Users Guide

Table 34. New encryption key details (continued)
Text Box Description
Confirm
Passphrase
Re-enter the passphrase. It is used to confirm the passphrase entry.
4. Click OK.
The dialog box closes. The encryption key you specified has been applied to future backups for this protected machine, and
the lock now appears as closed.
Optionally, if you want the encryption key applied immediately, force a snapshot. For more information, see Forcing a
snapshot on page 231.
CAUTION: Rapid Recovery uses AES 256-bit encryption in the Cipher Block Chaining (CBC) mode with 256-
bit keys. While using encryption is optional, Dell recommends that you establish an encryption key, and that
you protect the passphrase you define. Store the passphrase in a secure location as it is critical for data
recovery. Without a passphrase, data recovery is not possible.
Disassociating an encryption key from a protected machine
Once an encryption key is applied to a protected machine, all subsequent snapshot data stored in the Rapid Recovery Core is
encrypted.
You can disassociate an encryption key from a protected machine. This action does not decrypt the existing backup data, but
does result in a new base image for that machine at the time of the next scheduled or forced snapshot.
NOTE:
If you want to remove an encryption key from the Core, as described in the topic Removing an encryption key on
page 78, you must first disassociate that encryption key from all protected machines.
Perform this procedure to disassociate an encryption key from a specific protected machine.
1. Navigate to the Rapid Recovery Core and click Protected Machines.
The Protected Machines page appears, listing all the machines protected by this Core. An open lock
appears for any
machine that does not have an encryption key applied. A closed lock indicates that a protected machine has encryption
applied.
2. In the Protected Machines pane, click the Encrypted icon for the protected machine you want to configure.
The Encryption Configuration dialog box appears.
3. Select Encrypt data using Core-based encryption with an existing Key, and from the drop-down menu, select (None)
and then click OK.
4. If you want to remove this encryption key from the Rapid Recovery Core, first repeat this procedure for all protected
machines using this key. Then perform the procedure described in the topic Removing an encryption key on page 78.
Managing encryption keys
To manage encryption keys for the Rapid Recovery Core, from the icon bar, click (More) and then select Encryption Keys.
The Encryption Keys page appears. For each encryption key added to your Rapid Recovery Core (if any have been defined
yet), you see the information described in the following table.
Table 35. Information about each encryption key
UI Element Description
Select Item For each encryption key, you can select the checkbox to perform actions from the list of menu options
above the table.
Name The name associated with the encryption key.
Working with the DL Appliance Core 73