CLI Guide

Additional Information
To use this command successfully, you need to have enough SES drives to create atleast one disk group.
The RAID controller module firmware creates a lock that restricts access to the SES drives. SES drives
have a state called Security Capable. When you create a security key, the state is set to Security Enabled,
which restricts access to all SES drives that exist within the storage array.
You can have a storage array configuration with more than one set of encrypted disk groups. Each disk
group can have a unique security key. The character string generated by the keyIdentifier parameter
is a string that you can read and that enables you to identify the security key that you need. You can
create a keyIdentifer by using one of these methods:
You can enter up to 189 alphanumeric characters for a key identifier. The key identifier cannot have
these characters:
White spaces
Punctuation
Symbols
You can leave out this parameter.
Additional characters are automatically generated and appended to the end of the string that you enter
for the key identifier. If you do not enter any string for the keyIdentifier parameter, the key identifier
consists of only the characters that are automatically generated.
Your pass phrase must meet these criteria:
The pass phrase must be between eight and 32 characters long.
The pass phrase must contain at least one uppercase letter.
The pass phrase must contain at least one lowercase letter.
The pass phrase must contain at least one number.
The pass phrase must contain at least one non-alphanumeric character, for example, < > @ +.
If your pass phrase does not meet these criteria, you receive an error message and you must retry the
command.
Create Virtual Disk Copy
Description
This command creates a virtual disk copy and starts the virtual disk copy operation.
CAUTION: Before you create a new copy of a source virtual disk, stop any data access (I/O)
activity or suspend data transfer to the source virtual disk and (if applicable, the target disk) to
ensure that you capture an accurate point-in-time image of the source virtual disk. Close all
applications, including Windows Internet Explorer, to make sure all I/O activity has stopped.
NOTE: See Preparing Host Servers To Create A Virtual Disk Copy.
NOTE: Removing the drive letter of the associated virtual disk(s) in Windows or unmounting the
virtual drive in Linux helps to guarantee a stable copy of the drive for the virtual copy.
206