Users Guide
Table Of Contents
- Dell Technologies PowerEdge RAID Controller 11 User’s Guide PERC H755 adapter, H755 front SAS, H755N front NVMe, and PERC H755 MX adapter
- Contents
- Dell Technologies PowerEdge RAID Controller 11
- Applications and User Interfaces supported by PERC 11
- Features of PowerEdge RAID Controller 11
- Controller features
- Virtual disk features
- Hard drive features
- Fault tolerance
- Install and remove a PERC 11 card
- Safety instructions
- Before working inside your system
- After working inside your system
- Remove the PERC H755 adapter
- Install the PERC H755 adapter
- Remove the PERC H755 front SAS card
- Install the PERC H755 front SAS card
- Remove the PERC H755N front NVMe card
- Install the PERC H755N front NVMe card
- Remove the PERC H755 MX adapter
- Install the PERC H755 MX adapter
- Driver support for PERC 11
- Firmware
- Manage PERC 11 controllers using HII configuration utility
- Enter the PERC 11 HII configuration utility
- Exit the PERC 11 HII configuration utility
- Navigate to Dell PERC 11 configuration utility
- View the HII Configuration utility dashboard
- Configuration management
- Controller management
- Clear controller events
- Save controller events
- Save debug log
- Enable security
- Disable security
- Change security settings
- Restore factory default settings
- Auto configure behavior
- Manage controller profile
- Advanced controller properties
- Virtual disk management
- Physical disk management
- Hardware components
- Security key management in HII configuration utility
- Security key and RAID management
- Security key implementation
- Local Key Management
- Create a security key
- Change Security Settings
- Disable security key
- Create a secured virtual disk
- Secure a non-RAID disk
- Secure a pre-existing virtual disk
- Import a secured non-RAID disk
- Import a secured virtual disk
- Dell Technologies OpenManage Secure Enterprise Key Manager
- Supported controllers for OpenManage Secure Enterprise Key Manager
- Manage enterprise key manager mode
- Disable enterprise key manager mode
- Manage virtual disks in enterprise key manager mode
- Manage non–RAID disks in enterprise key manager mode
- Migration of drives from local key management to enterprise key management
- Troubleshooting
- Single virtual disk performance or latency in hypervisor configurations
- Configured disks removed or not accessible error message
- Dirty cache data error message
- Discovery error message
- Drive Configuration Changes Error Message
- Windows operating system installation errors
- Firmware fault state error message
- Foreign configuration found error message
- Foreign configuration not found in HII error message
- Degraded state of virtual disks
- Memory errors
- Preserved Cache State
- Security key errors
- General issues
- Physical disk issues
- Physical disk in failed state
- Unable to rebuild a fault tolerant virtual disk
- Fatal error or data corruption reported
- Multiple disks are inaccessible
- Rebuilding data for a failed physical disk
- Virtual disk fails during rebuild using a global hot spare
- Dedicated hot spare disk fails during rebuild
- Redundant virtual disk fails during reconstruction
- Virtual disk fails rebuild using a dedicated hot spare
- Physical disk takes a long time to rebuild
- Drive removal and insertion in the same slot generates a foreign configuration event
- SMART errors
- Replace member errors
- Linux operating system errors
- Drive indicator codes
- HII error messages
- Appendix RAID description
- Getting help
- Documentation resources
Multi-bit errors are more serious as they result in corrupted data and data loss. The following are the actions that occur in the
case of multi-bit errors:
● If a multi-bit error occurs while accessing data in the cache when the controller is started with dirty cache, the controller
discards the cache contents. The controller generates a warning message to the system console to indicate that the cache
was discarded and generates an event.
● If a multi-bit error occurs at run-time either in code/data or in the cache, the controller stops.
● The controller logs an event to the controller’s internal event log and a message during POST is displayed indicating a
multi-bit error has occurred.
NOTE: In case of a multi-bit error, contact Global Technical Support.
Preserved Cache State
The controller preserves the dirty cache from a virtual disk if the virtual disk goes offline or is deleted because of missing
physical disks. This preserved dirty cache is called pinned cache and is preserved until you import the virtual disk or discard the
cache.
1. Import the virtual disk—Power off the system, re-insert the virtual disk and restore the system power. Use the HII
Configuration Utility to import the foreign configuration.
2. Discard the preserved cache—See Clear the cache memory.
NOTE: It is recommended to clear the preserved cache before reboot using any of the virtual disks present on the
controller.
Security key errors
Secured foreign import errors
A foreign configuration is a RAID configuration that already exists on a replacement physical disk that you install in a system. A
secured foreign configuration is a RAID configuration that was created under a different security key.
There are two scenarios in which a secured foreign import fails:
● The passphrase authentication fails—A virtual disk secured with a security key different from the current controller
security key cannot be imported without authentication of the original passphrase used to secure them. Supply the correct
passphrase to import the secured foreign configuration. If you have lost or forgotten the passphrase, the secured foreign
disks remain locked (inaccessible) until the appropriate passphrase is entered or if they are erased.
● The secured virtual disk is in an offline state after supplying the correct passphrase—You must check to determine
why the virtual disk failed and correct the problem.
Failure to select or configure non Self-Encrypting Disks non-SED
A virtual disk can be either secured or unsecured depending on how it was configured when created. In order to create a
secured virtual disk, the controller must have a security key present and must contain SEDs only. In order to select/configure
non-SED, you must create an unsecured virtual disk. You can create an unsecured virtual disk even if there is a security key.
Select the Secure VD option as No in the Create New VD menu. For steps on how to create an unsecured virtual disk, see
Create virtual disks.
Failure to delete security key
A security key is used to lock or unlock access to a security-enabled component. This key is not utilized in the actual encryption
of data. If a security key is present, both secured and unsecured virtual disks may exist.
To delete the security key, you must have a previously established security key present on the controller and there cannot be
any configured secured disks. If there are configured secured virtual disks, remove or delete them.
72
Troubleshooting