Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

First Published: March 04, 2013

Americas Headquarters

Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706

USA http://www.cisco.com Tel: 408 526-4000

800 553-NETS (6387) Fax: 408 527-0883

Text Part Number: OL-28893-01

THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,

INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,

EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.

THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH

THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,

CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.

The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright ?? 1981, Regents of the University of California.

NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED ???AS IS" WITH ALL FAULTS.

CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF

MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.

IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT

LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS

HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: http:// www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)

Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.

?? 2009-2013 Cisco Systems, Inc. All rights reserved.

C O N T E N T S

Contents

C H A P T E R 4

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Contents

C H A P T E R 5

C H A P T E R 6

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Contents

Contents

Contents

C H A P T E R 1 0

C H A P T E R 1 1

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Contents

C H A P T E R 1 2

C H A P T E R 1 3

C H A P T E R 1 4

C H A P T E R 1 5

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Contents

A P P E N D I X A

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Preface

This preface includes the following sections:

???Audience, page xi

???Conventions, page xi

Audience

This guide is intended primarily for data center administrators with responsibilities and expertise in one or more of the following:

???Server administration

???Storage administration

???Network administration

???Network security

Conventions

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Preface

Conventions

Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the document.

Tip Means the following information will help you solve a problem. The tips information might not be troubleshooting or even an action, but could be useful information, similar to a Timesaver.

Caution Means reader be careful. In this situation, you might perform an action that could result in equipment damage or loss of data.

Timesaver Means the described action saves time. You can save time by performing the action described in the paragraph.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Preface

New and Changed Information for this Release

Warning IMPORTANT SAFETY INSTRUCTIONS

This warning symbol means danger. You are in a situation that could cause bodily injury. Before you work on any equipment, be aware of the hazards involved with electrical circuitry and be familiar with standard practices for preventing accidents. Use the statement number provided at the end of each warning to locate its translation in the translated safety warnings that accompanied this device.

SAVE THESE INSTRUCTIONS

New and Changed Information for this Release

The following tables provide an overview of the significant changes to this guide for the current release. The tables do not provide an exhaustive list of all changes made to the configuration guides or of the new features in this release.

For a complete list of all C-Series documentation, see the Cisco UCS C-Series Servers Documentation Roadmap available at the following URL: http://www.cisco.com/go/unifiedcomputing/c-series-doc .

New Features and Significant Behavioral Changes in Cisco Integrated Management Controller software, Release 1.4(6)

Release Notes for Cisco UCS C-Series Software, Release 1.4(6)

New Features and Significant Behavioral Changes in Cisco Integrated Management Controller software, Release 1.4(5)

Release Notes for Cisco UCS C-Series Software, Release 1.4(5)

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Preface

New and Changed Information for this Release

New Features and Significant Behavioral Changes in Cisco Integrated Management Controller software, Release 1.4(4)

Release Notes for Cisco UCS C-Series Software, Release 1.4(4)

New Features and Significant Behavioral Changes in Cisco Integrated Management Controller software, Release 1.4(3)

Release Notes for Cisco UCS C-Series Software, Release 1.4(3)

New Features and Significant Behavioral Changes in Cisco Integrated Management Controller software, Release 1.4(2)

Release Notes for Cisco UCS C-Series Software, Release 1.4(2)

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Preface

Related Cisco UCS Documentation

New Features and Significant Behavioral Changes in Cisco Integrated Management Controller software, Release 1.4(1)

Release Notes for Cisco UCS C-Series Software, Release 1.4(1)

Related Cisco UCS Documentation

Documentation Roadmaps

For a complete list of all B-Series documentation, see the Cisco UCS B-Series Servers Documentation Roadmap available at the following URL: http://www.cisco.com/go/unifiedcomputing/b-series-doc.

For a complete list of all C-Series documentation, see the Cisco UCS C-Series Servers Documentation Roadmap available at the following URL: http://www.cisco.com/go/unifiedcomputing/c-series-doc .

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Preface

Related Cisco UCS Documentation

Other Documentation Resources

An ISO file containing all B and C-Series documents is available at the following URL: http://www.cisco.com/ cisco/software/type.html?mdfid=283853163&flowid=25821. From this page, click Unified Computing

System (UCS) Documentation Roadmap Bundle.

The ISO file is updated after every major documentation release.

Follow Cisco UCS Docs on Twitter to receive document update notifications.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

C H A P T E R 1

Overview

This chapter includes the following sections:

Overview of the Cisco UCS C-Series Rack-Mount Servers

The Cisco UCS C-Series rack-mount servers include the following models:

???Cisco UCS C200 Rack-Mount Server

???Cisco UCS C210 Rack-Mount Server

???Cisco UCS C220 Rack-Mount Server

???Cisco UCS C240 Rack-Mount Server

???Cisco UCS C250 Rack-Mount Server

???Cisco UCS C260 Rack-Mount Server

???Cisco UCS C460 Rack-Mount Server

Note To determine which Cisco UCS C-Series rack-mount servers are supported by this firmware release, see the associated Release Notes. The C-Series release notes are available at the following URL: http:// www.cisco.com/en/US/products/ps10739/prod_release_notes_list.html

Overview of the Server Software

The Cisco UCS C-Series Rack-Mount Server ships with two major software systems installed.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Overview

Cisco Integrated Management Controller

CIMC Firmware

CIMC is a separate management module built into the motherboard. A dedicated ARM-based processor, separate from the main server CPU, runs the CIMC firmware. The system ships with a running version of the CIMC firmware. You can update the CIMC firmware, but no initial installation is needed.

Server OS

The main server CPU runs an OS such as Windows or Linux. The server ships with a pre-installed OS, but you can install a different OS using the DVD drive or over the network. You can use CIMC to install the new OS using the KVM console and vMedia.

Note You can access the available OS installation documentation from the Cisco UCS C-Series Servers Documentation Roadmap at http://www.cisco.com/go/unifiedcomputing/c-series-doc.

Cisco Integrated Management Controller

The CIMC is the management service for the C-Series servers. CIMC runs within the server.

Note The CIMC management service is used only when the server is operating in Standalone Mode. If your C-Series server is integrated into a UCS system, you must manage it using UCS Manager. For information about using UCS Manager, see the configuration guides listed in the Cisco UCS B-Series Servers Documentation Roadmap at http://www.cisco.com/go/unifiedcomputing/b-series-doc.

Management Interfaces

You can use a web-based GUI or SSH-based CLI to access, configure, administer, and monitor the server. Almost all tasks can be performed in either interface, and the results of tasks performed in one interface are displayed in another. However, you cannot do the following:

???Use CIMC GUI to invoke CIMC CLI

???View a command that has been invoked through CIMC CLI in CIMC GUI

???Generate CIMC CLI output from CIMC GUI

Tasks You Can Perform in CIMC

You can use CIMC to perform the following server management tasks:

???Power on, power off, power cycle, reset and shut down the server

???Toggle the locator LED

???Configure the server boot order

???View server properties and sensors

???Manage remote presence

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Overview

CIMC CLI

???Create and manage local user accounts, and enable remote user authentication through Active Directory

???Configure network-related settings, including NIC properties, IPv4, VLANs, and network security

???Configure communication services, including HTTP, SSH, and IPMI Over LAN

???Manage certificates

???Configure platform event filters

???Update CIMC firmware

???Monitor faults, alarms, and server status

No Operating System or Application Provisioning or Management

CIMC provisions servers, and as a result, exists below the operating system on a server. Therefore, you cannot use it to provision or manage operating systems or applications on servers. For example, you cannot do the following:

???Deploy an OS, such as Windows or Linux

???Deploy patches for software, such as an OS or an application

???Install base software components, such as anti-virus software, monitoring agents, or backup clients

???Install software applications, such as databases, application server software, or web servers

???Perform operator actions, including restarting an Oracle database, restarting printer queues, or handling non-CIMC user accounts

???Configure or manage external storage on the SAN or NAS storage

CIMC CLI

The CIMC CLI is a command-line management interface for Cisco UCS C-Series servers. You can launch the CIMC CLI and manage the server over the network by SSH or Telnet. By default, Telnet access is disabled.

A user of the CLI will be one of three roles: admin, user (can control, cannot configure), and read-only.

Note To recover from a lost admin password, see the Cisco UCS C-Series server installation and service guide for your platform.

Command Modes

The CLI is organized into a hierarchy of command modes, with the EXEC mode being the highest-level mode of the hierarchy. Higher-level modes branch into lower-level modes. You use the scope command to move from higher-level modes to modes in the next lower level , and the exit command to move up one level in the mode hierarchy. The top command returns to the EXEC mode.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Overview

Command Modes

Note Most command modes are associated with managed objects. The scope command does not create managed objects and can only access modes for which managed objects already exist.

Each mode contains a set of commands that can be entered in that mode. Most of the commands available in each mode pertain to the associated managed object. Depending on your assigned role, you may have access to only a subset of the commands available in a mode; commands to which you do not have access are hidden.

The CLI prompt for each mode shows the full path down the mode hierarchy to the current mode. This helps you to determine where you are in the command mode hierarchy and can be an invaluable tool when you need to navigate through the hierarchy.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Overview

Command Modes

Command Mode Table

The following table lists the first four levels of command modes, the commands used to access each mode, and the CLI prompt associated with each mode.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Overview

Command Modes

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Overview

Command Modes

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Overview

Complete a Command

Complete a Command

You can use the Tab key in any mode to complete a command. Partially typing a command name and pressing Tab causes the command to be displayed in full or to the point where another keyword must be chosen or an argument value must be entered.

Command History

The CLI stores all commands used in the current session. You can step through the previously used commands by using the Up Arrow or Down Arrow keys. The Up Arrow key steps to the previous command in the history, and the Down Arrow key steps to the next command in the history. If you get to the end of the history, pressing the Down Arrow key does nothing.

All commands in the history can be entered again by simply stepping through the history to recall the desired command and pressing Enter. The command is entered as if you had manually typed it. You can also recall a command and change it before you press Enter.

Committing, Discarding, and Viewing Pending Commands

When you enter a configuration command in the CLI, the command is not applied until you enter the commit command. Until committed, a configuration command is pending and can be discarded by entering a discard command. When any command is pending, an asterisk (*) appears before the command prompt. The asterisk disappears when you enter the commit command, as shown in this example:

Server# scope chassis

Server /chassis # set locator-led off

Server /chassis *# commit

Server /chassis #

You can accumulate pending changes in multiple command modes and apply them together with a single commit command. You can view the pending commands by entering the show configuration pending command in any command mode.

Note Committing multiple commands together is not an atomic operation. If any command fails, the successful commands are applied despite the failure. Failed commands are reported in an error message.

Command Output Formats

Most CLI show commands accept an optional detail keyword that causes the output information to be displayed as a list rather than a table. You can configure either of two presentation formats for displaying the output information when the detail keyword is used. The format choices are as follows:

??? Default???For easy viewing, the command output is presented in a compact list.

This example shows command output in the default format:

Server /chassis # set cli output default

Server /chassis # show hdd detail

Name HDD_01_STATUS:

Status : present

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Overview

Online Help for the CLI

Name HDD_02_STATUS:

Status : present

Name HDD_03_STATUS:

Status : present

Name HDD_04_STATUS:

Status : present

Server /chassis #

???YAML???For easy parsing by scripts, the command output is presented in the YAML (YAML Ain't Markup Language) data serialization language, delimited by defined character strings.

This example shows command output in the YAML format:

Server /chassis # set cli output yaml

Server /chassis # show hdd detail

---

name: HDD_01_STATUS

hdd-status: present

---

name: HDD_02_STATUS

hdd-status: present

---

name: HDD_03_STATUS

hdd-status: present

---

name: HDD_04_STATUS

hdd-status: present

...

Server /chassis #

For detailed information about YAML, see http://www.yaml.org/about.html.

In most CLI command modes, you can enter set cli output default to configure the default format, or set cli output yaml to configure the YAML format.

Online Help for the CLI

At any time, you can type the ? character to display the options available at the current state of the command syntax.

If you have not typed anything at the prompt, typing ? lists all available commands for the mode you are in. If you have partially typed a command, typing ? lists all available keywords and arguments available at your current position in the command syntax.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Overview

Online Help for the CLI

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

C H A P T E R 2

Installing the Server OS

This chapter includes the following sections:

??? OS Installation Methods, page 11

??? KVM Console, page 11

??? PXE Installation Servers, page 12

OS Installation Methods

C-Series servers support several operating systems. Regardless of the OS being installed, you can install it on your server using one of the following tools:

???KVM console

???PXE installation server

KVM Console

The KVM console is an interface accessible from CIMC that emulates a direct keyboard, video, and mouse (KVM) connection to the server. The KVM console allows you to connect to the server from a remote location.

Instead of using CD/DVD or floppy drives physically connected to the server, the KVM console uses virtual media, which are actual disk drives or disk image files that are mapped to virtual CD/DVD or floppy drives. You can map any of the following to a virtual drive:

???CD/DVD or floppy drive on your computer

???Disk image files (ISO or IMG files) on your computer

???USB flash drive on your computer

???CD/DVD or floppy drive on the network

???Disk image files (ISO or IMG files) on the network

???USB flash drive on the network

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Installing the Server OS

PXE Installation Servers

You can use the KVM console to install an OS on the server.

PXE Installation Servers

A Preboot Execution Environment (PXE) installation server allows a client to boot and install an OS from a remote location. To use this method, a PXE environment must be configured and available on your VLAN, typically a dedicated provisioning VLAN. Additionally, the server must be set to boot from the network.

When the server boots, it sends a PXE request across the network. The PXE installation server acknowledges the request, and starts a sequence of events that installs the OS on the server.

PXE servers can use installation disks, disk images, or scripts to install an OS. Proprietary disk images can also be used to install an OS, additional components, or applications.

Note PXE installation is an efficient method for installing an OS on a large number of servers. However, considering that this method requires setting up a PXE environment, it might be easier to use another installation method.

Installing an OS Using a PXE Installation Server

Before You Begin

???Verify that the server can be reached over a VLAN.

???You must log in as a user with admin privileges to install an OS.

Procedure

Step 1 Set the boot order to PXE first.

Step 2 Reboot the server.

If a PXE install server is available on the VLAN, the installation process begins when the server reboots. PXE installations are typically automated and require no additional user input. Refer to the installation guide for the OS being installed to guide you through the rest of the installation process.

What to Do Next

After the OS installation is complete, reset the LAN boot order to its original setting.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

C H A P T E R 3

Managing the Server

This chapter includes the following sections:

Toggling the Locator LED

Before You Begin

You must log in with user or admin privileges to perform this task.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing the Server

Toggling the Locator LED for a Hard Drive

This example disables the chassis locator LED and commits the transaction:

Server# scope chassis

Server /chassis # set locator-led off

Server /chassis *# commit

Server /chassis #

Toggling the Locator LED for a Hard Drive

Before You Begin

You must log in with user or admin privileges to perform this task.

Procedure

This example turns on the locator LED on HDD 2:

Server /chassis/hdd #

Managing the Server Boot Order

Server Boot Order

Using CIMC, you can configure the order in which the server attempts to boot from available boot device types.

When you change the boot order configuration, CIMC sends the configured boot order to the BIOS the next time the server is rebooted. To implement the new boot order, reboot the server after making the configuration change. The new boot order will take effect on any subsequent reboot. The configured boot order is not sent again until the configuration is changed again.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing the Server

Configuring the Server Boot Order

Note The actual boot order will differ from the configured boot order if either of the following conditions occur:

???The BIOS encounters issues while trying to boot using the configured boot order.

???A user changes the boot order directly through the BIOS.

Configuring the Server Boot Order

Note Do not change the boot order while the host is performing BIOS power-on self test (POST).

Before You Begin

You must log in with user or admin privileges to perform this task.

Procedure

The new boot order will be used on the next BIOS boot.

This example sets the boot order and commits the transaction:

Server# scope bios

Server /bios # set boot-order hdd,cdrom,fdd,pxe,efi

Server /bios *# commit

Server /bios # show detail

BIOS:

Boot Order: HDD,CDROM,FDD,PXE,EFI

Server /bios #

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing the Server

Viewing the Actual Server Boot Order

What to Do Next

Reboot the server to boot with your new boot order.

Viewing the Actual Server Boot Order

The actual server boot order is the boot order actually used by the BIOS when the server last booted. The actual boot order can differ from the boot order configured in CIMC.

Procedure

This example displays the actual boot order from the last boot:

Resetting the Server

Important If any firmware or BIOS updates are in progress, do not reset the server until those tasks are complete.

Before You Begin

You must log in with user or admin privileges to perform this task.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing the Server

Shutting Down the Server

Procedure

This example resets the server:

Server# scope chassis

Server /chassis # power hard-reset

This operation will change the server's power state.

Continue?[y|N]

Shutting Down the Server

Important If any firmware or BIOS updates are in progress, do not shut down the server until those tasks are complete.

Before You Begin

You must log in with user or admin privileges to perform this task.

Procedure

The following example shuts down the server:

Server# scope chassis

Server /chassis # power shutdown

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing the Server

Managing Server Power

Managing Server Power

Powering On the Server

Note If the server was powered off other than through the CIMC, the server will not become active immediately when powered on. In this case, the server will enter standby mode until the CIMC completes initialization.

Important If any firmware or BIOS updates are in progress, do not change the server power until those tasks are complete.

Before You Begin

You must log in with user or admin privileges to perform this task.

Procedure

This example turns on the server:

Server# scope chassis

Server /chassis # power on

Powering Off the Server

Important If any firmware or BIOS updates are in progress, do not power off the server until those tasks are complete.

Before You Begin

You must log in with user or admin privileges to perform this task.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing the Server

Power Cycling the Server

Procedure

Power Cycling the Server

Important If any firmware or BIOS updates are in progress, do not power cycle the server until those tasks are complete.

Before You Begin

You must log in with user or admin privileges to perform this task.

Procedure

This example power cycles the server:

Server# scope chassis

Server /chassis # power cycle

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing the Server

Configuring Power Policies

Configuring Power Policies

Viewing the Power Statistics

Procedure

The displayed fields are described in the following table:

Additional fields are described in the following table:

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing the Server

Power Capping Policy

This example displays the detailed power statistics:

Server# show power-cap detail

Cur Consumption (W): 247

Max Consumption (W): 286

Min Consumption (W): 229

Minimum Configurable Limit (W): 285

Maximum Configurable Limit (W): 1250

Power Cap Enabled: yes

Peak Power: 0

Non Compliance Action: throttle

Server#

Power Capping Policy

The power capping policy determines how server power consumption is actively managed. When power capping is enabled, the system monitors how much power is allocated to the server and attempts to keep the power consumption below the allocated power. If the server exceeds its maximum allotment, the power capping policy triggers the specified non-compliance action.

Configuring the Power Cap Policy

Note This feature is not available on some servers.

Before You Begin

You must log in with admin privileges to perform this task.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing the Server

Configuring the Power Cap Policy

Procedure

This example enables and configures a power cap policy and commits the transaction:

Server# scope power-cap

Server /power-cap # set enabled yes

Server /power-cap *# set peak-power 1000

Server /power-cap *# set non-compliance-action throttle

Server /power-cap *# commit

Server /power-cap # show detail

Cur Consumption (W): 688

Max Consumption (W): 1620

Min Consumption (W): 48

Minimum Configurable Limit (W): 500

Maximum Configurable Limit (W): 2000

Power Cap Enabled: yes

Peak Power: 1000

Non Compliance Action: throttle

Server /power-cap #

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing the Server

Configuring the Power Restore Policy

Configuring the Power Restore Policy

The power restore policy determines how power is restored to the server after a chassis power loss.

Before You Begin

You must log in with admin privileges to perform this task.

Procedure

This example sets the power restore policy to power-on with a fixed delay of 180 seconds (3 minutes) and commits the transaction:

Server# scope chassis

Server /chassis # set policy power-on

Server /chassis *# set delay fixed

Server /chassis *# set delay-value 180

Server /chassis *# commit

Server /chassis # show detail

Chassis:

Power: on

Serial Number: QCI1404A1IT

Product Name: UCS C200 M1

PID : R200-1120402

UUID: 01A6E738-D8FE-DE11-76AE-8843E138AE04

Locator LED: off

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing the Server

Managing the Flexible Flash Controller

Description: Testing power restore

Power Restore Policy: power-on

Power Delay Type: fixed

Power Delay Value(sec): 180

Server /chassis #

Managing the Flexible Flash Controller

Cisco Flexible Flash

Some C-Series Rack-Mount Servers support an internal Secure Digital (SD) memory card for storage of server software tools and utilities. The SD card is hosted by the Cisco Flexible Flash storage adapter.

The SD storage is available to CIMC as four virtual USB drives. Three are preloaded with Cisco software and the fourth can hold a user-installed hypervisor or other content. The four virtual drives are as follows:

???Cisco UCS Server Configuration Utility (bootable)

???User-installed (may be bootable)

???Cisco drivers (not bootable)

???Cisco Host Upgrade Utility (bootable)

For information about the Cisco software utilities and packages, see the Cisco UCS C-Series Servers Documentation Roadmap at this URL:

http://www.cisco.com/go/unifiedcomputing/c-series-doc

Dual Card Management in the Cisco Flexible Flash Controller

The Cisco Flexible Flash controller supports management of two SD cards as a RAID-1 pair. With the introduction of dual card management, you can perform the following tasks:

RAID Partition Enumeration

Non-RAID partitions are always enumerated from the primary card and the enumeration does not depend on the status of the primary card.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing the Server

Configuring the Flexible Flash Controller Properties

Following is the behavior of the RAID partition enumeration when there are two cards in the Cisco Flexible Flash controller:

Configuring the Flexible Flash Controller Properties

Before You Begin

???You must log in with admin privileges to perform this task.

???Cisco Flexible Flash must be supported by your platform.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing the Server

Configuring the Flexible Flash Controller Properties

This example shows how to configure the properties of the Flash controller:

Server# scope chassis

Server /chassis # scope flexflash FlexFlash-0

Server /chassis/flexflash # scope operational-profile

Server /chassis/flexflash/operational-profile # set read-error-count-threshold 100

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing the Server

Booting from the Flexible Flash

Server /chassis/flexflash/operational-profile # set write-error-count-threshold 100 Server /chassis/flexflash/operational-profile *# set raid-primary-member slot1 Server /chassis/flexflash/operational-profile # set raid-secondary-role active Server /chassis/flexflash/operational-profile *# set virtual-drives-enabled "SCU HUU" Server /chassis/flexflash/operational-profile *# commit

Server /chassis/flexflash/operational-profile #

Booting from the Flexible Flash

You can specify a bootable virtual drive on the Cisco Flexible Flash card that will override the default boot priority the next time the server is restarted, regardless of the default boot order defined for the server. The specified boot device is used only once. After the server has rebooted, this setting is ignored.

Note Before you reboot the server, ensure that the virtual drive you select is enabled on the Cisco Flexible Flash card.

Before You Begin

???You must log in with admin privileges to perform this task.

???Cisco Flexible Flash must be supported by your platform.

Procedure

This example specifies that the server boots from the Cisco UCS Server Configuration Utility the next time it is restarted:

Server# scope bios

Server /bios # set boot-override SCU

Committing the boot override BIOS will try boot to the specified boot device first. Failure to detect the boot device BIOS will boot from the list configured in the BIOS boot order.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing the Server

Resetting the Flexible Flash Controller

Server /bios *# commit

Server /bios #

Resetting the Flexible Flash Controller

In normal operation, it should not be necessary to reset the Cisco Flexible Flash. We recommend that you perform this procedure only when explicitly directed to do so by a technical support representative.

Note This operation will disrupt traffic to the virtual drives on the Cisco Flexible Flash controller.

Before You Begin

???You must log in with admin privileges to perform this task.

???Cisco Flexible Flash must be supported by your platform.

Procedure

This example resets the flash controller:

Server# scope chassis

Server /chassis # scope flexflash FlexFlash-0

Server /chassis/flexflash # reset

This operation will reset Cisco Flexible Flash controller.

Host traffic to VDs on this device will be disrupted.

Continue?[y|N] y

Server /chassis/flexflash #

Resetting the Configuration of the Cards in the Cisco Flexible Flash Controller

You can reset the configuration of a selected slot in the Cisco Flexible Flash controller to the default configuration.

When you reset the configuration of the slots in the Cisco Flexible Flash card, the following situations occur:

???The card in the selected slot is marked as primary healthy.

???The card in the other slot is marked as secondary-active unhealthy.

???Three non-RAID partitions and one RAID partition are created.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing the Server

Retaining the Configuration of the Flexible Flash Controller

???The card read/write error counts and read/write threshold are set to 0.

???Host connectivity could be disrupted.

Before You Begin

???You must log in with admin privileges to perform this task.

???Cisco Flexible Flash must be supported on your server.

Procedure

This example shows how to reset the configuration from a slot to the default configuration:

Server# scope chassis

Server /chassis # scope flexflash FlexFlash-0

Server /chassis/flexflash # reset-config slot1

This action will mark the slot1 as the healthy primary slot, and slot2 (if card exists) as unhealthy secondary active.

This operation may disturb the host connectivity as well. Continue? [y|N] y

Server /chassis/flexflash/operational-profile *# commit

Server /chassis/flexflash/operational-profile #

Retaining the Configuration of the Flexible Flash Controller

You can copy the configuration of a given slot in the Cisco Flexible Flash card to the other slot. However, the slot from which the configuration is copied from must be of the SDK523 type. You can retain the configuration in the following situations:

???There are two unpaired SD cards

???The server is operating from a single SD card, and an unpaired SD card is in the other slot.

???One SD card supports firmware version 1.2.253, and the other SD card is either unpartitioned or supports firmware version 1.2.247.

Before You Begin

??? You must log in with admin privileges to perform this task.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing the Server

Configuring BIOS Settings

??? Cisco Flexible Flash must be supported on your server.

Procedure

This example shows how to copy the configuration from one slot to the other:

Server# scope chassis

Server /chassis # scope flexflash FlexFlash-0

Server /chassis/flexflash # retain-config slot1

This action will copy the config of slot1 to both the slots, mark slot1 as healthy, primary slot and slot2 (card must be present) as unhealthy secondary active.

This operation may disturb the host connectivity as well. Continue? [y|N] y

Server /chassis/flexflash/operational-profile *# commit

Server /chassis/flexflash/operational-profile #

Configuring BIOS Settings

Viewing BIOS Status

Procedure

The BIOS status information contains the following fields:

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing the Server

Configuring Main BIOS Settings

This example displays the BIOS status:

Server# scope bios

Server /bios # show detail

BIOS Version: "C460M1.1.2.2a.0 (Build Date: 01/12/2011)"

Boot Order: EFI,CDROM,HDD

Boot Override Priority:

FW Update/Recovery Status: NONE

FW Update/Recovery Progress: 100

Server /bios #

Configuring Main BIOS Settings

Before You Begin

You must log in with admin privileges to perform this task.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing the Server

Configuring Advanced BIOS Settings

Changes are applied on the next server reboot. If server power is on, you are prompted to choose whether to reboot now.

This example configures the BIOS to pause the boot upon a critical POST error and commits the transaction:

Server# scope bios

Server /bios # scope main

Server /bios/main # set POSTErrorPause Enabled

Server /bios/main *# commit

Changes to BIOS set-up parameters will require a reboot.

Do you want to reboot the system?[y|N] n

Changes will be applied on next reboot.

Server /bios/main #

Configuring Advanced BIOS Settings

Note Depending on your installed hardware, some configuration options described in this topic may not appear.

Before You Begin

You must log in with admin privileges to perform this task.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing the Server

Configuring Server Management BIOS Settings

This example enables low voltage DDR memory mode and commits the transaction:

Server# scope bios

Server /bios # scope advanced

Server /bios/advanced # set LvDDRMode Enabled

Server /bios/advanced *# commit

Changes to BIOS set-up parameters will require a reboot.

Do you want to reboot the system?[y|N] n

Changes will be applied on next reboot.

Server /bios/advanced #

Configuring Server Management BIOS Settings

Before You Begin

You must log in with admin privileges to perform this task.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing the Server

Restoring BIOS Defaults

This example enables automatic detection of the BMC and commits the transaction:

Server# scope bios

Server /bios # scope server-management

Server /bios/server-management # set BMCPnP Enabled

Server /bios/server-management *# commit

Changes to BIOS set-up parameters will require a reboot.

Do you want to reboot the system?[y|N] n

Changes will be applied on next reboot.

Server /bios/server-management #

Restoring BIOS Defaults

Before You Begin

You must log in as a user with admin privileges to perform this task.

Procedure

This example restores BIOS default settings:

Server# scope bios

Server /bios # bios-setup-default

This operation will reset the BIOS set-up tokens to factory defaults.

All your configuration will be lost.

Changes to BIOS set-up parameters will initiate a reboot.

Continue?[y|N]y

Restoring BIOS Manufacturing Custom Defaults

In instances where the components of the BIOS no longer function as desired, you can restore the BIOS set up tokens to the manufacturing default values.

Note This action is only available for some C-Series servers.

Before You Begin

???You must log in with admin privileges to perform this task.

???The server must be powered off.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing the Server

Restoring BIOS Manufacturing Custom Defaults

Procedure

This example shows how to restore the BIOS set up tokens to the manufacturing default values:

Server # scope bios

Server /bios # restore-mfg-defaults

This operation will reset the BIOS set-up tokens to manufacturing defaults.

The system will be powered on.

Continue? [y|n] N

Server /bios #

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing the Server

Restoring BIOS Manufacturing Custom Defaults

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

C H A P T E R 4

Viewing Server Properties

This chapter includes the following sections:

Viewing Server Properties

Procedure

This example displays server properties:

Server# show chassis detail

Chassis:

Power: on

Serial Number: QCI140205ZG

Product Name: UCS C210 M2

PID : R210-2121605W

UUID: FFFFFFFF-FFFF-FFFF-FFFF-FFFFFFFFFFFF

Locator LED: off

Description:

Power Restore Policy: power-off

Power Delay Type: fixed

Power Delay Value(sec): 0

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Viewing Server Properties

Viewing CIMC Properties

Server#

Viewing CIMC Properties

Note CIMC gets the current date and time from the server BIOS. To change this information, reboot the server and press F2 when prompted to access the BIOS configuration menu. Then change the date or time using the options on the main BIOS configuration tab.

Procedure

This example displays CIMC properties:

Server# show cimc detail

CIMC:

Firmware Version: 1.4(2.18)

Current Time: Wed Jan 11 07:01:50 2012

Boot-loader Version: 1.4(2.18).16

Server#

Viewing CPU Properties

Before You Begin

The server must be powered on, or the properties will not display.

Procedure

Server /chassis #

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Viewing Server Properties

Viewing Memory Properties

Viewing Memory Properties

Before You Begin

The server must be powered on, or the properties will not display.

Procedure

Server /chassis #

This example displays detailed information about memory properties:

Server# scope chassis

Server /chassis # show dimm detail Name DIMM_A1:

Capacity: 2048 MB

Channel Speed (MHz): 1067

Channel Type: Other

Memory Type Detail: Synchronous

Bank Locator: NODE 0 CHANNEL 0 DIMM 0

Visibility: Yes

Operability: Operable

Manufacturer: 0x802C

Part Number: 18JSF25672PY-1G1D1

Serial Number: 0xDA415F3F

Asset Tag: Unknown

Data Width: 64 bits Name DIMM_A2:

Capacity: 2048 MB --More--

Server /chassis #

This example displays DIMM summary information:

Server# scope chassis

Server /chassis # show dimm-summary

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Viewing Server Properties

Viewing Power Supply Properties

DIMM Summary:

Memory Speed: 1067 MHz

Total Memory: 16384 MB

Effective Memory: 16384 MB

Redundant Memory: 0 MB

Failed Memory: 0 MB

Ignored Memory: 0 MB

Number of Ignored Dimms: 0

Number of Failed Dimms: 0

Memory RAS possible: Memory configuration can support mirroring

Memory Configuration: Maximum Performance

Server /chassis #

Viewing Power Supply Properties

Before You Begin

The server must be powered on, or the properties will not display.

Procedure

Server /chassis #

Viewing Storage Properties

Viewing Storage Adapter Properties

Before You Begin

The server must be powered on, or the properties will not display.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Viewing Server Properties

Viewing Storage Adapter Properties

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Viewing Server Properties

Viewing the Flexible Flash Controller Properties

Server /chassis #

This example displays battery backup unit information for the storage card named SAS:

Server /chassis/storageadapter #

Viewing the Flexible Flash Controller Properties

Before You Begin

??? Cisco Flexible Flash must be supported by your platform.

Procedure

This example displays the properties of the flash controller:

Server /chassis # scope flexflash FlexFlash-0

Server /chassis/flexflash #

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Viewing Server Properties

Viewing Physical Drive Properties

Viewing Physical Drive Properties

Procedure

This example displays general information about physical drive number 1 on the storage card named SAS:

Server# scope chassis

Server /chassis # scope storageadapter SAS

Server /chassis/storageadapter # scope physical-drive 1

Server /chassis/storageadapter/physical-drive # show general

Slot Number 1:

Controller: SAS

Enclosure Device ID: 27

Device ID: 34

Sequence Number: 2

Media Error Count: 0

Other Error Count: 0

Predictive Failure Count: 0

Link Speed: 6.0 Gb/s

Interface Type: SAS

Media Type: HDD

Block Size: 512

Block Count: 585937500

Raw Size: 286102 MB

Non Coerced Size: 285590 MB

Coerced Size: 285568 MB

SAS Address 0: 500000e112693fa2

SAS Address 1:

Connected Port 0:

Connected Port 1:

Connected Port 2:

Connected Port 3:

Connected Port 4:

Connected Port 5:

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Viewing Server Properties

Viewing Virtual Drive Properties

Connected Port 6:

Connected Port 7:

Power State: powersave

Server /chassis/storageadapter/physical-drive #

This example displays inquiry data about physical drive number 1 on the storage card named SAS:

Server# scope chassis

Server /chassis # scope storageadapter SAS

Server /chassis/storageadapter # scope physical-drive 1

Server /chassis/storageadapter/physical-drive # show inquiry-data

Slot Number 1:

Controller: SAS

Product ID: MBD2300RC

Drive Firmware: 5701

Drive Serial Number: D010P9A0016D

Server /chassis/storageadapter/physical-drive #

This example displays status information about physical drive number 1 on the storage card named SAS:

Server# scope chassis

Server /chassis # scope storageadapter SAS

Server /chassis/storageadapter # scope physical-drive 1

Server /chassis/storageadapter/physical-drive # show inquiry-data

Slot Number 1:

Controller: SAS

State: online

Online: true

Fault: false

Server /chassis/storageadapter/physical-drive #

Viewing Virtual Drive Properties

Procedure

This example displays information about virtual drives on the storage card named SAS:

Server# scope chassis

Server /chassis # scope storageadapter SAS

Server /chassis/storageadapter # show virtual-drive

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Viewing Server Properties

Viewing Nvidia GPU Card Information

Server /chassis/storageadapter #

This example displays physical drive information about virtual drive number 1 on the storage card named SAS:

Server# scope chassis

Server /chassis # scope storageadapter SAS

Server /chassis/storageadapter # scope virtual-drive 1

Server /chassis/storageadapter/virtual-drive #

Viewing Nvidia GPU Card Information

These commands are not available on all UCS C-series servers.

Before You Begin

The server must be powered on to view information on the Nvidia GPU cards.

Procedure

This example shows how to view the temperature information of the available GPU cards on the system:

Server # scope chassis

Server /chassis # show gpu

Server /chassis # scope gpu 5

Server /chassis/gpu # show gpu-list

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Viewing Server Properties

Viewing PCI Adapter Properties

032

133

Server /chassis/gpu #

Viewing PCI Adapter Properties

Before You Begin

The server must be powered on, or the properties will not display.

Procedure

Server /chassis #

Viewing Network Related Properties

Viewing LOM Properties

You can view the MAC addresses of the LAN On Motherboard (LOM) Ethernet ports.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Viewing Server Properties

Viewing LOM Properties

This example shows how to display the MAC addresses of the LOM ports:

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Viewing Server Properties

Viewing LOM Properties

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

C H A P T E R 5

Viewing Server Sensors

This chapter includes the following sections:

Viewing Power Supply Sensors

Procedure

This example displays power supply sensor statistics:

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Viewing Server Sensors

Viewing Fan Sensors

Server /sensor #

Viewing Fan Sensors

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Viewing Server Sensors

Viewing Voltage Sensors

This example displays temperature sensor statistics:

Server /sensor #

Viewing Voltage Sensors

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Viewing Server Sensors

Viewing Current Sensors

1.744 1.852

Server /sensor #

Viewing Current Sensors

Procedure

The displayed fields are described in the following table:

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Viewing Server Sensors

Viewing Storage Sensors

This example displays storage sensor information:

Server# scope chassis

Server /chassis # show hdd

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Viewing Server Sensors

Viewing Storage Sensors

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

C H A P T E R 6

Managing Remote Presence

This chapter includes the following sections:

??? Managing the Virtual KVM, page 55

??? Configuring Virtual Media, page 58

??? Managing Serial over LAN, page 61

Managing the Virtual KVM

KVM Console

The KVM console is an interface accessible from CIMC that emulates a direct keyboard, video, and mouse (KVM) connection to the server. The KVM console allows you to connect to the server from a remote location.

Instead of using CD/DVD or floppy drives physically connected to the server, the KVM console uses virtual media, which are actual disk drives or disk image files that are mapped to virtual CD/DVD or floppy drives. You can map any of the following to a virtual drive:

???CD/DVD or floppy drive on your computer

???Disk image files (ISO or IMG files) on your computer

???USB flash drive on your computer

???CD/DVD or floppy drive on the network

???Disk image files (ISO or IMG files) on the network

???USB flash drive on the network

You can use the KVM console to install an OS on the server.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Remote Presence

Enabling the Virtual KVM

Enabling the Virtual KVM

Before You Begin

You must log in as a user with admin privileges to enable the virtual KVM.

Procedure

Server /kvm #

Disabling the Virtual KVM

Before You Begin

You must log in as a user with admin privileges to disable the virtual KVM.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Remote Presence

Configuring the Virtual KVM

Server /kvm #

Configuring the Virtual KVM

Before You Begin

You must log in as a user with admin privileges to configure the virtual KVM.

Procedure

This example configures the virtual KVM and displays the configuration:

Server# scope kvm

Server /kvm # set enabled yes

Server /kvm *# set encrypted no

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Remote Presence

Configuring Virtual Media

Server /kvm *# set kvm-port 2068

Server /kvm *# set max-sessions 4

Server /kvm *# set local-video yes

Server /kvm *# commit

Server /kvm # show detail

KVM Settings:

Encryption Enabled: no

Max Sessions: 4

Local Video: yes

Active Sessions: 0

Enabled: yes

KVM Port: 2068

Server /kvm #

What to Do Next

Launch the virtual KVM from the GUI.

Configuring Virtual Media

Before You Begin

You must log in as a user with admin privileges to configure virtual media.

Procedure

This example configures virtual media encryption:

Server# scope vmedia

Server /vmedia # set enabled yes

Server /vmedia *# set encryption yes

Server /vmedia *# commit Server /vmedia # show detail vMedia Settings:

Encryption Enabled: yes

Enabled: yes

Max Sessions: 1

Active Sessions: 0 Server /vmedia #

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Remote Presence

Configuring Network Mounted vMedia Mapping

What to Do Next

Use the KVM to attach virtual media devices to a host.

Configuring Network Mounted vMedia Mapping

Before You Begin

You must log in with admin privileges to perform this task.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Remote Presence

Viewing Network Mount vMedia Mapping Properties

??? Username and password to connect to the server

This example shows how to create a CIFS network mounted vMedia mapping:

Server # scope vmedia

Server /vmedia # map-cifs sample-volume //10.10.10.10/project /test/sample

Server username:

Server password: ****

Confirm password: ****

Server /vmedia #

Viewing Network Mount vMedia Mapping Properties

Before You Begin

You must log in with admin privileges to perform this task.

Procedure

This example shows how to view the properties of all the configured vmedia mapping:

Server # scope vmedia

Server /vmedia # show mappings

Removing Network Mounted vMedia Mapping

Before You Begin

You must log in with admin privileges to perform this task.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Remote Presence

Managing Serial over LAN

Procedure

This example shows how to unmap a local vmedia volume:

Server # scope vmedia

Server /vmedia # show mappings

Server /vmedia #

Managing Serial over LAN

Serial Over LAN

Serial over LAN (SoL) is a mechanism that enables the input and output of the serial port of a managed system to be redirected via an SSH session over IP. SoL provides a means of reaching the host console via CIMC.

Guidelines and Restrictions for Serial Over LAN

For redirection to SoL, the server console must have the following configuration:

???console redirection to serial port A

???no flow control

???baud rate the same as configured for SoL

???VT-100 terminal type

???legacy OS redirection disabled

The SoL session will display line-oriented information such as boot messages, and character-oriented screen menus such as BIOS setup menus. If the server boots an operating system or application with a bitmap-oriented

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Remote Presence

Configuring Serial Over LAN

display, such as Windows, the SoL session will no longer display. If the server boots a command-line-oriented operating system (OS), such as Linux, you may need to perform additional configuration of the OS in order to properly display in an SoL session.

In the SoL session, your keystrokes are transmitted to the console except for the function key F2. To send an F2 to the console, press the Escape key, then press 2.

Configuring Serial Over LAN

Before You Begin

You must log in as a user with admin privileges to configure serial over LAN (SoL).

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Remote Presence

Launching Serial Over LAN

This example configures SoL:

Server# scope sol

Server /sol # set enabled yes

Server /sol *# set baud-rate 115200

Server /sol # show detail

Serial Over LAN:

Enabled: yes

Baud Rate(bps): 115200

Com Port: com2

Server /sol #

Launching Serial Over LAN

Procedure

What to Do Next

To end the SoL session, you must close the CLI session. For example, to end an SoL session over an SSH connection, disconnect the SSH connection.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Remote Presence

Launching Serial Over LAN

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

C H A P T E R 7

Managing User Accounts

This chapter includes the following sections:

Configuring Local Users

Before You Begin

You must log in as a user with admin privileges to configure or modify local user accounts.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing User Accounts

Configuring Active Directory

??? Manage the power control options such as power on, power cycle, and power off

??? Launch the KVM console and virtual media

??? Clear all logs

??? Toggle the locator LED

??? admin???This user can perform all actions available through the GUI, CLI, and IPMI.

This example configures user 5 as an admin:

Configuring Active Directory

Active Directory

Active Directory is a technology that provides a variety of network services including LDAP-like directory services, Kerberos-based authentication, and DNS-based naming. The CIMC utilizes the Kerberos-based authentication service of Active Directory.

When Active Directory is enabled in the CIMC, user authentication and role authorization is performed by Active Directory for user accounts not found in the local user database.

you can require the server to encrypt data sent to Active Directory.

Configuring the Active Directory Server

The CIMC can be configured to use Active Directory for user authentication and authorization. To use Active Directory, configure users with an attribute that holds the user role and locale information for the CIMC. You can use an existing LDAP attribute that is mapped to the CIMC user roles and locales or you can modify the Active Directory schema to add a new custom attribute, such as the CiscoAVPair attribute, which has an

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing User Accounts

Configuring the Active Directory Server

attribute ID of 1.3.6.1.4.1.9.287247.1. For more information about altering the Active Directory schema, see the article at http://technet.microsoft.com/en-us/library/bb727064.aspx.

The following steps are to be performed on the Active Directory server.

Note This example creates a custom attribute named CiscoAVPair, but you can also use an existing LDAP attribute that is mapped to the CIMC user roles and locales.

Procedure

Step 1 Ensure that the Active Directory schema snap-in is installed.

Step 2 Using the Active Directory schema snap-in, add a new attribute with the following properties:

Step 3 Add the CiscoAVPair attribute to the user class using the Active Directory snap-in:

a)Expand the Classes node in the left pane and type U to select the user class.

b)Click the Attributes tab and click Add.

c)Type C to select the CiscoAVPair attribute.

d)Click OK.

Step 4 Add the following user role values to the CiscoAVPair attribute, for the users that you want to have access to CIMC:

Note For more information about adding values to attributes, see the article at http://technet.microsoft.com/ en-us/library/bb727064.aspx.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing User Accounts

Configuring Active Directory in CIMC

What to Do Next

Use the CIMC to configure Active Directory.

Configuring Active Directory in CIMC

Configure Active Directory (AD) in CIMC when you want to use an AD server for local user authentication and authorization.

Before You Begin

You must log in as a user with admin privileges to perform this task.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing User Accounts

Configuring Active Directory Groups in CIMC

This example configures AD using the CiscoAVPair attribute:

Server# scope ldap

Server /ldap # set enabled yes

Server /ldap *# set dc1 192.0.20.123

Server /ldap *# set gc1 192.0.20.11

Server /ldap *# set timeout 60

Server /ldap *# set encrypted yes

Server /ldap *# set base-dn example.com

Server /ldap *# set attribute CiscoAVPair

Server /ldap *# commit

Server /ldap # show detail

LDAP Settings:

Domain Controller 1: 192.0.20.123

Domain Controller 2: 0.0.0.0

Domain Controller 3: 0.0.0.0

BaseDN: example.com

Encrypted: yes

Timeout: 60

Enabled: yes

Attribute: CiscoAvPair

Group Authorization: no

Global Catalog 1: 192.0.20.11

Global Catalog 2: 0.0.0.0

Global Catalog 3: 0.0.0.0

Server /ldap #

What to Do Next

If you want to use Active Directory groups for group authorization, see Configuring Active Directory Groups in CIMC.

Configuring Active Directory Groups in CIMC

Note When Active Directory (AD) group authorization is enabled and configured, user authentication is also done on the group level for users that are not found in the local user database or who are not individually authorized to use CIMC in the Active Directory.

Before You Begin

???You must log in as a user with admin privileges to perform this task.

???Active Directory (or LDAP) must be enabled and configured.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing User Accounts

Configuring Active Directory Groups in CIMC

Procedure

This example shows how to configure AD group authorization:

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing User Accounts

Viewing User Sessions

Server /ldap/role-group #

Viewing User Sessions

Procedure

The command output displays the following information about current user sessions:

This example displays information about current user sessions:

Terminating a User Session

Before You Begin

You must log in as a user with admin privileges to terminate a user session.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing User Accounts

Terminating a User Session

Procedure

This example shows how the admin at user session 10 terminates user session 15:

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

C H A P T E R 8

Configuring Network-Related Settings

This chapter includes the following sections:

Server NIC Configuration

Server NICs

NIC Mode

The NIC mode setting determines which ports can reach the CIMC. The following network mode options are available, depending on your platform:

???Dedicated???The management port is used to access the CIMC.

???Shared LOM???Any LOM (LAN On Motherboard) port can be used to access the CIMC.

???Shared LOM 10G???Any 10G LOM port can be used to access the CIMC. This option is only available for some adapter cards.

???Cisco Card???Any port on the adapter card can be used to access the CIMC. The Cisco adapter card has to be installed in a slot with Network Communications Services Interface protocol (NCSI) support.

???Shared LOM Extended???Any LOM port or adapter card port can be used to access the CIMC. The Cisco adapter card has to be installed in a slot with NCSI support.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Configuring Network-Related Settings

Configuring Server NICs

NIC Redundancy

The following NIC redundancy options are available, depending on the selected NIC mode and your platform:

???none???Each port associated with the configured NIC mode operates independently. The ports do not fail over if there is a problem.

???active-active???If supported, all ports associated with the configured NIC mode operate simultaneously. This increases throughput and provides multiple paths to the CIMC.

???active-standby???If a port associated with the configured NIC mode fails, traffic will fail over to one of the other ports associated with the NIC mode.

Note If you select this option, make sure all ports associated with the configured NIC mode are connected to the same subnet to ensure that traffic is secure regardless of which port is used.

The available redundancy modes vary depending on the selected network mode and your platform. For the available modes, see the Hardware Installation Guide (HIG) for the type of server you are using. The C-Series HIGs are available at the following URL: http://www.cisco.com/en/US/products/ps10493/prod_installation_ guides_list.html

Configuring Server NICs

Configure a server NIC when you want to set the NIC mode and NIC redundancy.

Before You Begin

You must log in as a user with admin privileges to configure the NIC.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Configuring Network-Related Settings

Configuring Common Properties

This example configures the CIMC network interface:

Configuring Common Properties

Use common properties to describe your server.

Before You Begin

You must log in as a user with admin privileges to configure common properties.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Configuring Network-Related Settings

Configuring IPv4

Configuring IPv4

Before You Begin

You must log in as a user with admin privileges to configure IPv4 network settings.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Configuring Network-Related Settings

Configuring the Server VLAN

This example configures and displays the IPv4 network settings:

Server# scope cimc

Server /cimc # scope network

Server /cimc/network # set dhcp-enabled yes

Server /cimc/network *# set v4-addr 10.20.30.11

Server /cimc/network *# set v4-netmask 255.255.248.0

Server /cimc/network *# set v4-gateway 10.20.30.1

Server /cimc/network *# set dns-use-dhcp-enabled no

Server /cimc/network *# set preferred-dns-server 192.168.30.31

Server /cimc/network *# set alternate-dns-server 192.168.30.32

Server /cimc/network *# commit

Server /cimc/network # show detail

Network Setting:

IPv4 Address: 10.20.30.11

IPv4 Netmask: 255.255.248.0

IPv4 Gateway: 10.20.30.1

DHCP Enabled: yes

Obtain DNS Server by DHCP: no

Preferred DNS: 192.168.30.31

Alternate DNS: 192.168.30.32

VLAN Enabled: no

VLAN ID: 1

VLAN Priority: 0

Hostname: Server

MAC Address: 01:23:45:67:89:AB

NIC Mode: dedicated

NIC Redundancy: none

Server /cimc/network #

Configuring the Server VLAN

Before You Begin

You must be logged in as admin to configure the server VLAN.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Configuring Network-Related Settings

Connecting to a Port Profile

This example configures the server VLAN:

Server# scope cimc

Server /cimc # scope network

Server /cimc/network # set vlan-enabled yes

Server /cimc/network *# set vlan-id 10

Server /cimc/network *# set vlan-priority 32

Server /cimc/network *# commit

Server /cimc/network # show detail

Network Setting:

IPv4 Address: 10.20.30.11

IPv4 Netmask: 255.255.248.0

IPv4 Gateway: 10.20.30.1

DHCP Enabled: yes

Obtain DNS Server by DHCP: no

Preferred DNS: 192.168.30.31

Alternate DNS: 192.168.30.32

VLAN Enabled: yes

VLAN ID: 10

VLAN Priority: 32

Hostname: Server

MAC Address: 01:23:45:67:89:AB

NIC Mode: dedicated

NIC Redundancy: none

Server /cimc/network #

Connecting to a Port Profile

Note You can configure a port profile or a VLAN, but you cannot use both. If you want to use a port profile, make sure the set vlan-enabled command is set to no.

Before You Begin

You must be logged in as admin to connect to a port profile.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Configuring Network-Related Settings

Connecting to a Port Profile

Procedure

This example connects to port profile abcde12345:

Server# scope cimc

Server /cimc # scope network

Server /cimc/network # set port-profile abcde12345

Server /cimc/network *# commit

Server /cimc/network # show detail

Network Setting:

IPv4 Address: 10.193.66.174

IPv4 Netmask: 255.255.248.0

IPv4 Gateway: 10.193.64.1

DHCP Enabled: no

Obtain DNS Server by DHCP: no

Preferred DNS: 0.0.0.0

Alternate DNS: 0.0.0.0

VLAN Enabled: no

VLAN ID: 1

VLAN Priority: 0

Port Profile: abcde12345

Hostname: Server

MAC Address: 50:3D:E5:9D:63:3C

NIC Mode: dedicated

NIC Redundancy: none

Server /cimc/network #

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Configuring Network-Related Settings

Network Security Configuration

Network Security Configuration

Network Security

The CIMC uses IP blocking as network security. IP blocking prevents the connection between a server or website and certain IP addresses or ranges of addresses. IP blocking effectively bans undesired connections from those computers to a website, mail server, or other Internet servers.

IP banning is commonly used to protect against denial of service (DoS) attacks. CIMC bans IP addresses by setting up an IP blocking fail count.

Configuring Network Security

Configure network security if you want to set up an IP blocking fail count.

Before You Begin

You must log in as a user with admin privileges to configure network security.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Configuring Network-Related Settings

Network Time Protocol Configuration

This example configures IP blocking:

Server# scope cimc

Server /cimc # scope network

Server /cimc/network # scope ipblocking

Server /cimc/network/ipblocking # set enabled yes

Server /cimc/network/ipblocking *# set fail-count 5

Server /cimc/network/ipblocking *# set fail-window 90

Server /cimc/network/ipblocking *# set penalty-time 600

Server /cimc/network/ipblocking *# commit

Server /cimc/network/ipblocking #

Network Time Protocol Configuration

Configuring Network Time Protocol Settings

By default, when CIMC is reset, it synchronizes the time with the host. With the introduction of the NTP service, you can configure CIMC to synchronize the time with an NTP server. The NTP server does not run in CIMC by default. You must enable and configure the NTP service by specifying the IP/DNS address of at least one server or a maximum of four servers that function as NTP servers or time source servers. When you enable the NTP service, CIMC synchronizes the time with the configured NTP server. The NTP service can be modified only through CIMC.

Note To enable the NTP service, it is preferable to specify the IP address of a server rather than the DNS address.

Before You Begin

You must log in with admin privileges to perform this task.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Configuring Network-Related Settings

Configuring Network Time Protocol Settings

This example shows how to configure the NTP service:

Server # scope cimc

Server /cimc # scope network Server /cimc/network # scope ntp

Server /cimc/network/ntp # set enabled yes Warning: IPMI Set SEL Time Command will be disabled if NTP is enabled.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

C H A P T E R 9

Managing Network Adapters

This chapter includes the following sections:

Overview of the Cisco UCS C-Series Network Adapters

Note The procedures in this chapter are available only when a Cisco UCS C-Series network adapter is installed in the chassis.

A Cisco UCS C-Series network adapter can be installed to provide options for I/O consolidation and virtualization support. The following adapters are available:

???Cisco UCS P81E Virtual Interface Card

???Cisco UCS VIC1225 Virtual Interface Card

The interactive UCS Hardware and Software Interoperability Utility lets you view the supported components and configurations for a selected server model and software release. The utility is available at the following URL: http://www.cisco.com/web/techdoc/ucs/interoperability/matrix/matrix.html

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Overview of the Cisco UCS C-Series Network Adapters

Cisco UCS P81E Virtual Interface Card

The Cisco UCS P81E Virtual Interface Card is optimized for virtualized environments, for organizations that seek increased mobility in their physical environments, and for data centers that want reduced costs through NIC, HBA, cabling, and switch reduction and reduced management overhead. This Fibre Channel over Ethernet (FCoE) PCIe card offers the following benefits:

???Allows up to 16 virtual Fibre Channel and 16 virtual Ethernet adapters to be provisioned in virtualized or nonvirtualized environments using just-in-time provisioning, providing tremendous system flexibility and allowing consolidation of multiple physical adapters.

???Delivers uncompromising virtualization support, including hardware-based implementation of Cisco VN-Link technology and pass-through switching.

???Improves system security and manageability by providing visibility and portability of network polices and security all the way to the virtual machine.

The virtual interface card makes Cisco VN-Link connections to the parent fabric interconnects, which allows virtual links to connect virtual NICs in virtual machines to virtual interfaces in the interconnect. In a Cisco Unified Computing System environment, virtual links then can be managed, network profiles applied, and interfaces dynamically reprovisioned as virtual machines move between servers in the system.

Cisco UCS VIC1225 Virtual Interface Card

The Cisco UCS VIC1225 Virtual Interface Card is a high-performance, converged network adapter that provides acceleration for the various new operational modes introduced by server virtualization. It brings superior flexibility, performance, and bandwidth to the new generation of Cisco UCS C-Series Rack-Mount Servers.

The Cisco UCS VIC 1225 implements the Cisco Virtual Machine Fabric Extender (VM-FEX), which unifies virtual and physical networking into a single infrastructure. It provides virtual-machine visibility from the physical network and a consistent network operations model for physical and virtual servers. In virtualized environments, this highly configurable and self-virtualized adapter provides integrated, modular LAN interfaces on Cisco UCS C-Series Rack-Mount Servers. Additional features and capabilities include:

???Supports up to 256 PCIe virtual devices, either virtual network interface cards (vNICs) or virtual host bus adapters (vHBAs), with high I/O operations per second (IOPS), support for lossless Ethernet, and 20 Gbps to servers.

???PCIe Gen2 x16 helps assure optimal bandwidth to the host for network-intensive applications with a redundant path to the fabric interconnect.

???Half-height design reserves full-height slots in servers for Cisco certified third-party adapters.

???Centrally managed by Cisco UCS Manager with support for Microsoft Windows, Red Hat Enterprise Linux, SUSE Linux, VMware vSphere, and Citrix XenServer.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Viewing Network Adapter Properties

Viewing Network Adapter Properties

Procedure

This example displays the properties of adapter 2:

Configuring Network Adapter Properties

Before You Begin

???You must log in with admin privileges to perform this task.

???A supported Virtual Interface Card (VIC) must be installed in the chassis and the server must be powered on.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Managing vHBAs

Procedure

This example configures the properties of adapter 1:

Managing vHBAs

Guidelines for Managing vHBAs

When managing vHBAs, consider the following guidelines and restrictions:

???The Cisco UCS P81E Virtual Interface Card and Cisco UCS VIC1225 Virtual Interface Card provide two vHBAs (fc0 and fc1). You can create up to 16 additional vHBAs on these adapter cards.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Viewing vHBA Properties

Note If Network Interface Virtualization (NIV) mode is enabled for the adapter, you must assign a channel number to a vHBA when you create it.

???When using the Cisco UCS P81E Virtual Interface Card or Cisco UCS VIC1225 Virtual Interface Card in an FCoE application, you must associate the vHBA with the FCoE VLAN. Follow the instructions in to assign the VLAN.

???After making configuration changes, you must reboot the host for settings to take effect.

Viewing vHBA Properties

Procedure

This example displays all vHBAs on adapter card 1 and the detailed properties of fc0:

Server /chassis/adapter # show host-fc-if fc0 detail

Name fc0:

World Wide Node Name: 10:00:00:22:BD:D6:5C:35

World Wide Port Name: 20:00:00:22:BD:D6:5C:35

FC SAN Boot: Disabled

Persistent LUN Binding: Disabled

Uplink Port: 0

MAC Address: 00:22:BD:D6:5C:35

CoS: 3

VLAN: NONE

Rate Limiting: OFF

PCIe Device Order: ANY

EDTOV: 2000

RATOV: 10000

Maximum Data Field Size: 2112

Channel Number: 3

Port Profile:

Server /chassis/adapter #

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Modifying vHBA Properties

Modifying vHBA Properties

Before You Begin

You must log in with admin privileges to perform this task.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Modifying vHBA Properties

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Modifying vHBA Properties

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Modifying vHBA Properties

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Creating a vHBA

This example configures the properties of a vHBA:

Server /chassis/adapter/host-fc-if # set boot enable

Server /chassis/adapter/host-fc-if *# scope scsi-io

Server /chassis/adapter/host-fc-if/scsi-io *# set cdb-wq-count 2

Server /chassis/adapter/host-fc-if/scsi-io *# exit

Server /chassis/adapter/host-fc-if *# commit

Server /chassis/adapter/host-fc-if #

What to Do Next

Reboot the server to apply the changes.

Creating a vHBA

The adapter provides two permanent vHBAs. If NIV mode is enabled, you can create up to 16 additional vHBAs.

Before You Begin

You must log in with user or admin privileges to perform this task.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Deleting a vHBA

This example creates a vHBA on adapter 1:

Server# scope chassis

Server /chassis # scope adapter 1

Server /chassis/adapter # create host-fc-if Vhba5

Server /chassis/adapter/host-fc-if *# commit

New host-fc-if settings will take effect upon the next server reset

Server /chassis/adapter/host-fc-if #

What to Do Next

???Reboot the server to create the vHBA.

???If configuration changes are required, configure the new vHBA as described in Modifying vHBA Properties, on page 88.

Deleting a vHBA

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

vHBA Boot Table

This example deletes a vHBA on adapter 1:

vHBA Boot Table

In the vHBA boot table, you can specify up to four LUNs from which the server can boot.

Viewing the Boot Table

Procedure

This example displays the boot table for a vHBA:

Server# scope chassis

Server /chassis # scope adapter 1

Server /chassis/adapter # scope host-fc-if fc1

Server /chassis/adapter/host-fc-if # show boot

Server /chassis/adapter/host-fc-if #

Creating a Boot Table Entry

You can create up to four boot table entries.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Deleting a Boot Table Entry

Procedure

This example creates a boot table entry for vHBA fc1:

Server# scope chassis

Server /chassis # scope adapter 1

Server /chassis/adapter # scope host-fc-if fc1

Server /chassis/adapter/host-fc-if # create-boot-entry 20:00:00:11:22:33:44:55 3

Server /chassis/adapter/host-fc-if *# commit

New boot table entry will take effect upon the next server reset

Server /chassis/adapter/host-fc-if #

Deleting a Boot Table Entry

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

vHBA Persistent Binding

This example deletes boot table entry number 1 for the vHBA fc1:

New host-fc-if settings will take effect upon the next server reset

Server /chassis/adapter/host-fc-if # show boot

Server /chassis/adapter/host-fc-if #

What to Do Next

Reboot the server to apply the changes.

vHBA Persistent Binding

Persistent binding ensures that the system-assigned mapping of Fibre Channel targets is maintained after a reboot.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Enabling Persistent Binding

Enabling Persistent Binding

Procedure

This example enables persistent binding for a vHBA:

Server# scope chassis

Server /chassis # scope adapter 4

Server /chassis/adapter # scope host-fc-if fc1

Server /chassis/adapter/host-fc-if # scope perbi

Server /chassis/adapter/host-fc-if/perbi # set persistent-lun-binding enable

Server /chassis/adapter/host-fc-if/perbi *# commit

Server /chassis/adapter/host-fc-if/perbi #

Disabling Persistent Binding

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Rebuilding Persistent Binding

This example disables persistent binding for a vHBA:

Server# scope chassis

Server /chassis # scope adapter 4

Server /chassis/adapter # scope host-fc-if fc1

Server /chassis/adapter/host-fc-if # scope perbi

Server /chassis/adapter/host-fc-if/perbi # set persistent-lun-binding disable

Server /chassis/adapter/host-fc-if/perbi *# commit

Server /chassis/adapter/host-fc-if/perbi #

Rebuilding Persistent Binding

Before You Begin

Persistent binding must be enabled in the vHBA properties.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Managing vNICs

This example rebuilds the persistent binding table for a vHBA:

Server# scope chassis

Server /chassis # scope adapter 4

Server /chassis/adapter # scope host-fc-if fc1

Server /chassis/adapter/host-fc-if # scope perbi

Server /chassis/adapter/host-fc-if/perbi # rebuild

Server /chassis/adapter/host-fc-if/perbi #

Managing vNICs

Guidelines for Managing vNICs

When managing vNICs, consider the following guidelines and restrictions:

???The Cisco UCS P81E Virtual Interface Card and Cisco UCS VIC1225 Virtual Interface Card provide two default vNICs (eth0 and eth1). You can create up to 16 additional vNICs on these adapter cards.

Note If Network Interface Virtualization (NIV) mode is enabled for the adapter, you must assign a channel number to a vNIC when you create it.

??? After making configuration changes, you must reboot the host for settings to take effect.

Viewing vNIC Properties

Procedure

This example displays the brief properties of all vNICs and the detailed properties of eth0:

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Modifying vNIC Properties

Server /chassis/adapter # show host-eth-if eth0 detail

Name eth0:

MTU: 1500

Uplink Port: 0

MAC Address: 00:22:BD:D6:5C:33

CoS: 0

Trust Host CoS: disabled

PCI Order: ANY

VLAN: NONE

VLAN Mode: TRUNK

Rate Limiting: OFF

PXE Boot: enabled

Channel Number: N/A

Port Profile: N/A

Uplink Failover: N/A

Uplink Failback Timeout: N/A

Server /chassis/adapter #

Modifying vNIC Properties

Before You Begin

You must log in with admin privileges to perform this task.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Modifying vNIC Properties

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Modifying vNIC Properties

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Modifying vNIC Properties

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Modifying vNIC Properties

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Creating a vNIC

This example configures the properties of a vNIC:

Server /chassis/adapter/host-eth-if/offload *# set tcp-segment-offload enable

Server /chassis/adapter/host-eth-if/offload *# exit

Server /chassis/adapter/host-eth-if *# commit

Server /chassis/adapter/host-eth-if #

What to Do Next

Reboot the server to apply the changes.

Creating a vNIC

The adapter provides two permanent vNICs. You can create up to 16 additional vNICs.

Before You Begin

You must log in with user or admin privileges to perform this task.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Deleting a vNIC

Procedure

This example creates a vNIC on adapter 1:

Server# scope chassis

Server /chassis # scope adapter 1

Server /chassis/adapter # create host-eth-if Vnic5

Server /chassis/adapter/host-eth-if *# commit

New host-eth-if settings will take effect upon the next server reset

Server /chassis/adapter/host-eth-if #

Deleting a vNIC

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Configuring iSCSI Boot Capability

Note The changes will take effect upon the next server reboot.

This example deletes a vNIC on adapter 1:

Server# scope chassis

Server /chassis # scope adapter 1

Server /chassis/adapter # delete host-eth-if Vnic5

Server /chassis/adapter *# commit

Server /chassis/adapter #

Configuring iSCSI Boot Capability

Configuring iSCSI Boot Capability for vNICs

When the rack-servers are configured in a standalone mode, and when the VIC adapters are directly attached to the Nexus 5000 family of switches, you can configure these VIC adapters to boot the servers remotely from iSCSI storage targets. You can configure Ethernet vNICs to enable a rack server to load the host OS image from remote iSCSI target devices.

To configure the iSCSI boot capability on a vNIC:

???You must log in with admin privileges to perform this task.

???To configure a vNIC to boot a server remotely from an iSCSI storage target, you must enable the PXE boot option on the vNIC.

Note You can configure a maximum of 2 iSCSI vNICs for each host.

Configuring iSCSI Boot Capability on a vNIC

You can configure a maximum of 2 iSCSI vNICs for each host.

Before You Begin

???To configure a vNIC to boot a server remotely from an iSCSI storage target, you must enable the PXE boot option on the vNIC.

???You must log in with admin privileges to perform this task.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Configuring iSCSI Boot Capability

Procedure

This example shows how to configure the iSCSI boot capability for a vNIC:

Server # scope chassis

Server /chassis # scope adapter 1

Server /chassis/adapter # scope host-eth-if eth0

Server /chassis/adapter/host-eth-if # create iscsi-boot 0

Server /adapter/host-eth-if/iscsi-boot *# set dhcp-net-settings enabled

Server /adapter/host-eth-if/iscsi-boot *# set initiator-name iqn.2012-01.com.adser:abcde

Server /adapter/host-eth-if/iscsi-boot *# set dhcp-iscsi-settings enabled

Server /adapter/host-eth-if/iscsi-boot *# commit

New host-eth-if settings will take effect upon the next server reset

Server /adapter/host-eth-if/iscsi-boot #

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Managing VM FEX

Deleting an iSCSI Boot Configuration for a vNIC

Before You Begin

You must log in with admin privileges to perform this task.

Procedure

This example shows how to delete the iSCSI boot capability for a vNIC:

Server # scope chassis

Server /chassis # scope adapter 1

Server /chassis/adapter # scope host-eth-if eth0

Server /chassis/adapter/host-eth-if # delete iscsi-boot 0

Server /adapter/host-eth-if/iscsi-boot *# commit

New host-eth-if settings will take effect upon the next server reset

Server /adapter/host-eth-if/iscsi-boot #

Managing VM FEX

Virtual Machine Fabric Extender

Cisco Virtual Machine Fabric Extender (VM FEX) extends the (prestandard) IEEE 802.1Qbh port extender architecture to virtual machines. In this architecture, each VM interface is provided with a virtual Peripheral Component Interconnect Express (PCIe) device and a virtual port on a switch.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Viewing VM FEX Properties

Viewing VM FEX Properties

Before You Begin

???The server must be powered on, or the properties will not display.

???A supported Virtual Interface Card (VIC) must be installed in the chassis and the server must be powered on.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

VM FEX Settings

This example displays the VM FEX properties:

Server /chassis/adapter # show vmfex detail

Name pts0:

MTU: 1500

Uplink Port: 0

MAC Address: 00:00:00:00:00:00

CoS: N/A

Trust Host CoS:

PCI Order:

VLAN: N/A

VLAN Mode: N/A

Rate Limiting:

PXE Boot: disabled

Channel Number: 0

Port Profile:

Uplink Failover: Enabled

Uplink Failback Timeout: 5

-------------------- ---------------- ---------------- -------------

VM FEX Settings

The following tables describe the VM FEX settings that you can view.

General Properties Settings

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

VM FEX Settings

Ethernet Interrupt Settings

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

VM FEX Settings

Ethernet Receive Queue Settings

Ethernet Transmit Queue Settings

Completion Queue Settings

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

VM FEX Settings

TCP Offload Settings

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Managing Storage Adapters

Managing Storage Adapters

Create Virtual Drive from Unused Physical Drives

Before You Begin

You must log in with admin privileges to perform this task.

Procedure

This example shows how to create a new virtual drive that spans two unused physical drives.

Server# scope chassis

Server /chassis # scope storageadapter SLOT-3

Server /chassis/storageadapter # create-virtual-drive Please enter RAID level

(0, 1, 5, 6, 10, 50, 60) --> 1

Please choose from the following 2 unused physical drives:

Slot 6: size 68664 MB

Slot 7: size 68664 MB

Specify physical disks for span 0:

Enter comma-separated PDs from above list--> 6,7

Please enter Virtual Drive name (15 characters maximum)--> test_v_drive

Please enter Virtual Drive size in MB, GB, or TB

Example format: '400 GB' --> 1000 MB

Optional attribute:

Write Policy: defaults to Write Back

OK? (y or n)--> n

0:Write Through

1:Write Back

2:Write Back with Bad BBU

3:Write Back Adaptive

Choose number from above options--> 2

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Create Virtual Drive from an Existing Drive Group

Write Policy will be set to Write Back with Bad BBU (2 and 'write-policy\:2')

New virtual drive will have the following characteristics: - Spans: '[6.7]'

- RAID level: '1'

- Name: 'test_v_drive'

- Size: 1000 MB

- Write Policy: Write Back with Bad BBU

Server /chassis/storageadapter #

Create Virtual Drive from an Existing Drive Group

Before You Begin

You must log in with admin privileges to perform this task.

Procedure

This example shows how to carve a new virtual drive out of unused space in an existing RAID 1 drive group:

Server# scope chassis

Server /chassis # scope storageadapter SLOT-3

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Clearing Foreign Configuration

New virtual drive will have the following characteristics:

-It will share space with virtual drive 3

-Name: 'new_from_test'

-Size: 500 MB

Server /chassis/storageadapter #

Clearing Foreign Configuration

Important This task clears all foreign configuration on the controller. Also, all configuration information from all physical drives hosting foreign configuration is deleted. This action cannot be reverted.

Before You Begin

You must log in with admin privileges to perform this task.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Deleting a Virtual Drive

This example shows how to clear all foreign configurations on the MegaRAID controller in slot 3:

Server# scope chassis

Server /chassis # scope storageadapter SLOT-3

Server /chassis/storageadapter # clear-foreign-config

Are you sure you want to clear all foreign configurations on this controller?

All data on the drive(s) will be lost.

Enter 'yes' to confirm -> yes

Server /chassis/storageadapter #

Deleting a Virtual Drive

Important This task deletes a virtual drive, including the drives that run the booted operating system. So back up any data that you want to retain before you delete a virtual drive.

Before You Begin

You must log in with admin privileges to perform this task.

Procedure

This example shows how to delete virtual drive 3.

Server# scope chassis

Server /chassis # scope storageadapter SLOT-3

Server /chassis/storageadapter # scope virtual-drive 3

Server /chassis/storageadapter/virtual-drive # delete-virtual-drive

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Initializing a Virtual Drive

Are you sure you want to delete virtual drive 3?

All data on the drive will be lost. Enter 'yes' to confirm -> yes

Server /chassis/storageadapter/virtual-drive #

Initializing a Virtual Drive

All data on a virtual drive is lost when you initialize the drive. Before you run an initialization, back up any data on the virtual drive that you want to save.

Before You Begin

You must log in with admin privileges to perform this task.

Procedure

This example shows how to initialize virtual drive 3 using fast initialization:

Server# scope chassis

Server /chassis # scope storageadapter SLOT-3

Server /chassis/storageadapter # scope virtual-drive 3

Server /chassis/storageadapter/virtual-drive # start-initialization

Are you sure you want to initialize virtual drive 3?

All data on the drive will be lost. Enter 'yes' to confirm -> yes

Fast (0) or full (1) initialization? -> 0

Server /chassis/storageadapter/virtual-drive # get-operation-status

progress-percent: 20%

elapsed -seconds: 30

operation-in-progress: initializing virtual drive

Server /chassis/storageadapter/virtual-drive #

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Set as Boot Drive

Set as Boot Drive

Before You Begin

You must log in with admin privileges to perform this task.

Procedure

This example shows how to specify the controller to boot from virtual drive 3:

Server# scope chassis

Server /chassis # scope storageadapter SLOT-3

Server /chassis/storageadapter # scope virtual-drive 3

Modifying Attributes of a Virtual Drive

Before You Begin

You must log in with admin privileges to perform this task.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Making a Dedicated Hot Spare

This example shows how to carve a new virtual drive out of unused space in an existing RAID 1 drive group:

Server# scope chassis

Server /chassis # scope storageadapter SLOT-3

Server /chassis/storageadapter # scope virtual-drive

Server /chassis/storageadapter/virtual-drive # modify-attributes

Current write policy: Write Back

0:Write Through

1:Write Back

2:Write Back even if Bad BBU

Choose number from above options --> 0

The following attribute will be modified:

- Write policy: Write Through

OK? (y or n) --> y

operation in progress.

Server /chassis/storageadapter/virtual-drive #

Making a Dedicated Hot Spare

Before You Begin

You must log in with admin privileges to perform this task.

Procedure

This example shows how to make physical drive 3 a dedicated hot spare for virtual drive 6:

Server# scope chassis

Server /chassis # scope storageadapter SLOT-3

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Making a Global Hot Spare

Server /chassis/storageadapter # scope physical-drive 3

Server /chassis/storageadapter/physical-drive # make-dedicated-hot-spare

5:VD_OS_1, RAID 0, 102400 MB, physical disks: 1

6:VD_OS_2, RAID 0, 12288 MB, physical disks: 1

7:VD_OS_3, RAID 0, 12288 MB, physical disks: 1

8:VD_DATA_1, RAID 0, 12512 MB, physical disks: 1

9:RAID1_2358, RAID 1, 40000 MB, physical disks: 2,3,5,8

11:JFB_RAID1_67, RAID 1, 20000 MB, physical disks: 6,7

12:JFB_Crv_R1_40, RAID 1, 40000 MB, physical disks: 6,7

13:JFB_R1_10GB, RAID 1, 10000 MB, physical disks: 6,7

Please choose from the above 8 virtual drives-->6

Server /chassis/storageadapter/physical-drive #

Making a Global Hot Spare

Before You Begin

You must log in with admin privileges to perform this task.

Procedure

This example shows how to make physical drive 3 a global hot spare:

Server# scope chassis

Server /chassis # scope storageadapter SLOT-3

Server /chassis/storageadapter # scope physical-drive 3

Server /chassis/storageadapter/physical-drive # make-global-hot-spare

Server /chassis/storageadapter/physical-drive #

Preparing a Drive for Removal

You can confirm this task only on physical drives that display the Unconfigured Good status.

Before You Begin

You must log in with admin privileges to perform this task.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Removing a Drive from Hot Spare Pools

Procedure

This example shows how to prepare physical drive 3 for removal.

Server# scope chassis

Server /chassis # scope storageadapter SLOT-3

Server /chassis/storageadapter # scope physical-drive 3

Server /chassis/storageadapter/physical-drive # prepare-for-removal

Server /chassis/storageadapter/physical-drive #

Removing a Drive from Hot Spare Pools

Before You Begin

You must log in with admin privileges to perform this task.

Procedure

This example shows how to remove physical drive 3 from the hot spare pools:

Server# scope chassis

Server /chassis # scope storageadapter SLOT-3

Server /chassis/storageadapter # scope physical-drive 3

Server /chassis/storageadapter/physical-drive # remove-hot-spare

Server /chassis/storageadapter/physical-drive #

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Undo Preparing a Drive for Removal

Undo Preparing a Drive for Removal

Before You Begin

You must log in with admin privileges to perform this task.

Procedure

This example shows how to respin physical drive 3 after preparing the drive for removal.

Server# scope chassis

Server /chassis # scope storageadapter SLOT-3

Server /chassis/storageadapter # scope physical-drive 3

Server /chassis/storageadapter/physical-drive # undo-prepare-for-removal

Server /chassis/storageadapter/physical-drive #

Enabling Auto Learn Cycles for the Battery Backup Unit

Before You Begin

You must log in with admin privileges to perform this task.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Disabling Auto Learn Cycles for the Battery Backup Unit

This example shows how to enable the battery auto-learn cycles:

Server # scope chassis

Server /chassis # scope storageadapter SLOT-2

Server /chassis/storageadapter # scope bbu

Server /chassis/storageadapter/bbu # enable-auto-learn

Automatic BBU learn cycles will occur without notice if enabled. Are you sure? [y/n] --> y

enable-auto-learn initiated

Server /chassis/storageadapter/bbu #

Disabling Auto Learn Cycles for the Battery Backup Unit

Before You Begin

You must log in with admin privileges to perform this task.

Procedure

This example shows how to disables the battery auto-learn cycles:

Server # scope chassis

Server /chassis # scope storageadapter SLOT-2

Server /chassis/storageadapter # scope bbu

Server /chassis/storageadapter/bbu # disable-auto-learn Automatic BBU learn cycles will no longer occur if disabled. Are you sure? [y/n] --> y

disable-auto-learn initiated

Server /chassis/storageadapter/bbu #

Starting a Learn Cycle for a Battery Backup Unit

Before You Begin

You must be logged in as an admin to use this command.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Toggling the Locator LED for a Physical Drive

Procedure

This example shows how to initiate the learn cycles for a battery:

Server # scope chassis

Server /chassis # scope storageadapter SLOT-2

Server /chassis/storageadapter # scope bbu

Server /chassis/storageadapter/bbu # start-learn-cycle

Server /chassis/storageadapter/bbu #

Toggling the Locator LED for a Physical Drive

Before You Begin

You must be logged in as an admin to perform this task.

Procedure

This example shows how to enable the locator LED for physical drive 3:

Server # scope chassis

Server /chassis # scope storageadapter SLOT-2

Server /chassis/storageadapter # scope physical-drive 3

Server /chassis/storageadapter/physical-drive # locator-led on

Server /chassis/storageadapter/physical-drive* # commit

Server /chassis/storageadapter/physical-drive #

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Viewing Storage Controller Logs

Viewing Storage Controller Logs

Before You Begin

You must log in with admin privileges to perform this task.

Procedure

This example shows how to display storage controller logs:

Server # scope chassis

Server /chassis # scope storageadapter SLOT-3

Server /chassis/storageadapter # show log

Server /chassis/storageadapter #

Backing Up and Restoring the Adapter Configuration

Exporting the Adapter Configuration

The adapter configuration can be exported as an XML file to a TFTP server.

Important If any firmware or BIOS updates are in progress, do not export the adapter configuration until those tasks are complete.

Before You Begin

A supported Virtual Interface Card (VIC) must be installed in the chassis and the server must be powered on. Obtain the TFTP server IP address.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Importing the Adapter Configuration

Procedure

This example exports the configuration of adapter 1:

Importing the Adapter Configuration

Important If any firmware or BIOS updates are in progress, do not import the adapter configuration until those tasks are complete.

Before You Begin

You must log in with admin privileges to perform this task.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Restoring Adapter Defaults

This example imports a configuration for the adapter in PCI slot 1:

Server# scope chassis

Server /chassis # scope adapter 1

Server /chassis/adapter # import-vnic 192.0.2.34 /ucs/backups/adapter4.xml

Import succeeded.

New VNIC adapter settings will take effect upon the next server reset.

Server /chassis/adapter #

What to Do Next

Reboot the server to apply the imported configuration.

Restoring Adapter Defaults

Before You Begin

You must log in with admin privileges to perform this task.

Procedure

This example restores the default configuration of the adapter in PCI slot 1:

Server# scope chassis

Server /chassis # adapter-reset-defaults 1

This operation will reset the adapter to factory default.

All your configuration will be lost.

Continue?[y|N] y

Server /chassis #

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Managing Adapter Firmware

Managing Adapter Firmware

Adapter Firmware

A Cisco UCS C-Series network adapter contains the following firmware components:

???Adapter firmware???The main operating firmware, consisting of an active and a backup image, can be installed from the CIMC GUI or CLI interface or from the Host Upgrade Utility (HUU). You can upload a firmware image from either a local file system or a TFTP server.

???Bootloader firmware???The bootloader firmware cannot be installed from the CIMC GUI or CLI. You can install this firmware using the Host Upgrade Utility.

Installing Adapter Firmware

Important If any firmware or BIOS updates are in progress, do not install the adapter firmware until those tasks are complete.

Before You Begin

You must log in with admin privileges to perform this task.

Procedure

This example begins an adapter firmware upgrade on the adapter in PCI slot 1:

Server# scope chassis

Server /chassis # update-adapter-fw 192.0.2.34 /ucs/adapters/adapter4.bin activate 1

Server /chassis #

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Activating Adapter Firmware

What to Do Next

To activate the new firmware, see Activating Adapter Firmware, on page 131.

Activating Adapter Firmware

Important While the activation is in progress, do not:

???Reset, power off, or shut down the server.

???Reboot or reset CIMC.

???Activate any other firmware.

???Export technical support or configuration data.

Before You Begin

You must log in with admin privileges to perform this task.

Procedure

This example activates adapter firmware image 2 on the adapter in PCI slot 1:

Server# scope chassis

Server /chassis # activate-adapter-fw 1 2

Firmware image activation suceeded

Please reset the server to run the activated image

Server /chassis #

What to Do Next

Reboot the server to apply the changes.

Resetting the Adapter

Before You Begin

You must log in with admin privileges to perform this task.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Network Adapters

Resetting the Adapter

Procedure

This example resets the adapter in PCI slot 1:

Server# scope chassis

Server /chassis # adapter-reset 1

This operation will reset the adapter and the host if it is on.

You may lose connectivity to the CIMC and may have to log in again.

Continue?[y|N] y

Server /chassis #

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

C H A P T E R 10

Configuring Communication Services

This chapter includes the following sections:

Configuring HTTP

Before You Begin

You must log in as a user with admin privileges to configure HTTP.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Configuring Communication Services

Configuring SSH

This example configures HTTP for the CIMC:

Server /http #

Configuring SSH

Before You Begin

You must log in as a user with admin privileges to configure SSH.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Configuring Communication Services

Configuring XML API

This example configures SSH for the CIMC:

Server /ssh #

Configuring XML API

XML API for CIMC

The Cisco CIMC XML application programming interface (API) is a programmatic interface to CIMC for a C-Series Rack-Mount Server. The API accepts XML documents through HTTP or HTTPS.

For detailed information about the XML API, see Cisco UCS Rack-Mount Servers CIMC XML API

Programmer???s Guide.

Enabling XML API

Before You Begin

You must log in as a user with admin privileges to perform this task.

Procedure

This example enables XML API control of CIMC and commits the transaction:

Server# scope xmlapi

Server /xmlapi # set enabled yes

Server /xmlapi *# commit

Server /xmlapi # show detail

XMLAPI Settings:

Enabled: yes

Active Sessions: 0

Max Sessions: 4

Server /xmlapi #

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Configuring Communication Services

Configuring IPMI

Configuring IPMI

IPMI Over LAN

Intelligent Platform Management Interface (IPMI) defines the protocols for interfacing with a service processor embedded in a server platform. This service processor is called a Baseboard Management Controller (BMC) and resides on the server motherboard. The BMC links to a main processor and other on-board elements using a simple serial bus.

During normal operations, IPMI lets a server operating system obtain information about system health and control system hardware. For example, IPMI enables the monitoring of sensors, such as temperature, fan speeds and voltages, for proactive problem detection. If server temperature rises above specified levels, the server operating system can direct the BMC to increase fan speed or reduce processor speed to address the problem.

Configuring IPMI over LAN

Configure IPMI over LAN when you want to manage the CIMC with IPMI messages.

Before You Begin

You must log in with admin privileges to perform this task.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Configuring Communication Services

Configuring SNMP

This example configures IPMI over LAN for the CIMC:

Server# scope ipmi

Server /ipmi # set enabled yes

Server /ipmi *# set privilege-level admin

Server /ipmi *# set encryption-key abcdef01234567890abcdef01234567890abcdef

Server /ipmi #

Configuring SNMP

SNMP

The Cisco UCS C-Series Rack-Mount Servers support the Simple Network Management Protocol (SNMP) for viewing server configuration and status and for sending fault and alert information by SNMP traps. For information on Management Information Base (MIB) files supported by CIMC, see the MIB Quick Reference for Cisco UCS at this URL: http://www.cisco.com/en/US/docs/unified_computing/ucs/sw/mib/reference/UCS_ MIBRef.html.

Configuring SNMP Properties

Before You Begin

You must log in as a user with admin privileges to perform this task.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Configuring Communication Services

Configuring SNMP Properties

This example configures the SNMP properties and commits the transaction:

Server# scope snmp

Server /snmp # set enabled yes

Server /snmp *# commit

Server /snmp # set community-str cimcpublic

Server /snmp # set community-access Full

Server /snmp # set trap-community-str public

Server /snmp *# set sys-contact "User Name <username@example.com> +1-408-555-1212"

Server /snmp *# set sys-location "San Jose, California"

Server /snmp *# commit

Server /snmp # show detail

SNMP Settings:

SNMP Port: 161

System Contact: User Name <username@example.com> +1-408-555-1212

System Location: San Jose, California

SNMP Community: cimcpublic

SNMP Trap community: public

SNMP Community access: Full

Enabled: yes

Server /snmp #

What to Do Next

Configure SNMP trap settings as described in Configuring SNMP Trap Settings, on page 139.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Configuring Communication Services

Configuring SNMP Trap Settings

Configuring SNMP Trap Settings

Before You Begin

???You must log in with admin privileges to perform this task.

???SNMP must be enabled and saved before trap settings can be configured.

Procedure

This example configures general SNMP trap settings and trap destination number 1 and commits the transaction:

Server# scope snmp

Server /snmp # Scope trap-destinations 1

Server /snmp/trap-destination *# set enabled yes

Server /snmp/trap-destination *# set version 2

Server /snmp/trap-destination *# set type inform

Server /snmp/trap-destination *# set user user1

Server /snmp/trap-destination *# set v4-addr 192.2.3.4

Server /snmp/trap-destination *# commit

Server /snmp/trap-destination # show detail

Trap Destination 1:

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Configuring Communication Services

Sending a Test SNMP Trap Message

Enabled: yes

SNMP version: 2

Trap type: inform

SNMP user: user1

IPv4 Address: 192.2.3.4

Delete Trap: no

Server /snmp/trap-destination #

Sending a Test SNMP Trap Message

Before You Begin

You must log in with admin privileges to perform this task.

Procedure

This example sends a test message to all the enabled SNMP trap destinations:

Server# scope snmp

Server /snmp # sendSNMPtrap

SNMP Test Trap sent to the destination.

Server /snmp #

Configuring SNMPv3 Users

Before You Begin

???You must log in as a user with admin privileges to perform this task.

???SNMP must be enabled and saved before these configuration commands are accepted.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Configuring Communication Services

Configuring SNMPv3 Users

This example configures SNMPv3 user number 2 and commits the transaction:

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Configuring Communication Services

Configuring SNMPv3 Users

Please enter v3priv-auth-key:!1@2#3$4%5^6&7*8

Please confirm v3priv-auth-key:!1@2#3$4%5^6&7*8

Server /snmp/v3users *# commit

Settings are being applied ... allow a few minutes for the process to complete

Server /snmp/v3users # show detail

User 2:

Add User: yes

Security Name: ucsSNMPV3user

Security Level: authpriv

Auth Type: SHA

Auth Key: ******

Encryption: AES

Private Key: ******

Server /snmp/v3users #

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

C H A P T E R 11

Managing Certificates

This chapter includes the following sections:

??? Managing the Server Certificate, page 143

??? Generating a Certificate Signing Request, page 143

??? Creating a Self-Signed Certificate, page 145

??? Uploading a Server Certificate, page 147

Managing the Server Certificate

You can generate a certificate signing request (CSR) to obtain a new certificate, and you can upload the new certificate to the CIMC to replace the current server certificate. The server certificate may be signed either by a public Certificate Authority (CA), such as Verisign, or by your own certificate authority.

Procedure

Step 1 Generate the CSR from the CIMC.

Step 2 Submit the CSR file to a certificate authority that will issue and sign your certificate. If your organization generates its own self-signed certificates, you can use the CSR file to generate a self-signed certificate.

Step 3 Upload the new certificate to the CIMC.

Note The uploaded certificate must be created from a CSR generated by the CIMC. Do not upload a certificate that was not created by this method.

Generating a Certificate Signing Request

Before You Begin

You must log in as a user with admin privileges to configure certificates.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Certificates

Generating a Certificate Signing Request

Procedure

You will be prompted to enter the following information for the certificate signing request:

After you have entered the requested information, the system will generate and display a certificate signing request in the console output. A CSR file will not be created, but you can copy the CSR information from the console output and paste the information into a text file.

This example generates a certificate signing request:

Server# scope certificate

Server /certificate # generate-csr

Common Name (CN): test.example.com

Organization Name (O): Example, Inc.

Organization Unit (OU): Test Department

Locality (L): San Jose

StateName (S): CA

Country Code (CC): US

Email: user@example.com

Continue to generate CSR?[y|N]y

-----BEGIN CERTIFICATE REQUEST-----

MIIB/zCCAWgCAQAwgZkxCzAJBgNVBAYTAlVTMQswCQYDVQQIEwJDQTEVMBMGA1UE

BxMMU2FuIEpvc2UsIENBMRUwEwYDVQQKEwxFeGFtcGxlIEluYy4xEzARBgNVBAsT

ClRlc3QgR3JvdXAxGTAXBgNVBAMTEHRlc3QuZXhhbXBsZS5jb20xHzAdBgkqhkiG

9w0BCQEWEHVzZXJAZXhhbXBsZS5jb20wgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJ

AoGBAMZw4nTepNIDhVzb0j7Z2Je4xAG56zmSHRMQeOGHemdh66u2/XAoLx7YCcYU

ZgAMivyCsKgb/6CjQtsofvzxmC/eAehuK3/SINv7wd6Vv2pBt6ZpXgD4VBNKONDl

GMbkPayVlQjbG4MD2dx2+H8EH3LMtdZrgKvPxPTE+bF5wZVNAgMBAAGgJTAjBgkq

hkiG9w0BCQcxFhMUQSBjaGFsbGVuZ2UgcGFzc3dvcmQwDQYJKoZIhvcNAQEFBQAD

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Certificates

Creating a Self-Signed Certificate

gYEAG61CaJoJaVMhzCl903O6Mg51zq1zXcz75+VFj2I6rH9asckCld3mkOVx5gJU

Ptt5CVQpNgNLdvbDPSsXretysOhqHmp9+CLv8FDuy1CDYfuaLtvlWvfhevskV0j6

mK3Ku+YiORnv6DhxrOoqau8r/hyI/L43l7IPN1HhOi3oha4=

-----END CERTIFICATE REQUEST-----

Copy everything from "-----BEGIN ..." to "END CERTIFICATE REQUEST-----", paste to a file, send to your chosen CA for signing,

and finally upload the signed certificate via upload command.

---OR---

Continue to self sign CSR and overwrite the current certificate? All HTTPS and SSH sessions will be disconnected. [y|N]N

What to Do Next

Perform one of the following tasks:

???If you do not want to obtain a certificate from a public certificate authority, and if your organization does not operate its own certificate authority, you can allow CIMC to internally generate a self-signed certificate from the CSR and upload it immediately to the server. Type y after the final prompt in the example to perform this action.

???If your organization operates its own certificate server for generating self-signed certificates, copy the command output from "-----BEGIN ..." to "END CERTIFICATE REQUEST-----" and paste to a file named csr.txt. Input the CSR file to your certificate server to generate a self-signed certificate.

???If you will obtain a certificate from a public certificate authority, copy the command output from "-----BEGIN ..." to "END CERTIFICATE REQUEST-----" and paste to a file named csr.txt. Submit the CSR file to the certificate authority to obtain a signed certificate.

If you did not use the first option, in which CIMC internally generates and uploads a self-signed certificate, you must upload the new certificate using the upload command in certificate command mode.

Creating a Self-Signed Certificate

As an alternative to using a public Certificate Authority (CA) to generate and sign a server certificate, you can operate your own CA and sign your own certificates. This section shows commands for creating a CA and generating a server certificate using the OpenSSL certificate server running on Linux. For detailed information about OpenSSL, see http://www.openssl.org.

Note These commands are to be entered on a Linux server with the OpenSSL package, not in the CIMC CLI.

Before You Begin

Obtain and install a certificate server software package on a server within your organization.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Certificates

Creating a Self-Signed Certificate

Procedure

This example shows how to create a CA and to generate a server certificate signed by the new CA. These commands are entered on a Linux server running OpenSSL.

# /usr/bin/openssl genrsa -out ca.key 1024

Generating RSA private key, 1024 bit long modulus

.............++++++

.....++++++

e is 65537 (0x10001)

# /usr/bin/openssl req -new -x509 -days 365 -key ca.key -out ca.crt

You are about to be asked to enter information that will be incorporated into your certificate request.

What you are about to enter is what is called a Distinguished Name or a DN.

There are quite a few fields but you can leave some blank For some fields there will be a default value,

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Certificates

Uploading a Server Certificate

If you enter '.', the field will be left blank.

-----

Country Name (2 letter code) [GB]:US

State or Province Name (full name) [Berkshire]:California

Locality Name (eg, city) [Newbury]:San Jose

Organization Name (eg, company) [My Company Ltd]:Example Incorporated

Organizational Unit Name (eg, section) []:Unit A

Common Name (eg, your name or your server's hostname) []:example.com

Email Address []:admin@example.com

#echo "nsCertType = server" > openssl.conf

#/usr/bin/openssl x509 -req -days 365 -in csr.txt -CA ca.crt -set_serial 01 -CAkey ca.key -out server.crt -extfile openssl.conf

Signature ok

subject=/C=US/ST=California/L=San Jose/O=Example Inc./OU=Unit A/CN=example.com/emailAddress=john@example.com

Getting CA Private Key

What to Do Next

Upload the new certificate to the CIMC.

Uploading a Server Certificate

Before You Begin

You must log in as a user with admin privileges to upload a certificate.

The certificate to be uploaded must be available as readable text. During the upload procedure, you will copy the certificate text and paste it into the CLI.

Note You must first generate a CSR using the CIMC certificate management CSR generation procedure, and you must use that CSR to obtain the certificate for uploading. Do not upload a certificate that was not obtained by this method.

Note All current HTTPS and SSH sessions are disconnected when the new server certificate is uploaded.

Procedure

Copy the certificate text, paste it into the console when prompted, and type CTRL+D to upload the certificate.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Managing Certificates

Uploading a Server Certificate

This example uploads a new certificate to the server:

Server# scope certificate

Server /certificate # upload

Please paste your certificate here, when finished, press CTRL+D.

-----BEGIN CERTIFICATE-----

MIIB/zCCAWgCAQAwgZkxCzAJBgNVBAYTAlVTMQswCQYDVQQIEwJDQTEVMBMGA1UE

BxMMU2FuIEpvc2UsIENBMRUwEwYDVQQKEwxFeGFtcGxlIEluYy4xEzARBgNVBAsT

ClRlc3QgR3JvdXAxGTAXBgNVBAMTEHRlc3QuZXhhbXBsZS5jb20xHzAdBgkqhkiG

9w0BCQEWEHVzZXJAZXhhbXBsZS5jb20wgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJ

AoGBAMZw4nTepNIDhVzb0j7Z2Je4xAG56zmSHRMQeOGHemdh66u2/XAoLx7YCcYU

ZgAMivyCsKgb/6CjQtsofvzxmC/eAehuK3/SINv7wd6Vv2pBt6ZpXgD4VBNKONDl

GMbkPayVlQjbG4MD2dx2+H8EH3LMtdZrgKvPxPTE+bF5wZVNAgMBAAGgJTAjBgkq

hkiG9w0BCQcxFhMUQSBjaGFsbGVuZ2UgcGFzc3dvcmQwDQYJKoZIhvcNAQEFBQAD

gYEAG61CaJoJaVMhzCl903O6Mg51zq1zXcz75+VFj2I6rH9asckCld3mkOVx5gJU

Ptt5CVQpNgNLdvbDPSsXretysOhqHmp9+CLv8FDuy1CDYfuaLtvlWvfhevskV0j6

mK3Ku+YiORnv6DhxrOoqau8r/hyI/L43l7IPN1HhOi3oha4=

-----END CERTIFICATE-----

<CTRL+D>

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

C H A P T E R 12

Configuring Platform Event Filters

This chapter includes the following sections:

??? Platform Event Filters, page 149

??? Enabling Platform Event Alerts, page 149

??? Disabling Platform Event Alerts, page 150

??? Configuring Platform Event Filters, page 150

??? Configuring Platform Event Trap Settings, page 152

??? Interpreting Platform Event Traps, page 153

Platform Event Filters

A platform event filter (PEF) can trigger an action and generate an alert when a critical hardware-related event occurs. For each PEF, you can choose the action to be taken (or take no action) when a platform event occurs. You can also choose to generate and send an alert when a platform event occurs. Alerts are sent as an SNMP trap, so you must configure an SNMP trap destination before the alerts can be sent.

You can globally enable or disable the generation of platform event alerts. When disabled, alerts are not sent even if PEFs are configured to send them.

Enabling Platform Event Alerts

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Configuring Platform Event Filters

Disabling Platform Event Alerts

The following example enables platform event alerts:

Disabling Platform Event Alerts

Procedure

The following example disables platform event alerts:

Configuring Platform Event Filters

You can configure actions and alerts for the following platform event filters:

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Configuring Platform Event Filters

Configuring Platform Event Filters

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Configuring Platform Event Filters

Configuring Platform Event Trap Settings

This example configures the platform event alert for an event:

Server /fault/pef #

What to Do Next

If you configure any PEFs to send an alert, enable platform event alerts.

Configuring Platform Event Trap Settings

Before You Begin

You must log in with admin privileges to perform this task.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Configuring Platform Event Filters

Interpreting Platform Event Traps

This example configures general platform event trap settings and trap destination number 1 and commits the transaction:

Interpreting Platform Event Traps

A CIMC platform event alert contains an enterprise object identifier (OID) in the form 1.3.6.1.4.1.3183.1.1.0.event. The first ten fields of the OID represent the following information:

iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).wired_for_management(3183).PET(1).version(1).version(0),

indicating an IPMI platform event trap (PET) version 1.0 message. The last field is an event number, indicating the specific condition or alert being notified.

Platform Event Trap Descriptions

The following table provides a description of the event being notified in a platform event trap message, based on the event number in the trap OID.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Configuring Platform Event Filters

Interpreting Platform Event Traps

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Configuring Platform Event Filters

Interpreting Platform Event Traps

Note 1: Basic information about the event number format can be found in the IPMI Platform Event Trap

Format Specification v1.0 at this URL: ftp://download.intel.com/design/servers/ipmi/pet100.pdf.

Note 2: Some platforms and releases use generic sensor implementations, while some use Cisco proprietary sensor implementations.

Note 3: In Release 1.3(1) and later releases, the ECC sensor no longer activates the LED.

Note 4: When the event filter is set to accept all reading types, bits 15:8 of the hex event number are masked to 0. For example, event number 786689 (0C0101h) becomes 786433 (0C0001h).

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Configuring Platform Event Filters

Interpreting Platform Event Traps

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

C H A P T E R 13

CIMC Firmware Management

This chapter includes the following sections:

??? Overview of Firmware, page 157

??? Obtaining Firmware from Cisco, page 158

??? Installing CIMC Firmware from a Remote Server, page 159

??? Activating Installed CIMC Firmware, page 160

??? Installing BIOS Firmware from a Remote Server, page 162

Overview of Firmware

C-Series servers use Cisco-certified firmware specific to the C-Series server model that you are using. You can download new releases of the firmware for all supported server models from Cisco.com.

Caution When you install new BIOS firmware, it must be from the same software release as the CIMC firmware running on the server. Do not install new BIOS firmware until after you have activated the matching CIMC firmware or the server will not boot.

To avoid potential problems, we strongly recommend that you use the Cisco Host Upgrade Utility (HUU), which upgrades the BIOS, CIMC, and other firmware to compatible levels. For detailed information about this utility, see the Cisco Host Upgrade Utility Guide for the version of the HUU that goes with the CIMC software release that you want to install. The HUU guides are available at the following URL: http:// www.cisco.com/en/US/products/ps10493/products_user_guide_list.html.

If you elect to update the firmware manually, you must update the CIMC firmware first. The CIMC firmware update process is divided into the following stages to minimize the amount of time the server will be offline:

???Installation. During this stage, CIMC installs the selected CIMC firmware in the non-active, or backup, slot on the server.

???Activation. During this stage, CIMC sets the non-active firmware version as active and reboots the server, causing a disruption in service. When the server reboots, the firmware in the new active slot becomes the running version.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

CIMC Firmware Management

Obtaining Firmware from Cisco

After you activate the CIMC firmware, you can update the BIOS firmware. The server must be powered off during the entire BIOS update process, so the process is not divided into stages. Instead, you only need to issue a single command and CIMC installs and updates the BIOS firmware as quickly as possible. Once the CIMC finishes rebooting, the server can be powered on and returned to service.

Note You can either upgrade an older firmware version to a newer one, or downgrade a newer firmware version to an older one.

Obtaining Firmware from Cisco

Procedure

Step 1 Navigate to http://www.cisco.com/.

Step 2 If you are not already logged in, click Log In at the top right-hand edge of the page and log in using your Cisco.com credentials.

Step 3 In the menu bar at the top, click Support.

Step 4 Click All Downloads in the roll down menu.

Step 5 If your server model is listed in the Recently Used Products list, click the server name. Otherwise, do the following:

a)In the left-hand box, click Products.

b)In the center box, click Unified Computing and Servers.

c)In the right-hand box, click Cisco UCS C-Series Rack-Mount Standalone Server Software.

d)In the right-hand box, click the server model whose software you want to download.

Step 6 Click the Unified Computing System (UCS) Server Firmware link.

Step 7 (Optional) Select a prior release from the menu bar on the left-hand side of the page.

Step 8 Click the Download button associated with the Cisco Host Upgrade Utility ISO for the selected release.

Step 9 Click Accept License Agreement.

Step 10 Save the ISO file to a local drive.

We recommend you upgrade the CIMC and BIOS firmware on your server using this ISO file, which contains the Cisco Host Upgrade Utility. For detailed information about this utility, see the Cisco Host Upgrade Utility Guide for the version of the HUU that goes with the CIMC software release that you want to install. The HUU guides are available at the following URL: http://www.cisco.com/en/US/products/ps10493/products_user_ guide_list.html.

Step 11 (Optional) If you plan to upgrade the CIMC and BIOS firmware manually, do the following:

a)From the ISO file, open the ZIP file containing the firmware installation files. The ZIP file is on the top-level of the ISO file, and its name follows the format

ServerModel_ReleaseNumber.ZIP. For example, C240M3_1.4.4A.ZIP.

You do not need to extract all of the files contained in this ZIP file. Instead, you only need to open it so that you can access the BIOS firmware installation CAP file and the ZIP file containing the CIMC firmware installation BIN file.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

CIMC Firmware Management

Installing CIMC Firmware from a Remote Server

b)From the ServerModel_ReleaseNumber.ZIP file, extract the BIOS firmware installation CAP file and save it to your local drive.

The CAP file is in the ReleaseNumber/bios/cimc folder, and its name follows the format

Server-BIOS-Release-Number.CAP.

For example, 1.4.4a/bios/cimc/C240-BIOS-1-4-4c-0.CAP.

c)From the ServerModel_ReleaseNumber.ZIP file, open the ZIP file containing the CIMC firmware installation files.

The ZIP file is in the ReleaseNumber/cimc folder and its name follows the format server-model-cimc-release.zip.

For example, 1.4.4a/cimc/c240-m3-cimc.1.4.4a.zip.

You do not need to extract all of the files contained in this zip file. Instead, you only need to open it so that you can access the CIMC firmware installation BIN file.

d)From the server-model-cimc-release.zip file, extract the full CIMC firmware installation BIN file and save it to your local drive.

The BIN file is in the server-model-cimc-release folder and its name follows the format upd-pkg-server-model-cimc.full.release.bin.

For example, c240-m3-cimc.1.4.4a/upd-pkg-c240-m3-cimc.full.1.4.4a.bin.

Step 12 (Optional) If you plan to install the firmware from a remote server, copy the BIOS installation CAP file and the CIMC installation BIN file to the remote server you want to use.

The remote server can be one of the following:

???TFTP

???FTP

???SFTP

???SCP

???HTTP

The server must have read permission for the destination folder on the remote server.

What to Do Next

Use the Cisco Host Upgrade Utility to upgrade all firmware on the server or manually install the CIMC firmware on the server.

Installing CIMC Firmware from a Remote Server

Before You Begin

???Log in to the as a user with admin privileges.

???Obtain the Cisco Host Upgrade Utility ISO file from Cisco.com and extract the firmware installation files as described in Obtaining Firmware from Cisco, on page 158.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

CIMC Firmware Management

Activating Installed CIMC Firmware

Note If you start an update while an update is already in process, both updates will fail.

Procedure

This example updates the CIMC firmware:

Server# scope cimc

Server /cimc # scope firmware

Server /cimc/firmware # update ftp 192.0.20.34 //test/dnld-ucs-k9-bundle.1.0.2h.bin

<CR> Press Enter key Firmware update has started.

Please check the status using "show detail" Server /cimc/firmware #

What to Do Next

Activate the new firmware.

Activating Installed CIMC Firmware

Before You Begin

Install the CIMC firmware on the server.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

CIMC Firmware Management

Activating Installed CIMC Firmware

Important While the activation is in progress, do not:

???Reset, power off, or shut down the server.

???Reboot or reset CIMC.

???Activate any other firmware.

???Export technical support or configuration data.

Procedure

This example activates firmware image 1 and then verifies the activation after the BMC reboots:

Server# scope cimc

Server /cimc # scope firmware

Server /cimc/firmware # show detail

Firmware Image Information:

Update Stage: NONE

Update Progress: 100

Current FW Version: 1.3(3a)

FW Image 1 Version: 1.4(3j)

FW Image 1 State: BACKUP INACTIVATED

FW Image 2 Version: 1.3(3a)

FW Image 2 State: RUNNING ACTIVATED

Boot-loader Version: 1.4(3.21).18

Server /cimc/firmware # activate 1

This operation will activate firmware 1 and reboot the BMC. Continue?[y|N]y

.

.

-- BMC reboot --

.

.

-- Log into CLI as Admin --

Server# scope cimc

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

CIMC Firmware Management

Installing BIOS Firmware from a Remote Server

Server /cimc # scope firmware

Server /cimc/firmware # show detail

Firmware Image Information:

Update Stage: NONE

Update Progress: 100

Current FW Version: 1.4(3j)

FW Image 1 Version: 1.4(3j)

FW Image 1 State: RUNNING ACTIVATED

FW Image 2 Version: 1.3(3a)

FW Image 2 State: BACKUP INACTIVATED

Boot-loader Version: 1.4(3.21).18

Installing BIOS Firmware from a Remote Server

Note This procedure is not available on some servers. For other BIOS installation methods, see the Cisco UCS C-Series Rack-Mount Server BIOS Upgrade Guide available at the following URL: http://www.cisco.com/ en/US/docs/unified_computing/ucs/c/sw/bios/b_Upgrading_BIOS_Firmware.html.

Before You Begin

???Log in to the as a user with admin privileges.

???Activate the CIMC firmware that goes with the BIOS version you want to install, as described in .

???Power off the server.

Note If you start an update while an update is already in process, both updates will fail.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

CIMC Firmware Management

Installing BIOS Firmware from a Remote Server

This example updates the BIOS firmware to CIMC software release 1.4(3j):

Server# scope cimc

Server /cimc # scope firmware

Server /cimc/firmware # show detail

Firmware Image Information:

Update Stage: NONE

Update Progress: 100

Current FW Version: 1.4(3j)

FW Image 1 Version: 1.4(3j)

FW Image 1 State: RUNNING ACTIVATED

FW Image 2 Version: 1.3(3a)

FW Image 2 State: BACKUP INACTIVATED

Boot-loader Version: 1.4(3.21).18

Server /cimc/firmware # top

Server # scope bios

Server /bios # update ftp 192.0.20.34 //upgrade_bios_files/C260-BIOS-1-4-3j-0.CAP

<CR> Press Enter key Firmware update has started.

Please check the status using "show detail" Server /bios #

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

CIMC Firmware Management

Installing BIOS Firmware from a Remote Server

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

C H A P T E R 14

Viewing Logs

This chapter includes the following sections:

Viewing the Faults and Logs Summary

Procedure

This example displays a summary of faults:

Server /fault #

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Viewing Logs

CIMC Log

CIMC Log

Viewing the CIMC Log

Procedure

This example displays the log of CIMC events:

------------------- ------------- ---------------- ----------------------------------------

2012 Jan 30 05:20:45 Informational BMC:ciscoNET:961 " rpc_aim_callback_function_1_svc() - result == SUCCESS, callbackData size: 600 "

2012 Jan 30 05:20:45 Informational BMC:ciscoNET:961 rpc_aim_callback_function_1_svc() - returned from pFunctionCallback result:0

2012 Jan 30 05:20:45 Informational BMC:ciscoNET:961 " rpc_aim_callback_function_1_svc() - szFunctionName:netGetCurrentIfConfig nSize:0 nMaxSize: 600 "

--More--

Server /cimc/log # show entries detail

Trace Log:

Time: 2012 Jan 30 05:20:45

Severity: Informational

Source: BMC:ciscoNET:961

Description: " rpc_aim_callback_function_1_svc() - result == SUCCESS, callbackData size: 600 "

Order: 0 Trace Log:

Time: 2012 Jan 30 05:20:45

Severity: Informational

Source: BMC:ciscoNET:961

Description: rpc_aim_callback_function_1_svc() - returned from pFunctionCallback result:0

Order: 1 Trace Log:

Time: 2012 Jan 30 05:20:45

Severity: Informational

Source: BMC:ciscoNET:961

Description: " rpc_aim_callback_function_1_svc() - szFunctionName:netGetCurrentIfConfig nSize:0 nMaxSize: 600 "

Order: 2 --More--

Server /cimc/log #

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Viewing Logs

Clearing the CIMC Log

Clearing the CIMC Log

Procedure

The following example clears the log of CIMC events:

Server# scope cimc

Server /cimc # scope log

Server /cimc/log # clear

Configuring the CIMC Log Threshold

You can specify the lowest level of messages that will be included in the CIMC log.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Viewing Logs

Sending the CIMC Log to a Remote Server

This example shows how to configure the logging of messages with a minimum severity of Warning:

Server# scope cimc

Server /cimc # scope log

Sending the CIMC Log to a Remote Server

You can configure profiles for one or two remote syslog servers to receive CIMC log entries.

Before You Begin

???The remote syslog server must be configured to receive logs from a remote host.

???The remote syslog server must be configured to receive all types of logs, including authentication-related logs.

???The remote syslog server's firewall must be configured to allow syslog messages to reach the syslog server.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Viewing Logs

Sending the CIMC Log to a Remote Server

This example shows how to configure a remote syslog server profile and enable the sending of CIMC log entries with a minimum severity level of Warning:

Server /cimc/log # show remote-syslog-severity

Remote Syslog Severity: warning

Server /cimc/log #

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Viewing Logs

System Event Log

System Event Log

Viewing the System Event Log

Procedure

This example displays the system event log:

2001-01-01 08:30:15 Informational " LED_PSU_STATUS: Platform sensor, ON event was asserted"

2001-01-01 08:30:15 Informational " LED_HLTH_STATUS: Platform sensor, AMBER was asserted"

2001-01-01 08:30:15 Informational " LED_HLTH_STATUS: Platform sensor, FAST BLINK event was asserted"

2001-01-01 08:30:14 Non-Recoverable " PSU2 PSU2_VOUT: Voltage sensor for PSU2, non-recoverable

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Viewing Logs

Clearing the System Event Log

Clearing the System Event Log

Procedure

This example clears the system event log:

Server# scope sel

Server /sel # clear

This operation will clear the whole sel.

Continue?[y|N]y

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Viewing Logs

Clearing the System Event Log

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

C H A P T E R 15

Server Utilities

This chapter includes the following sections:

??? Exporting Technical Support Data, page 173

??? Rebooting the CIMC, page 175

??? Clearing the BIOS CMOS, page 175

??? Recovering from a Corrupted BIOS, page 176

??? Resetting the CIMC to Factory Defaults, page 177

??? Exporting and Importing the CIMC Configuration, page 178

??? Generating Non maskable Interrupts to the Host, page 180

Exporting Technical Support Data

Perform this task when requested by the Cisco Technical Assistance Center (TAC). This utility creates a summary report containing configuration information, logs and diagnostic data that will help TAC in troubleshooting and resolving a technical issue.

Important If any firmware or BIOS updates are in progress, do not export the technical support data until those tasks are complete.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Server Utilities

Exporting Technical Support Data

This example creates a technical support data file and transfers the file to a TFTP server:

Server# scope cimc

Server /cimc # scope tech-support

Server /cimc/tech-support # set remote-ip 192.0.20.41

Server /cimc/tech-support* # set remote-protocol tftp

Server /cimc/tech-support *# set remote-path /user/user1/default.tar.gz

Server /cimc/tech-support *# commit

Server /cimc/tech-support # start

Tech Support upload started.

Server /cimc/tech-support # show detail

Tech Support:

Server Address: 192.0.20.41

Path: default.tar.gz

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Server Utilities

Rebooting the CIMC

Protocol: tftp

Username:

Password: *******

Progress (%): 5

Status: Collecting

Server /cimc/tech-support #

What to Do Next

Provide the generated report file to Cisco TAC.

Rebooting the CIMC

On rare occasions, such as an issue with the current running firmware, troubleshooting a server may require you to reboot the CIMC. This procedure is not part of the normal maintenance of a server. After you reboot the CIMC, you are logged off and the CIMC will be unavailable for a few minutes.

Note If you reboot the CIMC while the server is performing power-on self test (POST) or is operating in the Extensible Firmware Interface (EFI) shell, the server will be powered down until the CIMC reboot is complete.

Procedure

This example reboots the CIMC:

Server# scope cimc

Server /cimc # reboot

Clearing the BIOS CMOS

On rare occasions, troubleshooting a server may require you to clear the server's BIOS CMOS memory. This procedure is not part of the normal maintenance of a server.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Server Utilities

Recovering from a Corrupted BIOS

This example clears the BIOS CMOS memory:

Server# scope bios

Server /bios # clear-cmos

This operation will clear the BIOS CMOS.

Note: Server should be in powered off state to clear CMOS.

Continue?[y|n] y

Server /bios #

Recovering from a Corrupted BIOS

Note This procedure is not available in some server models.

In addition to this procedure, there are three other methods for recovering from a corrupted BIOS:

???Use the Cisco Host Upgrade Utility (HUU). This is the recommended method.

???Use the CIMC GUI interface.

???If your server model supports it, use the BIOS recovery function of the hardware jumper on the server motherboard. For instructions, see the Cisco UCS Server Installation and Service Guide for your server model.

Before You Begin

???You must be logged in as admin to recover from a corrupted BIOS.

???Have the BIOS recovery ISO image ready. You will find the BIOS recovery ISO image under the Recovery folder of the firmware distribution package.

???Schedule some down time for the server because it will be power cycled at the end of the recovery procedure.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Server Utilities

Resetting the CIMC to Factory Defaults

This example shows how to recover from a corrupted BIOS:

Server# scope bios

Server /bios # recover

This operation will automatically power on the server to perform BIOS FW recovery.

Continue?[y|N]y

What to Do Next

Power cycle or reset the server.

Resetting the CIMC to Factory Defaults

On rare occasions, such as an issue with the current running firmware, troubleshooting a server may require you to reset the CIMC to the factory default. When this happens, all user-configurable settings are reset.

This procedure is not part of the normal server maintenance. After you reset the CIMC, you are logged off and must log in again. You may also lose connectivity and may need to reconfigure the network settings.

Procedure

The CIMC factory defaults include the following conditions:

???SSH is enabled for access to the CIMC CLI. Telnet is disabled.

???HTTPS is enabled for access to the CIMC GUI.

??? A single user account exists (user name is admin , password is password ).

???DHCP is enabled on the management port.

???The boot order is EFI, CDROM, PXE (using LoM), FDD, HDD.

???KVM and vMedia are enabled.

???USB is enabled.

???SoL is disabled.

This example resets the CIMC to factory defaults:

Server# scope cimc

Server /cimc # factory-default

This operation will reset the CIMC configuration to factory default.

All your configuration will be lost.

Continue?[y|N]

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Server Utilities

Exporting and Importing the CIMC Configuration

Exporting and Importing the CIMC Configuration

Exporting and Importing the CIMC Configuration

To perform a backup of the CIMC configuration, you take a snapshot of the system configuration and export the resulting CIMC configuration file to a location on your network. The export operation saves information from the management plane only; it does not back up data on the servers. Sensitive configuration information such as user accounts and the server certificate are not exported.

You can restore an exported CIMC configuration file to the same system or you can import it to another CIMC system, provided that the software version of the importing system is the same as or is configuration-compatible with the software version of the exporting system. When you import a configuration file to another system as a configuration template, you must modify system-specific settings such as IP addresses and host names. An import operation modifies information on the management plane only.

The CIMC configuration file is an XML text file whose structure and elements correspond to the CIMC command modes.

When performing an export or import operation, consider these guidelines:

???You can perform an export or an import while the system is up and running. While an export operation has no impact on the server or network traffic, some modifications caused by an import operation, such as IP address changes, can disrupt traffic or cause a server reboot.

???You cannot execute an export and an import simultaneously.

Exporting the CIMC Configuration

Note For security reasons, this operation does not export user accounts or the server certificate.

Important If any firmware or BIOS updates are in progress, do not export the CIMC configuration until those tasks are complete.

Before You Begin

Obtain the backup remote server IP address.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Server Utilities

Importing a CIMC Configuration

To determine whether the export operation has completed successfully, use the show detail command. To abort the operation, type CTRL+C.

This example shows how to back up the CIMC configuration:

Server# scope cimc

Server /cimc # scope import-export

Server /cimc/import-export # export-config tftp 192.0.2.34 /ucs/backups/cimc5.xml

Export config started. Please check the status using "show detail".

Server /cimc/import-export # show detail

Import Export:

Operation: EXPORT

Status: COMPLETED

Error Code: 100 (No Error)

Diagnostic Message: NONE

Server /cimc/import-export #

Importing a CIMC Configuration

Important If any firmware or BIOS updates are in progress, do not import the CIMC configuration until those tasks are complete.

Before You Begin

If you want to restore the SNMP configuration information when you import the configuration file, make sure that SNMP is disabled on this server before you do the import. If SNMP is enabled when you perform the import, CIMC does not overwrite the current values with those saved in the configuration file.

Procedure

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Server Utilities

Generating Non maskable Interrupts to the Host

To determine whether the import operation has completed successfully, use the show detail command. To abort the operation, type CTRL+C.

This example shows how to import a CIMC configuration:

Server# scope cimc

Server /cimc # scope import-export

Server /cimc/import-export # import-config tftp 192.0.2.34 /ucs/backups/cimc5.xml

Import config started. Please check the status using "show detail".

Server /cimc/import-export #

Generating Non maskable Interrupts to the Host

In some situations, the server might hang and not respond to traditional debug mechanisms. By generating a non maskable interrupt (NMI) to the host, you can create and send a crash dump file of the server and use it to debug the server.

Depending on the type of operating system associated with the server, this task might restart the OS.

Procedure

This example shows how to generate NMI signals to the host:

Server # scope chassis

Server /chassis # generate-nmi

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Server Utilities

Generating Non maskable Interrupts to the Host

This operation will send NMI to the host and may cause reboot of the OS.

OS reboot depends on it's NMI configuration.

Do you want to continue? [y|N] y

Server /chassis #

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

Server Utilities

Generating Non maskable Interrupts to the Host

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

A P P E N D I X A

BIOS Parameters by Server Model

This appendix contains the following sections:

C22 and C24 Servers

Main BIOS Parameters for C22 and C24 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C22 and C24 Servers

Advanced BIOS Parameters for C22 and C24 Servers

Processor Configuration Parameters

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C22 and C24 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C22 and C24 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C22 and C24 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C22 and C24 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C22 and C24 Servers

??? Enabled???The CPU transitions to its minimum frequency. This option saves the maximum amount of power in C1 state.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C22 and C24 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C22 and C24 Servers

Memory Configuration Parameters

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C22 and C24 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C22 and C24 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C22 and C24 Servers

QPI Configuration Parameters

Onboard Storage Parameters

Onboard SCU Storage Support Whether the onboard software RAID controller is available to the server. This can be one of the following:

???Disabled???The software RAID controller is not available.

???Enabled???The software RAID controller is available.

USB Configuration Parameters

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C22 and C24 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C22 and C24 Servers

PCI Configuration Parameters

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C22 and C24 Servers

Serial Configuration Parameters

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C22 and C24 Servers

Redirection After BIOS POST Whether BIOS console redirection should be active after BIOS POST is complete and control given to the OS bootloader. This can be one of the following:

??????BIOS Legacy console redirection is active during the OS boot and run time.

???Bootloader???BIOS Legacy console redirection is disabled before giving control to the OS boot loader.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C22 and C24 Servers

LOM and PCIe Slots Configuration Parameters

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Server Management BIOS Parameters for C22 and C24 Servers

Server Management BIOS Parameters for C22 and C24 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Server Management BIOS Parameters for C22 and C24 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Server Management BIOS Parameters for C22 and C24 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

C220 and C240 Servers

C220 and C240 Servers

Main BIOS Parameters for C220 and C240 Servers

Advanced BIOS Parameters for C220 and C240 Servers

Processor Configuration Parameters

Intel Hyper-Threading Technology Whether the processor uses Intel Hyper-Threading Technology, which allows multithreaded software applications to execute threads in parallel within each processor. This can be one of the following:

??? Disabled???The processor does not permit hyperthreading.

??? Enabled???The processor allows for the parallel execution of multiple threads.

We recommend that you contact your operating system vendor to make sure the operating system supports this feature.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C220 and C240 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C220 and C240 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C220 and C240 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C220 and C240 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C220 and C240 Servers

??? Enabled???The CPU transitions to its minimum frequency. This option saves the maximum amount of power in C1 state.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C220 and C240 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C220 and C240 Servers

Memory Configuration Parameters

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C220 and C240 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C220 and C240 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C220 and C240 Servers

QPI Configuration Parameters

Onboard Storage Parameters

Onboard SCU Storage Support Whether the onboard software RAID controller is available to the server. This can be one of the following:

???Disabled???The software RAID controller is not available.

???Enabled???The software RAID controller is available.

USB Configuration Parameters

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C220 and C240 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C220 and C240 Servers

PCI Configuration Parameters

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C220 and C240 Servers

Serial Configuration Parameters

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C220 and C240 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C220 and C240 Servers

Redirection After BIOS POST Whether BIOS console redirection should be active after BIOS POST is complete and control given to the OS bootloader. This can be one of the following:

??????BIOS Legacy console redirection is active during the OS boot and run time.

???Bootloader???BIOS Legacy console redirection is disabled before giving control to the OS boot loader.

LOM and PCIe Slots Configuration Parameters

LOM Port n OptionROM Whether Option ROM is available on the LOM port designated by n. This can be one of the following:

???Disabled???The expansion slot n is not available.

???Enabled???The expansion slot n is available.

??????The expansion slot n is available for UEFI only.

??????The expansion slot n is available for legacy only.

All PCIe Slots OptionROM Whether the server can use the PCIe Option ROM expansion slots. This can be one of the following:

???Disabled???The expansion slot n is not available.

???Enabled???The expansion slot n is available.

??????The expansion slot n is available for UEFI only.

??????The expansion slot n is available for legacy only.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Server Management BIOS Parameters for C220 and C240 Servers

Server Management BIOS Parameters for C220 and C240 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Server Management BIOS Parameters for C220 and C240 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Server Management BIOS Parameters for C220 and C240 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

C260 Servers

C260 Servers

Main BIOS Parameters for C260 Servers

Advanced BIOS Parameters for C260 Servers

Processor Configuration Parameters

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C260 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C260 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C260 Servers

Intel VT-d Address Translation Services Whether the processor supports Intel VT-d Address Translation Services (ATS). This can be one of the following:

??? Disabled???The processor does not support ATS.

??? Enabled???The processor uses VT-d ATS as required.

Intel VT-d PassThrough DMA Whether the processor supports Intel VT-d Pass-through DMA. This can be one of the following:

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C260 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C260 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C260 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C260 Servers

Serial Port Configuration Parameters

USB Configuration Parameters

Make Device Non-Bootable Whether the server can boot from a USB device. This can be one of the following:

???Disabled???The server can boot from a USB device.

???Enabled???The server cannot boot from a USB device.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C260 Servers

PCI Configuration Parameters

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C260 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Server Management BIOS Parameters for C260 Servers

Server Management BIOS Parameters for C260 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Server Management BIOS Parameters for C260 Servers

??? ???The watchdog timer expires 10 minutes after the OS begins to boot.

??? ???The watchdog timer expires 15 minutes after the OS begins to boot.

??? ???The watchdog timer expires 20 minutes after the OS begins to boot.

Note This option is only applicable if you enable the OS

Boot Watchdog Timer.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Server Management BIOS Parameters for C260 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

C420 Servers

C420 Servers

Main BIOS Parameters for C420 Servers

Advanced BIOS Parameters for C420 Servers

Processor Configuration Parameters

Intel Hyper-Threading Technology Whether the processor uses Intel Hyper-Threading Technology, which allows multithreaded software applications to execute threads in parallel within each processor. This can be one of the following:

??? Disabled???The processor does not permit hyperthreading.

??? Enabled???The processor allows for the parallel execution of multiple threads.

We recommend that you contact your operating system vendor to make sure the operating system supports this feature.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C420 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C420 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C420 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C420 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C420 Servers

??? Enabled???The CPU transitions to its minimum frequency. This option saves the maximum amount of power in C1 state.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C420 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C420 Servers

Memory Configuration Parameters

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C420 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C420 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C420 Servers

QPI Configuration Parameters

USB Configuration Parameters

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C420 Servers

PCI Configuration Parameters

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C420 Servers

Serial Configuration Parameters

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C420 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C420 Servers

Redirection After BIOS POST Whether BIOS console redirection should be active after BIOS POST is complete and control given to the OS bootloader. This can be one of the following:

??????BIOS Legacy console redirection is active during the OS boot and run time.

???Bootloader???BIOS Legacy console redirection is disabled before giving control to the OS boot loader.

LOM and PCIe Slots Configuration Parameters

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C420 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Server Management BIOS Parameters for C420 Servers

Server Management BIOS Parameters for C420 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Server Management BIOS Parameters for C420 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

C460 Servers

C460 Servers

Main BIOS Parameters for C460 Servers

Advanced BIOS Parameters for C460 Servers

Processor Configuration Parameters

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C460 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C460 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C460 Servers

Intel VT-d Address Translation Services Whether the processor supports Intel VT-d Address Translation Services (ATS). This can be one of the following:

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C460 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C460 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C460 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C460 Servers

Serial Port Configuration Parameters

USB Configuration Parameters

Make Device Non-Bootable Whether the server can boot from a USB device. This can be one of the following:

???Disabled???The server can boot from a USB device.

???Enabled???The server cannot boot from a USB device.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C460 Servers

PCI Configuration Parameters

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Advanced BIOS Parameters for C460 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Server Management BIOS Parameters for C460 Servers

Server Management BIOS Parameters for C460 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Server Management BIOS Parameters for C460 Servers

??? ???The watchdog timer expires 10 minutes after the OS begins to boot.

??? ???The watchdog timer expires 15 minutes after the OS begins to boot.

??? ???The watchdog timer expires 20 minutes after the OS begins to boot.

Note This option is only applicable if you enable the OS

Boot Watchdog Timer.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Server Management BIOS Parameters for C460 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

BIOS Parameters by Server Model

Server Management BIOS Parameters for C460 Servers

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 1.5

I N D E X

A

Active Directory 66, 68, 69 configuring groups 69 configuring in CIMC 68

adapter 46, 85, 127, 128, 129, 130, 131 activating firmware 131 configuring properties 85 exporting the configuration 127 firmware 130

importing the configuration 128 installing firmware 130 network 85

PCI 46 resetting 131

restoring default configuration 129 viewing properties 85

adapters 83 overview 83

advanced BIOS parameters 184, 203, 222, 235, 253 C22 and C24 servers 184

C220 and C240 servers 203

C260 server 222

C420 servers 235

C460 server 253

BIOS parameters (continued)

main parameters for C22 and C24 183 main parameters for C220 and C240 203 main parameters for C260 222

main parameters for C420 235 main parameters for C460 253

server management parameters for C22 and C24 200 server management parameters for C220 and C240 219 server management parameters for C260 232

server management parameters for C420 251 server management parameters for C460 263

BIOS settings 14, 31, 32, 33, 34 advanced 32

main 31

restoring defaults 34 server boot order 14 server management 33

BIOS status 30 viewing 30

boot order 14, 15, 16 about 14 configuring 15 viewing 16

boot table 94, 95 creating entry 94 deleting entry 94, 95 description 94

B

backing up 178

CIMC configuration 178 bios 176

recovering corrupt 176

BIOS 158, 162

installing from remote server 162 obtaining firmware from Cisco 158

BIOS parameters 183, 184, 200, 203, 219, 222, 232, 235, 251, 253, 263 advanced parameters for C22 and C24 184

advanced parameters for C220 and C240 203 advanced parameters for C260 222 advanced parameters for C420 235 advanced parameters for C460 253

C

C22 and C24 servers 183, 184, 200 advanced BIOS parameters 184 main BIOS parameters 183

server management BIOS parameters 200 C220 and C240 servers 203, 219

advanced BIOS parameters 203 main BIOS parameters 203

server management BIOS parameters 219 C260 server 222, 232

advanced BIOS parameters 222 main BIOS parameters 222

Index

C260 server (continued)

server management BIOS parameters 232 C420 server 235, 251

main BIOS parameters 235

server management BIOS parameters 251 C420 servers 235

advanced BIOS parameters 235 C460 server 253, 263

advanced BIOS parameters 253 main BIOS parameters 253

server management BIOS parameters 263 certificate management 147

uploading a certificate 147

CIMC 38, 157, 158, 159, 160, 166, 167, 168, 177 activating firmware 160

clearing log 167

configuring log threshold 167 firmware overview 157

installing firmware from remote server 159 obtaining firmware from Cisco 158 resetting to factory defaults 177

sending log 168 viewing log 166 viewing properties 38

CIMC CLI 3 CIMC overview 2

clearing foreign configuration 117 common properties 75

communication services properties 133, 134, 136 HTTP properties 133

IPMI over LAN properties 136 SSH properties 134

configuration 178, 179 backing up 178 exporting 178 importing 179

CPU properties 38 create virtual drive 115 Create Virtual Drive 116 current sensors 52

D

date 38 setting 38

delete virtual drive 118 disabling KVM 56 disabling-auto-learn 125

E

enabling KVM 56, 57 enabling-auto-learn 124 encrypting virtual media 58 event filters, platform 149, 150

about 149 configuring 150

event log, system 170, 171 clearing 171 viewing 170

events 149, 150 platform 149, 150

disabling alerts 150 enabling alerts 149

exporting 178

CIMC configuration 178

F

fan sensors 50 fault summary 165

viewing 165 faults, logs 165

viewing summary 165

FEX 109, 110 description 109

viewing properties 110 FIP mode 85

enabling 85 firmware 157, 158, 159, 160

about 157 activating 160

installing from remote server 159 obtaining from Cisco 158

Flexible Flash 24, 25, 27, 28, 42 booting from 27 configuring properties 25 description 24

resetting 28

viewing properties 42 floppy disk emulation 58

G

generate NMI 180

H

hard drive locator LED 14

Index

I

importing 179

CIMC configuration 179 initializing virtual drive 119 IP blocking 80

IPMI over LAN 136 description 136

IPMI over LAN properties 136 IPv4 properties 76

iscsi-boot 107 vNIC 107

K

KVM 56, 57 configuring 57 disabling 56 enabling 56, 57

KVM console 11, 55

N

network adapter 85 viewing properties 85

network mounted vMedia mapping 59 cifs 59

nfs 59 www 59

network properties 74, 75, 76, 77, 78 common properties 75

IPv4 properties 76 NIC properties 74

port profile properties 78 VLAN properties 77

network security 80 NIC properties 74 NIV mode 85

enabling 85 NTP settings 81

Nvidia GPU card information 45 temperature 45

Index

power cap policy 21 configuring 21

power capping policy 21 about 21

power cycling the server 19 power restore policy 23 power statistics 20

viewing 20

power supply properties 40 power supply sensors 49 powering off the server 18 powering on the server 18 prepare for removal 122 PXE installation 12

R

recovering from a corrupted bios 176 remote presence 56, 57, 58, 62, 63

configuring serial over LAN 62 launching serial over LAN 63 virtual KVM 56, 57

virtual media 58

reset configuration of cards, Cisco FlexFlash Controller 28 resetting the server 16

restore BIOS manufacturing custom defaults 34 retain configuration, FlexFlash Controller 29

server management BIOS parameters 200, 219, 232, 251, 263 C22 and C24 servers 200

C220 and C240 servers 219

C260 server 232

C420 server 251

C460 server 263 server NICs 73 server overview 1 server software 1 set as boot drive 120

shutting down the server 17

SNMP 137, 139, 140 configuring properties 137

configuring SNMPv3 users 140 configuring trap settings 139 sending test message 140

SSH properties 134 start-learn-cycle 125 storage properties 40, 43, 44

viewing adapter properties 40 viewing physical drive properties 43 viewing virtual drive properties 44

storage sensors 52 viewing 52

syslog 168

sending CIMC log 168 system event log 170, 171

clearing 171 viewing 170

S

self-signed certificate 145 sensors 49, 50, 51, 52

current 52 fan 50

power supply 49 temperature 50 voltage 51

serial over LAN 61, 62, 63 configuring 62 launching 63

server 37

viewing properties 37

server management 13, 14, 16, 17, 18, 19 hard drive locator LED 14 power cycling the server 19 powering off the server 18 powering on the server 18 resetting the server 16

server boot order 14 server locator LED 13 shutting down the server 17

T

technical support data 173 exporting 173

Telnet 3

temperature sensors 50 time 38

setting 38

U

undo prepare for removal 124 uploading a server certificate 147 user management 65, 68, 71

Active Directory 68 local users 65

terminating user sessions 71 viewing user sessions 71

user sessions 71 terminating 71 viewing 71

Index

V

vHBA 86, 87, 88, 92, 93, 94, 95, 96, 97, 98 boot table 94

creating 92

creating boot table entry 94 deleting 93

deleting boot table entry 94, 95 disabling persistent binding 97 enabling persistent binding 97 guidelines for managing 86 modifying properties 88 persistent binding 96 rebuilding persistent binding 98 viewing properties 87

viewing storage controller logs 127 virtual drive 119, 120

initializing 119 modifying attributes 120 set as boot drive 120

virtual KVM 56, 57 virtual media 58 VLAN properties 77

VM FEX 109, 110 description 109 viewing properties 110

vmedia mapping 60 removing 60 viewing properties 60

vNIC 99, 100, 105, 106, 107, 109 creating 105

deleting 106

guidelines for managing 99 iscsi-boot 107

iscsi-boot deletion 109 modifying properties 100 viewing properties 99

vNICs 107

iSCSI-boot guidelines 107 voltage sensors 51

X

XML API 135 description 135 enabling 135

Y

YAML 8

Index