If you enable another method of encryption, backups will fail. First, define your library: OFF Specifies that drive encryption will not be permitted. When using encryption-capable drives with the Application method, a new format will be used to write encrypted data to tapes. W22D validated with TSM 5. To use these scratch volumes in a drive that is not enabled for encryption, either because the hardware is not capable of encryption or because the encryption method is set to OFF, you must relabel them. This format results in a cartridge capacity of 1.

Uploader: Kazinris
Date Added: 21 May 2009
File Size: 51.39 Mb
Operating Systems: Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X
Downloads: 54160
Price: Free* [*Free Regsitration Required]

W validated with TSM 5. The data encryption feature is currently not supported on Sun StorageTek Ultrium drives. Example Define an encrypted storage pool so that Tivoli Storage Manager is the encryption key manager. U24V validated with TSM 6.

HP StorageWorks LTO-4 Ultrium SCSI Internal WW Tape Drive (EHA) –

This is particularly beneficial for tapes that are removed from the Tivoli Storage Manager server environment to an off-site location. Anyone who has access to both the database backup and the encryption keys has access to your data. All Supported Versions Operating system s: In addition, hl drives within a logical library must use the same method of encryption.

Check here to start a new keyword search. When the parameter is set to ON, backup operations will fail if the hardware is configured for another encryption method. H13D validated with TSM 5. This format results in a cartridge capacity of 1. Application managed encryption is only supported for storage pool volumes.


If you enable the Application method, Tivoli Storage Manager will disable encryption and backups will be attempted. When using Application encryption, you must take extra care to secure database backups since the encryption keys used to encrypt and decrypt data are stored in the server database.

First, define your library: Tivoli Storage Manager generates and stores the keys in the server database. The default value is to allow another method of encryption. Contact and feedback Need support?

Setting up Encrypted Storage Pools You can set up encrypted storage pools to protect tapes that contain critical or sensitive data. When defining a device class for LTO-4 drive, use.

HP LTO-4 StorageWorks Ultrium 1840 SCSI Internal Tape Drive

It specifies whether or xix drive encryption is enabled or can be enabled. If you enable another method of encryption, backups will fail. Tivoli Storage Manager Server. With this method, encryption keys are managed by the application, in this case, Tivoli Storage Manger. Using Drive Encryption In order to utilize drive encryption, your Tivoli Storage Manager environment should be set up so that all drives in a library support the new encryption format. This parameter is optional. OFF Specifies that drive encryption will not be permitted.


Lho4 data is written to volumes using the new format and if the volumes are then returned to scratch, they will contain labels that are only readable by encryption-enabled drives. Data is decrypted on READ operations.

IBM Persistent Reservation Support in Tivoli Storage Manager Server – United States

To ensure that data for off-site volumes is protected, TSM Server can utilize T Encryption protocols to encrypt and decrypt data sent to tape drives which can support T Security protocols.

To disable encryption on new volumes, the parameter should be set to OFF. Watson Product Search Search. Tapes that contain sensitive security or financial information can become an llto4 if data is not encrypted and tapes are lost. ON Specifies that Tivoli Storage Manager is the key manager for drive encryption and will permit drive encryption for empty storage pool volumes only if the Application method is enabled through the hardware.

This method is defined through the device class. In order to restore your data, you must ltto4 the oto4 database backup and corresponding encryption keys to access your information.