Pause Synchronous Replication (SyncRep)
.....................................................................................................................
316
Resume Synchronous Replication (SyncRep)
..................................................................................................................
317
Enable Synchronous Replication (SyncRep) for a Volume Collection
...............................................................................
317
Disable Synchronous Replication (SyncRep) for a Volume Collection
..............................................................................
317
Change the Pool Assignment of a Synchronous Replication (SyncRep) Volume
.............................................................
318
View the Distribution of a Volume Across Pools
..............................................................................................................
318
About Switching and Failing Over SyncRep Pools
...........................................................................................................
318
Switch from SyncActive to SyncAlternate
................................................................................................................
318
Fail Over from SyncActive to SyncAlternate
.............................................................................................................
318
Switch Synchronous Replication (SyncRep) Collection Pools
....................................................................................
319
Disconnect the SyncActive Volume
................................................................................................................................
319
19 About Self-Encrypting Drives (SEDs) and AutoSED
...................................................
320
Scenarios Covered by AutoSED
.....................................................................................................................................
320
Scenarios Not Covered by AutoSED
..............................................................................................................................
320
About Self-Encrypting Drives (SED)
...............................................................................................................................
321
How Key Shares Work
..............................................................................................................................................
321
How Self-Encryption Protects Data
................................................................................................................................
321
About SED Members in a Group
....................................................................................................................................
322
Examples
..................................................................................................................................................................
322
Back Up a Self-Encrypting Drive (SED) Key
...................................................................................................................
322
Self-Encrypting Drives (SED) Frequently Asked Questions (FAQ)
..................................................................................
323
Why are my backups always
different?
....................................................................................................................
323
Why is a secure-erase command not available?
.......................................................................................................
323
What is the
difference
between a locked drive and a securely erased drive?
............................................................
323
I accidentally reset an SED array. What can I do?
.....................................................................................................
323
What if the entire array is stolen?
.............................................................................................................................
323
What if the grpadmin password is stolen?
................................................................................................................
323
Is it safe to discard or return a locked SED?
.............................................................................................................
324
Can I add SEDs to a non-SED array, or vice versa?
..................................................................................................
324
Does a SED system also use RAID?
..........................................................................................................................
324
Does SED encrypt my volumes?
..............................................................................................................................
324
If I create a new set of backup units, does the new set invalidate the previous set of backup units?
.......................
324
Self-Encrypting Drives (SED) Examples
.........................................................................................................................
324
Self-Encrypting Drives (SED) Advanced Encryption
......................................................................................................
325
Media Encryption Key and the Access Key
..............................................................................................................
325
Threshold Secret Sharing and Local Keying
..............................................................................................................
325
Example: AutoSED Key Sharing
................................................................................................................................
326
20 About Monitoring
......................................................................................................
327
Tools That Monitor and Manage Storage Performance
..................................................................................................
327
About Using Group Manager to Monitor Performance Data
.....................................................................................
327
About Displaying Performance Statistics with the Performance Monitor
.................................................................
328
About SAN Headquarters
.........................................................................................................................................
333
Monitor Group Members
................................................................................................................................................
334
About Monitoring Enclosure Elements
......................................................................................................................
334
14