立即与支持人员聊天
与支持团队交流

NetVault 13.2 - Built-in Plug-ins User Guide

Using Plug-in for Encryption

Using Plug‑in for Encryption

About Plug-in for Encryption

About Plug-in for Encryption

NetVault offers four encryption options:

CAST128: CAST-128 is a 12- or 16-round Feistel network with a 64-bit block size and a key size of between 40 to 128 bits, but only in 8-bit increments.
CAST256: CAST-256 uses the same elements as CAST-128, but it is adapted for a block size of 128 bits — twice the size of its 64-bit predecessor. Acceptable key sizes are 128, 160, 192, 224 and 256 bits. CAST-256 is composed of 48 rounds, sometimes described as 12 “quad-rounds”, arranged in a generalized Feistel network.
AES256: Advanced Encryption Standard (AES) is an encryption standard adopted by the U.S. government. The standard consists of three block ciphers, AES-128, AES-192, and AES-256. Each AES cipher has a 128-bit block size, with key sizes of 128, 192 and 256 bits, respectively. When you select the AES256 option, the plug-in uses a FIPS compliant AES-256 encryption algorithm to encrypt backups.
AES256_OLD: Select this option for the plug-in to use the non FIPS compliant AES-256 encryption algorithm to encrypt backups, specifically when FIPS compliance is not a requirements for your backups and you prefer using the non FIPS compliant AES-256 algorithm to benefit backup speeds.

These options encrypt and transfer data across the network to the backup device, where the data remains encrypted until restored to the client. If encryption is only required for secondary storage, job-level encryption offers the choice of encrypting only the secondary copy while the primary backup remains unencrypted to shrink the backup window. When using disk-based storage devices, job‑level deduplication allows you to separate deduplicated from non deduplicated unencrypted data for optimal deduplication ratios and performance.

For a list of NetVault Plug-ins that are incompatible with the Plug‑in for Encryption, see the respective release notes.

Encryption strategy overview

When defining an encryption strategy, you must determine the following:

Selecting which backups to encrypt

NetVault performs software-based encryption. The backup stream is encrypted using the selected algorithm by the NetVault Server or Client for which the plug-in is enabled. The encrypted data stream is transferred over the network to the backup device where it remains encrypted. During restore, the encrypted backup is transferred from the backup device to the targeted NetVault Client, where the plug-in completes the decryption.

The backup encryption and decryption processes are performed by the plug-in on the NetVault Server or Client. These processes use resources on the machine. The encryption process lengthens the time it takes to perform backups, while the decryption process lengthens the time it takes to perform restores. The impact to the performance of the client, backup window, and restore time should be considered when deciding which backups must be encrypted. In summary, backups should only be encrypted when security requirements outweigh the impact to performance, backup windows, and restore times.

相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级