NetBackup™ 10.4 Application Guide
- Product overview
- Release notes
- Geting started
- Creating NetBackup application instances
- Managing NetBackup application instances
- Accessing NetBackup primary and media server instances for management tasks
- Managing users on a primary or a media server instance
- Running NetBackup commands on a primary or a media server application instance
- Managing users on a primary or a media server instance
- Accessing NetBackup WORM storage server instances for management tasks
- Managing users from the deduplication shell
- Managing certificates from the deduplication shell
- Configuring an isolated recovery environment using the web UI
- Managing NetBackup services from the deduplication shell
- Monitoring and troubleshooting NetBackup services from the deduplication shell
- Managing S3 service from the deduplication shell
- Managing users from the deduplication shell
Encrypting backups from the deduplication shell
To encrypt backups on a WORM storage server, you can configure MSDP encryption with or without the Key Management Service (KMS).
Use the following procedures to configure encryption for your backups from the deduplication shell.
To configure MSDP encryption with KMS
- Open an SSH session to the server as the msdpadm user.
- Run the following command:
setting encryption enable-kms kms_server=<server> key_group=<key group>
Where <server> is the host name of the external KMS server and <key group> is the KMS server key group name.
- To verify the KMS encryption status, run the setting encryption kms-status command.
To configure MSDP encryption without KMS
- Open an SSH session to the server as the msdpadm user.
- Run the following command:
setting encryption enable
- To verify the MSDP encryption status, run the setting encryption status command.
The convert-legacy-kms command migrates the legacy index-based KMS to KEK-based KMS. This migration unencrypts the SO records using the legacy KMS key and then re-encrypts the SO record using the active KEK.
To rotate keys for KEK encryption:
Use the rotate-kektag command to create a new KEK and rotate SO records to the new KEK using the new three-tiered KMS system. In this system, KMS keys now encrypt KEKs which in turn encrypt SOs.
The rotate-kms-keys command rotates the KMS keys under the new KMS system. KEKs, which are stored in the KMS proxy database, are unencrypted using the corresponding KMS key and then re-encrypted using the active KMS key.