B UCSM CLI Configuration Guide 2 2
B UCSM CLI Configuration Guide 2 2
2
First Published: 2013-12-11
Last Modified: 2016-07-27
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version
of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: http://
www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
CHAPTER 14 Registering Cisco UCS Domains with Cisco UCS Central 227
Registration of Cisco UCS Domains 227
Policy Resolution between Cisco UCS Manager and Cisco UCS Central 228
Registering a Cisco UCS Domain with Cisco UCS Central 229
Configuring Policy Resolution between Cisco UCS Manager and Cisco UCS Central 230
Setting Cisco UCS Central Registration Properties in Cisco UCS Manager 232
Removing Unmanaged Zones from a VSAN Accessible to One Fabric Interconnect 376
Configuring Fibre Channel Storage Connection Policies 377
Creating a Fibre Channel Storage Connection Policy 377
Deleting a Fibre Channel Storage Connection Policy 378
Audience
This guide is intended primarily for data center administrators with responsibilities and expertise in one or
more of the following:
• Server administration
• Storage administration
• Network administration
• Network security
Conventions
Text Type Indication
GUI elements GUI elements such as tab titles, area names, and field labels appear in this font.
Main titles such as window, dialog box, and wizard titles appear in this font.
TUI elements In a Text-based User Interface, text the system displays appears in this font.
System output Terminal sessions and information that the system displays appear in this
font.
string A nonquoted set of characters. Do not use quotation marks around the string or
the string will include the quotation marks.
!, # An exclamation point (!) or a pound sign (#) at the beginning of a line of code
indicates a comment line.
Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the
document.
Tip Means the following information will help you solve a problem. The tips information might not be
troubleshooting or even an action, but could be useful information, similar to a Timesaver.
Timesaver Means the described action saves time. You can save time by performing the action described in the
paragraph.
Caution Means reader be careful. In this situation, you might perform an action that could result in equipment
damage or loss of data.
Documentation Feedback
To provide technical feedback on this document, or to report an error or omission, please send your comments
to [email protected]. We appreciate your feedback.
Architectural Simplification
The simplified architecture of Cisco UCS reduces the number of required devices and centralizes switching
resources. By eliminating switching inside a chassis, network access-layer fragmentation is significantly
reduced.
Cisco UCS implements Cisco unified fabric within racks and groups of racks, supporting Ethernet and Fibre
Channel protocols over 10 Gigabit Cisco Data Center Ethernet and Fibre Channel over Ethernet (FCoE) links.
This radical simplification reduces the number of switches, cables, adapters, and management points by up
to two-thirds. All devices in a Cisco UCS domain remain under a single management domain, which remains
highly available through the use of redundant components.
High Availability
The management and data plane of Cisco UCS is designed for high availability and redundant access layer
fabric interconnects. In addition, Cisco UCS supports existing high availability and disaster recovery solutions
for the data center, such as data replication and application-level clustering technologies.
Scalability
A single Cisco UCS domain supports multiple chassis and their servers, all of which are administered through
one Cisco UCS Manager. For more detailed information about the scalability, speak to your Cisco representative.
Flexibility
A Cisco UCS domain allows you to quickly align computing resources in the data center with rapidly changing
business requirements. This built-in flexibility is determined by whether you choose to fully implement the
stateless computing feature.
Pools of servers and other system resources can be applied as necessary to respond to workload fluctuations,
support new applications, scale existing software and business services, and accommodate both scheduled
and unscheduled downtime. Server identity can be abstracted into a mobile service profile that can be moved
from server to server with minimal downtime and no need for additional network configuration.
With this level of flexibility, you can quickly and easily scale server capacity without having to change the
server identity or reconfigure the server, LAN, or SAN. During a maintenance window, you can quickly do
the following:
• Deploy new servers to meet unexpected workload demand and rebalance resources and traffic.
• Shut down an application, such as a database management system, on one server and then boot it up
again on another server with increased I/O capacity and memory resources.
Unified Fabric
With unified fabric, multiple types of data center traffic can run over a single Data Center Ethernet (DCE)
network. Instead of having a series of different host bus adapters (HBAs) and network interface cards (NICs)
present in a server, unified fabric uses a single converged network adapter. This type of adapter can carry
LAN and SAN traffic on the same cable.
Cisco UCS uses Fibre Channel over Ethernet (FCoE) to carry Fibre Channel and Ethernet traffic on the same
physical Ethernet connection between the fabric interconnect and the server. This connection terminates at a
converged network adapter on the server, and the unified fabric terminates on the uplink ports of the fabric
interconnect. On the core network, the LAN and SAN traffic remains separated. Cisco UCS does not require
that you implement unified fabric across the data center.
The converged network adapter presents an Ethernet interface and Fibre Channel interface to the operating
system. At the server, the operating system is not aware of the FCoE encapsulation because it sees a standard
Fibre Channel HBA.
At the fabric interconnect, the server-facing Ethernet port receives the Ethernet and Fibre Channel traffic. The
fabric interconnect (using Ethertype to differentiate the frames) separates the two traffic types. Ethernet frames
and Fibre Channel frames are switched to their respective uplink interfaces.
IPv6 Compliance
Cisco UCS Manager supports IPv6 addressing. This is important for the following reasons:
• IPv4 addresses have a shorter address space than IPv6 addresses.
• The number of unique IPv4 addresses is finite, and the allocation scheme used by the Internet addressing
body has exacerbated the decline of available addresses.
• IPv6 addresses have a larger address space, and the pool of available IPv6 addresses is much greater
than the pool of IPv4 addresses.
• Some customers require that all networking software they purchase be IPv6 standards compliant.
All features in Cisco UCS Manager that support IPv4 addressing also support IPv6.
IPv6 addresses can be used to configure inband access to management interfaces, the Cisco Cisco UCS
Manager GUI, the KVM Console, and SSH over SoL.
Note IPv6 addresses are not supported for out-of-band access to CIMC.
Services Supported
Services that support IPv6 addresses include:
• HTTP and HTTPS
• SSH
• Telnet
• CIM XML
• SNMP
• Flash policy server
Client Support
External clients that support IPv6 addresses include:
• NTP
• DNS
• DHCP
• LDAP
• RADIUS
• TACACS+
• SSH
• Syslog
• vCenter
• Call Home
• NFS
Fabric Interconnects
Initial setup of the fabric interconnects supports the use of IPv6 addresses for the management IP address,
default gateway and DNS servers.
In a cluster setup, if Fabric A is configured using IPv6 addresses and a cluster configuration is enabled, when
Fabric B is subsequently configured, the setup process retrieves the address type from Fabric A, and prompts
you to use IPv6 addresses. IPv4 addresses then need to be configured for both fabric interconnects for
out-of-band (OOB) access after initial setup is complete.
Cisco UCS Manager and the fabric interconnects support OOB access over both IPv4 and IPv6 addresses.
Servers
Cisco UCS blade and rack servers can be configured to use static IPv6 addresses. Inband access to the server
Cisco Integrated Management Controller (CIMC) is possible using IPv6 addresses. Inband access is faster
because management traffic flows between the fabric interconnects and the servers using the higher-bandwidth
uplink port.
Note Only Cisco UCS M3 and M4 servers support IPv6 addresses. IPv6 addressing for Cisco UCS M1 and M2
servers is not supported.
through Cisco UCS Manager. All service profiles are centrally managed and stored in a database on the fabric
interconnect.
Every server must be associated with a service profile.
Important At any given time, each server can be associated with only one service profile. Similarly, each service
profile can be associated with only one server at a time.
After you associate a service profile with a server, the server is ready to have an operating system and
applications installed, and you can use the service profile to review the configuration of the server. If the
server associated with a service profile fails, the service profile does not automatically fail over to another
server.
When a service profile is disassociated from a server, the identity and connectivity information for the server
is reset to factory defaults.
Unless the service profile contains power management policies, a server pool qualification policy, or another
policy that requires a specific hardware configuration, you can use the profile for any type of server in the
Cisco UCS domain.
You can associate these service profiles with either a rack-mount server or a blade server. The ability to
migrate the service profile depends upon whether you choose to restrict migration of the service profile.
Note If you choose not to restrict migration, Cisco UCS Manager does not perform any compatibility checks
on the new server before migrating the existing service profile. If the hardware of both servers are not
similar, the association might fail.
Important The server identity and configuration information inherited through this service profile might not have
the values burned into the server hardware at the manufacturer if those values were changed before this
profile is associated with the server.
Tip If you need only one service profile with similar values to an existing service profile, you can clone a
service profile in the Cisco UCS Manager GUI.
For example, if you need several service profiles with similar values to configure servers to host database
software, you can create a service profile template, either manually or from an existing service profile. You
then use the template to create the service profiles.
Updating template
Service profiles created from an updating template inherit all the properties of the template and remain
connected to the template. Any changes to the template automatically update the service profiles created
from the template.
Note Service profiles that are created from the initial template and normal service profiles fetch the lowest
available IDs in the sequential pool when you presReset.
Service profiles created from updating template might attempt to retain the same ID when you pressReset
even when lower IDs of sequential pool are free.
Policies
Policies determine how Cisco UCS components will act in specific circumstances. You can create multiple
instances of most policies. For example, you might want different boot policies, so that some servers can PXE
boot, some can SAN boot, and others can boot from local storage.
Policies allow separation of functions within the system. A subject matter expert can define policies that are
used in a service profile, which is created by someone without that subject matter expertise. For example, a
LAN administrator can create adapter policies and quality of service policies for the system. These policies
can then be used in a service profile that is created by someone who has limited or no subject matter expertise
with LAN administration.
You can create and use two types of policies in Cisco UCS Manager:
• Configuration policies that configure the servers and other components
• Operational policies that control certain management, monitoring, and access control functions
Pools
Pools are collections of identities, or physical or logical resources, that are available in the system. All pools
increase the flexibility of service profiles and allow you to centrally manage your system resources.
You can use pools to segment unconfigured servers or available ranges of server identity information into
groupings that make sense for the data center. For example, if you create a pool of unconfigured servers with
similar characteristics and include that pool in a service profile, you can use a policy to associate that service
profile with an available, unconfigured server.
If you pool identifying information, such as MAC addresses, you can preassign ranges for servers that host
specific applications. For example, you can configure all database servers within the same range of MAC
addresses, UUIDs, and WWNs.
Domain Pools
Domain Pools are defined locally in a Cisco UCS domain, and can only be used in that Cisco UCS domain.
Global Pools
Global Pools are defined in Cisco UCS Central, and can be shared between Cisco UCS domains. If a Cisco
UCS domain is registered with Cisco UCS Central, you can assign Global Pools in Cisco UCS Manager.
Multiple inband management IP addresses for each server support additional CIMC sessions. When you
configure both OOB and inband addresses, users can choose from a list of those addresses in the KVM Console
dialog box when they launch KVM from a server, SSH to SoL, a service profile, the KVM Launch Manager,
or from the Cisco UCS Manager GUI web URL.
CIMC inband access supports the following services:
• KVM Console
• SSH to CIMC for SoL
Note Only Cisco UCS M3 and M4 servers support inband CIMC access. Inband CIMC access for Cisco UCS
M1 and M2 servers is not supported.
You can configure inband IP pools of IPv4 or IPv6 addresses and use them to assign addresses to servers.
You can configure inband VLAN groups and assign them to servers using service profiles.
You need to configure an Inband Profile with an Inband VLAN group to select an Inband Network (VLAN)
in Service Profiles and Service Profile templates.
You can configure the network and IP pool name in an Inband profile to assign Inband CIMC addresses to
Cisco UCS M3 and M4 servers.
You can configure inband IP pools of IPv4 or IPv6 addresses and use them to assign addresses to servers.
You can configure inband VLAN groups and assign them to servers using service profiles.
Traffic Management
Oversubscription
Oversubscription occurs when multiple network devices are connected to the same fabric interconnect port.
This practice optimizes fabric interconnect use, since ports rarely run at maximum speed for any length of
time. As a result, when configured correctly, oversubscription allows you to take advantage of unused
bandwidth. However, incorrectly configured oversubscription can result in contention for bandwidth and a
lower quality of service to all services that use the oversubscribed port.
For example, oversubscription can occur if four servers share a single uplink port, and all four servers attempt
to send data at a cumulative rate higher than available bandwidth of uplink port.
Oversubscription Considerations
The following elements can impact how you configure oversubscription in a Cisco UCS domain:
servers and only two ports that can communicate up to the network, your uplink ports will be oversubscribed.
In this situation, the amount of traffic created by the servers can also affect performance.
Cost/Performance Slider
The prioritization of cost and performance is different for each data center and has a direct impact on the
configuration of oversubscription. When you plan hardware usage for oversubscription, you need to know
where the data center is located on this slider. For example, oversubscription can be minimized if the data
center is more concerned with performance than cost. However, cost is a significant factor in most data centers,
and oversubscription requires careful planning.
Bandwidth Usage
The estimated bandwidth that you expect each server to actually use is important when you determine the
assignment of each server to a fabric interconnect port and, as a result, the oversubscription ratio of the ports.
For oversubscription, you must consider how many GBs of traffic the server will consume on average, the
ratio of configured bandwidth to used bandwidth, and the times when high bandwidth use will occur.
Network Type
The network type is only relevant to traffic on uplink ports, because FCoE does not exist outside Cisco UCS.
The rest of the data center network only differentiates between LAN and SAN traffic. Therefore, you do not
need to take the network type into consideration when you estimate oversubscription of a fabric interconnect
port.
Pinning
Pinning in Cisco UCS is only relevant to uplink ports. You can pin Ethernet or FCoE traffic from a given
server to a specific uplink Ethernet port or uplink FC port.
When you pin the NIC and HBA of both physical and virtual servers to uplink ports, you give the fabric
interconnect greater control over the unified fabric. This control ensures more optimal utilization of uplink
port bandwidth.
Cisco UCS uses pin groups to manage which NICs, vNICs, HBAs, and vHBAs are pinned to an uplink port.
To configure pinning for a server, you can either assign a pin group directly, or include a pin group in a vNIC
policy, and then add that vNIC policy to the service profile assigned to that server. All traffic from the vNIC
or vHBA on the server travels through the I/O module to the same uplink port.
Quality of Service
Cisco UCS provides the following methods to implement quality of service:
• System classes that specify the global configuration for certain types of traffic across the entire system
• QoS policies that assign system classes for individual vNICs
• Flow control policies that determine how uplink Ethernet ports handle pause frames
Global QoS changes made to the QoS system class may result in brief data-plane interruptions for all traffic.
Some examples of such changes are:
• Changing the MTU size for an enabled class
• Changing packet drop for an enabled class
• Changing the CoS value for an enabled class
Guidelines and Limitations for Quality of Service on Cisco UCS 6300 Series Fabric Interconnect
• Cisco UCS 6300 Series Fabric Interconnect uses a shared buffer for all system classes.
• Multicast optimization is not supported.
• When you change the QoS parameters for any class causes traffic disruption to all classes. The following
table lists the changes in the QoS system class and the conditions that trigger a system reboot.
• The subordinate FI reboots first as a result of the change in the QoS system class. The primary FI reboots
only after you acknowledge it in Pending Activities.
System Classes
Cisco UCS uses Data Center Ethernet (DCE) to handle all traffic inside a Cisco UCS domain. This industry
standard enhancement to Ethernet divides the bandwidth of the Ethernet pipe into eight virtual lanes. Two
virtual lanes are reserved for internal system and management traffic. You can configure quality of service
(QoS) for the other six virtual lanes. System classes determine how the DCE bandwidth in these six virtual
lanes is allocated across the entire Cisco UCS domain.
Each system class reserves a specific segment of the bandwidth for a specific type of traffic, which provides
a level of traffic management, even in an oversubscribed system. For example, you can configure the Fibre
Channel Priority system class to determine the percentage of DCE bandwidth allocated to FCoE traffic.
The following table describes the system classes that you can configure.
Best Effort A system class that sets the quality of service for the lane reserved for basic
Ethernet traffic.
Some properties of this system class are preset and cannot be modified. For
example, this class has a drop policy that allows it to drop data packets if
required. You cannot disable this system class.
Fibre Channel A system class that sets the quality of service for the lane reserved for Fibre
Channel over Ethernet traffic.
Some properties of this system class are preset and cannot be modified. For
example, this class has a no-drop policy that ensures it never drops data packets.
You cannot disable this system class.
Note FCoE traffic has a reserved QoS system class that should not be used
by any other type of traffic. If any other type of traffic has a CoS value
that is used by FCoE, the value is remarked to 0.
Opt-In Features
Each Cisco UCS domain is licensed for all functionality. Depending upon how the system is configured, you
can decide to opt in to some features or opt out of them for easier integration into existing environment. If a
process change happens, you can change your system configuration and include one or both of the opt-in
features.
The opt-in features are as follows:
• Stateless computing, which takes advantage of mobile service profiles with pools and policies where
each component, such as a server or an adapter, is stateless.
• Multi-tenancy, which uses organizations and role-based access control to divide the system into smaller
logical segments.
Stateless Computing
Stateless computing allows you to use a service profile to apply the personality of one server to a different
server in the same Cisco UCS domain. The personality of the server includes the elements that identify that
server and make it unique in the Cisco UCS domain. If you change any of these elements, the server could
lose its ability to access, use, or even achieve booted status.
The elements that make up a server's personality include the following:
• Firmware versions
• UUID (used for server identification)
• MAC address (used for LAN connectivity)
• World Wide Names (used for SAN connectivity)
• Boot settings
Stateless computing creates a dynamic server environment with highly flexible servers. Every physical server
in a Cisco UCS domain remains anonymous until you associate a service profile with it, then the server gets
the identity configured in the service profile. If you no longer need a business service on that server, you can
shut it down, disassociate the service profile, and then associate another service profile to create a different
identity for the same physical server. The "new" server can then host another business service.
To take full advantage of the flexibility of statelessness, the optional local disks on the servers should only
be used for swap or temp space and not to store operating system or application data.
You can choose to fully implement stateless computing for all physical servers in a Cisco UCS domain, to
not have any stateless servers, or to have a mix of the two types.
Multitenancy
Multi-tenancy allows you to divide the large physical infrastructure of an Cisco UCS domain into logical
entities known as organizations. As a result, you can achieve a logical isolation between organizations without
providing a dedicated physical infrastructure for each organization.
You can assign unique resources to each tenant through the related organization in the multi-tenant environment.
These resources can include different policies, pools, and quality of service definitions. You can also implement
locales to assign or restrict user privileges and roles by organization, if you do not want all users to have
access to all organizations.
If you set up a multi-tenant environment, all organizations are hierarchical. The top-level organization is
always root. The policies and pools that you create in root are system-wide and are available to all organizations
in the system. However, any policies and pools created in other organizations are only available to organizations
that are above it in the same hierarchy. For example, if a system has organizations named Finance and HR
that are not in the same hierarchy, Finance cannot use any policies in the HR organization, and HR cannot
access any policies in the Finance organization. However, both Finance and HR can use policies and pools
in the root organization.
If you create organizations in a mult-itenant environment, you can also set up one or more of the following
for each organization or for a sub-organization in the same hierarchy:
• Resource pools
• Policies
• Service profiles
• Service profile templates
You can create locales to ensure that users have access only to those organizations that they are authorized
to administer.
Overview of Virtualization
Virtualization allows you to create multiple Virtual Machines (VMs) to run in isolation, side by side on the
same physical machine.
Each virtual machine has its own set of virtual hardware (RAM, CPU, NIC) upon which an operating system
and fully configured applications are loaded. The operating system sees a consistent, normalized set of hardware
regardless of the actual physical hardware components.
In a virtual machine, both hardware and software are encapsulated in a single file for rapid provisioning and
moving between physical servers. You can move a virtual machine, within seconds, from one physical server
to another for zero-downtime maintenance and continuous workload consolidation.
The virtual hardware makes it possible for many servers, each running in an independent virtual machine, to
run on a single physical server. The advantages of virtualization include better use of computing resources,
greater server density, and seamless server migration.
switching in the fabric interconnect. This method reduces the load on the server CPU, provides faster switching,
and enables you to apply a rich set of network management features to local and remote traffic.
VM-FEX extends the IEEE 802.1Qbh port extender architecture to the VMs by providing each VM interface
with a virtual Peripheral Component Interconnect Express (PCIe) device and a virtual port on a switch. This
solution allows precise rate limiting and quality of service (QoS) guarantees on the VM interface.
Almost all tasks can be performed in any of the interfaces, and the results of tasks performed in one interface
are automatically displayed in another.
However, you cannot do the following:
• Use Cisco UCS Manager GUI to invoke Cisco UCS Manager CLI.
• View the results of a command invoked through Cisco UCS Manager CLI in Cisco UCS Manager GUI.
Centralized Management
Cisco UCS Manager centralizes the management of resources and devices, rather than using multiple
management points. This centralized management includes management of the following devices in a Cisco
UCS domain:
• Fabric interconnects.
• Software switches for virtual servers.
• Power and environmental management for chassis and servers.
• Configuration and firmware updates for server network interfaces (Ethernet NICs and converged network
adapters).
• Firmware and BIOS settings for servers.
Cisco UCS is multi-tenancy ready, exposing primitives that allow systems management software using the
API to get controlled access to Cisco UCS resources. In a multi-tenancy environment, Cisco UCS Manager
enables you to create locales for user roles that can limit the scope of a user to a particular organization.
• Fabric interconnects
• Fans
• Ports
• Interface cards
• I/O modules
Server Administration
A server administrator can use Cisco UCS Manager to perform server management tasks within a Cisco UCS
domain, including the following:
• Create server pools and policies related to those pools, such as qualification policies
• Create policies for the servers, such as discovery policies, scrub policies, and IPMI policies
• Create service profiles and, if desired, service profile templates
• Apply service profiles to servers
• Monitor faults, alarms, and the status of equipment
Network Administration
A network administrator can use Cisco UCS Manager to perform tasks required to create LAN configuration
for a Cisco UCS domain, including the following:
• Configure uplink ports, port channels, and LAN PIN groups
• Create VLANs
• Configure the quality of service classes and definitions
• Create the pools and policies related to network configuration, such as MAC address pools and Ethernet
adapter profiles
Storage Administration
A storage administrator can use Cisco UCS Manager to perform tasks required to create SAN configuration
for a Cisco UCS domain, including the following:
• Configure ports, port channels, and SAN PIN groups
• Create VSANs
• Configure the quality of service classes and definitions
• Create the pools and policies related to the network configuration, such as WWN pools and Fibre Channel
adapter profiles
No Cross-System Management
You cannot use Cisco UCS Manager to manage systems or devices that are outside the Cisco UCS domain
where Cisco UCS Manager is located. For example, you cannot manage heterogeneous environments, such
as non-Cisco UCS x86 systems, SPARC systems, or PowerPC systems.
Managed Objects
Cisco UCS uses a managed object model, where managed objects are abstract representations of physical or
logical entities that can be managed. For example, servers, chassis, I/O cards, and processors are physical
entities represented as managed objects, and resource pools, user roles, service profiles, and policies are logical
entities represented as managed objects.
Managed objects may have one or more associated properties that can be configured.
Command Modes
The CLI is organized into a hierarchy of command modes, with the EXEC mode being the highest-level mode
of the hierarchy. Higher-level modes branch into lower-level modes. You use create, enter, and scope
commands to move from higher-level modes to modes in the next lower level , and you use the exit command
to move up one level in the mode hierarchy.
Note Most command modes are associated with managed objects, so you must create an object before you can
access the mode associated with that object. You use create and enter commands to create managed
objects for the modes being accessed. The scope commands do not create managed objects and can only
access modes for which managed objects already exist.
Each mode contains a set of commands that can be entered in that mode. Most of the commands available in
each mode pertain to the associated managed object. Depending on your assigned role and locale, you may
have access to only a subset of the commands available in a mode; commands to which you do not have access
are hidden.
The CLI prompt for each mode shows the full path down the mode hierarchy to the current mode. This helps
you to determine where you are in the command mode hierarchy, and it can be an invaluable tool when you
need to navigate through the hierarchy.
The following table lists the main command modes, the commands used to access each mode, and the CLI
prompt associated with each mode.
Object Commands
Four general commands are available for object management:
• create object
• delete object
• enter object
• scope object
You can use the scope command with any managed object, whether a permanent object or a user-instantiated
object. The other commands allow you to create and manage user-instantiated objects. For every create object
command, a corresponding delete object and enter object command exists.
In the management of user-instantiated objects, the behavior of these commands depends on whether the
object exists, as described in the following tables:
Command Behavior
create object The object is created and its configuration mode, if
applicable, is entered.
Command Behavior
create object An error message is generated.
Complete a Command
You can use the Tab key in any mode to complete a command. Partially typing a command name and pressing
Tab causes the command to be displayed in full or to the point where another keyword must be chosen or an
argument value must be entered.
Command History
The CLI stores all commands used in the current session. You can step through the previously used commands
by using the Up Arrow or Down Arrow keys. The Up Arrow key steps to the previous command in the history,
and the Down Arrow key steps to the next command in the history. If you get to the end of the history, pressing
the Down Arrow key does nothing.
All commands in the history can be entered again by simply stepping through the history to recall the desired
command and pressing Enter. The command is entered as if you had manually typed it. You can also recall
a command and change it before you press Enter.
Note Committing multiple commands together is not an atomic operation. If any command fails, the successful
commands are applied despite the failure. Failed commands are reported in an error message.
While any commands are pending, an asterisk (*) appears before the command prompt. The asterisk disappears
when you enter the commit-buffer command.
The following example shows how the prompts change during the command entry process:
switch-1# scope chassis 1
switch-1 /chassis # enable locator-led
switch-1 /chassis* # show configuration pending
scope chassis 1
+ enable locator-led
exit
switch-1 /chassis* # commit-buffer
switch-1 /chassis #
Setting the Web Session Limit for Cisco UCS Manager from the CLI
Procedure
Step 3 UCS-A /system/services # scope Enters system services web session limits mode.
web-session-limits
Step 4 UCS-A /system/services/web-session-limits The maximum number of concurrent HTTP and
# set total num-of-logins-total HTTPS sessions allowed for all users within the
system.
Enter an integer between 1 and 256.
The following example sets the maximum number of HTTP and HTTPS sessions allowed by the system to
200 and commits the transaction:
UCS-A# scope system
UCS-A /system # scope services
UCS-A /system/services # scope web-session-limits
UCS-A /system/services/web-session-limits* # set total 200
UCS-A /system/services/web-session-limits* # commit-buffer
UCS-A /system/services/web-session-limits #
Pre-Login Banner
With a pre-login banner, when a user logs into Cisco UCS Manager GUI, Cisco UCS Manager displays the
banner text in the Create Pre-Login Banner dialog box and waits until the user dismisses that dialog box
before it prompts for the username and password. When a user logs into Cisco UCS Manager CLI, Cisco UCS
Manager displays the banner text in a dialog box and waits for the user to dismiss that dialog box before it
prompts for the password. It then repeats the banner text above the copyright block that it displays to the user.
Step 5 At the prompt, type a pre-login banner On the line following your input, type ENDOFBUF
message and press Enter. to finish.
Press Ctrl and C to cancel out of the set message
dialog.
Step 5 At the prompt, modify the pre-login On the line following your input, type ENDOFBUF
banner message and press Enter. to finish.
Press Ctrl and C to cancel out of the set message
dialog.
Step 3 UCS-A /security/banner # delete Deletes the pre-login banner from the
pre-login-banner system.
• Management port IPv4 address and subnet mask, or IPv6 address and prefix
• Default gateway IPv4 or IPv6 address
• DNS Server IPv4 or IPv6 address
• Default domain name
Setup Mode
You can choose to either restore the system configuration from an existing backup file, or manually set up
the system by going through the Setup wizard. If you choose to restore the system, the backup file must be
reachable from the management network.
Note The cluster configuration provides redundancy only for the management plane. Data redundancy is
dependent on the user configuration and might require a third-party tool to support data redundancy.
To use the cluster configuration, you must directly connect the two fabric interconnects together using Ethernet
cables between the L1 (L1-to-L1) and L2 (L2-to-L2) high-availability ports, with no other fabric interconnects
in between. Also you can connect the fabric interconnects directly through a patch panel to allow the two
fabric interconnects to continuously monitor the status of each other and quickly know when one has failed.
Both fabric interconnects in a cluster configuration must go through the initial setup process. You must enable
the first fabric interconnect that you set up for a cluster configuration. When you set up the second fabric
interconnect, it detects the first fabric interconnect as a peer fabric interconnect in the cluster.
For more information, see to the Cisco UCS 6100 Series Fabric Interconnect Hardware Installation Guide.
In a cluster configuration, you must specify the following three IPv4 addresses in the same subnet, or three
IPv6 addresses with the same prefix:
• Management port IP address for fabric interconnect A
• Management port IP address for fabric interconnect B
• Cluster IP address
Note In a cluster configuration, the management port for both fabric interconnects must be configured with the
same address type, either IPv4 or IPv6. If you configure the first FI with an IPv4 address then attempt to
configure the second FI with an IPv6 address, the configuration will fail.
For more information, refer to the Cisco UCS Hardware Installation Guide for your fabric interconnect.
2 Verify that the console port parameters on the computer terminal (or console server) attached to the console
port are as follows:
• 9600 baud
• 8 data bits
• No parity
• 1 stop bit
3 Collect the following information that you will need to supply during the initial setup:
• System name
• Password for the admin account. Choose a strong password that meets the guidelines for Cisco UCS
Manager passwords. This password cannot be blank.
• Management port IPv4 and subnet mask, or IPv6 address and prefix.
• Default gateway IPv4 or IPv6 address.
• DNS server IPv4 or IPv6 address (optional).
• Domain name for the system (optional).
Procedure
Step 3 When the unconfigured system boots, it prompts you for the setup method to be used. Enter console to
continue the initial setup using the console CLI.
Step 4 Enter setup to continue as an initial system setup.
Step 5 Enter y to confirm that you want to continue the initial setup.
Step 6 Enter the password for the admin account.
Step 7 To confirm, re-enter the password for the admin account.
Step 8 Enter no to continue the initial setup for a standalone configuration.
Step 9 Enter the system name.
Step 10 Enter the IPv4 or IPv6 address for the management port of the fabric interconnect.
If you enter an IPv4 address, you will be prompted to enter an IPv4 subnet mask. If you enter an IPv6 address,
you will be prompted to enter an IPv6 network prefix.
Step 11 Enter the respective IPv4 subnet mask or IPv6 network prefix, then press Enter.
You are prompted for an IPv4 or IPv6 address for the default gateway, depending on the address type you
entered for the management port of the fabric interconnect.
Step 13 Enter yes if you want to specify the IP address for the DNS server, or no if you do not.
Step 14 (Optional) Enter the IPv4 or IPv6 address for the DNS server.
The address type must be the same as the address type of the management port of the fabric interconnect.
Step 15 Enter yes if you want to specify the default domain name, or no if you do not.
Step 16 (Optional) Enter the default domain name.
Step 17 Enter yes if you want to join the centralized management environment (Cisco UCS Central), or no if you
do not.
Step 18 Review the setup summary and enter yes to save and apply the settings, or enter no to go through the Setup
wizard again to change some of the settings.
If you choose to go through the Setup wizard again, it provides the values you previously entered, and the
values appear in brackets. To accept previously entered values, press Enter.
The following example sets up a standalone configuration using the console setup method and IPv4 management
addresses:
Enter the installation method (console/gui)? console
Enter the setup mode (restore from backup or initial setup) [restore/setup]? setup
You have chosen to setup a new switch. Continue? (y/n): y
Enter the password for "admin": adminpassword%958
Confirm the password for "admin": adminpassword%958
Do you want to create a new cluster on this switch (select 'no' for standalone setup or if
you want this switch to be added to an existing cluster)? (yes/no) [n]: no
Enter the system name: foo
Mgmt0 address: 192.168.10.10
Mgmt0 IPv4 netmask: 255.255.255.0
IPv4 address of the default gateway: 192.168.10.1
Configure the DNS Server IPv4 address? (yes/no) [n]: yes
DNS IP address: 20.10.20.10
Configure the default domain name? (yes/no) [n]: yes
Default domain name: domainname.com
Join centralized management environment (UCS Central)? (yes/no) [n]: no
Following configurations will be applied:
Switch Fabric=A
System Name=foo
Physical Switch Mgmt0 IP Address=192.168.10.10
Physical Switch Mgmt0 IP Netmask=255.255.255.0
Default Gateway=192.168.10.1
DNS Server=20.10.20.10
Domain Name=domainname.com
Apply and save the configuration (select 'no' if you want to re-enter)? (yes/no): yes
The following example sets up a standalone configuration using the console setup method and IPv6 management
addresses:
Enter the installation method (console/gui)? console
Enter the setup mode (restore from backup or initial setup) [restore/setup]? setup
You have chosen to setup a new switch. Continue? (y/n): y
Enter the password for "admin": adminpassword%652
Confirm the password for "admin": adminpassword%652
Do you want to create a new cluster on this switch (select 'no' for standalone setup or if
you want this switch to be added to an existing cluster)? (yes/no) [n]: no
Enter the system name: foo
Mgmt0 address: 2001::107
Mgmt0 IPv6 prefix: 64
IPv6 address of the default gateway: 2001::1
Configure the DNS Server IPv6 address? (yes/no) [n]: yes
DNS IP address: 2001::101
Configure the default domain name? (yes/no) [n]: yes
Default domain name: domainname.com
Join centralized management environment (UCS Central)? (yes/no) [n]: no
Following configurations will be applied:
Switch Fabric=A
System Name=foo
Enforced Strong Password=no
Physical Switch Mgmt0 IPv6 Address=2001::107
Physical Switch Mgmt0 IPv6 Prefix=64
Default Gateway=2001::1
Ipv6 value=1
DNS Server=2001::101
Domain Name=domainname.com
Apply and save the configuration (select 'no' if you want to re-enter)? (yes/no): yes
• A console port on the first fabric interconnect is physically connected to a computer terminal or
console server
• The management Ethernet port (mgmt0) is connected to an external hub, switch, or router
• The L1 ports on both fabric interconnects are directly connected to each other
• The L2 ports on both fabric interconnects are directly connected to each other
For more information, refer to the Cisco UCS Hardware Installation Guide for your fabric interconnect.
2 Verify that the console port parameters on the computer terminal (or console server) attached to the console
port are as follows:
• 9600 baud
• 8 data bits
• No parity
• 1 stop bit
3 Collect the following information that you will need to supply during the initial setup:
• System name.
• Password for the admin account. Choose a strong password that meets the guidelines for Cisco UCS
Manager passwords. This password cannot be blank.
• Three static IPv4 or IPv6 addresses: two for the management port on both fabric interconnects (one
per fabric interconnect) and one for the cluster IP address used by Cisco UCS Manager.
• Subnet mask for the three static IPv4 addresses, or network prefix for the three static IPv6 addresses.
• Default gateway IPv4 or IPv6 address.
• DNS server IPv4 or IPv6 address (optional).
• Domain name for the system (optional).
Procedure
You will see the power on self-test messages as the fabric interconnect boots. The system will run a DHCP
client to check for a lease.
Step 3 When the unconfigured system boots, it prompts you for the setup method to be used. Enter console to
continue the initial setup using the console CLI.
Step 4 Enter setup to continue as an initial system setup.
Step 5 Enter y to confirm that you want to continue the initial setup.
Step 6 Enter the password for the admin account.
Step 7 To confirm, re-enter the password for the admin account.
Step 8 Enter yes to continue the initial setup for a cluster configuration.
Step 9 Enter the fabric interconnect fabric (either A or B ).
Step 10 Enter the system name.
Step 11 Enter the IPv4 or IPv6 address for the management port of the fabric interconnect.
If you enter an IPv4 address, you will be prompted to enter an IPv4 subnet mask. If you enter an IPv6 address,
you will be prompted to enter an IPv6 network prefix.
Step 12 Enter the respective IPv4 subnet mask or IPv6 network prefix, then press Enter.
You are prompted for an IPv4 or IPv6 address for the default gateway, depending on the address type you
entered for the management port of the fabric interconnect.
Step 14 Enter yes if you want to specify the IP address for the DNS server, or no if you do not.
Step 15 (Optional) Enter the IPv4 or IPv6 address for the DNS server.
The address type must be the same as the address type of the management port of the fabric interconnect.
Step 16 Enter yes if you want to specify the default domain name, or no if you do not.
Step 17 (Optional) Enter the default domain name.
Step 18 Review the setup summary and enter yes to save and apply the settings, or enter no to go through the Setup
wizard again to change some of the settings.
If you choose to go through the Setup wizard again, it provides the values you previously entered, and the
values appear in brackets. To accept previously entered values, press Enter.
The following example sets up the first fabric interconnect for a cluster configuration using the console and
IPv4 management addresses:
For more information, refer to the Cisco UCS Hardware Installation Guide for your fabric interconnect.
2 Verify that the console port parameters on the computer terminal (or console server) attached to the console
port are as follows:
• 9600 baud
• 8 data bits
• No parity
• 1 stop bit
3 Collect the following information that you will need to supply during the initial setup:
• Password for the admin account of the peer fabric interconnect. Choose a strong password that meets
the guidelines for Cisco UCS Manager passwords. This password cannot be blank.
• Management port IPv4 address in the same subnet, or management port IPv6 with the same network
prefix as the peer fabric interconnect.
Procedure
Step 3 When the unconfigured system boots, it prompts you for the setup method to be used. Enter console to
continue the initial setup using the console CLI.
Note The fabric interconnect should detect the peer fabric interconnect in the cluster. If it does not, check
the physical connections between the L1 and L2 ports, and verify that the peer fabric interconnect
has been enabled for a cluster configuration.
Step 4 Enter y to add the subordinate fabric interconnect to the cluster.
Step 5 Enter the admin password of the peer fabric interconnect.
Step 6 Enter the IP address for the management port on the subordinate fabric interconnect.
Step 7 Review the setup summary and enter yes to save and apply the settings, or enter no to go through the Setup
wizard again to change some of the settings.
If you choose to go through the Setup wizard again, it provides the values you previously entered, and the
values appear in brackets. To accept previously entered values, press Enter.
The following example sets up the second fabric interconnect for a cluster configuration using the console
and the IPv4 address of the peer:
Enter the installation method (console/gui)? console
Installer has detected the presence of a peer Fabric interconnect. This Fabric interconnect
will be added to the cluster. Continue (y/n) ? y
Enter the admin password of the peer Fabric Interconnect: adminpassword%958
Peer Fabric interconnect Mgmt0 IPv4 Address: 192.168.10.11
Apply and save the configuration (select 'no' if you want to re-enter)? (yes/no): yes
The following example sets up the second fabric interconnect for a cluster configuration using the console
and the IPv6 address of the peer:
Enter the installation method (console/gui)? console
Installer has detected the presence of a peer Fabric interconnect. This Fabric interconnect
will be added to the cluster. Continue (y/n) ? y
Enter the admin password of the peer Fabric Interconnect: adminpassword%958
Peer Fabric interconnect Mgmt0 IPv6 Address: 2001::107
Apply and save the configuration (select 'no' if you want to re-enter)? (yes/no): yes
Procedure
Step 2 UCS-A/fabric-interconnect # set Sets the OOB IPv4 address, network mask and
out-of-band ip ip-addr netmask gateway address.
ip-addrgw ip-addr The system warns that the console session change
may be disconnected when the change is committed.
Step 3 UCS-A/fabric-interconnect # Commits the transaction to the system configuration.
commit-buffer
The following example shows configuring an OOB IPv4 address for fabric interconnect A:
UCS-A# scope fabric-interconnect a
UCS-A /fabric-interconnect # set out-of-band ip 10.105.214.107 netmask 255.255.255.0 gw
10.105.214.1
Warning: When committed, this change may disconnect the current CLI session
UCS-A /fabric-interconnect* # commit-buffer
Procedure
Step 2 UCS-A(local-mgmt) # enable Enables cluster operation on the standalone fabric interconnect
cluster with the specified IPv4 or IPv6 address. When you enter this
{virtual-ip-addr|virtual-ip6-addr} command, you are prompted to confirm that you want to enable
cluster operation. Type yes to confirm.
The IP address must be the virtual IPv4 or IPv6 address for the
cluster configuration, not the IP address assigned to the fabric
interconnect that you are adding to the cluster.
The following example enables a standalone fabric interconnect with a virtual IPv4 address of 192.168.1.101
for cluster operation:
UCS-A# connect local-mgmt
UCS-A(local-mgmt)# enable cluster 192.168.1.101
This command will enable cluster mode on this setup. You cannot change it
back to stand-alone. Also, any GUI or KVM sessions may be terminated. Are you sure you want
to continue? (yes/no): yes
UCS-A(local-mgmt)#
The following example enables a standalone fabric interconnect with a virtual IPv6 address of 192.168.1.101
for cluster operation:
UCS-A# connect local-mgmt
UCS-A(local-mgmt)# enable cluster ipv6 2001::109
This command will enable IPv6 cluster mode on this setup. You cannot change it
back to stand-alone. Also, any GUI or KVM sessions may be terminated. Are you sure you want
to continue? (yes/no): yes
UCS-A(local-mgmt)#
What to Do Next
Add the second fabric interconnect to the cluster.
Step 2 UCS-A /system # set name name Sets the system name.
The name is updated on both fabric interconnects within about 30 seconds after the transaction is committed.
The following example changes the system name and commits the transaction:
UCS-A# scope system
UCS-A /system* # set name SanJose5
UCS-A /system* # commit-buffer
UCS-A /system #
Procedure
Step 2 UCS-A /fabric-interconnect # set out-of-band Sets the IP address, network mask, and
ip ip-address netmask netmask gw gateway IP address of the fabric interconnect.
gateway-ip-address
Step 3 UCS-A /fabric-interconnect # scope Enters fabric interconnect mode for fabric B.
fabric-interconnect b
Step 4 UCS-A /fabric-interconnect # set out-of-band Sets the IP address, netmask, and gateway
ip ip-address netmask netmask gw IP address of the fabric interconnect.
gateway-ip-address
Step 5 UCS-A /fabric-interconnect # scope system Enters system mode.
Step 6 UCS-A /system # set virtual-ip vip-address Sets the virtual IP address for the cluster.
When you commit the transaction, you are disconnected from the management session. Reconnect at the new
management IP address.
This example changes both fabric-interconnect IP addresses, changes the virtual IP address, and commits the
transaction, disconnecting the session:
UCS-A# scope fabric-interconnect a
UCS-A /fabric-interconnect # set out-of-band ip 192.0.2.111 netmask 255.255.255.0 gw 192.0.2.1
UCS-A /fabric-interconnect* # scope fabric-interconnect b
UCS-A /fabric-interconnect* # set out-of-band ip 192.0.2.112 netmask 255.255.255.0 gw
192.0.2.1
UCS-A /fabric-interconnect* # scope system
Procedure
Step 2 UCS-A fabric-interconnect # scope ipv6-config Enters IPv6 configuration mode for fabric
A.
Step 3 UCS-A fabric-interconnect/ ipv6-config # set Sets the management IPv6 address, gateway
out-of-band ipv6 ipv6-addr ipv6-gw IPv6 address, and network prefix for fabric
ipv6-gw-addr ipv6-prefix prefix A.
Step 4 UCS-A fabric-interconnect/ipv6-config # scope Enter fabric interconnect mode for fabric B.
fabric-interconnect b
Step 5 UCS-A fabric-interconnect/ # scope ipv6-config Enter IPv6 configuration mode for fabric B
When you commit the transaction, you are disconnected from the management session. Reconnect at the new
management IPv6 address.
This example changes both management IPv6 addresses, changes the virtual IPv6 address, and commits the
transaction:
UCS-A# scope fabric-interconnect a
UCS-A /fabric-interconnect # scope ipv6-config
UCS-A /fabric-interconnect/ipv6-config # set out-of-band ipv6 2001:10::157
Important You must enable the information policy on the fabric interconnect to view the SAN, LAN, and LLDP
neighbors of the fabric interconnect.
Procedure
The following example shows how to enable the information policy on the fabric interconnect:
UCS-A# scope system
UCS-A/system # scope info-policy
UCS-A/system/info-policy # show
Info Policy:
State: Disabled
UCS-A/system/info-policy # enable
UCS-A/system/info-policy* # commit-buffer
UCS-A/system/info-policy #
The following example shows how to disable the information policy on the fabric interconnect:
UCS-A# scope system
UCS-A/system # scope info-policy
UCS-A/system/info-policy # show
Info Policy:
State: Enabled
UCS-A/system/info-policy # disable
UCS-A/system/info-policy* # commit-buffer
UCS-A/system/info-policy #
Procedure
The following example shows how to view the information policy state on the fabric interconnect:
UCS-A# scope system
UCS-A/system # scope info-policy
UCS-A/system/info-policy # show
Info Policy:
State: Enabled
Procedure
The following example shows how to display the LAN neighbors of the fabric interconnect:
UCS-A # scope fabric-interconnect a
UCS-Afabric-interconnect # show lan-neighbors
Info Policy:Enabled
Lan Neighbors:
Local Interface: Ethernet1/2
Device Id: bgl-samc02-B(SSI140305YK)
IPv4 Address: 10.105.214.105
FI Port DN: sys/switch-A/slot-1/switch-ether/port-2
Procedure
The following example shows how to display the SAN neighbors of the fabric interconnect :
UCS-A # scope fabric-interconnect a
UCS-A/fabric-interconnect # show san-neighbors
Info Policy: Enabled
San neighbors:
Local Interface: fc2/1
Port VSAN: 100
Procedure
The following example shows how to display the LLDP neighbors of the fabric interconnect :
UCS-A # scope fabric-interconnect a
UCS-A/fabric-interconnect # show lldp-neighbors
Info Policy: Enabled
Lldp Neighbors:
Fabric Evacuation
Cisco UCS Manager 2.2(4) introduces fabric evacuation, which is the ability to evacuate all traffic that flows
through a Fabric Interconnect from all servers attached to it through an IOM or FEX while upgrading a system.
Upgrading the secondary Fabric Interconnect in a system disrupts the traffic that is active on the Fabric
Interconnect. This traffic fails over to the primary Fabric Interconnect. You can use fabric evacuation as
follows during the upgrade process:
1 Stop all the traffic that is active through a Fabric Interconnect.
2 For vNICs configured with failover, verify that the traffic has failed over by using Cisco UCS Manager
or tools such as vCenter.
Step 2 UCS-A /fabric-interconnect # stop Stops all the traffic that is active through the specified
server traffic [force] Fabric Interconnect.
Use the force option to evacuate a Fabric Interconnect
irrespective of its current evacuation state.
This example shows how to stop all traffic that is active through Fabric Interconnect B:
UCS-A# scope fabric-interconnect b
UCS-A /fabric-interconnect # stop server traffic
Warning: Enabling fabric evacuation will stop all traffic through this Fabric Interconnect
from servers attached through IOM/FEX. The traffic will fail over to the Primary Fabric
Interconnect for fail over vnics.
UCS-A /fabric-interconnect # commit-buffer
Step 2 UCS-A /fabric-interconnect # show detail Displays details about the specified Fabric
Interconnect.
This example shows how to display the detailed status of a Fabric Interconnect.
Note Admin Evacuation and Oper Evacuation show the status of evacuation at the Fabric Interconnect.
Fabric Interconnect:
ID: B
Product Name: Cisco UCS 6248UP
PID: UCS-FI-6248UP
VID: V01
Vendor: Cisco Systems, Inc.
Serial (SN): SSI171400HG
HW Revision: 0
Total Memory (MB): 16165
OOB IP Addr: 10.193.32.172
OOB Gateway: 10.193.32.1
OOB Netmask: 255.255.255.0
OOB IPv6 Address: ::
OOB IPv6 Gateway: ::
Prefix: 64
Operability: Operable
Thermal Status: Ok
Admin Evacuation: On
Oper Evacuation: On
Current Task 1:
Current Task 2:
Current Task 3:
Step 3 UCS-A /chassis/iom # show detail Displays details about the specified IOM.
Note Oper Evacuation shows the operational status of evacuation at the IOM.
IOM:
ID: 1
Side: Left
Fabric ID: A
User Label:
Overall Status: Fabric Conn Problem
Oper qualifier: Server Port Problem
Operability: Operable
Presence: Equipped
Thermal Status: OK
Discovery: Online
Config State: Ok
Peer Comm Status: Connected
Product Name: Cisco UCS 2204XP
PID: UCS-IOM-2204XP
VID: V02
Part Number: 73-14488-02
Vendor: Cisco Systems Inc
Serial (SN): FCH1718J9FT
HW Revision: 0
Mfg Date: 2013-05-12T00:00:00.000
Controller Subject: Iocard
Fabric Port Aggregation Capability: Port Channel
Oper Evacuation: On
Current Task 1:
Current Task 2:
Note • VIF at Fabric Interconnect A shows that traffic is initially active through the Fabric interconnect.
• VIF at Fabric Interconnect B is passive before evacuation.
This example shows the VIF paths after Fabric Interconnect A is evacuated.
Note • After fail over, the VIF state at Fabric Interconnect A goes into error.
• VIF at Fabric Interconnect B takes over as active.
Step 2 UCS-A /fabric-interconnect # start server Restarts traffic through the specified Fabric
traffic Interconnect.
End-Host Mode
End-host mode allows the fabric interconnect to act as an end host to the network, representing all servers
(hosts) connected to it through vNICs. This behavior is achieved by pinning (either dynamically pinned or
hard pinned) vNICs to uplink ports, which provides redundancy to the network, and makes the uplink ports
appear as server ports to the rest of the fabric. In end-host mode, the fabric interconnect does not run the
Spanning Tree Protocol (STP) but it avoids loops by denying uplink ports from forwarding traffic to each
other and by denying egress server traffic on more than one uplink port at a time. End-host mode is the default
Ethernet switching mode and should be used if either of the following are used upstream:
• Layer 2 switching for Layer 2 aggregation
• Virtual Switching System (VSS) aggregation layer
Note When you enable end-host mode, if a vNIC is hard pinned to an uplink port and this uplink port goes
down, the system cannot repin the vNIC, and the vNIC remains down.
Switch Mode
Switch mode is the traditional Ethernet switching mode. The fabric interconnect runs STP to avoid loops, and
broadcast and multicast packets are handled in the traditional way. Switch mode is not the default Ethernet
switching mode, and should be used only if the fabric interconnect is directly connected to a router, or if either
of the following are used upstream:
• Layer 3 aggregation
• VLAN in a box
Note For both Ethernet switching modes, even when vNICs are hard pinned to uplink ports, all server-to-server
unicast traffic in the server array is sent only through the fabric interconnect and is never sent through
uplink ports. Server-to-server multicast and broadcast traffic is sent through all uplink ports in the same
VLAN.
Important When you change the Ethernet switching mode, Cisco UCS Manager logs you out and restarts the fabric
interconnect. For a cluster configuration, Cisco UCS Manager restarts both fabric interconnects. The
subordinate fabric interconnect reboots first as a result of the change in switching mode. The primary
fabric interconnect reboots only after you acknowledge it in Pending Activities. The primary fabric
interconnect can take several minutes to complete the change in Ethernet switching mode and become
system ready. The existing configuration is retained.
While the fabric interconnects are rebooting, all blade servers lose LAN and SAN connectivity, causing
a complete outage of all services on the blades. This might cause the operating system to fail.
Procedure
Step 2 UCS-A /eth-uplink # set mode Sets the fabric interconnect to the specified switching
{end-host | switch} mode.
Step 3 UCS-A /eth-uplink # commit-buffer Commits the transaction to the system configuration.
Cisco UCS Manager restarts the fabric interconnect,
logs you out, and disconnects Cisco UCS Manager
CLI.
The following example sets the fabric interconnect to end-host mode and commits the transaction:
UCS-A# scope eth-uplink
UCS-A /eth-uplink # set mode end-host
Warning: When committed, this change will cause the switch to reboot
End-Host Mode
End-host mode allows the fabric interconnect to act as an end host to the connected fibre channel networks,
representing all servers (hosts) connected to it through virtual host bus adapters (vHBAs). This behavior is
achieved by pinning (either dynamically pinned or hard pinned) vHBAs to Fibre Channel uplink ports, which
makes the Fibre Channel ports appear as server ports (N-ports) to the rest of the fabric. When in end-host
mode, the fabric interconnect avoids loops by denying uplink ports from receiving traffic from one another.
End-host mode is synonymous with N Port Virtualization (NPV) mode. This mode is the default Fibre Channel
Switching mode.
Note When you enable end-host mode, if a vHBA is hard pinned to an uplink Fibre Channel port and this uplink
port goes down, the system cannot repin the vHBA, and the vHBA remains down.
Switch Mode
Switch mode is the traditional Fibre Channel switching mode. Switch mode allows the fabric interconnect to
connect directly to a storage device. Enabling Fibre Channel switch mode is useful in Pod models where there
is no SAN (for example, a single Cisco UCS domain that is connected directly to storage), or where a SAN
exists (with an upstream MDS).
Switch mode is not the default Fibre Channel switching mode.
Note In Fibre Channel switch mode, SAN pin groups are irrelevant. Any existing SAN pin groups are ignored.
Cisco UCS Fabric Interconnect in Switch Mode with Cisco MDS 9000 Family Fibre Channel Switching Modules
While creating a port channel between a Cisco MDS 9000 family FC switching module and a Cisco UCS
Fabric Interconnect in switch mode, use the following order:
1 Create the port channel on the MDS side.
2 Add the port channel member ports.
3 Create the port channel on the Fabric Interconnect side.
4 Add the port channel member ports.
If you create the port channel on the Fabric Interconnect side first, the ports will go into a suspended state.
When the Cisco UCS Fabric Interconnect is in switch mode, the port channel mode can only be in ON mode
and not Active. However, to get the peer wwn information for the Fabric Interconnect, the port channel must
be in Active mode.
Note When the Fibre Channel switching mode is changed, both Cisco UCS fabric interconnects reload
simultaneously. Reloading the fabric interconnects will cause a system-wide downtime for approximately
10 to 15 minutes.
Procedure
Step 2 UCS-A /fc-uplink # set mode Sets the fabric interconnect to the specified switching
{end-host | switch} mode.
Step 3 UCS-A /fc-uplink # commit-buffer Commits the transaction to the system configuration.
Cisco UCS Manager restarts the fabric interconnect,
logs you out, and disconnects Cisco UCS Manager CLI.
The following example shows how to set the fabric interconnect to end-host mode and commit the transaction:
UCS-A # scope fc-uplink
UCS-A /fc-uplink # set mode end-host
UCS-A /fc-uplink* # commit-buffer
UCS-A /fc-uplink #
• Server and Uplink Ports on the 6100 Series Fabric Interconnect, page 61
• Unified Ports on the Fabric Interconnect, page 63
• Physical and Backplane Ports, page 71
• Server Ports, page 74
• Uplink Ethernet Ports, page 76
• Appliance Ports, page 77
• FCoE Uplink Ports, page 82
• Unified Storage Ports, page 84
• Unified Uplink Ports, page 85
• FCoE and Fibre Channel Storage Ports, page 86
• Uplink Ethernet Port Channels, page 88
• Appliance Port Channels, page 91
• Fibre Channel Port Channels, page 96
• FCoE Port Channels, page 100
• Unified Uplink Port Channel, page 102
• Event Detection and Action, page 103
• Adapter Port Channels, page 108
• Fabric Port Channels, page 109
UCS domain until you configure them. You can add expansion modules to increase the number of uplink
ports on the fabric interconnect or to add uplink Fibre Channel ports to the fabric interconnect.
Note When you configure a port on a fabric interconnect, the administrative state is automatically set to enabled.
If the port is connected to another device, this may cause traffic disruption. You can disable the port after
configuring it.
You need to create LAN pin groups and SAN pin groups to pin traffic from servers to an uplink port.
Note Ports on the Cisco UCS 6100 Series Fabric Interconnect are not unified. For more information on Unified
Ports, see Unified Ports on the Fabric Interconnect.
You can configure uplink Ethernet ports on either the fixed module or an expansion module.
Note When you configure a port on a fabric interconnect, the administrative state is automatically set to enabled.
If the port is connected to another device, this may cause traffic disruption. You can disable the port after
configuring it.
Configurable beacon LEDs indicate which unified ports are configured for the selected port mode.
Port Modes
The port mode determines whether a unified port on the fabric interconnect is configured to carry Ethernet
or Fibre Channel traffic. You configure the port mode in Cisco UCS Manager. However, the fabric interconnect
does not automatically discover the port mode.
Changing the port mode deletes the existing port configuration and replaces it with a new logical port. Any
objects associated with that port configuration, such as VLANs and VSANS, are also removed. There is no
restriction on the number of times you can change the port mode for a unified port.
Port Types
The port type defines the type of traffic carried over a unified port connection.
By default, unified ports changed to Ethernet port mode are set to the Ethernet uplink port type. Unified ports
changed to Fibre Channel port mode are set to the Fibre Channel uplink port type. You cannot unconfigure
Fibre Channel ports.
Changing the port type does not require a reboot.
Ethernet Port Mode
When you set the port mode to Ethernet, you can configure the following port types:
• Server ports
• Ethernet uplink ports
• Ethernet port channel members
• FCoE ports
• Appliance ports
• Appliance port channel members
• SPAN destination ports
• SPAN source ports
Note For SPAN source ports, configure one of the port types and then configure the port as
SPAN source.
Note For SPAN source ports, configure one of the port types and then configure the port as
SPAN source.
Note For unified ports on the expansion module, you can reset the Beacon LED property to the default value
of Off during expansion module reboot.
Example of a valid configuration— Might include unified ports 1–16 on the fixed module configured in
Ethernet port mode and ports 17–32 in Fibre Channel port mode. On the expansion module you could configure
ports 1–4 in Ethernet port mode and then configure ports 5–16 in Fibre Channel mode. The rule about alternating
Ethernet and Fibre Channel port types is not violated because this port arrangement complies with the rules
on each individual module.
Example of an invalid configuration— Might include a block of Fibre Channel ports starting with port 16.
Because each block of ports has to start with an odd-numbered port, you would have to start the block with
port 17.
Note The total number of uplink Ethernet ports and uplink Ethernet port channel members that can be configured
on each fabric interconnect is limited to 31. This limitation includes uplink Ethernet ports and uplink
Ethernet port channel members configured on the expansion module.
Cautions and Guidelines for Configuring Unified Uplink Ports and Unified
Storage Ports
The following are cautions and guidelines to follow while working with unified uplink ports and unified
storage ports:
• In an unified uplink port, if you enable one component as a SPAN source, the other component will
automatically become a SPAN source.
Note If you create or delete a SPAN source under the Ethernet uplink port, Cisco UCS Manager
automatically creates or deletes a SPAN source under the FCoE uplink port. The same
happens when you create a SPAN source on the FCOE uplink port.
• You must configure a non default native VLAN on FCoE and unified uplink ports. This VLAN is not
used for any traffic. Cisco UCS Manager will reuse an existing fcoe-storage-native-vlan for this purpose.
This fcoe-storage-native-vlan will be used as a native VLAN on FCoE and unified uplinks.
• In an unified uplink port, if you do not specify a non default VLAN for the Ethernet uplink port the
fcoe-storage-native-vlan will be assigned as the native VLAN on the unified uplink port. If the Ethernet
port has a non default native VLAN specified as native VLAN, this will be assigned as the native VLAN
for unified uplink port.
• When you create or delete a member port under an Ethernet port channel, Cisco UCS Manager
automatically creates or deletes the member port under FCoE port channel. The same happens when
you create or delete a member port in FCoE port channel.
• When you configure an Ethernet port as a standalone port, such as server port, Ethernet uplink, FCoE
uplink or FCoE storage and make it as a member port for an Ethernet or FCOE port channel, Cisco UCS
Manager automatically makes this port as a member of both Ethernet and FCoE port channels.
• When you remove the membership for a member port from being a member of server uplink, Ethernet
uplink, FCoE uplink or FCoE storage, Cisco UCS Manager deletes the corresponding members ports
from Ethernet port channel and FCoE port channel and creates a new standalone port.
• If you downgrade Cisco UCS Manager from release 2.1 to any of the prior releases, all unified uplink
ports and port channels will be converted to Ethernet ports and Ethernet port channels when the downgrade
is complete. Similarly, all the unified storage ports will be converted to appliance ports.
• For unified uplink ports and unified storage ports, when you create two interfaces, only one license is
checked out. As long as either interface is enabled, the license remains checked out. The license will be
released only if both the interfaces are disabled for a unified uplink port or a unified storage port.
• Cisco UCS 6100 series fabric interconnect switch can only support 1VF or 1VF-PO facing same
downstream NPV switch.
Tip To minimize the traffic disruption during system changes, form a Fibre Channel uplink port-channel across
the fixed and expansion modules.
If you change the port modes on the fixed modules of both fabric interconnects simultaneously, all data traffic
through the fabric interconnects are interrupted for approximately eight minutes while the fabric interconnects
reboot.
FC Links Rebalancing
The FC uplinks balance automatically when FC Port Channels are utilized. To create FC Port Channels, refer
to Configuring a Fibre Channel Port Channel, on page 96.
For the FC uplinks that are not members of the Port Channels (Individual ISLs), load balancing is done
according to the FC uplinks balancing algorithm. For a vHBA of a host or service profile to choose an available
FC uplink, when FC uplink trunking is disabled, the uplink and vHBA must belong to the same VSAN
For each vHBA, the algorithm searches for an FC uplink in the following order:
1 Least used FC uplink based on the number of vHBAs currently bound to the uplink.
2 If FC uplinks are equally balanced, then round robin is used.
This process continues for all the other vHBAs. The algorithm also considers other parameters such as
pre-fip/fip adapters and number of flogis. You may not see the least-used component when there are less than
six flogis.
After a port configuration or any other uplink state changes, if the traffic passing through the FC uplinks is
no longer balanced, you can re-balance the traffic by resetting the vHBA(s) on each adapter and allow the
load balancing algorithm to evaluate for the current state of the FC uplinks.
Caution Changing the port mode on either module can cause an interruption in data traffic because changes to the
fixed module require a reboot of the fabric interconnect and changes on an expansion module require a
reboot of that module .
If the Cisco UCS domain has a cluster configuration that is set up for high availability and servers with
service profiles that are configured for failover, traffic fails over to the other fabric interconnect and data
traffic is not interrupted when the port mode is changed on the fixed module.
In the Cisco UCS Manager CLI, there are no new commands to support Unified Ports. Instead, you change
the port mode by scoping to the mode for the desired port type and then creating a new interface. When you
create a new interface for an already configured slot ID and port ID, UCS Manager deletes the previously
configured interface and creates a new one. If a port mode change is required because you configure a port
that previously operated in Ethernet port mode to a port type in Fibre Channel port mode, UCS Manager notes
the change.
Procedure
eth-server
For configuring server ports.
eth-storage
For configuring Ethernet storage ports and Ethernet storage
port channels.
eth-traffic-mon
For configuring Ethernet SPAN ports.
eth-uplink
For configuring Ethernet uplink ports.
fc-storage
For configuring Fibre Channel storage ports.
fc-traffic-mon
For configuring Fibre Channel SPAN ports.
Step 2 UCS-A /port-type-mode # scope Enters the specified port type mode for the specified fabric.
fabric {a | b}
Step 3 UCS-A /port-type-mode/fabric Creates an interface for the specified port type.
# create interface slot-id If you are changing the port type from Ethernet port mode to Fibre
port-id Channel port mode, or vice-versa, the following warning appears:
Warning: This operation will change the port mode (from
Ethernet to FC or vice-versa). When committed, this
change will require the module to restart.
Step 4 Create new interfaces for other There are several restrictions that govern how Ethernet and Fibre
ports belonging to the Ethernet Channel ports can be arranged on a fixed or expansion module.
or Fibre Channel port block. Among other restrictions, it is required that you change ports in
groups of two. Violating any of the restrictions outlined in the
Guidelines for Configuring Unified Ports section will result in an
error.
Based on the module for which you configured the port modes, data traffic for the Cisco UCS domain is
interrupted as follows:
• Fixed module—The fabric interconnect reboots. All data traffic through that fabric interconnect is
interrupted. In a cluster configuration that provides high availability and includes servers with vNICs
that are configured for failover, traffic fails over to the other fabric interconnect and no interruption
occurs. Changing the port mode for both sides at once results in both fabric interconnects rebooting
simultaneously and a complete loss of traffic until both fabric interconnects are brought back up.
It takes about 8 minutes for the fixed module to reboot.
• Expansion module—The module reboots. All data traffic through ports in that module is interrupted.
It takes about 1 minute for the expansion module to reboot.
The following example changes ports 3 and 4 on slot 1 from Ethernet uplink ports in Ethernet port mode to
uplink Fibre Channel ports in Fibre Channel port mode:
UCS-A# scope fc-uplink
UCS-A /fc-uplink # scope fabric a
UCS-A /fc-uplink/fabric # create interface 1 3
Warning: This operation will change the port mode (from Ethernet to FC or vice-versa).
When committed, this change will require the fixed module to restart.
UCS-A /fc-uplink/fabric/interface* # up
UCS-A /fc-uplink/fabric* #create interface 1 4
Warning: This operation will change the port mode (from Ethernet to FC or vice-versa).
When committed, this change will require the fixed module to restart.
UCS-A /fc-uplink/fabric/interface* #commit-buffer
Procedure
eth
All of the Unified Ports configured in Ethernet
mode illuminate.
fc
All of the Unified Ports configured in Fibre
Channel mode illuminate.
off
Beacon LED lights for all ports on the module
are turned off.
The following example illuminates all of the beacon lights for Unified Ports in Ethernet port mode and commits
the transaction:
UCS-A# scope fabric-interconnect a
UCS-A /fabric # scope card 1
UCS-A /fabric/card # scope beacon-led
UCS-A /fabric/card/beacon-led # set admin-state eth
UCS-A /fabric/card/beacon-led* # commit-buffer
UCS-A /fabric/card/beacon-led #
The following example shows how to display physical port statistics that are obtained from the ASIC:
Ethernet1/11 is up
Dedicated Interface
Hardware: 40000 Ethernet, address: a46c.2ae3.0e1a (bia a46c.2ae3.0e1a)
Description: S: Server
MTU 1500 bytes, BW 40000000 Kbit, DLY 10 usec
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA
Port mode is fex-fabric
full-duplex, 40 Gb/s, media type is 40G
Beacon is turned off
Input flow-control is off, output flow-control is off
Rate mode is dedicated
Switchport monitor is off
EtherType is 0x8100
Last link flapped 01:25:42
Last clearing of "show interface" counters never
2 interface resets
30 seconds input rate 22664 bits/sec, 2833 bytes/sec, 3 packets/sec
30 seconds output rate 9512 bits/sec, 1189 bytes/sec, 1189 bytes/sec, 4 packets/sec
Load-Interval #2: 5 minute (300 seconds)
input rate 33.80 Kbps, 5 pps; output rate 1.23 Mbps, 71 pps
RX
126057 unicast packets 1744 multicast packets 12877 broadcast packets
140693 input packets 28702696 bytes
3351 jumbo packets 0 storm suppression bytes
0 runts 0 giants 0 CRC 0 no buffer
0 input error 0 short frame 0 overrun 0 underrun 0 ignored
0 watchdog 0 bad etype drop 0 bad proto drop 0 if down drop
0 input with dribble 184 input discard
0 Rx pause
TX
919778 unicast packets 6991 multicast packets 29 broadcast packets
926798 output packets 1237109219 bytes
794275 jumbo packets
0 output errors 0 collision 0 deferred 0 late collision
0 lost carrier 0 no carrier 0 babble 0 output discard
0 Tx pause
Step 2 UCS-A(nxos)# show hardware internal Displays physical ports on a fabric interconnect
bcm-usd info port-info | grep interface_slot_id that correspond to physical ports on BCM.
The following example shows how to display physical ports on a fabric interconnect that correspond to physical
ports on BCM:
Eth1/11 0x1a00a000 41 xe-40 57 CR4 sw 4044 0 uta 2240 0 fd dis blk dis dis
ena 40G 40G up
The following example shows how to verify the status of backplane ports for fabric interconnect A:
--------------------------------------------------------------------------------
Ethernet VLAN Type Mode Status Reason Speed Port
Interface Ch #
--------------------------------------------------------------------------------
Eth1/1 1 eth access down SFP not inserted 40G(D) --
Eth1/2 1 eth access down SFP not inserted 40G(D) --
Br-Eth1/3/1 1 eth access down Administratively down 10G(D) --
Br-Eth1/3/2 1 eth access down Administratively down 10G(D) --
Br-Eth1/3/3 1 eth access down Administratively down 10G(D) --
Br-Eth1/3/4 1 eth access down Administratively down 10G(D) --
Eth1/4 1 eth access down SFP not inserted 40G(D) --
Br-Eth1/5/1 4044 eth trunk down Link not connected 10G(D) --
Br-Eth1/5/2 4044 eth trunk down Link not connected 10G(D) --
Br-Eth1/5/3 4044 eth trunk down Link not connected 10G(D) --
Br-Eth1/5/4 4044 eth trunk down Link not connected 10G(D) --
Eth1/6 1 eth access down SFP not inserted 40G(D) --
Eth1/7 1 eth access down SFP not inserted 40G(D) --
Eth1/8 1 eth access down SFP not inserted 40G(D) --
Eth1/9 1 eth access down SFP not inserted 40G(D) --
Eth1/10 1 eth access down SFP not inserted 40G(D) --
Eth1/11 1 eth fabric up none 40G(D) --
Eth1/12 1 eth access down SFP not inserted 40G(D) --
Eth1/13 1 eth access down SFP not inserted 40G(D) --
Eth1/14 1 eth access down SFP not inserted 40G(D) --
Eth1/15 1 eth access down SFP not inserted 40G(D) --
Eth1/16 1 eth access down SFP not inserted 40G(D) --
Eth1/17 1 eth access down SFP not inserted 40G(D) --
Eth1/18 1 eth access down SFP not inserted 40G(D) --
Eth1/19 1 eth access down SFP not inserted 40G(D) --
Eth1/20 1 eth access down SFP not inserted 40G(D) --
Br-Eth1/21/1 1 eth trunk up none 10G(D) --
Br-Eth1/21/2 1 eth trunk up none 10G(D) --
Br-Eth1/21/3 1 eth trunk down Link not connected 10G(D) --
Br-Eth1/21/4 1 eth trunk up none 10G(D) --
Eth1/22 1 eth access down SFP not inserted 40G(D) --
Eth1/23 1 eth access down SFP not inserted 40G(D) --
Eth1/24 1 eth access down SFP not inserted 40G(D) --
Eth1/25 1 eth access down SFP not inserted 40G(D) --
Eth1/26 1 eth access down SFP not inserted 40G(D) --
Eth1/27 1 eth access down SFP not inserted 40G(D) --
Eth1/28 1 eth access down SFP not inserted 40G(D) --
Eth1/29 1 eth access down SFP not inserted 40G(D) --
Eth1/30 1 eth access down SFP not inserted 40G(D) --
Eth1/31 1 eth access down SFP not inserted 40G(D) --
Eth1/32 1 eth access down SFP not inserted 40G(D) --
--------------------------------------------------------------------------------
Port-channel VLAN Type Mode Status Reason Speed Protocol
Interface
--------------------------------------------------------------------------------
Po1285 1 eth vntag up none a-10G(D) none
Po1286 1 eth vntag up none a-10G(D) none
Po1287 1 eth vntag up none a-10G(D) none
Po1288 1 eth vntag up none a-10G(D) none
Po1289 1 eth vntag up none a-10G(D) none
--------------------------------------------------------------------------------
Port VRF Status IP Address Speed MTU
--------------------------------------------------------------------------------
mgmt0 -- down 10.197.157.252 -- 1500
--------------------------------------------------------------------------------
Vethernet VLAN Type Mode Status Reason Speed
--------------------------------------------------------------------------------
Veth691 4047 virt trunk down nonParticipating auto
Veth692 4047 virt trunk up none auto
Veth693 1 virt trunk down nonParticipating auto
Veth695 1 virt trunk up none auto
Veth699 1 virt trunk up none auto
-------------------------------------------------------------------------------
--------------------------------------------------------------------------------
Ethernet VLAN Type Mode Status Reason Speed Port
Interface Ch #
--------------------------------------------------------------------------------
Eth1/1/1 1 eth vntag up none 10G(D) 1286
Eth1/1/2 1 eth access down Administratively down 10G(D) --
Eth1/1/3 1 eth vntag up none 10G(D) 1286
Eth1/1/4 1 eth access down Administratively down 10G(D) --
Eth1/1/5 1 eth vntag up none 10G(D) 1287
Eth1/1/6 1 eth access down Administratively down 10G(D) --
Eth1/1/7 1 eth vntag up none 10G(D) 1287
Eth1/1/8 1 eth access down Administratively down 10G(D) --
Eth1/1/9 1 eth vntag up none 10G(D) 1289
Eth1/1/10 1 eth access down Administratively down 10G(D) --
Eth1/1/11 1 eth vntag up none 10G(D) 1289
Eth1/1/12 1 eth access down Administratively down 10G(D) --
Eth1/1/13 1 eth vntag up none 10G(D) 1285
Eth1/1/14 1 eth access down Administratively down 10G(D) --
Eth1/1/15 1 eth vntag up none 10G(D) 1285
Eth1/1/16 1 eth access down Administratively down 10G(D) --
Eth1/1/17 1 eth access down Administratively down 10G(D) --
Eth1/1/18 1 eth vntag up none 10G(D) 1288
Eth1/1/19 1 eth access down Administratively down 10G(D) --
Eth1/1/20 1 eth vntag up none 10G(D) 1288
Eth1/1/21 1 eth access down Administratively down 10G(D) --
Eth1/1/22 1 eth access down Administratively down 10G(D) --
Eth1/1/23 1 eth access down Administratively down 10G(D) --
Eth1/1/24 1 eth access down Administratively down 10G(D) --
Eth1/1/25 1 eth access down Administratively down 10G(D) --
Eth1/1/26 1 eth access down Administratively down 10G(D) --
Eth1/1/27 1 eth access down Administratively down 10G(D) --
Eth1/1/28 1 eth access down Administratively down 10G(D) --
Eth1/1/29 1 eth access down Administratively down 10G(D) --
Eth1/1/30 1 eth access down Administratively down 10G(D) --
Eth1/1/31 1 eth access down Administratively down 10G(D) --
Eth1/1/32 1 eth access down Administratively down 10G(D) --
Eth1/1/33 4044 eth trunk up none 1000(D) --
Server Ports
Configuring a Server Port
All of the port types listed are configurable on both the fixed and expansion module, including server ports,
which are not configurable on the 6100 series fabric interconnect expansion module, but are configurable on
the 6200 series fabric interconnect expansion module.
Procedure
Step 3 UCS-A /eth-server/fabric # create interface Creates an interface for the specified Ethernet
slot-num port-num server port.
The following example shows how to create an interface for Ethernet server port 4 on slot 1 of fabric B and
commit the transaction:
UCS-A# scope eth-server
UCS-A /eth-server # scope fabric b
UCS-A /eth-server/fabric # create interface 1 4
UCS-A /eth-server/fabric* # commit-buffer
UCS-A /eth-server/fabric #
Step 2 UCS-A /eth-server # scope fabric {a | b} Enters Ethernet server fabric mode for the
specified fabric.
Step 3 UCS-A /eth-server/fabric # delete interface Deletes the interface for the specified Ethernet
slot-num port-num server port.
The following example unconfigures Ethernet server port 12 on slot 1 of fabric B and commits the transaction:
UCS-A# scope eth-server
UCS-A /eth-server # scope fabric b
UCS-A /eth-server/fabric # delete interface 1 12
UCS-A /eth-server/fabric* # commit-buffer
UCS-A /eth-server/fabric #
Procedure
Step 2 UCS-A /eth-uplink # scope fabric a | Enters Ethernet uplink fabric mode for the specified
b} fabric.
Step 3 UCS-A /eth-uplink/fabric # create Creates an interface for the specified Ethernet uplink
interface slot-num port-num port.
The following example shows how to create an interface for Ethernet uplink port 3 on slot 2 of fabric B, set
the speed to 10 gbps, and commit the transaction:
UCS-A# scope eth-uplink
UCS-A /eth-uplink # scope fabric b
UCS-A /eth-uplink/fabric # create interface 2 3
UCS-A /eth-uplink/fabric # set speed 10gbps
UCS-A /eth-uplink/fabric* # commit-buffer
UCS-A /eth-uplink/fabric #
Step 3 UCS-A /eth-uplink/fabric # delete interface Deletes the interface for the specified Ethernet
slot-num port-num uplink port.
The following example unconfigures Ethernet uplink port 3 on slot 2 of fabric B and commits the transaction:
UCS-A# scope eth-uplink
UCS-A /eth-uplink # scope fabric b
UCS-A /eth-uplink/fabric # delete interface 2 3
UCS-A /eth-uplink/fabric* # commit-buffer
UCS-A /eth-uplink/fabric #
Appliance Ports
Appliance ports are only used to connect fabric interconnects to directly attached NFS storage.
Note When you create a new appliance VLAN, its IEEE VLAN ID is not added to the LAN Cloud. Therefore,
appliance ports that are configured with the new VLAN remain down, by default, due to a pinning failure.
To bring up these appliance ports, you have to configure a VLAN in the LAN Cloud with the same IEEE
VLAN ID.
Cisco UCS Manager supports up to four appliance ports per fabric interconnect.
Procedure
Step 2 UCS-A /eth-storage # scope Enters Ethernet storage mode for the specified fabric.
fabric{a | b}
Step 3 UCS-A /eth-storage/fabric # Creates an interface for the specified appliance port.
create interface slot-num
port-num
The following example creates an interface for an appliance port 2 on slot 3 of fabric B, sets the port mode
to access, pins the appliance port to a pin group called pingroup1, sets the QoS class to fc, sets the admin
speed to 10 gbps, and commits the transaction:
UCS-A# scope eth-storage
UCS-A /eth-storage # scope fabric b
UCS-A /eth-storage/fabric # create interface 3 2
UCS-A /eth-storage/fabric* # set portmode access
UCS-A /eth-storage/fabric* # set pingroupname pingroup1
UCS-A /eth-storage/fabric* # set prio fc
UCS-A /eth-storage/fabric* # set adminspeed 10gbps
UCS-A /eth-storage/fabric* # commit-buffer
UCS-A /eth-storage/fabric #
What to Do Next
Assign a VLAN or target MAC address for the appliance port.
Procedure
Step 2 UCS-A /eth-storage # scope fabric{a | b} Enters Ethernet storage mode for the specified
fabric.
Step 3 UCS-A /eth-storage/fabric # scope Enters Ethernet interface mode for the specified
interface slot-id port-id interface.
Note To assign a target MAC address to an
appliance port channel, use the scope
port-channel command instead of scope
interface .
Step 4 UCS-A /eth-storage/fabric/interface # Specifies the name for the specified MAC address
create eth-target eth-target name target.
The following example assigns a target MAC address for an appliance device on port 3, slot 2 of fabric B and
commits the transaction:
UCS-A# scope eth-storage
UCS-A /eth-storage* # scope fabric b
Step 2 UCS-A/eth-storage# create vlan Creates a named VLAN, specifies the VLAN
vlan-name vlan-id name and VLAN ID, and enters Ethernet storage
VLAN mode
Step 5 UCS-A/eth-storage# create vlan Creates a named VLAN, specifies the VLAN
vlan-name vlan-id name and VLAN ID, and enters Ethernet storage
VLAN mode .
Step 6 UCS-A/eth-storage/vlan# set sharing Associates the primary VLAN to the secondary
community VLAN that you are creating.
Step 7 UCS-A/eth-storage/vlan# set pubnwname Specifies the primary VLAN to be associated with
primary vlan-name this secondary VLAN.
Step 2 UCS-A/eth-storage# scope fabric {a|b} Enters Ethernet storage fabric interconnect mode
for the specified fabric interconnect.
Step 3 UCS-A/eth-storage/fabric# create Creates an interface for the specified Ethernet server
interface slot-num port-num port.
Step 3 UCS-A /eth-storage/fabric # delete Deletes the interface for the specified
eth-interface slot-num port-num appliance port.
The following example unconfigures appliance port 3 on slot 2 of fabric B and commits the transaction:
UCS-A# scope eth-storage
UCS-A /eth-storage # scope fabric b
UCS-A /eth-storage/fabric # delete eth-interface 2 3
UCS-A /eth-storage/fabric* # commit-buffer
UCS-A /eth-storage/fabric #
Note FCoE uplinks and unified uplinks enable the multi-hop FCoE feature, by extending the unified fabric up
to the distribution layer switch.
You can configure the same Ethernet port as any of the following:
• FCoE uplink port—As an FCoE uplink port for only Fibre Channel traffic.
• Uplink port—As an Ethernet port for only Ethernet traffic.
• Unified uplink port—As a unified uplink port to carry both Ethernet and Fibre Channel traffic.
Procedure
Step 2 UCS-A /fc-uplink # scope fabric{a | b} Enters FC - Uplink mode for the specific
fabric.
Step 3 UCS-A /fc-uplink/fabric # create fcoeinterface Creates interface for the specified FCoE
slot-numberport-number uplink port.
The following example creates an interface for FCoE uplink port 1 on slot 8 of fabric A and commits the
transaction:
UCS-A# scope fc-uplink
UCS-A /fc-uplink # scope fabric a
UCS-A /fc-uplink/fabric # create fcoeinterface 1 8
UCS-A /fc-uplink/fabric/fcoeinterface* # commit-buffer
UCS-A /fc-uplink/fabric/fcoeinterface #
Step 2 UCS-A /fc-uplink # scope fabric{a | b} Enters FC - Uplink mode for the specific
fabric.
The following example deletes the FCoE uplink interface on port 1 on slot 8 of fabric A and commits the
transaction:
UCS-A# scope fc-uplink
UCS-A /fc-uplink # scope fabric a
UCS-A /fc-uplink/fabric # delete fcoeinterface 1 8
UCS-A /fc-uplink/fabric/fcoeinterface* # commit-buffer
UCS-A /fc-uplink/fabric/fcoeinterface #
Step 2 UCS-A /fc-uplink # scope fabric{a | b} Enters FC - Uplink mode for the specific
fabric.
The following example displays the available FCoE uplink interfaces on fabric A:
UCS-A# scope fc-uplink
UCS-A /fc-uplink # scope fabric a
UCS-A /fc-uplink/fabric # show fcoeinterface
FCoE Interface:
• When you enable or disable the FCoE storage interface, the corresponding VFC is enabled or disabled.
So when the FCoE storage interface is disabled in a unified storage port, the appliance interface will
continue to function normally.
Step 2 UCS-A /eth-storage # scope fabric{a | b} Enters Ethernet storage mode for the specified
fabric.
Step 3 UCS-A /eth-storage/fabric # create interface Creates an interface for the specified appliance
slot-num port-num port.
Step 7 UCS-A /fc-storage/fabric # create interface Adds FCoE storage port mode on the
fcoe slot-num port-num appliance port mode and creates a unified
storage port..
The following example creates an interface for an appliance port 2 on slot 3 of fabric A, adds fc storage to
the same port to convert it as an unified port , and commits the transaction:
UCS-A# scope eth-storage
UCS-A /eth-storage # scope fabric a
UCS-A /eth-storage/fabric # create interface 3 2
UCS-A /eth-storage/fabric* # commit-buffer
UCS-A /eth-storage/fabric* # scope fc-storage
UCS-A /fc-storage*# scope fabric a
UCS-A /fc-storage/fabric* # create interface fcoe 3 2
UCS-A /fc-storage/fabric* # commit-buffer
UCS-A /fc-storage/fabric*
• Enabling or disabling an Ethernet uplink results in the corresponding physical port being enabled or
disabled.
If you disable an Ethernet uplink, it disables the underlying physical port in a unified uplink. Therefore, even
when the FCoE uplink is enabled, the FCoE uplink also goes down. But if you disable an FCoE uplink, only
the VFC goes down. If the Ethernet uplink is enabled, it can still function properly in the unified uplink port.
Procedure
Step 2 UCS-A /eth-uplink # scope fabric {a | b} Enters Ethernet uplink fabric mode for the
specified fabric.
Step 3 UCS-A /eth-uplink/fabric # create interface Converts the FCoE uplink port as a unified
15 port.
The following example creates a unified uplink port on an existing FCoE port:
UCS-A# scope eth-uplink
UCS-A /eth-uplink # scope fabric b
UCS-A /eth-uplink/fabric # create interface 1 5
UCS-A /eth-uplink/fabric/interface* # commit-buffer
UCS-A /eth-uplink/interface #
Step 2 UCS-A /fc-storage # scope fabric {a | b} Enters Fibre Channel storage mode for the
specified fabric.
The following example creates an interface for Fibre Channel storage port 10 on slot 2 of fabric A and commits
the transaction:
UCS-A# scope fc-storage
UCS-A /fc-storage # scope fabric a
UCS-A /fc-storage/fabric* # create interface fc 2 10
UCS-A /fc-storage/fabric # commit-buffer
What to Do Next
Assign a VSAN.
Step 2 UCS-A /fc-storage # scope fabric {a | b} Enters Fibre Channel storage mode for the
specified fabric.
Step 3 UCS-A /fc-storage/fabric # delete interface Deletes the interface for the specified Fibre
{fc | fcoe} slot-num port-num Channel or FCoE storage port.
The following example unconfigures Fibre Channel storage port 10 on slot 2 of fabric A and commits the
transaction:
UCS-A# scope fc-storage
UCS-A /fc-storage # scope fabric a
UCS-A /fc-storage/fabric* # delete interface fc 2 10
UCS-A /fc-storage/fabric # commit-buffer
Restoring a Fibre Channel Storage Port Back to an Uplink Fibre Channel Port
Procedure
Step 2 UCS-A /fc-uplink # scope fabric {a | b} Enters Fibre Channel uplink mode for the
specified fabric.
Step 3 UCS-A /fc-uplink/fabric # create interface Creates an interface for the specified Fibre
slot-num port-num Channel uplink port.
The following example creates an interface for Fibre Channel uplink port 10 on slot 2 of fabric A and commits
the transaction:
UCS-A# scope fc-uplink
UCS-A /fc-uplink # scope fabric a
UCS-A /fc-uplink/fabric* # create interface 2 10
UCS-A /fc-uplink/fabric # commit-buffer
Important The state of a configured port changes to unconfigured in the following scenarios:
• The port is deleted or removed from a port channel. The port channel can be of any type, such as,
uplink or storage.
• A port channel is deleted.
Note Cisco UCS uses Link Aggregation Control Protocol (LACP), not Port Aggregation Protocol (PAgP), to
group the uplink Ethernet ports into a port channel. If the ports on the upstream switch are not configured
for LACP, the fabric interconnects treat all ports in an uplink Ethernet port channel as individual ports,
and therefore forward packets.
Step 2 UCS-A /eth-uplink # scope fabric {a | b } Enters Ethernet uplink fabric mode for the
specified fabric.
Step 3 UCS-A /eth-uplink/fabric # create Creates a port channel on the specified Ethernet
port-channel port-num uplink port, and enters Ethernet uplink fabric port
channel mode.
The following example creates a port channel on port 13 of fabric A, sets the name to portchan13a, enables
the administrative state, assigns the flow control policy named flow-con-pol432 to the port channel, and
commits the transaction:
UCS-A# scope eth-uplink
UCS-A /eth-uplink # scope fabric a
UCS-A /eth-uplink/fabric # create port-channel 13
UCS-A /eth-uplink/fabric/port-channel* # enable
UCS-A /eth-uplink/fabric/port-channel* # set name portchan13a
UCS-A /eth-uplink/fabric/port-channel* # set flow-control-policy flow-con-pol432
UCS-A /eth-uplink/fabric/port-channel* # commit-buffer
UCS-A /eth-uplink/fabric/port-channel #
Step 2 UCS-A /eth-uplink # scope fabric {a | b } Enters Ethernet uplink fabric mode for the
specified fabric.
Step 3 UCS-A /eth-uplink/fabric # delete Deletes the port channel on the specified
port-channel port-num Ethernet uplink port.
The following example unconfigures the port channel on port 13 of fabric A and commits the transaction:
UCS-A# scope eth-uplink
UCS-A /eth-uplink # scope fabric a
UCS-A /eth-uplink/fabric # delete port-channel 13
UCS-A /eth-uplink/fabric* # commit-buffer
UCS-A /eth-uplink/fabric #
Step 2 UCS-A /eth-uplink # scope fabric {a | b } Enters Ethernet uplink fabric mode for the
specified fabric.
Step 3 UCS-A /eth-uplink/fabric # scope Enters Ethernet uplink fabric port channel mode
port-channel port-num for the specified port channel.
Step 4 UCS-A /eth-uplink/fabric/port-channel # Creates the specified member port from the port
create member-port slot-num port-num channel and enters Ethernet uplink fabric port
channel member port mode.
The following example adds the member port on slot 1, port 7 to the port channel on port 13 of fabric A and
commits the transaction.
UCS-A# scope eth-uplink
UCS-A /eth-uplink # scope fabric a
UCS-A /eth-uplink/fabric # scope port-channel 13
UCS-A /eth-uplink/fabric/port-channel # create member-port 1 7
UCS-A /eth-uplink/fabric/port-channel* # commit-buffer
UCS-A /eth-uplink/fabric/port-channel #
Step 2 UCS-A /eth-uplink # scope fabric {a | b } Enters Ethernet uplink fabric mode for the
specified fabric.
Step 3 UCS-A /eth-uplink/fabric # scope Enters Ethernet uplink fabric port channel
port-channel port-num mode for the specified port channel.
Step 4 UCS-A /eth-uplink/fabric/port-channel # Deletes the specified member port from the
delete member-port slot-num port-num port channel.
The following example deletes a member port from the port channel on port 13 of fabric A and commits the
transaction:
UCS-A# scope eth-uplink
UCS-A /eth-uplink # scope fabric a
UCS-A /eth-uplink/fabric # scope port-channel 13
UCS-A /eth-uplink/fabric/port-channel # delete member-port 1 7
UCS-A /eth-uplink/fabric/port-channel* # commit-buffer
UCS-A /eth-uplink/fabric/port-channel #
Step 2 UCS-A /eth-storage # scope fabric Enters Ethernet storage fabric mode for the specified fabric.
{a | b }
Step 3 UCS-A /eth-storage/fabric # create Creates a port channel on the specified Ethernet storage
port-channel port-num port, and enters Ethernet storage fabric port channel mode.
The following example creates a port channel on port 13 of fabric A and commits the transaction:
UCS-A# scope eth-storage
UCS-A /eth-storage # scope fabric a
UCS-A /eth-storage/fabric # create port-channel 13
UCS-A /eth-storage/fabric/port-channel* # enable
UCS-A /eth-storage/fabric/port-channel* # set name portchan13a
UCS-A /eth-storage/fabric/port-channel* # set pingroupname pingroup1
UCS-A /eth-storage/fabric/port-channel* # set portmode access
UCS-A /eth-storage/fabric/port-channel* # set prio fc
UCS-A /eth-storage/fabric/port-channel* # set speed 2gbps
UCS-A /eth-storage/fabric/port-channel* # commit-buffer
UCS-A /eth-storage/fabric/port-channel #
Step 2 UCS-A /eth-storage # scope fabric {a | b } Enters Ethernet storage fabric mode for the
specified fabric.
Step 3 UCS-A /eth-storage/fabric # delete Deletes the port channel from the specified
port-channel port-num Ethernet storage port.
The following example unconfigures the port channel on port 13 of fabric A and commits the transaction:
UCS-A# scope eth-storage
UCS-A /eth-storage # scope fabric a
UCS-A /eth-storage/fabric # delete port-channel 13
UCS-A /eth-storage/fabric* # commit-buffer
UCS-A /eth-storage/fabric #
Step 2 UCS-A /eth-storage # scope fabric {a | b } Enters Ethernet storage mode for the specified
fabric.
Step 3 UCS-A /eth-storage/fabric # scope Enters Ethernet storage port channel mode.
port-channel port-chan-name
Step 4 UCS-A /eth-storage/fabric/port-channel # Enables or disables the administrative state of
{enable | disable } the port channel. The port channel is disabled
by default.
The following example enables port channel 13 on fabric A and commits the transaction:
UCS-A# scope eth-storage
UCS-A /eth-storage # scope fabric a
UCS-A /eth-storage/fabric # scope port-channel 13
UCS-A /eth-storage/fabric/port-channel* # enable
UCS-A /eth-storage/fabric/port-channel* # commit-buffer
UCS-A /eth-storage/fabric/port-channel #
Step 2 UCS-A /eth-storage # scope fabric {a | b Enters Ethernet storage fabric mode for the
} specified fabric.
Step 3 UCS-A /eth-storage/fabric # scope Enters Ethernet storage fabric port channel mode
port-channel port-num for the specified port channel.
Step 4 UCS-A /eth-storage/fabric/port-channel # Creates the specified member port from the port
create member-port slot-num port-num channel and enters Ethernet storage fabric port
channel member port mode.
The following example adds the member port on slot 1, port 7 to the port channel on port 13 of fabric A and
commits the transaction.
UCS-A# scope eth-storage
UCS-A /eth-storage # scope fabric a
UCS-A /eth-storage/fabric # scope port-channel 13
UCS-A /eth-storage/fabric/port-channel # create member-port 1 7
UCS-A /eth-storage/fabric/port-channel* # commit-buffer
UCS-A /eth-storage/fabric/port-channel #
Step 2 UCS-A /eth-storage # scope fabric {a | b } Enters Ethernet storage fabric mode for the
specified fabric.
Step 3 UCS-A /eth-storage/fabric # scope Enters Ethernet storage fabric port channel
port-channel port-num mode for the specified port channel.
Step 4 UCS-A /eth-storage/fabric/port-channel # Deletes the specified member port from the
delete member-port slot-num port-num port channel.
The following example deletes a member port from the port channel on port 13 of fabric A and commits the
transaction:
UCS-A# scope eth-storage
UCS-A /eth-storage # scope fabric a
UCS-A /eth-storage/fabric # scope port-channel 13
UCS-A /eth-storage/fabric/port-channel # delete member-port 1 7
UCS-A /eth-storage/fabric/port-channel* # commit-buffer
UCS-A /eth-storage/fabric/port-channel #
Note Fibre Channel port channels are not compatible with non-Cisco technology.
You can create up to four Fibre Channel port channels in each Cisco UCS domain with Cisco UCS 6200 and
6300 Series fabric interconnects. Each Fibre Channel port channel can include a maximum of 16 uplink Fibre
Channel ports.
You can create up to two Fibre Channel port channels in each Cisco UCS domain with Cisco UCS 6324 fabric
interconnects. Each Fibre Channel port channel can include a maximum of four uplink Fibre Channel ports.
Ensure that the Fibre Channel port channel on the upstream NPIV switch is configured with its channel mode
as active. If both the member port(s) and peer port(s) do not have the same channel mode configured, the port
channel will not come up. When the channel mode is configured as active, the member ports initiate port
channel protocol negotiation with the peer port(s) regardless of the channel group mode of the peer port. If
the peer port, while configured in a channel group, does not support the port channel protocol, or responds
with a nonnegotiable status, it defaults to the On mode behavior. The active port channel mode allows automatic
recovery without explicitly enabling and disabling the port channel member ports at either end.
This example shows how to configure channel mode as active:
switch(config)# int po114
switch(config-if)# channel mode active
Note If you are connecting two Fibre Channel port channels, the admin speed for both port channels must match
for the link to operate. If the admin speed for one or both of the Fibre Channel port channels is set to auto,
Cisco UCS adjusts the admin speed automatically.
Procedure
Step 2 UCS-A /fc-uplink # scope fabric {a | b } Enters Fibre Channel uplink fabric mode for the
specified fabric.
Step 3 UCS-A /fc-uplink/fabric # create Creates a port channel on the specified Fibre
port-channel port-num Channel uplink port, and enters Fibre Channel
uplink fabric port channel mode.
The following example creates port channel 13 on fabric A, sets the name to portchan13a, enables the
administrative state, sets the speed to 2 Gbps, and commits the transaction:
UCS-A# scope fc-uplink
UCS-A /fc-uplink # scope fabric a
UCS-A /fc-uplink/fabric # create port-channel 13
UCS-A /fc-uplink/fabric/port-channel* # enable
UCS-A /fc-uplink/fabric/port-channel* # set name portchan13a
UCS-A /fc-uplink/fabric/port-channel* # set speed 2gbps
UCS-A /fc-uplink/fabric/port-channel* # commit-buffer
UCS-A /fc-uplink/fabric/port-channel #
Step 2 UCS-A /fc-uplink # scope fabric {a | b } Enters Fibre Channel uplink fabric mode for the
specified fabric.
Step 3 UCS-A /fc-uplink/fabric # delete Deletes the port channel on the specified Fibre
port-channel port-num Channel uplink port.
The following example unconfigures port channel 13 on fabric A and commits the transaction:
UCS-A# scope fc-uplink
UCS-A /fc-uplink # scope fabric a
UCS-A /fc-uplink/fabric # delete port-channel 13
UCS-A /fc-uplink/fabric* # commit-buffer
UCS-A /fc-uplink/fabric #
Adding Channel Mode Active To The Upstream NPIV Fibre Channel Port
Channel
Procedure
Step 2 UCS-A /fc-uplink # scope fabric {a | b } Enters Fibre Channel uplink fabric mode for the
specified fabric.
Step 3 UCS-A /fc-uplink/fabric # create Creates a port channel on the specified Fibre
port-channel port-num Channel uplink port, and enters Fibre Channel
uplink fabric port channel mode.
portchan13a
Administrative channel mode is active
Operational channel mode is active
UCS-A /fc-uplink/fabric/ #
Step 2 UCS-A /fc-uplink # scope fabric {a | b } Enters Fibre Channel uplink mode for the
specified fabric.
Step 3 UCS-A /fc-uplink/fabric # scope Enters Fibre Channel uplink port channel mode.
port-channel port-chan-name
Step 4 UCS-A /fc-uplink/fabric/port-channel # Enables or disables the administrative state of
{enable | disable } the port channel. The port channel is disabled by
default.
The following example enables port channel 13 on fabric A and commits the transaction:
UCS-A# scope fc-uplink
UCS-A /fc-uplink # scope fabric a
UCS-A /fc-uplink/fabric # scope port-channel 13
UCS-A /fc-uplink/fabric/port-channel* # enable
UCS-A /fc-uplink/fabric/port-channel* # commit-buffer
UCS-A /fc-uplink/fabric/port-channel #
Step 2 UCS-A /fc-uplink # scope fabric {a | b } Enters Fibre Channel uplink fabric mode for the
specified fabric.
Step 3 UCS-A /fc-uplink/fabric # scope Enters Fibre Channel uplink fabric port channel
port-channel port-num mode for the specified port channel.
Step 4 UCS-A /fc-uplink/fabric/port-channel # Creates the specified member port from the port
create member-port slot-num port-num channel and enters Fibre Channel uplink fabric
port channel member port mode.
The following example adds the member port on slot 1, port 7 to port channel 13 on fabric A and commits
the transaction.
UCS-A# scope fc-uplink
UCS-A /fc-uplink # scope fabric a
UCS-A /fc-uplink/fabric # scope port-channel 13
UCS-A /fc-uplink/fabric # create member-port 1 7
UCS-A /fc-uplink/fabric/port-channel* # commit-buffer
UCS-A /fc-uplink/fabric/port-channel #
Step 2 UCS-A /fc-uplink # scope fabric {a | b} Enters Fibre Channel uplink fabric mode for
the specified fabric.
Step 3 UCS-A /fc-uplink/fabric # scope Enters Fibre Channel uplink fabric port channel
port-channel port-num mode for the specified port channel.
Step 4 UCS-A /fc-uplink/fabric/port-channel # Deletes the specified member port from the port
delete member-port slot-num port-num channel.
The following example deletes a member port from port channel 13 on fabric A and commits the transaction:
UCS-A# scope fc-uplink
UCS-A /fc-uplink # scope fabric a
UCS-A /fc-uplink/fabric # scope port-channel 13
UCS-A /fc-uplink/fabric # delete member-port 1 7
UCS-A /fc-uplink/fabric/port-channel* # commit-buffer
UCS-A /fc-uplink/fabric/port-channel #
Step 2 UCS-A /fc-uplink # scope fabric{a | b} Enters FC - Uplink mode for the specific
fabric.
Step 3 UCS-A /fc-uplink/fabric # create Creates port channel for the specified FCoE
fcoe-port-channel number uplink port.
The following example creates an interface for FCoE uplink port 1 on slot 4 of fabric A and commits the
transaction:
UCS-A# scope fc-uplink
UCS-A /fc-uplink # scope fabric a
UCS-A /fc-uplink/fabric # create fcoe-port-channel 4
UCS-A /fc-uplink/fabric/fcoe-port-channel* # commit-buffer
UCS-A /fc-uplink/fabric/fcoe-port-channel #
Step 2 UCS-A /fc-uplink # scope fabric {a | Enters Fibre Channel uplink fabric mode for the
b} specified fabric.
Step 3 UCS-A /fc-uplink/fabric # scope Enters FCoE uplink port channel mode for the specified
fcoe-port-channel ID port channel.
Step 4 UCS-A Creates the specified member port from the port channel
/fc-uplink/fabric/fcoe-port-channel # and enters FCoE uplink fabric port channel member
create member-port slot-num port mode.
port-num Note If the FCoE uplink port channel is a unified
uplink port channel, you will get the following
message:
Warning: if this is a unified port channel then
member will be added to the ethernet port
channel of the same id as well.
The following example adds the member port on slot 1, port 7 to FCoE port channel 13 on fabric A and
commits the transaction.
UCS-A# scope fc-uplink
UCS-A /fc-uplink # scope fabric a
UCS-A /fc-uplink/fabric # scope fcoe-port-channel 13
UCS-A /fc-uplink/fabric # create member-port 1 7
UCS-A /fc-uplink/fabric/fcoe-port-channel* # commit-buffer
UCS-A /fc-uplink/fabric/fcoe-port-channel #
If you disable an Ethernet uplink port channel, it disables the underlying physical port channel in a unified
uplink port channel. Therefore, even when the FCoE uplink is enabled, the FCoE uplink port channel also
goes down. If you disable an FCoE uplink port channel, only the VFC goes down. If the Ethernet uplink port
channel is enabled, it can still function properly in the unified uplink port channel.
Procedure
Step 2 UCS-A /eth-uplink # scope fabric {a | b} Enters Ethernet uplink fabric mode for the
specified fabric.
Step 3 UCS-A /eth-uplink/fabric # create Creates a port channel for the specified
port-channel ID Ethernet uplink port.
The following example creates a unified uplink port channel on an existing FCoE port channel:
UCS-A# scope eth-uplink
UCS-A /eth-uplink # scope fabric b
UCS-A /eth-uplink/fabric # create port-channel 2
UCS-A /eth-uplink/fabric/port-channel* # commit-buffer
UCS-A /eth-uplink/fabric #
Note The network interface port statistics is collected only from active ports and the information is sent to Cisco
UCS Manager.
Step 2 UCS-A/chassis # scope iom {a | b} Enters chassis IOM mode for the specified
IOM.
The following example shows how to display the statistics for the network interface ports:
UCS-A # scope chassis 1
UCS-A/chassis # scope iom a
UCS-A/chassis/iom # scope port-group fabric
UCS-A/chassis/iom/port-group # scope faric-if 1
UCS-A/chassis/iom/port-group/fabric-if # show stats
NI Ether Error Stats:
Time Collected: 2014-08-20T15:37:24:688
Monitored Object: sys/chassis-1/slot-1/fabric/port-1/ni-err-stats
Suspect: Yes
Crc (errors): 5000
Frame Tx (errors): 0
Too Long (errors): 0
Too Short (errors): 0
In Range (errors): 0
Thresholded: 0
Step 2 UCS-A /chassis # scope iom {a b} Enters chassis IOM mode for the specified
IOM.
Step 3 UCS-A /chassis/iom # scope port group Enters port group mode for the specified port
group.
Step 4 UCS-A /chassis/iom/port group # show Displays the adapter port channels on the
host-port-channel [detail | expand] specified chassis.
This following example shows how to display information on host port channels within a port group mode:
UCS-A # scope chassis 1
UCS-A /chassis # scope iom a
UCS-A /chassis/iom # scope port group
UCS-A /chassis/iom/port group # show host-port-channel
For each IOM there is a single fabric port channel. Each uplink connecting an IOM to a fabric interconnect
can be configured as a discrete link or included in the port channel, but an uplink cannot belong to more than
one fabric port channel. For example, if a chassis with two IOMs is discovered and the chassis discovery
policy is configured to create fabric port channels, Cisco UCS Manager creates two separate fabric port
channels: one for the uplinks connecting IOM-1 and another for the uplinks connecting IOM-2. No other
chassis can join these fabric port channels. Similarly, uplinks belonging to the fabric port channel for IOM-1
cannot join the fabric port channel for IOM-2.
In this example, a 2200 Series IOM module is verified by connecting iom X (where X is the chassis number).
show platform software fwmctrl nifport
(....)
Hash Parameters:
l2_da: 1 l2_sa: 1 l2_vlan: 0
l3_da: 1 l3_sa: 1
l4_da: 1 l4_sa: 1
FCoE l2_da: 1 l2_sa: 1 l2_vlan: 0
FCoE l3_did: 1 l3_sid: 1 l3_oxid: 1
Caution Adding a second link to a fabric-port-channel port group is disruptive and will automatically increase the
available amount of VIF namespace from 63 to 118. Adding further links is not disruptive and the VIF
namespace stays at 118.
Caution Linking a chassis to two fabric-port-channel port groups does not affect the VIF namespace unless it is
manually acknowledged. The VIF namespace is then automatically set to the smaller size fabric port-channel
port group usage (either 63 or 118 VIFs) of the two groups.
For high availability cluster-mode applications, we strongly recommend symmetric cabling configurations.
If the cabling is asymmetric, the maximum number of VIFs available is the smaller of the two cabling
configurations.
For more information on the maximum number of VIFs for your Cisco UCS environment, see the Configuration
Limits document for your hardware and software configuration.
Step 1 To include all links from the IOM to the fabric interconnect in a fabric port channel during chassis discovery,
set the link grouping preference in the chassis discovery policy to port channel.
Step 2 To include links from individual chassis in a fabric port channel during chassis discovery, set the link grouping
preference in the chassis connectivity policy to port channel.
Step 3 After chassis discovery, enable or disable additional fabric port channel member ports.
What to Do Next
To add or remove chassis links from a fabric port channel after making a change to the chassis discovery
policy or the chassis connectivity policy, reacknowledge the chassis. Chassis reacknowledgement is not
required to enable or disable chassis member ports from a fabric port channel
Step 2 UCS-A /eth-server # scope fabric {a | b} Enters Ethernet server fabric mode for the
specified fabric.
Step 3 UCS-A /eth-server/fabric # show Displays fabric port channels on the specified
fabric-port-channel [detail | expand] fabric interconnect.
The following example displays information about configured fabric port channels on fabric interconnect A:
UCS-A# scope eth-server
UCS-A /eth-server # scope fabric a
UCS-A /eth-server/fabric # show fabric-port-channel
Fabric Port Channel:
Port Channel Id Chassis Id Admin State Oper State State Reason
--------------- ---------- ----------- ---------------- ------------
1025 1 Enabled Failed No operational members
1026 2 Enabled Up
UCS-A /eth-server/fabric #
Step 2 UCS-A /eth-server # scope fabric {a | b} Enters Ethernet server fabric mode for the
specified fabric.
Step 3 UCS-A /eth-server/fabric # scope Enters Ethernet server fabric, fabric port
fabric-port-channel port-chan-id channel mode for the specified fabric.
The following example disables fabric channel member port 1 31 on fabric port channel 1025 and commits
the transaction:
UCS-A# scope eth-server
UCS-A /eth-server # scope fabric a
UCS-A /eth-server/fabric # scope fabric-port-channel 1025
UCS-A /eth-server/fabric/fabric-port-channel # scope member-port 1 31
UCS-A /eth-server/fabric/fabric-port-channel/member-port # disable
UCS-A /eth-server/fabric/fabric-port-channel/member-port* # commit-buffer
UCS-A /eth-server/fabric/fabric-port-channel/member-port #
Communication Services
You can use the communication services defined below to interface third-party applications with Cisco UCS.
Cisco UCS Manager supports IPv4 and IPv6 address access for the following services:
• CIM XML
• HTTP
• HTTPS
• SNMP
• SSH
• Telnet
Cisco UCS Manager supports out-of-band IPv4 address access to the Cisco UCS KVM Direct launch page
from a web browser. To provide this access, you must enable the following service:
• CIMC Web Service
SMASH CLP This service is enabled for read-only access and supports a limited subset of the
protocols, such as the show command. You cannot disable it.
This shell service is one of the standards that the Distributed Management Task
Force defines.
SNMP By default, this service is disabled. If enabled, the default port is 161. You must
configure the community and at least one SNMP trap.
Enable this service only if your system includes integration with an SNMP server.
Step 3 UCS-A /system/services # enable cimxml Enables the CIM XLM service.
Step 4 UCS-A /system/services # set cimxml port Specifies the port for the CIM XML
port-num connection.
The following example enables CIM XML, sets the port number to 5988, and commits the transaction:
UCS-A# scope system
UCS-A /system # scope services
UCS-A /system/services # enable cimxml
UCS-A /system/services* # set cimxml port 5988
UCS-A /system/services* # commit-buffer
UCS-A /system/services #
Configuring HTTP
Procedure
Step 4 UCS-A /system/services # set http port Specifies the port to be used for the HTTP
port-num connection.
The following example enables HTTP, sets the port number to 80, and commits the transaction:
UCS-A# scope system
UCS-A /system # scope services
UCS-A /system/services # enable http
UCS-A /system/services* # set http port 80
Warning: When committed, this closes all the web sessions.
UCS-A /system/services* # commit-buffer
UCS-A /system/services #
Unconfiguring HTTP
Procedure
Configuring HTTPS
Certificates, Key Rings, and Trusted Points
HTTPS uses components of the Public Key Infrastructure (PKI) to establish secure communications between
two devices, such as a client's browser and Cisco UCS Manager.
Certificates
To prepare for secure communications, two devices first exchange their digital certificates. A certificate is a
file containing a device's public key along with signed information about the device's identity. To merely
support encrypted communications, a device can generate its own key pair and its own self-signed certificate.
When a remote user connects to a device that presents a self-signed certificate, the user has no easy method
to verify the identity of the device, and the user's browser will initially display an authentication warning. By
default, Cisco UCS Manager contains a built-in self-signed certificate containing the public key from the
default key ring.
Trusted Points
To provide stronger authentication for Cisco UCS Manager, you can obtain and install a third-party certificate
from a trusted source, or trusted point, that affirms the identity of your device. The third-party certificate is
signed by the issuing trusted point, which can be a root certificate authority (CA) or an intermediate CA or
trust anchor that is part of a trust chain that leads to a root CA. To obtain a new certificate, you must generate
a certificate request through Cisco UCS Manager and submit the request to a trusted point.
Procedure
Step 2 UCS-A /security # create keyring keyring-name Creates and names the key ring.
Step 3 UCS-A /security/keyring # set modulus {mod1024 Sets the SSL key length in bits.
| mod1536 | mod2048 | mod512}
The following example creates a keyring with a key size of 1024 bits:
UCS-A# scope security
UCS-A /security # create keyring kr220
UCS-A /security/keyring* # set modulus mod1024
UCS-A /security/keyring* # commit-buffer
UCS-A /security/keyring #
What to Do Next
Create a certificate request for this key ring.
Procedure
Step 2 UCS-A /security # scope keyring default Enters key ring security mode for the
default key ring.
Step 3 UCS-A /security/keyring # set regenerate yes Regenerates the default key ring.
Procedure
Step 2 UCS-A /security # scope keyring Enters configuration mode for the key ring.
keyring-name
Step 3 UCS-A /security/keyring # create certreq Creates a certificate request using the IPv4 or IPv6
{ip [ipv4-addr | ipv6-v6] |subject-name address specified, or the name of the fabric
name} interconnect. You are prompted to enter a password
for the certificate request.
The following example creates and displays a certificate request with an IPv4 address for a key ring, with
basic options:
UCS-A# scope security
UCS-A /security # scope keyring kr220
UCS-A /security/keyring # create certreq ip 192.168.200.123 subject-name sjc04
Certificate request password:
Confirm certificate request password:
UCS-A /security/keyring* # commit-buffer
UCS-A /security/keyring # show certreq
Certificate request subject name: sjc04
Certificate request ip address: 192.168.200.123
Certificate request e-mail name:
Certificate request country name:
State, province or county (full name):
Locality (eg, city):
Organization name (eg, company):
Organization Unit name (eg, section):
Request:
-----BEGIN CERTIFICATE REQUEST-----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-----END CERTIFICATE REQUEST-----
UCS-A /security/keyring #
Procedure
Step 2 UCS-A /security # scope keyring Enters configuration mode for the key ring.
keyring-name
Step 3 UCS-A /security/keyring # create certreq Creates a certificate request.
Step 4 UCS-A /security/keyring/certreq* # set Specifies the country code of the country in
country country name which the company resides.
Step 5 UCS-A /security/keyring/certreq* # set dns Specifies the Domain Name Server (DNS)
DNS Name address associated with the request.
Step 6 UCS-A /security/keyring/certreq* # set e-mail Specifies the email address associated with
E-mail name the certificate request.
Step 12 UCS-A /security/keyring/certreq* # set state Specifies the state or province in which the
state, province or county company requesting the certificate is
headquartered.
Step 13 UCS-A /security/keyring/certreq* # set Specifies the fully qualified domain name of
subject-name certificate request name the Fabric Interconnect.
The following example creates and displays a certificate request with an IPv4 address for a key ring, with
advanced options:
UCS-A# scope security
UCS-A /security # scope keyring kr220
UCS-A /security/keyring # create certreq
UCS-A /security/keyring/certreq* # set ip 192.168.200.123
UCS-A /security/keyring/certreq* # set subject-name sjc04
UCS-A /security/keyring/certreq* # set country US
UCS-A /security/keyring/certreq* # set dns bg1-samc-15A
UCS-A /security/keyring/certreq* # set email [email protected]
UCS-A /security/keyring/certreq* # set locality new york city
UCS-A /security/keyring/certreq* # set org-name "Cisco Systems"
UCS-A /security/keyring/certreq* # set org-unit-name Testing
UCS-A /security/keyring/certreq* # set state new york
UCS-A /security/keyring/certreq* # commit-buffer
UCS-A /security/keyring/certreq # show certreq
Certificate request subject name: sjc04
Certificate request ip address: 192.168.200.123
Certificate request e-mail name: [email protected]
Certificate request country name: US
State, province or county (full name): New York
Locality name (eg, city): new york city
Organization name (eg, company): Cisco
Organization Unit name (eg, section): Testing
Request:
-----BEGIN CERTIFICATE REQUEST-----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-----END CERTIFICATE REQUEST-----
UCS-A /security/keyring/certreq #
What to Do Next
• Copy the text of the certificate request, including the BEGIN and END lines, and save it in a file. Send
the file with the certificate request to a trust anchor or certificate authority to obtain a certificate for the
key ring.
• Create a trusted point and set the certificate chain for the certificate of trust received from the trust
anchor.
Step 2 UCS-A /security # create trustpoint Creates and names a trusted point.
name
Step 3 UCS-A /security/trustpoint # set Specifies certificate information for this trusted point.
certchain [ certchain ]
The following example creates a trusted point and provides a certificate for the trusted point:
UCS-A# scope security
UCS-A /security # create trustpoint tPoint10
UCS-A /security/trustpoint* # set certchain
Enter lines one at a time. Enter ENDOFBUF to finish. Press ^C to abort.
Trustpoint Certificate Chain:
> -----BEGIN CERTIFICATE-----
> MIIDMDCCApmgAwIBAgIBADANBgkqhkiG9w0BAQQFADB0MQswCQYDVQQGEwJVUzEL
> BxMMU2FuIEpvc2UsIENBMRUwEwYDVQQKEwxFeGFtcGxlIEluYy4xEzARBgNVBAsT
> ClRlc3QgR3JvdXAxGTAXBgNVBAMTEHRlc3QuZXhhbXBsZS5jb20xHzAdBgkqhkiG
> 9w0BCQEWEHVzZXJAZXhhbXBsZS5jb20wgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJ
> AoGBAMZw4nTepNIDhVzb0j7Z2Je4xAG56zmSHRMQeOGHemdh66u2/XAoLx7YCcYU
> ZgAMivyCsKgb/6CjQtsofvtrmC/eAehuK3/SINv7wd6Vv2pBt6ZpXgD4VBNKONDl
> GMbkPayVlQjbG4MD2dx2+H8EH3LMtdZrgKvPxPTE+bF5wZVNAgMBAAGgJTAjBgkq
> hkiG9w0BCQcxFhMUQSBjaGFsbGVuZ2UgcGFzc3dvcmQwDQYJKoZIhvcNAQEFBQAD
> gYEAG61CaJoJaVMhzCl903O6Mg51zq1zXcz75+VFj2I6rH9asckCld3mkOVx5gJU
> Ptt5CVQpNgNLdvbDPSsXretysOhqHmp9+CLv8FDuy1CDYfuaLtvlWvfhevskV0j6
> jtcEMyZ+f7+3yh421ido3nO4MIGeBgNVHSMEgZYwgZOAFLlNjtcEMyZ+f7+3yh42
> 1ido3nO4oXikdjB0MQswCQYDVQQGEwJVUzELMAkGA1UECBMCQ0ExFDASBgNVBAcT
> C1NhbnRhIENsYXJhMRswGQYDVQQKExJOdW92YSBTeXN0ZW1zIEluYy4xFDASBgNV
> BAsTC0VuZ2luZWVyaW5nMQ8wDQYDVQQDEwZ0ZXN0Q0GCAQAwDAYDVR0TBAUwAwEB
> /zANBgkqhkiG9w0BAQQFAAOBgQAhWaRwXNR6B4g6Lsnr+fptHv+WVhB5fKqGQqXc
> wR4pYiO4z42/j9Ijenh75tCKMhW51az8copP1EBmOcyuhf5C6vasrenn1ddkkYt4
> PR0vxGc40whuiozBolesmsmjBbedUCwQgdFDWhDIZJwK5+N3x/kfa2EHU6id1avt
> 4YL5Jg==
> -----END CERTIFICATE-----
> ENDOFBUF
UCS-A /security/trustpoint* # commit-buffer
UCS-A /security/trustpoint #
What to Do Next
Obtain a key ring certificate from the trust anchor or certificate authority and import it into the key ring.
Procedure
Step 2 UCS-A /security # scope keyring Enters configuration mode for the key ring that will receive
keyring-name the certificate.
Step 3 UCS-A /security/keyring # set Specifies the trusted point for the trust anchor or certificate
trustpoint name authority from which the key ring certificate was obtained.
Step 4 UCS-A /security/keyring # set cert Launches a dialog for entering and uploading the key ring
certificate.
At the prompt, paste the certificate text that you received
from the trust anchor or certificate authority. On the next
line following the certificate, type ENDOFBUF to complete
the certificate input.
Important The certificate must be in Base64 encoded
X.509 (CER) format.
Step 5 UCS-A /security/keyring # Commits the transaction.
commit-buffer
The following example specifies the trust point and imports a certificate into a key ring:
UCS-A# scope security
UCS-A /security # scope keyring kr220
UCS-A /security/keyring # set trustpoint tPoint10
UCS-A /security/keyring* # set cert
Enter lines one at a time. Enter ENDOFBUF to finish. Press ^C to abort.
Keyring certificate:
> -----BEGIN CERTIFICATE-----
> MIIB/zCCAWgCAQAwgZkxCzAJBgNVBAYTAlVTMQswCQYDVQQIEwJDQTEVMBMGA1UE
> BxMMU2FuIEpvc2UsIENBMRUwEwYDVQQKEwxFeGFtcGxlIEluYy4xEzARBgNVBAsT
> ClRlc3QgR3JvdXAxGTAXBgNVBAMTEHRlc3QuZXhhbXBsZS5jb20xHzAdBgkqhkiG
> 9w0BCQEWEHVzZXJAZXhhbXBsZS5jb20wgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJ
> AoGBAMZw4nTepNIDhVzb0j7Z2Je4xAG56zmSHRMQeOGHemdh66u2/XAoLx7YCcYU
> ZgAMivyCsKgb/6CjQtsofvtrmC/eAehuK3/SINv7wd6Vv2pBt6ZpXgD4VBNKONDl
> GMbkPayVlQjbG4MD2dx2+H8EH3LMtdZrgKvPxPTE+bF5wZVNAgMBAAGgJTAjBgkq
> hkiG9w0BCQcxFhMUQSBjaGFsbGVuZ2UgcGFzc3dvcmQwDQYJKoZIhvcNAQEFBQAD
> gYEAG61CaJoJaVMhzCl903O6Mg51zq1zXcz75+VFj2I6rH9asckCld3mkOVx5gJU
> Ptt5CVQpNgNLdvbDPSsXretysOhqHmp9+CLv8FDuy1CDYfuaLtvlWvfhevskV0j6
> mK3Ku+YiORnv6DhxrOoqau8r/hyI/L43l7IPN1HhOi3oha4=
> -----END CERTIFICATE-----
> ENDOFBUF
UCS-A /security/keyring* # commit-buffer
UCS-A /security/keyring #
What to Do Next
Configure your HTTPS service with the key ring.
Configuring HTTPS
Caution After you complete the HTTPS configuration, including changing the port and key ring for the HTTPS
to use, all current HTTP and HTTPS sessions are closed without warning as soon as you save or commit
the transaction.
Procedure
The following example enables HTTPS, sets the port number to 443, sets the key ring name to kring7984,
sets the Cipher Suite security level to high, and commits the transaction:
UCS-A# scope system
UCS-A /system # scope services
UCS-A /system/services # enable https
UCS-A /system/services* # set https port 443
Warning: When committed, this closes all the web sessions.
UCS-A /system/services* # set https keyring kring7984
UCS-A /system/services* # set https cipher-suite-mode high
UCS-A /system/services* # commit-buffer
UCS-A /system/services #
Step 2 UCS-A /security # delete keyring name Deletes the named key ring.
Procedure
Step 2 UCS-A /security # delete trustpoint name Deletes the named trusted point.
Unconfiguring HTTPS
Before You Begin
Disable HTTP to HTTPS redirection.
Procedure
Procedure
The following example enables HTTP to HTTPS redirection and commits the transaction:
UCS-A# scope system
UCS-A /system # scope services
UCS-A /system/services # enable http-redirect
Warning: When committed, this closes all the web sessions.
UCS-A /system/services* # commit-buffer
UCS-A /system/services #
Enabling SNMP
SNMP Overview
The Simple Network Management Protocol (SNMP) is an application-layer protocol that provides a message
format for communication between SNMP managers and agents. SNMP provides a standardized framework
and a common language for monitoring and managing devices in a network.
Cisco UCS supports SNMPv1, SNMPv2c and SNMPv3. Both SNMPv1 and SNMPv2c use a community-based
form of security. SNMP is defined in the following:
• RFC 3410 (http://tools.ietf.org/html/rfc3410)
• RFC 3411 (http://tools.ietf.org/html/rfc3411)
• RFC 3412 (http://tools.ietf.org/html/rfc3412)
• RFC 3413 (http://tools.ietf.org/html/rfc3413)
• RFC 3414 (http://tools.ietf.org/html/rfc3414)
• RFC 3415 (http://tools.ietf.org/html/rfc3415)
• RFC 3416 (http://tools.ietf.org/html/rfc3416)
• RFC 3417 (http://tools.ietf.org/html/rfc3417)
• RFC 3418 (http://tools.ietf.org/html/rfc3418)
• RFC 3584 (http://tools.ietf.org/html/rfc3584)
SNMP Notifications
A key feature of SNMP is the ability to generate notifications from an SNMP agent. These notifications do
not require that requests be sent from the SNMP manager. Notifications can indicate improper user
authentication, restarts, the closing of a connection, loss of connection to a neighbor router, or other significant
events.
Cisco UCS Manager generates SNMP notifications as either traps or informs. Traps are less reliable than
informs because the SNMP manager does not send any acknowledgment when it receives a trap, and Cisco
UCS Manager cannot determine if the trap was received. An SNMP manager that receives an inform request
acknowledges the message with an SNMP response Protocol Data Unit (PDU). If the Cisco UCS Manager
does not receive the PDU, it can send the inform request again.
SNMPv3 provides for both security models and security levels. A security model is an authentication strategy
that is set up for a user and the role in which the user resides. A security level is the permitted level of security
within a security model. A combination of a security model and a security level determines which security
mechanism is employed when handling an SNMP packet.
Procedure
Step 5 UCS-A /monitoring # set snmp Specifies the system contact person responsible for
syscontact system-contact-name the SNMP. The system contact name can be any
alphanumeric string up to 255 characters, such as an
email address or name and telephone number.
Step 6 UCS-A /monitoring # set snmp Specifies the location of the host on which the SNMP
syslocation system-location-name agent (server) runs. The system location name can be
any alphanumeric string up to 512 characters.
Step 7 UCS-A /monitoring # commit-buffer Commits the transaction to the system configuration.
The following example enables SNMP, configures an SNMP community named SnmpCommSystem2,
configures a system contact named contactperson, configures a contact location named systemlocation, and
commits the transaction:
UCS-A# scope monitoring
UCS-A /monitoring # enable snmp
UCS-A /monitoring* # set snmp community
UCS-A /monitoring* # Enter a snmp community: SnmpCommSystem2
UCS-A /monitoring* # set snmp syscontact contactperson1
UCS-A /monitoring* # set snmp syslocation systemlocation
UCS-A /monitoring* # commit-buffer
UCS-A /monitoring #
What to Do Next
Create SNMP traps and users.
Step 4 UCS-A /monitoring/snmp-trap # set Specifies the SNMP community name to be used for
community community-name the SNMP trap.
Step 5 UCS-A /monitoring/snmp-trap # set port Specifies the port to be used for the SNMP trap.
port-num
Step 6 UCS-A /monitoring/snmp-trap # set Specifies the SNMP version and model used for the
version {v1 | v2c | v3} trap.
The following example enables SNMP, creates an SNMP trap using an IPv4 address, specifies that the trap
will use the SnmpCommSystem2 community on port 2, sets the version to v3, sets the notification type to
traps, sets the v3 privilege to priv, and commits the transaction:
UCS-A# scope monitoring
UCS-A /monitoring # enable snmp
UCS-A /monitoring* # create snmp-trap 192.168.100.112
UCS-A /monitoring/snmp-trap* # set community SnmpCommSystem2
UCS-A /monitoring/snmp-trap* # set port 2
UCS-A /monitoring/snmp-trap* # set version v3
UCS-A /monitoring/snmp-trap* # set notificationtype traps
UCS-A /monitoring/snmp-trap* # set v3 privilege priv
UCS-A /monitoring/snmp-trap* # commit-buffer
UCS-A /monitoring/snmp-trap #
The following example enables SNMP, creates an SNMP trap using an IPv6 address, specifies that the trap
will use the SnmpCommSystem3 community on port 2, sets the version to v3, sets the notification type to
traps, sets the v3 privilege to priv, and commits the transaction:
UCS-A# scope monitoring
UCS-A /monitoring # enable snmp
UCS-A /monitoring* # create snmp-trap 2001::1
UCS-A /monitoring/snmp-trap* # set community SnmpCommSystem3
UCS-A /monitoring/snmp-trap* # set port 2
UCS-A /monitoring/snmp-trap* # set version v3
UCS-A /monitoring/snmp-trap* # set notificationtype traps
UCS-A /monitoring/snmp-trap* # set v3 privilege priv
UCS-A /monitoring/snmp-trap* # commit-buffer
UCS-A /monitoring/snmp-trap #
Step 2 UCS-A /monitoring # delete snmp-trap Deletes the specified SNMP trap host with the
{hostname | ip-addr} specified hostname or IP address.
The following example deletes the SNMP trap at IP address 192.168.100.112 and commits the transaction:
UCS-A# scope monitoring
UCS-A /monitoring # delete snmp-trap 192.168.100.112
UCS-A /monitoring* # commit-buffer
UCS-A /monitoring #
Step 3 UCS-A /monitoring # create snmp-user Creates the specified SNMPv3 user.
user-name An SNMP username cannot be the same as a local
username. Choose an SNMP username that does not
match a local username.
Step 7 UCS-A /monitoring/snmp-user # set Specifies the user privacy password. After you enter
priv-password the set priv-password command, you are prompted
to enter and confirm the privacy password.
The following example enables SNMP, creates an SNMPv3 user named snmp-user14, disables AES-128
encryption, specifies the use of MD5 authentication, sets the password and privacy password, and commits
the transaction:
UCS-A# scope monitoring
UCS-A /monitoring # enable snmp
UCS-A /monitoring* # create snmp-user snmp-user14
UCS-A /monitoring/snmp-user* # set aes-128 no
UCS-A /monitoring/snmp-user* # set auth md5
UCS-A /monitoring/snmp-user* # set password
Enter a password:
Confirm the password:
UCS-A /monitoring/snmp-user* # set priv-password
Enter a password:
Confirm the password:
UCS-A /monitoring/snmp-user* # commit-buffer
UCS-A /monitoring/snmp-user #
Step 2 UCS-A /monitoring # delete snmp-user Deletes the specified SNMPv3 user.
user-name
Step 3 UCS-A /monitoring # commit-buffer Commits the transaction to the system
configuration.
The following example deletes the SNMPv3 user named snmp-user14 and commits the transaction:
UCS-A# scope monitoring
UCS-A /monitoring # delete snmp-user snmp-user14
UCS-A /monitoring* # commit-buffer
UCS-A /monitoring #
Enabling Telnet
Procedure
Procedure
The following example shows how to enable the CIMC web service and save the transaction:
UCS-A# scope system
UCS-A/system # scope services
UCS-A/system/services # enable cimcwebsvc
UCS-A/system/services *# commit-buffer
UCS-A/system/services # commit-buffer
UCS-A/system/services # show cimcwebsvc
Name: cimcwebservice
Admin State: Enabled
Procedure
The following example shows how to disable the CIMC web service and save the transaction:
UCS-A# scope system
UCS-A/system # scope services
UCS-A/system/services # disable cimcwebsvc
UCS-A/system/services *# commit-buffer
UCS-A/system/services # commit-buffer
UCS-A/system/services # show cimcwebsvc
Name: cimcwebservice
Admin State: Disabled
Step 3 UCS-A /system/services # disable Disables the specified service, where the service-name
service-name argument is one of the following keywords:
• cimxml —Disables CIM XML service
• http —Disables HTTP service
• https —Disables HTTPS service
• telnet-server —Disables Telnet service
The following example disables CIM XML and commits the transaction:
UCS-A# scope system
UCS-A# scope services
UCS-A /system/services # disable cimxml
UCS-A /system/services* # commit-buffer
UCS-A /system/services #
Authentication Services
Cisco UCS supports the following two methods to authenticate user logins:
• Local user authentication - uses user accounts that exist locally in the Cisco UCS Manager
• Remote user authentication - uses one of the following protocols:
◦LDAP
◦RADIUS
◦TACACS+
Note This step is not required for LDAP configurations that use the LDAP Group Mapping to assign roles and
locales.
When a user logs in, Cisco UCS Manager does the following:
1 Queries the remote authentication service.
2 Validates the user.
3 If the user is validated, checks for the roles and locales assigned to that user.
The following table contains a comparison of the user attribute requirements for the remote authentication
providers supported by Cisco UCS.
RADIUS Optional Optional. You can choose to do The vendor ID for the Cisco
one of the following: RADIUS implementation is 009 and
the vendor ID for the attribute is
• Do not extend the RADIUS 001.
schema and use an existing
unused attribute that meets The following syntax example
the requirements. shows how to specify multiples user
roles and locales if you choose to
• Extend the RADIUS schema create the cisco-avpair attribute:
and create a custom attribute shell:roles="admin,aaa"
with a unique name, such as shell:locales="L1,abc". Use a
cisco-avpair. comma "," as the delimiter to
separate multiple values.
TACACS+ Required Required. You must extend the The cisco-av-pair name is the string
schema and create a custom that provides the attribute ID for the
attribute with the name TACACS+ provider.
cisco-av-pair. The following syntax example
shows how to specify multiples user
roles and locales when you create
the cisco-av-pair attribute:
cisco-av-pair=shell:roles="admin
aaa" shell:locales*"L1 abc".
Using an asterisk (*) in the
cisco-av-pair attribute syntax flags
the locale as optional, preventing
authentication failures for other
Cisco devices that use the same
authorization profile. Use a space
as the delimiter to separate multiple
values.
CN=CiscoAVPair,CN=Schema,
CN=Configuration,CN=X
objectClass: top
objectClass: attributeSchema
cn: CiscoAVPair
distinguishedName: CN=CiscoAVPair,CN=Schema,CN=Configuration,CN=X
instanceType: 0x4
uSNCreated: 26318654
attributeID: 1.3.6.1.4.1.9.287247.1
attributeSyntax: 2.5.5.12
isSingleValued: TRUE
showInAdvancedViewOnly: TRUE
adminDisplayName: CiscoAVPair
adminDescription: UCS User Authorization Field
oMSyntax: 64
lDAPDisplayName: CiscoAVPair
name: CiscoAVPair
objectCategory: CN=Attribute-Schema,CN=Schema,CN=Configuration,CN=X
Two-Factor Authentication
Cisco UCS Manager uses two-factor authentication for remote user logins, which adds a level of security to
account logins. Two-factor authentication login requires a username, a token, and a password combination
in the password field. You can provide a PIN, a certificate, or a token.
Two-factor authentication uses authentication applications that maintain token servers to generate one-time
tokens for users during the login process and store passwords in the AAA server. Requests are sent to the
token server to retrieve a vendor-specific attribute. Cisco UCS Manager expects the token server to integrate
with the AAA server, therefore it forwards the request to the AAA server. The password and token are validated
at the same time by the AAA server. Users must enter the token and password sequence in the same order as
it is configured in the AAA server.
Two-factor authentication is supported by associating RADIUS or TACACS+ provider groups with designated
authentication domains and enabling two-factor authentication for those domains. Two-factor authentication
does not support IPM and is not supported when the authentication realm is set to LDAP, local, or none.
Note Nested LDAP search support is supported only for Microsoft Active Directory servers. The supported
versions are Microsoft Windows 2003 SP3, Microsoft Windows 2008 R2, and Microsoft Windows 2012.
By default, user rights are inherited when you nest an LDAP group within another group. For example, if you
make Group_1 a member of Group_2, the users in Group_1 have the same permissions as the members of
Group_2. You can then search users that are members of Group_1 by choosing only Group_2 in the LDAP
group map, instead of having to search Group_1 and Group_2 separately.
You do not always need to create subgroups in a group map in Cisco UCS Manager.
Procedure
Step 3 UCS-A /security/ldap # set attribute Restricts database searches to records that contain
attribute the specified attribute.
Step 4 UCS-A /security/ldap # set basedn Restricts database searches to records that contain
distinguished-name the specified distinguished name.
The following example sets the LDAP attribute to CiscoAvPair, the base distinguished name to
"DC=cisco-ucsm-aaa3,DC=qalab,DC=com", the filter to sAMAccountName=$userid, and the timeout interval
to 5 seconds, and commits the transaction:
UCS-A# scope security
UCS-A /security # scope ldap
UCS-A /security/ldap # set attribute CiscoAvPair
UCS-A /security/ldap* # set basedn "DC=cisco-ucsm-aaa3,DC=qalab,DC=com"
UCS-A /security/ldap* # set filter sAMAccountName=$userid
UCS-A /security/ldap* # set timeout 5
UCS-A /security/ldap* # commit-buffer
UCS-A /security/ldap #
Note User login will fail if the userdn for an LDAP user exceeds 255 characters.
What to Do Next
Create an LDAP provider.
If you choose to create the CiscoAVPair custom attribute, use the following attribute ID:
1.3.6.1.4.1.9.287247.1
◦For a cluster configuration, add the management port IPv4 or IPv6 addresses for both fabric
interconnects. This configuration ensures that remote users can continue to log in if the first fabric
interconnect fails and the system fails over to the second fabric interconnect. All login requests
are sourced from these IP addresses, not the virtual IPv4 or IPv6 address used by Cisco UCS
Manager.
• If you want to use secure communications, create a trusted point containing the certificate of the root
certificate authority (CA) of the LDAP server in Cisco UCS Manager.
• If you need to change the LDAP providers or add or delete them, you need to change the authentication
realm for the domain to local, make the changes to the providers, and then change the domain
authentication realm back to LDAP.
• If you want to use the special characters listed in the following table for defining the attributes of an
Active Directory bind distinguished name, you must replace the special character with an escape, by
using a backslash (\) followed by the corresponding hexadecimal value of the character.
\ backslash 0x5C
; semicolon 0x3B
Procedure
Step 11 UCS-A Enables or disables the use of encryption when communicating with
/security/ldap/server # set the LDAP server. The options are as follows:
ssl {yes no}
• yes —Encryption is required. If encryption cannot be negotiated,
the connection fails.
• no —Encryption is disabled. Authentication information is sent
as clear text.
Step 12 UCS-A The length of time in seconds the system spends trying to contact the
/security/ldap/server # set LDAP database before it times out.
timeout timeout-num Enter an integer from 1 to 60 seconds, or enter 0 (zero) to use the
global timeout value specified on the LDAP General tab. The default
is 30 seconds.
Step 13 UCS-A Enables or disables the use of the nested LDAP group search capability
/security/ldap/server # set on the LDAP server. The options are as follows:
vendor {ms-ad | openldap}
• ms-ad—Nested LDAP group searches are supported with this
option. If you set the vendor to ms-ad (Microsoft Active
Directory), and enable and set the ldap-group-rule to recursive,
Cisco UCS Manager can search through any nested LDAP
groups.
• openldap—Nested LDAP group searches are not supported
with this option. If you set the vendor to openldap, and enable
and set the ldap-group-rule to recursive, Cisco UCS Managerwill
not search through any nested LDAP groups. If you choose this
option, you must create each LDAP subgroup as an LDAP group
map in Cisco UCS Manager, even if the parent group is already
set up in a group map.
The following example creates an LDAP server instance named 10.193.169.246, configures the binddn,
password, order, port, SSL settings, vendor attribute, and commits the transaction:
UCS-A# scope security
UCS-A /security # scope ldap
UCS-A /security/ldap* # create server 10.193.169.246
UCS-A /security/ldap/server* # set binddn
"cn=Administrator,cn=Users,DC=cisco-ucsm-aaa3,DC=qalab,DC=com"
UCS-A /security/ldap/server* # set password
Enter the password:
Confirm the password:
UCS-A /security/ldap/server* # set order 2
UCS-A /security/ldap/server* # set port 389
UCS-A /security/ldap/server* # set ssl yes
UCS-A /security/ldap/server* # set timeout 30
UCS-A /security/ldap/server* # set vendor ms-ad
UCS-A /security/ldap/server* # commit-buffer
UCS-A /security/ldap/server #
The following example creates an LDAP server instance named 12:31:71:1231:45b1:0011:011:900, configures
the binddn, password, order, port, SSL settings, vendor attribute, and commits the transaction:
UCS-A# scope security
UCS-A /security # scope ldap
UCS-A /security/ldap* # create server 12:31:71:1231:45b1:0011:011:900
UCS-A /security/ldap/server* # set binddn
"cn=Administrator,cn=Users,DC=cisco-ucsm-aaa3,DC=qalab,DC=com"
UCS-A /security/ldap/server* # set password
Enter the password:
Confirm the password:
UCS-A /security/ldap/server* # set order 1
UCS-A /security/ldap/server* # set port 389
UCS-A /security/ldap/server* # set ssl yes
UCS-A /security/ldap/server* # set timeout 45
UCS-A /security/ldap/server* # set vendor ms-ad
UCS-A /security/ldap/server* # commit-buffer
UCS-A /security/ldap/server #
What to Do Next
For implementations involving a single LDAP database, select LDAP as the authentication service.
For implementations involving multiple LDAP databases, configure an LDAP provider group.
Step 3 UCS-A /security/ldap # scope server Enters security LDAP provider mode.
ldap-provider
Step 4 UCS-A /security/ldap/server # scope Enters LDAP group rule mode.
ldap-group-rule
Step 5 UCS-A Specifies whether Cisco UCS searches LDAP groups when
/security/ldap/server/ldap-group-rule assigning user roles and locales to a remote user.
# set authorization {enable |
disable} • disable—Cisco UCS does not access any LDAP
groups.
• enable—Cisco UCS searches the LDAP provider
groups mapped in this Cisco UCS domain. If the
remote user is found, Cisco UCS assigns the user roles
and locales defined for that LDAP group in the
associated LDAP group map.
Step 7 UCS-A Specifies whether Cisco UCS takes the settings for a group
/security/ldap/server/ldap-group-rule member's parent group, if necessary. This can be:
# set traversal {non-recursive |
recursive} • non-recursive—Cisco UCS only searches those
groups that the user belongs to.
• recursive—Cisco UCS searches all the ancestor
groups belonging to the user.
The following example sets the LDAP group rule to enable authorization, sets the member of attribute to
memberOf, sets the traversal to non-recursive, and commits the transaction:
UCS-A# scope security
UCS-A /security # scope ldap
UCS-A /security/ldap # scope server ldapprovider
UCS-A /security/ldap/server # scope ldap-group-rule
UCS-A /security/ldap/server/ldap-group-rule # set authorization enable
UCS-A /security/ldap/server/ldap-group-rule* # set member-of-attribute memberOf
UCS-A /security/ldap/server/ldap-group-rule* # set traversal non-recursive
UCS-A /security/ldap/server/ldap-group-rule* # set use-primary-group yes
UCS-A /security/ldap/server/ldap-group-rule* # commit-buffer
UCS-A /security/ldap/server/ldap-group-rule #
The following example deletes the LDAP server called ldap1 and commits the transaction:
UCS-A# scope security
UCS-A /security # scope ldap
UCS-A /security/ldap # delete server ldap1
UCS-A /security/ldap* # commit-buffer
UCS-A /security/ldap #
When a user logs in to Cisco UCS Manager, the LDAP group map pulls information about the user's role and
locale. If the role and locale criteria match the information in the policy, access is granted. Cisco UCS Manager
supports a maximum of 28, 128, or 160 LDAP group maps depending on the release version.
Note Cisco UCS Manager Release 3.1(1) supports a maximum of 128 LDAP group maps, and Release 3.1(2)
and later releases support a maximum of 160 LDAP group maps.
The role and locale definitions that you configure locally in the Cisco UCS Manager do not update automatically
based on changes to an LDAP directory. When deleting or renaming LDAP groups in an LDAP directory,
you must also update the Cisco UCS Manager with the change.
You can configure an LDAP group map to include any of the following combinations of roles and locales:
• Roles only
• Locales only
• Both roles and locales
For example, consider an LDAP group representing a group of server administrators at a specific location.
The LDAP group map might include user roles such as server profile and server equipment. To restrict access
to server administrators at a specific location, you can set the locale to a particular site name.
Note Cisco UCS Manager includes out-of-the-box user roles, but does not include any locales. Mapping an
LDAP provider group to a locale requires that you create a custom locale.
Procedure
Step 3 UCS-A /security/ldap # create Creates an LDAP group map for the specified DN.
ldap-group group-dn The maximum number of characters for group-dn
is 240.
The following example maps the LDAP group mapped to a DN, sets the locale to pacific, sets the role to
admin, and commits the transaction:
UCS-A# scope security
UCS-A /security # scope ldap
UCS-A /security/ldap # create ldap-group cn=security,cn=users,dc=lab,dc=com
UCS-A /security/ldap/ldap-group* # create locale pacific
UCS-A /security/ldap/ldap-group* # create role admin
UCS-A /security/ldap/ldap-group* # commit-buffer
UCS-A /security/ldap/ldap-group #
What to Do Next
Set the LDAP group rule.
Step 3 UCS-A /security/ldap # delete ldap-group Deletes the LDAP group map for the
group-dn specified DN.
The following example deletes an LDAP group map and commits the transaction:
UCS-A# scope security
UCS-A /security # scope ldap
UCS-A /security/ldap # delete ldap-group cn=security,cn=users,dc=lab,dc=com
UCS-A /security/ldap* # commit-buffer
UCS-A /security/ldap #
Procedure
The following example sets the RADIUS retries to 4, sets the timeout interval to 30 seconds, and commits
the transaction:
UCS-A# scope security
UCS-A /security # scope radius
UCS-A /security/radius # set retries 4
UCS-A /security/radius* # set timeout 30
UCS-A /security/radius* # commit-buffer
UCS-A /security/radius #
What to Do Next
Create a RADIUS provider.
• Configure users with the attribute that holds the user role and locale information for Cisco UCS Manager.
You can choose whether to extend the RADIUS schema for this attribute. If you do not want to extend
the schema, use an existing RADIUS attribute to hold the Cisco UCS user roles and locales. If you prefer
to extend the schema, create a custom attribute, such as the cisco-avpair attribute.
The vendor ID for the Cisco RADIUS implementation is 009 and the vendor ID for the attribute is 001.
The following syntax example shows how to specify multiples user roles and locales if you choose to
create the cisco-avpair attribute: shell:roles="admin,aaa" shell:locales="L1,abc". Use a comma
"," as the delimiter to separate multiple values.
• For a cluster configuration, add the management port IPv4 or IPv6 addresses for both fabric interconnects.
This configuration ensures that remote users can continue to log in if the first fabric interconnect fails
and the system fails over to the second fabric interconnect. All login requests are sourced from these IP
addresses, not the virtual IP address used by Cisco UCS Manager.
Procedure
Step 3 UCS-A /security/radius # create Creates a RADIUS server instance and enters security
server server-name RADIUS server mode
Step 5 UCS-A /security/radius/server # set Sets the RADIUS server key. To set the key value,
key press Enter after typing the set key command and
enter the key value at the prompt.
The following example creates a server instance named radiusserv7, sets the authentication port to 5858, sets
the key to radiuskey321, sets the order to 2, sets the retries to 4, sets the timeout to 30, enables two-factor
authentication, and commits the transaction:
UCS-A# scope security
UCS-A /security # scope radius
UCS-A /security/radius # create server radiusserv7
UCS-A /security/radius/server* # set authport 5858
UCS-A /security/radius/server* # set key
Enter the key: radiuskey321
Confirm the key: radiuskey321
UCS-A /security/radius/server* # set order 2
UCS-A /security/radius/server* # set retries 4
UCS-A /security/radius/server* # set timeout 30
UCS-A /security/radius/server* # commit-buffer
UCS-A /security/radius/server #
What to Do Next
For implementations involving a single RADIUS database, select RADIUS as the primary authentication
service.
For implementations involving multiple RADIUS databases, configure a RADIUS provider group.
The following example deletes the RADIUS server called radius1 and commits the transaction:
UCS-A# scope security
UCS-A /security # scope radius
UCS-A /security/radius # delete server radius1
UCS-A /security/radius* # commit-buffer
UCS-A /security/radius #
Procedure
The following example sets the TACACS+ timeout interval to 45 seconds and commits the transaction:
UCS-A# scope security
UCS-A /security # scope tacacs
UCS-A /security/tacacs # set timeout 45
UCS-A /security/tacacs* # commit-buffer
UCS-A /security/tacacs #
What to Do Next
Create a TACACS+ provider.
authentication failures for other Cisco devices that use the same authorization profile. Use a space as
the delimiter to separate multiple values.
• For a cluster configuration, add the management port IPv4 or IPv6 addresses for both fabric interconnects.
This configuration ensures that remote users can continue to log in if the first fabric interconnect fails
and the system fails over to the second fabric interconnect. All login requests are sourced from these IP
addresses, not the virtual IP address used by Cisco UCS Manager.
Procedure
Step 3 UCS-A /security/tacacs # create Creates an TACACS+ server instance and enters
server server-name security TACACS+ server mode
The following example creates a server instance named tacacsserv680, sets the key to tacacskey321 and
confirms the key, sets the order to 4, sets the authentication port to 5859, and commits the transaction:
UCS-A# scope security
UCS-A /security # scope tacacs
UCS-A /security/tacacs # create server tacacsserv680
UCS-A /security/tacacs/server* # set key
Enter the key: tacacskey321
Confirm the key: tacacskey321
UCS-A /security/tacacs/server* # set order 4
UCS-A /security/tacacs/server* # set port 5859
UCS-A /security/tacacs/server* # commit-buffer
UCS-A /security/tacacs/server #
What to Do Next
For implementations involving a single TACACS+ database, select TACACS+ as the primary authentication
service.
For implementations involving multiple TACACS+ databases, configure a TACACS+ provider group.
The following example deletes the TACACS server called tacacs1 and commits the transaction:
UCS-A# scope security
UCS-A /security # scope tacacs
UCS-A /security/tacacs # delete server TACACS1
UCS-A /security/tacacs* # commit-buffer
UCS-A /security/tacacs #
After provider groups and authentication domains are configured in Cisco UCS Manager, you can use the
following syntax to log in to the system using Cisco UCS Manager CLI: ucs: auth-domain \ user-name .
When multiple authentication domains and native authentication are configured with a remote authentication
service, use one of the following syntax examples to log in with SSH, Telnet or Putty.
• ssh ucs-auth-domain\\username@{UCSM-ip-address|UCSM-ipv6-address}
ssh ucs-ldap23\\[email protected]
ssh ucs-ldap23\\jsmith@2001::1
• telnet ucs-{UCSM-ip-address|UCSM-ipv6-address}ucs-auth-domain\username
telnet 10.106.19.12 2052
ucs-qa-10-A login: ucs-ldap23\blradmin
Note If the default authentication is set to local, and the console authentication is set to LDAP,
you can log in to the fabric interconnect from a Putty client using ucs-local\admin, where
admin is the name of the local account.
Procedure
Step 3 UCS-A /security/ldap # create Creates an LDAP provider group and enters
auth-server-group authentication server group security LDAP mode.
auth-server-group-name
Step 4 UCS-A /security/ldap/auth-server-group # Adds the specified LDAP provider to the LDAP
create server-ref ldap-provider-name provider group and enters server reference
authentication server group security LDAP mode.
Step 5 UCS-A Specifies the order in which Cisco UCS uses this
/security/ldap/auth-server-group/server-ref provider to authenticate users.
# set order order-num Valid values include no-value and 0-16, with the
lowest value indicating the highest priority. Setting
the order to no-value is equivalent to giving that
server reference the highest priority.
The following example creates an LDAP provider group called ldapgroup, adds two previously configured
providers called ldap1 and ldap2 to the provider group, sets the order, and commits the transaction:
UCS-A# scope security
UCS-A /security # scope ldap
UCS-A /security/ldap # create auth-server-group ldapgroup
UCS-A /security/ldap/auth-server-group* # create server-ref ldap1
UCS-A /security/ldap/auth-server-group/server-ref* # set order 1
UCS-A /security/ldap/auth-server-group/server-ref* # up
UCS-A /security/ldap/auth-server-group* # create server-ref ldap2
UCS-A /security/ldap/auth-server-group/server-ref* # set order 2
UCS-A /security/ldap/auth-server-group/server-ref* # commit-buffer
UCS-A /security/ldap/auth-server-group/server-ref #
What to Do Next
Configure an authentication domain or select a default authentication service.
Procedure
The following example deletes an LDAP provider group called ldapgroup and commits the transaction:
UCS-A# scope security
UCS-A /security # scope ldap
UCS-A /security/ldap # delete auth-server-group ldapgroup
UCS-A /security/ldap* # commit-buffer
UCS-A /security/ldap #
Procedure
Step 3 UCS-A /security/radius # create Creates a RADIUS provider group and enters
auth-server-group auth-server-group-name authentication server group security RADIUS
mode.
The following example creates a RADIUS provider group called radiusgroup, adds two previously configured
providers called radius1 and radius2 to the provider group, sets the order, and commits the transaction:
UCS-A# scope security
UCS-A /security # scope radius
UCS-A /security/radius # create auth-server-group radiusgroup
UCS-A /security/radius/auth-server-group* # create server-ref radius1
UCS-A /security/radius/auth-server-group/server-ref* # set order 1
UCS-A /security/radius/auth-server-group/server-ref* # up
UCS-A /security/radius/auth-server-group* # create server-ref radius2
UCS-A /security/radius/auth-server-group/server-ref* # set order 2
UCS-A /security/radius/auth-server-group/server-ref* # commit-buffer
UCS-A /security/radius/auth-server-group/server-ref #
What to Do Next
Configure an authentication domain or select a default authentication service.
Procedure
The following example deletes a RADIUS provider group called radiusgroup and commits the transaction:
UCS-A# scope security
UCS-A /security # scope radius
UCS-A /security/radius # delete auth-server-group radiusgroup
UCS-A /security/radius* # commit-buffer
UCS-A /security/radius #
Procedure
Step 3 UCS-A /security/tacacs # create Creates a TACACS provider group and enters
auth-server-group auth-server-group-name authentication server group security TACACS
mode.
Step 5 UCS-A Specifies the order in which Cisco UCS uses this
/security/tacacs/auth-server-group/server-ref provider to authenticate users.
# set order order-num Valid values include no-value and 0-16, with the
lowest value indicating the highest priority. Setting
the order to no-value is equivalent to giving that
server reference the highest priority.
The following example creates a TACACS provider group called tacacsgroup, adds two previously configured
providers called tacacs1 and tacacs2 to the provider group, sets the order, and commits the transaction:
UCS-A# scope security
UCS-A /security # scope tacacs
UCS-A /security/tacacs # create auth-server-group tacacsgroup
UCS-A /security/tacacs/auth-server-group* # create server-ref tacacs1
UCS-A /security/tacacs/auth-server-group/server-ref* # set order 1
UCS-A /security/tacacs/auth-server-group/server-ref* # up
UCS-A /security/tacacs/auth-server-group* # create server-ref tacacs2
UCS-A /security/tacacs/auth-server-group/server-ref* # set order 2
What to Do Next
Configure an authentication domain or select a default authentication service.
Procedure
The following example deletes a TACACS provider group called tacacsgroup and commits the transaction:
UCS-A# scope security
UCS-A /security # scope tacacs
UCS-A /security/tacacs # delete auth-server-group tacacsgroup
UCS-A /security/tacacs* # commit-buffer
UCS-A /security/tacacs #
Authentication Domains
The Cisco UCS Manager uses Authentication Domains to leverage multiple authentication systems. You can
specify and configure each authentication domain during login; otherwise, Cisco UCS Manager uses the
default authentication service configuration.
You can create up to eight authentication domains. Each authentication domain is associated with a provider
group and a realm in the Cisco UCS Manager. The Cisco UCS Manager uses all servers within the realm if
you do not specify a provider group.
Step 2 UCS-A /security # create Creates an authentication domain and enters authentication
auth-domain domain-name domain mode.
Note For systems using the remote authentication protocol,
the authentication domain name is considered part of
the username and counts toward the 32-character limit
for locally created usernames. Because Cisco UCS
inserts 5 characters for formatting, authentication fails
if the domain name and username combined characters
total exceeds 27.
Step 3 UCS-A /security/auth-domain # (Optional)
set refresh-period seconds When a web client connects to Cisco UCS Manager, the client
must send refresh requests to Cisco UCS Manager to keep the
web session active. This option specifies the maximum amount
of time allowed between refresh requests for a user in this
domain.
If this time limit is exceeded, Cisco UCS Manager considers
the web session inactive, but it does not terminate the session.
Specify an integer between 60 and 172800. The default is 600
seconds when Two-Factor Authentication is not enabled and
7200 seconds when it is enabled.
Note The number of seconds set for the Web Session
Refresh Period must be less than the number of
seconds set for the Web Session Timeout. Do not set
the Web Session Refresh Period to the same value
as the Web Session Timeout.
Step 4 UCS-A /security/auth-domain # (Optional)
set session-timeout seconds The maximum amount of time that can elapse after the last
refresh request before Cisco UCS Manager considers a web
session as inactive. If this time limit is exceeded, Cisco UCS
Manager automatically terminates the web session.
Specify an integer between 300 and 172800. The default is 7200
seconds when Two-Factor Authentication is not enabled and
8000 seconds when it is enabled.
Note If you set two-factor authentication for a RADIUS or
TACACS+ realm, consider increasing the
session-refresh and session-timeout periods so that
remote users will not have to re-authenticate too
frequently.
The following example creates an authentication domain called domain1 with a web refresh period of 3600
seconds (1 hour) and a session timeout period of 14400 seconds (4 hours). It then configures domain1 to use
the providers in radius1, sets the realm type to radius, enables two-factor authentication, and commits the
transaction:
UCS-A# scope security
UCS-A /security # create auth-domain domain1
UCS-A /security/auth-domain* # set refresh-period 3600
UCS-A /security/auth-domain* # set session-timeout 14400
UCS-A /security/auth-domain* # create default-auth
UCS-A /security/auth-domain/auth-domain* # set auth-server-group radius1
UCS-A /security/auth-domain/auth-domain* # set realm radius
UCS-A /security/auth-domain/auth-domain* # set user-2-factor yes
UCS-A /security/auth-domain/auth-domain* # commit-buffer
UCS-A /security/auth-domain/auth-domain #
Procedure
The following example sets the authentication realm to TACACS+, sets the console authentication provider
group to provider1, enables two-factor authentication, and commits the transaction:
UCS-A# scope security
UCS-A /security # scope console-auth
UCS-A /security/console-auth # set realm tacacs
UCS-A /security/console-auth # set auth-server-group provider1
UCS-A /security/console-auth* # set use-2-factor yes
UCS-A /security/console-auth* # commit-buffer
UCS-A /security/console-auth #
The following example sets the default authentication to RADIUS, the default authentication provider group
to provider1, enables two-factor authentications, sets the refresh period to 7200 seconds (2 hours), the session
timeout period to 28800 seconds (8 hours), and enables two-factor authentication. It then commits the
transaction.
UCS-A# scope security
UCS-A /security # scope default-auth
UCS-A /security/default-auth # set realm radius
UCS-A /security/default-auth* # set auth-server-group provider1
UCS-A /security/default-auth* # set use-2-factor yes
UCS-A /security/default-auth* # set refresh-period 7200
UCS-A /security/default-auth* # set session-timeout 28800
UCS-A /security/default-auth* # commit-buffer
UCS-A /security/default-auth #
no-login
Restricts user access to Cisco UCS Manager based on user roles. If user roles have not been assigned
for the remote authentication system, access is denied.
Step 2 UCS-A /security # set remote-user Specifies whether user access to Cisco UCS
default-role {assign-default-role | no-login} Manager is restricted based on user roles.
The following example sets the role policy for remote users and commits the transaction:
UCS-A# scope security
UCS-A /security # set remote-user default-role assign-default-role
UCS-A /security* # commit-buffer
UCS-A /security #
5 If the default server pool in the root organization has an available server, Cisco UCS Manager associates
that server with the service profile and discontinues the search. If the default pool does not have an available
server, Cisco UCS Manager returns an allocation error.
Step 2 UCS-A /org # create org Creates the specified organization under the root
org-name organization and enters organization mode for the specified
organization.
Note When you move from one organization mode to
another, the command prompt does not change.
Step 3 UCS-A /org # commit-buffer Commits the transaction to the system configuration.
The following example creates an organization named Finance under the root organization and commits the
transaction:
UCS-A# scope org /
UCS-A /org # create org Finance
UCS-A /org* # commit-buffer
UCS-A /org #
Step 2 UCS-A /org # scope org Enters organization mode for the specified organization.
org-name Note When you move from one organization mode to
another, the command prompt does not change.
Step 3 UCS-A /org # create org Creates the specified organization under the previously
org-name configured non-root organization and enters organization
mode for the specified organization.
Step 4 UCS-A /org # commit-buffer Commits the transaction to the system configuration.
The following example creates an organization named Finance under the NorthAmerica organization and
commits the transaction:
UCS-A# scope org /
UCS-A /org # scope org NorthAmerica
UCS-A /org # create org Finance
UCS-A /org* # commit-buffer
UCS-A /org #
Deleting an Organization
Procedure
Step 2 UCS-A /org # delete org org-name Deletes the specified organization.
The following example deletes the organization under the root organization named Finance and commits the
transaction:
UCS-A# scope org /
UCS-A /org # delete org Finance
UCS-A /org* # commit-buffer
UCS-A /org #
You can set user accounts with an SSH public key. The public key can be set in either of the two formats:
OpenSSH or SECSH.
Admin Account
An admin account comes with each Cisco UCS domain. The admin account is a default user account and
cannot be modified or deleted. This account is the system administrator or superuser account s full privileges.
There is no default password assigned to the admin account; you must choose the password during the initial
system setup.
The admin account is always active and does not expire. You cannot configure the admin account as inactive.
Note After you configure a user account with an expiration date, you cannot reconfigure the account to not
expire. However, you can configure the account to use the latest expiration date available.
• samdme
• debug
• Must not contain a character that is repeated more than three times consecutively, such as aaabbb.
• Must not be identical to the username or the reverse of the username.
• Must pass a password dictionary check. For example, the password must not be based on a standard
dictionary word.
• Must not contain the following symbols: $ (dollar sign), ? (question mark), and = (equals sign).
• Should not be blank for local user and admin accounts.
User Roles
User roles contain one or more privileges that define the operations that are allowed for a user. You can assign
one or more roles to each user. Users with multiple roles have the combined privileges of all assigned roles.
For example, if Role1 has storage-related privileges, and Role 2 has server-related privileges, users with Role1
and Role 2 have both storage-related and server-related privileges.
A Cisco UCS domain can contain up to 48 user roles, including the default user roles. Any user roles configured
after the first 48 are accepted, but they are inactive with faults raised.
All roles include read access to all configuration settings in the Cisco UCS domain. Users with read-only
roles cannot modify the system state.
You can create, modify or remove existing privileges, and delete roles. When you modify a role, the new
privileges apply to all users with that role. Privilege assignment is not restricted to the privileges defined for
the default roles. Meaning, you can use a custom set of privileges to create a unique role. For example, the
default Server Administrator and Storage Administrator roles have a different set of privileges. However, you
can create a Server and Storage Administrator role that combines the privileges of both roles.
Note If you delete a role after it was assigned to users, it is also deleted from those user accounts.
Modify the user profiles on AAA servers (RADIUS or TACACS+) to add the roles corresponding to the
privileges granted to that user. The attribute stores the role information. The AAA servers return this attribute
with the request and parse it to obtain the roles. LDAP servers return the roles in the user profile attributes.
Note If a local and a remote user account have the same username, Cisco UCS Manager overrides any roles
assigned to the remote user with those assigned to the local user.
Administrator
Complete read-and-write access to the entire system. Assigns this role to the default administrator
account by default. You cannot change it.
Facility Manager
Read-and-write access to power management operations through the power management privilege.
Read access to the remaining system.
Network Administrator
Read-and-write access to fabric interconnect infrastructure and network security operations. Read access
to the remaining system.
Operations
Read-and-write access to systems logs, including the syslog servers, and faults. Read access to the
remaining system.
Read-Only
Read-only access to system configuration with no privileges to modify the system state.
Server Compute
Read and write access to most aspects of service profiles. However, the user cannot create, modify or
delete vNICs or vHBAs.
Storage Administrator
Read-and-write access to storage operations. Read access to the remaining system.
Privileges
Privileges give users, assigned to user roles, access to specific system resources and permission to perform
specific tasks. The following table lists each privilege and the user role given that privilege by default.
Tip Detailed information about these privileges and the tasks that they enable users to perform is available in
Privileges in Cisco UCS available at the following URL: http://www.cisco.com/en/US/products/ps10281/
prod_technical_reference_list.html.
User Locales
You can assign a user to one or more locales. Each locale defines one or more organizations (domains) to
which a user can access. Access is usually limited to the organizations specified in the locale. An exception
is a locale without any organizations. It provides unrestricted access to system resources in all organizations.
A Cisco UCS domain can contain up to 48 user locales. Any user locales configured after the first 48 are
accepted, but are inactive with faults raised.
Users with admin or aaa privileges can assign organizations to the locale of other users. The assignment of
organizations is restricted to only those in the locale of the user assigning the organizations. For example, if
a locale contains only the Engineering organization, a user assigned to that locale can only assign the
Engineering organization to other users.
Note You cannot assign a locale to users with one or more of the following privileges:
• aaa
• admin
• fault
• operations
You can hierarchically manage organizations. A user who is assigned to a top-level organization has automatic
access to all organizations below it. For example, an Engineering organization can contain a Software
Engineering organization and a Hardware Engineering organization. A locale containing only the Software
Engineering organization has access to system resources only within that organization. However, a locale that
contains the Engineering organization has access to the resources for both the Software Engineering and
Hardware Engineering organizations.
Step 2 UCS-A /security # create role name Creates the user role and enters security role mode.
Step 3 UCS-A /security/role # add privilege Adds one or more privileges to the role.
privilege-name
The following example creates the service-profile-security-admin role, adds the service profile security and
service profile security policy privileges to the role, and commits the transaction:
UCS-A# scope security
UCS-A /security # create role ls-security-admin
UCS-A /security/role* # add privilege service-profile-security service-profile-security-policy
UCS-A /security/role* # commit-buffer
UCS-A /security/role #
Step 2 UCS-A /security # scope role name Enters security role mode for the specified role.
Step 3 UCS-A /security/role # add Adds one or more privileges to the existing privileges of
privilege privilege-name the user role.
Note You can specify more than one privilege-name
on the same command line to add multiple
privileges to the role, or you can add privileges
to the same role using multiple add privilege
commands.
Step 4 UCS-A /security/role # Commits the transaction to the system configuration.
commit-buffer
The following example shows how to add the server security and server policy privileges to the
service-profile-security-admin role and commit the transaction:
UCS-A# scope security
UCS-A /security # scope role service-profile-security-admin
UCS-A /security/role # add privilege server-security server-policy
UCS-A /security/role* # commit-buffer
UCS-A /security/role #
Step 2 UCS-A /security # scope role name Enters security role mode for the specified role.
Step 3 UCS-A /security/role # set privilege Replaces the existing privileges of the user role.
privilege-name Note You can specify more than one privilege-name
on the same command line to replace the existing
privilege with multiple privileges. After replacing
the privileges, you can add privileges to the same
role using the add privilege command.
Step 4 UCS-A /security/role # Commits the transaction to the system configuration.
commit-buffer
The following example shows how to replace the existing privileges for the service-profile-security-admin
role with the server security and server policy privileges and commit the transaction:
UCS-A# scope security
UCS-A /security # scope role service-profile-security-admin
UCS-A /security/role # set privilege server-security server-policy
UCS-A /security/role* # commit-buffer
UCS-A /security/role #
Step 2 UCS-A /security # scope role name Enters security role mode for the specified role.
Step 3 UCS-A /security/role # remove Removes one or more privileges from the existing user
privilege privilege-name role privileges.
Note You can specify more than one privilege-name
on the same command line to remove multiple
privileges from the role, or you can remove
privileges from the same role using multiple
remove privilege commands.
Step 4 UCS-A /security/role # Commits the transaction to the system configuration.
commit-buffer
The following example removes the server security and server policy privileges from the
service-profile-security-admin role and commits the transaction:
UCS-A# scope security
UCS-A /security # scope role service-profile-security-admin
UCS-A /security/role # remove privilege server-security server-policy
UCS-A /security/role* # commit-buffer
UCS-A /security/role #
Step 2 UCS-A /security # delete role name Deletes the user role.
The following example deletes the service-profile-security-admin role and commits the transaction:
UCS-A# scope security
UCS-A /security # delete role service-profile-security-admin
UCS-A /security* # commit-buffer
UCS-A /security #
Configuring Locales
Creating a Locale
Procedure
Step 2 UCS-A /security # create locale Creates a locale and enters security locale mode.
locale-name
Step 3 UCS-A /security/locale # create org-ref References (binds) an organization to the locale. The
org-ref-name orgdn orgdn org-ref-name argument is the name used to identify
org-root/org-ref-name the organization reference, and the orgdn-name
argument is the distinguished name of the
organization being referenced.
The following example creates the western locale, references the finance organization to the locale, names
the reference finance-ref, and commits the transaction:
UCS-A# scope security
UCS-A /security # create locale western
UCS-A /security/locale* # create org-ref finance-ref orgdn org-root/org-finance
UCS-A /security/locale* # commit-buffer
UCS-A /security/locale #
Step 3 UCS-A /security/locale # create org-ref References (binds) an organization to the locale. The
org-ref-name orgdn org-ref-name argument is the name used to identify
org-root/org-ref-name the organization reference, and the orgdn-name
argument is the distinguished name of the
organization being referenced.
Step 4 UCS-A /security/locale # commit-buffer Commits the transaction to the system configuration.
The following example enters the western locale, adds (references) the marketing organization to the locale,
names the reference marketing-ref, and commits the transaction:
UCS-A# scope security
UCS-A /security # scope locale western
UCS-A /security/locale* # create org-ref marketing-ref orgdn org-root/org-marketing
UCS-A /security/locale* # commit-buffer
UCS-A /security/locale #
Step 3 UCS-A /security/locale # delete org-ref Deletes the organization from the locale.
org-ref-name
Step 4 UCS-A /security/locale # commit-buffer Commits the transaction to the system
configuration.
The following example deletes the finance organization from the western locale and commits the transaction:
UCS-A# scope security
UCS-A /security # scope locale western
UCS-A /security/locale # delete org-ref finance-ref
UCS-A /security/locale* # commit-buffer
UCS-A /security/locale #
Deleting a Locale
Procedure
The following example deletes the western locale and commits the transaction:
UCS-A# scope security
UCS-A /security # delete locale western
UCS-A /security* # commit-buffer
UCS-A /security #
Procedure
Step 2 UCS-A /security # create local-user Creates a user account for the specified local user
local-user-name and enters security local user mode.
Step 3 UCS-A /security/local-user # set Specifies whether the local user account is enabled
account-status {active| inactive} or disabled.
If the account status for a local user account is set to
inactive, the user is prevented from logging into the
system using their existing credentials.
Step 4 UCS-A /security/local-user # set Sets the password for the user account
password password
Step 5 UCS-A /security/local-user # set (Optional)
firstname first-name Specifies the first name of the user.
The following example creates the user account named kikipopo, enables the user account, sets the password
to foo12345, and commits the transaction:
UCS-A# scope security
UCS-A /security # create local-user kikipopo
UCS-A /security/local-user* # set account-status active
UCS-A /security/local-user* # set password
Enter a password:
Confirm the password:
UCS-A /security/local-user* # commit-buffer
UCS-A /security/local-user #
The following example creates the user account named lincey, enables the user account, sets an OpenSSH
key for passwordless access, and commits the transaction.
UCS-A# scope security
UCS-A /security # create local-user lincey
UCS-A /security/local-user* # set account-status active
UCS-A /security/local-user* # set sshkey "ssh-rsa
AAAAB3NzaC1yc2EAAAABIwAAAIEAuo9VQ2CmWBI9/S1f30klCWjnV3lgdXMzO0WUl5iPw85lkdQqap+NFuNmHcb4K
iaQB8X/PDdmtlxQQcawclj+k8f4VcOelBxlsGk5luq5ls1ob1VOIEwcKEL/h5lrdbNlI8y3SS9I/gGiBZ9ARlop9LDpD
m8HPh2LOgyH7Ei1MI8="
UCS-A /security/local-user* # commit-buffer
UCS-A /security/local-user #
The following example creates the user account named jforlenz, enables the user account, sets a Secure SSH
key for passwordless access, and commits the transaction.
UCS-A# scope security
UCS-A /security # create local-user jforlenz
UCS-A /security/local-user* # set account-status active
UCS-A /security/local-user* # set sshkey
Enter lines one at a time. Enter ENDOFBUF to finish. Press ^C to abort.
User's SSH key:
> ---- BEGIN SSH2 PUBLIC KEY ----
>AAAAB3NzaC1yc2EAAAABIwAAAIEAuo9VQ2CmWBI9/S1f30klCWjnV3lgdXMzO0WUl5iPw8
>5lkdQqap+NFuNmHcb4KiaQB8X/PDdmtlxQQcawclj+k8f4VcOelBxlsGk5luq5ls1ob1VO
>IEwcKEL/h5lrdbNlI8y3SS9I/gGiBZ9ARlop9LDpDm8HPh2LOgyH7Ei1MI8=
> ---- END SSH2 PUBLIC KEY ----
> ENDOFBUF
UCS-A /security/local-user* # commit-buffer
UCS-A /security/local-user #
Procedure
Step 2 UCS-A /security # enforce-strong-password Specifies whether the password strength check
{yes | no} is enabled or disabled.
Step 3 UCS-A /system/services # scope Enters system services web session limits mode.
web-session-limits
Step 4 UCS-A /system/services/web-session-limits Sets the maximum number of concurrent HTTP
# set peruser num-of-logins-per-user and HTTPS sessions allowed for each user.
Enter an integer between 1 and 256. By default,
this value is set to 32.
The following example sets the maximum number of HTTP and HTTPS sessions allowed by each user account
to 60 and commits the transaction:
UCS-A# scope system
UCS-A /system # scope services
UCS-A /system/services # scope web-session-limits
UCS-A /system/services/web-session-limits* # set peruser 60
UCS-A /system/services/web-session-limits* # commit-buffer
UCS-A /system/services/web-session-limits #
Procedure
Step 2 UCS-A /security # scope local-user Enters security local user mode for the specified
local-user-name local user account.
Step 3 UCS-A /security/local-user # create role Assigns the specified role to the user account .
role-name Note The create role command can be entered
multiple times to assign more than one
role to a user account.
Step 4 UCS-A security/local-user # Commits the transaction.
commit-buffer
The following example assigns the operations role to the kikipopo local user account and commits the
transaction:
UCS-A# scope security
UCS-A /security # scope local-user kikipopo
UCS-A /security/local-user # create role operations
UCS-A /security/local-user* # commit-buffer
UCS-A /security/local-user #
Procedure
Step 2 UCS-A /security # scope local-user Enters security local user mode for the specified
local-user-name local user account.
Step 3 UCS-A /security/local-user # create Assigns the specified locale to the user account.
locale locale-name
The following example assigns the western locale to the kikipopo local user account and commits the
transaction:
UCS-A# scope security
UCS-A /security # scope local-user kikipopo
UCS-A /security/local-user # create locale western
UCS-A /security/local-user* # commit-buffer
UCS-A /security/local-user #
Procedure
Step 2 UCS-A /security # scope local-user Enters security local user mode for the specified
local-user-name local user account.
Step 3 UCS-A /security/local-user # delete role Removes the specified role from the user account
role-name .
Note The delete role command can be entered
multiple times to remove more than one
role from a user account.
Step 4 UCS-A security/local-user # Commits the transaction.
commit-buffer
The following example removes the operations role from the kikipopo local user account and commits the
transaction:
UCS-A# scope security
UCS-A /security # scope local-user kikipopo
UCS-A /security/local-user # delete role operations
UCS-A /security/local-user* # commit-buffer
UCS-A /security/local-user #
Step 2 UCS-A /security # scope local-user Enters security local user mode for the specified
local-user-name local user account.
Step 3 UCS-A /security/local-user # delete Removes the specified locale from the user account.
locale locale-name Note The delete locale command can be
entered multiple times to remove more
than one locale from a user account.
Step 4 UCS-A security/local-user # Commits the transaction.
commit-buffer
The following example removes the western locale from the kikipopo local user account and commits the
transaction:
UCS-A# scope security
UCS-A /security # scope local-user kikipopo
UCS-A /security/local-user # delete locale western
UCS-A /security/local-user* # commit-buffer
UCS-A /security/local-user #
Procedure
Step 3 UCS-A /security/local-user # set Specifies whether the local user account is enabled or
account-status {active | inactive} disabled.
The admin user account is always set to active. It cannot
be modified.
Note If you set the account status to inactive, the
configuration is not deleted from the database.
Step 2 UCS-A /security # scope local-user Enters local user security mode for the
user-name specified user account.
Step 3 UCS-A /security/local-user # set clear Clears the password history for the specified
password-history yes user account.
The following example configures the password history count and commits the transaction:
UCS-A # scope security
UCS-A /security # scope local-user admin
UCS-A /security/local-user # set clear password-history yes
UCS-A /security/local-user* # commit-buffer
UCS-A /security/local-user #
The following example deletes the foo user account and commits the transaction:
UCS-A# scope security
UCS-A /security # delete local-user foo
UCS-A /security* # commit-buffer
UCS-A /security #
Note You must have admin or aaa privileges to change the password profile properties. Except for password
history, these properties do not apply to users with admin or aaa privileges.
Procedure
Step 5 UCS-A /security/password-profile # Specifies the maximum number of hours over which the
set change-interval num-of-hours number of password changes specified in the Change
Count field are enforced.
This value can be anywhere from 1 to 745 hours.
For example, if this field is set to 48 and the Change
Count field is set to 2, a locally authenticated user can
make no more than 2 password changes within a 48 hour
period.
The following example enables the change during interval option, sets the change count to 5, sets the change
interval to 72 hours, and commits the transaction:
UCS-A # scope security
UCS-A /security # scope password-profile
UCS-A /security/password-profile # set change-during-interval enable
UCS-A /security/password-profile* # set change-count 5
UCS-A /security/password-profile* # set change-interval 72
UCS-A /security/password-profile* # commit-buffer
UCS-A /security/password-profile #
Procedure
The following example disables the change during interval option, sets the no change interval to 72 hours,
and commits the transaction:
UCS-A # scope security
UCS-A /security # scope password-profile
UCS-A /security/password-profile # set change-during-interval disable
UCS-A /security/password-profile* # set no-change-interval 72
UCS-A /security/password-profile* # commit-buffer
UCS-A /security/password-profile #
Procedure
The following example configures the password history count and commits the transaction:
UCS-A # scope security
UCS-A /security # scope password-profile
UCS-A /security/password-profile # set history-count 5
UCS-A /security/password-profile* # commit-buffer
UCS-A /security/password-profile #
Step 2 UCS-A /security # show user-session Displays session information for all users logged in
{local | remote} [detail] to the system. An asterisk (*) next to the session ID
denotes the current login session.
The following example lists all local users logged in to the system. The asterisk indicates which session is the
current login session.
UCS-A# scope security
UCS-A /security # show user-session local
Session Id User Host Login Time
--------------- --------------- -------------------- ----------
pts_25_1_31264* steve 192.168.100.111 2009-05-09T14:06:59
ttyS0_1_3532 jeff console 2009-05-02T15:11:08
web_25277_A faye 192.168.100.112 2009-05-15T22:11:25
The following example displays detailed information on all local users logged in to the system:
UCS-A# scope security
UCS-A /security # show user-session local detail
Session Id pts_25_1_31264:
Fabric Id: A
Term: pts/25
User: steve
Host: 64.101.53.93
Pid: 31264
Login Time: 2009-05-09T14:06:59
Session Id ttyS0_1_3532:
Fabric Id: A
Term: ttyS0
User: jeff
Host: console
Pid: 3532
Login Time: 2009-05-02T15:11:08
Session Id web_25277_A:
Fabric Id: A
Term: web_25277
User: faye
Host: 192.168.100.112
Pid: 3518
Login Time: 2009-05-15T22:11:25
Note When you configure multiple DNS servers, the system searches for the servers only in any random order.
If a local management command requires DNS server lookup, it can only search for three DNS servers in
random order.
The following example configures a DNS server with the IPv4 address 192.168.200.105 and commits the
transaction:
UCS-A# scope system
UCS-A /system # scope services
UCS-A /system/services # create dns 192.168.200.105
UCS-A /system/services* # commit-buffer
UCS-A /system/services #
The following example configures a DNS server with the IPv6 address 2001:db8::22:F376:FF3B:AB3F and
commits the transaction:
UCS-A# scope system
UCS-A /system # scope services
UCS-A /system/services # create dns 2001:db8::22:F376:FF3B:AB3F
UCS-A /system/services* # commit-buffer
UCS-A /system/services #
Step 3 UCS-A /system/services # delete dns Deletes the NTP server with the specified IP
ip-addr address.
The following example deletes the DNS server with the IP address 192.168.200.105 and commits the
transaction:
UCS-A# scope system
UCS-A /system # scope services
UCS-A /system/services # delete dns 192.168.200.105
UCS-A /system/services* # commit-buffer
UCS-A /system/services #
Chassis Links
If you have a Cisco UCS domain with some of the chassis' wired with one link, some with two links, some
with four links, and some with eight links, Cisco recommends configuring the chassis/FEX discovery policy
for the minimum number links in the domain so that Cisco UCS Manager can discover all chassis.
Tip To establish the highest available chassis connectivity in a Cisco UCS domain where Fabric Interconnect
is connected to different types of IO Modules supporting different max number of uplinks, select platform
max value. Setting the platform max ensures that Cisco UCS Manager discovers the chassis including the
connections and servers only when the maximum supported IOM uplinks are connected per IO Module.
After the initial discovery, re-acknowledge the chassis' that are wired for a greater number of links and Cisco
UCS Manager configures the chassis to use all available links.
Cisco UCS Manager cannot discover any chassis that is wired for fewer links than are configured in the
chassis/FEX discovery policy. For example, if the chassis/FEX discovery policy is configured for four links,
Cisco UCS Manager cannot discover any chassis that is wired for one link or two links. Re-acknowledgement
of the chassis resolves this issue.
The following table provides an overview of how the chassis/FEX discovery policy works in a multi-chassis
Cisco UCS domain:
Link Grouping
For hardware configurations that support fabric port channels, link grouping determines whether all of the
links from the IOM to the fabric interconnect are grouped in to a fabric port channel during chassis discovery.
If the link grouping preference is set to port channel, all of the links from the IOM to the fabric interconnect
are grouped in a fabric port channel. If set to no group, links from the IOM to the fabric interconnect are not
grouped in a fabric port channel.
After you create a fabric port channel, you can add or remove links by changing the link group preference
and re-acknowledging the chassis, or by enabling or disabling the chassis from the port channel.
Note The link grouping preference only takes effect if both sides of the links between an IOM or FEX and the
fabric interconnect support fabric port channels. If one side of the links does not support fabric port
channels, this preference is ignored and the links are not grouped in a port channel.
The following example scopes to the default chassis/FEX discovery policy, sets it to discover chassis with
four links to a fabric interconnect, provides a description for the policy, specifies the server pool policy
qualifications that will be used to qualify the chassis, and commits the transaction:
UCS-A# scope org /
UCS-A /org # scope chassis-disc-policy
UCS-A /org/chassis-disc-policy* # set action 4-link
UCS-A /org/chassis-disc-policy* # set descr "This is an example chassis/FEX discovery
policy."
UCS-A /org/chassis-disc-policy* # set qualifier ExampleQual
UCS-A /org/chassis-disc-policy* # commit-buffer
UCS-A /org/chassis-disc-policy #
The following example scopes to the default chassis/FEX discovery policy, sets it to discover chassis with
eight links to a fabric interconnect, provides a description for the policy, sets the link grouping preference to
port channel, specifies the server pool policy qualifications that will be used to qualify the chassis, and commits
the transaction:
UCS-A# scope org /
UCS-A /org # scope chassis-disc-policy
UCS-A /org/chassis-disc-policy* # set action 8-link
UCS-A /org/chassis-disc-policy* # set descr "This is an example chassis/FEX discovery
policy."
UCS-A /org/chassis-disc-policy* # set link-aggregation-pref port-channel
UCS-A /org/chassis-disc-policy* # set qualifier ExampleQual
UCS-A /org/chassis-disc-policy* # commit-buffer
UCS-A /org/chassis-disc-policy #
The following example scopes to the default chassis/FEX discovery policy, sets it to discover chassis with
four links to a fabric interconnect, provides a description for the policy, sets the link grouping preference to
port channel, enables multicast hardware hashing, specifies the server pool policy qualifications that will be
used to qualify the chassis, and commits the transaction:
UCS-A# scope org /
UCS-A /org # scope chassis-disc-policy
UCS-A /org/chassis-disc-policy* # set action 4-link
UCS-A /org/chassis-disc-policy* # set descr "This is an example chassis/FEX discovery
policy."
UCS-A /org/chassis-disc-policy* # set link-aggregation-pref port-channel
UCS-A /org/chassis-disc-policy* # set multicast-hw-hash enabled
UCS-A /org/chassis-disc-policy* # set qualifier ExampleQual
UCS-A /org/chassis-disc-policy* # commit-buffer
UCS-A /org/chassis-disc-policy #
What to Do Next
To customize fabric port channel connectivity for a specific chassis, configure the chassis connectivity policy.
Note The chassis connectivity policy is created by Cisco UCS Manager only when the hardware configuration
supports fabric port channels. At this time, only the 6200 series fabric interconnects and the 2200 series
IOMs support this feature. For all other hardware combinations, Cisco UCS Manager does not create a
chassis connectivity policy.
Caution Changing the connectivity mode for a chassis results in chassis re-acknowledgement. Traffic might be
disrupted during this time.
Procedure
Step 2 UCS-A /org # scope Enters chassis connection policy organization mode for the
chassis-conn-policy chassis-num [a specified chassis and fabric.
| b}
Step 3 UCS-A /org/chassis-conn-policy # Specifies whether the links from the IOMs or FEXes to the
set link-aggregation-pref {global | fabric interconnects are grouped in a port channel.
none | port-channel}
• None—No links are grouped in a port channel
• Port Channel—All links from an IOM to a fabric
interconnect are grouped in a port channel.
The following example shows how to change the fabric port channel connectivity for two chassis. Chassis 6,
fabric A is changed to port channel and chassis 12, fabric B is changed to discrete links:
UCS-A# scope org /
UCS-A /org # scope chassis-conn-policy 6 a
UCS-A /org/chassis-conn-policy # set link-aggregation-pref port-channel
UCS-A /org/chassis-conn-policy* # up
UCS-A /org* # scope chassis-conn-policy 12 b
UCS-A /org/chassis-conn-policy* # set link-aggregation-pref none
UCS-A /org/chassis-conn-policy* # commit-buffer
UCS-A /org/chassis-conn-policy #
The following example scopes to the default rack server discovery policy, sets it to immediately discover new
rack servers, provides a description for the policy, specifies a scrub policy called scrubpol1, and commits the
transaction:
UCS-A# scope org /
UCS-A /org # scope rackserver-disc-policy
UCS-A /org/rackserver-disc-policy* # set action immediate
UCS-A /org/rackserver-disc-policy* # set descr "This is an example rackserver discovery
policy."
UCS-A /org/rackserver-disc-policy* # set scrub-policy scrubpol1
UCS-A /org/rackserver-disc-policy* # commit-buffer
UCS-A /org/rackserver-disc-policy #
Step 2 UCS-A /eth-uplink # set mac-aging Specifies the aging time for the MAC address table. Use
{dd hh mm ss | mode-default | the mode-default keyword to set the aging time to a
never} default value dependent on the configured Ethernet
switching mode. Use the never keyword to never remove
MAC addresses from the table regardless of how long they
have been idle.
Step 3 UCS-A /eth-uplink # commit-buffer Commits the transaction to the system configuration.
The following example sets the aging time for the MAC address table to one day and 12 hours and commits
the transaction:
UCS-A# scope eth-uplink
UCS-A /eth-uplink # set mac-aging 01 12 00 00
UCS-A /eth-uplink* # commit-buffer
UCS-A /eth-uplink #
Licenses
Each Cisco UCS fabric interconnect comes with several port licenses that are factory installed and shipped
with the hardware. You can purchase fabric interconnects fully licensed or partially licensed. You can also
purchase additional licenses after delivery.
The following four new licenses are added for the 6300 Series FI and are only valid on the 6332 and 6332-16UP
Fis.
• 40G_ETH_PORT_ACTIVATION_PKG – Licenses used for 40 GB Ethernet ports
• 40G_ETH_C_PORT_ACTIVATION_PKG – Licenses used for 40 GB Ethernet ports directly connected
to rack servers (C-Direct)
• 10G_C_PORT_ACTIVATION_PKG – Licenses used for the first 16 10 GB unified ports on the
6332-16UP that are directly connected to rack servers (C-Direct)
• 10G_PORT_ACTIVATION_PKG – Licenses used for the first 16 10 GB unified ports on the 6332-16UP
At a minimum, each fabric interconnect ships with the following counted licenses pre-installed:
Cisco UCS 6296 (unified ports) For the first 18 enabled Ethernet ports and any Fibre
Channel ports in the expansion module.
Cisco UCS 6324 For 4 non-breakout ports only. The fifth port, which
does not include a license, is further broken in to four
10 GB ports.
Cisco UCS 6332 16UP For four 40 GB ports and eight 10 GB ports.
Note The first 16 ports are 10 GB. The remaining
are 40 GB.
Note The initial configuration of a port will enable it, and consume a license.
Important Licenses are not portable across product generations. Licenses purchased for 6200 series fabric interconnects
cannot be used to enable ports on 6300 series fabric interconnects or vice-versa.
Each Cisco UCS 6324 Fabric Interconnect comes with a factory installed port license that is shipped with the
hardware. This license is for the eight 40 GB unified ports, and can be used for any supported purpose. The
C-direct port license is factory installed with a grace period, and can be used for Cisco UCS rack servers.
Grace Period
If you attempt to use a port that does not have an installed license, Cisco UCS initiates a 120 day grace period.
The grace period is measured from the first use of the port without a license and is paused when a valid license
file is installed. The amount of time used in the grace period is retained by the system.
Note Each physical port has its own grace period. Initiating the grace period on a single port does not initiate
the grace period for all ports.
If a licensed port is unconfigured, that license is transferred to a port functioning within a grace period. If
multiple ports are acting within grace periods, the license is moved to the port whose grace period is closest
to expiring.
• If no other ports under the breakout port are enabled, the parent 40 GB port is allotted a license
under the 40G_C_PORT_ACTIVATION_PKG, and the used quantity is incremented for this
instance.
• If other ports are enabled, and if at least one port is not connected to a Direct Connect rack server,
even if the port is not being used, the parent 40 GB port is allotted a license under the
40G_ETH_PORT_ACTIVATION_PKG, and the used quantity is incremented for this instance.
• When you enable a breakout port under a 40 GB breakout port and that port is connected to a
Direct-Connect rack server, and the 40G_C_PORT_ACTIVATION_PKG license files are not installed
on the FI, the following license allocation occurs:
◦If no ports under the breakout port are enabled, the parent 40 GB port is allotted a license under
the 40G_ETH_PORT_ACTIVATION_PKG. The subordinate quantity is increased if the licenses
are available in the 40G_ETH_PORT_ACTIVATION_PKG. If the licenses are not available, the
used quantity under this feature is increased and the entire port goes in to the grace period.
◦If other ports are enabled and at least one port is not connected to a Direct Connect rack server,
even if the port is not being used, the parent 40 GB port is allotted a license under the
40G_ETH_PORT_ACTIVATION_PKG, and the used quantity is incremented for this instance.
Procedure
Step 2 UCS-A /license # show Obtains the host ID or serial number for the fabric
server-host-id interconnect.
Tip Use the entire host ID that displays after the
equal (=) sign.
What to Do Next
Obtain the required licenses from Cisco.
Obtaining a License
Note This process may change after the release of this document. If one or more of these steps no longer applies,
contact your Cisco representative for information on how to obtain a license file.
Procedure
Step 1 Obtain the product authorization key (PAK) from the claim certificate or other proof of purchase document.
Step 2 Locate the website URL in the claim certificate or proof of purchase document.
Step 3 Access the website URL for the fabric interconnect and enter the serial number and the PAK.
Cisco sends you the license file by email. The license file is digitally signed to authorize use on only the
requested fabric interconnect. The requested features are also enabled once Cisco UCS Manager accesses the
license file.
What to Do Next
Install the license on the fabric interconnect.
Installing a License
Note In a cluster setup, Cisco recommends that you download and install licenses to both fabric interconnects
in matching pairs. An individual license is only downloaded to the fabric interconnect that is used to
initiate the download.
Procedure
You cannot have spaces anywhere in the path name or the file
name. For example,
c:\Path\Folder_Name\License.lic is a valid path,
but c:\Path\Folder Name\License.lic is invalid due
to the space in "Folder Name".
Step 2 UCS-A /license # show file Displays the licenses installed on the fabric
[license_filename | detail] interconnect with the level of detail specified in
the command.
The following example displays the full details for the licenses installed on a fabric interconnect:
UCS-A /license #
Command or Purpose
Action
Step 1 UCS-A# scope Enters license mode.
license
Step 2 UCS-A /license # Displays the license usage table for all license files installed on the fabric
show usage interconnect.
This following are included:
• Feat Name
• Scope
• Default
The default number of licenses provided for this Cisco UCS domain.
Command or Purpose
Action
• Total Quant
The total number of licenses available. This value is the sum of the
number of default licenses plus the number of purchased licenses.
• Used Quant
• Subordinate Quant
C-Series Rack Servers that are currently being used by the system.
• State
• Grace Used
The amount of time (in seconds) used in the grace period. After the
grace period ends, Cisco UCS sends alert messages until a new license
is purchased.
The following examples display full details of the licenses installed on a fabric interconnect:
License Ok Matching 0
ETH_PORT_C_ACTIVATION_PKG A 0 0 0 0
Not Applicable Matching 0
ETH_PORT_ACTIVATION_PKG B 20 48 11 0
License Ok Matching 0
ETH_PORT_C_ACTIVATION_PKG B 0 0 0 0
Not Applicable Matching 0
UCS-A /license #
License feature:
Name Vendor Version Type Grace Period
------------------------- ------ ------- ------------------ ------------
ETH_PORT_ACTIVATION_PKG cisco 1.0 Counted 120
ETH_PORT_C_ACTIVATION_PKG cisco 1.0 Counted 120
UCS-A /license #
Uninstalling a License
Note Permanent licenses cannot be uninstalled if they are in use. You can only uninstall a permanent license
that is not in use. If you try to delete a permanent license that is being used, Cisco UCS Manager rejects
the request and display an error message.
Procedure
Step 2 UCS-A /license # clear file license-filename Uninstalls the specified license.
Cisco UCS Manager deactivates the license, removes the license from the list of licenses, and deletes the
license from the fabric interconnect. The port is moved into unlicensed mode. In a cluster setup, you must
uninstall the license from the other fabric interconnect.
The following example shows the uninstallation of port9.lic:
UCS-A # scope license
UCS-A /license # clear file port9.lic
Clearing license port9.lic:
SERVER this_host ANY
VENDOR cisco
INCREMENT ETH_PORT_ACTIVATION_PKG cisco 1.0 permanent 1 \
VENDOR_STRING=<LIC_SOURCE>UCS_SWIFT</LIC_SOURCE><SKU>N10-L001=</SKU> \
HOSTID=VDH=FLC12360025 \
NOTICE="<LicFileID>20090519200954833</LicFileID><LicLineID>1</LicLineID> \
<PAK></PAK>" SIGN=C01FAE4E87FA
Virtual Interfaces
In a blade server environment, the number of vNICs and vHBAs configurable for a service profile is determined
by adapter capability and the amount of virtual interface (VIF) namespace available on the adapter. In Cisco
UCS, portions of VIF namespace are allotted in chunks called VIFs. Depending on your hardware, the
maxiumum number of VIFs are allocated on a predefined, per-port basis.
The maximum number of VIFs varies based on hardware capability and port connectivity. For each configured
vNIC or vHBA, one or two VIFs are allocated. Stand-alone vNICs and vHBAs use one VIF and failover
vNICs and vHBAs use two.
The following variables affect the number of VIFs available to a blade server, and therefore, how many vNICs
and vHBAs you can configure for a service profile.
• Maximum number of VIFs supported on your fabric interconnect
• How the fabric interconnects are cabled
• If your fabric interconnect and IOM are configured in fabric port channel mode
For more information about the maximum number of VIFs supported by your hardware configuration, see
the appropriate Cisco UCS Configuration Limits for Cisco UCS Manager for your software release.
• Connectivity type
If you change your configuration in a way that decreases the number of VIFs available to a blade, UCS
Manager will display a warning and ask you if you want to proceed. This includes several scenarios, including
times where adding or moving a connection decreases the number of VIFs.
Note The policy resolution options in Cisco UCS Central are not supported on all versions of Cisco UCS
Manager. If your Cisco UCS Manager version is earlier than the earliest supported release, the policy
resolution screen may display the value as global even if it is not applicable.
The following table contains a list of the policies and configuration settings that you can choose to have
managed by either Cisco UCS Manager or Cisco UCS Central:
Time Zone Management 2.1(2) Determines whether the time zone and NTP server settings
are defined locally in Cisco UCS Manager or comes from
Cisco UCS Central.
Communication 2.1(2) Determines whether HTTP, CIM XML, Telnet, SNMP, web
Services session limits, and Management Interfaces Monitoring Policy
settings are defined locally in Cisco UCS Manager or in Cisco
UCS Central.
Global Fault Policy 2.1(2) Determines whether the Global Fault Policy is defined locally
in Cisco UCS Manager or in Cisco UCS Central.
User Management 2.1(2) Determines whether authentication and native domains, LDAP,
RADIUS, TACACS+, trusted points, locales, and user roles
are defined locally in Cisco UCS Manager or in Cisco UCS
Central.
DNS Management 2.1(2) Determines whether DNS servers are defined locally in Cisco
UCS Manager or in Cisco UCS Central.
Monitoring 2.1(2) Determines whether Call Home, Syslog, and TFTP Core
Exporter settings are defined locally in Cisco UCS Manager
or in Cisco UCS Central.
SEL Policy 2.1(2) Determines whether the SEL Policy is defined locally in Cisco
UCS Manager or in Cisco UCS Central.
Power Allocation Policy 2.1(2) Determines whether the Power Allocation Policy is defined
locally in Cisco UCS Manager or in Cisco UCS Central.
Power Policy 2.1(2) Determines whether the Power Policy is defined locally in
Cisco UCS Manager or in Cisco UCS Central.
Equipment Policy 2.2(7) Determines whether the Equipment Policy is defined locally
in Cisco UCS Manager or in Cisco UCS Central.
Quality of Service (QoS) 2.2(7) Determines whether QoS configuration is defined locally in
Configuration Cisco UCS Manager or in Cisco UCS Central.
Procedure
Step 2 UCS-A/system # create Creates the policy required to register the Cisco UCS Domain
control-ep policy ucs-central with Cisco UCS Central.
ucs-central can be the hostname or IP address of the virtual
machine where Cisco UCS Central is deployed.
The following example registers a Cisco UCS Domain with a Cisco UCS Central system at IP address
209.165.200.233, and commits the transaction:
What to Do Next
Configure policy resolution between Cisco UCS Manager and Cisco UCS Central.
Procedure
Step 3 UCS-A/system/control-ep # set Determines whether the Full State Backup Policy
backup-policy-ctrl source {local | global} and All Configuration Export Policy are defined
locally or in Cisco UCS Central.
Step 5 UCS-A/system/control-ep # set Determines whether the date and time is defined
datetime-policy-ctrl source {local | locally or comes from Cisco UCS Central.
global}
Step 6 UCS-A/system/control-ep # set Determines whether DNS servers are defined locally
dns-policy-ctrl source {local | global} or in Cisco UCS Central.
Step 10 UCS-A/system/control-ep # set Determines whether Call Home, Syslog, and TFTP
monitoring-policy-ctrl source {local | Core Exporter settings are defined locally or in
global} Cisco UCS Central.
The following example configures policy resolution for a Cisco UCS Domain that is registered with Cisco
UCS Central and commits the transaction:
Note The deep remove global cleanup mode does not remove
global VSANs and VLANs when you unregister from
Cisco UCS Central. Those must be removed manually if
desired.
Step 5 UCS-A Acknowledges that inconsistencies exist between Cisco UCS Manager
/system/control-ep # set and Cisco UCS Central and that you are still willing to reconnect the
ackstate acked Cisco UCS domain with Cisco UCS Central. This automatically turns
off suspend state.
The following example shows how to change the Cisco UCS Central registration cleanup mode to
deep-remove-global and commit the transaction:
Procedure
Step 2 UCS-A/system # delete control-ep Deletes the policy and unregisters the Cisco UCS
policy Domain from Cisco UCS Central.
The following example unregisters a Cisco UCS Domain from Cisco UCS Central and commits the transaction:
Named VLANs
A named VLAN creates a connection to a specific external LAN. The VLAN isolates traffic to that external
LAN, including broadcast traffic.
The name that you assign to a VLAN ID adds a layer of abstraction that allows you to globally update all
servers associated with service profiles that use the named VLAN. You do not need to reconfigure the servers
individually to maintain communication with the external LAN.
You can create more than one named VLAN with the same VLAN ID. For example, if servers that host
business services for HR and Finance need to access the same external LAN, you can create VLANs named
HR and Finance with the same VLAN ID. Then, if the network is reconfigured and Finance is assigned to a
different LAN, you only have to change the VLAN ID for the named VLAN for Finance.
In a cluster configuration, you can configure a named VLAN to be accessible only to one fabric interconnect
or to both fabric interconnects.
Important You cannot create VLANs with IDs from 4030 to 4047. This range of VLAN IDs is reserved.
The VLAN IDs you specify must also be supported on the switch that you are using. For example, on
Cisco Nexus 5000 Series switches, the VLAN ID range from 3968 to 4029 is reserved. Before you specify
the VLAN IDs in Cisco UCS Manager, make sure that the same VLAN IDs are available on your switch.
VLANs in the LAN cloud and FCoE VLANs in the SAN cloud must have different IDs. Using the same
ID for a VLAN and an FCoE VLAN in a VSAN results in a critical fault and traffic disruption for all
vNICs and uplink ports using that VLAN. Ethernet traffic is dropped on any VLAN which has an ID that
overlaps with an FCoE VLAN ID.
VLAN 4048 is user configurable. However, Cisco UCS Manager uses VLAN 4048 for the following default
values. If you want to assign 4048 to a VLAN, you must reconfigure these values:
• After an upgrade to Cisco UCS, Release 2.0—The FCoE storage port native VLAN uses VLAN 4048
by default. If the default FCoE VSAN was set to use VLAN 1 before the upgrade, you must change it
to a VLAN ID that is not used or reserved. For example, consider changing the default to 4049 if that
VLAN ID is not in use.
• After a fresh install of Cisco UCS, Release 2.0—The FCoE VLAN for the default VSAN uses VLAN
4048 by default. The FCoE storage port native VLAN uses VLAN 4049.
Private VLANs
A private VLAN (PVLAN) partitions the Ethernet broadcast domain of a VLAN into subdomains, and allows
you to isolate some ports. Each subdomain in a PVLAN includes a primary VLAN and one or more secondary
VLANs. All secondary VLANs in a PVLAN must share the same primary VLAN. The secondary VLAN ID
differentiates one subdomain from another.
Note You cannot configure an isolated VLAN to use with a regular VLAN.
You can have more than one isolated port in a specified isolated VLAN. Each port is completely isolated from
all other ports in the isolated VLAN.
Important You cannot create VLANs with IDs from 4030 to 4047. This range of VLAN IDs is reserved.
The VLAN IDs you specify must also be supported on the switch that you are using. For example, on
Cisco Nexus 5000 Series switches, the VLAN ID range from 3968 to 4029 is reserved. Before you specify
the VLAN IDs in Cisco UCS Manager, make sure that the same VLAN IDs are available on your switch.
VLANs in the LAN cloud and FCoE VLANs in the SAN cloud must have different IDs. Using the same
ID for a VLAN and an FCoE VLAN in a VSAN results in a critical fault and traffic disruption for all
vNICs and uplink ports using that VLAN. Ethernet traffic is dropped on any VLAN which has an ID that
overlaps with an FCoE VLAN ID.
VLAN 4048 is user configurable. However, Cisco UCS Manager uses VLAN 4048 for the following default
values. If you want to assign 4048 to a VLAN, you must reconfigure these values:
• After an upgrade to Cisco UCS, Release 2.0—The FCoE storage port native VLAN uses VLAN 4048
by default. If the default FCoE VSAN was set to use VLAN 1 before the upgrade, you must change it
to a VLAN ID that is not used or reserved. For example, consider changing the default to 4049 if that
VLAN ID is not in use.
• After a fresh install of Cisco UCS, Release 2.0—The FCoE VLAN for the default VSAN uses VLAN
4048 by default. The FCoE storage port native VLAN uses VLAN 4049.
Based on the number of VLANs configured for these ports, Cisco UCS Manager tracks the cumulative count
of VLAN port instances and enforces the VLAN port limit during validation. Cisco UCS Manager reserves
some pre-defined VLAN port resources for control traffic. These include management VLANs configured
under HIF and NIF ports.
Cisco UCS Manager strictly enforces the VLAN port limit on service profile operations. If Cisco UCS Manager
detects that the VLAN port limit is exceeded, the service profile configuration fails during deployment.
Exceeding the VLAN port count in a border domain is less disruptive. When the VLAN port count is exceeded
in a border domain Cisco UCS Manager changes the allocation status to Exceeded. To change the status back
to Available, complete one of the following actions:
• Unconfigure one or more border ports
• Remove VLANs from the LAN cloud
• Unconfigure one or more vNICs or vHBAs
Important You cannot create VLANs with IDs from 4030 to 4047. This range of VLAN IDs is reserved.
The VLAN IDs you specify must also be supported on the switch that you are using. For example, on
Cisco Nexus 5000 Series switches, the VLAN ID range from 3968 to 4029 is reserved. Before you specify
the VLAN IDs in Cisco UCS Manager, make sure that the same VLAN IDs are available on your switch.
VLANs in the LAN cloud and FCoE VLANs in the SAN cloud must have different IDs. Using the same
ID for a VLAN and an FCoE VLAN in a VSAN results in a critical fault and traffic disruption for all
vNICs and uplink ports using that VLAN. Ethernet traffic is dropped on any VLAN which has an ID that
overlaps with an FCoE VLAN ID.
Procedure
Step 2 UCS-A /eth-uplink # create vlan Creates a named VLAN, specifies the VLAN name and
vlan-name vlan-id VLAN ID, and enters Ethernet uplink VLAN mode.
The VLAN name is case sensitive.
Step 3 UCS-A /eth-uplink/fabric/vlan # set Sets the sharing for the specified VLAN.
sharing {isolated | none | primary} This can be one of the following:
The following example creates a named VLAN for both fabric interconnects, names the VLAN accounting,
assigns the VLAN ID 2112, sets the sharing to none, and commits the transaction:
UCS-A# scope eth-uplink
UCS-A /eth-uplink # create vlan accounting 2112
UCS-A /eth-uplink/vlan* # set sharing none
Important You cannot create VLANs with IDs from 4030 to 4047. This range of VLAN IDs is reserved.
The VLAN IDs you specify must also be supported on the switch that you are using. For example, on
Cisco Nexus 5000 Series switches, the VLAN ID range from 3968 to 4029 is reserved. Before you specify
the VLAN IDs in Cisco UCS Manager, make sure that the same VLAN IDs are available on your switch.
VLANs in the LAN cloud and FCoE VLANs in the SAN cloud must have different IDs. Using the same
ID for a VLAN and an FCoE VLAN in a VSAN results in a critical fault and traffic disruption for all
vNICs and uplink ports using that VLAN. Ethernet traffic is dropped on any VLAN which has an ID that
overlaps with an FCoE VLAN ID.
Procedure
Step 2 UCS-A /eth-storage # create vlan Creates a named VLAN, specifies the VLAN name
vlan-name vlan-id and VLAN ID, and enters Ethernet storage VLAN
mode.
The VLAN name is case sensitive.
Step 3 UCS-A /eth-storage/vlan # create Creates a member port for the specified VLAN on
member-port {a | b} slot-id port-id the specified fabric.
The following example creates a named VLAN for both fabric interconnects, names the VLAN accounting,
assigns the VLAN ID 2112, creates a member port on slot 2, port 20, and commits the transaction:
UCS-A# scope eth-storage
UCS-A /eth-storage # create vlan accounting 2112
UCS-A /eth-storage/vlan* # create member-port a 2 20
UCS-A /eth-storage/vlan/member-port* # commit-buffer
UCS-A /eth-storage/vlan/member-port #
Important You cannot create VLANs with IDs from 4030 to 4047. This range of VLAN IDs is reserved.
The VLAN IDs you specify must also be supported on the switch that you are using. For example, on
Cisco Nexus 5000 Series switches, the VLAN ID range from 3968 to 4029 is reserved. Before you specify
the VLAN IDs in Cisco UCS Manager, make sure that the same VLAN IDs are available on your switch.
VLANs in the LAN cloud and FCoE VLANs in the SAN cloud must have different IDs. Using the same
ID for a VLAN and an FCoE VLAN in a VSAN results in a critical fault and traffic disruption for all
vNICs and uplink ports using that VLAN. Ethernet traffic is dropped on any VLAN which has an ID that
overlaps with an FCoE VLAN ID.
Procedure
Step 2 UCS-A /eth-uplink # scope fabric Enters Ethernet uplink fabric interconnect mode for the
{a | b} specified fabric interconnect (A or B).
Step 3 UCS-A /eth-uplink/fabric # create Creates a named VLAN, specifies the VLAN name and
vlan vlan-name vlan-id VLAN ID, and enters Ethernet uplink fabric interconnect
VLAN mode.
The VLAN name is case sensitive.
Step 4 UCS-A /eth-uplink/fabric/vlan # set Sets the sharing for the specified VLAN.
sharing {isolated | none | primary} This can be one of the following:
The following example creates a named VLAN for fabric interconnect A, names the VLAN finance, assigns
the VLAN ID 3955, sets the sharing to none, and commits the transaction:
UCS-A# scope eth-uplink
UCS-A /eth-uplink # scope fabric a
UCS-A /eth-uplink/fabric # create vlan finance 3955
Important You cannot create VLANs with IDs from 4030 to 4047. This range of VLAN IDs is reserved.
The VLAN IDs you specify must also be supported on the switch that you are using. For example, on
Cisco Nexus 5000 Series switches, the VLAN ID range from 3968 to 4029 is reserved. Before you specify
the VLAN IDs in Cisco UCS Manager, make sure that the same VLAN IDs are available on your switch.
VLANs in the LAN cloud and FCoE VLANs in the SAN cloud must have different IDs. Using the same
ID for a VLAN and an FCoE VLAN in a VSAN results in a critical fault and traffic disruption for all
vNICs and uplink ports using that VLAN. Ethernet traffic is dropped on any VLAN which has an ID that
overlaps with an FCoE VLAN ID.
Procedure
Step 2 UCS-A /eth-storage # scope fabric {a | Enters Ethernet storage fabric interconnect mode
b} for the specified fabric interconnect.
Step 3 UCS-A /eth-storage/fabric # create vlan Creates a named VLAN, specifies the VLAN name
vlan-name vlan-id and VLAN ID, and enters Ethernet storage fabric
interconnect VLAN mode.
The VLAN name is case sensitive.
Step 4 UCS-A /eth-storage/vlan # create Creates a member port for the specified VLAN on
member-port {a | b} slot-id port-id the specified fabric.
The following example creates a named VLAN for fabric interconnect A, names the VLAN finance, assigns
the VLAN ID 3955, creates a member port on slot 2, port 20, and commits the transaction:
UCS-A# scope eth-storage
UCS-A /eth-storage # scope fabric a
UCS-A /eth-storage/fabric # create vlan finance 3955
UCS-A /eth-storage/fabric/vlan* # create member-port a 2 20
UCS-A /eth-storage/fabric/vlan/member-port* # commit-buffer
UCS-A /eth-storage/fabric/vlan/member-port #
Note If you delete a VLAN that is assigned to a vNIC or vNIC template, the vNIC might allow that VLAN to
flap.
Procedure
Step 3 UCS-A /eth-uplink # delete vlan Deletes the specified named VLAN.
vlan-name
Step 4 UCS-A /eth-uplink # commit-buffer Commits the transaction to the system configuration.
The following example deletes a named VLAN accessible to both fabric interconnects and commits the
transaction:
UCS-A# scope eth-uplink
UCS-A /eth-uplink # delete vlan accounting
UCS-A /eth-uplink* # commit-buffer
UCS-A /eth-uplink #
The following example deletes a named VLAN accessible to one fabric interconnect and commits the
transaction:
UCS-A# scope eth-uplink
UCS-A /eth-uplink # scope fabric a
UCS-A /eth-uplink/fabric # delete vlan finance
UCS-A /eth-uplink/fabric* # commit-buffer
UCS-A /eth-uplink/fabric #
Important You cannot create VLANs with IDs from 4030 to 4047. This range of VLAN IDs is reserved.
The VLAN IDs you specify must also be supported on the switch that you are using. For example, on
Cisco Nexus 5000 Series switches, the VLAN ID range from 3968 to 4029 is reserved. Before you specify
the VLAN IDs in Cisco UCS Manager, make sure that the same VLAN IDs are available on your switch.
VLANs in the LAN cloud and FCoE VLANs in the SAN cloud must have different IDs. Using the same
ID for a VLAN and an FCoE VLAN in a VSAN results in a critical fault and traffic disruption for all
vNICs and uplink ports using that VLAN. Ethernet traffic is dropped on any VLAN which has an ID that
overlaps with an FCoE VLAN ID.
Procedure
Step 2 UCS-A /eth-uplink # create vlan Creates a named VLAN, specifies the VLAN name
vlan-name vlan-id and VLAN ID, and enters Ethernet uplink VLAN
mode.
The VLAN name is case sensitive.
Step 3 UCS-A /eth-uplink/vlan # set sharing Sets the VLAN as the primary VLAN.
primary
Step 4 UCS-A /eth-uplink/vlan # commit-buffer Commits the transaction to the system
configuration.
The following example creates a named VLAN for both fabric interconnects, names the VLAN accounting,
assigns the VLAN ID 2112, makes this VLAN the primary VLAN, and commits the transaction:
UCS-A# scope eth-uplink
UCS-A /eth-uplink # create vlan accounting 2112
UCS-A /eth-uplink/vlan* # set sharing primary
UCS-A /eth-uplink/vlan* # commit-buffer
UCS-A /eth-uplink/vlan #
Important You cannot create VLANs with IDs from 4030 to 4047. This range of VLAN IDs is reserved.
The VLAN IDs you specify must also be supported on the switch that you are using. For example, on
Cisco Nexus 5000 Series switches, the VLAN ID range from 3968 to 4029 is reserved. Before you specify
the VLAN IDs in Cisco UCS Manager, make sure that the same VLAN IDs are available on your switch.
VLANs in the LAN cloud and FCoE VLANs in the SAN cloud must have different IDs. Using the same
ID for a VLAN and an FCoE VLAN in a VSAN results in a critical fault and traffic disruption for all
vNICs and uplink ports using that VLAN. Ethernet traffic is dropped on any VLAN which has an ID that
overlaps with an FCoE VLAN ID.
Procedure
Step 2 UCS-A /eth-uplink # scope fabric {a | Enters Ethernet uplink fabric interconnect mode for
b} the specified fabric interconnect.
Step 3 UCS-A /eth-uplink/fabric # create vlan Creates a named VLAN, specifies the VLAN name
vlan-name vlan-id and VLAN ID, and enters Ethernet uplink fabric
interconnect VLAN mode.
The VLAN name is case sensitive.
Step 4 UCS-A /eth-uplink/fabric/vlan # set Sets the VLAN as the primary VLAN.
sharing primary
Step 5 UCS-A /eth-uplink/fabric/vlan # Commits the transaction to the system
commit-buffer configuration.
The following example creates a named VLAN for fabric interconnect A, names the VLAN finance, assigns
the VLAN ID 3955, makes this VLAN the primary VLAN, and commits the transaction:
UCS-A# scope eth-uplink
UCS-A /eth-uplink # scope fabric a
UCS-A /eth-uplink/fabric # create vlan finance 3955
UCS-A /eth-uplink/fabric/vlan* # set sharing primary
UCS-A /eth-uplink/fabric/vlan* # commit-buffer
UCS-A /eth-uplink/fabric/vlan #
Important You cannot create VLANs with IDs from 4030 to 4047. This range of VLAN IDs is reserved.
The VLAN IDs you specify must also be supported on the switch that you are using. For example, on
Cisco Nexus 5000 Series switches, the VLAN ID range from 3968 to 4029 is reserved. Before you specify
the VLAN IDs in Cisco UCS Manager, make sure that the same VLAN IDs are available on your switch.
VLANs in the LAN cloud and FCoE VLANs in the SAN cloud must have different IDs. Using the same
ID for a VLAN and an FCoE VLAN in a VSAN results in a critical fault and traffic disruption for all
vNICs and uplink ports using that VLAN. Ethernet traffic is dropped on any VLAN which has an ID that
overlaps with an FCoE VLAN ID.
Procedure
Step 2 UCS-A /eth-uplink # create vlan Creates a named VLAN, specifies the VLAN name
vlan-name vlan-id and VLAN ID, and enters Ethernet uplink VLAN
mode.
The VLAN name is case sensitive.
Step 3 UCS-A /eth-uplink/vlan # set sharing Sets the VLAN as the secondary VLAN.
isolated
Step 4 UCS-A /eth-uplink/vlan # set Specifies the primary VLAN to be associated with
pubnwname primary-vlan-name this secondary VLAN.
The following example creates a named VLAN for both fabric interconnects, names the VLAN accounting,
assigns the VLAN ID 2112, makes this VLAN the secondary VLAN, associates the secondary VLAN with
the primary VLAN, and commits the transaction:
UCS-A# scope eth-uplink
UCS-A /eth-uplink # create vlan accounting 2112
UCS-A /eth-uplink/vlan* # set sharing isolated
UCS-A /eth-uplink/vlan* # set pubnwname pvlan1000
UCS-A /eth-uplink/vlan* # commit-buffer
UCS-A /eth-uplink/vlan #
Important You cannot create VLANs with IDs from 4030 to 4047. This range of VLAN IDs is reserved.
The VLAN IDs you specify must also be supported on the switch that you are using. For example, on
Cisco Nexus 5000 Series switches, the VLAN ID range from 3968 to 4029 is reserved. Before you specify
the VLAN IDs in Cisco UCS Manager, make sure that the same VLAN IDs are available on your switch.
VLANs in the LAN cloud and FCoE VLANs in the SAN cloud must have different IDs. Using the same
ID for a VLAN and an FCoE VLAN in a VSAN results in a critical fault and traffic disruption for all
vNICs and uplink ports using that VLAN. Ethernet traffic is dropped on any VLAN which has an ID that
overlaps with an FCoE VLAN ID.
Procedure
Step 2 UCS-A /eth-uplink # scope fabric {a | b} Enters Ethernet uplink fabric interconnect mode
for the specified fabric interconnect (A or B).
Step 3 UCS-A /eth-uplink/fabric # create vlan Creates a named VLAN, specifies the VLAN name
vlan-name vlan-id and VLAN ID, and enters Ethernet uplink fabric
interconnect VLAN mode.
The VLAN name is case sensitive.
Step 4 UCS-A /eth-uplink/vlan # set sharing Sets the VLAN as the secondary VLAN.
isolated
Step 5 UCS-A /eth-uplink/vlan # set Specifies the primary VLAN to be associated with
pubnwname primary-vlan-name this secondary VLAN.
The following example creates a named VLAN for fabric interconnect A, names the VLAN finance, assigns
the VLAN ID 3955, makes this VLAN the secondary VLAN, associates the secondary VLAN with the primary
VLAN, and commits the transaction:
UCS-A# scope eth-uplink
UCS-A /eth-uplink # scope fabric a
UCS-A /eth-uplink/fabric # create vlan finance 3955
UCS-A /eth-uplink/fabric/vlan* # set sharing isolated
UCS-A /eth-uplink/fabric/vlan* # set pubnwname pvlan1000
UCS-A /eth-uplink/fabric/vlan* # commit-buffer
UCS-A /eth-uplink/fabric/vlan #
Community VLANs
Cisco UCS Manager supports Community VLANs in UCS Fabric Interconnects. Community ports communicate
with each other and with promiscuous ports. Community ports have Layer 2 isolation from all other ports in
other communities, or isolated ports within the PVLAN. Broadcasts are transmitted between the community
ports associated with the PVLAN only and the other promiscuous ports. A promiscuous port can communicate
with all interfaces, including the isolated and community ports within a PVLAN.
Step 2 UCS-A# /eth-uplink/ # create vlan ID . Create a VLAN with the specified VLAN
ID.
Step 3 UCS-A# /eth-uplink/ vlan # set sharing Type Specifies the vlan type.
.
Step 4 UCS-A# /eth-uplink/ vlan # set pubnwname Specifies the primary vlan association.
Name .
Step 5 UCS-A# /eth-uplink/ vlan # commit-buffer. Commits the transaction to the system
configuration.
Step 3 UCS-A /org/service-profile # scope vnic Enters command mode for the specified vNIC.
vnic-name
Step 4 UCS-A /org/service-profile/vnic # create Allows the community VLAN to access the
eth-if community-vlan-name specified vNIC.
The following example shows how to assign the community VLAN cVLAN101 to the vNIC vnic_1 and
commits the transaction.
UCS-A# scope org /
UCS-A /org # scope service-profile GSP1
UCS-A /org/service-profile # scope vnic vnic_1
UCS-A /org/service-profile/vnic # create eth-if cVLAN101
UCS-A /org/service-profile/vnic* # commit-buffer
Procedure
Step 2 UCS-A /eth-storage # scope vlan Enters the specified isolated VLAN.
iso-vlan-name
Step 3 UCS-A /eth-storage/vlan # create Creates the member port for the specified fabric,
member-port fabric slot- num port- num assigns the slot number and port number, and
enters member port configuration scope.
Step 6 UCS-A /eth-storage # scope vlan Enters the specified community VLAN.
comm-vlan-name
The following example shows how to assign the isolated and community associated with the same primary
VLAN to the same appliance port and commits the transaction.
UCS-A# scope eth-storage
UCS-A /eth-storage # scope vlan isovlan501
UCS-A /eth-storage/vlan # create member-port a 1 2
UCS-A /eth-storage/vlan/member-port* # exit
UCS-A /eth-storage/vlan* # exit
UCS-A /eth-storage* # scope vlan cvlan502
UCS-A /eth-storage/vlan* # create member-port a 1 2
UCS-A /eth-storage/vlan/member-port* # commit-buffer
UCS-A /eth-storage/vlan/member-port #
Note If you delete a VLAN that is assigned to a vNIC or vNIC template, the vNIC might allow that VLAN to
flap.
Procedure
The following example deletes a Community VLAN and commits the transaction:
UCS-A# scope eth-uplink
UCS-A /eth-uplink # delete commnity vlan vlan203
UCS-A /eth-uplink* # commit-buffer
UCS-A /eth-uplink #
The following example displays the VLAN port count for fabric interconnect A:
UCS-A# scope fabric-interconnect a
UCS-A /fabric-interconnect # show vlan-port-count
VLAN-Port Count:
VLAN-Port Limit Access VLAN-Port Count Border VLAN-Port Count Alloc Status
---------- --------------- ---------------- ----------
6000 3 0 Available
Important • Enabling VLAN port count optimization increases the number of available VLAN ports for use. If
the port VLAN count exceeds the maximum number of VLANs in a non-optimized state, you cannot
disable the VLAN port count optimization.
• VLAN port count optimization is not supported in Cisco UCS 6100 Series fabric interconnect.
Step 2 UCS-A /eth-uplink# set Enables the vlan for port VLAN count
vlan-port-count-optimization enable optimization.
The following example shows how to enable VLAN port count optimization:
UCS-A# scope eth-uplink
UCS-A /eth-uplink # set vlan-port-count-optimization enable
UCS-A /eth-uplink* # commit-buffer
UCS-A /eth-uplink#
Procedure
Step 2 UCS-A /eth-uplink# set Disables the port VLAN count optimization.
vlan-port-count-optimization disable
Step 3 UCS-A /eth-uplink # commit-buffer Commits the transaction to the system
configuration.
The following example shows how to disable VLAN port count optimization:
UCS-A# scope eth-uplink
UCS-A /eth-uplink # set vlan-port-count-optimization disable
UCS-A /eth-uplink* # commit-buffer
UCS-A /eth-uplink#
Step 2 UCS-A /eth-uplink# show Displays the vlan for port VLAN count
vlan-port-count-optimization group optimization groups.
The following example shows port VLAN count optimization group in fabric a and b:
UCS-A# scope eth-uplink
UCS-A /eth-uplink # show vlan-port-count-optimization group
VLAN Port Count Optimization Group:
Fabric ID Group ID VLAN ID
-------- ------- -------
A 5 6
A 5 7
A 5 8
B 10 100
B 10 101
VLAN Groups
VLAN groups allow you to group VLANs on Ethernet uplink ports, by function or by VLANs that belong to
a specific network. You can define VLAN membership and apply the membership to multiple Ethernet uplink
ports on the fabric interconnect.
Note Cisco UCS Manager supports a maximum of 200 VLAN Groups. If Cisco UCS Manager determines that
you create more than 200 VLAN groups, the system disables VLAN compression.
You can configure inband and out-of-band (OOB) VLAN groups to use to access the Cisco Integrated
Management Interface (CIMC) on blade and rack servers. Cisco UCS Manager supports OOB IPv4 and inband
IPv4 and IPv6 VLAN groups for use with the uplink interfaces or uplink port channels.
After you assign a VLAN to a VLAN group, any changes to the VLAN group are applied to all Ethernet
uplink ports that are configured with the VLAN group. The VLAN group also enables you to identify VLAN
overlaps between disjoint VLANs.
You can configure uplink ports under a VLAN group. When you configure an uplink port for a VLAN group,
that uplink port will support all the VLANs that are part of the associated VLAN groups and individual VLANs
that are associated with the uplink using LAN Uplinks Manager, if any. Further, any uplink that is not selected
for association with that VLAN group will stop supporting the VLANs that are part of that VLAN group.
You can create VLAN groups from the LAN Cloud or from the LAN Uplinks Manager.
Step 2 UCS-A# /eth-uplink/ #create Create a VLAN group with the specified name.
vlan-groupName . This name can be between 1 and 32 alphanumeric
characters. You cannot use spaces or any special
characters other than - (hyphen), _ (underscore), :
(colon), and . (period), and you cannot change this name
after the object is saved.
Step 3 UCS-A# /eth-uplink/ Adds the specified VLANs to the created VLAN group.
vlan-group#create member-vlanID .
Step 4 UCS-A# /eth-uplink/vlan-group Assigns the uplink Ethernet ports to the VLAN group.
#create member-port
[member-port-channel] .
Step 5 UCS-A#/vlan-group* # Commits the transaction to the system configuration.
commit-buffer.
Procedure
Step 5 UCS-A /eth-uplink/vlan-group # create Creates the member port for the specified
member-portfabricslot-numport-num fabric, assigns the slot number, and port
number and enters member port configuration.
Step 6 UCS-A /eth-uplink/vlan-group/member-port # Commits the transaction.
commit-buffer
The example below creates a VLAN group named inband-vlan-group, creates a member of the group named
Inband_VLAN and assigns VLAN ID 888, creates member ports for Fabric A and Fabric B, and commits the
transaction:
UCS-A# scope eth-uplink
UCS-A /eth-uplink # create vlan-group inband-vlan-group
UCS-A /eth-uplink/vlan-group* # create member-vlan Inband_VLAN 888
UCS-A /eth-uplink/vlan-group/member-vlan* # exit
UCS-A /eth-uplink/vlan-group* # create member-port a 1 23
UCS-A /eth-uplink/vlan-group/member-port* # exit
UCS-A /eth-uplink/vlan-group* # create member-port b 1 23
UCS-A /eth-uplink/vlan-group/member-port* # commit-buffer
UCS-A /eth-uplink/vlan-group/member-port # exit
UCS-A /eth-uplink/vlan-group # exit
What to Do Next
Assign the inband VLAN group to an inband service profile.
Step 2 UCS-A /org # show vlan-group Displays the available groups in the organization.
The following example shows the available VLAN groups in the root org:
UCS-A# scope org
UCS-A# /org/# show vlan-group
VLAN Group:
Name
----
eng
hr
finance
VLAN Permissions
VLAN permissions restrict access to VLANs based on specified organizations and on the service profile
organizations to which the VLANs belong. VLAN permissions also restrict the set of VLANs that you can
assign to service profile vNICs. VLAN permissions is an optional feature and is disabled by default. You can
enable or disable the feature based on your requirements. If you disable the feature, all of the VLANs are
globally accessible to all organizations.
Note If you enable the org permission in LAN > LAN Cloud > Global Policies > Org Permissions, when
you create a VLAN, the Permitted Orgs for VLAN(s) option displays in the Create VLANs dialog box.
If you do not enable the Org Permissions, the Permitted Orgs for VLAN(s) option does not display.
Enabling the org permission allows you to specify the organizations for the VLAN. When you specify the
organizations, the VLAN becomes available to that specific organization and all of the sub organizations
below the structure. Users from other organizations cannot access this VLAN. You can also modify the VLAN
permission anytime based on changes to your VLAN access requirements.
Caution When you assign the VLAN org permission to an organization at the root level, all sub organizations can
access the VLANs. After assigning the org permission at the root level, and you change the permission
for a VLAN that belongs to a sub organization, that VLAN becomes unavailable to the root level
organization.
Step 2 UCS-A# /org/ #create Creates the specified VLAN permission and assigns
vlan-permitVLAN permission name. VLAN access permission to the organization.
The following example shows how to create a VLAN permission for an organization:
UCS-A# scope org
UCS-A /org # create vlan-permit dev
UCS-A /org* # commit-buffer
UCS-A /org #
Step 2 UCS-A# /org/ #delete vlan-permitVLAN Deletes the access permission to the VLAN.
permission name.
Step 3 UCS-A#/org* # commit-buffer. Commits the transaction to the system
configuration.
The following example shows how to delete a VLAN permission from an organization:
UCS-A# scope org
UCS-A /org # delete vlan-permit dev
UCS-A /org* # commit-buffer
UCS-A /org #
Step 2 UCS-A /org # show vlan-permit Displays the available permissions in the
organization.
The following example shows the VLAN groups that have permission to access this VLAN:
UCS-A# scope org
UCS-A# /org/# show vlan-permit
VLAN Group:
Name
----
eng
hr
finance
Note If you do not assign a pin group to a server interface through a vNIC policy, Cisco UCS Manager chooses
an uplink Ethernet port or port channel for traffic from that server interface dynamically. This choice is
not permanent. A different uplink Ethernet port or port channel may be used for traffic from that server
interface after an interface flap or a server reboot.
If an uplink is part of a LAN pin group, the uplink is not necessarily reserved for only that LAN pin group.
Other vNIC's policies that do not specify a LAN pin group can use the uplink as a dynamic uplink.
Procedure
Step 2 UCS-A /eth-uplink # create pin-group Creates an Ethernet (LAN) pin group with the specified
pin-group-name name, and enters Ethernet uplink pin group mode.
The following example creates a LAN pin group named pingroup54 on fabric A, provides a description for
the pin group, sets the pin group target to port channel 28, and commits the transaction:
UCS-A# scope eth-uplink
UCS-A /eth-uplink # create pin-group pingroup54
UCS-A /eth-uplink/pin-group* # set descr "This is my pin group #54"
UCS-A /eth-uplink/pin-group* # set target a port-channel 28
UCS-A /eth-uplink/pin-group* # commit-buffer
UCS-A /eth-uplink/pin-group #
What to Do Next
Include the pin group in a vNIC template.
MAC Pools
A MAC pool is a collection of network identities, or MAC addresses, that are unique in their Layer 2
environment and are available to be assigned to vNICs on a server. If you use MAC pools in service profiles,
you do not have to manually configure the MAC addresses to be used by the server associated with the service
profile.
In a system that implements multitenancy, you can use the organizational hierarchy to ensure that MAC pools
can be used only by specific applications or business services. Cisco UCS uses the name resolution policy to
assign MAC addresses from the pool.
To assign a MAC address to a server, you must include the MAC pool in a vNIC policy. The vNIC policy is
then included in the service profile assigned to that server.
You can specify your own MAC addresses or use a group of MAC addresses provided by Cisco.
Step 2 UCS-A /org # create Creates a MAC pool with the specified name, and enters
mac-pool mac-pool-name organization MAC pool mode.
Step 5 UCS-A /org/mac-pool # Creates a block (range) of MAC addresses, and enters organization
create block first-mac-addr MAC pool block mode. You must specify the first and last MAC
last-mac-addr addresses in the address range using the form nn:nn:nn:nn:nn:nn,
with the addresses separated by a space.
Note A MAC pool can contain more than one MAC address
block. To create multiple MAC address blocks, you must
enter multiple create block commands from organization
MAC pool mode.
Step 6 UCS-A /org/mac-pool # Commits the transaction to the system configuration.
commit-buffer
The following example shows how to create a MAC pool named pool37, provide a description for the pool,
define a MAC address block by specifying the first and last MAC addresses in the block, and commit the
transaction:
UCS-A# scope org /
UCS-A /org # create mac-pool pool37
UCS-A /org/mac-pool* # set descr "This is my MAC pool"
UCS-A /org/mac-pool* # create block 00:A0:D7:42:00:01 00:A0:D7:42:01:00
UCS-A /org/mac-pool/block* # commit-buffer
UCS-A /org/mac-pool/block #
What to Do Next
Include the MAC pool in a vNIC template.
Procedure
Step 2 UCS-A /org # delete mac-pool Deletes the specified MAC pool.
pool-name
Step 3 UCS-A /org # commit-buffer Commits the transaction to the system configuration.
The following example shows how to delete the MAC pool named pool4 and commit the transaction:
UCS-A# scope org /
UCS-A /org # delete mac-pool pool4
UCS-A /org* # commit-buffer
UCS-A /org #
Quality of Service
Cisco UCS provides the following methods to implement quality of service:
• System classes that specify the global configuration for certain types of traffic across the entire system
• QoS policies that assign system classes for individual vNICs
• Flow control policies that determine how uplink Ethernet ports handle pause frames
Global QoS changes made to the QoS system class may result in brief data-plane interruptions for all traffic.
Some examples of such changes are:
• Changing the MTU size for an enabled class
• Changing packet drop for an enabled class
• Changing the CoS value for an enabled class
Guidelines and Limitations for Quality of Service on Cisco UCS 6300 Series Fabric Interconnect
• Cisco UCS 6300 Series Fabric Interconnect uses a shared buffer for all system classes.
• Multicast optimization is not supported.
• When you change the QoS parameters for any class causes traffic disruption to all classes. The following
table lists the changes in the QoS system class and the conditions that trigger a system reboot.
• The subordinate FI reboots first as a result of the change in the QoS system class. The primary FI reboots
only after you acknowledge it in Pending Activities.
Best Effort A system class that sets the quality of service for the lane reserved for basic
Ethernet traffic.
Some properties of this system class are preset and cannot be modified. For
example, this class has a drop policy that allows it to drop data packets if
required. You cannot disable this system class.
Fibre Channel A system class that sets the quality of service for the lane reserved for Fibre
Channel over Ethernet traffic.
Some properties of this system class are preset and cannot be modified. For
example, this class has a no-drop policy that ensures it never drops data packets.
You cannot disable this system class.
Note FCoE traffic has a reserved QoS system class that should not be used
by any other type of traffic. If any other type of traffic has a CoS value
that is used by FCoE, the value is remarked to 0.
Procedure
Step 2 UCS-A /eth-server # scope qos Enters Ethernet server QoS mode.
Step 3 UCS-A /eth-server/qos # scope Enters Ethernet server QoS Ethernet classified mode for
eth-classified {bronze | gold | the specified system class.
platinum | silver}
Step 8 UCS-A /eth-server/qos/eth-classified Specifies whether the class is optimized to for sending
# set multicast-optimize {no | yes} multicast packets.
Step 9 UCS-A /eth-server/qos/eth-classified Specifies the relative weight for the specified system class.
# set weight {weight-value | Valid weight values are 0 to 10.
best-effort | none}
Step 10 UCS-A /eth-server/qos/eth-classified Commits the transaction to the system configuration.
# commit-buffer
The following example shows how to enable the platinum system class, allow the channel to drop packets,
set the class of service to 6, set the MTU to normal, set the relative weight to 5, and commit the transaction:
UCS-A# scope eth-server
UCS-A /eth-server # scope qos
UCS-A /eth-server/qos # scope eth-classified platinum
UCS-A /eth-server/qos/eth-classified # enable
UCS-A /eth-server/qos/eth-classified* # set drop drop
Warning: The operation will cause momentary disruption to traffic forwarding
UCS-A /eth-server/qos/eth-classified* # set cos 6
UCS-A /eth-server/qos/eth-classified* # set mtu normal
Warning: The operation will cause momentary disruption to traffic forwarding
UCS-A /eth-server/qos/eth-classified* # set weight 5
UCS-A /eth-server/qos/eth-classified* # commit-buffer
UCS-A /eth-server/qos/eth-classified #
Procedure
Step 2 UCS-A /eth-server # scope qos Enters Ethernet server QoS mode.
Step 3 UCS-A /eth-server/qos # scope eth-classified Enters Ethernet server QoS Ethernet classified
{bronze | gold | platinum | silver} mode for the specified system class.
The following example disables the platinum system class and commits the transaction:
UCS-A# scope eth-server
UCS-A /eth-server # scope qos
UCS-A /eth-server/qos # scope eth-classified platinum
UCS-A /eth-server/qos/eth-classified # disable
UCS-A /eth-server/qos/eth-classified* # commit-buffer
UCS-A /eth-server/qos/eth-classified #
Step 2 Switch-A /org # create Creates the specified QoS policy, and enters org QoS policy mode.
qos-policy policy-name
Step 3 Switch-A /org/qos-policy # Creates the egress policy (for both vNICs and vHBAs) to be used
create egress-policy by the QoS policy, and enters org QoS policy egress policy mode.
Step 4 Switch-A (Optional) Specifies whether the host or Cisco UCS Manager
/org/qos-policy/egress-policy controls the class of service (CoS) for a vNIC. This setting has no
# set host-cos-control {full | effect on a vHBA.
none} Use the full keyword to have the host control the CoS. If the packet
has a valid CoS value, the host uses that value. Otherwise, it uses
the CoS value associated with the specified class priority. Use the
none keyword to have Cisco UCS Manager use the CoS value
associated with the specified priority.
Step 5 Switch-A Specifies the system class to be used for the egress policy. The
/org/qos-policy/egress-policy sys-class-name argument can be one of the following class
# set prio sys-class-name keywords:
• Fc—Use this priority for QoS policies that control vHBA
traffic only.
• Platinum—Use this priority for QoS policies that control
vNIC traffic only.
• Gold—Use this priority for QoS policies that control vNIC
traffic only.
• Silver—Use this priority for QoS policies that control vNIC
traffic only.
• Bronze—Use this priority for QoS policies that control vNIC
traffic only.
• Best Effort—Do not use this priority. It is reserved for the
Basic Ethernet traffic lane. If you assign this priority to a QoS
policy and configure another system class as CoS 0, Cisco
UCS Manager does not default to this system class. It defaults
to the priority with CoS 0 for that traffic.
The following example creates a QoS policy for vNIC traffic, assigns the platinum system class and sets the
rate limit (traffic rate and burst size) for the egress policy, and commits the transaction:
Switch-A# scope org /
Switch-A /org # create qos-policy VnicPolicy34
Switch-A /org/qos-policy* # create egress-policy
Switch-A /org/qos-policy/egress-policy* # set prio platinum
Switch-A /org/qos-policy/egress-policy* # set rate 5000000 burst 65000
Switch-A /org/qos-policy/egress-policy* # commit-buffer
Switch-A /org/qos-policy/egress-policy #
The following example creates a QoS policy for vHBA traffic, assigns the fc (Fibre Channel) system class
and sets the rate limit (traffic rate and burst size) for the egress policy, and commits the transaction:
Switch-A# scope org /
Switch-A /org # create qos-policy VhbaPolicy12
Switch-A /org/qos-policy* # create egress-policy
Switch-A /org/qos-policy/egress-policy* # set prio fc
Switch-A /org/qos-policy/egress-policy* # set rate 5000000 burst 65000
Switch-A /org/qos-policy/egress-policy* # commit-buffer
Switch-A /org/qos-policy/egress-policy #
What to Do Next
Include the QoS policy in a vNIC or vHBA template.
Procedure
Step 2 UCS-A /org # delete qos-policy Deletes the specified QoS policy.
policy-name
Step 3 UCS-A /org # commit-buffer Commits the transaction to the system configuration.
The following deletes the QoS policy named QosPolicy34 and commits the transaction:
UCS-A# scope org /
UCS-A /org # delete qos-policy QosPolicy34
UCS-A /org* # commit-buffer
UCS-A /org #
Procedure
Step 2 UCS-A /eth-uplink # scope Enters Ethernet uplink flow control mode.
flow-control
Step 3 UCS-A /eth-uplink/flow-control # Creates the specified flow control policy.
create policy policy-name
Step 4 UCS-A Specifies one of the following flow control priority options:
/eth-uplink/flow-control/policy # set
prio prio-option • auto —The Cisco UCS system and the network
negotiate whether PPP will be used on this fabric
interconnect.
• on —PPP is enabled on this fabric interconnect.
Step 5 UCS-A Specifies one of the following flow control receive options:
/eth-uplink/flow-control/policy # set
receive receive-option • off —Pause requests from the network are ignored
and traffic flow continues as normal.
• on —Pause requests are honored and all traffic is
halted on that uplink port until the network cancels
the pause request.
Step 6 UCS-A Specifies one of the following flow control send options:
/eth-uplink/flow-control/policy # set
send send-option • off —Traffic on the port flows normally regardless
of the packet load.
• on —The Cisco UCS system sends a pause request
to the network if the incoming packet rate becomes
too high. The pause remains in effect for a few
milliseconds before traffic is reset to normal levels.
The following configures a flow control policy and commits the transaction:
UCS-A# scope eth-uplink
UCS-A /eth-uplink # scope flow-control
UCS-A /eth-uplink/flow-control # create policy FlowControlPolicy23
UCS-A /eth-uplink/flow-control/policy* # set prio auto
UCS-A /eth-uplink/flow-control/policy* # set receive on
UCS-A /eth-uplink/flow-control/policy* # set send on
UCS-A /eth-uplink/flow-control/policy* # commit-buffer
UCS-A /eth-uplink/flow-control/policy #
What to Do Next
Associate the flow control policy with an uplink Ethernet port or port channel.
Step 2 UCS-A /eth-uplink # scope flow-control Enters Ethernet uplink flow control mode.
Step 3 UCS-A /eth-uplink/flow-control # delete Deletes the specified flow control policy.
policy policy-name
Step 4 UCS-A /eth-uplink/flow-control # Commits the transaction to the system
commit-buffer configuration.
The following example deletes the flow control policy named FlowControlPolicy23 and commits the transaction:
UCS-A# scope eth-uplink
UCS-A /eth-uplink # scope flow-control
UCS-A /eth-uplink/flow-control # delete policy FlowControlPolicy23
UCS-A /eth-uplink/flow-control* # commit-buffer
UCS-A /eth-uplink/flow-control #
Note If your server has two Emulex or QLogic NICs (Cisco UCS CNA M71KR-E or Cisco UCS CNA
M71KR-Q), you must configure vNIC policies for both adapters in your service profile to get a user-defined
MAC address for both NICs. If you do not configure policies for both NICs, Windows still detects both
of them in the PCI bus. Then because the second eth is not part of your service profile, Windows assigns
it a hardware MAC address. If you then move the service profile to a different server, Windows sees
additional NICs because one NIC did not have a user-defined MAC address.
Step 2 UCS-A /org # create Creates a vNIC template and enters organization vNIC template
vnic-templ vnic-templ-name mode.
[eth-if vlan-name] [fabric {a | The target you choose determines whether or not Cisco UCS
b}] [target [adapter | vm]] Manager automatically creates a VM-FEX port profile with the
appropriate settings for the vNIC template. This can be one of
the following:
• Adapter—The vNICs apply to all adapters. No VM-FEX
port profile is created if you choose this option.
• VM—The vNICs apply to all virtual machines. A VM-FEX
port profile is created if you choose this option.
Step 5 UCS-A /org/vnic-templ # set The MAC address pool that vNICs created from this vNIC
mac-pool mac-pool-name template should use.
Step 6 UCS-A /org/vnic-templ # set The maximum transmission unit, or packet size, that vNICs
mtu mtu-value created from this vNIC template should use.
Enter an integer between 1500 and 9000.
Note If the vNIC template has an associated QoS policy, the
MTU specified here must be equal to or less than the
MTU specified in the associated QoS system class. If
this MTU value exceeds the MTU value in the QoS
system class, packets may be dropped during data
transmission.
Step 7 UCS-A /org/vnic-templ # set The network control policy that vNICs created from this vNIC
nw-control-policy policy-name template should use.
Step 8 UCS-A /org/vnic-templ # set The LAN pin group that vNICs created from this vNIC template
pin-group group-name should use.
Step 9 UCS-A /org/vnic-templ # set The quality of service policy that vNICs created from this vNIC
qos-policy policy-name template should use.
Step 10 UCS-A /org/vnic-templ # set The statistics collection policy that vNICs created from this vNIC
stats-policy policy-name template should use.
Step 11 UCS-A /org/vnic-templ # set Specifies the vNIC template update type. If you do not want vNIC
type {initial-template | instances created from this template to be automatically updated
updating-template} when the template is updated, use the initial-template keyword;
otherwise, use the updating-template keyword to ensure that
all vNIC instances are updated when the vNIC template is
updated.
The following example configures a vNIC template and commits the transaction:
UCS-A# scope org /
UCS-A /org* # create vnic template VnicTempFoo
UCS-A /org/vnic-templ* # set descr "This is a vNIC template example."
UCS-A /org/vnic-templ* # set fabric a
UCS-A /org/vnic-templ* # set mac-pool pool137
UCS-A /org/vnic-templ* # set mtu 8900
UCS-A /org/vnic-templ* # set nw-control-policy ncp5
UCS-A /org/vnic-templ* # set pin-group PinGroup54
UCS-A /org/vnic-templ* # set qos-policy QosPol5
UCS-A /org/vnic-templ* # set stats-policy ServStatsPolicy
UCS-A /org/vnic-templ* # set type updating-template
UCS-A /org/vnic-templ* # commit-buffer
UCS-A /org/vnic-templ #
Step 4 UCS-A/ # org vnic-templ set descr Sets the template as the Primary vNIC template.
primaryinredundancypair .
Step 5 UCS-A/ # org vnic-templ set Sets the redundancy template type as the Primary vNIC
redundancy-type primary. template.
Following are descriptions of the Redundancy Types:
Primary—Creates configurations that can be shared with
the Secondary vNIC template. Any shared changes on the
Primary vNIC template are automatically synchronized to
the Secondary vNIC template.
Secondary — All shared configurations are inherited from
the Primary template.
No Redundancy— Legacy vNIC template behavior.
Following is a list of shared configurations:
• Network Control Policy
• QoS Policy
• Stats Threshold Policy
• Template Type
• Connection Policies
• VLANS
• MTU
Step 6 UCS-A/ # org vnic-templ exit . Exits creating the redundancy template pairing.
Note Ensure to commit the transaction after linking the
Primary vNIC template to a peer Secondary vNIC
template to create the redundancy pair.
Step 7 UCS-A/ # org vnic-templ create Creates the Secondary vNIC template.
vNIC-templ vNICsecondary .
Step 9 UCS-A/ org # vnic-templ [set Specifies the fabric for the Secondary vNIC template. If you
fabric {a | b}] . specify Fabric A for the Primary vNIC template, the
Secondary vNIC template must be Fabric B or vice versa.
Step 10 UCS-A/ # org vnic-templ set descr Sets the secondary vNIC template as a redundancy pair
secondaryredundancypair. template.
Step 11 UCS-A/ # org vnic-templ set Sets the vNIC template type as Secondary.
redundancy-type secondary.
Step 12 UCS-A/ # org vnic-templ set Sets the Primary vNIC template as the peer to the Secondary
peer-template-name vNIC template.
vNIC-primary.
Step 13 UCS-A/ # org vnic-templ Commits the transaction to the system configuration.
commit-buffer .
The following example configures a vNIC redundancy template pair and commits the transaction:
What to Do Next
After you create the vNIC redundancy template pair, you can use the redundancy template pair to create
redundancy vNIC pairs for any service profile in the same organization or sub- organization.
Procedure
Step 2 UCS-A /org/ vnic-templ # set Removes the paring between the peer Primary or
redundancy-type no redundancy. Secondary redundancy template used to perform the
template pairing.
Step 2 UCS-A /org # delete vnic-templ Deletes the specified vNIC template.
vnic-templ-name
Step 3 UCS-A /org # commit-buffer Commits the transaction to the system configuration.
The following example deletes the vNIC template named VnicTemp42 and commits the transaction:
UCS-A# scope org /
UCS-A /org # delete vnic template VnicTemp42
UCS-A /org* # commit-buffer
UCS-A /org #
• Queues
• Interrupt handling
• Performance enhancement
• RSS hash
• Failover in a cluster configuration with two fabric interconnects
Note For Fibre Channel adapter policies, the values displayed by Cisco UCS Manager may not match those
displayed by applications such as QLogic SANsurfer. For example, the following values may result in an
apparent mismatch between SANsurfer and Cisco UCS Manager:
• Max LUNs Per Target—SANsurfer has a maximum of 256 LUNs and does not display more than
that number. Cisco UCS Manager supports a higher maximum number of LUNs.
• Link Down Timeout—In SANsurfer, you configure the timeout threshold for link down in seconds.
In Cisco UCS Manager, you configure this value in milliseconds. Therefore, a value of 5500 ms in
Cisco UCS Manager displays as 5s in SANsurfer.
• Max Data Field Size—SANsurfer has allowed values of 512, 1024, and 2048. Cisco UCS Manager
allows you to set values of any size. Therefore, a value of 900 in Cisco UCS Manager displays as
512 in SANsurfer.
• LUN Queue Depth—The LUN queue depth setting is available for Windows system FC adapter
policies. Queue depth is the number of commands that the HBA can send and receive in a single
transmission per LUN. Windows Storport driver sets this to a default value of 20 for physical miniports
and to 250 for virtual miniports. This setting adjusts the initial queue depth for all LUNs on the
adapter. Valid range for this value is 1 to 254. The default LUN queue depth is 20. This feature only
works with Cisco UCS Manager version 3.1(2) and higher.
• IO TimeOut Retry—When the target device is not responding to an IO request within the specified
timeout, the FC adapter will abort the pending command then resend the same IO after the timer
expires. The FC adapter valid range for this value is 1 to 59 seconds. The default IO retry timeout
is 5 seconds. This feature only works with Cisco UCS Manager version 3.1(2) and higher.
Important We recommend that you use the values in these policies for the applicable operating system. Do not modify
any of the values in the default policies unless directed to do so by Cisco Technical Support.
However, if you are creating an Ethernet adapter policy for a Windows OS (instead of using the default
Windows adapter policy), you must use the following formulas to calculate values that work with Windows:
Completion Queues = 1 + 8 = 9
Interrupt Count = (9 + 2) rounded up to the nearest power of 2 = 16
Interrupt Coalescing
Adapters typically generate a large number of interrupts that a host CPU must service. Interrupt coalescing
reduces the number of interrupts serviced by the host CPU. This is done by interrupting the host only once
for multiple occurrences of the same event over a configurable coalescing interval.
When interrupt coalescing is enabled for receive operations, the adapter continues to receive packets, but the
host CPU does not immediately receive an interrupt for each packet. A coalescing timer starts when the first
packet is received by the adapter. When the configured coalescing interval times out, the adapter generates
one interrupt with the packets received during that interval. The NIC driver on the host then services the
multiple packets that are received. Reduction in the number of interrupts generated reduces the time spent by
the host CPU on context switches. This means that the CPU has more time to process packets, which results
in better throughput and latency.
• Microsoft SMB Direct with RoCE is supported only with third generation Cisco UCS VIC 1340, 1380,
1385, 1387 adapters. Second generation UCS VIC 1225 and 1227 adapters are not supported.
• RoCE configuration is supported between Cisco adapters. Interoperability between Cisco adapters and
third party adapters is not supported.
• Cisco UCS Manager does not support more than 4 RoCE-enabled vNICs per adapter.
• Cisco UCS Manager does not support RoCE with NVGRE, VXLAN, NetFlow, VMQ, or usNIC.
• Maximum number of queue pairs per adapter is 8192.
• Maximum number of memory regions per adapter is 524288.
• If you do not disable RoCE before downgrading Cisco UCS Manager from Release 2.2(4), downgrade
will fail.
• Cisco UCS Manager does not support fabric failover for vNICs with RoCE enabled.
Step 16 UCS-A /org/eth-policy # commit-buffer Commits the transaction to the system configuration.
The following example configures an Ethernet adapter policy, and commits the transaction:
UCS-A# scope org
UCS-A /org* # create eth-policy EthPolicy19
UCS-A /org/eth-policy* # set comp-queue count 16
UCS-A /org/eth-policy* # set descr "This is an Ethernet adapter policy example."
UCS-A /org/eth-policy* # set failover timeout 300
UCS-A /org/eth-policy* # set interrupt count 64
UCS-A /org/eth-policy* # set offload large-receive disabled
UCS-A /org/eth-policy* # set recv-queue count 32
UCS-A /org/eth-policy* # set rss receivesidescaling enabled
UCS-A /org/eth-policy* # set trans-queue
UCS-A /org/eth-policy* # commit-buffer
UCS-A /org/eth-policy #
The following example configures an Ethernet adapter policy with RoCE, and commits the transaction:
UCS-A# scope org
UCS-A /org* # create eth-policy EthPolicy20
UCS-A /org/eth-policy* # set roce adminstate enable
UCS-A /org/eth-policy* # set roce memoryregions 131072
UCS-A /org/eth-policy* # set roce queuepairs 256
UCS-A /org/eth-policy* # set roce resourcegroups 32
UCS-A /org/eth-policy # commit buffer
UCS-A /org # show eth-policy EthPolicy20 detail expand
ARFS:
Accelarated Receive Flow Steering: Disabled
Count: 2
Ethernet Failback:
Timeout (sec): 5
Ethernet Interrupt:
Coalescing Time (us): 125
Coalescing Type: Min
Count: 4
Driver Interrupt Mode: MSI-X
NVGRE:
NVGRE: Disabled
Ethernet Offload:
Large Receive: Enabled
TCP Segment: Enabled
TCP Rx Checksum: Enabled
TCP Tx Checksum: Enabled
ROCE:
RoCE: Enabled
Resource Groups: 32
Memory Regions: 131072
Queue Pairs: 256
VXLAN:
VXLAN: Disabled
RSS:
Receive Side Scaling: Disabled
Procedure
Procedure
Step 2 UCS-A /org # create eth-policy Creates the specified Ethernet adapter policy and enters
policy-name organization Ethernet policy mode.
The following example shows how to configure an Ethernet adapter policy to enable stateless offloads with
NVGRE and commit the transaction:
UCS-A# scope org /
UCS-A /org* # create eth-policy NVGRE
UCS-A /org/eth-policy* # set descr "Ethernet adapter policy with stateless offloads"
UCS-A /org/eth-policy* # set nvgre adminstate enabled
UCS-A /org/eth-policy* # set comp-queue count 16
UCS-A /org/eth-policy* # set interrupt count 64
UCS-A /org/eth-policy* # set recv-queue count 32
UCS-A /org/eth-policy* # set rss receivesidescaling enabled
UCS-A /org/eth-policy* # set trans-queue 1
UCS-A /org/eth-policy* # set interrupt mode mxi-x
UCS-A /org/eth-policy* # commit-buffer
UCS-A /org/eth-policy #
Procedure
Step 2 UCS-A /org # create eth-policy Creates the specified Ethernet adapter policy and enters
policy-name organization Ethernet policy mode.
The following example shows how to configure an Ethernet adapter policy to enable stateless offloads with
VXLAN and commit the transaction:
UCS-A# scope org /
UCS-A /org* # create eth-policy VXLAN
UCS-A /org/eth-policy* # set descr "Ethernet adapter policy with stateless offloads"
UCS-A /org/eth-policy* # set vxlan adminstate enabled
UCS-A /org/eth-policy* # set comp-queue count 16
UCS-A /org/eth-policy* # set interrupt count 64
UCS-A /org/eth-policy* # set recv-queue count 32
UCS-A /org/eth-policy* # set rss receivesidescaling enabled
UCS-A /org/eth-policy* # set trans-queue 1
UCS-A /org/eth-policy* # set interrupt mode mxi-x
UCS-A /org/eth-policy* # commit-buffer
UCS-A /org/eth-policy #
Step 2 UCS-A /org # delete eth-policy Deletes the specified Ethernet adapter policy.
policy-name
Step 3 UCS-A /org # commit-buffer Commits the transaction to the system configuration.
The following example deletes the Ethernet adapter policy named EthPolicy19 and commits the transaction:
UCS-A# scope org /
UCS-A /org # delete eth-policy EthPolicy19
UCS-A /org* # commit-buffer
UCS-A /org #
Note If you do not specify a default behavior policy for vNICs, HW Inherit is used by default.
This example shows how to set the default vNIC behavior policy to hw-inherit:
UCS-A # scope org /
UCS-A/org # scope vnic-beh-policy
UCS-A/org/vnic-beh-policy # set action hw-inherit
UCS-A/org/vnic-beh-policy* # commit-buffer
UCS-A/org/vnic-beh-policy #
Note We do not recommend that you use static IDs in connectivity policies, because these policies are included
in service profiles and service profile templates and can be used to configure multiple servers.
Cisco UCS maintains mutual exclusivity between connectivity policies and local vNIC and vHBA configuration
in the service profile. You cannot have a combination of connectivity policies and locally created vNICs or
vHBAs. When you include a LAN connectivity policy in a service profile, all existing vNIC configuration is
erased, and when you include a SAN connectivity policy, all existing vHBA configuration in that service
profile is erased.
Step 2 UCS-A /org # create Creates the specified LAN connectivity policy, and enters
lan-connectivity-policy organization LAN connectivity policy mode.
policy-name This name can be between 1 and 16 alphanumeric characters.
You cannot use spaces or any special characters other than -
(hyphen), _ (underscore), : (colon), and . (period), and you cannot
change this name after the object is saved.
The following example shows how to create a LAN connectivity policy named LanConnect42 and commit
the transaction:
UCS-A# scope org /
UCS-A /org* # create lan-connectivity-policy LanConnect42
What to Do Next
Add one or more vNICs and/or iSCSI vNICs to this LAN connectivity policy.
Procedure
Step 2 UCS-A /org # scope Enters LAN connectivity policy mode for the specified
lan-connectivity-policy policy-name LAN connectivity policy.
Step 3 UCS-A /org/lan-connectivity-policy Creates a vNIC for the specified LAN connectivity policy.
# create vnic vnic-name [eth-if This name can be between 1 and 16 alphanumeric
eth-if-name] [fabric {a | b}] characters. You cannot use spaces or any special characters
other than - (hyphen), _ (underscore), : (colon), and .
(period), and you cannot change this name after the object
is saved.
Step 4 UCS-A Specifies the fabric to use for the vNIC. If you did not
/org/lan-connectivity-policy/vnic # specify the fabric when you created the vNIC in Step 3,
set fabric {a | a-b | b | b-a} you have the option to specify it with this command.
If you want this vNIC to be able to access the second fabric
interconnect if the default one is unavailable, choose a-b
(A is the primary) or b-a (B is the primary) .
Note Do not enable fabric failover for the vNIC under
the following circumstances:
• If the Cisco UCS domain is running in
Ethernet Switch Mode. vNIC fabric failover
is not supported in that mode. If all Ethernet
uplinks on one fabric interconnect fail, the
vNICs do not fail over to the other.
• If you plan to associate this vNIC to a server
with an adapter that does not support fabric
failover, such as the Cisco UCS 82598KR-CI
10-Gigabit Ethernet Adapter. If you do so,
Cisco UCS Manager generates a
configuration fault when you associate the
service profile with the server.
The following example shows how to configure a vNIC for a LAN connectivity policy named LanConnect42
and commit the transaction:
UCS-A# scope org /
UCS-A /org # scope lan-connectivity-policy LanConnect42
UCS-A /org/lan-connectivity-policy* # create vnic vnic3 fabric a
UCS-A /org/lan-connectivity-policy/vnic* # set fabric a-b
UCS-A /org/lan-connectivity-policy/vnic* # set adapter-policy AdaptPol2
UCS-A /org/lan-connectivity-policy/vnic* # set identity mac-pool MacPool3
UCS-A /org/lan-connectivity-policy/vnic* # set mtu 8900
UCS-A /org/lan-connectivity-policy/vnic* # set nw-control-policy ncp5
UCS-A /org/lan-connectivity-policy/vnic* # set order 0
UCS-A /org/lan-connectivity-policy/vnic* # set pin-group EthPinGroup12
UCS-A /org/lan-connectivity-policy/vnic* # set qos-policy QosPol5
UCS-A /org/lan-connectivity-policy/vnic* # set stats-policy StatsPol2
UCS-A /org/lan-connectivity-policy/vnic* # set template-name VnicConnPol3
UCS-A /org/lan-connectivity-policy/vnic* # set vcon any
UCS-A /org/lan-connectivity-policy/vnic* # commit-buffer
UCS-A /org/lan-connectivity-policy/vnic #
What to Do Next
If desired, add another vNIC or an iSCSI vNIC to the LAN connectivity policy. If not, include the policy in
a service profile or service profile template.
Step 2 UCS-A /org # scope Enters LAN connectivity policy mode for the
lan-connectivity-policy policy-name specified LAN connectivity policy.
Step 3 UCS-A /org/lan-connectivity-policy # Deletes the specified vNIC from the LAN
delete vnic vnic-name connectivity policy.
The following example shows how to delete a vNIC named vnic3 from a LAN connectivity policy named
LanConnect42 and commit the transaction:
UCS-A# scope org /
UCS-A /org # scope lan-connectivity-policy LanConnect42
UCS-A /org/lan-connectivity-policy # delete vnic vnic3
UCS-A /org/lan-connectivity-policy* # commit-buffer
UCS-A /org/lan-connectivity-policy #
Procedure
Step 2 UCS-A /org # scope Enters LAN connectivity policy mode for the specified
lan-connectivity-policy policy-name LAN connectivity policy.
Step 3 UCS-A /org/lan-connectivity-policy # Creates an iSCSI vNIC for the specified LAN
create vnic-iscsi iscsi-vnic-name . connectivity policy.
This name can be between 1 and 16 alphanumeric
characters. You cannot use spaces or any special
characters other than - (hyphen), _ (underscore), : (colon),
and . (period), and you cannot change this name after the
object is saved.
Step 6 UCS-A Specifies the MAC address for the iSCSI vNIC.
/org/lan-connectivity-policy/vnic-iscsi Note The MAC address is set only for the Cisco UCS
# set identity { dynamic-mac NIC M51KR-B Adapters.
{dynamic-mac-address | derived } |
mac-pool mac-pool-name }
The following example shows how to configure an iSCSI vNIC for a LAN connectivity policy named
LanConnect42 and commit the transaction:
What to Do Next
If desired, add another iSCI vNIC or a vNIC to the LAN connectivity policy. If not, include the policy in a
service profile or service profile template.
Step 2 UCS-A /org # scope Enters LAN connectivity policy mode for the
lan-connectivity-policy policy-name specified LAN connectivity policy.
Step 3 UCS-A /org/lan-connectivity-policy # Deletes the specified iSCSI vNIC from the LAN
delete vnic-iscsi iscsi-vnic-name connectivity policy.
The following example shows how to delete an iSCSI vNIC named iscsivnic3 from a LAN connectivity policy
named LanConnect42 and commit the transaction:
UCS-A# scope org /
UCS-A /org # scope lan-connectivity-policy LanConnect42
UCS-A /org/lan-connectivity-policy # delete vnic-iscsi iscsivnic3
UCS-A /org/lan-connectivity-policy* # commit-buffer
UCS-A /org/lan-connectivity-policy #
Procedure
Step 2 UCS-A /org # delete Deletes the specified LAN connectivity policy.
lan-connectivity-policy policy-name
Step 3 UCS-A /org # commit-buffer Commits the transaction to the system configuration.
The following example shows how to delete the LAN connectivity policy named LanConnectiSCSI42 from
the root organization and commit the transaction:
UCS-A# scope org /
UCS-A /org # delete lan-connectivity-policy LanConnectiSCSI42
UCS-A /org* # commit-buffer
UCS-A /org #
Note If your implementation includes those types of non-VM-FEX capable converged network adapters
mentioned in this section and the adapter is expected to handle both Ethernet and FCoE traffic, we
recommend that you configure the Action on Uplink Fail property with a value of warning. Note that
this configuration might result in an Ethernet teaming driver not being able to detect a link failure when
the border port goes down.
Note If a trunking driver is being run on the host and the interface is in promiscuous mode, we recommend that
you set the MAC Registration Mode to All VLANs.
Configuring Link Layer Discovery Protocol for Fabric Interconnect vEthernet Interfaces
Cisco UCS Manager Release 2.2.4 allows you to enable and disable LLDP on a vEthernet interface. You can
also retrieve information about these LAN uplink neighbors. This information is useful while learning the
topology of the LAN connected to the UCS system and while diagnosing any network connectivity issues
from the Fabric Interconnect (FI). The FI of a UCS system is connected to LAN uplink switches for LAN
connectivity and to SAN uplink switches for storage connectivity. When using Cisco UCS with Cisco
Application Centric Infrastructure (ACI), LAN uplinks of the FI are connected to ACI leaf nodes. Enabling
LLDP on a vEthernet interface will help the Application Policy Infrastructure Controller (APIC) to identify
the servers connected to the FI by using vCenter.
To permit the discovery of devices in a network, support for Link Layer Discovery Protocol (LLDP), a
vendor-neutral device discovery protocol that is defined in the IEEE 802.1ab standard, is introduced. LLDP
is a one-way protocol that allows network devices to advertise information about themselves to other devices
on the network. LLDP transmits information about the capabilities and current status of a device and its
interfaces. LLDP devices use the protocol to solicit information only from other LLDP devices.
You can enable or disable LLDP on a vEthernet interface based on the Network Control Policy (NCP) that
is applied on the vNIC in the service profile.
Procedure
Step 2 UCS-A /org # create nw-ctrl-policy Creates the specified network control policy, and enters
policy-name organization network control policy mode.
Step 3 UCS-A /org/nw-ctrl-policy # {disable Disables or enables Cisco Discovery Protocol (CDP).
| enable} cdp
Step 4 UCS-A /org/nw-ctrl-policy # {disable Disables or enables the transmission of LLDP packets on
| enable} lldp transmit an interface.
Step 5 UCS-A /org/nw-ctrl-policy # {disable Disables or enables the reception of LLDP packets on an
| enable} lldp receive interface.
Step 6 UCS-A /org/nw-ctrl-policy # set Specifies the action to be taken when no uplink port is
uplink-fail-action {link-down | available in end-host mode.
warning} Use the link-down keyword to change the operational
state of a vNIC to down when uplink connectivity is lost
on the fabric interconnect, and facilitate fabric failover
for vNICs. Use the warning keyword to maintain
server-to-server connectivity even when no uplink port
is available, and disable fabric failover when uplink
connectivity is lost on the fabric interconnect. The default
uplink failure action is link-down.
Step 7 UCS-A /org/nw-ctrl-policy # set Whether adapter-registered MAC addresses are added
mac-registration-mode{all-host-vlans only to the native VLAN associated with the interface or
| only-native-vlan added to all VLANs associated with the interface. This
can be one of the following:
• Only Native Vlan—MAC addresses are only added
to the native VLAN. This option is the default, and
it maximizes the port+VLAN count.
• All Host Vlans—MAC addresses are added to all
VLANs with which they are associated. Select this
option if your VLANs are configured to use trunking
but are not running in Promiscuous mode.
Step 8 UCS-A /org/nw-ctrl-policy # create Enters organization network control policy MAC security
mac-security mode
Step 9 UCS-A /org/nw-ctrl-policy/mac-security Allows or denies the forging of MAC addresses when
# set forged-transmit {allow | deny} sending traffic. MAC security is disabled when forged
MAC addresses are allowed, and MAC security is enabled
when forged MAC addresses are denied. By default,
The following example shows how to create a network control policy named ncp5, enable CDP, enable LLDP
transmit and LLDP recive, set the uplink fail action to link-down, deny forged MAC addresses (enable MAC
security), and commit the transaction:
UCS-A# scope org /
UCS-A /org # create nw-ctrl-policy ncp5
UCS-A /org/nw-ctrl-policy* # enable cdp
UCS-A /org/nw-ctrl-policy* # enable lldp transmit
UCS-A /org/nw-ctrl-policy* # enable lldp receive
UCS-A /org/nw-ctrl-policy* # set uplink-fail-action link-down
UCS-A /org/nw-ctrl-policy* # create mac-security
UCS-A /org/nw-ctrl-policy/mac-security* # set forged-transmit deny
UCS-A /org/nw-ctrl-policy/mac-security* # commit-buffer
UCS-A /org/nw-ctrl-policy/mac-security #
Step 2 UCS-A /org # scope nw-ctrl-policy Enters organization network control policy mode for
{default | policy-name} the specified network control policy.
Step 3 UCS-A /org/nw-ctrl-policy # show Displays details about the specified network control
detail policy.
The following example shows how to display the details of a network control policy named ncp5:
UCS-A# scope org /
UCS-A /org # scope nw-ctrl-policy ncp5
UCS-A /org/nw-ctrl-policy* # show detail
UCS-A /org/nw-ctrl-policy #
Step 2 UCS-A /org # delete nwctrl-policy Deletes the specified network control policy.
policy-name
Step 3 UCS-A /org # commit-buffer Commits the transaction to the system
configuration.
The following example deletes the network control policy named ncp5 and commits the transaction:
UCS-A# scope org /
UCS-A /org # delete nwctrl-policy ncp5
UCS-A /org* # commit-buffer
UCS-A /org #
• If a Cisco UCS domain includes 6300 and 6200 series fabric interconnects, any multicast policy can be
assigned.
• We highly recommend you use the same IGMP snooping state on the fabric interconnects and the
associated LAN switches. For example, if IGMP snooping is disabled on the fabric interconnects, it
should be disabled on any associated LAN switches as well.
Procedure
Step 2 UCS-A /org # create mcast-policy Creates a multicast policy with the specified policy
policy-name name, and enters organization multicast policy mode.
The following example shows how to create a multicast policy named policy1:
UCS-A# scope org /
UCS-A /org # create mcast-policy policy1
UCS-A /org/mcast-policy* # commit-buffer
UCS-A /org/mcast-policy #
Procedure
Step 2 UCS-A /org # create mcast-policy Creates a new multicast policy with the specified
policy-name policy name, and enters organization multicast
policy mode.
Step 4 UCS-A /org/mcast-policy* # set Specifies the IPv4 address for the IGMP snooping
querierip IGMP snooping querier IPv4 querier.
address
Step 5 UCS-A /org/mcast-policy* # set Enables or disables IGMP snooping. By default,
snooping{enabled | disabled} IGMP snooping is enabled for a multicast policy.
The following example shows how to create and enter a multicast policy named policy1:
UCS-A# scope org /
UCS-A /org # create mcast-policy policy1
UCS-A /org/mcast-policy* # set querier enabled
UCS-A /org/mcast-policy* # set querierip 1.2.3.4
UCS-A /org/mcast-policy* # set snooping enabled
UCS-A /org/mcast-policy* # commit-buffer
UCS-A /org/mcast-policy #
Procedure
Step 2 UCS-A /org # scope mcast-policy Enters organization multicast policy mode.
policy-name
Step 3 UCS-A /org/mcast-policy* # set Enables or disables IGMP snooping querier. By
querier{enabled | disabled} default, IGMP snooping querier is disabled for a
multicast policy.
Step 4 UCS-A /org/mcast-policy* # set querierip Specifies the IPv4 address for the IGMP snooping
IGMP snooping querier IPv4 address querier.
The following example shows how to create a multicast policy named policy1:
UCS-A# scope org /
UCS-A /org # scope mcast-policy policy1
UCS-A /org/mcast-policy* # set querier enabled
UCS-A /org/mcast-policy* # set querierip 1.2.3.4
UCS-A /org/mcast-policy* # set snooping enabled
UCS-A /org/mcast-policy* # commit-buffer
UCS-A /org/mcast-policy #
Procedure
Step 2 UCS-A /eth-uplink # scope fabric{a | b} Enters Ethernet uplink fabric mode for the
specified fabric interconnect.
Step 3 UCS-A /eth-uplink/fabric # scope vlan Enters Ethernet uplink fabric VLAN mode.
vlan-name
Step 4 UCS-A /eth-uplink/fabric/vlan # set Assigns a multicast policy for the VLAN.
mcastpolicy policy-name
Step 5 UCS-A /eth-uplink/fabric/vlan # Commits the transaction to the system
commit-buffer configuration.
The following example sets a named VLAN accessible to one fabric interconnect and commits the transaction:
UCS-A# scope eth-uplink
UCS-A /eth-uplink # scope fabric a
UCS-A /eth-uplink/fabric # scope vlan vlan1
UCS-A /eth-uplink/fabric/vlan # set mcastpolicy policy1
UCS-A /eth-uplink/fabric/vlan* # commit-buffer
UCS-A /eth-uplink/fabric/vlan #
Note If you assigned a non-default (user-defined) multicast policy to a VLAN and then delete that multicast
policy, the associated VLAN inherits the multicast policy settings from the default multicast policy until
the deleted policy is re-created.
Procedure
Step 2 UCS-A /org # delete mcast-policy Deletes a multicast policy with the specified policy
policy-name name.
The following example shows how to delete a multicast policy named policy1:
UCS-A# scope org /
UCS-A /org # delete mcast-policy policy1
UCS-A /org* # commit-buffer
UCS-A /org #
System creates a default LACP policy at system start up. You can modify this policy or create a new policy.
You can also apply one LACP policy to multiple port-channels.
Step 2 UCS-A /org # create lacppolicypolicy Creates the specified lacp policy.
nam.
Step 3 UCS-A /org # commit-buffer Commits the transaction to the system
configuration.
The following example creates the lacp policy and commits the transaction:
UCS-A# scope org
UCS-A /org # create lacppolicy lacp1
UCS-A /org* # commit-buffer
UCS-A /org #
Step 2 UCS-A /org # scope lacppolicy policy-name . Enters the specified lacp policy.
Step 3 UCS-A /org/lacp policy/ policy-name # set Sets suspend individual for the policy.
suspend-individual true .
Step 4 UCS-A /org/lacp policy/ policy-name # set Sets LACP rate for the policy.
lacp-rate fast .
Step 5 UCS-A /org/lacp policy/ policy-name # Commits the transaction to the system
commit-buffer configuration.
The following example modifies the lacp policy and commits transaction:
UCS-A# scope org
UCS-A/org # scope lacppolicy policy-name
UCS-A /org/lacp policy policy-name# set suspend-individual true
UCS-A/prg/policy policy-name# set lacp-rate fast
UCS-A /org* # commit-buffer
UCS-A /org #
Note You can assign lacp policy to port-channels, FCoE port-channels, and ethernet storage port-channels. This
procedures describes assigning the lacp policy to port-channels.
Procedure
Step 4 UCS-A /eth-uplink/fabric/port-channel # set Specifies the lacp policy for this
lacp-policy-namepolicy-name port-channel.
A unidirectional link occurs whenever traffic sent by a local device is received by its neighbor but traffic from
the neighbor is not received by the local device.
Modes of Operation
UDLD supports two modes of operation: normal (the default) and aggressive. In normal mode, UDLD can
detect unidirectional links due to misconnected interfaces on fiber-optic connections. In aggressive mode,
UDLD can also detect unidirectional links due to one-way traffic on fiber-optic and twisted-pair links and to
misconnected interfaces on fiber-optic links.
In normal mode, UDLD detects a unidirectional link when fiber strands in a fiber-optic interface are
misconnected and the Layer 1 mechanisms do not detect this misconnection. If the interfaces are connected
correctly but the traffic is one way, UDLD does not detect the unidirectional link because the Layer 1
mechanism, which is supposed to detect this condition, does not do so. In case, the logical link is considered
undetermined, and UDLD does not disable the interface. When UDLD is in normal mode, if one of the fiber
strands in a pair is disconnected and autonegotiation is active, the link does not stay up because the Layer 1
mechanisms did not detect a physical problem with the link. In this case, UDLD does not take any action, and
the logical link is considered undetermined.
UDLD aggressive mode is disabled by default. Configure UDLD aggressive mode only on point-to-point
links between network devices that support UDLD aggressive mode. With UDLD aggressive mode enabled,
when a port on a bidirectional link that has a UDLD neighbor relationship established stops receiving UDLD
packets, UDLD tries to reestablish the connection with the neighbor and administratively shuts down the
affected port. UDLD in aggressive mode can also detect a unidirectional link on a point-to-point link on which
no failure between the two devices is allowed. It can also detect a unidirectional link when one of the following
problems exists:
• On fiber-optic or twisted-pair links, one of the interfaces cannot send or receive traffic.
• On fiber-optic or twisted-pair links, one of the interfaces is down while the other is up.
• One of the fiber strands in the cable is disconnected.
If the detection window ends and no valid reply message is received, the link might shut down, depending
on the UDLD mode. When UDLD is in normal mode, the link might be considered undetermined and
might not be shut down. When UDLD is in aggressive mode, the link is considered unidirectional, and
the interface is shut down.
If UDLD in normal mode is in the advertisement or in the detection phase and all the neighbor cache entries
are aged out, UDLD restarts the link-up sequence to resynchronize with any potentially out-of-sync neighbors.
If you enable aggressive mode when all the neighbors of a port have aged out either in the advertisement or
in the detection phase, UDLD restarts the link-up sequence to resynchronize with any potentially out-of-sync
neighbor. UDLD shuts down the port if, after the fast train of messages, the link state is still undetermined.
Step 2 UCS-A /org # create eth-link-profile Creates a link profile with the specified name,
link-profile-name and enters link profile mode.
Step 5 UCS-A /org # scope eth-link-profile Enters link profile mode for the specified link
link-profile-name profile.
The following example shows how to create a link profile called LinkProfile1 and assign the default UDLD
link policy.
UCS-A# scope org /
UCS-A /chassis/org # create eth-link-profile LinkProfile1
UCS-A /chassis/org/eth-link-profile* # commit-buffer
UCS-A /chassis/org/eth-link-profile # exit
UCS-A /chassis/org # scope eth-link-profile LinkProfile1
UCS-A /chassis/org/eth-link-profile # set udld-link-policy default
UCS-A /chassis/org/eth-link-profile* # commit-buffer
Step 2 UCS-A /org # create udld-link-policy Creates a UDLD link policy with the specified
link-policy-name name, and enters UDLD link policy mode.
Step 5 UCS-A /org # scope udld-link-policy Enters UDLD link policy mode for the
link-policy-name specified UDLD link policy.
Step 6 UCS-A /org/udld-link-policy # set mode Specifies the mode for the UDLD link policy.
{aggressive | normal}
Step 7 UCS-A /org/udld-link-policy # set Disables or enables UDLD on the interface.
admin-state {disabled | enabled}
Step 8 UCS-A /org/udld-link-policy # Commits the transaction to the system
commit-buffer configuration.
The following example shows how to create a link profile called UDLDPol1, sets the mode to aggressive,
and enables UDLD on the interface.
UCS-A# scope org /
UCS-A /chassis/org # create udld-link-policy UDLDPol1
Step 2 UCS-A /org # show udld-policy Displays the current UDLD system settings.
Step 3 UCS-A /org # scope udld-policy Enters UDLD policy mode for the global UDLD
default policy.
Step 4 UCS-A /org/udld-policy # set Specifies the time interval (in seconds) between
message-interval seconds UDLD probe messages on ports that are in
advertisement mode. Enter an integer between 7 and
60. The default is 15 seconds.
Step 5 UCS-A /org/udld-policy # set Specifies the action to be taken on any ports that are
recovery-action [reset | none] disabled when UDLD aggressive mode is enabled.
The default is none.
The following example shows how to update the default UDLD system settings for a 30 second time interval.
UCS-A# scope org /
UCS-A /chassis/org # show udld-policy
Step 2 UCS-A /eth-uplink # scope fabric {a | b} Enters Ethernet uplink fabric mode for the
specified fabric.
Step 3 UCS-A /eth-uplink/fabric # scope port-channel Enters Ethernet uplink fabric port channel
port-chan-id mode for the specified port channel.
Step 4 UCS-A /eth-uplink/fabric/port-channel # scope Enters Ethernet server fabric, fabric port
member-port slot-id port-id channel mode for the specified member port.
The following example shows how to assign link profile LinkProfile1 to a port channel Ethernet interface:
UCS-A# scope eth-uplink
UCS-A /eth-uplink # scope fabric a
UCS-A /eth-uplink/fabric # scope port-channel 88
UCS-A /eth-uplink/fabric/port-channel # scope member-port 1 31
UCS-A /eth-uplink/fabric/port-channel/member-port # set eth-link-profile LinkProfile1
UCS-A /eth-uplink/fabric/port-channel/member-port* # commit-buffer
UCS-A /eth-uplink/fabric/port-channel/member-port #
Step 2 UCS-A /fc-uplink # scope fabric {a | b} Enters Fibre Channel uplink fabric mode
for the specified fabric.
Step 3 UCS-A /fc-uplink/fabric # scope fcoe-port-channel Enters Fibre Channel uplink fabric port
port-chan-id channel mode for the specified port
channel.
The following example shows how to assign link profile LinkProfile1 to a port channel FCoE interface:
UCS-A# scope fc-uplink
UCS-A /fc-uplink # scope fabric a
UCS-A /fc-uplink/fabric # scope fcoe-port-channel 192
UCS-A /fc-uplink/fabric/fcoe-port-channel # scope fcoe-member-port 1 20
UCS-A /fc-uplink/fabric/fcoe-port-channel/fcoe-member-port # set eth-link-profile LinkProfile1
UCS-A /fc-uplink/fabric/fcoe-port-channel/fcoe-member-port* # commit-buffer
UCS-A /fc-uplink/fabric/fcoe-port-channel/fcoe-member-port #
Step 2 UCS-A /eth-uplink # scope fabric {a | b} Enters Ethernet uplink fabric mode for the
specified fabric.
Step 3 UCS-A /eth-uplink/fabric # scope interface Enters the interface command mode for the
slot-num port num specified uplink port.
The following example shows how to assign link profile LinkProfile1 to an uplink Ethernet interface:
UCS-A# scope eth-uplink
UCS-A /eth-uplink # scope fabric a
UCS-A /eth-uplink/fabric # scope interface 2 2
UCS-A /eth-uplink/fabric/interface # set eth-link-profile LinkProfile1
UCS-A /eth-uplink/fabric/interface* # commit-buffer
UCS-A /eth-uplink/fabric/interface #
Step 2 UCS-A /fc-uplink # scope fabric {a | b} Enters Fibre Channel uplink fabric mode for
the specified fabric.
Step 3 UCS-A /fc-uplink/fabric # scope fcoeinterface Enters the Fibre Channel interface command
slot-num port num mode for the specified uplink port.
The following example shows how to assign link profile LinkProfile1 to an uplink FCoE interface:
UCS-A# scope fc-uplink
UCS-A /fc-uplink # scope fabric a
UCS-A /fc-uplink/fabric # scope fcoeinterface 2 2
UCS-A /fc-uplink/fabric/fcoeinterface # set eth-link-profile LinkProfile1
UCS-A /fc-uplink/fabric/fcoeinterface* # commit-buffer
UCS-A /fc-uplink/fabric/fcoeinterface #
If you want to configure the VMQ vNIC on a service profile for a server, at least one adapter in the server
must support VMQ. Make sure the servers have at least one the following adapters installed:
• UCS-VIC-M82-8P
• UCSB-MLOM-40G-01
• UCSC-PCIE-CSC-02
You can apply only any one of the vNIC connection policies on a service profile at any one time. Make sure
to select one of the three options such as Dynamic, usNIC or VMQ connection policy for the vNIC. When a
VMQ vNIC is configured on service profile, make sure you have the following settings:
• Select SRIOV in the BIOS policy.
• Select Windows in the Adapter policy.
Step 2 UCS-A /org # create vmq-conn-policy Specifies the name for this VMQ connection
policy-name policy.
Step 3 UCS-A /org/vmq-conn-policy* # set Specifies the queue count for the VMQ
queue-countqueue count connection policy.
Step 4 UCS-A /org/vmq-conn-policy* # set Specifies the interrupt count for the VMQ
interrupt-countinterrupt count connection policy.
NetQueue
Information About NetQueue
NetQueue improves traffic performance by providing a network adapter with multiple receive queues. These
queues allow the data interrupt processing that is associated with individual virtual machines to be grouped.
Configuring NetQueue
Procedure
• The driver supports up to 16 NetQueues per port for standard frame configurations.
Note VMware recommends that you use up to eight NetQueues per port for standard frame
configurations.
• NetQueue should be enabled only on MSIX systems.
• You should disable NetQueue on 1 GB NICs.
Step 3 Enable the MSIX mode in the adapter policy for NetQueue.
Step 4 Associate the service profile with the server.
Note By default, data traffic in Cisco UCS works on a principle of mutual inclusion. All traffic for all VLANs
and upstream networks travels along all uplink ports and port channels. If you have upgraded from a
release that does not support upstream disjoint layer-2 networks, you must assign the appropriate uplink
interfaces to your VLANs, or traffic for those VLANs continues to flow along all uplink ports and port
channels.
The configuration for disjoint L2 networks works on a principle of selective exclusion. Traffic for a VLAN
that is designated as part of a disjoint network can only travel along an uplink Ethernet port or port channel
that is specifically assigned to that VLAN, and is selectively excluded from all other uplink ports and port
channels. However, traffic for VLANs that are not specifically assigned to an uplink Ethernet port or port
channel can still travel on all uplink ports or port channels, including those that carry traffic for the disjoint
L2 networks.
In Cisco UCS, the VLAN represents the upstream disjoint L2 network. When you design your network
topology for disjoint L2 networks, you must assign uplink interfaces to VLANs not the reverse.
For information about the maximum number of supported upstream disjoint L2 networks, see the appropriate
Cisco UCS Configuration Limits for Cisco UCS Manager Guide.
VLAN Validity Criteria Are the Same for Uplink Ethernet Ports and Port Channels
The VLAN used for the disjoint L2 networks must be configured and assigned to an uplink Ethernet port or
uplink Ethernet port channel. If the port or port channel does not include the VLAN, Cisco UCS Manager
considers the VLAN invalid and does the following:
• Displays a configuration warning in the Status Details area for the server.
• Ignores the configuration for the port or port channel and drops all traffic for that VLAN.
Note The validity criteria are the same for uplink Ethernet ports and uplink Ethernet port channels. Cisco UCS
Manager does not differentiate between the two.
Appliance Port Must Be Configured with the Same VLAN as Uplink Ethernet Port or Port Channel
For an appliance port to communicate with a disjoint L2 network, you must ensure that at least one uplink
Ethernet port or port channel is in the same network and is therefore assigned to the same VLANs that are
used by the appliance port. If Cisco UCS Manager cannot identify an uplink Ethernet port or port channel
that includes all VLANs that carry traffic for an appliance port, the appliance port experiences a pinning failure
and goes down.
For example, a Cisco UCS domain includes a global VLAN named vlan500 with an ID of 500. vlan500 is
created as a global VLAN on the uplink Ethernet port. However, Cisco UCS Manager does not propagate this
VLAN to appliance ports. To configure an appliance port with vlan500, you must create another VLAN named
vlan500 with an ID of 500 for the appliance port. You can create this duplicate VLAN in the Appliances
node on the LAN tab of the Cisco UCS Manager GUI or the eth-storage scope in the Cisco UCS Manager
CLI. If you are prompted to check for VLAN Overlap, accept the overlap and Cisco UCS Manager creates
the duplicate VLAN for the appliance port.
Default VLAN 1 Cannot Be Configured Explicitly on an Uplink Ethernet Port or Port Channel
Cisco UCS Manager implicitly assigns default VLAN 1 to all uplink ports and port channels. Even if you do
not configure any other VLANs, Cisco UCS uses default VLAN 1 to handle data traffic for all uplink ports
and port channels.
Note After you configure VLANs in a Cisco UCS domain, default VLAN 1 remains implicitly on all uplink
ports and port channels. You cannot explicitly assign default VLAN 1 to an uplink port or port channel,
nor can you remove it from an uplink port or port channel.
If you attempt to assign default VLAN 1 to a specific port or port channel, Cisco UCS Manager raises an
Update Failed fault.
Therefore, if you configure a Cisco UCS domain for disjoint L2 networks, do not configure any vNICs with
default VLAN 1 unless you want all data traffic for that server to be carried on all uplink Ethernet ports and
port channels and sent to all upstream networks.
Soft Pinning
Soft pinning is the default behavior in Cisco UCS. If you plan to implement soft pinning, you do not need to
create LAN pin groups to specify a pin target for a vNIC. Instead, Cisco UCS Manager pins the vNIC to an
uplink Ethernet port or port channel according to VLAN membership criteria.
With soft pinning, Cisco UCS Manager validates data traffic from a vNIC against the VLAN membership of
all uplink Ethernet ports and port channels. If you have configured disjoint L2 networks, Cisco UCS Manager
must be able to find an uplink Ethernet port or port channel that is assigned to all VLANS on the vNIC. If no
uplink Ethernet port or port channel is configured with all VLANs on the vNIC, Cisco UCS Manager does
the following:
• Brings the link down.
• Drops the traffic for all of the VLANs on the vNIC.
• Raises the following faults:
◦Link Down
◦VIF Down
Cisco UCS Manager does not raise a fault or warning about the VLAN configuration.
For example, a vNIC on a server is configured with VLANs 101, 102, and 103. Interface 1/3 is assigned only
to VLAN 102. Interfaces 1/1 and 1/2 are not explicitly assigned to a VLAN, which makes them available for
traffic on VLANs 101 and 103. As a result of this configuration, the Cisco UCS domain does not include a
border port interface that can carry traffic for all three VLANS for which the vNIC is configured. As a result,
Cisco UCS Manager brings down the vNIC, drops traffic for all three VLANs on the vNIC, and raises the
Link Down and VIF Down faults.
Hard Pinning
Hard pinning occurs when you use LAN pin groups to specify the pinning target for the traffic intended for
the disjoint L2 networks. In turn, the uplink Ethernet port or port channel that is the pinning target must be
configured to communicate with the appropriate disjoint L2 network.
With hard pinning, Cisco UCS Manager validates data traffic from a vNIC against the VLAN membership
of all uplink Ethernet ports and port channels, and validates the LAN pin group configuration to ensure it
includes the VLAN and the uplink Ethernet port or port channel. If the validation fails at any point, Cisco
UCS Manager does the following:
• Raises a Pinning VLAN Mismatch fault with a severity of Warning.
• Drops traffic for the VLAN.
• Does not bring the link down, so that traffic for other VLANs can continue to flow along it.
For example, if you want to configure hard pinning for an upstream disjoint L2 network that uses VLAN 177,
do the following:
• Create a LAN pin group with the uplink Ethernet port or port channel that carries the traffic for the
disjoint L2 network.
• Configure at least one vNIC in the service profile with VLAN 177 and the LAN pin group.
• Assign VLAN 177 to an uplink Ethernet port or port channel included in the LAN pin group
If the configuration fails at any of these three points, then Cisco UCS Manager warns for a VLAN mismatch
for VLAN 177 and drops the traffic for that VLAN only.
Note If changes are made to soft pinning configurations resulting in vNIC VLANs not resolving with disjoint
L2 uplink, a warning dialog box is displayed. The warning dialog box allows you to proceed with your
configuration or cancel it. If you decide to proceed with the mis- configuration, you will experience a
reduction is server traffic performance.
Procedure
Step 2 Configure the ports and port channels that See Configuring Ports and Port Channels, on page
you require to carry traffic for the disjoint 61.
L2 networks.
Step 3 Configure the LAN pin groups required to (Optional)
pin the traffic for the appropriate uplink See Configuring LAN Pin Groups, on page 259.
Ethernet ports or port channels.
Step 4 Create one or more VLANs. These can be named VLANs or private VLANs. For
a cluster configuration, we recommend that you
create the VLANs in Uplink Ethernet Mode and
accessible to both fabric interconnects.
See VLANs, on page 235.
Step 5 Assign the desired ports or port channels to When this step is completed, traffic for those VLANs
the VLANs for the disjoint L2 networks. can only be sent through the trunks for the assigned
ports and/or port channels.
Assigning Ports and Port Channels to VLANs, on
page 326
Step 6 Ensure that the service profiles for all servers You can complete this configuration through one or
that need to communicate with the disjoint more vNIC templates or when you configure the
L2 networks include the correct LAN networking options for the service profile.
connectivity configuration to ensure the See Service Profiles, on page 593.
Step 2 UCS-A /eth-uplink # scope vlan vlan-name Enters Ethernet uplink VLAN mode for the
specified VLAN.
Step 3 UCS-A /eth-uplink/vlan # create Assigns the specified VLAN to the specified
member-port fabric-interconnect slot-id uplink Ethernet port.
port-id
Step 4 UCS-A /eth-uplink/vlan # create Assigns the specified VLAN to the specified
member-port-channel fabric-interconnect uplink Ethernet port channel.
member-port-chan-id
Step 5 UCS-A /eth-uplink/vlan # commit-buffer Commits the transaction to the system
configuration.
After a port or port channel is assigned to one or
more VLANs, it is removed from all other
VLANs.
The following example assigns uplink Ethernet ports to a named VLAN called VLAN100 on fabric interconnect
A and commits the transaction:
UCS-A# scope eth-uplink
UCS-A /eth-uplink # scope vlan VLAN100
UCS-A /eth-uplink/vlan # create member-port a 2
UCS-A /eth-uplink/vlan # create member-port a 4
UCS-A /eth-uplink/vlan* # commit-buffer
UCS-A /eth-uplink/vlan #
Step 2 UCS-A /eth-uplink # scope vlan Enters Ethernet uplink VLAN mode for the specified
vlan-name VLAN.
Step 3 UCS-A /eth-uplink/vlan # delete Deletes the specified Uplink Ethernet member port
member-port fabric-interconnect assignment from the VLAN.
slot-id port-id
Step 4 UCS-A /eth-uplink/vlan # delete Deletes the specified Uplink Ethernet port channel
member-port-channel assignment from the VLAN.
fabric-interconnect
member-port-chan-id
Step 5 UCS-A /eth-uplink/vlan # Commits the transaction to the system configuration.
commit-buffer Important If you remove all port or port channel
interfaces from a VLAN, the VLAN returns
to the default behavior and data traffic on that
VLAN flows on all uplink ports and port
channels. Based on the configuration in the
Cisco UCS domain, this default behavior can
cause Cisco UCS Manager to drop traffic for
that VLAN. To avoid this occurrence, Cisco
recommends that you assign at least one
interface to the VLAN or delete the VLAN.
The following example deletes the association between uplink Ethernet port 2 on fabric interconnect A and
the named VLAN called MyVLAN and commits the transaction:
UCS-A# scope eth-uplink
UCS-A /eth-uplink # scope vlan MyVLAN
UCS-A /eth-uplink/vlan # delete member-port a 2
UCS-A /eth-uplink/vlan* # commit-buffer
UCS-A /eth-uplink/vlan #
Step 3 UCS-A /eth-uplink/vlan # show Shows member ports assigned to the specified
member-port [detail | expand] VLAN.
Step 4 UCS-A /eth-uplink/vlan # show Shows member port channels assigned to the
member-port-channel [detail | expand] specified VLAN.
The following example displays the full details for uplink Ethernet ports assigned to a named VLAN called
MyVLAN:
UCS-A# scope eth-uplink
UCS-A /eth-uplink # scope vlan MyVLAN
UCS-A /eth-uplink/vlan # show member-port detail
Member Port:
Fabric ID: A
Slot ID: 1
Port ID: 2
Mark Native Vlan: No
UCS-A /eth-uplink/vlan #
Named VSANs
A named VSAN creates a connection to a specific external SAN. The VSAN isolates traffic to that external
SAN, including broadcast traffic. The traffic on one named VSAN knows that the traffic on another named
VSAN exists, but cannot read or access that traffic.
Like a named VLAN, the name that you assign to a VSAN ID adds a layer of abstraction that allows you to
globally update all servers associated with service profiles that use the named VSAN. You do not need to
reconfigure the servers individually to maintain communication with the external SAN. You can create more
than one named VSAN with the same VSAN ID.
If you disable Fibre Channel trunking and delete any existing SAN port channels, Cisco UCS Manager returns
all VSANs in the range from 3840 to 4078 to an operational state and restores any associated vHBAs back
to those VSANs.
Note FCoE VLANs in the SAN cloud and VLANs in the LAN cloud must have different IDs. Using the same
ID for an FCoE VLAN in a VSAN and a VLAN results in a critical fault and traffic disruption for all
vNICs and uplink ports using that FCoE VLAN. Ethernet traffic is dropped on any VLAN with an ID that
overlaps with an FCoE VLAN ID.
VLAN 4048 is user configurable. However, Cisco UCS Manager uses VLAN 4048 for the following default
values. If you want to assign 4048 to a VLAN, you must reconfigure these values:
• After an upgrade to Cisco UCS, Release 2.0—The FCoE storage port native VLAN uses VLAN 4048
by default. If the default FCoE VSAN was set to use VLAN 1 before the upgrade, you must change it
to a VLAN ID that is not used or reserved. For example, consider changing the default to 4049 if that
VLAN ID is not in use.
• After a fresh install of Cisco UCS, Release 2.0—The FCoE VLAN for the default VSAN uses VLAN
4048 by default. The FCoE storage port native VLAN uses VLAN 4049.
Note FCoE VLANs in the SAN cloud and VLANs in the LAN cloud must have different IDs. Using the same
ID for an FCoE VLAN in a VSAN and a VLAN results in a critical fault and traffic disruption for all
vNICs and uplink ports using that FCoE VLAN. Ethernet traffic is dropped on any VLAN with an ID that
overlaps with an FCoE VLAN ID.
Procedure
Step 2 UCS-A /fc-uplink # create Creates the specified named VSAN, specifies the VSAN name,
vsan vsan-name vsan-id VSAN ID and FCoE VLAN ID, and enters Fibre Channel uplink
fcoe-id VSAN mode.
• After an upgrade to Cisco UCS, Release 2.0—The FCoE
storage port native VLAN uses VLAN 4048 by default. If the
default FCoE VSAN was set to use VLAN 1 before the
upgrade, you must change it to a VLAN ID that is not used
or reserved. For example, consider changing the default to
4049 if that VLAN ID is not in use.
• After a fresh install of Cisco UCS, Release 2.0—The FCoE
VLAN for the default VSAN uses VLAN 4048 by default.
The FCoE storage port native VLAN uses VLAN 4049.
Step 3 UCS-A /fc-uplink/vsan # set Configures Fibre Channel zoning for the VSAN, as follows:
fc-zoning {disabled |
enabled} • disabled—The upstream switch configures and controls the
Fibre Channel zoning or Fibre Channel zoning is not
implemented on this VSAN.
• enabled—Cisco UCS Manager configures and controls Fibre
Channel zoning.
The following example creates a named VSAN for both fabric interconnects, names the VSAN accounting,
assigns the VSAN ID 2112, assigns the FCoE VLAN ID 4021, enables the VSAN for Cisco UCS
Manager-based Fibre Channel zoning, and commits the transaction:
UCS-A# scope fc-uplink
UCS-A /fc-uplink* # create vsan accounting 2112 4021
Note FCoE VLANs in the SAN cloud and VLANs in the LAN cloud must have different IDs. Using the same
ID for an FCoE VLAN in a VSAN and a VLAN results in a critical fault and traffic disruption for all
vNICs and uplink ports using that FCoE VLAN. Ethernet traffic is dropped on any VLAN with an ID that
overlaps with an FCoE VLAN ID.
Procedure
Step 2 UCS-A /fc-storage # create Creates the specified named VSAN, specifies the VSAN name,
vsan vsan-name vsan-id fcoe-id VSAN ID, and FCoE VLAN ID, and enters Fibre Channel
storage VSAN mode.
• After an upgrade to Cisco UCS, Release 2.0—The FCoE
storage port native VLAN uses VLAN 4048 by default. If
the default FCoE VSAN was set to use VLAN 1 before the
upgrade, you must change it to a VLAN ID that is not used
or reserved. For example, consider changing the default to
4049 if that VLAN ID is not in use.
• After a fresh install of Cisco UCS, Release 2.0—The FCoE
VLAN for the default VSAN uses VLAN 4048 by default.
The FCoE storage port native VLAN uses VLAN 4049.
Step 3 UCS-A /fc-storage/vsan # Creates a member port; specifies whether the port type, fabric,
create member-port {fc | fcoe} slot ID and port ID.
{a | b} slot-id port-id
Step 4 UCS-A /fc-storage/vsan # set Configures Fibre Channel zoning for the VSAN, as follows:
fc-zoning {disabled | enabled}
• disabled—The upstream switch configures and controls
the Fibre Channel zoning or Fibre Channel zoning is not
implemented on this VSAN.
• enabled—Cisco UCS Manager configures and controls
Fibre Channel zoning.
The following example creates a named VSAN, names the VSAN finance, assigns the VSAN ID 3955, assigns
the FCoE VLAN ID 4021, creates a member port and assigns it to member port A, slot 1 port 40, enables the
VSAN for Cisco UCS Manager-based Fibre Channel zoning, and commits the transaction:
UCS-A# scope fc-storage
UCS-A /fc-storage/ # create VSAN finance 3955 4021
UCS-A /fc-storage/vsan # create member-port fcoe a 1 40
UCS-A /fc-storage/vsan # set fc-zoning enabled
UCS-A /fc-storage/vsan/member-port* # commit-buffer
UCS-A /fc-storage/vsan/member-port #
Note FCoE VLANs in the SAN cloud and VLANs in the LAN cloud must have different IDs. Using the same
ID for an FCoE VLAN in a VSAN and a VLAN results in a critical fault and traffic disruption for all
vNICs and uplink ports using that FCoE VLAN. Ethernet traffic is dropped on any VLAN with an ID that
overlaps with an FCoE VLAN ID.
Procedure
Step 2 UCS-A /fc-uplink # scope Enters Fibre Channel uplink fabric interconnect mode for the
fabric {a | b} specified fabric interconnect (A or B).
Step 3 UCS-A /fc-uplink/fabric # Creates the specified named VSAN, specifies the VSAN name,
create vsan vsan-name vsan-id VSAN ID, and FCoE VLAN ID, and enters Fibre Channel uplink
fcoe-id VSAN mode.
• After an upgrade to Cisco UCS, Release 2.0—The FCoE
storage port native VLAN uses VLAN 4048 by default. If
the default FCoE VSAN was set to use VLAN 1 before the
upgrade, you must change it to a VLAN ID that is not used
or reserved. For example, consider changing the default to
4049 if that VLAN ID is not in use.
• After a fresh install of Cisco UCS, Release 2.0—The FCoE
VLAN for the default VSAN uses VLAN 4048 by default.
The FCoE storage port native VLAN uses VLAN 4049.
Step 4 UCS-A /fc-uplink/vsan # set Configures Fibre Channel zoning for the VSAN, as follows:
fc-zoning {disabled | enabled}
• disabled—The upstream switch configures and controls the
Fibre Channel zoning or Fibre Channel zoning is not
implemented on this VSAN.
The following example creates a named VSAN for fabric interconnect A, names the VSAN finance, assigns
the VSAN ID 3955, assigns the FCoE VLAN ID 2221, enables the VSAN for Cisco UCS Manager-based
Fibre Channel zoning, and commits the transaction:
UCS-A# scope fc-uplink
UCS-A /fc-uplink # scope fabric a
UCS-A /fc-uplink/fabric # create vsan finance 3955 2221
UCS-A /fc-uplink/vsan # set fc-zoning enabled
UCS-A /fc-uplink/fabric/vsan* # commit-buffer
UCS-A /fc-uplink/fabric/vsan #
Note FCoE VLANs in the SAN cloud and VLANs in the LAN cloud must have different IDs. Using the same
ID for an FCoE VLAN in a VSAN and a VLAN results in a critical fault and traffic disruption for all
vNICs and uplink ports using that FCoE VLAN. Ethernet traffic is dropped on any VLAN with an ID that
overlaps with an FCoE VLAN ID.
Procedure
Step 2 UCS-A /fc-storage # scope fabric Enters Fibre Channel storage mode for the specified fabric
{a | b} interconnect.
Step 3 UCS-A /fc-storage/fabric # create Creates the specified named VSAN, specifies the VSAN name,
vsan vsan-name vsan-id fcoe-id VSAN ID, and FCoE VLAN ID, and enters Fibre Channel
storage VSAN mode.
• After an upgrade to Cisco UCS, Release 2.0—The FCoE
storage port native VLAN uses VLAN 4048 by default.
If the default FCoE VSAN was set to use VLAN 1 before
the upgrade, you must change it to a VLAN ID that is
not used or reserved. For example, consider changing the
default to 4049 if that VLAN ID is not in use.
The following example creates a named VSAN on fabric A, names the VSAN finance, assigns the VSAN ID
3955, assigns the FCoE VLAN ID 2221, creates a member port and assigns the it to member port A, slot 1
port 40, and commits the transaction:
UCS-A# scope fc-storage
UCS-A /fc-storage/ # scope fabric a
UCS-A /fc-storage/fabric # create VSAN finance 3955 2221
UCS-A /fc-storage/fabric/vsan # create member-port a 1 40
UCS-A /fc-storage/fabric/vsan # set fc-zoning enabled
UCS-A /fc-storage/fabric/vsan/member-port* # commit-buffer
UCS-A /fc-storage/fabric/vsan/member-port #
Procedure
Step 2 UCS-A /fc-uplink # delete vsan vsan-name Deletes the specified named VSAN.
The following example shows how to delete a named VSAN and commit the transaction:
UCS-A# scope fc-uplink
UCS-A /fc-uplink # delete vsan finance
UCS-A /fc-uplink* # commit-buffer
UCS-A /fc-uplink #
Changing the VLAN ID for the FCoE Native VLAN for a Named
VSAN
Note FCoE VLANs in the SAN cloud and VLANs in the LAN cloud must have different IDs. Using the same
ID for an FCoE VLAN in a VSAN and a VLAN results in a critical fault and traffic disruption for all
vNICs and uplink ports using that FCoE VLAN. Ethernet traffic is dropped on any VLAN with an ID that
overlaps with an FCoE VLAN ID.
Procedure
Step 2 UCS-A /fc-uplink # scope vsan vsan-name Enters VSAN mode for the specified named
VSAN.
Step 3 UCS-A /fc-uplink/vsan # set fcoe-vlan Sets the unique identifier assigned to the VLAN
fcoe-vlan-id used for Fibre Channel connections.
The following example changes the VLAN ID for the FCoE Native VLAN on a named VSAN called finance
to 4000 and commits the transaction:
UCS-A# scope fc-uplink
UCS-A /fc-uplink # scope vsan finance
UCS-A /fc-uplink/vsan # set fcoe-vlan 4000
UCS-A /fc-uplink/vsan* # commit-buffer
UCS-A /fc-uplink/vsan #
Changing the VLAN ID for the FCoE Native VLAN for a Storage
VSAN
Note FCoE VLANs in the SAN cloud and VLANs in the LAN cloud must have different IDs. Using the same
ID for an FCoE VLAN in a VSAN and a VLAN results in a critical fault and traffic disruption for all
vNICs and uplink ports using that FCoE VLAN. Ethernet traffic is dropped on any VLAN with an ID that
overlaps with an FCoE VLAN ID.
Procedure
Step 2 UCS-A /fc-storage # set Sets the unique identifier assigned to the VLAN
fcoe-storage-native-vlan fcoe-id used for Fibre Channel connections.
The following example changes the VLAN ID for the FCoE Native VLAN on a storage VSAN called finance
to 4000 and commits the transaction:
UCS-A# scope fc-storage
UCS-A /fc-storage # set fcoe-storage-native-vlan 4000
UCS-A /fc-storage* # commit-buffer
UCS-A /fc-storage #
Note If the fabric interconnects are configured for Fibre Channel end-host mode, enabling Fibre Channel uplink
trunking renders all VSANs with an ID in the range from 3840 to 4079 non-operational.
Procedure
Step 2 UCS-A /fc-uplink # scope fabric {a | b } Enters Fibre Channel uplink mode for the
specified fabric.
The following example enables Fibre Channel uplink trunking for fabric A and commits the transaction:
UCS-A# scope fc-uplink
UCS-A /fc-uplink # scope fabric a
UCS-A /fc-uplink/fabric # set uplink-trunking enabled
UCS-A /fc-uplink/fabric* # commit-buffer
UCS-A /fc-uplink/fabric #
Note In Fibre Channel switch mode, SAN pin groups are irrelevant. Any existing SAN pin groups will be
ignored.
To configure pinning for a server, you must include the SAN pin group in a vHBA policy. The vHBA policy
is then included in the service profile assigned to that server. All traffic from the vHBA will travel through
the I/O module to the specified uplink Fibre Channel port.
You can assign the same pin group to multiple vHBA policies. As a result, you do not need to manually pin
the traffic for each vHBA.
Important Changing the target interface for an existing SAN pin group disrupts traffic for all vHBAs which use that
pin group. The fabric interconnect performs a log in and log out for the Fibre Channel protocols to re-pin
the traffic.
Procedure
Step 2 UCS-A /fc-uplink # create pin-group Creates a Fibre Channel (SAN) pin group with the
pin-group-name specified name, and enters Fibre Channel uplink pin
group mode.
The following example creates a SAN pin group named fcpingroup12, provides a description for the pin
group, sets the pin group target to slot 2, port 1, and commits the transaction:
UCS-A# scope fc-uplink
UCS-A /fc-uplink # create pin-group fcpingroup12
UCS-A /fc-uplink/pin-group* # set descr "This is my pin group #12"
UCS-A /fc-uplink/pin-group* # set target a port 2/1
UCS-A /fc-uplink/pin-group* # commit-buffer
UCS-A /fc-uplink/pin-group #
What to Do Next
Include the pin group in a vHBA template.
Procedure
Step 2 UCS-A /fc-uplink # create pin-group Creates a FCoE pin group with the specified
fcoepingroup name, and enters FCoE uplink pin group mode.
Step 3 UCS-A /fc-uplink/pin-group # set target a Sets FCoE port 1/8 as the target port for this pin
fcoe-port 1/8 group.
WWN Pools
A World Wide Name (WWN) pool is a collection of WWNs for use by the Fibre Channel vHBAs in a Cisco
UCS domain. You create separate pools for the following:
• WW node names assigned to the vHBA
• WW port names assigned to the vHBA
• Both WW node names and WW port names
Important A WWN pool can include only WWNNs or WWPNs in the ranges from 20:00:00:00:00:00:00:00 to
20:FF:FF:FF:FF:FF:FF:FF or from 50:00:00:00:00:00:00:00 to 5F:FF:FF:FF:FF:FF:FF:FF. All other
WWN ranges are reserved. To ensure the uniqueness of the Cisco UCS WWNNs and WWPNs in the SAN
fabric, Cisco recommends using the following WWN prefix for all blocks in a pool:
20:00:00:25:B5:XX:XX:XX
If you use WWN pools in service profiles, you do not have to manually configure the WWNs that will be
used by the server associated with the service profile. In a system that implements multi-tenancy, you can use
a WWN pool to control the WWNs used by each organization.
You assign WWNs to pools in blocks.
WWNN Pools
A WWNN pool is a WWN pool that contains only WW node names. If you include a pool of WWNNs in a
service profile, the associated server is assigned a WWNN from that pool.
WWPN Pools
A WWPN pool is a WWN pool that contains only WW port names. If you include a pool of WWPNs in a
service profile, the port on each vHBA of the associated server is assigned a WWPN from that pool.
WWxN Pools
A WWxN pool is a WWN pool that contains both WW node names and WW port names. You can specify
how many ports per node are created with WWxN pools. The pool size must be a multiple of ports-per-node
+ 1. For example, if you specify 7 ports per node, the pool size must be a multiple of 8. If you specify 63 ports
per node, the pool size must be a multiple of 64.
You can use a WWxN pool whenever you select a WWNN or WWPN pool. The WWxN pool must be created
before it can be assigned.
• For WWNN pools, the WWxN pool is displayed as an option in the WWNN Assignment drop-down
list.
• For WWPN pools, choose Derived in the WWPN Assignment drop-down list.
Important A WWN pool can include only WWNNs or WWPNs in the ranges from 20:00:00:00:00:00:00:00 to
20:FF:FF:FF:FF:FF:FF:FF or from 50:00:00:00:00:00:00:00 to 5F:FF:FF:FF:FF:FF:FF:FF. All other
WWN ranges are reserved. To ensure the uniqueness of the Cisco UCS WWNNs and WWPNs in the SAN
fabric, Cisco recommends using the following WWN prefix for all blocks in a pool:
20:00:00:25:B5:XX:XX:XX
A WWNN pool with the last four digits ending in 00:01 causes the vHBA to not initialize, no output from
the lunlist command, and displays the Waiting for Flogi error. This error occurs if the WWPN is in the same
block as the WWNN ending in 00:01. To ensure that the WWNN and WWPN addresses do not overlap, we
recommend using a unique WWN address.
Procedure
Step 2 UCS-A /org # create wwn-pool Creates a WWN pool with the specified name and purpose, and
wwn-pool-name enters organization WWN pool mode. This can be one of the
{node-and-port-wwn-assignment following:
| node-wwn-assignment |
port-wwn-assignment} • node-and-port-wwn-assignment—Creates a WWxN
pool that includes both world wide node names (WWNNs)
and world wide port names (WWPNs).
• node-wwn-assignment—Creates a WWNN pool that
includes only WWNNs.
Step 5 UCS-A /org/wwn-pool # set For WWxN pools, specify the maximum number of ports that
max-ports-per-node can be assigned to each node name in this pool. The default
{15-ports-per-node | value is 3-ports-per-node.
3-ports-per-node | Note The pool size for WWxN pools must be a multiple of
31-ports-per-node | ports-per-node + 1. For example, if you specify
63-ports-per-node | 7-ports-per-node, the pool size must be a multiple of
7-ports-per-node} 8. If you specify 63-ports-per-node, the pool size must
be a multiple of 64.
Step 6 UCS-A /org/wwn-pool # create Creates a block (range) of WWNs, and enters organization
block first-wwn last-wwn WWN pool block mode. You must specify the first and last
WWN in the block using the form nn:nn:nn:nn:nn:nn:nn:nn,
with the WWNs separated by a space.
Note A WWN pool can contain more than one WWN block.
To create multiple WWN blocks, you must enter
multiple create block commands from organization
WWN pool mode.
Step 7 UCS-A /org/wwn-pool/block # exit Exits organization WWN pool block mode.
Step 8 UCS-A /org/wwn-pool # create Creates a single initiator for a WWNN or WWPN pool, and
initiator wwn wwn enters organization WWN pool initiator mode. You must specify
the initiator using the form nn:nn:nn:nn:nn:nn:nn:nn.
The following example shows how to create a WWNN pool named sanpool, provide a description for the
pool, specify a block of WWNs and an initiator to be used for the pool, and commit the transaction:
UCS-A# scope org /
UCS-A /org # create wwn-pool sanpool node-wwn-assignment
UCS-A /org/wwn-pool* # set descr "This is my WWNN pool"
UCS-A /org/wwn-pool* # create block 20:00:00:25:B5:00:00:00 20:00:00:25:B5:00:00:01
UCS-A /org/wwn-pool/block* # exit
UCS-A /org/wwn-pool* # create initiator 23:00:00:05:AD:1E:02:00
UCS-A /org/wwn-pool/initiator* # commit-buffer
UCS-A /org/wwn-pool/initiator #
The following example shows how to create a WWxN pool named sanpool, provide a description for the pool,
specify seven ports per node, specify a block of eight WWNs to be used for the pool, and commit the transaction:
UCS-A# scope org /
UCS-A /org # create wwn-pool sanpool node-and-port-wwn-assignment
UCS-A /org/wwn-pool* # set descr "This is my WWxN pool"
UCS-A /org/wwn-pool* # set max-ports-per-node 7-ports-per-node
UCS-A /org/wwn-pool* # create block 20:00:00:25:B5:00:00:00 20:00:00:25:B5:00:00:08
UCS-A /org/wwn-pool/block* # commit-buffer
UCS-A /org/wwn-pool/block #
What to Do Next
• Include the WWPN pool in a vHBA template.
• Include the WWNN pool in a service profile and template.
• Include the WWxN pool in a service profile and template.
Procedure
Step 2 UCS-A /org # delete wwn-pool Deletes the specified WWN pool.
pool-name
Step 3 UCS-A /org # commit-buffer Commits the transaction to the system configuration.
The following example shows how to delete the WWN pool named pool4 and commit the transaction:
UCS-A# scope org /
UCS-A /org # delete wwn-pool pool4
UCS-A /org* # commit-buffer
UCS-A /org #
Step 2 UCS-A /org # create vhba-templ Creates a vHBA template and enters organization vHBA
vhba-templ-name [fabric {a | b}] template mode.
[fc-if vsan-name]
Step 6 UCS-A /org/vhba-templ # set Specifies the maximum size of the Fibre Channel frame
max-field-size size-num payload (in bytes) that the vHBA supports.
Step 7 UCS-A /org/vhba-templ # set Specifies the pin group to use for the vHBA template.
pin-group group-name
Step 8 UCS-A /org/vhba-templ # set Specifies the QoS policy to use for the vHBA template.
qos-policy mac-pool-name
Step 9 UCS-A /org/vhba-templ # set Specifies the server and server component statistics
stats-policy policy-name threshold policy to use for the vHBA template.
Step 10 UCS-A /org/vhba-templ # set type Specifies the vHBA template update type. If you do not
{initial-template | want vHBA instances created from this template to be
updating-template} automatically updated when the template is updated, use
the initial-template keyword; otherwise, use the
updating-template keyword to ensure that all vHBA
instances are updated when the vHBA template is
updated.
Step 11 UCS-A /org/vhba-templ # set Specifies the WWPN pool to use for the vHBA template.
wwpn-pool pool-name
Step 12 UCS-A /org/vhba-templ # Commits the transaction to the system configuration.
commit-buffer
The following example configures a vHBA template and commits the transaction:
UCS-A# scope org /
UCS-A /org* # create vhba template VhbaTempFoo
UCS-A /org/vhba-templ* # set descr "This is a vHBA template example."
UCS-A /org/vhba-templ* # set fabric a
UCS-A /org/vhba-templ* # set fc-if accounting
UCS-A /org/vhba-templ* # set max-field-size 2112
UCS-A /org/vhba-templ* # set pin-group FcPinGroup12
UCS-A /org/vhba-templ* # set qos-policy policy34foo
UCS-A /org/vhba-templ* # set stats-policy ServStatsPolicy
UCS-A /org/vhba-templ* # set type updating-template
Step 3 UCS-A/ # org vhba-templ [set Specifies the fabric for the Primary vHBA template. If you
fabric {a | b}] . specify Fabric A for the Primary vHBA template, the
Secondary vHBA template must be Fabric B or vice versa.
Step 4 UCS-A/ # org vhba-templ set Sets the redundancy template type as the Primary template.
redundancy-type primary . See the Redundancy Type descriptions below.
Step 5 UCS-A/ # org vhba-templ Commits the transaction to the system configuration.
commit-buffer .
Step 6 UCS-A/ # org vhba-templcreate Creates a Secondary vHBA template.
vhba-templ vhba-secondary .
Step 8 UCS-A/ # org vhba-templ Commits the transaction to the system configuration.
commit-buffer .
Step 9 UCS-A/ # org vhba-templ vhba Sets the Primary vHBA template as a redundancy pair
primary. template.
Step 10 UCS-A/ # org vhba-templ scope Accesses the primary vhba template.
vhba template vhba primary.
Step 11 UCS-A/ # org vhba-templ set Sets the Secondary vHBA template as the peer to the
redundancy peer-template-name Primary vHBA template.
vhba-secondary.
Step 12 UCS-A/ # org vhba-templ Commits the transaction to the system configuration.
commit-buffer .
The following example configures a vHBA redundancy template pair and commits the transaction:
What to Do Next
After you create the vHBA redundancy template pair, you can use the redundancy template pair to create
redundancy vHBA pairs for any service profile in the same organization or sub- organization.
Procedure
Step 2 UCS-A /org/ vhba-templ # set Removes the paring between the peer Primary or
redundancy-type no redundancy. Secondary redundancy template used to perform the
template pairing.
Step 2 UCS-A /org # delete vhba-templ Deletes the specified vHBA template.
vhba-templ-name
Step 3 UCS-A /org # commit-buffer Commits the transaction to the system configuration.
The following example deletes the vHBA template named VhbaTempFoo and commits the transaction:
UCS-A# scope org /
UCS-A /org # delete vhba template VhbaTempFoo
UCS-A /org* # commit-buffer
UCS-A /org #
Note For Fibre Channel adapter policies, the values displayed by Cisco UCS Manager may not match those
displayed by applications such as QLogic SANsurfer. For example, the following values may result in an
apparent mismatch between SANsurfer and Cisco UCS Manager:
• Max LUNs Per Target—SANsurfer has a maximum of 256 LUNs and does not display more than
that number. Cisco UCS Manager supports a higher maximum number of LUNs.
• Link Down Timeout—In SANsurfer, you configure the timeout threshold for link down in seconds.
In Cisco UCS Manager, you configure this value in milliseconds. Therefore, a value of 5500 ms in
Cisco UCS Manager displays as 5s in SANsurfer.
• Max Data Field Size—SANsurfer has allowed values of 512, 1024, and 2048. Cisco UCS Manager
allows you to set values of any size. Therefore, a value of 900 in Cisco UCS Manager displays as
512 in SANsurfer.
• LUN Queue Depth—The LUN queue depth setting is available for Windows system FC adapter
policies. Queue depth is the number of commands that the HBA can send and receive in a single
transmission per LUN. Windows Storport driver sets this to a default value of 20 for physical miniports
and to 250 for virtual miniports. This setting adjusts the initial queue depth for all LUNs on the
adapter. Valid range for this value is 1 to 254. The default LUN queue depth is 20. This feature only
works with Cisco UCS Manager version 3.1(2) and higher.
• IO TimeOut Retry—When the target device is not responding to an IO request within the specified
timeout, the FC adapter will abort the pending command then resend the same IO after the timer
expires. The FC adapter valid range for this value is 1 to 59 seconds. The default IO retry timeout
is 5 seconds. This feature only works with Cisco UCS Manager version 3.1(2) and higher.
Important We recommend that you use the values in these policies for the applicable operating system. Do not modify
any of the values in the default policies unless directed to do so by Cisco Technical Support.
However, if you are creating an Ethernet adapter policy for a Windows OS (instead of using the default
Windows adapter policy), you must use the following formulas to calculate values that work with Windows:
Completion Queues = 1 + 8 = 9
Interrupt Count = (9 + 2) rounded up to the nearest power of 2 = 16
Step 2 UCS-A /org # create fc-policy policy-name Creates the specified Fibre Channel adapter
policy and enters organization Fibre Channel
policy mode.
The following example configures a Fibre Channel adapter policy and commits the transaction:
UCS-A# scope org /
UCS-A /org* # create fc-policy FcPolicy42
UCS-A /org/fc-policy* # set descr "This is a Fibre Channel adapter policy example."
UCS-A /org/fc-policy* # set error-recovery error-detect-timeout 2500
UCS-A /org/fc-policy* # set port max-luns 4
UCS-A /org/fc-policy* # set port-f-logi retries 250
UCS-A /org/fc-policy* # set port-p-logi timeout 5000
UCS-A /org/fc-policy* # set recv-queue count 1
UCS-A /org/fc-policy* # set scsi-io ring-size 256
UCS-A /org/fc-policy* # set trans-queue ring-size 256
UCS-A /org/fc-policy* # commit-buffer
UCS-A /org/fc-policy #
Step 2 UCS-A /org # delete fc-policy Deletes the specified Fibre Channel adapter policy.
policy-name
Step 3 UCS-A /org # commit-buffer Commits the transaction to the system configuration.
The following example deletes the Fibre Channel adapter policy named FcPolicy42 and commits the transaction:
UCS-A# scope org /
UCS-A /org # delete fc-policy FcPolicy42
UCS-A /org* # commit-buffer
UCS-A /org #
Note If you do not specify a default behavior policy for vHBAs, none is used by default.
This example shows how to set the default vHBA behavior policy to hw-inherit.
UCS-A # scope org /
UCS-A/org # scope vhba-beh-policy
UCS-A/org/vhba-beh-policy # set action hw-inherit
UCS-A/org/vhba-beh-policy* # commit-buffer
UCS-A/org/vhba-beh-policy #
Note We do not recommend that you use static IDs in connectivity policies, because these policies are included
in service profiles and service profile templates and can be used to configure multiple servers.
Cisco UCS maintains mutual exclusivity between connectivity policies and local vNIC and vHBA configuration
in the service profile. You cannot have a combination of connectivity policies and locally created vNICs or
vHBAs. When you include a LAN connectivity policy in a service profile, all existing vNIC configuration is
erased, and when you include a SAN connectivity policy, all existing vHBA configuration in that service
profile is erased.
Step 2 UCS-A /org # create Creates the specified SAN connectivity policy, and enters
san-connectivity-policy organization network control policy mode.
policy-name This name can be between 1 and 16 alphanumeric characters.
You cannot use spaces or any special characters other than -
(hyphen), _ (underscore), : (colon), and . (period), and you
cannot change this name after the object is saved.
Step 4 UCS-A /org/service-profile # set Specifies how the server acquires a UUID or WWNN. You can
identity {dynamic-uuid {uuid | do one of the following:
derived} | dynamic-wwnn
{wwnn | derived} | uuid-pool • Create a unique UUID in the form
nnnnnnnn-nnnn-nnnn-nnnnnnnnnnnn
pool-name | wwnn-pool
pool-name} • Derive the UUID from the one burned into the hardware
at manufacture
The following example shows how to create a SAN connectivity policy named SanConnect242 and commit
the transaction:
UCS-A# scope org /
UCS-A /org* # create san-connectivity-policy SanConnect242
UCS-A /org/san-connectivity-policy* # set descr "SAN connectivity policy"
UCS-A /org/san-connectivity-policy* # set identity wwnn-pool SanPool7
UCS-A /org/san-connectivity-policy* # commit-buffer
UCS-A /org/san-connectivity-policy #
What to Do Next
Add one or more vHBAs and/or initiator groups to this SAN connectivity policy.
Procedure
Step 2 UCS-A /org # scope Enters SAN connectivity policy mode for the specified
san-connectivity-policy policy-name SAN connectivity policy.
Step 3 UCS-A /org/san-connectivity-policy # Creates a vHBA for the specified SAN connectivity
create vhba vhba-name [fabric {a | b}] policy and enters vHBA mode.
[fc-if fc-if-name] This name can be between 1 and 16 alphanumeric
characters. You cannot use spaces or any special
characters other than - (hyphen), _ (underscore), :
(colon), and . (period), and you cannot change this name
after the object is saved.
Step 6 UCS-A Specifies the maximum size of the Fibre Channel frame
/org/san-connectivity-policy/vhba # set payload (in bytes) that the vHBA supports.
max-field-size size-num Enter an integer between 256 and 2112. The default is
2048.
Step 7 UCS-A Specifies the PCI scan order for the vHBA.
/org/san-connectivity-policy/vhba # set
order {order-num | unspecified}
Step 8 UCS-A Disables or enables persistent binding to Fibre Channel
/org/san-connectivity-policy/vhba # set targets.
pers-bind {disabled | enabled}
Step 9 UCS-A Specifies the SAN pin group to use for the vHBA.
/org/san-connectivity-policy/vhba # set
pin-group group-name
Step 10 UCS-A Specifies the QoS policy to use for the vHBA.
/org/san-connectivity-policy/vhba # set
qos-policy policy-name
Step 11 UCS-A Specifies the statistics threshold policy to use for the
/org/san-connectivity-policy/vhba # set vHBA.
stats-policy policy-name
Step 13 UCS-A Assigns the vHBA to one or all virtual network interface
/org/san-connectivity-policy/vhba # set connections.
vcon {1 | 2 | 3 | 4 | any}
Step 14 UCS-A Commits the transaction to the system configuration.
/org/san-connectivity-policy/vhba #
commit-buffer
The following example shows how to configure a vHBA for a SAN connectivity policy named SanConnect242
and commit the transaction:
UCS-A# scope org /
UCS-A /org* # scope san-connectivity-policy SanConnect242
UCS-A /org/san-connectivity-policy* # create vhba vhba3 fabric a
UCS-A /org/san-connectivity-policy/vhba* # set adapter-policy AdaptPol2
UCS-A /org/san-connectivity-policy/vhba* # set identity wwpn-pool SanPool7
UCS-A /org/san-connectivity-policy/vhba* # set max-field-size 2112
UCS-A /org/san-connectivity-policy/vhba* # set order 0
UCS-A /org/san-connectivity-policy/vhba* # set pers-bind enabled
UCS-A /org/san-connectivity-policy/vhba* # set pin-group FcPinGroup12
UCS-A /org/san-connectivity-policy/vhba* # set qos-policy QosPol5
UCS-A /org/san-connectivity-policy/vhba* # set stats-policy StatsPol2
UCS-A /org/san-connectivity-policy/vhba* # set template-name SanConnPol3
UCS-A /org/san-connectivity-policy/vhba* # set vcon any
UCS-A /org/san-connectivity-policy/vhba* # commit-buffer
UCS-A /org/san-connectivity-policy/vhba #
What to Do Next
If desired, add another vHBA or an initiator group to the SAN connectivity policy. If not, include the policy
in a service profile or service profile template.
Step 2 UCS-A /org # scope Enters SAN connectivity policy mode for the
san-connectivity-policy policy-name specified SAN connectivity policy.
The following example shows how to delete a vHBA named vHBA3 from a SAN connectivity policy named
SanConnect242 and commit the transaction:
UCS-A# scope org /
UCS-A /org # scope san-connectivity-policy SanConnect242
UCS-A /org/san-connectivity-policy # delete vHBA vHBA3
UCS-A /org/san-connectivity-policy* # commit-buffer
UCS-A /org/san-connectivity-policy #
Procedure
The following example shows how to configure an initiator group named initGroupZone1 with two initiators
for a a SAN connectivity policy named SanConnect242, configure a local storage connection policy definition
named scPolicyZone1, and commit the transaction:
UCS-A# scope org /
UCS-A /org* # scope san-connectivity-policy SanConnect242
UCS-A /org/san-connectivity-policy # create initiator-group initGroupZone1 fc
UCS-A /org/san-connectivity-policy/initiator-group* # set zoning-type sist
UCS-A /org/san-connectivity-policy/initiator-group* # create initiator vhba1
UCS-A /org/san-connectivity-policy/initiator-group* # create initiator vhba2
UCS-A /org/san-connectivity-policy/initiator-group* # create storage-connection-def
scPolicyZone1
UCS-A /org/san-connectivity-policy/initiator-group/storage-connection-def* # create
storage-target
20:10:20:30:40:50:60:70
UCS-A /org/san-connectivity-policy/initiator-group/storage-connection-def/storage-target*
# set
target-path a
UCS-A /org/san-connectivity-policy/initiator-group/storage-connection-def/storage-target*
# set
target-vsan default
UCS-A /org/san-connectivity-policy/initiator-group* # commit-buffer
UCS-A /org/san-connectivity-policy/initiator-group #
What to Do Next
If desired, add another initiator group or a vHBA to the SAN connectivity policy. If not, include the policy
in a service profile or service profile template.
Step 2 UCS-A /org # scope Enters SAN connectivity policy mode for the
san-connectivity-policy policy-name specified SAN connectivity policy.
Step 3 UCS-A /org/san-connectivity-policy # Deletes the specified initiator group from the SAN
delete initiator-group group-name connectivity policy.
The following example shows how to delete an initiator group named initGroup3 from a SAN connectivity
policy named SanConnect242 and commit the transaction:
UCS-A# scope org /
UCS-A /org # scope san-connectivity-policy SanConnect242
UCS-A /org/san-connectivity-policy # delete initiator-group initGroup3
UCS-A /org/san-connectivity-policy* # commit-buffer
UCS-A /org/san-connectivity-policy #
Procedure
Step 2 UCS-A /org # delete Deletes the specified SAN connectivity policy.
san-connectivity-policy policy-name
Step 3 UCS-A /org # commit-buffer Commits the transaction to the system configuration.
The following example shows how to delete a SAN connectivity policy named SanConnect52 from the root
organization and commit the transaction:
UCS-A# scope org /
UCS-A /org # delete san-connectivity-policy SanConnect52
UCS-A /org* # commit-buffer
UCS-A /org #
Note Zoning is configured on a per-VSAN basis. You cannot enable zoning at the fabric level.
Note You cannot implement Cisco UCS Manager-based zoning if the VSAN is also configured to communicate
with a VSAN on an upstream switch and includes Fibre Channel or FCoE uplink ports.
Note Cisco UCS Manager does not create default Fibre Channel storage.
• The port WWNs of the vHBA initiators derived from the vHBA initiator groups.
• The port WWNs of the storage array derived from the storage connection policy.
Guidelinesandrecommendationsfor CiscoUCSManager-Based
Fibre Channel Zoning
When you plan your configuration for Fibre Channel zoning, consider the following guidelines and
recommendations:
Fibre Channel Switching Mode Must Be Switch Mode for Cisco UCS Manager Configurations
If you want Cisco UCS Manager to handle Fibre Channel zoning, the fabric interconnects must be in Fibre
Channel Switch mode. You cannot configure Fibre Channel zoning in End-Host mode.
Note This procedure provides a high level overview of the steps required to configure a Cisco UCS domain for
Fibre Channel zoning that is controlled by Cisco UCS Manager. You must ensure that you complete all
of the following steps.
Procedure
Step 4 Configure the Fibre Channel and FCoE storage See Configuring Ports and Port Channels, on
ports that you require to carry traffic for the page 61.
Fibre Channel zones.
Step 5 Create one or more VSANs and enable Fibre For a cluster configuration, we recommend that
Channel zoning on all VSANs that you require you create the VSANs that you intend to include
to carry traffic for the Fibre Channel zones. in a Fibre Channel zone in Fibre Channel storage
mode and accessible to both fabric interconnects.
See Configuring Named VSANs, on page 329.
Step 6 Create one or more Fibre Channel storage You can perform this step when you configure
connection policies. Fibre Channel zoning in the service profiles, if
you prefer.
See Creating a Fibre Channel Storage Connection
Policy, on page 377.
Step 7 Configure zoning in service profiles or service Complete the following steps to complete this
profile templates for servers that need to configuration:
communicate through Fibre Channel zones.
• Enable zoning in the VSAN or VSANs
assigned to the VHBAs.
• Configure one or more vHBA initiator
groups.
Procedure
Step 2 UCS-A /fc-uplink # scope fabric {a | Enters Fibre Channel uplink mode for the specified
b} fabric interconnect.
Step 3 UCS-A /fc-uplink/fabric # scope vsan Enters VSAN mode for the specified named VSAN.
vsan-name
Step 4 UCS-A /fc-uplink/fabric/vsan # Clears all unmanaged Fibre Channel zones from the
clear-unmanaged-fc-zones-all specified named VSAN.
If desired, you can repeat Steps 2 through 4 to remove
unmanaged zones from all VSANs that are accessible
to the specified fabric interconnect before you commit
the buffer.
The following example shows how to remove unmanaged zones from a named VSAN accessible to fabric
interconnect A and commit the transaction:
UCS-A# scope fc-uplink
UCS-A /fc-uplink # scope fabric a
UCS-A /fc-uplink/fabric # scope vsan finance
UCS-A /fc-uplink/fabric/vsan # clear-unmanaged-fc-zones-all
UCS-A /fc-uplink/fabric/vsan* # commit-buffer
UCS-A /fc-uplink #
Procedure
Step 2 UCS-A /fc-uplink # scope vsan Enters VSAN mode for the specified named VSAN.
vsan-name
Step 3 UCS-A /fc-uplink/vsan # Clears all unmanaged Fibre Channel zones from the
clear-unmanaged-fc-zones-all specified named VSAN.
If desired, you can repeat steps 2 and 3 to remove
unmanaged zones from all VSANs that are accessible
to both fabric interconnects before you commit the
buffer.
The following example shows how to remove unmanaged zones from a named VSAN and commit the
transaction:
UCS-A# scope fc-uplink
UCS-A /fc-uplink # scope vsan finance
UCS-A /fc-uplink/vsan # clear-unmanaged-fc-zones-all
UCS-A /fc-uplink/vsan* # commit-buffer
UCS-A /fc-uplink #
Step 2 UCS-A /org # create Creates a storage connection policy with the specified
storage-connection-policy policy-name policy name, and enters organization storage
connection policy mode.
Step 3 UCS-A /org # set zoning-type {none | simt • None—Cisco UCS Manager does not configure
| sist} Fibre Channel zoning.
• Single Initiator Single Target—Cisco UCS
Manager automatically creates one zone for
each vHBA and storage port pair. Each zone
Step 4 UCS-A /org/storage-connection-policy # Creates a storage target endpoint with the specified
create storage-target wwpn WWPN, and enters storage target mode.
The following example configures a Fibre Channel storage connection policy in the root organization named
scPolicyZone1, using fabric interconnect A and the default VSAN, and commits the transaction:
UCS-A# scope org /
UCS-A /org* # create storage-connection-policy scPolicyZone1
UCS-A /org/storage-connection-policy* set zoning-type sist
UCS-A /org/storage-connection-policy* # create storage-target 20:10:20:30:40:50:60:70
UCS-A /org/storage-connection-policy/storage-target* # set target-path a
UCS-A /org/storage-connection-policy/storage-target* # set target-vsan default
UCS-A /org/storage-connection-policy* # commit-buffer
UCS-A /org/storage-connection-policy #
Step 2 UCS-A /org # delete Deletes the specified storage connection policy.
storage-connection-policy policy-name
The following example deletes the storage connection policy named scPolicyZone1 from the root organization
and commits the transaction:
UCS-A# scope org /
UCS-A /org # delete san-connectivity-policy scPolicyZone1
UCS-A /org* # commit-buffer
UCS-A /org #
Step 2 UCS-A /org # create server-pool Creates a server pool with the specified name, and enters
server-pool-name organization server pool mode.
Step 3 UCS-A /org/server-pool # create Creates a server for the server pool.
server chassis-num/slot-num Note A server pool can contain more than one server.
To create multiple servers for the pool, you must
enter multiple create server commands from
organization server pool mode.
Step 4 UCS-A /org/server-pool # Commits the transaction to the system configuration.
commit-buffer
The following example shows how to create a server pool named ServPool2, create two servers for the server
pool, and commit the transaction:
UCS-A# scope org /
UCS-A /org # create server-pool ServPool2
UCS-A /org/server-pool* # create server 1/1
UCS-A /org/server-pool* # create server 1/4
UCS-A /org/server-pool* # commit-buffer
UCS-A /org/server-pool #
Step 2 UCS-A /org # delete server-pool Deletes the specified server pool.
server-pool-name
Step 3 UCS-A /org # commit-buffer Commits the transaction to the system configuration.
The following example shows how to delete the server pool named ServPool2 and commit the transaction:
UCS-A# scope org /
UCS-A /org # delete server-pool ServPool2
UCS-A /org* # commit-buffer
UCS-A /org #
Step 2 UCS-A /org # create Creates a UUID suffix pool with the specified pool name and
uuid-suffix-pool pool-name enters organization UUID suffix pool mode.
This name can be between 1 and 32 alphanumeric characters. You
cannot use spaces or any special characters other than - (hyphen),
_ (underscore), : (colon), and . (period), and you cannot change
this name after the object is saved.
The following example shows how to create a UUID suffix pool named pool4, provide a description for the
pool, specify a block of UUID suffixes to be used for the pool, and commit the transaction:
UCS-A# scope org /
UCS-A /org # create uuid-suffix-pool pool4
UCS-A /org/uuid-suffix-pool* # set descr "This is UUID suffix pool 4"
UCS-A /org/uuid-suffix-pool* # create block 1000-000000000001 1000-000000000010
UCS-A /org/uuid-suffix-pool/block* # commit-buffer
UCS-A /org/uuid-suffix-pool/block #
What to Do Next
Include the UUID suffix pool in a service profile and/or template.
Procedure
Step 2 UCS-A /org # delete uuid-suffix-pool Deletes the specified UUID suffix pool.
pool-name
The following example shows how to delete the UUID suffix pool named pool4 and commit the transaction:
UCS-A# scope org /
UCS-A /org # delete uuid-suffix-pool pool4
UCS-A /org* # commit-buffer
UCS-A /org #
IP Pool Configuration
IP Pools
IP pools are collections of IP addresses that do not have a default purpose. You can create IPv4 or IPv6 address
pools in Cisco UCS Manager to do the following:
•
• Replace the default management IP pool ext-mgmt for servers that have an associated service profile.
Cisco UCS Manager reserves each block of IP addresses in the IP pool for external access that terminates
in the Cisco Integrated Management Controller (CIMC) on a server. If there is no associated service
profile, you must use the ext-mgmt IP pool for the CIMC to get an IP address.
• Replace the management inband or out-of-band IP addresses for the CIMC.
Note You cannot create iSCSI boot IPv6 pools in Cisco UCS Manager.
You can create IPv4 address pools in Cisco UCS Manager to do the following:
• Replace the default iSCSI boot IP pool iscsi-initiator-pool. Cisco UCS Manager reserves each block
of IP addresses in the IP pool that you specify.
• Replace both the management IP address and iSCSI boot IP addresses.
Note The IP pool must not contain any IP addresses that were assigned as static IP addresses for a server or
service profile.
Procedure
Step 2 UCS-A /org # create ip-pool Creates an IP pool with the specified name, and enters
pool-name organization IP pool mode.
This name can be between 1 and 32 alphanumeric characters.
You cannot use spaces or any special characters other than
- (hyphen), _ (underscore), : (colon), and . (period), and you
cannot change this name after the object is saved.
Step 7 UCS-A /org/ip-pool # create Creates a block of IPv6 addresses, and enters organization
ip6block first-ip6-addr IPv6 pool block mode. You must specify the first and last
last-ip6-addr gateway-ip6-addr IPv6 addresses in the address range, the gateway IPv6
prefix address, and network prefix.
The example below creates an inband IP pool named inband-default, creates a block of IPv4 addresses, creates
a block of IPv6 addresses, and commits the transaction:
UCS-A# scope org
UCS-A /org # create ip-pool inband_default
UCS-A /org/ip-pool* # create block 192.168.100.10 192.168.100.100 192.168.100.1 255.255.255.0
UCS-A /org/ip-pool/block* # commit-buffer
UCS-A /org/ip-pool/block # exit
UCS-A /org/ip-pool # create ipv6-block 2001:888::10 2001:888::100 2001:888::1 64
UCS-A /org/ip-pool/ipv6-block* # commit-buffer
UCS-A /org/ip-pool/ipv6-block #
What to Do Next
Include the IP pool in a service profile and template.
Step 2 UCS-A /org # scope ip-pool Enters organization IP pool mode for the specified pool.
pool-name
Step 3 UCS-A /org/ip-pool # create block Creates a block (range) of IP addresses, and enters
first-ip-addr last-ip-addr organization IP pool block mode. You must specify the first
gateway-ip-addr subnet-mask and last IP addresses in the address range, the gateway IP
address, and subnet mask.
Note An IP pool can contain more than one IP block.
To create multiple blocks, enter multiple create
block commands from organization IP pool mode.
Step 4 UCS-A /org/ip-pool/block # Commits the transaction.
commit-buffer
Step 5 UCS-A /org/ip-pool/block # exit Exits IPv4 block configuration mode.
Step 6 UCS-A /org/ip-pool # create Creates a block (range) of IPv6 addresses, and enters
ipv6-block first-ip6-addr organization IP pool IPv6 block mode. You must specify
last-ip6-addr gateway-ip6-addr the first and last IPv6 addresses in the address range, the
prefix gateway IPv6 address, and network prefix.
Note An IP pool can contain more than one IPv6 block.
To create multiple IPv6 blocks, enter multiple
create ipv6-block commands from organization
IP pool mode.
Step 7 UCS-A /org/ip-pool/ ipv6-block # Commits the transaction to the system configuration.
commit-buffer
This example shows how to add blocks of IPv4 and IPv6 addresses to an IP pool named pool4 and commit
the transaction:
UCS-A# scope org /
UCS-A /org # scope ip-pool pool4
UCS-A /org/ip-pool # create block 192.168.100.1 192.168.100.200 192.168.100.10 255.255.255.0
UCS-A /org/ip-pool/block* # commit-buffer
UCS-A /org/ip-pool/block #exit
UCS-A /org/ip-pool* # create ipv6-block 2001:888::10 2001:888::100 2001:888::1 64
UCS-A /org/ip-pool/ipv6-block* commit-buffer
Procedure
Step 2 UCS-A /org # scope ip-poolpool-name Enters organization IP pool mode for the specified
pool.
Step 3 UCS-A /org/ip-pool # delete Deletes the specified block (range) of IPv4 or IPv6
{ip-block|ipv6-block} addresses.
{first-ip-addr|first-ip6-addr}{last-ip-addr|
last-ip6-addr}
Step 4 UCS-A /org/ip-pool # commit-buffer Commits the transaction to the system
configuration.
This example shows how to delete an IP address block from an IP pool named pool4 and commit the transaction:
UCS-A# scope org /
UCS-A /org # scope ip-pool pool4
UCS-A /org/ip-pool # delete block 192.168.100.1 192.168.100.200
UCS-A /org/ip-pool* # commit-buffer
UCS-A /org/ip-pool #
This example shows how to delete an IPv6 address block from an IP pool named pool4 and commit the
transaction:
UCS-A# scope org /
UCS-A /org # scope ip-pool pool4
UCS-A /org/ip-pool # delete ipv6-block 2001::1 2001::10
UCS-A /org/ip-pool* # commit-buffer
UCS-A /org/ip-pool #
Deleting an IP Pool
If you delete a pool, Cisco UCS Manager does not reallocate any addresses from that pool that were assigned
to vNICs or vHBAs. All assigned addresses from a deleted pool remain with the vNIC or vHBA to which
they are assigned until one of the following occurs:
• The associated service profiles are deleted.
• The vNIC or vHBA to which the address is assigned is deleted.
• The vNIC or vHBA is assigned to a different pool.
Procedure
The following example shows how to delete the IP pool named pool4 and commit the transaction:
UCS-A# scope org /
UCS-A /org # delete ip-pool pool4
UCS-A /org* # commit-buffer
UCS-A /org #
Management IP Address
Each server in a Cisco UCS domain must have a one or more management IP addresses assigned to its Cisco
Integrated Management Controller (CIMC) or to the service profile associated with the server. Cisco UCS
Manager uses these IP addresses for external access that terminates in the CIMC. This external access can be
through one of the following services:
• KVM console
• Serial over LAN
• An IPMI tool
The management IP addresses used to access the CIMC on a server can be out-of-band (OOB) addresses,
through which traffic traverses the fabric interconnect via the management port, or inband addresses, through
which traffic traverses the fabric interconnect via the fabric uplink port. Up to six IP addresses can be configured
to access the CIMC on a server, two out-of-band (OOB) and four inband.
You can configure the following management IP addresses:
• A static OOB IPv4 address assigned directly to the server
• An OOB IPv4 address assigned to the server from a global ext-mgmt pool
• An inband IPv4 address derived from a service profile associated with the server
• An inband IPv4 address drawn from a management IP pool and assigned to a service profile or service
profile template
You can assign multiple management IP addresses to each CIMC on the server and to the service profile
associated with the server. If you do so, you must use different IP addresses for each of them.
A management IP address that is assigned to a service profile moves with that service profile. If KVM or SoL
sessions are active when you migrate the service profile to another server, Cisco UCS Manager terminates
the sessions and does not restart them after the migration is completed. You configure the IP address when
you create or modify a service profile.
Note You cannot assign a static IP address to a server or service profile if that IP address has already been
assigned to a server or service profile in the Cisco UCS domain. If you attempt to do so, Cisco UCS
Manager warns you that the IP address is already in use and rejects the configuration.
An ARP request will be sent to the gateway IP address every second from each server that is configured with
an Inband IP address. This is to check if connectivity for the Inband traffic through the current Fabric
Interconnect is up, and to initiate a failover to the other Fabric Interconnect if it is down. The path selected
for Inband and the failover operations are completely independent of the server data traffic.
Step 2 UCS-A /chassis/server # scope cimc Enters chassis server CIMC mode.
Step 5 UCS-A /chassis/server/cimc/ext-static-ip # set Specifies the default gateway that the IP
default-gw ip-addr address should use.
Step 6 UCS-A /chassis/server/cimc/ext-static-ip # set Specifies the subnet mask for the IP address.
subnet ip-addr
Step 7 UCS-A /chassis/server/cimc/ext-static-ip # Commits the transaction to the system
commit-buffer configuration.
The following example configures a static management IP address for chassis 1 server 1, sets the static IPv4
address, sets the default gateway, sets the subnet mask, and commits the transaction:
UCS-A# scope server 1/1
UCS-A /chassis/server # scope cimc
UCS-A /chassis/server/cimc # create ext-static-ip
UCS-A /chassis/server/cimc/ext-static-ip* # set addr 192.168.10.10
UCS-A /chassis/server/cimc/ext-static-ip* # set default-gw 192.168.10.1
UCS-A /chassis/server/cimc/ext-static-ip* # set subnet 255.255.255.0
UCS-A /chassis/server/cimc/ext-static-ip* # commit-buffer
UCS-A /chassis/server/cimc/ext-static-ip #
Step 2 UCS-A /chassis/server # scope cimc Enters chassis server CIMC mode.
Step 3 UCS-A /chassis/server/cimc # create Creates a static management IPv6 address for
ext-static-ip6 the specified server.
Step 5 UCS-A /chassis/server/cimc/ext-static-ip6 # Specifies the default gateway that the IPv6
set default-gw ip6-addr address should use.
The following example configures a static management IPv6 address for chassis 1 server 1, sets a static IPv6
address, sets the default gateway, sets the network prefix, and commits the transaction:
UCS-A# scope server 1/1
UCS-A /chassis/server # scope cimc
UCS-A /chassis/server/cimc # create ext-static-ip6
UCS-A /chassis/server/cimc/ext-static-ip* # set addr 2001:888::10
UCS-A /chassis/server/cimc/ext-static-ip* # set default-gw 2001:888::100
UCS-A /chassis/server/cimc/ext-static-ip* # set prefix 64
UCS-A /chassis/server/cimc/ext-static-ip* # commit-buffer
UCS-A /chassis/server/cimc/ext-static-ip #
Procedure
Step 2 UCS-A /chassis/server # scope cimc Enters chassis server CIMC mode.
Step 3 UCS-A /chassis/server/cimc # delete Deletes the external static IPv4 or IPv6 address
{ext-static-ip | ext-static-ip6} and returns the blade server to the management
IP pool.
The following example deletes the static management IP address for chassis 1 server 1 and commits the
transaction:
UCS-A# scope server 1/1
UCS-A /chassis/server # scope cimc
UCS-A /chassis/server/cimc # delete ext-static-ip
UCS-A /chassis/server/cimc* # commit-buffer
UCS-A /chassis/server/cimc/ #
The following example deletes the static management IPv6 address for chassis 1 server 1 and commits the
transaction:
UCS-A# scope server 1/1
UCS-A /chassis/server # scope cimc
UCS-A /chassis/server/cimc # delete ext-static-ip6
UCS-A /chassis/server/cimc* # commit-buffer
UCS-A /chassis/server/cimc/ #
Step 3 UCS-A /server/cimc # create ext-static-ip Creates a static management IP address for the
specified server.
Step 4 UCS-A /server/cimc/ext-static-ip # set addr Specifies the static IPv4 address to be assigned
ip-addr to the server.
Step 6 UCS-A /server/cimc/ext-static-ip # set Specifies the subnet mask for the IP address.
subnet ip-addr
Step 7 UCS-A /server/cimc/ext-static-ip # Commits the transaction to the system
commit-buffer configuration.
The following example configures a static management IP address for rack server 1, sets the static IPv4
address, sets the default gateway, sets the subnet mask, and commits the transaction:
UCS-A# scope server 1
UCS-A /server # scope cimc
UCS-A /server/cimc # create ext-static-ip
UCS-A /server/cimc/ext-static-ip* # set addr 192.168.10.10
UCS-A /server/cimc/ext-static-ip* # set default-gw 192.168.10.1
UCS-A /server/cimc/ext-static-ip* # set subnet 255.255.255.0
UCS-A /server/cimc/ext-static-ip* # commit-buffer
UCS-A /server/cimc/ext-static-ip #
Step 3 UCS-A /server/cimc # create ext-static-ip6 Creates a static management IPv6 address for
the specified server.
Step 4 UCS-A /server/cimc/ext-static-ip6 # set addr Specifies the static IPv6 address to be assigned
ip6-addr to the server.
Step 5 UCS-A /server/cimc/ext-static-ip6 # set Specifies the default gateway that the IP
default-gw ip6-addr address should use.
Step 6 UCS-A /server/cimc/ext-static-ip6 # set Specifies the network prefix for the IPv6
prefix ip6-addr address.
The following example configures a static management IPv6 address for rack server 1, sets the static IPv4
address, sets the default gateway, sets the network prefix, and commits the transaction:
UCS-A# scope server 1
UCS-A /server # scope cimc
UCS-A /server/cimc # create ext-static-ip6
UCS-A /server/cimc/ext-static-ip6* # set addr 2001::8999
UCS-A /server/cimc/ext-static-ip6* # set default-gw 2001::1
UCS-A /server/cimc/ext-static-ip6* # set prefix 64
UCS-A /server/cimc/ext-static-ip6* # commit-buffer
UCS-A /server/cimc/ext-static-ip #
Procedure
Step 3 UCS-A /server/cimc # delete {ext-static-ip Deletes the external static IPv4 or IPv6 address
| ext-static-ip6} and returns the rack server to the management IP
pool.
The following example deletes the static management IP address for rack server 1 and commits the transaction:
UCS-A# scope server 1
UCS-A /server # scope cimc
UCS-A /server/cimc # delete ext-static-ip
UCS-A /server/cimc* # commit-buffer
UCS-A /server/cimc/ #
The following example deletes the static management IPv6 address for rack server 1 and commits the
transaction:
UCS-A# scope server 1
UCS-A /server # scope cimc
UCS-A /server/cimc # delete ext-static-ip6
UCS-A /server/cimc* # commit-buffer
UCS-A /server/cimc/ #
Step 2 UCS-A /org # scope service-profile Enters organization service profile mode for the specified
profile-name service.
Step 3 UCS-A /org/service-profile # set Specifies how the management IPv4 or IPv6 address
ext-mgmt-ip-state {none | ext-pooled-ip will be assigned to the service profile.
| You can set the management IP address policy using
ext-pooled-ip6|ext-static-ip|ext-static-ip6} the following options:
• None--The service profile is not assigned an IP
address.
• Pooled--The service profile is assigned an IP
address from the management IPv4 or IPv6 pool.
• Static--The service profile is assigned the
configured static IPv4 or IPv6 address.
Note Setting the ext-management-ip-state to
static for a service profile template is not
supported and will result in an error.
The following example sets the management address policy for a service profile called accounting to static
IPv4 and then commits the transaction:
UCS-A# scope org /
UCS-A /org # scope service-profile accounting
UCS-A /org/service-profile # set ext-mgmt-ip-state ext-static-ip
UCS-A /org/service-profile* # commit-buffer
UCS-A /org/service-profile #
What to Do Next
If you have set the management IP address to static, configure a server to use a static IP address.
Tip To avoid assigning an IP pool that contains only IPv4 addresses as the in-band IPv6 policy, or assigning
an IP pool that contains only IPv6 addresses as the in-band IPv4 policy to a server CIMC, it is suggested
that you configure separate in-band address pools, each with only IPv4 or IPv6 addresses.
You can configure service profiles and service profile templates to use IP addresses from the management IP
pools. You cannot configure servers to use the management IP pool.
All IP addresses in the management IP pool must be in the same IPv4 subnet, or have the same IPv6 network
prefix as the IP address of the fabric interconnect.
Note The management IP pool must not contain any IP addresses that were assigned as static IP addresses for
a server or service profile.
Procedure
Step 5 UCS-A /org/ip-pool # create block Creates a block (range) of IP addresses, and enters
first-ip-addr last-ip-addr organization IP pool block mode. You must specify the first
gateway-ip-addr subnet-mask and last IP addresses in the address range, the gateway IP
address, and subnet mask.
Note An IP pool can contain more than one IP block.
To create multiple blocks, enter multiple create
block commands from organization IP pool mode.
Step 6 UCS-A /org/ip-pool/block # set Specifies the primary DNS and secondary DNS IP
primary-dns ip-addrress addresses.
|secondary-dns ip-address
Step 7 UCS-A /org/ip-pool/ ipv6-block # Commits the transaction to the system configuration.
commit-buffer
Step 8 UCS-A /org/ip-pool/block # exit Exits IPv4 block configuration mode.
Step 9 UCS-A /org/ip-pool # create Creates a block (range) of IPv6 addresses, and enters
ipv6-block first-ip6-addr organization IP pool IPv6 block mode. You must specify
last-ip6-addr gateway-ip6-addr the first and last IPv6 addresses in the address range, the
prefix gateway IPv6 address, and network prefix.
Note An IP pool can contain more than one IPv6 block.
To create multiple IPv6 blocks, enter multiple
create ipv6-block commands from organization
IP pool mode.
Step 10 UCS-A /org/ip-pool/ipv6-block # set Specifies the primary DNS and secondary DNS IPv6
primary-dns ip6-address addresses.
secondary-dns ip6-address
Step 11 UCS-A /org/ip-pool/ipv6-block # Commits the transaction to the system configuration.
commit-buffer
The following example configures an IPv4 address block for the management IP pool, specifies the primary
and secondary IPv4 addresses, creates an IPv6 block, specifies the primary and secondary IPv6 addresses and
commits the transaction:
UCS-A# scope org /
UCS-A /org # scope ip-pool ext-mgmt-ip
UCS-A /org/ip-pool* # set descr "This is a management ip pool example."
UCS-A /org/ip-pool* # create block 192.168.100.1 192.168.100.200 192.168.100.10 255.255.255.0
UCS-A /org/ip-pool/block* # set primary-dns 192.168.100.1 secondary-dns 192.168.100.20
UCS-A /org/ip-pool/block* commit-buffer
UCS-A /org/ip-pool/block exit
UCS-A /org/ip-pool* # create ipv6-block 2001:888::10 2001:888::100 2001:888::1 64
UCS-A /org/ip-pool/ipv6- block* set primary-dns 2001:888::11 secondary-dns 2001:888::12
UCS-A /org/ip-pool/ipv6- block* commit-buffer
UCS-A /org/ip-pool/ipv6- block #UCS-A /org/ip-pool/block* # commit-buffer
UCS-A /org/ip-pool/block #
The following example configures an IPv6 address block for the management IP pool and commits the
transaction:
UCS-A# scope org /
UCS-A /org #scope ip-pool ext-mgmt-ip
UCS-A /org/ip-pool* # set descr "This is a management IPv6 pool example."
UCS-A /org/ip-pool* # create ipv6-block 2001:888::10 2001:888::100 2001:888::1 64
UCS-A /org/ip-pool/ipv6-block* # commit-buffer
UCS-A /org/ip-pool/ipv6-block* #
What to Do Next
Configure one or more service profiles or service profile templates to obtain the CIMC IP address from the
management IP pool.
Step 2 UCS-A /org # scope ip-pool ext-mgmt Enters the management IP pool.
Step 3 UCS-A /org/ip-pool # delete Deletes the specified block (range) of IPv4 or
{ip-block|ipv6-block} IPv6 addresses.
{first-ip-addr|first-ip6-addr}{last-ip-addr|
last-ip6-addr}
Step 4 UCS-A /org/ip-pool # commit-buffer Commits the transaction to the system
configuration.
The following example deletes an IP address block from the management IP pool and commits the transaction:
UCS-A# scope org /
UCS-A /org # scope ip-pool ext-mgmt
Depending upon the needs of the data center, you can configure BIOS policies for some service profiles and
use the BIOS defaults in other service profiles in the same Cisco UCS domain, or you can use only one of
them. You can also use Cisco UCS Manager to view the actual BIOS settings on a server and determine
whether they are meeting current needs.
Note Cisco UCS Manager pushes BIOS configuration changes through a BIOS policy or default BIOS settings
to the Cisco Integrated Management Controller (CIMC) buffer. These changes remain in the buffer and
do not take effect until the server is rebooted.
We recommend that you verify the support for BIOS settings in the server that you want to configure.
Some settings, such as Mirroring Mode for RAS Memory, are not supported by all Cisco UCS servers.
Name Description
Reboot on BIOS Settings Change When the server is rebooted after you change one or more BIOS
settings.
set reboot-on-update
yes—If you enable this setting, the server is rebooted according
to the maintenance policy in the server's service profile. For
example, if the maintenance policy requires user
acknowledgment, the server is not rebooted and the BIOS
changes are not applied until a user acknowledges the pending
activity.
no—If you do not enable this setting, the BIOS changes are not
applied until the next time the server is rebooted, whether as a
result of another server configuration change or a manual reboot.
Quiet Boot What the BIOS displays during Power On Self-Test (POST).
set quiet-boot-config quiet-boot This can be one of the following:
• disabled—The BIOS displays all messages and Option
ROM information during boot.
• enabled—The BIOS displays the logo screen, but does
not display any messages or Option ROM information
during boot.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Name Description
Post Error Pause What happens when the server encounters a critical error during
POST. This can be one of the following:
set post-error-pause-config
post-error-pause • disabled—The BIOS continues to attempt to boot the
server.
• enabled—The BIOS pauses the attempt to boot the server
and opens the Error Manager when a critical error occurs
during POST.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Resume Ac On Power Loss How the server behaves when power is restored after an
unexpected power loss. This can be one of the following:
set resume-ac-on-power-loss-config
resume-action • stay-off—The server remains off until manually powered
on.
• last-state—The server is powered on and the system
attempts to restore its last state.
• reset—The server is powered on and automatically reset.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Front Panel Lockout Whether the power and reset buttons on the front panel are
ignored by the server. This can be one of the following:
set front-panel-lockout-config
front-panel-lockout • disabled—The power and reset buttons on the front panel
are active and can be used to affect the server.
• enabled—The power and reset buttons are locked out.
The server can only be reset or powered on or off from
the CIMC GUI.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Name Description
Consistent Device Naming Consistent Device Naming allows Ethernet interfaces to be
named in a consistent manner. This makes Ethernet interface
set consistent-device-name-control
names more uniform, easy to identify, and persistent when
cdn-name
adapter or other configuration changes are made.
Whether consistent device naming is enabled or not. This can
be one of the following:
• disabled—Consistent device naming is disabled for the
BIOS policy.
• enabled—Consistent device naming is enabled for the
BIOS policy. This enables Ethernet interfaces to be named
consistently.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Name Description
Turbo Boost Whether the processor uses Intel Turbo Boost Technology,
set intel-turbo-boost-config turbo-boost which allows the processor to automatically increase its
frequency if it is running below power, temperature, or voltage
specifications. This can be one of the following:
• disabled—The processor does not increase its frequency
automatically.
• enabled—The processor uses Turbo Boost Technology
if required.
• platform-default —The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Name Description
Enhanced Intel Speedstep Whether the processor uses Enhanced Intel SpeedStep
Technology, which allows the system to dynamically adjust
set enhanced-intel-speedstep-config
processor voltage and core frequency. This technology can result
speed-step
in decreased average power consumption and decreased average
heat production. This can be one of the following:
• disabled—The processor never dynamically adjusts its
voltage or frequency.
• enabled—The processor utilizes Enhanced Intel SpeedStep
Technology and enables all supported processor sleep
states to further conserve power.
• platform-default —The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Name Description
Core Multi Processing Sets the state of logical processor cores per CPU in a package.
If you disable this setting, Intel Hyper Threading technology is
set core-multi-processing-config
also disabled. This can be one of the following:
multi-processing
• all—Enables multiprocessing on all logical processor
cores.
• 1 through n—Specifies the number of logical processor
cores per CPU that can run on the server. To disable
multiprocessing and have only one logical processor core
per CPU running on the server, choose 1.
• platform-default —The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Execute Disabled Bit Classifies memory areas on the server to specify where the
application code can execute. As a result of this classification,
set execute-disable bit
the processor disables code execution if a malicious worm
attempts to insert code in the buffer. This setting helps to prevent
damage, worm propagation, and certain classes of malicious
buffer overflow attacks. This can be one of the following:
• disabled—The processor does not classify memory areas.
• enabled—The processor classifies memory areas.
• platform-default —The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Virtualization Technology (VT) Whether the processor uses Intel Virtualization Technology,
which allows a platform to run multiple operating systems and
set intel-vt-config vt
applications in independent partitions. This can be one of the
following:
• disabled—The processor does not permit virtualization.
• enabled—The processor allows multiple operating systems
in independent partitions.
• platform-default —The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Note If you change this option, you must power cycle the
server before the setting takes effect.
Name Description
Hardware Pre-fetcher Whether the processor allows the Intel hardware prefetcher to
fetch streams of data and instruction from memory into the
set processor-prefetch-config
unified second-level cache when necessary. This can be one of
hardware-prefetch
the following:
• disabled—The hardware prefetcher is not used.
• enabled—The processor uses the hardware prefetcher
when cache issues are detected.
• platform-default —The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Name Description
DCU IP Pre-fetcher Whether the processor uses the DCU IP Prefetch mechanism to
analyze historical cache access patterns and preload the most
set processor-prefetch-config
relevant lines in the L1 cache. This can be one of the following:
dcu-ip-prefetch
• disabled—The processor does not preload any cache data.
• enabled—The DCU IP prefetcher preloads the L1 cache
with the data it determines to be the most relevant.
• platform-default —The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Direct Cache Access Allows processors to increase I/O performance by placing data
from I/O devices directly into the processor cache. This setting
set direct-cache-access-config access
helps to reduce cache misses. This can be one of the following:
• disabled—Data from I/O devices is not placed directly
into the processor cache.
• enabled—Data from I/O devices is placed directly into
the processor cache.
• platform-default —The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Processor C State Whether the system can enter a power savings mode during idle
periods. This can be one of the following:
set processor-c-state-config c-state
• disabled—The system remains in a high-performance
state even when idle.
• enabled—The system can reduce power to system
components such as the DIMMs and CPUs.
• platform-default —The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Name Description
Processor C1E Allows the processor to transition to its minimum frequency
upon entering C1. This setting does not take effect until after
set processor-c1e-config c1e
you have rebooted the server. This can be one of the following:
• disabled—The CPU continues to run at its maximum
frequency in the C1 state.
• enabled—The CPU transitions to its minimum frequency.
This option saves the maximum amount of power in the
C1 state.
• platform-default —The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Processor C3 Report Whether the processor sends the C3 report to the operating
system. This can be one of the following:
set processor-c3-report-config
processor-c3-report • disabled—The processor does not send the C3 report.
• acpi-c2—The processor sends the C3 report using the
advanced configuration and power interface (ACPI) C2
format.
• acpi-c3—The processor sends the C3 report using the
ACPI C3 format.
• platform-default —The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
On the Cisco UCS B440 Server, the BIOS Setup menu uses
enabled and disabled for these options. If you specify acpi-c2
or acpi-c2, the server sets the BIOS value for that option to
enabled.
Processor C6 Report Whether the processor sends the C6 report to the operating
system. This can be one of the following:
set processor-c6-report-config
processor-c6-report • disabled—The processor does not send the C6 report.
• enabled—The processor sends the C6 report.
• platform-default —The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Name Description
Processor C7 Report Whether the processor sends the C7 report to the operating
system. This can be one of the following:
set processor-c7-report-config
processor-c7-report • disabled—The processor does not send the C7 report.
• enabled—The processor sends the C7 report.
• platform-default —The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
CPU Performance Sets the CPU performance profile for the server. This can be
one of the following:
set cpu-performance-config
cpu-performance • enterprise—For M3 servers, all prefetchers and data reuse
are enabled. For M1 and M2 servers, data reuse and the
DCU IP prefetcher are enabled, and all other prefetchers
are disabled.
• high-throughput—Data reuse and the DCU IP prefetcher
are enabled, and all other prefetchers are disabled.
• hpc—All prefetchers are enabled and data reuse is
disabled. This setting is also known as high-performance
computing.
Max Variable MTRR Setting Allows you to select the number of mean time to repair (MTRR)
variables. This can be one of the following:
set max-variable-mtrr-setting-config
processor-mtrr • auto-max—BIOS uses the default value for the processor.
• 8—BIOS uses the number specified for the variable
MTRR.
• platform-default —The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Name Description
Local X2 APIC Allows you to set the type of Application Policy Infrastructure
Controller (APIC) architecture. This can be one of the following:
set local-x2-apic-config localx2-apic
• xapic—Uses the standard xAPIC architecture.
• x2apic—Uses the enhanced x2APIC architecture to
support 32 bit addressability of processors.
• auto—Automatically uses the xAPIC architecture that is
detected.
• platform-default —The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Power Technology Enables you to configure the CPU power management settings
for the following options:
set processor-energy-config
cpu-power-management • Enhanced Intel Speedstep Technology
• Intel Turbo Boost Technology
• Processor Power State C6
Name Description
Energy Performance Allows you to determine whether system performance or energy
efficiency is more important on this server. This can be one of
set processor-energy-config
the following:
energy-performance
• performance
• balanced-performance
• balanced-energy
• energy-efficient
• platform-default —The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Name Description
P-STATE Coordination Allows you to define how BIOS communicates the P-state
support model to the operating system. There are 3 models as
set p-state-coordination-config p-state
defined by the Advanced Configuration and Power Interface
(ACPI) specification.
• hw-all—The processor hardware is responsible for
coordinating the P-state among logical processors with
dependencies (all logical processors in a package).
• sw-all—The OS Power Manager (OSPM) is responsible
for coordinating the P-state among logical processors with
dependencies (all logical processors in a physical package),
and must initiate the transition on all of the logical
processors.
• sw-all—The OS Power Manager (OSPM) is responsible
for coordinating the P-state among logical processors with
dependencies (all logical processors in a package), and
may initiate the transition on any of the logical processors
in the domain.
• platform-default —The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Name Description
Channel Interleaving Whether the CPU divides memory blocks and spreads
set interleave-config channel-interleave contiguous portions of data across interleaved channels to enable
simultaneous read operations. This can be one of the following:
• Auto—The CPU determines what interleaving is done.
• 1-way—Some channel interleaving is used.
• 2-way
• 3-way
• 4-way—The maximum amount of channel interleaving is
used.
• platform-default —The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Rank Interleaving Whether the CPU interleaves physical ranks of memory so that
one rank can be accessed while another is being refreshed. This
set interleave-config rank-interleave
can be one of the following:
• Auto—The CPU determines what interleaving is done.
• 1-way—Some rank interleaving is used.
• 2-way
• 4-way
• 8-way—The maximum amount of rank interleaving is
used.
• platform-default —The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Memory Interleaving Whether the CPU interleaves the physical memory so that the
set interleave-config memory-interleave memory can be accessed while another is being refreshed. This
can be one of the following:
• Auto—The CPU determines what interleaving is done.
• 1-way—Some memory interleaving is used.
• 2-way
• 4-way
• platform-default —The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Name Description
Demand Scrub Whether the system corrects single bit memory errors
set scrub-policies-config demand-scrub encountered when the CPU or I/O makes a demand read. This
can be one of the following:
• disabled— Single bit memory errors are not corrected.
• enabled— Single bit memory errors are corrected in
memory and the corrected data is set in response to the
demand read.
• platform-default —The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Patrol Scrub Whether the system actively searches for, and corrects, single
bit memory errors even in unused portions of the memory on
set scrub-policies-config patrol-scrub
the server. This can be one of the following:
• disabled—The system checks for memory ECC errors
only when the CPU reads or writes a memory address.
• enabled—The system periodically reads and writes
memory searching for ECC errors. If any errors are found,
the system attempts to fix them. This option may correct
single bit errors before they become multi-bit errors, but
it may adversely affect performance when the patrol scrub
is running.
• platform-default —The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Altitude The approximate number of meters above sea level at which the
physical server is installed. This can be one of the following:
set altitude altitude-config
• auto—The CPU determines the physical elevation.
• 300-m—The server is approximately 300 meters above
sea level.
• 900-m—The server is approximately 900 meters above
sea level.
• 1500-m—The server is approximately 1500 meters above
sea level.
• 3000-m—The server is approximately 3000 meters above
sea level.
• platform-default —The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Name Description
Package C State Limit The amount of power available to the server components when
they are idle. This can be one of the following:
set package-c-state-limit-config
package-c-state-limit • auto
• no-limit—The server may enter any available C state.
• c0—The server provides all server components with full
power at all times. This option maintains the highest level
of performance and requires the greatest amount of power.
• c1—When the CPU is idle, the system slightly reduces
the power consumption. This option requires less power
than C0 and allows the server to return quickly to high
performance mode.
• c3—When the CPU is idle, the system reduces the power
consumption further than with the C1 option. This requires
less power than C1 or C0, but it takes the server slightly
longer to return to high performance mode.
• c6—When the CPU is idle, the system reduces the power
consumption further than with the C3 option. This option
saves more power than C0, C1, or C3, but there may be
performance issues until the server returns to full power.
• c2—When the CPU is idle, the system reduces the power
consumption further than with the C1 option. This requires
less power than C1 or C0, but it takes the server slightly
longer to return to high performance mode.
• c7—When the CPU is idle, the server makes a minimal
amount of power available to the components. This option
saves the maximum amount of power but it also requires
the longest time for the server to return to high
performance mode.
• c7s—When the CPU is idle, the server makes a minimal
amount of power available to the components. This option
saves more power than C7, but it also requires the longest
time for the server to return to high performance mode.
• platform-default —The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Name Description
CPU Hardware Power Management Enables processor Hardware Power Management (HWPM).
This can be one of the following:
set
cpu-hardware-power-management-config • platform-default —The BIOS uses the value for this
cpu-hardware-power-management attribute contained in the BIOS defaults for the server type
and vendor.
• disabled—HWPM is disabled.
• hwpm-native-mode—HWPM native mode is enabled.
• hwpm-oob-mode—HWPM Out-Of-Box mode is enabled.
Energy Performance Tuning Determines if the BIOS or Operating System can turn on the
energy performance bias tuning. The options are BIOS and OS.
Workload Configuration This feature allows for workload optimization. The options are
Balanced and I/O Sensitive. Cisco recommends using Balanced.
Name Description
VT for Directed IO Whether the processor uses Intel Virtualization Technology for
Directed I/O (VT-d). This can be one of the following:
set intel-vt-directed-io-config vtd
• disabled—The processor does not use virtualization
technology.
• enabled—The processor uses virtualization technology.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Name Description
Interrupt Remap Whether the processor supports Intel VT-d Interrupt Remapping.
This can be one of the following:
set intel-vt-directed-io-config
interrupt-remapping • disabled—The processor does not support remapping.
• enabled—The processor uses VT-d Interrupt Remapping
as required.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Coherency Support Whether the processor supports Intel VT-d Coherency. This can
be one of the following:
set intel-vt-directed-io-config
coherency-support • disabled—The processor does not support coherency.
• enabled—The processor uses VT-d Coherency as required.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
ATS Support Whether the processor supports Intel VT-d Address Translation
set intel-vt-directed-io-config ats-support Services (ATS). This can be one of the following:
• disabled—The processor does not support ATS.
• enabled—The processor uses VT-d ATS as required.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Pass Through DMA Support Whether the processor supports Intel VT-d Pass-through DMA.
This can be one of the following:
set intel-vt-directed-io-config
passthrough-dma • disabled—The processor does not support pass-through
DMA.
• enabled—The processor uses VT-d Pass-through DMA
as required.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Name Description
Memory RAS Config How the memory reliability, availability, and serviceability
(RAS) is configured for the server. This can be one of the
set memory-ras-config ras-config
following:
• maximum-performance—System performance is
optimized.
• mirroring—System reliability is optimized by using half
the system memory as backup.
• lockstep—If the DIMM pairs in the server have an
identical type, size, and organization and are populated
across the SMI channels, you can enable lockstep mode
to minimize memory access latency and provide better
performance. Lockstep is enabled by default for B440
servers.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
NUMA Whether the BIOS supports NUMA. This can be one of the
following:
set numa-config numa-optimization
• disabled—The BIOS does not support NUMA.
• enabled—The BIOS includes the ACPI tables that are
required for NUMA-aware operating systems. If you
enable this option, the system must disable Inter-Socket
Memory interleaving on some platforms.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Name Description
Mirroring Mode Memory mirroring enhances system reliability by keeping two
identical data images in memory.
set memory-mirroring-mode
mirroring-mode This option is only available if you choose the mirroring option
for Memory RAS Config. It can be one of the following:
• inter-socket—Memory is mirrored between two Integrated
Memory Controllers (IMCs) across CPU sockets.
• intra-socket—One IMC is mirrored with another IMC in
the same socket.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
LV DDR Mode Whether the system prioritizes low voltage or high frequency
set lv-dimm-support-config lv-ddr-mode memory operations. This can be one of the following:
• power-saving-mode—The system prioritizes low voltage
memory operations over high frequency memory
operations. This mode may lower memory frequency in
order to keep the voltage low.
• performance-mode—The system prioritizes high
frequency operations over low voltage operations.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Name Description
DRAM Refresh Rate The refresh interval rate for internal memory. This can be one
of the following:
set dram-refresh-rate-config
dram-refresh • 1x
• 2x
• 3x
• 4x
• auto
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
DDR3 Voltage Selection The voltage to be used by the dual-voltage RAM. This can be
one of the following:
set ddr3-voltage-config ddr3-voltage
• ddr3-1500mv
• ddr3-1350mv
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Name Description
Serial Port A Whether serial port A is enabled or disabled. This can be one
of the following:
set serial-port-a-config serial-port-a
• disabled—The serial port is disabled.
• enabled—The serial port is enabled.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Name Description
Make Device Non Bootable Whether the server can boot from a USB device. This can be
one of the following:
set usb-boot-config
make-device-non-bootable • disabled—The server can boot from a USB device.
• enabled—The server cannot boot from a USB device.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Legacy USB Support Whether the system supports legacy USB devices. This can be
one of the following:
set usb-boot-config legacy-support
• disabled—USB devices are only available to EFI
applications.
• enabled—Legacy USB support is always available.
• auto—Disables legacy USB support if no USB devices
are connected.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
USB System Idle Power Optimizing Whether the USB System Idle Power Optimizing setting is used
Setting to reduce USB EHCI idle power consumption. Depending upon
the value you choose, this setting can have an impact on
set
performance. This can be one of the following:
usb-system-idle-power-optimizing-setting-config
usb-idle-power-optimizing • high-performance—The USB System Idle Power
Optimizing setting is disabled, because optimal
performance is preferred over power savings.
Selecting this option can significantly improve
performance. We recommend you select this option unless
your site has server power restrictions.
• lower-idle-power—The USB System Idle Power
Optimizing setting is enabled, because power savings are
preferred over optimal performance.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Name Description
USB Front Panel Access Lock USB front panel lock is configured to enable or disable the front
panel access to USB ports. This can be one of the following:
set usb-front-panel-access-lock-config
usb-front-panel-lock • disabled
• enabled
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Port 60/64 Emulation Whether the system supports 60h/64h emulation for complete
USB keyboard legacy support. This can be one of the following:
set usb-port-config usb-emulation
• disabled—60h/64 emulation is not supported.
• enabled—60h/64 emulation is supported.
You should select this option if you are using a non-USB
aware operating system on the server.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
USB Port:Front Whether the front panel USB devices are enabled or disabled.
This can be one of the following:
set usb-port-config usb-front
• disabled—Disables the front panel USB ports. Devices
connected to these ports are not detected by the BIOS and
operating system.
• enabled—Enables the front panel USB ports. Devices
connected to these ports are detected by the BIOS and
operating system.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Name Description
USB Port:Internal Whether the internal USB devices are enabled or disabled. This
can be one of the following:
set usb-port-config usb-internal
• disabled—Disables the internal USB ports. Devices
connected to these ports are not detected by the BIOS and
operating system.
• enabled—Enables the internal USB ports. Devices
connected to these ports are detected by the BIOS and
operating system.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
USB Port:KVM Whether the KVM ports are enabled or disabled. This can be
one of the following:
set usb-port-config usb-kvm
• disabled—Disables the KVM keyboard and/or mouse
devices. Keyboard and/or mouse will not work in the KVM
window.
• enabled—Enables the KVM keyboard and/or mouse
devices.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
USB Port:Rear Whether the rear panel USB devices are enabled or disabled.
This can be one of the following:
set usb-port-config usb-rear
• disabled—Disables the rear panel USB ports. Devices
connected to these ports are not detected by the BIOS and
operating system.
• enabled—Enables the rear panel USB ports. Devices
connected to these ports are detected by the BIOS and
operating system.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Name Description
USB Port:SD Card Whether the SD card drives are enabled or disabled. This can
be one of the following:
set usb-port-config usb-sdcard
• disabled—Disables the SD card drives. The SD card drives
are not detected by the BIOS and operating system.
• enabled—Enables the SD card drives.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
USB Port:VMedia Whether the virtual media devices are enabled or disabled. This
can be one of the following:
set usb-port-config usb-vmedia
• disabled—Disables the vMedia devices.
• enabled—Enables the vMedia devices.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
All USB Devices Whether all physical and virtual USB devices are enabled or
disabled. This can be one of the following:
set all-usb-devices-config all-usb
• disabled—All USB devices are disabled.
• enabled—All USB devices are enabled.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
xHCI Mode Support Whether xHCI mode support is enabled or disabled. This can
be one of the following:
set usb-configuration-select-config
xhci-enable-disable • disabled—xHCI mode support is disabled.
• enabled—xHCI mode support is enabled.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Name Description
Max Memory Below 4G Whether the BIOS maximizes memory usage below 4GB for
an operating system without PAE support, depending on the
set max-memory-below-4gb-config
system configuration. This can be one of the following:
max-memory
• disabled—Does not maximize memory usage. Choose
this option for all operating systems with PAE support.
• enabled—Maximizes memory usage below 4GB for an
operating system without PAE support.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Memory Mapped IO Above 4Gb Config Whether to enable or disable memory mapped I/O of 64-bit PCI
set memory-mapped-io-above-4gb-config devices to 4GB or greater address space. Legacy option ROMs
are not able to access addresses above 4GB. PCI devices that
memory-mapped-io
are 64-bit compliant but use a legacy option ROM may not
function correctly with this setting enabled. This can be one of
the following:
• disabled—Does not map I/O of 64-bit PCI devices to 4GB
or greater address space.
• enabled—Maps I/O of 64-bit PCI devices to 4GB or
greater address space.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Name Description
VGA Priority Allows you to set the priority for VGA graphics devices if
multiple VGA devices are found in the system. This can be one
set vga-priority-config vga-priority
of the following:
• onboard—Priority is given to the onboard VGA device.
BIOS post screen and OS boot are driven through the
onboard VGA port.
• offboard—Priority is given to the PCIE Graphics adapter.
BIOS post screen and OS boot are driven through the
external graphics adapter port.
• onboard-vga-disabled—Priority is given to the PCIE
Graphics adapter, and the onboard VGA device is disabled.
Note The vKVM does not function when the onboard
VGA is disabled.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Name Description
QPI Link Frequency The Intel QuickPath Interconnect (QPI) link frequency, in megatransfers
per second (MT/s). This can be one of the following:
set
qpi-link-frequency-select-config • 6400
qpi-link-freqency-mt-per-sec
• 7200
• 8000
• 9600
• Auto—The CPU determines the QPI link frequency.
• platform-default —The BIOS uses the value for this attribute
contained in the BIOS defaults for the server type and vendor.
Name Description
PCIe Slot:SAS OptionROM Whether Option ROM is available on the SAS port.
This can be one of the following:
set slot-option-rom-enable-config pcie-sas
• disabled—The expansion slot is not available.
• enabled—The expansion slot is available.
• uefi-only
—The expansion slot is available for UEFI
only.
• legacy-only—The expansion slot is available
for legacy only.
• platform-default—The BIOS uses the value
for this attribute contained in the BIOS
defaults for the server type and vendor.
PCIe Slot:n Link Speed This option allows you to restrict the maximum
speed of an adapter card installed in PCIe slot n.
set slot-link-speed-config pcie-slotn-link-speed
This can be one of the following:
• gen1—2.5GT/s (gigatransfers per second) is
the maximum speed allowed.
• gen2—5GT/s is the maximum speed allowed.
• gen3—8GT/s is the maximum speed allowed.
• auto—The maximum speed is set
automatically.
• disabled—The maximum speed is not
restricted.
• platform-default—The BIOS uses the value
for this attribute contained in the BIOS
defaults for the server type and vendor.
Name Description
PCIe Slot:n OptionROM Whether Option ROM is available on the port. This
can be one of the following:
set slot-option-rom-enable-config
slotn-option-rom-enable • disabled—The expansion slot is not available.
• enabled—The expansion slot is available.
• uefi-only
—The expansion slot is available for UEFI
only.
• legacy-only—The expansion slot is available
for legacy only.
• platform-default—The BIOS uses the value
for this attribute contained in the BIOS
defaults for the server type and vendor.
PCIe Slot:HBA OptionROM Whether Option ROM is available on the HBA port.
This can be one of the following:
set slot-option-rom-enable-config pcie-hba
• disabled—The expansion slot is not available.
• enabled—The expansion slot is available.
• uefi-only
—The expansion slot is available for UEFI
only.
• legacy-only—The expansion slot is available
for legacy only.
• platform-default—The BIOS uses the value
for this attribute contained in the BIOS
defaults for the server type and vendor.
Name Description
PCIe Slot:N1 OptionROM Whether Option ROM is available on the port. This
can be one of the following:
set slot-option-rom-enable-config pcie-n1
• disabled—The expansion slot is not available.
• enabled—The expansion slot is available.
• uefi-only
—The expansion slot is available for UEFI
only.
• legacy-only—The expansion slot is available
for legacy only.
• platform-default—The BIOS uses the value
for this attribute contained in the BIOS
defaults for the server type and vendor.
PCIe Slot:N2 OptionROM Whether Option ROM is available on the port. This
can be one of the following:
set slot-option-rom-enable-config pcie-n2
• Disabled—The expansion slot is not available.
• Enabled—The expansion slot is available.
• uefi-only
—The expansion slot is available for UEFI
only.
• legacy-only—The expansion slot is available
for legacy only.
• platform-default—The BIOS uses the value
for this attribute contained in the BIOS
defaults for the server type and vendor.
PCIe 10G LOM 2 Link Whether Option ROM is available on the 10G LOM
port. This can be one of the following:
set lom-ports-config pcie-lom2-link
• disabled—The expansion slot is not available.
• enabled—The expansion slot is available.
• platform-default—The BIOS uses the value
for this attribute contained in the BIOS
defaults for the server type and vendor.
Name Description
PCI ROM CLP
• disabled—The expansion slot is not available.
set pci-rom-clp-support pci-rom-clp-config
• enabled—The expansion slot is available.
• platform-default—The BIOS uses the value
for this attribute contained in the BIOS
defaults for the server type and vendor.
Name Description
SB MEZZ1 Option ROM
• disabled—The expansion slot is not available.
set sbmezz1-optionrom-config sbmezz1-optionrom
• enabled—The expansion slot is available.
• uefi-only
—The expansion slot is available for UEFI
only.
• legacy-only—The expansion slot is available
for legacy only.
• platform-default—The BIOS uses the value
for this attribute contained in the BIOS
defaults for the server type and vendor.
Name Description
IOE Slot2 Option ROM
• disabled—The expansion slot is not available.
set ioeslot2-optionrom-config ioeslot2-optionrom
• enabled—The expansion slot is available.
• uefi-only
—The expansion slot is available for UEFI
only.
• legacy-only—The expansion slot is available
for legacy only.
• platform-default—The BIOS uses the value
for this attribute contained in the BIOS
defaults for the server type and vendor.
Name Description
SBNVME1 Option ROM
• disabled—The expansion slot is not available.
set sbnvme1-optionrom-config sbnvme1-optionrom
• enabled—The expansion slot is available.
• uefi-only
—The expansion slot is available for UEFI
only.
• legacy-only—The expansion slot is available
for legacy only.
• platform-default—The BIOS uses the value
for this attribute contained in the BIOS
defaults for the server type and vendor.
Name Description
Integrated Graphics Enables integrated graphics. This can be one of the following:
set integrated-graphics-config • platform-default—The BIOS uses the value for this
integrated-graphics attribute contained in the BIOS defaults for the server type
and vendor.
• enabled—Integrated graphic is enabled.
• disabled—Integrated graphics is disabled.
Aperture Size Allows you to set the size of mapped memory for the integrated
set integrated-graphics-aperture-config graphics controller. This can be one of the following:
integrated-graphics-aperture • platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
• 128mb
• 256mb
• 512mb
• 1024mb
• 2048mb
• 4096mb
Name Description
Onboard Graphics Enables onboard graphics (KVM). This can be one of the
following:
set onboard-graphics-config
onboard-graphics • platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
• enabled—Onboard graphics is enabled.
• disabled—Onboard graphics is disabled.
Name Description
Boot Option Retry Whether the BIOS retries NON-EFI based boot options without
waiting for user input. This can be one of the following:
set boot-option-retry-config retry
• disabled—Waits for user input before retrying NON-EFI
based boot options.
• enabled—Continually retries NON-EFI based boot options
without waiting for user input.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Intel Entry SAS RAID Whether the Intel SAS Entry RAID Module is enabled. This
can be one of the following:
set intel-entry-sas-raid-config sas-raid
• disabled—The Intel SAS Entry RAID Module is disabled.
• enabled—The Intel SAS Entry RAID Module is enabled.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Name Description
Intel Entry SAS RAID Module How the Intel SAS Entry RAID Module is configured. This can
be one of the following:
set intel-entry-sas-raid-config
sas-raid-module • it-ir-raid—Configures the RAID module to use Intel IT/IR
RAID.
• intel-esrtii—Configures the RAID module to use Intel
Embedded Server RAID Technology II.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Onboard SCU Storage Support Whether the onboard software RAID controller is available to
the server. This can be one of the following:
set onboard-sas-storage-config
onboard-sas-ctrl • disabled—The software RAID controller is not available.
• enabled—The software RAID controller is available.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Note BIOS parameter virtualization capability in Cisco UCS Manager maps a unified set of BIOS settings in
a service profile to the actual BIOS supporting parameters. However, not all BIOS setting items are
applicable to every server model/platform. When you create a custom BIOS policy and have the Boot
Option Retry selected, and when there is no bootable option available, the reboot fails on the Cisco UCS
B420 M3 or Cisco UCS B420 M4 servers and Cisco UCS Manager displays this message : Reboot and
Select proper Boot device or Insert Boot Media in selected Boot device and press a key. You must manually
set a boot option after the boot path is corrected, in order to enable the servers to reboot after a power
outage. For more information about BIOS default server policies and the BIOS options and their default
settings, see BIOS Policy, on page 444 and Server BIOS Settings, on page 403.
General Settings
Name Description
Assert Nmi on Serr Whether the BIOS generates a non-maskable interrupt (NMI)
and logs an error when a system error (SERR) occurs. This can
set assert-nmi-on-serr-config assertion
be one of the following:
• disabled—The BIOS does not generate an NMI or log an
error when a SERR occurs.
• enabled—The BIOS generates an NMI and logs an error
when a SERR occurs. You must enable this setting if you
want to enable Assert Nmi on Perr.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Assert Nmi on Perr Whether the BIOS generates a non-maskable interrupt (NMI)
set assert-nmi-on-perr-config assertion and logs an error when a processor bus parity error (PERR)
occurs. This can be one of the following:
• disabled—The BIOS does not generate an NMI or log an
error when a PERR occurs.
• enabled—The BIOS generates an NMI and logs an error
when a PERR occurs. You must enable Assert Nmi on
Serr to use this setting.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
OS Boot Watchdog Timer Whether the BIOS programs the watchdog timer with a
predefined timeout value. If the operating system does not
set os-boot-watchdog-timer-config
complete booting before the timer expires, the CIMC resets the
os-boot-watchdog-timer
system and an error is logged. This can be one of the following:
• disabled—The watchdog timer is not used to track how
long the server takes to boot.
• enabled—The watchdog timer tracks how long the server
takes to boot. If the server does not boot within the
predefined length of time, the CIMC resets the system and
logs an error.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Name Description
OS Boot Watchdog Timer Timeout What action the system takes if the watchdog timer expires.
Policy This can be one of the following:
set os-boot-watchdog-timer-policy-config • power-off—The server is powered off if the watchdog
os-boot-watchdog-timer-policy timer expires during OS boot.
• reset—The server is reset if the watchdog timer expires
during OS boot.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
OS Boot Watchdog Timer Timeout What timeout value the BIOS uses to configure the watchdog
timer. This can be one of the following:
set
os-boot-watchdog-timer-timeout-config • 5-minutes—The watchdog timer expires 5 minutes after
os-boot-watchdog-timer-timeout the OS begins to boot.
• 10-minutes—The watchdog timer expires 10 minutes after
the OS begins to boot.
• 15-minutes—The watchdog timer expires 15 minutes after
the OS begins to boot.
• 20-minutes—The watchdog timer expires 20 minutes after
the OS begins to boot.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
FRB-2 Timer Whether the FRB-2 timer is used to recover the system if it
hangs during POST. This can be one of the following:
set frb-2-timer-config frb-2-timer
• Disabled—The FRB-2 timer is not used.
• Enabled—The FRB-2 timer is started during POST and
used to recover the system if necessary.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Name Description
Console Redirection Allows a serial port to be used for console redirection during
POST and BIOS booting. After the BIOS has booted and the
set console-redir-config console-redir
operating system is responsible for the server, console redirection
is irrelevant and has no effect. This can be one of the following:
• disabled—No console redirection occurs during POST.
• serial-port-a—Enables serial port A for console
redirection during POST. This option is valid for blade
servers and rack-mount servers.
• serial-port-b—Enables serial port B for console
redirection and allows it to perform server management
tasks. This option is only valid for rack-mount servers.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Note If you enable this option, you also disable the display
of the Quiet Boot logo screen during POST.
Flow Control Whether a handshake protocol is used for flow control. Request
to Send / Clear to Send (RTS/CTS) helps to reduce frame
set console-redir-config flow-control
collisions that can be introduced by a hidden terminal problem.
This can be one of the following:
• none—No flow control is used.
• rts-cts—RTS/CTS is used for flow control.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Name Description
BAUD Rate What BAUD rate is used for the serial port transmission speed.
If you disable Console Redirection, this option is not available.
set console-redir-config baud-rate
This can be one of the following:
• 9600—A 9600 BAUD rate is used.
• 19200—A 19200 BAUD rate is used.
• 38400—A 38400 BAUD rate is used.
• 57600—A 57600 BAUD rate is used.
• 115200—A 115200 BAUD rate is used.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Name Description
Putty KeyPad Allows you to change the action of the PuTTY function keys
and the top row of the numeric keypad. This can be one of the
set console-redir-config
following:
putty-function-keypad
• vt100—The function keys generate ESC OP through ESC
O[.
• linux—Mimics the Linux virtual console. Function keys
F6 to F12 behave like the default mode, but F1 to F5
generate ESC [[A through ESC [[E.
• xtermr6—Function keys F5 to F12 behave like the default
mode. Function keys F1 to F4 generate ESC OP through
ESC OS, which are the sequences produced by the top
row of the keypad on Digital terminals.
• sco—The function keys F1 to F12 generate ESC [M
through ESC [X. The function and shift keys generate ESC
[Y through ESC [j. The control and function keys generate
ESC [k through ESC [v. The shift, control and function
keys generate ESC [w through ESC [{.
• escn—The default mode. The function keys match the
general behavior of Digital terminals. The function keys
generate sequences such as ESC [11~ and ESC [12~.
• vt400—The function keys behave like the default mode.
The top row of the numeric keypad generates ESC OP
through ESC OS.
• platform-default—The BIOS uses the value for this
attribute contained in the BIOS defaults for the server type
and vendor.
Out of Band Management Used for Windows Special Administration Control (SAC).
BIOS Policy
The BIOS policy is a policy that automates the configuration of BIOS settings for a server or group of servers.
You can create global BIOS policies available to all servers in the root organization, or you can create BIOS
policies in sub-organizations that are only available to that hierarchy.
To use a BIOS policy, do the following:
1 Create the BIOS policy in Cisco UCS Manager.
2 Assign the BIOS policy to one or more service profiles.
3 Associate the service profile with a server.
During service profile association, Cisco UCS Manager modifies the BIOS settings on the server to match
the configuration in the BIOS policy. If you do not create and assign a BIOS policy to a service profile, the
server uses the default BIOS settings for that server platform.
You can modify the default BIOS settings provided by Cisco UCS Manager. However, any changes to the
default BIOS settings apply to all servers of that particular type or platform. If you want to modify the BIOS
settings for only certain servers, we recommend that you use a BIOS policy.
Note Cisco UCS Manager pushes BIOS configuration changes through a BIOS policy or default BIOS settings
to the Cisco Integrated Management Controller (CIMC) buffer. These changes remain in the buffer and
do not take effect until the server is rebooted.
We recommend that you verify the support for BIOS settings in the server that you want to configure.
Some settings, such as Mirroring Mode for RAS Memory, are not supported by all Cisco UCS servers.
Procedure
Step 2 UCS-A /org # create Creates a BIOS policy with the specified policy name, and enters
bios-policy policy-name org BIOS policy mode.
Step 3 Configure the BIOS For the CLI commands, descriptions and information about the
settings. options for each BIOS setting, see the following topics:
• Main page: Main BIOS Settings, on page 404
The following example creates a BIOS policy under the root organization and commits the transaction:
UCS-A# scope org /
UCS-A /org # create bios-policy biosPolicy3
UCS-A /org/bios-policy* # set numa-config numa-optimization enabled
UCS-A /org/bios-policy* # commit-buffer
UCS-A /org/bios-policy #
Procedure
Step 3 UCS-A /system/server-defaults # show (Optional) Displays platform descriptions for all
platform servers.
Step 6 Reconfigure the BIOS settings. For the CLI commands, descriptions and information
about the options for each BIOS setting, see the
following topics:
• Main page: Main BIOS Settings, on page 404
• Processor page: Processor BIOS Settings, on
page 406
• Intel Directed IO page: Intel Directed I/O
BIOS Settings, on page 419
• RAS Memory page: RAS Memory BIOS
Settings, on page 421
• Serial Port page: Serial Port BIOS Settings,
on page 423
• USB page: USB BIOS Settings, on page 424
• PCI Configuration page: PCI Configuration
BIOS Settings, on page 427
• Boot Options page: Boot Options BIOS
Settings, on page 438
• Server Management page: Server
Management BIOS Settings, on page 439
The following example shows how to change the NUMA default BIOS setting for a platform and commit the
transaction:
UCS-A# scope system
UCS-A /system # scope server-defaults
UCS-A /system/server-defaults # show platform
Platform:
Product Name Vendor Model Revision
Procedure
Step 2 UCS-A /chassis/server # scope bios Enters BIOS mode for the specified server.
Step 3 UCS-A /chassis/server/bios # scope Enters BIOS settings mode for the specified
bios-settings server.
Intel Vt Config:
Vt
--
Enabled
UCS-A /chassis/server/bios/bios-settings #
environments. It is a requirement for the Intel Trusted Execution Technology (TXT) security feature, which
must be enabled in the BIOS settings for a server equipped with a TPM. Cisco UCS M4 blade and rack-mount
servers include support for TPM. TPM is enabled by default on these servers.
Important • If you upgrade Cisco UCS Manager to Release 2.2(4), TPM is enabled.
• When TPM is enabled and you downgrade Cisco UCS Manager from Release 2.2(4), TPM is disabled.
Trusted Platform
The modular servers in Cisco UCSME-2814 compute cartridges include support for TPM and TXT. Cisco
UCS M4 blade and rack-mount servers include support for TPM and TXT. UCS Manager Release 2.5(2)UCS
Manager Release 2.2(4) allows you to perform the following operations on TPM and TXT:
• Enabling or Disabling TPM, on page 449
• Enabling or Disabling TXT, on page 450
• Clearing TPM for a Blade Server, on page 717 or Clearing TPM for a Rack-Mount Server, on page 731
Note For Cisco UCS M3 blade servers, press F2 to enter the BIOS setup menu and change the settings.
Procedure
Step 5 UCS-A /org # create service-profile Creates the service profile specified and enters
sp-name} service profile configuration mode.
Step 6 UCS-A /org/service-profile* # set Associates the specified BIOS policy with the
bios-policy policy-name service profile.
Step 8 UCS-A /org/service-profile # associate Associates the service profile with a single server.
server chassis-id / slot-id
Procedure
Step 2 UCS-A /org # create bios-policy Creates a BIOS policy with the specified policy
policy-name name, and enters org BIOS policy mode.
Step 5 UCS-A /org # create service-profile Creates the service profile specified and enters
sp-name} service profile configuration mode.
Step 6 UCS-A /org/service-profile* # set Associates the specified BIOS policy with the
bios-policy policy-name service profile.
Step 8 UCS-A /org/service-profile # associate Associates the service profile with a single server.
server chassis-id / slot-id
If this is not done, the vNICs will not come up with the configured CDN names.
• When the applied BIOS policy is changed from CDN-disabled to CDN-enabled or from CDN-enabled
to CDN-disabled on a service profile, do the following:
1 Uninstall the network drivers.
2 Scan the system for hidden devices and delete them.
3 Rescan the system for new hardware and install the network drivers again.
Note When the BIOS policy is changed from CDN-enabled to CDN-disabled, ensure that the
CDN names are removed from all the vNICs on the system.
• If any change is made to the vNICs, the BDF of all the devices on the system also changes. Following
are some of the scenarios that trigger a change in the BDF of all the vNICs present on the system:
◦When a vNIC is added or deleted
◦When a vNIC is moved from one adapter on the system to another adapter on the system
If the hidden devices are not deleted, the CDN names of the network adapters will not appear as configured
on Cisco UCS Manager.
Procedure
Step 2 UCS-A /org # create bios-policy Creates a BIOS policy with the specified policy
policy-name name, and enters org BIOS policy mode.
Step 3 UCS-A /org/bios-policy* # set Specifies whether consistent device naming (CDN)
consistent-device-name-control is enabled or disabled.
cdn-name {enabled | disabled |
platform-default}
Step 4 UCS-A /org/bios-policy* # commit-buffer Commits the transaction to the system
configuration.
Procedure
Step 2 UCS-A /org # scope service-profile Enters service profile configuration mode for the
sp-name} specified service profile.
Step 3 UCS-A /org/service-profile # set Associates the specified BIOS policy with the service
bios-policy policy-name profile.
The following example shows how to associate a CDN-enabled BIOS policy with a service profile:
Procedure
Step 2 UCS-A /org # scope service-profile Enters service profile configuration mode for the
sp-name specified service profile.
Step 3 UCS-A /org/service-profile # scope vnic Enters vNIC configuration mode for the specified
vnic-name vNIC.
Step 4 UCS-A /org/service-profile/vnic # set Specifies the CDN name for the vNIC.
cdn-name cdn-name
Step 5 UCS-A /org/service-profile/vnic* # Commits the transaction to the system
commit-buffer configuration.
Procedure
Step 2 UCS-A /server # scope adapter adapter-id Enters adapter mode for the specified adapter.
The following example shows how to display the CDN name of a vNIC:
Eth Interface:
ID: 1
Dynamic MAC Address: 00:25:B5:00:00:99
Burned-In MAC Address: 00:00:00:00:00:00
Model: UCSC-PCIE-CSC-02
Name: vnic1
Cdn Name: cdn0
Admin State: Enabled
Operability: Operable
Order: 1
Procedure
Step 2 UCS-A /org # scope service-profile Enters service profile configuration mode for the
sp-name specified service profile.
Step 3 UCS-A /org/service-profile # show vnic Displays the details of the vNIC in the specified
[detail] [expand] service profile.
Note The CDN name that you configured for the vNIC appears as the Admin CDN Name. The CDN name
that is finally applied to the BIOS policy appears as the Oper CDN Name.
vNIC:
Name: vnic1
Fabric ID: B
Procedure
Step 2 UCS-A /org # create Creates the specified IPMI access profile and enters
ipmi-access-profile profile-name organization IPMI access profile mode.
The following example creates an IPMI access profile named ReadOnly, creates an endpoint user named bob,
sets the password and the privileges for bob, and commits the transaction:
UCS-A# scope org /
UCS-A /org # create ipmi-access-profile ReadOnly
UCS-A /org/ipmi-access-profile* # create ipmi-user bob
UCS-A /org/ipmi-access-profile/ipmi-user* # set password
Enter a password:
Confirm the password:
UCS-A /org/ipmi-access-profile/ipmi-user* # set privilege readonly
UCS-A /org/ipmi-access-profile/ipmi-user* # commit-buffer
UCS-A /org/ipmi-access-profile/ipmi-user #
What to Do Next
Include the IPMI profile in a service profile and/or template.
Step 2 UCS-A /org # delete Deletes the specified IPMI access profile.
ipmi-access-profile profile-name
Step 3 UCS-A /org # commit-buffer Commits the transaction to the system configuration.
The following example deletes the IPMI access profile named ReadOnly and commits the transaction:
UCS-A# scope org /
UCS-A /org # delete ipmi-access-profile ReadOnly
UCS-A /org* # commit-buffer
UCS-A /org #
Step 2 UCS-A /org # scope Enters organization IPMI access profile mode for the
ipmi-access-profile profile-name specified IPMI access profile.
Step 3 UCS-A /org/ipmi-access-profile # Creates the specified endpoint user and enters
create ipmi-user ipmi-user-name organization IPMI access profile endpoint user mode.
Note More than one endpoint user can be created
within an IPMI access profile, with each
endpoint user having its own password and
privileges.
Step 4 UCS-A Sets the password for the endpoint user.
/org/ipmi-access-profile/ipmi-user # After entering the set password command, you are
set password
prompted to enter and confirm the password. For security
The following example adds an endpoint user named alice to the IPMI access profile named ReadOnly and
commits the transaction:
UCS-A# scope org /
UCS-A /org* # scope ipmi-access-profile ReadOnly
UCS-A /org/ipmi-access-profile* # create ipmi-user alice
UCS-A /org/ipmi-access-profile/ipmi-user* # set password
Enter a password:
Confirm the password:
UCS-A /org/ipmi-access-profile/ipmi-user* # set privilege readonly
UCS-A /org/ipmi-access-profile/ipmi-user* # commit-buffer
UCS-A /org/ipmi-access-profile/ipmi-user #
Step 2 UCS-A /org # scope ipmi-access-profile Enters organization IPMI access profile mode for
profile-name the specified IPMI access profile.
Step 3 UCS-A /org/ipmi-access-profile # delete Deletes the specified endpoint user from the IPMI
ipmi-user epuser-name access profile.
The following example deletes the endpoint user named alice from the IPMI access profile named ReadOnly
and commits the transaction:
UCS-A# scope org /
UCS-A /org # scope ipmi-access-profile ReadOnly
UCS-A /org/ipmi-access-profile # delete ipmi-user alice
UCS-A /org/ipmi-access-profile* # commit-buffer
UCS-A /org/ipmi-access-profile #
Note After a KVM vMedia session is mapped, if you change the KVM management policy, it will result in a
loss of the vMedia session. You must re-map the KVM vMedia session again.
Step 2 UCS-A /org # create kvm-mgmt-policy Creates the specified KVM management policy
policy-name and enters organization KVM management policy
mode.
The following example shows how to create a KVM management policy named KVM_Policy1, enable vMedia
encryption, and commit the transaction:
UCS-A# scope org /
UCS-A /org # create kvm-mgmt-policy KVM_Policy1
UCS-A /org/kvm-mgmt-policy* # set vmedia-encryption enable
UCS-A /org/kvm-mgmt-policy* # commit-buffer
UCS-A /org/kvm-mgmt-policy #
You must include this policy in a service profile and that service profile must be associated with a server for
the policy to take effect.
Note For a Cisco UCS C-Series server integrated with Cisco UCS Manager, with an embedded on-board RAID
controller, the local disk mode should always be Any Configuration, and the RAID must be configured
directly on the controller.
Do Not Assign a Service Profile with the Default Local Disk Configuration Policy from a B200 M1 or M2 to a
B200 M3
Due to the differences in the RAID/JBOD support provided by the storage controllers of B200 M1 and M2
servers and those of the B200 M3 server, you cannot assign or re-assign a service profile that includes the
default local disk configuration policy from a B200M1 or M2 server to a B200 M3 server. The default local
disk configuration policy includes those with Any Configuration or JBOD configuration.
Note Only B200 M1, B200 M2, B200 M3, B250 M1, B250 M2 and B22 M3 blade servers support the JBOD
mode for local disks.
Server May Not Boot After RAID1 Cluster Migration if Any Configuration Mode Specified in Service Profile
After RAID1 clusters are migrated, you need to associate a service profile with the server. If the local disk
configuration policy in the service profile is configured with Any Configuration mode rather than RAID1,
the RAID LUN remains in "inactive" state during and after association. As a result, the server cannot boot.
To avoid this issue, ensure that the service profile you associate with the server contains the identical local
disk configuration policy as the original service profile before the migration and does not include the Any
Configuration mode.
Maximum of One RAID Volume and One RAID Controller in Integrated Rack-Mount Servers
A rack-mount server that has been integrated with Cisco UCS Manager can have a maximum of one RAID
volume irrespective of how many hard drives are present on the server.
All the local hard drives in an integrated rack-mount server must be connected to only one RAID Controller.
Integration with Cisco UCS Manager does not support the connection of local hard drives to multiple RAID
Controllers in a single rack-mount server. We therefore recommend that you request a single RAID Controller
configuration when you order rack-mount servers to be integrated with Cisco UCS Manager.
In addition, do not use third party tools to create multiple RAID LUNs on rack-mount servers. Cisco UCS
Manager does not support that configuration.
Maximum of One RAID Volume and One RAID Controller in Blade Servers
A blade server can have a maximum of one RAID volume irrespective of how many drives are present in the
server. All the local hard drives must be connected to only one RAID controller. For example, a B200 M3
server has an LSI controller and an Intel Patsburg controller, but only the LSI controller can be used as a
RAID controller.
In addition, do not use third party tools to create multiple RAID LUNs on blade servers. Cisco UCS Manager
does not support that configuration.
Step 2 UCS-A /org # create Creates a local disk configuration policy and enters local
local-disk-config-policy policy-name disk configuration policy mode.
Step 4 UCS-A /org/local-disk-config-policy Specifies the mode for the local disk configuration policy.
# set mode {any-configuration |
no-local-storage | no-raid |
raid-0-striped | raid-1-mirrored |
raid-5-striped-parity |
raid-6-striped-dual-parity |
raid-10-mirrored-and-striped}
Step 5 UCS-A /org/local-disk-config-policy Specifies whether the server retains the configuration in the
# set protect {yes | no} local disk configuration policy even if the server is
disassociated from the service profile.
Caution Protect Configuration becomes non-functional
if one or more disks in the server are defective
or faulty.
When a service profile is disassociated from a server and a
new service profile associated, the setting for the Protect
Configuration property in the new service profile takes
precedence and overwrites the setting in the previous service
profile.
With this option enabled, the data on the disk is protected
even after the server is decommissioned and then
recommissioned. Hence, reassociation of the server with a
service profile fails.
The following example configures a local disk configuration policy and commits the transaction:
UCS-A# scope org /
UCS-A /org # create local-disk-config-policy DiskPolicy7
UCS-A /org/local-disk-config-policy* # set mode raid-1-mirrored
UCS-A /org/local-disk-config-policy* # set protect yes
UCS-A /org/local-disk-config-policy* # commit-buffer
UCS-A /org/local-disk-config-policy #
Step 2 UCS-A /org # show Displays the local disk policy. If you have not configured a local
local-disk-config-policy disk policy, the local disk configuration (created by the create
policy-name local-disk-config command) displays.
Displays the local disk definition (set by the create local-disk-config
command). If the serial over LAN definition is not set, and if a
policy is set (using the set local-disk-config-policy command), then
the policy will be displayed.
The following example shows how to display local disk policy information for a local disk configuration
policy called DiskPolicy7:
UCS-A# scope org /
UCS-A /org # show local-disk-config-policy DiskPolicy7
Step 2 UCS-A /org # delete Deletes the specified local disk configuration policy.
local-disk-config-policy policy-name
Step 3 UCS-A /org # commit-buffer Commits the transaction to the system configuration.
The following example deletes the local disk configuration policy named DiskPolicy7 and commits the
transaction:
UCS-A# scope org /
UCS-A /org # delete local-disk-config-policy DiskPolicy7
UCS-A /org* # commit-buffer
UCS-A /org #
FlexFlash Support
Overview
Cisco UCS B-Series, C-Series M3 and higher, and S-Series M4 servers support internal Secure Digital (SD)
memory cards. The SD cards are hosted by the Cisco Flexible Flash storage controller, a PCI-based controller
which has two slots for SD cards. The cards contain a single partition called HV. When FlexFlash is enabled,
Cisco UCS Manager displays the HV partition as a USB drive to both the BIOS and the host operating system.
You can populate one or both the SD card slots that are provided. If two SD cards are populated, you can use
them in a mirrored mode.
The SD cards can be used to store operating system boot images or other information. The following figure
illustrates the SD card slots.
FlexFlash is disabled by default. You can enable FlexFlash in a local disk policy used in a service profile.
When FlexFlash is enabled in a local disk policy, and the server is capable of supporting SD cards, the FlexFlash
controller is enabled during service profile association. If a server is not capable of supporting SD cards or
has an older CIMC version, a config failure message is displayed.
If you disable FlexFlash in a supported server, the Hypervisor or HV partition is immediately disconnected
from the host. The FlexFlash controller will also be disabled as part of a related service profile disassociation.
The FlexFlash controller supports RAID-1 for dual SD cards. The FlexFlash scrub policy erases the HV
partition in both cards, and brings the cards to a healthy RAID state.
You can configure new SD cards in a RAID pair and format them using one of the following methods:
• Format the SD cards.
• For an associated server, create a FlexFlash scrub policy and disassociate the service profile from the
server. For an unassociated server, create a FlexFlash scrub policy and reacknowledge the server after
modifying the default scrub policy.
The Scrub Policy Settings section in the Cisco UCS Manager Server Management Guide provides more
details about the usage of the scrub policy.
To boot from the HV partition, the SD card must be present in the boot policy used in the service profile.
Note 16 GB and 32 GB cards are supported only on the B200-M3 blade servers, and the 64
GB SD cards are supported only on the B200-M4 blade servers.
• We do not recommend using an SD card from a rack server in a blade server, or using an SD card from
a blade server in a rack server. Switching SD cards between server types might result in data loss from
the SD card.
• Some Cisco UCS C-Series rack-mount servers have SD cards with four partitions: HV, HUU, SCU, and
Drivers. Only the HV partition is visible in Cisco UCS Manager. You can migrate a four-partition SD
card to a single HV partition card with a FlexFlash scrub policy.
• The FlexFlash controller does not support RAID-1 sync (mirror rebuild). If the SD cards are in a degraded
RAID state, or if any metadata errors are reported by the controller, you must run the FlexFlash scrub
policy to pair the cards for RAID. For more information about the FlexFlash scrub policy, see
Server-Related Policies. The following conditions might result in degraded RAID or metadata errors:
◦Inserting a new or used SD card in one slot, when the server already has an SD card populated in
the second slot.
◦Inserting two SD cards from different servers.
FlexFlash operations with the FX3S control are similar to those with the Cisco Flexible Flash storage controller.
FlexFlash is disabled by default, and is enabled using a local disk policy. You can also reset the controller,
format the SD cards, and enable automatic synchronization of your paired SD cards.
The SD cards for the FX3S controller contain a single partition called Hypervisor.
Procedure
Step 2 UCS-A /org # scope Enters the specified local disk configuration policy
local-disk-config-policy policy-name mode.
Step 4 UCS-A /org/local-disk-config-policy # set Specifies whether FlexFlash RAID reporting support
flexflash-raid-reporting-state {enable | is enabled.
disable} Note If only one SD card is installed, the
FlexFlash inventory displays the RAID
State as Disabled and the RAID Health as
NA.
The following example shows how to enable FlexFlash SD card support and FlexFlash RAID reporting state
on the local disk config policy default, and commits the transaction to the system:
UCS-A# scope org/
UCS-A /org # scope local-disk-config-policy default
UCS-A /org/local-disk-config-policy #set flexflash-state enable
UCS-A /org/local-disk-config-policy# #set flexflash-raid-reporting-state enable
UCS-A /org/local-disk-config-policy* # commit-buffer
UCS-A /org/local-disk-config-policy #
Enabling Auto-Sync
Procedure
The following example resyncs the SD cards using the SD card in slot 2 as the primary:
UCS-A# scope chassis 1
UCS-A /chassis # scope server 1
UCS-A /chassis/server # scope flexflash-controller 1
UCS-A /chassis/server/flexflash-controller # pair 2
UCS-A /chassis/server/flexflash-controller* # commit-buffer
UCS-A /chassis/server/flexflash-controller #
Procedure
Step 2 UCS-A /chassis # scope server server-num Enters server chassis mode.
Procedure
Step 2 UCS-A /chassis # scope server server-num Enters server chassis mode.
Procedure
Step 2 UCS-A /chassis # scope server server-num Enters server chassis mode.
The following example shows the status of the FlexFlash controller and SD cards:
UCS-A# scope chassis 1
UCS-A /chassis # scope server 1
UCS-A /chassis/server # scope flexflash-controller 1
UCS-A /chassis/server/flexflash-controller # show detail expand
FlexFlash Controller:
ID: 1
Type: SD
FlexFlash Type: FX3S
Vendor: Cypress
Model: FX3S
Serial: NA
Firmware Version: 1.3.2 build 158
Controller State: Connected Partition Over USB To Host
Controller Health: Old Firmware Running
RAID State: Enabled Paired
RAID Health: OK
Physical Drive Count: 2
Virtual Drive Count: 1
RAID Sync Support: Supported
Operability: Operable
Oper Qualifier Reason:
Presence: Equipped
Current Task:
FlexFlash Card:
Controller Index: 1
Slot Number: 1
Vendor: SE32G
Model: SE32G
HW Rev: 8.0
Serial: 0xa2140794
Manufacturer ID: 3
OEM ID: SD
Manufacturer Date: 2/14
Size (MB): 30436
Block Size: 512
Card Type: FX3S configured
Write Enabled: Not Write Protected
Card Health: OK
Card Mode: Secondary Active
Operation State: Raid Partition
Card State: Active
Write IO Error Count: 0
Read IO Error Count: 0
Operability: Operable
Oper Qualifier Reason:
Presence: Equipped
Controller Index: 1
Slot Number: 2
Vendor: SE32G
Model: SE32G
HW Rev: 8.0
Serial: 0xa2140742
Manufacturer ID: 3
OEM ID: SD
Manufacturer Date: 2/14
Size (MB): 30436
Block Size: 512
Card Type: FX3S configured
Write Enabled: Not Write Protected
Card Health: OK
Card Mode: Primary
Operation State: Raid Partition
Card State: Active
Write IO Error Count: 0
Read IO Error Count: 0
Operability: Operable
Oper Qualifier Reason:
Presence: Equipped
UCS-A /chassis/server/flexflash-controller #
Note Local disk scrub policies only apply to hard drives that are managed by Cisco UCS Manager and do not
apply to other devices such as USB drives.
Depending upon how you configure a scrub policy, the following can occur at those times:
Disk scrub
One of the following occurs to the data on any local drives on disassociation:
• If enabled, destroys all data on any local drives.
• If disabled, preserves all data on any local drives, including local storage configuration.
FlexFlash Scrub
FlexFlash Scrub enables you to pair new or degraded SD cards, resolve FlexFlash metadata configuration
failures, and migrate older SD cards with 4 partitions to single partition SD cards. One of the following occurs
to the SD card when a service profile containing the scrub policy is disassociated from a server, or when the
server is reacknowledged:
• If enabled, the HV partition on the SD card is formatted using the PNUOS formatting utility. If two SD
cards are present, the cards are RAID-1 paired, and the HV partitions in both cards are marked as valid.
The card in slot 1 is marked as primary, and the card in slot 2 is marked as secondary.
• If disabled, preserves the existing SD card settings.
Note • Because the FlexFlash scrub erases the HV partition on the SD cards, we recommend that you take
a full backup of the SD card(s) using your preferred host operating system utilities before performing
the FlexFlash Scrub.
• To resolve metadata config failures in a service profile, you need to disable FlexFlash in the local
disk config policy before you run the FlexFlash scrub, then enable FlexFlash after the server is
reacknowledged.
• Disable the scrub policy as soon as the pairing is complete or the metadata failures are resolved.
• FlexFlash scrub is not supported for Cisco UCS S3260 Storage Server.
Step 2 UCS-A /org # create Creates a scrub policy with the specified policy name, and enters
scrub-policy policy-name organization scrub policy mode.
Step 5 UCS-A /org/scrub-policy # set Disables or enables BIOS settings scrubbing on servers using this
bios-settings-scrub {no | yes} scrub policy as follows:
• If enabled, erases all BIOS settings for the server and resets
them to the BIOS defaults for that server type and vendor.
• If disabled, preserves the existing BIOS settings on the
server.
The following example creates a scrub policy named ScrubPolicy2, enables disk scrubbing on servers using
the scrub policy, and commits the transaction:
UCS-A# scope org /
UCS-A /org # create scrub-policy ScrubPolicy2
UCS-A /org/scrub-policy* # set descr "Scrub disk but not BIOS."
UCS-A /org/scrub-policy* # set disk-scrub yes
UCS-A /org/scrub-policy* # set bios-settings-scrub no
UCS-A /org/scrub-policy* # set flexflash-scrub no
UCS-A /org/scrub-policy* # commit-buffer
UCS-A /org/scrub-policy #
Step 2 UCS-A /org # delete scrub-policy Deletes the specified scrub policy.
policy-name
Step 3 UCS-A /org # commit-buffer Commits the transaction to the system configuration.
The following example deletes the scrub policy named ScrubPolicy2 and commits the transaction:
UCS-A# scope org /
UCS-A /org # delete scrub-policy ScrubPolicy2
UCS-A /org* # commit-buffer
UCS-A /org #
Procedure
Step 2 UCS-A/chassis # scope server server-num Enters server mode for the specified server.
Step 3 UCS-A/chassis/server # Resets the correctable and uncorrectable errors
reset-all-memory-errors on all the DIMMs in a server.
Step 4 UCS-A /chassis/server* # commit-buffer Commits any pending transactions.
This example shows how to reset the memory errors for the selected memory unit(s):
UCS-A# scope chassis 1
UCS-A/chassis # scope server 1
UCS-A/chassis/server # reset-all-memory-errors
UCS-A/chassis/server* # commit-buffer
UCS-A/chassis/server #
DIMM Blacklisting
In Cisco UCS Manager, the state of the Dual In-line Memory Module (DIMM) is based on SEL event records.
When the BIOS encounters a noncorrectable memory error during memory test execution, the DIMM is
marked as faulty. A faulty DIMM is a considered a nonfunctional device.
If you enable DIMM blacklisting, Cisco UCS Manager monitors the memory test execution messages and
blacklists any DIMMs that encounter memory errors in the DIMM SPD data. To allow the host to map out
any DIMMs that encounter uncorrectable ECC errors.
Note • This feature is supported both on the Cisco UCS B-Series blade servers and UCS C-Series rack
servers.
Note Cisco UCS C-Series 420 M3 rack server do not support this feature.
Procedure
Step 2 UCS-A /org # scope Enters memory policy mode for the global memory
memory-config-policy default policy.
Step 3 UCS-A /org/memory-config-policy # Enables DIMM blacklisting for the domain level policy
set blacklisting enabled and these changes applies to all the servers on that
particular domain.
Note If the Cisco IMC of a server does not support
DIMM blacklisting, an information level fault
is generated.
Step 2 UCS-A /org # create sol-policy Creates a serial over LAN policy and enters organization
policy-name serial over LAN policy mode.
The following example creates a serial over LAN policy named Sol9600, provides a description for the policy,
sets the speed to 9,600 baud, enables the policy, and commits the transaction:
UCS-A# scope org /
UCS-A /org* # create sol-policy Sol9600
UCS-A /org/sol-policy* # set descr "Sets serial over LAN policy to 9600 baud."
UCS-A /org/sol-policy* # set speed 9600
UCS-A /org/sol-policy* # enable
UCS-A /org/sol-policy* # commit-buffer
UCS-A /org/sol-policy #
Step 2 UCS-A /org # show sol-policy Displays the serial over LAN definition (set by the create
policy-name sol-config command). If the serial over LAN definition is not
set, and if a policy is set (using the set sol-policy command),
then the policy will be displayed.
The following example shows how to display serial over LAN information for a serial over LAN policy called
Sol115200:
UCS-A# scope org /
UCS-A /org # show sol-policy Sol115200
SOL Policy:
Name: sol115200
SOL State: Enable
Speed: 115200
Description:
Policy Owner: Local
Step 2 UCS-A /org # delete sol-policy Deletes the specified serial over LAN policy.
policy-name
The following example deletes the serial over LAN policy named Sol9600 and commits the transaction:
UCS-A# scope org /
UCS-A /org* # delete sol-policy Sol9600
UCS-A /org* # commit-buffer
UCS-A /org #
Step 2 UCS-A /org # create Creates a server autoconfiguration policy with the
server-autoconfig-policy policy-name specified policy name, and enters organization server
autoconfiguration policy mode.
The following example creates a server autoconfiguration policy named AutoConfigFinance, provides a
description for the policy, specifies finance as the destination organization, ServPoolQual22 as the server pool
policy qualification, and ServTemp2 as the service profile template, and commits the transaction:
UCS-A# scope org /
UCS-A /org* # create server-autoconfig-policy AutoConfigFinance
UCS-A /org/server-autoconfig-policy* # set descr "Server Autoconfiguration Policy for
Finance"
UCS-A /org/server-autoconfig-policy* # set destination org finance
UCS-A /org/server-autoconfig-policy* # set qualifier ServPoolQual22
UCS-A /org/server-autoconfig-policy* # set template ServTemp2
UCS-A /org/server-autoconfig-policy* # commit-buffer
UCS-A /org/server-autoconfig-policy #
Step 2 UCS-A /org # delete Deletes the specified server autoconfiguration policy.
server-autoconfig-policy policy-name
Step 3 UCS-A /org # commit-buffer Commits the transaction to the system configuration.
The following example deletes the server autoconfiguration policy named AutoConfigFinance and commits
the transaction:
UCS-A# scope org /
UCS-A /org* # delete server-autoconfig-policy AutoConfigFinance
If automatic deep discovery is triggered by any hardware insertion, removal, or replacement, the following
occurs:
1 The server is moved to a “pending activities” list.
2 A critical hardware mismatch fault is raised on the server, indicating that UCSM has detected a hardware
mismatch.
3 User must explicitly acknowledge the server to trigger the deep discovery.
Important In Cisco UCS Manager Release 2.2 (4), blade servers do not support drives with a block size of 4K, but
rack-mount servers support such drives. If a drive with a block size of 4K is inserted into a blade server,
discovery fails and the following error message appears:
Unable to get Scsi Device Information from the system
If this error occurs, do the following:
1 Remove the 4K drive.
2 Reacknowledge the server.
Reacknowledging the server causes the server to reboot and results in loss of service.
Procedure
Step 3 UCS-A /org/server-disc-policy # set Specifies when the system will attempt to discover new
action {diag | immediate | servers.
user-acknowledged}
Step 4 UCS-A /org/chassis-disc-policy # set (Optional)
descr description Provides a description for the server discovery policy.
Note If your description includes spaces, special
characters, or punctuation, you must begin and
end your description with quotation marks. The
quotation marks will not appear in the description
field of any show command output.
Step 5 UCS-A /org/server-disc-policy # set (Optional)
qualifier qualifier Uses the specified server pool policy qualifications to
associates this policy with a server pool.
Step 6 UCS-A /org/server-disc-policy # set Specifies the scrub policy to be used by this policy. The
scrub-policy scrub policy defines whether the disk drive on a server
should be scrubbed clean upon discovery.
The following example creates a server discovery policy named ServDiscPolExample, sets it to immediately
discover new servers, provides a description for the policy, specifies the server pool policy qualifications and
scrub policy, and commits the transaction:
UCS-A# scope org /
UCS-A /org # create server-disc-policy ServDiscPolExample
UCS-A /org/server-disc-policy* # set action immediate
UCS-A /org/server-disc-policy* # set descr "This is an example server discovery policy."
UCS-A /org/server-disc-policy* # set qualifier ExampleQual
UCS-A /org/server-disc-policy* # set scrub-policy NoScrub
UCS-A /org/server-disc-policy # commit-buffer
What to Do Next
Include the server discovery policy in a service profile and/or template.
Step 2 UCS-A /org # Delete server-disc-policy Deletes the specified server discovery policy.
policy-name
Step 3 UCS-A /org/server-disc-policy # Commits the transaction to the system
commit-buffer configuration.
The following example deletes the server discovery policy named ServDiscPolExample and commits the
transaction:
UCS-A# scope org /
UCS-A /org # delete server-disc-policy ServDiscPolExample
UCS-A /org* # commit-buffer
UCS-A /org #
You cannot migrate a service profile created with this policy to another server.
identity of the adapter must be derived from default pools. If the default pools do not include sufficient entries
for one to be assigned to the server, service profile association fails with a configuration error.
Procedure
Step 2 UCS-A /org # create Creates a server inheritance policy with the specified
server-inherit-policy policy-name policy name, and enters organization server inheritance
policy mode.
The following example creates a server inheritance policy named InheritEngineering, provides a description
for the policy, specifies engineering as the destination organization and ServPoolQual22 as the server pool
policy qualification, and commits the transaction:
UCS-A# scope org /
UCS-A /org* # create server-inherit-policy InheritEngineering
UCS-A /org/server-inherit-policy* # set descr "Server Inheritance Policy for Engineering"
UCS-A /org/server-inherit-policy* # set destination org engineering
UCS-A /org/server-inherit-policy* # set qualifier ServPoolQual22
UCS-A /org/server-inherit-policy* # commit-buffer
UCS-A /org/server-inherit-policy #
Step 2 UCS-A /org # delete Deletes the specified server inheritance policy.
server-inherit-policy policy-name
Step 3 UCS-A /org # commit-buffer Commits the transaction to the system configuration.
The following example deletes the server inheritance policy named InheritEngineering and commits the
transaction:
UCS-A# scope org /
UCS-A /org* # delete server-inherit-policy InheritEngineering
UCS-A /org* # commit-buffer
UCS-A /org #
Step 2 UCS-A /org # create pooling-policy Creates a server pool policy with the specified name, and
policy-name enters organization pooling policy mode.
Step 5 UCS-A /org/pooling-policy # set Specifies the server pool qualifier to use with the server
qualifier qualifier-name pool policy.
The following example creates a server pool policy named ServerPoolPolicy4 and commits the transaction:
UCS-A# scope org /
UCS-A /org # create pooling-policy ServerPoolPolicy4
UCS-A /org/pooling-policy* # set pool org-root/compute-pool-pool3
UCS-A /org/pooling-policy* # set qualifier ServPoolQual8
UCS-A /org/pooling-policy* # commit-buffer
UCS-A /org/pooling-policy #
Step 2 UCS-A /org # delete pooling-policy Deletes the specified server pool policy.
policy-name
Step 3 UCS-A /org # commit-buffer Commits the transaction to the system configuration.
The following example deletes the server pool policy named ServerPoolPolicy4 and commits the transaction:
UCS-A# scope org /
UCS-A /org # delete pooling-policy ServerPoolPolicy4
UCS-A /org/pooling-policy* # commit-buffer
UCS-A /org/pooling-policy #
Depending upon the implementation, you might need to configure several policies with server pool policy
qualifications including the following:
• Autoconfiguration policy
• Chassis discovery policy
• Server discovery policy
• Server inheritance policy
• Server pool policy
The following example creates a server pool qualification named ServPoolQual22 and commits the transaction:
UCS-A# scope org /
UCS-A /org* # create server-qual ServPoolQual22
UCS-A /org/server-qual* # commit-buffer
UCS-A /org/server-qual #
What to Do Next
Configure one or more of the following server component qualifications:
• Adapter qualification
• Chassis qualification
• Memory qualification
• Power group qualification
• Processor qualification
• Storage qualification
Step 2 UCS-A /org # delete server-qual Deletes the specified server pool qualification.
server-qual-name
Step 3 UCS-A /org/server-qual # Commits the transaction to the system configuration.
commit-buffer
The following example deletes the server pool qualification named ServPoolQual22 and commits the
transaction:
UCS-A# scope org /
UCS-A /org* # delete server-qual ServPoolQual22
Procedure
Step 2 UCS-A /org # scope server-qual Enters organization server qualification mode for the specified
server-qual-name server pool policy qualification.
Step 3 UCS-A /org/server-qual # create Creates an adapter qualification and enters organization server
adapter qualification adapter mode.
Step 4 UCS-A /org/server-qual/adapter Creates an adapter capacity qualification for the specified adapter
# create cap-qual adapter-type type and enters organization server qualification adapter capacity
qualification mode. The adapter-type argument can be any of
the following values:
• fcoe —Fibre Channel over Ethernet
• non-virtualized-eth-if —Non-virtualized Ethernet
interface
• non-virtualized-fc-if —Non-virtualized Fibre Channel
interface
• path-encap-consolidated —Path encapsulation
consolidated
• path-encap-virtual —Path encapsulation virtual
• protected-eth-if —Protected Ethernet interface
• protected-fc-if —Protected Fibre Channel interface
• protected-fcoe —Protected Fibre Channel over Ethernet
• virtualized-eth-if —Virtualized Ethernet interface
• virtualized-fc-if —Virtualized Fibre Channel interface
• virtualized-scsi-if —Virtualized SCSI interface
Step 5 UCS-A Specifies the maximum capacity for the selected adapter type.
/org/server-qual/adapter/cap-qual
# set maximum {max-cap |
unspecified}
The following example creates and configures an adapter qualification for a non-virtualized Ethernet interface
and commits the transaction:
UCS-A# scope org /
UCS-A /org # scope server-qual ServPoolQual22
UCS-A /org/server-qual # create adapter
UCS-A /org/server-qual/adapter* # create cap-qual non-virtualized-eth-if
UCS-A /org/server-qual/adapter/cap-qual* # set maximum 2500000000
UCS-A /org/server-qual/adapter/cap-qual* # commit-buffer
UCS-A /org/server-qual/adapter/cap-qual #
Step 2 UCS-A /org # scope server-qual Enters organization server qualification mode for the
server-qual-name specified server pool policy qualification.
Step 3 UCS-A /org/server-qual # delete Deletes the adapter qualification from the server pool
adapter policy qualification.
The following example deletes the adapter qualification from the server pool policy qualification named
ServPoolQual22 and commits the transaction:
UCS-A# scope org /
UCS-A /org # scope server-qual ServPoolQual22
UCS-A /org/server-qual # delete adapter
UCS-A /org/server-qual* # commit-buffer
UCS-A /org/server-qual #
Procedure
Step 2 UCS-A /org # scope server-qual Enters organization server qualification mode for the
server-qual-name specified server pool policy qualification.
Step 3 UCS-A /org/server-qual # create chassis Creates a chassis qualification for the specified chassis
min-chassis-num max-chassis-num range and enters organization server qualification
chassis mode.
Step 4 UCS-A /org/server-qual/chassis # create Creates a chassis slot qualification for the specified
slot min-slot-num max-slot-num slot range and enters organization server qualification
chassis slot mode.
The following example configures a chassis qualification for slots 1 to 4 on chassis 1 and 2 and commits the
transaction:
UCS-A# scope org /
UCS-A /org* # scope server-qual ServPoolQual22
UCS-A /org/server-qual* # create chassis 1 2
UCS-A /org/server-qual/chassis* # create slot 1 4
UCS-A /org/server-qual/chassis/slot* # commit-buffer
UCS-A /org/server-qual/chassis/slot #
Step 2 UCS-A /org # scope server-qual Enters organization server qualification mode for
server-qual-name the specified server pool policy qualification.
Step 3 UCS-A /org/server-qual # delete chassis Deletes the chassis qualification for the specified
min-chassis-num max-chassis-num chassis range.
The following example deletes the chassis qualification for chassis 1 and 2 and commits the transaction:
UCS-A# scope org /
UCS-A /org # scope server-qual ServPoolQual22
UCS-A /org/server-qual # delete chassis 1 2
UCS-A /org/server-qual* # commit-buffer
UCS-A /org/server-qual #
Procedure
Step 2 UCS-A /org # scope server-qual Enters organization server qualification mode
server-qual-name for the specified server pool policy
qualification.
Step 3 UCS-A /org/server-qual # create cpu Creates a CPU qualification and enters
organization server qualification processor
mode.
Step 4 UCS-A /org/server-qual/cpu # set arch {any Specifies the processor architecture type.
| dual-core-opteron | intel-p4-c | opteron |
pentium-4 | turion-64 | xeon | xeon-mp}
Step 5 UCS-A /org/server-qual/cpu # set maxcores Specifies the maximum number of processor
{max-core-num | unspecified} cores.
Step 6 UCS-A /org/server-qual/cpu # set mincores Specifies the minimum number of processor
{min-core-num | unspecified} cores.
Step 7 UCS-A /org/server-qual/cpu # set maxprocs Specifies the maximum number of processors.
{max-proc-num | unspecified}
Step 8 UCS-A /org/server-qual/cpu # set minprocs Specifies the minimum number of processors.
{min-proc-num | unspecified}
Step 9 UCS-A /org/server-qual/cpu # set maxthreads Specifies the maximum number of threads.
{max-thread-num | unspecified}
Step 10 UCS-A /org/server-qual/cpu # set minthreads Specifies the minimum number of threads.
{min-thread-num | unspecified}
Step 11 UCS-A /org/server-qual/cpu # set stepping Specifies the processor stepping number.
{step-num | unspecified}
The following example creates and configures a CPU qualification and commits the transaction:
UCS-A# scope org /
UCS-A /org # scope server-qual ServPoolQual22
UCS-A /org/server-qual # create processor
UCS-A /org/server-qual/cpu* # set arch xeon
UCS-A /org/server-qual/cpu* # set maxcores 8
UCS-A /org/server-qual/cpu* # set mincores 4
UCS-A /org/server-qual/cpu* # set maxprocs 2
UCS-A /org/server-qual/cpu* # set minprocs 1
UCS-A /org/server-qual/cpu* # set maxthreads 16
UCS-A /org/server-qual/cpu* # set minthreads 8
UCS-A /org/server-qual/cpu* # set stepping 5
UCS-A /org/server-qual/cpu* # commit-buffer
UCS-A /org/server-qual/cpu #
Step 2 UCS-A /org # scope server-qual Enters organization server qualification mode for the
server-qual-name specified server pool policy qualification.
The following example deletes the processor qualification and commits the transaction:
UCS-A# scope org /
UCS-A /org # scope server-qual ServPoolQual22
UCS-A /org/server-qual # delete cpu
UCS-A /org/server-qual* # commit-buffer
UCS-A /org/server-qual #
Procedure
Step 2 UCS-A /org # scope server-qual Enters organization server qualification mode for the
server-qual-name specified server pool policy qualification.
Step 3 UCS-A /org/server-qual # create Creates a power group qualification for the specified
power-group power-group-name power group name.
The following example configures a power group qualification for a power group called powergroup1 and
commits the transaction:
UCS-A# scope org /
UCS-A /org # scope server-qual ServPoolQual22
UCS-A /org/server-qual # create power-group powergroup1
UCS-A /org/server-qual* # commit-buffer
UCS-A /org/server-qual #
Step 2 UCS-A /org # scope server-qual Enters organization server qualification mode for
server-qual-name the specified server pool policy qualification.
Step 3 UCS-A /org/server-qual # delete Deletes the specified power group qualification.
power-group power-group-name
Step 4 UCS-A /org/server-qual # Commits the transaction to the system configuration.
commit-buffer
The following example deletes a power group qualification for a power group called powergroup1 and commits
the transaction:
UCS-A# scope org /
UCS-A /org # scope server-qual ServPoolQual22
UCS-A /org/server-qual # delete power-group powergroup1
UCS-A /org/server-qual* # commit-buffer
UCS-A /org/server-qual #
Procedure
Step 2 UCS-A /org # scope server-qual Enters organization server qualification mode
server-qual-name for the specified server pool policy qualification.
Step 3 UCS-A /org/server-qual # create memory Creates a memory qualification and enters
organization server qualification memory mode.
Step 4 UCS-A /org/server-qual/memory # set clock Specifies the memory clock speed.
{clock-num | unspec}
Step 5 UCS-A /org/server-qual/memory # set Specifies the maximum capacity of the memory
maxcap {max-cap-num | unspec} array.
Step 6 UCS-A /org/server-qual/memory # set Specifies the minimum capacity of the memory
mincap {min-cap-num | unspec} array.
Step 7 UCS-A /org/server-qual/memory # set speed Specifies the memory data rate.
{speed-num | unspec}
Step 8 UCS-A /org/server-qual/memory # set units Specifies the number of memory units (DRAM
{unit-num | unspec} chips mounted to the memory board).
Step 9 UCS-A /org/server-qual/memory # set width Specifies the bit width of the data bus.
{width-num | unspec}
Step 10 UCS-A /org/server-qual/memory # Commits the transaction to the system
commit-buffer configuration.
The following example creates and configures a memory qualification and commits the transaction:
UCS-A# scope org /
UCS-A /org # scope server-qual ServPoolQual22
UCS-A /org/server-qual # create memory
UCS-A /org/server-qual/memory* # set clock 1067
UCS-A /org/server-qual/memory* # set maxcap 4096
UCS-A /org/server-qual/memory* # set mincap 2048
UCS-A /org/server-qual/memory* # set speed unspec
UCS-A /org/server-qual/memory* # set units 16
UCS-A /org/server-qual/memory* # set width 64
UCS-A /org/server-qual/memory* # commit-buffer
UCS-A /org/server-qual/memory #
Step 2 UCS-A /org # scope server-qual Enters organization server qualification mode for the
server-qual-name specified server pool policy qualification.
The following example deletes the memory qualification and commits the transaction:
UCS-A# scope org /
UCS-A /org # scope server-qual ServPoolQual22
UCS-A /org/server-qual # delete memory
UCS-A /org/server-qual* # commit-buffer
UCS-A /org/server-qual #
Procedure
Step 2 UCS-A /org # scope server-qual Enters organization server qualification mode for the
server-qual-name specified server pool policy qualification.
Step 4 UCS-A /org/server-qual/physical-qual # Specifies a regular expression that the model name
set model-regex regex must match.
The following example creates and configures a physical qualification and commits the transaction:
UCS-A# scope org /
UCS-A /org # scope server-qual ServPoolQual22
UCS-A /org/server-qual # create physical-qual
UCS-A /org/server-qual/physical-qual* # set model-regex
UCS-A /org/server-qual/physical-qual* # commit-buffer
UCS-A /org/server-qual/physical-qual #
Step 2 UCS-A /org # scope server-qual Enters organization server qualification mode for
server-qual-name the specified server pool policy qualification.
The following example deletes a physical qualification and commits the transaction:
UCS-A# scope org /
UCS-A /org # scope server-qual ServPoolQual22
Procedure
Step 2 UCS-A /org # scope server-qual Enters organization server qualification mode
server-qual-name for the specified server pool policy
qualification.
Step 3 UCS-A /org/server-qual # create storage Creates a storage qualification and enters
organization server qualification storage mode.
Step 6 UCS-A /org/server-qual/storage # set disktype Specifies the type of disk that can be used. The
{hdd | ssd | unspecified} options are:
• Unspecified—Either disk type is
acceptable.
• HDD—The disk must be HDD.
• SSD—The disk must be SSD (SATA or
SAS).
Step 9 UCS-A /org/server-qual/storage # set mincap Specifies the minimum capacity of the storage
{min-cap-num | unknown} array.
The following example shows how to create and configure a storage qualification and commits the transaction:
UCS-A# scope org /
UCS-A /org # scope server-qual ServPoolQual22
UCS-A /org/server-qual # create storage
UCS-A /org/server-qual/storage* # set blocksize 512
UCS-A /org/server-qual/storage* # set disktype hdd
UCS-A /org/server-qual/storage* # set maxcap 420000
UCS-A /org/server-qual/storage* # set mincap 140000
UCS-A /org/server-qual/storage* # set numberofblocks 287277984
UCS-A /org/server-qual/storage* # set perdiskcap 140000
UCS-A /org/server-qual/storage* # set units 1
UCS-A /org/server-qual/storage* # set flexflash-num-cards 2
UCS-A /org/server-qual/storage* # commit-buffer
UCS-A /org/server-qual/storage #
Step 2 UCS-A /org # scope server-qual Enters organization server qualification mode for the
server-qual-name specified server pool policy qualification.
The following example deletes the storage qualification and commits the transaction:
UCS-A# scope org /
UCS-A /org # scope server-qual ServPoolQual22
UCS-A /org/server-qual # delete storage
UCS-A /org/server-qual* # commit-buffer
UCS-A /org/server-qual #
Each vNIC/vHBA placement policy contains four vCons that are virtual representations of the physical
adapters. When a vNIC/vHBA placement policy is assigned to a service profile, and the service profile is
associated with a server, the vCons in the vNIC/vHBA placement policy are assigned to the physical adapters
and the vNICs and vHBAs are assigned to those vCons.
For blade or rack servers that contain one adapter, Cisco UCS assigns all vCons to that adapter. For servers
that contain four adapters, Cisco UCS assigns vCon1 to Adapter1, vCon2 to Adapter2, vCon3 to Adapter3,
and vCon4 to Adapter4.
For blade or rack servers that contain two or three adapters, Cisco UCS assigns the vCons based on the type
of server and the selected virtual slot mapping scheme, which can be Round Robin or Linear Ordered. For
details about the available mapping schemes, see vCon to Adapter Placement, on page 504.
After Cisco UCS assigns the vCons, it assigns the vNICs and vHBAs based on the Selection Preference for
each vCon. This can be one of the following:
Note You can specify the PCI order for the vHBA; however, the desired order works within a class of devices,
such as vNICs or vHBAs and not across them. Within an adapter, vNICs are always placed ahead of the
vHBAs.
• all—All configured vNICs and vHBAs can be assigned to the vCon, whether they are explicitly assigned
to it, unassigned, or dynamic. This is the default.
• assigned-only—vNICs and vHBAs must be explicitly assigned to the vCon. You can assign them
explicitly through the service profile or the properties of the vNIC or vHBA.
• exclude-dynamic—Dynamic vNICs and vHBAs cannot be assigned to the vCon. The vCon can be used
for all static vNICs and vHBAs, whether they are unassigned or explicitly assigned to it.
• exclude-unassigned—Unassigned vNICs and vHBAs cannot be assigned to the vCon. The vCon can
be used for dynamic vNICs and vHBAs and for static vNICs and vHBAs that are explicitly assigned to
it.
• exclude-usnic—Cisco usNICs cannot be assigned to the vCon. The vCon can be used for all other
configured vNICs and vHBAs, whether they are explicitly assigned to it, unassigned, or dynamic.
Note An SRIOV usNIC that is explicitly assigned to a vCon set to exclude-usnic will remain
assigned to that vCon.
If you do not include a vNIC/vHBA placement policy in the service profile, Cisco UCS Manager defaults to
the Round Robin vCon mapping scheme and the All vNIC/vHBA selection preference, distributing the vNICs
and vHBAs between the adapters based on the capabilities and relative capacities of each adapter.
You must consider this placement when you configure the vNIC/vHBA selection preference to assign vNICs
and vHBAs to vCons.
Note vCon to adapter placement is not dependent upon the PCIE slot number of the adapter. The adapter numbers
used for the purpose of vCon placement are not the PCIE slot numbers of the adapters, but the ID assigned
to them during server discovery.
Table 10: vCon to Adapter Placement Using the Round - Robin Mapping Scheme
Number of Adapters vCon1 Assignment vCon2 Assignment vCon3 Assignment vCon4 Assignment
1 Adapter1 Adapter1 Adapter1 Adapter1
Table 11: vCon to Adapter Placement Using the Linear Ordered Mapping Scheme
Number of Adapters vCon1 Assignment vCon2 Assignment vCon3 Assignment vCon4 Assignment
1 Adapter1 Adapter1 Adapter1 Adapter1
Note If you are using a vCon policy with two adapters in the Cisco UCS B440 M2 Blade Server, be aware of
the following mapping.
• vCon 2 to adapter 1 maps first
• vCon 1 to adapter 2 maps second ZXA Q
• Set the vCon configuration to any of the available options. You can configure the vCons through a
vNIC/vHBA placement policy or in the service profile associated with the server. If a vCon is configured
for All, you can still explicitly assign a vNIC or vHBA to that vCon.
• Assign the vNICs and vHBAs to a vCon. You can make this assignment through the virtual host interface
placement properties of the vNIC or vHBA or in the service profile associated with the server.
If you attempt to assign a vNIC or vHBA to a vCon that is not configured for that type of vNIC or vHBA,
Cisco UCS Manager displays a message advising you of the configuration error.
During service profile association, Cisco UCS Manager validates the configured placement of the vNICs and
vHBAs against the number and capabilities of the physical adapters in the server before assigning the vNICs
and vHBAs according to the configuration in the policy. Load distribution is based upon the explicit assignments
to the vCons and adapters configured in this policy.
If the adapters do not support the assignment of one or more vNICs or vHBAs, Cisco UCS Manager raises a
fault against the service profile.
Note You can specify the PCI order for the vHBA; however, the desired order works within a class of devices,
such as vNICs or vHBAs and not across them. Within an adapter, vNICs are always placed ahead of the
vHBAs.
During service profile association, Cisco UCS Manager verifies the number and capabilities of the physical
adapters in the server and assigns the vNICs and vHBAs accordingly. Load distribution is based upon the
capabilities of the adapters, and placement of the vNICs and vHBAs is performed according to the actual
order determined by the system. For example, if one adapter can accommodate more vNICs than another, that
adapter is assigned more vNICs.
If the adapters cannot support the number of vNICs and vHBAs configured for that server, Cisco UCS Manager
raises a fault against the service profile.
• If the server has the same adapter in both slots, Cisco UCS Manager assigns half the vNICs and half the
vHBAs to each adapter.
• If the server has one non-VIC adapter and one VIC adapter, Cisco UCS Manager assigns two vNICs
and two vHBAs to the non-VIC adapter and the remaining vNICs and vHBAs to the VIC adapter.
• If the server has two different VIC adapters, Cisco UCS Manager assigns the vNICs and vHBAs
proportionally, based on the relative capabilities of the two adapters.
The following examples show how Cisco UCS Manager would typically assign the vNICs and vHBAs with
different combinations of supported adapter cards:
• If you want to configure four vNICs and the server contains two Cisco UCS M51KR-B Broadcom
BCM57711 adapters (with two vNICs each), Cisco UCS Manager assigns two vNICs to each adapter.
• If you want to configure 50 vNICs and the server contains a Cisco UCS CNA M72KR-E adapter (2
vNICs) and a Cisco UCS M81KR Virtual Interface Card adapter (128 vNICs), Cisco UCS Manager
assigns two vNICs to the Cisco UCS CNA M72KR-E adapter and 48 vNICs to the Cisco UCS M81KR
Virtual Interface Card adapter.
• If you want to configure 150 vNICs and the server contains a Cisco UCS M81KR Virtual Interface Card
adapter (128 vNICs) and a Cisco UCS VIC-1240 Virtual Interface Card adapter (256 vNICs), Cisco
UCS Manager assigns 50 vNICs to the Cisco UCS M81KR Virtual Interface Card adapter and 100
vNICs to the Cisco UCS VIC-1240 Virtual Interface Card adapter.
Note Exceptions to this implicit assignment occur if you configure the vNICs for fabric failover and if you
configure dynamic vNICs for the server.
For a configuration that includes vNIC fabric failover where one adapter does not support vNIC failover,
Cisco UCS Manager implicitly assigns all vNICs that have fabric failover enabled to the adapter that supports
them. If the configuration includes only vNICs that are configured for fabric failover, no vNICs are implicitly
assigned to the adapter that does not support them. If some vNICs are configured for fabric failover and some
are not, Cisco UCS Manager assigns all failover vNICs to the adapter that supports them and a minimum of
one nonfailover vNIC to the adapter that does not support them, according to the ratio above.
For a configuration that includes dynamic vNICs, the same implicit assignment would occur. Cisco UCS
Manager assigns all dynamic vNICs to the adapter that supports them. However, with a combination of
dynamic vNICs and static vNICs, at least one static vNIC is assigned to the adapter that does not support
dynamic vNICs.
The following example creates a vNIC/vHBA placement policy named Adapter1All, sets the vCon mapping
scheme to Linear Ordered, specifies that only assigned vNICs and vHBAs can be placed on adapter 1, and
commits the transaction:
UCS-A# scope org /
UCS-A /org # create vcon-policy Adapter1
UCS-A /org/vcon-policy* # set descr "This profile places all vNICs and vHBAs on adapter 1."
UCS-A /org/vcon-policy* # set mapping-scheme linear-ordered
UCS-A /org/vcon-policy* # set vcon 1 selection assigned-only
UCS-A /org/vcon-policy* # commit-buffer
UCS-A /org/vcon-policy* #
UCS-A /org #
Step 2 UCS-A /org # delete vcon-policy Deletes the specified vNIC/vHBA placement profile.
policy-name
Step 3 UCS-A /org # commit-buffer Commits the transaction.
The following example deletes the vNIC/vHBA placement profile named Adapter1All and commits the
transaction:
UCS-A# scope org /
UCS-A /org # delete vcon-policy Adapter1All
UCS-A /org* # commit-buffer
UCS-A /org #
If a vCon is configured for All, you can explicitly assign a vNIC or vHBA to that vCon. However, there is
less control with this configuration.
Procedure
Step 3 UCS-A /org/service-profile # scope Enters organization service profile mode for the
vnic vnic-name specified vnic.
Step 4 UCS-A /org/service-profile/vnic # set Sets the virtual network interface connection (vCon)
vcon {1 | 2 | 3 | 4 | any} placement for the specified vNIC.
Entering a value of any allows Cisco UCS Manager to
determine the vCon to which the vNIC is assigned.
Step 5 UCS-A /org/service-profile/vnic # set Specifies the desired PCI order for the vNIC.
order {order-num | unspecified} Valid values include 0-128 and unspecified.
The following example sets the vCon placement for a vNIC called vnic3 to 2, sets the desired order to 10,
and commits the transaction:
UCS-A# scope org /
UCS-A /org # scope service-profile accounting
UCS-A /org/service-profile # scope vnic vnic3
UCS-A /org/service-profile/vnic # set vcon 2
UCS-A /org/service-profile/vnic* # set order 10
UCS-A /org/service-profile/vnic* # commit-buffer
UCS-A /org/service-profile/vnic #
If a vCon is configured for All, you can explicitly assign a vNIC or vHBA to that vCon. However, there is
less control with this configuration.
Procedure
Step 2 UCS-A /org # scope service-profile Enters organization service profile mode for the specified
profile-name service.
Step 3 UCS-A /org/service-profile # scope Enters organization service profile mode for the specified
vhba vhba-name vHBA.
Step 4 UCS-A /org/service-profile/vhba # set Sets the virtual network interface connection (vCon)
vcon {1 | 2 | 3 | 4 | any} placement for the specified vHBA.
Entering a value of any allows Cisco UCS Manager to
determine the vCon to which the vHBA is assigned.
Step 5 UCS-A /org/service-profile/vhba # set Specifies the desired PCI order for the vHBA.
order {order-num | unspecified} Valid desired order number values include 0-128 and
unspecified.
The following example sets the vCon placement for a vHBA called vhba3 to 2, sets the desired order to 10,
and commits the transaction:
UCS-A# scope org /
UCS-A /org # scope service-profile accounting
UCS-A /org/service-profile # scope vhba vhba3
UCS-A /org/service-profile/vhba # set vcon 2
UCS-A /org/service-profile/vhba* # set order 10
UCS-A /org/service-profile/vhba* # commit-buffer
UCS-A /org/service-profile/vhba #
• For SRIOV-enabled service profiles, UCSM places the vNIC Physical Function(PF) before the
corresponding Virtual Functions (VFs). This scheme guarantees that the VFs are placed close to the parent
PF vNIC on the PCIe bus and BDFs are in successive incremental order for the VFs.
Example
Beginning Device Order in Cisco UCS Manager Release 2.0:
dyn-vNIC-1 1
dyn-vNIC-2 2
New Device Order in Cisco UCS Manager Release 2.0 (Add 2 static vNICs):
dyn-vNIC-1 1
dyn-vNIC-2 2
eth-vNIC-1 3
eth-vNIC-2 4
After upgrading to Cisco UCS Manager Release 2.1, (Before any vNIC-related change is made to the service
profile.)
dyn-vNIC-1 1
dyn-vNIC-2 2
eth-vNIC-1 3
eth-vNIC-2 4
New Device Order in Cisco UCS Manager Release 2.1 (Add 2 dynamic vNICs by changing the policy count
from 2 to 4.)
dyn-vNIC-1 3
dyn-vNIC-2 4
eth-vNIC-1 1
eth-vNIC-2 2
dyn-vNIC-3 5
dyn-vNIC-4 6
Note Cisco UCS Manager Version 2.1 supports the new StaticZero mode.
Note You can perform vNIC/vHBA host port placement on servers that support Cisco UCS VIC 1340 and VIC
1380 adapters.
The host port placement of the vNIC/vHBA determines the order of the vNIC/vHBA on the adapter. The
vNICs/vHBAs placed on the first host port will be enumerated first, followed by the vNICs/vHBAs on the
second host port.
Procedure
Step 2 UCS-A /org # scope service-profile Enters service profile organization mode for the service
profile-name profile.
Step 3 UCS-A /org/service-profile # scope Enters organization service profile mode for the specified
vnic vnic-name vNIC.
Step 4 UCS-A /org/service-profile/vnic # set Sets the host port for the specified vNIC.
host-port {1 | 2 | any} Entering a value of any allows Cisco UCS Manager to
determine the host port to which the vNIC is assigned.
If you set the host port for a vNIC on an adapter that
does not support host port placement, the Actual Host
Port parameter displays None.
The following example places a vNIC called vnic3 to host port 2, commits the transaction, and displays the
host port information:
UCS-A# scope org
UCS-A /org # scope service-profile SP-2
UCS-A /org/service-profile # scope vnic vnic3
UCS-A /org/service-profile/vnic # set host-port 2
UCS-A /org/service-profile/vnic* # commit-buffer
UCS-A /org/service-profile/vnic # show detail
vNIC:
Name: vnic3
Fabric ID: A
Dynamic MAC Addr: 00:25:B5:13:13:11
Desired Order: 2
Actual Order: 3
Desired VCon Placement: 1
Actual VCon Placement: 1
Desired Host Port: 2
Actual Host Port: 2
...
UCS-A /org/service-profile/vnic #
Note Cisco UCS Manager support for Scriptable vMedia is applicable for CIMC mapped devices only. Existing
KVM based vMedia devices are not supported.
This is because the change in the name of the service profile does not change the remote vMedia image
filename in the vMedia policy. The image filename still points to the older image on the remote device, which
cannot be found.
Note Cisco UCS B200M2 Blade Server and Cisco UCS B230M2 Blade Server cannot use a vMedia policy as
the policy is not supported on these blade servers.
Procedure
Step 2 UCS-A /org # create vmedia-policy Creates a vMedia policy with the specified policy name.
policy-name This name can be between 1 and 16 alphanumeric characters.
You cannot use spaces or any special characters other than
- (hyphen), _ (underscore), : (colon), and . (period), and you
cannot change this name after the object is saved.
Step 3 UCS-A /org/vmedia-policy* # create Creates a vMedia policy sub-directory with the specified
vmedia-mapping mapping -name mapping name.
Step 6 UCS-A Specifies the type of remote vMedia image file name. Enter
/org/vmedia-policy/vmedia-mapping* the full path to the backup configuration file. This field can
# set image-file image-file-name contain the filename [with the file extension] only.
Note Ensure that the full path to the file begins with “/“
after the share name.
Step 7 UCS-A Specifies the remote vMedia image path. Enter the full path
/org/vmedia-policy/vmedia-mapping* to the remote vMedia configuration file.
# set image-path image-path
Step 8 UCS-A Specifies the name to be used for the image. Options are:
/org/vmedia-policy/vmedia-mapping*
# set image-variable-name {none | • none—Enter the filename manually.
service-profile-name} • service-profile-name—Automatically uses the name
of the service profile that the policy is associated with.
Note If you specify the image-variable-name as
the service-profile-name, do not rename the
service profile. Renaming the service profile
can result in vMedia mount failure.
The following example creates a vMedia policy named vMediaPolicy2, selects remote vMedia device type,
mount protocol, image location, and commits the transaction:
UCS-A# scope org /
UCS-A /org # create vmedia-policy vmediapolicy2
UCS-A /org/vmedia-policy* # create vmedia-mapping map1
UCS-A /org/vmedia-policy/vmedia-mapping* # set descr vmedia-map
UCS-A /org/vmedia-policy/vmedia-mapping* # set device-type cdd
UCS-A /org/vmedia-policy/vmedia-mapping* # set image-file-name win2011.iso
UCS-A /org/vmedia-policy/vmedia-mapping* # set image-path cifs
UCS-A /org/vmedia-policy/vmedia-mapping* # set image-variable-name service-profile-name
UCS-A /org/vmedia-policy/vmedia-mapping* # set mount-protocol cifs
UCS-A /org/vmedia-policy/vmedia-mapping* # set auth-option default
UCS-A /org/vmedia-policy/vmedia-mapping* # set password Password:
UCS-A /org/vmedia-policy/vmedia-mapping* # set remote-ip 172.41.1.158
UCS-A /org/vmedia-policy/vmedia-mapping* # set user-id Adminstrator
UCS-A /org/vmedia-policy/vmedia-mapping* # commit-buffer
Note When vMedia policy is created the Retry on Mount Fail option is set to Yes. The following example
changes the Retry on Mount Fail option to No .
Warning When you set the Retry on Mount Fail option to No, a warning message appears stating: This will disable
automatic retry of mount in case of any vMedia mount failure.
Boot Policy
The Cisco UCS Manager enables you to create a boot policy for blade servers, rack servers, and modular
servers.
The Cisco UCS Manager boot policy overrides the boot order in the BIOS setup menu and determines the
following:
• Selection of the boot device
• Location from which the server boots
• Order in which boot devices are invoked
For example, you can have associated servers boot from a local device, such as a local disk or CD-ROM
(VMedia), or you can select a SAN boot or a LAN (PXE) boot.
You can either create a named boot policy to associate with one or more service profiles, or create a boot
policy for a specific service profile. A boot policy must be included in a service profile, and that service profile
must be associated with a server for it to take effect. If you do not include a boot policy in a service profile,
Cisco UCS Manager applies the default boot policy.
Note Changes to a boot policy might be propagated to all servers created with an updating service profile
template that includes that boot policy. Re-association of the service profile with the server to rewrite the
boot order information in the BIOS is automatically triggered.
You can also specify the following for the boot policy:
• Local LUN name. The name specified is the logical name in the storage profile, not the deployed
name. For modular servers, you can specify both a primary and secondary name. For other servers,
specify only a primary name. Specifying a secondary name results in a configuration error.
• Specific JBOD disk number for booting from JBOD disks. This is not supported for the Modular
servers.
• Any LUN for backward compatibility; however, we do not recommend this. Other devices must not
have bootable images to ensure a successful boot.
• If you want to use UEFI boot mode with two iSCSI LUNs, you must manually specify a common iSCSI
initiator name in the service profile that is applied to both underlying iSCSI eNICs rather than allowing
Cisco UCS Manager to select the name from an IQN suffix pool. If you do not supply a common name,
Cisco UCS Manager will not be able to detect the second iSCSI LUN.
• You cannot mix UEFI and legacy boot mode on the same server.
• The server will boot correctly in UEFI mode only if the boot devices configured in the boot policy have
UEFI-aware operating systems installed. If a compatible OS is not present, the boot device is not displayed
on the Actual Boot Order tab in the Boot Order Details area.
• In some corner cases, the UEFI boot may not succeed because the UEFI boot manager entry was not
saved correctly in the BIOS NVRAM. You can use the UEFI shell to enter the UEFI boot manager entry
manually. This situation could occur in the following situations:
◦If a blade server with UEFI boot mode enabled is disassociated from the service profile, and the
blade is manually powered on using the Equipment tab or the front panel.
◦If a blade server with UEFI boot mode enabled is disassociated from the service profile, and a
direct VIC firmware upgrade is attempted.
◦If a blade or rack server with UEFI boot mode enabled is booted off SAN LUN, and the service
profile is migrated.
You can create UEFI boot parameters in Cisco UCS Manager. UEFI Boot Parameters, on page 571
provides more information.
Note UEFI boot mode is supported on Cisco UCS C-Series and S-Series rack servers beginning
with Release 2.2(3a).
Note CIMC secure boot is enabled by default on the Cisco UCS C220 M4, C240 M4 rack
servers, and is automatically enabled on the Cisco UCS C460 M4 rack server after
upgrading to CIMC firmware release 2.2(3) or higher.
The following example shows how to display the CIMC secure boot status:
UCS-A# scope server 1
UCS-A /chassis/server # scope cimc
UCS-A /chassis/server/cimc # show secure-boot
Secure Boot: Disabled
UCS-A /chassis/server/cimc #
Step 3 UCS-A /server/cimc # enable Enables CIMC secure boot status for the specified
secure-boot server. CIMC secure boot is only supported on Cisco
UCS M3 rack servers.
Note Once enabled, CIMC secure boot cannot be
disabled.
Step 4 UCS-A /server/cimc # commit-buffer Commits the transaction to the system configuration.
The following example shows how to enable CIMC secure boot and commit the transaction:
UCS-A# scope server 1
UCS-A /chassis/server # scope cimc
UCS-A /chassis/server/cimc # enable secure-boot
Warning: When committed, CIMC Secure Boot and Installation Feature will be enabled for the
server.
This is an irreversible operation!!
Note This does not apply for Cisco UCS M3 and M4 servers.
Procedure
Step 2 UCS-A /org # create boot-policy Creates a boot policy with the specified policy name, and
policy-name [purpose {operational enters organization boot policy mode.
| utility}] When you create the boot policy, specify the operational
option. This ensures that the server boots from the operating
system installed on the server. The utility options is
reserved and should only be used if instructed to do so by a
Cisco representative.
Step 5 UCS-A /org/boot-policy # set If you choose yes, Cisco UCS Manager displays a
enforce-vnic-name {no | yes} configuration error and reports whether one or more of the
vNICs, vHBAs, or iSCSI vNICs listed in the Boot Order
table match the server configuration in the service profile.
If you choose no, Cisco UCS Manager uses the vNICs,
vHBAs, or iSCSI vNICs (as appropriate for the boot option)
from the service profile.
Step 6 UCS-A /org/boot-policy # set Specifies whether the servers using this boot policy are using
boot-mode {legacy | uefi} UEFI or legacy boot mode.
The following example shows how to create a boot policy named boot-policy-LAN, specify that servers using
this policy will not be automatically rebooted when the boot order is changed, set the UEFI boot mode, enable
UEFI boot security, and commit the transaction:
UCS-A# scope org /
UCS-A /org* # create boot-policy boot-policy-LAN purpose operational
UCS-A /org/boot-policy* # set descr "Boot policy that boots from the LAN."
UCS-A /org/boot-policy* # set reboot-on-update no
UCS-A /org/boot-policy* # set boot-mode uefi
UCS-A /org/boot-policy* # commit-buffer
UCS-A /org/boot-policy # create boot-security
UCS-A /org/boot-policy/boot-security* # set secure-boot yes
UCS-A /org/boot-policy/boot-security* # commit-buffer
UCS-A /org/boot-policy/boot-security #
What to Do Next
Configure one or more of the following boot options for the boot policy and set their boot order:
• LAN Boot —Boots from a centralized provisioning server. It is frequently used to install operating
systems on a server from that server.
If you choose the LAN Boot option, continue to Configuring a LAN Boot for a Boot Policy, on page
562.
• SAN Boot —Boots from an operating system image on the SAN. You can specify a primary and a
secondary SAN boot. If the primary boot fails, the server attempts to boot from the secondary.
We recommend that you use a SAN boot policy, because it offers the most service profile mobility
within the system. If you boot from the SAN, when you move a service profile from one server to another,
the new server boots from exactly the same operating system image. Therefore, the new server appears
to be exactly the same server to the network.
If you choose the SAN Boot option, continue to Configuring a SAN Boot for a Boot Policy, on page
528.
• Virtual Media Boot —Mimics the insertion of a physical CD into a server. It is typically used to
manually install operating systems on a server.
If you choose the Virtual Media boot option, continue to Configuring a Virtual Media Boot for a Boot
Policy, on page 567.
Tip If you configure a local disk and a SAN LUN for the boot order storage type and the operating system or
logical volume manager (LVM) is configured incorrectly, the server might boot from the local disk rather
than the SAN LUN.
For example, on a server with Red Hat Linux installed, where the LVM is configured with default LV
names and the boot order is configured with a SAN LUN and a local disk, Linux reports that there are
two LVs with the same name and boots from the LV with the lowest SCSI ID, which could be the local
disk.
SAN Boot
You can configure a boot policy to boot one or more servers from an operating system image on the SAN.
The boot policy can include a primary and a secondary SAN boot. If the primary boot fails, the server attempts
to boot from the secondary.
Cisco recommends using a SAN boot, because it offers the most service profile mobility within the system.
If you boot from the SAN when you move a service profile from one server to another, the new server boots
from the same operating system image. Therefore, the new server appears as the same server to the network.
To use a SAN boot, ensure that the following is configured:
• The Cisco UCS domain must be able to communicate with the SAN storage device that hosts the operating
system image.
• A boot target LUN (Logical Unit Number) on the device where the operating system image is located.
Note SAN boot is not supported on Gen-3 Emulex adapters on Cisco UCS blade and rack servers.
Tip If you configure a local disk and a SAN LUN for the boot order storage type and the operating system or
logical volume manager (LVM) is configured incorrectly, the server might boot from the local disk rather
than the SAN LUN.
For example, on a server with Red Hat Linux installed, where the LVM is configured with default LV
names and the boot order is configured with a SAN LUN and a local disk, Linux reports that there are
two LVs with the same name and boots from the LV with the lowest SCSI ID, which could be the local
disk.
This procedure continues directly from Creating a Boot Policy, on page 525.
Note If you are creating a boot policy that boots the server from a SAN LUN and you require reliable SAN
boot operations, we recommend that you first remove all local disks from servers associated with a service
profile that includes the boot policy.
This does not apply for Cisco UCS M3 and M4 servers.
Beginning with Release 2.2, all SAN boot-related CLI commands have been moved to the SAN scope. Any
existing scripts from previous releases that use SAN boot under the storage scope instead of org/boot-policy/san
or org/service-profile/boot-definition/san should be updated.
Procedure
Step 2 UCS-A /org # scope boot-policy Enters organization boot policy mode for the specified boot
policy-name policy.
Step 3 UCS-A /org/boot-policy # create Creates a SAN boot for the boot policy and enters
san organization boot policy storage mode.
Step 4 UCS-A /org/boot-policy/san # set Sets the boot order for the SAN boot. Enter an integer
order order_number between 1 and 16.
Step 5 UCS-A /org/boot-policy/san # Creates a SAN image location, and if the san-image option
create san-image {primary | is specified, enters organization boot policy storage SAN
secondary} image mode.
When using the enhanced boot order on Cisco UCS M3
servers, or M4 servers, the boot order that you define is
used. For standard boot mode using the terms "primary" or
"secondary" do not imply a boot order. The effective order
of boot devices within the same device class is determined
by the PCIe bus scan order.
Step 6 UCS-A Specifies the vHBA to be used for the SAN boot.
/org/boot-policy/ssn/san-image #
set vhba vhba-name
Step 7 UCS-A Creates a primary or secondary SAN boot path and enters
/org/boot-policy/san/san-image # organization boot policy SAN path mode.
create path {primary | secondary} When using the enhanced boot order on Cisco UCS M3
servers, or M4 servers, the boot order that you define is
used. For standard boot mode using the terms "primary" or
"secondary" do not imply a boot order. The effective order
of boot devices within the same device class is determined
by the PCIe bus scan order.
Step 8 UCS-A Specifies the LUN or WWN to be used for the SAN path
/org/boot-policy/san/san-image/path to the boot image.
# set {lun lun-id | wwn wwn-num}
Step 9 UCS-A Commits the transaction to the system configuration.
/org/boot-policy/san/san-image/path
# commit-buffer
The following example shows how to enter the boot policy named lab1-boot-policy, create a SAN boot for
the policy, set the boot order to 1, create a primary SAN image, use a vHBA named vHBA2, create primary
path using LUN 0, and commit the transaction:
UCS-A# scope org /
UCS-A /org* # scope boot-policy lab1-boot-policy
UCS-A /org/boot-policy # create san
UCS-A /org/boot-policy/san* # set order 1
UCS-A /org/boot-policy/san* # create san-image primary
UCS-A /org/boot-policy/san/san-image* # set vhba vHBA2
UCS-A /org/boot-policy/san/san-image* # create path primary
UCS-A /org/boot-policy/san/san-image/path* # set lun 0
UCS-A /org/boot-policy/san/san-image/path* # commit-buffer
UCS-A /org/boot-policy/san/san-image/path #
The following example shows how to create a SAN boot for the service profile SP_lab1, set the boot order
to 1, create a primary SAN image, use a vHBA named vHBA2, create primary path using LUN 0, and commit
the transaction:
UCS-A# scope org /
UCS-A /org* # scope service-profile SP_lab1
UCS-A /org/service-profile # create boot-definition
UCS-A /org/service-profile/boot-definition* # create san
UCS-A /org/service-profile/boot-definition/san* # create san-image primary
UCS-A /org/service-profile/boot-definition/san/san-image* # set vhba vHBA2
UCS-A /org/service-profile/boot-definition/san/san-image* # create path primary
UCS-A /org/service-profile/boot-definition/san/san-image/path* # set lun 0
UCS-A /org/service-profile/boot-definition/san/san-image/path* # commit-buffer
UCS-A /org/service-profile/boot-definition/san/san-image/path #
What to Do Next
Include the boot policy in a service profile and template.
iSCSI Boot
iSCSI boot enables a server to boot its operating system from an iSCSI target machine located remotely over
a network.
iSCSI boot is supported on the following Cisco UCS hardware:
• Cisco UCS blade servers that have the Cisco UCS M51KR-B Broadcom BCM57711 network adapter
and use the default MAC address provided by Broadcom.
• Cisco UCS M81KR Virtual Interface Card
• Cisco UCS VIC-1240 Virtual Interface Card
• Cisco UCS VIC-1280 Virtual Interface Card
• Cisco UCS rack servers that have the Cisco UCS M61KR-B Broadcom BCM57712 network adapter.
• Cisco UCS P81E Virtual Interface Card
• Cisco UCS VIC 1225 Virtual Interface Cardon Cisco UCS rack servers
There are prerequisites that must be met before you configure iSCSI boot. For a list of these prerequisites,
see iSCSI Boot Guidelines and Prerequisites, on page 531.
For a high-level procedure for implementing iSCSI boot, see Configuring iSCSI Boot, on page 534.
Note Previously, the host could see only one of the boot paths configured, depending on which path completed
the LUN discovery first, and would boot from that path. Now, when there are two iSCSI boot vNICs
configured, the host sees both of the boot paths. So for multipath configurations, a single IQN must be
configured on both the boot vNICs. If there are different IQNs configured on the boot vNICs on a host,
the host boots with the IQN that is configured on the boot vNIC with the lower PCI order.
The next step, which is the installation of the operating system (OS), requires an OS that is iBFT capable.
During installation of the OS, the OS installer scans the host memory for the iBFT table and uses the information
in the iBFT to discover the boot device and create an iSCSI path to the target LUN. Some OSs requires a NIC
driver to complete this path. If this step is successful, the OS installer finds the iSCSI target LUN on which
to install the OS.
Note The iBFT works at the OS installation software level and might not work with HBA mode (also known
as TCP offload). Whether iBFT works with HBA mode depends on the OS capabilities during installation.
Also, for a server that includes a Cisco UCS M51KR-B Broadcom BCM57711 adapter, the iBFT normally
works at a maximum transmission unit (MTU) size of 1500, regardless of the MTU jumbo configuration.
If the OS supports HBA mode, you might need to set HBA mode, dual-fabric support, and jumbo MTU
size after the iSCSI installation process.
• Two IP addresses must be determined, one for each iSCSI initiator. If possible, the IP addresses should
be on the same subnet as the storage array. The IP addresses are assigned statically or dynamically using
the Dynamic Host Configuration Protocol (DHCP).
• You cannot configure boot parameters in the Global boot policy. Instead, after configuring boot
parameters, include the boot policy in the appropriate service profile.
• The operating system (OS) must be iSCSI Boot Firmware Table (iBFT) compatible.
• For Cisco UCS M51KR-B Broadcom BCM57711 network adapters:
◦Servers that use iSCSI boot must contain the Cisco UCS M51KR-B Broadcom BCM57711 network
adapter. For information on installing or replacing an adapter card, see the Cisco UCS B250
Extended Memory Blade Server Installation and Service Note. The service note is accessible from
the Cisco UCS B-Series Servers Documentation Roadmap at http://www.cisco.com/go/
unifiedcomputing/b-series-doc.
◦Set the MAC addresses on the iSCSI device.
◦If you are using the DHCP Vendor ID (Option 43), configure the MAC address of an iSCSI device
in /etc/dhcpd.conf.
◦HBA mode (also known as TCP offload) and the boot to target setting are supported. However,
only Windows OS supports HBA mode during installation.
◦Before installing the OS, disable the boot to target setting in the iSCSI adapter policy, then after
installing the OS, re-enable the boot to target setting.
Note Each time you change an adapter policy setting, the adapter reboots to apply the new
setting.
◦When installing the OS on the iSCSI target, the iSCSI target must be ordered before the device
where the OS image resides. For example, if you are installing the OS on the iSCSI target from a
CD, the boot order should be the iSCSI target and then the CD.
◦After the server is iSCSI booted, do not modify the Initiator Name, Target name, LUN, iSCSI
device IP, or Netmask/gateway using the Broadcom tool.
◦Do not interrupt the POST (power on self-test) process or the Cisco UCS M51KR-B Broadcom
BCM57711 network adapter will fail to initialize.
• For Cisco UCS M81KR Virtual Interface Card and Cisco UCS VIC-1240 Virtual Interface Card:
For Cisco UCS VIC-1240 Virtual Interface Card:
◦Do not set MAC addresses on the iSCSI device.
◦HBA mode and the boot to target setting are not supported.
◦When installing the OS on the iSCSI target, the iSCSI target must be ordered after the device where
the OS image resides. For example, if you are installing the OS on the iSCSI target from a CD,
the boot order should be the CD and then the iSCSI target.
◦If you are using the DHCP Vendor ID (Option 43), the MAC address of the overlay vNIC must
be configured in /etc/dhcpd.conf.
◦After the server is iSCSI booted, do not modify the IP details of the overlay vNIC.
• The VMware ESX/ESXi operating system does not support storing a core dump file to an iSCSI boot
target LUN. Dump files must be written to a local disk.
Note If you change an iSCSI vNIC to use the DHCP Option 43 by setting the vendor ID, it
does not remove the initiator IQN configured at the service profile level. The initiator
IQN at the service profile level can still be used by another iSCSI vNIC which does not
use the DHCP Option 43.
Note If you change the networking hardware, Windows might fail to boot from an iSCSI drive. For more
information, see Microsoft support Article ID: 976042.
Procedure
Step 1 In the service profile associated with the server, configure the primary iSCSI vNIC.
For more information, see Creating an iSCSI vNIC in a Service Profile, on page 544.
Step 2 Using the primary iSCSI vNIC, install the Windows operating system on the iSCSI target LUN.
Step 3 After Windows installation completes, enable MPIO on the host.
Step 4 In the service profile associated with the server, add the secondary iSCSI vNIC to the boot policy.
For more information, see Creating an iSCSI Adapter Policy, on page 535.
Procedure
Step 7 Create an iSCSI vNIC in a service profile. For more information, see Creating an iSCSI vNIC
in a Service Profile, on page 544.
Step 9 Create an iSCSI static or auto target. For more information, see either Creating an iSCSI
Static Target, on page 557 or Creating an iSCSI Auto
Target, on page 560.
Step 10 Associate the service profile with a server. For more information, see Associating a Service
Profile with a Blade Server or Server Pool, on page
626.
Step 11 Verify the iSCSI boot operation. For more information, see Verifying iSCSI Boot.
Step 12 Install the OS on the server. For more information, see one of the following
guides:
• Cisco UCS B-Series Blade Servers VMware
Installation Guide
• Cisco UCS B-Series Blade Servers Linux
Installation Guide
• Cisco UCS B-Series Blade Servers Windows
Installation Guide
Step 2 UCS-A /org # create iscsi-policy Creates the iSCSI adapter policy.
policy-name
Step 3 UCS-A /org/iscsi-policy # set descr (Optional)
description Provides a description for the iSCSI adapter policy.
Step 5 UCS-A /org/iscsi-policy # set The number of seconds to wait before the initiator assumes
iscsi-protocol-item dhcp-timeout that the DHCP server is unavailable.
timeout-secs Enter an integer between 60 and 300 (default: 60 seconds).
Step 6 UCS-A /org/iscsi-policy # set The number of times to retry the connection in case of a
iscsi-protocol-item failure during iSCSI LUN discovery.
lun-busy-retry-count num Enter an integer between 0 and 60. If you enter 0, Cisco
UCS uses the value set in the adapter firmware (default:
15 seconds).
Step 7 UCS-A /org/iscsi-policy # set Specifies whether to apply a TCP timestamp. With this
iscsi-protocol-item tcp-time-stamp setting, transmitted packets are given a time stamp of when
{no | yes} the packet was sent so that the packet's round-trip time can
be calculated, when needed. This setting applies only to
Cisco UCS M51KR-B Broadcom BCM57711 adapters.
Step 9 UCS-A /org/iscsi-policy # set Specifies whether to boot from the iSCSI target.
iscsi-protocol-item boottotarget {no This option only applies to servers with the Cisco UCS
| yes} NIC M51KR-B adapter. It should be disabled until you
have installed an operating system on the server.
The following example shows how to create an iSCSI adapter policy called iscsiboot, set the connection
timeout, DHCP timeout, and LUN busy retry count, apply a TCP timestamp, and commit the transaction:
UCS-A# scope org /
UCS-A /org # create iscsi-policy iscsiboot
UCS-A /org/iscsi-policy* # set iscsi-protocol-item connection-timeout 60
UCS-A /org/iscsi-policy* # set iscsi-protocol-item dhcp-timeout 200
UCS-A /org/iscsi-policy* # set iscsi-protocol-item lun-busy-retry-count 5
UCS-A /org/iscsi-policy* # set iscsi-protocol-item tcp-time-stamp yes
UCS-A /org/iscsi-policy* # set iscsi-protocol-item hbamode yes
UCS-A /org/iscsi-policy* # set iscsi-protocol-item boottotarget yes
UCS-A /org/iscsi-policy* # commit-buffer
UCS-A /org/iscsi-policy #
What to Do Next
Include the adapter policy in a service profile and template.
Step 2 UCS-A /org # delete iscsi-policy Deletes the iSCSI adapter policy.
policy-name
Step 3 UCS-A /org # commit-buffer Commits the transaction to the system configuration.
The following example shows how to delete an iSCSI adapter policy named iscsi-adapter-pol and commit the
transaction:
UCS-A# scope org /
UCS-A /org # delete iscsi-policy iscsi-adapter-pol
UCS-A /org* # commit-buffer
UCS-A /org #
Procedure
Step 2 UCS-A /org # create auth-profile Creates an authentication profile with the
profile-name specified name. The name can be up to 16
alphanumeric characters.
The following example shows how to create an authentication profile for an initiator and target and commit
the transaction:
What to Do Next
Create an Ethernet vNIC to be used as the overlay vNIC for the iSCSI device, and then create an iSCSI vNIC.
Step 2 UCS-A /org # delete auth-profile Deletes the specified authentication profile.
auth-profile-name
Step 3 UCS-A /org # commit-buffer Commits the transaction to the system configuration.
The following example shows how to delete an authentication profile called iscsi-auth and commit the
transaction:
UCS-A# scope org
UCS-A /org # delete auth-profile iscsi-auth
Procedure
Step 2 UCS-A /org# scope ip-pool Enters the mode to specify an iSCSI initiator pool.
iscsi-initiator-pool
Step 3 UCS-A /org/ip-pool # set descr (Optional)
description Provides a description for the IP pool.
Note If your description includes spaces, special
characters, or punctuation, you must begin and
end your description with quotation marks. The
quotation marks will not appear in the
description field of any show command output.
Step 4 UCS-A /org/ip-pool # set This can be one of the following:
assignmentorder {default |
sequential} • default—Cisco UCS Manager selects a random
identity from the pool.
• sequential—Cisco UCS Manager selects the lowest
available identity from the pool.
Step 5 UCS-A /org/ip-pool# create block Creates a block of IP addresses for the iSCSI initiator.
from_ip_address to_ip_address
default_gateway subnet_mask
Step 6 UCS-A/org/ip-pool/block# show (Optional)
detail expand Shows the block of IP addresses that you have created.
The following example shows how to create an IP initiator pool for the iSCSI vNIC and commit the transaction:
What to Do Next
Configure one or more service profiles or service profile templates to obtain the iSCSI initiator IP address
from the iSCSI initiator IP pool.
Step 2 UCS-A /org# scope ip-pool Enters the mode to specify an iSCSI initiator pool.
iscsi-initiator-pool
Step 3 UCS-A /org/ip-pool# delete block Deletes the specified block of IP addresses from
from_ip_address to_ip_address the initiator pool.
Step 5 UCS-A /org/ip-pool# commit buffer Commits the transaction to the system
configuration.
The following example shows how to delete a block of IP addresses from the initiator pool and commit the
transaction:
IP Pool:
Name: iscsi-initiator-pool
Size: 0
Assigned: 0
Descr:
UCS-A /org/ip-pool # commit buffer
Procedure
Step 2 UCS-A /org # create boot-policy Creates a boot policy with the specified policy name, and enters
policy-name [purpose organization boot policy mode.
{operational | utility}] This name can be between 1 and 16 alphanumeric characters.
You cannot use spaces or any special characters other than -
(hyphen), _ (underscore), : (colon), and . (period), and you
cannot change this name after the object is saved.
When you create the boot policy, specify the operational
option. This ensures that the server boots from the operating
system installed on the server. The utility options is reserved
and should only be used if instructed to do so by a Cisco
representative.
Step 5 UCS-A /org/boot-policy # set Specifies whether the servers using this boot policy are
reboot-on-update {no | yes} automatically rebooted after you make changes to the boot
order.
In the Cisco UCS Manager GUI, if the Reboot on Boot Order
Change check box is checked for a boot policy, and if
CD-ROM or Floppy is the last device in the boot order, deleting
or adding the device does not directly affect the boot order and
the server does not reboot.
The following example shows how to create an iSCSI boot policy named iscsi-boot-policy-LAN, provide a
description for the boot policy, specify that servers using this policy are not automatically rebooted when the
boot order is changed, set the boot order for iSCSI boot to 2, create an iSCSI boot and associate it with a vNIC
called iscsienic1, and commit the transaction:
UCS-A# scope org /
UCS-A /org* # create boot-policy iscsi-boot-policy-LAN purpose operational
UCS-A /org/boot-policy* # set descr "Boot policy that boots from iSCSI."
UCS-A /org/boot-policy* # set enforce-vnic-name yes
UCS-A /org/boot-policy* # set reboot-on-update no
UCS-A /org/boot-policy* # create iscsi
UCS-A /org/boot-policy/iscsi* # create path primary
UCS-A /org/boot-policy/iscsi/path* # set iscsivnicname iscsienic1
UCS-A /org/boot-policy/iscsi/path* # exit
UCS-A /org/boot-policy/iscsi* # set order 2
UCS-A /org/boot-policy/iscsi* # commit-buffer
UCS-A /org/boot-policy #
What to Do Next
Include the boot policy in a service profile and template.
After a server is associated with a service profile that includes this boot policy, you can verify the actual boot
order in the Boot Order Details area on the General tab for the server.
Step 2 UCS-A /org # scope boot-policy Enters boot policy organization mode for the
boot-pol-name specified boot policy.
Step 3 UCS-A /org/boot-policy # delete iscsi Deletes the iSCSI boot from the boot policy.
The following example shows how to delete an iSCSI boot from the boot policy named boot-policy-iscsi and
commit the transaction:
UCS-A# scope org /
UCS-A /org # scope boot-policy boot-policy-iscsi
UCS-A /org/boot-policy # delete iscsi
UCS-A /org/boot-policy* # commit-buffer
UCS-A /org/boot-policy #
Procedure
Step 2 UCS-A /org # scope service-profile profile-name Enters service profile organization mode
for the service profile.
Step 4 UCS-A /org/service-profile* # commit buffer Commits the transaction to the system
configuration.
The following example shows how to create a specific name for an iSCSI initiator and commit the transaction:
Procedure
Step 2 UCS-A /org # scope service-profile Enters service profile organization mode for the service
profile-name profile.
Step 8 UCS-A /org/service-profile/vnic-iscsi* Specifies the Ethernet vNIC that is used by the iSCSI
# set overlay-vnic-name device as the overlay vNIC. For more information, see
overlay-vnic-name Configuring a vNIC for a Service Profile, on page 610.
The following example shows how to create an iSCSI vNIC called scsivnic1, add it to an existing service
profile called accounting, and commit the transaction:
What to Do Next
Configure an iSCSI initiator to boot using a static IP address, an IP address from a configured IP pool, or
DHCP.
Step 2 UCS-A /org # scope service-profile Enters service profile organization mode for the
profile-name service profile.
Step 3 UCS-A /org/service-profile # delete Deletes the specified iSCSI vNIC from the specified
vnic-iscsi iscsi-vnic-name service profile.
The following example shows how to delete an iSCSI vNIC called scsivnic1 and commit the transaction:
UCS-A# scope org /
UCS-A /org # scope service-profile accounting
UCS-A /org/service-profile # delete vnic-iscsi scsivnic1
UCS-A /org/service-profile* # commit-buffer
UCS-A /org/service-profile #
Procedure
The following example shows how to configure the initiator to boot using a static IP address and commit the
transaction:
255.255.255.0
UCS-A /org/service-profile/iscsi-boot/vnic-iscsi/ip-if/static-ip-params* # commit-buffer
What to Do Next
Create an iSCSI target.
Procedure
Step 2 UCS-A /org # scope service-profile profile-name Enters service profile organization
mode for the service profile.
Step 3 UCS-A /org/service-profile # scope vnic-iscsi iscsi-vnic-name Enters the configuration mode for
the specified iSCSI vNIC.
Step 4 UCS-A /org/service-profile/iscsi-boot/vnic-iscsi # scope ip-if Enters the configuration mode for
an IP interface.
The following example shows how to delete the static IP address boot parameters from the initiator and commit
the transaction:
Procedure
Step 3 UCS-A /org/service-profile # scope iscsi-boot Enters the configuration mode for
configuring iSCSI boot
parameters.
Step 4 UCS-A /org/service-profile/iscsi-boot # scope vnic-iscsi Enters the configuration mode for
iscsi-vnic-name the specified iSCSI vNIC.
Step 5 UCS-A /org/service-profile/iscsi-boot/vnic-iscsi* # scope ip-if Enters the configuration mode for
the iSCSI Ethernet interface.
The following example shows how to create an iSCSI initiator and configure it to boot using an IP address
from an IP pool:
What to Do Next
Create an iSCSI target.
Procedure
Step 3 UCS-A /org/service-profile # scope iscsi-boot Enters the configuration mode for
configuring the iSCSI boot
parameters.
Step 4 UCS-A /org/service-profile/iscsi-boot/ # scope vnic-iscsi Enters the configuration mode for
iscsi-vnic-name the specified iSCSI vNIC.
Step 5 UCS-A /org/service-profile/iscsi-boot/vnic-iscsi # enter ip-if Enters the configuration mode for
an IP interface.
The following example shows how to delete the boot using an IP address from an IP poo parameter and commit
the transaction:
Procedure
Step 2 UCS-A /org # scope service-profile profile-name Enters service profile organization
mode for the service profile.
Step 3 UCS-A /org/service-profile # scope iscsi-boot Enters the configuration mode for
configuring iSCSI boot
parameters.
Step 4 UCS-A /org/service-profile/iscsi-boot # scope vnic-iscsi Enters the configuration mode for
iscsi-vnic-name the specified iSCSI vNIC.
Step 6 UCS-A /org/service-profile/iscsi-boot/vnic-iscsi/ip-if* # create Specifies that you are setting the
dhcp-ip-params initiator to boot using DHCP.
The following example shows how to configure the initiator to boot using DHCP and commit the transaction:
What to Do Next
Create an iSCSI target.
Procedure
Step 2 UCS-A /org # scope service-profile profile-name Enters service profile organization
mode for the service profile.
Step 3 UCS-A /org/service-profile # scope iscsi-boot Enters the configuration mode for
configuring iSCSI boot
parameters.
Step 4 UCS-A /org/service-profile/iscsi-boot # scope vnic-iscsi Enters the configuration mode for
iscsi-vnic-name the specified iSCSI vNIC.
Step 5 UCS-A /org/service-profile/iscsi-boot/vnic-iscsi # enter ip-if Enters the configuration mode for
an IP interface.
Step 6 UCS-A /org/service-profile/iscsi-boot/vnic-iscsi/ip-if* # delete Specifies that the initiator does not
dhcp-ip-params use DHCP to boot.
The following example shows how to delete the boot using DHCP parameter and commit the transaction:
IQN Pools
An IQN pool is a collection of iSCSI Qualified Names (IQNs) for use as initiator identifiers by iSCSI vNICs
in a Cisco UCS domain.
IQN pool members are of the form prefix:suffix:number, where you can specify the prefix, suffix, and a block
(range) of numbers.
An IQN pool can contain more than one IQN block, with different number ranges and different suffixes, but
sharing the same prefix.
Note In most cases, the maximum IQN size (prefix + suffix + additional characters) is 223 characters. When
using the Cisco UCS NIC M51KR-B adapter, you must limit the IQN size to 128 characters.
Procedure
Step 2 UCS-A /org # create iqn-pool Creates an IQN pool with the specified pool name and enters
pool-name organization IQN pool mode.
This name can be between 1 and 32 alphanumeric characters. You
cannot use spaces or any special characters other than - (hyphen),
_ (underscore), : (colon), and . (period), and you cannot change
this name after the object is saved.
Step 3 UCS-A /org/iqn-pool # set Specifies the prefix for the IQN block members. Unless limited
iqn-prefix prefix by the adapter card, the prefix can contain up to 150 characters.
Step 6 UCS-A /org/iqn-pool # create Creates a block (range) of IQNs, and enters organization IQN pool
block suffix from to block mode. You must specify the base suffix, the starting suffix
number, and the ending suffix number. The resulting IQN pool
members are of the form prefix:suffix:number. The suffix can be
up to 64 characters.
Note An IQN pool can contain more than one IQN block. To
create multiple blocks, enter multiple create block
commands from organization IQN pool mode.
Step 7 UCS-A /org/iqn-pool/block # Commits the transaction to the system configuration.
commit-buffer
The following example shows how to create an IQN pool named pool4, provide a description for the pool,
specify a prefix and a block of suffixes to be used for the pool, and commit the transaction:
UCS-A# scope org /
UCS-A /org # create iqn-pool pool4
UCS-A /org/iqn-pool* # set iqn-prefix iqn.alpha.com
UCS-A /org/iqn-pool* # set descr "This is IQN pool 4"
UCS-A /org/iqn-pool* # create block beta 3 5
UCS-A /org/iqn-pool/block* # commit-buffer
UCS-A /org/iqn-pool/block #
What to Do Next
Include the IQN suffix pool in a service profile and template.
Step 2 UCS-A /org # scope iqn-pool Enters organization IQN pool mode for the specified pool.
pool-name
Step 3 UCS-A /org/iqn-pool # create Creates a block (range) of IQN suffixes, and enters
block suffix from to organization IQN pool block mode. You must specify the
base suffix, the starting suffix number, and the ending suffix
number. The resulting IQN pool members are of the form
prefix:suffix:number.
Note An IQN pool can contain more than one IQN block.
To create multiple blocks, enter multiple create
block commands from organization IQN pool
mode.
Step 4 UCS-A /org/iqn-pool/block # Commits the transaction to the system configuration.
commit-buffer
Step 5 UCS-A /org/iqn-pool/block # exit (Optional)
Returns to organization IQN pool mode.
This example shows how to add a block of IQN suffixes to an IQN pool named pool4 and commit the
transaction:
UCS-A# scope org /
UCS-A /org # scope iqn-pool pool4
UCS-A /org/iqn-pool # create block beta 3 5
UCS-A /org/iqn-pool #
Procedure
Step 2 UCS-A /org # scope iqn-pool Enters organization IQN pool mode for the specified
pool-name pool.
Step 3 UCS-A /org/iqn-pool # delete block Deletes a block (range) of IQNs. You must specify the
suffix from to base suffix and the first and last numbers in the block
to be deleted.
This example shows how to delete a block of suffixes from an IQN pool named pool4 and commit the
transaction:
UCS-A# scope org /
UCS-A /org # scope iqn-pool pool4
UCS-A /org/iqn-pool # delete block beta 0 12
UCS-A /org/iqn-pool* # commit-buffer
UCS-A /org/iqn-pool #
Procedure
Step 2 UCS-A /org # delete iqn-pool Deletes the specified IQN pool.
pool-name
Step 3 UCS-A /org # commit-buffer Commits the transaction to the system configuration.
The following example shows how to delete the IQN pool named pool4 and commit the transaction:
UCS-A# scope org /
UCS-A /org # delete iqn-pool pool4
UCS-A /org* # commit-buffer
UCS-A /org #
Step 2 UCS-A /org # scope iqn-pool Enters organization IQN pool mode for the specified
pool-name pool.
Step 3 UCS-A /org/iqn-pool # show pooled Displays the assignments of the IQN block members.
The following example shows how to display the assignments of suffixes in the IQN pool named pool4:
UCS-A# scope org /
UCS-A /org # scope iqn-pool pool4
UCS-A /org/iqn-pool # show pooled
Pooled:
Name Assigned Assigned To Dn
---------- -------- --------------
beta:3 No
beta:4 No
beta:5 No
UCS-A /org/iqn-pool #
Procedure
Step 2 UCS-A /org # scope service-profile profile-name Enters service profile organization mode for the
profile to which you want to add an iSCSI target
Step 3 UCS-A /org/service-profile # scope iscsi-boot Enters the mode for configuring iSCSI boot para
Step 4 UCS-A /org/service-profile/iscsi-boot # scope vnic-iscsi Enters the iSCSI vNIC mode for the specified vN
iscsi-vnic-name
Step 5 UCS-A /org/service-profile/iscsi-boot/vnic-iscsi # create Creates a static target for the iSCSI vNIC and ass
static-target-if {1 | 2} priority level to it.
Valid priority levels are 1 or 2.
The following example shows how to create two iSCSI static target interfaces and commit the transaction:
UCS-A # scope org test
UCS-A /org # scope service-profile accounting
UCS-A /org/service-profile # scope iscsi-boot
UCS-A /org/service-profile/iscsi-boot # scope vnic-iscsi iSCSI1
UCS-A /org/service-profile/iscsi-boot/vnic-iscsi # create static-target-if 1
UCS-A /org/service-profile/iscsi-boot/vnic-iscsi/static-target-if* # set name statictarget1
UCS-A /org/service-profile/iscsi-boot/vnic-iscsi/static-target-if* # set port 3260
UCS-A /org/service-profile/iscsi-boot/vnic-iscsi/static-target-if* # set auth-name
authprofile1
UCS-A /org/service-profile/iscsi-boot/vnic-iscsi/static-target-if* # set ip-address
192.168.10.10
UCS-A /org/service-profile/iscsi-boot/vnic-iscsi/static-target-if* # create lun
UCS-A /org/service-profile/iscsi-boot/vnic-iscsi/static-target-if/lun* # set id 1
UCS-A /org/service-profile/iscsi-boot/vnic-iscsi/static-target-if/lun* # exit
UCS-A /org/service-profile/iscsi-boot/vnic-iscsi/static-target-if* # exit
UCS-A /org/service-profile/iscsi-boot/vnic-iscsi # commit-buffer
UCS-A /org/service-profile/iscsi-boot/vnic-iscsi # create static-target-if 2
UCS-A /org/service-profile/iscsi-boot/vnic-iscsi/static-target-if* # set ipaddress
192.168.10.11
UCS-A /org/service-profile/iscsi-boot/vnic-iscsi/static-target-if* # set name statictarget2
What to Do Next
To configure a second iSCSI device, repeat the steps for creating an iSCSI vNIC, initiator, and target.
Note If you have two iSCSI targets and you delete the first priority target, the second priority target becomes
the first priority target, although the Cisco UCS Manager still shows it as the second priority target.
Procedure
Step 2 UCS-A /org # scope service-profile Enters service profile organization mode for the
profile-name service profile to which you want to add an iSCSI
target.
Step 3 UCS-A /org/service-profile # scope Enters the mode for configuring iSCSI boot
iscsi-boot parameters.
Step 4 UCS-A /org/service-profile/iscsi-boot # Enters the iSCSI vNIC mode for the specified
scope vnic-iscsi iscsi-vnic-name vNIC name.
Step 5 UCS-A Deletes the static target for the iSCSI vNIC.
/org/service-profile/iscsi-boot/vnic-iscsi #
delete static-target-if
Step 6 UCS-A Commits the transaction to the system
/org/service-profile/iscsi-boot/vnic-iscsi # configuration.
commit-buffer
The following example shows how to delete an iSCSI static target and commit the transaction:
UCS-A # scope org test
UCS-A /org # scope service-profile sample
UCS-A /org # scope iscsi-boot
Procedure
Step 2 UCS-A /org # scope service-profile profile-name Enters service profile organization mode
for the service profile that you want to add
an iSCSI target interface to.
Step 3 UCS-A /org # scope iscsi-boot Enters the mode for configuring iSCSI
boot parameters.
Example:
Step 4 UCS-A /org/service-profile/iscsi-boot # scope Enters iSCSI vNIC service profile
vnic-iscsi iscsi-vnic-name organization mode for the specified vNIC
name.
Step 5 UCS-A /org/service-profile/iscsi-boot/vnic-iscsi/ # Creates an auto target for the iSCSI vNIC.
create auto-target-if If you plan to use an auto target without
the vendor ID, you must configure an
initiator name. For more information, see
Creating an iSCSI vNIC in a Service
Profile, on page 544.
The following example shows how to create an iSCSI auto target without a vendor ID and commit the
transaction:
What to Do Next
To configure a second iSCSI device, repeat the steps for creating an iSCSI vNIC, initiator, and target.
Procedure
Step 2 UCS-A /org # scope service-profile Enters the service profile mode for the service
profile-name profile to which you want to add an iSCSI target.
Step 3 UCS-A /org/service-profile # scope Enters the mode for configuring iSCSI boot
iscsi-boot parameters.
Step 4 UCS-A /org/service-profile/iscsi-boot # Enters the iSCSI vNIC mode for the specified
scope vnic-iscsi iscsi-vnic-name vNIC name.
The following example shows how to delete an iSCSI auto target and commit the transaction:
LAN Boot
You can configure a boot policy to boot one or more servers from a centralized provisioning server on the
LAN. A LAN (or PXE) boot is frequently used to install operating systems on a server from that LAN server.
You can add more than one type of boot device to a LAN boot policy. For example, you could add a local
disk or virtual media boot as a secondary boot device.
Procedure
Step 2 UCS-A /org # scope boot-policy Enters organization boot policy mode for the
policy-name specified boot policy.
Step 3 UCS-A /org/boot-policy # create lan Creates a LAN boot for the boot policy and enters
organization boot policy LAN mode.
Step 4 UCS-A /org/boot-policy/lan # set order Specifies the boot order for the LAN boot.
{1 | 2 | 3 | 4}
Step 5 UCS-A /org/boot-policy/lan # create path Creates a primary or secondary LAN boot path and
{primary | secondary} enters organization boot policy LAN path mode.
Step 6 UCS-A /org/boot-policy/lan/path # set Specifies the vNIC to use for the LAN path to the
vnic vnic-name boot image.
The following example enters the boot policy named lab2-boot-policy, creates a LAN boot for the policy,
sets the boot order to 2, creates primary and secondary paths using the vNICs named vNIC1 and vNIC2 , and
commits the transaction:
UCS-A# scope org /
UCS-A /org* # scope boot-policy lab2-boot-policy
UCS-A /org/boot-policy* # create lan
UCS-A /org/boot-policy/lan* # set order 2
UCS-A /org/boot-policy/lan* # create path primary
UCS-A /org/boot-policy/lan/path* # set vnic vNIC1
UCS-A /org/boot-policy/lan/path* # exit
UCS-A /org/boot-policy/lan* # create path secondary
UCS-A /org/boot-policy/lan/path* # set vnic vNIC2
UCS-A /org/boot-policy/lan/path* # commit-buffer
UCS-A /org/boot-policy/lan/path #
What to Do Next
Include the boot policy in a service profile and template.
Note For Cisco UCS M3 and M4 blade and rack servers using enhanced boot order, you can select both top-level
and second-level boot devices. For Cisco UCS M1 and M2 blade and rack servers using standard boot
order, you can only select a top-level device.
Note Second-level devices are only available for Cisco UCS M3 and M4 blade and rack servers using enhanced
boot order. For Cisco UCS M1 and M2 blade and rack servers using standard boot order, you can choose
only the top-level Add Local Disk.
Note Second-level devices are only available for Cisco UCS M3 and M4 blade and rack servers using enhanced
boot order. For Cisco UCS M1 and M2 blade and rack servers using standard boot order, you can choose
only the top-level Add CD/DVD or Add Floppy.
Note Beginning with Release 2.2, if you want to add any top-level local storage device to the boot order, you
must use create local-any after the create local command. If you have any policies from previous releases
that contain a local storage device, they will be modified to use local-any during upgrade.
Procedure
Step 2 UCS-A /org # scope boot-policy policy-name Enters organization boot policy mode for the
specified boot policy.
Step 3 UCS-A /org/boot-policy # create storage Creates a storage boot for the boot policy and
enters organization boot policy storage mode.
Step 4 UCS-A /org/boot-policy/storage # create local Creates a local storage location and enters the
boot policy local storage mode.
Step 5 UCS-A /org/boot-policy/storage/local/ # create Specifies the type of local storage. This can be
{local-any | local-lun | sd-card | usb-extern | one of the following:
usb-intern }
• local-any—Any type of local storage
device. This option can be used in either
legacy or UEFI boot mode.
Note Cisco UCS M1 and M2 blade and
rack servers using standard boot
order can only use local-any.
• local-lun—A local hard disk drive.
• sd-card—An SD card.
• usb-extern—An external USB card.
• usb-intern—An internal USB card.
Step 6 UCS-A Sets the boot order for the specified local storage
/org/boot-policy/storage/local/local-storage-device device. Enter an integer between 1 and 16.
# set order order_number When using the enhanced boot order on Cisco
UCS M3 servers, or M4 servers, the boot order
that you define is used. For standard boot mode
using the terms "primary" or "secondary" do not
imply a boot order. The effective order of boot
devices within the same device class is
determined by the PCIe bus scan order.
The following example shows how to create a boot policy named lab1-boot-policy, create a local hard disk
drive boot for the policy, set the boot order to 3, and commit the transaction:
UCS-A# scope org /
UCS-A /org* # scope boot-policy lab1-boot-policy
UCS-A /org/boot-policy* # create storage
UCS-A /org/boot-policy/storage* # create local
UCS-A /org/boot-policy/storage/local* # create local-lun
UCS-A /org/boot-policy/storage/local/sd-card* # set order 3
UCS-A /org/boot-policy/storage/local/sd-card* # commit-buffer
UCS-A /org/boot-policy/storage/local/sd-card #
The following example shows how to create a local SD card boot for the service profile SP_lab1, set the boot
order to 3, and commit the transaction:
UCS-A# scope org /
UCS-A /org* # scope service-profile SP_lab1
UCS-A /org/service-profile # create boot-definition
UCS-A /org/service-profile/boot-definition* # create storage
UCS-A /org/service-profile/boot-definition/storage* # create local
UCS-A /org/service-profile/boot-definition/storage/local* # create sd-card
UCS-A /org/service-profile/boot-definition/storage/local* # set order 3
UCS-A /org/service-profile/boot-definition/storage/local* # commit-buffer
UCS-A /org/service-profile/boot-definition/storage/local #
The following example shows how to create any top-level local device boot for the service profile SP_lab1,
set the boot order to 3, and commit the transaction:
UCS-A# scope org /
UCS-A /org* # scope service-profile SP_lab1
UCS-A /org/service-profile # create boot-definition
UCS-A /org/service-profile/boot-definition* # create storage
UCS-A /org/service-profile/boot-definition/storage* # create local
UCS-A /org/service-profile/boot-definition/storage/local* # create local-any
UCS-A /org/service-profile/boot-definition/storage/local/local-any* # set order 3
UCS-A /org/service-profile/boot-definition/storage/local/local-any* # commit-buffer
UCS-A /org/service-profile/boot-definition/storage/local/local-any #
What to Do Next
Include the boot policy in a service profile and template.
Note Virtual Media requires the USB to be enabled. If you modify the BIOS settings that affect the USB
functionality, you also affect the Virtual Media. Therefore, Cisco recommends that you leave the following
USB BIOS defaults for best performance:
• Make Device Non Bootable—set to disabled
• USB Idle Power Optimizing Setting—set to high-performance
Procedure
Step 2 UCS-A /org # scope boot-policy Enters organization boot policy mode for the specified boot
policy-name policy.
Step 3 UCS-A /org/boot-policy # create Creates the specified virtual media boot for the boot policy
virtual-media {read-only | and enters organization boot policy virtual media mode. This
read-only-local | can be one of the following:
read-only-remote | read-write |
read-write-drive | • read-only—Local or remote CD/DVD. This option can
be used in either legacy or UEFI boot mode.
read-write-local |
read-write-remote} • read-only-local—Local CD/DVD.
• read-only-remote—Remote CD/DVD.
• read-write—Local or remote floppy disk drive. This
option can be used in either legacy or UEFI boot mode.
• read-write-drive—Remote USB drive.
• read-write-local—Local floppy disk drive.
• read-write-remote—Remote floppy disk drive.
The following example shows how to enter the boot policy named lab3-boot-policy, create a CD/DVD virtual
media boot, set the boot order to 3, and commit the transaction:
UCS-A# scope org /
UCS-A /org* # scope boot-policy lab3-boot-policy
UCS-A /org/boot-policy* # create virtual-media read-only-local
UCS-A /org/boot-policy/virtual-media* # set order 3
UCS-A /org/boot-policy/virtual-media* # commit-buffer
What to Do Next
Include the boot policy in a service profile and template.
Procedure
Step 2 UCS-A /org # create boot-policy Creates a boot policy with the specified policy
policy-name name, and enters organization boot policy mode.
Step 3 UCS-A /org/boot-policy* # create Displays a list of local and remote devices to your
virtual-media ? can access and boot.
Step 4 UCS-A /org/boot-policy* # create Displays a list of local and remote devices to your
virtual-media {access | can access and boot.
vMediaMappingName}
Step 5 UCS-A /org/boot-policy* # create Creates vMedia Boot Device configuration for
virtual-media read-write-remote-drive specified vMedia.
vMediaMap0}
Step 6 UCS-A /org/boot-policy/virtual-media* # Commits the transaction to the system
commit-buffer configuration.
UCS-A /chassis/server/cimc #
Important In an EFI Shell boot policy, If you edit the boot mode to Legacy, Cisco UCS Manager removes the EFI
Shell boot device and sets the boot policy to default.
Procedure
Step 2 UCS-A /org # create boot-policy Creates a boot policy with the specified policy name,
policy-name and enters organization boot policy mode.
Step 3 UCS-A /org/boot-policy* # set Specifies whether the servers using this boot policy are
boot-mode {legacy | uefi} using UEFI or legacy boot mode.
Note To configure EFI Shell as a boot device, ensure
that the boot mode is set to Uefi
Step 4 UCS-A /org/boot-policy* # create Creates an EFI Shell boot for the boot policy and enters
efi-shell organization boot policy mode.
What to Do Next
Include the boot policy in a service profile and template.
Step 2 UCS-A /org # delete boot-policy Deletes the specified boot policy.
policy-name
Step 3 UCS-A /org # commit-buffer Commits the transaction to the system configuration.
The following example deletes the boot policy named boot-policy-LAN and commits the transaction:
UCS-A# scope org /
UCS-A /org # delete boot-policy boot-policy-LAN
UCS-A /org* # commit-buffer
UCS-A /org #
• UEFI boot parameters are specific to each operating system. You can specify UEFI boot parameters for
the following operating systems:
◦VMware ESX
◦SuSE Linux
◦Microsoft Windows
◦Red Hat Enterprise Linux 7
Procedure
Step 5 UCS-A /org/boot-policy/storage/local/ # scope {local-any | local-lun | sd-card Specifies the type of
| usb-extern | usb-intern } local storage. This
can be one of the
following:
• local-any—Any
type of local
storage device.
This option
Important The
only
type of
local
storage
for
which
you can
configure
UEFI
boot
parameters
is
local-lun.
The following example shows how to create UEFI boot parameters for a local LUN, and commit the transaction:
UCS-A# scope org /
UCS-A /org* # scope boot-policy bp1
UCS-A /org/boot-policy* # scope storage
UCS-A /org/boot-policy/storage* # scope local
UCS-A /org/boot-policy/storage/local* # scope local-lun
UCS-A /org/boot-policy/storage/local/local-lun # scope local-lun-image-path primary
UCS-A /org/boot-policy/storage/local/local-lun/local-lun-image-path # create uefi-boot-param
UCS-A /org/boot-policy/storage/local/local-lun/local-lun-image-path/uefi-boot-param* # set
bootloader-name grub.efi
UCS-A /org/boot-policy/storage/local/local-lun/local-lun-image-path/uefi-boot-param* # set
bootloader-path EFI\redhat
UCS-A /org/boot-policy/storage/local/local-lun/local-lun-image-path/uefi-boot-param* # set
boot-description "Red Hat Enterprise Linux"
UCS-A /org/boot-policy/storage/local/local-lun/local-lun-image-path/uefi-boot-param* #
commit-buffer
Procedure
Step 2 UCS-A /org # scope boot-policy policy-name Enters organization boot policy mode for the
specified boot policy.
Step 3 UCS-A /org/boot-policy # scope iscsi Enters organization boot policy iSCSI mode
for the boot policy.
Step 4 UCS-A /org/boot-policy/iscsi # scope path Enters the image path for the iSCSI LUN.
{primary | secondary}
Step 5 UCS-A /org/boot-policy/iscsi/path # create Creates UEFI boot parameters and enters
uefi-boot-param UEFI boot parameter mode.
The following example shows how to create UEFI boot parameters for an iSCSI LUN, and commit the
transaction:
UCS-A# scope org /
UCS-A /org* # scope boot-policy bp2
UCS-A /org/boot-policy* # scope iscsi
UCS-A /org/boot-policy/iscsi # scope path primary
UCS-A /org/boot-policy/iscsi/path # create uefi-boot-param
UCS-A /org/boot-policy/iscsi/path/uefi-boot-param* # set bootloader-name grub.efi
UCS-A /org/boot-policy/iscsi/path/uefi-boot-param* # set bootloader-path EFI\redhat
UCS-A /org/boot-policy/iscsi/path/uefi-boot-param* # set boot-description "Red Hat Enterprise
Linux"
UCS-A /org/boot-policy/iscsi/path/uefi-boot-param* # commit-buffer
Procedure
Step 2 UCS-A /org # scope boot-policy policy-name Enters organization boot policy mode
for the specified boot policy.
Step 3 UCS-A /org/boot-policy # scope san Enters organization boot policy SAN
mode for the boot policy.
The following example shows how to create UEFI boot parameters for a SAN LUN, and commit the transaction:
UCS-A# scope org /
UCS-A /org* # scope boot-policy bp3
UCS-A /org/boot-policy* # scope san
UCS-A /org/boot-policy/san # scope san-image primary
UCS-A /org/boot-policy/san/san-image # scope path primary
UCS-A /org/boot-policy/san/san-image/path # create uefi-boot-param
UCS-A /org/boot-policy/san/san-image/path/uefi-boot-param* # set bootloader-name grub.efi
If you want to defer the deployment of service profile changes, you must configure one or more maintenance
policies and configure each service profile with a maintenance policy. If you want to define the time period
when the deployment should occur, you also need to create at least one schedule with one or more recurring
occurrences or one time occurrences, and include that schedule in a maintenance policy.
Recurring Occurrence
Recurring occurrences define a series of maintenance windows. These windows continue until the
maximum number of tasks or the end of the day specified in the occurrence was reached.
Maintenance Policy
A maintenance policy determines how Cisco UCS Manager reacts when a change that requires a server reboot
is made to a service profile associated with a server or to an updating service profile bound to one or more
service profiles.
The maintenance policy specifies how Cisco UCS Manager deploys the service profile changes. The deployment
can occur in one of the following ways:
• Immediately
• When acknowledged by a user with administrator privileges
• Automatically at the time specified in a schedule
• On the next reboot or shutdown without waiting for the user acknowledgment or the timer scheduling
option
Note If the On Next Boot option is enabled in a maintenance policy, and you downgrade
from Cisco UCS Manager Release 3.1(1) or later releases to any release earlier than
Cisco UCS Manager Release 2.2(8), firmware downgrade will fail. Disable On Next
Boot from the maintenance policy to continue with the downgrade.
You can use the soft shutdown timer in the maintenance policy to configure the wait time for performing a
hard shutdown. The soft shutdown timer is applicable when you reboot the server for the following:
• Reset the server using the Gracefully Restart OS option.
• Shut down the server with the In case of graceful shutdown failure, a hard shutdown will be issued
after X seconds option.
• Modify a service profile that requires a server reboot.
If the maintenance policy is configured to deploy the change during a scheduled maintenance window, the
policy must include a valid schedule. The schedule deploys the changes in the first available maintenance
window.
Note A maintenance policy only prevents an immediate server reboot when a configuration change is made to
an associated service profile. However, a maintenance policy does not prevent the following actions from
taking place right away:
• Deleting an associated service profile from the system
• Disassociating a server profile from a server
• Directly installing a firmware upgrade without using a service policy
• Resetting the server
Note You cannot specify the maintenance window in which a specific pending activity is applied to the server.
The maintenance window depends upon how many activities are pending and which maintenance policy
is assigned to the service profile. However, any user with admin privileges can manually initiate a pending
activity and reboot the server immediately, whether it is waiting for user acknowledgment or for a
maintenance window.
Configuring Schedules
Creating a Schedule
Procedure
Step 2 UCS-A /system # create scheduler Creates a scheduler and enters scheduler
sched-name mode.
The following example creates a scheduler called maintenancesched and commits the transaction:
UCS-A# scope system
UCS-A /system # create scheduler maintenancesched
UCS-A /system/scheduler* # commit-buffer
UCS-A /system/scheduler #
What to Do Next
Create a one time occurrence or recurring occurrence for the schedule.
Step 2 UCS-A /system # scope schedule sched-name Enters scheduler system mode.
The following example creates a one time occurrence called onetimemaint for a scheduler called maintsched,
sets the maximum number of concurrent tasks to 5, sets the start date to April 1, 2011 at 11:00, and commits
the transaction:
UCS-A# scope system
UCS-A /system # scope scheduler maintsched
UCS-A /system/scheduler # create occurrence one-time onetimemaint
UCS-A /system/scheduler/one-time* # set date apr 1 2011 11 00
UCS-A /system/scheduler/one-time* # set concur-tasks 5
UCS-A /system/scheduler/one-time* # commit-buffer
UCS-A /system/scheduler/one-time #
The following example creates a recurring occurrence called recurringmaint for a scheduler called maintsched,
sets the maximum number of concurrent tasks to 5, sets the day this occurrence will run to even days, sets the
time it will start to 11:05, and commits the transaction:
UCS-A# scope system
UCS-A /system # scope scheduler maintsched
UCS-A /system/scheduler # create occurrence recurring recurringmaint
UCS-A /system/scheduler/recurring* # set day even-day
UCS-A /system/scheduler/recurring* # set hour 11
UCS-A /system/scheduler/recurring* # set minute 5
UCS-A /system/scheduler/recurring* # set concur-tasks 5
UCS-A /system/scheduler/recurring* # commit-buffer
UCS-A /system/scheduler/recurring #
Procedure
Step 2 UCS-A /system # scope scheduler sched-name Enters scheduler system mode.
Step 3 UCS-A /system/scheduler # delete occurrence Deletes the specified one-time occurrence.
one-time occurrence-name
Step 4 UCS-A /system/scheduler # commit-buffer Commits the transaction to the system
configuration.
The following example deletes a one time occurrence called onetimemaint from scheduler maintsched and
commits the transaction:
UCS-A# scope system
UCS-A /system # scope scheduler maintsched
UCS-A /system/scheduler # delete occurrence one-time onetimemaint
UCS-A /system/scheduler* # commit-buffer
UCS-A /system/scheduler #
Procedure
Step 2 UCS-A /system # scope scheduler sched-name Enters scheduler system mode.
Step 3 UCS-A /system/scheduler # delete occurrence Deletes the specified recurring occurrence.
recurring occurrence-name
Step 4 UCS-A /system/scheduler # commit-buffer Commits the transaction to the system
configuration.
The following example deletes a recurring occurrence called onetimemaint from scheduler maintsched and
commits the transaction:
UCS-A# scope system
UCS-A /system # scope scheduler maintsched
UCS-A /system/scheduler # delete occurrence recurring onetimemaint
UCS-A /system/scheduler* # commit-buffer
UCS-A /system/scheduler #
Deleting a Schedule
If this schedule is included in a maintenance policy, the policy is reconfigured with no schedule. If that policy
is assigned to a service profile, any pending activities related to the server associated with the service profile
cannot be deployed. You must add a schedule to the maintenance policy to deploy the pending activity.
Procedure
Step 2 UCS-A /system # delete scheduler Deletes a scheduler and enters scheduler
sched-name mode.
The following example deletes a scheduler called maintenancesched and commits the transaction:
UCS-A# scope system
UCS-A /system # delete scheduler maintenancesched
UCS-A /system* # commit-buffer
UCS-A /system #
Procedure
Step 3 UCS-A /org/maint-policy # set When a service profile is associated with a server, the server
reboot-policy {immediate | needs to be rebooted to complete the association. Specifying the
timer-automatic | user-ack} reboot-policy command determines when the reboot occurs for
all service profiles that include this maintenance policy. Possible
values include:
• immediate--The server reboots as soon as the change is
made to the service profile.
• timer-automatic --You select the schedule that specifies
when maintenance operations can be applied to the server
using the set scheduler command. Cisco UCS reboots the
server and completes the service profile changes at the
scheduled time.
• user-ack --The user must explicitly acknowledge the
changes by using the apply pending-changes command
before changes are applied.
Step 5 UCS-A /org/maint-policy # set Specifies the time in seconds for Cisco UCS Manager to wait
soft-shutdown-timer { after issuing a soft shutdown to allow servers to gracefully shut
150-seconds | 300-seconds | down and reboot within the specified time instead of issuing a
600-seconds \ | never } hard shutdown after 150 seconds.
The following example creates a maintenance policy called maintenance, sets the system to reboot immediately
when a service profile is associated with a server, sets the soft shutdown timer to 300 seconds, and commits
the transaction:
UCS-A# scope org /
UCS-A /org # create maint-policy maintenance
UCS-A /org/maint-policy* # set reboot-policy immediate
UCS-A /org/maint-policy* # set soft-shutdown-timer 300-secs
UCS-A /org/maint-policy* # commit-buffer
UCS-A /org/maint-policy #
The following example enters a maintenance policy called maintenance, sets the system to reboot when you
explicitly acknowledge changes made to the service profile, sets the on-next-boot option, sets the soft shutdown
timer to 300 seconds, and commits the transaction:
UCS-A# scope org /
UCS-A /org # enter maint-policy maintenance
UCS-A /org/maint-policy* # set reboot-policy user-ack
UCS-A /org/maint-policy* # set on-next-boot
UCS-A /org/maint-policy* # set soft-shutdown-timer 300-secs
UCS-A /org/maint-policy* # commit-buffer
UCS-A /org/maint-policy #
Step 2 UCS-A /org # delete maint-policy Deletes the specified maintenance policy.
policy-name
Step 3 UCS-A /org # commit-buffer Commits the transaction to the system configuration.
The following example deletes a maintenance policy called maintenance and commits the transaction:
UCS-A# scope org /
UCS-A /org # delete maint-policy maintenance
UCS-A /org/maint-policy* # commit-buffer
UCS-A /org/maint-policy #
The following example shows how to display pending changes for a service profile called accounting:
UCS-A# scope org /
UCS-A /org # scope service-profile accounting
UCS-A /org/service-profile # show pending-changes detail
Pending Changes:
Scheduler:
Changed by: admin
Acked by:
Mod. date: 2010-09-20T20:36:09.254
State: Untriggered
Admin State: Untriggered
Pend. Changes: 0
Pend. Disr.: 0
UCS-A /org/service-profile #
Important You cannot stop Cisco UCS Manager from rebooting the affected server after you acknowledge a pending
activity.
Procedure
Step 2 UCS-A /org # scope service-profile Enters organization service profile mode for the
profile-name specified service.
The following example shows how to apply pending changes for a service profile called accounting:
UCS-A# scope org /
UCS-A /org # scope service-profile accounting
UCS-A /org/service-profile # apply pending-changes immediate
UCS-A /org/service-profile #
Important You cannot stop Cisco UCS Manager from rebooting the affected server after you acknowledge a pending
activity.
Procedure
Step 2 UCS-A /org # scope service-profile Enters organization service profile mode for the
profile-name specified service.
The following example shows how to apply pending changes for a service profile called accounting:
UCS-A# scope org /
UCS-A /org # scope service-profile accounting
UCS-A /org/service-profile # apply pending-changes immediate
UCS-A /org/service-profile #
As a result, the change in the server is transparent to your network. You do not need to reconfigure any
component or application on your network to begin using the new server.
This profile allows you to take advantage of and manage system resources through resource pools and policies,
such as the following:
• Virtualized identity information, including pools of MAC addresses, WWN addresses, and UUIDs
• Ethernet and Fibre Channel adapter profile policies
• Firmware package policies
• Operating system boot order policies
Unless the service profile contains power management policies, a server pool qualification policy, or another
policy that requires a specific hardware configuration, you can use the profile for any type of server in the
Cisco UCS domain.
You can associate these service profiles with either a rack-mount server or a blade server. The ability to
migrate the service profile depends upon whether you choose to restrict migration of the service profile.
Note If you choose not to restrict migration, Cisco UCS Manager does not perform any compatibility checks
on the new server before migrating the existing service profile. If the hardware of both servers are not
similar, the association might fail.
Important The server identity and configuration information inherited through this service profile might not have
the values burned into the server hardware at the manufacturer if those values were changed before this
profile is associated with the server.
Note All Cisco UCS M3 and M4 servers configured in Cisco UCS Manager GUI with an out-of-band
configuration using the server CIMC from the Equipment tab, will automatically get an inband network
(VLAN) and IPv4/IPv6 configuration as specified in the inband profile. Removing the network or IP pool
name from the inband profile configuration will delete the inband configuration from the server, if the
server inband configuration was derived from the inband profile.
Procedure
Step 2 UCS-A /eth-uplink # scope inband-profile Enters the inband profile configuration
mode.
Step 3 UCS-A /eth-uplink/inband-profile # set Sets the network group name for the inband
net-group-namevlan-group-name profile.
Step 4 UCS-A /eth-uplink/inband-profile # set Sets the default VLAN for the inband
default-vlan-namevlan-name profile.
Step 5 UCS-A /eth-uplink/inband-profile # set Sets the IP pool for the inband profile.
default-pool-name pool-name
Step 6 UCS-A /eth-uplink/inband-profile # Commits the transaction to the system
commit-buffer configuration.
The example below creates the inband service profile inband-profile, sets the network group name to
inband-vlan-group, sets the default VLAN to Inband_VLAN, sets the IP pool to inband_default, and commits
the transaction:
UCS-A #scope eth-uplink
UCS-A /eth-uplink # scope inband-profile
UCS-A /eth-uplink/inband-profile # set net-group-name inband-vlan-group
UCS-A /eth-uplink/inband-profile* # set default-vlan-name Inband_VLAN
UCS-A /eth-uplink/inband-profile* # set pool-name inband_default
UCS-A /eth-uplink/inband-profile* # commit-buffer
UCS-A /eth-uplink/inband-profile #
Procedure
Step 2 UCS-A /org # create service-profilesp-name Creates the service profile specified
and enters service profile
configuration mode.
Step 3 UCS-A /org/service-profile # create mgmt-ifacein-band Creates the management interface
specified and enters management
interface configuration mode
The example below creates a service profile name inband_sp, configures a management interface named
in-band, creates a management VLAN, sets the network name to Inband_VLAN, creates an external IPv4
pool and sets the name to inband_default, creates an external IP and an external IPv6 management pool, sets
the name of both pools to inband_default, and commits the transaction:
UCS-A# scope org
UCS-A /org # create service-profile inband_sp
UCS-A /org/service-profile* # create mgmt-iface in-band
UCS-A /org/service-profile/mgmt-iface* # create mgmt-vlan
UCS-A /org/service-profile/mgmt-iface/mgmt-vlan* # set network-name Inband_VLAN
UCS-A /org/service-profile/mgmt-iface/mgmt-vlan* # create ext-pooled-ip
UCS-A /org/service-profile/mgmt-iface/mgmt-vlan/ext-pooled-ip* # set name inband_default
UCS-A /org/service-profile/mgmt-iface/mgmt-vlan/ext-pooled-ip* # exit
UCS-A /org/service-profile/mgmt-iface/mgmt-vlan* # create ext-pooled-ip6
UCS-A /org/service-profile/mgmt-iface/mgmt-vlan/ext-pooled-ip6* # set name inband_default
UCS-A /org/service-profile/mgmt-iface/mgmt-vlan/ext-pooled-ip6* # commit-buffer
UCS-A /org/service-profile/mgmt-iface/mgmt-vlan/ext-pooled-ip6 # exit
UCS-A /org/service-profile/mgmt-iface/mgmt-vlan # exit
UCS-A /org/service-profile/mgmt-iface # exit
What to Do Next
Associate the inband management interface service profile to a server.
Note If an inband profile is configured in Cisco UCS Manager with a default VLAN name and a default pool
name, the server CIMC will automatically get an inband configuration from the inband profile within one
minute after deleting the configuration from the service profile.
Procedure
Step 2 UCS-A/org # scope service-profile blade1 Enters the organization profile configuration
mode.
Step 3 UCS-A/org/service-profile # delete Deletes the specified service profile.
mgmt-ifacein-band
Step 4 UCS-A/org/service-profile # commit-buffer Commits the transaction to the system
configuration.
The following example scopes to the service profile blade1, deletes the management interface in-band, and
commits the transaction:
UCS-A# scope org
UCS-A /org # scope service-profile blade1
UCS-A /org/service-profile # delete mgmt-iface in-band
UCS-A /org/service-profile* # commit-buffer
UCS-A /org/service-profile
Note Setting the inband management IP to static IP is similar to setting the inband management IP to pooled
IP. The example below creates a management interface on chassis 1, server 1 named in-band, sets the
IPv4 and IPv6 states to static, and commits the transaction. This example also creates a management
VLAN, creates an external static IPv4, brings up the IPv4, creates an external static IPv6, brings up the
IPv6, and commits the transaction:
UCS-A# scope server 1/1
UCS-A /chassis/server # scope cimc
UCS-A /chassis/server/cimc # create mgmt-iface in-band
UCS-A /chassis/server/cimc/mgmt-iface* # set ipv4state static
UCS-A /chassis/server/cimc/mgmt-iface* # set ipv6state static
UCS-A /chassis/server/cimc/mgmt-iface* # commit-buffer
UCS-A /chassis/server/cimc/mgmt-iface # show detail
Procedure
The example below creates a management interface on chassis 1, server 1 named in-band, sets the IPv4 and
IPv6 states to pooled, creates a management VLAN, sets the network name to Inband, creates an external
IPv4 pool, sets the name to inband_default. Creates an external IPv6 pool, sets the name to inband_default,
and commits the transaction:
UCS-A# scope server 1/1
UCS-A /chassis/server # scope cimc
UCS-A /chassis/server/cimc # create mgmt-iface in-band
UCS-A /chassis/server/cimc/mgmt-iface* # set ipv4state pooled
UCS-A /chassis/server/cimc/mgmt-iface* # set ipv6state pooled
UCS-A /chassis/server/cimc/mgmt-iface* # create mgmt-vlan
UCS-A /chassis/server/cimc/mgmt-iface/mgmt-vlan* # set network-name Inband
UCS-A /chassis/server/cimc/mgmt-iface/mgmt-vlan* # create ext-pooled-ip
UCS-A /chassis/server/cimc/mgmt-iface/mgmt-vlan/ext-pooled-ip* # set name Inband_default
UCS-A /chassis/server/cimc/mgmt-iface/mgmt-vlan/ext-pooled-ip* # exit
UCS-A /chassis/server/cimc/mgmt-iface/mgmt-vlan* # create ext-pooled-ip6
UCS-A /chassis/server/cimc/mgmt-iface/mgmt-vlan/ext-pooled-ip6* # set name Inband_default
UCS-A /chassis/server/cimc/mgmt-iface/mgmt-vlan/ext-pooled-ip6* # commit-buffer
UCS-A /chassis/server/cimc/mgmt-iface/mgmt-vlan/ext-pooled-ip6 #
Note If an inband profile is configured in Cisco UCS Manager with a default VLAN name and a default pool
name, the server CIMC will automatically get an inband configuration from the inband profile within one
minute after deleting the configuration from the service profile.
Procedure
Step 2 UCS-A /chassis/server # scope cimc Enters the CIMC configuration mode.
The following example deletes the deletes the management interface named in-band from chassis1, server 1,
and commits the transaction:
UCS-A# scope server 1/1
UCS-A /chassis/server # scope cimc
UCS-A /chassis/server/cimc # delete mgmt-iface in-band
UCS-A /chassis/server/cimc* # commit-buffer
UCS-A /chassis/server/cimc #
Tip If you need only one service profile with similar values to an existing service profile, you can clone a
service profile in the Cisco UCS Manager GUI.
For example, if you need several service profiles with similar values to configure servers to host database
software, you can create a service profile template, either manually or from an existing service profile. You
then use the template to create the service profiles.
Cisco UCS supports the following types of service profile templates:
Initial template
Service profiles created from an initial template inherit all the properties of the template. Service profiles
created from an initial service profile template are bound to the template. However, changes to the
initial template do not automatically propagate to the bound service profiles. If you want to propagate
changes to bound service profiles, unbind and rebind the service profile to the initial template.
Updating template
Service profiles created from an updating template inherit all the properties of the template and remain
connected to the template. Any changes to the template automatically update the service profiles created
from the template.
Note Service profiles that are created from the initial template and normal service profiles fetch the lowest
available IDs in the sequential pool when you presReset.
Service profiles created from updating template might attempt to retain the same ID when you pressReset
even when lower IDs of sequential pool are free.
Step 2 UCS-A /org # create service-profile Creates the specified service profile template and enters
profile-name {initial-template | organization service profile mode.
updating-template}
Step 3 UCS-A /org/service-profile # set Associates the specified BIOS policy with the service
bios-policy policy-name profile.
Step 4 UCS-A /org/service-profile # set Associates the specified boot policy with the service
boot-policy policy-name profile.
Step 8 UCS-A /org/service-profile # set Associates the specified host firmware policy with the
host-fw-policy policy-name service profile.
Step 9 UCS-A /org/service-profile # set Specifies how the server acquires a UUID or WWNN.
identity {dynamic-uuid {uuid | You can do one of the following:
derived} | dynamic-wwnn {wwnn |
derived} | uuid-pool pool-name | • Create a unique UUID in the form
nnnnnnnn-nnnn-nnnn-nnnnnnnnnnnn .
wwnn-pool pool-name}
• Derive the UUID from the one burned into the
hardware at manufacture.
Step 10 UCS-A /org/service-profile # set Associates the specified IPMI access profile with the
ipmi-access-profile profile-name service profile.
Step 11 UCS-A /org/service-profile # set Associates the specified LAN connectivity policy with
lan-connectivity-policy-name the service profile.
policy-name Note You cannot have a LAN connectivity policy and
locally created vNICs in the same service profile.
When you add a LAN connectivity policy to a
service profile, any existing vNIC configuration
is erased.
Step 12 UCS-A /org/service-profile # set Associates the specified local disk policy with the service
local-disk-policy policy-name profile.
Step 13 UCS-A /org/service-profile # set Associates the specified maintenance policy with the
maint-policy policy-name service profile.
Step 14 UCS-A /org/service-profile # set Associates the specified management firmware policy
mgmt-fw-policy policy-name with the service profile.
Step 15 UCS-A /org/service-profile # set Associates the specified power control policy with the
power-control-policy policy-name service profile.
Step 16 UCS-A /org/service-profile # set Associates the specified SAN connectivity policy with
san-connectivity-policy-name the service profile.
policy-name Note You cannot have a SAN connectivity policy and
locally created vHBAs in the same service
profile. When you add a SAN connectivity policy
to a service profile, any existing vHBA
configuration is erased.
Step 17 UCS-A /org/service-profile # set Associates the specified scrub policy with the service
scrub-policy policy-name profile.
Step 18 UCS-A /org/service-profile # set Associates the specified serial over LAN policy with the
sol-policy policy-name service profile.
Step 19 UCS-A /org/service-profile # set Associates the specified statistics policy with the service
stats-policy policy-name profile.
Step 20 UCS-A /org/service-profile # set Specifies the user label associated with the service profile.
user-label label-name
The following example shows how to create a service profile template and commit the transaction:
UCS-A# scope org /
UCS-A /org* # create service-profile ServTemp2 updating-template
UCS-A /org/service-profile* # set bios-policy biospol1
UCS-A /org/service-profile* # set boot-policy bootpol32
UCS-A /org/service-profile* # set descr "This is a service profile example."
UCS-A /org/service-profile* # set dynamic-vnic-conn-policy mydynvnicconnpolicy
UCS-A /org/service-profile* # set ext-mgmt-ip-state pooled
UCS-A /org/service-profile* # set host-fw-policy ipmi-user987
UCS-A /org/service-profile* # set identity dynamic-uuid derived
UCS-A /org/service-profile* # set ipmi-access-profile ipmiProf16
UCS-A /org/service-profile* # set local-disk-policy localdiskpol33
UCS-A /org/service-profile* # set maint-policy maintpol4
UCS-A /org/service-profile* # set mgmt-fw-policy mgmtfwpol75
UCS-A /org/service-profile* # set power-control-policy powcontrpol13
UCS-A /org/service-profile* # set scrub-policy scrubpol55
UCS-A /org/service-profile* # set sol-policy solpol2
UCS-A /org/service-profile* # set stats-policy statspol4
UCS-A /org/service-profile* # set user-label mylabel
UCS-A /org/service-profile* # vcon-policy myvconnpolicy
UCS-A /org/service-profile* # commit-buffer
UCS-A /org/service-profile #
What to Do Next
• (Optional) Configure a boot definition for the service profile. Use this option only if you have not
associated a boot policy with the service profile.
• Create a service profile instance from the service profile template.
Procedure
Step 2 UCS-A /org # create Creates the specified service profile instance and enters
service-profile profile-name organization service profile mode.
instance Enter a unique profile-name to identify this service profile
template.
This name can be between 2 and 32 alphanumeric characters.
You cannot use spaces or any special characters other than -
(hyphen), _ (underscore), : (colon), and . (period), and this name
must be unique across all service profiles and service profile
templates within the same organization.
Step 3 UCS-A /org/service-profile # Specifies the source service profile template to apply to the
set src-templ-name service profile instance. All configuration settings from the
profile-name service profile template will be applied to the service profile
instance.
The following example creates a service profile instance named ServProf34, applies the service profile template
named ServTemp2, and commits the transaction:
UCS-A# scope org /
UCS-A /org* # create service-profile ServProf34 instance
UCS-A /org/service-profile* # set src-templ-name ServTemp2
UCS-A /org/service-profile* # commit-buffer
UCS-A /org/service-profile #
What to Do Next
Associate the service profile to a server, rack server, or server pool.
Procedure
Step 2 UCS-A /org # scope service-profile Enters organization service profile mode for the
profile-name specified service profile.
Step 3 UCS-A /org/service-profile # set Unbinds the service profile from the service profile
src-templ-name "" template.
The following example unbinds the service profile named ServiceProf1 and commits the transaction:
UCS-A# scope org
UCS-A /org # scope service-profile ServiceProf1
UCS-A /org/service-profile # set src-templ-name ""
UCS-A /org/service-profile* # commit-buffer
UCS-A /org/service-profile #
Step 2 UCS-A /org # create service-profile Creates the specified service profile instance and enters
profile-name instance organization service profile mode.
Enter a unique profile-name to identify this service
profile.
This name can be between 2 and 32 alphanumeric
characters. You cannot use spaces or any special
characters other than - (hyphen), _ (underscore), :
(colon), and . (period), and this name must be unique
across all service profiles and service profile templates
within the same organization.
Step 3 UCS-A /org/service-profile # set Associates the specified BIOS policy with the service
bios-policy policy-name profile.
Step 8 UCS-A /org/service-profile # set Associates the specified host forwarding policy with the
host-fw-policy ipmi-user-name service profile.
Step 9 UCS-A /org/service-profile # set Specifies how the server acquires a UUID or WWNN.
identity {dynamic-uuid {uuid | You can do one of the following:
derived} | dynamic-wwnn {wwnn |
derived} | uuid-pool pool-name | • Create a unique UUID in the form
nnnnnnnn-nnnn-nnnn-nnnnnnnnnnnn.
wwnn-pool pool-name}
• Derive the UUID from the one burned into the
hardware at manufacture.
• Use a UUID pool.
• Create a unique WWNN in the form hh : hh :
hh : hh : hh : hh : hh : hh .
• Derive the WWNN from one burned into the
hardware at manufacture.
• Use a WWNN pool.
Step 11 UCS-A /org/service-profile # set Associates the specified local disk policy with the service
local-disk-policy policy-name profile.
Step 12 UCS-A /org/service-profile # set Associates the specified maintenance policy with the
maint-policy policy-name service profile.
Step 13 UCS-A /org/service-profile # set Associates the specified management forwarding policy
mgmt-fw-policy policy-name with the service profile.
Step 14 UCS-A /org/service-profile # set Associates the specified power control policy with the
power-control-policy policy-name service profile.
Step 15 UCS-A /org/service-profile # set Associates the specified scrub policy with the service
scrub-policy policy-name profile.
Step 16 UCS-A /org/service-profile # set Associates the specified serial over LAN policy with the
sol-policy policy-name service profile.
Step 17 UCS-A /org/service-profile # set Associates the specified statistics policy with the service
stats-policy policy-name profile.
Step 18 UCS-A /org/service-profile # set Specifies the user label associated with the service
user-label label-name profile.
Step 19 UCS-A /org/service-profile # set vcon Specifies the selection preference for the specified vCon.
{1 | 2} selection {all | assigned-only |
exclude-dynamic |
exclude-unassigned}
Step 20 UCS-A /org/service-profile # set Associates the specified vNIC/vHBA placement policy
vcon-policy policy-name with the service profile.
Note You can either assign a vNIC/vHBA placement
profile to the service profile, or set vCon
selection preferences for the service profile, but
you do not need to do both.
Step 21 UCS-A /org/service-profile # Commits the transaction to the system configuration.
commit-buffer
The following example shows how to create a service profile instance and commit the transaction:
UCS-A# scope org /
UCS-A /org* # create service-profile ServInst90 instance
UCS-A /org/service-profile* # set bios-policy biospol1
UCS-A /org/service-profile* # set boot-policy bootpol32
UCS-A /org/service-profile* # set descr "This is a service profile example."
UCS-A /org/service-profile* # set ext-mgmt-ip-state pooled
UCS-A /org/service-profile* # set host-fw-policy ipmi-user987
UCS-A /org/service-profile* # set identity dynamic-uuid derived
UCS-A /org/service-profile* # set ipmi-access-profile ipmiProf16
UCS-A /org/service-profile* # set local-disk-policy localdiskpol33
What to Do Next
• (Optional) Configure a boot definition for the service profile. Use this option only if you have not
associated a boot policy with the service profile.
• Associate the service profile with a blade server, server pool, or rack server.
Step 2 UCS-A /org # scope service-profile Enters organization service profile mode for the specified
profile-name service profile.
Step 3 UCS-A /org/service-profile # create Creates a vNIC for the specified service profile and enters
vnic vnic-name [eth-if eth-if-name] organization service profile vNIC mode.
[fabric {a | b}]
Step 4 UCS-A /org/service-profile/vnic # Specifies the adapter policy to use for the vNIC.
set adapter-policy policy-name
Step 5 UCS-A /org/service-profile/vnic # Specifies the fabric to use for the vNIC. If you did not
set fabric {a | a-b | b | b-a} specify the fabric when creating the vNIC template in Step
3, you have the option to specify it with this command.
If you want this vNIC to be able to access the second fabric
interconnect if the default one is unavailable, choose a-b
(A is the primary) or b-a (B is the primary) .
Step 6 UCS-A /org/service-profile/vnic # Specifies the identity (MAC address) for the vNIC. You
set identity {dynamic-mac can set the identity using one of the following options:
{mac-addr | derived} | mac-pool
mac-pool-name} • Create a unique MAC address in the form nn : nn
: nn : nn : nn : nn .
• Derive the MAC address from one burned into the
hardware at manufacture.
• Assign a MAC address from a MAC pool.
Step 7 UCS-A /org/service-profile/vnic # The maximum transmission unit, or packet size, that this
set mtu size-num vNIC accepts.
Enter an integer between 1500 and 9216.
Note If the vNIC has an associated QoS policy, the
MTU specified here must be equal to or less than
the MTU specified in the associated QoS system
class. If this MTU value exceeds the MTU value
in the QoS system class, packets might get
dropped during data transmission.
Step 8 UCS-A /org/service-profile/vnic # The network control policy the vNIC should use.
set nw-control-policy policy-name
Step 9 UCS-A /org/service-profile/vnic # Specifies the relative order for the vNIC.
set order {order-num | unspecified}
Step 10 UCS-A /org/service-profile/vnic # The LAN pin group the vNIC should use.
set pin-group group-name
Step 11 UCS-A /org/service-profile/vnic # The quality of service policy the vNIC should use.
set qos-policy policy-name
Step 12 UCS-A /org/service-profile/vnic # The statistics collection policy the vNIC should use.
set stats-policy policy-name
Step 14 UCS-A /org/service-profile/vnic # Assigns the vNIC to the specified vCon. Use the any
set vcon {1 | 2 | 3 | 4 | any} keyword to have Cisco UCS Manager automatically assign
the vNIC.
The following example configures a vNIC for a service profile and commits the transaction:
UCS-A# scope org /
UCS-A /org* # scope service-profile ServInst90
UCS-A /org/service-profile* # create vnic vnic3 fabric a
UCS-A /org/service-profile/vnic* # set adapter-policy AdaptPol2
UCS-A /org/service-profile/vnic* # set fabric a-b
UCS-A /org/service-profile/vnic* # set identity mac-pool MacPool3
UCS-A /org/service-profile/vnic* # set mtu 8900
UCS-A /org/service-profile/vnic* # set nw-control-policy ncp5
UCS-A /org/service-profile/vnic* # set order 0
UCS-A /org/service-profile/vnic* # set pin-group EthPinGroup12
UCS-A /org/service-profile/vnic* # set qos-policy QosPol5
UCS-A /org/service-profile/vnic* # set stats-policy StatsPol2
UCS-A /org/service-profile/vnic* # set template-name VnicConnPol3
UCS-A /org/service-profile/vnic* # set set vcon any
UCS-A /org/service-profile/vnic* # commit-buffer
UCS-A /org/service-profile/vnic #
Step 2 UCS-A /org # scope service-profile Enters the name of the service profile where you want
service profile name . to create the vNIC pair.
Step 3 UCS-A /org # scope service-profile Assigns a name to the vNIC for creating the redundancy
create vnic eth0. pair.
Step 4 UCS-A /org/service-profile/vnic* # Specifies to use the Primary vNIC template that you can
set template-namevNIC-primary . link to a Secondary vNIC template to create a vNIC pair
at the service profile level.
Step 5 UCS-A /org/service-profile/vnic* # Exits the Primary vNIC template to use to create the
exit . vNIC pair.
Step 7 UCS-A /org/service-profile/vnic* set Specifies to use the Secondary vNIC template as the peer
template-name vNIC secondary . template to a Primary vNIC template to create a vNIC
pair that you can use at the service profile level.
Step 8 UCS-A /org/service-profile/vnic* # Exits the Secondary vNIC template to use to create the
exit . vNIC pair.
The following example creates a vNIC redundancy pair from a service profile and commits the transaction:
Step 2 UCS-A /org # scope service-profile Enters organization service profile mode for the
profile-name specified service.
Step 3 UCS-A /org/service-profile # create vhba Creates a vHBA for the specified service profile and
vhba-name [fabric {a | b}] [fc-if enters organization service profile vHBA mode.
fc-if-name]
Step 4 UCS-A /org/service-profile/vhba # set Specifies the adapter policy to use for the vHBA.
adapter-policy policy-name
Step 6 UCS-A /org/service-profile/vhba # set Specifies the WWPN for the vHBA.
identity {dynamic-wwpn {wwpn | You can set the storage identity using one of the
derived} | wwpn-pool wwn-pool-name} following options:
Step 7 UCS-A /org/service-profile/vhba # set Specifies the maximum size of the Fibre Channel
max-field-size size-num frame payload (in bytes) that the vHBA supports.
Step 8 UCS-A /org/service-profile/vhba # set Specifies the PCI scan order for the vHBA.
order {order-num | unspecified}
Step 9 UCS-A /org/service-profile/vhba # set Disables or enables persistent binding to Fibre
pers-bind {disabled | enabled} Channel targets.
Step 10 UCS-A /org/service-profile/vhba # set Specifies the SAN pin group to use for the vHBA.
pin-group group-name
Step 11 UCS-A /org/service-profile/vhba # set Specifies the QoS policy to use for the vHBA.
qos-policy policy-name
Step 12 UCS-A /org/service-profile/vhba # set Specifies the statistics threshold policy to use for the
stats-policy policy-name vHBA.
Step 13 UCS-A /org/service-profile/vhba # set Specifies the vHBA template to use for the vHBA.
template-name policy-name
Step 14 UCS-A /org/service-profile/vhba # Commits the transaction to the system configuration.
commit-buffer
The following example configures a vHBA for a service profile and commits the transaction:
UCS-A# scope org /
UCS-A /org* # scope service-profile ServInst90
UCS-A /org/service-profile* # create vhba vhba3 fabric b
Step 2 UCS-A/ org # scope service-profile Enters the name of the service profile where you want to
service profile name . create the vHBA pair.
Step 3 UCS-A/ org # service-profile create Assigns a name to the vHBA for creating the redundancy
vhba fc0. pair.
Step 4 UCS-A /org/service-profile # set Specifies to use the Primary vHBA template that you can
template-name vhba primary . link to a Secondary vHBA template to create a vHBA
pair at the service profile level.
Step 5 UCS-A /org/service-profile # exit . Exits the Primary vHBA template to use to create the
vHBA pair.
Note You can now create the peer vHBA to link to
vHBA fc0. Ensure to commit the transaction
after linking vHBA fc0 to vHBA fc1 to create
the vHBA pair.
Step 6 UCS-A /org/service-profile # create Assigns a name to the vHBA for creating the peer vHBA
vhba fc1. to create the pair that you link to vHBA fc0.
Step 7 UCS-A/ org # service-profile set Specifies to use the Secondary vHBA template as the
template-name vhba secondary . peer template to a Primary vHBA template to create a
vHBA pair that you can use at the service profile level.
Step 8 UCS-A/ # org service profile Commits the transaction to the system configuration.
commit-buffer .
The following example creates a vHBA redundancy pair from a service profile and commits the transaction:
Step 2 UCS-A /org # scope service-profile Enters organization service profile mode for
profile-name the specified service profile.
Step 3 UCS-A /org/service-profile # create Creates a local disk configuration for the
local-disk-config service profile and enters organization service
profile local disk configuration mode.
Step 5 UCS-A /org/service-profile/local-disk-config # Specifies the mode for the local disk.
set mode {any-configuration | no-local-storage
| no-raid | raid-0-striped | raid-1-mirrored |
raid-5-striped-parity |
raid-6-striped-dual-parity |
raid-10-mirrored-and-striped}
Step 6 UCS-A /org/service-profile/local-disk-config # Creates a partition for the local disk and
create partition enters organization service profile local disk
configuration partition mode.
The following example configures a local disk for a service profile and commits the transaction:
UCS-A# scope org /
UCS-A /org # scope service-profile ServInst90
UCS-A /org/service-profile # scope boot-definition
UCS-A /org/service-profile # create local-disk-config
UCS-A /org/service-profile/local-disk-config* # set mode raid-1-mirrored
UCS-A /org/service-profile/local-disk-config* # create partition
UCS-A /org/service-profile/local-disk-config/partition* # set size 1000000
UCS-A /org/service-profile/local-disk-config/partition* # set type ntfs
UCS-A /org/service-profile/local-disk-config/partition* # commit-buffer
UCS-A /org/service-profile/local-disk-config/partition #
Step 2 UCS-A /org # scope service-profile Enters organization service profile mode for the
profile-name specified service.
Step 3 UCS-A /org/service-profile # create Creates a serial over LAN configuration for the
sol-config service profile and enters organization service
profile SoL configuration mode.
The following example configures serial over LAN for the service profile named ServInst90 and commits the
transaction:
UCS-A# scope org /
UCS-A /org # scope service-profile ServInst90
UCS-A /org/service-profile # create sol-config
UCS-A /org/service-profile/sol-config* # enable
UCS-A /org/service-profile/sol-config* # set descr "Sets serial over LAN to 9600 baud."
UCS-A /org/service-profile/sol-config* # set speed 9600
UCS-A /org/service-profile/sol-config* # commit-buffer
UCS-A /org/service-profile/sol-config #
Step 2 UCS-A /org # scope service-profile Enters organization service profile mode for the the
profile-name specified service.
Step 3 UCS-A /org/service-profile # create Creates a boot definition for the service profile and
boot-definition enters organization service profile boot definition
mode.
The following example configures a boot definition for a service profile and commits the transaction:
UCS-A# scope org /
UCS-A /org* # scope service-profile ServInst90
UCS-A /org/service-profile* # create boot-definition
UCS-A /org/service-profile/boot-definition* # set descr "This boot definition reboots on
update."
UCS-A /org/service-profile/boot-definition* # set reboot-on-update yes
UCS-A /org/service-profile/boot-definition* # commit-buffer
UCS-A /org/service-profile/boot-definition #
What to Do Next
Configure one or more of the following boot options for the boot definition and set their boot order:
• LAN Boot —Boots from a centralized provisioning server. It is frequently used to install operating
systems on a server from that server.
If you choose the LAN Boot option, continue to Configuring a LAN Boot for a Service Profile Boot
Definition , on page 619.
• Storage Boot — Boots from an operating system image on the SAN. You can specify a primary and a
secondary SAN boot. If the primary boot fails, the server attempts to boot from the secondary.
We recommend that you use a SAN boot, because it offers the most service profile mobility within the
system. If you boot from the SAN, when you move a service profile from one server to another, the new
server boots from exactly the same operating system image. Therefore, the new server appears to be
exactly the same server to the network.
If you choose the Storage Boot option, continue to Configuring a Storage Boot for a Service Profile
Boot Definition , on page 620.
• Virtual Media Boot —Mimics the insertion of a physical CD into a server. It is typically used to
manually install operating systems on a server.
If you choose the Virtual Media boot option, continue to Configuring a Virtual Media Boot for a Service
Profile Boot Definition , on page 622.
Procedure
Step 2 UCS-A /org # scope service-profile Enters organization service profile mode for the
profile-name specified service profile.
Step 3 UCS-A /org/service-profile # scope Enters organization service profile boot definition
boot-definition mode.
Step 4 UCS-A /org/service-profile/boot-definition Creates a LAN boot for the service profile boot
# create lan definition and enters service profile boot
definition LAN mode.
Step 5 UCS-A Specifies the boot order for the LAN boot.
/org/service-profile/boot-definition/lan # set
order {1 | 2 | 3 | 4}
Step 7 UCS-A Specifies the vNIC to use for the LAN image path.
/org/service-profile/boot-definition/lan/path
# set vnic vnic-name
Step 8 UCS-A Commits the transaction to the system
/org/service-profile/boot-definition/lan/path configuration.
# commit-buffer
The following example enters the service profile named ServInst90, creates a LAN boot for the service profile
boot definition, sets the boot order to 2, creates a primary path, and commits the transaction:
UCS-A# scope org /
UCS-A /org* # scope service-profile ServInst90
UCS-A /org/service-profile* # scope boot-definition
UCS-A /org/service-profile/boot-definition* # create lan
UCS-A /org/service-profile/boot-definition/lan* # set order 2
UCS-A /org/service-profile/boot-definition/lan* # create path primary
UCS-A /org/service-profile/boot-definition/lan/path* # set vnic vnic3
UCS-A /org/service-profile/boot-definition/lan/path* # commit-buffer
UCS-A /org/service-profile/boot-definition/lan/path #
Procedure
Step 2 UCS-A /org # scope service-profile profile-name Enters organization service profile
mode for the specified service.
Step 3 UCS-A /org/service-profile # scope boot-definition Enters organization service profile boot
definition mode.
Step 4 UCS-A /org/service-profile/boot-definition # create Creates a storage boot for the service
storage profile boot definition and enters
service profile boot definition storage
mode.
The following example enters the service profile named ServInst90, creates a storage boot for the service
profile boot definition, sets the boot order to 2, creates a primary path, and commits the transaction:
UCS-A# scope org /
UCS-A /org* # scope service-profile ServInst90
UCS-A /org/service-profile* # scope boot-definition
UCS-A /org/service-profile/boot-definition* # create storage
UCS-A /org/service-profile/boot-definition/storage* # create san-image primary
UCS-A /org/service-profile/boot-definition/storage* # set order 2
UCS-A /org/service-profile/boot-definition/storage/san-image* # create path primary
UCS-A /org/service-profile/boot-definition/storage/san-image/path* # set lun 27512
UCS-A /org/service-profile/boot-definition/storage/san-image/path* # set vhba vhba3
UCS-A /org/service-profile/boot-definition/storage/san-image/path* # set wwn
20:00:00:00:20:00:00:23
Procedure
Step 2 UCS-A /org # scope service-profile Enters organization service profile mode for
profile-name the specified service.
Step 5 UCS-A Specifies the boot order for the virtual media
/org/service-profile/boot-definition/virtual-media boot.
# set order {1 | 2 | 3 | 4}
Step 6 UCS-A Commits the transaction to the system
/org/service-profile/boot-definition/virtual-media configuration.
# commit-buffer
The following example enters the service profile named ServInst90, creates a virtual media boot with read-only
privileges for the service profile boot definition, sets the boot order to 3, and commits the transaction:
UCS-A# scope org /
UCS-A /org* # scope service-profile ServInst90
UCS-A /org/service-profile* # scope boot-definition
UCS-A /org/service-profile/boot-definition* # create virtual-media read-only
UCS-A /org/service-profile/boot-definition/virtual-media* # set order 3
UCS-A /org/service-profile/boot-definition/virtual-media* # commit-buffer
UCS-A /org/service-profile/boot-definition/virtual-media #
Step 2 UCS-A /org # scope service-profile Enters organization service profile mode for the the
profile-name specified service.
Step 3 UCS-A /org/service-profile # delete Deletes the boot definition for the service profile.
boot-definition
Step 4 UCS-A /org/service-profile # Commits the transaction to the system
commit-buffer configuration.
The following example deletes the boot definition for a service profile and commits the transaction:
UCS-A# scope org /
UCS-A /org # scope service-profile ServInst90
UCS-A /org/service-profile # delete boot-definition
UCS-A /org/service-profile* # commit-buffer
UCS-A /org/service-profile #
Procedure
Step 2 UCS-A /org # scope service-profile Enters organization service profile mode for the
profile-name specified service profile.
Step 4 UCS-A /org/service-profile/initiator-group Creates the specified vHBA initiator in the initiator
# create initiator vhba-name group.
If desired, repeat this step to add a second vHBA
initiator to the group.
The following example configures a vHBA initiator group named initGroupZone1 with two vHBA initiators
for a service profile named ServInst90, includes an existing Fibre Channel storage connection policy, and
commits the transaction:
UCS-A# scope org /
UCS-A /org # scope service-profile ServInst90
UCS-A /org/service-profile # create initiator-group initGroupZone1
UCS-A /org/service-profile/initiator-group* # create initiator vhba1
UCS-A /org/service-profile/initiator-group* # create initiator vhba2
UCS-A /org/service-profile/initiator-group* # set storage-connection-policy scpolicyZone1
UCS-A /org/service-profile* # commit-buffer
UCS-A /org/service-profile #
Procedure
Step 4 UCS-A /org/service-profile/initiator-group # create initiator vhba-name Creates the specified vHBA
initiator in the vHBA
initiator group.
If desired, repeat this step
to add a second vHBA
initiator to the group.
The following example configures a vHBA initiator group named initGroupZone1 with two vHBA initiators
for a service profile named ServInst90, configures a local storage connection policy definition named
scPolicyZone1, and commits the transaction:
UCS-A# scope org /
UCS-A /org* # scope service-profile ServInst90
UCS-A /org/service-profile # create initiator-group initGroupZone1
UCS-A /org/service-profile/initiator-group* # create initiator vhba1
UCS-A /org/service-profile/initiator-group* # create initiator vhba2
UCS-A /org/service-profile/initiator-group* # create storage-connection-def scPolicyZone1
UCS-A /org/service-profile/initiator-group/storage-connection-def* # create storage-target
20:10:20:30:40:50:60:70
UCS-A /org/service-profile/initiator-group/storage-connection-def/storage-target* # set
target-path a
UCS-A /org/service-profile/initiator-group/storage-connection-def/storage-target* # set
target-vsan default
UCS-A /org/service-profile/initiator-group* # commit-buffer
UCS-A /org/service-profile/initiator-group #
Procedure
Step 2 UCS-A /org # scope service-profile Enters organization service profile mode for the
profile-name specified service profile.
Step 3 UCS-A /org/service-profile # associate Associates the service profile with a single server, or
{server chassis-id / slot-id | server-pool to the specified server pool with the specified server
pool-name qualifier} pool policy qualifications.
[restrict-migration] Adding the optional restrict-migration keyword
prevents the service profile from being migrated to
another server.
The following example associates the service profile named ServProf34 with the server in slot 4 of chassis 1
and commits the transaction:
UCS-A# scope org /
UCS-A /org* # scope service-profile ServProf34
UCS-A /org/service-profile* # associate server 1/4
UCS-A /org/service-profile* # commit-buffer
UCS-A /org/service-profile #
Procedure
Step 2 UCS-A /org # scope service-profile Enters organization service profile mode for the
profile-name specified service profile.
Step 3 UCS-A /org/service-profile # associate Associates the service profile with the specified rack
server serv-id [restrict-migration] server.
Adding the optional the restrict-migration command
prevents the service profile from being migrated to
another server.
The following example associates the service profile named ServProf34 with the rack server 1 and commits
the transaction:
UCS-A# scope org /
UCS-A /org* # scope service-profile ServProf34
UCS-A /org/service-profile* # associate server 1
UCS-A /org/service-profile* # commit-buffer
UCS-A /org/service-profile #
Procedure
Step 2 UCS-A /org # scope service-profile Enters organization service profile mode for the
profile-name specified service profile.
Step 3 UCS-A /org/service-profile # Disassociates the service profile from the server or
disassociate server pool.
The following example disassociates the service profile named ServProf34 from the server to which it was
associated and commits the transaction:
UCS-A# scope org /
UCS-A /org* # scope service-profile ServProf34
UCS-A /org/service-profile # disassociate
UCS-A /org/service-profile* # commit-buffer
UCS-A /org/service-profile #
Procedure
Step 2 UCS-A /org # scope Enters organization service profile mode for the specified
service-profile profile-name service.
This example shows how to change the name of a service profile from ServInst90 to ServZoned90 and commits
the transaction:
UCS-A# scope org /
UCS-A /org* # scope service-profile ServInst90
Procedure
Step 2 UCS-A /org # scope service-profile Enters the service profile that requires the UUID for the
profile-name associated server to be reset to a different UUID suffix
pool.
Step 3 UCS-A /org/service-profile # set Specifies that the service profile will obtain a UUID
identity dynamic-uuid derived dynamically from a pool.
This example resets the UUID of a service profile to a different UUID suffix pool:
UCS-A# scope org /
UCS-A /org # scope service-profile ServInst90
UCS-A /org/service-profile # set identity dynamic-uuid derived
UCS-A /org/service-profile* # commit-buffer
UCS-A /org/service-profile #
Resetting the MAC Address Assigned to a vNIC from a Pool in a Service Profile
Template
If you change the MAC pool assigned to an updating service profile template, Cisco UCS Manager does not
change the MAC address assigned to a service profile created with that template. If you want Cisco UCS
Manager to assign a MAC address from the newly assigned pool to the service profile, and therefore to the
associated server, you must reset the MAC address. You can only reset the MAC address assigned to a service
profile and its associated server under the following circumstances:
• The service profile was created from an updating service profile template and includes a MAC address
assigned from a MAC pool.
• The MAC pool name is specified in the service profile. For example, the pool name is not empty.
• The MAC address value is not 0, and is therefore not derived from the server hardware.
Procedure
Step 2 UCS-A /org # scope service-profile Enters the command mode for the service profile that
profile-name requires the MAC address of the associated server to be
reset to a different MAC address.
Step 3 UCS-A /org/service-profile # scope Enters the command mode for the vNIC for which you
vnic vnic-name want to reset the MAC address.
Step 4 UCS-A /org/service-profile/vnic # set Specifies that the vNIC will obtain a MAC address
identity dynamic-mac derived dynamically from a pool.
Procedure
Step 2 UCS-A /org # scope service-profile Enters the service profile of the vHBA for which you
profile-name want to reset the WWPN.
Step 3 UCS-A /org/service-profile # scope Enters the command mode for vHBA for which you
vhba vhba-name want to reset the WWPN.
Step 4 UCS-A /org/service-profile/vhba # set Specifies that the vHBA will obtain a WWPN
identity dynamic-wwpn derived dynamically from a pool.
Storage Profiles
To allow flexibility in defining the number of storage disks, roles and usage of these disks, and other storage
parameters, you can create and use storage profiles. A storage profile encapsulates the storage requirements
for one or more service profiles. LUNs configured in a storage profile can be used as boot LUNs or data
LUNs, and can be dedicated to a specific server. You can also specify a local LUN as a boot device. However,
LUN resizing is not supported. The introduction of storage profiles allows you to do the following:
• Configure multiple virtual drives and select the physical drives that are used by a virtual drive. You can
also configure the storage capacity of a virtual drive.
• Configure the number, type and role of disks in a disk group.
• Associate a storage profile with a service profile.
You can create a storage profile both at an org level and at a service-profile level. A service profile can have
a dedicated storage profile as well as a storage profile at an org level.
Virtual Drives
A disk group can be partitioned into virtual drives. Each virtual drive appears as an individual physical device
to the Operating System.
All virtual drives in a disk group must be managed by using a single disk group policy.
Configuration States
Indicates the configuration states of a virtual drive. Virtual drives can have the following configuration states:
• Applying—Creation of the virtual drive is in progress.
• Applied—Creation of the virtual drive is complete, or virtual disk policy changes are configured and
applied successfully.
• Failed to apply—Creation, deletion, or renaming of a virtual drive has failed due to errors in the underlying
storage subsystem.
• Orphaned—The service profile that contained this virtual drive is deleted or the service profile is no
longer associated with a storage profile.
Deployment States
Indicates the actions that you are performing on virtual drives. Virtual drives can have the following deployment
states:
• No action—No pending work items for the virtual drive.
• Creating—Creation of the virtual drive is in progress.
• Deleting—Deletion of the virtual drive is in progress.
• Modifying—Modification of the virtual drive is in progress.
Operability States
Indicates the operating condition of a virtual drive. Virtual drives can have the following operability states:
• Optimal—The virtual drive operating condition is good. All configured drives are online.
• Degraded—The virtual drive operating condition is not optimal. One of the configured drives has failed
or is offline.
• Cache-degraded—The virtual drive has been created with a write policy of write back mode, but the
BBU has failed, or there is no BBU.
Note This state does not occur if you select the always write back mode.
• Partially degraded—The operating condition in a RAID 6 virtual drive is not optimal. One of the
configured drives has failed or is offline. RAID 6 can tolerate up to two drive failures.
• Offline—The virtual drive is not available to the RAID controller. This is essentially a failed state.
• Unknown—The state of the virtual drive is not known.
Presence States
Indicates the presence of virtual drive components. Virtual drives have the following presence states:
• Equipped—The virtual drive is available.
• Mismatched—A virtual drive deployed state is different from its configured state.
• Missing—Virtual drive is missing.
RAID Levels
The RAID level of a disk group describes how the data is organized on the disk group for the purpose of
ensuring availability, redundancy of data, and I/O performance.
The following are features provided by RAID:
• Striping—Segmenting data across multiple physical devices. This improves performance by increasing
throughput due to simultaneous device access.
• Mirroring—Writing the same data to multiple devices to accomplish data redundancy.
• Parity—Storing of redundant data on an additional device for the purpose of error correction in the event
of device failure. Parity does not provide full redundancy, but it allows for error recovery in some
scenarios.
• Spanning—Allows multiple drives to function like a larger one. For example, four 20 GB drives can be
combined to appear as a single 80 GB drive.
• RAID 5 Striped Parity—Data is striped across all disks in the array. Part of the capacity of each disk
stores parity information that can be used to reconstruct data if a disk fails. RAID 5 provides good data
throughput for applications with high read request rates.
RAID 5 distributes parity data blocks among the disks that are part of a RAID-5 group and requires a
minimum of three disks.
• RAID 6 Striped Dual Parity—Data is striped across all disks in the array and two sets of parity data are
used to provide protection against failure of up to two physical disks. In each row of data blocks, two
sets of parity data are stored.
Other than addition of a second parity block, RAID 6 is identical to RAID 5 . A minimum of four disks
are required for RAID 6.
• RAID 10 Mirrored and Striped—RAID 10 uses mirrored pairs of disks to provide complete data
redundancy and high throughput rates through block-level striping. RAID 10 is mirroring without parity
and block-level striping. A minimum of four disks are required for RAID 10.
• RAID 50 Striped Parity and Striped—Data is striped across multiple striped parity disk sets to provide
high throughput and multiple disk failure tolerance.
• RAID 60 Striped Dual Parity and Striped—Data is striped across multiple striped dual parity disk sets
to provide high throughput and greater disk failure tolerance.
2 Select regular disks depending on the minimum number of disks and minimum disk size. Disks are selected
sequentially starting from the lowest numbered disk slot that satisfies the search criteria.
Note If you specify Any as the type of drive, the first available drive is selected. After this drive is selected,
subsequent drives will be of a compatible type. For example, if the first drive was SATA, all subsequent
drives would be SATA.
3 Select dedicated hot spares by using the same method as normal disks. Disks are only selected if they are
in an Unconfigured Good state.
4 If a provisioned LUN has the same disk group policy as a deployed virtual drive, then try to deploy the
new virtual drive in the same disk group. Otherwise, try to find new disks for deployment.
The removal of a LUN will cause a warning to be displayed. Ensure that you take action to avoid loss of data.
Destructive modifications are also not supported. The following are unsupported destructive modifications:
• RAID-level changes that do not support reconstruction. For example, RAID5 to RAID1.
• Shrinking the size of a virtual drive.
• RAID-level changes that support reconstruction, but where there are other virtual drives present on the
same drive group.
• Disk removal when there is not enough space left on the disk group to accommodate the virtual drive.
• Explicit change in the set of disks used by the virtual drive.
2 The LUN is successfully deployed, which means that a virtual drive is created, which uses the slot.
3 You remove a disk from the slot, possibly because the disk failed.
4 You insert a new working disk into the same slot.
the Rebuilding state with the virtual drive in the Degraded state. After rebuilding is complete, that drive goes
to the Online state.
Cisco UCSM raises a disk missing and virtual drive mismatch fault because although the virtual drive is
operational, it does not match the physical configuration that Cisco UCSM expects.
if you insert a new disk in the slot with the disk missing, automatic copy back starts from the earlier hot spare
disk to the newly inserted disk. After copy back, the hot spare disk is restored. In this state all faults are cleared.
If automatic copy back does not start, and the newly inserted disk remains in the Unconfigured Good, JBOD,
or Foreign Configuration state, remove the new disk from the slot, reinsert the earlier hot spare disk into the
slot, and import foreign configuration. This initiates the rebuilding process and the drive state becomes Online.
Now, insert the new disk in the hot spare slot and mark it as hot spare to match it exactly with the information
available in Cisco UCSM.
You can rename virtual drives that are not referenced by any service profile or server.
LUN Dereferencing
A LUN is dereferenced when it is no longer used by any service profile. This can occur as part of the following
scenarios:
• The LUN is no longer referenced from the storage profile
• The storage profile is no longer referenced from the service profile
• The server is disassociated from the service profile
• The server is decommissioned
When the LUN is no longer referenced, but the server is still associated, re-association occurs.
When the service profile that contained the LUN is deleted, the LUN state is changed to Orphaned.
Procedure
Step 2 UCS-A /org# create Creates a disk group configuration policy with the specified
disk-group-config-policy name and enters disk group configuration policy mode.
disk-group-name
Step 3 UCS-A Specifies the RAID level for the disk group configuration
/org/disk-group-config-policy* # set policy. The RAID levels that you can specify are:
raid-level raid-level
• raid-0-striped
• raid-1-mirrored
• raid-10-mirrored-and-striped
• raid-5-striped-parity
• raid-6-striped-dual-parity
• raid-50-striped-parity-and-striped
• raid-60-striped-dual-parity-and-striped
This example shows how to set the RAID level for a disk group configuration policy.
UCS-A# scope org
UCS-A /org # create disk-group-config-policy raid5policy
UCS-A /org/disk-group-config-policy* # set raid-level raid-5-striped-parity
UCS-A /org/disk-group-config-policy* # commit-buffer
What to Do Next
Automatically or manually configure disks as part of the disk group configuration policy.
Procedure
Step 2 UCS-A /org# enter disk-group-config-policy Enters disk group configuration policy mode for
disk-group-name the specified disk group name.
Step 3 UCS-A /org/disk-group-config-policy* # enter Enters disk group qualification mode. In this mode,
disk-group-qual UCSM automatically configures disks as part of
the specified disk group.
Step 4 UCS-A Specifies the drive type for the disk group. You can
/org/disk-group-config-policy/disk-group-qual* select:
# set drive-type drive-type
• HDD
• SSD
• Unspecified
Step 5 UCS-A Specifies the minimum drive size for the disk group.
/org/disk-group-config-policy/disk-group-qual* Only disks that match this criteria will be available
# set min-drive-size drive-size for selection.
The range for minimum drive size is from 0 to10240
GB. You can also set the minimum drive size as
Unspecified. If you set the minimum drive size as
Unspecified, drives of all sizes will be available
for selection.
Step 7 UCS-A Specifies the number of drives for the disk group.
/org/disk-group-config-policy/disk-group-qual* The range for drives is from 0 to 24 drives for Cisco
# set num-drives drive-num UCS C240, C220, C24, and C22 servers. For all
other servers, the limit is 16 drives per server.. You
Step 8 UCS-A Specifies the number of global hot spares for the
/org/disk-group-config-policy/disk-group-qual* disk group.
# set num-glob-hot-spares hot-spare-num The range for global hot spares is from 0 to 24 hot
spares. You can also set the number of global hot
spares as Unspecified. If you set the number of
global hot spares as Unspecified, the global hot
spares will be selected according to the disk
selection process.
This example shows how to automatically configure disks for a disk group configuration policy.
UCS-A# scope org
UCS-A /org # enter disk-group-config-policy raid5policy
UCS-A /org/disk-group-config-policy* # enter disk-group-qual
UCS-A /org/disk-group-config-policy/disk-group-qual* # set drive-type hdd
UCS-A /org/disk-group-config-policy/disk-group-qual* # set min-drive-size 1000
UCS-A /org/disk-group-config-policy/disk-group-qual* # set num-ded-hot-spares 2
UCS-A /org/disk-group-config-policy/disk-group-qual* # set num-drives 7
UCS-A /org/disk-group-config-policy/disk-group-qual* # set num-glob-hot-spares 2
UCS-A /org/disk-group-config-policy/disk-group-qual* # set use-remaining-disks no
UCS-A /org/disk-group-config-policy/disk-group-qual* # commit-buffer
What to Do Next
Configure Virtual Drives.
Procedure
Step 2 UCS-A /org# enter disk-group-config-policy Enters disk group configuration policy mode
disk-group-name for the specified disk group name.
Step 4 UCS-A Specifies the role of the local disk in the disk
/org/disk-group-config-policy/local-disk-config-ref group. You can select:
*# set role role
• ded-hot-spare: Dedicated hot spare
• glob-hot-spare: Global hot spare
• normal
This example shows how to manually configure disks for a disk group configuration policy.
UCS-A# scope org
UCS-A /org # enter disk-group-config-policy raid5policy
UCS-A /org/disk-group-config-policy* # create local-disk-config-ref 1
UCS-A /org/disk-group-config-policy/local-disk-config-ref *# set role ded-hot-spare
UCS-A /org/disk-group-config-policy/local-disk-config-ref* # set span-id 1
UCS-A /org/disk-group-config-policy/local-disk-config-ref *# commit-buffer
What to Do Next
Configure Virtual Drive Properties.
For the LSI MegaRAID SAS 2208 ROMB controller, these properties are supported only in the B420-M3
blade server. For the other controllers, these properties are supported in multiple rack servers.
Procedure
Step 2 UCS-A /org# scope disk-group-config-policy Enters disk group configuration policy mode
disk-group-name for the specified disk group name.
Step 3 UCS-A /org/disk-group-config-policy* # create Creates a virtual drive definition and enters the
virtual-drive-def virtual drive definition mode.
Step 5 UCS-A Specifies the state of the drive cache. This can
/org/disk-group-config-policy/virtual-drive-def* be one of the following:
# set drive-cache state
• enable
• disable
• no-change
• platform-default
Step 6 UCS-A Specifies the I/O policy. This can be one of the
/org/disk-group-config-policy/virtual-drive-def* following:
# set io-policy policy-type
• cached
• direct
• platform-default
Step 8 UCS-A Specifies the strip size. This can be one of the
/org/disk-group-config-policy/virtual-drive-def* following:
# set strip-size strip-size
• 64 KB
• 128 KB
• 256 KB
• 512 KB
• 1024 KB
• platform-default
What to Do Next
Create a Storage Profile
Procedure
Step 2 UCS-A /org # create storage-profile Creates a storage profile with the specified name
storage-profile-name at the org level and enters storage-profile
configuration mode.
This example shows how to create a storage profile at the org level.
UCS-A# scope org
UCS-A /org # create storage-profile stp2
UCS-A /org/storage-profile* # commit-buffer
This example shows how to create a storage profile at the service-profile level.
UCS-A# scope org
UCS-A /org* # enter service-profile sp1
UCS-A /org/service-profile* # create storage-profile-def
UCS-A /org/service-profile/storage-profile-def* # commit-buffer
What to Do Next
Create Local LUNs
Procedure
Step 2 UCS-A /org # delete storage-profile Deletes the storage profile with the specified name
storage-profile-name at the org level.
This example shows how to delete a storage profile at the org level.
UCS-A # scope org
UCS-A /org # delete storage-profile stor1
This example shows how to delete a storage profile at the service-profile level.
UCS-A # scope org
UCS-A /org # scope service-profile sp1
UCS-A /org/service-profile # delete storage-profile-def
Procedure
Step 3 UCS-A /org/storage-profile # create controller-def Creates a PCH controller definition with
controller-definition-name the specified name and enters
controller-definition configuration
mode.
This example shows how to add a PCH controller definition called "raid1-controller" with raid mode set to
RAID 1 Mirrored to the org-level storage profile named "storage-profile-A".
UCS-A# scope org /
UCS-A /org # scope storage-profile storage-profile-A
UCS-A /org/storage-profile # create controller-def raid1-controller
UCS-A /org/storage-profile/controller-def* # create controller-mode-config
UCS-A /org/storage-profile/controller-def/controller-mode-config* # set protect-config yes
UCS-A /org/storage-profile/controller-def/controller-mode-config* # set raid-mode
raid-1-mirrored
UCS-A /org/storage-profile/controller-def/controller-mode-config* # commit buffer
This example shows how to scope to the service profile called "Service-Profile1", create a storage profile,
then create a PCH controller definition called "Raid60Ctrlr" within that storage profile. The controller definition
has protection mode off and uses RAID 60 Striped Dual Parity and Striped.
UCS-A /org/service-profile # scope org /
UCS-A /org # scope service-profile Service-Profile1
UCS-A /org/service-profile # create storage-profile-def
UCS-A /org/service-profile/storage-profile-def* # create controller-def Raid60Ctrlr
UCS-A /org/service-profile/storage-profile-def/controller-def* # create controller-mode-config
UCS-A /org/service-profile/storage-profile-def/controller-def/controller-mode-config* # set
protect-config no
UCS-A /org/service-profile/storage-profile-def/controller-def/controller-mode-config* # set
raid-mode raid-60-striped-dual-parity-and-striped
UCS-A /org/service-profile/storage-profile-def/controller-def/controller-mode-config* #
commit-buffer
Step 3 UCS-A /org/storage-profile # delete Deletes a PCH controller definition with the specified
controller-def name.
controller-definition-name
Step 4 UCS-A /org/storage-profile* # Commits the transaction to the system configuration.
commit-buffer
This example shows how to delete a PCH controller definition called "raid1-controller" from the org-level
storage profile named "storage-profile-A".
Procedure
Step 2 UCS-A /org # enter storage-profile Enters storage-profile mode for the specified storage
storage-profile-name profile.
Step 3 UCS-A /org/storage-profile* # create Creates a local LUN with the specified name.
local-lun lun-name
Step 4 UCS-A /org/storage-profile/local-lun* # Specifies whether the LUN should be auto-deployed
set auto-deploy {auto-deploy | or not.
no-auto-deploy}
Step 5 UCS-A /org/storage-profile/local-lun* # Specifies the name of the disk policy name for this
set disk-policy-name disk-policy-name LUN.
Step 7 UCS-A /org/storage-profile/local-lun* # Specifies the size of this LUN in GB. The size can
set size size range from 1 GB to 10240 GB.
Note You do not need to specify a LUN size
while claiming an orphaned LUN.
Step 8 UCS-A /org/storage-profile/local-lun* # Commits the transaction to the system configuration.
commit-buffer
This example shows how to configure a local LUN within a storage profile at the org level.
UCS-A# scope org
UCS-A /org # enter storage-profile stp2
UCS-A /org/storage-profile* # create local-lun lun2
UCS-A /org/storage-profile/local-lun* # set auto-deploy no-auto-deploy
UCS-A /org/storage-profile/local-lun* # set disk-policy-name dpn2
UCS-A /org/storage-profile/local-lun* # set expand-to-avail yes
UCS-A /org/storage-profile/local-lun* # set size 1000
UCS-A /org/storage-profile/local-lun* # commit-buffer
This example shows how to configure a local LUN within a dedicated storage profile at the service-profile
level.
UCS-A# scope org
UCS-A /org # enter service-profile sp1
What to Do Next
Associate a Storage Profile with a Service Profile
Procedure
Step 2 UCS-A /org # enter storage-profile Enters storage-profile mode for the specified
storage-profile-name storage profile.
LUN Name Size (GB) Order Disk Policy Name Auto Deploy
LUN Name Size (GB) Order Disk Policy Name Auto Deploy
Important Storage profiles can be defined under org and under service profile (dedicated). Hence, a service profile
inherits local LUNs from both possible storage profiles. A service profile can have a maximum of two
such local LUNs.
Procedure
Step 2 UCS-A /org # scope service-profile Enters the specified service profile mode.
service-profile-name
Step 3 UCS-A /org/service-profile # set Associates the specified storage profile with the service
storage-profile-name profile.
storage-profile-name Note To dissociate the service profile from a storage
profile, use the set storage-profile-name
command and specify "" as the storage profile
name.
Step 4 UCS-A /org/service-profile* # Commits the transaction to the system configuration.
commit-buffer
This example shows how to associate a storage profile with a service profile.
UCS-A# scope org
UCS-A /org # scope service-profile sp1
UCS-A /org/service-profile # set storage-profile-name stp2
This example shows how to dissociate a service profile from a storage profile.
UCS-A# scope org
UCS-A /org # scope service-profile sp1
UCS-A /org/service-profile # set storage-profile-name ""
Procedure
Command or Purpose
Action
Step 1 UCS-A Displays the following detailed information about all the local LUNs inherited by
/org/service-profile the specified service profile:
# show
local-lun-ref • Name—LUN name in the storage profile.
• Admin State—Specifies whether a local LUN should be deployed or not.
Admin state can be Online or Undeployed.
When the local LUN is being referenced by a service profile, if the
auto-deploy status is no-auto-deploy then the admin state will be
Undeployed, else it will be Online. After the local LUN is referenced by a
service profile, any change made to this local LUN's auto-deploy status is
not reflected in the admin state of the LUN inherited by the service profile.
• RAID Level—Summary of the RAID level of the disk group used.
• Provisioned Size (GB)—Size, in GB, of the LUN specified in the storage
profile.
• Assigned Size (MB)—Size, in MB, assigned by UCSM.
• Config State—State of LUN configuration. The states can be one of the
following:
• Applying—Admin state is online, the LUN is associated with a server,
and the virtual drive is being created.
• Applied—Admin state is online, the LUN is associated with a server,
and the virtual drive is created.
• Apply Failed—Admin stage is online, the LUN is associated with a
server, but the virtual drive creation failed.
• Not Applied—The LUN is not associated with a server, or the LUN is
associated with a service profile, but admin state is undeployed.
Command or Purpose
Action
• Unknown
• Optimal
• Degraded
• Inoperable
• Partially Degraded
Profile LUN Name Admin State RAID Level Provisioned Size (GB) Assigned
Size (MB) Config State Referenced Lun Deploy Name ID Drive State
UCS-A /org/service-profile #
This example shows how to import foreign configurations from local disks that are in the Foreign
Configuration state:
UCS-A# scope server 1/3
UCS-A /chassis/server # scope raid-controller 1 sas
UCS-A /chassis/server/raid-controller # set admin-state import-foreign-configuration
UCS-A /chassis/server/raid-controller* #
This example shows how to import foreign configurations from local disks that are in the Foreign
Configuration state:
UCS-A# scope server 1
UCS-A /server # scope raid-controller 1 sas
UCS-A /server/raid-controller # set admin-state import-foreign-configuration
UCS-A /server/raid-controller* #
This example shows how to clear any foreign configuration from a local disk:
UCS-A /chassis/server/raid-controller/local-disk # set admin-state clear-foreign-configuration
This example shows how to specify a local disk as a dedicated hot spare:
UCS-A /chassis/server/raid-controller/local-disk* # set admin-state dedicated-hot-spare
1001
This example shows how to specify that a local disk is marked for removal from the chassis:
UCS-A /chassis/server/raid-controller/local-disk* # set admin-state prepare-for-removal
This example shows how to specify that a local disk is marked for removal as a hot spare:
UCS-A /chassis/server/raid-controller/local-disk* # set admin-state remove-hot-spare
This example shows how to specify that a local disk is working, but is unconfigured for use:
UCS-A /chassis/server/raid-controller/local-disk* # set admin-state unconfigured-good
This example shows how to specify that a local disk is no longer marked for removal from the chassis:
UCS-A /chassis/server/raid-controller/local-disk* # set admin-state undo-prepare-for-removal
This example shows how to clear any foreign configuration from a local disk:
UCS-A /server/raid-controller/local-disk # set admin-state clear-foreign-configuration
This example shows how to specify a local disk as a dedicated hot spare:
UCS-A /server/raid-controller/local-disk* # set admin-state dedicated-hot-spare 1001
This example shows how to specify that a local disk is marked for removal:
UCS-A /server/raid-controller/local-disk* # set admin-state prepare-for-removal
This example shows how to specify that a local disk is marked for removal as a hot spare:
UCS-A /server/raid-controller/local-disk* # set admin-state remove-hot-spare
This example shows how to specify that a local disk is working, but is unconfigured for use:
UCS-A /server/raid-controller/local-disk* # set admin-state unconfigured-good
This example shows how to specify that a local disk is no longer marked for removal:
UCS-A /server/raid-controller/local-disk* # set admin-state undo-prepare-for-removal
Procedure
This example shows how to delete an orphan virtual drive by specifying the virtual drive ID.
UCS-A# scope server 1/3
UCS-A /chassis/server # scope raid-controller 1 sas
UCS-A /chassis/server/raid-controller # show virtual-drive
Virtual Drive:
ID: 1001
Name: lun111-1
Block Size: 512
Blocks: 62914560
Size (MB): 30720
Operability: Operable
Presence: Equipped
Oper Device ID: 0
Change Qualifier: No Change
Config State: Applied
Deploy Action: No Action
ID: 1002
Name: luna-1
Block Size: 512
Blocks: 2097152
Size (MB): 1024
Operability: Operable
Presence: Equipped
Oper Device ID: 1
Change Qualifier: No Change
Config State: Orphaned
Deploy Action: No Action
ID: 1003
Name: lunb-1
Block Size: 512
Blocks: 2097152
Size (MB): 1024
Operability: Operable
Presence: Equipped
Oper Device ID: 2
Change Qualifier: No Change
Config State: Orphaned
Deploy Action: No Action
ID: 1004
Name: lunb-2
Block Size: 512
Blocks: 2097152
Size (MB): 1024
Operability: Operable
Presence: Equipped
Oper Device ID: 3
Change Qualifier: No Change
Config State: Orphaned
Deploy Action: No Action
ID: 1005
Name: luna-2
Block Size: 512
Blocks: 2097152
Size (MB): 1024
Operability: Operable
Presence: Equipped
Oper Device ID: 4
Change Qualifier: No Change
Config State: Orphaned
Deploy Action: No Action
...
Virtual Drive:
ID: 1001
Name: lun111-1
Block Size: 512
Blocks: 62914560
Size (MB): 30720
Operability: Operable
Presence: Equipped
Oper Device ID: 0
Change Qualifier: No Change
Config State: Applied
Deploy Action: No Action
ID: 1003
Name: lunb-1
Block Size: 512
Blocks: 2097152
Size (MB): 1024
Operability: Operable
Presence: Equipped
Oper Device ID: 2
Change Qualifier: No Change
Config State: Orphaned
Deploy Action: No Action
ID: 1004
Name: lunb-2
Block Size: 512
Blocks: 2097152
Size (MB): 1024
Operability: Operable
Presence: Equipped
Oper Device ID: 3
Change Qualifier: No Change
Config State: Orphaned
Deploy Action: No Action
ID: 1005
Name: luna-2
Block Size: 512
Blocks: 2097152
Size (MB): 1024
Operability: Operable
Presence: Equipped
Oper Device ID: 4
Change Qualifier: No Change
Config State: Orphaned
Deploy Action: No Action
...
Warning: When committed, the virtual drive will be deleted, which may result in data loss.
Procedure
This example shows how to delete an orphan virtual drive by specifying the virtual drive ID.
UCS-A# scope server 1
UCS-A /server # scope raid-controller 1 sas
UCS-A /server/raid-controller # show virtual-drive
Virtual Drive:
ID: 1001
Name: lun111-1
Block Size: 512
Blocks: 62914560
Size (MB): 30720
Operability: Operable
Presence: Equipped
Oper Device ID: 0
Change Qualifier: No Change
Config State: Applied
Deploy Action: No Action
ID: 1002
Name: luna-1
Block Size: 512
Blocks: 2097152
Size (MB): 1024
Operability: Operable
Presence: Equipped
Oper Device ID: 1
Change Qualifier: No Change
Config State: Orphaned
Deploy Action: No Action
ID: 1003
Name: lunb-1
Block Size: 512
Blocks: 2097152
Size (MB): 1024
Operability: Operable
Presence: Equipped
Oper Device ID: 2
Change Qualifier: No Change
Config State: Orphaned
Deploy Action: No Action
ID: 1004
Name: lunb-2
Block Size: 512
Blocks: 2097152
Size (MB): 1024
Operability: Operable
Presence: Equipped
Oper Device ID: 3
Change Qualifier: No Change
Config State: Orphaned
Deploy Action: No Action
ID: 1005
Name: luna-2
Block Size: 512
Blocks: 2097152
Size (MB): 1024
Operability: Operable
Presence: Equipped
Oper Device ID: 4
Change Qualifier: No Change
Config State: Orphaned
Deploy Action: No Action
...
Virtual Drive:
ID: 1001
Name: lun111-1
Block Size: 512
Blocks: 62914560
Size (MB): 30720
Operability: Operable
Presence: Equipped
Oper Device ID: 0
Change Qualifier: No Change
Config State: Applied
Deploy Action: No Action
ID: 1003
Name: lunb-1
Block Size: 512
Blocks: 2097152
Size (MB): 1024
Operability: Operable
Presence: Equipped
Oper Device ID: 2
Change Qualifier: No Change
Config State: Orphaned
Deploy Action: No Action
ID: 1004
Name: lunb-2
Block Size: 512
Blocks: 2097152
Size (MB): 1024
Operability: Operable
Presence: Equipped
Oper Device ID: 3
Change Qualifier: No Change
Config State: Orphaned
Deploy Action: No Action
ID: 1005
Name: luna-2
Block Size: 512
Blocks: 2097152
Size (MB): 1024
Operability: Operable
Presence: Equipped
Oper Device ID: 4
Change Qualifier: No Change
Config State: Orphaned
Deploy Action: No Action
...
Warning: When committed, the virtual drive will be deleted, which may result in data loss.
Procedure
Step 2 UCS-A /chassis/server # scope raid-controller Enters RAID controller chassis mode.
raid-contr-id {sas | sata}
Step 3 UCS-A /chassis/server/raid-controller # scope Enters virtual drive mode for the specified
virtual-drive virtual-drive-id virtual drive.
This example shows how to specify a name for an orphan virtual drive.
UCS-A /chassis/server # scope raid-controller 1 sas
UCS-A /chassis/server/raid-controller # scope virtual-drive 1060
UCS-A /chassis/server/raid-controller/virtual-drive # set name vd1
UCS-A /chassis/server/raid-controller/virtual-drive # commit-buffer
Procedure
Step 4 UCS-A /server/raid-controller/virtual-drive # set Specifies a name for the orphan virtual
name virtual-drive-name drive.
This example shows how to specify a name for an orphan virtual drive.
UCS-A /server # scope raid-controller 1 sas
UCS-A /server/raid-controller # scope virtual-drive 1060
UCS-A /server/raid-controller/virtual-drive # set name vd1
UCS-A /server/raid-controller/virtual-drive # commit-buffer
Procedure
Step 2 UCS-A /org # scope boot-policy policy-name Enters organization boot policy mode
for the specified boot policy.
Step 3 UCS-A /org/boot-policy # create storage Creates a storage boot for the boot
policy and enters organization boot
policy storage mode.
Step 4 UCS-A /org/boot-policy/storage # create local Creates a local storage location and
enters the boot policy local storage
mode.
Step 5 UCS-A /org/boot-policy/storage/local/ # create local-lun Specifies a local hard disk drive as
the local storage.
Step 6 UCS-A /org/boot-policy/storage/local/local-lun # create Specifies the boot order for the LUN
local-lun-image-path {primary | secondary} that you specify.
Important Cisco UCS Manager
Release 2.2(4) does not
support secondary boot
order.
Step 7 UCS-A Specifies the name of the LUN that
/org/boot-policy/storage/local/local-lun/local-lun-image-path you want to boot from.
# set lunname lun_name
Step 8 UCS-A /org/boot-policy/storage/local/local-storage-device Commits the transaction to the
# commit-buffer system configuration.
The following example shows how to create a boot policy named lab1-boot-policy, create a local hard disk
drive boot for the policy, specify a boot order and a LUN to boot from, and commit the transaction:
UCS-A# scope org /
UCS-A /org* # scope boot-policy lab1-boot-policy
UCS-A /org/boot-policy* # create storage
UCS-A /org/boot-policy/storage* # create local
UCS-A /org/boot-policy/storage/local* # create local-lun
UCS-A /org/boot-policy/storage/local/local-lun # create local-lun-image-path primary
UCS-A /org/boot-policy/storage/local/local-lun/local-lun-image-path # set lunname luna
UCS-A /org/boot-policy/storage/local/local-lun/local-lun-image-path # commit-buffer
UCS-A /org/boot-policy/storage/local/local-lun/local-lun-image-path #
What to Do Next
Include the boot policy in a service profile and template.
Procedure
Step 2 UCS-A /org # scope boot-policy policy-name Enters organization boot policy
mode for the specified boot policy.
Step 3 UCS-A /org/boot-policy # create storage Creates a storage boot for the boot
policy and enters organization boot
policy storage mode.
Step 4 UCS-A /org/boot-policy/storage # create local Creates a local storage location and
enters the boot policy local storage
mode.
Step 5 UCS-A /org/boot-policy/storage/local/ # create local-jbod Specifies a local JBOD disk as the
local storage.
JBOD is supported only on the
following servers:
• Cisco UCS B200 M3 blade
server
• Cisco UCS B260 M4 blade
server
• Cisco UCS B460 M4 blade
server
• Cisco UCS B200 M4 blade
server
• Cisco UCS C220 M4
rack-mount server
• Cisco UCS C240 M4
rack-mount server
• Cisco UCS C460 M4
rack-mount server
Step 6 UCS-A /org/boot-policy/storage/local/local-jbod # create Specifies the boot order for the local
local-disk-image-path {primary | secondary} JBOD disk.
Important Cisco UCS Manager
Release 2.2(4) does not
support secondary
boot order.
The following example shows how to create a boot policy named lab1-boot-policy, create a local hard disk
drive boot for the policy, specify a boot order and a JBOD disk to boot from, and commit the transaction:
UCS-A# scope org /
UCS-A /org* # scope boot-policy lab1-boot-policy
UCS-A /org/boot-policy* # create storage
UCS-A /org/boot-policy/storage* # create local
UCS-A /org/boot-policy/storage/local* # create local-jbod
UCS-A /org/boot-policy/storage/local/local-jbod # create local-disk-image-path primary
UCS-A /org/boot-policy/storage/local/local-jbod/local-disk-image-path* # set slotnumber 5
UCS-A /org/boot-policy/storage/local/local-jbod/local-disk-image-path # commit-buffer
UCS-A /org/boot-policy/storage/local/local-jbod/local-disk-image-path #
What to Do Next
Include the boot policy in a service profile and template.
Note Preprovisioning a LUN name, claiming an orphan LUN, and deploying or undeploying a LUN result in
server reboot.
Procedure
Step 2 UCS-A /org# scope service-profile Enters the specified service profile mode.
service-profile-name
Step 3 UCS-A /org/service-profile# enter Enters the specified LUN.
local-lun-ref lun-name
Step 4 UCS-A Sets the referenced LUN name.
/org/service-profile/local-lun-ref# set If this LUN name exists and the LUN is orphaned, its
ref-name ref-lun-name is claimed by the service profile. If this LUN does not
exist, a new LUN is created with the specified name.
Procedure
Step 2 UCS-A /org# scope service-profile Enters the specified service profile mode.
service-profile-name
Step 3 UCS-A /org/service-profile# enter Enters the specified LUN.
local-lun-ref lun-name
Procedure
Step 2 UCS-A /org# scope service-profile Enters the specified service profile mode.
service-profile-name
Step 3 UCS-A /org/service-profile# enter Enters the specified LUN.
local-lun-ref lun-name
Step 4 UCS-A /org/service-profile/local-lun-ref# set Renames the referenced LUN.
name
The following example shows that the state of the local disk Locator LED is on:
USA-A# scope server 1
USA-A /server # scope local-disk 2
USA-A /serverlocal-disk # show locator-led
Locator LED:
Equipment Operational State
---------------- -----------------
1/SAS-1/2 On
Procedure
The following example displays how to turn on the local disk Locator LED:
UCS-A# scope server 1
UCS-A /server/raid-controller # scope local-disk 2
USA-A /server/raid-controller/local-disk # enable locator-led
USA-A /server/raid-controller/local-disk* # commit-buffer
Procedure
The following example displays how to disable the local disk Locator LED:
UCS-A# server 1
UCS-A /server # scope local-disk 2
USA-A /server/local-disk # disable locator-led
USA-A /server/local-disk* # commit-buffer
You can use Policy Driven Chassis Group Power Cap, or Manual Blade Level Power Cap methods to allocate
power that applies to all of the servers in a chassis.
Cisco UCS Manager provides the following power management policies to help you allocate power to your
servers:
Power Control Policies Specifies the priority to calculate the initial power
allocation for each blade in a chassis.
Global Power Allocation Specifies the Policy Driven Chassis Group Power
Cap or the Manual Blade Level Power Cap to apply
to all servers in a chassis.
Global Power Profiling Specifies how the power cap values of the servers are
calculated. If it is enabled, the servers will be profiled
during discovery through benchmarking. This policy
applies when the Global Power Allocation Policy is
set to Policy Driven Chassis Group Cap.
The following example lists the minimum and maximum power measured for blades.
UCS-A# show power-measured
Measured Power:
For more information about power redundancy, see the Cisco UCS
5108 Server Chassis Installation Guide.
The following example configures the power policy to use grid redundancy and commits the transaction:
UCS-A# scope org /
UCS-A /org # scope psu-policy
UCS-A /org/psu-policy # set redundancy grid
UCS-A /org/psu-policy* # commit-buffer
UCS-A /org/psu-policy #
Step 4 UCS-A /power-cap-mgmt # show Displays whether the global power profiling
profile-policy policy is on.
Global Power Profiling Policy:
Power Profiling
Yes
The following example show how to display the global power profiling policy
UCS-A /power-cap-mgmt # show profile-policy
Global Power Profiling Policy:
Power Profiling
---------------
No
Important Any change to the Manual Blade level Power Cap configuration results in the loss of any groups or
configuration options set for the Policy Driven Chassis Group Power Cap.
Step 2 UCS-A /power-cap-mgmt # set cap-policy Sets the global cap policy to the specified power
{manual-blade-level-cap | cap management mode.
policy-driven-chassis-group-cap} By default, the global cap policy is set to policy
driven chassis group cap.
The following example sets the global cap policy to manual blade power cap and commits the transaction:
UCS-A# scope power-cap-mgmt
UCS-A /power-cap-mgmt # set cap-policy manual-blade-level-cap
UCS-A /power-cap-mgmt* # commit-buffer
UCS-A /power-cap-mgmt #
Step 2 UCS-A /power-cap-mgmt # show Displays the minimum and maximum power
power-measured cap values.
The following example shows how to display the minimum and maximum power cap values:
UCS-A# scope power-cap-mgmt
UCS-A /power-cap-mgmt # show power-measured
Measured Power:
Device Id (W) Minimum power (W) Maximum power (W) OperMethod
-------------- ----------------- ----------------- ----------
blade 1/1 234 353 Pnuos
UCS-A /power-cap-mgmt #
Note The system reserves enough power to boot a server in each slot, even if that slot is empty. This reserved
power cannot be leveraged by servers requiring more power. Blades that fail to comply with the power
cap are penalized.
The peak power cap is a static value that represents the maximum power available to all blade servers within
a given power group. If you add or remove a blade from a power group, but do not manually modify the peak
power value, the power group adjusts the peak power cap to accommodate the basic power-on requirements
of all blades within that power group.
A minimum of 890 AC watts should be set for each chassis. This converts to 800 watts of DC power, which
is the minimum amount of power required to power an empty chassis. To associate a half-width blade, the
group cap needs to be set to 1475 AC watts. For a full-width blade, it needs to be set to 2060 AC watts.
After a chassis is added to a power group, all service profile associated with the blades in the chassis become
part of that power group. Similarly, if you add a new blade to a chassis, that blade inherently becomes part
of the chassis' power group.
Note Creating a power group is not the same as creating a server pool. However, you can populate a server pool
with members of the same power group by creating a power qualifier and adding it to server pool policy.
When a chassis is removed or deleted, the chassis gets removed from the power group.
UCS Manager supports explicit and implicit power groups.
• Explicit: You can create a power group, add chassis' and racks, and assign a budget for the group.
• Implicit: Ensures that the chassis is always protected by limiting the power consumption within safe
limits. By default, all chassis that are not part of an explicit power group are assigned to the default
group and the appropriate caps are placed. New chassis that connect to UCS Manager are added to the
default power group until you move them to a different power group.
The following table describes the error messages you might encounter while assigning power budget and
working with power groups.
P-State lowered as Displays when the server is capped This is an information message.
consumption hit power to reduce the power consumption If a server should not be capped, in
cap for server below the allocated power. the service profile set the value of
the power control policy Power
Capping field to no-cap.
Chassis N has a mix of This fault is raised when a chassis This is an unsupported
high-line and low-line has a mix of high-line and low-line configuration. All PSUs must be
PSU input power PSU input sources connected. connected to similar power sources.
sources.
Procedure
Step 2 UCS-A /power-cap-mgmt # create Creates a power group and enters power group
power-group power-group-name mode.
Step 3 UCS-A /power-cap-mgmt/power-group # set Specifies the maximum peak power (in watts)
peak {peak-num | disabled | uninitialized} available to the power group.
Step 4 UCS-A /power-cap-mgmt/power-group # Adds the specified chassis to the power group
create chassis chassis-id and enters power group chassis mode.
The following example creates a power group called powergroup1, specifies the maximum peak power for
the power group (10000 watts), adds chassis 1 to the group, and commits the transaction:
UCS-A# scope power-cap-mgmt
UCS-A /power-cap-mgmt # create power-group powergroup1
UCS-A /power-cap-mgmt/power-group* # set peak 10000
UCS-A /power-cap-mgmt/power-group* # create chassis 1
UCS-A /power-cap-mgmt/power-group/chassis* # commit-buffer
UCS-A /power-cap-mgmt/power-group/chassis #
Procedure
Step 2 UCS-A /power-cap-mgmt # delete power-group Deletes the specified power group.
power-group-name
Step 3 UCS-A /power-cap-mgmt/power-group/chassis # Commits the transaction to the system
commit-buffer configuration.
The following example deletes a power group called powergroup1 and commits the transaction:
UCS-A# scope power-cap-mgmt
UCS-A /power-cap-mgmt # delete power-group powergroup1
UCS-A /power-cap-mgmt* # commit-buffer
UCS-A /power-cap-mgmt #
Note You must include the power control policy in a service profile and that service profile must be associated
with a server for it to take effect.
Procedure
Step 2 UCS-A /org # create power-control-policy Creates a power control policy and enters power
power-control-pol-name control policy mode.
Step 3 UCS-A /org/power-control-policy # set Specifies the priority for the power control policy.
priority {priority-num | no-cap}
Step 4 UCS-A /org/power-control-policy # Commits the transaction to the system
commit-buffer configuration.
The following example creates a power control policy called powerpolicy15, sets the priority at level 2, and
commits the transaction:
UCS-A# scope org /
UCS-A /org # create power-control-policy powerpolicy15
UCS-A /org/power-control policy* # set priority 2
What to Do Next
Include the power control policy in a service profile.
Procedure
Step 2 UCS-A /org # delete Deletes the specified power control policy.
power-control-policy
power-control-pol-name
Step 3 UCS-A /org # commit-buffer Commits the transaction to the system
configuration.
The following example deletes a power control policy called powerpolicy15 and commits the transaction:
UCS-A# scope org /
UCS-A /org # delete power-control-policy powerpolicy15
UCS-A /org* # commit-buffer
UCS-A /org #
If the server encounters a spike in power usage that meets or exceeds the maximum configured for the server,
Cisco UCS Manager does not disconnect or shut down the server. Instead, Cisco UCS Manager reduces the
power that is made available to the server. This reduction can slow down the server, including a reduction in
CPU speed.
Note If you configure the manual blade-level power cap using Equipment > Policies > Global Policies >
Global Power Allocation Policy, the priority set in the Power Control Policy is no longer relevant.
Procedure
The following example limits the power usage for a server to 1000 watts and commits the transaction:
UCS-A# scope server 1/7
UCS-A /chassis/server # show power-budget
Budget:
AdminCommitted (W)
-----------------
139
Budget:
AdminCommitted (W)
-----------------
Unbounded
Budget:
AdminCommitted (W)
-----------------
1000
UCS-A /chassis/server #
Step 2 UCS-A /chassis/server # show stats Displays the power usage statistics collected for
the server.
Mb Power Stats:
Time Collected: 2010-04-15T21:18:04.992
Monitored Object: sys/chassis-1/blade-2/board
Suspect: No
Consumed Power (W): 118.285194
Input Voltage (V): 11.948000
Input Current (A): 9.900000
Thresholded: Input Voltage Min
UCS-A /chassis/server #
power sync policy for the specified service profile or change the reference to an existing policy in the service
profile.
Shallow Association ON ON ON
Step 2 UCS-A/org # scope power-sync-policy Enters the global power sync policy mode.
default
The following example displays the global (default) power sync policy:
UCS-A # scope org
UCS-A /org # scope power-sync-policy default-sync
UCS-A /org/power-sync-policy # show expand
UCS-A /org/power-sync-policy #
Procedure
Step 2 UCS-A/org # scope service-profile Enters the service profile mode for the specified service
service-profile-name profile. The name of the service profile can be a minimum
of two characters and a maximum up to 32 characters.
Step 3 UCS-A /org/service-profile # set Specifies the global power sync policy that can be
power-sync-policy default referenced in the service profile. You can also change the
policy reference from the default to other power sync
policies using this command.
The following example sets the reference to the global power sync policy for use in the service profile.
UCS-A # scope org
UCS-A/org # scope service-profile spnew
UCS-A/org/service-profile # set power-sync-policy default
UCS-A/org/service-profile* # commit-buffer
Step 2 UCS-A /org # create Creates a power sync policy and enters power sync policy mode.
power-sync-policy The power sync policy name can be up to 16 characters.
power-sync-pol-name
Step 3 UCS-A (Optional)
/org/power-sync-policy* # set Specifies the description of the power-sync-policy. You can also
descr optionall-description modify the description using the descr keyword.
Step 4 UCS-A Specifies the power synchronization option to the physical server.
/org/power-sync-policy* # set You can also modify the power synchronization option using the
sync-option { always-sync | sync-option keyword. This can be one of the following:
default-sync |
initial-only-sync } • Default Sync—After the initial server association, any
configuration change or management connectivity changes
that you perform trigger a server reassociation. This option
synchronizes the desired power state to the physical server if
the physical server power state is off and the desired power
state is on. This is the default behavior.
• Always Sync—When the initial server association or the
server reassociation occurs, this option always synchronizes
the desired power state to the physical server even if the
physical server power state is on and the desired power state
is off.
• Initial Only Sync—This option only synchronizes the power
to a server when a service profile is associated to the server
for the first time or when the server is re-commissioned. When
you set this option, resetting the power state from the physical
server side does not affect the desired power state on the
service profile.
The following example creates a power sync policy called newSyncPolicy, sets the default sync-option, and
commits the transaction to the system configuration:
UCS-A # scope org
UCS-A /org # create power-sync-policy newSyncPolicy
UCS-A /org/power-sync-policy* # set decsr newSyncPolicy
UCS-A /org/power-sync-policy* # set sync-option default-sync
UCS-A /org/power-sync-policy* # commit-buffer
UCS-A /org/power-sync-policy #
What to Do Next
Include the power sync policy in a service profile or in a service profile template.
Step 2 UCS-A /org # delete power-sync-policy Deletes the specified power sync policy.
power-sync-pol-name
Step 3 UCS-A /org # commit buffer Commits the transaction to the system
configuration.
The following example deletes the power sync policy called spnew and commits the transaction to the system:
UCS-A # scope org
UCS-A /org # delete power-sync-policy spnew
UCS-A /org # commit-buffer
The following example displays power sync policies that are defined:
UCS-A # scope org
UCS-A /org # show power-sync-policy expand
Power Sync Policy:
Name Power Sync Option
-------------------- -----------------
default Default Sync
policy-1 Default Sync
UCS-A /org #
Procedure
Step 2 UCS-A /org # scope service-profile Enters the service profile mode for the specified
service-profile-name service profile. The name of the service profile can
be a minimum of two characters and a maximum up
to 32 characters.
Step 3 UCS-A /org/service-profile # create Enters the power sync definition mode. You can
power-sync-definition create a power sync policy definition that you defined
for the power sync policy.
The following example creates a local policy using the policy sync definition, sets the sync-option, and commits
the transaction to the system configuration:
UCS-A # scope org
UCS-A/org # scope service-profile spnew
UCS-A/org/service-profile # create power-sync-definition
UCS-A/org/service-profile/power-sync-definition* # set decsr spnew
UCS-A/org/service-profile/power-sync-definition* # set sync-option default-sync
UCS-A/org/service-profile/power-sync-definition* # commit-buffer
Step 2 UCS-A/org # scope service-profile Enters the service profile mode for the specified service
service-profile-name profile. The name of the service profile can be a minimum
of two characters and a maximum up to 32 characters.
The following example displays the local policy in use by the service profile spnew:
UCS-A # scope org
UCS-A/org # scope service-profile spnew
UCS-A/org/service-profile # show power-sync-definition expand
UCS-A/org/service-profile #
Step 2 UCS-A/org # scope service-profile Enters the service profile mode for the specified service
service-profile-name profile. The name of the service profile can be a minimum
of two characters and a maximum up to 32 characters.
Step 3 UCS-A /org/service-profile # delete Enters the power sync definition mode. You can delete
power-sync-definition a power sync policy definition that you defined for the
power sync policy.
The following example deletes the local policy in use by the service profile.
UCS-A # scope org
UCS-A/org # scope service-profile spnew
UCS-A/org/service-profile # delete power-sync-definition
UCS-A/org/service-profile* # commit-buffer
Time Zones
Cisco UCS requires a domain-specific time zone setting and an NTP server to ensure the correct time display
in Cisco UCS Manager. If you do not configure both of these settings in a Cisco UCS domain, the time does
not display correctly.
Step 3 UCS-A /system/services # set At this point, you are prompted to enter a number
timezone corresponding to your continent, country, and time zone
region. Enter the appropriate information at each
prompt.
When you have finished specifying the location
information, you are prompted to confirm that the
The following example configures the time zone to the Pacific time zone region, commits the transaction, and
displays the configured time zone:
UCS-A# scope system
UCS-A /system # scope services
UCS-A /system/services # set timezone
Please identify a location so that time zone rules can be set correctly.
Please select a continent or ocean.
1) Africa 4) Arctic Ocean 7) Australia 10) Pacific Ocean
2) Americas 5) Asia 8) Europe
3) Antarctica 6) Atlantic Ocean 9) Indian Ocean
#? Artic ocean
Please enter a number in range.
#? 2
Please select a country.
1) Anguilla 18) Ecuador 35) Paraguay
2) Antigua & Barbuda 19) El Salvador 36) Peru
3) Argentina 20) French Guiana 37) Puerto Rico
4) Aruba 21) Greenland 38) St Kitts & Nevis
5) Bahamas 22) Grenada 39) St Lucia
6) Barbados 23) Guadeloupe 40) St Pierre & Miquelon
7) Belize 24) Guatemala 41) St Vincent
8) Bolivia 25) Guyana 42) Suriname
9) Brazil 26) Haiti 43) Trinidad & Tobago
10) Canada 27) Honduras 44) Turks & Caicos Is
11) Cayman Islands 28) Jamaica 45) United States
12) Chile 29) Martinique 46) Uruguay
13) Colombia 30) Mexico 47) Venezuela
14) Costa Rica 31) Montserrat 48) Virgin Islands (UK)
15) Cuba 32) Netherlands Antilles 49) Virgin Islands (US)
16) Dominica 33) Nicaragua
17) Dominican Republic 34) Panama
#? 45
Please select one of the following time zone regions.
1) Eastern Time
2) Eastern Time - Michigan - most locations
3) Eastern Time - Kentucky - Louisville area
4) Eastern Time - Kentucky - Wayne County
5) Eastern Standard Time - Indiana - most locations
6) Eastern Standard Time - Indiana - Crawford County
7) Eastern Standard Time - Indiana - Starke County
8) Eastern Standard Time - Indiana - Switzerland County
9) Central Time
10) Central Time - Michigan - Wisconsin border
11) Central Time - North Dakota - Oliver County
12) Mountain Time
13) Mountain Time - south Idaho & east Oregon
14) Mountain Time - Navajo
15) Mountain Standard Time - Arizona
16) Pacific Time
United States
Pacific Time
Step 3 UCS-A /system/services # create ntp-server Configures the system to use the NTP server
{hostname | ip-addr|ip6-addr} with the specified hostname, IPv4 or IPv6
address.
The following example configures an NTP server with the IP address 192.168.200.101 and commits the
transaction:
UCS-A# scope system
UCS-A /system # scope services
UCS-A /system/services # create ntp-server 192.168.200.101
UCS-A /system/services* # commit-buffer
UCS-A /system/services #
The following example configures an NTP server with the IP address 4001::6 and commits the transaction:
UCS-A# scope system
UCS-A /system # scope services
UCS-A /system/services # create ntp-server 4001::6
UCS-A /system/services* # commit-buffer
UCS-A /system/services #
Step 3 UCS-A /system/services # delete ntp-server Deletes the NTP server with the specified
{hostname | ip-addr|ip6-addr} hostname, IPv4 or IPv6 address.
The following example deletes the NTP server with the IP address 192.168.200.101 and commits the transaction:
UCS-A# scope system
UCS-A /system # scope services
UCS-A /system/services # delete ntp-server 192.168.200.101
UCS-A /system/services* # commit-buffer
UCS-A /system/services #
The following example deletes the NTP server with the IPv6 address 4001::6 and commits the transaction:
UCS-A# scope system
UCS-A /system # scope services
UCS-A /system/services # delete ntp-server 4001::6
UCS-A /system/services* # commit-buffer
UCS-A /system/services #
Procedure
Step 3 UCS-A /system/services # set clock mon date Configures the system clock.
year hour min sec
The following example configures the system clock and commits the transaction:
UCS-A# scope system
UCS-A /system # scope services
UCS-A /system/services # set clock apr 14 2010 15 27 00
UCS-A /system/services #
Decommissioning a Chassis
Decommissioning is performed when a chassis is physically present and connected but you want to temporarily
remove it from the Cisco UCS Manager configuration. Because it is expected that a decommissioned chassis
will be eventually recommissioned, a portion of the chassis' information is retained by Cisco UCS Manager
for future use.
Removing a Chassis
Removing is performed when you physically remove a chassis from the system. Once the physical removal
of the chassis is completed, the configuration for that chassis can be removed in Cisco UCS Manager.
Note You cannot remove a chassis from Cisco UCS Manager if it is physically present and connected.
If you need to add a removed chassis back to the configuration, it must be reconnected and then rediscovered.
During rediscovery Cisco UCS Manager will assign the chassis a new ID that may be different from ID that
it held before.
Acknowledging a Chassis
Perform the following procedure if you increase or decrease the number of links that connect the chassis to
the fabric interconnect. Acknowledging the chassis ensures that Cisco UCS Manager is aware of the change
in the number of links and that traffics flows along all available links.
After you enable or disable a port on a fabric interconnect, wait for at least 1 minute before you re-acknowledge
the chassis. If you re-acknowledge the chassis too soon, the pinning of server traffic from the chassis might
not get updated with the changes to the port that you enabled or disabled.
Procedure
Decommissioning a Chassis
Procedure
Chassis:
Chassis Overall Status Admin State
---------- ------------------------ -----------
1 Operable Acknowledged
2 Accessibility Problem Decommission
UCS-A #
Removing a Chassis
Before You Begin
Physically remove the chassis before performing the following procedure.
Procedure
Recommissioning a Chassis
This procedure returns the chassis to the configuration and applies the chassis discovery policy to the chassis.
After this procedure, you can access the chassis and any servers in it.
Procedure
The following example recommissions a Cisco UCS 5108 chassis and commits the transaction:
UCS-A# show chassis
Chassis:
Chassis Overall Status Admin State
---------- ------------------------ -----------
1 Accessibility Problem Decommission
Renumbering a Chassis
Note You cannot renumber a blade server through Cisco UCS Manager. The ID assigned to a blade server is
determined by its physical slot in the chassis. To renumber a blade server, you must physically move the
server to a different slot in the chassis.
Procedure
Step 2 Verify that the chassis inventory • The chassis you want to renumber
does not include the following:
• A chassis with the number you want to use
Step 3 UCS-A# recommission chassis Recommissions and renumbers the specified chassis.
vendor-name model-name
serial-num [chassis-num]
Step 4 UCS-A# commit-buffer Commits the transaction to the system configuration.
The following example decommissions two Cisco UCS chassis (chassis 8 and 9), switches their IDs, and
commits the transaction:
UCS-A# show chassis inventory
Step 2 UCS-A /chassis # enable locator-led Turns on the chassis locator LED.
The following example turns on the locator LED for chassis 2 and commits the transaction:
UCS-A# scope chassis 2
UCS-A /chassis # enable locator-led
UCS-A /chassis* # commit-buffer
UCS-A /chassis #
Step 2 UCS-A /chassis # disable locator-led Turns off the chassis locator LED.
The following example turns off the locator LED for chassis 2 and commits the transaction:
UCS-A# scope chassis 2
UCS-A /chassis # disable locator-led
UCS-A /chassis* # commit-buffer
UCS-A /chassis #
Procedure
Procedure
Procedure
Step 1 Verify that the existing Cisco UCS B260 M4 blade server is not associated with a service profile.
Step 2 Insert the second Cisco UCS B260 M4 blade server into the chassis either above or below the first blade
server.
Note If the second blade server does not have a Cisco UCS scalability terminator, use the terminator from
the first blade server.
Step 3 Decommission both Cisco UCS B260 M4 blade servers.
Step 4 Synchronize the firmware.
Use the Firmware Auto Sync Server policy in Cisco UCS Manager to automatically update the new server.
For more information, see the appropriate Cisco UCS B-Series Firmware Management Guide.
Step 5 Replace the Cisco UCS scalability terminators with the Cisco UCS scalability connector.
The presence of the slots changes to mismatch, but discovery is not triggered.
Note Only servers added to a server pool automatically during discovery are removed automatically. Servers
that were manually added to a server pool must be removed manually.
To add a removed blade server back to the configuration, it must be reconnected, then rediscovered. When a
server is reintroduced to Cisco UCS Manager, it is treated as a new server and is subject to the deep discovery
process. For this reason, it is possible for Cisco UCS Manager to assign the server a new ID that might be
different from the ID that it held before.
Important Do not use any of the following options on an associated server that is currently powered off:
• Reset in the GUI
• cycle cycle-immediate or reset hard-reset-immediate in the CLI
• The physical Power or Reset buttons on the server
If you reset, cycle, or use the physical power buttons on a server that is currently powered off, the server's
actual power state might become out of sync with the desired power state setting in the service profile. If the
communication between the server and Cisco UCS Manager is disrupted or if the service profile configuration
changes, Cisco UCS Manager might apply the desired power state from the service profile to the server,
causing an unexpected power change.
Power synchronization issues can lead to an unexpected server restart, as shown below:
Desired Power State in Service Current Server Power State Server Power State After
Profile Communication Is Disrupted
Up Powered Off Powered On
Desired Power State in Service Current Server Power State Server Power State After
Profile Communication Is Disrupted
Down Powered On Powered On
Note Running servers are not
shut down regardless of
the desired power state in
the service profile.
Procedure
Step 2 UCS-A /org # scope service-profile Enters organization service profile mode for the
profile-name specified service profile.
Step 3 UCS-A /org/service-profile # power up Boots the blade server associated with the service
profile.
The following example boots the blade server associated with the service profile named ServProf34 and
commits the transaction:
UCS-A# scope org /
UCS-A /org* # scope service-profile ServProf34
UCS-A /org/service-profile* # power up
UCS-A /org/service-profile* # commit-buffer
UCS-A /org/service-profile #
Note When a blade server that is associated with a service profile is shut down, the VIF down alert F0283 and
F0479 are automatically suppressed.
Procedure
Step 2 UCS-A /org # scope service-profile Enters organization service profile mode for the
profile-name specified service profile.
Step 3 UCS-A /org/service-profile # power Shuts down the blade server associated with the
down service profile.
The following example shuts down the blade server associated with the service profile named ServProf34
and commits the transaction:
UCS-A# scope org /
UCS-A /org # scope service-profile ServProf34
UCS-A /org/service-profile # power down
UCS-A /org/service-profile* # commit-buffer
UCS-A /org/service-profile #
The following example immediately power cycles blade server 4 in chassis 2 and commits the transaction:
UCS-A# scope server 2/4
UCS-A /chassis/server # cycle cycle-immediate
UCS-A /chassis/server* # commit-buffer
UCS-A /chassis/server #
Note If you are trying to boot a server from a power-down state, you should not use Reset.
If you continue the power-up with this process, the desired power state of the servers become out of sync
with the actual power state and the servers might unexpectedly shut down at a later time. To safely reboot
the selected servers from a power-down state, click Cancel, then select the Boot Server action.
Procedure
Step 3 UCS-A /server # commit-buffer Commits the transaction to the system configuration.
The following example performs an immediate hard reset of blade server 4 in chassis 2 and commits the
transaction:
UCS-A# scope server 2/4
UCS-A /chassis/server # reset hard-reset-immediate
UCS-A /chassis/server* # commit-buffer
UCS-A /chassis/server #
Perform the following procedure to reset the server to factory default settings.
Procedure
The following example resets the server settings to factory default without deleting storage, and commits the
transaction:
UCS-A# scope server 2/4
UCS-A /chassis/server # reset factory-default
UCS-A /chassis/server* # commit-buffer
The following example resets the server settings to factory default, deletes flexflash storage, and commits the
transaction:
UCS-A# scope server 2/4
UCS-A /chassis/server # reset factory-default delete-flexflash-storage
The following example resets the server settings to factory default, deletes all storage, and commits the
transaction:
UCS-A# scope server 2/4
UCS-A /chassis/server # reset factory-default delete-storage
UCS-A /chassis/server* # commit-buffer
The following example resets the server settings to factory default, deletes all storage, sets all disks to their
initial state, and commits the transaction:
UCS-A# scope server 2/4
UCS-A /chassis/server # reset factory-default delete-storage create-initial-storage-volumes
UCS-A /chassis/server* # commit-buffer
Procedure
The following example acknowledges server 4 in chassis 2 and commits the transaction:
UCS-A# acknowledge server 2/4
UCS-A* # commit-buffer
UCS-A #
Procedure
The following example removes blade server 4 in chassis 2 and commits the transaction:
UCS-A# remove server 2/4
UCS-A* # commit-buffer
UCS-A #
What to Do Next
If you physically re-install the blade server, you must re-acknowledge the slot for the Cisco UCS Manager to
rediscover the server.
For more information, see Acknowledging a Blade Server, on page 713.
The following example decommissions blade server 4 in chassis 2 and commits the transaction:
UCS-A# decommission server 2/4
UCS-A* # commit-buffer
UCS-A #
The following example turns on the locator LED for blade server 4 in chassis 2 and commits the transaction:
UCS-A# scope server 2/4
UCS-A /chassis/server # enable locator-led
UCS-A /chassis/server* # commit-buffer
UCS-A /chassis/server #
The following example turns on the locator LED for blade server 7 in chassis 2 and commits the transaction:
UCS-A# scope chassis 2/7
UCS-A /chassis/server # enable locator-led multi-master
UCS-A /chassis/server* # commit-buffer
UCS-A /chassis/server #
The following example turns off the locator LED for blade server 4 in chassis 2 and commits the transaction:
UCS-A# scope chassis 2/4
UCS-A /chassis/server # disable locator-led
UCS-A /chassis/server* # commit-buffer
UCS-A /chassis/server #
The following example turns off the locator LED for blade server 7 in chassis 2 and commits the transaction:
UCS-A# scope chassis 2/7
UCS-A /chassis/server # disable locator-led multi-master
UCS-A /chassis/server* # commit-buffer
UCS-A /chassis/server #
Procedure
Step 2 UCS-A /chassis/server # reset-cmos Resets the CMOS for the blade server.
The following example resets the CMOS for blade server 4 in chassis 2 and commits the transaction:
UCS-A# scope server 2/4
UCS-A /chassis/server # reset-cmos
UCS-A /chassis/server* # commit-buffer
UCS-A /chassis/server #
If the CIMC is reset, the power monitoring functions of Cisco UCS become briefly unavailable until the CIMC
reboots. Typically, the reset only takes 20 seconds; however, it is possible that the peak power cap can exceed
during that time. To avoid exceeding the configured power cap in a low power-capped environment, consider
staggering the rebooting or activation of CIMCs.
Procedure
Step 2 UCS-A /chassis/server # scope CIMC Enters chassis server CIMC mode
Step 3 UCS-A /chassis/server/CIMC # reset Resets the CIMC for the blade server.
The following example resets the CIMC for blade server 4 in chassis 2 and commits the transaction:
UCS-A# scope server 2/4
UCS-A /chassis/server # scope CIMC
UCS-A /chassis/server/cimc # reset
UCS-A /chassis/server/cimc* # commit-buffer
UCS-A /chassis/server/cimc #
Caution Clearing TPM is a potentially hazardous operation. The OS may stop booting. You may also see loss of
data.
Procedure
Step 3 UCS-A# /chassis/server/tpm # set adminaction Specifies that the TPM is to be cleared.
clear-config
The following example shows how to clear TPM for a blade server:
Important Remove all attached or mapped USB storage from a server before you attempt to recover the corrupt BIOS
on that server. If an external USB drive is attached or mapped from vMedia to the server, BIOS recovery
fails.
Procedure
Step 2 UCS-A /chassis/server # recover-bios Loads and activates the specified BIOS version.
version
Step 3 UCS-A /chassis/server # commit-buffer Commits the transaction.
Procedure
The following example sends an NMI from server 4 in chassis 2 and commits the transaction:
UCS-A# scope server 2/4
UCS-A /chassis/server # diagnostic-interrupt
UCS-A /chassis/server* # commit-buffer
UCS-A /chassis/server #
Name Description
Severity column The severity of the alarm. This can be one of the following:
• Critical—The blade health LED is blinking amber.
• Minor—The blade health LED is amber.
Sensor Name column The name of the sensor that triggered the alarm.
Step 2 UCS-A /chassis/server # show health-led Displays the health LED and sensor alarms for
expand the selected server.
The following example shows how to display the health LED status and sensor alarms for chassis 1 server 1:
UCS-A# scope server 1/1
UCS-A /chassis/server # show health-led
Health LED:
Severity: Minor
Reason:: P0V75_STBY:Voltage Threshold Crossed;TEMP_SENS_FRONT:Temperature Threshold
Crossed;
Color: Amber
Oper State:: On
Sensor Alarm:
Severity: Minor
Sensor ID: 7
Sensor Name: P0V75_STBY
Alarm Desc: Voltage Threshold Crossed
Severity: Minor
Sensor ID: 76
Sensor Name: TEMP_SENS_FRONT
Alarm Desc: Temperature Threshold Crossed
Severity: Minor
Sensor ID: 91
Sensor Name: DDR3_P1_D2_TMP
Alarm Desc: Temperature Threshold Crossed
UCS-A /chassis/server #
Tip For information on how to integrate a supported Cisco UCS rack-mount server with Cisco UCS Manager,
see the Cisco UCS C-series server integration guide or Cisco UCS S-series server integration guide for
your Cisco UCS Manager release.
Note Only those servers added to a server pool automatically during discovery will be removed automatically.
Servers that have been manually added to a server pool have to be removed manually.
If you need to add a removed rack-mount server back to the configuration, it must be reconnected and then
rediscovered. When a server is reintroduced to Cisco UCS Manager it is treated like a new server and is subject
to the deep discovery process. For this reason, it's possible that Cisco UCS Manager will assign the server a
new ID that may be different from the ID that it held before.
Important Do not use any of the following options on an associated server that is currently powered off:
• Reset in the GUI
• cycle cycle-immediate or reset hard-reset-immediate in the CLI
• The physical Power or Reset buttons on the server
If you reset, cycle, or use the physical power buttons on a server that is currently powered off, the server's
actual power state might become out of sync with the desired power state setting in the service profile. If the
communication between the server and Cisco UCS Manager is disrupted or if the service profile configuration
changes, Cisco UCS Manager might apply the desired power state from the service profile to the server,
causing an unexpected power change.
Power synchronization issues can lead to an unexpected server restart, as shown below:
Desired Power State in Service Current Server Power State Server Power State After
Profile Communication Is Disrupted
Up Powered Off Powered On
Procedure
Step 2 UCS-A /org # scope service-profile Enters organization service profile mode for the
profile-name specified service profile.
Step 3 UCS-A /org/service-profile # power Boots the rack-mount server associated with the
up service profile.
The following example boots the rack-mount server associated with the service profile named ServProf34
and commits the transaction:
UCS-A# scope org /
UCS-A /org* # scope service-profile ServProf34
UCS-A /org/service-profile # power up
UCS-A /org/service-profile* # commit-buffer
UCS-A /org/service-profile #
Procedure
Step 2 UCS-A /org # scope service-profile Enters organization service profile mode for the
profile-name specified service profile.
Step 3 UCS-A /org/service-profile # power Shuts down the rack-mount server associated with
down the service profile.
The following example shuts down the rack-mount server associated with the service profile named ServProf34
and commits the transaction:
UCS-A# scope org /
UCS-A /org # scope service-profile ServProf34
UCS-A /org/service-profile # power down
UCS-A /org/service-profile* # commit-buffer
UCS-A /org/service-profile #
The following example immediately power cycles rack-mount server 2 and commits the transaction:
UCS-A# scope server 2
UCS-A /server # cycle cycle-immediate
UCS-A /server* # commit-buffer
UCS-A /server #
Note If you are trying to boot a server from a power-down state, you should not use Reset.
If you continue the power-up with this process, the desired power state of the servers become out of sync
with the actual power state and the servers might unexpectedly shut down at a later time. To safely reboot
the selected servers from a power-down state, click Cancel, then select the Boot Server action.
Procedure
Step 2 UCS-A /server # reset Performs a hard reset of the rack-mount server.
{hard-reset-immediate | Use the hard-reset-immediate keyword to immediately
hard-reset-wait} begin hard resetting the rack-mount server; use the
hard-reset-wait keyword to schedule the hard reset to
begin after all pending management operations have
completed.
Step 3 UCS-A /server # commit-buffer Commits the transaction to the system configuration.
The following example performs an immediate hard reset of rack-mount server 2 and commits the transaction:
UCS-A# scope server 2
UCS-A /server # reset hard-reset-immediate
UCS-A /server* # commit-buffer
UCS-A /server #
Procedure
The following example acknowledges rack-mount server 2 and commits the transaction:
UCS-A# acknowledge server 2
UCS-A* # commit-buffer
UCS-A #
The following example decommissions rack-mount server 2 and commits the transaction:
UCS-A# decommission server 2
UCS-A* # commit-buffer
UCS-A #
Procedure
Step 2 Verify that the server inventory • The rack-mount server you want to renumber
does not include the following:
• A rack-mount server with the number you want to use
Step 3 UCS-A# recommission server Recommissions and renumbers the specified rack-mount
vendor-name model-name server.
serial-numnew-id
Step 4 UCS-A# commit-buffer Commits the transaction to the system configuration.
The following example decommissions a rack-mount server with ID 2, changes the ID to 3, recommissions
that server, and commits the transaction:
UCS-A# show server inventory
Server Equipped PID Equipped VID Equipped Serial (SN) Slot Status Ackd Memory (MB)
Ackd Cores
------- ------------ ------------ -------------------- ---------------- ----------------
----------
1/1 UCSB-B200-M3 V01 FCH1532718P Equipped 131072
16
1/2 UCSB-B200-M3 V01 FCH153271DF Equipped 131072
16
1/3 UCSB-B200-M3 V01 FCH153271DL Equipped 114688
16
1/4 UCSB-B200-M3 V01 Empty
1/5 Empty
1/6 Empty
1/7 N20-B6730-1 V01 JAF1432CFDH Equipped 65536
16
1/8 Empty
1 R200-1120402W V01 QCI1414A02J N/A 49152
12
2 R210-2121605W V01 QCI1442AHFX N/A 24576 8
4 UCSC-BSE-SFF-C200 V01 QCI1514A0J7 N/A 8192 8
Server Equipped PID Equipped VID Equipped Serial (SN) Slot Status Ackd Memory (MB)
Ackd Cores
------- ------------ ------------ -------------------- ---------------- ----------------
----------
1/1 UCSB-B200-M3 V01 FCH1532718P Equipped 131072
16
1/2 UCSB-B200-M3 V01 FCH153271DF Equipped 131072
16
1/3 UCSB-B200-M3 V01 FCH153271DL Equipped 114688
16
1/4 UCSB-B200-M3 V01 Empty
1/5 Empty
1/6 Empty
1/7 N20-B6730-1 V01 JAF1432CFDH Equipped 65536
16
1/8 Empty
1 R200-1120402W V01 QCI1414A02J N/A 49152
12
3 R210-2121605W V01 QCI1442AHFX N/A 24576 8
4 UCSC-BSE-SFF-C200 V01 QCI1514A0J7 N/A 8192 8
Procedure
The following example removes rack-mount server 4 and commits the transaction:
UCS-A# remove server 4
UCS-A* # commit-buffer
UCS-A #
What to Do Next
If you physically reconnect the rack-mount server, you must re-acknowledge it for the Cisco UCS Manager
to rediscover the server.
For more information, see Acknowledging a Rack-Mount Server, on page 726.
Step 2 UCS-A /server # enable locator-led Turns on the rack-mount server locator LED.
The following example turns on the locator LED for rack-mount server 2 and commits the transaction:
UCS-A# scope server 2
UCS-A /server # enable locator-led
UCS-A /server* # commit-buffer
UCS-A /server #
Step 2 UCS-A /server # disable locator-led Turns off the rack-mount server locator LED.
The following example turns off the locator LED for rack-mount server 2 and commits the transaction:
UCS-A# scope server 2
UCS-A /server # disable locator-led
UCS-A /server* # commit-buffer
UCS-A /server #
Procedure
Step 2 UCS-A /server # reset-cmos Resets the CMOS for the rack-mount server.
The following example resets the CMOS for rack-mount server 2 and commits the transaction:
UCS-A# scope server 2
UCS-A /server # reset-cmos
UCS-A /server* # commit-buffer
UCS-A /server #
Procedure
Step 3 UCS-A /server/CIMC # reset Resets the CIMC for the rack-mount server.
The following example resets the CIMC for rack-mount server 2 and commits the transaction:
UCS-A# scope server 2
UCS-A /server # scope CIMC
UCS-A /server/cimc # reset
UCS-A /server/cimc* # commit-buffer
UCS-A /server/cimc #
Caution Clearing TPM is a potentially hazardous operation. The OS may stop booting. You may also see loss of
data.
Procedure
Step 3 UCS-A# /server/tpm # set adminaction Specifies that the TPM is to be cleared.
clear-config
Step 4 UCS-A# /server/tpm # commit-buffer Commits the transaction to the system
configuration.
The following example shows how to clear TPM for a rack-mount server:
Important Remove all attached or mapped USB storage from a server before you attempt to recover the corrupt BIOS
on that server. If an external USB drive is attached or mapped from vMedia to the server, BIOS recovery
fails.
Procedure
Step 2 UCS-A /server # recover-bios version Loads and activates the specified BIOS
version.
The following example shows the status for all servers in the Cisco UCS domain. The servers numbered 1
and 2 do not have a slot listed in the table because they are rack-mount servers.
Server Slot Status Availability Overall Status Discovery
--------------------------------------------------------------------
1/1 Equipped Unavailable Ok Complete
1/2 Equipped Unavailable Ok Complete
1/3 Equipped Unavailable Ok Complete
1/4 Empty Unavailable Ok Complete
1/5 Equipped Unavailable Ok Complete
1/6 Equipped Unavailable Ok Complete
1/7 Empty Unavailable Ok Complete
1/8 Empty Unavailable Ok Complete
1 Equipped Unavailable Ok Complete
2 Equipped Unavailable Ok Complete
Procedure
The following example sends an NMI from server 4 in chassis 2 and commits the transaction:
UCS-A# scope server 2/4
UCS-A /chassis/server # diagnostic-interrupt
UCS-A /chassis/server* # commit-buffer
UCS-A /chassis/server #
A new session is generally added when a user connects to KVM, vMedia, or SOL. A Pnuos vMedia session
will be displayed in the session table during the server discovery with the user name __vmediausr__.
The CIMC session data is available under the CIMC Sessions tab in Cisco UCS Manager GUI. Any CIMC
session terminated by the user is audit logged with proper details.
Note To perform the GUI and CLI tasks that are described in this guide, a CIMC image version of 2.1(2a) or
above is required for the session management support for the blade servers. The latest CIMC image version
of 1.5(1l) and above is required for the rack-servers.
Note Viewing CIMC sessions of a specific server or a service-profile option is not present in CLI. It is available
in GUI.
Procedure
Step 2 UCS-A /security # show cimc-sessions local Displays all CIMC sessions opened by the local
users.
Step 3 UCS-A /security # show cimc-sessions local Displays all CIMC sessions opened by a
user-name specific local user.
Procedure
Step 2 UCS-A /security # show cimc-sessions Displays all CIMC sessions opened by the
remote remote users.
Step 3 UCS-A /security # show cimc-sessions Displays all CIMC sessions opened by a
remote user-name specific remote user.
Procedure
Step 2 UCS-A /org # scope ipmi-access-profile Enters the IPMI access profile name.
profile-name
Step 3 UCS-A /org/ipmi-access-profile # scope Enters an IPMI user name.
ipmi-user user-name
Step 4 UCS-A /org/ipmi-access-profile/ipmi-user # Displays all CIMC sessions opened by the
show cimc-sessions specified IPMI User.
The following example shows how to view all the CIMC sessions opened by an IPMI user:
UCS-A # scope org Finance
UCS-A /org* # scope ipmi-access-profile ReadOnly
UCS-A /org/ipmi-access-profile* # scope ipmi-user alice
UCS-A /org/ipmi-access-profile/ipmi-user # show cimc-sessions
Procedure
Step 2 UCS-A /security # terminate cimc-sessions Clears the CIMC sessions on a specific
server chassis-id/blade-id blade server of a chassis.
Step 3 UCS-A /security # terminate cimc-sessions Clears the CIMC sessions on a specific rack
server Rack-server-id server.
Step 4 UCS-A /security # terminate cimc-sessions Clears the CIMC sessions of a specific type
server server-id type session-type on a server.
Step 5 UCS-A /security # terminate cimc-sessions Clears the CIMC sessions of a specific user
server server-id user-name user-name on a server.
The first example shows how to clear all CIMC sessions on a server. The second example shows how to clear
the CIMC sessions of a specific type on a server. The third example shows how to clear the CIMC sessions
of a specific user on a server:
UCS-A /security # scope security
UCS-A /security # terminate cimc-sessions server 2/1
This will close KVM sessions. Are you sure? (yes/no):yes
UCS-A /security
Procedure
Step 2 UCS-A /security # terminate cimc-sessions Clears all CIMC sessions opened by a local
local-user user-name user.
Step 3 UCS-A /security # terminate cimc-sessions Clears all CIMC sessions of specific session
local-user user-name type {kvm | vmedia sol | type opened by a local user.
all}
The following example shows how to clear the CIMC sessions opened by a local user:
UCS-A /security# scope security
UCS-A /security# terminate cimc-sessions local-user testuser
This will close cimc sessions. Are you sure? (yes/no):yes
UCS-A /security#
Procedure
Step 2 UCS-A /security # terminate cimc-sessions Clears all CIMC sessions opened by a
remote-user user-name remote user.
Step 3 UCS-A /security # terminate cimc-sessions Clears all CIMC sessions of specific session
remote-user user-name type {kvm | vmedia sol type opened by a remote user.
| all}
The following example shows how to clear all CIMC sessions opened by a remote user:
UCS-A /security# scope security
UCS-A /security# terminate cimc-sessions remote-user testuser
This will close cimc sessions. Are you sure? (yes/no):yes
UCS-A /security#
Procedure
Step 2 UCS-A /security # scope local-user user-name Enters local user mode.
Step 3 UCS-A /security/local user # terminate Clears the chosen CIMC session.
cimc-session session-id
Step 4 UCS-A /security/local user* # commit-buffer Commits the transaction.
The following example shows how to clear a specific CIMC session opened by a local user and commits the
transaction:
UCS-A /security# scope security
UCS-A /security# scope local-user admin
UCS-A /security/local user # terminate cimc-session 6_1_2
UCS-A /security/local user*# commit-buffer
UCS-A /security/local user#
Procedure
Step 2 UCS-A /security # scope remote -user user-name Enters remote user mode.
Step 3 UCS-A /security/remote user # terminate Clears the chosen CIMC session.
cimc-session session-id
Step 4 UCS-A /security/remote user* # commit-buffer Commits the transaction.
The following example shows how to clear a specific CIMC session opened by a remote user and commits
the transaction:
UCS-A /security# scope security
UCS-A /security# scope remote-user admin
UCS-A /security/remote user # terminate cimc-session 6_1_3
UCS-A /security/remote user*# commit-buffer
UCS-A /security/remote user#
Procedure
Step 2 UCS-A /org # scope ipmi-access-profile Enters the IPMI access profile name.
profile-name
Step 3 UCS-A /org/ipmi-access-profile # scope ipmi-user Enters the IPMI user.
user-name
The following example displays how to clear a specific CIMC session opened by an IPMI user and commits
the changes:
UCS-A # scope org Finance
UCS-A /org* # scope ipmi-access-profile ReadOnly
UCS-A /org/ipmi-access-profile* # scope ipmi-user alice
UCS-A /org/ipmi-access-profile/ipmi-user # terminate cimc-sessions 5_1_2
UCS-A /org/ipmi-access-profile/ipmi-user* # commit-buffer
Acknowledging an IO Module
Cisco UCS Manager Release 2.2(4) introduces the ability to acknowledge a specific IO module in a chassis.
Note This operation rebuilds the network connectivity between the IO module and the Fabrics to which it is
connected.
Procedure
Step 2 UCS-A /chassis # acknowledge iom {1 | Acknowledges the specified IOM in the chassis.
2}
Step 3 UCS-A /chassis* # commit-buffer Commits the transaction to the system
configuration.
Step 2 UCS-A /chassis # scope iom {a b} Enters chassis IOM mode for the specified
IOM.
The following example resets the IOM on fabric A and commits the transaction:
UCS-A# scope chassis 1
UCS-A /chassis # scope iom a
UCS-A /chassis/iom # reset
UCS-A /chassis/iom* # commit-buffer
UCS-A /chassis/iom #
Procedure
Step 2 UCS-A /chassis # scope iom {a b} Enters chassis IOM mode for the specified IOM.
Step 3 UCS-A /chassis/iom # reset-peer Resets the peer IOM of the specified IOM.
Backup Types
You can perform one or more of the following types of backups in Cisco UCS Manager and Cisco UCS
Central:
• Full state—A binary file that includes a snapshot of the entire system. You can use the file generated
from this backup to restore the system during disaster recovery. This file can restore or rebuild the
configuration on the original fabric interconnect, or recreate the configuration on a different fabric
interconnect. You cannot use this file for an import.
Note You can only use a full state backup file to restore a system that is running the same
version as the system from which the backup file was exported.
• All configuration—An XML file that includes all system and logical configuration settings. You can
use the file generated from this backup to import these configuration settings to the original fabric
interconnect or to a different fabric interconnect. You cannot use this file for a system restore. This file
does not include passwords for locally authenticated users.
• System configuration—An XML file that includes all system configuration settings such as usernames,
roles, and locales. You can use the file generated from this backup to import these configuration settings
to the original fabric interconnect or to a different fabric interconnect. You cannot use this file for a
system restore.
• Logical configuration—An XML file that includes all logical configuration settings such as service
profiles, VLANs, VSANs, pools, and policies. You can use the file generated from this backup to import
these configuration settings to the original fabric interconnect or to a different fabric interconnect. You
cannot use this file for a system restore.
Scheduled Backups
You can create a backup operation in advance and leave the admin state disabled, until you are ready
to run the backup. Cisco UCS Manager does not run the backup operation, save, or export the
configuration file until you set the admin state of the backup operation to enabled.
Incremental Backups
You cannot perform incremental backups.
Scheduled Backups
You can configure policies in Cisco UCS to schedule the following types of backups:
• Full state
• All configuration
Import Configuration
You can import any configuration file that was exported from Cisco UCS. The file does not need to have been
exported from the same Cisco UCS.
Note You cannot import configuration from a higher release to a lower release.
The import function is available for all configuration, system configuration, and logical configuration files.
You can perform an import while the system is up and running. An import operation modifies information
on the management plane only. Some modifications caused by an import operation, such as a change to a
vNIC assigned to a server, can cause a server reboot or other operations that disrupt traffic.
You cannot schedule an import operation. You can, however, create an import operation in advance and leave
the admin state disabled until you are ready to run the import.Cisco UCS will not run the import operation on
the configuration file until you set the admin state to enabled.
You can maintain only one import operation for each location where you saved a configuration backup file.
Import Methods
You can use one of the following methods to import and update a system configuration through Cisco UCS:
• Merge—The information in the imported configuration file is compared with the existing configuration
information. If there are conflicts, the import operation overwrites the information on the Cisco UCS
domain with the information in the import configuration file.
• Replace—The current configuration information is replaced with the information in the imported
configuration file one object at a time.
System Restore
You can use the restore function for disaster recovery.
You can restore a system configuration from any full state backup file that was exported from Cisco UCS.
The file does not need to have been exported from Cisco UCS on the system that you are restoring. When
restoring using a backup file that was exported from a different system, we recommend that you use a system
with the same or similar system configuration and hardware, including fabric interconnects, servers, adapters,
and I/O module or FEX connectivity. Mismatched hardware and system configuration can lead to the restored
system not fully functioning. If there is a mismatch between the I/O module links or servers on the two systems,
acknowledge the chassis and servers after the restore operation.
The restore function is only available for a full state backup file. You cannot import a full state backup file.
You perform a restore through the initial system setup. For more information, see the appropriate Cisco UCS
Central Installation and Upgrade Guide.
Note You can only use a full state backup file to restore a system that is running the same version as the system
from which the backup file was exported.
Procedure
Step 2 UCS-A /system # Creates a backup operation. Specify the URL for the backup file using
create backup URL one of the following syntax:
backup-type {disabled
| enabled} • ftp:// username@hostname / path
• scp:// username@hostname / path
• sftp:// username@hostname / path
• tftp:// hostname : port-num / path
You can save multiple backup operations, but only one operation for each
hostname is saved.
If you use the enable keyword, the backup operation automatically runs
as soon as you enter the commit-buffer command. If you use the disable
keyword, the backup operation will not run until it is enabled. When
enabling a backup operation, you must specify the hostname you used when
creating the backup operation.
The following example shows how to create a disabled all-configuration backup operation for hostname host35
and commit the transaction:
UCS-A# scope system
UCS-A /system* # create backup scp://user@host35/backups/all-config9.bak all-configuration
disabled
Password:
UCS-A /system* # commit-buffer
UCS-A /system #
Step 2 UCS-A /system # scope backup Enters system backup mode for the specified
hostname hostname.
The following example enables a backup operation named host35, enters the password for the SCP protocol,
and commits the transaction:
UCS-A# scope system
UCS-A /system # scope backup host35
UCS-A /system/backup # enable
Password:
UCS-A /system/backup* # commit-buffer
UCS-A /system/backup #
Procedure
Step 2 UCS-A /system # scope backup Enters system backup mode for the specified hostname.
hostname
Step 3 UCS-A /system/backup # (Optional)
disable Disables an enabled backup operation so that it does not
automatically run when the transaction is committed.
The following example adds a description and changes the protocol, username, and password for the host35
backup operation and commits the transaction:
UCS-A# scope system
UCS-A /system # scope backup host35
UCS-A /system/backup # set descr "This is a backup operation for host35."
UCS-A /system/backup* # set protocol sftp
UCS-A /system/backup* # set user UserName32
UCS-A /system/backup* # set password
Password:
UCS-A /system/backup* # set preserve-pooled-values no
UCS-A /system/backup* # commit-buffer
UCS-A /system #
Step 2 UCS-A /system # delete backup hostname Deletes the backup operation for the
specified hostname.
The following example deletes a backup operation for the host35 hostname and commits the transaction:
UCS-A# scope system
UCS-A /system # delete backup host35
UCS-A /system* # commit-buffer
UCS-A /system #
Procedure
Step 2 UCS-A /org # scope Enters the all configuration export policy mode.
backup-policy default
Step 3 UCS-A /org/backup-policy # set Specifies the hostname, IPv4 or IPv6 address of the location
hostname {hostname | ip-addr | where the backup policy is stored. This can be a server, storage
ip6-addr} array, local drive, or any read/write media that the fabric
interconnect can access through the network.
Step 5 UCS-A /org/backup-policy # set Specifies the username the system should use to log in to the
user username remote server. This step does not apply if the TFTP protocol
is used.
Step 6 UCS-A /system/backup-policy # After you press Enter, you are prompted to enter the password.
set password Specifies the password for the remote server username. This
step does not apply if the TFTP protocol is used.
Step 7 UCS-A /system/backup-policy # Specifies the full path to the backup file. This field can contain
set remote-file filename the filename as well as the path. If you omit the filename, the
backup procedure assigns a name to the file.
Step 8 UCS-A /system/backup-policy # Specifies the admin state for the policy. This can be one of
set adminstate {disabled | the following:
enabled}
• enabled—Cisco UCS Manager exports the backup file
using the schedule specified in the Schedule field.
• disabled—Cisco UCS Manager does not export the file.
Step 9 UCS-A /system/backup-policy # Specifies the frequency with which Cisco UCS Manager
set schedule {daily | weekly | exports the backup file.
bi-weekly}
Step 10 UCS-A /system/backup-policy # Specifies a description for the backup policy.
set descr description Enter up to 256 characters. You can use any characters or
spaces except ` (accent mark), \ (backslash), ^ (carat), "
(double quote), = (equal sign), > (greater than), < (less than),
or ' (single quote).
The following example shows how to configure the full state backup policy for a weekly backup and commit
the transaction:
UCS-A# scope org /
UCS-A /org # scope backup-policy default
UCS-A /org/backup-policy # set hostname host35
Procedure
Step 2 UCS-A /org # scope Enters the all configuration export policy mode.
cfg-export-policy default
Step 3 UCS-A /org/cfg-export-policy # Specifies the hostname, IPv4 or IPv6 address of the location
set hostname {hostname | ip-addr where the configuration file is stored. This can be a server,
| ip6-addr} storage array, local drive, or any read/write media that the
fabric interconnect can access through the network.
Note If you use a hostname rather than an IPv4 or IPv6
address, you must configure a DNS server. If the
Cisco UCS domain is not registered with Cisco UCS
Central or DNS management is set to local, configure
a DNS server in Cisco UCS Manager. If the Cisco
UCS domain is registered with Cisco UCS Central
and DNS management is set to global, configure a
DNS server in Cisco UCS Central.
Step 4 UCS-A /org/cfg-export-policy # Specifies the protocol to use when communicating with the
set protocol {ftp | scp | sftp | tftp} remote server.
Step 5 UCS-A /org/cfg-export-policy # Specifies the username the system should use to log in to the
set user username remote server. This step does not apply if the TFTP protocol
is used.
Step 6 UCS-A /system/cfg-export-policy After you press Enter, you are prompted to enter the password.
# set password Specifies the password for the remote server username. This
step does not apply if the TFTP protocol is used.
Step 8 UCS-A /system/cfg-export-policy Specifies the admin state for the policy. This can be one of
# set adminstate {disabled | the following:
enabled}
• enabled—Cisco UCS Manager exports the configuration
information using the schedule specified in the Schedule
field.
• disabled—Cisco UCS Manager does not export the
information.
Step 9 UCS-A /system/cfg-export-policy Specifies the frequency with which Cisco UCS Manager
# set schedule {daily | weekly | exports the configuration information.
bi-weekly}
Step 10 UCS-A /system/cfg-export-policy Specifies a description for the configuration export policy.
# set descr description Enter up to 256 characters. You can use any characters or
spaces except ` (accent mark), \ (backslash), ^ (carat), "
(double quote), = (equal sign), > (greater than), < (less than),
or ' (single quote).
The following example shows how to configure the all configuration export policy for a weekly backup and
commit the transaction:
UCS-A# scope org /
UCS-A /org # scope cfg-export-policy default
UCS-A /org/cfg-export-policy # set hostname host35
UCS-A /org/cfg-export-policy* # set protocol scp
UCS-A /org/cfg-export-policy* # set user UserName32
UCS-A /cfg-export-policy* # set password
Password:
UCS-A /cfg-export-policy* # set remote-file /backups/all-config9.bak
UCS-A /cfg-export-policy* # set adminstate enabled
UCS-A /cfg-export-policy* # set schedule weekly
UCS-A /cfg-export-policy* # set descr "This is an all configuration backup."
UCS-A /cfg-export-policy* # commit-buffer
UCS-A /cfg-export-policy #
Step 2 UCS-A /org # scope Enters the backup/export configuration policy mode.
backup-exp-policy
Step 3 UCS-A /org/backup-exp-policy # Displays the existing backup/export configuration policy.
show
Step 4 UCS-A /org/backup-exp-policy # set Specifies the admin state for the policy. This can be one
adminstate {disable | enable} of the following:
• enable—Cisco UCS Manager raises a fault if a
backup is not taken during the specified time period.
• disable—Cisco UCS Manager does not raise a fault
if a backup is not taken during the specified time
period.
Step 5 UCS-A /org/backup-exp-policy # set Specifies the number of days before you are reminded
frequency Number_of_Days to take a backup. Enter an integer between 1 and 365.
The default value is 30 days.
The following example shows how to view the current backup/export config policy, change the frequency of
the reminders, and commit the transaction:
UCS-A# scope org /
UCS-A /org # scope backup-exp-policy
UCS-A /org/backup-exp-policy # set frequency 5
UCS-A /org/backup-exp-policy* # commit-buffer
UCS-A /org/backup-exp-policy #
• System configuration
• Logical configuration
Procedure
Step 2 UCS-A /system # create Creates an import operation. Specify the URL for the file being
import-config URL imported using one of the following syntax:
{disabled | enabled}
{merge | replace} • ftp:// username@hostname / path
• scp:// username@hostname / path
• sftp:// username@hostname / path
• tftp:// hostname : port-num / path
You can save multiple import operations, but only one operation for
each hostname is saved.
If you use the enable keyword, the import operation automatically
runs as soon as you enter the commit-buffer command. If you use
the disable keyword, the import operation will not run until it is
enabled. When enabling an import operation, you must specify the
hostname you used when creating the import operation.
If you use the merge keyword, the configuration information is
merged with the existing information. If there are conflicts, the system
replaces the information on the current system with the information in
the import configuration file. If you use the replace keyword, the
system takes each object in the import configuration file and overwrites
the corresponding object in the current configuration.
The following example creates a disabled import operation for hostname host35 that replaces the existing
configuration and commits the transaction:
UCS-A# scope system
UCS-A /system* # create import-config scp://user@host35/backups/all-config9.bak disabled
replace
Password:
UCS-A /system/import-config* # commit-buffer
UCS-A /system/import-config #
Procedure
Step 2 UCS-A /system # scope import-config Enters system backup mode for the
hostname specified hostname.
The following example enables an import operation for the host35 hostname and commits the transaction:
UCS-A# scope system
UCS-A /system # scope import-config host35
UCS-A /system/import-config # enable
UCS-A /system/import-config* # commit-buffer
UCS-A /system/import-config #
The following example adds a description, changes the password, protocol and username for the host35 import
operation, and commits the transaction:
UCS-A# scope system
UCS-A /system # scope import-config host35
UCS-A /system/import-config # set descr "This is an import operation for host35."
UCS-A /system/import-config* # set password
Password:
UCS-A /system/import-config* # set protocol sftp
UCS-A /system/import-config* # set user jforlenz32
UCS-A /system/import-config* # commit-buffer
UCS-A /system/import-config #
Step 2 UCS-A /system # delete import-config Deletes the import operation for the
hostname specified hostname.
The following example deletes the import operation for the host35 hostname and commits the transaction:
UCS-A# scope system
UCS-A /system # delete import-config host35
UCS-A /system* # commit-buffer
UCS-A /system #
To avoid issues with VSAN or VLAN configuration, a backup should be restored on the fabric interconnect
that was the primary fabric interconnect at the time of backup.
Note You must have access to a Full State configuration file to perform a system restore. You
cannot perform a system restore with any other type of configuration or backup file.
Procedure
The following example restores a system configuration from the Backup.bak file, which was retrieved from
the 20.10.20.10 backup server using FTP:
Enter the configuration method. (console/gui) ? console
Enter the setup mode; setup newly or restore from backup. (setup/restore) ? restore
NOTE:
To configure Fabric interconnect using a backup file on a remote server,
you will need to setup management interface.
The management interface will be re-configured (if necessary),
based on information stored in the backup file.
Continue to restore this Fabric interconnect from a backup file (yes/no) ? yes
Procedure
Caution For Cisco UCS Mini, this procedure requires you to pull all the fabric interconnects in a Cisco UCS domain
out of their chassis slots. As a result, all data transmission in the Cisco UCS domain is stopped until you
slide the fabric interconnects back into their chassis slots.
For other Cisco UCS configurations, this procedure requires you to power down all fabric interconnects.
As a result, all data transmission in the Cisco UCS domain is stopped until you restart the fabric
interconnects.
Note To determine the role of the fabric interconnects in a cluster when the admin password is lost, open the
Cisco UCS Manager GUI from the IP addresses of both fabric interconnects. The subordinate fabric
interconnect fails with the following message:
UCSM GUI is not available on secondary node.
Procedure
The following example displays the leadership role for both fabric interconnects in a cluster, where fabric
interconnect A has the primary role and fabric interconnect B has the subordinate role:
UCS-A# show cluster state
Cluster Id: 0x4432f72a371511de-0xb97c000de1b1ada4
A: UP, PRIMARY
B: UP, SUBORDINATE
HA READY
Tip To find this information, you can log in with any user account on the Cisco UCS domain.
Procedure
You may need to press the selected key combination multiple times before your screen displays the loader
prompt.
Example:
loader > boot /installables/switch/ucs-6100-k9-kickstart.4.1.3.N2.1.0.11.gbin
Choose a strong password that includes at least one capital letter and one number. The password cannot be
blank.
The new password displays in clear text mode.
Step 7 Exit config terminal mode and return to the boot prompt.
Step 8 Boot the system firmware version on the fabric interconnect.
Fabric(boot)#
load /installables/switch/
system_firmware_version
Example:
Fabric(boot)# load /installables/switch/ucs-6100-k9-system.4.1.3.N2.1.0.211.bin
Tip To find this information, you can log in with any user account on the Cisco UCS domain.
Procedure
You may need to press the selected key combination multiple times before your screen displays the loader
prompt.
You may need to press the selected key combination multiple times before your screen displays the loader
prompt.
Step 5 Boot the kernel firmware version on the primary fabric interconnect.
loader > boot /installables/switch/
kernel_firmware_version
Example:
loader > boot /installables/switch/ucs-6100-k9-kickstart.4.1.3.N2.1.0.11.gbin
Step 8 Exit config terminal mode and return to the boot prompt.
Step 9 Boot the system firmware version on the primary fabric interconnect.
Fabric(boot)# load /installables/switch/
system_firmware_version
Example:
Fabric(boot)# load /installables/switch/ucs-6100-k9-system.4.1.3.N2.1.0.211.bin