8 Contents
Locating a Disk Group . . . . . . . . . . . . . . 104
Creating Virtual Disks . . . . . . . . . . . . . . . 104
Changing the Virtual Disk Modification
Priority
. . . . . . . . . . . . . . . . . . . . . . 106
Changing the Virtual Disk Cache Settings . . . . 107
Changing the Segment Size of a
Virtual Disk
. . . . . . . . . . . . . . . . . . . . 109
Changing the I/O Type. . . . . . . . . . . . . . . 110
Choosing an Appropriate Physical Disk Type . . . . . 111
Physical Disk Security With Self Encrypting Disk
. . 112
Creating a Security Key
. . . . . . . . . . . . . . 114
Changing a Security Key
. . . . . . . . . . . . . 116
Saving a Security Key. . . . . . . . . . . . . . . 117
Validate Security Key
. . . . . . . . . . . . . . . 118
Unlocking Secure Physical Disks
. . . . . . . . . 119
Erasing Secure Physical Disks . . . . . . . . . . 119
Configuring Hot Spare Physical Disks. . . . . . . . . 120
Hot Spares and Rebuild
. . . . . . . . . . . . . . 122
Global Hot Spares
. . . . . . . . . . . . . . . . . 122
Hot Spare Operation
. . . . . . . . . . . . . . . 122
Hot Spare Drive Protection . . . . . . . . . . . . 123
Enclosure Loss Protection
. . . . . . . . . . . . . . . 123
Host-to-Virtual Disk Mapping
. . . . . . . . . . . . . 125
Creating Host-to-Virtual Disk Mappings
. . . . . 126
Modifying and Removing Host-to-Virtual
Disk Mapping . . . . . . . . . . . . . . . . . . . 127
Changing Controller Ownership of
the Virtual Disk
. . . . . . . . . . . . . . . . . . 128
Removing Host-to-Virtual Disk Mapping
. . . . . 129
Changing the RAID Controller Module
Ownership of a Disk Group
. . . . . . . . . . . . 129
book.book Page 8 Friday, September 23, 2011 2:46 PM