The Volumes remount.Resolving foreign volumesIf a provisioned MD1200 is powered off or disconnected and then later powered back on, an eventappears on the Core Console reporting that the MD1200 is connected. However, no task appears on theAppliance tab Tasks screen that permits you to recover it. The Enclosures screen reports the MD1200 asbeing in a foreign state and the repositories on the foreign virtual disks as off-line.To resolve foreign volumes:1. From the Core Console, select the Appliance tab, and then click Remount Volumes.The volumes remount.2. Select the Configuration tab, and then click Repositories.3. Expand the repository with the red status indicator by clicking > next to Status.4. To verify the repository integrity, under Actions, click Check.Recovering a repositoryWhen the appliance fails to import a repository, it reports the failure in the Tasks screen with the taskstatus indicated by a red circle, and the status description reporting Error, Completed — Exception. Toview the error details from the Tasks screen, expand the task details by clicking > next to the Statuscolumn. Status Details reports that the recovery task status is exception, and the Error Message columnprovides additional details about the error condition.To recover a repository from a failed import state:1. Navigate to the Core Console.The Repositories screen displays the failed repository with a red status indicator.2. Click Configuration → Repositories.3. Expand the failed repository by clicking > next to Status.4. From the Actions section, click Check, and then click Yes to confirm that you want to run the check.The appliance recovers the repository.Managing securityThe Core can encrypt protected machine snapshot data within the repository. Instead of encrypting theentire repository, you can specify an encryption key during the protection of a machine in a repositorywhich lets the keys be reused for different protected machines. Encryption does not affect performance,as each active encryption key creates an encryption domain, thus letting a single core supportmultitenancy by hosting multiple encryption domains. In a multi-tenant environment, data is partitionedand deduplicated within the encryption domains. Because you manage the encryption keys, loss of thevolume cannot leak the keys. Key security concepts and considerations include:• Encryption is performed using 256 bit AES in Cipher Block Chaining (CBC) mode that is compliantwith SHA-3.• Deduplication operates within an encryption domain to ensure privacy.• Encryption is performed without impact on performance.• You can add, remove, import, export, modify, and delete encryption keys that are configured on theCore.• There is no limit to the number of encryption keys you can create on the Core.37