Mantenha tudo organizado com as coleções
Salve e categorize o conteúdo com base nas suas preferências.
O dispositivo com isolamento físico do Google Distributed Cloud (GDC) usa criptografia de disco baseada no Linux Unified Key Setup (LUKS) com Yubikeys.
Para cada dispositivo isolado do GDC, três ou mais YubiKeys são enviadas separadamente ao cliente. As Yubikeys são certificadas pelo FIPS 140-2. Para mais informações sobre o modelo Yubikey, consulte
https://www.yubico.com/product/yubikey-5-nano-fips/.
As portas USB em cada blade de servidor do dispositivo são ativadas com dongles USB.
As YubiKeys são inseridas nas máquinas do servidor como parte da configuração do dispositivo.
Depois que a instalação for concluída, as YubiKeys precisam ficar no servidor até que você
remova para transporte ou
devolva o sistema. Transfira as YubiKeys separadamente do appliance para evitar o roubo do servidor.
[[["Fácil de entender","easyToUnderstand","thumb-up"],["Meu problema foi resolvido","solvedMyProblem","thumb-up"],["Outro","otherUp","thumb-up"]],[["Difícil de entender","hardToUnderstand","thumb-down"],["Informações incorretas ou exemplo de código","incorrectInformationOrSampleCode","thumb-down"],["Não contém as informações/amostras de que eu preciso","missingTheInformationSamplesINeed","thumb-down"],["Problema na tradução","translationIssue","thumb-down"],["Outro","otherDown","thumb-down"]],["Última atualização 2025-09-04 UTC."],[[["\u003cp\u003eGoogle Distributed Cloud (GDC) air-gapped appliances utilize LUKS-based disk encryption in conjunction with Yubikeys.\u003c/p\u003e\n"],["\u003cp\u003eEach GDC air-gapped appliance is shipped with a minimum of three FIPS 140-2 certified Yubikeys.\u003c/p\u003e\n"],["\u003cp\u003eYubikeys must remain in the server machines after installation, except when removing them for transport or returning the system.\u003c/p\u003e\n"],["\u003cp\u003eThe Yubikeys, inserted via USB dongles on the server blades, should be transferred separately from the appliance for security reasons.\u003c/p\u003e\n"]]],[],null,["# Boot disk encryption\n\nGoogle Distributed Cloud (GDC) air-gapped appliance uses Linux Unified Key Setup (LUKS) based disk\nencryption with Yubikeys.\n\nFor each GDC air-gapped appliance, three or more Yubikeys are shipped separately\nto the customer. The Yubikeys are FIPS 140-2 certified. For more information on the Yubikey model, see\n\u003chttps://www.yubico.com/product/yubikey-5-nano-fips/\u003e.\n\nThe USB ports on each server blade of the device are enabled with USB dongles.\nThe Yubikeys are inserted into the server machines as part of the device setup.\nAfter the installation completes, the Yubikeys must stay in the server until you\n[remove them for transport](/distributed-cloud/hosted/docs/latest/appliance/admin/shutdown#remove_yubikeys) or you\n[return the system](/distributed-cloud/hosted/docs/latest/appliance/admin/return-device). Ensure that the Yubikeys\nare transferred separately from the appliance to protect against server theft."]]