Dell POWERVAULT MD3620I User Manual

Page 9

Advertising
background image

Contents

9

Choosing an Appropriate Physical Disk Type

. . . . . .

121

Physical Disk Security with Self
Encrypting Disk

. . . . . . . . . . . . . . . . . . . . .

121

Creating a Security Key

. . . . . . . . . . . . . . .

124

Changing a Security Key

. . . . . . . . . . . . . .

126

Saving a Security Key

. . . . . . . . . . . . . . .

128

Validate Security Key

. . . . . . . . . . . . . . . .

129

Unlocking Secure Physical Disks

. . . . . . . . . .

129

Erasing Secure Physical Disks

. . . . . . . . . . .

130

Configuring Hot Spare Physical Disks

. . . . . . . . .

130

Hot Spares and Rebuild

. . . . . . . . . . . . . . .

132

Global Hot Spares

. . . . . . . . . . . . . . . . .

132

Hot Spare Operation

. . . . . . . . . . . . . . . .

133

Hot Spare Drive Protection

. . . . . . . . . . . . .

133

Enclosure Loss Protection

. . . . . . . . . . . . . . . .

134

Host-to-Virtual Disk Mapping

. . . . . . . . . . . . . .

135

Creating Host-to-Virtual Disk Mappings

. . . . . .

136

Modifying and Removing Host-to-Virtual

Disk Mapping

. . . . . . . . . . . . . . . . . . . .

137

Changing Controller Ownership of the

Virtual Disk

. . . . . . . . . . . . . . . . . . . . .

138

Removing Host-to-Virtual Disk Mapping

. . . . . .

139

Changing the RAID Controller Module

Ownership of a Disk Group

. . . . . . . . . . . . .

139

Changing the RAID Level of a Disk Group

. . . . .

141

Removing a Host-to-Virtual Disk Mapping

Using Linux DMMP

. . . . . . . . . . . . . . . . .

141

Restricted Mappings

. . . . . . . . . . . . . . . . . . .

143

Changing the RAID Controller Module

Ownership of a Virtual Disk or a Disk Group

. . . .

144

Changing the RAID Level of a Disk Group

. . . . . . . .

146

book.book Page 9 Tuesday, June 18, 2013 3:09 PM

Advertising
This manual is related to the following products: