Users Guide
Table Of Contents
- Dell EMC PowerEdge RAID Controller 10 User’s Guide PERC H345, H740P, H745, H745P MX, and H840
- Contents
- Overview
- Getting Started
- Features
- Controller features
- Virtual disk features
- Hard drive features
- Fault tolerance
- Operating system device enumeration
- Controller mode
- Non-RAID disk
- Deploying the PERC card
- Removing the PERC H345 adapter
- Installing the PERC H345 adapter
- Removing the PERC H345 front card
- Installing the PERC H345 front card
- Removing the PERC H740P adapter
- Installing the PERC H740P adapter
- Removing the PERC H740P mini monolithic
- Installing the PERC H740P mini monolithic
- Removing the PERC H745 adapter
- Installing the PERC H745 adapter
- Removing the PERC H745 front card
- Installing the PERC H745 front card
- Removing the PERC H745P MX adapter card
- Installing the PERC H745P MX adapter card
- Removing the PERC H840 card
- Installing the PERC H840 card
- Part replacement of a PERC card in eHBA mode
- Part replacement of a PERC card in RAID mode with another in eHBA mode
- Driver installation
- Creating the device driver media
- Windows driver installation
- Installing the driver during a Windows Server 2012 R2 and newer installation
- Installing the driver after Windows Server 2012 R2 and newer installation
- Updating PERC 10 driver for existing Windows Server 2012 R2 and newer
- Linux driver installation
- Firmware
- HII configuration utility
- Entering the HII configuration utility
- Exiting the HII configuration utility
- Navigating to Dell PERC 10 configuration utility
- HII Configuration utility dashboard view options
- Configuration management
- Controller management
- Virtual disk management
- Physical disk management
- Hardware components
- Security key management in the HII configuration utility
- Security key and RAID management
- Security key implementation
- Local Key Management
- Creating security key
- Changing Security Settings
- Disabling security key
- Create secured virtual disk
- Secure non-RAID disks
- Secure preexisting virtual disk
- Importing secure virtual disk
- Import secured non-RAID disk
- Dell EMC OpenManage Secure Enterprise Key Manager
- Troubleshooting
- Single virtual disk performance or latency in hypervisor configurations
- Adapter at baseport not responding error message
- BIOS disabled error message
- Configured disks removed or not accessible error message
- Dirty cache data error message
- Discovery error message
- Drive Configuration Changes Error Message
- Windows operating system installation errors
- Firmware fault state error message
- Extra enclosure error message
- Foreign configuration found error message
- Foreign configuration not found in HII error message
- Degraded state of virtual disks
- Memory errors
- Preserved Cache State
- Security key errors
- General issues
- Physical disk issues
- Physical disk in failed state
- Unable to rebuild a fault tolerant virtual disk
- Fatal error or data corruption reported
- Physical disk displayed as blocked
- Multiple disks are inaccessible
- Rebuilding data for a failed physical disk
- Virtual disk fails during rebuild using a global hot spare
- Dedicated hot spare disk fails during rebuild
- Redundant virtual disk fails during reconstruction
- Virtual disk fails rebuild using a dedicated hot spare
- Physical disk takes a long time to rebuild
- SMART errors
- Replace member errors
- Linux operating system errors
- Drive indicator codes
- HII error messages
- Appendix RAID description
- Getting help
- Documentation resources
Entering the HII configuration utility............................................................................................................................ 56
Exiting the HII configuration utility............................................................................................................................... 56
Navigating to Dell PERC 10 configuration utility....................................................................................................... 56
HII Configuration utility dashboard view options....................................................................................................... 57
Configuration management.............................................................................................................................................57
Auto Configure RAID 0...............................................................................................................................................57
Creating virtual disks.................................................................................................................................................. 58
Configuring virtual disk parameters........................................................................................................................ 58
Creating profile based virtual disk...........................................................................................................................59
Viewing disk group properties.................................................................................................................................. 59
Deleting configurations.............................................................................................................................................. 59
Controller management................................................................................................................................................... 59
Clearing controller events......................................................................................................................................... 59
Saving controller events............................................................................................................................................ 60
Saving debug log......................................................................................................................................................... 60
Managing link speed................................................................................................................................................... 60
Restoring factory default settings.......................................................................................................................... 60
Manage controller mode............................................................................................................................................60
Changing profile using HII Configuration Utility....................................................................................................61
Advanced controller properties................................................................................................................................ 61
Virtual disk management................................................................................................................................................. 64
Virtual disk numbering................................................................................................................................................ 64
Viewing virtual disk properties................................................................................................................................. 64
Viewing physical disks associated with a virtual disk......................................................................................... 65
Configuring virtual disk policies............................................................................................................................... 65
Configuring Virtual Disks........................................................................................................................................... 66
Performing expand virtual disk operation..............................................................................................................66
Performing consistency check.................................................................................................................................66
Physical disk management.............................................................................................................................................. 67
Viewing physical disk properties.............................................................................................................................. 67
Cryptographic erase................................................................................................................................................... 68
Physical disk erase...................................................................................................................................................... 68
Assigning global hot spare.........................................................................................................................................69
Assigning dedicated hot spare................................................................................................................................. 69
Convert to RAID capable........................................................................................................................................... 69
Convert to Non-RAID disk.........................................................................................................................................70
Hardware components.....................................................................................................................................................70
Viewing battery properties........................................................................................................................................ 70
Viewing physical disks associated with an enclosure.......................................................................................... 71
Security key management in the HII configuration utility.........................................................................................71
Chapter 8: Security key and RAID management........................................................................... 72
Security key implementation...........................................................................................................................................72
Local Key Management....................................................................................................................................................72
Creating security key........................................................................................................................................................72
Changing Security Settings............................................................................................................................................ 73
Disabling security key....................................................................................................................................................... 73
Create secured virtual disk..............................................................................................................................................73
Secure non-RAID disks.....................................................................................................................................................74
Secure preexisting virtual disk........................................................................................................................................74
Contents
5