- Computers & electronics
- Computer components
- System components
- RAID controllers
- Broadcom
- MegaRAID SAS Software
- User Guide
advertisement
MegaRAID SAS Software User Guide March 2012 Chapter 3: SafeStore Disk Encryption Terminology
Chapter 3: SafeStore Disk Encryption
This chapter describes the LSI SafeStore Disk Encryption service. The SafeStore Disk Encryption service is a collection of features within LSI storage products that supports self-encrypting disks. SafeStore encryption services supports local key management.
Overview
The SafeStore Disk Encryption service offers the ability to encrypt data on drives and use disk-based key management to provide data security. This solution provides data protection in the event of theft or loss of physical drives. With self-encrypting drives, if you remove a drive from its storage system or the server in which it is housed, the data on that drive is encrypted and useless to anyone who attempts to access without the appropriate security authorization.
With the SafeStore encryption service, data is encrypted by the drives. You can designate which data to encrypt at the individual virtual disk (VD) level. Any encryption solution requires management of the encryption keys. The security service provides a way to manage these keys. Both the WebBIOS Configuration Utility and the MegaRAID Storage Manager software offer procedures that you can use to manage the security settings for the drives.
Purpose and Benefits
Security is a growing market concern and requirement. MegaRAID customers are looking for a comprehensive storage encryption solution to protect data. You can use the SafeStore encryption service to help protect your data. In addition, SafeStore local key management removes the administrator from most of the daily tasks of securing data, thereby reducing user error and decreasing the risk of data loss. Also, SafeStore local key management supports instant secure erase of drives that permanently removes data when repurposing or decommissioning drives. These services provide a much more secure level of data erasure than other common erasure methods, such as overwriting or degaussing.
Terminology
The following table describes the terminology related to the SafeStore encryption feature.
Table 19 Terminology used in FDE Option
Authenticated Mode Blob Key backup Password Re-provisioning
Description
The RAID configuration is keyed to a user password. The password must be provided on system boot to authenticate the user and facilitate unlocking the configuration for user access to the encrypted data.
A blob is created by encrypting a keys using another key. There are two types of blob in the system – encryption key blob and security key blob.
You need to provide the controller with a lock key if the controller is replaced or if you choose to migrate secure virtual disks. To do this task, you must back up the security key.
An optional authenticated mode is supported in which you must provide a password on each boot to make sure the system boots only if the user is authenticated. Firmware uses the user password to encrypt the security key in the security key blob stored on the controller.
Re-provisioning disables the security system of a device. For a controller, it involves destroying the security key. For SafeStore encrypted drives, when the drive lock key is deleted, the drive is unlocked and any user data on the drive is securely deleted. This situation does not apply to controller-encrypted drives,
, for information about the instant secure erase feature.
LSI Corporation - 41 -
MegaRAID SAS Software User Guide March 2012 Security Key
Option
Un-Authenticated Mode Volume Encryption Keys (VEK) Chapter 3: SafeStore Disk Encryption Workflow
Description
A key based on a user-provided string. The controller uses the security key to lock and unlock access to the secure user data. This key is encrypted into the security key blob and stored on the controller. If the security key is unavailable, user data is irretrievably lost. You must take all precautions to never lose the security key.
This mode allows controller to boot and unlock access to user configuration without user intervention. In this mode, the security key is encrypted into a security key blob, stored on the controller, but instead of a user password, an internal key specific to the controller is used to create the security key blob.
The controller uses the volume encryption keys to encrypt data when a controller-encrypted virtual disk is created. These keys are not available to the user. The firmware uses a unique 512-bit key for each virtual disk. The VEKs for the virtual disks are stored on the physical disks in a VEK blob.
Workflow
Enable Security
You can enable security on the controller. After you enable security, you have the option to create secure virtual drives using a security key.
There are three procedures you can perform to create secure virtual drives using a security key: Create the security key identifier Create the security key Create a password (optional)
Create the Security Key Identifier
The security key identifier appears whenever you enter the security key. If you have multiple security keys, the identifier helps you determine which security key to enter. The controller provides a default identifier for you. You can use the default setting or enter your own identifier.
Create the Security Key
You need to enter the security key to perform certain operations. You can choose a strong security key that the controller suggests.
CAUTION
If you forget the security key, you will lose access to your data.
Create a Password
The password provides additional security. The password should be different from the security key. You can select a setting in the utilities so that you must enter the password whenever you boot your server.
CAUTION
If you forget the password, you will lose access to your data.
When you use the specified security key identifier, security key, and password, security is enabled on the controller.
Change Security
You can change the security settings on the controller, and you have the option to change the security key identifier, security key, and password. If you have previously removed any secured drives, you still need to supply the old security key to import them.
You can perform three procedures to change the security settings on the controller: LSI Corporation - 42 -
MegaRAID SAS Software User Guide March 2012 Chapter 3: SafeStore Disk Encryption Workflow Change the security key identifier Change the security key Change a password See Section
security options in the MegaRAID Storage Manager software.
Change the Security Key Identifier
You have the option to edit the security key identifier. If you plan to change the security key, it is highly recommended that you change the security key identifier. Otherwise, you will not be able to differentiate between the security keys.
You can select whether you want to keep the current security key identifier or enter a new one. To change the security key identifier, enter a new security key identifier.
Change the Security Key
You can choose to keep the current security key or enter a new one. To change the security key, you can either enter the new security key or accept the security key that the controller suggests.
Add or Change the Password
You have the option to add a password or change the existing one. To change the password, enter the new password. To keep the existing password, enter the current password. If you choose this option, you must enter the password whenever you boot your server.
This procedure updates the existing configuration on the controller to use the new security settings.
Create Secure Virtual Drives
You can create a secure virtual drive and set its parameters as desired. To create a secure virtual drive, select a configuration method. You can select either simple configuration or advanced configuration.
Simple Configuration
If you select simple configuration, select the redundancy type and drive security method to use for the drive group.
See Section
type and drive security method for a configuration.
Advanced Configuration
If you select advanced configuration, select the drive security method, and add the drives to the drive group.
See Section
Creating a Virtual Drive Using Advanced Configuration
, for the procedures used to import a foreign configuration.
After the drive group is secured, you cannot remove the security without deleting the virtual drives.
Import a Foreign Configuration
After you create a security key, you can run a scan for a foreign configuration and import a locked configuration. (You can import unsecured or unlocked configurations when security is disabled.) A foreign configuration is a RAID configuration that already exists on a replacement set of drives that you install in a computer system. WebBIOS Configuration Utility and the MegaRAID Storage Manager software allows you to import the existing configuration to the RAID controller or clear the configuration so you can create a new one.
See Section Viewing and Changing Device Properties , for the procedure used to import a foreign configuration in WebBIOS or Section Importing or Clearing a Foreign Configuration , for the procedure in the MegaRAID Storage Manager software.
LSI Corporation - 43 -
MegaRAID SAS Software User Guide March 2012 Chapter 3: SafeStore Disk Encryption Instant Secure Erase To import a foreign configuration, you must first enable security to allow importation of locked foreign drives. If the drives are locked and the controller security is disabled, you cannot import the foreign drives. Only unlocked drives can be imported when security is disabled. After you enable the security, you can import the locked drives. To import the locked drives, you must provide the security key used to secure them. Verify whether any drives are left to import as the locked drives can use different security keys. If there are any drives left, repeat the import process for the remaining drives. After all of the drives are imported, there is no configuration to import.
Instant Secure Erase
Instant Secure Erase is a feature used to erase data from encrypted drives. After the initial investment for an encrypted disk, there is no additional cost in dollars or time to erase data using the Instant Secure Erase feature.
You can change the encryption key for all MegaRAID RAID controllers that are connected to encrypted drives. All encrypted drives, whether locked or unlocked, always have an encryption key. This key is set by the drive and is always active. When the drive is unlocked, the data to host from the drive (on reads) and from the host to the drive cache (on writes) is always provided. However, when resting on the drive platters, the data is always encrypted by the drive.
You might not want to lock your drives because you have to manage a password if they are locked. Even if you do not lock the drives, there is still a benefit to using encrypted disks.
If you are concerned about data theft or other security issues, you might already invest in drive disposal costs, and there are benefits to using SafeStore encryption over other technologies that exist today, both in terms of the security provided and time saved.
If the encryption key on the drive changes, the drive cannot decrypt the data on the platters, effectively erasing the data on the disks. The National Institute of Standards and Technology (http://www.nist.gov) values this type of data erasure above secure erase and below physical destruction of the device.
Consider the following reasons for using instant secure erase.
If you need to repurpose the hard drive for a different application
You might need to move the drive to another server to expand storage elsewhere, but the drive is in use. The data on the drive might contain sensitive data including customer information that, if lost or divulged, could cause an embarrassing disclosure of a security hole. You can use the instant secure erase feature to effectively erase the data so that the drive can be moved to another server or area without concern that old data could be found.
If you need to replace drives
If the amount of data has outgrown the storage system, and there is no room to expand capacity by adding drives, you might choose to purchase upgrade drives. If the older drives support encryption, you can erase the data instantly so the new drives can be used.
If you need to return a disk for warranty activity
If the drive is beginning to show SMART predictive failure alerts, you might want to return the drive for replacement. If so, the drive must be effectively erased if there is sensitive data. Occasionally a drive is in such bad condition that standard erasure applications do not work. If the drive still allows any access, it might be possible to destroy the encryption key.
LSI Corporation - 44 -
advertisement
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Related manuals
advertisement
Table of contents
- 1 MegaRAID® SAS Software User Guide
- 12 Chapter 1: Overview
- 12 SAS Technology
- 13 Serial-Attached SCSI Device Interface
- 13 Serial ATA III Features
- 13 Solid State Drive Features
- 14 SSD Guard
- 14 Dimmer Switch Features
- 14 UEFI 2.0 Support
- 14 Configuration Scenarios
- 16 Valid Drive Mix Configurations with HDDs and SSDs
- 17 Technical Support
- 18 Chapter 2: Introduction to RAID
- 18 Components and Features
- 18 Drive Group
- 18 Virtual Drive
- 19 Fault Tolerance
- 19 Multipathing
- 20 Consistency Check
- 20 Copyback
- 20 Background Initialization
- 21 Patrol Read
- 21 Disk Striping
- 22 Disk Mirroring
- 22 Parity
- 23 Disk Spanning
- 24 Hot Spares
- 25 Disk Rebuilds
- 25 Rebuild Rate
- 26 Hot Swap
- 26 Drive States
- 26 Virtual Drive States
- 26 Beep Codes
- 27 Enclosure Management
- 27 RAID Levels
- 27 Summary of RAID Levels
- 28 Selecting a RAID Level
- 28 RAID 0
- 29 Figure 7 RAID 0 Drive Group Example with Two Drives
- 29 RAID 1
- 29 Figure 8 RAID 1 Drive Group
- 30 RAID 5
- 30 Figure 9 RAID 5 Drive Group with Six Drives
- 30 RAID 6
- 31 Figure 10 Example of Distributed Parity across Two Blocks in a Stripe (RAID 6)
- 31 RAID 00
- 32 Figure 11 RAID 00 Drive Group Example with Two Drives
- 32 RAID 10
- 33 Figure 12 RAID 10 Level Virtual Drive
- 33 RAID 50
- 34 Figure 13 RAID 50 Level Virtual Drive
- 34 RAID 60
- 35 Figure 14 RAID 60 Level Virtual Drive
- 35 RAID Configuration Strategies
- 36 Maximizing Fault Tolerance
- 36 Maximizing Performance
- 37 Maximizing Storage Capacity
- 38 RAID Availability
- 38 RAID Availability Concept
- 39 Configuration Planning
- 39 Number of Drives
- 41 Chapter 3: SafeStore Disk Encryption
- 41 Terminology
- 42 Workflow
- 42 Enable Security
- 42 Change Security
- 43 Create Secure Virtual Drives
- 43 Import a Foreign Configuration
- 44 Instant Secure Erase
- 45 Chapter 4: WebBIOS Configuration Utility
- 45 Overview
- 45 Starting the WebBIOS Configuration Utility
- 46 WebBIOS Configuration Utility Main Dialog Options
- 48 Managing Software Licensing
- 48 Managing MegaRAID Advanced Software Options
- 50 Reusing the Activation Key
- 50 Managing Advanced Software Summary
- 51 Activating an Unlimited Key Over a Trial Key
- 52 Activating a Trial Software
- 52 Activating an Unlimited Key
- 53 Securing MR Advanced SW
- 53 Confirm Re-hosting Process
- 54 Re-hosting Process Complete
- 55 Creating a Storage Configuration
- 59 Using Automatic Configuration
- 59 Using Manual Configuration
- 59 Virtual Drive Options
- 61 Using Manual Configuration: RAID 0
- 63 Using Manual Configuration: RAID 1
- 66 Using Manual Configuration: RAID 5
- 69 Using Manual Configuration: RAID 6
- 72 Using Manual Configuration: RAID 00
- 76 Using Manual Configuration: RAID 10
- 81 Using Manual Configuration: RAID 50
- 85 Using Manual Configuration: RAID 60
- 89 CacheCade Configuration
- 90 Creating a MegaRAID CacheCade Configuration
- 90 Figure 59 WebBIOS Select Configuration Wizard Dialog
- 91 Figure 60 Drive Group Definition
- 92 Figure 61 Span Definition Dialog
- 93 Figure 62 SSD Caching Disk Dialog
- 94 Figure 63 CacheCade Configuration Preview Dialog
- 94 Creating a MegaRAID CacheCade Pro 2.0 Software Configuration
- 99 Modifying CacheCade Pro 2.0 Virtual Drive Properties
- 99 Enabling or Disabling SSD Caching on a Virtual Drive
- 100 Enabling or Disabling SSD Caching on Multiple Virtual Drives
- 101 Enabling SSD Caching on New Virtual Drives
- 102 Clearing Configurations on CacheCade Pro 2.0 Virtual Drives
- 103 Removing Blocked Access
- 104 Selecting SafeStore Encryption Services Security Options
- 104 Enabling the Security Key Identifier, Security Key, and Password
- 108 Changing the Security Key Identifier, Security Key, and Pass Phrase
- 112 Disabling the Drive Security Settings
- 113 Viewing and Changing Device Properties
- 113 Viewing Controller Properties
- 117 Controller Information Menu Options
- 119 Viewing Virtual Drive Properties, Policies, and Operations
- 121 Viewing Drive Properties
- 122 Shield State
- 122 Shield State Physical View
- 122 Logical View Shield State
- 123 Viewing the Physical Drive Properties of a Drive in Shield State
- 124 Viewing if Shield State Is Enabled in a Controller
- 125 Viewing and Changing Battery Backup Unit Information
- 128 BBU Modes
- 128 Setting the Learn Delay Interval
- 129 Setting the Auto Learn Mode
- 129 Managing Link Speed
- 131 Viewing Enclosure Properties
- 133 SSD Disk Cache Policy
- 134 Viewing Cache Properties
- 134 Emergency Hotspare
- 134 Emergency Hotspare for Physical Drives
- 135 Emergency Hotspare for Controllers
- 135 Setting Controller Hotspare Properties
- 136 Viewing Controller Hotspare Properties
- 137 Commissioned Hotspare
- 138 Viewing and Expanding a Virtual Drive
- 140 Recovering and Clearing Punctured Block Entries
- 140 Suspending and Resuming Virtual Drive Operations
- 141 Using MegaRAID Recovery
- 142 Recovery Scenarios
- 142 Enabling the Recovery Advanced Software
- 145 Creating Snapshots and Views
- 149 Creating Concurrent Snapshots
- 151 Selecting the Snapshot Settings
- 153 Viewing Snapshot Properties
- 155 Restoring a Virtual Drive by Rolling Back to a Snapshot
- 156 Cleaning Up a Snapshot Repository
- 158 Non-SED Secure Erase
- 158 Erasing a Non-SED Physical Drive
- 160 Drive Erase Progress
- 161 Virtual Drive Erase
- 162 Group Show Progress for Virtual Drive Erase
- 163 Viewing System Event Information
- 165 Managing Configurations
- 165 Running a Consistency Check
- 165 Deleting a Virtual Drive
- 166 Importing or Clearing a Foreign Configuration
- 168 Foreign Configurations in Cable Pull and Drive Removal Scenarios
- 169 Importing Foreign Configurations from Integrated RAID to MegaRAID
- 169 Troubleshooting Information
- 170 Importing Foreign Configurations
- 170 Migrating the RAID Level of a Virtual Drive
- 170 Additional Drives Required for RAID-Level Migration
- 171 Migrating the RAID Level
- 172 New Drives Attached to a MegaRAID Controller
- 172 WebBIOS Dimmer Switch
- 176 Power-Save Mode
- 176 Power Save Settings – Advanced
- 177 Power-Save While Creating Virtual Drives
- 179 Chapter 5: MegaRAID Command Tool
- 179 Product Overview
- 180 Novell NetWare, SCO, Solaris, FreeBSD, and MS-DOS Operating System Support
- 180 Command Line Abbreviations and Conventions
- 181 Abbreviations Used in the Command Line
- 181 Conventions
- 182 Pre-boot MegaCLI
- 183 CacheCade Related Options
- 183 Create a Solid State Drive Cache Drive to Use as Secondary Cache
- 183 Delete a Solid State Drive Cache Drive
- 183 Associate/Disassociate Virtual Drives
- 183 Display CacheCade Pro 2.0 Configurations on a Controller
- 184 Create a RAID Drive Group for CacheCade Pro 2.0 from All Unconfigured Good Drives
- 184 Remove Blocked Access on a Virtual Drive
- 185 Create RAID 0 Configuration with SSD Caching
- 185 Create a RAID Level 10, 50, 60 (Spanned) Configuration with SSD Caching
- 186 Delete Virtual Drives with SSD Caching
- 186 Clear Configurations on CacheCade Pro 2.0 Virtual Drives
- 187 Create a CacheCade Pro 2.0 Virtual Drive with RAID Level and Write Policy
- 187 Software License Key
- 187 SafeStore Security Options
- 188 Use Instant Secure Erase on a Physical Drive
- 188 Secure Data on a Virtual Drive
- 188 Destroy the Security Key
- 189 Create a Security Key
- 189 Create a Drive Security Key
- 189 Change the Security Key
- 190 Get the Security Key ID
- 190 Set the Security Key ID
- 190 Verify the Security Key
- 191 Controller Property-Related Options
- 191 Display Controller Properties
- 191 Display Number of Controllers Supported
- 191 Enable or Disable Automatic Rebuild
- 191 Flush Controller Cache
- 192 Set Controller Properties
- 194 Display Specified Controller Properties
- 195 Set Factory Defaults
- 195 Set SAS Address
- 195 Set Time and Date on Controller
- 195 Display Time and Date on Controller
- 195 Get Connector Mode
- 196 Set Connector Mode
- 196 Patrol Read-Related Controller Properties
- 196 Set Patrol Read Options
- 197 Set Patrol Read Delay Interval
- 197 Set Patrol Read on Single, Multiple, or All Adapters
- 198 BIOS-Related Properties
- 198 Set or Display Bootable Virtual Drive ID
- 198 Select BIOS Status Options
- 199 Battery Backup Unit-Related Properties
- 199 Display BBU Information
- 199 Display BBU Status Information
- 200 Display BBU Capacity
- 201 Display BBU Design Parameters
- 201 Display Current BBU Properties
- 202 Start BBU Learning Cycle
- 202 Place Battery in Low-Power Storage Mode
- 202 Set BBU Properties
- 203 Seal the Gas Gauge EEPROM Write Access
- 203 Options for Displaying Logs Kept at the Firmware Level
- 203 Event Log Management
- 204 Set BBU Terminal Logging
- 205 Configuration-Related Options
- 205 Create a RAID Drive Group from All Unconfigured Good Drives
- 206 Add RAID 0, 1, 5, or 6 Configuration
- 207 Add RAID 10, 50, or 60 Configuration
- 208 Clear the Existing Configuration
- 208 Save the Configuration on the Controller
- 209 Restore the Configuration Data from File
- 209 Manage Foreign Configuration Information
- 209 Delete Specified Virtual Drives
- 210 Display the Free Space
- 210 Virtual Drive-Related Options
- 210 Display Virtual Drive Information
- 210 Change the Virtual Drive Cache and Access Parameters
- 211 Display the Virtual Drive Cache and Access Parameters
- 211 Manage Virtual Drives Initialization
- 212 Manage a Consistency Check
- 212 Schedule a Consistency Check
- 212 Manage a Background Initialization
- 213 Perform a Virtual Drive Reconstruction
- 213 Display Information about Virtual Drives and Drives
- 214 Display the Bad Block Table
- 214 Recovering and Clearing Punctured Block Entries
- 215 Display the Number of Virtual Drives
- 215 Clear the LDBBM Table Entries
- 215 Display the List of Virtual Drives with Preserved Cache
- 215 Discard the Preserved Cache of a Virtual Drive
- 215 Expand a Virtual Drive
- 216 Drive-Related Options
- 216 Display Drive Information
- 216 Set the Drive State to Online
- 217 Set the Drive State to Offline
- 217 Change the Drive State to Unconfigured-Good
- 217 Change the Drive State
- 217 Manage a Drive Initialization
- 218 Rebuild a Drive
- 218 Locate the Drives and Activate LED
- 219 Mark the Configured Drive as Missing
- 219 Display the Drives in Missing Status
- 219 Replace the Configured Drives and Start an Automatic Rebuild
- 219 Prepare the Unconfigured Drive for Removal
- 220 Display Total Number of Drives
- 220 Display List of Physical Devices
- 220 Download Firmware to the Physical Devices
- 221 Configure All Free Drives into a RAID 0, 1, 5, or 6 Configuration for a Specific Controller
- 222 Set the Mapping Mode of the Drives to the Selected Controllers
- 222 Secure Erase for Virtual Drives and Physical Drives
- 222 Perform the Copyback Operation on the Selected Drive
- 223 Enclosure-Related Options
- 223 Display Enclosure Information
- 223 Display Enclosure Status
- 224 Upgrade the Firmware without Restarting
- 224 Flashing the Firmware
- 224 Flash the Firmware with the ROM File
- 224 Flash the Firmware in Mode 0 with the ROM File
- 225 SAS Topology
- 225 Diagnostic-Related Options
- 225 Start Controller Diagnostics
- 225 Perform a Full Stroke Seek Test
- 226 Start Battery Test
- 226 Recovery (Snapshot)-Related Options
- 226 Enable the Snapshot Feature
- 226 Disable the Snapshot Feature
- 227 Take a Snapshot of a Volume
- 227 Set the Snapshot Properties
- 227 Delete a Snapshot
- 228 Create a View
- 228 Delete a View
- 228 Roll Back to an Older Snapshot
- 229 Display Snapshot and View Information
- 229 Clean the Recoverable Free Space on the Drives in a Virtual Drive
- 229 Display the Information for a Specific View
- 230 Enable the Snapshot Scheduler
- 230 Fast Path-Related Options
- 230 Dimmer Switch-Related Options
- 230 Display Selected Adapter Properties
- 231 Set the Properties on the Selected Adapter
- 232 Display the Power-Saving Level on the Virtual Disk
- 232 Add a RAID Level to a Specified Adapter
- 232 Create a RAID Level
- 233 Add the Unconfigured Drive to a Specified Adapter
- 234 Display the Cache and Access Policies
- 235 Performance Monitoring Options
- 235 Start Performance Data Collection
- 235 Stop Performance Data Collection
- 235 Save Performance Data
- 235 Miscellaneous Commands
- 236 Display the Version
- 236 Display the MegaCLI Version
- 236 Display Help for MegaCLI
- 236 Display Summary Information
- 237 Chapter 6: MegaRAID Storage Manager Overview and Installation
- 237 Overview
- 237 Creating Storage Configurations
- 237 Monitoring Storage Devices
- 237 Maintaining Storage Configurations
- 237 Hardware and Software Requirements
- 238 Installing MegaRAID Storage Manager
- 238 Prerequisite for MegaRAID Storage Manager Installation
- 239 Installing MegaRAID Storage Manager Software on Microsoft Windows
- 243 Setup Options
- 244 Installing MegaRAID Storage Manager Software for the Solaris 10 x86 Operating System
- 244 Uninstalling MegaRAID Storage Manager Software on the Solaris 10 x86 Operating System
- 245 Installing MegaRAID Storage Manager Software for the Solaris SPARC Operating System
- 245 Uninstalling MegaRAID Storage Manager Software on the Solaris SPARC Operating System
- 245 Prerequisites for Installing MegaRAID Storage Manager on the RHEL6.X x64 Operating System
- 246 Installing MegaRAID Storage Manager Software for the Linux Operating System
- 247 Linux Error Messages
- 247 Kernel Upgrade
- 247 Installing MegaRAID Storage Manager Software for the Linux Operating System
- 247 Executing a CIM Plug-in on Red Hat Enterprise Linux 5
- 248 MegaRAID Storage Manager Customization
- 248 Stopping the Pop-Up Notification Process
- 249 Windows Operating System
- 249 Linux, Solaris x86, and Solaris SPARC Operating Systems
- 249 Restarting the Pop-Up Notification Process
- 249 MegaRAID Storage Manager Support and Installation on VMware
- 249 Prerequisites for Installing MegaRAID Storage Manager for VMware
- 250 Installing MegaRAID Storage Manager on VMware ESX (VMware Classic)
- 250 Uninstalling MegaRAID Storage Manager for VMware
- 250 MegaRAID Storage Manager Support on the VMware ESXi Operating System
- 251 Limitations
- 251 Differences in MegaRAID Storage Manager for the VMware ESXi System
- 252 Installing and Configuring a CIM Provider
- 252 Installing a CIM SAS Storage Provider on the Linux Operating System
- 253 Running the CIM SAS Storage Provider on Pegasus
- 253 Installing a CIM SAS Storage Provider on Windows
- 253 Installing and Configuring an SNMP Agent
- 254 Prerequisite for LSI SNMP Agent RPM Installation
- 254 Prerequisite for Installing SNMP Agent on Linux Server
- 254 Installing and Configuring an SNMP Agent on a Linux Operating System
- 255 Installing and Configuring an SNMP Agent on the Solaris Operating System
- 255 Prerequisites
- 256 Installing SNMP on the Solaris Operating System
- 256 LSI SAS SNMP MIB Location
- 256 Starting, Stopping, and Checking the Status of the LSI SAS SNMP Agent
- 256 Configuring the snmpd.conf File
- 257 Configuring SNMP Traps
- 257 Uninstalling the SNMP Package
- 258 Installing an SNMP Agent on the Windows Operating System
- 258 Installing SNMP Agent
- 258 Installing SNMP Service for the Windows Operating System
- 258 Installing SNMP Service on the Server Side
- 258 Installing SNMP Service for the Windows 2008 Operating System
- 259 Configuring SNMP Service on the Server Side for the Windows 2008 Operating System
- 259 Installing MegaCLI for VMware 5.0
- 260 MegaRAID Storage Manager Remotely Connecting to VMware ESX
- 260 Prerequisites to Running MegaRAID Storage Manager Remote Administration
- 261 Chapter 7: MegaRAID Storage Manager Window and Menus
- 261 Starting the MegaRAID Storage Manager Software
- 265 LDAP Support
- 267 Configuring LDAP Support Settings
- 268 MegaRAID Storage Manager Main Menu
- 268 Dashboard / Physical View/ Logical View
- 270 Physical Drive Temperature
- 271 Shield State
- 271 Shield State Physical View
- 272 Logical View Shield State
- 273 Viewing the Physical Drive Properties
- 273 Viewing Server Profile of a Drive in Shield State
- 274 Displaying the Virtual Drive Properties
- 274 Parity Size
- 275 Mirror Data Size
- 276 Metadata Size
- 276 Emergency HotSpare Support
- 276 Emergency Hotspare for Physical Drives
- 277 Emergency Hotspare Property for Controllers
- 278 Commissioned Hotspare
- 279 SSD Disk Cache Policy
- 279 Virtual Drive Settings
- 280 Set Virtual Drive Properties
- 281 Non-SED Secure Erase Support
- 283 Group Show Progress
- 284 Virtual Drive Erase
- 286 Group Show Progress for Virtual Drive Erase
- 287 Rebuild Write Cache
- 287 Background Suspend or Resume Support
- 289 Enclosure Properties
- 290 Monitoring Battery Backup Units
- 291 GUI Elements in the MegaRAID Storage Manager Window and Menus
- 291 Icons
- 292 Properties and Graphical View Tabs
- 293 Event Log Panel
- 293 Menu Bar
- 295 Chapter 8: Configuration
- 295 Creating a New Storage Configuration
- 295 Selecting Virtual Drive Settings
- 296 Optimum Controller Settings for CacheCade
- 296 Optimum Controller Settings for FastPath
- 296 Creating a Virtual Drive Using Simple Configuration
- 300 Figure 189 Create Virtual Drive - Summary Window
- 300 Creating a Virtual Drive Using Advanced Configuration
- 307 Converting JBOD Drives to Unconfigured Good
- 308 Converting JBOD to Unconfigured Good from the MegaRAID Storage Manager Window
- 308 Adding Hot Spare Drives
- 309 Changing Adjustable Task Rates
- 311 Changing Power Settings
- 312 Enhanced Dimmer Switch Power Settings
- 314 Power Save Settings – Advanced
- 314 Automatically Spin Up Drives
- 315 Power-Save Mode
- 316 Power-Save Mode – SSD Drives
- 316 Recovering and Clearing Punctured Block Entries
- 317 Changing Virtual Drive Properties
- 319 Changing a Virtual Drive Configuration
- 319 Accessing the Modify Drive Group Wizard
- 320 Adding a Drive or Drives to a Configuration
- 323 Removing a Drive from a Configuration
- 324 Replacing a Drive
- 324 Migrating the RAID Level of a Virtual Drive
- 327 New Drives Attached to a MegaRAID Controller
- 328 Deleting a Virtual Drive
- 329 Chapter 9: Monitoring Controllers and Their Attached Devices
- 329 Alert Delivery Methods
- 329 Vivaldi Log/MegaRAID Storage Manager Log
- 331 System Log
- 331 Pop-up Notification
- 331 Email Notification
- 332 Configuring Alert Notifications
- 334 Editing Alert Delivery Methods
- 335 Changing Alert Delivery Methods for Individual Events
- 336 Changing the Severity Level for Individual Events
- 337 Roll Back to Default Individual Event Configuration
- 337 Entering or Editing the Sender Email Address and SMTP Server
- 338 Authenticating the SMTP Server
- 338 Adding Email Addresses of Recipients of Alert Notifications
- 339 Testing Email Addresses of Recipients of Alert Notifications
- 339 Removing Email Addresses of Recipients of Alert Notifications
- 340 Saving Backup Configurations
- 340 Loading Backup Configurations
- 340 Monitoring Server Events
- 341 Monitoring Controllers
- 342 Monitoring Drives
- 343 Running a Patrol Read
- 344 Patrol Read Task Rates
- 345 Monitoring Virtual Drives
- 346 Monitoring Enclosures
- 346 Monitoring Battery Backup Units
- 348 Battery Learn Cycle
- 348 Setting Automatic Learn Cycle Properties
- 350 Starting a Learn Cycle Manually
- 350 Monitoring Rebuilds and Other Processes
- 352 Chapter 10: Maintaining and Managing Storage Configurations
- 352 Initializing a Virtual Drive
- 352 Running a Group Initialization
- 353 Running a Consistency Check
- 354 Setting the Consistency Check Settings
- 354 Scheduling a Consistency Check
- 356 Running a Group Consistency Check
- 357 Scanning for New Drives
- 357 Rebuilding a Drive
- 358 New Drives Attached to a MegaRAID Controller
- 358 Making a Drive Offline or Missing
- 359 Removing a Drive
- 359 Upgrading the Firmware
- 361 Chapter 11: Using MegaRAID Advanced Software
- 361 MegaRAID Advanced Software
- 361 Recovery Advanced Software
- 362 MegaRAID Software Licensing
- 362 Managing MegaRAID Advanced Software
- 365 Activation Key
- 365 Advanced MegaRAID Software Status Summary
- 366 Application Scenarios and Messages
- 367 Activating an Unlimited Key over a Trial Key
- 368 Activating a Trial Software
- 369 Activating the Unlimited Key
- 370 Reusing the Activation Key
- 370 Securing Advanced MegaRAID Software
- 371 Configuring Key Vault (Re-hosting Process)
- 373 Re-hosting Complete
- 374 Deactivate Trial Software
- 375 MegaRAID Recovery
- 375 Recovery Scenarios
- 376 Enabling the Recovery Advanced Software
- 376 Snapshot Repository
- 378 Selecting the Virtual Drive
- 379 Scheduling Snapshots
- 380 Editing Snapshots
- 382 Snapshot Base Details
- 383 Manage Snapshots
- 385 Editing Schedule
- 385 Advanced Settings
- 386 Create View Using Manage Snapshots Wizard
- 387 Viewing Snapshot Details
- 387 No View Details for Snapshot
- 388 No Snapshot Schedule
- 389 Graphical Representation of Repository Virtual Drive
- 390 Deleting a Snapshot
- 390 Disabling MegaRAID Recovery
- 391 Using the MegaRAID CacheCade Advanced Software
- 395 Using the MegaRAID CacheCade Pro 2.0 Software
- 398 Modifying the CacheCade Virtual Drive Properties
- 399 Enabling SSD Caching on a Virtual Drive
- 400 Disabling SSD Caching on a Virtual Drive
- 400 Enabling or Disabling SSD Caching on Multiple Virtual Drives
- 401 Modifying a CacheCade Drive Group
- 402 Clearing Configuration on CacheCade Pro 2.0 Virtual Drives
- 402 Removing Blocked Access
- 403 Deleting a Virtual Drive with SSD Caching Enabled
- 404 Fast Path Advanced Software
- 404 Setting Fast Path Options
- 405 LSI MegaRAID SafeStore Encryption Services
- 405 Enabling Drive Security
- 408 Changing Security Settings
- 409 Disabling Drive Security
- 410 Importing or Clearing a Foreign Configuration
- 411 Foreign Configurations in Cable Pull and Drive Removal Scenarios
- 412 Managing Link Speed
- 415 Appendix A Events and Messages
- 415 Error Levels
- 415 Event Messages
- 427 Appendix B MegaCLI Error Messages
- 427 Error Messages and Descriptions
- 430 Appendix C History of Technical Changes
- 432 Glossary