User's Manual

Supported Non-RAID Controllers
Storage Management supports the following non-RAID controllers.
l Ultra SCSI, Ultra2 SCSI, Ultra160 SCSI, LSI 1020, LSI 1030, and LSI PCI-e U320
l SAS 5/i Integrated
l SAS 5/E
l SAS 6Gbps Adapter
Supported Enclosures
This release of Storage Management supports the following enclosures:
l DellPowerVault™20xSand21xSstoragesystems
l Dell PowerVault 220S and 221S storage systems
l Dell PowerVault MD1000 and MD1120 storage system
l Dell PowerVault MD1200 and MD1220 storage system
Support for Disk and Volume Management
Storage Management does not provide disk and volume management. To implement disk and volume management, you need to use the native disk and
volume management utilities provided by your operating system.
Support for Security Key Management
Storage Management enables creating, changing, and deleting the Security Key on a security-capable controller. PERC H700 and H800 family of controllers are
security-capable. You can enable security on these security-capable controllers through the Storage Management graphical user interface (GUI) or the
Command Line Interface (CLI). Setting a Security Key allows you to create secured virtual disks using Self Encryption Disks (SED). The data stored in the
secured virtual disk is encrypted.
For information on Command Line Interface, see Dell OpenManage Server Administrator Command Line Interface User's Guide on the Dell Support website at
support.dell.com/manuals.
Security Key
The controller uses the Security Key to lock or unlock access to Self Encryption Disks (SEDs). You can create only one Security Key for each security-enabled
controller.
Create a Security Key on a security-capable controller by providing a Security Key Identifier and a Passphrase.
Security Key Identifier
A Security Key Identifier is a user-supplied text label for the Passphrase. The identifier helps you determine which Passphrase to enter during authentication
for import of foreign secured SED drives.
Passphrase
A Passphrase is a user supplied string that the controller uses to create the Security Key.
For more information on creating a Security Key, see "Manage Security Key."
Back to Contents Page
however, use Storage Management to create a virtual disk on the PERC 4/IM controller. Storage Management supports other functions provided by the
PERC 4/IM controller. See "Integrated Mirroring and the PERC 4/IM Controller" for more information.