EasyManuals Logo
Home>Quantum>Storage>Scalar i80

Quantum Scalar i80 User Manual

Quantum Scalar i80
404 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #224 background imageLoading...
Page #224 background image
Chapter 7: Encryption Key Management
Scalar Key Manager Functions Available on the Library
196 Quantum Scalar i40 and Scalar i80 User’s Guide
Each SKM server provides a unique encryption key for each tape
cartridge that is encrypted. To read an encrypted tape in a library that is
attached to an SKM server that is different than the server that originally
provided the encryption key, the encryption key from the originating
(i.e., source) SKM server needs to be shared with the receiving (i.e.,
destination) SKM server. The key (or list of keys, if there is more than one
tape), is exported from the source SKM server to a file, which is sent to
the destination recipient. Each key contained in the file is encrypted
using the public key of the destination SKM server. The destination SKM
server provides its public key to the source SKM server as part of an
Encryption Certificate, which the source SKM server uses to wrap
(encrypt) the encryption keys for transport. Upon arrival, the file
containing the wrapped encryption keys can only be unwrapped by the
corresponding private key, which resides on the destination SKM server
and is never shared.
The process is as follows:
1 The destination administrator exports the Encryption Certificate that
belongs to the destination SKM server. The Encryption Certificate is
saved as a file to a location specified by the administrator on a
computer (see
Exporting Encryption Certificates on page 197).
2 The destination administrator e-mails the Encryption Certificate file
to the source administrator.
3 The source administrator saves the Encryption Certificate file to a
location on a computer, and then imports the Encryption Certificate
onto the source SKM server (see
Importing Encryption Certificates
on page 198).
4 The source administrator exports the Encryption Keys, assigning the
same Encryption Certificate noted above to wrap (encrypt) the keys.
The file containing the wrapped encryption keys is saved to a
location on a computer specified by the source administrator. See
Exporting Data Encryption Keys on page 199.
5 The source administrator e-mails the file containing the wrapped
encryption keys to the destination administrator.
6 The destination administrator saves the file containing the wrapped
encryption keys to a location on a computer, and then imports the
keys onto the destination SKM server (see
Importing Data
Encryption Keys on page 201).
7 The destination library can now read the encrypted tapes.

Table of Contents

Other manuals for Quantum Scalar i80

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Quantum Scalar i80 and is the answer not in the manual?

Quantum Scalar i80 Specifications

General IconGeneral
Power supply typeAC
Power requirements100 – 240V, 50/60Hz
Power consumption (typical)200 W
Dimensions (WxDxH)445 x 793 x 264 mm
Media types supported2x LTO-4
Maximum supported storage capacity128 TB
Storage temperature (T-T)-40 - 60 °C
Operating temperature (T-T)10 - 35 °C
Operating relative humidity (H-H)20 - 80 %
Media typeTape Cartridge
Form factor6U
Product typeStorage auto loader & library
CertificationIEC 60950, Class A / FCC part 15, ICES-003, CISPR 22, EN55022 Class A, VCCI, CNS 13438, KN22, AS/NZS CISPR 22, EN61000-3-2, EN61000-3-3 EN55024, KN24 CE, VCCI, GS, FCC, ICES, NRTL, GOST, BSMI, KCC
Product colorBlack
Standard interfacesFiber Channel
Weight and Dimensions IconWeight and Dimensions
Weight23800 g

Related product manuals