Dell MD3620F Server User Manual


 
114 Configuration: Disk Groups and Virtual Disks
The Secure Physical Disks option is inactive with a check mark on the left if
the disk group is already security enabled.
The Create a secure disk group option is displayed in the Create Disk Group
Wizard - Disk Group Name and Physical Disk Selection dialog. The Create
a secure disk group option is active only when these conditions are met:
A security key is installed in the storage array.
At least one security capable physical disk is installed in the storage array.
All of the physical disks that you selected on the
Physical
tab are security
capable physical disks.
You can erase security-enabled physical disks so that you can reuse the drives
in another disk group or in another storage array. When you erase security-
enabled physical disks, ensure that the data cannot be read. When all of the
physical disks that you have selected in the Physical tab are security enabled,
and none of the selected physical disks is part of a disk group, the Secure
Erase option is displayed in the Physical Disk menu.
The storage array password protects a storage array from potentially
destructive operations by unauthorized users. The storage array password is
independent from self encrypting disk and must not be confused with the
pass phrase that is used to protect copies of a security key. It is recommended
that you set a storage array password.
Creating a Security Key
When you create a security key, it is generated by and securely stored by the
array. You cannot read or view the security key.
NOTE: A copy of the security key must be kept on some other storage medium for
backup in case of system failure or for transfer to another storage array.
A pass phrase that you provide is used to encrypt and decrypt the security key
for storage on other media. When you create a security key, you also provide
information to create a security key identifier. Unlike the security key, you can
read or view the security key identifier. The security key identifier is also
stored on a physical disk or transportable media. The security key identifier is
used to identify which key the storage array is using.
book.book Page 114 Tuesday, June 18, 2013 3:03 PM