Glossary
159
adjacent disk sectors. To improve write performance, the cache may temporarily
store data in accordance with its write back policies. For more information, see
"Write-Back" on page 173.
Change Key
The process of generating a key for an encryption-capable or a
security-capable component. All current data on the media is accessible using
the newly generated key.
Consistency Check
An operation to verify that all stripes in a virtual disk with a redundant RAID
level are consistent and automatically fix any errors. For RAID 5, 6, 50, and
60 arrays, consistency check verifies correct parity data for each stripe.
For RAID 1 and RAID 10 arrays, this operation verifies correct mirror data
for each stripe.
Controller
See "Adapter Card" on page 157
Controller-Bound Security Configuration
An encryption configuration whereby the controller encrypts the security key
using an internal algorithm before storing it internally in the NVData.
The controller always understands how to decrypt the key and you need not
provide a passphrase on boot.
Current Encryption State
The state of an encryption-capable component. States are encrypted and not
encrypted.
Current Security State
The state of a security-capable component. States are secured and not
secured.
Decrypt
The process of reversing the obfuscation of data with the full knowledge of
the algorithm and the key used to encrypt it.
PERC7.2_UG.book Page 159 Thursday, March 3, 2011 2:14 PM
Summary of Contents for PERC H700
Page 1: ...Dell PowerEdge RAID Controller PERC H700 and H800 User s Guide ...
Page 10: ...10 Contents ...
Page 14: ...14 Safety Instructions ...
Page 40: ...40 Storage Controller Features ...
Page 68: ...68 Installing and Configuring Hardware ...
Page 120: ...120 CacheCade ...
Page 130: ...130 Security Key and RAID Management ...
Page 152: ...152 Troubleshooting ...
Page 154: ...154 Regulatory Notices ...
Page 156: ...156 Corporate Contact Details Taiwan Only ...
Page 178: ...178 Index ...