Table of Contents
RAID Functions.............................................................................................................................. 16
Supported RAID.....................................................................................................................................................16
User Capacity (Logical Capacity)............................................................................................................................22
RAID Group............................................................................................................................................................24
Volume..................................................................................................................................................................26
Hot Spares.............................................................................................................................................................28
Data Protection............................................................................................................................. 31
Data Block Guard ..................................................................................................................................................31
Disk Drive Patrol....................................................................................................................................................33
Redundant Copy....................................................................................................................................................34
Rebuild..................................................................................................................................................................35
Fast Recovery ........................................................................................................................................................36
Copyback/Copybackless.........................................................................................................................................37
Protection (Shield)................................................................................................................................................39
Reverse Cabling.....................................................................................................................................................41
Operations Optimization (Virtualization/Automated Storage Tiering)........................................... 42
Thin Provisioning ..................................................................................................................................................42
Flexible Tier ..........................................................................................................................................................49
Extreme Cache ......................................................................................................................................................55
Extreme Cache Pool ..............................................................................................................................................56
Optimization of Volume Configurations ........................................................................................ 57
RAID Migration......................................................................................................................................................59
Logical Device Expansion......................................................................................................................................61
LUN Concatenation ...............................................................................................................................................62
Wide Striping ........................................................................................................................................................65
Data Encryption ............................................................................................................................ 66
Encryption with Self Encrypting Drive (SED)..........................................................................................................67
Firmware Data Encryption.....................................................................................................................................68
Key Management Server Linkage..........................................................................................................................69
User Access Management ............................................................................................................. 72
Account Management...........................................................................................................................................72
2
FUJITSU Storage ETERNUS DX500 S4/DX600 S4, ETERNUS DX500 S3/DX600 S3 Hybrid Storage Systems Design Guide (Basic)
Copyright 2019 FUJITSU LIMITED
P3AM-7722-25ENZ0
Содержание ETERNUS DX500 S3/DX600 S3
Страница 218: ......