EasyManua.ls Logo

Fujitsu ETERNUS AF250 - Default Chapter; Table of Contents

Fujitsu ETERNUS AF250
171 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Table of Contents
1. Function 14
RAID Functions.............................................................................................................................. 16
Supported RAID
.....................................................................................................................................................16
User Capacity (Logical Capacity)............................................................................................................................22
RAID Group............................................................................................................................................................23
Volume..................................................................................................................................................................25
Hot Spares.............................................................................................................................................................27
Data Protection............................................................................................................................. 29
Data Block Guard ..................................................................................................................................................29
Disk Drive Patrol....................................................................................................................................................30
Redundant Copy....................................................................................................................................................31
Rebuild..................................................................................................................................................................32
Fast Recovery ........................................................................................................................................................33
Copyback/Copybackless.........................................................................................................................................34
Protection (Shield)................................................................................................................................................36
Operations Optimization (Deduplication/Compression and Storage Virtualization) ...................... 38
Deduplication/Compression ..................................................................................................................................38
Thin Provisioning ..................................................................................................................................................46
Flexible Tier ..........................................................................................................................................................52
Optimization of Volume Configurations ........................................................................................ 57
RAID Migration......................................................................................................................................................59
Logical Device Expansion......................................................................................................................................61
LUN Concatenation ...............................................................................................................................................62
Wide Striping ........................................................................................................................................................64
Data Encryption ............................................................................................................................ 65
Encryption with Self Encrypting Drive (SED)..........................................................................................................66
Firmware Data Encryption.....................................................................................................................................67
Key Management Server Linkage..........................................................................................................................68
User Access Management ............................................................................................................. 71
Account Management...........................................................................................................................................71
User Authentication ..............................................................................................................................................73
Audit Log ..............................................................................................................................................................75
Improving Host Connectivity ......................................................................................................... 76
2
FUJITSU Storage ETERNUS AF250 S2, ETERNUS AF250 All-Flash Arrays
Design Guide (Basic)
Copyright 2019 FUJITSU LIMITED
P3AG-1822-09ENZ0

Table of Contents

Other manuals for Fujitsu ETERNUS AF250

Related product manuals