HP 1/8 G2 and MSL Encryption Kit User Guide

Contents
1 Features and overview................................................................................5
Considerations for using the encryption kit...................................................................................5
LTO-4 and later generation tape drives and encryption..................................................................6
Requirements for using the encryption kit.....................................................................................6
Autoloader or library firmware requirements............................................................................7
Tape drive and drive firmware requirements.............................................................................7
Access to the USB port.........................................................................................................8
The key server token LED...........................................................................................................8
The keys on the key server token.................................................................................................9
The token data backup and restore processes.............................................................................11
Scenario 1........................................................................................................................12
Scenario 2........................................................................................................................12
Scenario 3........................................................................................................................12
2 Creating your key management processes...................................................14
When to create a new encryption key.......................................................................................14
Enabling automatic generation of new keys...........................................................................14
Backing up the key server token data........................................................................................14
Managing the token password (PIN).........................................................................................16
Naming key server tokens........................................................................................................16
Maintaining encryption capability in the event of a power loss.....................................................17
3 Installing and configuring the encryption kit.................................................18
Identifying product components................................................................................................18
Preparing the autoloader or library...........................................................................................18
Log in to the remote management interface...........................................................................18
Verify your autoloader or library firmware version..................................................................18
Locate the USB port............................................................................................................19
Preparing the key server tokens.................................................................................................19
Configuring encryption for the MSL6480...................................................................................20
Insert the key server token...................................................................................................21
Enter the PIN.....................................................................................................................21
Configure the encryption mode and features..........................................................................21
Backing up the initial key....................................................................................................28
Optional: Change the security user password........................................................................25
Configuring encryption for the autoloader and other libraries.......................................................25
Insert the key server token...................................................................................................25
Enter the PIN.....................................................................................................................26
Configure the encryption mode and features..........................................................................26
Backing up the initial key....................................................................................................28
4 Using the encryption kit.............................................................................30
Entering the PIN.....................................................................................................................30
After a power cycle.................................................................................................................31
Changing the PIN...................................................................................................................31
Generating a new encryption key.............................................................................................32
Enabling or disabling encryption..............................................................................................33
Backing up the token data.......................................................................................................34
Restoring the token data..........................................................................................................36
Restoring encrypted data.........................................................................................................38
Combining keys from multiple key server tokens..........................................................................39
When to obtain a new key server token.....................................................................................40
Seeding the new key server token.............................................................................................40
Contents 3