Table of Contents
1. Function Overview 14
2. Basic Functions 16
RAID Functions........................................................................................................................................... 16
Supported RAID
.................................................................................................................................................................... 16
User Capacity (Logical Capacity).................................................................................................................................. 22
RAID Group ........................................................................................................................................................................... 24
Volume.................................................................................................................................................................................... 26
Hot Spares ............................................................................................................................................................................. 29
Data Protection...........................................................................................................................................31
Data Block Guard ................................................................................................................................................................. 31
Disk Drive Patrol .................................................................................................................................................................. 32
Redundant Copy ................................................................................................................................................................. 33
Rebuild .................................................................................................................................................................................... 34
Fast Recovery....................................................................................................................................................................... 35
Copyback/Copybackless.................................................................................................................................................. 36
Protection (Shield).............................................................................................................................................................. 38
Reverse Cabling................................................................................................................................................................... 40
Operations Optimization (Virtualization/Automated Storage Tiering) ................................. 41
Thin Provisioning ..................................................................................................................................................................41
Flexible Tier ........................................................................................................................................................................... 48
Extreme Cache Pool .......................................................................................................................................................... 54
Optimization of Volume Configurations...........................................................................................55
RAID Migration ......................................................................................................................................................................57
Logical Device Expansion................................................................................................................................................. 59
LUN Concatenation............................................................................................................................................................. 61
Wide Striping ........................................................................................................................................................................ 63
Data Encryption.........................................................................................................................................64
Encryption with Self Encrypting Drive (SED)............................................................................................................ 65
Firmware Data Encryption............................................................................................................................................... 66
Key Management Server Linkage ..................................................................................................................................67
User Access Management..................................................................................................................... 70
Account Management....................................................................................................................................................... 70
User Authentication ............................................................................................................................................................72
2
Fujitsu Storage ETERNUS DX100 S4/DX200 S4, ETERNUS DX100 S3/DX200 S3 Hybrid Storage Systems
Design Guide (Basic)
Copyright 2023 Fujitsu Limited
P3AM-7642-32ENZ0