EasyManua.ls Logo

Fujitsu Eternus DX80 S2 - Page 49

Fujitsu Eternus DX80 S2
186 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Chapter 3 Setup
3.4 Data Encryption
ETERNUS DX80 S2/DX90 S2 Disk storage system User’s Guide -Operation-
Copyright 2013 FUJITSU LIMITED P3AM-4842-12ENZ0
49
â–  Volume conversion encryption function
For details on the data encryption procedure, refer to "ETERNUS Web GUI User’s Guide" or "ETERNUS CLI User’s
Guide".
• The encryption method for encrypted volumes cannot be changed. Encrypted volumes cannot be changed
to unencrypted volumes.
To change the encryption method or cancel the encryption for a volume, back up the data in the encrypted
volume, delete the encrypted volume, and restore the backed up data.
• It is recommended that the copy source volume and the copy destination volume use the same encryption
method for remote copy between encrypted volumes.
• When copying encrypted volumes (using Advanced Copy or copy operations via server), transfer
performance may not be as good as when copying unencrypted volumes.
• SDPVs cannot be encrypted after they are created. To create an encrypted SDPV, set encryption when
creating a volume.
• Thin Provisioning Volumes (TPVs) cannot be encrypted individually. Rather, the encryption status of TPVs
depends on that of the TPP to which the TPVs belong.
• Flexible Tier Volumes (FTVs) cannot be encrypted individually. Rather, the encryption status of TPVs
depends on that of the Flexible Tier Pool (FTRP) to which the FTVs belong.

Table of Contents

Other manuals for Fujitsu Eternus DX80 S2

Related product manuals