
Table of Contents
xv
Appendix L - Data Protector Express Virtual Library Recovery ............................................ 328
Overview...................................................................................................................................... 328
Definitions.................................................................................................................................... 328
General Use ................................................................................................................................ 329
Known Limitations ....................................................................................................................... 331
Appendix M - Encryption .......................................................................................................... 332
Overview...................................................................................................................................... 332
Installation ................................................................................................................................... 333
Default encryption state ......................................................................................................................................... 333
Definitions.................................................................................................................................... 333
Cryptographic Algorithms ............................................................................................................ 333
Software ................................................................................................................................................................. 333
Hardware................................................................................................................................................................ 334
Passphrase.................................................................................................................................. 334
Passphrases and Data Protector Express catalog ................................................................................................ 334
Passphrase management ...................................................................................................................................... 334
General use ................................................................................................................................. 335
Encryption Options ................................................................................................................................................. 335
Off .................................................................................................................................................................... 335
Automatic......................................................................................................................................................... 335
Software........................................................................................................................................................... 335
Hardware ......................................................................................................................................................... 335
Software Strength ............................................................................................................................................ 335
Encryption and Compression .......................................................................................................................... 336
Media Properties .................................................................................................................................................... 336
Media Import .......................................................................................................................................................... 337
Disaster Recovery ....................................................................................................................... 337
Recovering a system with an encrypted backup.................................................................................................... 337
Index ........................................................................................................................................... 338
Содержание BB118BV - StorageWorks Data Protector Express Package
Страница 1: ...U s e r s Gu i d ea n dT e c h n i c a l R e f e r e n c e ...
Страница 339: ......
Страница 345: ......
Страница 365: ...Index 347 ...