Hpe Switch Discovery Tool



To configure your StoreFabric B-Series switches to be monitored by Insight RS, complete the following sections:

The HPE FlexNetwork 5130 HI Switch Series comprises Gigabit Ethernet switches that support static and RIP Layer 3 routing, diversified services, and IPv6 forwarding, as well as provide four 10 Gigabit Ethernet (10GbE) interfaces. Hewlett Packard Enterprise Support Center HPE Support Center. To install the HP Network Discovery Tool follow these steps: From a PC (running Windows Vista SP2, Windows 7 SP1, 8, 2008 SP2 or R1 SP1, or later), type in the URL. for the HP Network Discovery Tool into a browser’s address field and press Enter. When asked, open the file. In the resulting folder, double-click on the file setup. The HP 2610-24 Switch is a fanless switch with quiet operation, making it ideal for deployments in open spaces. TheHP 2610-24-PPoE, 2610-24-PoE, and 2610-48-PoE Switches are IEEE 802.3af compliant for Power over Ethernet (PoE) andprovide up to 15.4 W for 12, 24, and 48 ports. The 2610-24-PPoE switch has 24 10/100 ports and provides 12 ports of PoE. HPE Network Discovery Tool 1.0.0.77 is free to download from our software library. The software is included in Internet & Network Tools. The actual developer of the free software is Hewlett Packard Enterprise. You've discovered and mapped your network with SolarWinds network discovery tool.

Note: Test trap support for B-series SAN switches requires the installation of Fabric Operating System v6.3.0b firmware or higher. For more details, refer to the HPE Fabric OS 6.3.0b Customer Advisory at: http://h20565.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01924282.

Note: Telnet or SSH is required for configuration collection support. Telnet and SSH are enabled by default on StoreFabric B-Series switches.

Install and configure communication software on SAN switches

To configure your monitored devices, complete the following sections:

Configure SNMPHpe Switch Discovery ToolHpe Switch Discovery Tool

You can use SNMPv1 or SNMPv3 to monitor your B-Series switches. Follow the steps in one of the options below to configure SNMP on your switch.

Use the following procedure to configure SNMP on a B-Series switch so that it can be monitored with Insight Remote Support.

  1. Display the current or default SNMPv1 settings:

    > snmpconfig --show snmpv1

    SNMPv1 community and trap recipient configuration:

    Community 1: public (rw) No trap recipient configured yet

    Community 2: public (rw) No trap recipient configured yet

    Community 3: public (rw) No trap recipient configured yet

    Community 4: public (ro) No trap recipient configured yet

    Community 5: common (ro) No trap recipient configured yet

    Community 6: FibreChannel (ro) No trap recipient configured yet

  2. Set SNMPv1 community string and Trap recipient:

    > snmpconfig --set snmpv1

    SNMP community and trap recipient configuration:

    Community (rw): [public] gcc-public ! Create new community

    Trap Recipient's IP address : [0.0.0.0] 1.2.3.4

    Trap recipient Severity level : (0..5) [0] 2

    Trap recipient Port : (0..65535) [162] Community (rw): [public]

    Trap Recipient's IP address : [0.0.0.0] Community (rw): [public]

    Trap Recipient's IP address : [0.0.0.0] Community (ro): [public]

    Trap Recipient's IP address : [0.0.0.0] Community (ro): [common]

    Trap Recipient's IP address : [0.0.0.0] Community (ro): [FibreChannel]

    Trap Recipient's IP address : [0.0.0.0] Committing configuration...done.

    Note: The trap severity level is associated with each trap recipient IP address. The event trap level is in conjunction with the event's severity level. When an event occurs and if its severity level is at or below the set value, the SNMP event traps (swEventTrap, swFabricWatchTrap, and connUnitEventTrap) are sent to the trap recipients.

    By default, this value is set to 0, implying that no such traps are sent. The possible values are the following:

    • 0 none
    • 1 critical
    • 2 error
    • 3 warning
    • 4 informational
    • 5 debug
  3. Display the new settings:

    > snmpconfig --show snmpv1

    SNMPv1 community and trap recipient configuration:

    Community 1: gcc-public (rw) Trap recipient: 1.2.3.4 Trap port: 162 Trap recipient Severity level: 2

    Community 2: public (rw) No trap recipient configured yet

    Community 3: public (rw) No trap recipient configured yet

    Community 4: public (ro) No trap recipient configured yet

    Community 5: common (ro) No trap recipient configured yet

    Community 6: FibreChannel (ro) No trap recipient configured yet

  4. Set SNMP access control:

    > snmpconfig --set accesscontrol

    SNMP access list configuration:

    Access host subnet area : [11.0.0.2] 1.2.3.4 ! set to the IP add of SIM Read/Write? (true, t, false, f): [true]

    Access host subnet area : [1.2.3.4] Read/Write? (true, t, false, f): [true] f

    Access host subnet area : [1.2.3.4] Read/Write? (true, t, false, f): [true] f

    Access host subnet area : [1.2.3.4] 0.0.0.0 ! remove this one Read/Write? (true, t, false, f): [true] f

    Access host subnet area : [1.2.3.4] Read/Write? (true, t, false, f): [true]

    Access host subnet area : [1.2.3.4] Read/Write? (true, t, false, f): [true]

    Committing configuration...done.

  5. Remove the remaining IP address from the SNMP Access Control List if required:

    > snmpconfig --set accesscontrol

    SNMP access list configuration:

    Access host subnet area : [1.2.3.4] Read/Write? (true, t, false, f): [true]

    Access host subnet area : [1.2.3.4] 0.0.0.0 Read/Write? (true, t, false, f): [false] f

    Access host subnet area : [1.2.3.4] 0.0.0.0 Read/Write? (true, t, false, f): [false] f

    Access host subnet area : [0.0.0.0] Read/Write? (true, t, false, f): [false]

    Access host subnet area : [1.2.3.4] 0.0.0.0 Read/Write? (true, t, false, f): [true] f

    Access host subnet area : [1.2.3.4] 0.0.0.0 Read/Write? (true, t, false, f): [true] f

    Committing configuration...done.

  6. Check the access to SNMP control list:

    > snmpconfig --show accesscontrol

    SNMP access list configuration:

    Entry 0: Access host subnet area 1.2.3.4 (rw)

    Entry 1: No access host configured yet

    Entry 2: No access host configured yet

    Entry 3: No access host configured yet

    Entry 4: No access host configured yet

    Entry 5: No access host configured yet

  7. Set MIB Capability:

    > snmpconfig --set mibcapability

    The SNMP Mib/Trap Capability has been set to support FE-MIB SW-MIB FA-MIB HA-MIB SW-TRAP FA-TRAP HA-TRAP

    FA-MIB (yes, y, no, n): [yes]

    FICON-MIB (yes, y, no, n): [no]

    HA-MIB (yes, y, no, n): [yes] yes

    FCIP-MIB (yes, y, no, n): [no]

    ISCSI-MIB (yes, y, no, n): [no]

    SW-TRAP (yes, y, no, n): [yes]

    swFCPortScn (yes, y, no, n): [no] yes

    swEventTrap (yes, y, no, n): [no] yes

    swFabricWatchTrap (yes, y, no, n): [no] yes

    swTrackChangesTrap (yes, y, no, n): [no] yes

    FA-TRAP (yes, y, no, n): [yes]

    connUnitStatusChange (yes, y, no, n): [no] yes

    connUnitEventTrap (yes, y, no, n): [no] yes

    connUnitSensorStatusChange (yes, y, no, n): [no] yes

    connUnitPortStatusChange (yes, y, no, n): [no] yes

    SW-EXTTRAP (yes, y, no, n): [no] yes

  8. Display the IP address of the switch, so it can be added to the Insight RS Console:

    > ipaddrshow

    SWITCH Ethernet IP Address: 1.2.3.4

    Ethernet Subnetmask: 1.2.3.4

    Fibre Channel IP Address: none

    Fibre Channel Subnetmask: none

    Gateway IP Address: 1.2.3.4

    DHCP: Off

  9. Modify the switch systemgroup variables if required:

    > snmpconfig --set systemGroup

    Customizing MIB-II system variables ... At each prompt, do one of the following:

    o to accept current value,

    o enter the appropriate new value,

    o to skip the rest of configuration, or

    o to cancel any change.

    To correct any input mistake: erases the previous character, erases the whole line,

    sysDescr: [Fibre Channel Switch.] Brocade 4/16 FC Switch

    sysLocation: [End User Premise.] HPE Building 11th floor

    sysContact: [Field Support.] John Doe

    authTrapsEnabled (true, t, false, f): [true]

    Committing configuration...done.

Before configuring SNMPv3, you will need the SNMP username and appropriate credentials to be used (Auth, Priv, and passwords for each).

Important: HPE Insight RS supports the secure SNMPv3 protocol on B-Series switches that support SNMPv3. Insight RS only supports SNMPv3 traps, and does not support SNMPv3 Informs. Insight RS listens on port 1162 for SNMPv3 traps, and your SNMPv3 passwords must be at least 8 characters long. Refer to your device's documentation to determine the versions of SNMP your device supports.

Hpe

To configure SNMPv3, complete the following steps. Example responses are shown in red.

  1. Using PuTTY or suitable SSH access tool, SSH to the switch and login as an Administrator user.
  2. Disable SNMPv1 using the following command:

    #snmpconfig –disable snmpv1

  3. Configure MIB capability on the switch to enabled the HA MIB and HA TRAPS:

    #snmpconfig –set mibcapability

    FE-MIB (yes, y, no, n): [yes] <return>

    SW-MIB (yes, y, no, n): [yes] <return>

    FA-MIB (yes, y, no, n): [yes] <return>

    FICON-MIB (yes, y, no, n): [no] <return>

    HA-MIB (yes, y, no, n): [no] Yes; if already Yes then <return>

    FCIP-MIB (yes, y, no, n): [no] <return>

    IF-MIB (yes, y, no, n): [yes] <return>

    BD-MIB (yes, y, no, n): [yes] <return>

    BROCADE-MAPS-MIB (yes, y, no, n): [yes] <return>

    T11-FC-ZONE-SERVER-MIB (yes, y, no, n): [no] <return>

    SW-TRAP (yes, y, no, n): [yes] <return>

    swFCPortScn (yes, y, no, n): [yes] <return>

    swEventTrap (yes, y, no, n): [yes] <return>

    DesiredSeverity: (0..4) [0] <return>

    swIPv6ChangeTrap (yes, y, no, n): [yes] <return>

    swPmgrEventTrap (yes, y, no, n): [yes] <return>

    swFabricReconfigTrap (yes, y, no, n): [no] <return>

    swFabricSegmentTrap (yes, y, no, n): [no] <return>

    swExtTrap (yes, y, no, n): [yes] <return>

    swStateChangeTrap (yes, y, no, n): [no] <return>

    swPortMoveTrap (yes, y, no, n): [no] <return>

    swBrcdGenericTrap (yes, y, no, n): [no] <return>

    swDeviceStatusTrap (yes, y, no, n): [no] <return>

    swZoneConfigChangeTrap (yes, y, no, n): [no] <return>

    FA-TRAP (yes, y, no, n): [yes] <return>

    connUnitStatusChange (yes, y, no, n): [yes] <return>

    connUnitEventTrap (yes, y, no, n): [yes] <return>

    connUnitPortStatusChange (yes, y, no, n): [yes] <return>

    HA-TRAP (yes, y, no, n): [no] yes

    fruStatusChanged (yes, y, no, n): [no] yes

    cpStatusChanged (yes, y, no, n): [no] yes

    fruHistoryTrap (yes, y, no, n): [no] yes

    IF-TRAP (yes, y, no, n): [yes] <return>

    linkDown (yes, y, no, n): [yes] <return>

    linkUp (yes, y, no, n): [yes] <return>

    BD-TRAP (yes, y, no, n): [yes] <return>

    bdTrap (yes, y, no, n): [yes] <return>

    bdClearTrap (yes, y, no, n): [yes] <return>

    MAPS-TRAP (yes, y, no, n): [yes] <return>

  4. Verify that the configuration changes have been accepted:

    #snmpconfig –show mibcapability

    FE-MIB: YES

    SW-MIB: YES

    FA-MIB: YES

    FICON-MIB: NO

    HA-MIB: YES

    FCIP-MIB: NO

    IF-MIB: YES

    BD-MIB: YES

    BROCADE-MAPS-MIB: YES

    T11-FC-ZONE-SERVER-MIB: NO

    SW-TRAP: YES

    swFCPortScn: YES

    swEventTrap: YES

    DesiredSeverity:None

    swIPv6ChangeTrap: YES

    swPmgrEventTrap: YES

    swFabricReconfigTrap: NO

    swFabricSegmentTrap: NO

    swExtTrap: YES

    swStateChangeTrap: NO

    swPortMoveTrap: NO

    swBrcdGenericTrap: NO

    swDeviceStatusTrap: NO

    swZoneConfigChangeTrap: NO

    FA-TRAP: YES

    connUnitStatusChange: YES

    connUnitEventTrap: YES

    connUnitPortStatusChange: YES

    FICON-TRAP: NO

    linkRNIDDeviceRegistration: NO

    linkRNIDDeviceDeRegistration: NO

    linkLIRRListenerAdded: NO

    linkLIRRListenerRemoved: NO

    linkRLIRFailureIncident: NO

    HA-TRAP: YES

    fruStatusChanged: YES

    cpStatusChanged: YES

    fruHistoryTrap: YES

    IF-TRAP: YES

    BD-TRAP: YES

    bdTrap: YES

    bdClearTrap: YES

    MAPS-TRAP: YES

    T11-FC-ZONE-SERVER-TRAP: NO

    t11ZsRequestRejectNotify: NO

    t11ZsMergeFailureNotify: NO

    t11ZsMergeSuccessNotify: NO

    t11ZsDefZoneChangeNotify: NO

    t11ZsActivateNotify: NO

  5. Begin to configure SNMPv3. Identify a configured SNMP user to use:

    #snmpconfig -- show snmpv3

    SNMPv3 USM configuration:

    User 1 (rw): snmpadmin1

    User 2 (rw): snmpadmin2

    Auth Protocol: noAuth

    Priv Protocol: noPriv

    User 3 (rw): snmpadmin3

    User 4 (ro): snmpuser1

    Auth Protocol: noAuth

    Priv Protocol: noPriv

    User 5 (ro): snmpuser2

    User 6 (ro): snmpuser3

    Auth Protocol: noAuth

    Priv Protocol: noPriv

    SNMPv3 Trap/Informs configuration:

    Trap Entry 1: No trap recipient configured yet

    Notify Type: TRAP(1)

    Trap Entry 2: No trap recipient configured yet

    Notify Type: TRAP(1)

    Trap Entry 3: No trap recipient configured yet

    Notify Type: TRAP(1)

    Trap Entry 4: No trap recipient configured yet

    Notify Type: TRAP(1)

    Trap Entry 5: No trap recipient configured yet

    Notify Type: TRAP(1)

    Trap Entry 6: No trap recipient configured yet

    Notify Type: TRAP(1)

    Choose a user not already defined in the SNMPv3 Trap/Inform configuration. In the example above, no SNMPv3 Trap/Inform configuration has been defined so all the listed users are available for use. In this example, we will use snmpadmin1.

  6. Once you have selected the SNMP user and have the appropriate credentials you want to use for the Auth/Priv configuration you can begin to configure SNMPv3.

    SNMP Informs Enabled (true, t, false, f): [false] <return>; needs to be “false”

    SNMPv3 user configuration (snmp user not configured in FOS user database will have physical AD and admin role as the default):

    User (rw): [snmpadmin1] <return>

    Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) 1; example selects MD5

    New Auth Passwd: <enter password, must be at least 8 chracters>

    Priv Protocol [DES(1)/noPriv(2)/AES128(3)/AES256(4)]): (1..4) 1; example selects DES

    New Priv Passwd: <enter password, must be at least 8 chracters>

    User (rw): [snmpadmin2] <return>

    Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3] <return>

    Priv Protocol [DES(1)/noPriv(2)/AES128(3)/AES256(4)]): (2..2) [2] <return>

    User (rw): [snmpadmin3] <return>

    Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3] <return>

    Priv Protocol [DES(1)/noPriv(2)/AES128(3)/AES256(4)]): (2..2) [2] <return>

    User (ro): [snmpuser1] <return>

    Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3] <return>

    Priv Protocol [DES(1)/noPriv(2)/AES128(3)/AES256(4)]): (2..2) [2] <return>

    User (ro): [snmpuser2] <return>

    Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3] <return>

    Priv Protocol [DES(1)/noPriv(2)/AES128(3)/AES256(4)]): (2..2) [2] <return>

    User (ro): [snmpuser3] <return>

    Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3] <return>

    Priv Protocol [DES(1)/noPriv(2)/AES128(3)/AES256(4)]): (2..2) [2] <return>

    SNMPv3 trap/inform recipient configuration:

    Trap Recipient's IP address : [0.0.0.0] <Add RS Host IP Here>

    Notify Type [TRAP(1)/INFORM(2)]: (1..1) [1] <return>; leave 1 for Traps

    UserIndex: (1..6) [1]; snmpadmin1 is the first in the list above, so 1 represents that user

    Trap recipient Severity level : (0..5) [2] 4

    Trap recipient Port : (0..65535) [162] 1162; must be 1162 for Insight RS listener

    Trap Recipient's IP address : [0.0.0.0] <return>

    Trap Recipient's IP address : [0.0.0.0] <return>

    Trap Recipient's IP address : [0.0.0.0] <return>

    Trap Recipient's IP address : [0.0.0.0] <return>

    Trap Recipient's IP address : [0.0.0.0] <return>

The configuration of the Brocade is now complete.

Configure firewall and port settings
SAN Switch Connectivity - Firewall/Port Requirements
ProtocolPortsSourceDestinationFunctionOptional
ICMPN/AHosting DeviceMonitored SystemsProvides system reachability (ping) check during system discovery and before other operations.Required
UDP161Hosting DeviceMonitored SystemsSNMP. This is the standard port used by SNMP agents on monitored systems. The Hosting Device sends requests to devices on this port.Required
UDP162Monitored SystemsHosting DeviceSNMP Trap. This is the port used by Insight RS to listen to SNMP traps.Required*
UDP1162Monitored DeviceHosting DeviceSNMPv3 Trap. This is the port used by Insight RS to listen to SNMPv3 traps.Required*
TCP22Hosting DeviceMonitored SystemsSSH: Remote Data CollectionOptional
TCP23Hosting DeviceMonitored SystemsTelnet: Remote Data CollectionOptional

* Dependent on the version of SNMP used on the monitored device.

Add protocol credentials and start discovery

To discover your monitored devices, complete the following sections:

Create an SNMP protocol credential in the Insight RS Console

Create an SNMPv1 or SNMPv3 protocol credential to correspond to the protocol you configured on your switch in Option 1: Configure SNMPv1orOption 2: Configure SNMPv3.

Option 1: SNMPv1

If your device's SNMP community string is set to public and your community access mode is read only, Insight RS automatically associates an SNMPv1 protocol with your device. If you use a different community string or use a nonstandard port, you must create an SNMPv1 protocol credential in the Insight RS Console.

To configure SNMPv1 in the Insight RS Console, complete the following steps:

  1. In a web browser, log on to the Insight RS Console.
  2. In the main menu, select Discovery and click the Credentials tab.
  3. From the Select and Configure Protocol drop-down list, select Simple Network Management Protocol Version 1, V2C (SNMPv1, SNMPv2C).
  4. Click New. The New Credential dialog box appears.

  5. Type the Community String you have configured on your device.
  6. Click Add.

Insight RS creates the protocol credential and it appears in the credentials table.

Option 2: SNMPv3

To configure SNMPv3 in the Insight RS Console, complete the following steps:

  1. Create a Named Credential for every set of Management Group credentials:

    1. In the Insight RS Console, navigate to Company InformationNamed Credentials.
    2. Click Add New Credential.
    3. Type a Credential Name, for example: Brocade SNMPv3.
    4. In the Protocol drop-down list, select Simple Network Management Protocol Version 3 (SNMPv3).
    5. Use the default port of 161.
    6. In the SNMP Account Credential fields, add:

      1. Type the Username for the user identified in Option 2: Configure SNMPv3.
      2. Account Authentication Protocol: MD5 or SHA

        The example used MD5 in Option 2: Configure SNMPv3.

      3. Account Authentication Password.
      4. Account Privacy Protocol: DES, DES3, AES128, AES192, AES256

        The example used DES in Option 2: Configure SNMPv3.

      5. Account Privacy Passphrase.

      6. Leave the Context Name blank.

    7. Click Save.
  2. Add Discovery credentials for the B-Series switches:

    1. In the Insight RS Console, navigate to DiscoveryCredentials.
    2. Create discovery protocol credentials for the Named Credential created earlier.

      1. In the Select and Configure Protocol drop-down list, select Simple Network Management Protocol Version 3 (SNMPv3).
      2. Click New.
      3. In the Named Credential drop-down list, select the Named Credential created earlier.
      4. Click Add.
Discover the device in the Insight RS ConsoleTool

To discover the device from the Insight RS Console, complete the following steps:

  1. In a web browser, log on to the Insight RS Console.
  2. In the main menu, select Discovery and click the Sources tab.
  3. Expand the IP Addresses section and add the IP address for your device:

    1. Click New.
    2. Select the Single Address, Address Range, or Address List option.
    3. Type the IP address(es) of the devices to be discovered.
    4. Click Add.
  4. Click Start Discovery.
Verify discovery and device status

Hpe Network Discovery Tool

To verify the device was discovered correctly, complete the following steps:

  1. In a web browser, log on to the Insight RS Console.
  2. In the main menu, select Devices and click the Device Summary tab.
  3. Make sure the Status column contains a success icon ().

    If there is no success icon, see Resolve monitored device status issues for troubleshooting information.

Verify warranty and contract information

Verify that the warranty and contract information was discovered correctly in the Insight RS Console:

  1. In the Insight RS Console, navigate to Devices and click the switch Device Name.
  2. Expand the Hardware section, and make sure the Acquired Serial Number and Acquired Product Number are correct. If they are not correct, type the correct values in the Override Serial Number and Override Product Number fields and click Save Changes.

    Note: If your SAN switch is covered by a critical service level contract then add CS4SAN to the Custom Delivery ID field in order to elevate the response to service events.

Verify communication between monitored device and Insight RS

To verify communication between your monitored device and Insight RS, complete the following sections:

Send a test event

Since B-Series Fabric-OS v6.3.x was released, B-Series switches can emit test traps to ensure that the complete end-to-end event flow can be verified. The user must log on to the switch CLI admin interface and issue the following command:

Send SNMP traps to test the configuration:

  1. Telnet or SSH to the B-Series switch.
  2. Show the available traps you can send as tests:

    snmptraps --show

  3. Send a blanket test trap for all tests:

    snmptraps --send

  4. Or send a specific test trap:

    snmptraps --send --trap_name <trapname>

    For example:

    snmptraps --send -trap_name cp-status-change-trap -ip_address <hosting_device_ip>

    where <hosting_device_ip> is the IP address of the Hosting Device. If the switch reports that the test trap cannot be sent, make sure snmpmibcaps is configured to send HA traps. If it is configured correctly, this command should create a test event visible in the Insight RS Console and also submit an incident to HPE.

Note: Not all traps result in an incident being delivered to the Insight RS Console. Not all traps are sent and not all are received. Some get received as ‘unregistered event’ if you have that option selected as a receive option in Events. The events that show up as ‘unregistered’ are not compiled in the SIM Mibs. FA-MIB’s generate a valid hardware event.

See the B-Series Switch documentation for more details.

Verify collections in the Insight RS Console

Hpe Network Switches

Collections are not automatically run after discovery. HPE recommends that you manually run a collection after discovery completes in order to verify connectivity. Run the collection schedule manually on the Collection Services → Collection Schedules tab. For more information about scheduling collections, see Manage Collection Schedules.

Verify that this collection ran successfully on the Collection Services → SAN Storage Collection Results tab in the Insight RS Console.

  1. Log on to the Insight RS Console.
  2. In the main menu, select Collection Services and then click the SAN Storage Collection Results tab.
  3. Expand the Storage Configuration Collection section.
  4. Locate the entry for your device and check the Result column. If the collection was successful, a success icon appears (). If it failed, an error icon appears ().
_HP_HTML5_bannerTitle.htm

Hpe Switch Selector

Printable version

HPE Smart Storage Administrator (HPE SSA) for Windows 64-bit

By downloading, you agree to the terms and conditions of the Hewlett Packard Enterprise Software License Agreement.
Note: Some software requires a valid warranty, current Hewlett Packard Enterprise support contract, or a license fee.

Type:Software - System Management
Version:2.60.18.0(24 Oct 2016)
Operating System(s):
Microsoft Windows 8.1 (64-bit)
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2008 R2 Foundation Edition
Microsoft Windows Server 2008 x64
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2016
Microsoft Windows Vista (64-bit)
Microsoft Windows XP Professional x64 Edition
Microsoft Windows 7 (64-bit)
File name:cp029559.exe (13 MB)
The HPE Smart Storage Administrator (HPE SSA) is a web-based application that helps you configure, manage, diagnose, and monitor HPE ProLiant Smart Array Controllers and now other storage devices as well, such as host bus adapters (HBAs), HPE Storage controllers, and future devices such as SCSI Express drives, and SAS switch devices. HPE SSA replaces the existing HP Array Configuration Utility, or ACU, with an updated design and will deliver new features and functionality for various Smart Storage initiatives as they come online. HPE Smart Array Advanced Pack 1.0 and 2.0 features are now part of the baseline features of HPE SSA, with the appropriate firmware.HPE SSA will allow you to configure and manage your storage as before, but now with additional features, abilities, and supported devices. Existing ACU scripts should only need to make minimal changes such as calling the appropriate binary or executable in order to maintain compatibility.

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

  • Support for:
    • Smart Array H240nr
    • Smart Array P240nr
    • Smart Array P542D
  • Added Sanitize Erase for supporting controllers
  • Added ability to enable erase and stop erase on multiple drives
  • Added support for the Microsoft® Windows Server® 2016 OS.

To ensure the integrity of your download, HPE recommends verifying your results with this SHA-256 Checksum value:

354b65016ceb9cb11a417c76aeba4079ac74f9a430588c0e9d7e633f4caa3a1fcp029559.exe

Reboot Requirement:
Reboot is not required after installation for updates to take effect and hardware stability to be maintained.

Installation:

If there is an older version of HPE SSA installed on the system, please uninstall it by going to 'Control Panel -> Uninstall a program' and then uninstall 'HP Smart Storage Administrator'.

Download the Smart Component to a directory on your hard drive and change to that directory. The downloaded file is a self-extracting executable with a filename based on the Smart Component Number.

From that drive and directory, execute the downloaded file.

Click the 'Install' button to proceed with the installation. The utility will automatically be installed.

End User License Agreements:
HPE Software License Agreement v1
Hewlett-Packard End User License Agreement

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

Important:

HPE SSA replaces the existing HP Array Configuration Utility, or ACU, with an updated design and will deliver new features and functionality for various Smart Storage initiatives as they come online. HPE Smart Array Advanced Pack 1.0 and 2.0 features are now part of the baseline features of HPE SSA, with the appropriate firmware.

HPE SSA will allow you to configure and manage your storage as before, but now with additional features, abilities, and supported devices. Existing ACU scripts should only need to make minimal changes such as calling the appropriate binary or executable in order to maintain compatibility.

Notes:

For support for HPE SSA or Smart Array controllers, please visit Contact HP.

Users will automatically be logged out after a predetermined period of inactivity when using HPE SSA and will have to re-login.

On the Web-based Management Device Homepage, under 'options', 'Anonymous Access' should be enabled when using HPE SSA.

When clicking on a controller that is currently being configured in a different HPE SSA session, a message will appear which allows you to override the other HPE SSA session or cancel. If you choose to override the other HPE SSA session, any unsaved changes in the other session will be discarded.

To uninstall HPE SSA, use Add/Remove Programs located in the Control Panel on Windows Systems.

To run HPE SSA in local application mode on Windows, Internet Explorer must be the default browser.

The following are known issues:

  • Sometimes the login on the Device Home Page will not work the first time. Click on the Device Home Page link again or refresh the page and re-login.

HPE SSA replaces the existing HP Array Configuration Utility, or ACU, with an updated design and will deliver new features and functionality for various Smart Storage initiatives as they come online. HPE Smart Array Advanced Pack 1.0 and 2.0 features are now part of the baseline features of HPE SSA, with the appropriate firmware.

HPE SSA will allow you to configure and manage your storage as before, but now with additional features, abilities, and supported devices. Existing ACU scripts should only need to make minimal changes such as calling the appropriate binary or executable in order to maintain compatibility.

Version:4.21.7.0 (5 Oct 2020)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

ADU report does not capture Slotx log greater than 4GiB size if configured.

Added support for HPE Smart Array S100i SR Gen10 Plus SW RAID


Version:4.17.6.0 (9 Mar 2020)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

Split Mirror Primary Array's Acceleration Mode displays an invalid message that indicates caching can be enabled or disabled for each individual logical drive even if the array does not contain a logical drive that can have caching enabled.


Version:4.15.6.0 (20 Dec 2019)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

  • Added support to enable SmartCache on volumes greater than 256TB

Version:3.47.6.0 (9 Sep 2019)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

Added support for SSD WearGauge reporting for NVMe drives.


Version:3.40.3.0 (2 Apr 2019)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

  • Supports Online Firmware Activation reporting

Version:3.30.14.0(A) (27 Nov 2018)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

Note: If version 3.30.14.0 was previously installed, then it is not necessary to upgrade to version 3.30.14.0 (A).

  • Added support for Microsoft Windows Server 2019

Version:3.30.14.0 (26 Jun 2018)

Upgrade Requirement:
Recommended - HPE recommends users update to this version at their earliest convenience.

It is recommended to update to this 3.30.13.0 version of HPE Smart Storage Administrator if you update your system BIOS using the 2018.06 version of SPP. Any array created with the BIOS configuration utility from the 2018.06 version of SPP will not be accessible with an older version of HPE Smart Storage Administrator.

  • Added the ability to enable or disable Drive Write Cache for configured and unconfigured drives

Version:3.25.4.0 (5 Feb 2018)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

  • Added support for Freeze/Anti-freeze of the Sanitize command.

Version:3.10.3.0 (12 Jul 2017)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

  • Initial firmware release for HPE P/E-Class SR Gen10 controllers.

Version:2.65.7.0 (21 Apr 2017)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

SSA incorrectly displays 64 characters for the encryption master key length in local mode. The length was changed to 32 characters.


Version:2.60.18.0 (24 Oct 2016)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

  • Support for:
    • Smart Array H240nr
    • Smart Array P240nr
    • Smart Array P542D
  • Added Sanitize Erase for supporting controllers
  • Added ability to enable erase and stop erase on multiple drives
  • Added support for the Microsoft® Windows Server® 2016 OS.

Version:2.40.13.0 (1 Apr 2016)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

New features:

  • Support for Drive Sanitize on Smart Array Px2x and Smart Array Px3x controllers

  • Allows users to forcefully re-enable failed encrypted volumes when their encryption keys are permanently lost and all the failed drives have been replaced

  • Added logical drive numbers/physical drive locations to primary and secondary boot volume information


Version:2.30.6.0 (1 Oct 2015)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

Updated HP EULA for encryption licensing


Version:2.20.11.0 (15 Jun 2015)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

Support for:

  • Smart Array P840ar

New Features:

  • Transformation support for H-series controllers
    • Includes plaintext and rekey operations for Encryption
  • NVMe drive support for discovery and Wear Gauge information
  • New Solid State device view

Version:2.10.14.0 (30 Mar 2015)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

Support for:

  • HP Smart Array P246br
  • HP Smart Array P741
  • HP Smart Array P841
New Features:
  • Parallel Surface Scan
  • Encryption Key Manager Authentication
  • Express Local Encryption
  • Volatile Encryption Keys
  • Re-enable Cache Module
    • Available only for specific cases where cache is disabled due to battery interruption

Version:2.0.23.0 (9 Sep 2014)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

Support for the following devices:

  • Smart Array P244br
  • Smart Array P440
  • Smart Array P440ar
  • Smart Array P441
  • Smart Array P840
  • Dynamic Smart Array B140i
  • Smart HBA H240
  • Smart HBA H240ar
  • Smart HBA H241
  • Smart HBA H244br
  • 12G SAS Expander
Support for the following new features:
  • Write-back cache write policy for HP SmartCache
  • HDD Flexible Latency Optimization (FLS)
  • Power Mode Management
  • HBA mode for latest generation Smart Array P-series controllers
  • RAID/Array mode for Smart HBA H-series controllers

Version:1.60.17.0 (18 Feb 2014)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

Support for
Smart Array P230i
Smart Array P530
Smart Array P531
Smart Array P830
Smart Array P830i
HP Secure Encryption
Rapid Rebuild Priority
SSD OPO (Over Provisioning Optimization)
512e Physical Drive support
Auto RAID 0


Version:1.50.4.0 (10 Sep 2013)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

  • Support for:
    • Smart Array P430
    • Smart Array P431
    • Smart Array P731m
  • Features supported with appropriate firmware versions and devices as base features (no longer requires SAAP license keys):
    • Drive Erase
    • Heal Array
    • HP SmartCache
    • HP SSD Smart Path
    • HP SmartSSD Wear Gauge
    • Online Expansions and Extensions of Arrays and Logical Drives
    • Moving and Deleting of Individual Logical Drive
      • Removes previous limitation of having to delete all logical drives in order until target was reache
      • Allows moving from one drive type to another...SATA to SAS, SAS to SAT
    • Advanced Capacity Expansions
    • Split Mirror Backup and Rollback
  • Online Mirror Splitting with Recombining in Offline Mode
  • Online RAID Migrations
  • Online Strip Size Migrations
  • Mismatched Drive Firmware Notifications
  • Supports following RAID levels as base features (no longer requires SAAP license keys):
    • RAID 0
    • RAID 1, RAID 1(ADM, Advanced Data Mirroring)
    • RAID 10, RAID 10(ADM, Advanced Data Mirroring)
    • RAID 5
    • RAID 50
    • RAID 6
    • RAID 60
  • Rapid Parity Initialization
  • Shrink Array, Move Array, and Replace Array
  • Spare Management
    • Dedicated (multiple arrays covered by one spare)
    • Auto-Replace Drive (spare becomes data replacement drive and covers RAID 0 when set in Predictive Spare Mode)
  • Video on Demand (VOD) Performance Optimization

Type:Software - System Management
Version:2.60.18.0(24 Oct 2016)
Operating System(s):
Microsoft Windows 7 (64-bit)
Microsoft Windows 8.1 (64-bit)
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2008 R2 Foundation Edition
Microsoft Windows Server 2008 x64
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2016
Microsoft Windows Vista (64-bit)
Microsoft Windows XP Professional x64 Edition

Description

The HPE Smart Storage Administrator (HPE SSA) is a web-based application that helps you configure, manage, diagnose, and monitor HPE ProLiant Smart Array Controllers and now other storage devices as well, such as host bus adapters (HBAs), HPE Storage controllers, and future devices such as SCSI Express drives, and SAS switch devices. HPE SSA replaces the existing HP Array Configuration Utility, or ACU, with an updated design and will deliver new features and functionality for various Smart Storage initiatives as they come online. HPE Smart Array Advanced Pack 1.0 and 2.0 features are now part of the baseline features of HPE SSA, with the appropriate firmware.HPE SSA will allow you to configure and manage your storage as before, but now with additional features, abilities, and supported devices. Existing ACU scripts should only need to make minimal changes such as calling the appropriate binary or executable in order to maintain compatibility.

Enhancements

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

  • Support for:
    • Smart Array H240nr
    • Smart Array P240nr
    • Smart Array P542D
  • Added Sanitize Erase for supporting controllers
  • Added ability to enable erase and stop erase on multiple drives
  • Added support for the Microsoft® Windows Server® 2016 OS.

Installation Instructions

To ensure the integrity of your download, HPE recommends verifying your results with this SHA-256 Checksum value:

354b65016ceb9cb11a417c76aeba4079ac74f9a430588c0e9d7e633f4caa3a1fcp029559.exe

Reboot Requirement:
Reboot is not required after installation for updates to take effect and hardware stability to be maintained.

Installation:

If there is an older version of HPE SSA installed on the system, please uninstall it by going to 'Control Panel -> Uninstall a program' and then uninstall 'HP Smart Storage Administrator'.

Download the Smart Component to a directory on your hard drive and change to that directory. The downloaded file is a self-extracting executable with a filename based on the Smart Component Number.

From that drive and directory, execute the downloaded file.

Click the 'Install' button to proceed with the installation. The utility will automatically be installed.

Release Notes

End User License Agreements:
HPE Software License Agreement v1
Hewlett-Packard End User License Agreement

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

Important:

HPE SSA replaces the existing HP Array Configuration Utility, or ACU, with an updated design and will deliver new features and functionality for various Smart Storage initiatives as they come online. HPE Smart Array Advanced Pack 1.0 and 2.0 features are now part of the baseline features of HPE SSA, with the appropriate firmware.

HPE SSA will allow you to configure and manage your storage as before, but now with additional features, abilities, and supported devices. Existing ACU scripts should only need to make minimal changes such as calling the appropriate binary or executable in order to maintain compatibility.

Notes:

For support for HPE SSA or Smart Array controllers, please visit Contact HP.

Users will automatically be logged out after a predetermined period of inactivity when using HPE SSA and will have to re-login.

On the Web-based Management Device Homepage, under 'options', 'Anonymous Access' should be enabled when using HPE SSA.

When clicking on a controller that is currently being configured in a different HPE SSA session, a message will appear which allows you to override the other HPE SSA session or cancel. If you choose to override the other HPE SSA session, any unsaved changes in the other session will be discarded.

To uninstall HPE SSA, use Add/Remove Programs located in the Control Panel on Windows Systems.

To run HPE SSA in local application mode on Windows, Internet Explorer must be the default browser.

The following are known issues:

  • Sometimes the login on the Device Home Page will not work the first time. Click on the Device Home Page link again or refresh the page and re-login.

Important

HPE SSA replaces the existing HP Array Configuration Utility, or ACU, with an updated design and will deliver new features and functionality for various Smart Storage initiatives as they come online. HPE Smart Array Advanced Pack 1.0 and 2.0 features are now part of the baseline features of HPE SSA, with the appropriate firmware.

HPE SSA will allow you to configure and manage your storage as before, but now with additional features, abilities, and supported devices. Existing ACU scripts should only need to make minimal changes such as calling the appropriate binary or executable in order to maintain compatibility.

Revision History

Version:4.21.7.0 (5 Oct 2020)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

ADU report does not capture Slotx log greater than 4GiB size if configured.

Added support for HPE Smart Array S100i SR Gen10 Plus SW RAID


Version:4.17.6.0 (9 Mar 2020)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

Split Mirror Primary Array's Acceleration Mode displays an invalid message that indicates caching can be enabled or disabled for each individual logical drive even if the array does not contain a logical drive that can have caching enabled.


Version:4.15.6.0 (20 Dec 2019)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

  • Added support to enable SmartCache on volumes greater than 256TB

Version:3.47.6.0 (9 Sep 2019)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

Added support for SSD WearGauge reporting for NVMe drives.


Version:3.40.3.0 (2 Apr 2019)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

  • Supports Online Firmware Activation reporting

Version:3.30.14.0(A) (27 Nov 2018)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

Note: If version 3.30.14.0 was previously installed, then it is not necessary to upgrade to version 3.30.14.0 (A).

  • Added support for Microsoft Windows Server 2019

Version:3.30.14.0 (26 Jun 2018)

Upgrade Requirement:
Recommended - HPE recommends users update to this version at their earliest convenience.

It is recommended to update to this 3.30.13.0 version of HPE Smart Storage Administrator if you update your system BIOS using the 2018.06 version of SPP. Any array created with the BIOS configuration utility from the 2018.06 version of SPP will not be accessible with an older version of HPE Smart Storage Administrator.

  • Added the ability to enable or disable Drive Write Cache for configured and unconfigured drives

Version:3.25.4.0 (5 Feb 2018)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

  • Added support for Freeze/Anti-freeze of the Sanitize command.

Version:3.10.3.0 (12 Jul 2017)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

  • Initial firmware release for HPE P/E-Class SR Gen10 controllers.

Version:2.65.7.0 (21 Apr 2017)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

SSA incorrectly displays 64 characters for the encryption master key length in local mode. The length was changed to 32 characters.


Version:2.60.18.0 (24 Oct 2016)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

  • Support for:
    • Smart Array H240nr
    • Smart Array P240nr
    • Smart Array P542D
  • Added Sanitize Erase for supporting controllers
  • Added ability to enable erase and stop erase on multiple drives
  • Added support for the Microsoft® Windows Server® 2016 OS.

Version:2.40.13.0 (1 Apr 2016)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

New features:

  • Support for Drive Sanitize on Smart Array Px2x and Smart Array Px3x controllers

  • Allows users to forcefully re-enable failed encrypted volumes when their encryption keys are permanently lost and all the failed drives have been replaced

  • Added logical drive numbers/physical drive locations to primary and secondary boot volume information


Version:2.30.6.0 (1 Oct 2015)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

Updated HP EULA for encryption licensing


Version:2.20.11.0 (15 Jun 2015)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

Support for:

  • Smart Array P840ar

New Features:

  • Transformation support for H-series controllers
    • Includes plaintext and rekey operations for Encryption
  • NVMe drive support for discovery and Wear Gauge information
  • New Solid State device view

Version:2.10.14.0 (30 Mar 2015)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

Support for:

  • HP Smart Array P246br
  • HP Smart Array P741
  • HP Smart Array P841
New Features:
  • Parallel Surface Scan
  • Encryption Key Manager Authentication
  • Express Local Encryption
  • Volatile Encryption Keys
  • Re-enable Cache Module
    • Available only for specific cases where cache is disabled due to battery interruption

Version:2.0.23.0 (9 Sep 2014)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

Support for the following devices:

  • Smart Array P244br
  • Smart Array P440
  • Smart Array P440ar
  • Smart Array P441
  • Smart Array P840
  • Dynamic Smart Array B140i
  • Smart HBA H240
  • Smart HBA H240ar
  • Smart HBA H241
  • Smart HBA H244br
  • 12G SAS Expander
Support for the following new features:
  • Write-back cache write policy for HP SmartCache
  • HDD Flexible Latency Optimization (FLS)
  • Power Mode Management
  • HBA mode for latest generation Smart Array P-series controllers
  • RAID/Array mode for Smart HBA H-series controllers

Version:1.60.17.0 (18 Feb 2014)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

Support for
Smart Array P230i
Smart Array P530
Smart Array P531
Smart Array P830
Smart Array P830i
HP Secure Encryption
Rapid Rebuild Priority
SSD OPO (Over Provisioning Optimization)
512e Physical Drive support
Auto RAID 0


Version:1.50.4.0 (10 Sep 2013)

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.

  • Support for:
    • Smart Array P430
    • Smart Array P431
    • Smart Array P731m
  • Features supported with appropriate firmware versions and devices as base features (no longer requires SAAP license keys):
    • Drive Erase
    • Heal Array
    • HP SmartCache
    • HP SSD Smart Path
    • HP SmartSSD Wear Gauge
    • Online Expansions and Extensions of Arrays and Logical Drives
    • Moving and Deleting of Individual Logical Drive
      • Removes previous limitation of having to delete all logical drives in order until target was reache
      • Allows moving from one drive type to another...SATA to SAS, SAS to SAT
    • Advanced Capacity Expansions
    • Split Mirror Backup and Rollback
  • Online Mirror Splitting with Recombining in Offline Mode
  • Online RAID Migrations
  • Online Strip Size Migrations
  • Mismatched Drive Firmware Notifications
  • Supports following RAID levels as base features (no longer requires SAAP license keys):
    • RAID 0
    • RAID 1, RAID 1(ADM, Advanced Data Mirroring)
    • RAID 10, RAID 10(ADM, Advanced Data Mirroring)
    • RAID 5
    • RAID 50
    • RAID 6
    • RAID 60
  • Rapid Parity Initialization
  • Shrink Array, Move Array, and Replace Array
  • Spare Management
    • Dedicated (multiple arrays covered by one spare)
    • Auto-Replace Drive (spare becomes data replacement drive and covers RAID 0 when set in Predictive Spare Mode)
  • Video on Demand (VOD) Performance Optimization

Hpe Switch Discovery Tool Kit

Legal Disclaimer: Products sold prior to the November 1, 2015 separation of Hewlett-Packard Company into Hewlett Packard Enterprise Company and HP Inc. may have older product names and model numbers that differ from current models.