HP StoreEver MSL Tape Libraries User Manual
Page 3

Contents
Considerations for using the encryption kit...................................................................................5
LTO-4 and later generation tape drives and encryption..................................................................6
Requirements for using the encryption kit.....................................................................................6
Autoloader or library firmware requirements............................................................................7
Tape drive and drive firmware requirements.............................................................................7
Access to the USB port.........................................................................................................8
The key server token LED...........................................................................................................8
The keys on the key server token.................................................................................................9
The token data backup and restore processes.............................................................................11
2 Creating your key management processes...................................................14
Backing up the key server token data........................................................................................14
Managing the token password (PIN).........................................................................................16
Naming key server tokens........................................................................................................16
Maintaining encryption capability in the event of a power loss.....................................................17
3 Installing and configuring the encryption kit.................................................18
Log in to the remote management interface...........................................................................18
Verify your autoloader or library firmware version..................................................................18
Locate the USB port............................................................................................................19
Preparing the key server tokens.................................................................................................19
Configuring encryption for the MSL6480...................................................................................20
Insert the key server token...................................................................................................21
Enter the PIN.....................................................................................................................21
Configure the encryption mode and features..........................................................................21
Backing up the initial key....................................................................................................28
Optional: Change the security user password........................................................................25
Insert the key server token...................................................................................................25
Enter the PIN.....................................................................................................................26
Configure the encryption mode and features..........................................................................26
Backing up the initial key....................................................................................................28
Entering the PIN.....................................................................................................................30
After a power cycle.................................................................................................................31
Changing the PIN...................................................................................................................31
Generating a new encryption key.............................................................................................32
Enabling or disabling encryption..............................................................................................33
Backing up the token data.......................................................................................................34
Restoring the token data..........................................................................................................36
Restoring encrypted data.........................................................................................................38
Combining keys from multiple key server tokens..........................................................................39
When to obtain a new key server token.....................................................................................40
Seeding the new key server token.............................................................................................40
Contents
3