Users Guide
Table Of Contents
O#- 0 |.Z(encryption key manager(EKM))
O#- WLA esLj! WLA E<! 4 $8& O#-Om WLA E<!
- P: $8& qPx# X6OB O#- 0& }:, 8#, ze W /v8v
O5O vxOB Java
™
RA.~n ANW%.
O#-(encryption)
Gv GB mG{N Us8NNM %LM& 8#OB |D8N %LM& ze
OB f}. O#- !I esLj!B #:. WLA VC.ILG %LM& O
#-Om qPx# X6OB % JdQOe~n W _~n! wTGn V@
O
Y. O#- $% W O#- 0B #:. VC.ILG GB #:. -v!- &
xUOY.
P`(compression)
#], s Je, _9 W RJdQ %LM& &EO) 9Ze GB mOG fL
& YLB AN<:.
VC.ILG |. O#-(application-managed encryption)
VC.ILG!- &nOB
WLA O#-.
W<: f}(access method)
b; :d.vM T/bB e! gL!- %LM& L?C0B bz.
W<: e!(accessor)
L 8:dR!B sLj/. N?z YZe G6b! wTKOY. W<: e!
B T/bB(I/O) :WLG, :d.v =T W WLA es
Lj gL!- +..
v& L?UOY.
W$ p:C9L(LCD(Liquid Crystal Display))
D;M W b8 T/bB(I/O) e!! gkOB z|x p:C9L bz.
npM +e(adapter card)
D;M! bI; _!Q 81 8e.
!#:](oersted)
qU.{N ><LM-W%-J(cgs) |Zb C:[GZb Je -
5 \'. !#
:]: 4π ><LMG `fb fLg 1Odn G1!-1| |y P5N )
ZH fm UOOT(: V9kLj ;NGZbe -5TOY.
5}Z(alphanumeric)
.Z, }Z W b8 .Z(9: 6'%)& wTOB .Z <.M |CKOY.
@yNW(Error log)
&
0 GB C:[!- *_! W<:O5O @y $8! zeH%LM <. G
B DO.
B-8
Dell PowerVault LTO WLA esLj gkZ H;-