Restoring Non-LDT Backup Data to an LDT GuardPoint
This section describes how to restore data encrypted with a non-versioned key to an LDT GuardPoint.
If the backup was performed with the Apply Key effect, the backup files are in clear text. Simply restore the clear text files to the LDT GuardPoint with the Apply Key effect. All files will be encrypted with the versioned key.
If the backup of the non-LDT GuardPoint was performed without the Apply Key effect, the backup is encrypted, and you must do the following:
Note
The following example is for a manual guarding. The steps may differ slightly if your GuardPoint is configured for auto guard.
-
Create a temporary directory for restoring the files, type:
mkdir -p /oxf-fs1/tmp_restore
-
Restore the encrypted backup files into the temporary directory, type:
cp -pr /backup-media/oxf-fs1/gp1/data_files/* /oxf-fs1/tmp_restore
-
Create a Standard Policy with the Apply Key effect for all operations, using the same key as the policy applied on the GuardPoint at the time of backup.
-
Create and enable a new GuardPoint for the temporary directory using the Standard Policy just created.
secfsd -guard /oxf-fs1/tmp_restore
-
Ensure that the temporary GuardPoint and LDT GuardPoint are both enabled.
secfsd -status guard GuardPoint Policy Type ConfigState Status Reason ---------- ------ ---- ----------- ------ ------ /oxf-fs1/gp1 LDT_AES256 manual guarded guarded N/A /oxf-fs1/tmp_restore AES256 manual guarded guarded N/A
-
Move the restored files from the temporary folder to the GuardPoint enabled with the LDT policy. The CTE agent encrypts the files in the LDT GuardPoint using the current key version in effect for the LDT policy.
mv /oxf-fs1/tmp_restore/* /oxf-fs1/gp1
-
Unguard the temporary GuardPoint and remove the temporary restore directory.
secfsd -unguard /oxf-fs1/tmp_restore rm -fr /oxf-fs1/tmp_restore
-
Delete the temporary GuardPoint on the CipherTrust Manager.