HP StoreEver MSL6480 Tape Library User and Service Guide Addendum (QU625-96016, October 2013)

Contents
1 Introduction...............................................................................................4
Security user............................................................................................................................4
Performing the wellness test........................................................................................................5
Managing license keys..............................................................................................................5
User interface enhancements......................................................................................................5
Configuring the system language...........................................................................................5
Using the partition map graphical view...................................................................................5
Viewing library or partition configuration settings.....................................................................6
Configuring the encryption key manager type..........................................................................7
Configuring use of the MSL Encryption Kit....................................................................................7
Errata...................................................................................................................................11
2 Basic control path and data path failover....................................................12
HP LTO-5 and LTO-6 data path port failover overview..................................................................12
HP LTO-5 and LTO-6 control path failover overview......................................................................13
Technology for drive-assisted failover.........................................................................................14
Technology for data path port failover..................................................................................15
Technology for control path failover......................................................................................15
Traditional bridged library control path............................................................................15
Virtual library connection using NPIV...............................................................................16
Failover licenses.....................................................................................................................18
Configuring and verifying control path failover...........................................................................19
Configuration requirements after enabling control path failure..................................................19
Verifying control path failover..............................................................................................20
Hardware-specific requirements...........................................................................................20
Configuring data path port failover...........................................................................................21
Enabling data path port failover..........................................................................................21
Verifying data path port failover..........................................................................................21
3 HP Enterprise Secure Key Manager (ESKM) integration..................................22
ESKM license.........................................................................................................................22
Configuring use of the ESKM....................................................................................................22
4 Support and other resources......................................................................24
Contacting HP........................................................................................................................24
Related information.................................................................................................................24
Websites..........................................................................................................................24
Typographic conventions.........................................................................................................24
5 Documentation feedback...........................................................................26
Contents 3