Intel RAID Controller Premium Feature Key Training



Similar documents
Intel RAID Premium Features

Intel RAID. INTEL raid

ServeRAID M5000 Series Performance Accelerator Key for IBM System x Product Guide

Intel RAID Web Console 2 and StorCLI Command Line Tool

ServeRAID M5000 Series Performance Accelerator Key for IBM System x IBM System x at-a-glance guide

StarWind iscsi SAN Software: Implementation of Enhanced Data Protection Using StarWind Continuous Data Protection

Time Stamp. Instruction Booklet

Intel Matrix Storage Console

BounceBack User Guide

Technical Note. Installing Micron SEDs in Windows 8 and 10. Introduction. TN-FD-28: Installing Micron SEDs in Windows 8 and 10.

Motion Computing Tablet PC

HP ProtectTools for Small Business Security Software, Version User Guide

MaxAttach NAS 4000 Series OS 2.2 Hard Disk Drive Replacement

How to Encrypt your Windows 7 SDS Machine with Bitlocker

The following is a preview of an Nfina storage system with an embedded LSI RAID controller using MegaRAID Storage Manager software.

Hiva-network.com. Microsoft_70-680_v _Kat. Exam A

4 Backing Up and Restoring System Software

Windows 8 Backup, Restore & Recovery By John Allen

VIA RAID Installation Guide

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

Chapter 2 Array Configuration [SATA Setup Utility] This chapter explains array configurations using this array controller.

Smart TPM. User's Manual. Rev MD-STPM-1001R

This user guide describes features that are common to most models. Some features may not be available on your computer.

Table of Contents. TPM Configuration Procedure Configuring the System BIOS... 2

Agilent Modular Products Connecting and Configuring JMR RAID to Work with the Agilent M9392A Vector Signal Analyzer System

Cautions When Using BitLocker Drive Encryption on PRIMERGY

VIA / JMicron RAID Installation Guide

GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry

BounceBack Server Solution Reference Guide

Trusted Platform Module (TPM) Quick Reference Guide

Intel Rapid Storage Technology

MSM Software Feature Difference Between the MR Controller and the IR Controller

MTA Course: Windows Operating System Fundamentals Topic: Understand backup and recovery methods File name: 10753_WindowsOS_SA_6.

1. System Requirements

AVLOR SERVER CLOUD RECOVERY

Gladinet Cloud Backup V3.0 User Guide

HP EliteBook and ProBook Notebook PCs - Upgrading from Windows 7 to Windows 8

Keep Your Data Secure: Fighting Back With Flash

Guide to SATA Hard Disks Installation and RAID Configuration

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL

NVIDIA RAID Installation Guide

Online Backup and Recovery Manager Setup for Microsoft Windows.

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions

Direct Storage Access Using NetApp SnapDrive. Installation & Administration Guide

Hi-Speed USB Flash Disk User s Manual Guide

Samsung Magician v.4.5 Introduction and Installation Guide

NEC Express5800 Series MegaRAID Storage Manager User's Guide - Windows Edition -

Using iscsi with BackupAssist. User Guide

Using the IPMI interface

Self-encrypting drives (SED): helping prevent data loss, theft, and misplacement

1 of 10 1/31/2014 4:08 PM

HP ProtectTools. Getting Started

GoldKey Software. User s Manual. Revision WideBand Corporation Copyright WideBand Corporation. All Rights Reserved.

BitLocker/Active Directory Encryption Procedure Department: Information Security Office Version: 1.0 Last Revised: 09/26/2011

User Guide - English. Embedded MegaRAID Software

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

Accelerating Server Storage Performance on Lenovo ThinkServer

Hyperoo 2 User Guide. Hyperoo 2 User Guide

USER MANUAL DataLocker Enterprise

FAQ. How does the new Big Bend Backup (powered by Keepit) work?

How to enable Disk Encryption on a laptop

WebBIOS Configuration Utility Guide

HP Array Configuration Utility User Guide

Full Disk Encryption Agent Reference

VOICE IMPROVEMENT PROCESSOR (VIP) BACKUP AND RECOVERY PROCEDURES - Draft Version 1.0

Lenovo Online Data Backup User Guide Version

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

Intel Matrix Storage Manager 8.x

RAID Utility User Guide. Instructions for setting up RAID volumes on a computer with a Mac Pro RAID Card or Xserve RAID Card

Encrypting with BitLocker for disk volumes under Windows 7

EMC VNX2: Data at Rest Encryption

Disk Encryption. Aaron Howard IT Security Office

e- storage Mail Archive

Intel RAID Software User s Guide:

Backups and Maintenance

LSI MegaRAID CacheCade Performance Evaluation in a Web Server Environment

Contents. Getting Started...1. Managing Your Drives Backing Up & Restoring Folders Synchronizing Folders Managing Security...

Team Foundation Server 2013 Installation Guide

Shutting down / Rebooting Small Business Server 2003 Version 1.00

RAID User Guide. Edition. Trademarks V1.0 P/N: C51GME0-00

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

System 800xA Tools. System Version 5.1. Power and productivity for a better world TM

Installing the Operating System or Hypervisor

SSD Guru. Installation and User Guide. Software Version 1.4

Overview Customer Login Main Page VM Management Creation... 4 Editing a Virtual Machine... 6

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The

Intel RAID Software User s Guide:

How To Add Drives To A Dip N Recording Appliance

ServeRAID M5015 and M5014 SAS/SATA Controllers for IBM System x IBM Redbooks Product Guide

Configuring HP Elite, EliteBook, and Z220 systems for Intel Smart Response Technology

Backup Exec Private Cloud Services. Planning and Deployment Guide

Upgrading from MSDE to SQL Server 2005 Express Edition with Advanced Services SP2

Using Drobo Storage with CrashPlan Pro for On-Site & Cloud Backup

2.6.1 Creating an Acronis account Subscription to Acronis Cloud Creating bootable rescue media... 12

High-Availability User s Guide v2.00

Moving the TRITON Reporting Databases

How To Backup In Cisco Uk Central And Cisco Cusd (Cisco) Cusm (Custodian) (Cusd) (Uk) (Usd).Com) (Ucs) (Cyse

ActiveImage Protector 3.5 for Hyper-V with SHR. User Guide - Back up Hyper-V Server 2012 R2 host and

BULLGUARD BAckUp GUIDE

Transcription:

Intel RAID Controller Premium Feature Key Training AXXRPFKSNSH Snapshot Recovery AXXRPFKDE Self Encrypting Drive (SED) AXXRPFKSSD SSD Cache with Fastpath Note: Graphics for this training is based on RAID FW1094 and RWC2 9.00.00 1

What are RAID Premium Features? Premium Features are additional features that can be added to an Intel RAID controller through the application of an add-on enablement key. Implementation of these features is designed to improve specific RAID usage models by adding additional performance, data protection, or other benefit to the targeted usage model. 2

Supported Intel RAID Controllers The following Controllers Support addition of Premium Feature Keys: RS2BL080 RS2BL040 RS2MB044 RS2PI008 RS2WG160 RS2SG244 3

Course Agenda The course includes the following modules: Module 1: Premium Feature Key Descriptions Module 2: Premium Feature Key Installation and Removal Module 3: Self Encrypting Drive (SED) Configuration and Use Module 4: Snapshot Recovery Configuration and Use Module 5: SSD Cache with Fastpath* Configuration and Use 4

Module 1 Premium Feature Key Descriptions A High Level Description of the Benefits of Each Premium Feature 5

Snapshot Recovery AXXRPFKSNSH The Snapshot Recovery feature offers a simplified way to recover data and can also provide automatic protection for the boot volume. You can use MegaRAID Recovery to take a snapshot of a volume and to restore a volume or file Snapshot functionality allows users to capture data changes to the volume. If data is deleted accidentally or maliciously, you can restore the data from view or roll back to a snapshot at a previous Point in Time (PiT) You can make up to 8 snapshots of Point in Times for each volume You can either restore files or roll back applications to a previous point in time Snapshot allows recovery of deleted, modified, or corrupted data from disk in minutes Minimizing downtime experienced by users and eliminates the lengthy process of restoring data from tape A Snapshot allows easy recovery of a server s boot volume in case corruption of operating system occurs Allows easy recovery of the boot volume in the case of an errant update or a corrupted or deleted file. NOTE: Snapshot Recovery is not a substitute for a tested backup strategy. Snapshot never makes a complete backup of a volume, only changes to the selected volume are tracked. When a roll back to a snapshot at a previous Point in Time (PiT) is done, you are undoing changes to the volume that caused corruption or a file deletion. 6

Full Disk Encryption AXXRPFKDE Full Disk Encryption support allows the RAID controller to manage the encryption keys for Self Encrypting Drives (SED). It enables authentication key management, auto-lock, and instant erase of self-encrypting drives Data going to the drive is encrypted by the drive, data read from the drive is decrypted by the drive. The controller provides the key management and password interface to the drive. Auto-Locks the volumes when powered down Encryption secures data when a drive is misplaced, failed, or stolen Instant Secure Erase deletes encryption keys from the drive before returning leased Drives or when redeploying with the datacenter, making data unreadable. Reduces the risk of data being compromised when drives eventually leave the data center Significantly reduces the cost and time of repurposing or retiring drives 100% Transparent to Storage Systems / End Users Appears the same as traditional non-encrypting drives Operates at full drive speed - No impact to performance Automatically encrypts/ decrypts all data 128Bit encryption, there is no backdoor *Strong enough for the National Security Agency* 7

SSD Cache with FastPath* I/O AXXRPFKSSD Two Separate Features resident on the key that are mutually exclusive SSD Cache Uses solid-state drives (SSDs) as additional cache for the RAID controller. Frequently accessed information is stored in SSD cache to allow for rapid access. SSD Cache can support from 1 to 32 SSD in a second level cache pool Data frequently re-read is copied to the cache pool with the benefit of higher SSD throughput and IO response of the SSD drives. Based on LSI* Cachecade Technology, it is sometimes referred to as SSD Cache (SSC). FastPath I/O Accelerates virtual drives made up of all SSDs by streamlining the RAID FW stack, providing up to 150,000 I/O reads per second for small block I/O activity; this is a dramatic increase over solutions that do not use FastPath. Without FastPath enabled, SSD arrays can reach up to 80,000 IOPs. FastPath streamlines the software stack for use with SSDs to optimize throughput with up to150,000 IO operations Per Second 8

Module 2 Premium Feature Key Installation and Removal Understand how to install and remove the feature key from an Intel RAID Controller 9

Install the Premium Feature Key IMPORTANT: Your Intel RAID Controller must be programmed with the latest Intel RAID Controller firmware to enable Intel RAID Premium Features Minimum requirements for Premium Feature Key usage. The latest FW is available at http://www.intel.com/support/motherboards/server/ The feature key is designed to plug onto a Mainstream or Scalable Performance Intel RAID Controller that has a RAID Premium Feature Key connector. The Intel RAID Premium Feature Key must remain attached to the connector in order to enable the premium feature. Entry level controllers do not support the key features. In the figure, the arrow points to the location of the RAID Premium Feature Key connector for the Intel RAID Controller RS2BL080. This is a 2-pin shielded connector The location of Premium Feature Key connector on your Intel RAID Controller may vary Refer to the Intel RAID Controller User Guide for the location of this connector Intel RAID Controller RS2BL080 10

Install the Premium Feature Key 1. Carefully remove the Premium Feature Key from its packaging 2. Locate the Premium Feature Key connector on the Intel RAID Controller 3. With the 2-hole edge of the Premium Feature key pointing to the RAID Premium Feature Key 2-pin connector of the RAID controller, push the key onto the connector on the RAID controller 4. Refer to RAID Controller documentation to finish installing the RAID controller and Software User s Guide for PFK configuration details Premium Feature Key Installed 11

Install the Premium Feature Key With the Feature Key installed, unless noted specifically, the added feature must be enabled and/or configured using the RAID BIOS Console utility or RAID Web Console 2 utility. For detailed information on enabling and configuring the feature key option, please refer to the Intel RAID Software User s Guide available under your selected controller at http://www.intel.com/support/motherboards/server/ Remove the Premium Feature Key Removing the PFK is done by firmly holding the RAID controller on a flat surface, and pulling the Intel RAID Premium Feature Key from the connector Note: Only single PFK installations are allowed (one PFK header per controller). Multiple premium features may be provided on a single key. When the PFK is removed all premium features provided by the key are disabled 12

Determining PFK Enablement BIOS Console To determine available features, select Manage Advanced Software Options in the left pane of the main view. Raid Web Console 2 Feature enabled/disabled status in RWC2 Dashboard view. 13

Module 3 Self Encrypting Drive (SED) Configuration and Use Understanding The SED Premium Feature Configuration Steps 14

Full Disk Encryption - AXXRPFKDE The Full Disk Encryption Premium Feature is offered as an add-on PFK and is also available on Intel RAID controllers with product code that ends in DE (RS2BL080DE and RS2PI008DE) Full Disk Encryption is encrypting data at rest on a hard disk drive. Although several methods can accomplish this, including software and host-based encryption, the Intel implementation relies on Self Encrypting Drive Technology (SED) Self Encrypting Drive Technology incorporates the encryption circuitry directly on the disk drive. SED drives encrypt everything written to the drive and de-crypt everything read from the drive. When the drive is powered down the SED drive is locked and the encryption key within that drive will not encrypt or decrypt data making the drive unreadable to an individual who does not have the correct authorizations. A security-enabled SED drive may be lost or stolen, but it will not expose its data to an unauthorized user Enabling encryption key management on the RAID controller allows the controller to manage the encryption key on the drive SED Auto-Lock functionality is enabled and managed within the RAID controller configuration utilities. Disk Encryption Services are available only for Intel 6Gbs Mainstream and Scalable Performance RAID controllers when the AXXRPFKDE PFK is installed 15

Encryption Management FAQs SED functionality affect on disk drive performance The SED has its AES engine built into the electronics, the throughput affect is imperceptibly small (a few millionths of a second). SED drives operate at the same throughput and response time levels as non-sed drives. Incorporation of the SED into the drives allows encryption performance to scale with the number of drives in the system. AES 128 bit implementation Both the NSA and NIST have asserted that AES-128 provides sufficient protection. There are 2^128 = 3.4 x 10^38 possible keys with 128 bits, which is a huge key space. NIST estimates that AES 128 is safe from key-search techniques for at least the next 30 years. The Seagate implementation of AES in drive circuitry has received NIST certification through an independent laboratory, as tested against the FIPS 197 standard. 16

Encryption Management FAQs (Cont) There are there no backdoors to the SED drives There is no way to circumvent the security measures provided by the drive. Security best practices dictate that sensitive or critical data should be backed up, as well as critical parameters like Security Keys. SED and non-sed drives can be mixed in the same Volume Non-SED drives cannot be part of an encryption-protected RAID set. SED drives can be used in non-encryption-protected RAID groups. A customer should purchase all SED drives to achieve an encrypted volume. The locking function is configured by selecting the appropriate feature on the RAID management console for those drives and defining a Security Key. SED drives have the same usable capacity as non SED drives The usable capacity of a drive is not reduced with SED 17

Encryption Management FAQs (Cont.) Instant secure erase functionality An authorized administrator can remove the on-board encryption key, thereby rendering the encrypted data unreadable. Intel RAID supports this feature on all 6Gbs products, even when a PFK is not present. It is not possible to erase a secure drive that is part of a secure volume group. You must first delete the volume configuration on the drive so that it is marked as Unconfigured. Boot protection for a system with SEDs The server can be configured to pause during the boot sequence for a password. If the appropriate password is not entered in three attempts, the server will still boot but the data on the SEDs will be inaccessible. This protects the data on the SEDs in the event the server is stolen. If the OS boot partition is secured via SED, the server can be configured to pause during the MegaRAID boot sequence for a password. If the appropriate password is not entered in three attempts, the server will not boot 18

Managing Self Encrypting drives Three Steps to enable and manage self encrypting drives (graphics on following pages): 1. Verify Encryption Capability after the PFK is installed 2. Enable the controller encryption support within the RAID Utility (BIOS Console or RAID Web Console 2) 3. Build a logical volume containing Self-Encrypting Disks (SEDs) 19

Step 1: Verify Device Encryption Capability Controller capability Select the controller and view the Properties tab FDE = Full Disk Encryption Drive encryption capability (SED) Select a drive and view the Properties tab 20

Step 2a: Enable Encryption (Drive Security) Support in RAID BIOS Console Security Wizard starts 1. Chose Drive Security from the left panel of the main view. 2. Accept security enablement. 3. Click OK for local key management. 4. Create the required Security key Identifier. Use the default suggestion, or create your own 5. Create the required Security key. Use the default suggestion, or create your own 6. Create an optional Pass Phrase for additional security 7. Accept the confirmation to complete the wizard and enable drive security 8. Drive Security is now enabled 21

Step 2b: Enable Encryption (Drive Security) Support in RAID Web Console Go To > Controller > Enable Drive Security Or Right Click on the controller and Enable Drive Security 22

Step 2b (cont): Enable Encryption (Drive Security) Support in RAID Web Console 2 Security Wizard starts 1. Click OK for local key management. 2. Create the required Security key Identifier. Use the default suggestion, or create your own 3. Create the required Security key. Use the default suggestion, or create your own 4. Create an optional Pass Phrase for additional security 5. Place a check mark in the reminder box to record the contents of this page. 6. Click Yes to complete the wizard and enable drive security 7. Controller properties will now indicate Drive security is enabled 23

Step 3: Build a Logical Volume Containing SEDs 1. Right click on the controller and select Create a Virtual Drive. 2. Choose the Advanced configuration. 3. Choose the desired RAID level, disk encryption, and auto power save mode. Click on the drives to be added to the array and select Add. Then click Next. 4. Select the Name and cache properties, then Click Create Virtual Drive. Click to acknowledge the Write Back Cache Warning, then click next. 5. Review the configuration information and click Finish. 24

Instant Secure Erase Description Instant Secure Erase removes the drive encryption key from the drive. Data encrypted with previous key is now unintelligible This action is Non-reversible Benefits Instant Secure Erase drives for secure disposal or repurposing It takes less than 1 second to remove the key. Easy to use from the GUI utility Steps to instant Secure Erase are in the following slides. Note, Instant Secure Erase is only available for Unconfigured Good Drives. The must be removed from a volume via the GUI before they can be erased. 25

Instant Secure Erase in RAID BIOS Console Note: Instant Secure Erase is only permitted on unconfigured drives to remove possibility of deleting array data Click on the target drive to erase Click on the radio button for Instant Secure Erase, then click on Go, and then accept the warning. 26

Instant Secure Erase in RAID Web Console 2 Note: Instant Secure Erase is only permitted on unconfigured drives to remove possibility of deleting array data Go To > Physical Drive > Instant Secure Erase Or Right Click on the physical drive and select Instant Secure Erase 27

Instant Secure Erase in RAID Web Console 2 (Cont) Accept confirmation to permanently erase disk drive 28

Module 4 Snapshot Recovery Configuration and Use Understand, configure, and use the Snapshot Recovery premium feature. 29

Snapshot Overview The Snapshot feature offers a simplified way to recover lost or corrupted data and provides automatic protection for the boot volume. You can use this feature to take a snapshot of a volume at a Point in Time (PiT) and then later roll back an individual file or a complete volume to that point in time. A Base Volume, or volume containing data, is designated and a repository volume is created to contain changed data. No data is copied at the time the snapshot is created, including the first snapshot. A PiT marker is set in the respository and any data that is changed will first be written to the repository volume. Data is copied on a block basis, not a file basis. So only blocks to be changed are copied to the repository. Note: Snapshot Recovery is not a substitute for a tested backup strategy. When Snapshot Recovery is enabled, a complete copy of the volume is NOT taken, but rather changes to the selected volume are tracked. When a roll back to a snapshot at a previous Point in Time (PiT) is done, you are undoing changes. 30

Snapshot Overview (cont) You can use RAID Web Console 2 (RWC2) to create up to eight snapshots of a volume. Creating a snapshot closes the previous snapshot and future changes are then tracked in the new snapshot until it is closed by creating a new snapshot. RWC2 shows the snapshots in chronological order from the oldest to the newest. Each snapshot is a PiT snapshot of the Base virtual drive Once the maximum number of 8 snapshots are created, the Create Snapshot button is disabled until a previous snapshot is deleted. Within RWC2 you can create views of the PiT snapshots. You can search the snapshot view to find and recover data that is not corrupted or missing. Data from view can be copied to the Snapshot Base, or working, volume. 31

Snapshot Overview (Cont) The size of the repository should be determined by the amount of data being written and the frequency of snapshots being taken. This is highly application dependent on the behavior of the application and how it manages files. If the repository runs out of space and resizing the repository becomes necessary, it is required to disable the feature and reenable it while re-sizing the repository. One issue with this process is that the existing snapshots are lost when the feature is disabled. Repository virtual drives will be lost if you disable snapshots. A future update will allow to grow the size of the repository dynamically, without losing snapshots. 32

Enabling Snapshot Recovery in RAID Web Console 2 1. When you enable Snapshot Recovery, you select two virtual drives -- one as a Snapshot Base and the other as a Snapshot Repository. 2. The base virtual drive contains the data that is stored in the repository virtual drive. 3. To enable the feature, highlight the Virtual drive to be the snapshot based, and go to manage=>virtual drive=>enable MegaRAID recovery; or right click Virtual Drive and select Enable MegaRAID Recovery The Enable MegaRAID Recovery Wizard will then appear 33

Enabling Snapshot Recovery in RAID Web Console 2 (cont) 4. On the Enable MegaRAID Recovery Wizard screen, highlight the virtual drive to use as the Snapshot Repository in the Snapshot Repository field. 5. Enter the capacity to use in the Snapshot Repository for changes to the base virtual drive. The available capacity is the largest free block of capacity on the snapshot repository virtual drive. 34

Enabling Snapshot Recovery in RAID Web Console 2 6. Choose to create a snapshot schedule or choose to disable the scheduling option. 7. Choose whether to automatically delete the oldest snapshot or to have a snapshot taken on reboot. To enable this option, check the box next to the Take snapshot on reboot field a. If you select this option, a snapshot is taken on boot after every successful shutdown. b. You can use this snapshot of the boot virtual drive to restore the operating system on the virtual drive in case the virtual drive becomes corrupted. CAUTION: Make sure that all data existing on the virtual drive chosen as the snapshot repository is backed up. If there is any existing data on this repository virtual drive, it will be lost after converting to the Snapshot repository. Notes: If you enable Take snapshot on reboot option and the Enable auto deletion of snapshot option (described later), after creating 8 snapshots, the system will automatically delete the oldest snapshot and then create a new one after reboot. 7. Click Finish 35

Enabling Snapshot Recovery in RAID Web Console 2 (cont) A confirmation dialog box appears 8. Check the box next to the Confirm field to enable snapshots on the selected virtual drive and then click Yes Snapshot Base This volume will contain the OS or usable data. Snapshot Repository This volume is used only for storing snapshot related data CAUTION: After you enable snapshots on this virtual drive, you cannot change the allocated percentage of capacity or the snapshot repository without first disabling snapshots and losing any snapshot data 36

Creating Snapshots 1. Click the Logical view on the main menu screen 2. Right Click the Snapshot Base virtual drive in the left frame 3. Click Manage Snapshots. This screen shows the Snapshot Base details and any existing snapshots 4. Within the window on the right, the snapshot schedule can be edited or a snapshot can be created. 5. Click Create Snapshot 37

Creating Snapshots (Cont) 6. A prompt pops up for a snapshot name. Edit the name as desired and Click Ok to continue. 7. The snapshot will appear in the snapshot List. Note: When you Enable auto deletion of snapshots, after 8 snapshots have been created the oldest snapshot will be automatically deleted when you can continue to create additional snapshots 38

Snapshot Recovery Views 1. In the manage snapshot screen, click on Create a View 2. Enter the name of the view in the Enter View name field and the capacity to set aside in the snapshot 3. Click OK 39

Snapshot Recovery - Rolling Back Snapshots Follow these steps to roll back the volume version to an earlier version 1. Open the Manage Snapshots view. 2. Highlight a snapshot in the snapshot list that is the most recent PiT snapshot that does not contain the corrupt or malicious file, or the PiT that was current when a file was deleted. 3. Click the Create View button. 4. Enter into My computer, and then you can see a new drive 5. Copy the files in the new drive to the original drive and cover them 6. The system rolls back to the selected PiT You can roll back to a previous Point in Time one snapshot at a time beginning with the newest snapshot until you find one that does not contain the corrupt or malicious file. 40

Snapshot Recovery - Deleting and Clearing Snapshots Note: When deleting snapshots, you can only delete the oldest snapshot Follow these steps to delete a single snapshot 1. Right Click the Snapshot base volume and then manage snap shots option 2. Highlight the oldest snap shot and choose delete snap shot 3. Snapshots must be deleted one at a time. 41

Setting Snapshot Recovery Properties Follow these steps to Set Snapshot Recovery Properties. 1. Open the Manage Snap Shot view by right clicking on the Snap Shot base volume. 2. Click on the Advanced Button 3. Advanced options are presented Enable or disable. Options include: A. Automatically delete the oldest snapshot B. Stop taking snapshots C. Take a snapshot on every reboot 42

Disable Snapshot Recovery Follow these steps to Disable MegaRAID Recovery 1. Click the Logical view on the main menu screen 2. Right Click the Snapshot Base virtual drive in the left frame 3. Disable MegaRAID Recovery on the menu bar 43

Disable Snapshot Recovery (cont) A confirmation dialog box appears. It warns that any snapshot-related data that is on the associated Snapshot Repository virtual drives will be lost if you disable snapshots 5. Check the box next to the Confirm field and click Yes 6. The snapshots are disabled 44

Module 5 SSD Cache with Fastpath* IO Configuration and Use Understanding SSD Cache and Fastpath Premium Feature Configuration and Use 45

SSD Cache with Fastpath IO SSD Cache (also referred to as SSD Cache (SSC) or CacheCade* Technology) uses one or more Solid State Devices (SSD) as additional controller cache, allowing for very large data sets to be copied to that cache to improve performance of data that is re-read. SSD Cache provides performance improvement in READ-intensive applications This solution is ideal for cost sensitive server environments, by offering a highperformance upgrade that requires only a small investment in SSD technology. This solution also reduces the need to invest expensive IT cycles to hand-tune applications running on hard drive-only disk arrays Up to 32 SSDs can be added as a second level cache pool. Fastpath IO is a performance tuned IO Accelerator feature for use with all SSD disk arrays. Raid firmware supporting Solid State Drive configurations is tuned for small, random block-size IO activity Can sustain over 150,000 IO READS Per Second. This feature requires that only SSD drives be connected to the RAID controller. Any Volume created with these SSD drives will then utilized Fastpath IO 46

Fastpath IO Enablement 1. Fastpath IO is enabled by default if the Premium Feature Key is installed 2. Login into Intel RAID Web Console 2 3. Select the Dashboard view 4. View the enablement in the Advanced Software Options area 47

SSD Cache Creation 1. Login into Intel RAID Web Console 2 2. Select the Dashboard view 3. Click Create SSD cache in the Actions tab 48

SSD Cache Creation 4. Or right click the RAID Controller and select Create SSCD (SSD Cache Drive) 49

SSD Cache Creation 5. The Create SSD Cache Drive group screen appears 6. Select the unconfigured SSD drive(s) 7. Click Add > -> Create SSC Drive Group -> Next 50

SSD Cache Creation 8. The Create SSD Cache Drive screen appears 9. Enter the SSD Cache Drive name in the name Field or leave the default 10. Click Create to create a SSC drive group 11. Click Next 12. Create SSD Cache screen appears. Click Finish to confirm the information and create SSD Cache Volume 51

SSD Cache Creation 13. An informational screen appears showing details of the configuration. Click Finish to complete and then click to acknowledge the configuration 14. You can see SSD Cache Drive Group in the logical view 52

Delete a SSD Cache Disk Follow these steps to delete the SSD Cache Volume 1. Click the Logical view tab on the main menu screen 2. Click the SSD Cache virtual drive 3. Click Go To -> Virtual Drive -> Delete Virtual Drive on the menu bar 4. Or Right click on the SSD Cache VD in the volume list ->Delete Virtual Drive 5. A confirmation dialog box appears 6. Check the box next to the Confirm field and click Yes 7. The SSCD is deleted 53

54