![Quantum Scalar i6000 Скачать руководство пользователя страница 24](http://html2.mh-extra.com/html/quantum/scalar-i6000/scalar-i6000_quick-start-manual_3547634024.webp)
Q
UANTUM
S
CALAR
I
6000 & S
AFE
N
ET
K
EY
S
ECURE
Q
UICK
S
TART
G
UIDE
27
4
Select the check box for the partition whose encryption method you want to change.
5
Change the encryption method by selecting
Enable Library Managed
from the Encryption Method
drop-down list:
Note:
If you change a partition from Enable Library Managed to Allow Application Managed, any
encrypted data that was written to the tapes while the partition was configured for library managed
encryption can no longer be read, until you change the partition back to Enable Library Managed.
6
Click
OK
.
The dialog box closes and you are returned to the main console.
If the partition encryption settings were not successfully configured, follow the screen instructions to
resolve any issues that occurred during the process.
When you are finished configuring the library, save the library configuration (
Tools > Save/Restore)
.
Using EKM Path Diagnostics
EKM Path Diagnostics is a series of short tests performed by the library to determine if the EKM servers
are connected and operating properly.
You can perform EKM Path Diagnostics tests manually at any time, or automatically in the background at
regular intervals:
•
Manual
— You can perform manual EKM Path Diagnostics at any time by clicking the
Test
button on
the EKM server setup screen (
Setup > Encryption > Server Configuration
).
•
Background
— The library is configured to automatically perform background EKM Path Diagnostics
tests at regularly scheduled intervals and notify you via RAS tickets if any problems arise. To do this,
go to
Setup > Physical Library
. Under
EKM Path Diagnostics
, select the
Enable
check box.
Note:
Background EKM Path Diagnostics is always enabled. You cannot disable it.
The tests performed are:
•
Ping
— Verifies the Ethernet communication between the library and the key servers.
•
Path
— Verifies that EKM/RKM/KMIP services are running on the key servers.
•
Config
— Verifies that the key servers are capable of serving encryption keys.