Creating a security key – Dell POWERVAULT MD3600F User Manual

Page 114

Advertising
background image

114

Configuration: Disk Groups and Virtual Disks

The Secure Physical Disks option is inactive with a check mark on the left if

the disk group is already security enabled.
The Create a secure disk group option is displayed in the Create Disk Group

Wizard - Disk Group Name and Physical Disk Selection dialog. The Create

a secure disk group option is active only when these conditions are met:

• A security key is installed in the storage array.
• At least one security capable physical disk is installed in the storage array.
• All of the physical disks that you selected on the

Physical tab are security

capable physical disks.

You can erase security-enabled physical disks so that you can reuse the drives

in another disk group or in another storage array. When you erase security-

enabled physical disks, ensure that the data cannot be read. When all of the

physical disks that you have selected in the Physical tab are security enabled,

and none of the selected physical disks is part of a disk group, the Secure

Erase option is displayed in the Physical Disk menu.
The storage array password protects a storage array from potentially

destructive operations by unauthorized users. The storage array password is

independent from self encrypting disk and must not be confused with the

pass phrase that is used to protect copies of a security key. It is recommended

that you set a storage array password.

Creating a Security Key

When you create a security key, it is generated by and securely stored by the

array. You cannot read or view the security key.

NOTE:

A copy of the security key must be kept on some other storage medium for

backup in case of system failure or for transfer to another storage array.

A pass phrase that you provide is used to encrypt and decrypt the security key

for storage on other media. When you create a security key, you also provide

information to create a security key identifier. Unlike the security key, you can

read or view the security key identifier. The security key identifier is also

stored on a physical disk or transportable media. The security key identifier is

used to identify which key the storage array is using.

book.book Page 114 Tuesday, June 18, 2013 3:03 PM

Advertising
This manual is related to the following products: