Contents 9
Choosing an Appropriate Physical Disk Type. . . . . . 121
Physical Disk Security with Self
Encrypting Disk
. . . . . . . . . . . . . . . . . . . . . 121
Creating a Security Key
. . . . . . . . . . . . . . . 124
Changing a Security Key . . . . . . . . . . . . . . 126
Saving a Security Key
. . . . . . . . . . . . . . . 128
Validate Security Key
. . . . . . . . . . . . . . . . 129
Unlocking Secure Physical Disks. . . . . . . . . . 129
Erasing Secure Physical Disks
. . . . . . . . . . . 130
Configuring Hot Spare Physical Disks
. . . . . . . . . 130
Hot Spares and Rebuild
. . . . . . . . . . . . . . . 132
Global Hot Spares
. . . . . . . . . . . . . . . . . 132
Hot Spare Operation
. . . . . . . . . . . . . . . . 133
Hot Spare Drive Protection. . . . . . . . . . . . . 133
Enclosure Loss Protection. . . . . . . . . . . . . . . . 134
Host-to-Virtual Disk Mapping
. . . . . . . . . . . . . . 135
Creating Host-to-Virtual Disk Mappings
. . . . . . 136
Modifying and Removing Host-to-Virtual
Disk Mapping . . . . . . . . . . . . . . . . . . . . 137
Changing Controller Ownership of the
Virtual Disk . . . . . . . . . . . . . . . . . . . . . 138
Removing Host-to-Virtual Disk Mapping
. . . . . . 139
Changing the RAID Controller Module
Ownership of a Disk Group . . . . . . . . . . . . . 139
Changing the RAID Level of a Disk Group
. . . . . 141
Removing a Host-to-Virtual Disk Mapping
Using Linux DMMP . . . . . . . . . . . . . . . . . 141
Restricted Mappings
. . . . . . . . . . . . . . . . . . . 143
Changing the RAID Controller Module
Ownership of a Virtual Disk or a Disk Group
. . . . 144
Changing the RAID Level of a Disk Group
. . . . . . . . 146
book.book Page 9 Tuesday, June 18, 2013 3:09 PM