Sun Microsystems, Inc.  Oracle System Handbook - ISO 7.0 May 2018 Internal/Partner Edition
   Home | Current Systems | Former STK Products | EOL Systems | Components | General Info | Search | Feedback

Asset ID: 1-71-1679259.1
Update Date:2014-06-18
Keywords:

Solution Type  Technical Instruction Sure

Solution  1679259.1 :   VLE - How to Create USB Copies for Encryption From the VLE Node to the USB Storage Device  


Related Items
  • Sun Virtual Library Extension (VLE)
  •  
Related Categories
  • PLA-Support>Sun Systems>TAPE>Virtual Tape>SN-TP: VLE
  •  




In this Document
Goal
Solution
References


Created from <SR 3-9105141406>

Applies to:

Sun Virtual Library Extension (VLE) - Version 1.4 to 1.4 [Release 1.0]
Oracle Solaris on x86-64 (64-bit)

Goal

 Create USB copies from the VLE node

Solution

This is a procedure is for the field engineer to create USB copies of the encryption keys directly from the VLE node.  Otherwise, the field engineer will make a master copy and the customer will make USB copies from an external USB device that will copy the master to the USB copies.

1. Insert a formatted USB stick

2. Perform the following command.

# source /opt/SUNWvle/scripts/vle_env 

3. Find the name of the media by performing the following command.

# mount | grep media

An example output is as follows.

root@VLE01:/export/home/vleadmin# mount | grep media
/media/VLE005551212 on /dev/dsk/c2t0d0p0:1 read/write/nosetuid/nodevices/rstchown/hidden/nofoldcase/clamptime/noatime/timezone=0/owner=0/group=0/mask=077/dev=3943b10 on Mon Jul 14 16:40:32 2014

4. Copy the key files, run:

# cp *.key /media/VLE005551212

5. Check keys on vle:

# ls -al /lib/svc/method/application/vle/.vle_keystore

Example output

 # ls -al /lib/svc/method/application/vle/.vle_keystore:

  drwxr-xr-x 2 root root 8 Jun 20 22:13 .
  drwxr-xr-x 3 root root 3 Jun 24 15:01 ..
  -rw------- 1 root root 909 Jun 20 22:13 vle-zfs.keys
  -rw-r--r-- 1 root root 1267 Jun 28 15:34 vle-zfs.loc
  -r--r--r-- 1 root root 32 Jun 24 15:01 VLE01_20140624150111001.key
  -r--r--r-- 1 root root 32 Jun 24 15:01 VLE01_20140624150111123.key
  -r--r--r-- 1 root root 32 Jul 14 16:48 VLE01_20140714164820234.key

 

6. Check keys on usb stick: (e.g: mount | grep media should give you the name of the stick as /media/VLE005551212)

# ls -al /media/VLE005551212 

Example output

root@VLE01:/# ls -al /media/VLE005551212/.vle_keystore

drwx------ 1 root root 16384 Jun 14 16:48 .
drwx------ 1 root root 16384 Jun 28 18:57 ..
-r-x------ 1 root root 32 Jun 24 15:01 VLE01_20140624150111001.key
-r-x------ 1 root root 32 Jun 24 15:01 VLE01_20140624150111123.key
-r-x------ 1 root root 32 Jul 14 16:48 VLE01_20140714164820234.key

 

7. Make sure that the file names match. You can use cmp command to compare key files on disk and key files on USB storage device.

# cmp /media/VLE005551212/VLE01_20140624150111001.key /lib/svc/method/application/vle/.vle_keystore/VLE01_20140624150111001.key


Never remove an encryption key from the VLE or from the USB storage device as this may produce unexpected results.

  

References

<NOTE:1679225.1> - VLE - How to verify the encryption keys on a VLE node and/or the USB storage device
<NOTE:1528443.1> - VLE Encryption Information

Attachments
This solution has no attachment
  Copyright © 2018 Oracle, Inc.  All rights reserved.
 Feedback