
Contents 9
Changing the I/O Type . . . . . . . . . . . . . . . 114
Choosing an Appropriate Physical Disk Type
. . . . . . 115
Physical Disk Security with Self
Encrypting Disk
. . . . . . . . . . . . . . . . . . . . . 115
Creating a Security Key
. . . . . . . . . . . . . . . 118
Changing a Security Key
. . . . . . . . . . . . . . 119
Saving a Security Key . . . . . . . . . . . . . . . 121
Validate Security Key
. . . . . . . . . . . . . . . . 122
Unlocking Secure Physical Disks
. . . . . . . . . . 122
Erasing Secure Physical Disks . . . . . . . . . . . 122
Configuring Hot Spare Physical Disks . . . . . . . . . 123
Hot Spares and Rebuild
. . . . . . . . . . . . . . . 125
Global Hot Spares . . . . . . . . . . . . . . . . . 125
Hot Spare Operation
. . . . . . . . . . . . . . . . 125
Hot Spare Drive Protection
. . . . . . . . . . . . . 126
Enclosure Loss Protection
. . . . . . . . . . . . . . . . 126
Host-to-Virtual Disk Mapping
. . . . . . . . . . . . . . 128
Creating Host-to-Virtual Disk Mappings
. . . . . . 129
Modifying and Removing
Host-to-Virtual Disk Mapping. . . . . . . . . . . . 130
Changing Controller Ownership
of the Virtual Disk
. . . . . . . . . . . . . . . . . . 131
Removing Host-to-Virtual Disk Mapping . . . . . . 132
Changing the RAID Controller Module
Ownership of a Disk Group
. . . . . . . . . . . . . 132
Changing the RAID Level of a Disk Group . . . . . 133
Removing a Host-to-Virtual Disk Mapping
Using Linux DMMP
. . . . . . . . . . . . . . . . . 134
Restricted Mappings
. . . . . . . . . . . . . . . . . . . 136
Changing the RAID Controller Module
Ownership of a Virtual Disk or a Disk Group
. . . . 137
book.book Page 9 Saturday, September 24, 2011 9:06 AM
Kommentare zu diesen Handbüchern