core-
based encryption with a new key. Then enter the details for the key as described in the following table.