6180 Storage Controllers are in Locked down state

1 disk on the array got faulted and on trying to replace it both controllers on the storage have gone into a
locked state.Both controllers have an LU+OE errors codes. Borrowed a similar controller to try and reset the faulted 2.
Followed the syshandbk method;
For controllers showing:
LU on one controller and the tray ID(85 or 99) on the other
1. serial into the LU controller, and run lemClearLockdown
2. Use the management interface to Online the Controller
3. The booting controller should show the same tray ID as the surviving one.
Am failing to serial into the LU controller. Is a special password needed for this? Am using kra16wen password.
Can the controllers be unlocked?
Edited by: 949609 on Jul 29, 2012 5:04 AM

Hello,
Yes a special Oracle restricted password is required to access the shell low level. This password is used only by Oracle authorized engineers. The "kra16wen" gives you the access to the Service Interface Menu which is a customer interface.
If one controller reports LU, this means that further investigation needs to be done by an Oracle engineer in order to determine (using special logs) why the controller is in lock down mode. This is not necessarily a H/W issue.
Regards
Nicolas

Similar Messages

  • What are the security settings to lock down a form with fillable fields and yet allow someone with Reader to fill in the fields as will as save the form and print it?

    What are the security settings to lock down a form with fillable fields and yet allow someone with Reader to fill in the fields as will as save the form and print it?

    You want to allow someone to open your document and fill out the form (in the fields you have created), but not change or edit the form, right? Here's the answer - assuming you are using Acrobat Pro and someone will be opening the PDF using at least Acrobat Reader 9 and up:
    Tools > Protection > Encrypt < Encrypt with Password
    Answer YES to change the security.
    A new window opens:
         Do NOT select Document Open (or that will require a password to open the document.)
         Select: Permissions (Check the box next to "Restrict editing and printing of the document.")
         Change the following 2 settings from the drop-down box:
              Printing Allowed: Select High Resolution
              Changes Allowed: Select Commenting, filling in form fields, and signing signature fields
              Leave selected: "Enable text access for screen reader devices for the visually impaired"
              Change Permissions Password (insert a strong password)
              Leave all other settings alone in "Options"
              OK - OK
              Re-enter the Permissions Password (the one you entered above)
              OK - OK
              Save the PDF to apply the security [notice that (SECURED0 will appear after the document title]

  • I put a Tesco sim (02 carrier) in 2 unlocked phones, Both phones are now locked to 02, 02 blame apple, I connect the iphone to itunes and it states that the new carrier (orange) is not supported

    I put a Tesco sim (02 carrier) in 2 unlocked phones, Both phones are now locked to 02, 02 blame apple, I connect the iphone to itunes and it states that the new carrier (orange) is not supported, Isk this of both 02 and apple, who's phone is this and what right do you have to lock a previously unlocked phone?  very angry

    Where did you get these phones?
    These and other forums are full of people with iPhone unlocking problems - the net result is that, as others have said, is:
    If you bought them from Apple they will be (and stay) unlocked.
    If you bought them PAYG from CPW then they will lock to the first SIM activated.
    Any other contract or PAYG phone iPhone bought from the networks WILL be locked by them too.
    However, all is not lost. The original purchaser can request for the phones to be unlocked by Apple, via the carrier. The carriers usually charge around £20 to do this, or gratis if you're out of contract.
    You are the original purchaser, right? If not, you need to get in touch with that person and pray they'll help you out.

  • Why the Fibre uplink ports are down state even after giving no shutdown command at the interface

    Hi
    My Predecessors brought 2 CISCO 3750 switches and implemented LACP on these core switches. Due to looping in the network the Fibre uplink ports GigabitEthernet1/1/3 and GigabitEthernet2/1/3 are down (I think these uplink ports are mirrored in the LACP concept)
    Please see below from the configuration.
    I logged into the core switch and went to this particular interface GigabitEthernet1/1/3 and I gave the following command and still the port is in the down state after I gave no shutdown command. Do I need to give the same no shutdown command at interface GigabitEthernet2/1/3 as well ?
    Switch-Core1(config) interface GigabitEthernet1/1/3
    Switch-Core1(config-if)#no shutdown
    Switch-Core1(config-if)#
    Please see below  After no shutdown command given still these 2 Gigabit fibre uplink ports are down.
    GigabitEthernet1/0/20  unassigned      YES unset  up                    up
    GigabitEthernet1/0/21  unassigned      YES unset  down                  down
    GigabitEthernet1/0/22  unassigned      YES unset  down                  down
    GigabitEthernet1/0/23  unassigned      YES unset  down                  down
    GigabitEthernet1/0/24  unassigned      YES unset  up                    up
    GigabitEthernet1/1/1   unassigned      YES unset  up                    up
    GigabitEthernet1/1/2   unassigned      YES unset  up                    up
    GigabitEthernet1/1/3   unassigned      YES unset  down                  down
    GigabitEthernet1/1/4   unassigned      YES unset  up                    up
    Te1/1/1                unassigned      YES unset  down                  down
    Te1/1/2                unassigned      YES unset  down                  down
    GigabitEthernet2/0/1   unassigned      YES unset  up                    up
    GigabitEthernet2/0/2   unassigned      YES unset  up                    up
    GigabitEthernet2/0/3   unassigned      YES unset  up                    up
    GigabitEthernet2/0/4   unassigned      YES unset  down                  down
    GigabitEthernet2/0/5   unassigned      YES unset  up                    up
    GigabitEthernet2/0/6   unassigned      YES unset  down                  down
    GigabitEthernet2/0/7   unassigned      YES unset  down                  down
    GigabitEthernet2/0/8   unassigned      YES unset  up                    up
    GigabitEthernet2/0/9   unassigned      YES unset  up                    up
    GigabitEthernet2/0/10  unassigned      YES unset  down                  down
    GigabitEthernet2/0/11  unassigned      YES unset  down                  down
    GigabitEthernet2/0/12  unassigned      YES unset  down                  down
    GigabitEthernet2/0/13  unassigned      YES unset  down                  down
    GigabitEthernet2/0/14  unassigned      YES unset  up                    up
    GigabitEthernet2/0/15  unassigned      YES unset  up                    up
    GigabitEthernet2/0/16  unassigned      YES unset  up                    up
    GigabitEthernet2/0/17  unassigned      YES unset  up                    up
    GigabitEthernet2/0/18  unassigned      YES unset  up                    up
    GigabitEthernet2/0/19  unassigned      YES unset  down                  down
    GigabitEthernet2/0/20  unassigned      YES unset  up                    up
    GigabitEthernet2/0/21  unassigned      YES unset  down                  down
    GigabitEthernet2/0/22  unassigned      YES unset  up                    up
    GigabitEthernet2/0/23  unassigned      YES unset  down                  down
    GigabitEthernet2/0/24  unassigned      YES unset  up                    up
    GigabitEthernet2/1/1   unassigned      YES unset  up                    up
    GigabitEthernet2/1/2   unassigned      YES unset  up                    up
    GigabitEthernet2/1/3   unassigned      YES unset  down                  down
    GigabitEthernet2/1/4   unassigned      YES unset  up                    up
    Te2/1/1                unassigned      YES unset  down                  down
    Te2/1/2                unassigned      YES unset  down                  down
    Port-channel1          unassigned      YES unset  down                  down
    Port-channel2          unassigned      YES unset  down                  down
    Please  let me know if I am doing something wrong .Please post me some tutorial to sort this.

    It is possible you are overloading that little 4215. If that is the case you should also be seeing "missed packet percentage" messages in your events.
    How much traffic is your 4215 getting? Those sensors will start to drop packets for inspection at about 30 Mb/s.
    - Bob

  • I have a Win7Pro SP1 PC locked down with a Group Policy as it is a public facing PC. PDF fillable forms cannot be completed when logged on as the restricted user. The forms work as a normal user. What are the user requirements/permissions needed to fill f

    I have a Win7Pro SP1 PC locked down with a Group Policy as it is a public facing PC. PDF fillable forms cannot be completed when logged on as the restricted user. The forms work as a normal user. What are the user requirements/permissions needed to fill forms?

    Well, try this (I was able to fix my with these steps):
    Go Utilities > Disk Utility
    Select your Startup Disk, e.g. Macintosh HD
    Then, under the First Aid Tab, click Verify Disk Permissions.
    If there are errors, then click repair Disk Permissions.
    After it is done, restart the computer and see if your problem is resolved.
    I hope this help.
    Zeke
    www.ZekeYuen.com/blog/

  • Are Macs able to lock down the firewall?

    Are Nacs able to lock down the firewall?

    I have mine locked. Do you have a problem locking yours?

  • Forward facing locked down machines... kiosk?

    Hey everyone,
    So I have done a lot of research on this topic, but have yet to find an end-all solution to my conundrum. I have many machines in my network that are forward facing and public use reference terminals that connect to a database of books and things. These
    machines are not and should not be used to casual internet browsing so we have manually locked them down. These machines currently run IE10 Win7x32. The windows side locking down is no problem. But we are having a BIG issue with the current way we allow specific
    sites and lock out all others. 
    In our system, we have an abundance of allowed sites for quick research purposes that these machines are allowed to access. Still technically reference information. For the sake of argument, we have about 25 sites including the main database site that should
    be allowed through a proxy or other filtering system. Currently, we have this proxy based with exceptions built into IE... however, there is around a 255 char limit on that input box (for whatever reason).
    So that brings me to my current solution that is not quite working correctly. I have configured a .PAC script and stored it on a server that these machines can access and an msi for IE10 branding using the IEAK for IE10. This .PAC script does not seem to
    be working the way it should. I got the idea from a site I didn't save, but the basic idea is below:
    function FindProxyForURL(url, host)
    // variable strings to return
    var proxy_yes = "PROXY 255.255.255.255:8080";
    var proxy_no = "DIRECT";
    if (shExpMatch(url, "*.google.com")) { return proxy_no; }
    // Proxy anything else with yes
    return proxy_yes;
    So, my understanding is this would run when sites are accessed, if it matches the if statements it passes and if it doesn't, it defaults to proxy_yes which doesn't exist and thus doesn't load. The ADMX configures the proxy itself and everything should be
    great. 
    My main question: is there a better way to allow sites through to a machine WITHOUT loading the pages first. A simple whitelist/blacklist doesn't necessarily work because it, as far as I understand, still loads the pages but does not display them. Currently,
    it looks like IEAK is the only way to correctly manipulate these settings in internet explorer 10+, unless I'm getting that wrong. It doesn't seem like the list from our previous installation from GP is being overridden using this method, and it doesn't
    apply to new machines connected to the policy. Of course, I know it is applying because other functions, like the content rating system that I accidentally left on, have caused some problems in the past. 
    We will be upgrading these machines to newer optiplex models and installing Windows 8, so if there is a more effective solution that only works in windows 8, I am willing to try it. 
    Thanks in advance for the help, you guys are always awesome! 

    Hi,
    >>Currently, it looks like IEAK is the only way to correctly manipulate these settings in internet explorer 10+, unless I'm getting that wrong.
    In addition to IEAK 10, to configure proxy for IE 10 on Windows 7, if our most up-to-date domain controller is Windows Server 2012 or R2, we can use Group Policy Preferences
    Internet Settings extension to configure the proxy setting. Besides, we can also choose to install Remote Server Administrative Tools on a Windows 8 or 8.1 client and manage group policy settings from this client.
    Moreover, another way is that we can try using Group Policy Preferences Registry extension to configure the proxy settings for IE10 on Windows 7.
    Regarding this point, the following thread can be referred to as reference.
    Proxy settings not applying to IE above 8
    http://social.technet.microsoft.com/Forums/en-US/3b0f54d7-7293-49dc-9e3f-e8799c20265b/proxy-settings-not-applying-to-ie-above-8?forum=winserverGP
    Best regards,
    Frank Shen

  • Locking down windows 2000

    Hi All
    I have been blessed with the task of figuring out how to lock down a
    Windows 2000 PC to run only 1 access runtime app in a kiosk type setting.
    Does anyone know a good starting point? I have very little Zen knowledge.
    Thanks in advance
    Paul

    1) Configure NAL to run as the Shell.
    http://www.novell.com/documentation/...a/a7q692x.html
    (Note: Works the same in ZFD4)
    2) Enable "Rogue Process Management" to limit the system to only NAL
    delivered apps.
    http://www.novell.com/documentation/...a/ahl34y5.html
    (Scratch That - This is a ZFD 6.5 or greater feature)
    3) Group Policy to only allow specified applications.
    http://msdn.microsoft.com/library/de...-us/gp/206.asp
    Craig Wilson - MCNE, MCSE, CCNA
    Novell Support Forums Volunteer Sysop
    Novell does not officially monitor these forums.
    Suggestions/Opinions/Statements made by me are solely my own.
    These thoughts may not be shared either Novell or any rational human.
    <[email protected]> wrote in message
    news:jyGTh.121$[email protected]..
    > Hi All
    >
    > I have been blessed with the task of figuring out how to lock down a
    > Windows 2000 PC to run only 1 access runtime app in a kiosk type setting.
    > Does anyone know a good starting point? I have very little Zen knowledge.
    >
    > Thanks in advance
    > Paul

  • How Creative Cloud working under locked down IT administration environment

    We are  existing CS6 and would like to sign for Creative Cloud. Just want to know how it works on the locked down user computers (without local administrator rights)?
    DISCLAIMER The contents of this email and any attachments (together "this email") may contain information that is confidential to Breville Group Limited (and/or its associated entities) (together"BRG"). Information contained in this email is subject to copyright. If you are not the intended recipient, you cannot print, use, rely, or disseminate any part of this email. If you receive this email in error, please notify us immediately by return e-mail and erase all copies. If you are the intended recipient of this email you should not copy, disclose, or distribute this email without the authority of BRG. Any views expressed in this email are those of the individual sender, except where the sender specifically states them to be the views of BRG. If this email contains any defamatory comments expressed by the individual sender, these comments are made outside the scope of his/her authority. BRG does not accept liability in respect of such defamatory comments. BRG does not warrant that the integrity of this email has been maintained, or that this email is free of errors or viruses, and has not been intercepted or interfered with. It is your responsibility to scan this email for computer viruses and other defects. BRG does not accept liability for any loss or damage however caused, whether by negligence or otherwise, which may result directly or indirectly from this email. In any event, BRG's liability is limited to the cost of re-supplying this email. Please consider the environment before printing this email. ***************************************************************

    The deployment is just the same like for the conventional suites and the same rules apply, so I'm not sure what you are asking.
    Mylenium

  • HELP - Macbook Pro Locked Down

    Ok, to make a long story short, I bought a used Macbook Pro and the password I was given is not working. The person I bought the computer from seemed fishy, I should have realized something was wrong before agreeing to buy the computer. The computer seems like it is a demo machine from an Apple Store or some other retail store. It is locked down and I can not gain access to the administrator account. I have tried everything I found on the internet. I called Apple up to inquire about this machine to see if it is marked/reported as being fraudlent/stolen/counterfiet and they confirmed the serial number is fine and it is an official apple computer. They said I have hardware support until end of March 2011, but no longer have software support. Oh by the way, I am new to Macs, this is my first Mac, so I'm not familiar with them. Not a very good first experience. I guess its my fault for buying a used computer without receiving the install/backup disks.
    Below is a summary of what is happening and what I tried:
    When I turn the computer on, it logs in fine. Everything seems to function fine. But if I try to do anything administratively it asks for password and I can not do anything.
    I tried the following things:
    - entering single user mode, removing the AppleSetupDone file. After I reboot from that, it just logs in as normal and doesn't prompt for new account. When I went back into single user mode, the AppleSetupDone file was back.
    - entered single user mode, changing password via command line. Seems like it changes fine with no errors. After I reboot, logs in fine and I try password I changed to and it doesn't accept it.
    - Tried putting OS 10.6.3 into DVD and booting from that by holding c key, but it ends up going to grey screen with Apple logo and does nothing.
    - Tried putting OS 10.6.3 into DVD and pressing "Option" key while booting to choose which device to boot from. I choose DVD and it goes to grey screen with Apple logo and does nothing.
    - I tried formating the hard drive, went to single user mode, did a rm -rf / Seemed like it erased the hard drive, so I figured it has to boot from DVD. Well when I turned on computer, it booted fine and logged in as normal. Went back into single user mode and everything was restored as was.
    - Tried clearing the PRAM and NVRAM thinking maybe there was something in the non-volatile memory, but that did nothing. Logged in as normal and still would not allow me to boot from DVD.
    Someone suggested the firmware was password protected, but I had read if you hold the option key down while booting that a lock would appear if the firmware was password protected and that didn't happen, I got the HD or DVD options to boot.
    Seems like the computer is locked down somehow to restrict anyone from modifying anything and at bootup, it restores everything to original state. Does anyone have any ideas or suggestions? Does anyone know how Apple stores lock down their demo computers to avoid customers from modifying them? Is there something in the hardware? Are there jumpers set somewhere that could be causing the machine to do a unique protected/recovery bootup? Someone mentioned pulling the hard drive and formatting it in another computer. Do you think this would do it for me?
    Thank you for the help,
    Kevin

    Proof? I bought it used from someone. All I have is the computer and charger. When I talked to the Apple representative on the phone about the serial number, he said the machine has not been registered yet. So what would the proof be?

  • I am using a Photoshop cs2, and I wonder if it is possible to keep the settings of the guidelines when closing an image, with the actual document ? It would be nice to have the guidelines locked down, I find it than when opening the same or another image,

    I am using a Photoshop cs2, and I wonder if it is possible to keep the settings of the guidelines when closing an image, with the actual document ? It would be nice to have the guidelines locked down, I find it than when opening the same or another image, the guidelines are not locked, it is annoying to have to lock them down again. and it would actually be nice, to ba able to give specific directions when placing the guidelines. Thanks

    Then why are the guides unlocked when I reopen a document that I saved with the guides locked ?
    Thanks.

  • Lock down X140e BIOS

    Hello!
    I'm deploying 55 of the Thinkpad x140e to a school, and I want to be able to lock down the BIOS so the students won't be able to boot from other devices or make any other changes in the BIOS. I'm wondering if anyone knows of an application that allows me to lock down the BIOS without having to do it manually on every machine. I'm imaging them with the same image, so if there's an application that can be put on the image beforehand, that would be ideal. Anyone run into a similar situation or know of any solutions?
    Thanks in advance for any help you can provide!
    Solved!
    Go to Solution.

    Lenovo has some scripts (and accompanying documentation) for configuring the BIOS through WMI available here:
    http://support.lenovo.com/us/en/documents/ht100612
    The X140e isn't listed as a supported model, but it might be worth a try anyhow.
    How are you deploying the image? If you're using something like MDT or SCCM you would create a task that runs the script as part of the imaging process.

  • How do I lock down an iPad from having certain apps removed?

    Hello,
    We are a Microsoft-based enterprise that has purchased iPad 2 devices as a means of reducing costs of wireless services as well as integration with the 3G adapter (to reduce damage and theft). While I have had great success with the iPhone Configuration Utility and an MDM server, I need to ensure that users cannot remove the Find My iPad App which we use to track employees and ensure they do not lose or steal the device (since they can't remove the battery).
    What can I do to lock down this app from being removed and also, I want to give these employees access to load whatever they wish on these iPad units. We control their access through a VPN to a Microsoft Terminal Server and with Microsoft Exchange but I don't want iTunes and the CEO's credit card being used to purchase apps. Any ideas anyone? I know that this can be done and if not, it will be done by me.
    Brian Tate
    Information Technology Manager
    Grand Texas Homes Inc
    http://www.grandhomes.com

    I'm not sure about the apps, but to prevent theft, you'll also need to disable the power button and the ability to restore the ipad. You might also want to superglue in your Sim card because if they remove that, it wont be tracked unless they connect to WiFi.
    Also, I'm not so sure it is an app on the iPad. I think it is built into the mail, calendar and contacts options if you have a Mobile me account.  http://www.apple.com/ipad/find-my-ipad-setup/

  • How can I create a navigation bar in the template so I can change the down state of a button on a page made from the template in DW3?

    We're creating pages from a template in DW3. The template includes a header, footer and a navigation bar. We've made the navigation bar an editable region so that we can change the down state of the buttons on pages where it is required. However, when we make a new page from the template and try to change the behaviors of the buttons in the navigation bar it will not allow us to make those changes. 

    Have you considered using CSS styled text/list menus instead of image rollovers.  It isn't hard really and it's actually a much better choice for   web accessibility and for search engines to find and follow your links.   Here are some links to several CSS menu systems you can try:
    CSS Express Drop-Down Menus (tutorial)
    http://www.projectseven.com/tutorials/navigation/auto_hide/
    CSS Tab Designer creates 60+ CSS Styled Button and Tab Menus  (download)
    http://www.highdots.com/css-tab-designer/
    List-O-Rama  (DW Extension)
    http://www.dmxzone.com/go?5618
    CSS  Menu Maker (On-Line Menu Generator)
    http://www.cssmenumaker.com/
    Pop-Menu  Magic2 by PVII (DW extension purchase)
    http://www.projectseven.com/products/menusystems/pmm2/index.htm
    Nancy O.
    Alt-Web Design & Publishing
    Web | Graphics | Print | Media  Specialists
    www.alt-web.com/
    www.twitter.com/altweb
    www.alt-web.blogspot.com

  • Would like to know how to Completely Lock-down Windows 7 OS

    I don't have a general question..
    It's more like specifics about how to lock down windows 7 computers..
    Here's a little background information...
    I have two computers, both with win 7(Pro, and home prem).
    A family member can somehow bypass all bios and all windows security services... Everytime I go to work or school, he will power on my desktop and somehow 'hack' into the OS and install keyloggers or viruses so he can obtain my banking or other personal information.
    He also unlocks and deletes all the passwords so he can have access whenever he wants..
    Can someone please tell me how to do a complete lockdown? This is getting extremely annoying.. I've done everything that I can do; Also considering on switching my major to some sort of computer security. I'm starting to lose my mind over these months.. All
    help is appreciated.
    I've password protected BIOS
    I've disabled administrator accounts, i've put password on the admin and the guest user; locked the option to change passwords..
    All help is appreciated. Thank you all in advance.

    Hi,
    If you are using Windows 7 Professional, Ultimate, or Enterprise, you can use the Local Group Policy Editor to change policies that affect the security of your computer. Please check if the following policies meet you requirements.
    [User Configuration\Administrative Templates\Windows Components\Windows Explorer]
    Enable these two polices:
    Prevent access to drives from My Computer
    Hide these specified drives in My Computer
    For your reference:
    Lock Down PCs with Windows 7:
    http://technet.microsoft.com/en-us/windows/gg983426.aspx
    Also, restrict Which Programs a User Can Run. You can set rules in AppLocker in the Group Policy Editor that prevents all programs from being run.
    In addition, temporarily Lock Your Computer if Someone Tries to Guess Your Password
    If you share your computer with other family members or allow your friends to use it, you should have a password on your Windows account so no one else can log into it. However, someone may try to guess your password and log into your account. If this happens,
    you can temporarily lock your computer.
    You should also periodically change your password.
    If you suspect, you family member using a tool to bypass your password. You may use Malicious Software Removal Tool (http://www.microsoft.com/security/pc-security/malware-removal.aspx)
    to remove it.
    Hope it helps.
    Regards,
    Blair Deng
    Blair Deng
    TechNet Community Support

Maybe you are looking for

  • List view GroupBy pagination does not work for the second group?

    Hi, I have defined view for list with grouping by 2 fields. I noticed the paging works only for the first grouping, for the second field there are always all items on the page. How could I configure it to provide paging also for the second level of g

  • HTML attachment in a mail

    Hello all, I'd like to know if it's possible to attach an HTML document to an external mail (or even a work item) in a workflow. I have a custom container multiline element (type W3CREATPAT-CONTENT) that contains a table of strings (the html file) an

  • CRM Business Partner Master Data Extraction

    Hello Friends, I would like to extract the complete Business Partner (BP) information in CRM onto application server in csv format. Could you pls let me know if there are any standard programs or Function Modules which helps me to extract complete da

  • Regards the issue on the db13 error is like SXPG_COMMAND_EXECUTE failed

    dear all, we are using os: windows 2003 databse :oracle  10.2.0.4 sap version: ecc 6.0 & on the production system is on the cluster environment the issue is when ever i am firing any thing from the db13 it is throwing an error like SXPG_COMMAND_EXECU

  • Multiple Properties for Sprites

    Hey all, I don't think the title does my question justice. What I want to do is make a pull down menu of properties in my behavior, but have it be dependent on another selection right above it in the inspector. For instance, lets say I have a list of