Users Guide

Encryption Key Manager!-Bk* W qk* 0&pN gkUOY. k* O#-
B gkZ GB #:. %LM& !. O#-OB fl!, qk* O#-Bk* 0&
8#OB fl(S5! u@2)! gkKOY.
keytoolz0:/?.<& gkO) Encryption Key Manager! kQ O#- 0&
}:R v V@OY. AES 0& }
:OB %Sz L& WLA esLj! |[OB f
D: O#- |. f}! {s Y(OY. W/* Encryption Key Manager!- O#
- 0& gkOB f}z Y% @kANW%!- gkOB f} gLG wL& LXO
i 5rL I v V@OY.
Dell Encryption Key Manager!-G O#- 0 3.
sLj/.!- |.OB WLA O#-G fl O#-Gv J: %LMB LTO 4 G
B LTO 5 WLA esLjN |[Gn Encryption Key Manager!- gk !IQ
0 zeRG g|! }:H k* %LM0(DK)& gkO) O# X:.N //H D
YC WLA! bOKOY. Encryption Key ManagerB sne Ns
fD8N g|!
}:H DK& 1CUOY. )/ 3G WLA +..v!- g| }:H DK v! N7
Q fl DK& YC gkUOY.DKB Encryption Key Manager!- O#- GB
&NH gD8N LTO 4 GB LTO 5 WLA esLjN |[KOY. LTO 4 W LTO
5 WLA esLjB L/Q DK& &
NX&O) O#- GB O# X6! gkUO
Y. W/* &NX&Gv J: 0B LTO 4 GB LTO 5 WLA +..vG SGG
'!! zeKOY. O#-H <}L bOGi DKB <}!- P: x-kN 0m G
B 0 9Lm! {s W<: !IOm Encryption Key Manager!- gkR v Vn
_ UOY. 1-8
dLvG W2 1-3!- L AN<:& 8)]OY.
Dell Encryption Key Manager!-B LTO O#-& 'Q k* 0& 0 Wl8N 6
wOB bI5 &xUOY. L' O#-OB %LM /|, L %LM! W<:OB g
kZ GBY% _dQ /!! {s 0& Wl-R v V@OY. Z<Q
$8B 3-16
dLvG :0 Wl [: W |.;& |6OJC@.
Y% @kANW%!- O#- 0 3.
@kANW%!- |.OB WLA O#-G fl O#-Gv J: %LMB LTO 4 W
LTO 5 WLA esLjN |[Gn Xg @kANW%!- &xOBk* DK& g
kO) O# X:.N //H D YC WLA! bOKOY.DKB WLA +..vG
SGG '!! zeG
v J@OY. O#-H <}L bOGi DKB 9& in <}!
- P: x-kN @kANW%!- gk !IQ '!, -v %LM#L:! Vn_ U
OY.
@kANW%!- |.OB O#-G fl LTO 4 W LTO 5 WLA esLjB
Yosemite(Dell PowerVault TL2000 W TL4000 WLA sLj/.k), CommVault
W
Symantec Backup ExecM 0:@kANW%; gkR v V@OY.
& 1 e WLA O#- 3d 1-7
|
|
|
|
|
|
|
|