Contents 9
Creating a Security Key. . . . . . . . . . . . . . . 116
Changing a Security Key
. . . . . . . . . . . . . . 117
Saving a Security Key . . . . . . . . . . . . . . . 119
Unlocking Secure Physical Disks
. . . . . . . . . . 120
Erasing Secure Physical Disks
. . . . . . . . . . . 120
Configuring Hot Spare Physical Disks
. . . . . . . . . 121
Hot Spares and Rebuild
. . . . . . . . . . . . . . . 123
Global Hot Spares
. . . . . . . . . . . . . . . . . 123
Hot Spare Operation . . . . . . . . . . . . . . . . 123
Hot Spare Drive Protection
. . . . . . . . . . . . . 123
Enclosure Loss Protection
. . . . . . . . . . . . . . . . 124
Host-to-Virtual Disk Mapping . . . . . . . . . . . . . . 126
Creating Host-to-Virtual Disk Mappings
. . . . . . 126
Modifying and Removing
Host-to-Virtual Disk Mapping. . . . . . . . . . . . 128
Changing Controller Ownership
of the Virtual Disk . . . . . . . . . . . . . . . . . . 129
Removing Host-to-Virtual Disk Mapping
. . . . . . 129
Changing the RAID Controller
Module Ownership of a Disk Group . . . . . . . . 130
Changing the RAID Level of a Disk Group
. . . . . 131
Restricted Mappings
. . . . . . . . . . . . . . . . . . . 132
Changing the RAID Controller Module
Ownership of a Virtual Disk or a Disk Group
. . . . 133
Changing the RAID Level of a Disk Group
. . . . . . . . 135
Storage Partitioning . . . . . . . . . . . . . . . . . . . 136
Disk Group and Virtual Disk Expansion
. . . . . . . . . 137
Disk Group Expansion
. . . . . . . . . . . . . . . 137
Virtual Disk Expansion
. . . . . . . . . . . . . . . 138
Using Free Capacity . . . . . . . . . . . . . . . . 138
book.book Page 9 Wednesday, May 26, 2010 2:14 PM