Table of Contents
1. Function 14
RAID Functions.............................................................................................................................. 16
Supported RAID
.....................................................................................................................................................16
User Capacity (Logical Capacity)............................................................................................................................22
RAID Group............................................................................................................................................................23
Volume..................................................................................................................................................................25
Hot Spares.............................................................................................................................................................27
Data Protection............................................................................................................................. 29
Data Block Guard ..................................................................................................................................................29
Disk Drive Patrol....................................................................................................................................................30
Redundant Copy....................................................................................................................................................31
Rebuild..................................................................................................................................................................32
Fast Recovery ........................................................................................................................................................33
Copyback/Copybackless.........................................................................................................................................34
Protection (Shield)................................................................................................................................................36
Operations Optimization (Deduplication/Compression and Storage Virtualization) ...................... 38
Deduplication/Compression ..................................................................................................................................38
Thin Provisioning ..................................................................................................................................................46
Flexible Tier ..........................................................................................................................................................52
Optimization of Volume Configurations ........................................................................................ 57
RAID Migration......................................................................................................................................................59
Logical Device Expansion......................................................................................................................................61
LUN Concatenation ...............................................................................................................................................62
Wide Striping ........................................................................................................................................................64
Data Encryption ............................................................................................................................ 65
Encryption with Self Encrypting Drive (SED)..........................................................................................................66
Firmware Data Encryption.....................................................................................................................................67
Key Management Server Linkage..........................................................................................................................68
User Access Management ............................................................................................................. 71
Account Management...........................................................................................................................................71
User Authentication ..............................................................................................................................................73
Audit Log ..............................................................................................................................................................75
Improving Host Connectivity ......................................................................................................... 76
2
FUJITSU Storage ETERNUS AF250 S2, ETERNUS AF250 All-Flash Arrays
Design Guide (Basic)
Copyright 2019 FUJITSU LIMITED
P3AG-1822-09ENZ0