RAID Functions........................................................................................................................................... 16
Supported RAID.................................................................................................................................................................... 16
User Capacity (Logical Capacity).................................................................................................................................. 22
RAID Group ........................................................................................................................................................................... 24
Volume.................................................................................................................................................................................... 26
Hot Spares ............................................................................................................................................................................. 29
Data Protection...........................................................................................................................................31
Data Block Guard ................................................................................................................................................................. 31
Disk Drive Patrol .................................................................................................................................................................. 32
Redundant Copy ................................................................................................................................................................. 33
Rebuild .................................................................................................................................................................................... 34
Fast Recovery ....................................................................................................................................................................... 35
Copyback/Copybackless.................................................................................................................................................. 36
Protection (Shield).............................................................................................................................................................. 38
Reverse Cabling................................................................................................................................................................... 40
Thin Provisioning .................................................................................................................................................................. 41
Flexible Tier ........................................................................................................................................................................... 48
Extreme Cache Pool .......................................................................................................................................................... 54
RAID Migration ......................................................................................................................................................................57
Logical Device Expansion................................................................................................................................................. 59
LUN Concatenation............................................................................................................................................................. 61
Wide Striping ........................................................................................................................................................................ 63
Data Encryption ......................................................................................................................................... 64
Firmware Data Encryption ............................................................................................................................................... 66
Key Management Server Linkage ..................................................................................................................................67
User Access Management ..................................................................................................................... 70
Account Management....................................................................................................................................................... 70
User Authentication ............................................................................................................................................................ 72
Fujitsu Storage ETERNUS DX100 S4/DX200 S4, ETERNUS DX100 S3/DX200 S3 Hybrid Storage Systems Design Guide (Basic)
2
Copyright 2023 Fujitsu Limited
Table of Contents
14
16
P3AM-7642-32ENZ0