Release Note для Spectra Logic spectra t120
Restoring Encrypted Data
December 2008
Spectra T950 Library
139
Spectra Logic recommends tracking the information listed in the following
table for every key that you create. For added security, encrypt the file
containing the tracking information.
table for every key that you create. For added security, encrypt the file
containing the tracking information.
Restoring Encrypted Data
Restoring encrypted data from tape follows the standard data restore
processes that you use with your backup software. The only difference is
that the key used to encrypt the data being restored needs to be on the
library and assigned to the partition in which the encrypted media is
loaded. If the key is available, the data is automatically decrypted as it is
read from tape; standard restore procedures simply work.
processes that you use with your backup software. The only difference is
that the key used to encrypt the data being restored needs to be on the
library and assigned to the partition in which the encrypted media is
loaded. If the key is available, the data is automatically decrypted as it is
read from tape; standard restore procedures simply work.
If the encryption key required for a specific set of encrypted data has been
exported from the library and then deleted, the library prompts you with
the moniker of the key that is required to decrypt the data. You can use the
key moniker to identify the key, then import the key into the library as
described in this section.
exported from the library and then deleted, the library prompts you with
the moniker of the key that is required to decrypt the data. You can use the
key moniker to identify the key, then import the key into the library as
described in this section.
Endura Decryption Utility (EDU) is an optional command-line encryption
utility which provides a method that lets you restore data without loading
the media into the library. See
utility which provides a method that lets you restore data without loading
the media into the library. See
for detailed information about using this utility.
Key Moniker: _____________________________________________
Number of key copies ______
Location of each copy:
_________________________________________________________
_________________________________________________________
_________________________________________________________
_________________________________________________________
_________________________________________________________
_________________________________________________________
Password(s) associated with exported copy of the moniker:
_________________________________________________________
_________________________________________________________
_________________________________________________________
_________________________________________________________
_________________________________________________________
_________________________________________________________
Location of data stored on mobile media, which has been encrypted
using this moniker:
_________________________________________________________
_________________________________________________________
_________________________________________________________
using this moniker:
_________________________________________________________
_________________________________________________________
_________________________________________________________
Moniker creation date:______________________________________
Proposed expiration date: ___________________________________
Important
You need this password
and
the encrypted file containing the key to import the
encryption key. Without the key password, you will not be able to import the
encryption key.
encryption key.