The pass phrase that you enter is masked.

NOTE: Create Key is active only if the pass phrase meets the above mentioned criterion.

5In Confirm pass phrase, re-enter the exact string that you entered in Pass phrase.

Make a record of the pass phrase that you entered and the security key identifier that is associated with the pass phrase. You need this information for later secure operations.

6Click Create Key.

7Make a record of the security key identifier and the file name from the Create Security Key Complete dialog, and click OK.

After you have created a security key, you can create secure disk groups from security capable physical disks. Creating a secure disk group makes the physical disks in the disk group security-enabled. Security-enabled physical disks enter Security Locked status whenever power is re-applied. They can be unlocked only by a RAID controller module that supplies the correct key during physical disk initialization. Otherwise, the physical disks remain locked, and the data is inaccessible. The Security Locked status prevents any unauthorized person from accessing data on a security-enabled physical disk by physically removing the physical disk and installing the physical disk in another computer or storage array.

Changing a Security Key

When you change a security key, a new security key is generated by the system. The new key replaces the previous key. You cannot view or read the key. However, a copy of the security key must be kept on some other storage medium for backup in case of system failure or for transfer to another storage array. A pass phrase that you provide encrypts and decrypts the security key for storage on other media. When you change a security key, you also provide information to create a security key identifier. Changing the security key does not destroy any data. You can change the security key at any time.

Before you change the security key, ensure that:

All virtual disks in the storage array are in Optimal status.

In storage arrays with two RAID controller modules, both are present and working normally.

Configuration: Disk Groups and Virtual Disks

117

Page 117
Image 117
Dell MD3200i, MD3220i owner manual Changing a Security Key, Click Create Key, 117

MD3200i, MD3220i specifications

The Dell MD3220i and MD3200i are part of Dell's extensive line of modular storage solutions, designed to support organizations in optimizing their data management and scalability requirements. These models offer reliable performance and flexible features, making them suitable for various workloads including virtualization, cloud storage, and disaster recovery.

One of the standout features of the MD3220i and MD3200i is their support for iSCSI storage networking. By utilizing the Internet Small Computer Systems Interface (iSCSI) protocol, these systems provide organizations with a cost-effective way to connect their storage over existing network infrastructure, enabling efficient data transfers and management.

Both models are equipped with dual controllers that ensure high availability and failover capabilities, which are crucial for meeting uptime requirements in mission-critical environments. The dual controllers also facilitate load balancing and increase overall system performance, as they allow multiple paths to the storage, enhancing I/O performance.

Scalability is another key characteristic of the MD3220i and MD3200i. These storage arrays can be expanded to meet growing storage demands, supporting up to 240TB of raw capacity with up to 16 additional expansion enclosures. This flexibility allows organizations to start with a smaller configuration and grow their storage capabilities without a complete overhaul of the existing infrastructure.

The units also support multiple disk types, including traditional spinning disks, solid-state drives (SSDs), and a combination of both. This versatility enables users to tailor storage configurations to their specific performance and budgetary needs. Furthermore, the systems feature advanced data management technologies such as snapshots and remote replication, providing essential tools for data protection.

With their ease of management, the MD3220i and MD3200i are designed for straightforward configuration and operation. The intuitive management interfaces allow IT professionals to monitor performance, configure storage, and manage data effectively, ensuring businesses can maintain optimal system availability.

In summary, the Dell MD3220i and MD3200i are robust, scalable, and versatile storage solutions that cater to diverse organizational needs. Their integrated technologies, such as iSCSI support, dual controller architecture, and advanced data management features, make them an ideal choice for modern data centers looking to enhance storage capabilities while ensuring reliability and performance.