This release note and the software that accompanies it are copyright (c) 2012, Avago Technologies or its suppliers, and may only be installed and used in accordance with the license that accompanies the software.
This Software is furnished under license and may only be used or copied in accordance with the terms of that license. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document. The Software is subject to change without notice, and should not be construed as a commitment by AVAGO TECHNOLOGIES or its suppliers to market, license, sell or support any product or technology. Unless otherwise provided for in the license under which this Software is provided, the Software is provided AS IS, with no warranties of any kind, express or implied. Except as expressly permitted by the Software license, neither Intel Corporation nor its suppliers assumes any responsibility or liability for any errors or inaccuracies that may appear herein. Except as expressly permitted by the Software license, no part of the Software may be reproduced, stored in a retrieval system, transmitted in any form, or distributed by any means without the express written consent of AVAGO TECHNOLOGIES.
==========================
Supported MegaRAID Controllers
==============================
MegaRAID SAS 9362-4i
MegaRAID SAS 9362-8i
MegaRAID SAS 9361-4i
MegaRAID SAS 9361-8i
MegaRAID SAS 9363-4i
MegaRAID SAS 9380-8e
MegaRAID SAS 9381-4i4e
MegaRAID SAS 9361-8iCC
MegaRAID SAS 9380-8eCC
MegaRAID SAS 9364-8i
MegaRAID SAS 9340-8i
MegaRAID SAS 9341-8i
MegaRAID SAS 9341-4i
MegaRAID SAS 9270-8i
MegaRAID SAS 9271-4i
MegaRAID SAS 9271-8i
MegaRAID SAS 9271-8iCC
MegaRAID SAS 9286-8e
MegaRAID SAS 9286CV-8e
MegaRAID SAS 9286CV-8eCC
MegaRAID SAS 9265-8i
MegaRAID SAS 9285-8e
MegaRAID SAS 9240-4i
MegaRAID SAS 9240-8i
MegaRAID SAS 9260-4i
MegaRAID SAS 9260CV-4i
MegaRAID SAS 9260-8i
MegaRAID SAS 9260CV-8i
MegaRAID SAS 9260DE-8i
MegaRAID SAS 9261-8i
MegaRAID SAS 9280-4i4e
MegaRAID SAS 9280-8e
MegaRAID SAS 9280DE-8e
MegaRAID SAS 9280-24i4e
MegaRAID SAS 9280-16i4e
MegaRAID SAS 9260-16i
MegaRAID SAS 9266-4i
MegaRAID SAS 9266-8i
MegaRAID SAS 9285CV-8e
MegaRAID SAS 8704ELP
MegaRAID SAS 8704EM2
MegaRAID SAS 8708ELP
MegaRAID SAS 8708EM2
MegaRAID SAS 8880EM2
MegaRAID SAS 8888ELP
MegaRAID SAS 8308ELP*
MegaRAID SAS 8344ELP*
MegaRAID SAS 84016E*
MegaRAID SAS 8408E*
MegaRAID SAS 8480E*
MegaRAID SATA 300-8ELP*
Supported HBA Controllers
=========================
LSI SAS 9211
LSI SAS 9212
LSI SAS3041E-R
LSI SAS3041X-R
LSI SAS3080X-R,
LSI SAS3081E-R
LSI SAS3442E-R
LSI SAS3442X-R
LSI WarpDrive SLP-300
9212 4i4e-R spec
9211-8i/4i-R spec
LSI Nytro WarpDrive WLP4-200
LSI Nytro WarpDrive WLP4-400
LSI Nytro WarpDrive BLP4-400
LSI Nytro WarpDrive BLP4-800
LSI Nytro WarpDrive BLP4-1600
LSI Nytro XD BLP4-400
LSI Nytro XD BLP4-800
LSI SAS 9207-4i4e
LSI SAS 9217-4i4e
LSI SAS 9207-8i
LSI SAS 9217-8i
LSI SAS 9207-8e
LSI SAS 9201-16e
LSI SAS 9200-8e
*These older controllers should work but have not been tested.
===================
Package Information
===================
OS supported = Windows* 2000, Windows* 2003, Windows* XP, Windows* Vista, Windows* 2008, Windows* 7, Windows* 8
This package can be installed on all x86 and x64 systems.
=========
Attention
=========
1) MSM uses 5571 or 3071 as multicast listening ports, please make sure these ports are NOT blocked by firewall utility for MSM remote connection.
2) MSM does not work on Longhorn Core
3)From MR5.3 MSM is added with 256 bit encryption and this option is disabled by default from factory.
The end user(s) who needs to enable 256 bit encryption is\are expected to perform the below steps
1. Go to <MSM_HOME>\ StrongSSLEncryption.ini
2.Modify the property SSL_STRONG_ENCRYPTION to �ENABLE�
3.Restart the MSM Framework
Warning : Please be aware that enabling 256bit encryption would restrict the user from communicating with the previous versions of MSM due to the higher Vs lower bit encryption handshake in the communication channel.
4) MSM Framework uses the 3071 port, please make sure this port is not occupied by other application to avoid the issues like Ex: GUI refresh and Monitor Events logging issues.
5) Increase/Decrease strength of Public/Private RSA keys:
Windows MSM Installer provides an option to user to select Self signed key size.
Upon installation user can still switch the keys and below were the steps to perform the same:
- Stop MSMFramework Service.
- Make sure service is Stopped
- Edit the vivaldikey.properties available in below locations
1) <MSM_HOME>
2) <MSM_HOME>\Framework
3) <MSM_HOME>\MegaPopup
- Comment/Uncomment the VIVALDI_KEY_FILE field for Key size selection.
- Save the vivaldikey.properties file.
- Start the MegaRAID Storage Manager Framework service.
- Start the MegaPopup from Command prompt ( <MSM_HOME>\MegaPopup\popup.exe)
6)Alert notifications of users choice:
After installation user can switch the alert notifications choices and below were the steps to perform the same:
- Stop MSMFramework Service.
- Make sure service is Stopped
- Edit the eventnotificationchoice.properties available in below location
<MSM_HOME>\Framework
- Comment/Uncomment the EVENT_NOTIFICATION_CHOICE field for alert notification choice selection.
- Save the eventnotificationchoice.properties file.
- Start the MegaRAID Storage Manager Framework service.
- Start the MegaPopup (<MSM_HOME>\MegaPopup\popup.sh)
7)MSM MR6.11 is upgraded with latest OpenSSL (1.0.2c) to address the Jun'15 OpenSSL advisory.
Below were the list of vulnerabilities and respective CVEs impact starting Jun�15
OpenSSL Security Advisory [12 Jun 2015]
======================================
- Fix HMAC ABI incompatibility. The previous version introduced an ABI
incompatibility in the handling of HMAC. The previous ABI has now been
restored.
OpenSSL Security Advisory [11 Jun 2015]
======================================
- Malformed ECParameters causes infinite loop
- Exploitable out-of-bounds read in X509_cmp_time
- PKCS7 crash with missing EnvelopedContent
- CMS verify infinite loop with unknown hash function
- Race condition handling NewSessionTicket
- Only support 256-bit or stronger elliptic curves with the'ecdh_auto' setting (server) or by default (client). Of supported
curves, prefer P-256 (both).
For the complete list of Open SSL security advisory please refer to change log for 1.0.x from link http://openssl.org/news/changelog.html#x3
Note: This list had been derived based on the symptoms / usage descriptions of advisory and AVAGO engineers are not equipped with insight of openssl code segment of impact analysis
==================
Known Restrictions
==================
1) Users have to install Windows Installer 3.0 or above to install MSM on their machines.
Here is the link to install Windows installer 3.0. http://www.microsoft.com/downloads/details.aspx?FamilyID=5fbc5470-b259-4733-a914-a956122e08e8&displaylang=en&Hash=XWGQj4dth%2f0C0XawhHybRR1RcAY9BfBRJiYTZWCYM5AMpqnvUT9q9zvYdbEZE0AC0H5guBKp%2biuLGqMH%2f0Xl%2fA%3d%3d
2) MSM will be supported starting from Windows 2000 Service Pack 3. Anything lower than this will not be supported.
3) Scan/Import IR RAID Foreign Configuration not working When all the drives are removed clear configuration wont appear. So foreign configuration should be tested removing only one drive without removing all of them.
4) sfcb timeout socket error in CIMOM server results in AEN blocked by sfcb-cimom and may lead to duplicate entries in client with incorrect event description.
To get rid of this, user is required to restart sfcb service in VMware ESXi.
Command to res
评论2