The first dialog of the Create Copy Wizard defines a and enables you to choose a .
Attention:
Possible loss of data access – Source logical drives that participate in a VolumeCopy are available for read I/O activity only while a VolumeCopy has a status of In Progress or Pending. Write requests are permitted after the VolumeCopy has completed.If the source logical drive has been initialized with a journaling file system, any attempt to issue a read request to the source logical drive might be rejected by the , and an error message might appear. The journaling file system driver issues a write request before it attempts to issue the read request. The controller rejects the write request, and the read request might not be issued because of the rejected write request. This situation might result in an error message, which indicates that the source logical drive is write protected.
To prevent this issue from occurring, do not try to access a source logical drive that is participating in a VolumeCopy while the VolumeCopy has a status of In Progress. Also, make sure that the Read-Only attribute for the is disabled after the VolumeCopy has completed to prevent error messages from appearing.
All valid base logical drives on the storage subsystem are shown in the list in alphanumeric order. The that you selected to start the Create Copy Wizard is highlighted.
These logical drives are not valid source logical drives and do not appear in the list:You also can create a source logical drive specifically for the VolumeCopy.
From the Create Copy Wizard - Introduction dialog, you can open the View Disk Drives dialog to view disk drive, slot, and capacity of the selected base logical drive. Use this information to copy high-access logical drives to different for increased accessibility. You also can use this information to copy logical drives to an array that uses larger capacity disk drives.
When the premium feature is enabled, the Secure column appears in the Source logical drive list in the Create Copy Wizard - Introduction dialog. If you choose to copy a secure source logical drive to a target logical drive that is not or not secure, you will be prompted to confirm your choice. The copy can be completed, but the security status of the resulting copy might be different from that of the source logical drive.