The I/O Priority Manager maintains statistics for the set of logical volumes in each
performance group that can be queried. If management is performed for the
performance policy, the I/O Priority Manager controls the I/O operations of all
managed performance groups to achieve the goals of the associated performance
policies. The performance group defaults to 0 if not specified. Table 10 lists
performance groups that are predefined and have the associated performance
policies:
Table 10. Performance groups and policies
Performance group
Performance policy
Performance policy
description
0
0
No management
1-5
1
Fixed block high priority
6-10
2
Fixed block medium priority
11-15
3
Fixed block low priority
Note:
Performance group settings can be managed using DS CLI or the DS Storage
Manager.
Encryption
The DS8000 series supports data encryption through the use of the IBM Full Disk
Encryption feature and IBM Tivoli Key Lifecycle Manager.
Encryption technology has a number of considerations that are critical to
understand to maintain the security and accessibility of encrypted data. This
section contains the key information that you have to know to manage IBM
encrypted storage and to comply with IBM requirements for using IBM encrypted
storage.
Failure to follow these requirements can result in a permanent encryption
deadlock, which can result in the permanent loss of all key-server-managed
encrypted data at all of your installations.
Encryption concepts
Encryption
is the process of transforming data into an unintelligible form in such a
way that the original data either cannot be obtained or can be obtained only by
using a decryption process.
Data that is encrypted is referred to as
ciphertext
. Data that is not encrypted is
referred to as
plaintext
. The data that is encrypted into ciphertext is considered
securely secret from anyone who does not have the decryption key.
The following encryption algorithms exist:
Symmetric encryption algorithm
A common key is used to both encrypt and decrypt data. Therefore, the
encryption key can be calculated from the decryption key and the
decryption key can be calculated from the encryption key.
Asymmetric encryption algorithm
Two keys are used to encrypt and decrypt data. A public key that is
known to everyone and a private key that is known only to the receiver or
sender of the message. The public and private keys are related in such a
70
Introduction and Planning Guide
Содержание DS8700
Страница 1: ...IBM System Storage DS8800 and DS8700 Version 6 Release 3 Introduction and Planning Guide GC27 2297 09...
Страница 2: ......
Страница 3: ...IBM System Storage DS8800 and DS8700 Version 6 Release 3 Introduction and Planning Guide GC27 2297 09...
Страница 8: ...vi Introduction and Planning Guide...
Страница 10: ...viii Introduction and Planning Guide...
Страница 20: ...xviii Introduction and Planning Guide...
Страница 22: ...xx Introduction and Planning Guide...
Страница 44: ...22 Introduction and Planning Guide...
Страница 142: ...120 Introduction and Planning Guide...
Страница 160: ...138 Introduction and Planning Guide...
Страница 212: ...190 Introduction and Planning Guide...
Страница 218: ...196 Introduction and Planning Guide...
Страница 224: ...202 Introduction and Planning Guide...
Страница 242: ...220 Introduction and Planning Guide...
Страница 254: ...232 Introduction and Planning Guide...
Страница 255: ......
Страница 256: ...Printed in USA GC27 2297 09...