Nonstop Volume Level Encryption Guide

Clearing tape drive encryption ............................................................................................52
Tape drive hardware replacement........................................................................................52
4 Maintenance...........................................................................................53
Security.................................................................................................................................53
License..................................................................................................................................53
ESKM license.........................................................................................................................53
SCF commands......................................................................................................................53
STATUS SUBSYS $ZZSTO....................................................................................................53
STATUS CLIM, ENCRYPTION...............................................................................................54
STATUS CLIM, KEYMANAGER.............................................................................................54
STATUS CLIM, KEYCHANGE...............................................................................................54
STATUS DISK, ENCRYPTION...............................................................................................55
STATUS DISK, ENCRYPTION, DETAIL....................................................................................55
STATUS TAPE, ENCRYPTION...............................................................................................55
Troubleshooting......................................................................................................................56
Fallback................................................................................................................................57
Adding CLIMs .......................................................................................................................57
A Encryption background.............................................................................58
Glossary of terms used in this manual............................................................59
Index.........................................................................................................61
4 Contents