Users Guide

Table Of Contents
Deleting Encryption Key Using RACADM
To delete an encryption key by running a RACADM command, use the following syntax:
racadm raid deletesecuritykey:RAID.ChassisIntegrated.1-1
For more information, see the Chassis Management Controller PowerEdge VRTX RACADM Command Line Reference Guide.
Encrypting Virtual Disks
You can encrypt virtual disks created on SEDs after configuring an encryption key on the controller. Whenever you perform an
encryption, a message is logged in the CMC Log. You can encrypt virtual disks:
Security key is configured on the controller.
All the drives on the virtual disk are SEDs.
Encrypting one virtual disk enables encryption on all the virtual disks on the same disks group.
You must have the Chassis Configuration Administrator privilege to encrypt virtual disks.
Encrypting Virtual Disks Using CMC Web Interface
To encrypt an existing virtual disk:
1. In the left pane, click Storage > Virtual Disks > Manage.
2. From the Virtual Actions drop-down, select Encrypt Virtual Disk and click Apply.
NOTE: The Encrypt Virtual Disk option is available only if unsecure virtual disks are configured in the SED.
Encrypting Virtual Disks Using RACADM
To encrypt virtual disks by running a RACADM command, use the following syntax:
racadm raid encryptvd:Disk.Virtual.0:RAID.ChassisIntegrated.1-1
For more information, see the Chassis Management Controller PowerEdge VRTX RACADM Command Line Reference Guide.
Unlocking Foreign Configuration
Drives which are part of secure virtual disks are called secured drives. Secured drives can be migrated from one controller to
another controller. If a different encryption or security key is configured for the destination controller, the security status of
these drives is displayed as locked and cannot be seen as part of preview foreign config. The Import foreign config does not
detect these foreign drives.
While running the unlock command, provide the source controller passphrase and key ID for these drives. Even after unlocking,
the foreign controller key still secures these drives. However, you can see these drives while searching for foreign drives in the
existing preview foreign config. You can import or clear the foreign configuration on these secure drives.
If foreign drives with different security keys are migrated from more than one controller, then unlock and import or clear the
set of drives from one foreign controller before unlocking the drives migrated from another controller. This action ensures that
unlock is not allowed on a controller, if the controller has drives that are unlocked but not imported or cleared.
Once drives are unlocked, you can import the foreign configuration using the CMC web interface or RACADM.
If the controller is power cycled after the unlock and before the import phase, the drives are locked again.
If the system has multiple foreign configurations, unlock and import each foreign configuration before unlocking the foreign
configuration.
The key ID used in unlocking is used only to identify the drives with matching the key ID. After the matching drives are found,
the passphrase is used for unlocking the drives.
186
Managing Chassis Storage