Users Guide

Table Of Contents
3. Click OK to proceed.
After you delete the encryption key, all the SEDs that are not part of the virtual disks are secure-erased. For more information, see the
Online Help.
Deleting Encryption Key Using RACADM
To delete an encryption key by running a RACADM command, use the following syntax:
racadm raid deletesecuritykey:RAID.ChassisIntegrated.1-1
For more information, see the Chassis Management Controller PowerEdge VRTX RACADM Command Line Reference Guide.
Encrypting Virtual Disks
You can encrypt virtual disks created on SEDs after configuring an encryption key on the controller. Whenever you perform an encryption,
a message is logged in the CMC Log. You can encrypt virtual disks:
Security key is configured on the controller.
All the drives on the virtual disk are SEDs.
Encrypting one virtual disk enables encryption on all the virtual disks on the same disks group.
You must have the Chassis Configuration Administrator privilege to encrypt virtual disks.
Encrypting Virtual Disks Using CMC Web Interface
To encrypt an existing virtual disk:
1. In the left pane, click Storage > Virtual Disks > Manage.
2. From the Virtual Actions drop-down, select Encrypt Virtual Disk and click Apply.
NOTE: The Encrypt Virtual Disk option is available only if unsecure virtual disks are configured in the SED.
Encrypting Virtual Disks Using RACADM
To encrypt virtual disks by running a RACADM command, use the following syntax:
racadm raid encryptvd:Disk.Virtual.0:RAID.ChassisIntegrated.1-1
For more information, see the Chassis Management Controller PowerEdge VRTX RACADM Command Line Reference Guide.
Unlocking Foreign Configuration
Drives which are part of secure virtual disks are called secured drives. Secured drives can be migrated from one controller to another
controller. If a different encryption or security key is configured for the destination controller, the security status of these drives is
displayed as ‘locked’ and cannot be seen as part of ‘preview foreign config’. The ‘Import foreign config’ does not detect these foreign
drives.
While running the unlock command, provide the source controller passphrase and key ID for these drives. Even after unlocking, the
‘foreign controller key’ still secures these drives. However, you can see these drives while searching for foreign drives in the existing
‘preview foreign config’. You can import or clear the foreign configuration on these secure drives.
If foreign drives with different security keys are migrated from more than one controller, then unlock and import or clear the set of drives
from one foreign controller before unlocking the drives migrated from another controller. This action ensures that unlock is not allowed on
a controller, if the controller has drives that are unlocked but not imported or cleared.
Once drives are unlocked, you can import the foreign configuration using the CMC web interface or RACADM.
If the controller is power cycled after the unlock and before the import phase, the drives are locked again.
If the system has multiple foreign configurations, unlock and import each foreign configuration before unlocking the foreign configuration.
184
Managing Chassis Storage