Nonstop Volume Level Encryption Guide

NOTE:
The NSSuser is a temporary user which you should delete, for security reasons, as soon as
the enrollment process is completed.
As long as the NSSuser local user exists, it will consume a client license. Until you delete it,
you may receive warnings that the number of licences has been exceeded. During the
installation and enrollment process you may ignore these warnings. They are a reminder that
this user should be deleted when enrollment has been completed.
If CLIMs that will be used for encryption are added to the system, you must follow the procedures
to add the NSSuser, register the CLIMs, and delete the user.
9. Verify connection between the CLIM and the key managers
Use SCF to verify that CLIMs and key managers can communicate:
STATUS CLIM, KEYMANAGER
This example shows the display of links to all key managers:
41-> status clim $zzsto.c100281, keymanager
STORAGE - KeyManager Status CLIM \JUN01.$ZZSTO.#C100281
KeyManager 16.107.200.150 OK
KeyManager 16.107.200.122 OK
10. Back up the configuration files
Back up the CLIM configuration files. See the NonStop Cluster I/O Protocols (CIP) Configuration
and Management Manual.
Now the system is ready for the security officer to configure storage devices for encryption.
11. Back up the Key Managers
Back up the key managers. You should also back them up after creating disk volume keys. See
the Enterprise Secure Key Manager Users Guide on the CD shipped with the device for details.
Installation steps 43