File Share Encryption

 View Only
  • 1.  Recent iSCSI issue caused corruption inside PGP Universal Server, running in VMWare 5.0

    Posted Apr 17, 2012 09:36 AM

    After a recent issue with our iSCSI network, which caused our VMware cluster to perform an HA on all VMs, the PGP Universal Server appears to have gotten a disk that has errors and will not mount.  The system is asking for the 'root' password in order to manually run a disk check, however, there was never a 'root' user created, only an 'admin' user.  The admin users password is not being accepted. 

    I have a support case open, however, I'm not getting any response to it, other than one garbled voice mail message.

    What are the implications of making another server, if I am unable to correct the disk error on the existing server?

    Thanks

     



  • 2.  RE: Recent iSCSI issue caused corruption inside PGP Universal Server, running in VMWare 5.0

    Posted Apr 17, 2012 10:16 AM

    Root user account could be used only with SSH access to the server, if you ever configured one. See http://www.symantec.com/business/support/index?page=content&id=TECH149673

    If you have a current backup outside PGP server and Organization Key has been exported then making another server should be no problem. It will, however, prompt all PGP Desktop users to accept a default cert coming from new server once it is up. And then, after you import your real Organization Key it will prompt them again to accept properly signed cert. Once the server is up you can easily restore the most recent backup. Treat the whole process as upgrading to 3.2.0 found here http://www.symantec.com/business/support/index?page=content&id=DOC4565



  • 3.  RE: Recent iSCSI issue caused corruption inside PGP Universal Server, running in VMWare 5.0

    Posted Apr 17, 2012 10:42 AM

    This link was the fix. 

     

    http://www.symantec.com/business/support/index?page=content&id=TECH149120&actp=search&viewlocale=en_US&searchid=1334671050961

     

    Apparently there is no root password available.