Enter a hex key, Enter an ascii (text) key, System installation process – Storix Software SBAdmin Linux System Recovery Guide User Manual

Page 38: After booting from a network boot server, Verifying the hardware configuration

Advertising
background image

Storix System Backup Administrator

38

Version 8.2 Linux System Recovery Guide

Enter a HEX Key

The length of the key will depend on the number of bits of encryption. For 128-bit encryption, a 32-byte
hexadecimal number is required. For 192-bit encryption, a 48-byte number is needed, and for 256-bit
encryption, a 64-byte hex number is needed. Select option 1 from the list above, then when prompted to
"Enter your 32-byte HEX key (or press Enter to reselect key type)", enter they key, or
press Enter to return to the options above.

Enter an ASCII (text) Key

The length of the key will depend on the number of bits of encryption. For 128-bit encryption, a 16-byte
ASCII string is required. For 192-bit encryption, a 24-byte string is needed, and for 256-bit encryption, a 32-
byte string is needed. Select option 1 from the list above, then when prompted to "Enter your 16-byte

ASCII (text) key (or press Enter to reselect key type)

", enter they key, or press Enter to

return to the options above.

The key you enter will be converted to an appropriate hexadecimal number and used to decrypt the data,
just as if you entered the hex key yourself.

Upon entry of a valid key, the restoration of the data will continue. If an invalid key is entered, you will be
informed so, and returned to the above menu of options.

System Installation Process

After booting from a network boot server

When the system is booted from the network, the client network installation options will also be copied from
the boot server to the client. Any installation options setup when the client was configured for network boot
(see

Enable/Disable Network Installation of a Client

) will be used by default for the installation. These pre-

set defaults may include the install server and device, the console device and terminal type, the backup
sequence number, or anything else required for the installation to proceed with no required input from the
user. If the user selected a no-prompt installation (see

No-Prompt Installation

above), the installation will

continue automatically. Otherwise, the installation menus will appear and the user may manually change
any prior defaults, add any settings that were not pre-configured, or continue the installation process with
the current settings.

Verifying the hardware configuration

Once the backup media is selected, and you chose to either continue the installation with the current
settings or to change the storage configuration, the following will occur:

1. The disks defined on the backup are compared against the current system’s hardware configuration. If

there are problems that would prevent the backup from being installed onto the system, such as
missing disks or disks that are too small to contain the backup data, a list of messages indicating the
problems will be displayed and the user will be required to either make changes manually or may select
to automatically fix any problems that are non-fatal.

2. Non-fatal errors are those that require changes to the configuration in order to allow the data to be

restored, although some settings may differ from those of the original system. If such non-fatal errors
occur when checking the system information, you will be provided the option of automatically fixing the
errors. You may also change the storage configuration manually to either add more disk space or
change other attributes manually that would allow it to fit on the new hardware.

More details of the verification that takes place are described later in

Verification Process

.

Advertising