Users Guide
Table Of Contents
- Dell Lifecycle Controller GUI Version 3.00.00.00 User's Guide
- Contents
- Introduction
- Using Lifecycle Controller
- Operating system deployment
- Monitor
- Hardware inventory view and export
- About view and export current inventory
- About view and export factory-shipped inventory
- Viewing hardware inventory — current or factory shipped
- Exporting hardware inventory — current or factory shipped
- Viewing or exporting hardware inventory after part replacement
- Viewing or exporting current inventory after resetting Lifecycle Controller
- Lifecycle Controller log
- Firmware update
- Configure
- System control panel access options
- Configuring iDRAC
- Configuring system time and date
- Configuring vFlash SD card
- Configuring RAID
- Configuring RAID using software RAID
- Creating a secure virtual disk on a RAID controller
- Key encryption
- Local key encryption mode
- Breaking mirrored drives
- System setup — Advanced Hardware Configuration
- Collect system inventory on restart
- Configuring local FTP server
- Configuring a local USB drive
- Configuring NFS and CIFS servers
- Conditions while configuring HTTP server
- Maintain
- Platform restore
- Backup server profile
- Export server profile
- Import server profile
- Import server license
- Part replacement configuration
- Repurpose or retire system
- Hardware diagnostics
- SupportAssist Collection
- Easy-to-use system component names
- Using the system setup and boot manager
- Troubleshooting and frequently asked questions
Creating a secure virtual disk on a RAID controller
Make sure that the controller is encrypted with a local key. For more information on encrypting with a local key, see Key
Encryption.
To create a secure virtual disk on a RAID controller:
1. Start Lifecycle Controller. For more information, see Starting Lifecycle Controller
2. In the left pane, click Hardware Configuration.
3. In the right pane, click Configuration Wizards.
4. Under Storage Configuration Wizards, click RAID Configuration to launch the wizard.
The View Current RAID Configuration and Select Controller page is displayed along with the information on whether
the displayed virtual disk is secure.
5. Select a security capable controller and click Next.
If the non-RAID disks are attached to the selected controller, select the non-RAID physical disk-drives, and then click Next
to initialize them. Else, the Select RAID Level page is displayed.
NOTE: During initialization, all the data on the non-RAID disk drives are deleted.
6. Select the RAID level and click Next.
The Select Physical Disks page is displayed.
NOTE: Create boot virtual disks only from disk drives populated across slots 0–3 of the system. For slot information,
see the system Owner’s Manual.
7. From the Encryption Capability drop-down menu, select Self-encryption.
The self-encryption disks (SEDs) are displayed.
8. Select the SEDs and specify the properties, and then click Next.
The Virtual Disk Attributes page is displayed.
9. Select the virtual disk parameters, select the Secure Virtual Disk option, and click Next.
The Summary page is displayed.
10. To apply the RAID configuration, click Finish.
Key encryption
Use the Key Encryption feature to:
● Apply local encryption for PERC H730, H730P, H740, H740P, H840 RAID controllers.
● Delete the local encryption key.
● Encrypt the existing unsecure virtual drives.
● To change an existing encryption key to another one.
Applying the local key on a RAID controller
Before applying the local key on a RAID controller, make sure that the controller is security-capable.
To apply the local key on a RAID controller:
1. Start Lifecycle Controller. For more information, see Starting Lifecycle Controller
2. In the left pane, click Hardware Configuration.
3. In the right pane, click Configuration Wizards.
4. Under Storage Configuration wizards, click Key Encryption.
5. Select the controller to apply a local key and click Next.
6. Click Set up local key encryption and click Next.
NOTE: Some controller options are disabled if they do not support encryption.
7. Enter the Encryption Key Identifier that is associated with the entered passphrase.
The Encryption Key Identifier is a passphrase hint; you must enter the passphrase when Lifecycle Controller prompts this
hint.
8. In the New Passphrase field, enter a passphrase.
Configure
45