Administrator Guide

Table Of Contents
Pause Synchronous Replication (SyncRep).....................................................................................................................316
Resume Synchronous Replication (SyncRep)..................................................................................................................317
Enable Synchronous Replication (SyncRep) for a Volume Collection...............................................................................317
Disable Synchronous Replication (SyncRep) for a Volume Collection.............................................................................. 317
Change the Pool Assignment of a Synchronous Replication (SyncRep) Volume............................................................. 318
View the Distribution of a Volume Across Pools.............................................................................................................. 318
About Switching and Failing Over SyncRep Pools...........................................................................................................318
Switch from SyncActive to SyncAlternate................................................................................................................ 318
Fail Over from SyncActive to SyncAlternate............................................................................................................. 318
Switch Synchronous Replication (SyncRep) Collection Pools....................................................................................319
Disconnect the SyncActive Volume................................................................................................................................ 319
19 About Self-Encrypting Drives (SEDs) and AutoSED...................................................320
Scenarios Covered by AutoSED..................................................................................................................................... 320
Scenarios Not Covered by AutoSED.............................................................................................................................. 320
About Self-Encrypting Drives (SED)............................................................................................................................... 321
How Key Shares Work.............................................................................................................................................. 321
How Self-Encryption Protects Data................................................................................................................................ 321
About SED Members in a Group.................................................................................................................................... 322
Examples..................................................................................................................................................................322
Back Up a Self-Encrypting Drive (SED) Key...................................................................................................................322
Self-Encrypting Drives (SED) Frequently Asked Questions (FAQ)..................................................................................323
Why are my backups always dierent?.................................................................................................................... 323
Why is a secure-erase command not available?....................................................................................................... 323
What is the dierence between a locked drive and a securely erased drive?............................................................323
I accidentally reset an SED array. What can I do?..................................................................................................... 323
What if the entire array is stolen?.............................................................................................................................323
What if the grpadmin password is stolen?................................................................................................................323
Is it safe to discard or return a locked SED?.............................................................................................................324
Can I add SEDs to a non-SED array, or vice versa?..................................................................................................324
Does a SED system also use RAID?..........................................................................................................................324
Does SED encrypt my volumes?.............................................................................................................................. 324
If I create a new set of backup units, does the new set invalidate the previous set of backup units?....................... 324
Self-Encrypting Drives (SED) Examples......................................................................................................................... 324
Self-Encrypting Drives (SED) Advanced Encryption...................................................................................................... 325
Media Encryption Key and the Access Key.............................................................................................................. 325
Threshold Secret Sharing and Local Keying..............................................................................................................325
Example: AutoSED Key Sharing................................................................................................................................326
20 About Monitoring...................................................................................................... 327
Tools That Monitor and Manage Storage Performance.................................................................................................. 327
About Using Group Manager to Monitor Performance Data.....................................................................................327
About Displaying Performance Statistics with the Performance Monitor................................................................. 328
About SAN Headquarters.........................................................................................................................................333
Monitor Group Members................................................................................................................................................334
About Monitoring Enclosure Elements......................................................................................................................334
14