No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


Disk Encryption User Guide

OceanStor V5 Series V500R007

This document is applicable to OceanStor 5110 V5, 5110F V5, 5300 V5, 5300F V5, 5500 V5, 5500F V5, 5600 V5, 5600F V5, 5800 V5, 5800F V5, 6800 V5, 6800F V5, 18500 V5, 18500F V5, 18800 V5, and 18800F V5. It introduces how to install and configure key management servers connected to the storage systems that use self-encrypting disks.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Configuring the Internal Key Management Service

Configuring the Internal Key Management Service

After the internal key management service is enabled and configured, keys of the self-encrypting disk domain will be saved in the internal database of the storage system.


SEDs have been configured on the storage system. The AutoLock status of the SEDs is OFF.

To query the AutoLock status of the SEDs, you can log in to the CLI of the storage system and run the show disk general command.

admin:/>show disk general   
ID        Health Status  Running Status  Type  Capacity   Role       Disk Domain ID  Speed(RPM)  Health Mark  Bar Code              Item      AutoLock State       --------  -------------  --------------  ----  ---------  ---------  --------------  ----------  -----------  --------------------  --------  --------------     
DAE000.0  Normal         Online          SSD-SED   366.965GB  Free Disk  --              --          --           2102350LGX10FB000131  02350LGX  OFF            
DAE000.1  Normal         Online          SSD-SED   366.965GB  Free Disk  --              --          --           2102350LGX10FB000124  02350LGX  OFF            
DAE000.2  Normal         Online          SSD-SED   366.965GB  Free Disk  --              --          --           2102350LGX10FB000238  02350LGX  OFF            
DAE000.3  Normal         Online          SSD-SED   366.965GB  Free Disk  --              --          --           2102350LGX10FA000228  02350LGX  OFF            
DAE000.4  Normal         Online          SSD-SED   371.965GB  Free Disk  --              --          --           2102350LGX10FA000227  02350LGX  OFF            
DAE000.5  Normal         Online          SSD-SED   371.965GB  Free Disk  --              --          --           2102350LGX10FA000187  02350LGX  OFF            
DAE100.0  Normal         Online          SSD-SED   366.965GB  Free Disk  --              --          --           2102350LGX10FA000159  02350LGX  OFF            
DAE100.1  Normal         Online          SSD-SED   366.965GB  Free Disk  --              --          --           2102350LGX10FA000161  02350LGX  OFF            
DAE100.2  Normal         Online          SSD-SED   366.965GB  Free Disk  --              --          --           2102350LGX10G3000505  02350LGX  OFF            
DAE100.3  Normal         Online          SSD-SED   366.965GB  Free Disk  --              --          --           2102350LGX10FA000182  02350LGX  OFF            
DAE100.4  Normal         Online          SSD-SED   371.965GB  Free Disk  --              --          --           2102350LGX10G3000511  02350LGX  OFF        

If AutoLock State is OFF, disk encryption is disabled.


  1. Log in to DeviceManager.
  2. Enable and configure the internal key service.

    1. Choose Settings > Storage Settings > Value-added Service Settings > Key Service.

      The Key Service page is displayed.

    2. Select Enable the internal key management service.
    3. Optional: Configure a key backup policy.

      When a key changes, the storage system automatically backs up the key's information on the backup server, ensuring that the key can be recovered if it is damaged.

      Before using the key backup function, ensure that the backup server has been successfully configured and communicates properly with the storage system. Table 2-1 lists the SSH key exchange algorithms supported by the storage system. When deploying the backup server, use SFTP server tools that support these key exchange algorithms, such as xlight FTP.

      Table 2-1 SSH key exchange algorithms


      Default Value


      • ecdh-sha2-nistp256
      • ecdh-sha2-nistp384
      • ecdh-sha2-nistp521
      • diffie-hellman-group-exchange-sha256
      • diffie-hellman-group-exchange-sha1
      • diffie-hellman-group14-sha1

      For details about how to use xlight FTP, see Using the xlight FTP Tool to Deploy the FTP Backup Server.

      1. Click Enable after Key Backup to enable the key backup.
      2. Set the parameters listed in Table 2-2.
        Table 2-2 Parameters related to the key backup





        Used by the storage system to back up keys to the backup server.

        You can choose SFTP or FTP.


        The storage systems support FTP for compatibility concerns. You are advised to use SFTP, however, to ensure data transmission security.

        Backup Server Address

        IP address or domain name of the SFTP or FTP server used to back up keys


        Backup Server Storage Path

        Path for saving keys on the backup server




        Used to log in to the backup server




        Used to log in to the backup server




        Port for communication between the backup server and the storage system

        [Value range]

        From 1 to 65535



      3. Click Test to test the connectivity between the backup server and the storage system.
    4. Click Save to save the configurations of the internal key service.
      • If Key Backup is not enabled, a security alert dialog box is displayed. Select I have read and understand the consequences associated with performing this operation and click OK. The Execution Result dialog box is displayed, indicating that the operation succeeded.
      • If Key Backup is enabled, the Execution Result dialog box is displayed, indicating that the operation succeeded.

  3. Create a self-encrypting disk domain and automatically generate encryption keys on the storage system.

    1. Choose Provisioning > Disk Domain.
    2. Click Create.

      The Create Disk Domain dialog box is displayed, as shown in Figure 2-1.

      Figure 2-1 Creating a disk domain
    3. Name and describe the disk domain.
      1. In Name, enter a name for the disk domain.
        • Each disk domain has a unique name.
        • A disk domain name can contain only letters, digits, underscores (_), hyphens (-), periods (.), and Chinese characters.
        • A disk domain name contains 1 to 31 characters.
      2. In Description, enter the usage and properties of the disk domain. The descriptive information helps identify the disk domain.
    4. Set Encryption Type to Self-Encrypting Disk.
    5. Select disks to be contained in the disk domain using any of the following methods:
      • Select All available disks.
      • Select Specify disk type.
        1. Select a storage tier.
        2. Set the number of disks that compose the storage tier.
      • Select Manually select.
        1. Click Select.
        2. In the Select Disk dialog box, select desired disks and click .
        3. Click OK to finish selecting disks.
        • You are advised to create a disk domain using Manually select. Ensure that the disk domain is made up of disks from the same engine. This will reduce disk failure rates and improve disk read/write performance.
        • If you want to create RAID 10 storage pools in the new disk domain, manually select disks for each storage tier in the disk domain and ensure that an even number of disks in each storage tier belong to the same engine. Such a configuration ensures the reliability of RAID 10 storage pools.
    6. Click OK.

      A message is displayed indicating that the operation succeeded.

    7. Click OK to finish creating the disk domain.

      After creating the disk domain, choose Provisioning > Disk Domain to check that the AutoLock status of disks in the current disk domain is Enable.

  4. Export the encryption key.

    1. Choose Settings > Storage Settings > Value-added Service Settings > Key Service.
    2. Click Export Internal Keys to export the key file using the browser.

    Save the exported key file properly and do not make any change. When the key is damaged, this file can be used for recovery.

Follow-up Procedure

  • After creating the self-encrypting disk domain, you can create LUNs or file systems to allocate the storage space to application servers. For details, see Basic Storage Service Configuration Guide for Block or Basic Storage Service Configuration Guide for File of the corresponding product model.
  • When updating self-encrypting disk domain keys, export keys in time.
  • On DeviceManager, you can choose Settings > Export Data > Running Data to export running data. You can query the key management configurations in the running data.
Updated: 2019-07-11

Document ID: EDOC1000181504

Views: 23007

Downloads: 181

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next