Could you maybe elaborate on what exactly has failed and what you are trying to accomplish?
If the RAID subsystem has already failed (multiple drive failures without successful rebuild), your data is likely unrecoverable without some serious recovery forensics from a 3rd party firm.
The 'Recovery Images' for 6.X have two different options:
1) 'repair' - This is the least disruptive option. What it appears to do is basically reinstall/reimage the root '/' filesystem on the server *without* manipulating any media repositories in any way (/media1, /media2, etc...). It doesn't even touch those logical disks. If the defined RAID array is already compromised, this isn't going to help you.
2) 'factory' - This is going to literally re-create the RAID arrays from scratch using the healthy disks it can detect. ALL PREVIOUS SYSTEM DATA WILL BE DESTROYED. It will then image the server with a complete fresh software install for re-deployment.
If you are attempting to perform a 'factory' recovery using the DVD, and the array is failing during the re-image process... you likely have a very sick disk member that needs to be replaced. If the chassis is covered by a SmartNet contract, you should be able to open a TAC case and get the drive member replaced via RMA.
I hope this helps!
Bulletproof Solutions Inc.
For all versions of the Email Security Appliance (ESA) and Security Management Appliance (SMA), some Secure Sockets Link (SSL) certificates issued from the QuoVadis root certificate authority (CA) trust chain before 2021-03-31 cannot b...
Automation and programmability for networking and security are increasingly important topics. Every release since ISE 1.2 has included new REST API capabilities to better automate and integrate ISE with the rest of your network, appli...
The latest iteration (v2.3.4) of the Cisco Secure Firewall Migration Tool adds public beta support for S2S VPN migrations from ASA:
Policy-based (crypto map) Pre-Shared key authentication type VPN configuration to Firepower Management Center
Cisco Defense Orchestrator (CDO) is a cloud-based, multi-device manager that manages security products like Adaptive Security Appliance (ASA), Firepower Threat Defense next-generation firewall, and Meraki devices, to name a few.
We make improvement...
This document presents the ISE data limiting best practices that can dramatically improve the system performance on ISE.
Your deployment may be impacted if the alarms tab on ISE shows High load average, high CPU or high memoy usage alarm...