Instruction Manual

Security Key and RAID Management 129
Failure to Select or Configure Non Self-Encrypting Disks (non-SED)
A virtual disk can be either secured or unsecured depending on how it was
configured when created. In order to create a secured virtual disk, the
controller must have a security key present and must be composed of SEDs
only. In order to select/configure non-SED, you must create an unsecured
virtual disk. You can create an unsecured virtual disk even if there is a security
key present. Select the secure virtual disk option as No in the Create New VD
menu. See "Creating Virtual Disks" on page 88 for steps on how to create an
unsecured virtual disk.
Failure to Delete Security Key
A security key is used to lock or unlock access to a security-enabled
component. This key is not utilized in the actual encryption of data. If a
security key is present, both secured and unsecured virtual disks may exist.
To delete the security key, you must have a previously established security key
present on the controller and there can not be any configured secured disks.
If there are configured secured disks, remove or delete them.
Failure to Instant Secure Erase Task on Physical Disks
Instant Secure Erase is the process of securely erasing all data permanently on
an encryption-capable physical disk and resetting the security attributes. It is
used in a couple of scenarios such as deleting a foreign configuration in the
event of a forgotten or lost passphrase or unlocking a disk that had been
previously locked.
Instant Secure Erase can be executed only on encryption-capable disks as long
as the disks are not hot spares and are not configured (not part of a virtual
disk). Ensure that the conditions are met and see "Instant Secure Erase" on
page 128.
PERC7.2_UG.book Page 129 Thursday, March 3, 2011 2:14 PM