Select Page

How can you restore encryption USB device in SAN

This is the fourth article in the StoneFly Storage Concentrator Series. The series was created to help users understand how to use the StoneFly Storage Concentrator Virtual Machine™ (SCVM) and how it can help storage administrators manage system operations.

This post guides users through the process of deploying different segments of the StoneFly Storage Concentrator Virtual Machine™. The previous article discussed how volumes can be expanded in the StoneFly Storage Concentrator Virtual Machine™.

This article will cover how you can restore encryption USB device in SAN. It also explains how to setup an encryption USB drive check scheduler. We allow data encryption for the volume security and the volumes cannot be excessed without the encryption keys therefore the encryption keys should not be lost.

Restoring the Encryption Keys to your USB drive

The USB drive holding encryption Keys may be lost or damaged. The Storage Concentrator does not function properly if the Encryption Keys are missing at boot times and other volume configuration points. The Storage Concentrator User Interface allows a non-encrypted USB drive to be formatted and rebuilt as the official encryption USB drive. The non-encrypted USB drive is identified on the System->Admin screen. The USB drive status states that the current USB drive does not contain the encryption information for this Storage Concentrator’s volumes. Once that status is encountered, the USB drive may be rebuilt to contain the encryption information for this Storage Concentrator. The rebuild/repair process requires the Passwords that were used to create the individual volumes. Without these passwords the USB drive cannot be restored.

Steps to restore the Encryption USB drive:

1.  Navigate to the Volumes->Volume Security screen. The default screen contents refer to assigning the volume to a specific host. The screen includes a tab for the “Encryption Keys”. Clicking this tab initiates the USB drive rebuild/repair process, or checks for USB drive presence in the system. The “Rebuild” button has to be used to restore a USB encryption drive by using a new USB device if the old one is not available for some reason. The “Repair” button repairs an existing USB encryption drive if the drive does not have valid encryption information for some of the encrypted volumes.

How can you restore encryption USB device in SAN
2. Click on the Encryption Keys button and then on Rebuild to view the USB drive status. It should appear as shown below. There should not be any encryption information on the drive. If the drive contains information for a different Storage Concentrator, then the status information will notify the user of such.
How can you restore encryption USB device in SAN

3. Insert the “USB device” into the system. Make sure the “USB device” is connected to the VMware ESXi or Hyper-V hypervisor where the SCVM™ is deployed. The “format” button option will format and empty the USB drive. This prepares the USB drive to hold the new encryption information. Click on the “Format” button to start the formatting process.

How can you restore encryption USB device in SAN
A pop-up message confirms the format operation prior to deleting any information from the device. Click on OK to start the format process.
How can you restore encryption USB device in SAN
4. At the end of the format process the Storage Concentrator displays a pop-up message to indicate success or failure. The following message appears after a successful format.
How can you restore encryption USB device in SAN

5. After the formatting process is complete, the screen will be updated to show the first encrypted volume in the Storage Concentrator. Type the correct password in the Password edit field and click on Submit to rebuild the first encryption key. Each different encrypted volume is displayed in a similar screen. Enter the proper password for each volume as they appear in the screen as shown below.

How can you restore encryption USB device in SAN

If the entered password matches the original password, the correct data is placed on the USB drive. If the entered password does not match the original the following message is displayed. Click OK and try again.

How can you restore encryption USB device in SAN

If the original password is not known or found by the time of the next reboot of the Storage Concentrator (such as a software upgrade), the volume will become unusable. Therefore, we strongly encourage users not lose the list of passwords! It is emphatically advised that users make copies of the USB drive!

Encryption USB Drive Check Scheduler

The USB drive holding the Encryption Keys should be present in the system only when encryption volume has to be created or deleted or in case a stand-alone Storage Concentrator has to be rebooted. Most of time the drive should to be stored in a safe place away from the Storage Concentrator. Users can set the scheduler to check for drive presence. If the USB drive is present the scheduler has to generate log message with critical severity level. Users can establish notifications that retransmit all messages with this severity through E-mail or SNMP.

Steps to manage the Scheduler for Checking for the USB Encryption USB Drive:

  • Navigate to the SAN > Volumes > Volume Security > Encryption Keys > Schedule Screen

Select the hour and minutes from the pull down menus and click the Submit button to set the time schedule. To delete the schedule, click on the check box under Remove From Scheduler and then click on the Submit button.

How can you restore encryption USB device in SAN

This concludes the section of setting up volume security in SAN storage. The article discussed about the encryption keys restore in USB drive, as they are important to access data. The next article will be discussing about volume configuration. The step by step process will be explained. If you have any queries you can contact us.

Turla Ransomware: Comprehensive Analysis of the Russian APT

Turla Ransomware: Comprehensive Analysis of the Russian APT

Turla ransomware is a sophisticated cyber threat known for its stealthy operations and advanced infiltration techniques. Leveraging custom malware, zero-day vulnerabilities, and highly targeted attacks, Turla poses a significant risk to corporate networks across...

What is Black Basta Ransomware and How to Defend Against it

What is Black Basta Ransomware and How to Defend Against it

Black Basta, a sophisticated ransomware group, has become a major threat to organizations globally, targeting industries ranging from healthcare to financial services. Known for using double-extortion tactics, Black Basta not only encrypts critical data but also...

S3 Object Storage Cost Comparison: Cloud vs Data Center

S3 Object Storage Cost Comparison: Cloud vs Data Center

S3 object storage cost comparisons between public cloud options and private data centers reveal crucial differences in long-term expenses and scalability. Public cloud providers offer readily available infrastructure and flexibility, but data storage and retrieval...

S3 Object Storage: The Ultimate Solution for AI/ML Data Lakes

S3 Object Storage: The Ultimate Solution for AI/ML Data Lakes

Artificial Intelligence (AI) and Machine Learning (ML) workloads generate and require massive amounts of data, often from diverse sources such as structured databases, unstructured logs, multimedia, and sensor data. To manage this data effectively, enterprises...

Top Reasons to Prioritize NAS Storage Backup in Your IT Strategy

Top Reasons to Prioritize NAS Storage Backup in Your IT Strategy

Backing up your NAS appliance is a non-negotiable requirement for enterprise organizations. While NAS systems offer scalable storage and accessibility, they are still vulnerable to critical risks such as hardware failures, cyberattacks, and data corruption. Without a...

You May Also Like

Subscribe To Our Newsletter

Join our mailing list to receive the latest news, updates, and promotions from StoneFly.

Please Confirm your subscription from the email