Specifications
ES/OL
Evaluator Series On-Line™
Storage Systems
Product Analysis
May, 2011
Page 10 of 30
Analysis of Fujitsu ETERNUS DX400 S2
Models DX410 and DX440
© 2007-2011 Evaluator Group, Inc. All rights reserved. Reproduction of this publication in any form without prior written permission is prohibited.
7720 E. Belleview Avenue • Suite 210 • Greenwood Village, CO 80111 • (303) 221-7867 • Fax (303) 221-6941 • www.evaluatorgroup.com
• Everyday - The mode is enabled every day from the specified start time to the specified end time.
• Every week - The mode is enabled every day from the specified start time to the specified end time.
• Specific day – The day or date of the month, along with start, and number of days is specified
• Specific week – A day of the week within the month, along with the start and ending day of the week and
the starting and ending time are specified
• Last Access Time – A specific amount of time has elapsed since a RAID group was last accessed, this
may be set to 10, 20, 30, 40, 50 or 60 minutes (default is 30 minutes)
Evaluator Group Comments: The lower power consumption of ECO-Mode is a somewhat unique
feature in the midrange market segment that provides customers with greater flexibility in matching
their storage systems to business requirements.
Disk Data Encryption
ETERNUS provides data encryption and protects critical, security sensitive data from unauthorized access to
drives that have been removed from the storage system. Setup and management of encryption is via the
ETERNUS management console and encryption is on a LUN by LUN basis.
There are two primary encryption algorithms supported:
• Fujitsu Original Encryption mode
• AES 128-bit (Advanced Encryption Standard) mode
All data within the system is encrypted and decrypted within the controller as shown below in Figure 4. When
encryption is enabled, data stored on disks is all encrypted with the same key. By keeping the key separate
from the drives, Fujitsu provides a high level of security if drives are lost or stolen.
Figure 4: Disk Data Encryption Detail (Source: Fujitsu)










