NOTE: If you have not created a security key for the storage array, the Create Security Key option is active. If you have created a security key for the storage array, the Create Security Key option is inactive with a check mark to the left. The Change Security Key option, the Save Security Key option, and the Validate Security Key option are now active.

The Secure Physical Disks option appears in the Disk Group menu. The Secure Physical Disks option is active if these conditions are true:

The selected storage array is not security enabled but is comprised entirely of security capable physical disks.

The storage array contains no snapshot base virtual disks or snapshot repository virtual disks.

The disk group is in an Optimal state.

A security key is set up for the storage array.

NOTE: The Secure Physical Disks option is inactive if these conditions are not true.

The Secure Physical Disks option is inactive with a check mark to the left if the disk group is already security enabled.

The Create a secure disk group option appears in the Create Disk Group Wizard - Disk Group Name and Physical Disk Selection dialog. The Create a secure disk group option is active only when these conditions are met:

A security key is installed in the storage array.

At least one security capable physical disk is installed in the storage array.

All of the physical disks that you selected on the Physical tab are security capable physical disks.

You can erase security-enabled physical disks so that you can reuse the drives in another disk group or in another storage array. When you erase security- enabled physical disks, ensure that the data cannot be read. When all of the physical disks that you have selected in the Physical pane are security enabled, and none of the selected physical disks is part of a disk group, the Secure Erase option appears in the Physical Disk menu.

The storage array password protects a storage array from potentially destructive operations by unauthorized users. The storage array password is independent from self encrypting disk, and should not be confused with the pass phrase that is used to protect copies of a security key. However, it is good practice to set a storage array password

Configuration: Disk Groups and Virtual Disks

115

Page 115
Image 115
Dell MD3200i, MD3220i owner manual 115

MD3200i, MD3220i specifications

The Dell MD3220i and MD3200i are part of Dell's extensive line of modular storage solutions, designed to support organizations in optimizing their data management and scalability requirements. These models offer reliable performance and flexible features, making them suitable for various workloads including virtualization, cloud storage, and disaster recovery.

One of the standout features of the MD3220i and MD3200i is their support for iSCSI storage networking. By utilizing the Internet Small Computer Systems Interface (iSCSI) protocol, these systems provide organizations with a cost-effective way to connect their storage over existing network infrastructure, enabling efficient data transfers and management.

Both models are equipped with dual controllers that ensure high availability and failover capabilities, which are crucial for meeting uptime requirements in mission-critical environments. The dual controllers also facilitate load balancing and increase overall system performance, as they allow multiple paths to the storage, enhancing I/O performance.

Scalability is another key characteristic of the MD3220i and MD3200i. These storage arrays can be expanded to meet growing storage demands, supporting up to 240TB of raw capacity with up to 16 additional expansion enclosures. This flexibility allows organizations to start with a smaller configuration and grow their storage capabilities without a complete overhaul of the existing infrastructure.

The units also support multiple disk types, including traditional spinning disks, solid-state drives (SSDs), and a combination of both. This versatility enables users to tailor storage configurations to their specific performance and budgetary needs. Furthermore, the systems feature advanced data management technologies such as snapshots and remote replication, providing essential tools for data protection.

With their ease of management, the MD3220i and MD3200i are designed for straightforward configuration and operation. The intuitive management interfaces allow IT professionals to monitor performance, configure storage, and manage data effectively, ensuring businesses can maintain optimal system availability.

In summary, the Dell MD3220i and MD3200i are robust, scalable, and versatile storage solutions that cater to diverse organizational needs. Their integrated technologies, such as iSCSI support, dual controller architecture, and advanced data management features, make them an ideal choice for modern data centers looking to enhance storage capabilities while ensuring reliability and performance.