8Contents
Locating a Disk Group . . . . . . . . . . . . . . . 96
Creating Virtual Disks . . . . . . . . . . . . . . . . 96
Changing the Virtual Disk Modification
Priority . . . . . . . . . . . . . . . . . . . . . . . 98
Changing the Virtual Disk Cache Settings . . . . . 99
Changing the Segment Size of a Virtual Disk . . . 101
Changing the I/O Type. . . . . . . . . . . . . . . 102
Choosing an Appropriate Physical Disk Type . . . . . 103
Physical Disk Security with Self Encrypting
Disk. . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Creating a Security Key. . . . . . . . . . . . . . 106
Changing a Security Key . . . . . . . . . . . . . 108
Saving a Security Key. . . . . . . . . . . . . . . 109
Unlocking Secure Physical Disks . . . . . . . . . 110
Erasing Secure Physical Disks . . . . . . . . . . 111
Configuring Hot Spare Physical Disks. . . . . . . . . 111
Hot Spares and Rebuild. . . . . . . . . . . . . . 113
Global Hot Spares. . . . . . . . . . . . . . . . . 113
Hot Spare Operation . . . . . . . . . . . . . . . 114
Hot Spare Drive Protection . . . . . . . . . . . . 114
Enclosure Loss Protection . . . . . . . . . . . . . . . 115
Host-to-Virtual Disk Mapping . . . . . . . . . . . . . 116
Creating Host-to-Virtual Disk Mappings . . . . . 117
Modifying and Removing Host-to-Virtual
Disk Mapping . . . . . . . . . . . . . . . . . . . 118
Changing Controller Ownership of the Virtua
l Disk . . . . . . . . . . . . . . . . . . . . . . . 119
Removing Host-to-Virtual Disk Mapping . . . . . 120
Changing the RAID Controller Module
Ownership of a Disk Group . . . . . . . . . . . . 121
Changing the RAID Level of a Disk Group . . . . 122
book.book Page 8 Monday, June 21, 2010 11:00 AM