![]() The 3-pass erase method overwrites all addressable locations with a character, its complement, then a random character, and finally verifies the results. In general, Secure Eraser has two types of erasure methods: 3-pass erase and crypto erase. The Secure Eraser utility works on both database servers and storage servers and covers all Exadata Database Machines V2 or higher.īased on hardware capabilities, different secure erasure methods are applied. ILOM will remain accessible through serial console. Theįollowing figure shows a sample certificate from Secure Eraser.Ĭaution:The server will become unbootable after the system devices are securely erased, and ILOM will no longer be remotely accessible after being reset to factory default. With a list of devices that have been securely erased. When the secure erasure is completed, a certificate is generated for each server Secure Eraser periodically generates a progress report every 10 seconds so that you can easily monitor the progress. Or, you can choose to do it interactively and choose to erase specific types of storage devices. The entire process can be completely automated without any user intervention. You can choose to initiate a secure erasure either through PXE or through an external USB. Secure Eraser comes with flexible options. TheĬryptographic erasure method used by Secure Eraser is fully compliant with the NIST Possible to provide better security and faster speed. Secure Eraser automatically detects the hardwareĬapability of a storage device and picks the best erasure method That the total time should be approximately the time it takes to erase whichever This means that the total time to securely erase anĮntire rack is the same regardless of whether it's a quarter, half, or full rack, and For each device type, all devices areįurther securely erased in parallel. Internal USBs) are securely erased in parallel. Server, all device types (such as hard drives, flash devices, persistent memory and All Oracle Exadata Database Servers and Oracle Exadata Storage Servers are securely erased in parallel. To achieve the best possible performance, secure erasure is performed in parallel atĮvery layer on an Exadata Database Machine. The solution securely erases all data on both database servers and storage servers, and resets the internal network switches, the Ethernet switches, and the power distribution units back to factory default. Secure Eraser is a comprehensive solution that covers all Exadata Database Machines V2 or higher, including both 2-socket and 8-socket servers. InfiniBand Network Fabric switches or RoCE Network Fabric switches ![]() Resetting Network Switches and Power Distribution Units to Factory DefaultĪfter performing a secure erase, the system is ready for return or re-imaging.Įxadata Database Machine consists of the following components:.Secure Eraser securely erases all data on both database servers and storage servers, and resets InfiniBand Network Fabric or RDMA over Converged Ethernet (RoCE) switches, Ethernet switches, and power distribution units back to the factory default. Interactive Secure Eraser through External USB.Starting with Exadata Database Machine X7-2, you can use EFI Network Boot when using Secure Eraser. Interactive Secure Eraser through Network Boot. ![]() ![]() On Exadata systems prior to Exadata Database Machine X7-2, you can use Preboot Execution Environment (PXE) Boot when performing a Secure Eraser. Interactive Secure Eraser through PXE Boot. ![]() In this procedure, you configure Secure Eraser to run automatically when you reboot the nodes.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |