User's Guide

Scalar i500 User’s Guide vii
Configuring and Viewing the Media Security Log................................... 143
Viewing the Media Usage Log..................................................................... 144
Automatically E-mailing Advanced Reporting Reports and Logs......... 145
Chapter 5 Capacity on Demand 147
Chapter 6 Storage Networking 149
About the Storage Networking License...................................................... 150
Configuring Control Path Failover.............................................................. 150
Forcing Control Path Failover............................................................... 151
Configuring Data Path Failover................................................................... 154
Enabling Data Path Failover ................................................................. 155
Forcing Data Path Failover.................................................................... 157
Configuring Host Access .............................................................................. 160
Registering a Host for Host Access...................................................... 161
Enabling Tape Drives for Host Access ................................................ 162
Mapping a Host to Tape Drives and Partitions.................................. 163
Modifying a Host.................................................................................... 163
Deleting a Host........................................................................................ 164
Chapter 7 Encryption Key Management 165
KMIP-compliant Encryption Key Management........................................ 167
General Notes About Encryption on the Library............................... 168
About the EKM License ......................................................................... 168
Configuring Encryption Key Management on the Library ..................... 169
Using EKM Path Diagnostics................................................................ 183
Differences Between Manual and Automatic EKM Path
Diagnostics ....................................................................................... 184
Using Manual EKM Path Diagnostics ................................................. 185
Using Automatic EKM Path Diagnostics ............................................ 186
Viewing and Changing the Active Key Server................................... 187
Viewing Tape Drive Encryption Settings............................................ 188
Performing Scalar Key Manager Functions on the Library.............. 188
FIPS-Certified Encryption Solution............................................................. 199
Configuring the Library for FIPS.......................................................... 200